Skip to main content

Research Repository

Advanced Search

Outputs (4095)

Sound and soundscape classification: Establishing key auditory dimensions and their relative importance (2006)
Presentation / Conference Contribution
McGregor, I., LePlâtre, G., Crerar, A., & Benyon, D. (2006, June). Sound and soundscape classification: Establishing key auditory dimensions and their relative importance. Presented at The 12th International Conference on Auditory Display, ICAD2006

This paper investigates soundscape classification by using two different forms of data gathering and two different populations. The first method involves a questionnaire completed by 75 audio professionals. The second uses a speak-aloud experiment, d... Read More about Sound and soundscape classification: Establishing key auditory dimensions and their relative importance.

Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. (2006)
Presentation / Conference Contribution
Graves, J., Buchanan, W. J., Saliou, L., & Old, L. J. (2006, June). Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. Presented at 5th European Conference on Information Warfare and Security (ECIW)

Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers and Intrusion Detection Systems (IDSs) can yield important information, whi... Read More about Performance analysis of network based forensic systems for in-line and out-of-line detection and logging..

Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. (2006)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2006, June). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. Presented at 5th European Conference on Information Warfare and Security

Security in computer networks is typically passive, static, and reactive. This is typically due to most networking devices being rule-based, and when updates are necessary, they are normally done manually. Ultimately, the social and hierarchical stru... Read More about Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations..

Untangling the culture medium of student designers (2006)
Journal Article
Strickfaden, M., Heylighen, A., Rodgers, P., & Neuckermans, H. (2006). Untangling the culture medium of student designers. CoDesign, 2(02), 97-107. https://doi.org/10.1080/15710880600647865

Designs do not occur in a vacuum. They are nourished by a breeding ground composed of various substances, phenomena and traces, which function as raw material for concept generation and ultimately for design. This paper examines the composition and f... Read More about Untangling the culture medium of student designers.

Achieving smooth component integration with generative aspects and component adaptation. (2006)
Presentation / Conference Contribution
Feng, Y., Liu, X., & Kerridge, J. (2006, June). Achieving smooth component integration with generative aspects and component adaptation. Presented at 9th International Conference on Software Reuse, ICSR 2006, Torino, Italy

Due to the availability of components and the diversity of target applications, mismatches between pre-qualified existing components and the particular reuse context in applications are often inevitable and have been a major hurdle of component reusa... Read More about Achieving smooth component integration with generative aspects and component adaptation..

Managing Missed Interactions in Distributed Virtual Environments (2006)
Presentation / Conference Contribution
Parkin, S., Andras, P., & Morgan, G. (2006, May). Managing Missed Interactions in Distributed Virtual Environments. Presented at 12th Eurographics conference on Virtual Environments, Lisbon, Portugal

A scalable distributed virtual environment (DVE) may be achieved by ensuring virtual world objects communicate their actions to only those objects that fall within their influence, reducing the need to send and process unnecessary messages. A missed... Read More about Managing Missed Interactions in Distributed Virtual Environments.

A Hybrid Meta-Heuristic for Multi-Objective Optimization: MOSATS (2006)
Journal Article
Baños, R., Gil, C., Paechter, B., & Ortega, J. (2007). A Hybrid Meta-Heuristic for Multi-Objective Optimization: MOSATS. Journal of Mathematical Modelling and Algorithms, 6(2), 213-230. https://doi.org/10.1007/s10852-006-9041-6

Real optimization problems often involve not one, but multiple objectives, usually in conflict. In single-objective optimization there exists a global optimum, while in the multi-objective case no optimal solution is clearly defined but rather a set... Read More about A Hybrid Meta-Heuristic for Multi-Objective Optimization: MOSATS.

Applying a Web-Service-Based Model to Dynamic Service-Deployment (2006)
Presentation / Conference Contribution
Chrysoulas, C., Haleplidis, E., Haas, R., Denazis, S., & Koyfopavlou, O. (2005, November). Applying a Web-Service-Based Model to Dynamic Service-Deployment. Presented at International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06), Vienna, Austria

Owing to the increase in both heterogeneity and complexity in today's networking systems, the need arises for an architecture for network-based services that provides flexibility and efficiency in the definition, deployment and execution of the servi... Read More about Applying a Web-Service-Based Model to Dynamic Service-Deployment.