Skip to main content

Research Repository

Advanced Search

Outputs (11)

Modeling and verifying context-aware non-monotonic reasoning agents (2015)
Conference Proceeding
Rakib, A., & Haque, H. M. U. (2015). Modeling and verifying context-aware non-monotonic reasoning agents. In 2015 ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE) (61-69). https://doi.org/10.1109/MEMCOD.2015.7340471

© 2015 IEEE. This paper complements our previous work on formal modeling of resource-bounded context-aware systems, which handle inconsistent context information using defeasible reasoning, by focusing on automated analysis and verification. A case s... Read More about Modeling and verifying context-aware non-monotonic reasoning agents.

Autonomous and self controlling smart objects for the future internet (2015)
Conference Proceeding
Perez Hernandez, M., & Reiff-Marganiec, S. (2015). Autonomous and self controlling smart objects for the future internet. In 2015 3rd International Conference on Future Internet of Things and Cloud (301-308). https://doi.org/10.1109/FiCloud.2015.89

Development of IoT applications relies heavily on middleware architectures. Multiple solutions have been proposed using service and agent paradigms, which consequently impose a specific application development model. We observe a trend towards a data... Read More about Autonomous and self controlling smart objects for the future internet.

Energy harvesting aware relay node addition for power-efficient coverage in wireless sensor networks (2015)
Conference Proceeding
Djenouri, D., & Bagaa, M. (2015). Energy harvesting aware relay node addition for power-efficient coverage in wireless sensor networks. https://doi.org/10.1109/ICC.2015.7248303

© 2015 IEEE. This paper deals with power-efficient coverage in wireless sensor networks (WSN) by taking advantage of energy-harvesting capabilities. A general scenario is considered for deployed networks with two types of sensor nodes, harvesting ena... Read More about Energy harvesting aware relay node addition for power-efficient coverage in wireless sensor networks.

Hierarchical rank-based veiling light estimation for underwater dehazing (2015)
Conference Proceeding
Emberton, S., Chittka, L., & Cavallaro, A. (2015). Hierarchical rank-based veiling light estimation for underwater dehazing. In X. Xie, M. W. Jones, & G. K. Tam (Eds.), Proceedings of the British Machine Vision Conference 2015 (125.1-125.12). https://doi.org/10.5244/C.29.125

Current dehazing approaches are often hindered when scenes contain bright objects which can cause veiling light and transmission estimation methods to fail. This paper introduces a single image dehazing approach for underwater images with novel veili... Read More about Hierarchical rank-based veiling light estimation for underwater dehazing.

A variant of connected dominating set in unit disk graphs for applications in communication networks (2015)
Conference Proceeding
Djenouri, D., & Bagaa, M. (2015). A variant of connected dominating set in unit disk graphs for applications in communication networks. https://doi.org/10.1109/EIT.2015.7293384

© 2015 IEEE. This paper considers a variant of the connected dominating set (CDS) problem in a unit disk graph G = (V, E). The considered problem consists in minimizing the number of CDS vertices that belong to a subset V' ⊆V. As far as we know, this... Read More about A variant of connected dominating set in unit disk graphs for applications in communication networks.

The construction of complex networks from linear and nonlinear measures - Climate networks (2015)
Conference Proceeding
Deza, J. I., & Ihshaish, H. (2015). The construction of complex networks from linear and nonlinear measures - Climate networks. . https://doi.org/10.1016/j.procs.2015.05.260

© The Authors. Published by Elsevier B.V. During the last decade the techniques of complex network analysis have found application in climate research. The main idea consists in embedding the characteristics of climate variables, e.g., temperature, p... Read More about The construction of complex networks from linear and nonlinear measures - Climate networks.

Not all days are equal: Investigating the meaning in the digital calendar (2015)
Conference Proceeding
Buzzo, D., & Merendino, N. (2015). Not all days are equal: Investigating the meaning in the digital calendar. In B. Begole, J. Kim, K. Inkpen, & W. Woo (Eds.), Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. , (489-498). https://doi.org/10.1145/2702613.2732512

Copyright © 2015 ACM. The electronic calendar is a common tool used by large numbers of people to reect and shape their daily activities. It's function and structure is rooted in legacy representations dating back thousands of years. Collaborating wi... Read More about Not all days are equal: Investigating the meaning in the digital calendar.

Classifying smart objects using capabilities (2015)
Conference Proceeding
Perez Hernandez, M., & Reiff-Marganiec, S. (2015). Classifying smart objects using capabilities. In 2014 International Conference on Smart Computing (309-316). https://doi.org/10.1109/SMARTCOMP.2014.7043873

The Internet Of Things has emerged, providing an umbrella for the increasing number of heterogeneous Smart Objects that are becoming part of our daily activities. In this scenario, classification approaches are useful to understand differences and id... Read More about Classifying smart objects using capabilities.

Virtualization security combining mandatory access control and virtual machine introspection (2015)
Conference Proceeding
Win, T. Y., Tianfield, H., & Mair, Q. (in press). Virtualization security combining mandatory access control and virtual machine introspection. In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (1004-1009). https://doi.org/10.1109/UCC.2014.165

Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a no... Read More about Virtualization security combining mandatory access control and virtual machine introspection.