Skip to main content

Research Repository

Advanced Search

Outputs (4095)

Tracking GDPR Compliance in Cloud-based Service Delivery (2020)
Journal Article
Barati, M., & Rana, O. (2022). Tracking GDPR Compliance in Cloud-based Service Delivery. IEEE Transactions on Services Computing, 15(3), 1498-1511. https://doi.org/10.1109/tsc.2020.2999559

The European General Data Protection Regulation (GDPR) has had a far-reaching impact on data privacy for cloud providers. GDPR influences access to, storage, and transmission of personal data, requiring these operations to be verified by cloud users... Read More about Tracking GDPR Compliance in Cloud-based Service Delivery.

A Survey of Error Analysis and Calibration Methods for MEMS Triaxial Accelerometers (2020)
Journal Article
Xiao, B., Jiang, Y., Liu, Q., Liu, X., & Sun, M. (2020). A Survey of Error Analysis and Calibration Methods for MEMS Triaxial Accelerometers. Computers, Materials & Continua, 64(1), 389-399. https://doi.org/10.32604/cmc.2020.06092

MEMS accelerometers are widely used in various fields due to their small size and low cost, and have good application prospects. However, the low accuracy limits its range of applications. To ensure data accuracy and safety we need to calibrate MEMS... Read More about A Survey of Error Analysis and Calibration Methods for MEMS Triaxial Accelerometers.

Thresholds: Embedding Virtual Reality in the Museum (2020)
Journal Article
Tennent, P., Martindale, S., Benford, S., Darzentas, D., Brundell, P., & Collishaw, M. (2020). Thresholds: Embedding Virtual Reality in the Museum. Journal on Computing and Cultural Heritage, 13(2), Article 12. https://doi.org/10.1145/3369394

We examine the experience of Thresholds, a virtual reality (VR) recreation of the world's first photographic exhibition, which has toured to multiple museums. Following the method of performance-led research in the wild, we provide an account of the... Read More about Thresholds: Embedding Virtual Reality in the Museum.

Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation (2020)
Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2020). Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation. Forensic Science International: Digital Investigation, 33, Article 300979. https://doi.org/10.1016/j.fsidi.2020.300979

Ransomware continues to grow in both scale, cost, complexity and impact since its initial discovery nearly 30 years ago. Security practitioners are engaged in a continual "arms race" with the ransomware developers attempting to defend their digital i... Read More about Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation.

Robust Visual Saliency Optimization Based on Bidirectional Markov Chains (2020)
Journal Article
Jiang, F., Kong, B., Li, J., Dashtipour, K., & Gogate, M. (2021). Robust Visual Saliency Optimization Based on Bidirectional Markov Chains. Cognitive Computation, 13, 69–80. https://doi.org/10.1007/s12559-020-09724-6

Saliency detection aims to automatically highlight the most important area in an image. Traditional saliency detection methods based on absorbing Markov chain only take into account boundary nodes and often lead to incorrect saliency detection when t... Read More about Robust Visual Saliency Optimization Based on Bidirectional Markov Chains.

Dynamic Precision Autotuning with TAFFO (2020)
Journal Article
Cherubin, S., Cattaneo, D., Chiari, M., & Agosta, G. (2020). Dynamic Precision Autotuning with TAFFO. ACM transactions on architecture and code optimization, 17(2), Article 10. https://doi.org/10.1145/3388785

Many classes of applications, both in the embedded and high performance domains, can trade off the accuracy of the computed results for computation performance. One way to achieve such a trade-off is precision tuning—that is, to modify the data types... Read More about Dynamic Precision Autotuning with TAFFO.

Agile Implementation and Expansive Learning: Identifying Contradictions and Their Resolution Using an Activity Theory Perspective (2020)
Presentation / Conference Contribution
Chita, P., Cruickshank, P., Smith, C., & Richards, K. (2020, June). Agile Implementation and Expansive Learning: Identifying Contradictions and Their Resolution Using an Activity Theory Perspective. Presented at 21st International Conference on Agile Software Development, XP 2020, Copenhagen, Denmark

A key challenge organisations face when transitioning to agile delivery methods is that of quickly and effectively learning new ways of working. This study posits that fundamental historical, cultural and behavioural aspects affect the transition and... Read More about Agile Implementation and Expansive Learning: Identifying Contradictions and Their Resolution Using an Activity Theory Perspective.

Machine Learning-based Real-Time Sensor Drift Fault Detection using Raspberry Pi (2020)
Presentation / Conference Contribution
Saeed, U., Ullah Jan, S., Lee, Y.-D., & Koo, I. (2020, January). Machine Learning-based Real-Time Sensor Drift Fault Detection using Raspberry Pi. Presented at 2020 International Conference on Electronics, Information, and Communication (ICEIC), Barcelona, Spain

From smart industries to smart cities, sensors in the modern world plays an important role by covering a large number of applications. However, sensors get faulty sometimes leading to serious outcomes in terms of safety, economic cost and reliability... Read More about Machine Learning-based Real-Time Sensor Drift Fault Detection using Raspberry Pi.

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure (2020)
Journal Article
Kim, T.-H., Kumar, G., Saha, R., Alazab, M., Buchanan, W. J., Rai, M. K., Geetha, G., & Thomas, R. (2020). CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure. IEEE Access, 8, 94748-94756. https://doi.org/10.1109/access.2020.2995443

The increasing number of devices in the age of Internet-of-Thing (IoT) has arisen a number of problems related to security. Cryptographic processes, more precisely the signatures and the keys, increase and generate an overhead on the network resource... Read More about CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.

An Experimental Evaluation and Characterization of VoIP Over an LTE-A Network (2020)
Journal Article
Di Mauro, M., & Liotta, A. (2020). An Experimental Evaluation and Characterization of VoIP Over an LTE-A Network. IEEE Transactions on Network and Service Management, 17(3), 1626-1639. https://doi.org/10.1109/tnsm.2020.2995505

Mobile telecommunications are converging towards all-IP solutions. This is the case of the Long Term Evolution (LTE) technology that, having no circuit-switched bearer to support voice traffic, needs a dedicated VoIP infrastructure, which often relie... Read More about An Experimental Evaluation and Characterization of VoIP Over an LTE-A Network.