Research explorer tool

Date


People

Download Available

179 results

VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees

Journal Article
Paterson, T., Graham, M., Kennedy, J., & Law, A. (2012)
VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees. BMC Bioinformatics, 13/8, https://doi.org/10.1186/1471-2105-13-S8-S5
Pedigree genotype datasets are used for analysing genetic inheritance and to map genetic markers and traits. Such datasets consist of hundreds of related animals genotyped for...

Using a conceptual data language to describe a database and its interface.

Conference Proceeding
Mitchell, K., Kennedy, J., & Barclay, P. J. (1995)
Using a conceptual data language to describe a database and its interface. In C. Goble, & J. Keane (Eds.), Advances in Databases: Proceedings [of the] 13th British National Conference on Database - BNCOD13, 1995, 101-119. doi:10.1007/BFb0000543
We propose a conceptual approach to defining interfaces to databases which uses the features of a fully object oriented data language to specify interface objects combined wit...

Using a persistent system to construct a customised interface to an ecological db.

Conference Proceeding
Barclay, P. J., Fraser, C., & Kennedy, J. (1993)
Using a persistent system to construct a customised interface to an ecological db. In R. Cooper (Ed.), Interfaces to Database Systems: Proceedings of the First International Workshop on Interfaces to Database Systems (IDS92), Glasgow, 1-3 July 1992, 225-243
New applications of information technology have increasingly sophisticated user interface requirements. Such interfaces are sometimes highly application specific and therefore...

Two approaches to representing multiple overlapping classifications: a comparison [plant taxonomy]

Conference Proceeding
Raguenaud, C., Graham, M., & Kennedy, J. (2002)
Two approaches to representing multiple overlapping classifications: a comparison [plant taxonomy]. In L. Kerschberg, & M. Kafatos (Eds.), Proceedings [of the] Thirteenth International Conference on Scientific and Statistical Database Management, SSDBM 2001, 239-244. https://doi.org/10.1109/ssdm.2001.938556
Plant taxonomy is the science of classification of plants. One of the tasks of plant taxonomy is the creation of classifications of organisms that allows the understanding of ...

Time-series Explorer: An Animated Information Visualisation for Microarray Time-course Data

Journal Article
Craig, P., Kennedy, J., & Cumming, A. (2005)
Time-series Explorer: An Animated Information Visualisation for Microarray Time-course Data. BMC bioinformatics, 6, P8. doi:10.1186/1471-2105-6-S3-P8
Microarray technologies are a relatively new development that allow biologists to monitor the activity of thousands of genes (normally around 8,000) in parallel across multipl...

Novel visualisation techniques for working with multiple, overlapping classification hierarchies

Journal Article
Graham, M., Watson, M. F., & Kennedy, J. (2002)
Novel visualisation techniques for working with multiple, overlapping classification hierarchies. Taxon, 51, 351-358
A Java-based program is presented that provides a visualisation tool for display of and comparison between classification hierarchies. Taxa, or groups of taxa, can be tracked ...

Multicast receiver and sender access control and its applicability to mobile IP environments: a survey

Journal Article
Kellil, M., Romdhani, I., Lach, H., Bouabdallah, A., & Betttahar, H. (2005)
Multicast receiver and sender access control and its applicability to mobile IP environments: a survey. Communications Surveys and Tutorials, IEEE Communications Society, 7(2), 46-70. https://doi.org/10.1109/comst.2005.1610545
No abstract available.

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data

Journal Article
Buchanan, W., Munoz, J., Abimbola, A., Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. doi:10.1016/j.cose.2006.04.001
Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these sys...

Ontology-based quality attributes prediction in component-based development

Journal Article
Li, C., Pooley, R., & Liu, X. (2010)
Ontology-based quality attributes prediction in component-based development. International journal of computer science & information technology, 2, 12-29. https://doi.org/10.5121/ijcsit.2010.2502
Despite the success that Component-Based Development (CBD) has achieved so far, component mismatch remains as a big obstacle for wider and smoother component reuse. Mismatch r...

Open source software adoption in non-profit organisations – socio-technical perspectives

Thesis
Zhang, G. Open source software adoption in non-profit organisations – socio-technical perspectives. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3811
Open source software has grown from a small sub-community of developers and users with their own ideologies to a significant element in the IT strategies of major vendors. Ope...