Skip to main content

Research Repository

Advanced Search

Relevant 5G Application Scenarios in the Health Domain (2017)
Presentation / Conference Contribution
Thuemmler, C. (2017, September). Relevant 5G Application Scenarios in the Health Domain. Paper presented at IEEE 5G and Beyond Testbed Workshop, Toronto, Canada

No abstract available.

Remote control by body movement in synchrony with orbiting widgets: an evaluation of TraceMatch (2017)
Journal Article
Clarke, C., Bellino, A., Esteves, A., & Gellersen, H. (2017). Remote control by body movement in synchrony with orbiting widgets: an evaluation of TraceMatch. PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1(3), Article 45. https://doi.org/10.1145/3130910

In this work we consider how users can use body movement for remote control with minimal effort and maximum flexibility. TraceMatch is a novel technique where the interface displays available controls as circular widgets with orbiting targets, and wh... Read More about Remote control by body movement in synchrony with orbiting widgets: an evaluation of TraceMatch.

An Intrusion Detection System Based on Polynomial Feature Correlation Analysis (2017)
Presentation / Conference Contribution
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017, August). An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. Presented at 2017 IEEE Trustcom/BigDataSE/ICESS

This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was designed and applied in this work to extract hidden correlations from traffic rel... Read More about An Intrusion Detection System Based on Polynomial Feature Correlation Analysis.

Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments (2017)
Journal Article
Alsarhan, A., Itradat, A., Al-Dubai, A. Y., Zomaya, A. Y., & Min, G. (2018). Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments. IEEE Transactions on Parallel and Distributed Systems, 29(1), 31-42. https://doi.org/10.1109/tpds.2017.2748578

In the current cloud business environment, the cloud provider (CP) can provide a means for offering the required quality of service (QoS) for multiple classes of clients. We consider the cloud market where various resources such as CPUs, memory, and... Read More about Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments.

Impact of selection methods on the diversity of many-objective Pareto set approximations (2017)
Presentation / Conference Contribution
Martí, L., Segredo, E., Sánchez-Pi, N., & Hart, E. (2017, September). Impact of selection methods on the diversity of many-objective Pareto set approximations. Presented at 21st International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, Marseille, France

Selection methods are a key component of all multi-objective and, consequently, many-objective optimisation evolutionary algorithms. They must perform two main tasks simultaneously. First of all, they must select individuals that are as close as poss... Read More about Impact of selection methods on the diversity of many-objective Pareto set approximations.

ESBSC: Energy-Aware Service Brokering Strategy in Clouds (2017)
Presentation / Conference Contribution
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017, July). ESBSC: Energy-Aware Service Brokering Strategy in Clouds. Presented at 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)

One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the job of choosing the suitable resource to be a very difficult one for the comm... Read More about ESBSC: Energy-Aware Service Brokering Strategy in Clouds.

Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space (2017)
Presentation / Conference Contribution
Singh Jamnal, G., Liu, X., & Fan, L. (2017, July). Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space. Presented at The 29th International Conference on Software Engineering and Knowledge Engineering

In this paper, we proposed a new type of decision making system to achieve the intelligent goal for automated smart environments. The artificial intelligence techniques, used as building blocks to understand inhabitant activity patterns. The collecte... Read More about Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space.

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks (2017)
Presentation / Conference Contribution
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017, August). Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. Presented at 2017 IEEE Trustcom/BigDataSE/ICESS

In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of Things (IoT) applications. In this paper we implemented and evaluated the... Read More about Performance Evaluation of RPL Protocol under Mobile Sybil Attacks.

An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment (2017)
Presentation / Conference Contribution
Liu, X., & Liu, Q. (2017, July). An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. Presented at 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, Guangdong, China

Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to imbalance of slow tasks distribution. Speculative execution (SE) presents a way to d... Read More about An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment.

Maximum Entropy in Nilsson's Probabilistic Logic (2017)
Presentation / Conference Contribution
Kane, T. B. (1989, August). Maximum Entropy in Nilsson's Probabilistic Logic. Presented at International Joint Conference on Artificial Intelligence

Nilsson's Probabilistic Logic is a set theoretic mechanism for reasoning with uncertainty. We propose a new way of looking at the probability constraints enforced by the framework, which allows the expert to include conditional probabilities in the s... Read More about Maximum Entropy in Nilsson's Probabilistic Logic.

Towards self-defending control systems in cybersecurity analysis and measures in industrial automation systems (2017)
Presentation / Conference Contribution
Soufian, M. (2017, June). Towards self-defending control systems in cybersecurity analysis and measures in industrial automation systems. Presented at 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE), Edinburgh, Scotland

Towards self-defending control systems in cybersecurity analysis and measures in industrial automation systems.

Simultaneous context inference and mapping using mm-Wave for indoor scenarios (2017)
Presentation / Conference Contribution
Yassin, A., Nasser, Y., Awad, M., & Al-Dubai, A. (2017, May). Simultaneous context inference and mapping using mm-Wave for indoor scenarios. Presented at 2017 IEEE International Conference on Communications (ICC), Paris, France

We introduce in this paper two main approaches, Triangulateration (TL) and Angle-Difference-of-Arrival (ADoA) for indoor localization and mapping using single-anchor and millimeter wave (MMW) propagation characteristics. Then, we perform context infe... Read More about Simultaneous context inference and mapping using mm-Wave for indoor scenarios.

User Experience in Cross-channel Ecosystems (2017)
Presentation / Conference Contribution
Benyon, D., & Resmini, A. (2017, July). User Experience in Cross-channel Ecosystems. Presented at British HCI

Recent developments in information and communication technologies have left interaction design and human-computer interaction (HCI) with something of a conceptual gap. The distinction between physical and digital spaces is increasingly blurred. Cloud... Read More about User Experience in Cross-channel Ecosystems.

Tailoring methodological bricolage to investigate non-discretionary use of digital technology (2017)
Presentation / Conference Contribution
Sobolewska, E. (2017, July). Tailoring methodological bricolage to investigate non-discretionary use of digital technology. Presented at BHCI 2017: Digital Make Believe, Sunderland, UK

Digital technology appears to be an integral part of everyday life: at homes, workplaces, during leisure time; mediating interactions, demanding attention and engagement. In the age of cloud computing, social media, and ubiquitous mobile devices, it... Read More about Tailoring methodological bricolage to investigate non-discretionary use of digital technology.

Pathways for Theoretical Advances in Visualization (2017)
Journal Article
Chen, M., Grinstein, G., Johnson, C. R., Kennedy, J., & Tory, M. (2017). Pathways for Theoretical Advances in Visualization. IEEE Computer Graphics and Applications, 37(4), 103-112. https://doi.org/10.1109/MCG.2017.3271463

There is little doubt that having a theoretic foundation will benefit the field of visualization, including its main subfields: information visualization, scientific visualization and visual analytics, as well as many domain-specific applications suc... Read More about Pathways for Theoretical Advances in Visualization.

Appropriating Affordances. Three Practice Based Explorations (2017)
Presentation / Conference Contribution
Flint, T. (2017, July). Appropriating Affordances. Three Practice Based Explorations. Presented at HCI 2017 - Digital Make-Believe, Sunderland, UK

Affordance and Appropriation are related. An effective way of examining these phenomena is through practice. This paper discusses practice based exploration of affordance in the design of physical interfaces. This study follows a framework developed... Read More about Appropriating Affordances. Three Practice Based Explorations.

Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT (2017)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017, May). Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. Presented at 2017 IEEE International Conference on Communications (ICC)

Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopted for routing information maintenance in such networks. This algorithm is o... Read More about Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT.

A novel substitution box for encryption based on Lorenz equations (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017, July). A novel substitution box for encryption based on Lorenz equations. Presented at 2017 International Conference on Circuits, System and Simulation (ICCSS), London, United Kingdom

Complexity of an encryption algorithm is highly dependent on nonlinear components that drive actual security. Only nonlinear component in all traditional encryption algorithms is mainly Substitution Box (S-Box). In block ciphers, the relationship bet... Read More about A novel substitution box for encryption based on Lorenz equations.