Date


School

Download Available

79 results

Component-based network test tools platform for network design and maintenance

Thesis
Golam, H. (2003)
Component-based network test tools platform for network design and maintenance. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4066
Tools development for testing real time systems rely heavily on frameworks that are capable of delivering the advantages of precise control, the availability of a range of fun...

A new rich vehicle routing problem model and benchmark resource

Conference Proceeding
Sim, K., Hart, E., Urquhart, N. B., & Pigden, T. (2018)
A new rich vehicle routing problem model and benchmark resource. In Advances in Evolutionary and Deterministic Methods for Design, Optimization and Control in Engineering and Sciences. https://doi.org/10.1007/978-3-319-89988-6_30
We describe a new rich VRP model that captures many real-world constraints, following a recently proposed taxonomy that addresses both scenario and problem physical characteri...

An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules

Journal Article
Habibullah, S., Liu, X., & Tan, Z. (2018)
An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules. International Journal of Computer Theory and Engineering, 10(5), 164-169. https://doi.org/10.7763/ijcte.2018.v10.1219
Evolving legacy enterprise systems into a lean system architecture has been on the agendas of many enterprises. Recent advance in legacy system evaluation is in favour of micr...

Technology for supporting care staff in residential homes.

Journal Article
Webster, G., & Hanson, V. L. (2014)
Technology for supporting care staff in residential homes. ACM transactions on accessible computing, 5, 8. https://doi.org/10.1145/2543577
Care staff, those who attend to the day-to-day needs of people in residential facilities, represent an important segment of the health-care provision of those entrusted to the...

Cloud-based identity and identity meta-data: secure and control own data in globalization era.

Journal Article
Spyra, G., Buchanan, W. J., Cruickshank, P., & Ekonomou, E. (2014)
Cloud-based identity and identity meta-data: secure and control own data in globalization era. International Journal of Reliable and Quality E-Healthcare, 3, https://doi.org/10.4018/ijrqeh.2014010105
This paper proposes a new identity, and its underlying meta-data, model. The approach enables secure spanning of identity meta-data across many boundaries such as health-care,...

Towards a scalable broadcast in wormhole-switched mesh networks

Conference Proceeding
Al-Dubai, A. Y., Ould-Khaoua, M., & Mackenzie, L. M. (2002)
Towards a scalable broadcast in wormhole-switched mesh networks. In Proceedings of the 2002 ACM symposium on Applied computing, 840-844. https://doi.org/10.1145/508791.508955
Broadcast algorithms for wormhole--switched meshes have been widely reported in the literature. However, most of these algorithms handle broadcast in a sequential manner and d...

Scenario Analysis using Out-of-line Firewall Evaluation Framework.

Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007)
Scenario Analysis using Out-of-line Firewall Evaluation Framework
Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These a...

A scaleable and trusted e-Health eco-system: safi.re

Presentation / Conference
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April)
A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013, European Commission, Brussels
At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main component...

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm

Journal Article
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914
Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification bu...

A Sustainable Service-Oriented B2C Framework for Small Businesses

Conference Proceeding
Liu, X., & Ye, H. (2008)
A Sustainable Service-Oriented B2C Framework for Small Businesses. In J. Lee, D. Liang, & Y. C. Cheng (Eds.), The Fourth IEEE International Symposium on Service-Oriented System Engineering, 281-286. https://doi.org/10.1109/sose.2008.14
Electronic commerce is fast expanding all over the world. Currently most B2C (business to customer) electronic commerce focuses on retailing and other online services, such as...