Browsing School of Computer Science and Informatics by Title
Now showing items 1595-1614 of 2979
-
K-Mediator: Towards evolving information systems.
(Conference) -
k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions
(Article)This paper examines Vaudenay’s privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary ... -
Keeping an eye on the game: Eye gaze interaction with massively multiplayer online games and virtual communities for motor impaired users.
(Conference)Online virtual communities are becoming increasingly popular both within the able-bodied and disabled user communities. These games assume the use of keyboard and mouse as standard input devices, which in some cases is ... -
Kernels of grey numbers and their operations
(Conference) -
A knee-point-based evolutionary algorithm using weighted subpopulation for many-objective optimization
(Article)Among many-objective optimization problems (MaOPs), the proportion of nondominated solutions is too large to distinguish among different solutions, which is a great obstacle in the process of solving MaOPs. Thus, this paper ... -
Knitwear customisation as repeated redesign.
(Conference)Producing large numbers of garment variants will only be economically viable if it requires very little human effort. But garment customisation cannot always be fully automated. Applying grading rules maintain the same ... -
Knowledge and Skills Sets for Telecare Service Staff in the Context of Digital Health
(Article)Telecare services have an established place within the United Kingdom. Through employing online technologies to help mostly older people to remain at home, they are increasingly recognised as having a support role for ... -
Knowledge based Learning Experience Management on the Semantic Web
(Conference)Learners engaged in informal learning tasks often find sharing their learning experience to be helpful. Informally, a learning experience describes what a learner has done, with what learning resources. We explore technological ... -
A knowledge coverage-based trust propagation for recommendation mechanism in social network group decision making
(Article)Trust is a typical relationship in social network, which in group decision making problems relates to the inner relationship among experts. To obtain a complete trust relationship of a networked group of experts, firstly, ... -
Knowledge Services for Distributed Service Integration
(Conference)Introduce a service-oriented approach for the provision of knowledge-based support for distributed computing, develop a generic knowledge service architecture to realise this approach, and apply this approach to design ... -
Knowledge-based systems.
(Book chapter) -
A Knowledge-Driven Approach to Activity Recognition in Smart Homes
(Article)This paper introduces a knowledge-driven approach to real-time, continuous activity recognition based on multisensor data streams in smart homes. The approach goes beyond the traditional data-centric methods for activity ... -
A Knowledge-driven Approach to Composite Activity Recognition in Smart Environments
(Book chapter)Knowledge-driven activity recognition has recently attracted increasing attention but mainly focused on simple activities. This paper extends previous work to introduce a knowledge-driven approach to recognition of composite ... -
A Knowledge-Driven Tool for Automatic Activity Dataset Annotation
(Book chapter)Human activity recognition has become a very important research topic, due to its multiple applications in areas such as pervasive computing, surveillance, context-aware computing, ambient assistive living or social robotics. ... -
KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures
(Article)During the last decade, several misbehaving Certificate Authorities (CA) have issued fraudulent TLS certificates allowing MITM kinds of attacks which result in serious security incidents. In order to avoid such incidents, ...