Skip to main content

Research Repository

Advanced Search

All Outputs (132)

An approach for web service selection and dynamic composition based on linked open data (2018)
Book Chapter
Vesyropoulos, N., Georgiadis, C., & Pimenidis, E. (2018). An approach for web service selection and dynamic composition based on linked open data. In N. T. Nguyen, & R. Kowalczyk (Eds.), Transactions on Computational Collective Intelligence XXX (54-70). Springer. https://doi.org/10.1007/978-3-319-99810-7_3

The wide adoption of the Service Oriented Architecture (SOA) paradigm has provided a means for heterogeneous systems to seamlessly interact and exchange data. Thus, enterprises and end-users have widely utilized Web Services (WS), either as stand-alo... Read More about An approach for web service selection and dynamic composition based on linked open data.

Reproduction of experiments in recommender systems evaluation based on explanations (2018)
Book Chapter
Polatidis, N., & Pimenidis, E. (2018). Reproduction of experiments in recommender systems evaluation based on explanations. In E. Pimenidis, & C. Jayne (Eds.), Engineering Applications of Neural Networks. Switzerland: Springer International Publishing AG. https://doi.org/10.1007/978-3-319-98204-5

The offline evaluation of recommender systems is typically based on accuracy metrics such as the Mean Absolute Error (MAE) and the Root Mean Squared Error (RMSE), while on the other hand Precision and Recall is used to measure the quality of the top-... Read More about Reproduction of experiments in recommender systems evaluation based on explanations.

Phase transitions in swarm optimization algorithms (2018)
Book Chapter
Adamatzky, A. (2018). Phase transitions in swarm optimization algorithms. In S. Stepney, & S. Verlan (Eds.), Unconventional Computation and Natural Computation (204-2016). Spinrger

Natural systems often exhibit chaotic behavior in their space-time evolution. Systems transiting between chaos and order manifest a potential to compute, as shown with cellular automata and artificial neural networks. We demonstrate that swarms optim... Read More about Phase transitions in swarm optimization algorithms.

The internet of flying things (2018)
Book Chapter
Pigatto, D. F., Rodrigues, M., de Carvalho Fontes, J. V., Pinto, A. S. R., Smith, J., & Branco, K. R. L. J. C. (2018). The internet of flying things. In Q. Hassan (Ed.), Internet of Things A to Z: Technologies and Applications (529-562). Wiley. https://doi.org/10.1002/9781119456735.ch19

Popularly known as drones, unmanned aerial vehicles (UAVs) have been applied in several fields, usually operating in cooperative and collaborative swarms to enable the execution of more dynamic missions. Thus, the new Flying Ad Hoc Networks (FANETs)... Read More about The internet of flying things.

Probabilistic word association for dialogue act classification with recurrent neural networks (2018)
Book Chapter
Duran, N., & Battle, S. (2018). Probabilistic word association for dialogue act classification with recurrent neural networks. In G. Boracchi, L. Iliadis, C. Jayne, & A. Likas (Eds.), Engineering Applications of Neural Networks (229-239). Springer

The identification of Dialogue Acts (DA) is an important aspect in determining the meaning of an utterance for many applications that require natural language understanding, and recent work using recurrent neural networks (RNN) has shown promising re... Read More about Probabilistic word association for dialogue act classification with recurrent neural networks.

Discovering Boolean gates in slime mould (2018)
Book Chapter
Adamatzky, A. (2018). Discovering Boolean gates in slime mould. In A. Adamatzky (Ed.), Inspired by nature. Springer

Slime mould of Physarum polycephalum is a large cell exhibiting rich spatial non-linear electrical characteristics. We exploit the electrical properties of the slime mould to implement logic gates using a flexible hardware platform designed for inves... Read More about Discovering Boolean gates in slime mould.

Encyclopedia of big data technologies (2018)
Book Chapter
Munir, K. (2018). Encyclopedia of big data technologies. In S. Sakr, & A. Zomaya (Eds.), Encyclopedia of Big Data Technologies. Springer

In the field of computer science, data is considered as the main raw material which is produced by abstracting the world into categories, measures and other representational forms (e.g., characters, numbers, relations, sounds, images, electronic wave... Read More about Encyclopedia of big data technologies.

Attribute-based signatures with user-controlled linkability without random oracles (2017)
Book Chapter
Ghadafi, E., & El Kaafarani, A. (2017). Attribute-based signatures with user-controlled linkability without random oracles. In M. O'Neill (Ed.), Cryptography and Coding. Springer International Publishing. https://doi.org/10.1007/978-3-319-71045-7

Attribute-Based Signatures (ABS) are a versatile cryptographic primitive and have many applications. They are a generalization of many widely-used signature-related notions such as group, ring and mesh signatures. Attribute-Based Signatures with U... Read More about Attribute-based signatures with user-controlled linkability without random oracles.

Metaheuristic design patterns - new perspectives for larger-scale search architectures (2017)
Book Chapter
Krawiec, K., Simons, C., Swan, J., & Woodward, J. (2017). Metaheuristic design patterns - new perspectives for larger-scale search architectures. In P. Vasant, S. Z. Alparslan-Gok, & G. Weber (Eds.), Handbook of Research on Emergent Applications of Optimization Algorithms (1-36). IGI Global Publishing. https://doi.org/10.4018/978-1-5225-2990-3.ch001

Design patterns capture the essentials of recurring best practice in an abstract form. Their merits are well established in domains as diverse as architecture and software development. They offer significant benefits, not least a common conceptual... Read More about Metaheuristic design patterns - new perspectives for larger-scale search architectures.

Predicting the occurrence of world news events using recurrent neural networks and auto-regressive moving average models (2017)
Book Chapter
Smith, E. M., Smith, J., Legg, P., & Francis, S. (2017). Predicting the occurrence of world news events using recurrent neural networks and auto-regressive moving average models. In F. Chao, S. Schockaert, & Q. Zhang (Eds.), Advances in Computational Intelligence Systems: UKCI 2017 (191-202). Springer Cham

The ability to predict future states is fundamental for a wide variety of applications, from weather forecasting to stock market analysis. Understanding the related data attributes that can influence changes in time series is a challenging task that... Read More about Predicting the occurrence of world news events using recurrent neural networks and auto-regressive moving average models.

A semantic representation of the knowledge management enablers domain: The aKMEOnt ontology (2017)
Book Chapter
Sabri, M., Odeh, M., & Saad, M. (2017). A semantic representation of the knowledge management enablers domain: The aKMEOnt ontology. In F. Marimon, M. Mas-Machuca, J. Berbegal-Mirabent, & R. Bastida (Eds.), Proceedings of the 18th European Conference on Knowledge Management ECKM 2017

Knowledge management is a significant driver for any enterprise development and evolution as it is engaged with planning, implementing, controlling, monitoring and improving enterprise’s processes and systems. However, organisations are still at a di... Read More about A semantic representation of the knowledge management enablers domain: The aKMEOnt ontology.

A preference-based application framework for resource-bounded context-aware agents (2017)
Book Chapter
Uddin, I., & Rakib, A. (2017). A preference-based application framework for resource-bounded context-aware agents. In K. J. Kim, & N. Joukov (Eds.), Mobile and Wireless Technologies 2017 (187-196). Springer

Context-awareness is an essential component of mobile and pervasive computing. It refers to the concept that an application understands its context, reason about its current situation, and provide relevant information and/or services to the users. On... Read More about A preference-based application framework for resource-bounded context-aware agents.

