Ontology-Driven Automated Generation of Data Entry Interfaces to Databases
Conference Proceeding
Cannon, A., Kennedy, J. B., Paterson, T., & Watson, M. F. (2004)
Ontology-Driven Automated Generation of Data Entry Interfaces to Databases. In H. Williams, & L. Mackinnon (Eds.), Key Technologies for Data Management; Lecture Notes in Computer Science, 150-164. doi:10.1007/978-3-540-27811-5_15
This paper discusses an ontology based approach for the automatic generation of data entry interfaces to databases. An existing domain ontology is mapped to a system domain mo...
Security and Routing Scoped IP Multicast Addresses
Conference Proceeding
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009)
Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09. , (228-235). https://doi.org/10.1109/icppw.2009.81
IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandw...
HI-risk: A method to analyse health information risk intelligence
Conference Proceeding
Buchanan, W. J., & van Deursen, N. (2016)
HI-risk: A method to analyse health information risk intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)https://doi.org/10.1109/healthcom.2016.7749536
Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to securi...
DEEPC: Dynamic Energy Profiling of Components
Conference Proceeding
Liu, X., Chinenyeze, S. J., & Al-Dubai, A. (2016)
DEEPC: Dynamic Energy Profiling of Components. In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)https://doi.org/10.1109/COMPSAC.2016.90
Many software projects are built using reusable components (i.e. reusable objects - as per component and connectors in software architectures). During component selection in C...
An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment
Conference Proceeding
Liu, X., & Liu, Q. (2017)
An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), (128-131). https://doi.org/10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to imbalance...
Clustering Moving Data with a Modified Immune Algorithm
Conference Proceeding
Hart, E., & Ross, P. (2001)
Clustering Moving Data with a Modified Immune Algorithm. In E. Boers (Ed.), Applications of Evolutionary Computing, 394-403. https://doi.org/10.1007/3-540-45365-2_41
In this paper we present a prototype of a new model for performing clustering in large, non-static databases. Although many machine learning algorithms for data clustering hav...
Evaluation of a genetic representation for outline shapes
Conference Proceeding
Lapok, P., Lawson, A., & Paechter, B. (2017)
Evaluation of a genetic representation for outline shapes. In GECCO '17 Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1419-1422). https://doi.org/10.1145/3067695.3082501
This work in progress focuses on the evaluation of a genetic representation for outline shapes for planar mechanical levers which addresses the first stage of the complex real...
Who would you trust to identify you in accessing your health record?
Conference Proceeding
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2013)
Who would you trust to identify you in accessing your health record?
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...
Real-Time Data Analytics in Support of Network Resource Management Protocols
Conference Proceeding
Moradpoor, N., Parr, G., Mcclean, S., Scotney, B., & Owusu, G. (2009)
Real-Time Data Analytics in Support of Network Resource Management Protocols. In Proceedings of 10th PGNET
Communications Networks Resource Management (RM) functions such as dynamic and static resource usage monitoring, real time resource reservation as well as advance resource res...
Cross-Layer Multipath Multichannel MAC protocol for MANETs
Conference Proceeding
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018)
Cross-Layer Multipath Multichannel MAC protocol for MANETs. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC)https://doi.org/10.1109/ISNCC.2018.8530886
Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure i...