default search action
Henry Larkin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c29]Ferial M. Khaddage, Henry Larkin:
Innovative mobile cloud strategy that supports responsive mobile web apps in education: IConnect via the cloud. MENACOMM 2018: 1-6 - 2017
- [j3]James Jin Kang, Henry Larkin:
Intelligent Personal Health Devices Converged with Internet of Things Networks. J. Mobile Multimedia 12(3&4): 197-212 (2017) - 2016
- [c28]James Jin Kang, Tom H. Luan, Henry Larkin:
Enhancement of Sensor Data Transmission by Inference and Efficient Data Processing. ATIS 2016: 81-92 - [c27]James Jin Kang, Tom H. Luan, Henry Larkin:
Inference System of Body Sensors for Health and Internet of Things Networks. MoMM 2016: 94-98 - [c26]James Jin Kang, Tom H. Luan, Henry Larkin:
Alarm Notification of Body Sensors Utilising Activity Recognition and Smart Device Application. MoMM 2016: 105-109 - 2015
- [j2]Henry Larkin:
A framework for programmatically designing user interfaces in JavaScript. Int. J. Pervasive Comput. Commun. 11(3): 254-269 (2015) - [c25]James Jin Kang, Sasan Adibi, Henry Larkin, Tom H. Luan:
Predictive data mining for Converged Internet of Things: A Mobile Health perspective. ITNAC 2015: 5-10 - 2014
- [c24]Henry Larkin:
Issues in Programmatically Designing User Interfaces in JavaScript. MoMM 2014: 72-76 - [c23]Henry Larkin:
A Human Readable Language for Stock Market Technical Analysis on Mobile Devices. MoMM 2014: 132-136 - [c22]Henry Larkin:
Investigation Into Using the Unicode Standard for Primitives of Unified Han Characters. PACLIC 2014: 129-134 - 2011
- [j1]Hock Chuan Lim, Rob Stocker, Michael Barlow, Henry Larkin:
Interplay of ethical trust and social moral norms: Environment modelling and computational mechanisms in agent-based social simulation (ABSS). Web Intell. Agent Syst. 9(4): 377-391 (2011) - 2010
- [c21]Norbert Gyorbíró, Henry Larkin, Michael Cohen:
Spaced repetition tool for improving long-term memory retention and recall of collected personal experiences. Advances in Computer Entertainment Technology 2010: 124-125 - [c20]Hock Chuan Lim, Rob Stocker, Michael Barlow, Henry Larkin:
Modelling interplay in normative social systems: towards a heuristics formalism of agents and networks. MEDES 2010: 1-8 - [c19]Norbert Gyorbíró, Henry Larkin, Michael Cohen:
Long-term memory retention and recall of collected personal memories. SIGGRAPH Posters 2010: 90:1
2000 – 2009
- 2009
- [c18]Mohd Fadzli Marhusin, Chris Lokan, Henry Larkin, David Cornforth:
A Data Mining Approach for Detection of Self-Propagating Worms. NSS 2009: 24-29 - 2008
- [c17]Mohd Fadzli Marhusin, David Cornforth, Henry Larkin:
An overview of recent advances in intrusion detection. CIT 2008: 432-437 - [c16]Henry Larkin:
Object oriented regular expressions. CIT 2008: 491-496 - [c15]Hock Chuan Lim, Rob Stocker, Henry Larkin:
Review of Trust and Machine Ethics Research: Towards A Bio-Inspired Computational Model of Ethical Trust (CMET). BIONETICS 2008: 8 - [c14]Rob Stocker, Henry Larkin:
Association in Multi-agent Simulations of Dynamic Random Social Networks. BIONETICS 2008: 20 - [c13]Mohd Fadzli Marhusin, Henry Larkin, Chris Lokan, David Cornforth:
An Evaluation of API Calls Hooking Performance. CIS (1) 2008: 315-319 - [c12]Hock Chuan Lim, Rob Stocker, Henry Larkin:
Ethical Trust and Social Moral Norms Simulation: A Bio-inspired Agent-Based Modelling Approach. IAT 2008: 245-251 - [c11]Mohd Fadzli Marhusin, David Cornforth, Henry Larkin:
Malicious Code Detection Architecture Inspired by Human Immune System. SNPD 2008: 312-317 - 2007
- [c10]Henry Larkin:
Applying Concurrent Versioning to Serverless Mobile Device Synchronisation. ACIS-ICIS 2007: 157-162 - [c9]Henry Larkin:
Word Indexing for Mobile Device Data Representations. CIT 2007: 399-404 - [c8]Henry Larkin:
Data representations for mobile devices. ICPADS 2007: 1-6 - 2006
- [c7]Henry Larkin:
Overview of Smart Queries in Databases. CIT 2006: 7 - [c6]Henry Larkin:
Variables and Reversibility in Object Oriented Regular Expressions. CIT 2006: 39 - 2005
- [c5]Henry Larkin, Zheng Da Wu, Warren Toomey:
Performance of Signal Loss Maps for Wireless Ad Hoc Networks. EUC 2005: 609-618 - [c4]Warren Toomey, Zheng Da Wu, Henry Larkin:
Algorithms for Predicting Node Connectivity in Wireless Ad hoc Networks. ICWN 2005: 475-481 - [c3]Henry Larkin, Zheng Da Wu, Warren Toomey:
Validity of Predicting Connectivity in Wireless Ad Hoc Networks. MSN 2005: 643-653 - 2004
- [c2]Henry Larkin:
Wireless Signal Strength Topology Maps in Mobile Adhoc Networks. EUC 2004: 538-547 - [c1]Henry Larkin, Zheng Da Wu, Warren Toomey:
Mapping Wireless Signal Strength for Mobile Adhoc Networks. International Conference on Wireless Networks 2004: 151-157
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint