Skip to main content

Research Repository

Advanced Search

Outputs (273)

E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks (2015)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., & Ekonomou, E. (2015, October). E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks. Presented at IEEE 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communi

Routing Protocol for Low Power and Lossy networks (RPL) is the de-facto standard for routing in resource-constrained low-power and lossy networks (LLNs) which represent the building block for the ever-growing Internet of Things (IoT). RPL along with... Read More about E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks.

Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable (2015)
Presentation / Conference Contribution
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015). Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. In 2015 IEEE International Conference on Computer and Inform

In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random variables and Nakagami-m random variable can be applied in performance analysis... Read More about Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable.

Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks (2015)
Presentation / Conference Contribution
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015, October). Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. Presented at 2015 IEEE International Conference on Computer and Information Technology

Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how a routing protocol for low-power and lossy-networks such as (RPL) would per... Read More about Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks.

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things (2015)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015, October). A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquit

Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However, a regular update process causes extra signaling overhead and drains the n... Read More about A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things.

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK) (2015)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015). A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and

It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefo... Read More about A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK).

Visualizing Sets with Linear Diagrams. (2015)
Journal Article
Rodgers, P., Stapleton, G., & Chapman, P. (2015). Visualizing Sets with Linear Diagrams. ACM transactions on computer-human interaction, 22(6), 1-39. https://doi.org/10.1145/2810012

This paper presents the first design principles that optimize the visualization of sets using linear diagrams. These principles are justified through empirical studies that evaluate the impact of graphical features on task performance. Linear diagr... Read More about Visualizing Sets with Linear Diagrams..

Mobility And Energy Extensions For The IEEE 802.15.4 Standard (2015)
Presentation / Conference Contribution
Romdhani, I., Al-Dubai, A. Y., & Guibene, W. (2015). Mobility And Energy Extensions For The IEEE 802.15.4 Standard. In L. Luke Chen, M. Steinbauer, I. Khalil, & G. Anderst-Kotsis (Eds.), Proceedings of the 13th International Conference on Advances in Mobi

The IEEE 802.15.4 standard is designed for low-power and low-rate wireless Personal Area Networks. Although energy is a key parameter in shaping the communication and interaction methods of wireless sensor nodes, the specification of the MAC layer do... Read More about Mobility And Energy Extensions For The IEEE 802.15.4 Standard.

An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks (2015)
Presentation / Conference Contribution
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Yassein, M. B. (2015, December). An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks. Presented at Proceedings of the 13th International Conference on Advances in Mobile Computi

In Wireless Sensor Networks (WSNs), clustering techniques are among the effective solutions to reduce energy consumption and prolong the network lifetime. During the iterative re-clustering process, extra energy and time are consumed especially at th... Read More about An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks.

Online view sampling for estimating depth from light fields (2015)
Presentation / Conference Contribution
Kim, C., Subr, K., Mitchell, K., Sorkine-Hornung, A., & Gross, M. (2015). Online view sampling for estimating depth from light fields. In 2015 IEEE International Conference on Image Processing (ICIP). https://doi.org/10.1109/icip.2015.7350981

Geometric information such as depth obtained from light fields finds more applications recently. Where and how to sample images to populate a light field is an important problem to maximize the usability of information gathered for depth reconstru... Read More about Online view sampling for estimating depth from light fields.

RESCUE: Resilient Secret Sharing Cloud-based Architecture. (2015)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015, August). RESCUE: Resilient Secret Sharing Cloud-based Architecture. Presented at TrustCom 2015 The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Commu

This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without user’s intervention; and break-glass data recovery, with in-built failover pro... Read More about RESCUE: Resilient Secret Sharing Cloud-based Architecture..