Date


School

Download Available

121 results

Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks

Journal Article
Torres Vega, M., Koonen, A. M. J., Liotta, A., & Famaey, J. (2018)
Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks. IEEE Wireless Communications Letters, 7(2), 278-281. https://doi.org/10.1109/lwc.2017.2771771
In light of the extreme radio congestion, the time has come to consider the upper parts of the electromagnetic spectrum. Optical beam-steered wireless communications offer gre...

Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence

Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017)
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), 1-38. https://doi.org/10.1145/3041956
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, inclu...

Resilience of Video Streaming Services to Network Impairments

Journal Article
Torres Vega, M., Perra, C., & Liotta, A. (2018)
Resilience of Video Streaming Services to Network Impairments. IEEE Transactions on Broadcasting, 64(2), 220-234. https://doi.org/10.1109/tbc.2017.2781125
When dealing with networks, performance management through conventional quality of service (QoS)-based methods becomes difficult and is often ineffective. In fact, quality eme...

Distributed healthcare framework using patient-centric role-based security modelling and workflow

Thesis
Symes, M. (2008)
Distributed healthcare framework using patient-centric role-based security modelling and workflow. (Dissertation). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4008
Healthcare professionals are spending less time with patients and more time on administrative duties (Royal College of Nursing, 2008). This is due to a high bureaucratic deman...

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016)
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirem...

A performance model for integrated wireless mesh networks and WLANs with heterogeneous stations.

Conference Proceeding
Wu, Y., Min, G., Li, K., & Al-Dubai, A. (2009)
A performance model for integrated wireless mesh networks and WLANs with heterogeneous stations. In GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference (1-6). https://doi.org/10.1109/GLOCOM.2009.5425390
The increasing demand for the coverage of high-speed wireless local area networks (WLANs) is driving the installation of a very large number of access points. Wireless mesh ne...

On-Line Building Energy Optimization Using Deep Reinforcement Learning

Journal Article
Mocanu, E., Mocanu, D. C., Nguyen, P. H., Liotta, A., Webber, M. E., Gibescu, M., & Slootweg, J. G. (2019)
On-Line Building Energy Optimization Using Deep Reinforcement Learning. IEEE Transactions on Smart Grid, 10(4), 3698-3708. https://doi.org/10.1109/tsg.2018.2834219
Unprecedented high volumes of data are becoming available with the growth of the advanced metering infrastructure. These are expected to benefit planning and operation of the ...

Numerical encoding to tame SQL injection attacks

Conference Proceeding
Uwagbole, S., Buchanan, W. J., & Fan, L. (2016)
Numerical encoding to tame SQL injection attacks. In 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS),https://doi.org/10.1109/NOMS.2016.7502997
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases....

Spatial anomaly detection in sensor networks using neighborhood information

Journal Article
Bosman, H. H., Iacca, G., Tejada, A., Wörtche, H. J., & Liotta, A. (2017)
Spatial anomaly detection in sensor networks using neighborhood information. Information Fusion, 33, 41-56. https://doi.org/10.1016/j.inffus.2016.04.007
The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capability, has now matured after a decade-long research effort and technological ad...

A Review of Predictive Quality of Experience Management in Video Streaming Services

Journal Article
Torres Vega, M., Perra, C., De Turck, F., & Liotta, A. (2018)
A Review of Predictive Quality of Experience Management in Video Streaming Services. IEEE Transactions on Broadcasting, 64(2), 432-445. https://doi.org/10.1109/tbc.2018.2822869
Satisfying the requirements of devices and users of online video streaming services is a challenging task. It requires not only managing the network quality of service but als...