Research explorer tool

Research Areas

Date


Research Areas

People

Download Available

Library Of Congress

Dewey Decimal

2936 results

Software agents and computer network security.

Conference Proceeding
Pikoulas, J., Mannion, M., & Buchanan, W. J. (2000)
Software agents and computer network security. In Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the, 211-217. https://doi.org/10.1109/ECBS.2000.839879
Preventing unauthorised access to corporate information systems is essential for many organisations. To address this problem we built a security enhancement software system us...

Software reuse in the emerging cloud computing era.

Book
Yang, H., & Liu, X. (2012)
Software reuse in the emerging cloud computing era. IGI Global Publishing. https://doi.org/10.4018/978-1-4666-0897-9
With the rapid development of computing hardware, high-speed network, web programming, distributed and parallel computing, and other technologies, cloud computing has recently...

Software development for engineers.

Book
Buchanan, W. J. (1996)
Software development for engineers. Butterworth-Heinemann Newton, MA, USA
Specialisation in software has become a thing of the past. With the move towards graphical user interface programming, engineers must have a sound knowledge of several program...

Social Media Adoption in Adult Education ‒ Administrators' Experience

Journal Article
Šliogerienė, J., Valūnaitė Oleškevičienė, G., Fotheringham, J., & Palfreyman, K. J. (2015)
Social Media Adoption in Adult Education ‒ Administrators' Experience. Public Policy and Administration, 13(4), 690-703. https://doi.org/10.13165/VPA-14-13-4-11
The rapid development of social media poses a multitude of considerations on this technology adoption. The emphasis in literature is put mainly on student or teacher perspecti...

Secret shares to protect health records in Cloud-based infrastructures

Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...

Security and Routing Scoped IP Multicast Addresses

Conference Proceeding
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009)
Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09, (228 - 235). https://doi.org/10.1109/icppw.2009.81
IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandw...

Security issues of a publicly accessible cloud computing infrastructure.

Conference Proceeding
Russell, G., & Macfarlane, R. (2012)
Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 1210-1216. https://doi.org/10.1109/TrustCom.2012.259
Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accident...

SCRAN: The Network

Journal Article
Cruickshank, P. (2011)
SCRAN: The Network. Journal of Urban Technology, 18, 83-97. https://doi.org/10.1080/10630732.2011.601121
This paper outlines the relationship between the Smart Cities (inter)Regional Academic Network (SCRAN) and the triple-helix model of knowledge production, a model encompassing...

Semantic integrity for persistent objects

Journal Article
Barclay, P. J., & Kennedy, J. (1992)
Semantic integrity for persistent objects. Information and Software Technology, 34(8), 533-541. https://doi.org/10.1016/0950-5849%2892%2990147-H
Modelling constructs for specifying semantic integrity are reviewed, and their implicit execution semantics discussed. An integrity mainte- nance model based on these construc...

Semantic description of cloud service agreements

Conference Proceeding
Greenwell, R., Liu, X., & Chalmers, K. (2015)
Semantic description of cloud service agreements. In Science and Information Conference (SAI), 2015, (823-831). https://doi.org/10.1109/sai.2015.7237239
To provide cloud services as a utility there must be a mechanism for comprehensively and precisely specifying cloud service agreements to reduce differences in service percept...

Date


People

423 results

Royal Botanic Gardens, Visitor Experience

2012 - 2014
The Royal Botanic Gardens Edinburgh would like to explore an opportunity to try to attract more visitors to the gardens during the dark winter months. They came up with an idea of setting up possible ...
Funder: Scottish Funding Council | Value: £5,000

Risk and opportunity in collaborative work

2008 - 2008
Social computing tools for collaboration in work environments. This study set out to establish the main risks and opportunities of the adoption of social computing tools within organizations for colla...
Funder: TFPL | Value: £4,400

Scapa Flow Technologies

2005 - 2006
To use evolutionary techniques to develop prototype software that will automatically optimise the performance of Enterprise Java software for large e-commerce systems.
Funder: Innovate UK | Value: £62,436

SCOPE: Server Configuration Optimisation through Parameter Evolution

2001 - 2006
SCOPE: Server Configuration Optimisation through Parameter Evolution
Funder: Innovate UK | Value: £100,000

sa.Fire

2012 - 2013
This project has resulted in a spin-out company which was incorporated on 17 January 2014. It has also generated a patent related to BDDs (Binary decision Diagrams).
Funder: Scottish Enterprise | Value: £320,000

Santander Staff Mobility Grant

2016 - 2017
"The Birth of a Nation: Exploring the Values-Based Leadership of Lee Kuan Yew in the Development of the Republic of Singapore" Yew was Singapore’s first Prime Minister from 1965 to 1990 and is regarde...
Funder: ENU Development Trust | Value: £400

RATTRAP (Guardian Toolkit)

2011 - 2013
The Office of Cyber Security & Information Assurance (OCSIA) estimates that the cost of cybercrime to businesses, in the UK alone, is over £21 billion per annum. This project focuses on the real-time ...
Funder: Scottish Enterprise | Value: £291,336

Research in Scotland on the Water Business: Strathpeffer Spa c.1850-2014

2014 - 2017
To analyse the rise, decline, and rise again of Strathpeffer Spa, c.1850-2014. This project will provide insight into the history and development of a distinctive, business-related highland community...
Funder: Carnegie Trust for the Universities of Scotland | Value: £1,000

Research in Librarianship - Impact Evaluation Study (RiLIES1)

2011 - 2011
Enhancing the impact of LIS Research Projects. RiLIES1 investigated the influence of funded research on practice in UK library and information science (LIS). It  identified factors that increase or ...
Funder: Library & information Science Research Coalition | Value: £27,945

Research in Librarianship - Impact Evaluation Study 2 (RiLIES2)

2012 - 2012
RiLIES2 was a follow-on project to RiLIES1 (completed in 2011). RiLIES2 was successful in: (1) clarifying the support and training needs of library and information science (LIS) researcher and r...
Funder: Library & information Science Research Coalition | Value: £21,923

Date


63 results

Date


People

134 results

Alistair Duff Interviewed: "Coronavirus, the Information Age & 1984!"

8 June 2020
The Asia Scotland Institute has released a vidcast with Professor Alistair Duff, Professor of Information Policy at Edinburgh Napier University, Edinburgh. Professor Duff addresses the extent to which...

University teams up with community researchers to help improve their neighbourhood

6 February 2020
A Team of community researchers will join forces with academics to help improve their neighbourhood. UK Research and Innovation today announced its backing for the Seven Kingdoms of Wester Hailes, on...

How working together delivered the key to unlocking the value of health data to European citizens

2 December 2019
Symphonic integrated into the EU Shield project, and which aims to share health care information across Europe, in a trusted way. Symphonic integrated a consent module which allows patient consent dat...

University Spin-out - Cyan Forensics - Wins at GovTech Summit 2019

18 November 2019
The third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University was the winner at PitchGovTech as part of the GovTech Summit 2019.

Prof Al Duff Featured in Sunday Express

5 October 2019
A revolt is needed to protect our privacy, leading professor claims Professor Alistair Duff insists the rise of technology such as facial recognition (FRT), CCTV and smart devices is robbing us of ou...

Expert Testimony to Scottish Parliament

30 September 2019
Prof Al Duff appeared as an expert witness before the Scottish Parliament's Justice Committee. Testifying on behalf of privacy pressure group NO2ID Edinburgh, he answered MSP question about the bill f...

Prof. Emma Hart invited to join Scottish Government Steering Group to develop an Artificial Intelligence (AI) strategy for Scotland.

16 September 2019
Prof. Emma Hart has been invited by Minister Kate Forbes to join a Scottish Government Steering Group to develop an Artificial Intelligence (AI) strategy for Scotland.

Music team and technology helps bring twins virtually together for the BBC World Service 'Digital Planet' programme

5 September 2019
Edinburgh Napier and the Royal College of Music has helped bring musicians virtually together as part of a special 18th birthday edition of the BBC World Service’s Digital Planet programme. Led in E...

Dr Scott Lyall publishes an article in The Conversation on Nan Shepherd.

28 August 2019
‘The Living Mountain: in an age of ecological crisis, Nan Shepherd’s nature writing is more relevant than ever’. Article in The Conversation, published 29 August 2019

University Spin-out Partners with National Center for Missing and Exploited Children

14 August 2019
Cyan Forensics - the third Cybersecurity spin-out from The Cyber Academy at Edinburgh Napier University - is partnering with America’s National Center for Missing & Exploited Children (NCMEC)

Date


People