default search action
Richard Hill
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Rahima Khanam, Muhammad Hussain, Richard Hill, Paul Allen:
A Comprehensive Review of Convolutional Neural Networks for Defect Detection in Industrial Applications. IEEE Access 12: 94250-94295 (2024) - [j43]Mohammad Hijjawi, Faisal Jamil, Harun Jamil, Tariq A. A. Alsboui, Richard Hill, Ibrahim A. Hameed:
Optimal smart contracts for controlling the environment in electric vehicles based on an Internet of Things network. Comput. Commun. 224: 192-212 (2024) - [j42]Hussain Al-Aqrabi, Ahmed M. Manasrah, Richard Hill, Mohammed Q. Shatnawi, Mohammad Sh. Daoud, Hoda Alkhzaimi:
Dynamic authentication for intelligent sensor clouds in the Internet of Things. Int. J. Inf. Sec. 23(3): 2003-2021 (2024) - [j41]Muhammad Ayyaz Ahmad, George Baryannis, Richard Hill:
Defining Complex Adaptive Systems: An Algorithmic Approach. Syst. 12(2): 45 (2024) - [c74]Andrew Lapetina, Richard Hill, Aman Yadav, Michael Lachney, Madison C. Allen Kuyenga:
A Co-Instructional Model to Develop High School CS Teachers in Historically Underrepresented Communities: Building Capacity with a Purpose. RESPECT 2024: 259-264 - [c73]Davide Resnati, Gianpietro Carnevale, Shyam Surthi, Chris M. Carlson, Matthew Thorum, Terry Kim, Emilio Camerlenghi, Richard Hill:
A Confined Storage Nitride 3D-NAND Cell with WL Airgap for Cell-To-Cell Interference Reduction and Improved Program Performances. VLSI Technology and Circuits 2024: 1-2 - 2023
- [j40]Muhammad Hussain, Richard Hill:
Custom Lightweight Convolutional Neural Network Architecture for Automated Detection of Damaged Pallet Racking in Warehousing & Distribution Centers. IEEE Access 11: 58879-58889 (2023) - [j39]Shamaila Iram, Hussain Al-Aqrabi, Hafiz Muhammad Shakeel, Hafiz Muhammad Athar Farid, Muhammad Riaz, Richard Hill, Prabanchan Vethathir, Tariq A. A. Alsboui:
An Innovative Machine Learning Technique for the Prediction of Weather Based Smart Home Energy Consumption. IEEE Access 11: 76300-76320 (2023) - [j38]Muhammad Hussain, Hussain Al-Aqrabi, Muhammad Munawar, Richard Hill, Simon Parkinson:
Exudate Regeneration for Automated Exudate Detection in Retinal Fundus Images. IEEE Access 11: 83934-83945 (2023) - [j37]Benjamin Agbo, Hussain Al-Aqrabi, Tariq A. A. Alsboui, Muhammad Hussain, Richard Hill:
Imputation of Missing Clinical Covariates for Downstream Classification Problems. IEEE Access 11: 102935-102943 (2023) - [c72]Tariq A. A. Alsboui, Muhammad Hussain, Hussain Al-Aqrabi, Richard Hill, Mohammad Hijjawi:
A Scalable Decentralized and Lightweight Access Control Framework Using IOTA Tangle for the Internet of Things. IoTBDS 2023: 178-185 - [c71]Titilayo Olabisi Soyoye, Tianhua Chen, Richard Hill, Keith McCabe:
Predicting Academic Performance of University Students Using Machine Learning: A Case Study in the UK. WI/IAT 2023: 431-434 - 2022
- [j36]Hafiz Muhammad Shakeel, Shamaila Iram, Hussain Al-Aqrabi, Tariq A. A. Alsboui, Richard Hill:
A Comprehensive State-of-the-Art Survey on Data Visualization Tools: Research Developments, Challenges and Future Domain Specific Visualization Framework. IEEE Access 10: 96581-96601 (2022) - [j35]Daniella Teixeira, Simon Linke, Richard Hill, Martine Maron, Berndt van Rensburg:
Fledge or fail: Nest monitoring of endangered black-cockatoos using bioacoustics and open-source call recognition. Ecol. Informatics 69: 101656 (2022) - [j34]Benjamin Agbo, Hussain Al-Aqrabi, Richard Hill, Tariq A. A. Alsboui:
Missing Data Imputation in the Internet of Things Sensor Networks. Future Internet 14(5): 143 (2022) - [j33]Muhammad Hussain, Hussain Al-Aqrabi, Muhammad Munawar, Richard Hill, Tariq A. A. Alsboui:
Domain Feature Mapping with YOLOv7 for Automated Edge-Based Pallet Racking Inspections. Sensors 22(18): 6927 (2022) - [j32]Tariq A. A. Alsboui, Richard Hill, Hussain Al-Aqrabi, Hafiz Muhammad Athar Farid, Muhammad Riaz, Shamaila Iram, Hafiz Muhammad Shakeel, Muhammad Hussain:
A Dynamic Multi-Mobile Agent Itinerary Planning Approach in Wireless Sensor Networks via Intuitionistic Fuzzy Set. Sensors 22(20): 8037 (2022) - [c70]Tariq A. A. Alsboui, Hussain Al-Aqrabi, Richard Hill, Shamaila Iram:
An Approach to Privacy-Preserving Distributed Intelligence for the Internet of Things. IoTBDS 2022: 174-182 - [c69]Saad Khan, Tariq A. A. Alsboui, Richard Hill, Hussain Al-Aqrabi:
Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network. UbiSec 2022: 534-544 - [c68]Muhammad Hussain, Tianhua Chen, Sofya Titarenko, Richard Hill, Hussain Al-Aqrabi:
Development of a Convolutional Neural Network Architecture for Production Based Photovoltaic Fault Detection. UKCI 2022: 415-426 - 2021
- [b2]Richard Hill, Stuart Berry:
Guide to Industrial Analytics - Solving Data Science Problems for Manufacturing and the Internet of Things. Texts in Computer Science, Springer 2021, ISBN 978-3-030-79103-2, pp. 3-228 - [j31]Tariq A. A. Alsboui, Yongrui Qin, Richard Hill, Hussain Al-Aqrabi:
An energy efficient multi-mobile agent itinerary planning approach in wireless sensor networks. Computing 103(9): 2093-2113 (2021) - [j30]Hengshan Zhang, Yimin Zhou, Tianhua Chen, Richard Hill, Zhongmin Wang, Yanping Chen:
Refinement of weights using attribute support for multiple attribute decision making. J. Comput. Sci. 54: 101440 (2021) - [j29]Tariq A. A. Alsboui, Yongrui Qin, Richard Hill, Hussain Al-Aqrabi:
Distributed Intelligence in the Internet of Things: Challenges and Opportunities. SN Comput. Sci. 2(4): 277 (2021) - [c67]Hafsa Al Ansari, Rupert Ward, Richard Hill:
Developing a Learning Analytics Model to Explore Computer Science Student Motivation in the UK. ICALT 2021: 442-444 - [c66]Phil Lane, Richard Hill, Stuart Berry:
Distributing On-Demand Analytics Processing on Heterogeneous Industrial Internet of Things Edge Hardware. iSCI 2021: 62-69 - 2020
- [j28]Tariq A. A. Alsboui, Yongrui Qin, Richard Hill, Hussain Al-Aqrabi:
Enabling distributed intelligence for the Internet of Things with IOTA and mobile agents. Computing 102(6): 1345-1363 (2020) - [j27]Reza Montasari, Richard Hill, Simon Parkinson, Alireza Daneshkhah, Amin Hosseinian Far:
Hardware-based cyber threats: attack vectors and defence techniques. Int. J. Electron. Secur. Digit. Forensics 12(4): 397-411 (2020) - [j26]Reza Montasari, Richard Hill, Farshad Montaseri, Hamid Jahankhani, Amin Hosseinian Far:
