Skip to main content

Research Repository

Advanced Search

All Outputs (20)

Depth codec for real-time, high-quality light field reconstruction (2019)
Patent
Mitchell, K., Koniaris, C., Kosek, M., & Sinclair, D. Depth codec for real-time, high-quality light field reconstruction. US20190313080A1

Systems, methods, and articles of manufacture are disclosed that enable the compression of depth data and real-time reconstruction of high-quality light fields. In one aspect, spatial compression and decompression of depth images is divided into the... Read More about Depth codec for real-time, high-quality light field reconstruction.

Deep Cognitive Neural Network (DCNN) (2019)
Patent
Howard, N., Adeel, A., Gogate, M., & Hussain, A. (2019). Deep Cognitive Neural Network (DCNN). US2019/0156189

Embodiments of the present systems and methods may provide a more efficient and low-powered cognitive computational platform utilizing a deep cognitive neural network (DCNN), incorporating an architecture that integrates convolutional feedforward and... Read More about Deep Cognitive Neural Network (DCNN).

Memory Allocation For Seamless Media Content Presentation (2019)
Patent
Mitchell, K., Koniaris, C., & Chitalu, F. (2019). Memory Allocation For Seamless Media Content Presentation. US20190096028

A system for performing memory allocation for seamless media content presentation includes a computing platform having a CPU, a GPU having a GPU memory, and a main memory storing a memory allocation software code. The CPU executes the memory allocati... Read More about Memory Allocation For Seamless Media Content Presentation.

System and method for management of confidential data (2018)
Patent
Buchanan, B., Lo, O., Macfarlane, R., Penrose, P., & Ramsay, B. (2018). System and method for management of confidential data. GB2561176A

This application is for a method of data management to identify confidential digital content on a database by first receiving a management request 302 from a system 304 to carry out data management operations. These include the identification of data... Read More about System and method for management of confidential data.

Real-time rendering with compressed animated light fields (2018)
Patent
Mitchell, K., Koniaris, C., Kosek, M., & Sinclair, D. (2018). Real-time rendering with compressed animated light fields. US20180322691

Systems, methods, and articles of manufacture for real-time rendering using compressed animated light fields are disclosed. One embodiment provides a pipeline, from offline rendering of an animated scene from sparse optimized viewpoints to real-time... Read More about Real-time rendering with compressed animated light fields.

Method for identification of digital content (2018)
Patent
Buchanan, B., Lo, O., Penrose, P., Ramsay, B., & Macfarlane, R. (2018). Method for identification of digital content. World Intellectual Property Organization

Many areas oi investigation require searching through data that may be oi interest. One example oi data that may be involved in an investigation is copyrighted material that may be suspected of having been obtained or reproduced illegally by a third... Read More about Method for identification of digital content.

System and method of presenting views of a virtual space (2018)
Patent
Mitchell, K., Koniaris, C., Iglesias-Guitian, J., Moon, B., & Smolikowski, E. (2018). System and method of presenting views of a virtual space. US20180114343

Views of a virtual space may be presented based on predicted colors of individual pixels of individual frame images that depict the views of the virtual space. Predictive models may be assigned to individual pixels that predict individual pixel color... Read More about System and method of presenting views of a virtual space.

Leaf-based Routing Mechanism for Low-Power and Lossy Networks (2018)
Patent
Ghaleb, B., & Al-Dubai, A. (2018). Leaf-based Routing Mechanism for Low-Power and Lossy Networks. 1800668.4. Intellectual Property Office, UK

Unlike existing solutions, our invention provides a “Leaf-Based” mechanism for establishing the Downward routes in Low-Power and Lossy Networks (LLNs) that seeks to provide a novel, scalable and efficient routing solution for LLNs, which are the back... Read More about Leaf-based Routing Mechanism for Low-Power and Lossy Networks.

Resilient secret sharing cloud based architecture for data vault (2016)
Patent
Lanc, D., Fan, L., MacKinnon, L., & Buchanan, B. (2016). Resilient secret sharing cloud based architecture for data vault

A method of securely storing data including: providing, within a secure data storage system, a plurality of secret sharing methods for selection and identifying a striping policy for storage of the data, in accordance with input preferences. The data... Read More about Resilient secret sharing cloud based architecture for data vault.

Simulation and skinning of heterogeneous texture detail deformation (2016)
Patent
Koniaris, C., Mitchell, K., & Cosker, D. (2016). Simulation and skinning of heterogeneous texture detail deformation. US2016133040

A method is disclosed for reducing distortions introduced by deformation of a surface with an existing parameterization. In an exemplary embodiment, the method comprises receiving a rest pose mesh comprising a plurality of faces, a rigidity map corre... Read More about Simulation and skinning of heterogeneous texture detail deformation.

Content aware texture mapping on deformable surfaces (2014)
Patent
Koniaris, C., Cosker, D., Yang, X., Mitchell, K., & Matthews, I. (2014). Content aware texture mapping on deformable surfaces. US2014267306

A method is disclosed for reducing distortions introduced by deformation of a surface with an existing parameterization. In one embodiment, the distortions are reduced over a user-specified convex region in texture space ensuring optimization is loca... Read More about Content aware texture mapping on deformable surfaces.

Many-to-Many embedded multicast addressing and access control method. (2012)
Patent
Romdhani, I. (2012). Many-to-Many embedded multicast addressing and access control method

A new addressing scheme for multicast IP with an extended scope field to include access rights. A new addressing scheme for multicast communications is disclosed. A new extended scope field is used which embeds a plurality of hierarchical scopes and... Read More about Many-to-Many embedded multicast addressing and access control method..

Identifying components of a network having high importance for network integrity (2009)
Patent
Young, M. P., Andras, P. E., & O'Neill, M. A. (2009). Identifying components of a network having high importance for network integrity. US20090062136A1

A computer system (2) is provided which is arranged to receive network data (1) identifying nodes and links between nodes. The computer system (2) processes the input network data (1) to utilise the network topology to identify nodes and links having... Read More about Identifying components of a network having high importance for network integrity.

Multicast Routing (2005)
Patent
Romdhani, I. (2005). Multicast Routing. WO2006US02514 20060119

A method, and system for routing multicast data traffic to a mobile node (48), e.g. a mobile receiver or a Mobile Router, in a packet data network (41), for example IP multicast in an IPv4 or an IPv6 network, comprising: a home agent (52) receiving m... Read More about Multicast Routing.

Network node, a communication network and a method of operation therefor (2005)
Patent
Lach, H., & Romdhani, I. (2005). Network node, a communication network and a method of operation therefor. US20050720871 20051209

A communication network (100) comprises a roaming network node (109) which may move within the network. The network node (109) comprises a network interface (201) for receiving data from a first node (107) of the network (100). The received data may... Read More about Network node, a communication network and a method of operation therefor.

Method and apparatus for identifying components of a network having high importance for network integrity (2004)
Patent
Young, M. P., Andras, P. E., & O'Neill, M. A. (2004). Method and apparatus for identifying components of a network having high importance for network integrity. WO2004040497A3

A computer system (2) is provided which is arranged to receive network data (1) identifying nodes and links between nodes. The computer system (2) processes the input network data (1) to utilise the network topology to identify nodes and links having... Read More about Method and apparatus for identifying components of a network having high importance for network integrity.