Skip to main content

Research Repository

Advanced Search

Outputs (23)

A plug-in disk-Interface-process for the WSQL data access controller. (1996)
Presentation / Conference Contribution
Kerridge, J., & Kukla, R. (1996, March). A plug-in disk-Interface-process for the WSQL data access controller. Presented at WoTUG '96 19th world occam and transputer user group technical meeting on Parallel processing developments

As part of the development of a disk based storage subsystem for a database machine, a disk interface process has been designed, exploiting parallel processing features of the transputer. In a step-by-step approach design-decisions are presented and... Read More about A plug-in disk-Interface-process for the WSQL data access controller..

Intelligent storage devices for scalable information management systems.
Presentation / Conference Contribution
Kukla, R., & Kerridge, J. (1996, April). Intelligent storage devices for scalable information management systems. Presented at International Conference and Exhibition HPCN EUROPE 1996, Brussels, Belgium

For most large commercial organisations the ability to store and manipulate massive volumes of data is a key operational requirement. Database systems are now fundamental to the efficient provision of a range of business tasks from on-line transactio... Read More about Intelligent storage devices for scalable information management systems..

Developing Visualisations to Enhance an Insider Threat Product: A Case Study
Presentation / Conference Contribution
Graham, M., Kukla, R., Mandrychenko, O., Hart, D., & Kennedy, J. (2021, October). Developing Visualisations to Enhance an Insider Threat Product: A Case Study. Presented at 2021 IEEE Symposium on Visualization for Cyber Security (VizSec), New Orleans, USA

This paper describes the process of developing data visualisations to enhance a commercial software platform for combating insider threat, whose existing UI, while perfectly functional, was limited in its ability to allow analysts to easily spot the... Read More about Developing Visualisations to Enhance an Insider Threat Product: A Case Study.