Skip to main content

Research Repository

Advanced Search

Head-mounted displays as opera glasses: using mixed-reality to deliver an egalitarian user experience during live events (2017)
Presentation / Conference Contribution
Bishop, C., Esteves, A., & McGregor, I. (2017, November). Head-mounted displays as opera glasses: using mixed-reality to deliver an egalitarian user experience during live events. Presented at Proceedings of the 19th ACM International Conference on Multimodal Interaction - ICMI 2017

This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-part user study that compares participants reported sense of presence acros... Read More about Head-mounted displays as opera glasses: using mixed-reality to deliver an egalitarian user experience during live events.

An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs (2017)
Presentation / Conference Contribution
Liu, X., & Liu, Q. (2017, June). An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. Presented at 3rd International Conference on Cloud Computing and Security (ICCCS 2017)

With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. However, the requirements of performance for WSNs are becoming great in terms... Read More about An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs.

Insider threat detection using principal component analysis and self-organising map (2017)
Presentation / Conference Contribution
Moradpoor, N., Brown, M., & Russell, G. (2017, October). Insider threat detection using principal component analysis and self-organising map. Presented at Proceedings of the 10th International Conference on Security of Information and Networks - SIN '17, India

An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data which can damage the employer's marketing position and reputation. In additio... Read More about Insider threat detection using principal component analysis and self-organising map.

Emergence of hierarchy from the evolution of individual influence in an agent-based model (2017)
Presentation / Conference Contribution
Perret, C., Powers, S. T., & Hart, E. (2017, September). Emergence of hierarchy from the evolution of individual influence in an agent-based model. Presented at 14th European Conference on Artificial Life (ECAL 2017)

The sudden transition from egalitarian groups to hierarchical societies that occurred with the origin of agriculture is one of the most striking features of the evolution of human societies. Hierarchy is reflected by the evolution of an asymmetrical... Read More about Emergence of hierarchy from the evolution of individual influence in an agent-based model.

Cryptography (2017)
Book
Buchanan, B. (2017). Cryptography. River Publishers

Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to d... Read More about Cryptography.

IRIDiuM+: deep media storytelling with non-linear light field video (2017)
Presentation / Conference Contribution
Kosek, M., Koniaris, B., Sinclair, D., Markova, D., Rothnie, F., Smoot, L., & Mitchell, K. (2017, July). IRIDiuM+: deep media storytelling with non-linear light field video. Presented at ACM SIGGRAPH 2017 VR Village on - SIGGRAPH '17, Los Angeles, California

We present immersive storytelling in VR enhanced with non-linear
sequenced sound, touch and light. Our Deep Media (Rose 2012) aim
is to allow for guests to physically enter rendered movies with
novel non-linear storytelling capability. With the ab... Read More about IRIDiuM+: deep media storytelling with non-linear light field video.

Image-based Emotion Feedback: How Does the Crowd Feel? And Why? (2017)
Presentation / Conference Contribution
Robb, D. A., Padilla, S., Methven, T. S., Kalkreuter, B., & Chantler, M. J. (2017, June). Image-based Emotion Feedback: How Does the Crowd Feel? And Why?. Presented at 2017 Conference on Designing Interactive Systems, Edinburgh, United Kingdom

In previous work we developed a method for interior designers to receive image-based feedback about a crowd’s emotions when viewing their designs. Although the designers clearly desired a service which provided the new style of feedback, we wanted to... Read More about Image-based Emotion Feedback: How Does the Crowd Feel? And Why?.

AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks (2017)
Presentation / Conference Contribution
Rotärmel, S., Farrenkopf, T., Guckert, M., & Urquhart, N. (2017, June). AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks. Presented at Practical Applications of Agents and Multi-Agent Systems, Porto, Portugal

AGADE-TRAFFIC is a tool for simulating traffic flow in networks. Traffic participants are modelled as NetLogo agents and are visualised in a graphical user interface. Geographic information is stored in a graph database and AGADE-TRAFFIC communicates... Read More about AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks.

Understanding Concept Maps: A Closer Look at How People Organise Ideas (2017)
Presentation / Conference Contribution
Padilla, S., Methven, T. S., Robb, D. A., & Chantler, M. J. (2017, May). Understanding Concept Maps: A Closer Look at How People Organise Ideas. Presented at 2017 CHI Conference on Human Factors in Computing Systems: Explore, Innovate, Inspire, Denver, Colorado, USA

Research into creating visualisations that organise ideas into concise concept maps often focuses on implicit mathematical and statistical theories which are built around algorithmic efficacy or visual complexity. Although there are multiple techniqu... Read More about Understanding Concept Maps: A Closer Look at How People Organise Ideas.

The next cyberattack could come from sound waves (2017)
Newspaper / Magazine
Buchanan, B. (2017). The next cyberattack could come from sound waves. https://theconversation.com/the-next-cyberattack-could-come-from-sound-waves-74716

You might think your smartphone or laptop is relatively safe from cyber attacks thanks to anti-virus and encryption software. But your devices are increasingly at risk from “side-channel” attacks, where an intruder can bypass traditional network entr... Read More about The next cyberattack could come from sound waves.

BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. (2017)
Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017). BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications (317-335). Springer

The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the ideal linear power consumption, omitting the fact that the diffu-sion prin... Read More about BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC..