Skip to main content

Research Repository

Advanced Search

All Outputs (80)

Rate secrecy of networks with game theory approach (2011)
Conference Proceeding
Bamohabbat Chafjiri, S., Tebbi, M. A., & Karimian, Y. (2011). Rate secrecy of networks with game theory approach. In G. Lee (Ed.), Proceedings of the 2011 International Conference on Mechanical Engineering and Technology (ICMET 2011) (833-837). https://doi.org/10.1115/1.859896.paper172

In this paper, we introduce a three-way discrete memoryless Broadcast channel (T-DMBC) between a transmitter (Alice), a receiver (Bob), and an intruder (Eve). We represent a protocol for secret key establishment (SKE) between Alice and Bob so that Ev... Read More about Rate secrecy of networks with game theory approach.

Reinforcement learning based radio resource scheduling in LTE-advanced (2011)
Conference Proceeding
Comsa, I. S., Aydin, M., Zhang, S., Kuonen, P., & Wagen, J. F. (2011). Reinforcement learning based radio resource scheduling in LTE-advanced

In this paper, a novel radio resource scheduling policy for Long Term Evolution Advanced (LTE-A) radio access technology in downlink acceptance is proposed. The scheduling process works with dispatching rules which are various with different behavior... Read More about Reinforcement learning based radio resource scheduling in LTE-advanced.

A model-driven privacy compliance decision support for medical data sharing in Europe (2011)
Journal Article
Boussi Rahmouni, H., Solomonides, T., Casassa Mont, M., Shiu, S., & Rahmouni, M. (2011). A model-driven privacy compliance decision support for medical data sharing in Europe. Methods of Information in Medicine, 50(4), 326-336. https://doi.org/10.3414/ME10-01-0075

Objectives: Clinical practitioners and medical researchers often have to share health data with other colleagues across Europe. Privacy compliance in this context is very important but challenging. Automated privacy guidelines are a practical way of... Read More about A model-driven privacy compliance decision support for medical data sharing in Europe.

Computing with liquid crystal fingers: Models of geometric and logical computation (2011)
Journal Article
Younger, D., Matranga, M. A., Kitson, S., Adamatzky, A., & de Lacy Costello, B. (2011). Computing with liquid crystal fingers: Models of geometric and logical computation. Physical Review E, 84(6), https://doi.org/10.1103/PhysRevE.84.061702

When a voltage is applied across a thin layer of cholesteric liquid crystal, fingers of cholesteric alignment can form and propagate in the layer. In computer simulation, based on experimental laboratory results, we demonstrate that these cholesteric... Read More about Computing with liquid crystal fingers: Models of geometric and logical computation.

Risk-driven compliant access controls for clouds (2011)
Presentation / Conference
Rahmouni, H. B., Munir, K., Odeh, M., & McClatchey, R. (2011, December). Risk-driven compliant access controls for clouds. Paper presented at Proceedings of the International Arab Conference on Information Technology (ACIT 2011), Riyadh, Saudi Arabia

There is widespread agreement that cloud computing have proven cost cutting and agility benefits. However, security and regulatory compliance issues are continuing to challenge the wide acceptance of such technology both from social and commercial st... Read More about Risk-driven compliant access controls for clouds.

Towards context caching in the clouds (2011)
Presentation / Conference
Liaquat Kiani, S., Anjum, A., Antonopoulos, N., Munir, K., & McClatchey, R. (2011, December). Towards context caching in the clouds. Paper presented at International Workshop on Intelligent Techniques and Architectures for Autonomic Clouds (ITAAC 2011), co-located with 4th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2011), Melbourne, Australia

Context information is traditionally collected from distributed digital artifacts and services and made available to similarly distributed, and often mobile, context consuming applications via context brokers or servers. Contextual data has a strong... Read More about Towards context caching in the clouds.

Translating RAD business process mModels into to BPMN models (2011)
Journal Article
Yousef, R., Odeh, M., Coward, D., & Shariah, A. (2011). Translating RAD business process mModels into to BPMN models. International Journal of Web Applications, 3(4), 187-196

Modelling business processes using BPMN has been emerging as the preferred choice for organisations seeking to enact their business processes in service-oriented environments. However, a number of organisations have their business processes modelled... Read More about Translating RAD business process mModels into to BPMN models.

Logic for coalitions with bounded resources (2011)
Journal Article
Nguyen, H. N., Alechina, N., Logan, B., Nga, N. H., & Rakib, A. (2011). Logic for coalitions with bounded resources. Journal of Logic and Computation, 21(6), 907-937. https://doi.org/10.1093/logcom/exq032

Recent work on Alternating-Time Temporal Logic and Coalition Logic has allowed the expression of many interesting properties of coalitions and strategies. However, there is no natural way of expressing resource requirements in these logics. In this a... Read More about Logic for coalitions with bounded resources.

Estimators for RBS-based time synchronization in heterogeneous wireless networks (2011)
Conference Proceeding
Djenouri, D. (2011). Estimators for RBS-based time synchronization in heterogeneous wireless networks. https://doi.org/10.1109/GLOCOMW.2011.6162456

A general scenario for using reference broadcast synchronization (RBS) in heterogeneous multi-hop wireless networks is defined, together with an appropriate model allowing to directly derive maximum likelihood estimators (MLE) to the skew and offset... Read More about Estimators for RBS-based time synchronization in heterogeneous wireless networks.

Context parsing, processing and distribution in clouds (2011)
Presentation / Conference
Kiani, S. L., Anjum, A. M., Bessis, N., Hill, R., & Knappmeyer, M. (2011, November). Context parsing, processing and distribution in clouds. Paper presented at Proceedings of IEEE INCoS-2011: Third International Conference on Intelligent Networking and Collaborative Systems, Japan

"Maybe it becomes a buddy, but do not call it a robot" - Seamless cooperation between companion robotics and smart homes (2011)
Journal Article
Van Den Heuvel, H., Huijnen, C., Badii, A., Heuvel, H., Caleb-Solly, P., & Thiemert, D. (2011). "Maybe it becomes a buddy, but do not call it a robot" - Seamless cooperation between companion robotics and smart homes. Lecture Notes in Artificial Intelligence, 7040 LNCS, 324-329. https://doi.org/10.1007/978-3-642-25167-2_44

This paper describes the findings arising from ongoing qualitative usability evaluation studies on mobile companion robotics in smart home environments from two research projects focused on socio-technical innovation to support independent living (Co... Read More about "Maybe it becomes a buddy, but do not call it a robot" - Seamless cooperation between companion robotics and smart homes.

Hierarchical event selection for video storyboards with a case study on snooker video visualization (2011)
Journal Article
Griffiths, I. W., Chung, D. H., Parry, M. L., Legg, P., & Chen, M. (2011). Hierarchical event selection for video storyboards with a case study on snooker video visualization. IEEE Transactions on Visualization and Computer Graphics, 17(12), 1747-1756. https://doi.org/10.1109/TVCG.2011.208

Video storyboard, which is a form of video visualization, summarizes the major events in a video using illustrative visualization. There are three main technical challenges in creating a video storyboard, (a) event classification, (b) event selection... Read More about Hierarchical event selection for video storyboards with a case study on snooker video visualization.

Biology and computing (2011)
Presentation / Conference
Gale, E. (2011, November). Biology and computing. Presented at Faculty Research Colloquium, University of the West of England, Bristol, UK

Memristors, the recently discovered 4th fundamental circuit element, have been used as models for biological components, such as neurons. It may be that neurons are memristors, rather than just conveniently modeled by them. This presentation covers r... Read More about Biology and computing.

Self-repairing clusters for time-efficient and scalable actor-fault-tolerance in wireless sensor and actor networks (2011)
Conference Proceeding
Amirouche, L., Djenouri, D., & Badache, N. (2011). Self-repairing clusters for time-efficient and scalable actor-fault-tolerance in wireless sensor and actor networks. In AccessNets 2010: Access Networks, (113-123). https://doi.org/10.1007/978-3-642-20931-4_9

A new solution for fault-tolerance in wireless sensor and actor networks (WSAN) is proposed. The solution deals with fault-tolerance of actors, contrary to most of the literature that only considers sensors. It considers real-time communication, and... Read More about Self-repairing clusters for time-efficient and scalable actor-fault-tolerance in wireless sensor and actor networks.

Chemistry for context awareness (C2A) (2011)
Conference Proceeding
Ikram, A., & Baker, N. (2011). Chemistry for context awareness (C2A). In 2011 Seventh International Conference on Intelligent Environments (346-349). https://doi.org/10.1109/IE.2011.69

Awareness is a necessary aspect of interaction of present day devices and communications in pervasive environments. Awareness is dependant on the information of surroundings that is seen as 'Context'. The sources of context have grown exponentially i... Read More about Chemistry for context awareness (C2A).

Verifying requirements for resource-bounded agents (2011)
Thesis
Rakib, A. Verifying requirements for resource-bounded agents. (Thesis). University of Nottingham. Retrieved from https://uwe-repository.worktribe.com/output/958223

This thesis presents frameworks for the modelling and verification of resource-bounded reasoning agents. The resources considered include the time, memory, and communication bandwidth required by agents to achieve a goal. The scalability and expressi... Read More about Verifying requirements for resource-bounded agents.

Semantic annotation for indexing archaeological context: A prototype development and evaluation (2011)
Journal Article
Vlachidis, A., & Tudhope, D. (2011). Semantic annotation for indexing archaeological context: A prototype development and evaluation. Communications in Computer and Information Science, 240 CCIS, 363-374. https://doi.org/10.1007/978-3-642-24731-6_37

The paper discusses the process of developing Semantic Annotations, a form of metadata for assigning conceptual entities to textual instances, in this case archaeological grey literature. The use of Information Extraction (IE), a Natural Language Pro... Read More about Semantic annotation for indexing archaeological context: A prototype development and evaluation.

On computing in fine-grained compartmentalised Belousov-Zhabotinsky medium (2011)
Journal Article
Adamatzky, A., Holley, J., Bull, L., & De Lacy Costello, B. (2011). On computing in fine-grained compartmentalised Belousov-Zhabotinsky medium. Chaos, Solitons and Fractals, 44(10), 779-790. https://doi.org/10.1016/j.chaos.2011.03.010

We introduce results of computer experiments on information processing in a hexagonal array of vesicles filled with Belousov-Zhabotinsky (BZ) solution in a sub-excitable mode. We represent values of Boolean variables by excitation wave-fragments and... Read More about On computing in fine-grained compartmentalised Belousov-Zhabotinsky medium.