Skip to main content

Research Repository

Advanced Search

Outputs (93)

Scenario Analysis using Out-of-line Firewall Evaluation Framework. (2007)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall Evaluation Framework.

Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These attacks typically aim at disabling computer network infrastructure, and, sin... Read More about Scenario Analysis using Out-of-line Firewall Evaluation Framework..

How affinity influences tolerance in an idiotypic network. (2007)
Journal Article
Hart, E., Bersini, H., & Santos, F. (2007). How affinity influences tolerance in an idiotypic network. Journal of Theoretical Biology, 249, 422-436. https://doi.org/10.1016/j.jtbi.2007.07.019

The mutability of bacteriophages offers a particular advantage in the treatment of bacterial infections not afforded by other antimicrobial therapies. When phage-resistant bacteria emerge, mutation may generate phage capable of exploiting and thus li... Read More about How affinity influences tolerance in an idiotypic network..

Dynamic Service Deployment using an Ontologybased Description of Devices and Services (2007)
Presentation / Conference Contribution
Chrysoulas, C., Koumoutsos, G., Denazis, S., Thramboulidis, K., & Koufopavlou, O. (2007). Dynamic Service Deployment using an Ontologybased Description of Devices and Services. . https://doi.org/10.1109/icns.2007.55

In the FlexiNET 1ST research project a service called Dynamic Service Deployment dynamically installs, monitors and uninstalls new services upon user demand, or by a default configuration. There was a need for a module to keep all the required inform... Read More about Dynamic Service Deployment using an Ontologybased Description of Devices and Services.

Automated process of network documentation (2007)
Thesis
Campbell, B. Automated process of network documentation. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4048

Knowledge of network topologies is invaluable to system administrators regardless of the size of an enterprise. Yet this information is time consuming to collect, and even more so to be processed into easily consumable formats (i.e. visual maps). Thi... Read More about Automated process of network documentation.

Establishing key dimensions for reifying soundfields and soundscapes from auditory professionals. (2007)
Presentation / Conference Contribution
McGregor, I., Crerar, A., Benyon, D., & LePlâtre, G. (2007). Establishing key dimensions for reifying soundfields and soundscapes from auditory professionals. In Proceedings of the 13th International Conference on Auditory Display (364-371)

This paper presents a unique insight into the way acousticians, computing specialists and sound designers describe the dimensions of sound they use. Seventy-five audio professionals completed a detailed questionnaire created to elicit common definiti... Read More about Establishing key dimensions for reifying soundfields and soundscapes from auditory professionals..

Finding feasible timetables using group-based operators. (2007)
Journal Article
Lewis, R. M. R., & Paechter, B. (2007). Finding feasible timetables using group-based operators. IEEE Transactions on Evolutionary Computation, 11, 397-413. https://doi.org/10.1109/TEVC.2006.885162

This paper describes the applicability of the so-called "grouping genetic algorithm" to a well-known version of the university course timetabling problem. We note that there are, in fact, various scaling up issues surrounding this sort of algorithm a... Read More about Finding feasible timetables using group-based operators..

Social software as support in hybrid learning environments: the value of the blog as a tool for reflective learning and peer support. (2007)
Journal Article
Hall, H., & Davison, B. (2007). Social software as support in hybrid learning environments: the value of the blog as a tool for reflective learning and peer support. Library and Information Science Research, 29(2), 163-187. https://doi.org/10.1016/j.lisr.2007.04.007

This article reports on an investigation of blog technology's potential for encouraging interaction between students, and its consequences in terms of peer learning and peer support, on a module of an accredited library and information science (LIS)... Read More about Social software as support in hybrid learning environments: the value of the blog as a tool for reflective learning and peer support..

Simulation of robustness against lesions of cortical networks (2007)
Journal Article
Kaiser, M., Martin, R., Andras, P., & Young, M. P. (2007). Simulation of robustness against lesions of cortical networks. European Journal of Neuroscience, 25(10), 3185-3192. https://doi.org/10.1111/j.1460-9568.2007.05574.x

Structure entails function, and thus a structural description of the brain will help to understand its function and may provide insights into many properties of brain systems, from their robustness and recovery from damage to their dynamics and even... Read More about Simulation of robustness against lesions of cortical networks.

Risk Modelling at the Pre-Proposal Stages of eGovernment Service Projects (2007)
Thesis
Evangelidis, A. Risk Modelling at the Pre-Proposal Stages of eGovernment Service Projects. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7309

eGovernment is a relatively new, but rapidly expanding, domain; mainly due to the perceived outcomes that it may bring to the public administration. Founded on the premise that eGovernment programmes may increase efficiency and effectiveness, decreas... Read More about Risk Modelling at the Pre-Proposal Stages of eGovernment Service Projects.

Mobile IP conditional binding update. (2007)
Presentation / Conference Contribution
Romdhani, I., & Al-Dubai, A. (2007). Mobile IP conditional binding update. In 1st IEEE Workshop on Autonomic Communication and Network Management ACNM-2007, 10th IFIP/IEEE Symposium on Integrated Management (64-70)

Mobile IP protocols use a correspondent registration procedure between a Mobile Node (MN) and its Correspondent Nodes (CNs) to maintain a valid and up-to-date binding association between MN’s home address and its current care-ofaddress whenever a han... Read More about Mobile IP conditional binding update..