Date


People

Download Available

Dewey Decimal

633 results

Building a new nation: risk, goverance and trust.

Presentation / Conference
Buchanan, W. J. (2013, January)
Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.

Ontology-Driven Automated Generation of Data Entry Interfaces to Databases

Conference Proceeding
Cannon, A., Kennedy, J. B., Paterson, T., & Watson, M. F. (2004)
Ontology-Driven Automated Generation of Data Entry Interfaces to Databases. In H. Williams, & L. Mackinnon (Eds.), Key Technologies for Data Management; Lecture Notes in Computer Science, 150-164. doi:10.1007/978-3-540-27811-5_15
This paper discusses an ontology based approach for the automatic generation of data entry interfaces to databases. An existing domain ontology is mapped to a system domain mo...

Security and Routing Scoped IP Multicast Addresses

Conference Proceeding
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009)
Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09. , (228-235). https://doi.org/10.1109/icppw.2009.81
IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandw...

Visual Exploration of Alternative Taxonomies through Concepts

Journal Article
Graham, M., & Kennedy, J. (2007)
Visual Exploration of Alternative Taxonomies through Concepts. Ecological Informatics, 2, 248-261. https://doi.org/10.1016/j.ecoinf.2007.07.004
A graphical user interface is presented that allows users of taxonomic data to explore concept relationships between conflicting but related taxonomic classifications. Ecolog...

HI-risk: A method to analyse health information risk intelligence

Conference Proceeding
Buchanan, W. J., & van Deursen, N. (2016)
HI-risk: A method to analyse health information risk intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)https://doi.org/10.1109/healthcom.2016.7749536
Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to securi...

Soundscape mapping: comparing listening experiences

Thesis
McGregor, I. Soundscape mapping: comparing listening experiences. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4284
The perceived auditory environment is an increasingly important part of people’s everyday interactive experiences. While sound design is an established discipline in media suc...

A Review on Deep Learning Approaches to Image Classification and Object Segmentation

Journal Article
Wu, H., Liu, Q., & Liu, X. (2019)
A Review on Deep Learning Approaches to Image Classification and Object Segmentation. Computers, Materials & Continua, 60(2), 575-597. https://doi.org/10.32604/cmc.2019.03595
Deep learning technology has brought great impetus to artificial intelligence, especially in the fields of image processing, pattern and object recognition in recent years. Pr...

DEEPC: Dynamic Energy Profiling of Components

Conference Proceeding
Liu, X., Chinenyeze, S. J., & Al-Dubai, A. (2016)
DEEPC: Dynamic Energy Profiling of Components. In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)https://doi.org/10.1109/COMPSAC.2016.90
Many software projects are built using reusable components (i.e. reusable objects - as per component and connectors in software architectures). During component selection in C...

An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment

Conference Proceeding
Liu, X., & Liu, Q. (2017)
An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), (128-131). https://doi.org/10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to imbalance...

Clustering Moving Data with a Modified Immune Algorithm

Conference Proceeding
Hart, E., & Ross, P. (2001)
Clustering Moving Data with a Modified Immune Algorithm. In E. Boers (Ed.), Applications of Evolutionary Computing, 394-403. https://doi.org/10.1007/3-540-45365-2_41
In this paper we present a prototype of a new model for performing clustering in large, non-static databases. Although many machine learning algorithms for data clustering hav...