Search for a surname in the box below and then click "Search" to search for Staff.
Hood, B., & Flint, T. (2018, March). Eidolon 360 – a VR experience. Presented at Tangible Embedded Interaction 2018. TEI Arts, Stockholm, Sweden
Art piece displayed at the ACM International Conference on Tangible, Embedded and Embodied Interaction (TEI) exhibition.
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November). Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This wor...
Thuemmler, C. (2017, May). 5G - What architecture to serve vertical industry. Presented at IEEE ICC 2017, Paris
5G offers the promise to dynamically satisfy a multiplicity of concurrent requirements originating from various business models of vertical industries. The 5G PPP has publishe...
Thuemmler, C. (2017, May). 5G: What Architecture to Serve Vertical Industries?. Presented at IEEE ICC 2017, Paris
The implementation and roll out of 5G technology is progressing at increasing speed and will impact all industrial verticals. Health is globally a very important industry wort...
Thuemmler, C. & Jefefries, N. (2016, December). 5G as an enabler for Medical IOT - 5GMIOT. Presented at IEEE Globecom 2016, Washington DC
Short Power Point presentation on 5G as enabler for Medical IoT – 5GMIOT Standards, policies and strategies for social technological alignment of 5G technology
Tsiros, A. (2016). Morpheme
This is a MaxMSP 5 32 bit software, Morpheme allows the control of a concatenative synthesis module (IMTR CataRT) through the act of sketching on a digital canvas. The aim is ...
Buchanan, W. J. (2013, January). Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.
Esteves, A. & Oakley, I. (2011, January). Eco Planner: A Tabletop System for Scheduling Sustainable Routines. Presented at The 5th International Conference on Tangible, Embedded and Embodied Interaction, 2011., Madeira, Funchal, Portugal
This paper presents Eco Planner, a tangible system that aims to encourage users to behave more sustainably. It is based on a tabletop system showing a tabular view on which us...
Horton, K., Davenport, E., & Wood-Harper, T. (2004). Understanding sociotechnical action: an introduction to the special issue. International Journal of Technology and Human Interaction, 1, 1-6
No abstract available. Item is Editorial preface to special issue.
Benyon, D., & Murray, D. (2000). Special issue on intelligent interface technology: editor's introduction. Interacting with Computers, 12(4), (315-322). doi:10.1016/S0953-5438(99)00024-7. ISSN 0953-5438
The term ‘Intelligent Interface Technology’ (IIT) is intended to capture the wide range of issues and methods in which some form of ‘intelligence’ is applied to both user inte...
Thuemmler, C. (2014). Shock Index demonstrator
This is an outcome from the FI-STAR project and a contribution to the FIWARE catalogue.
Buchanan, W. J. (2011). Advanced security and network forensics: Introduction. Edinburgh Napier University
1.3 Security Taxonomy
Buchanan, W. J. (2011). Advanced security and network forensics: obfuscation and data hiding. Edinburgh Napier University
4 DATA HIDING AND OBFUSCATION
4.3 Obfuscation using Encryption
Private-key data hiding
Public-key data hiding
Buchanan, W. J. (2011). Advanced security and network forensics: network forensics. Edinburgh Napier University
3 NETWORK FORENSICS
3.3 The key protocols
3.4 Ethernet, IP and TCP headers
3.5 TCP connection
3.8 Application Layer Ana...
Buchanan, W. J. (2011). Advanced security and network forensics: web Infrastructures. Edinburgh Napier University
5 WEB INFRASTRUCTURES
5.3 Identity 2.0
5.4 SOAP over HTTP
5.6 Authentication Infrastructures
5.7 802.1x Authentication ...