Explore PETRAS's research knowledge base of peer reviewed, multidisciplinary publications.
451. Chang, Cheng; He, Ligang; Chaudhary, Nadeem; Fu, Songling; Chen, Hao; Sun, Jianhua; Li, Kenli; Fu, Zhangjie; Xu, Ming-Liang: Performance analysis and optimization for workflow authorization. In: vol. 67, pp. 194–205, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-chang_performance_2017,
title = {Performance analysis and optimization for workflow authorization},
author = {Cheng Chang and Ligang He and Nadeem Chaudhary and Songling Fu and Hao Chen and Jianhua Sun and Kenli Li and Zhangjie Fu and Ming-Liang Xu},
url = {https://doi.org/10.1016%2Fj.future.2016.09.011},
doi = {10.1016/j.future.2016.09.011},
volume = {67},
pages = {194--205},
publisher = {Elsevier BV},
abstract = {Many workflow management systems have been developed to enhance the performance of workflow executions. The authorization policies deployed in the system may restrict the task executions. The common authorization constraints include role constraints, Separation of Duty (SoD), Binding of Duty (BoD) and temporal constraints. This paper presents the methods to check the feasibility of these constraints, and also determines the time durations when the temporal constraints will not impose negative impact on performance. Further, this paper presents an optimal authorization method, which is optimal in the sense that it can minimize a workflow's delay caused by the temporal constraints. The authorization analysis methods are also extended to analyze the stochastic workflows, in which the tasks' execution times are not known exactly, but follow certain probability distributions. Simulation experiments have been conducted to verify the effectiveness of the proposed authorization methods. The experimental results show that comparing with the intuitive authorization method, the optimal authorization method can reduce the delay caused by the authorization constraints and consequently reduce the workflows' response time.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
452. Wang, Bin; Chen, Chao; He, Ligang; Gao, Bo; Ren, Jiadong; Fu, Zhangjie; Fu, Songling; Hu, Yongjian; Li, Chang-Tsun: Modelling and developing conflict-aware scheduling on large-scale data centres. In: vol. 86, pp. 995–1007, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-wang_modelling_2018,
title = {Modelling and developing conflict-aware scheduling on large-scale data centres},
author = {Bin Wang and Chao Chen and Ligang He and Bo Gao and Jiadong Ren and Zhangjie Fu and Songling Fu and Yongjian Hu and Chang-Tsun Li},
url = {https://doi.org/10.1016%2Fj.future.2017.07.043},
doi = {10.1016/j.future.2017.07.043},
volume = {86},
pages = {995--1007},
publisher = {Elsevier BV},
abstract = {Large-scale data centres are the growing trend for modern computing systems. Since a large-scale data centre has to manage a large number of machines and jobs, deploying multiple independent schedulers (termed as distributed schedulers in literature) to make scheduling decisions simultaneously has been shown as an effective way to speed up the processing of large quantity of submitted jobs and data. The key drawback of distributed schedulers is that since these schedulers schedule different jobs independently, the scheduling decisions made by different schedulers may conflict with each other due to the possibility that different scheduling decisions refer to the same subset of the resources in the data centre. Conflicting scheduling decisions cause additional scheduling attempts and consequently increase the scheduling cost. More resources each scheduler demands, higher scheduling cost may incur and longer job response times the users may experience. It is useful to investigate the balanced points in terms of resource demands for each of independent schedulers, so that the distributed schedulers can all achieve decent job performance without experiencing undesired resource competition. To address this issue, we model distributed scheduling and resource conflict using the game theory and conduct the quantitative analysis about scheduling cost and job performance. Further, based on the analysis, we develop the conflict-aware scheduling strategies to reduce the scheduling cost and improve job performance. We have conducted the simulation experiments with workload trace and also real experiments on Amazon Web Services(AWS). The experimental results verify the effectiveness of the proposed modelling approach and scheduling strategies.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
453. Gu, Chen; Bradbury, Matthew; Kirton, Jack; Jhumka, Arshad: A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks. In: vol. 87, pp. 514–526, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-gu_decision_2018,
title = {A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks},
author = {Chen Gu and Matthew Bradbury and Jack Kirton and Arshad Jhumka},
url = {https://doi.org/10.1016%2Fj.future.2018.01.046},
doi = {10.1016/j.future.2018.01.046},
volume = {87},
pages = {514--526},
publisher = {Elsevier BV},
abstract = {Source location privacy (SLP) is becoming an important property for a large class of security-critical wireless sensor network applications such as monitoring and tracking. Many routing protocols have been proposed that provide SLP, all of which provide a trade-off between SLP and energy. Experiments have been conducted to gauge the performance of the proposed protocols under different network parameters such as noise levels. As that there exists a plethora of protocols which contain a set of possibly conflicting performance attributes, it is difficult to select the SLP protocol that will provide the best trade-offs across them for a given application with specific requirements. In this paper, we propose a methodology where SLP protocols are first profiled to capture their performance under various protocol configurations. Then, we present a novel decision theoretic procedure for selecting the most appropriate SLP routing algorithm for the application and network under investigation. We show the viability of our approach through different case studies.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
454. Berthelot, Melissa; Henry, Francis Patrick; Hunter, Judith; Leff, Daniel; Wood, Simon; Jallali, Navid; Dex, Elizabeth; Lysakova, Ladislava; Lo, Benny P. L.; Yang, Guang-Zhong: Pervasive wearable device for free tissue transfer monitoring based on advanced data analysis: clinical study report. In: vol. 24, no. 06, pp. 1, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-berthelot_pervasive_2019,
title = {Pervasive wearable device for free tissue transfer monitoring based on advanced data analysis: clinical study report},
author = {Melissa Berthelot and Francis Patrick Henry and Judith Hunter and Daniel Leff and Simon Wood and Navid Jallali and Elizabeth Dex and Ladislava Lysakova and Benny P. L. Lo and Guang-Zhong Yang},
doi = {10.1117/1.jbo.24.6.067001},
volume = {24},
number = {06},
pages = {1},
publisher = {SPIE-Intl Soc Optical Eng},
abstract = {Free tissue transfer (FTT) surgery for breast reconstruction following mastectomy has become a routine operation with high success rates. Although failure is low, it can have a devastating impact on patient recovery, prognosis, and psychological well-being. Continuous and objective monitoring of tissue oxygen saturation (StO2) has been shown to reduce failure rates through rapid detection time of postoperative vascular complications. We have developed a pervasive wearable wireless device that employs near-infrared spectroscopy (NIRS) to continuously monitor FTT via StO2 measurement. Previously tested on different models, the results of a clinical study are introduced. Our goal for the study is to demonstrate that the developed device can reliably detect StO2 variations in a clinical setting: 14 patients were recruited. Advanced data analysis was performed on the StO2 variations, the relative StO2 gradient change, and the classification of the StO2 within different clusters of blood occlusion level (from 0% to 100% at 25% step) based on previous studies made on a vascular phantom and animals. The outcomes of the clinical study concur with previous experimental results and the expected biological responses. This suggests that the device is able to correctly detect perfusion changes and provide real-time assessment on the viability of the FTT in a clinical setting.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
455. Bao, Shihan; Hathal, Waleed; Cruickshank, Haitham; Sun, Zhili; Asuquo, Philip; Lei, Ao: A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters. In: vol. 4, no. 4, pp. 221–227, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-bao_lightweight_2018,
title = {A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters},
author = {Shihan Bao and Waleed Hathal and Haitham Cruickshank and Zhili Sun and Philip Asuquo and Ao Lei},
url = {https://doi.org/10.1016%2Fj.icte.2017.12.001},
doi = {10.1016/j.icte.2017.12.001},
volume = {4},
number = {4},
pages = {221--227},
publisher = {Elsevier BV},
abstract = {In Vehicular Ad hoc Networks (VANETs), broadcasted beacon messages are critical as most safety applications rely on them. However, the design of a secure broadcast authentication faces many security and privacy challenges as vehicles are vulnerable to active attacks and the revealing of location. In this paper, we propose a lightweight authentication scheme using Timed Efficient Stream Loss-Tolerant Authentication (TESLA) scheme and Bloom Filters that not only prevents active attacks but also adds a privacy-preserving feature to make the scheme have better performance. Simulation results indicate the scheme outperforms the existing schemes in terms of verification time and the level of anonymity.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
456. Ng, Irene C. L.; Wakenshaw, Susan Y. L.: The Internet-of-Things: Review and research directions. In: vol. 34, no. 1, pp. 3–21, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-ng_internet_2017,
title = {The Internet-of-Things: Review and research directions},
author = {Irene C. L. Ng and Susan Y. L. Wakenshaw},
url = {https://doi.org/10.1016%2Fj.ijresmar.2016.11.003},
doi = {10.1016/j.ijresmar.2016.11.003},
volume = {34},
number = {1},
pages = {3--21},
publisher = {Elsevier BV},
abstract = {This paper presents a review of the Internet-of-Things (IoT) through four conceptualizations: IoT as liquification and density of information of resources; IoT as digital materiality; IoT as assemblage or service system; and IoT as modules, transactions, and service. From the conceptualizations, we provide a definition of IoT and present its implications and impact on future research in Marketing that interfaces with information systems, design and innovation, data science and cybersecurity, as well as organizational studies and economics. By integrating the implications of IoT with extant literature, we then propose a set of priorities for future research in this area.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
457. Deligianni, Fani; Wong, Charence; Lo, Benny P. L.; Yang, Guang-Zhong: A fusion framework to estimate plantar ground force distributions and ankle dynamics. In: vol. 41, pp. 255–263, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-deligianni_fusion_2018,
title = {A fusion framework to estimate plantar ground force distributions and ankle dynamics},
author = {Fani Deligianni and Charence Wong and Benny P. L. Lo and Guang-Zhong Yang},
url = {https://doi.org/10.1016%2Fj.inffus.2017.09.008},
doi = {10.1016/j.inffus.2017.09.008},
volume = {41},
pages = {255--263},
publisher = {Elsevier BV},
