Research explorer tool

Date


School

People

Output Type

Download Available

249 results

"I am Spartacus" – privacy enhancing technologies and privacy as a public good

Journal Article
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2014)
"I am Spartacus" – privacy enhancing technologies and privacy as a public good. Artificial Intelligence and Law, 22(2), 113-139. https://doi.org/10.1007/s10506-014-9155-5
The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This understanding of privacy has...

An efficient neighbourhood load routing metric for wireless mesh networks

Journal Article
Zhao, L., Al-Dubai, A., & Min, G. (2011)
An efficient neighbourhood load routing metric for wireless mesh networks. Simulation Modelling Practice and Theory, 19, 1415-1426. https://doi.org/10.1016/j.simpat.2010.10.009
The Wireless Mesh Network (WMN) is a highly capable technology that can offer low-cost and easy-deployable network connectivity to both small-size community networks and large...

An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation

Journal Article
Fang, D., Liu, X., Romdhani, I., Jamshidi, P., & Pahl, C. (2016)
An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation. Future Generation Computer Systems, 56, 11-26. https://doi.org/10.1016/j.future.2015.09.025
Cloud computing enables a revolutionary paradigm of consuming ICT services. However, due to the inadequately described service information, users often feel confused while try...

An approach to domain-based scalable context management architecture in pervasive environments

Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2012)
An approach to domain-based scalable context management architecture in pervasive environments. Personal and Ubiquitous Computing, 16(6), 741-755. https://doi.org/10.1007/s00779-011-0422-0
In pervasive environments, context management systems are expected to administrate large volume of contextual information that is captured from spatial to nonspatial elements....

An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework

Journal Article
Fang, D., Liu, X., Romdhani, I., & Pahl, C. (2015)
An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework. Journal of cloud computing advances, systems and applications, 4(1), https://doi.org/10.1186/s13677-015-0039-3
Cloud computing offers various computational resources via convenient on-demand service provision. Currently, heterogeneous services and cloud resources are usually utilized a...

A novel privacy preserving method for the location tracking of mobile devices

Journal Article
Buchanan, W. J., & Kwecka, Z. (2011)
A novel privacy preserving method for the location tracking of mobile devices. Wireless Networks,
Two of the major changes within computing, at the present time, are the move towards serviceoriented architectures and the increasing usage of mobile devices to access these s...

A new scalable broadcast algorithm for multiport meshes with minimum communication steps

Journal Article
Ould-Khaoua, M., Al-Dubai, A., Al-Dubai, A., & Ould-Khaoua, M. (2003)
A new scalable broadcast algorithm for multiport meshes with minimum communication steps. Microprocessors and Microsystems, 27(3), 101-113. doi:10.1016/s0141-9331(02)00094-7
Many broadcast algorithms have been proposed for the mesh in the literature. However, most of these algorithms do not exhibit good scalability properties as the network size i...

A new dynamic counter-based broadcasting scheme for mobile ad hoc networks.

Journal Article
Yassein, M. B., Nimer, S. F., & Al-Dubai, A. (2011)
A new dynamic counter-based broadcasting scheme for mobile ad hoc networks. Simulation Modelling Practice and Theory, 19, 553-563. https://doi.org/10.1016/j.simpat.2010.08.011
Broadcasting is an essential operation in Mobile Ad hoc Networks (MANETs) to transmit a message (data packet) from the sender to the rest of the network nodes. Although floodi...

A fuzzy logic controller applied to a diversity-based multi-objective evolutionary algorithm for single-objective optimisation

Journal Article
Segredo, E., Seguro, C., Coromoto, L., & Hart, E. (2014)
A fuzzy logic controller applied to a diversity-based multi-objective evolutionary algorithm for single-objective optimisation. Soft Computing, 19(10), 2927-2945. https://doi.org/10.1007/s00500-014-1454-y
In recent years, Multi-Objective Evolutionary Algorithms (MOEAS) that consider diversity as an objective have been used to tackle single-objective optimisation prob- lems. The...

Culture & biometrics: regional differences in the perception of biometric authentication technologies

Journal Article
Riley, C. W., Buckner, K., Johnson, G., & Benyon, D. (2009)
Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & society, 24, 295-306. https://doi.org/10.1007/s00146-009-0218-1
Previous research has identified user concerns about biometric authentication technology, but most of this research has been conducted in European contexts. There is a lack of...