Selection of the papers and research outputs from the University of Northampton's Computing academic team:
- Al-Mahmood, A. and Opoku Agyeman, M. (2018) On wearable devices for motivating patients with upper limb disability via gaming and home rehabilitation.Paper presented to: IEEE International Workshop on Internet of Things: Networking Applications and Technologies (IoTNAT 2018), Barcelona, Spain, 23-26 April 2018.
- Al-Sherbaz, A., Turner, S. J., Dohan, M. and Clarke, E. (2018) Blockchain: no thunder no wonder. Invited Presentation presented to: British Computing Society (BCS) Northampton Talk, University of Northampton, 13 March 2018.
- Al-Waisi, Z. and Opoku Agyeman, M. (2018) Challenges and opportunities of smart meters in smart homes and smart grids. In: International Symposium on Computer Science and Intelligent Control. Sweden: ISCSIC. (Accepted)
- Dean, A. and Opoku Agyeman, M. (2018) A study of the advances in IoT security. In: International Symposium on Computer Science and Intelligent Control.Sweden: ISCSIC. (Accepted)
- Devecchi, C., Al-Sherbaz, A., Turner, S. J., Taeed, O. and Petford, N. (2018) Capturing and transacting ‘value for students’ in the Digital University: the Blockchain Educational Passport. Invited Presentation presented to: University of Northampton Research Conference 2018, University of Northampton, 20-21 June 2018.
- Dohan, M. and Opoku Agyeman, M. (2018) A study of cache management mechanisms for real-time embedded systems. In: International Symposium on Computer Science and Intelligent Control. Sweden : ISCSIC. (Accepted)
- Edan, N. M., Al-Sherbaz, A. and Turner, S. J. (2018) Design and implement a hybrid WebRTC signalling mechanism for unidirectional & bi-directional video conferencing. International Journal of Electrical and Computer Engineering (IJECE). 8(1), pp. 390-399. 2088-8708.
- Edan, N. M., Al-Sherbaz, A. and Turner, S. J. (2018) Performance evaluation of resources management in WebRTC for a scalable communication. In: Computing Conference 2018 Proceedings. London: IEEE. (Accepted)
- Mahmood, J. K. and Opoku Agyeman, M. (2018) An overview of prevention/mitigation against memory corruption attack. In: International Symposium on Computer Science and Intelligent Control. Sweden: ISCSIC. (Accepted)
- Margarita Espinosa Jimenez, L. and Opoku Agyeman, M. (2018) A study of techniques to increase Instruction Level Parallelism. In: International Symposium on Computer Science and Intelligent Control. Sweden: ISCSIC. (Accepted)
- Mohammedali, N. and Opoku Agyeman, M. (2018) A study of reconfigurable accelerators for cloud computing. In: International Symposium on Computer Science and Intelligent Control. Sweden: ISCSIC. (Accepted)
- Montasari, R., Hill, R., Hosseinian-Far, A. and Montaseri, F. (2018) Countermeasures for timing-based side-channel attacks against shared, modern computing hardware. International Journal of Electronic Security and Digital Forensics. 1751-911X. (Accepted)
- Montasari, R., Hosseinian-Far, A., Hill, R., Montaseri, F., Sharma, M. and Shabbir, S. (2018) Are timing-based side-channel attacks feasible in shared, modern computing hardware? International Journal of Organizational and Collective Intelligence (IJOCI). 8(2) 1947-9344.
- Mu, M. (2018) Software defined cognitive networking: supporting intelligent online video streaming. 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC). 2331-9860.
- Mu, M., Stokking, H. and Den Hartog, F. (2018) Network delay and bandwidth estimation for cross-device synchronized media. In: Montagud, M., Cesar, P., Boronat, F. and Jansen, J. (eds.) MediaSync: Handbook on Multimedia Synchronization. U.S.: Springer International. pp. 649-676.
- Ofori-Attah, E. and Opoku Agyeman, M. (2018) A survey of low power design techniques for last level caches. Poster presented to: 14th International Symposium on Applied Reconfigurable Computing (ARC 2018), Santorini, Greece, 02-04 May 2018.
- Ofori-Attah, E. and Opoku Agyeman, M. (2018) A survey of power-aware Network-on-Chip design techniques. The Thirteenth International Multi-Conference on Computing in Global Information Technology. 2308-4529. (Accepted)
- Ofori-Attah, E., Opoku Agyeman, M. and Turner, S. J. (2018) A survey of application mapping techniques for many-core designs. Invited Presentation presented to: University of Northampton Research Conference 2018, University of Northampton, 20-21 June 2018.
- Ofori-Attah, E., Opoku Agyeman, M. and Turner, S. J. (2018) Low power design for many core systems. Invited Presentation presented to: 3MT: Three-Minute Thesis Competition, Northampton, 21 June 2018.
- Ofori-Attah, E., Wang, X. and Opoku Agyeman, M. (2018) A survey of low power design techniques for last level caches. Lecture Notes in Computer Science.10824, pp. 217-228. 0302-9743.
- Ofori-Attah, E., Wang, X. and Opoku Agyeman, M. (2018) A survey of system level power management schemes in the dark-silicon era for many-core architectures. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. 5(15) 2410-0218.
- Opoku Agyeman, M., Ahmadinia, A. and Bagherzadeh, N. (2018) Energy and performance-aware application mapping for inhomogeneous 3D networks-on-chip.Journal of Systems Architecture. 89, pp. 103-117. 1383-7621.
- Sam, D. and Opoku Agyeman, M. (2018) An overview of design space exploration of cache memory. In: International Symposium on Computer Science and Intelligent Control. Sweden: ISCSIC. (Accepted)
- Slavova, Y. and Mu, M. (2018) A comparative study of the learning outcomes and experience of VR in education. In: IEEE Conference on Virtual Reality and 3D User Interfaces (IEEE VR 2018). Germany: IEEE. (Accepted)
- Turner, S. J. (2018) Games in teaching programming: HE perspective. Invited Presentation presented to: Gaming in Education, Milton Keynes, 28 June 2018.
- Turner, S. J. (2018) Robots in home and school. Invited Presentation presented to: British Computing Society (BCS) Northampton Robotics Talk, University of Northampton, 17 April 2018.
- Vossen, P. H. and Ajit, S. (2018) Fuzzy scoring theory applied to team-peer assessment: additive vs. multiplicative scoring models on the signed or unsigned unit interval. Advances in Intelligent Systems and Computing. 2194-5357. (Accepted)
- Xue, J. (2018) Mining association rules for admission control and service differentiation in e-commerce applications. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. 1942-4795. (In Press)
- Yu, Y., Kaiya, H., Yoshioka, N., Hu, Z., Washizaki, H., Xiong, Y. and Hosseinian-Far, A. (2018) Goal modelling for security problem matching and pattern enforcement. International Journal of Secure Software Engineering (IJSSE). 8(3), pp. 42-57. 1947-3036.
All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with. Twitter: @scottturneruon
No comments:
Post a Comment