Skip to main content

Research Repository

Advanced Search

Outputs (324)

Application and analysis of private matching schemes based on commutative cryptosystems. (2009)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2009, July). Application and analysis of private matching schemes based on commutative cryptosystems. Presented at 9th European Conference on Information Warfare and Security

Privacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These fears seem to be justified, in the light of recent events involving the UK... Read More about Application and analysis of private matching schemes based on commutative cryptosystems..

Modelling motorcycles driving cycles and emissions in Edinburgh (2009)
Thesis
Kumar, R. Modelling motorcycles driving cycles and emissions in Edinburgh. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/3047

The level of ownership and use of motorcycling has increased rapidly in Edinburgh and the UK in the last ten years. In this study, motorcycle driving cycles (rural and urban) were developed for Edinburgh (Edinburgh Motorcycle Driving cycle-EMDC). The... Read More about Modelling motorcycles driving cycles and emissions in Edinburgh.

JCSP agents-based service discovery for pervasive computing. (2009)
Presentation / Conference Contribution
Kosek, A., Kerridge, J., Syed, A., & Armitage, A. (2009, November). JCSP agents-based service discovery for pervasive computing. Presented at Communicating Process Architectures 2009 - WoTUG-32

Device and service discovery is a very important topic when considering pervasive environments. The discovery mechanism is required to work in networks with dynamic topology and on limited software, and be able to accept different device descriptions... Read More about JCSP agents-based service discovery for pervasive computing..

Form (2009)
Book Chapter
Kennedy, J., & Cannon, A. (2009). Form. In L. Liu, & M. T. Özsu (Eds.), Encyclopedia of Database Systems. Springer-Verlag

A Perspective on Middleware-Oriented Context-Aware Pervasive Systems (2009)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2009, July). A Perspective on Middleware-Oriented Context-Aware Pervasive Systems. Presented at 2009 33rd Annual IEEE International Computer Software and Applications Conference

The evolving concepts of mobile computing, context-awareness, and ambient intelligence are increasingly influencing user's experience of services. Therefore, the goal of this paper is to provide an overview of recent developments and implementations... Read More about A Perspective on Middleware-Oriented Context-Aware Pervasive Systems.

Soft-sphere soft glasses. (2009)
Journal Article
Heyes, D. M., Clarke, S. M., & Brańka, A. C. (2009). Soft-sphere soft glasses. Journal of Chemical Physics, 131, 204506. https://doi.org/10.1063/1.3266845

Molecular dynamics simulations have been used to compute physical properties of model fluids in which the particles interacted via the soft-sphere pair potential (SSP) ϕ(r)=ϵ(σ/r) n , where ϵ and σ are the characteristic energy and distance, respe... Read More about Soft-sphere soft glasses..

The secret life of the immune system: inspiring pervasive systems (2009)
Newspaper / Magazine
Hart, E. (2009). The secret life of the immune system: inspiring pervasive systems

The immune system performs more than simply defence and exploiting its additional functionality can lead to the design of better pervasive adaptive systems.

Forensic verification of operating system activity via novel data, acquisition and analysis techniques (2009)
Thesis
Graves, J. Forensic verification of operating system activity via novel data, acquisition and analysis techniques. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/6699

Digital Forensics is a nascent field that faces a number of technical, procedural and cultural difficulties that must be overcome if it is to be recognised as a scientific discipline, and not just an art. Technical problems involve the need to develo... Read More about Forensic verification of operating system activity via novel data, acquisition and analysis techniques.