17 results

Cooja Simulator Manual

Report
Thomson, C., Romdhani, I., Al-Dubai, A., Qasem, M., Ghaleb, B., & Wadhaj, I. (2016)
Cooja Simulator Manual. Edinburgh: Edinburgh Napier University
While Cooja has been proven to be an ideal tool for the simulation of RPL in WSNs, there are challenges involved in its use, particularly in regard to a lack of documentation....

3DES Encryption and Decryption in Microsoft .NET.

Report
Buchanan, W. J. (2009)
3DES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of 3DES in Microsoft .NET. It provides a basic overview of the 3-DES method, along with a review of other popular encryption methods and some sam...

Digital engagement workshops for Community Councils and Registered Tenant Organisations

Report
Ryan, B. & Cruickshank, P. (2016)
Digital engagement workshops for Community Councils and Registered Tenant Organisations. Scotland: Scottish Government
In October and November 2015 Edinburgh Napier University (Napier) hosted a series of workshops on digital engagement for Community Councillors and representatives of Registere...

Lattice-based modelling of thesauri.

Report
Priss, U. & Old, L. J. (2007)
Lattice-based modelling of thesauri
This paper revisits ideas about the use of lattices as underlying conceptual structures in information retrieval and machine translation as suggested by researchers in the 195...

Digital engagement workshop for community councils: Glasgow 2016 report.

Report
Ryan, B. & Cruickshank, P. (2016)
Digital engagement workshop for community councils: Glasgow 2016 report
This report covers a workshop on digital engagement for Community Councils supported by the School of Computing's public engagement fund. It was held in Glasgow on 22 March ...

Artificial Immune Systems (Dagstuhl Seminar 11172)

Report
Hart, E., Jansen, T. & Timmis, J. (2010)
Artificial Immune Systems (Dagstuhl Seminar 11172
This report documents the program and the outcomes of the Dagstuhl Seminar 11172 ``Artificial Immune Systems''. The purpose of the seminar was to bring together researchers fr...

5G-PPP White Paper on eHealth Vertical Sector

Report
Thuemmler, C., Jumelle, A. K. L., Paulin, A., Sadique, A., Schneider, A., Fedell, C., …Covaci, S. (2015)
5G-PPP White Paper on eHealth Vertical Sector. Brussels: EU Commission
Gaston Crommenlaan 1 PO box: 101 9050 Gent Belgium www.5g-ppp.eu 5G and e-Health 1 Socioeconomic drivers of e-Health in Horizon 2020 Although socioeconomically the sector addr...

AES Encryption and Decryption in Microsoft .NET.

Report
Buchanan, W. J. (2009)
AES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample...

Simulating vehicular traffic flows using the Circal System.

Report
Russell, G., Cowie, A., McInnes, J., Bate, M. & Milne, G. (1993)
Simulating vehicular traffic flows using the Circal System
Modern civil engineers have big problems on their hands; more cars use our road networks every year, leading to ever increasing congestion. Knowing how to change a road networ...

An object-based processor cache.

Report
Russell, G. & Shaw, P. (1992)
An object-based processor cache
In the past, many persistent object-oriented architecture designs have been based on traditional processor technologies. Such architectures invariantly attempt to insert an ob...