Skip to main content

Research Repository

Advanced Search

Outputs (303)

A parametric study for congestion control in queuing networks (2017)
Conference Proceeding
Malik, M. H., Majeed, A., Aydin, M. E., & Malik, M. H. (2017). A parametric study for congestion control in queuing networks. In ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed Systems. https://doi.org/10.1145/3102304.3105574

Congestion avoidance mechanisms are used to prevent the saturation of the bottleneck under mean-field domain where large numbers of TCP connections interact with one another. It is clear that selections of parameters play an important role on the per... Read More about A parametric study for congestion control in queuing networks.

Energy Harvesting Aware Minimum Spanning Tree for Survivable WSN with Minimum Relay Node Addition (2017)
Conference Proceeding
Djenouri, D., Bagaa, M., Chelli, A., & Balasingham, I. (2017). Energy Harvesting Aware Minimum Spanning Tree for Survivable WSN with Minimum Relay Node Addition. https://doi.org/10.1109/glocomw.2016.7848891

Survivable wireless sensor networks that take advantage of green energy resources from the environment is considered in this paper. The particular problem of constrained relay nodes (RNs) placement to ensure communication coverage in the single-tiere... Read More about Energy Harvesting Aware Minimum Spanning Tree for Survivable WSN with Minimum Relay Node Addition.

Permissions snapshots: Assessing users' adaptation to the Android runtime permission model (2017)
Conference Proceeding
Andriotis, P., Sasse, M. A., & Stringhini, G. (2017). Permissions snapshots: Assessing users' adaptation to the Android runtime permission model. . https://doi.org/10.1109/WIFS.2016.7823922

© 2016 IEEE. The Android operating system changed its security-and privacy-related permission model recently, offering its users the ability to control resources that applications are allowed to access on their devices. This major change to the tradi... Read More about Permissions snapshots: Assessing users' adaptation to the Android runtime permission model.

Towards a smart learning environment for smart city governance (2016)
Conference Proceeding
Hammad, R., & Ludlow, D. (2016). Towards a smart learning environment for smart city governance. In UCC '16 Proceedings of the 9th International Conference on Utility and Cloud Computing (185-190). https://doi.org/10.1145/2996890.3007859

Copyright © 2016 ACM. Educational services provided to various stakeholders need to be actively developed to accommodate the diversity of learning models and to get the advantages of available resources (e.g. data) in smart cities governance. Despite... Read More about Towards a smart learning environment for smart city governance.

Towards a software framework for the autonomous Internet of Things (2016)
Conference Proceeding
Hernandez, M. E., Perez Hernandez, M., & Reiff-Marganiec, S. (2016). Towards a software framework for the autonomous Internet of Things. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (220-227). https://doi.org/10.1109/FiCloud.2016.39

IoT promises a world where Smart Objects (SO) are able to autonomously communicate and work together to make the (human) user's life easier. Popular approaches for development of IoT applications take for granted that on-object resources are evenly c... Read More about Towards a software framework for the autonomous Internet of Things.

Mobile App Collusions and Its Cyber Security Implications (2016)
Conference Proceeding
Arabo, A. (2016). Mobile App Collusions and Its Cyber Security Implications. In M. Qiu, L. Tao, & J. Niu (Eds.), 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (178-183). https://doi.org/10.1109/CSCloud.2016.9

© 2016 IEEE. The key focus in securing mobile software systems is substantiality intended in detecting and mitigating vulnerabilities in a single app or apps developed by the same individual. It fails to identify vulnerabilities that arise as a resul... Read More about Mobile App Collusions and Its Cyber Security Implications.

Foundations of fully dynamic group signatures (2016)
Conference Proceeding
Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., & Groth, J. (2016). Foundations of fully dynamic group signatures. In Applied Cryptography and Network Security (117-136). https://doi.org/10.1007/978-3-319-39555-5_7

Group signatures are a central cryptographic primitive that has received a considerable amount of attention from the cryptographic community. They allow members of a group to anonymously sign on behalf of the group. Membership is overseen by a design... Read More about Foundations of fully dynamic group signatures.

The ‘E’ in QWERTY: Musical expression with old computer interfaces (2016)
Conference Proceeding
Nash, C. (2016). The ‘E’ in QWERTY: Musical expression with old computer interfaces. In Proceedings of the International Conference on New Interfaces for Musical Expression (224-229). https://doi.org/10.5281/zenodo.1176088

This paper presents a development of the ubiquitous computer keyboard to capture velocity and other continuous musical properties, in order to support more expressive interaction with music software. Building on existing ‘virtual piano’ utilities, th... Read More about The ‘E’ in QWERTY: Musical expression with old computer interfaces.

Parallel BSO algorithm for association rules mining using master/worker paradigm (2016)
Conference Proceeding
Djenouri, Y., Bendjoudi, A., Djenouri, D., & Habbas, Z. (2016). Parallel BSO algorithm for association rules mining using master/worker paradigm. https://doi.org/10.1007/978-3-319-32149-3_25

© Springer International Publishing Switzerland 2016. The extraction of association rules from large transactional databases is considered in the paper using cluster architecture parallel computing. Motivated by both the successful sequential BSO-ARM... Read More about Parallel BSO algorithm for association rules mining using master/worker paradigm.

Short accountable ring signatures based on DDH (2016)
Conference Proceeding
Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J., & Petit, C. (2016). Short accountable ring signatures based on DDH. In Computer Security -- ESORICS 2015 (243-265). https://doi.org/10.1007/978-3-319-24174-6_13

Ring signatures and group signatures are prominent cryptographic primitives offering a combination of privacy and authentication. They enable individual users to anonymously sign messages on behalf of a group of users. In ring signatures, the group,... Read More about Short accountable ring signatures based on DDH.