abstract = {Gait analysis plays an important role in several conditions, including the rehabilitation of patients with orthopaedic problems and the monitoring of neurological conditions, mental health problems and the well-being of elderly subjects. It also constitutes an index of good posture and thus it can be used to prevent injuries in athletes and monitor mental health in typical subjects. Usually, accurate gait analysis is based on the measurement of ankle dynamics and ground reaction forces. Therefore, it requires expensive multi-camera systems and pressure sensors, which cannot be easily employed in a free-living environment. We propose a fusion framework that uses an ear worn activity recognition (e-AR) sensor and a single video camera to estimate foot angle during key gait events. To this end we use canonical correlation analysis with a fused-lasso penalty in a two-steps approach that firstly learns a model of the timing distribution of ground reaction forces based on e-AR signal only and subsequently models the eversion/inversion as well as the dorsiflexion of the ankle based on the combined features of e-AR sensor and the video. The results show that incorporating invariant features of angular ankle information from the video recordings improves the estimation of the foot progression angle, substantially.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
458. Fell, Michael J.; Schneiders, Alexandra; Shipworth, David: Consumer Demand for Blockchain-Enabled Peer-to-Peer Electricity Trading in the United Kingdom: An Online Survey Experiment. In: vol. 12, no. 20, pp. 3913, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-fell_consumer_2019,
title = {Consumer Demand for Blockchain-Enabled Peer-to-Peer Electricity Trading in the United Kingdom: An Online Survey Experiment},
author = {Michael J. Fell and Alexandra Schneiders and David Shipworth},
doi = {10.3390/en12203913},
volume = {12},
number = {20},
pages = {3913},
publisher = {MDPI AG},
abstract = {Peer-to-peer (P2P) energy trading could help address grid management challenges in a decentralizing electricity system, as well as provide other social and environmental benefits. Many existing and proposed trading schemes are enabled by blockchain, a distributed ledger technology (DLT) relying on cryptographic proof of ownership rather than human intermediaries to establish energy transactions. This study used an online survey experiment (n = 2064) to investigate how consumer demand for blockchain-enabled peer-to-peer energy trading schemes in the United Kingdom varies depending on how the consumer proposition is designed and communicated. The analysis provides some evidence of a preference for schemes offering to meet a higher proportion of participants' energy needs and for those operating at the city/region (as compared to national or neighbourhood) level. People were more likely to say they would participate when the scheme was framed as being run by their local council, followed by an energy supplier, community energy organization, and social media company. Anonymity was the most valued DLT characteristic and mentioning blockchain's association with Bitcoin led to a substantial decrease in intended uptake. We highlight a range of important questions and implications suggested by these findings for the introduction and operation of P2P trading schemes.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
459. Safa, Nader Sohrabi; Maple, Carsten; Watson, Tim; Solms, Rossouw Von: Motivation and opportunity based model to reduce information security insider threats in organisations. In: vol. 40, pp. 247–257, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-safa_motivation_2018,
title = {Motivation and opportunity based model to reduce information security insider threats in organisations},
author = {Nader Sohrabi Safa and Carsten Maple and Tim Watson and Rossouw Von Solms},
url = {https://doi.org/10.1016%2Fj.jisa.2017.11.001},
doi = {10.1016/j.jisa.2017.11.001},
volume = {40},
pages = {247--257},
publisher = {Elsevier BV},
abstract = {Information technology has brought with it many advantages for organisations, but information security is still a major concern for organisations which rely on such technology. Users, whether with intent or through negligence, are a great source of potential of risk to information assets. A lack of awareness, negligence, resistance, disobedience, apathy and mischievousness are root causes of information security incidents in organisations. As such, insider threats have attracted the attention of a number of experts in this domain. Two particularly important considerations when exploring insider threats are motivation and opportunity. Two fundamental theories relating to these phenomena, and on which the research presented in this paper relies, are Social Bond Theory (SBT), which can be used to help undermine motivation to engage in misbehaviour, and Situational Crime Prevention Theory (SCPT), which can be used to reduce opportunities for misbehaviour. The results of our data analysis show that situational prevention factors such as increasing the effort and risk involved in a crime, reducing the rewards and removing excuses can significantly promotes the adoption of negative attitudes towards misbehaviour, though reducing provocations does not have any effect on attitudes. Further, social bond factors such as a commitment to organisational policies and procedures, involvement in information security activities and personal norms also significantly promotes the adoption of negative attitudes towards misbehaviour. However, attachment does not significantly promote an attitude of misbehaviour avoidance on the part of employees. Finally, our findings also show that a negative attitude towards misbehaviour influences the employees' intentions towards engaging in misbehaviour positively, and this in turn reduces insider threat behaviour. The outputs of this study shed some light on factors which play a role in reducing misbehaviour in the domain of information security for academics and practitioners.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
460. Rosa, Bruno Miguel Gil; Ip, Henry; Yang, Guang-Zhong: Wireless Datapaths and Security. In: Implantable Sensors and Systems, pp. 595–635, Springer International Publishing, 0000, ISBN: 978-3-319-69747-5. (Type: Book Section | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-rosa_wireless_2018,
title = {Wireless Datapaths and Security},
author = {Bruno Miguel Gil Rosa and Henry Ip and Guang-Zhong Yang},
doi = {10.1007/978-3-319-69748-2_8},
isbn = {978-3-319-69747-5},
booktitle = {Implantable Sensors and Systems},
pages = {595--635},
publisher = {Springer International Publishing},
chapter = {8},
abstract = {For Implantable Medical Devices (IMD), we have discussed in the previous chapters the technical challenges related to biocompatible materials, flexible fabrication processes, system-on-chip design, low-power operation, and packaging. Increasingly advanced computing capabilities found in IMDs and networking technologies can further broaden the applications and enhance the functions of these devices. However, they can only make a real impact on healthcare when a high level of security is incorporated in these devices. This chapter discusses the relationship between different components of an IMD security system under intrinsic resource constraints. A qualitative overview of the strategies commonly used to provide a secure implant system is provided and the chapter covers the design considerations of lightweight and no-hardware-intensive algorithms for implants.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
461. Arapinis, Myrto; Liu, Jia; Ritter, Eike; Ryan, Mark: Stateful applied pi calculus: Observational equivalence and labelled bisimilarity. In: vol. 89, pp. 95–149, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-arapinis_stateful_2017,
title = {Stateful applied pi calculus: Observational equivalence and labelled bisimilarity},
author = {Myrto Arapinis and Jia Liu and Eike Ritter and Mark Ryan},
url = {https://doi.org/10.1016%2Fj.jlamp.2017.03.001},
doi = {10.1016/j.jlamp.2017.03.001},
volume = {89},
pages = {95--149},
publisher = {Elsevier BV},
abstract = {We extend Abadi-Fournet's applied pi calculus with state cells, which are used to reason about protocols that store persistent information. Examples are protocols involving databases or hardware modules with internal state. We distinguish between private state cells, which are not available to the attacker, and public state cells, which arise when a private state cell is compromised by the attacker. For processes involving only private state cells we define observational equivalence and labelled bisimilarity in the same way as in the original applied pi calculus, and show that they coincide. Our result implies Abadi-Fournet's theorem - the coincidence of observational equivalence and labelled bisimilarity - in a revised version of the applied pi calculus. For processes involving public state cells, we can essentially keep the definition of observational equivalence, but need to strengthen the definition of labelled bisimulation in order to show that observational equivalence and labelled bisimilarity coincide in this case as well.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
462. Bradbury, Matthew; Jhumka, Arshad; Leeke, Matthew: Hybrid online protocols for source location privacy in wireless sensor networks. In: vol. 115, pp. 67–81, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-bradbury_hybrid_2018,
title = {Hybrid online protocols for source location privacy in wireless sensor networks},
author = {Matthew Bradbury and Arshad Jhumka and Matthew Leeke},
url = {https://doi.org/10.1016%2Fj.jpdc.2018.01.006},
doi = {10.1016/j.jpdc.2018.01.006},
volume = {115},
pages = {67--81},
publisher = {Elsevier BV},
abstract = {Wireless sensor networks (WSNs) will form the building blocks of many novel applications such as asset monitoring. These applications will have to guarantee that the location of the occurrence of specific events is kept private from attackers, in what is called the source location privacy (SLP) problem. Fake sources have been used in numerous techniques, however, the solution's efficiency is typically achieved by fine-tuning parameters at compile time. This is undesirable as WSN conditions may change. In this paper, we first present an SLP algorithm - Dynamic - that estimates the relevant parameters at runtime and show that it provides a high level of SLP, albeit at the expense of a high number of messages. To address this, we provide a hybrid online algorithm - DynamicSPR - that uses directed random walks for the fake sources allocation strategy to reduce energy usage. We perform simulations of the various protocols we present and our results show that DynamicSPR provides a similar level of SLP as when parameters are optimised at compile-time, with a lower number of messages sent.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
463. Li, Ruizhe; Li, Chang-Tsun; Guan, Yu: Inference of a compact representation of sensor fingerprint for source camera identification. In: vol. 74, pp. 556–567, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-li_inference_2018,
title = {Inference of a compact representation of sensor fingerprint for source camera identification},
author = {Ruizhe Li and Chang-Tsun Li and Yu Guan},
url = {https://doi.org/10.1016%2Fj.patcog.2017.09.027},
doi = {10.1016/j.patcog.2017.09.027},
volume = {74},
pages = {556--567},
publisher = {Elsevier BV},
abstract = {Sensor pattern noise (SPN) is an inherent fingerprint of imaging devices, which provides an effective way for source camera identification (SCI). Although SPNs extracted from large image blocks usually yield high identification accuracy, their high dimensionality would incur a high computational cost in the matching stage, consequently hindering many applications that require efficient camera matchings. In this work, we employ and evaluate the concept of principal component analysis (PCA) de-noising in SCI tasks. Based on this concept, we present a framework that formulates a compact SPN representation. To enhance the de-noising effect, we introduce a training set construction procedure that minimizes the impact of various interfering artifacts, which is especially useful in some challenging cases, e.g., when only textured reference images are available. To further boost the SCI performance, a novel approach based on linear discriminant analysis (LDA) is adopted to extract more discriminant SPN features. To evaluate our methods, extensive experiments are conducted on the Dresden image database. The results indicate that the proposed framework can serve as an effective post-processing procedure, which not only boosts the performance, but also greatly reduces the computational cost in the matching phase.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
464. Calvo, Jose L.; Tindemans, Simon H.; Strbac, Goran: Incorporating failures of System Protection Schemes into power system operation. In: vol. 8, pp. 98–110, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-calvo_incorporating_2016,
