Skip to main content

Research Repository

Advanced Search

All Outputs (273)

Comparative Evaluation of Radio and Audio Logo Sound Designs (2015)
Journal Article
McGregor, I., & Cunningham, S. (2015). Comparative Evaluation of Radio and Audio Logo Sound Designs. Journal of the Audio Engineering Society, 63(11), 876-888. https://doi.org/10.17743/jaes.2015.0076

This study aims to explore the suitability of capturing designers’ and listeners’ experiences of sound design for a radio drama and audio logos using the repertory grid technique, which is a proven method of information elicitation based on Personal... Read More about Comparative Evaluation of Radio and Audio Logo Sound Designs.

Latency aware foveated rendering in unreal engine 4 (2015)
Presentation / Conference Contribution
Swafford, N. T., Cosker, D., & Mitchell, K. (2015). Latency aware foveated rendering in unreal engine 4. In CVMP '15 Proceedings of the 12th European Conference on Visual Media Production. https://doi.org/10.1145/2824840.2824863

We contribute a foveated rendering implementation in Unreal Engine 4 (UE4) and a straight-forward metric to allow calculation of rendered foveal region sizes to compensate for overall system latency and maintain perceptual losslessness. Our system de... Read More about Latency aware foveated rendering in unreal engine 4.

Real-time variable rigidity texture mapping (2015)
Presentation / Conference Contribution
Koniaris, C., Mitchell, K., & Cosker, D. (2015, November). Real-time variable rigidity texture mapping. Presented at Proceedings of the 12th European Conference on Visual Media Production - CVMP '15

Parameterisation of models is typically generated for a single pose, the rest pose. When a model deforms, its parameterisation characteristics change, leading to distortions in the appearance of texture-mapped mesostructure. Such distortions are unde... Read More about Real-time variable rigidity texture mapping.

The future internet: a world of secret shares (2015)
Journal Article
Buchanan, W. J., Lanc, D., Ukwandu, E., Fan, L., Russell, G., & Lo, O. (2015). The future internet: a world of secret shares. Future Internet, 7(4), 445-464. https://doi.org/10.3390/fi7040445

The PKI infrastructure is crumbling, especially due to the lack of a strong understanding of how encryption actually works, and in threats around its implementation. This paper outlines an Internet storage using secret sharing methods, and which coul... Read More about The future internet: a world of secret shares.

An architecture for semantic service discovery and realizability in cloud computing (2015)
Presentation / Conference Contribution
Barati, M., & St-Denis, R. (2015). An architecture for semantic service discovery and realizability in cloud computing. In 2015 6th International Conference on the Network of the Future (NOF). https://doi.org/10.1109/nof.2015.7333293

One of the open issues in cloud computing is service discovery. Another issue, which has received less attention by practitioners in the cloud computing industry, is service composition based on formal methods, particularly those based on automata an... Read More about An architecture for semantic service discovery and realizability in cloud computing.

Efficient text localization in born-digital images by local contrast-based segmentation (2015)
Presentation / Conference Contribution
Chen, K., Yin, F., Hussain, A., & Liu, C. (2015). Efficient text localization in born-digital images by local contrast-based segmentation. In 2015 13th International Conference on Document Analysis and Recognition (ICDAR) (291-295). https://doi.org/10.11

Text localization in born-digital images is usually performed using methods designed for scene text images. Based on the observation that text strokes in born-digital images mostly have complete contours and the pixels on the contours have high contr... Read More about Efficient text localization in born-digital images by local contrast-based segmentation.

Guided ecological simulation for artistic editing of plant distributions in natural scenes (2015)
Journal Article
Bradbury, G. A., Subr, K., Koniaris, C., Mitchell, K., & Weyrich, T. (2015). Guided ecological simulation for artistic editing of plant distributions in natural scenes. The Journal of Computer Graphics Techniques, 4(4), 28-53

In this paper we present a novel approach to author vegetation cover of large natural scenes. Unlike stochastic scatter-instancing tools for plant placement (such as multi-class blue noise generators), we use a simulation based on ecological processe... Read More about Guided ecological simulation for artistic editing of plant distributions in natural scenes.

Carpet unrolling for character control on uneven terrain (2015)
Presentation / Conference Contribution
Miller, M., Holden, D., Al-Ashqar, R., Dubach, C., Mitchell, K., & Komura, T. (2015). Carpet unrolling for character control on uneven terrain. In MIG '15 Proceedings of the 8th ACM SIGGRAPH Conference on Motion in Games. https://doi.org/10.1145/2822013.

We propose a type of relationship descriptor based on carpet unrolling that computes the joint positions of a character based on the sum of relative vectors originating from a local coordinate system embedded on the surface of a carpet. Given a terra... Read More about Carpet unrolling for character control on uneven terrain.

Supporting the meeting journey: understanding and designing collaborative device ecologies (2015)
Presentation / Conference Contribution
Ammeloot, A. (2015, November). Supporting the meeting journey: understanding and designing collaborative device ecologies. Presented at 2015 International Conference on Interactive Tabletops & Surfaces

The combination of personal and mobile technologies (Bring Your Own Device) with technology-augmented spaces designed for collaboration offers new design challenges for the HCI community. This paper is a summary of a doctoral work-in-progress aiming... Read More about Supporting the meeting journey: understanding and designing collaborative device ecologies.

