Skip to main content

Research Repository

Advanced Search

Outputs (4095)

An analysis of the dynamics of British academic science (2007)
Report
Andras, P., Herald, N. D., & Charlton, B. (2007). An analysis of the dynamics of British academic science. Newcastle-upon-Tyne: Newcastle University

We analysed the ranking and market share dynamics of main British universities based on their research output production (publications and citations). The data that we analysed is dominated very much by research output in natural and medical sciences... Read More about An analysis of the dynamics of British academic science.

KM, culture and compromise: interventions to promote knowledge sharing supported by technology in corporate environments (2007)
Journal Article
Hall, H., & Goody, M. (2007). KM, culture and compromise: interventions to promote knowledge sharing supported by technology in corporate environments. Journal of Information Science, 33(2), 181-188. https://doi.org/10.1177/0165551506070708

The theme of knowledge sharing is discussed extensively in the knowledge management literature. Such work tends to focus on the barriers that impede knowledge sharing activity. Of these “culture” is commonly cited as a major obstacle. This article ex... Read More about KM, culture and compromise: interventions to promote knowledge sharing supported by technology in corporate environments.

Endangered Sounds (2007)
Digital Artefact
McGregor, I., Baker, N., Fanshawe, S., Jarvis, R., Sweet, R., White, P., O'Donoghue, G., Woodward, S., & Maunder, M. (2007). Endangered Sounds. [Radio Programme]

The melodramatic clang of the old style police car bell, the tranquil tick of a grandfather clock; the warm purr of the old dialling tone - all formerly familiar, all under threat of extinction or already consigned to the sound file marked nostalgia.... Read More about Endangered Sounds.

Designing with blends: Conceptual foundations of human-computer interaction and software engineering methods. (2007)
Book
Imaz, M., & Benyon, D. (2007). Designing with blends: Conceptual foundations of human-computer interaction and software engineering methods. MIT Press

This work talks about how recent research in cognitive science offers new ways to understand the interaction of people and computers and develops a new literacy for well-informed, sensitive software design. The evolution of the concept of mind in cog... Read More about Designing with blends: Conceptual foundations of human-computer interaction and software engineering methods..

Performance of deterministic and adaptive broadcast algorithms in multicomputer networks (2006)
Journal Article
Al-Dubai, A. (2006). Performance of deterministic and adaptive broadcast algorithms in multicomputer networks. International Journal of High Performance Computing and Networking, 4, 152-160. https://doi.org/10.1504/IJHPCN.2006.010637

This paper examines the performance of broadcast communication on multicomputer networks. Unlike many existing works, this study considers a number of key factors/prosperities, including scalability, parallelism and routing scheme that could greatly... Read More about Performance of deterministic and adaptive broadcast algorithms in multicomputer networks.

Navigating information space: web site design and lessons from the built environment. (2006)
Journal Article
Benyon, D. (2006). Navigating information space: web site design and lessons from the built environment. PsychNology journal, 4, 7-24

The Web is the archetypal information space but even on a well designed site it can be difficult to find all the information you need. It is impossible to design a site so that all the information needs of all the users of the site are satisfied on a... Read More about Navigating information space: web site design and lessons from the built environment..

Enhancing intrusion detection via an active target host. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006, December). Enhancing intrusion detection via an active target host. Presented at IEEE ICTe 2006

Over the past decade, there have been increases in network attacks. These attacks are typically at-tempts to compromise the integrity, confidentiality or availability of networked resources. In other to reduce these attacks, Intrusion Detection Syste... Read More about Enhancing intrusion detection via an active target host..

A framework to detect novel computer viruses via system calls. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006, December). A framework to detect novel computer viruses via system calls. Presented at 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting

This paper describes a framework for detecting self-propagating email viruses based on deterministic system calls derived from associated email client’s dynamic link libraries (DLLs). Our research approach is based on the principle that a key objecti... Read More about A framework to detect novel computer viruses via system calls..

Agent-based systems for Ad-hoc routing. (2006)
Presentation / Conference Contribution
Buchanan, W. J., Migas, N., & McArtney, K. (2006, April). Agent-based systems for Ad-hoc routing. Presented at BCS Symposium on Intelligence in Security and Forensic Computing

Provides a foundation in agent-based systems for Ad-hoc routing.