An open model-based interface development system: The Teallach approach.
Griffiths, T., McKirdy, J., Paton, N. W., Kennedy, J., Cooper, R., Barclay, P. J., …Dinn, A. (1998)
An open model-based interface development system: The Teallach approach. In P. Markopoulos, & P. Johnson (Eds.), Design, Specification and Verification of Interactive Systems '98. Proceedings of the Eurographics Workshop, 34-50
The goal of the Teallach project is to provide facilities for the systematic development of interfaces to object databases in a manner which is independent of both a specific ...
An Upper Ontology for Benefits Management of Cloud Computing
Greenwell, R., Liu, X., & Chalmers, K. (2014)
An Upper Ontology for Benefits Management of Cloud Computing. International Journal of Advanced Computer Science and Applications, 5(12), https://doi.org/10.14569/IJACSA.2014.051211
Benefits Management provides an established approach for decision making and value extraction for IT/IS investments and, can be used to examine cloud computing investments. Th...
An overview of artificial immune systems.
Timmis, J., Knight, T., de Castro, L., & Hart, E. (2004)
An overview of artificial immune systems. In R. Paton, H. Bolouri, W. M. L. Holcombe, J. H. Parish, & R. Tateson (Eds.), Computation in Cells and Tissues: Perspectives and Tools of Thought, 51-86. Springer-Verlag
The immune system is highly distributed, highly adaptive, self-organising in nature, maintains a memory of past encounters and has the ability to continually learn about new e...
An Integrated Cloud-based Healthcare Infrastructure.
Ekonomou, E., Fan, L., Buchanan, W. J., & Thuemmler, C. (2011)
An Integrated Cloud-based Healthcare Infrastructure. In 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), (532-536). https://doi.org/10.1109/CloudCom.2011.80
We present a cloud-based healthcare system that integrates a formal care system (DACAR) with an informal care system (Microsoft HealthVault). The system provides high levels o...
An integrated charge amplifier for a pyroelectric sensor.
Setiadi, D., Armitage, A., Binnie, D., Regtien, P., & Sarro, P. (1997)
An integrated charge amplifier for a pyroelectric sensor. Sensors and Actuators A: Physical, 61, 421-426. https://doi.org/10.1016/S0924-4247%2897%2980299-3
This paper presents an integrated charge amplifier that measures a small charge. This charge is generated by a pyroelectric detector. The charge amplifier consists of a single...
An Integrated approach to street canyon pollution modelling.
Addison, P. S., Currie, J., Low, D. J., & McCann, J. M. (2000)
An Integrated approach to street canyon pollution modelling. In R. S. Sokhi, R. S. José, N. Moussiopoulos, & R. Berkowicz (Eds.), Urban Air Quality: Measurement, Modelling and Management, 333-342. https://doi.org/10.1007/978-94-010-0932-4_36
An integrated method for the prediction of the spatial pollution distribution within a street canyon directly from a microscopic traffic simulation model is outlined. The traf...
An international dimension: shipping.
Cullinane, K. (2012)
An international dimension: shipping. In L. Chapman, & T. J. Ryley (Eds.), Transport and Climate Change, 65-104. Emerald Publishing. https://doi.org/10.1108/S2044-9941%282012%290000002007
Purpose – The shipping industry is generally recognised as having better fuel efficiency than other transport modes. In many regions of the world, therefore, policy has promot...
An intelligent agent security intrusion system
Pikoulas, J., Buchanan, W., Mannion, M., & Triantafyllopoulos, K. (2001)
An intelligent agent security intrusion system. In Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 94 - 99. doi:10.1109/ecbs.2002.999827
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly secu...
An integrated firewall policy validation tool.
Macfarlane, R. (2009)
An integrated firewall policy validation tool. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3971
Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manual...
Aging of the labour force and globalization.
McQuaid, R. W. (2007)
Aging of the labour force and globalization. In R. Cooper, K. Donaghy, & G. Hewings (Eds.), Globalization and Regional Economic Modelling, 69-85. Springer-Verlag. https://doi.org/10.1007/978-3-540-72444-5_5
The rapid aging of the population structure across most developed countries is one of the main challenges facing their economies and governments (CEC 2004a).1 These changes wi...