An investigation into the use of hybrid solar power and cloud service solutions for 24/7 computing (2017)
Book Chapter
Ogunshile, E. K. A. (2017). An investigation into the use of hybrid solar power and cloud service solutions for 24/7 computing. In D. Ferguson, V. Méndez Muñoz, J. Cardoso, M. Helfert, & C. Pahl (Eds.), Proceedings of the 7th International Conference on Cloud Computing and Services Science (743-754). Porto, Portugal: Scitepress. https://doi.org/10.5220/0006380007430754

As the human race demands more from computing, the national grids of nations around the world subsequently have to burn additional fossil fuels to meet increased power requirements. The aim of this paper is to investigate ways in which an organisatio... Read More about An investigation into the use of hybrid solar power and cloud service solutions for 24/7 computing.

An investigation into the use of solar power in cloud computing environment (2017)
Book Chapter
Ogunshile, E. K. A. (2017). An investigation into the use of solar power in cloud computing environment. In D. Ferguson, V. Méndez Muñoz, J. Cardoso, M. Helfert, & C. Pahl (Eds.), Proceedings of the 7th International Conference on Cloud Computing and Services Science (755-766). Porto, Portugal: Scitepress. https://doi.org/10.5220/0006380107550766

Cisco predict that by 2019, 86% of computing workloads will be carried out within a cloud computing environment. This is leading to the dramatically increasing need for data centre expansion which in turn is consuming more and more of the world’s nat... Read More about An investigation into the use of solar power in cloud computing environment.

Critical infrastructure cyber-security risk management (2017)
Book Chapter
Spyridopoulos, T., Maraslis, K., Tryfonas, T., & Oikonomou, G. (2017). Critical infrastructure cyber-security risk management. In M. Conway, L. Jarvis, O. Lehane, S. Macdonald, & L. Nouri (Eds.), Terrorists' Use of the Internet (59-76). IOS Press. https://doi.org/10.3233/978-1-61499-765-8-59

Traditional IT cyber-security risk management methods are based on the evaluation of risks calculated as the likelihood of cyber-security incidents occurring. However, these probabilities are usually estimations or guesses based on past experience an... Read More about Critical infrastructure cyber-security risk management.

Efficient round-optimal blind signatures in the standard model (2017)
Book Chapter
Ghadafi, E. (2017). Efficient round-optimal blind signatures in the standard model. In A. Kiayias (Ed.), Financial Cryptography and Data Security (455-473). Malta: Springer Verlag

Blind signatures are at the core of e-cash systems and has numerous other applications. In this work we construct efficient blind and partially blind signature schemes over bilinear groups in the standard model. Our schemes yield short signatures co... Read More about Efficient round-optimal blind signatures in the standard model.

Expressive gestural personality (2017)
Book Chapter
van den Berg, C., Heap, I., Stark, A., & Mitchell, T. (2017). Expressive gestural personality. In K. Bjorn (Ed.), Push Turn Move: Interface Design in Electronic Music. Denmark: BJOOKS

n/a

Doctoral colloquium: The application of established gestural languages in the control mappings of free-hand gestural musical instruments (2016)
Book Chapter
Brown, D. (2016). Doctoral colloquium: The application of established gestural languages in the control mappings of free-hand gestural musical instruments. In T. Magnusson, C. Kiefer, & S. Duffy (Eds.), Proceedings of the International Conference on Live Interfaces (181-186). University of Sussex

The “mapping problem” is a long standing issue in the development of digital musical instruments, and occurs when an instrument’s musical response fails to reflect the performer’s gestural actions. This paper describes ongoing doctoral research that... Read More about Doctoral colloquium: The application of established gestural languages in the control mappings of free-hand gestural musical instruments.

An ontology regulating privacy oriented access controls (2016)
Book Chapter
Rahmouni Boussi, H. (2016). An ontology regulating privacy oriented access controls. In Risks and Security of Internet and Systems. Springer International Publishing Switzerland

Access Control is one of the essential and traditional security weapons of data protection. In open and complex environments such as the Internet or cloud computing, the decision to grant access to a resource must ensure a secure management with a s... Read More about An ontology regulating privacy oriented access controls.