Date


People

Download Available

292 results

Teallach: a model-based user interface development environment for object databases

Conference Proceeding
Griffiths, T., Barclay, P. J., McKirdy, J., Paton, N. W., Gray, P. D., Kennedy, J., …Smyth, M. (1999)
Teallach: a model-based user interface development environment for object databases. In Proceedings [IEEE] User Interfaces to Data Intensive Systems (86-96). https://doi.org/10.1109/UIDIS.1999.791465
Model-based user interface development environments show promise for improving the productivity of user interface developers, and possibly for improving the quality of develop...

NetHost-sensor: Monitoring a target host's application via system calls

Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. (2006)
NetHost-sensor: Monitoring a target host's application via system calls. Information Security Technical Report, 11(4), 166-175. https://doi.org/10.1016/j.istr.2006.10.003
Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert ...

Teallach: a model-based user interface development environment for object databases

Journal Article
Griffiths, T., Barclay, P. J., Paton, N. W., McKirdy, J., Kennedy, J., Gray, P., …Pinherio da Silva, P. (2001)
Teallach: a model-based user interface development environment for object databases. Interacting with Computers, 14(1), 31-68. https://doi.org/10.1016/s0953-5438%2801%2900042-x
Model-based user interface development environments show promise for improving the productivity of user-interface developers and possibly for improving the quality of develope...

A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments

Book Chapter
Jaroucheh, Z., Liu, X., & Smith, S. (2014)
A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments. In Software Design and Development, (71-95). IGI Global. https://doi.org/10.4018/978-1-4666-4301-7.ch005
Context-awareness is considered to be the cornerstone technique for developing pervasive computing applications that are flexible, adaptable, and capable of acting autonomousl...

Supporting design through the strategic use of shape grammars

Journal Article
Edmonds, E., Smyth, M., & Edmonds, E. A. (2000)
Supporting design through the strategic use of shape grammars. Knowledge-Based Systems, 13(6), (385-393). ISSN 0950-7051
This paper is concerned with the early processes of design, particularly in the context of spatial arrangements. We are interested in the strategies that a designer uses in or...

Implementing a wireless network of PDAs in a hospital setting

Journal Article
Turner, P., Milne, G., Kubitscheck, M., Penman, I., & Turner, S. (2005)
Implementing a wireless network of PDAs in a hospital setting. Personal and Ubiquitous Computing, 9, 209-217. https://doi.org/10.1007/s00779-004-0322-7
This paper discusses the introduction of a wireless network of personal digital assistants into a specialist unit of a hospital in Edinburgh. All of the technology has been us...

Regaining the conceptual level in object oriented modelling

Conference Proceeding
Barclay, P. J., & Kennedy, J. (1991)
Regaining the conceptual level in object oriented modelling. In Proceedings of the 9th British National Conference on Databases, Aspects of Databases, (BNCOD 9) (269-305
This paper attempts to develop a conceptual model for the object oriented description of data. We abstract from various logical model features essential for thinking about dat...

The impact of routing schemes on group communication throughput in scalable networks.

Conference Proceeding
Al-Dubai, A. (2008)
The impact of routing schemes on group communication throughput in scalable networks. In Proceedings of the 2008 IEEE international parallel & distributed processing symposium, 1-8. https://doi.org/10.1109/IPDPS.2008.4536490
Multicast communication has been a major avenue for many studies in interconnection networks. However, such a communication pattern has been studied under either limited opera...

Extensions to a memetic timetabling system.

Conference Proceeding
Paechter, B., Cumming, A., Norman, M. G., & Luchian, H. (1996)
Extensions to a memetic timetabling system. In R. Burke (Ed.), Practice and Theory of Automated Timetabling, 251-265. https://doi.org/10.1007/3-540-61794-9_64
This paper describes work in progress to increase the performance of a memetic timetabling system. The features looked at are two directed mutation operators, targeted mutatio...

Minimization of incompletely specified mixed polarity Reed Muller functions using genetic algorithm.

Conference Proceeding
Al-Jassani, B. A., Urquhart, N. B., & Almaini, A. E. A. (2009)
Minimization of incompletely specified mixed polarity Reed Muller functions using genetic algorithm. https://doi.org/10.1109/12.67320
A New and efficient Genetic Algorithm (GA) based approach is presented to minimise the number of terms of Mixed Polarity Reed Muller (MPRM) single and multi output incompletel...