Internet of things devices: digital forensic process and data reduction. Int. J. Electron. Secur. Digit. Forensics 12(4): 424-436 (2020) - [j25]Reza Montasari, Richard Hill, Simon Parkinson, Pekka Peltola, Amin Hosseinian Far, Alireza Daneshkhah:
Digital Forensics: Challenges and Opportunities for Future Studies. Int. J. Organ. Collect. Intell. 10(2): 37-53 (2020) - [j24]Anju P. Johnson, Hussain Al-Aqrabi, Richard Hill:
Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems. Sensors 20(3): 844 (2020) - [j23]Hussain Al-Aqrabi, Anju P. Johnson, Richard Hill, Phil Lane, Tariq A. A. Alsboui:
Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT. Sensors 20(7): 1963 (2020) - [c65]Benjamin Agbo, Yongrui Qin, Richard Hill:
Best Fit Missing Value Imputation (BFMVI) Algorithm for Incomplete Data in the Internet of Things. IoTBDS 2020: 130-137 - [c64]Tariq A. A. Alsboui, Yongrui Qin, Richard Hill, Hussain Al-Aqrabi:
Towards a Scalable IOTA Tangle-Based Distributed Intelligence Approach for the Internet of Things. SAI (2) 2020: 487-501 - [p3]Richard Hill, Hussain Al-Aqrabi:
Edge Intelligence and the Industrial Internet of Things. Advances in Edge Computing 2020: 178-196 - [i13]Hussain Al-Aqrabi, Phil Lane, Richard Hill:
Performance Evaluation of Multiparty Authentication in 5G IIoT Environments. CoRR abs/2001.06108 (2020) - [i12]Hussain Al-Aqrabi, Lu Liu, Richard Hill, Nick Antonopoulos:
A Multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service. CoRR abs/2002.04047 (2020) - [i11]Richard Hill:
Blended Learning Content Generation: A Guide for Busy Academics. CoRR abs/2006.03730 (2020)
2010 – 2019
- 2019
- [j22]Reza Montasari, Victoria Carpenter, Richard Hill:
A road map for digital forensics research: a novel approach for establishing the design science research process in digital forensics. Int. J. Electron. Secur. Digit. Forensics 11(2): 194-224 (2019) - [j21]Reza Montasari, Richard Hill, Amin Hosseinian Far, Farshad Montaseri:
Countermeasures for timing-based side-channel attacks against shared, modern computing hardware. Int. J. Electron. Secur. Digit. Forensics 11(3): 294-320 (2019) - [c63]Tianhua Chen, Pan Su, Changjing Shang, Richard Hill, Hengshan Zhang, Qiang Shen:
Sentiment Classification of Drug Reviews Using Fuzzy-rough Feature Selection. FUZZ-IEEE 2019: 1-6 - [c62]Reza Montasari, Richard Hill:
Next-Generation Digital Forensics: Challenges and Future Paradigms. ICGS3 2019 - [c61]Hussain Al-Aqrabi, Richard Hill, Phil Lane, Hamza Aagela:
Securing Manufacturing Intelligence for the Industrial Internet of Things. ICICT (2) 2019: 267-282 - [c60]Benjamin Agbo, Yongrui Qin, Richard Hill:
Research Directions on Big IoT Data Processing using Distributed Ledger Technology: A Position Paper. IoTBDS 2019: 385-391 - [c59]Tariq A. A. Alsboui, Yongrui Qin, Richard Hill:
Enabling Distributed Intelligence in the Internet of Things using the IOTA Tangle Architecture. IoTBDS 2019: 392-398 - [c58]Pekka Peltola, Reza Montasari, Fernando Seco, Antonio Ramón Jiménez, Richard Hill:
Multi-Platform Architecture for Cooperative Pedestrian Navigation Applications. IPIN 2019: 1-8 - [c57]Hussain Al-Aqrabi, Anju P. Johnson, Richard Hill, Phil Lane, Lu Liu:
A Multi-layer Security Model for 5G-Enabled Industrial Internet of Things. iSCI 2019: 279-292 - [c56]Daniel Clarke, Hussain Al-Aqrabi, Richard Hill, Pritesh Mistry, Phil Lane:
Implementing a Lightweight Cloud-Based Process Monitoring Solution for Smart Agriculture. iSCI 2019: 379-391 - [c55]Pritesh Mistry, Phil Lane, Paul Allen, Hussain Al-Aqrabi, Richard Hill:
Condition Monitoring of Motorised Devices for Smart Infrastructure Capabilities. iSCI 2019: 392-403 - [c54]Hussain Al-Aqrabi, Anju P. Johnson, Richard Hill:
Dynamic Multiparty Authentication using Cryptographic Hardware for the Internet of Things. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 21-28 - [i10]Hussain Al-Aqrabi, Richard Hill:
Dynamic Multiparty Authentication of Data Analytics Services within Cloud Environments. CoRR abs/1901.03051 (2019) - [i9]Hussain Al-Aqrabi, Richard Hill:
A Secure Connectivity Model for Internet of Things Analytics Service Delivery. CoRR abs/1901.03052 (2019) - [i8]Phil Lane, Richard Hill:
Towards Optimised Data Transport and Analytics for Edge Computing. CoRR abs/1901.03054 (2019) - [i7]Hussain Al-Aqrabi, Richard Hill:
A Scalable Model for Secure Multiparty Authentication. CoRR abs/1901.03056 (2019) - [i6]Hussain Al-Aqrabi, Richard Hill, Phil Lane, Hamza Aagela:
Securing Manufacturing Intelligence for the Industrial Internet of Things. CoRR abs/1901.07284 (2019) - [i5]Hussain Al-Aqrabi, Lu Liu, Richard Hill, Nick Antonopoulos:
Cloud BI: Future of Business Intelligence in the Cloud. CoRR abs/1901.08151 (2019) - 2018
- [j20]Muhammad Usman Yaseen, Ashiq Anjum, Omer F. Rana, Richard Hill:
Cloud-based scalable object detection and classification in video streams. Future Gener. Comput. Syst. 80: 286-298 (2018) - [j19]Reza Montasari, Amin Hosseinian Far, Richard Hill, Farshad Montaseri, Mak Sharma, Shahid Shabbir:
Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware? Int. J. Organ. Collect. Intell. 8(2): 32-59 (2018) - [c53]Marc Stringer, Colin Jones, Richard Hill, Mohit Dalvi, Colin Johnson, Jeremy Walton:
A Hybrid-Resolution Earth System Model. eScience 2018: 268-269 - [c52]Hussain Al-Aqrabi, Richard Hill:
Dynamic Multiparty Authentication of Data Analytics Services Within Cloud Environments. HPCC/SmartCity/DSS 2018: 742-749 - [c51]Hussain Al-Aqrabi, Richard Hill:
A Secure Connectivity Model for Internet of Things Analytics Service Delivery. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 9-16 - [c50]Hussain Al-Aqrabi, Richard Hill:
A Scalable Model for Secure Multiparty Authentication. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 17-22 - [e6]Simon Parkinson, Andrew Crampton, Richard Hill:
Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach. Computer Communications and Networks, Springer 2018, ISBN 978-3-319-92623-0 [contents] - 2017
- [j18]Jia Liu, Longli Liu, Yong Xue, Jing Dong, Yincui Hu, Richard Hill, Jie Guang, Chi Li:
Grid workflow validation using ontology-based tacit knowledge: A case study for quantitative remote sensing applications. Comput. Geosci. 98: 46-54 (2017) - [c49]Dharmendra Shadija, Mo Rezai, Richard Hill:
Towards an understanding of microservices. ICAC 2017: 1-6 - [c48]Richard Hill, Dharmendra Shadija, Mo Rezai:
Enabling Community Health Care with Microservices. ISPA/IUCC 2017: 1444-1450 - [c47]Richard Hill, James Devitt, Ashiq Anjum, Muhammad K. Ali:
Towards In-Transit Analytics for Industry 4.0. iThings/GreenCom/CPSCom/SmartData 2017: 810-817 - [c46]Yongrui Qin, Richard Hill:
Message from the UCIoT 2017 Workshop Co-Chairs. UCC (Companion") 2017: 187-188 - [c45]Dharmendra Shadija, Mo Rezai, Richard Hill:
Microservices: Granularity vs. Performance. UCC (Companion") 2017: 215-220 - [e5]Shao Ying Zhu, Sandra Scott-Hayward, Ludovic Jacquin, Richard Hill:
Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications. Computer Communications and Networks, Springer 2017, ISBN 978-3-319-64652-7 [contents] - [i4]Dharmendra Shadija, Mo Rezai, Richard Hill:
Towards an Understanding of Microservices. CoRR abs/1709.06912 (2017) - [i3]Richard Hill, Dharmendra Shadija, Mo Rezai:
Enabling Community Health Care with Microservices. CoRR abs/1709.07037 (2017) - [i2]Dharmendra Shadija, Mo Rezai, Richard Hill:
Microservices: Granularity vs. Performance. CoRR abs/1709.09242 (2017) - [i1]Richard Hill, James Devitt, Ashiq Anjum, Muhammad K. Ali:
Towards In-Transit Analytics for Industry 4.0. CoRR abs/1710.04121 (2017) - 2016
- [c44]Muhammad Usman Yaseen, Muhammad Sarim Zafar, Ashiq Anjum, Richard Hill:
High Performance Video Processing in Cloud Data Centres. SOSE 2016: 152-161 - 2015
- [j17]Ahsan Ikram, Ashiq Anjum, Richard Hill, Nick Antonopoulos, Lu Liu, Stelios Sotiriadis:
Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurr. Comput. Pract. Exp. 27(8): 1966-1984 (2015) - [j16]Hussain Al-Aqrabi, Lu Liu, Richard Hill, Nick Antonopoulos:
Cloud BI: Future of business intelligence in the Cloud. J. Comput. Syst. Sci. 81(1): 85-96 (2015) - [c43]Marcello Trovati, Richard Hill, Nik Bessis:
A Non-genuine Message Detection Method Based on Unstructured Datasets. 3PGCIC 2015: 597-600 - [c42]Oladotun Omosebi, Stelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis, Marcello Trovati, Richard Hill:
Designing a Subscription Service for Earthquake Big Data Analysis from Multiple Sources. 3PGCIC 2015: 601-604 - [c41]Richard Hill:
Dealing with cyber security threats: International cooperation, ITU, and WCIT. CyCon 2015: 119-134 - [c40]José M. García-Campos, Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Nik Bessis, Federico Barrero, Eleana Asimakopoulou, Richard Hill:
Performance Evaluation of Reactive Routing Protocols for VANETs in Urban Scenarios Following Good Simulation Practices. IMIS 2015: 1-8 - [c39]Marcello Trovati, Aniello Castiglione, Nik Bessis, Richard Hill:
A Kuramoto Model Based Approach to Extract and Assess Influence Relations. ISICA 2015: 464-473 - [c38]Richard Hill:
Challenging an E-voting System in Court - An Experience Report. VoteID 2015: 161-171 - [p2]Dominic Davies-Tagg, Ashiq Anjum, Richard Hill:
A Platform for Analytics on Social Networks Derived from Organisational Calendar Data. Big-Data Analytics and Cloud Computing 2015: 147-165 - [e4]Marcello Trovati, Richard Hill, Ashiq Anjum, Shao Ying Zhu, Lu Liu:
Big-Data Analytics and Cloud Computing - Theory, Algorithms and Applications. Springer 2015, ISBN 978-3-319-25311-4 [contents] - 2014
- [c37]Anthony Smith, Stuart Berry, Richard Hill:
Matching Services with Users in Opportunistic Network Environments. CISIS 2014: 30-37 - [c36]Hussain Al-Aqrabi, Lu Liu, Richard Hill, Nick Antonopoulos:
A Multi-layer Hierarchical Inter-cloud Connectivity Model for Sequential Packet Inspection of Tenant Sessions Accessing BI as a Service. HPCC/CSS/ICESS 2014: 498-505 - 2013
- [b1]Richard Hill, Laurie Hirsch, Peter Lake, Siavash Moshiri:
Guide to Cloud Computing - Principles and Practice. Computer Communications and Networks, Springer 2013, ISBN 978-1-4471-4602-5, pp. i-xxi, 1-278 - [j15]Stelios Sotiriadis, Nik Bessis, Nick Antonopoulos, Richard Hill:
Meta-scheduling algorithms for managing inter-cloud interoperability. Int. J. High Perform. Comput. Netw. 7(3): 156-172 (2013) - [j14]Richard Hill:
WCIT: failure or success, impasse or way forward? Int. J. Law Inf. Technol. 21(3): 313-328 (2013) - [j13]Saad Liaquat Kiani, Ashiq Anjum, Nik Bessis, Richard Hill, Michael Knappmeyer:
Energy conservation in mobile devices and applications: A case for context parsing, processing and distribution in clouds. Mob. Inf. Syst. 9(1): 1-17 (2013) - [c35]Don-Anthony Dasilva, Stelios Sotiriadis, Richard Hill, Nick Antonopoulos, Nik Bessis:
Evaluating the Use of Automation in the Virtual Datacentre for Improved Efficiency. 3PGCIC 2013: 457-460 - [c34]Hussain Al-Aqrabi, Lu Liu, Richard Hill, Lei Cui, Jianxin Li:
Faceted Search in Business Intelligence on the Cloud. GreenCom/iThings/CPScom 2013: 842-849 - [c33]Hussain Al-Aqrabi, Lu Liu, Richard Hill, Zhijun Ding, Nick Antonopoulos:
Business Intelligence Security on the Clouds: Challenges, Solutions and Future Directions. SOSE 2013: 137-144 - [e3]Nik Bessis, Fatos Xhafa, Dora Varvarigou, Richard Hill, Maozhen Li:
Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence. Studies in Computational Intelligence 460, Springer 2013, ISBN 978-3-642-34951-5 [contents] - 2012
- [j12]Quan Shi, Yanghua Xiao, Nik Bessis, Yiqi Lu, Yaoliang Chen, Richard Hill:
Optimizing K2 trees: A case for validating the maturity of network of practices. Comput. Math. Appl. 63(2): 427-436 (2012) - [j11]Richard Hill, Nick Antonopoulos, Stuart Berry:
Peer-to-peer networks and collective intelligence: the case for agency. Int. J. Grid Util. Comput. 3(4): 233-241 (2012) - [j10]Ashiq Anjum, Richard Hill, Richard McClatchey, Nik Bessis, Andrew Branson:
Glueing grids and clouds together: a service-oriented approach. Int. J. Web Grid Serv. 8(3): 248-265 (2012) - [j9]Zhenxing Liu, Lu Liu, James Hardy, Ashiq Anjum, Richard Hill, Nick Antonopoulos:
Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing. J. Cloud Comput. 1: 3 (2012) - [c32]Saad Liaquat Kiani, Ashiq Anjum, Nik Bessis, Richard Hill:
Large-Scale Context Provisioning: A Use-Case for Homogenous Cloud Federation. CISIS 2012: 241-248 - [c31]Sarah Carter, Martin Smith, Suveena Bali, Stelios Sotiriadis, Nik Bessis, Richard Hill:
The Use of Crowdsourcing to Aid Quest Design in Games. EIDWT 2012: 302-305 - [c30]Ezinwa Okoro, Stelios Sotiriadis, Nik Bessis, Richard Hill:
Customized Profile Accessibility and Privacy for Users of Social Networks. EIDWT 2012: 306-310 - [c29]Thomas Stimpson, Lu Liu, Jianjun Zhang, Richard Hill, Weining Liu, Yongzhao Zhan:
Assessment of security and vulnerability of home wireless networks. FSKD 2012: 2133-2137 - [c28]Hussain Al-Aqrabi, Lu Liu, Richard Hill, Nick Antonopoulos:
Taking the Business Intelligence to the Clouds. HPCC-ICESS 2012: 953-958 - [c27]John Panneerselvam, Lu Liu, Richard Hill, Yongzhao Zhan, Weining Liu:
An Investigation of the Effect of Cloud Computing on Network Management. HPCC-ICESS 2012: 1794-1799 - [c26]Charlie Baker, Ashiq Anjum, Richard Hill, Nik Bessis, Saad Liaquat Kiani:
Improving Cloud Datacentre Scalability, Agility and Performance Using OpenFlow. INCoS 2012: 20-27 - [c25]Hussain Al-Aqrabi, Lu Liu, Jie Xu, Richard Hill, Nick Antonopoulos, Yongzhao Zhan:
Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing. ISORC Workshops 2012: 124-129 - 2011
- [j8]Anthony Smith, Richard Hill:
Measuring Efficiency in Opportunistic Ad Hoc Networks. J. Interconnect. Networks 12(3): 189-203 (2011) - [c24]Anthony Smith, Richard Hill:
Towards a Framework for the Evaluation of Efficient Provisioning in Opportunistic Ad Hoc Networks. 3PGCIC 2011: 32-36 - [c23]Ashiq Anjum, Nik Bessis, Richard Hill, Richard McClatchey, Irfan Habib, Kamran Soomro, Peter Bloodsworth, Andrew Branson:
Provenance Management for Neuroimaging Workflows in neuGrid. 3PGCIC 2011: 67-74 - [c22]Richard Hill, Nick Antonopoulos, Nik Bessis:
Towards an Understanding of Peer Rationality and Collective Intelligence. CISIS 2011: 385-390 - [c21]Quan Shi, Yanghua Xiao, Nik Bessis, Yiqi Lu, Yaoliang Chen, Richard Hill:
Towards a Maturity Model for Networks of Practice: A Case of K2 Tree Optimization. EIDWT 2011: 1-5 - [c20]Ashiq Anjum, Richard Hill, Richard McClatchey:
Gluing Grids and Clouds Together: A Service-Oriented Approach. EIDWT 2011: 55-62 - [c19]Zhenxing Liu, Lu Liu, Richard Hill, Yongzhao Zhan:
Base62x: An alternative approach to Base64 for non-alphanumeric characters. FSKD 2011: 2667-2670 - [c18]Richard Hill, Dharmendra Shadija:
Internationalising the Computing Curricula: A Peircian Approach. ICCS 2011: 406-413 - [c17]Saad Liaquat Kiani, Ashiq Anjum, Nik Bessis, Richard Hill, Michael Knappmeyer:
Context Parsing, Processing and Distribution in Clouds. INCoS 2011: 141-148 - [c16]Zhenxing Liu, Lu Liu, James Hardy, Ashiq Anjum, Richard Hill, Nick Antonopoulos:
Dot-base62x: A Compact Textual Representation of IPv6 Address for Clouds. UCC 2011: 427-432 - [e2]Simon Andrews, Simon Polovina, Richard Hill, Babak Akhgar:
Conceptual Structures for Discovering Knowledge - 19th International Conference on Conceptual Structures, ICCS 2011, Derby, UK, July 25-29, 2011. Proceedings. Lecture Notes in Computer Science 6828, Springer 2011, ISBN 978-3-642-22687-8 [contents] - 2010
- [c15]Martin Watmough, Simon Polovina, Babak Khazaeri, Richard Hill:
Future Supply Chain Processes and Data for Collective Intelligence. 3PGCIC 2010: 179-185 - [c14]Richard Hill, Nikos Antonopoulos:
Peer-to-Peer Networks and Collective Intelligence: The Case for Agency. 3PGCIC 2010: 357-362 - [c13]Richard Hill:
Conceptual Structures for Reasoning Enterprise Agents. ICCS 2010: 191-194 - [c12]Ivan Launders, Simon Polovina, Richard Hill:
Semantics and Pragmatics in Enterprise Architecture Through Transaction Agent Modelling. ICISO 2010: 285-291 - [c11]Richard Hill:
Agency and the Virtual Campus: The TrAM Approach. INCoS 2010: 8-15 - [c10]Richard Hill:
Computational Intelligence and Emerging Data Technologies. INCoS 2010: 449-454
2000 – 2009
- 2009
- [j7]Simon Polovina, Richard Hill:
A Transactions Pattern for Structuring Unstructured Corporate Information in Enterprise Applications. Int. J. Intell. Inf. Technol. 5(2): 33-47 (2009) - 2008
- [c9]Richard Hill, Simon Polovina:
An Automated Conceptual Catalogue for the Enterprise. ICCS Supplement 2008: 99-106 - 2007
- [p1]Richard Hill:
Capturing and Specifying Multiagent Systems for the Management of Community Healthcare. Advanced Computational Intelligence Paradigms in Healthcare (1) 2007: 127-163 - [e1]Uta Priss, Simon Polovina, Richard Hill:
Conceptual Structures: Knowledge Architectures for Smart Applications, 15th International Conference on Conceptual Structures, ICCS 2007, Sheffield, UK, July 22-27, 2007, Proceedings. Lecture Notes in Computer Science 4604, Springer 2007, ISBN 978-3-540-73680-6 [contents] - 2006
- [j6]Martin D. Beer, Richard Hill:
Building a Community Care Demonstrator with JADE Semantic Agents. Int. Trans. Syst. Sci. Appl. 1(1): 1-14 (2006) - [j5]Gang Lu, Yong Yan, Mike Colechin, Richard Hill:
Monitoring of oscillatory characteristics of pulverized coal flames through image processing and spectral analysis. IEEE Trans. Instrum. Meas. 55(1): 226-231 (2006) - [c8]Richard Hill, Simon Polovina, Dharmendra Shadija:
Transaction Agent Modelling: From Experts to Concepts to Multi-Agent Systems. ICCS 2006: 247-259 - [c7]Martin D. Beer, Richard Hill:
Using Multi-agent Systems to Manage Community Care. KES (2) 2006: 1240-1247 - [c6]Tiana Razafimbelo, Simon Polovina, Richard Hill:
Can the Pragmatic Web Assist Search Engine Optimisation? PragWeb 2006: 81-96 - 2005
- [c5]Richard Hill, Simon Polovina, Martin D. Beer:
Improving AOSE with an Enriched Modelling Framework. AOSE 2005: 94-108 - [c4]Steven Willmott, Martin D. Beer, Richard Hill, Dominic A. P. Greenwood, Monique Calisti, Ian D. Mathieson, Lin Padgham, Christine Reese, Kolja Lehmann, Thorsten Scholz, M. Omair Shafiq:
NETDEMO: openNet networked agents demonstration. AAMAS 2005: 129-130 - [c3]Richard Hill, Simon Polovina, Martin D. Beer:
From concepts to agents: towards a framework for multi-agent system modelling. AAMAS 2005: 1155-1156 - [c2]Simon Polovina, Richard Hill:
Enhancing the Initial Requirements Capture of Multi-Agent Systems Through Conceptual Graphs. ICCS 2005: 439-452 - 2003
- [j4]Martin D. Beer, Richard Hill, Wei Huang, Andrew Sixsmith:
An agent-based architecture for managing the provision of community care - the INCA (Intelligent Community Alarm) experience. AI Commun. 16(3): 179-192 (2003) - [c1]Martin D. Beer, Richard Hill, Andrew Sixsmith:
Deploying an agent-based architecture for the management of community care. AAMAS 2003: 932-933 - 2002
- [j3]Richard Hill:
To the Editor: Letters. D Lib Mag. 8(1) (2002)
1990 – 1999
- 1997
- [j2]Richard Hill:
Electronic Commerce, World Wide Web, Minitel and EDI. Inf. Soc. 13(1): 33-41 (1997)
1970 – 1979
- 1978
- [j1]Gordon Bell, Alan Kotok, Thomas N. Hastings, Richard Hill:
The Evolution of the DECsystem 10. Commun. ACM 21(1): 44-63 (1978)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint