6 results

The Privacy and Security Implications of Open Data in Healthcare: A Contribution from the IMIA Open Source Working Group

Journal Article
Kobayashi, S., Kane, T., & Paton, C. (2018)
The Privacy and Security Implications of Open Data in Healthcare: A Contribution from the IMIA Open Source Working Group. IMIA Yearbook of Medical Informatics, https://doi.org/10.1055/s-0038-1641201
Objective: The International Medical Informatics Association (IMIA) Open Source Working Group (OSWG) initiated a group discussion to discuss current privacy and security issue...

VANET aided D2D Discovery: Delay Analysis and Performance

Journal Article
Chour, H., Nasser, Y., Artail, H., Kachouh, A., & Al-Dubai, A. (2017)
VANET aided D2D Discovery: Delay Analysis and Performance. IEEE Transactions on Vehicular Technology, 66(9), 8059-8071. https://doi.org/10.1109/TVT.2017.2690238
The proposed solutions in the literature for integrating Device-to-Device (D2D) communication in cellular networks require added functionalities and consume valuable network r...

The REAL Corpus: a crowd-sourced corpus of human generated and evaluated spatial references to real-world urban scenes

Conference Proceeding
Bartie, P., Mackaness, W., Gkatzia, D., & Rieser, V. (2016)
The REAL Corpus: a crowd-sourced corpus of human generated and evaluated spatial references to real-world urban scenes. In 10th International Conference on Language Resources and Evaluation (LREC)
We present a newly crowd-sourced data set of natural language references to objects anchored in complex urban scenes (In short: The REAL Corpus – Referring Expressions Anchore...

Tracking, Analysis and Measurement of Pedestrian Trajectories

Thesis
Clayton, S. E. (2016)
Tracking, Analysis and Measurement of Pedestrian Trajectories. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/452997
Pedestrian movement is unconstrained. For this reason it is not amenable to mathematical modelling in the same way as road traffic. Individual pedestrians are notoriously diff...

An approach to using a laser pointer as a mouse

Conference Proceeding
Aizeboje, J., & Peng, T. (2015)
An approach to using a laser pointer as a mouse. In Proceedings of the 17th International Conference on Enterprise Information Systems Volume 2, (543-552). https://doi.org/10.5220/0005378005430552
Modern technologies have evolved to present different ways users can interact with computers. Nowadays, computers and projectors are commonly used in teaching and presentation...

Dimensional analysis based causal ordering

Conference Proceeding
Shen, Q., Peng, T., & Milne, R. (1998)
Dimensional analysis based causal ordering. In Proceedings of the 13th International Workshop on Qualitative Reasoning, 193-202
This paper presents a novel approach for generating causal dependencies between system variables, from an acausal description of the system behaviour, and for identifying the ...