Date


People

Download Available

200 results

Integrated many-to-many multicast addressing and access control method

Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...

Mastering Java.

Book
Buchanan, W. J. (1997)
Mastering Java. Macmillan Press
This book provides an introduction to the Java programming language and also covers other related areas such as HTML, JavaScript, CGIscript and VRML. Most of the Java programs...

Interoperable Services for Federations of Database System

Conference Proceeding
Roantree, M., Kennedy, J., & Barclay, P. J. (2002)
Interoperable Services for Federations of Database System. In A. Caplinskas, & J. Eder (Eds.), Advances in Databases and Information Systems: Fifth East-European Conference ADBIS' 2001
The problems associated with defining interoperable protocols for heterogenous information systems has been the subject of researchers for many years. While numerous solutions...

Ontology-based quality attributes prediction in component-based development

Journal Article
Li, C., Pooley, R., & Liu, X. (2010)
Ontology-based quality attributes prediction in component-based development. International journal of computer science & information technology, 2, 12-29. https://doi.org/10.5121/ijcsit.2010.2502
Despite the success that Component-Based Development (CBD) has achieved so far, component mismatch remains as a big obstacle for wider and smoother component reuse. Mismatch r...

Achieving smooth component integration with generative aspects and component adaptation.

Conference Proceeding
Feng, Y., Liu, X., & Kerridge, J. (2006)
Achieving smooth component integration with generative aspects and component adaptation. In M. Morisio (Ed.), Re-Use of Off-the-shelf Components: 9th International Conference on Software Reuse, 260-272. https://doi.org/10.1007/11763864_19
Due to the availability of components and the diversity of target applications, mismatches between pre-qualified existing components and the particular reuse context in applic...

Coordinated graph and scatter-plot views for the visual exploration of microarray time-series data

Conference Proceeding
Craig, P., & Kennedy, J. (2003)
Coordinated graph and scatter-plot views for the visual exploration of microarray time-series data. In IEEE Symposium on Information Visualization, 173-180. doi:10.1109/infvis.2003.1249023
Microarrays are a relatively new, high-throughput data acquisition technology for investigating biological phenomena at the micro-level. The product of microarray experiments ...

Measuring pedestrian gait using low resolution infrared people counters

Thesis
Chamberlain, T. Measuring pedestrian gait using low resolution infrared people counters. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/2733
This thesis describes research conducted into the measure- ment of pedestrian movement. It starts with an examination of current pedestrian detection and tracking systems, loo...

Individual differences and inclusive design.

Book
Benyon, D., Crerar, A., & Wilkinson, S. (2000)
Individual differences and inclusive design. In C. Stephanidis (Ed.), User interfaces for all: Concepts, methods and tools, 21-46. Lawrence Erlbaum
Usability is widely recognised to be as important as functionality to the success of interactive computer systems. However, even where usability is considered seriously, the s...

An assessment of data leakage in Firefox under different conditions.

Presentation / Conference
Findlay, C., & Leimich, P. (2014, July)
An assessment of data leakage in Firefox under different conditions. Paper presented at CFET 2014: 7th International Conference on Cybercrime Forensics Education & Training, Christ Church,
Data leakage is a serious issue and can result in the loss of sensitive data, compromising user accounts and details, potentially affecting millions of internet users. This pa...

NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification

Journal Article
Yazdania, S., Tan, Z., Kakavand, M., & Lau, S. (2022)
NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification. Wireless Networks, 28, 1251-1261. https://doi.org/10.1007/s11276-018-01909-0
Research in financial domain has shown that sentiment aspects of stock news have a profound impact on volume trades, volatility, stock prices and firm earnings. With the ever ...