Skip to main content

Research Repository

Advanced Search

Outputs (218)

Can wireless mesh networking carry long-distance communications? (2018)
Other
Tu, W. (2018). Can wireless mesh networking carry long-distance communications?. [Blog Post]

Many regard wireless mesh networking as a potential key technology to provide low-cost Internet over a specific coverage area.

A wireless mesh network (WMN) consists of mesh gateways, mesh routers, and mesh clients. Mesh gateways and mesh routers... Read More about Can wireless mesh networking carry long-distance communications?.

Interpreting MOS scores, when can users see a difference? Understanding user experience differences for photo quality (2018)
Journal Article
Katsigiannis, S., Scovell, J., Ramzan, N., Janowski, L., Corriveau, P., Saad, M. A., & Van Wallendael, G. (2018). Interpreting MOS scores, when can users see a difference? Understanding user experience differences for photo quality. Quality and User Experience, 3(1), Article 6. https://doi.org/10.1007/s41233-018-0019-8

The use of no-reference image quality evaluation tools that produce MOS scores, like the VIQET tool which was released by the Video Quality Expert Group, raises the question of whether the produced MOS differences between images correspond to noticea... Read More about Interpreting MOS scores, when can users see a difference? Understanding user experience differences for photo quality.

"attractor Tempi" in Brahms's Symphony No. 2/III (2018)
Journal Article
Gotham, M. R. H. (2018). "attractor Tempi" in Brahms's Symphony No. 2/III. Music Theory Spectrum, 40(1), 138 – 153. https://doi.org/10.1093/mts/mty010

This analysis assesses tempo choice in the third movement of Brahms’s Second Symphony. It is shown that, at key moments of the movement, the average tempi used in a sample of commercial recordings align closely with those suggested by the “attractor”... Read More about "attractor Tempi" in Brahms's Symphony No. 2/III.

Towards affordable semantic searching: Zero-shot retrieval via dominant attributes (2018)
Presentation / Conference Contribution
Long, Y., Liu, L., Shen, Y., & Shao, L. (2018, December). Towards affordable semantic searching: Zero-shot retrieval via dominant attributes. Presented at Thirty-Second AAAI Conference on Artificial Intelligence

Instance-level retrieval has become an essential paradigm to index and retrieves images from large-scale databases. Conventional instance search requires at least an example of the query image to retrieve images that contain the same object instance.... Read More about Towards affordable semantic searching: Zero-shot retrieval via dominant attributes.

Study on student performance estimation, student progress analysis, and student potential prediction based on data mining (2018)
Journal Article
Yang, F., & Li, F. W. (2018). Study on student performance estimation, student progress analysis, and student potential prediction based on data mining. Computers & Education, 123, 97-108. https://doi.org/10.1016/j.compedu.2018.04.006

Student performance, student progress and student potential are critical for measuring learning results, selecting learning materials and learning activities. However, existing work doesn't provide enough analysis tools to analyze how students perfor... Read More about Study on student performance estimation, student progress analysis, and student potential prediction based on data mining.

Towards a characterization of constant-factor approximable Finite-Valued CSPs (2018)
Journal Article
Dalmau, V., Krokhin, A., & Manokaran, R. (2018). Towards a characterization of constant-factor approximable Finite-Valued CSPs. Journal of Computer and System Sciences, 97, 14-27. https://doi.org/10.1016/j.jcss.2018.03.003

We study the approximability of (Finite-)Valued Constraint Satisfaction Problems (VCSPs) with a fixed finite constraint language Γ consisting of finitary functions on a fixed finite domain. Ene et al. have shown that, under a mild technical condition... Read More about Towards a characterization of constant-factor approximable Finite-Valued CSPs.

Security Threats to Critical Infrastructure: The Human Factor (2018)
Journal Article
Ghafir, I., Saleem, J., Hammoudeh, M., Faour, H., Prenosil, V., Jaf, S., …Baker, T. (2018). Security Threats to Critical Infrastructure: The Human Factor. Journal of Supercomputing, 74(10), 4986-5002. https://doi.org/10.1007/s11227-018-2337-2

In the 21st century, globalisation made corporate boundaries invisible and difficult to manage. This new macroeconomic transformation caused by globalisation introduced new challenges for critical infrastructure management. By replacing manual tasks... Read More about Security Threats to Critical Infrastructure: The Human Factor.