Skip to main content

Research Repository

Advanced Search

Outputs (105)

L3V: A Layered Video Format for 3D Display (2014)
Presentation / Conference Contribution
Mitchell, K., Sinclair, D., Kosek, M., & Swaford, N. (2014, November). L3V: A Layered Video Format for 3D Display. Presented at Conference on Visual Media Production, London

We present a layered video format for 3D interactive display which adapts and exploits well-developed 2D codecs with layer centric packing for real-time user perspective playback. We demonstrate our 3D video format for both handheld 3D on mobile devi... Read More about L3V: A Layered Video Format for 3D Display.

The arrowhead approach for SOA application development and documentation (2014)
Presentation / Conference Contribution
Blomstedt, F., Ferreira, L. L., Klisics, M., Chrysoulas, C., de Soria, I. M., Morin, B., …Varga, P. (2014). The arrowhead approach for SOA application development and documentation. In IECON 2014 - 40th Annual Conference of the IEEE Industrial Electron

The Arrowhead project aims to address the technical and applicative issues associated with cooperative automation based on Service Oriented Architectures. The problems of developing such kind of systems are mainly due to the lack of adequate developm... Read More about The arrowhead approach for SOA application development and documentation.

Computer Science: Driving Entrepreneurship. (2014)
Presentation / Conference Contribution
Smith, S. (2014, October). Computer Science: Driving Entrepreneurship. Paper presented at 10th European Computer Science Summit

No abstract available.

Dependency tree-based rules for concept-level aspect-based sentiment analysis (2014)
Presentation / Conference Contribution
Poria, S., Ofek, N., Gelbukh, A., Hussain, A., & Rokach, L. (2014). Dependency tree-based rules for concept-level aspect-based sentiment analysis. In Semantic Web Evaluation Challenge: SemWebEval 2014 at ESWC 2014, Anissaras, Crete, Greece, May 25-29, 20

Over the last few years, the way people express their opinions has changed dramatically with the progress of social networks, web communities, blogs, wikis, and other online collaborative media. Now, people buy a product and express their opinion in... Read More about Dependency tree-based rules for concept-level aspect-based sentiment analysis.

PGCert-2014 Academic Paper and Pedagogy model outline (2014)
Presentation / Conference Contribution
Sheykhkanloo, N. M. (2014, October). PGCert-2014 Academic Paper and Pedagogy model outline. Paper presented at Teaching and Learning Enhancement Conference

This paper aims to explore the development of the Abertay Graduate Attributes (AGAs) into one of the computing modules, Issues in Network Security, for third year digital forensic students in school of Science Engineering and Technology (SET) at Univ... Read More about PGCert-2014 Academic Paper and Pedagogy model outline.

Arrowhead compliant virtual market of energy (2014)
Presentation / Conference Contribution
Ferreira, L. L., Siksnys, L., Pedersen, P., Stluka, P., Chrysoulas, C., le Guilly, T., …Pedersen, T. (2014). Arrowhead compliant virtual market of energy. In Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA). https://doi.or

Industrial processes use energy to transform raw materials and intermediate goods into final products. Many efforts have been done on the minimization of energy costs in industrial plants. Apart from working on “how” an industrial process is implemen... Read More about Arrowhead compliant virtual market of energy.

A Novel Feature Selection Approach for Intrusion Detection Data Classification (2014)
Presentation / Conference Contribution
Ambusaidi, M. A., He, X., Tan, Z., Nanda, P., Lu, L. F., & Nagar, U. T. (2014). A Novel Feature Selection Approach for Intrusion Detection Data Classification. . https://doi.org/10.1109/trustcom.2014.15

Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats. However, the routinely produced analytical data from computer networks ar... Read More about A Novel Feature Selection Approach for Intrusion Detection Data Classification.

A Stateful Mechanism for the Tree-Rule Firewall (2014)
Presentation / Conference Contribution
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2014). A Stateful Mechanism for the Tree-Rule Firewall. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (122-129). https://doi.org/10.1109/trustcom.2014

In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewall model based on the proposed connection tracking mechanism is then develop... Read More about A Stateful Mechanism for the Tree-Rule Firewall.

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning (2014)
Presentation / Conference Contribution
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2014). Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (1

The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish the task, and these algorithms require a large number of labeled training d... Read More about Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment (2014)
Presentation / Conference Contribution
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014). A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communic

The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovative concept enables a physical device to represent itself in the digital wo... Read More about A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment.