


default search action
Enda Barrett
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Mian Ibad Ali Shah
, Abdul Wahid, Enda Barrett, Karl Mason:
Peer-to-peer energy trading in dairy farms using multi-agent systems. Comput. Electr. Eng. 118: 109437 (2024) - [j23]Daniel Kelly
, Frank G. Glavin
, Enda Barrett
:
DoWNet - classification of Denial-of-Wallet attacks on serverless application traffic. J. Cybersecur. 10(1) (2024) - [j22]Mian Ibad Ali Shah
, Abdul Wahid, Enda Barrett, Karl Mason:
Multi-agent systems in Peer-to-Peer energy trading: A comprehensive survey. Eng. Appl. Artif. Intell. 132: 107847 (2024) - [c20]Mian Ibad Ali Shah, Enda Barrett, Karl Mason:
Reinforcement Learning Enabled Peer-to-Peer Energy Trading for Dairy Farms. PAAMS 2024: 27-38 - [c19]Kevlyn Kadamala, Des Chambers, Enda Barrett:
Transfer Learning with TD3 for Adaptive HVAC Control in Diverse Building Environments. PAAMS (Workshops) 2024: 256-267 - [c18]Kevlyn Kadamala, Des Chambers, Enda Barrett:
Enhancing HVAC Control Efficiency: A Hybrid Approach Using Imitation and Reinforcement Learning. ECML/PKDD (9) 2024: 256-270 - [i4]Mian Ibad Ali Shah, Enda Barrett, Karl Mason:
Reinforcement Learning Enabled Peer-to-Peer Energy Trading for Dairy Farms. CoRR abs/2405.12716 (2024) - 2023
- [j21]Daniel Kelly
, Frank G. Glavin, Enda Barrett:
DoWTS - Denial-of-Wallet Test Simulator: Synthetic data generation for preemptive defence. J. Intell. Inf. Syst. 60(2): 325-348 (2023) - [c17]Mian Ibad Ali Shah, Abdul Wahid, Enda Barrett, Karl Mason:
A Multi-agent Systems Approach for Peer-to-Peer Energy Trading in Dairy Farming. ECAI Workshops (2) 2023: 254-261 - [i3]Mian Ibad Ali Shah, Abdul Wahid, Enda Barrett, Karl Mason:
A Multi-Agent Systems Approach for Peer-to-Peer Energy Trading in Dairy Farming. CoRR abs/2310.05932 (2023) - 2022
- [j20]Rachael Shaw
, Enda Howley
, Enda Barrett:
Applying Reinforcement Learning towards automating energy efficient virtual machine consolidation in cloud data centers. Inf. Syst. 107: 101722 (2022) - 2021
- [j19]Md. Sipon Miah
, Michael Schukat
, Enda Barrett:
A throughput analysis of an energy-efficient spectrum sensing scheme for the cognitive radio-based Internet of things. EURASIP J. Wirel. Commun. Netw. 2021(1): 201 (2021) - [j18]Daniel Kelly
, Frank G. Glavin
, Enda Barrett:
Denial of wallet - Defining a looming threat to serverless computing. J. Inf. Secur. Appl. 60: 102843 (2021) - [j17]Ili Ko
, Desmond Chambers, Enda Barrett:
Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain. Int. J. Mach. Learn. Cybern. 12(11): 3145-3167 (2021) - [j16]Mohammad Amzad Hossain
, Michael Schukat
, Enda Barrett:
Enhancing the Spectrum Sensing Performance of Cluster-Based Cooperative Cognitive Radio Networks via Sequential Multiple Reporting Channels. Wirel. Pers. Commun. 116(3): 2411-2433 (2021) - [c16]Mohammad Amzad Hossain
, Michael Schukat
, Enda Barrett:
A Reliable Energy and Spectral Efficient Spectrum Sensing Approach for Cognitive Radio Based IoT Networks. CCWC 2021: 1569-1576 - [c15]Mohammad Amzad Hossain, Michael Schukat
, Enda Barrett:
MU-MIMO Based Cognitive Radio in Internet of Vehicles (IoV) for Enhanced Spectrum Sensing Accuracy and Sum Rate. VTC Spring 2021: 1-7 - [i2]Daniel Kelly, Frank G. Glavin, Enda Barrett:
Denial of Wallet - Defining a Looming Threat to Serverless Computing. CoRR abs/2104.08031 (2021) - 2020
- [j15]Md. Sipon Miah
, Michael Schukat
, Enda Barrett:
Sensing and throughput analysis of a MU-MIMO based cognitive radio scheme for the Internet of Things. Comput. Commun. 154: 442-454 (2020) - [j14]Ili Ko, Desmond Chambers, Enda Barrett:
Self-supervised network traffic management for DDoS mitigation within the ISP domain. Future Gener. Comput. Syst. 112: 524-533 (2020) - [j13]Ili Ko
, Desmond Chambers, Enda Barrett:
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain. Int. J. Inf. Sec. 19(1): 53-70 (2020) - [j12]Ili Ko, Desmond Chambers, Enda Barrett:
Adaptable feature-selecting and threshold-moving complete autoencoder for DDoS flood attack mitigation. J. Inf. Secur. Appl. 55: 102647 (2020) - [j11]Rachael Shaw
, Enda Howley
, Enda Barrett:
An intelligent ensemble learning approach for energy efficient and interference aware dynamic virtual machine consolidation. Simul. Model. Pract. Theory 102: 101992 (2020) - [j10]Paulo Lissa, Michael Schukat, Enda Barrett:
Transfer Learning Applied to Reinforcement Learning-Based HVAC Control. SN Comput. Sci. 1(3): 127 (2020) - [c14]Daniel Kelly
, Frank G. Glavin, Enda Barrett:
Serverless Computing: Behind the Scenes of Major Platforms. CLOUD 2020: 304-312 - [i1]Daniel Kelly, Frank G. Glavin, Enda Barrett:
Serverless Computing: Behind the Scenes of Major Platforms. CoRR abs/2012.05600 (2020)
2010 – 2019
- 2019
- [j9]Rachael Shaw
, Enda Howley
, Enda Barrett:
An energy efficient anti-correlated virtual machine placement algorithm using resource usage predictions. Simul. Model. Pract. Theory 93: 322-342 (2019) - [j8]Martin Duggan
, Rachael Shaw, Jim Duggan, Enda Howley
, Enda Barrett:
A multitime-steps-ahead prediction approach for scheduling live migration in cloud data centers. Softw. Pract. Exp. 49(4): 617-639 (2019) - [c13]Paulo Lissa, Dayanne Peretti, Michael Schukat, Enda Barrett, Federico Seri, Marcus Keane:
Machine Learning Methods Applied to Building Energy Production and Consumption Prediction. AICS 2019: 236-247 - [c12]Rachael Shaw, Enda Howley
, Enda Barrett:
An Energy Efficient and Interference Aware Virtual Machine Consolidation Algorithm Using Workload Classification. ICSOC 2019: 251-266 - 2018
- [j7]Karl Mason
, Martin Duggan, Enda Barrett, Jim Duggan, Enda Howley
:
Predicting host CPU utilization in the cloud using evolutionary neural networks. Future Gener. Comput. Syst. 86: 162-173 (2018) - [j6]Md. Sipon Miah
, Michael Schukat
, Enda Barrett:
An enhanced sum rate in the cluster based cognitive radio relay network using the sequential approach for the future Internet of Things. Hum. centric Comput. Inf. Sci. 8: 16 (2018) - [c11]Seamus Dowling
, Michael Schukat
, Enda Barrett:
Using Reinforcement Learning to Conceal Honeypot Functionality. ECML/PKDD (3) 2018: 341-355 - [c10]Rachael Shaw, Enda Howley
, Enda Barrett:
A Predictive Anti-Correlated Virtual Machine Placement Algorithm for Green Cloud Computing. UCC 2018: 267-276 - 2017
- [j5]Martin Duggan, Jim Duggan, Enda Howley
, Enda Barrett:
A network aware approach for the scheduling of virtual machine migration during peak loads. Clust. Comput. 20(3): 2083-2094 (2017) - [j4]Martin Duggan, Jim Duggan, Enda Howley
, Enda Barrett:
A reinforcement learning approach for the scheduling of live migration from under utilised hosts. Memetic Comput. 9(4): 283-293 (2017) - [c9]Deepak Janardhanan, Enda Barrett:
CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA models. ICITST 2017: 55-60 - [c8]Rachael Shaw, Enda Howley
, Enda Barrett:
An advanced reinforcement learning approach for energy-aware virtual machine consolidation in cloud data centers. ICITST 2017: 61-66 - [c7]Martin Duggan, Karl Mason, Jim Duggan, Enda Howley
, Enda Barrett:
Predicting host CPU utilization in cloud computing using recurrent neural networks. ICITST 2017: 67-72 - [c6]Rachael Shaw, Enda Howley
, Enda Barrett:
Predicting the Available Bandwidth on Intra Cloud Network Links for Deadline Constrained Workflow Scheduling in Public Clouds. ICSOC 2017: 221-228 - 2016
- [j3]Philip D. Healy, Theo Lynn
, Enda Barrett, John P. Morrison:
Single system image: A survey. J. Parallel Distributed Comput. 90-91: 35-51 (2016) - [c5]Martin Duggan, Jim Duggan, Enda Howley
, Enda Barrett:
An Autonomous Network Aware VM Migration Strategy in Cloud Data Centres. ICCAC 2016: 24-32 - 2015
- [c4]Enda Barrett, Stephen Linder:
Autonomous HVAC Control, A Reinforcement Learning Approach. ECML/PKDD (3) 2015: 3-19 - 2014
- [j2]Enda Barrett, Jim Duggan, Enda Howley
:
A parallel framework for Bayesian reinforcement learning. Connect. Sci. 26(1): 7-23 (2014) - 2013
- [j1]Enda Barrett, Enda Howley
, Jim Duggan:
Applying reinforcement learning towards automating resource allocation and application scalability in the cloud. Concurr. Comput. Pract. Exp. 25(12): 1656-1674 (2013) - 2011
- [c3]Enda Barrett, Enda Howley
, Jim Duggan:
A Learning Architecture for Scheduling Workflow Applications in the Cloud. ECOWS 2011: 83-90
2000 – 2009
- 2009
- [c2]Enda Barrett, Des Chambers, Cosmin Rotariu:
ECG Classification and Analysis in a Zigbee Wireless Sensor Network. BIOSIGNALS 2009: 322-326 - [c1]Enda Barrett, Enda Howley
, Jim Duggan:
Evolving Group Coordination in an N-Player Game. ECAL (1) 2009: 450-457
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint