Research explorer tool

Date


Output Type

Download Available

193 results

Analysis of Information governance and patient data protection within primary health care

Journal Article
Smith, M., Buchanan, W. J., Thuemmler, C., Bell, D., & Hazelhoff Roelfzema, N. (2010)
Analysis of Information governance and patient data protection within primary health care. International Journal for Quality in Health Care,
The introduction of Information Governance throughout the NHS in Great Britain from 2004 onwards, saw Pri-mary Care Medicine subject to a regulatory regime ...

A novel privacy preserving method for the location tracking of mobile devices

Journal Article
Buchanan, W. J., & Kwecka, Z. (2011)
A novel privacy preserving method for the location tracking of mobile devices. Wireless Networks,
Two of the major changes within computing, at the present time, are the move towards serviceoriented architectures and the increasing usage of mobile devices to access these s...

A new scalable broadcast algorithm for multiport meshes with minimum communication steps

Journal Article
Ould-Khaoua, M., Al-Dubai, A., Al-Dubai, A., & Ould-Khaoua, M. (2003)
A new scalable broadcast algorithm for multiport meshes with minimum communication steps. Microprocessors and Microsystems, 27(3), 101-113. doi:10.1016/s0141-9331(02)00094-7
Many broadcast algorithms have been proposed for the mesh in the literature. However, most of these algorithms do not exhibit good scalability properties as the network size i...

A new dynamic counter-based broadcasting scheme for mobile ad hoc networks.

Journal Article
Yassein, M. B., Nimer, S. F., & Al-Dubai, A. (2011)
A new dynamic counter-based broadcasting scheme for mobile ad hoc networks. Simulation Modelling Practice and Theory, 19, 553-563. https://doi.org/10.1016/j.simpat.2010.08.011
Broadcasting is an essential operation in Mobile Ad hoc Networks (MANETs) to transmit a message (data packet) from the sender to the rest of the network nodes. Although floodi...

A Simulation Study of Scalable Broadcast in High-Performance Regular Networks

Journal Article
Al-Dubai, A. Y., Ould-Khaoua, M., & Obaidat, M. S. (2004)
A Simulation Study of Scalable Broadcast in High-Performance Regular Networks. SIMULATION, 80(4-5), 207-220. https://doi.org/10.1177/0037549704044325
Broadcast is an important communication operation required by many real-world applications encountered in parallel, cluster, and grid computing environments. Broadcasting on r...

Crime risk evaluation within information sharing between the Police and community partners.

Journal Article
Uthmani, O., Buchanan, W. J., Lawson, A., Scott, R., Schafer, B., & Fan, L. (2011)
Crime risk evaluation within information sharing between the Police and community partners. Information and Communications Technology Law, 20, 57-81. https://doi.org/10.1080/13600834.2011.578922
The aim of this paper is to provide profiles for crimes which can be used to model the context for information sharing between the police and community partner organisations. ...

QoS-aware Inter-domain multicast for scalable wireless community networks

Journal Article
Al-Dubai, A. Y., Zhao, L., Zomaya, A. Y., & Min, G. (2014)
QoS-aware Inter-domain multicast for scalable wireless community networks. IEEE Transactions on Parallel and Distributed Systems, 26(11), 3136-3148. https://doi.org/10.1109/TPDS.2014.2365190
Wireless Community Networks (WCNs) have emerged as a cost-effective ubiquitous broadband connectivity solution, offering a wide range of services in a given geographical area....

Protecting mobile agents from external replay attacks

Journal Article
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009)
Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018
This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching ...

Radio frequency identification (RFID) in pervasive healthcare

Journal Article
Fekri, A. H., Thuemmler, C., Buchanan, W., Fekri, H., & Lawson, A. (2009)
Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management, 10(1/2), 119. doi:10.1504/ijhtm.2009.023731
Active and passive RFID (Radio Frequency Identification) technology are available and licensed for the use in hospitals, and can be used to establish highly reliable pervasive...

Intrusion detection method based on nonlinear correlation measure

Journal Article
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F., & Jamdagni, A. (2014)
Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8(2/3), 77. https://doi.org/10.1504/ijipt.2014.066377
Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services,...