Research explorer tool

Date


School

Output Type

Download Available

34 results

Novel visualisation techniques for working with multiple, overlapping classification hierarchies

Journal Article
Graham, M., Watson, M. F., & Kennedy, J. (2002)
Novel visualisation techniques for working with multiple, overlapping classification hierarchies. Taxon, 51, 351-358
A Java-based program is presented that provides a visualisation tool for display of and comparison between classification hierarchies. Taxa, or groups of taxa, can be tracked ...

The Prometheus Description Model: an examination of the taxonomic description-building process and its representation

Journal Article
Pullan, M. R., Armstrong, K. E., Paterson, T., Cannon, A., Kennedy, J. B., Watson, M. F., …Raguenaud, C. (2005)
The Prometheus Description Model: an examination of the taxonomic description-building process and its representation. Taxon, 54(3), 751-765. https://doi.org/10.2307/25065431
A model for representing taxonomic descriptive data is presented. The model has been developed in response to the growing requirement for the global exchange of descriptive da...

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data

Journal Article
Buchanan, W., Munoz, J., Abimbola, A., Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. doi:10.1016/j.cose.2006.04.001
Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these sys...

Low-Complexity Non-Intrusive Load Monitoring Using Unsupervised Learning and Generalized Appliance Models

Journal Article
Liu, Q., Kamoto, K. M., Liu, X., Sun, M., & Linge, N. (2019)
Low-Complexity Non-Intrusive Load Monitoring Using Unsupervised Learning and Generalized Appliance Models. IEEE Transactions on Consumer Electronics, 65(1), 1-1. doi:10.1109/tce.2019.2891160
Awareness of electric energy usage has both societal and economic benefits, which include reduced energy bills and stress on non-renewable energy sources. In recent years, the...

A new scalable broadcast algorithm for multiport meshes with minimum communication steps

Journal Article
Ould-Khaoua, M., Al-Dubai, A., Al-Dubai, A., & Ould-Khaoua, M. (2003)
A new scalable broadcast algorithm for multiport meshes with minimum communication steps. Microprocessors and Microsystems, 27(3), 101-113. doi:10.1016/s0141-9331(02)00094-7
Many broadcast algorithms have been proposed for the mesh in the literature. However, most of these algorithms do not exhibit good scalability properties as the network size i...

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds:Four Kinds of Schema

Journal Article
Wang, Z., & Chalmers, K. (2013)
Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds:Four Kinds of Schema. Procedia Computer Science, 19, 889-894. https://doi.org/10.1016/j.procs.2013.06.120
The proposed research will focus on developing a novel approach to solve Software Service Evolution problems in Computing Clouds. The approach will support dynamic evolution o...

VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees

Journal Article
Paterson, T., Graham, M., Kennedy, J., & Law, A. (2012)
VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees. BMC Bioinformatics, 13/8, https://doi.org/10.1186/1471-2105-13-S8-S5
Pedigree genotype datasets are used for analysing genetic inheritance and to map genetic markers and traits. Such datasets consist of hundreds of related animals genotyped for...

Teallach — a flexible user-interface development environment for object database applications

Journal Article
Barclay, P. J., Griffiths, T., McKirdy, J., Kennedy, J., Cooper, R., Paton, N. W., & Gray, P. (2003)
Teallach — a flexible user-interface development environment for object database applications. Journal of Visual Languages and Computing, 14(1), 47-77. https://doi.org/10.1016/s1045-926x%2802%2900056-3
The Teallach project has adapted model-based user-interface development techniques to the systematic creation of user-interfaces for object-oriented database applications. Mod...

A rule based taxonomy of dirty data.

Journal Article
Li, L., Peng, T., & Kennedy, J. (2011)
A rule based taxonomy of dirty data. GSTF journal on computing, 1(2), 140-148
There is a growing awareness that high quality of data is a key to today’s business success and that dirty data existing within data sources is one of the causes of poor data ...