Date


People

Output Type

Download Available

Dewey Decimal

145 results

Assessing the Relative Importance of an E-learning system Usability Design Characteristics Based on Students' Preferences

Journal Article
Rutter, M. J., Smith, S., & Alshehri, A. (2019)
Assessing the Relative Importance of an E-learning system Usability Design Characteristics Based on Students' Preferences. European Journal of Educational Research, 8(3), 839-855. https://doi.org/10.12973/eu-jer.8.3.839
This study considers the interaction between an e-learning system, the Blackboard system, and the students who use it in Saudi Arabia. While previous work exists, there is lim...

The Social Impact of Digital Youth Work: What Are We Looking For?

Journal Article
Pawluczuk, A., Webster, G., Smith, C., & Hall, H. (2019)
The Social Impact of Digital Youth Work: What Are We Looking For?. Media and Communication, 7(2), 59-68. https://doi.org/10.17645/mac.v7i2.1907
Digital youth work is an emerging field of research and practice which seeks to investigate and support youth-centred digital literacy initiatives. Whilst digital youth work p...

Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput?

Journal Article
Barakat, B., Keates, S., Wassell, I., & Arshad, K. (2019)
Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput?. IEEE Communications Letters, 23(6), 987-990. https://doi.org/10.1109/LCOMM.2019.2907935
The Zero-Wait (ZW) policy is widely held to achieve maximum information 'freshness', i.e., to achieve minimum Peak Age (PA) and maximum throughput, for real-time Internet-of-T...

Deep Precomputed Radiance Transfer for Deformable Objects

Journal Article
Li, Y., Wiedemann, P., & Mitchell, K. (2019)
Deep Precomputed Radiance Transfer for Deformable Objects. Proceedings of the ACM on Computer Graphics and Interactive Techniques, 2(1), 1-16. https://doi.org/10.1145/3320284
We propose, DeepPRT, a deep convolutional neural network to compactly encapsulate the radiance transfer of a freely deformable object for rasterization in real-time. With pre...

An optimized Speculative Execution Strategy Based on Local Data Prediction in Heterogeneous Hadoop Environment

Journal Article
Jin, D., Liu, Q., Liu, X., & Linge, N. (2019)
An optimized Speculative Execution Strategy Based on Local Data Prediction in Heterogeneous Hadoop Environment. Journal of Computers, 30(3), 130-142. https://doi.org/10.3966/199115992019063003010
Hadoop is a famous parallel computing framework that is applied to process large-scale data, but there exists such a task in hadoop framework, which is called “Straggling task...

Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning

Journal Article
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2019)
Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, 128, 56-63. https://doi.org/10.1016/j.jnca.2018.12.002
Suspicious emails are one big threat for Internet of Things (IoT) security, which aim to induce users to click and then redirect them to a phishing webpage. To protect IoT sys...

Copy-move forgery detection using combined features and transitive matching

Journal Article
Lin, C., Lu, W., Huang, X., Liu, K., Sun, W., Lin, H., & Tan, Z. (2019)
Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications, 78(21), 30081-30096. https://doi.org/10.1007/s11042-018-6922-4
Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be ta...

Mitigating Disaster using Secure Threshold-Cloud Architecture

Journal Article
Ukwandu, E., Buchanan, W. J., & Russell, G. (2018)
Mitigating Disaster using Secure Threshold-Cloud Architecture. Current Trends in Computer Sciences & Applications, 1(2),
There are many risks in moving data into public cloud environments, along with an increasing threat around large-scale data leakage during cloud outages. This work aims to app...

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services

Journal Article
Zhang, S., Li, X., Tan, Z., Peng, T., & Wang, G. (2019)
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Generation Computer Systems, 94, 40-50. doi:10.1016/j.future.2018.10.053
With the rapid pervasion of location-based services (LBSs), protection of location privacy has become a significant concern. In most continuous LBSs' privacy-preserving soluti...

The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime

Journal Article
Dyson, S., Buchanan, W., & Bell, L. (2018)
The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime. The Journal of the British Blockchain Association, 1(2), 1-6. https://doi.org/10.31585/jbba-1-2-%288%292018
We increasingly live in a world where there is a balance between the rights to privacy and the requirements for consent, and the rights of society to protect itself. Within th...