A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations
Journal Article
Ghaleb, B., Al-Dubai, A. Y., Ekonomou, E., Alsarhan, A., Nasser, Y., Mackenzie, L. M., & Boukerche, A. (2018)
A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations. Communications Surveys and Tutorials, IEEE Communications Society, https://doi.org/10.1109/COMST.2018.2874356
Driven by the special requirements of the Low-power and Lossy Networks (LLNs), the IPv6 Routing Protocol for LLNs (RPL) was standardized by the IETF some six years ago to tack...
System and method for management of confidential data
Patent
Buchanan, B., Lo, O., Macfarlane, R., Penrose, P., & Ramsay, B. (in press)
System and method for management of confidential data. GB2561176A
This application is for a method of data management to identify confidential digital content on a database by first receiving a management request 302 from a system 304 to car...
Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings
Conference Proceeding
(2018)
Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings. In I. Romdhani, L. Shu, H. Takahiro, Z. Zhou, T. Gordon, & D. Zeng (Eds.), Collaborative Computing: Networking, Applications and Worksharinghttps://doi.org/10.1007/978-3-030-00916-8
This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, Collabora...
Image Based Proximate Shadow Retargeting
Conference Proceeding
Casas, L., Fauconneau, M., Kosek, M., Mclister, K., & Mitchell, K. (2018)
Image Based Proximate Shadow Retargeting. In Proceedings of Computer Graphics & Visual Computing (CGVC) 2018https://doi.org/10.2312/cgvc.20181206
We introduce Shadow Retargeting which maps real shadow appearance to virtual shadows given a corresponding deformation of scene geometry, such that appearance is seamlessly ma...
Delivering HE and FE: A user evaluation of virtual learning environments in a networked institution.
Presentation / Conference
Clayes, E., & Fabian, K. (2018, September)
Delivering HE and FE: A user evaluation of virtual learning environments in a networked institution
No abstract available.
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things
Conference Proceeding
Semedo, F., Moradpoor, N., & Rafiq, M. (2018)
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. In SIN '18 Proceedings of the 11th International Conference on Security of Information and Networkshttps://doi.org/10.1145/3264437.3264438
The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Position...
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device
Conference Proceeding
Lo, O., Buchanan, W. J., & Carson, D. (2018)
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Securityhttps://doi.org/10.1145/3230833.3232801
Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consu...
GDPR and Cyber Security for Business Information Systems
Book
Gobeo, A., Fowler, C., & Buchanan, B. (2018)
GDPR and Cyber Security for Business Information Systems. River Publishers
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundame...
GPU-accelerated depth codec for real-time, high-quality light field reconstruction
Journal Article
Koniaris, B., Kosek, M., Sinclair, D., & Mitchell, K. (2018)
GPU-accelerated depth codec for real-time, high-quality light field reconstruction. Proceedings of the ACM on Computer Graphics and Interactive Techniques, 1(1), 1-15. https://doi.org/10.1145/3203193
Pre-calculated depth information is essential for efficient light field video rendering, due to the prohibitive cost of depth estimation from color when real-time performance ...
From Faces to Outdoor Light Probes
Journal Article
Calian, D. A., Lalonde, J., Gotardo, P., Simon, T., Matthews, I., & Mitchell, K. (2018)
From Faces to Outdoor Light Probes. Computer Graphics Forum, 37(2), 51-61. doi:10.1111/cgf.13341
Image‐based lighting has allowed the creation of photo‐realistic computer‐generated content. However, it requires the accurate capture of the illumination conditions, a task n...