Date


People

Download Available

Dewey Decimal

864 results

Building a new nation: risk, goverance and trust.

Presentation / Conference
Buchanan, W. J. (2013, January)
Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.

Contextual grounding in CVE design.

Journal Article
Turner, P., & Turner, S. (2001)
Contextual grounding in CVE design. Presence: Teleoperators and Virtual Environments, 14, (30-38). ISSN 1054-7460
A proper respect for eventual context of use is crucially important for the success of virtual environments destined for real-world organisations, yet is frequently absent fro...

Concept Neighbourhoods in Lexical Databases

Conference Proceeding
Priss, U., & Old, L. J. (2010)
Concept Neighbourhoods in Lexical Databases. In L. Kwuida, & B. Sertkaya (Eds.), Formal Concept Analysis, 283-295. doi:10.1007/978-3-642-11928-6_20
This paper discusses results from an experimental study of concept neighbourhoods in WordNet and Roget’s Thesaurus. The general aim of this research is to determine ways in wh...

Ontology-Driven Automated Generation of Data Entry Interfaces to Databases

Conference Proceeding
Cannon, A., Kennedy, J. B., Paterson, T., & Watson, M. F. (2004)
Ontology-Driven Automated Generation of Data Entry Interfaces to Databases. In H. Williams, & L. Mackinnon (Eds.), Key Technologies for Data Management; Lecture Notes in Computer Science, 150-164. doi:10.1007/978-3-540-27811-5_15
This paper discusses an ontology based approach for the automatic generation of data entry interfaces to databases. An existing domain ontology is mapped to a system domain mo...

Advanced security and network forensics: network forensics.

Other
Buchanan, W. J. (2011)
Advanced security and network forensics: network forensics. Edinburgh Napier University
3 NETWORK FORENSICS 3.1 Objectives 3.2 Introduction 3.3 The key protocols 3.4 Ethernet, IP and TCP headers 3.5 TCP connection 3.6 ARP 3.7 SYN 3.8 Application Layer Ana...

Security and Routing Scoped IP Multicast Addresses

Conference Proceeding
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009)
Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09. , (228-235). https://doi.org/10.1109/icppw.2009.81
IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandw...

Visual Exploration of Alternative Taxonomies through Concepts

Journal Article
Graham, M., & Kennedy, J. (2007)
Visual Exploration of Alternative Taxonomies through Concepts. Ecological Informatics, 2, 248-261. https://doi.org/10.1016/j.ecoinf.2007.07.004
A graphical user interface is presented that allows users of taxonomic data to explore concept relationships between conflicting but related taxonomic classifications. Ecolog...

Workshop on Interactivity in Healthcare Systems (IHS).

Conference Proceeding
Hanson, V. L., Webster, G., & Dennis, M. (2015)
Workshop on Interactivity in Healthcare Systems (IHS). In Human-Computer Interaction–INTERACT 2015, 677-678. https://doi.org/10.1007/978-3-319-22723-8_98
We are all living longer with average life expectancy increasing across the globe [1]. However, chronic conditions such as heart disease, strokes and cancer, coupled with an i...

HI-risk: A method to analyse health information risk intelligence

Conference Proceeding
Buchanan, W. J., & van Deursen, N. (2016)
HI-risk: A method to analyse health information risk intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)https://doi.org/10.1109/healthcom.2016.7749536
Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to securi...

Soundscape mapping: comparing listening experiences

Thesis
McGregor, I. Soundscape mapping: comparing listening experiences. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4284
The perceived auditory environment is an increasingly important part of people’s everyday interactive experiences. While sound design is an established discipline in media suc...