title = {Incorporating failures of System Protection Schemes into power system operation},
author = {Jose L. Calvo and Simon H. Tindemans and Goran Strbac},
url = {https://doi.org/10.1016%2Fj.segan.2016.10.002},
doi = {10.1016/j.segan.2016.10.002},
volume = {8},
pages = {98--110},
publisher = {Elsevier BV},
abstract = {The power transfer capability of existing transmission networks can be enhanced through the use of automated system protection schemes (SPS), which rapidly respond to disturbances on the network to keep the system's variables within operational bounds. However, reliance on such schemes may expose the network to large impacts-including blackouts-if the SPS does not respond as designed, so the deployment of SPS should balance risks and benefits. This paper formulates a risk-based cost-benefit framework that allows the operator to strike an optimal balance between constraint costs and risks of demand curtailment due to malfunctioning SPS. It is applied to a simple 4-bus power system inspired by the GB network, for which an exact optimisation problem can be formulated. A component-based dependability model is developed for the SPS to determine its failure modes and associated probabilities. The resulting cost-minimisation problem is solved for a range of operating conditions and SPS reliability levels. The results consistently show cost savings from the use of an SPS, even if it is highly unreliable, when a hedging strategy may be used. The optimal solution is highly sensitive to the problem parameters, but it is demonstrated that optimal operational strategies are associated with particular SPS outcomes. This finding may be used as empirical guidance to develop operational strategies for complex networks with unreliable SPS.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
465. Cooper, Rachel; Dunn, Nick; Coulton, Paul; Walker, Stuart; Rodgers, Paul; Cruikshank, Leon; Tsekleves, Emmanuel; Hands, David; Whitham, Roger; Boyko, Christopher T.; Richards, Daniel; Aryana, Bijan; Pollastri, Serena; Escalante, Maria Alejandra Lujan; Knowles, Brandin Hanson; Lopez-Galviz, Carlos; Cureton, Paul; Coulton, Claire: ImaginationLancaster: Open-Ended, Anti-Disciplinary, Diverse. In: vol. 4, no. 4, pp. 307–341, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-cooper_imaginationlancaster_2018,
title = {ImaginationLancaster: Open-Ended, Anti-Disciplinary, Diverse},
author = {Rachel Cooper and Nick Dunn and Paul Coulton and Stuart Walker and Paul Rodgers and Leon Cruikshank and Emmanuel Tsekleves and David Hands and Roger Whitham and Christopher T. Boyko and Daniel Richards and Bijan Aryana and Serena Pollastri and Maria Alejandra Lujan Escalante and Brandin Hanson Knowles and Carlos Lopez-Galviz and Paul Cureton and Claire Coulton},
url = {https://doi.org/10.1016%2Fj.sheji.2018.11.001},
doi = {10.1016/j.sheji.2018.11.001},
volume = {4},
number = {4},
pages = {307--341},
publisher = {Elsevier BV},
abstract = {The paper is the story of building a design research group from scratch. As there has been some recent interest in design research as a team based activity, this article illustrates how we built the Imagination research team and how it continues to develop. This article gives us the chance to reflect on how far we have come in the last decade. Once we were a few dedicated members of staff wanting to bring design research to a small university in the north of the UK. Now we are one of the leading centers of excellence worldwide for design research. This article uses case studies from research projects and Ph.D. research to demonstrate Imagination's research philosophy\textemdashopen-ended and anti-disciplinary. We celebrate the plurality of ways design research is carried out. The article highlights how we use design research to address global challenges, and how these have also shaped our teaching and further research. We end by considering the value of design research and how we, as a team, can take Imagination forward into the next decade.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
466. Koutroumpis, Pantelis; Leiponen, Aija: Crowdsourcing mobile coverage. In: vol. 40, no. 6, pp. 532–544, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-koutroumpis_crowdsourcing_2016,
title = {Crowdsourcing mobile coverage},
author = {Pantelis Koutroumpis and Aija Leiponen},
url = {https://doi.org/10.1016%2Fj.telpol.2016.02.005},
doi = {10.1016/j.telpol.2016.02.005},
volume = {40},
number = {6},
pages = {532--544},
publisher = {Elsevier BV},
abstract = {Mobile coverage affects social and economic communication and performance. Looking at the determinants of mobile network coverage helps highlight both operators׳ strategies and individual users׳ decisions. Subscribers often install small wireless antennas called femto-cells within buildings with poor signal. The location and density of these antennas provides information for areas with significant demand but poor coverage-areas where coverage is effectively crowdsourced. In contrast to the development of fixed-line networks, average income, population, geography, and education are the main drivers of both telecom and femto-cell based mobile coverage. Low-income regions are found to receive almost 15% less coverage compared to their affluent counterparts and have two fewer telecom base stations installed for equal distributions of (potential) subscribers. Base stations tend to be at least three times further from lower-income subscribers. Within poorly-covered areas, wealthier households are able to compensate by investing in femto-cells, but poorer households are often excluded from communication networks and the internet. The results of this research has implications for information policy.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
467. Clinch, Sarah; Mikusz, Mateusz; Elhart, Ivan; Davies, Nigel; Langheinrich, Marc: Scheduling Content in Pervasive Display Systems. In: vol. 3, no. 4, pp. 1–37, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-clinch_scheduling_2019,
title = {Scheduling Content in Pervasive Display Systems},
author = {Sarah Clinch and Mateusz Mikusz and Ivan Elhart and Nigel Davies and Marc Langheinrich},
doi = {10.1145/3369826},
volume = {3},
number = {4},
pages = {1--37},
publisher = {Association for Computing Machinery (ACM)},
abstract = {Digital displays are a ubiquitous feature of public spaces; London recently deployed a whole network of new displays in its Underground stations, and the screens on One Time Square (New York) allow for presentation of over 16,000 square feet of digital media. However, despite decades of research into pervasive displays, the problem of scheduling content is under-served and there is little forward momentum in addressing the challenges brought with large-scale and open display networks. This paper presents the first comprehensive architectural model for scheduling in current and anticipated pervasive display systems. In contrast to prior work, our three-stage model separates out the process of high level goal setting from content filtering and selection. Our architecture is motivated by an extensive review of the literature and a detailed consideration of requirements. The architecture is realised with an implementation designed to serve the world's largest and longest-running research testbed of pervasive displays. A mixed-methods evaluation confirms the viability of the architecture from three angles: demonstrating capability to meet the articulated requirements, performance that comfortably fits within the demands of typical display deployments, and evidence of its ability to serve as the day-to-day scheduling platform for the previously described research testbed. Based on our evaluation and a reflection on paper as a whole, we identify ten implications that will shape future research and development in pervasive display scheduling.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
468. Vine, Scott Le; Polak, John W.: The impact of free-floating carsharing on car ownership: Early-stage findings from London. In: vol. 75, pp. 119–127, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-vine_impact_2019,
title = {The impact of free-floating carsharing on car ownership: Early-stage findings from London},
author = {Scott Le Vine and John W. Polak},
url = {https://doi.org/10.1016%2Fj.tranpol.2017.02.004},
doi = {10.1016/j.tranpol.2017.02.004},
volume = {75},
pages = {119--127},
publisher = {Elsevier BV},
abstract = {Free-floating carsharing is a rapidly growing urban mobility service. It has emerged at commercial scale more recently than traditional 'round-trip' carsharing, and at present its growth trajectory is steeper. The evidence base regarding its impacts on sustainable transport indicators is, however, less well-developed. This issue is topical for a variety of reasons, including the importance of public policy to the success of this form of carsharing.
The research objective of this study is to establish the early-stage impact of free-floating carsharing on private car ownership. We report findings from a point in time three months following the initiation of a free-floating carsharing service in London (UK). We investigate characteristics of FFCS users that are associated with having one's car ownership impacted, as well as the distinction between deterrence of increased car ownership and sale/disposal of a previously owned private car. We find that 37% (n=347; 95% confidence interval:±5%) of users indicate that free-floating carsharing has impacted their ownership of private cars. Of this 37%, a large majority (83%) indicated that the mechanism of impact was that they decided not to buy a car that they otherwise would have purchased. 11% reported that they had disposed of a car in the past three months, and 6% stated that they will sell a private car within the next three months.
The average income and education level of users are both higher than for the general population. Within the population of service-users, multivariate analysis demonstrates that, net of confounding effects, heavier (more-frequent) service-users are more likely to indicate impacts on car ownership, and that being highly-educated and higher-income than other users were both (independently) associated with maintaining one's car ownership level. Additional findings are presented that relate car ownership impacts to further demographic characteristics as well as behavioural indicators.
Our findings should be interpreted to pertain to the 'early adopter' cohort of FFCS users, and as free-floating carsharing services mature and grow further research will be needed to ascertain how user characteristics, behaviour and impacts are evolving.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
The research objective of this study is to establish the early-stage impact of free-floating carsharing on private car ownership. We report findings from a point in time three months following the initiation of a free-floating carsharing service in London (UK). We investigate characteristics of FFCS users that are associated with having one's car ownership impacted, as well as the distinction between deterrence of increased car ownership and sale/disposal of a previously owned private car. We find that 37% (n=347; 95% confidence interval:±5%) of users indicate that free-floating carsharing has impacted their ownership of private cars. Of this 37%, a large majority (83%) indicated that the mechanism of impact was that they decided not to buy a car that they otherwise would have purchased. 11% reported that they had disposed of a car in the past three months, and 6% stated that they will sell a private car within the next three months.
The average income and education level of users are both higher than for the general population. Within the population of service-users, multivariate analysis demonstrates that, net of confounding effects, heavier (more-frequent) service-users are more likely to indicate impacts on car ownership, and that being highly-educated and higher-income than other users were both (independently) associated with maintaining one's car ownership level. Additional findings are presented that relate car ownership impacts to further demographic characteristics as well as behavioural indicators.
Our findings should be interpreted to pertain to the 'early adopter' cohort of FFCS users, and as free-floating carsharing services mature and grow further research will be needed to ascertain how user characteristics, behaviour and impacts are evolving.469. Latinopoulos, Charilaos; Sivakumar, A.; Polak, John W.: Response of electric vehicle drivers to dynamic pricing of parking and charging services: Risky choice in early reservations. In: vol. 80, pp. 175–189, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-latinopoulos_response_2017,
title = {Response of electric vehicle drivers to dynamic pricing of parking and charging services: Risky choice in early reservations},
author = {Charilaos Latinopoulos and A. Sivakumar and John W. Polak},
url = {https://doi.org/10.1016%2Fj.trc.2017.04.008},
doi = {10.1016/j.trc.2017.04.008},
volume = {80},
pages = {175--189},
publisher = {Elsevier BV},
abstract = {When clusters of electric vehicles charge simultaneously in urban areas, the capacity of the power network might not be adequate to accommodate the additional electricity demand. Recent studies suggest that real-time control strategies, like dynamic pricing of electricity, can spread the demand and help operators to avoid costly infrastructure investments. To assess the effectiveness of dynamic pricing, it is necessary to understand how electric vehicle drivers respond to uncertain future prices when they charge their vehicle away from home. Even when data is available from electric vehicle trials, the lack of variability in electricity prices renders them insufficient for this analysis. We resolve this problem by designing a survey where we observe the stated preferences of the respondents for hypothetical charging services. A novel feature of this survey is its interface, which resembles an online or smartphone application for parking-and-charging reservations. The time-of-booking choices are evaluated within a risky-choice modelling framework, where expected utility and non-expected utility specifications are compared to understand how people perceive price probabilities. In the progress, we bring together theoretical frameworks of forward-looking behaviour in contexts where individuals were subject to equivalent price uncertainties. The results suggest that (a) the majority of the electric vehicle drivers are risk averse by choosing a certain price to an uncertain one and (b) there is a non-linearity in their choices, with a disproportional influence by the upper end of the price distribution. This approach gives new perspectives in the way people plan their travel activities in advance and highlights the impact of uncertainty when managing limited resources in dense urban centres. Similar surveys and analyses could provide valuable insights in a wide range of innovative mobility applications, including car-sharing, ride-sharing and on-demand services.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
470. Seymour, William: Privacy Therapy with Aretha. In: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, 0000. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-seymour_privacy_2019,
title = {Privacy Therapy with Aretha},
author = {William Seymour},
doi = {10.1145/3290607.3308449},
booktitle = {Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {The rapid adoption of smart home devices has brought with it a widespread lack of understanding amongst users over where their devices send data. Smart home ecosystems represent complex additions to existing wicked problems around network privacy and security in the home. This work presents the Aretha project, a device which combines the functionality of a firewall with the position of voice assistants as the hub of the smart home, and the sophistication of modern conversational voice interfaces. The result is a device which can engage users in conversation about network privacy and security, allowing for the forming and development of complex preferences that Aretha is then able to act upon.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
471. Kirstein, Peter T.; Ruiz-Zafra, Angel: Use of Templates and The Handle for Large-Scale Provision of Security and IoT in the Built Environment. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018, Institution of Engineering and Technology, 0000. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-kirstein_use_2018,
title = {Use of Templates and The Handle for Large-Scale Provision of Security and IoT in the Built Environment},
author = {Peter T. Kirstein and Angel Ruiz-Zafra},
doi = {10.1049/cp.2018.0029},
booktitle = {Living in the Internet of Things: Cybersecurity of the IoT - 2018},
publisher = {Institution of Engineering and Technology},
abstract = {Building Information Modeling (BIM) is the main standard for constructions in the Built Environment. However, the currently agreed BIM interchange standards (IFC, COBie) are not suited for much further extension, lacking features needed for the incorporation of IoT and security. In addition, these standards are used to describe buildings and other assets through files, where the different building assets are entities with a fixed data structure and no relations between them. That is, two assets represented in the file, even described with the same data structure, are treated as separated elements, so that changes in one element do not affect the data structure of the other one. This will cause functional problems in future Building Automation Systems, such as the lack of provision for handling all objects of a particular type at the same time when adding specific or general security features. To address these issues, we present here a novel approach, this was part of our research work in the EBIS project (Extending BIM Level 2 to support IoT \& Security) and forms the basis of the PETRAS APBIM Project. The approach is based on the use of digital objects (DOs), instead of files, to represent built environments with IoT and security features. Also, these DOs could be used to define customised hierarchical structures to represent flexible data structures and relate built assets between them, what we called templates. These DOs to represent assets are supported by the Handle System, a Secure Identity Data Management System (SIDMS). This approach will allow the incorporation of generic and specific security features to all assets of a specific class. It will allow also the incorporation of assets defined generically in other domains to become templates, after appropriate processing, in the BIM databases. In order to validate our proposal, a Proof of Concept (PoC) is conducted in this research. We conclude with some comments on future work in the advertising of building features in a catalogue system - working in collaboration with our approach.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
472. Tuptuk, Nilufer; Chalanga, Asif; Hailes, Stephen: A Co-simulation Environment for Security of Smart Buildings. In: Living in the Internet of Things (IoT 2019), Institution of Engineering and Technology, 0000. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-tuptuk_co_2019,
title = {A Co-simulation Environment for Security of Smart Buildings},
author = {Nilufer Tuptuk and Asif Chalanga and Stephen Hailes},
doi = {10.1049/cp.2019.0171},
booktitle = {Living in the Internet of Things (IoT 2019)},
publisher = {Institution of Engineering and Technology},
abstract = {In this paper, we introduce an illustrative co-simulation environment to study the security of smart building systems. Smart buildings contain a network of IoT devices that are used to monitor and control the electrical, lighting, heating, security and other systems. Currently, the interaction between the control and network communications systems in smart buildings, and the possible attacks against these components are not well understood. We propose a co-simulation environment, designed to facilitate security analysis in networked control systems. We introduce the architecture of our proposed co-simulation and discuss how it can be used in testing attacks against the system and, as a result, in developing countermeasures.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
473. Coulton, Paul; Lindley, Joseph Galen: More-Than Human Centred Design: Considering Other Things. In: vol. 22, no. 4, pp. 463–481, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-coulton_more_2019,
title = {More-Than Human Centred Design: Considering Other Things},
author = {Paul Coulton and Joseph Galen Lindley},
doi = {10.1080/14606925.2019.1614320},
volume = {22},
number = {4},
pages = {463--481},
publisher = {Informa UK Limited},
abstract = {This paper responds to contemporary design contexts that frequently contain complex interdependencies of human and non-human actants. To adequately represent these perspectives requires a shift towards More-Than Human Centred Design. The Internet of Things (IoT) is one context that demonstrates this need. The `things' within such networks transcend their physical forms and extend to include algorithms, humans, data, business models, etc. and each imports independent-but-interdependent motivations and perspectives. Therefore, we use the IoT to clarify our proposition and to convey our three contributions. First, we review the expanding corpus of contemporary Human-Computer Interaction research that seeks to expand the notion of Human Centred Design by moving beyond the dominant anthropocentric perspective. Second, we introduce a novel design metaphor, `constellations', which allows both the interdependencies and independent perspectives to be considered. Third, we provide an account of a speculative design to demonstrate how it may be put into practice.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
474. Lindley, Joseph Galen; Coulton, Paul; Alter, Hayley: Networking with Ghosts in the Machine. Speaking to the Internet of Things. In: vol. 22, no. sup1, pp. 1187–1199, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-lindley_networking_2019,
title = {Networking with Ghosts in the Machine. Speaking to the Internet of Things},
author = {Joseph Galen Lindley and Paul Coulton and Hayley Alter},
doi = {10.1080/14606925.2019.1594984},
volume = {22},
number = {sup1},
pages = {1187--1199},
publisher = {Informa UK Limited},
abstract = {Our increasingly technologically-mediated world continues to pose challenges for design. Considering these we suggest that the digital products and services that surround us are haunted by `ghosts in the machine'. These spectres bridge the physical with the digital, they broker competing relationships, and live among streams of data which cohere as algorithmic oceans causing precipitation of physical agency. Cast in this light, the ghosts in the machines of modern networked technologies represent aspects of designers' challenging relationships with the products and services they create. An emerging body of Post Anthropocentric theory offers conceptual `jumping-off' points to engage with these challenges. In this paper we describe experiments that reflect and build on these theories. Through these we explore the possible foundations of accessible heuristics to aid in purposeful designerly apprehension of the difficult socio-technical complexities that are common among 21st century technological assemblages.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
475. Pilling, Franziska Louise; Coulton, Paul: Forget the Singularity, its mundane artificial intelligence that should be our immediate concern. In: vol. 22, no. sup1, pp. 1135–1146, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-pilling_forget_2019,
title = {Forget the Singularity, its mundane artificial intelligence that should be our immediate concern},
author = {Franziska Louise Pilling and Paul Coulton},
doi = {10.1080/14606925.2019.1594979},
volume = {22},
number = {sup1},
pages = {1135--1146},
publisher = {Informa UK Limited},
abstract = {Fuelled by Science Fiction and the pronouncements of Silicon Valley gurus such as Elon Musk, the `Singularity' is arguably the biggest geek myth of our time (Modis, 2006) and is distracting us from addressing the numerous problems emerging with the increasing use of Artificial intelligence (AI). Artificial General Intelligence (AGI) is often perceived to mean super human like intelligence such as the ones depicted in movies like Her (2013) and Ex Machina (2014). These anthropomorphic representations of AI besiege our attention away from the very real threat of biases introduced through Machine Learning (ML). In this paper we will consider whether current practices within Human-Centred Design (HCD) permit designers to consider interactions and services in which non-human algorithms play a significant role and consider how approaches inspired by Object Oriented Ontology (OOO) may offer new perspectives for framing design activities concerning AI.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
476. Stead, Michael; Coulton, Paul; Lindley, Joseph Galen: Do-It-Yourself Medical Devices: exploring their potential futures through design fiction. In: DRS2018: Catalyst, Design Research Society, 0000. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-stead_do_2018,
title = {Do-It-Yourself Medical Devices: exploring their potential futures through design fiction},
author = {Michael Stead and Paul Coulton and Joseph Galen Lindley},
doi = {10.21606/drs.2018.475},
booktitle = {DRS2018: Catalyst},
publisher = {Design Research Society},
abstract = {With ever increasing demands on healthcare around the world, ensuring adequate provision for patients is becoming more and more challenging. In this paper, we focus on future healthcare provision, specifically looking at how Do-It-Yourself (DIY) Medical Devices might become widely adopted. Our motivation is to move beyond current debates, which tend to focus on technological capabilities, and instead consider the implications of those technologies for future policy and regulation. Discussions around the future are often challenging, as people find it difficult to envisage how disruptive technologies make futures that stand apart from their current and previous experiences. To facilitate these discussions, we use Design Fiction to speculate about a multi-purpose DIY Medical Device which can support various medical conditions. Using Design Fiction in this way allows us to concretize and explore a future world in which DIY Medical Devices exist, and thus enable meaningful discussions around the social and ethical implications of such DIY medical cultures.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}