Collaborating with intelligent machines
(2015)
Presentation / Conference Contribution
Outputs (114)
Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat (2015)
Presentation / Conference Contribution
The greatest asset that any organisation has are its people, but they may also be the greatest threat. Those who are within the organisation may have authorised access to vast amounts of sensitive company records that are essential for maintaining co... Read More about Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat.
An exploration of expressive feedback as a method for improving the human-computer relationship (2015)
Thesis
A growing community of designers have begun to focus on the emotional aspects of system design as they seek to improve the user experience (UX), by developing applications that elicit positive responses from users that motivate them to learn, play or... Read More about An exploration of expressive feedback as a method for improving the human-computer relationship.
Fast catheter segmentation from echocardiographic sequences based on segmentation from corresponding X-ray fluoroscopy for cardiac catheterization interventions (2015)
Journal Article
© 2014 IEEE. Echocardiography is a potential alternative to X-ray fluoroscopy in cardiac catheterization given its richness in soft tissue information and its lack of ionizing radiation. However, its small field of view and acoustic artifacts make di... Read More about Fast catheter segmentation from echocardiographic sequences based on segmentation from corresponding X-ray fluoroscopy for cardiac catheterization interventions.
Multi-agent model of slime mould for computing and robotics (2015)
Book Chapter
HRF-relaxed: Adapting HRF to the complexities of industrial heterogeneous memory models (2015)
Journal Article
© 2015 ACM. Memory consistency models, or memory models, allow both programmers and program language imple-menters to reason about concurrent accesses to one or more memory locations. Memory model specifications balance the often conflicting needs fo... Read More about HRF-relaxed: Adapting HRF to the complexities of industrial heterogeneous memory models.
Distributed low-latency data aggregation scheduling in wireless sensor networks (2015)
Journal Article
This article considers the data aggregation scheduling problem, where a collision-free schedule is determined in a distributed way to route the aggregated data from all the sensor nodes to the base station within the least time duration. The algorith... Read More about Distributed low-latency data aggregation scheduling in wireless sensor networks.
On exploration of geometrically constrained space by medicinal leeches Hirudo verbana (2015)
Journal Article
© 2015 Elsevier Ireland Ltd. Leeches are fascinating creatures: they have simple modular nervous circuitry yet exhibit a rich spectrum of behavioural modes. Leeches could be ideal blue-prints for designing flexible soft robots which are modular, mult... Read More about On exploration of geometrically constrained space by medicinal leeches Hirudo verbana.
Cybersecurity in the IoT (2015)
Presentation / Conference Contribution
IoT is a nightmare for security and privacy issues and a honeypot for cyber criminals. Cybercrime and threats of cyber security is much closer to connected home ecosystems futures because of the increase adaptability of IoT than ever been expected. M... Read More about Cybersecurity in the IoT.
Use of credibility heuristics in a social question-answering service (2015)
Journal Article
Introduction.This study looked at the effect of community peripheral cues (specifically voting score and answerer's reputation) on the user's credibility rating of answers. Method. Students in technology and philosophy were asked to assess the credi... Read More about Use of credibility heuristics in a social question-answering service.