Skip to main content

Research Repository

Advanced Search

All Outputs (105)

L3V: A Layered Video Format for 3D Display (2014)
Presentation / Conference Contribution
Mitchell, K., Sinclair, D., Kosek, M., & Swaford, N. (2014, November). L3V: A Layered Video Format for 3D Display. Presented at Conference on Visual Media Production, London

We present a layered video format for 3D interactive display which adapts and exploits well-developed 2D codecs with layer centric packing for real-time user perspective playback. We demonstrate our 3D video format for both handheld 3D on mobile devi... Read More about L3V: A Layered Video Format for 3D Display.

The arrowhead approach for SOA application development and documentation (2014)
Presentation / Conference Contribution
Blomstedt, F., Ferreira, L. L., Klisics, M., Chrysoulas, C., de Soria, I. M., Morin, B., Zabasta, A., Eliasson, J., Johansson, M., & Varga, P. (2014, October). The arrowhead approach for SOA application development and documentation. Presented at IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA

The Arrowhead project aims to address the technical and applicative issues associated with cooperative automation based on Service Oriented Architectures. The problems of developing such kind of systems are mainly due to the lack of adequate developm... Read More about The arrowhead approach for SOA application development and documentation.

Computer Science: Driving Entrepreneurship. (2014)
Presentation / Conference Contribution
Smith, S. (2014, October). Computer Science: Driving Entrepreneurship. Paper presented at 10th European Computer Science Summit

No abstract available.

Dependency tree-based rules for concept-level aspect-based sentiment analysis (2014)
Presentation / Conference Contribution
Poria, S., Ofek, N., Gelbukh, A., Hussain, A., & Rokach, L. (2014, May). Dependency tree-based rules for concept-level aspect-based sentiment analysis. Presented at SemWebEval 2014 at ESWC 2014, Anissaras, Crete, Greece

Over the last few years, the way people express their opinions has changed dramatically with the progress of social networks, web communities, blogs, wikis, and other online collaborative media. Now, people buy a product and express their opinion in... Read More about Dependency tree-based rules for concept-level aspect-based sentiment analysis.

PGCert-2014 Academic Paper and Pedagogy model outline (2014)
Presentation / Conference Contribution
Sheykhkanloo, N. M. (2014, October). PGCert-2014 Academic Paper and Pedagogy model outline. Paper presented at Teaching and Learning Enhancement Conference

This paper aims to explore the development of the Abertay Graduate Attributes (AGAs) into one of the computing modules, Issues in Network Security, for third year digital forensic students in school of Science Engineering and Technology (SET) at Univ... Read More about PGCert-2014 Academic Paper and Pedagogy model outline.

Arrowhead compliant virtual market of energy (2014)
Presentation / Conference Contribution
Ferreira, L. L., Siksnys, L., Pedersen, P., Stluka, P., Chrysoulas, C., le Guilly, T., Albano, M., Skou, A., Teixeira, C., & Pedersen, T. (2014, September). Arrowhead compliant virtual market of energy. Presented at 2014 IEEE Emerging Technology and Factory Automation (ETFA), Barcelona, Spain

Industrial processes use energy to transform raw materials and intermediate goods into final products. Many efforts have been done on the minimization of energy costs in industrial plants. Apart from working on “how” an industrial process is implemen... Read More about Arrowhead compliant virtual market of energy.

A Novel Feature Selection Approach for Intrusion Detection Data Classification (2014)
Presentation / Conference Contribution
Ambusaidi, M. A., He, X., Tan, Z., Nanda, P., Lu, L. F., & Nagar, U. T. (2014). A Novel Feature Selection Approach for Intrusion Detection Data Classification. . https://doi.org/10.1109/trustcom.2014.15

Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats. However, the routinely produced analytical data from computer networks ar... Read More about A Novel Feature Selection Approach for Intrusion Detection Data Classification.

A Stateful Mechanism for the Tree-Rule Firewall (2014)
Presentation / Conference Contribution
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2014, September). A Stateful Mechanism for the Tree-Rule Firewall. Presented at 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications

In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewall model based on the proposed connection tracking mechanism is then develop... Read More about A Stateful Mechanism for the Tree-Rule Firewall.

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning (2014)
Presentation / Conference Contribution
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2014, September). Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. Presented at 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications

The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish the task, and these algorithms require a large number of labeled training d... Read More about Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment (2014)
Presentation / Conference Contribution
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014, September). A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. Presented at 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications

The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovative concept enables a physical device to represent itself in the digital wo... Read More about A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment.

AGADE how individual guidance leads to group behaviour and how this can be simulated (2014)
Presentation / Conference Contribution
Farrenkopf, T., Guckert, M., Hoffmann, B., & Urquhart, N. B. (2014, September). AGADE how individual guidance leads to group behaviour and how this can be simulated. Presented at 12th German Conference, MATES 2014, Stuttgart, Germany

In this paper we will demonstrate how BDI agents can be used to model individuals as participants in social structures where they act as potential buyers in a simple mobile phone market simulation. The simulation presented here is run in AGADE (Agile... Read More about AGADE how individual guidance leads to group behaviour and how this can be simulated.