Fall of Humans: Interactive tabletop games and transmedia storytelling. (2015)
Presentation / Conference Contribution
Dionisio, M., Gujaran, A., Pinto, M., & Esteves, A. (2015). Fall of Humans: Interactive tabletop games and transmedia storytelling. In Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces (401-404). https://doi.org/10.1145

This paper illustrates how transmedia storytelling can help introduce players to interactive tabletop games. To do so, we developed Fall of Humans (FoH), an experience that takes place over two games: Meat factory, a physical card game where players... Read More about Fall of Humans: Interactive tabletop games and transmedia storytelling..

Strategic positioning of IT business Incubators within Universities - a comparative study of the United Kingdom and India. (2015)
Presentation / Conference Contribution
Smith, S., Kannabiran, G., & Laing, S. (2015, November). Strategic positioning of IT business Incubators within Universities - a comparative study of the United Kingdom and India. Paper presented at Institute for Small Business and Entrepreneurship

Advances in Information Technology (IT) offers various innovation opportunities. Incubation of IT innovation, with a focus on promoting entrepreneurship, has been a strategic priority of many leading universities across the world. Incubation of IT in... Read More about Strategic positioning of IT business Incubators within Universities - a comparative study of the United Kingdom and India..

High-dimensional function approximation using local linear embedding (2015)
Presentation / Conference Contribution
Andras, P. (2015). High-dimensional function approximation using local linear embedding. In 2015 International Joint Conference on Neural Networks (IJCNN). https://doi.org/10.1109/IJCNN.2015.7280370

Neural network approximation of high-dimensional nonlinear functions is difficult due to the sparsity of the data in the high-dimensional data space and the need for good coverage of the data space by the `receptive fields' of the neurons. However, h... Read More about High-dimensional function approximation using local linear embedding.

Roll Project Rich Vehicle Routing benchmark problems. (2015)
Data
Hart, E., & Sim, K. (2015). Roll Project Rich Vehicle Routing benchmark problems. [Data]. https://doi.org/10.17869/ENU.2015.9367

This document describes a large set of Benchmark Problem Instances for the Rich Vehicle Routing Problem. All files are supplied as a single compressed (zipped) archive containing the instances, in XML format, an Object-Oriented Model supplied in XSD... Read More about Roll Project Rich Vehicle Routing benchmark problems..

Roll Project Job Shop scheduling benchmark problems. (2015)
Data
Hart, E., & Sim, K. (2015). Roll Project Job Shop scheduling benchmark problems. [Dataset]. https://doi.org/10.17869/ENU.2015.9365

This document describes two sets of benchmark problem instances for the job shop scheduling problem. Each set of instances is supplied as a compressed (zipped) archive containing a single CSV file for each problem instance using the format described... Read More about Roll Project Job Shop scheduling benchmark problems..

A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks (2015)
Presentation / Conference Contribution
Eshaftri, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015, September). A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks. Presented at Proceedings of the 2015 Federated Conference on Computer Science and Information Systems

In Wireless Sensor Networks (WSNs), clustering techniques are usually used as a key effective solution to reduce energy consumption and prolong the network lifetime. Despite many works on clustering in WSNs, this issue is still, however, in its infan... Read More about A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks.

On Blind Source Camera Identification (2015)
Presentation / Conference Contribution
Farinella, G. M., Giuffrida, M. V., Digiacomo, V., & Battiato, S. (2015). On Blind Source Camera Identification. In Advanced Concepts for Intelligent Vision Systems (464-473). https://doi.org/10.1007/978-3-319-25903-1_40

An interesting and challenging problem in digital image forensics is the identification of the device used to acquire an image. Although the source imaging device can be retrieved exploiting the file's header e.g., EXIF, this information can be easil... Read More about On Blind Source Camera Identification.

A semantic-based flexible framework for automatic behavior composition (2015)
Presentation / Conference Contribution
Barati, M., & St-Denis, R. (2015). A semantic-based flexible framework for automatic behavior composition. In 2015 Internet Technologies and Applications (ITA). https://doi.org/10.1109/itecha.2015.7317380

The behavior composition problem consists in the synthesis of a controller that coordinates a set of available behaviors with the aim of realizing a desired target behavior. This problem suffers from a serious drawback because, for many instances, th... Read More about A semantic-based flexible framework for automatic behavior composition.

Augmented creativity: bridging the real and virtual worlds to enhance creative play (2015)
Presentation / Conference Contribution
Zünd, F., Ryffel, M., Magnenat, S., Marra, A., Nitti, M., Kapadia, M., …Sumner, R. W. (2015). Augmented creativity: bridging the real and virtual worlds to enhance creative play. In SA '15 SIGGRAPH Asia 2015 Mobile Graphics and Interactive Application

Augmented Reality (AR) holds unique and promising potential to bridge between real-world activities and digital experiences, allowing users to engage their imagination and boost their creativity. We propose the concept of Augmented Creativity as empl... Read More about Augmented creativity: bridging the real and virtual worlds to enhance creative play.

A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks (2015)
Journal Article
Moradpoor Sheykhkanloo, N. (2015). A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(6), 1443-1453

Thousands of organisations store important and confidential information related to them, their customers, and their business partners in databases all across the world. The stored data ranges from less sensitive (e.g. first name, last name, date of b... Read More about A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks.