Skip to main content

Research Repository

Advanced Search

Outputs (114)

Messaging activity reconstruction with sentiment polarity identification (2015)
Journal Article
Andriotis, P., & Oikonomou, G. (2015). Messaging activity reconstruction with sentiment polarity identification. Lecture Notes in Artificial Intelligence, 9190, 475-486. https://doi.org/10.1007/978-3-319-20376-8_42

© Springer International Publishing Switzerland 2015. Sentiment Analysis aims to extract information related to the emotional state of the person that produced a text document and also describe the sentiment polarity of the short or long message. Thi... Read More about Messaging activity reconstruction with sentiment polarity identification.

A framework for describing multimedia circulation in a smartphone ecosystem (2015)
Journal Article
Andriotis, P., Tryfonas, T., Oikonomou, G., & King, I. (2015). A framework for describing multimedia circulation in a smartphone ecosystem. IFIP Advances in Information and Communication Technology, 462, 251-267. https://doi.org/10.1007/978-3-319-24123-4_15

© IFIP International Federation for Information Processing 2015. Contemporary mobile devices allow almost unrestricted sharing of multimedia and other types of files. However, because smartphones and tablets can easily access the Internet and exchang... Read More about A framework for describing multimedia circulation in a smartphone ecosystem.

Efficient Distributed tag-based encryption and its application to group signatures with efficient distributed traceability (2015)
Journal Article
Ghadafi, E. (2015). Efficient Distributed tag-based encryption and its application to group signatures with efficient distributed traceability. Lecture Notes in Artificial Intelligence, 8895, 327-347. https://doi.org/10.1007/978-3-319-16295-9_18

© Springer International Publishing Switzerland 2015. In this work, we first formalize the notion of dynamic group signatures with distributed traceability, where the capability to trace signatures is distributed among n managers without requiring an... Read More about Efficient Distributed tag-based encryption and its application to group signatures with efficient distributed traceability.

Jurojin: Designing a GPS device for people living with dementia (2015)
Book Chapter
Palmer, M., & Hancock, J. (2015). Jurojin: Designing a GPS device for people living with dementia. In M. Antona, & C. Stephanidis (Eds.), Universal Access in Human-Computer Interaction. Access to Learning, Health and Well-Being Part III (600-668). Heidelberg: Springer

Memory loss is the most common symptom of dementia. The impact is such that people living with dementia (PLWD) lose the ability to find their way to previously familiar locations, such as local amenities, and without the aid of others, find themselv... Read More about Jurojin: Designing a GPS device for people living with dementia.

How does the alteration of an avatar’s proportions affect experience and performance when controlling it? (2015)
Book Chapter
Palmer, M., & Pink, S. How does the alteration of an avatar’s proportions affect experience and performance when controlling it?. In D. Brown, & E. Petersson Brooks (Eds.), Virtual Reality Technologies for Health and Clinical Applications. Springer. Manuscript submitted for publication

Despite the claim that ‘you are the controller’ designers of video game characters do not model players’ avatars using any criteria other than aesthetics. Given the demonstrated malleability of the human body image the purpose of this study was to in... Read More about How does the alteration of an avatar’s proportions affect experience and performance when controlling it?.

Negation detection and word sense disambiguation in digital archaeology reports for the purposes of semantic annotation (2015)
Journal Article
Vlachidis, A., & Tudhope, D. (2015). Negation detection and word sense disambiguation in digital archaeology reports for the purposes of semantic annotation. Program, 49(2), 118-134

The paper presents the role and contribution of Natural Language Processing Techniques, in particular Negation Detection and Word Sense Disambiguation in the process of Semantic Annotation of Archaeological Grey Literature. Archaeological reports con... Read More about Negation detection and word sense disambiguation in digital archaeology reports for the purposes of semantic annotation.

Real-time monitoring of privacy abuses and intrusion detection in android system (2015)
Journal Article
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34

© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ‘norm... Read More about Real-time monitoring of privacy abuses and intrusion detection in android system.

Towards computation of novel ideas from corpora of scientific text (2015)
Journal Article
Liu, H., Goulding, J., & Brailsford, T. (2015). Towards computation of novel ideas from corpora of scientific text. Lecture Notes in Artificial Intelligence, 9285, 541-556. https://doi.org/10.1007/978-3-319-23525-7_33

© Springer International Publishing Switzerland 2015. In this work we present a method for the computation of novel ‘ideas’ from corpora of scientific text. The system functions by first detecting concept noun-phrases within the titles and abstracts... Read More about Towards computation of novel ideas from corpora of scientific text.

Application of a game theoretic approach in smart sensor data trustworthiness problems (2015)
Journal Article
Maraslis, K., Spyridopoulos, T., Oikonomou, G., Tryfonas, T., & Haghighi, M. (2015). Application of a game theoretic approach in smart sensor data trustworthiness problems. IFIP Advances in Information and Communication Technology, 455, 601-615. https://doi.org/10.1007/978-3-319-18467-8_40

© IFIP International Federation for Information Processing 2015. In this work we present an Intrusion Detection (ID) and an Intrusion Prevention (IP) model for Wireless Sensor Networks (WSNs). The attacker’s goal is to compromise the deployment by ca... Read More about Application of a game theoretic approach in smart sensor data trustworthiness problems.