Browsing by Author "Gamage, CD"

Sort by: Order: Results:

  • Amarawardhana, C; Dayananada, KS; Porawagama, H; Gamage, CD [Conference-Abstract]
    The increasing interconnectivity of SCADA (Supervisory Control and Data Acquisition) networks has exposed them to a wide range of network security problems. Also in that case WSN (Wireless Sensor Networks, which is a new ...
  • Sooriyaarachchi, SJ; Gamage, CD [Conference-Abstract]
    The modern computing paradigm is moving towards personal devices that incorporate wireless networking, mobility, and collaborative applications. The networking paradigm that best matches this scenario is the mobile ad-hoc ...
  • Ranmuthugala, MHP; Gamage, CD [Conference-Abstract]
    The amount of visual information available in digital format has grown exponentially in recent years due to the wide availability of digital equipments, changes in the way people socially interact by setting up community ...
  • Sooriyaarachchi, SJ; Fernando, WAC; Gamage, CD [Conference-Abstract]
    Mobile ad-hoc networks (MANETs) enable ubiquitous computing with wide availability of smart mobile devices and applications. However, robust and lightweight protocols are yet to be implemented for multihop communication. ...
  • Perera, A; Pemasiri, A; Wijayarathna, S; Wijebandara, C; Gamage, CD [Conference-Abstract]
    In augmented reality applications for handheld devices, accuracy and speed of the tracking algorithm are two of the most critical parameters to achieve realism. This paper presents a comprehensive framework to evaluate ...
  • Joseph, CN; Kokulakumaran, S; Srijeyanthan, K; Thusyanthan, A; Gunasekara, C; Gamage, CD [Conference-Abstract]
    The growth of technology continues to make both hardware and software affordable and accessible creating space for the emergence of new applications. Rapid growth in computer vision and image processing applications have ...
  • Thusyanthan, A; Srijeyanthan, K; Kokulakumaran, S; Joseph, CN; Gunasekara, C; Gamage, CD [Conference-Abstract]
    The growth of technology continues to make both hardware and software affordable and accessible creating space for the emergence of new applications. Rapid growth in computer vision and image processing applications ...
  • Alwis, WNT; Gamage, CD [Article-Abstract]
    In the era of cloud computing, multi-tenant based Software as a Service (SaaS) applications have been widely identified as the next generation of cloud applications. SaaS allows multiple user organizations to customize an ...
  • Pemasiri, A; Wijebandara, C; Wijayarathna, S; Perera, A; Gamage, CD [Conference-Abstract]
    The level of realism in augmented reality applications is heavily dependent on the consistency of illumination between real objects and virtual objects. This paper presents a comprehensive methodology to model the real ...
  • Nimalaprakasan, S; Ramanan, S; Malalasena, BA; Shayanthan, K; Gamage, CD; Fernando, MSD [Conference-Abstract]
    The electronic identity (eID) is being positioned to be a basic tool for identification, authentication and authorization in application domains ranging from eCommerce in private sector to eGovernance in public sector. A ...
  • Dissanayake, V; Herath, S; Rasnayaka, S; Seneviratne, S; Vidanaarachchi, R; Gamage, CD [Conference-Abstract]
    Many different image stitching algorithms, and mechanisms to assess their quality have been proposed by different research groups in the past decade. However, a comparison across different stitching algorithms and evaluation ...
  • Lokumarambage, M; Gamage, CD [Conference-Abstract]
    Service Oriented Architecture (SOA) is a paradigm that can be used to build complex enterprise architectures enabling clients with needs and servers with capabilities to interact via services across disparate platforms, ...
  • Malalasena, BA; Nimalaprakasan, S; Ramanan, S; Shayanthan, S; Gamage, CD; Fernando, MSD [Conference-Abstract]
    For eGovernment and eBusiness to function to their full potential, people need a secure, convenient and effective way of identifying themselves. Electronic Identity systems draw the fundamental basics for the Implementation ...