Tailoring methodological bricolage to investigate non-discretionary use of digital technology
Sobolewska, E. (2017)
Tailoring methodological bricolage to investigate non-discretionary use of digital technology. https://doi.org/10.14236/ewic/HCI2017.49
Digital technology appears to be an integral part of everyday life: at homes, workplaces, during leisure time; mediating interactions, demanding attention and engagement. In t...
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017)
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In C. Westphall, K. El-Khatib, D. Krstić, & H. Menouar (Eds.), Proceedings of the Thirteenth International Conference on Wireless and Mobile Communications
The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious ...
The importance of the individual encoding in memetic algorithms with diversity control applied to large Sudoku puzzles
Segura, C., Segredo, E., & Miranda, G. (2017)
The importance of the individual encoding in memetic algorithms with diversity control applied to large Sudoku puzzles. In 2017 IEEE Congress on Evolutionary Computation (CEC). https://doi.org/10.1109/CEC.2017.7969565
In recent years, several memetic algorithms with explicit mechanisms to delay convergence have shown great promise when solving 9x9 Sudoku puzzles. This paper analyzes and ext...
The Effectiveness of Two Audiovisual Mappings to Control a Concatenative Synthesiser
Tsiros, A., & Leplâtre, G. (2017)
The Effectiveness of Two Audiovisual Mappings to Control a Concatenative Synthesiser. In J. Pätynen, V. Välimäki, & T. Lokki (Eds.), Proceedings of the 14th Sound and Music Computing Conference 2017. , (320-327
This paper presents the results of an investigation into audio visual (AV) correspondences conducted as part of the development of Morpheme, a painting interface to control a ...
A new enhanced RPL based routing for Internet of Things
Ghaleb, B., Al-Dubai, A., Ekonomou, E., & Wadhaj, I. (2017)
A new enhanced RPL based routing for Internet of Things. In 2017 IEEE International Conference on Communications. , (1-6). https://doi.org/10.1109/ICCW.2017.7962723
The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the ...
A hybrid method for feature construction and selection to improve wind-damage prediction in the forestry sector
Hart, E., Sim, K., Gardiner, B., & Kamimura, K. (2017)
A hybrid method for feature construction and selection to improve wind-damage prediction in the forestry sector. In GECCO '17 Proceedings of the Genetic and Evolutionary Computation Conference. , (1121-1128). https://doi.org/10.1145/3071178.3071217
Catastrophic damage to forests resulting from major storms has resulted in serious timber and financial losses within the sector across Europe in the recent past. Developing r...
Sustainable HCI: Blending permaculture and user-experience
Benyon, D., & Egan, C. (2017)
Sustainable HCI: Blending permaculture and user-experience. In DIS '17 Companion Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems. , (39-43). https://doi.org/10.1145/3064857.3079115
For approximately 10 years the SIGCHI Sustainable HCI (sHCI) and Sustainable Interaction Design (SID) communities have debated the contribution that HCI can make to sustainabi...
AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks
Rotärmel, S., Farrenkopf, T., Guckert, M., & Urquhart, N. (2017)
AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks. In Y. Demazeau, P. Davidsson, J. Bajo, & Z. Vale (Eds.), Advances in Practical Applications of Cyber-Physical Multi-Agent Systems: The PAAMS Collection. , (355-358). https://doi.org/10.1007/978-3-319-59930-4_37
AGADE-TRAFFIC is a tool for simulating traffic flow in networks. Traffic participants are modelled as NetLogo agents and are visualised in a graphical user interface. Geograph...
New trust metric for the RPL routing protocol
Romdhani, I., Djedjig, N., Medjek, F., & Tandjaoui, D. (2017)
New trust metric for the RPL routing protocol. In 2017 8th International Conference on Information and Communication Systems (ICICS),https://doi.org/10.1109/iacs.2017.7921993
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...
Communicating Connected Components: Extending Plug-and-Play to Support Skeletons
Chalmers, K., Kerridge, J., & Pedersen, J. B. (2017)
Communicating Connected Components: Extending Plug-and-Play to Support Skeletons. In Communicating Process Architectures 2016
For a number of years, the Communicating Process Architecture (CPA) community have developed languages and runtimes supporting message passing concurrency. For these we always...