Dynamic evolution of service architecture in mobile cloud applications.
(2012)
Presentation / Conference Contribution
Zhao, H., Sun, J., & Liu, X. (2012, April). Dynamic evolution of service architecture in mobile cloud applications. Presented at 2nd International Conference on Cloud Computing and Services Science, CLOSER 2012, Port, Portugal
Outputs (160)
Software reuse in the emerging cloud computing era. (2012)
Book
Yang, H., & Liu, X. (2012). Software reuse in the emerging cloud computing era. IGI Global Publishing. https://doi.org/10.4018/978-1-4666-0897-9With the rapid development of computing hardware, high-speed network, web programming, distributed and parallel computing, and other technologies, cloud computing has recently emerged as a commercial reality. Software Reuse in the Emerging Cloud Comp... Read More about Software reuse in the emerging cloud computing era..
A new analytical model for multi-hop cognitive radio networks (2012)
Journal Article
Wu, Y., Min, G., & Al-Dubai, A. (2012). A new analytical model for multi-hop cognitive radio networks. IEEE Transactions on Wireless Communications, 11, 1643-1648. https://doi.org/10.1109/TWC.2012.030812.111106The cognitive radio (CR) is an emerging technique for increasing the utilisation of communication resources by allowing the unlicensed users to employ the under-utilised spectrum. In this paper, a new analytical performance model is developed to eval... Read More about A new analytical model for multi-hop cognitive radio networks.
Smart meter technology tradeoffs. (2012)
Presentation / Conference Contribution
Wigan, M. (2012, October). Smart meter technology tradeoffsSmart meters have become a matter of concern for
many populations, although the technology is as always
politically neutral. The focus on electricity rather than all
metered services, water, gas and electricity is one aspect of this
public concer... Read More about Smart meter technology tradeoffs..
Evolution pattern for service evolution in clouds. (2012)
Presentation / Conference Contribution
Wang, Z., Liu, X., & Chalmers, K. (2012, December). Evolution pattern for service evolution in cloudsThe proposed research will focus on
developing a novel approach to solve Software Service
Evolution problems in Computing Clouds. The
approach will support dynamic evolution of the
software service in clouds via a set of discovered
evolution pat... Read More about Evolution pattern for service evolution in clouds..
Implementation and evaluation of a botnet analysis and detection method in a virtual environment (2012)
Thesis
Waheed, S. Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/5667Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a form of malware controlled by a Botmaster using Command and Control (C&C).... Read More about Implementation and evaluation of a botnet analysis and detection method in a virtual environment.
Novel tracking of rogue network packets using danger theory approach (2012)
Journal Article
Uwagbole, S., Buchanan, W. J., & Fan, L. (2012). Novel tracking of rogue network packets using danger theory approach. Proceedings of the ... international conference on information warfare and security, 277-286Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hacking groups, such as Anonymous and Lulzsec. These groups often aim to disrupt computer networks and gain access to private confidential data. A typica... Read More about Novel tracking of rogue network packets using danger theory approach.
Enlightened trial and error (2012)
Journal Article
Turner, P., Turner, S., & Flint, T. (2012). Enlightened trial and error. Interaction Design and Architecture(s) IxDetA, 13/14, 64-83Human-computer interaction as a rationalistic, engineering discipline has been taught successfully for more than 25 years. The established narrative is one of designing usable systems for users, some of whom have been described as “naïve”, safely ins... Read More about Enlightened trial and error.
Sketching concatenative synthesis: audiovisual Isomorphism in reduced modes. (2012)
Presentation / Conference Contribution
Tsiros, A., LePlâtre, G., & Smyth, M. (2012, July). Sketching concatenative synthesis: audiovisual Isomorphism in reduced modes. Presented at 9th Sound and Music Computing ConferenceThis paper presents a prototype allowing the control of a
concatenative synthesis algorithm using a 2D sketching
interface. The design of the system is underpinned by a
preliminary discussion in which isomorphisms between
auditory and visual phen... Read More about Sketching concatenative synthesis: audiovisual Isomorphism in reduced modes..
E-Health: chances and challenges of distributed, service oriented architectures (2012)
Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012). E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remain affordable for governments and individuals. Mobile technology and cloud c... Read More about E-Health: chances and challenges of distributed, service oriented architectures.