Skip to main content

Research Repository

Advanced Search

Outputs (230)

Matching and mismatch: understanding employer expectations of work placement applicants (2016)
Presentation / Conference Contribution
Smith, C., & Smith, S. (2016, September). Matching and mismatch: understanding employer expectations of work placement applicants. Paper presented at ACEN

The success and sustainability of work-integrated learning (WIL) is an abiding concern for universities, as institutions seek to mainstream WIL within academic programmes. A supply of placement opportunities, and students successfully being appointe... Read More about Matching and mismatch: understanding employer expectations of work placement applicants.

An Agent-Based Approach for Modelling Peer to Peer Networks (2016)
Presentation / Conference Contribution
Alharbi, H., & Hussain, A. (2016). An Agent-Based Approach for Modelling Peer to Peer Networks. In 2015 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim) (532-537). https://doi.org/10.1109/UKSim.2015.47

A promising modelling and simulation tool is Agent-based Modelling (ABM) that has proved to be an effective and powerful tool across a wide range of fields. However, its exploitation within the Peer to Peer (P2P) paradigm has only recently attracted... Read More about An Agent-Based Approach for Modelling Peer to Peer Networks.

Whole Image Synthesis Using a Deep Encoder-Decoder Network (2016)
Presentation / Conference Contribution
Sevetlidis, V., Giuffrida, M. V., & Tsaftaris, S. A. (2016, October). Whole Image Synthesis Using a Deep Encoder-Decoder Network. Presented at SASHIMI Workshop - MICCAI, Athens, Greece

The synthesis of medical images is an intensity transformation of a given modality in a way that represents an acquisition with a different modality (in the context of MRI this represents the synthesis of images originating from different MR sequence... Read More about Whole Image Synthesis Using a Deep Encoder-Decoder Network.

Will quantum computers be the end of public key encryption? (2016)
Journal Article
Buchanan, W., & Woodward, A. (2016). Will quantum computers be the end of public key encryption?. Journal of Cyber Security Technology, 1(1), 1-22. https://doi.org/10.1080/23742917.2016.1226650

The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-understood algorithms for factoring large composites and solving the discrete log... Read More about Will quantum computers be the end of public key encryption?.

Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA) (2016)
Journal Article
Lo, O., Buchanan, W. J., & Carson, D. (2016). Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology, 1(2), 88-107. https://doi.org/10.1080/23742917.2016.1231523

This article demonstrates two fundamental techniques of power analysis, differential power analysis (DPA) and correlation power analysis (CPA), against a modern piece of hardware which is widely available to the public: the Arduino Uno microcontrolle... Read More about Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA).

Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things (2016)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Paechter, B., & Qasem, M. (2016, April). Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things. Presented at 2016 IEEE Wireless Communications and Networking Conference

Constrained Low-power and Lossy networks (LLNs) represent the building block for the ever-growing Internet of Things (IoT) that deploy the Routing Protocol for Low Power and Lossy networks (RPL) as a key routing standard. RPL, along with other routin... Read More about Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things.

MLCut: exploring multi-level cuts in dendrograms for biological data (2016)
Presentation / Conference Contribution
Vogogias, A., Kennedy, J., Archambault, D., Anne Smith, V., & Currant, H. (2016). MLCut: exploring multi-level cuts in dendrograms for biological data. In C. Turkay, & T. Ruan Wan (Eds.), Computer Graphics and Visual Computing (CGVC). https://doi.org/10.2

Choosing a single similarity threshold for cutting dendrograms is not sufficient for performing hierarchical clustering analysis of heterogeneous data sets. In addition, alternative automated or semi-automated methods that cut dendrograms in multiple... Read More about MLCut: exploring multi-level cuts in dendrograms for biological data.

Influences and benefits of role models on social media (2016)
Presentation / Conference Contribution
Jenkins, L., Lin, R., & Jeske, D. (2016, September). Influences and benefits of role models on social media. Presented at 15th IFIP Conference on e-Business e-Services & e-Society (I3E)

The current paper examined three research questions. First, what are the perceived benefits for social network users who have role models online? Second, to what extent does having role models online influence one’s self-presentation on social media?... Read More about Influences and benefits of role models on social media.

Evaluation of a Sketching Interface to Control a Concatenative Synthesiser (2016)
Presentation / Conference Contribution
Tsiros, A., & Leplâtre, G. (2016). Evaluation of a Sketching Interface to Control a Concatenative Synthesiser. In Proceedings of the 42nd International Computer Music Conference 2016 (74-78)

This paper presents the evaluation of Morpheme a sketching interface for the control of sound synthesis. We explain the task that was designed in order to assess the effectiveness of the interface, detect usability issues and gather participants' res... Read More about Evaluation of a Sketching Interface to Control a Concatenative Synthesiser.

TraceMatch: a computer vision technique for user input by tracing of animated controls (2016)
Presentation / Conference Contribution
Esteves>, A., Clarke, C., Bellino, A., Esteves, A., Velloso, E., & Gellersen, H. (2016). TraceMatch: a computer vision technique for user input by tracing of animated controls. In UbiComp '16 Proceedings of the 2016 ACM International Joint Conference on

Recent works have explored the concept of movement correlation interfaces, in which moving objects can be selected by matching the movement of the input device to that of the desired object. Previous techniques relied on a single modality (e.g. gaze... Read More about TraceMatch: a computer vision technique for user input by tracing of animated controls.