Skip to main content

Research Repository

Advanced Search

All Outputs (155)

Intelligent control for adaptive video streaming (2013)
Presentation / Conference Contribution
Menkovski, V., & Liotta, A. (2013). Intelligent control for adaptive video streaming. . https://doi.org/10.1109/ICCE.2013.6486825

We present an autonomous learning agent for adaptive video streaming in best effort networks. The agent learns an optimal control strategy in regards to the delivered quality of experience without the need for implementation of a complex heuristics.

Generation of Network Behaviour Descriptions Using MCA Based on TAM (2013)
Presentation / Conference Contribution
Tan, Z. (2013, March). Generation of Network Behaviour Descriptions Using MCA Based on TAM. Paper presented at Kaspersky Lab's 2013 Annual Student Cyber Security Conference

In this paper, a multivariate correlation analysis technique based on triangle area map is introduced. The technique is applied for network traffic characterization and provides quality network behaviour descriptors for intrusion detectors to use. Th... Read More about Generation of Network Behaviour Descriptions Using MCA Based on TAM.

Application of multi-dimensional scaling and artificial neural networks for biologically inspired opinion mining (2013)
Journal Article
Cambria, E., Mazzocco, T., & Hussain, A. (2013). Application of multi-dimensional scaling and artificial neural networks for biologically inspired opinion mining. Biologically Inspired Cognitive Architectures, 4, 41-53. https://doi.org/10.1016/j.bica.2013

The way people express their opinions has radically changed in the past few years thanks to the advent of online collaborative media. The distillation of knowledge from this huge amount of unstructured information can be a key factor for marketers wh... Read More about Application of multi-dimensional scaling and artificial neural networks for biologically inspired opinion mining.

The challenges of Big Data: future risks, governance and trust. (2013)
Presentation / Conference Contribution
Buchanan, W. J. (2013, March). The challenges of Big Data: future risks, governance and trust. Paper presented at The Future of Cyber Security 2013

The emphasis in computer security is moving from end point security towards data controls, and this is becoming an increasing threat as we move into an era build around Big Data. This presentation thus outlines the change in emphasis of security cont... Read More about The challenges of Big Data: future risks, governance and trust..

Genome Sequence of Lawsonia intracellularis Strain N343, Isolated from a Sow with Hemorrhagic Proliferative Enteropathy (2013)
Journal Article
Sait, M., Aitchison, K., Wheelhouse, N., Wilson, K., Alex Lainson, F., Longbottom, D., & Smith, D. G. E. (2013). Genome Sequence of Lawsonia intracellularis Strain N343, Isolated from a Sow with Hemorrhagic Proliferative Enteropathy. Genome Announcements, 1(1), https://doi.org/10.1128/genomeA.00027-13

Lawsonia intracellularis is the etiological agent of proliferative enteropathy (PE), causing mild or acute hemorrhagic diarrhea in infected animals. Here we report the genome sequence of strain N343, isolated from a sow that died of hemorrhagic PE. N... Read More about Genome Sequence of Lawsonia intracellularis Strain N343, Isolated from a Sow with Hemorrhagic Proliferative Enteropathy.

Investigations of impacts of junction design on emissions: are our junctions sustainable? (2013)
Journal Article
Saleh, W., & Lawson, A. (2013). Investigations of impacts of junction design on emissions: are our junctions sustainable?. World journal of science, technology and sustainable development, 10(2), 143-151. https://doi.org/10.1108/20425941311323145

Purpose - An investigation of the driving behaviour and impacts on emission at two traffic junctions Design/methodology/approach - A signalised junction and a roundabout in Edinburgh have been selected. An instrumented car has been used and a GPS... Read More about Investigations of impacts of junction design on emissions: are our junctions sustainable?.

Book Review: Mobile Technologies: from Telecommunications to Media. (2013)
Journal Article
Smith, C. (2014). Book Review: Mobile Technologies: from Telecommunications to Media. Telecommunications Policy, 38(1), 119-121. https://doi.org/10.1016/j.telpol.2012.11.006

No abstract available. Item discussed - Mobile technologies: From telecommunications to media, Gerard Goggin, Larissa Hjorth, Routledge, New York, USA (2009), 297 pp. including list of contributors and index plus list of figures, acknowledgements and... Read More about Book Review: Mobile Technologies: from Telecommunications to Media..

Supporting offline activities on interactive surfaces (2013)
Presentation / Conference Contribution
Esteves, A., Scott, M., & Oakley, I. (2013, February). Supporting offline activities on interactive surfaces. Presented at 7th International Conference on Tangible, Embedded and Embodied Interaction - TEI '13

This paper argues that inherent support for offline activities -- activities that are not sensed by the system -- is one of strongest benefits of tangible interaction over more traditional interface paradigms. By conducting two studies with single an... Read More about Supporting offline activities on interactive surfaces.

Physical games or digital games?: comparing support for mental projection in tangible and virtual representations of a problem-solving task (2013)
Presentation / Conference Contribution
Esteves, A., van den Hoven, E., & Oakley, I. (2013, February). Physical games or digital games?: comparing support for mental projection in tangible and virtual representations of a problem-solving task. Presented at 7th International Conference on Tangib

This paper explores how different interfaces to a problem-solving task affect how users perform it. Specifically, it focuses on a customized version of the game of Four-in-a-row and compares play on a physical, tangible game board with that conducted... Read More about Physical games or digital games?: comparing support for mental projection in tangible and virtual representations of a problem-solving task.

Contemporary iconography for rich picture construction (2013)
Journal Article
Berg, T., & Pooley, R. (2013). Contemporary iconography for rich picture construction. Systems Research and Behavioral Science, 30, 31-42. https://doi.org/10.1002/sres.2121

There are many tools available to elicit knowledge and provide understanding of organizational concerns. This paper focuses on the rich picture (RP) used within the soft system methodology. The RP is a diagrammatic means of identifying differing worl... Read More about Contemporary iconography for rich picture construction.

Enhanced SenticNet with affective labels for concept-based opinion mining (2013)
Journal Article
Poria, S., Gelbukh, A., Hussain, A., Howard, N., Das, D., & Bandyopadhyay, S. (2013). Enhanced SenticNet with affective labels for concept-based opinion mining. IEEE Intelligent Systems, 28(2), 2-9. https://doi.org/10.1109/MIS.2013.4

SenticNet 1.0 is one of the most widely used, publicly available resources for concept-based opinion mining. The presented methodology enriches SenticNet concepts with affective information by assigning an emotion label.

e-Health in the Cloud (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, January). e-Health in the Cloud. Presented at Future of e-Health

This presentation outlines how risk assessors can be used to create holistic care. A key focus is on the security infrastructure and in new risk assessors such as the frailty index.

Public perceptions in health care security. (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, January). Public perceptions in health care security. Paper presented at Health Informatics 2013

Over the past few years many industries have been revolutionized by the application of Information Technology, in fact, we are now moving from an Industrial Age into an Information Age, where almost every part of our lives involves some form of integ... Read More about Public perceptions in health care security..

Building a new nation: risk, goverance and trust. (2013)
Presentation / Conference Contribution
Buchanan, W. J. (2013, January). Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013

This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.