EU-China joint white paper on the Internet of Things
Working Paper
(CAICT), C. A. O. I. A. C. T. & DG Connect, E. C. (2016)
EU-China joint white paper on the Internet of Things
This paper reflects the outcome of several years of the IoT international cooperation between the EU and China and documents the state-of-the-art on IoT development in both re...
Interagency data exchange, privacy protection and governance architecture for Information sharing across domains
Working Paper
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. Interagency data exchange, privacy protection and governance architecture for Information sharing across domains)
Buchanan, W. J., Fan, L., Uthmani, O., & Schafer, B. Interagency data exchange, privacy protection and governance architecture for Information sharing across domains
This paper discusses privacy enhancing technologies in the field of inter-agency data sharing, a key government objective for efficient public service delivery. We analyse the...
A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation.
Working Paper
Uthmani, O., Buchanan, W. J., Fan, L. & Lawson, A. (2012)
A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation
This paper outlines a novel information sharing method using Binary Decision Diagrams (BBDs). It is inspired by the work of Al-Shaer and Hamed, who applied BDDs into the model...
Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model.
Working Paper
Uthmani, O., Buchanan, W. J., Fan, L. & Lawson, A. (2012)
Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model
This paper defines a structured methodology which is based on the foundational work of Al-Shaer et al. in [1] and that of Hamed and Al-Shaer in [2]. It defines a methodology f...
RC2 Encryption and Decryption in Microsoft .NET.
Working Paper
Buchanan, W. J. (2009)
RC2 Encryption and Decryption in Microsoft .NET
This paper outlines the usage of RC2 in Microsoft .NET. It provides a basic overview of the RC2 method, along with a review of other popular encryption methods and some sample...
Inclusive design: Reflections on design practice
Working Paper
Dong, H., Cardoso, C., Cassim, J., Keates, S., & Clarkson, P. J. (2002)
Inclusive design: Reflections on design practice
To investigate the practice of inclusive design in an industrial context and to gain an insight into the industrial perspectives, eight UK design consultancies' participation ...
Using cursor control measures to suggest methods of cursor assistance for motion-impaired users
Working Paper
Keates, S., Hwang, F., Langdon, P. M., Clarkson, P. J., & Robinson, P. (2001)
Using cursor control measures to suggest methods of cursor assistance for motion-impaired users
No abstract available.
User capabilities and computer access.
Working Paper
Ashcroft, A. D. C., Keates, S., & Clarkson, P. J. (2000)
User capabilities and computer access
No abstract available.
Towards a practical inclusive design approach
Working Paper
Keates, S., Clarkson, P., Harrison, L., & Robinson, P. Towards a practical inclusive design approach)
Keates, S., Clarkson, P., Harrison, L., & Robinson, P. Towards a practical inclusive design approach
No abstract available.
Gesture input and motion-impaired users
Working Paper
Keates, S., Clarkson, P. J., & Robinson, P. (1999)
Gesture input and motion-impaired users
No abstract available.