Skip to main content

Research Repository

Advanced Search

Outputs (80)

Rate secrecy of networks with game theory approach (2011)
Conference Proceeding
Bamohabbat Chafjiri, S., Tebbi, M. A., & Karimian, Y. (2011). Rate secrecy of networks with game theory approach. In G. Lee (Ed.), Proceedings of the 2011 International Conference on Mechanical Engineering and Technology (ICMET 2011) (833-837). https://doi.org/10.1115/1.859896.paper172

In this paper, we introduce a three-way discrete memoryless Broadcast channel (T-DMBC) between a transmitter (Alice), a receiver (Bob), and an intruder (Eve). We represent a protocol for secret key establishment (SKE) between Alice and Bob so that Ev... Read More about Rate secrecy of networks with game theory approach.

A model-driven privacy compliance decision support for medical data sharing in Europe (2011)
Journal Article
Boussi Rahmouni, H., Solomonides, T., Casassa Mont, M., Shiu, S., & Rahmouni, M. (2011). A model-driven privacy compliance decision support for medical data sharing in Europe. Methods of Information in Medicine, 50(4), 326-336. https://doi.org/10.3414/ME10-01-0075

Objectives: Clinical practitioners and medical researchers often have to share health data with other colleagues across Europe. Privacy compliance in this context is very important but challenging. Automated privacy guidelines are a practical way of... Read More about A model-driven privacy compliance decision support for medical data sharing in Europe.

Reinforcement learning based radio resource scheduling in LTE-advanced (2011)
Conference Proceeding
Comsa, I. S., Aydin, M., Zhang, S., Kuonen, P., & Wagen, J. F. (2011). Reinforcement learning based radio resource scheduling in LTE-advanced

In this paper, a novel radio resource scheduling policy for Long Term Evolution Advanced (LTE-A) radio access technology in downlink acceptance is proposed. The scheduling process works with dispatching rules which are various with different behavior... Read More about Reinforcement learning based radio resource scheduling in LTE-advanced.

Computing with liquid crystal fingers: Models of geometric and logical computation (2011)
Journal Article
Younger, D., Matranga, M. A., Kitson, S., Adamatzky, A., & de Lacy Costello, B. (2011). Computing with liquid crystal fingers: Models of geometric and logical computation. Physical Review E, 84(6), https://doi.org/10.1103/PhysRevE.84.061702

When a voltage is applied across a thin layer of cholesteric liquid crystal, fingers of cholesteric alignment can form and propagate in the layer. In computer simulation, based on experimental laboratory results, we demonstrate that these cholesteric... Read More about Computing with liquid crystal fingers: Models of geometric and logical computation.

Risk-driven compliant access controls for clouds (2011)
Presentation / Conference
Rahmouni, H. B., Munir, K., Odeh, M., & McClatchey, R. (2011, December). Risk-driven compliant access controls for clouds. Paper presented at Proceedings of the International Arab Conference on Information Technology (ACIT 2011), Riyadh, Saudi Arabia

There is widespread agreement that cloud computing have proven cost cutting and agility benefits. However, security and regulatory compliance issues are continuing to challenge the wide acceptance of such technology both from social and commercial st... Read More about Risk-driven compliant access controls for clouds.

Towards context caching in the clouds (2011)
Presentation / Conference
Liaquat Kiani, S., Anjum, A., Antonopoulos, N., Munir, K., & McClatchey, R. (2011, December). Towards context caching in the clouds. Paper presented at International Workshop on Intelligent Techniques and Architectures for Autonomic Clouds (ITAAC 2011), co-located with 4th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2011), Melbourne, Australia

Context information is traditionally collected from distributed digital artifacts and services and made available to similarly distributed, and often mobile, context consuming applications via context brokers or servers. Contextual data has a strong... Read More about Towards context caching in the clouds.

Translating RAD business process mModels into to BPMN models (2011)
Journal Article
Yousef, R., Odeh, M., Coward, D., & Shariah, A. (2011). Translating RAD business process mModels into to BPMN models. International Journal of Web Applications, 3(4), 187-196

Modelling business processes using BPMN has been emerging as the preferred choice for organisations seeking to enact their business processes in service-oriented environments. However, a number of organisations have their business processes modelled... Read More about Translating RAD business process mModels into to BPMN models.

Logic for coalitions with bounded resources (2011)
Journal Article
Nguyen, H. N., Alechina, N., Logan, B., Nga, N. H., & Rakib, A. (2011). Logic for coalitions with bounded resources. Journal of Logic and Computation, 21(6), 907-937. https://doi.org/10.1093/logcom/exq032

Recent work on Alternating-Time Temporal Logic and Coalition Logic has allowed the expression of many interesting properties of coalitions and strategies. However, there is no natural way of expressing resource requirements in these logics. In this a... Read More about Logic for coalitions with bounded resources.

Estimators for RBS-based time synchronization in heterogeneous wireless networks (2011)
Conference Proceeding
Djenouri, D. (2011). Estimators for RBS-based time synchronization in heterogeneous wireless networks. https://doi.org/10.1109/GLOCOMW.2011.6162456

A general scenario for using reference broadcast synchronization (RBS) in heterogeneous multi-hop wireless networks is defined, together with an appropriate model allowing to directly derive maximum likelihood estimators (MLE) to the skew and offset... Read More about Estimators for RBS-based time synchronization in heterogeneous wireless networks.