Skip to main content

Research Repository

Advanced Search

Outputs (106)

Untangling the culture medium of student designers (2006)
Journal Article
Strickfaden, M., Heylighen, A., Rodgers, P., & Neuckermans, H. (2006). Untangling the culture medium of student designers. CoDesign, 2(02), 97-107. https://doi.org/10.1080/15710880600647865

Designs do not occur in a vacuum. They are nourished by a breeding ground composed of various substances, phenomena and traces, which function as raw material for concept generation and ultimately for design. This paper examines the composition and f... Read More about Untangling the culture medium of student designers.

Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. (2006)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2006). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In W. Hutchinson (Ed.),

Security in computer networks is typically passive, static, and reactive. This is typically due to most networking devices being rule-based, and when updates are necessary, they are normally done manually. Ultimately, the social and hierarchical stru... Read More about Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations..

A standard data model representation for taxonomic information. (2006)
Journal Article
Kennedy, J., Hyam, R., Kukla, R., & Paterson, T. (2006). A standard data model representation for taxonomic information. OMICS, 10, 220-230. https://doi.org/10.1089/omi.2006.10.220

The names used by biologists to label the observations they make are imprecise. This is an issue as workers increasingly seek to exploit data gathered from multiple, unrelated sources on line. Even when the international codes of nomenclature are fol... Read More about A standard data model representation for taxonomic information..

Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. (2006)
Presentation / Conference Contribution
Graves, J., Buchanan, W. J., Saliou, L., & Old, L. J. (2006). Performance analysis of network based forensic systems for in-line and out-of-line detection and logging.

Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers and Intrusion Detection Systems (IDSs) can yield important information, whi... Read More about Performance analysis of network based forensic systems for in-line and out-of-line detection and logging..

Achieving smooth component integration with generative aspects and component adaptation. (2006)
Presentation / Conference Contribution
Feng, Y., Liu, X., & Kerridge, J. (2006). Achieving smooth component integration with generative aspects and component adaptation. In M. Morisio (Ed.), Re-Use of Off-the-shelf Components: 9th International Conference on Software Reuse (260-272). https://d

Due to the availability of components and the diversity of target applications, mismatches between pre-qualified existing components and the particular reuse context in applications are often inevitable and have been a major hurdle of component reusa... Read More about Achieving smooth component integration with generative aspects and component adaptation..

Managing Missed Interactions in Distributed Virtual Environments (2006)
Conference Proceeding
Parkin, S., Andras, P., & Morgan, G. (2006). Managing Missed Interactions in Distributed Virtual Environments. In EGVE'06: Proceedings of the 12th Eurographics conference on Virtual Environments (27-34)

A scalable distributed virtual environment (DVE) may be achieved by ensuring virtual world objects communicate their actions to only those objects that fall within their influence, reducing the need to send and process unnecessary messages. A missed... Read More about Managing Missed Interactions in Distributed Virtual Environments.

A Hybrid Meta-Heuristic for Multi-Objective Optimization: MOSATS (2006)
Journal Article
Baños, R., Gil, C., Paechter, B., & Ortega, J. (2007). A Hybrid Meta-Heuristic for Multi-Objective Optimization: MOSATS. Journal of Mathematical Modelling and Algorithms, 6(2), 213-230. https://doi.org/10.1007/s10852-006-9041-6

Real optimization problems often involve not one, but multiple objectives, usually in conflict. In single-objective optimization there exists a global optimum, while in the multi-objective case no optimal solution is clearly defined but rather a set... Read More about A Hybrid Meta-Heuristic for Multi-Objective Optimization: MOSATS.

Applying a Web-Service-Based Model to Dynamic Service-Deployment (2006)
Conference Proceeding
Chrysoulas, C., Haleplidis, E., Haas, R., Denazis, S., & Koyfopavlou, O. (2006). Applying a Web-Service-Based Model to Dynamic Service-Deployment. In International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06). https://doi.org/10.1109/cimca.2005.1631253

Owing to the increase in both heterogeneity and complexity in today's networking systems, the need arises for an architecture for network-based services that provides flexibility and efficiency in the definition, deployment and execution of the servi... Read More about Applying a Web-Service-Based Model to Dynamic Service-Deployment.

Transparent Handover for Mobile Multicast Sources (2006)
Presentation / Conference Contribution
Romdhani, I., Bettahar, H., & Bouabdallah, A. (2006). Transparent Handover for Mobile Multicast Sources. In International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Tec

The Internet research community has proposed many routing protocols to support efficient multicast application. However, these protocols were developed for multicast parties whose members are topologically stationary, and they thus do not support bot... Read More about Transparent Handover for Mobile Multicast Sources.