An open model-based interface development system: The Teallach approach.
Griffiths, T., McKirdy, J., Paton, N. W., Kennedy, J., Cooper, R., Barclay, P. J., …Dinn, A. (1998)
An open model-based interface development system: The Teallach approach. In P. Markopoulos, & P. Johnson (Eds.), Design, Specification and Verification of Interactive Systems '98. Proceedings of the Eurographics Workshop, 34-50
The goal of the Teallach project is to provide facilities for the systematic development of interfaces to object databases in a manner which is independent of both a specific ...
An Upper Ontology for Benefits Management of Cloud Computing
Greenwell, R., Liu, X., & Chalmers, K. (2014)
An Upper Ontology for Benefits Management of Cloud Computing. International Journal of Advanced Computer Science and Applications, 5(12), https://doi.org/10.14569/IJACSA.2014.051211
Benefits Management provides an established approach for decision making and value extraction for IT/IS investments and, can be used to examine cloud computing investments. Th...
An Integrated Cloud-based Healthcare Infrastructure.
Ekonomou, E., Fan, L., Buchanan, W. J., & Thuemmler, C. (2011)
An Integrated Cloud-based Healthcare Infrastructure. In 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), (532-536). https://doi.org/10.1109/CloudCom.2011.80
We present a cloud-based healthcare system that integrates a formal care system (DACAR) with an informal care system (Microsoft HealthVault). The system provides high levels o...
An intelligent agent security intrusion system
Pikoulas, J., Buchanan, W., Mannion, M., & Triantafyllopoulos, K. (2001)
An intelligent agent security intrusion system. In Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 94 - 99. doi:10.1109/ecbs.2002.999827
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly secu...
An agent-based Bayesian method for network intrusion detection.
Pikoulas, J. (2003)
An agent-based Bayesian method for network intrusion detection. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4057
Security is one of the major issues in any network and on the Internet. It encapsulates many different areas, such as protecting individual users against intruders, protecting...
An agent based Bayesian forecasting model for enhanced network security.
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001, 247 - 254. https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...
An Affordance-based Framework for CVE Evaluation
Turner, P., & Turner, S. (2002)
An Affordance-based Framework for CVE Evaluation. In X. Faulkner, J. Finlay, & F. Détienne (Eds.), People and Computers XVI - Memorable Yet Invisible, 89-103. https://doi.org/10.1007/978-1-4471-0105-5_6
We argue that a conceptual framework is required to support the
practical evaluation of collaborative virtual environments. We propose
such a framework based on an extended, t...
ALT text and basic accessibility
McEwan, T., & Weerts, B. (2007)
ALT text and basic accessibility. In D. Ramduny-Ellis, & D. Rachovides (Eds.), People and computers XXI : HCI-- but not as we know it : proceedings of HCI 2007, the 21st British HCI Group Annual Conference, 1-4
Recent surveys have shown that the majority of websites are not accessible. Despite legal obligations and the importance of the internet for disabled people, most websites fai...
ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things
Qasem, M., Al-Dubai, A., Imed, R., & Yassien, M. B. (2015)
ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things. In ICEMIS '15 Proceedings of the The International Conference on Engineering & MIS 2015https://doi.org/10.1145/2832987.2833058
Energy is a precious resource in Internet of Things (IoT) especially with battery operated nodes, the overhead that consumes the battery power of the sensor nodes is a fundame...
Benchmarking the business and operations strategy link.
McGarrie, B., & MacKerron, G. (1994)
Benchmarking the business and operations strategy link. In D. Draaijer, H. Boer, & K. Krabbendam (Eds.), International Conference - European Operations Management Association : Management and new production systems, 314-318
This paper reports on the use of benchmarking to improve the links between business and operations strategies. The use of benchmarking as a tool to facilitate improvement in t...