scispace - formally typeset
Search or ask a question
Institution

Dublin City University

EducationDublin, Ireland
About: Dublin City University is a education organization based out in Dublin, Ireland. It is known for research contribution in the topics: Machine translation & Laser. The organization has 5904 authors who have published 17178 publications receiving 389376 citations. The organization is also known as: National Institute for Higher Education, Dublin & DCU.


Papers
More filters
Proceedings ArticleDOI
24 Aug 2015
TL;DR: In this paper, the suitability of container and cluster technology for edge cloud environments is discussed, where applications are distributed across distributed multi-cloud platforms build from a range of networked nodes ranging from data centres to small devices.
Abstract: Cloud technology is moving towards more distribution across multi-clouds and the inclusion of various devices, as evident through IoT and network integration in the context of edge cloud and fog computing. Generally, lightweight virtualisation solutions are beneficial for this architectural setting with smaller, but still virtualised devices to host application and platform services, and the logistics required to manage this. Containerisation is currently discussed as a lightweight virtualisation solution. In addition to having benefits over traditional virtual machines in the cloud in terms of size and flexibility, containers are specifically relevant for platform concerns typically dealt with Platform-as-a-Service (PaaS) clouds such as application packaging and orchestration. For the edge cloud environment, application and service orchestration can help to manage and orchestrate applications through containers as an application packaging mechanism. We review edge cloud requirements and discuss the suitability container and cluster technology of that arise from having to facilitate applications through distributed multi-cloud platforms build from a range of networked nodes ranging from data centres to small devices, which we refer to here as edge cloud.

219 citations

Book ChapterDOI
14 Feb 2005
TL;DR: It is described, in detail sufficient for easy implementation, a fast method for calculation of the Tate pairing, as required for pairing-based cryptographic protocols.
Abstract: We describe, in detail sufficient for easy implementation, a fast method for calculation of the Tate pairing, as required for pairing-based cryptographic protocols. We point out various optimisations and tricks, and compare timings of a pairing-based Identity Based Encryption scheme with an optimised RSA implementation.

218 citations

Journal ArticleDOI
TL;DR: There is increasing evidence that miRNAs have potential not only to facilitate the determination of diagnosis and prognosis and the prediction of response to treatment, but also to act as therapeutic targets and replacement therapies.
Abstract: BACKGROUND: Successful treatment of breast cancer is enhanced by early detection and, if possible, subsequent patient-tailored therapy. Toward this goal, it is essential to identify and understand the most relevant panels of biomarkers, some of which may also have relevance as therapeutic targets. METHODS: We critically reviewed published literature on microRNAs (miRNAs) as relevant to breast cancer. SUMMARY: Since the initial recognition of the association of miRNAs with breast cancer in 2005, studies involving cell lines, in vivo models, and clinical specimens have implicated several functions for miRNAs, including suppressing oncogenesis and tumors, promoting or inhibiting metastasis, and increasing sensitivity or resistance to chemotherapy and targeted agents in breast cancer. For example, miR-21 is overexpressed in both male and female breast tumors compared with normal breast tissue and has been associated with advanced stage, lymph node positivity, and reduced survival time. miR-21 knock-down in cell-line models has been associated with increased sensitivity to topotecan and taxol in vitro and the limitation of lung metastasis in vivo. Furthermore, the discovery of extracellular miRNAs (including miR-21), existing either freely or in exosomes in the systemic circulation, has led to the possibility that such molecules may serve as biomarkers for ongoing patient monitoring. Although additional investigations are necessary to fully exploit the use of miRNAs in breast cancer, there is increasing evidence that miRNAs have potential not only to facilitate the determination of diagnosis and prognosis and the prediction of response to treatment, but also to act as therapeutic targets and replacement therapies.

217 citations

Journal ArticleDOI
TL;DR: In this article, the authors review Mode 2 UTT from a quadruple helix perspective to identify key themes to develop a research agenda which reflects progression from a triple into quadruple-helix ecosystem.
Abstract: Within recent years, there has been a rapid expansion of the University's role in economic development. This has resulted in University Technology Transfer (UTT) taking place within an increasingly complex network of regional stakeholders. This complexity has resulted in quadruple helix models where the triple helix model of academia, industry and regional government now includes societal based innovation users as a fourth helix. Despite this development, extant research is fragmented and lacks coherent frameworks and conceptualisations which fully depict the dynamic and evolving nature of UTT. Accordingly, this article reviews Mode 2 UTT from a quadruple helix perspective to identify key themes to develop a research agenda which reflects progression from a triple into a quadruple helix ecosystem.

217 citations

Book ChapterDOI
14 Feb 2005
TL;DR: In this paper, a new two-party identity-based key agreement scheme was proposed, which is inspired by the key pair derivation algorithm first proposed by Sakai and Kasahara.
Abstract: We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorithm first proposed by Sakai and Kasahara. We show how this key agreement can be used in either escrowed or escrowless mode. We also describe conditions under which users of different Key Generation Centres can agree on a shared secret key. We give an overview of existing two-party key agreement protocols, and compare our new scheme with existing ones in terms of computational cost and storage requirements.

217 citations


Authors

Showing all 6059 results

NameH-indexPapersCitations
Joseph Wang158128298799
David Cameron1541586126067
David Taylor131246993220
Gordon G. Wallace114126769095
David A. Morrow11359856776
G. Hughes10395746632
David Wilson10275749388
Muhammad Imran94305351728
Haibo Zeng9460439226
David Lloyd90101737691
Vikas Kumar8985939185
Luke P. Lee8441322803
James Chapman8248336468
Muhammad Iqbal7796123821
Michael C. Berndt7622816897
Network Information
Related Institutions (5)
Nanyang Technological University
112.8K papers, 3.2M citations

91% related

University of Southampton
99.4K papers, 3.4M citations

91% related

National University of Singapore
165.4K papers, 5.4M citations

90% related

Ghent University
111K papers, 3.7M citations

90% related

University of Glasgow
98.2K papers, 3.8M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202367
2022261
20211,110
20201,177
20191,030
2018935