Browsing School of Computer Science and Informatics by Title
Now showing items 340-359 of 2970
-
The C6H6 NMR repository: an integral solution to control the flow of your data from the magnet to the public
(Article)NMR is a mature technique that is well established and adopted in a wide range of research facilities from laboratories to hospitals. This accounts for large amounts of valuable experimental data that may be readily exported ... -
CA-UCON: A Context-Aware Usage Control Model
(Conference)Usage CONtrol (UCON) model is the latest major enhance- ment of the traditional access control models which enables mutability of subject and object attributes, and continuity of control on usage of resources. In UCON, ... -
CA-UCON: A context-aware usage control model.
(Conference) -
The Calculus of context-aware ambients.
(Article)We present the Calculus of Context-aware Ambients (CCA in short) for the modelling and verification of mobile systems that are context-aware. This process calculus is built upon the calculus of mobile ambients and introduces ... -
Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
(Article)This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject ... -
Can compact optimisation algorithms be structurally biased?
(Conference)In the field of stochastic optimisation, the so-called structural bias constitutes an undesired behaviour of an algorithm that is unable to explore the search space to a uniform extent. In this paper, we investigate whether ... -
Can Machines Create Art?
(Article)As machines take over more tasks previously done by humans, artistic creation is also considered as a candidate to be automated. But, can machines create art? This paper offers a conceptual framework for a philosophical ... -
Can Single Solution Optimisation Methods Be Structurally Biased?
(Article)This paper investigates whether optimisation methods with the population made up of one solution can suffer from structural bias just like their multisolution variants. Following recent results highlighting the importance ... -
Care robots and the future of ICT-mediated elderly care: a response to doom scenarios.
(Article)The discussion about robots in elderly care is populated by doom scenarios about a totally dehumanized care system in which elderly people are taken care of by machines. Such scenarios are helpful as they attend us ... -
Carers’ Involvement in Telecare Provision for Older People in England: Perspectives of Council Telecare Managers and Stakeholders
(Article)This paper explores telecare manager and other ‘stakeholder’ perspectives on the nature, extent and impact of family and other unpaid/informal carers’ involvement in the provision of telecare equipment and services for ... -
A case study of image retrieval on lung cancer chest x-ray pictures.
(Conference)This paper presents a case study of an image retrieval system based on a notion of similarity between images in a multimedia database and where a user request can be an image file or a keyword. The CBIR (Content Based Image ... -
CCA: a calculus of context-aware ambients.
(Conference)We present a process calculus, CCA, for the modelling and verification of mobile systems that are context-aware. This process calculus is built upon the calculus of mobile ambients and introduces new constructs to enable ... -
CertLedger: A New PKI Model with Certi cate Transparency Based on Blockchain
(Article)In conventional PKI, CAs are assumed to be fully trusted. However, in practice, CAs' absolute responsibility for providing trustworthiness caused major security and privacy issues. To prevent such issues, Google introduced ...