Cache as a service: Leveraging sdn to efficiently and transparently support video-on-demand on the last mile (2014)
Presentation / Conference Contribution
Georgopoulos, P., Broadbent, M., Plattner, B., & Race, N. (2014, August). Cache as a service: Leveraging sdn to efficiently and transparently support video-on-demand on the last mile. Presented at 2014 23rd International Conference on Computer Communication and Networks (ICCCN), Shanghai, China

High quality online video streaming, both live and on-demand, has become an essential part of consumers' every-day lives. The popularity of video streaming has placed a heavy burden on the network infrastructure that now has to transfer an enormous a... Read More about Cache as a service: Leveraging sdn to efficiently and transparently support video-on-demand on the last mile.

Is British HCI Important? A topic-based comparison with CHI (2014)
Presentation / Conference Contribution
Padilla, S., Methven, T. S., & Chandler, M. J. (2014, September). Is British HCI Important? A topic-based comparison with CHI. Paper presented at HCI 2014 - Sand, Sea and Sky - Holiday HCI, Southport, UK

We have applied topic modelling to the full-text British HCI and CHI corpora in order to automatically derive one hundred topics and their trends. We use these to compare the distributions of topics and changing foci of two conferences over the last... Read More about Is British HCI Important? A topic-based comparison with CHI.

Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, September). Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities. Paper presented at 7th International Conference on Security of Information and Networks (SIN 2014)

This presentation will outline some new research related to the Heartbleed vulnerability, and cover the full technical details of the threat, with a live demo. Along with it will show how Heartbleed is detected on networked device, and some new resea... Read More about Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities..

Generating Verbal Descriptions from Medical Sensor Data: A Corpus Study on User Preferences (2014)
Presentation / Conference Contribution
Gkatzia, D., Rieser, V., Mcsporran, A., Mcgowan, A., Mort, A., & Dewar, M. (2014). Generating Verbal Descriptions from Medical Sensor Data: A Corpus Study on User Preferences. In BCS Health Informatics Scotland (HIS)

Understanding and interpreting medical sensor data is an essential part of pre-hospital care in medical emergencies, but requires training and previous knowledge. In this paper, we describe ongoing work towards a medical decision support tool, which... Read More about Generating Verbal Descriptions from Medical Sensor Data: A Corpus Study on User Preferences.

Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis. (2014)
Presentation / Conference Contribution
Lawson, A., Attridge, A., & Lapok, P. (2014, September). Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis. Paper presented at Eurocall 2014

This project aims to address pronunciation problems of English language learners. Current pronunciation software tools mainly address phonemic difficulties and give little or no analytic feedback. Achievement of near native fluency however involves t... Read More about Guiding learners to near native fluency in English through an adaptive programme of activities which includes phoneme and prosody analysis..

Large-scale SDN experiments in federated environments (2014)
Presentation / Conference Contribution
Carrozzo, G., Monno, R., Belter, B., Krzywania, R., Pentikousis, K., Broadbent, M., Kudoh, T., Takefusa, A., Vieo-Oton, A., Fernandez, C., & et al. (2014, June). Large-scale SDN experiments in federated environments. Presented at 2014 International Conference on Smart Communications in Network Technologies (SaCoNeT), Vilanova i la Geltru, Spain

International cooperation on Software-Defined Networking (SDN), crossing the boundaries of Europe, the Americas and Asia, builds a strong foundation for pursuing experimental research through advanced programmable network testbeds. The EU-Japan joint... Read More about Large-scale SDN experiments in federated environments.

What’s in it for me? Making the case for paid student placements in computer science. (2014)
Presentation / Conference Contribution
Smith, S., & Smith, C. F. (2014, July). What’s in it for me? Making the case for paid student placements in computer science. Paper presented at STEM 2014

Recognising the need for skilled computer science graduates, the university funding body in Scotland, the Scottish Funding Council (SFC) is supporting a Scotland-wide student placement project, e-Placement Scotland, to create 750 new paid student pla... Read More about What’s in it for me? Making the case for paid student placements in computer science..

An improved immune inspired hyper-heuristic for combinatorial optimisation problems. (2014)
Presentation / Conference Contribution
Sim, K., & Hart, E. (2014, July). An improved immune inspired hyper-heuristic for combinatorial optimisation problems

The meta-dynamics of an immune-inspired optimisation sys- tem NELLI are considered. NELLI has previously shown to exhibit good performance when applied to a large set of optimisation problems by sustaining a network of novel heuristics. We address th... Read More about An improved immune inspired hyper-heuristic for combinatorial optimisation problems..