Skip to main content

Research Repository

Advanced Search

Outputs (81)

Can pay, should pay? Exploring paid and unpaid work opportunities from employer and student perspectives. (2013)
Presentation / Conference Contribution
Caddell, M., McIlwhan, R., Irving, C., Smith, C. F., & Smith, S. (2013). Can pay, should pay? Exploring paid and unpaid work opportunities from employer and student perspectives.

Within current university-focused discussions around how to enhance and support student employability, considerable emphasis has been placed on gaining work experience, either through volunteering or via work placements and internships. There is grow... Read More about Can pay, should pay? Exploring paid and unpaid work opportunities from employer and student perspectives..

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., Varga, J., & Anderson, C. (2013, April). Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. Presented at CSP 2013: Cyber Security and Privacy

We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, organisations and units, into a formal definition, and then implement these as... Read More about Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture..

Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., & Clayton, J. (2013, June). Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. Presented at Cyberforensics 2013, Cardiff, UK

There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other electronic devices increases, and as the storage capacity of these devices i... Read More about Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter..

Fast and reliable hybrid routing for vehicular ad hoc networks. (2013)
Presentation / Conference Contribution
Al-Kubati, G., Al-Dubai, A., Mackenzie, L., & Pezaros, D. (2013). Fast and reliable hybrid routing for vehicular ad hoc networks. In 13th International Conference on ITS Telecommunications (ITST) (20-25). https://doi.org/10.1109/ITST.2013.6685515

Intelligent Transportation Systems (ITSs) have been attracting tremendous attention in both academia and industry due to emerging applications that pave the way towards safer enjoyable journeys and inclusive digital partnerships. Undoubtedly, these I... Read More about Fast and reliable hybrid routing for vehicular ad hoc networks..

Communicating Process Architectures 2013. (2013)
Presentation / Conference Contribution
(2013). Communicating Process Architectures 2013. In P. H. Welch, F. R. M. Barnes, J. F. Broenink, K. Chalmers, J. B. Pedersen, & A. T. Sampson (Eds.), Communicating Process Architectures 2013

Homevisor: Adapting home network environments (2013)
Presentation / Conference Contribution
Fratczak, T., Broadbent, M., Georgopoulos, P., & Race, N. (2013). Homevisor: Adapting home network environments. In 2013 Second European workshop on software defined networks (32-37). https://doi.org/10.1109/EWSDN.2013.12

This paper considers SDN, and OpenFlow in particular, as technology to develop the next generation of more flexible, configurable and automated home networks. We identify the problems with the current state of the art in home networking, which includ... Read More about Homevisor: Adapting home network environments.

Can pay, should pay? Comparing employer and student outcomes of paid and unpaid work opportunities. (2013)
Presentation / Conference Contribution
Smith, C. F., Smith, S., & Irving, C. (2013, April). Can pay, should pay? Comparing employer and student outcomes of paid and unpaid work opportunities. Presented at 2013 STEM Annual Conference

This paper looks across and beyond this project to examine the range of placement and work experience forms currently experienced by computing students, and asks the question – are all of these opportunities equal? Or more specifically, are the benef... Read More about Can pay, should pay? Comparing employer and student outcomes of paid and unpaid work opportunities..

A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks (2013)
Presentation / Conference Contribution
Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2013, September). A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks. Presented at 2013 5th Computer Science and Electronic Engineering Conference (CEEC), Colchester, UK

Optical and wireless integration scheme merges the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of the wireless counterparts for the Subscriber Stations (SSs). It is also financially viab... Read More about A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks.

Using Knowledge Organisation to Manage Information Risk (2013)
Presentation / Conference Contribution
Haynes, D. (2013, October). Using Knowledge Organisation to Manage Information Risk. Paper presented at ISKO UK Meeting on “Information –a risky business”, London

Categorising information risk helps us to develop a strategy approach to risk management. Existing classifications focus on natural disasters or human generated catastrophes and do not lend themselves to classification of information risk.