Research explorer tool

Date


School

Themes

Download Available

82 results

Facilitating reuse in database applications with scenario-based component adaptation and generation

Conference Proceeding
Wang, B., Liu, X., & Kerridge, J. (2002)
Facilitating reuse in database applications with scenario-based component adaptation and generation. In Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications, 527-534. doi:10.1109/iri.2003.1251461
The development of database application systems will beneft from high reusabiliiy because similar design circumstances recur frequently in database developments. However, rese...

Jabber-based cross-domain efficient and privacy-ensuring context management framework.

Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2013)
Jabber-based cross-domain efficient and privacy-ensuring context management framework. International Journal of Advanced Computer Science and Applications, 4, 84
In pervasive environments, context-aware applications require a global knowledge of the context information distributed in different spatial domains in order to establish cont...

Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications

Conference Proceeding
Jaroucheh, Z., Liu, X., & Smith, S. (2010)
Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications. In Proceedings of IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technologies (WI-IAT 2010), 611-614. doi:10.1109/wi-iat.2010.25
Context-aware computing is widely accepted as a promising paradigm to enable seamless computing. Several middlewares and ontology-based models for describing context informati...

Recognize contextual situation in pervasive environments using process mining techniques

Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2011)
Recognize contextual situation in pervasive environments using process mining techniques. Journal of Ambient Intelligence and Humanized Computing, 2(1), 53-69. https://doi.org/10.1007/s12652-010-0038-7
Research in pervasive computing and ambience intelligence aims to enable users to interact with the environment in a context-aware way. To achieve this, a complex set of featu...

OCSO: Off-the-cloud service optimization for green efficient service resource utilization

Journal Article
Fang, D., Liu, X., Liu, L., & Yang, H. (2014)
OCSO: Off-the-cloud service optimization for green efficient service resource utilization. Journal of cloud computing advances, systems and applications, 3(1), https://doi.org/10.1186/s13677-014-0009-1
Many efforts have been made in optimizing cloud service resource management for efficient service provision and delivery, yet little research addresses how to consume the prov...

MVICS: a repository and search tool towards holistic semantic-based precise component selection.

Journal Article
Liu, X., & Li, C. (2013)
MVICS: a repository and search tool towards holistic semantic-based precise component selection. International journal of computers & technology, 5, 144-157
Driven by the continuous expansions of software applications and the increases in component varieties and sizes, the so-called component mismatch problem has become a more sev...

Ontology-based quality attributes prediction in component-based development

Journal Article
Li, C., Pooley, R., & Liu, X. (2010)
Ontology-based quality attributes prediction in component-based development. International journal of computer science & information technology, 2, 12-29. https://doi.org/10.5121/ijcsit.2010.2502
Despite the success that Component-Based Development (CBD) has achieved so far, component mismatch remains as a big obstacle for wider and smoother component reuse. Mismatch r...

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications

Conference Proceeding
Jaroucheh, Z., Liu, X., Smith, S., & Zhao, H. (2011)
Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. In 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW),, 351-355. doi:10.1109/compsacw.2011.65
Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context informat...

An Upper Ontology for Benefits Management of Cloud Computing

Journal Article
Greenwell, R., Liu, X., & Chalmers, K. (2014)
An Upper Ontology for Benefits Management of Cloud Computing. International Journal of Advanced Computer Science and Applications, 5(12), https://doi.org/10.14569/IJACSA.2014.051211
Benefits Management provides an established approach for decision making and value extraction for IT/IS investments and, can be used to examine cloud computing investments. Th...

Benefits management of cloud computing investments

Journal Article
Greenwell, R., Liu, X., & Chalmers, K. (2014)
Benefits management of cloud computing investments. International Journal of Advanced Computer Science and Applications, 5(7), 1-9. https://doi.org/10.14569/IJACSA.2014.050701%23sthash.KtMts9Zz.dpuf
This paper examines investments in cloud computing using the Benefits Management approach. The major contribution of the paper is to provide a unique insight into how organiza...