Skip to main content

Research Repository

Advanced Search

All Outputs (285)

Leveraging SDN to provide an in-network QoE measurement framework (2015)
Presentation / Conference Contribution
Farshad, A., Georgopoulos, P., Broadbent, M., Mu, M., & Race, N. (2015). Leveraging SDN to provide an in-network QoE measurement framework. In 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (239-244). https://doi.org/10.1109/I

Online video streaming using HTTP Adaptive Streaming (HAS) is becoming the most popular content delivery mechanism for media services. Network and content providers would like to ensure a high degree of video Quality of Experience (QoE) for their end... Read More about Leveraging SDN to provide an in-network QoE measurement framework.

Detecting communities of methods using dynamic analysis data (2015)
Presentation / Conference Contribution
Andras, P., & Duffee, B. (2015). Detecting communities of methods using dynamic analysis data. In 2015 IEEE/ACM 6th International Workshop on Emerging Trends in Software Metrics. https://doi.org/10.1109/WETSoM.2015.11

Maintaining large-scale software is difficult due to the size and variable nature of such software. Network analysis is a promising approach to extract useful knowledge from network representations of large and complex systems. Community detection is... Read More about Detecting communities of methods using dynamic analysis data.

Till All Are One: Towards a Unified Cloud IDS (2015)
Presentation / Conference Contribution
Pitropakis, N., Lambrinoudakis, C., & Geneiatakis, D. (2015). Till All Are One: Towards a Unified Cloud IDS. In S. Fischer-Hübner, C. Lambrinoudakis, & J. López (Eds.), Trust, Privacy and Security in Digital Business; Lecture Notes in Computer Science (

Recently there is a trend to use cloud computing on service deployment, enjoying various advantages that it offers with emphasis on the economy which is achieved in the era of the financial crisis. However, along with the transformation of technology... Read More about Till All Are One: Towards a Unified Cloud IDS.

Bus bunching along a corridor served by two lines. (2015)
Presentation / Conference Contribution
Sun, W., Schmöcker, J., Liu, R., & Fonzone, A. (2015, August). Bus bunching along a corridor served by two lines. Paper presented at 6th International Symposium on Transportation Network Reliability

Building Fault Tolerant Industrial Applications Based on IEC 61499 (2015)
Presentation / Conference Contribution
de Sousa, M., Chrysoulas, C., & Homay, A. (2015). Building Fault Tolerant Industrial Applications Based on IEC 61499. In FAIM 2015

IEC 61499 defines an execution model for industrial control applications that may be distributed among several devices. In such a heterogeneous environment partial failures are likely to occur. In order to avoid probable system malfunction and breakd... Read More about Building Fault Tolerant Industrial Applications Based on IEC 61499.

Making places: visualization, interaction and experience in urban space (2015)
Presentation / Conference Contribution
Smyth, M., Trigueiros, P., Helgason, I., Coelho, A., Gallacher, S., Burrows, A., …Penha, R. (2015). Making places: visualization, interaction and experience in urban space. Interaction Design and Architecture(s) IxDetA, 25, 813-816

Preface to the focus section: Making places: visualization, interaction and experience in urban space Cities are exciting and people continue to be drawn to urban areas because of the choices that cities offer in all areas of economic and social... Read More about Making places: visualization, interaction and experience in urban space.

Semantic description of cloud service agreements (2015)
Presentation / Conference Contribution
Greenwell, R., Liu, X., & Chalmers, K. (2015). Semantic description of cloud service agreements. In Science and Information Conference (SAI), 2015 (823-831). https://doi.org/10.1109/sai.2015.7237239

To provide cloud services as a utility there must be a mechanism for comprehensively and precisely specifying cloud service agreements to reduce differences in service perception between customers and suppliers. This paper proposes a description... Read More about Semantic description of cloud service agreements.

Manufacture of solid oxide fuel cells using electroless c0deposition - a review of work carried out at Edinburgh Napier University. (2015)
Presentation / Conference Contribution
Davidson, A., Wilson, C., & Shearer, N. (2015, July). Manufacture of solid oxide fuel cells using electroless c0deposition - a review of work carried out at Edinburgh Napier University. Paper presented at ECS COnference on Electrochemical Energy Conversio

This paper reviews work carried out at Edinburgh Napier University on the manufacture of anodes and cathodes for solid oxide fuel cells (SOFCs) using electroless co-deposition of nickel and ceramic powders. Most of the work has been focused on anodes... Read More about Manufacture of solid oxide fuel cells using electroless c0deposition - a review of work carried out at Edinburgh Napier University..

A model of bus bunching under reliability-based passenger arrival patterns. (2015)
Presentation / Conference Contribution
Fonzone, A., Schmöcker, J., & Liu, R. (2015). A model of bus bunching under reliability-based passenger arrival patterns. Transportation Research Procedia, 7, 276-299. https://doi.org/10.1016/j.trpro.2015.06.015

If bus service departure times are not completely unknown to the passengers, non-uniform passenger arrival patterns can be expected. We propose that passengers decide their arrival time at stops based on a continuous logit model that considers the ri... Read More about A model of bus bunching under reliability-based passenger arrival patterns..

Real-time monitoring of privacy abuses and intrusion detection in android system (2015)
Presentation / Conference Contribution
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. In Human Aspects of Information Security, Privacy, and Trust (379-390). https://doi

In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from 'normal' apps. We also investigated the injection technolog... Read More about Real-time monitoring of privacy abuses and intrusion detection in android system.

How do public libraries demonstrate their impact upon citizenship development in the UK? : results of a focus group methodology. (2015)
Presentation / Conference Contribution
Appleton, L., Hall, H., Duff, A., & Raeside, R. (2015, July). How do public libraries demonstrate their impact upon citizenship development in the UK? : results of a focus group methodology. Paper presented at 11th Northumbria International Conference on

There is a general acceptance that public libraries contribute to ‘community’, and at least have the potential to have a very positive impact on civil society. (Varheim, 2007). As both a central meeting space, and a place from which public services a... Read More about How do public libraries demonstrate their impact upon citizenship development in the UK? : results of a focus group methodology..

Defining Acceptable Interaction for Universal Access (2015)
Presentation / Conference Contribution
Keates, S. (2015). Defining Acceptable Interaction for Universal Access. In M. Antona, & C. Stephanidis (Eds.), Universal Access in Human-Computer Interaction. Access to Today's Technologies (54-63). https://doi.org/10.1007/978-3-319-20678-3_6

Many new assistive input systems developed to meet the needs of users with functional impairments fail to make it out of the research laboratory and into regular use by the intended users. This paper examines some of the reasons for this and focuses... Read More about Defining Acceptable Interaction for Universal Access.

Exploiting voting strategies in partially replicated IEC 61499 applications (2015)
Presentation / Conference Contribution
de Sousa, M., Chrysoulas, C., & Homay, A. E. (2015). Exploiting voting strategies in partially replicated IEC 61499 applications. . https://doi.org/10.1109/wfcs.2015.7160589

In a modern industrial environment control programs are distributed among several devices. This raises new issues and challenges especially in failure modes. Building fault tolerant applications can be the solution in order a failure of one sub-compo... Read More about Exploiting voting strategies in partially replicated IEC 61499 applications.

Designing clinical blended spaces: a biophilic inspired digitally augmented evironment for use within a Child Protection Unit. (2015)
Presentation / Conference Contribution
Mival, O., Hamilton, A., & Fischer, H. (2015). Designing clinical blended spaces: a biophilic inspired digitally augmented evironment for use within a Child Protection Unit. In Design4Health: Proceedings of the 3rd European Conference on Design4Health (1

This paper details the research, design and implementation process of a commissioned artist’s integration of a biophilic design philosophy into the spatial and interaction design of Glasgow’s new Child Protection Unit (CPU) facility helping children... Read More about Designing clinical blended spaces: a biophilic inspired digitally augmented evironment for use within a Child Protection Unit..

Design principles for collaborative device ecologies (2015)
Presentation / Conference Contribution
Ammeloot, A., Benyon, D., & Mival, O. (2015). Design principles for collaborative device ecologies. In Proceedings of the 2015 British HCI Conference (255-256). https://doi.org/10.1145/2783446.2783598

This paper describes the ongoing investigation of interaction design issues related to collaborative activities in device ecologies, mixing Bring Your Own Device (BYOD) and smart meeting room technologies.

The Cost of Communication: Environmental Pressure and Survivability in mEDEA (2015)
Presentation / Conference Contribution
Steyven, A., Hart, E., & Paechter, B. (2015, July). The Cost of Communication: Environmental Pressure and Survivability in mEDEA. Presented at GECCO ’15

We augment the mEDEA algorithm to explicitly account for the costs of communication between robots. Experimental results show that adding a costs for communication exerts environmental pressure to implicitly select for genomes that maintain high... Read More about The Cost of Communication: Environmental Pressure and Survivability in mEDEA.

Editorial: TLAD 2015 (2015)
Presentation / Conference Contribution
Leimich, P., & Bhogal, J. (2015, July). Editorial: TLAD 2015. Presented at 13th International Workshop on Teaching, Learning and Assessment of Databases (TLAD 2015)

No abstract available.

New Intuitive Metrics for Diversity Performance Evaluation of Multi-element Antenna Systems (2015)
Presentation / Conference Contribution
Papamichael, V., & Karadimas, P. (2015). New Intuitive Metrics for Diversity Performance Evaluation of Multi-element Antenna Systems. In PIERS 2015 in Prague Proceedings (1963-1965)

Diversity performance of multi-element antenna (MEA) systems is evaluated using several metrics. The most common are the diversity antenna gain (DAG), the effective diversity gain (EDG) and the actual diversity gain (ADG). These metrics calculate the... Read More about New Intuitive Metrics for Diversity Performance Evaluation of Multi-element Antenna Systems.