Research explorer tool

Date


School

People

Output Type

Download Available

82 results

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things

Conference Proceeding
Semedo, F., Moradpoor, N., & Rafiq, M. (2018)
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. In SIN '18 Proceedings of the 11th International Conference on Security of Information and Networkshttps://doi.org/10.1145/3264437.3264438
The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Position...

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device

Conference Proceeding
Lo, O., Buchanan, W. J., & Carson, D. (2017)
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security
Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consu...

Head-mounted displays as opera glasses: using mixed-reality to deliver an egalitarian user experience during live events

Conference Proceeding
Bishop, C., Esteves, A., & McGregor, I. (2017)
Head-mounted displays as opera glasses: using mixed-reality to deliver an egalitarian user experience during live events. In ICMI 2017 Proceedings of the 19th ACM International Conference on Multimodal Interactionhttps://doi.org/10.1145/3136755.3136781
This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-...

An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs

Conference Proceeding
Liu, X., & Liu, Q. (2017)
An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. In X. Sun, H. C. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security (ICCCS 2017), (450-459). https://doi.org/10.1007/978-3-319-68505-2_39
With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. Ho...

Insider threat detection using principal component analysis and self-organising map

Conference Proceeding
Moradpoor, N., Brown, M., & Russell, G. (2017)
Insider threat detection using principal component analysis and self-organising map. In 10th International Conference on Security of Information and Networks (SIN 2017)https://doi.org/10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...

Emergence of hierarchy from the evolution of individual influence in an agent-based model

Conference Proceeding
Perret, C., Powers, S. T., & Hart, E. (2017)
Emergence of hierarchy from the evolution of individual influence in an agent-based model. In Proceedings of the 14th European Conference on Artificial Life 2017, (348-355
The sudden transition from egalitarian groups to hierarchical societies that occurred with the origin of agriculture is one of the most striking features of the evolution of h...

IRIDiuM+: deep media storytelling with non-linear light field video

Conference Proceeding
Kosek, M., Koniaris, B., Sinclair, D., Markova, D., Rothnie, F., Smoot, L., & Mitchell, K. (2017)
IRIDiuM+: deep media storytelling with non-linear light field video. In SIGGRAPH '17 ACM SIGGRAPH 2017 VR Village. https://doi.org/10.1145/3089269.3089277
We present immersive storytelling in VR enhanced with non-linear sequenced sound, touch and light. Our Deep Media (Rose 2012) aim is to allow for guests to physically enter re...

AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks

Conference Proceeding
Rotärmel, S., Farrenkopf, T., Guckert, M., & Urquhart, N. (2017)
AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks. In Y. Demazeau, P. Davidsson, J. Bajo, & Z. Vale (Eds.), Advances in Practical Applications of Cyber-Physical Multi-Agent Systems: The PAAMS Collection. , (355-358). https://doi.org/10.1007/978-3-319-59930-4_37
AGADE-TRAFFIC is a tool for simulating traffic flow in networks. Traffic participants are modelled as NetLogo agents and are visualised in a graphical user interface. Geograph...

Antipattern comprehension: an empirical evaluation

Conference Proceeding
Hou, T., Chapman, P., & Blake, A. (2016)
Antipattern comprehension: an empirical evaluation. In W. Kuhn, & R. Ferrario (Eds.), 9th International Conference on Formal Ontology in Information Systems (FOIS 2016), (211-224). https://doi.org/10.3233/978-1-61499-660-6-211
Comprehension of justifications is known to be difficult for even experienced ontology engineers, and much more so for other stakeholders. In this paper, we present two method...

Interactive Ray-Traced Area Lighting with Adaptive Polynomial Filtering

Conference Proceeding
Iglesias-Guitian, J. A., Moon, B., & Mitchell, K. (2016)
Interactive Ray-Traced Area Lighting with Adaptive Polynomial Filtering. In Proceedings of the 13th European Conference on Visual Media Production (CVMP 2016)
Area lighting computation is a key component for synthesizing photo-realistic rendered images, and it simulates plausible soft shadows by considering geometric relationships b...