Software reuse in the emerging cloud computing era.
Yang, H., & Liu, X. (2012)
Software reuse in the emerging cloud computing era. IGI Global Publishing. https://doi.org/10.4018/978-1-4666-0897-9
With the rapid development of computing hardware, high-speed network, web programming, distributed and parallel computing, and other technologies, cloud computing has recently...
Security and Routing Scoped IP Multicast Addresses
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009)
Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09, (228 - 235). https://doi.org/10.1109/icppw.2009.81
IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandw...
Semantic description of cloud service agreements
Greenwell, R., Liu, X., & Chalmers, K. (2015)
Semantic description of cloud service agreements. In Science and Information Conference (SAI), 2015, (823-831). https://doi.org/10.1109/sai.2015.7237239
To provide cloud services as a utility there must be
a mechanism for comprehensively and precisely specifying cloud
service agreements to reduce differences in service percept...
Redeeming pedigree data with an interactive error cleaning visualisation.
Graham, M., Kennedy, J., Paterson, T., & Law, A. (2012)
Redeeming pedigree data with an interactive error cleaning visualisation. In Proceedings of Advanced Visual Interfaces 2012, 741-744. https://doi.org/10.1145/2254556.2254698
We describe a visual data cleansing application for pedigree genotype data, which is used to redeem otherwise unusable pedigree data sets. Biologists and bioinformaticians dyn...
Querying the composite pattern in OQL.
Raguenaud, C., Kennedy, J., & Barclay, P. J. Querying the composite pattern in OQL)
Raguenaud, C., Kennedy, J., & Barclay, P. J. Querying the composite pattern in OQL
This paper analyses the problem generated by recursive patterns in typed query languages such as OQL [Cattell '97]. Recursive patterns describe hierarchical structures such as...
QoS-aware Inter-domain multicast for scalable wireless community networks
Al-Dubai, A. Y., Zhao, L., Zomaya, A. Y., & Min, G. (2014)
QoS-aware Inter-domain multicast for scalable wireless community networks. IEEE Transactions on Parallel and Distributed Systems, 26(11), 3136-3148. https://doi.org/10.1109/TPDS.2014.2365190
Wireless Community Networks (WCNs) have emerged as a cost-effective ubiquitous broadband connectivity solution, offering a wide range of services in a given geographical area....
Quality metrics for internet applications: developing new from old.
Zhou, S., & Liu, X. (2007)
Quality metrics for internet applications: developing new from old. https://doi.org/10.1109/COMPSAC.2007.176
This discussion concerns ?metrics?. More specifically, we discuss quantitative metrics for evaluating Internet applications: what should we quantify, monitor and analyse in or...
RDF recipes for context-aware interoperability in pervasive systems.
Kosek, A., Syed, A., & Kerridge, J. (2012)
RDF recipes for context-aware interoperability in pervasive systems. In Proceedings of IEEE Symposium on Computers and Communications, (1017-1022). https://doi.org/10.1109/ISCC.2010.5546647
Nowadays home automation systems integrate many devices from security system, heating, ventilation and air conditioning system, lighting system or audio-video systems. Every t...
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2014)
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications,, (174-181). https://doi.org/10.1109/trustcom.2014.26
The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish ...
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014)
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (205-211). https://doi.org/10.1109/trustcom.2014.31
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovat...