Date


People

Output Type

Download Available

138 results

Image Based Proximate Shadow Retargeting

Conference Proceeding
Casas, L., Fauconneau, M., Kosek, M., Mclister, K., & Mitchell, K. (2018)
Image Based Proximate Shadow Retargeting. In Proceedings of Computer Graphics & Visual Computing (CGVC) 2018https://doi.org/10.2312/cgvc.20181206
We introduce Shadow Retargeting which maps real shadow appearance to virtual shadows given a corresponding deformation of scene geometry, such that appearance is seamlessly ma...

Secret shares to protect health records in Cloud-based infrastructures

Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...

A lightweight presentation model for database user interfaces.

Conference Proceeding
Gray, P., Cooper, R., Kennedy, J., McKirdy, J., Barclay, P. J., & Griffiths, T. (1998)
A lightweight presentation model for database user interfaces. In C. Stephanidis, & A. Waern (Eds.), 4th ERCIM Workshop on "User Interfaces for All"
The Teallach project is building a system which eases the design and implementation of user interfaces (web-based or otherwise) to object-oriented database applications. Teall...

Who am I and where am I? - switching and stitching in the digital age.

Conference Proceeding
Smyth, M., Raijmakers, B., & Munro, A. (2003)
Who am I and where am I? - switching and stitching in the digital age. In D. Marjanovic (Ed.), Proceedings of the 8th International Design Conference DESIGN 2004, 1487-1492
This paper will introduce the concept of human identity. It will focus on how the creation, maintenance and communication of identity could be supported by technology. Initial...

Soundscape mapping: a tool for evaluating sounds and auditory environments

Conference Proceeding
McGregor, I., LePlâtre, G., Turner, P., & Flint, T. (2010)
Soundscape mapping: a tool for evaluating sounds and auditory environments. In Proceedings of the 16th International Conference on Auditory Display
This paper describes a soundscape mapping tool, and provides an illustration of its use in the evaluation of an in-car auditory interface. The tool addresses three areas: comm...

A universal character model and ontology of defined terms for taxonomic description.

Conference Proceeding
Paterson, T., Kennedy, J., Pullan, M. R., Cannon, A., Armstrong, K. E., Watson, M. F., …Russell, G. (2004)
A universal character model and ontology of defined terms for taxonomic description. In E. Rahm (Ed.), Proceedings of Data Integration in the Life Sciences (DILS), 63-78
Taxonomists classify biological specimens into groups (taxa) on the basis of similarities between their observed features (characters). The description of these characters is ...

IRIDiuM+: deep media storytelling with non-linear light field video

Conference Proceeding
Kosek, M., Koniaris, B., Sinclair, D., Markova, D., Rothnie, F., Smoot, L., & Mitchell, K. (2017)
IRIDiuM+: deep media storytelling with non-linear light field video. In SIGGRAPH '17 ACM SIGGRAPH 2017 VR Village. https://doi.org/10.1145/3089269.3089277
We present immersive storytelling in VR enhanced with non-linear sequenced sound, touch and light. Our Deep Media (Rose 2012) aim is to allow for guests to physically enter re...

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Conference Proceeding
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019)
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data)https://doi.org/10.1109/BigData.2018.8621922
Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exis...

Wizard of Oz experiments for Companions.

Conference Proceeding
Bradley, J., Mival, O., & Benyon, D. (2009)
Wizard of Oz experiments for Companions. In Proceedings British HCI 2009, (313-317
Wizard of Oz experiments allow designers and developers to see the reactions of people as they interact with to-bedeveloped technologies. At the Centre for Interaction Design ...

Immunological inspiration for building a new generation of autonomic systems.

Conference Proceeding
Hart, E., Davoudani, D., & McEwan, C. (2007)
Immunological inspiration for building a new generation of autonomic systems. In Autonomics '07 Proceedings of the 1st international conference on Autonomic computing and communication systems
Autonomic computing systems of the future will be required to exhibit a number of properties which cannot be engineered using current technologies and algorithms. The most dir...