Research explorer tool

Date


School

People

Download Available

420 results

Software reuse in the emerging cloud computing era.

Book
Yang, H., & Liu, X. (2012)
Software reuse in the emerging cloud computing era. IGI Global Publishing. https://doi.org/10.4018/978-1-4666-0897-9
With the rapid development of computing hardware, high-speed network, web programming, distributed and parallel computing, and other technologies, cloud computing has recently...

Security and Routing Scoped IP Multicast Addresses

Conference Proceeding
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009)
Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09, (228 - 235). https://doi.org/10.1109/icppw.2009.81
IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandw...

Semantic description of cloud service agreements

Conference Proceeding
Greenwell, R., Liu, X., & Chalmers, K. (2015)
Semantic description of cloud service agreements. In Science and Information Conference (SAI), 2015, (823-831). https://doi.org/10.1109/sai.2015.7237239
To provide cloud services as a utility there must be a mechanism for comprehensively and precisely specifying cloud service agreements to reduce differences in service percept...

Redeeming pedigree data with an interactive error cleaning visualisation.

Conference Proceeding
Graham, M., Kennedy, J., Paterson, T., & Law, A. (2012)
Redeeming pedigree data with an interactive error cleaning visualisation. In Proceedings of Advanced Visual Interfaces 2012, 741-744. https://doi.org/10.1145/2254556.2254698
We describe a visual data cleansing application for pedigree genotype data, which is used to redeem otherwise unusable pedigree data sets. Biologists and bioinformaticians dyn...

Querying the composite pattern in OQL.

Working Paper
Raguenaud, C., Kennedy, J., & Barclay, P. J. Querying the composite pattern in OQL

)
Raguenaud, C., Kennedy, J., & Barclay, P. J. Querying the composite pattern in OQL
This paper analyses the problem generated by recursive patterns in typed query languages such as OQL [Cattell '97]. Recursive patterns describe hierarchical structures such as...

QoS-aware Inter-domain multicast for scalable wireless community networks

Journal Article
Al-Dubai, A. Y., Zhao, L., Zomaya, A. Y., & Min, G. (2014)
QoS-aware Inter-domain multicast for scalable wireless community networks. IEEE Transactions on Parallel and Distributed Systems, 26(11), 3136-3148. https://doi.org/10.1109/TPDS.2014.2365190
Wireless Community Networks (WCNs) have emerged as a cost-effective ubiquitous broadband connectivity solution, offering a wide range of services in a given geographical area....

Quality metrics for internet applications: developing new from old.

Conference Proceeding
Zhou, S., & Liu, X. (2007)
Quality metrics for internet applications: developing new from old. https://doi.org/10.1109/COMPSAC.2007.176
This discussion concerns ?metrics?. More specifically, we discuss quantitative metrics for evaluating Internet applications: what should we quantify, monitor and analyse in or...

RDF recipes for context-aware interoperability in pervasive systems.

Conference Proceeding
Kosek, A., Syed, A., & Kerridge, J. (2012)
RDF recipes for context-aware interoperability in pervasive systems. In Proceedings of IEEE Symposium on Computers and Communications, (1017-1022). https://doi.org/10.1109/ISCC.2010.5546647
Nowadays home automation systems integrate many devices from security system, heating, ventilation and air conditioning system, lighting system or audio-video systems. Every t...

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning

Conference Proceeding
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2014)
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications,, (174-181). https://doi.org/10.1109/trustcom.2014.26
The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish ...

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment

Conference Proceeding
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014)
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (205-211). https://doi.org/10.1109/trustcom.2014.31
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovat...