Skip to main content

Research Repository

Advanced Search

All Outputs (55)

A minimal jerk prosthesis control system. (2005)
Presentation / Conference Contribution
Hill, S. S., Binnie, D., & Gow, D. J. (2005). A minimal jerk prosthesis control system. In Proceedings of the MEC’05 conference, UNB; 2005

Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification (2005)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2005). Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. In W. Hutchinson (Ed.),

This paper presents a novel framework for network security, and provides a complete solution to integrated security policies, which meets the objectives of an organisation, and also an automated verification process. The framework uses a security com... Read More about Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification.

Coordinated parallel views for the exploratory analysis of microarray time-course data. (2005)
Presentation / Conference Contribution
Craig, P., Kennedy, J., & Cumming, A. (2005). Coordinated parallel views for the exploratory analysis of microarray time-course data. . https://doi.org/10.1109/CMV.2005.5

Microarray time-course data relate to the recorded activity of thousands of genes, in parallel, over multiple discrete points in time during a biological process. Existing techniques that attempt to support the exploratory analysis of this data rely... Read More about Coordinated parallel views for the exploratory analysis of microarray time-course data..

Online assessment and checking of SQL: detecting and preventing plagiarism. (2005)
Presentation / Conference Contribution
Russell, G., & Cumming, A. (2005). Online assessment and checking of SQL: detecting and preventing plagiarism.

The automatic checking of online assessments and tutorials offers a significant advantage to students. Such students can work out-of-hours, from home or work, managing their own time allocation. This allows formal practical sessions to concentrate on... Read More about Online assessment and checking of SQL: detecting and preventing plagiarism..

On the performance of broadcast algorithms in interconnection networks. (2005)
Presentation / Conference Contribution
Al-Dubai, A., & Ould-Khaoua, M. (2005). On the performance of broadcast algorithms in interconnection networks. . https://doi.org/10.1109/ICPPW.2005.63

Broadcast Communication is among the most primitive collective capabilities of any message passing network. Broadcast algorithms for the mesh have been widely reported in the literature. However, most existing algorithms have been studied within limi... Read More about On the performance of broadcast algorithms in interconnection networks..

Scenario based generative component adaptation in .NET framework (2005)
Presentation / Conference Contribution
Wang, B., Xiaodong Liu, X., Kerridge, J., & Li, Y. (2004, November). Scenario based generative component adaptation in .NET framework. Presented at 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004., Las Vegas, NV, USA

Mismatches between pre-quaZi$ed existing components and the particular reuse context in applicutions have been a major factor hindering component reusability. Although component adaptation has octed as a key solution of eliminating these mismatch... Read More about Scenario based generative component adaptation in .NET framework.

An advisory system for the treatment of kidney stones. (2005)
Presentation / Conference Contribution
Hardy, J., & Armitage, A. (2005, May). An advisory system for the treatment of kidney stones. Paper presented at Natural Computing Applications Forum

Kidney stones can be treated by a number of methods, some more invasive than others. Increasingly, Shock Wave Lithotripsy (a non-invasive technique) is used in preference to surgery. However, the kidney stones can recur. This study was done in conjun... Read More about An advisory system for the treatment of kidney stones..

Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing (2005)
Presentation / Conference Contribution
Migas, N., & Buchanan, W. J. (2005, April). Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing. Presented at 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'05), Greenbelt, MD, USA

Ad-hoc wireless networks, which use ad-hoc routing methods may prove a good solution in certain applications, especially where networks have to be constructed where there is no possibly of creating a network backbone, and in emergency situations. The... Read More about Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing.

KM, culture and compromise: Devising practical interventions to promote knowledge sharing in corporate environments (2005)
Presentation / Conference Contribution
Hall, H. (2005, March). KM, culture and compromise: Devising practical interventions to promote knowledge sharing in corporate environments. Paper presented at European Business Information Conference

The attached document summarises the main points to be covered by Hazel Hall in the first part of breakout session B2. Setting the context: how research informs practice. Invited paper presentation Presentation slides can be found on slidesh... Read More about KM, culture and compromise: Devising practical interventions to promote knowledge sharing in corporate environments.

Enhanced Methods of Coursework Provision in Computer Networks. (2005)
Presentation / Conference Contribution
Buchanan, W. J., & Saliou, L. (2005). Enhanced Methods of Coursework Provision in Computer Networks. In ITRE 2004. 2nd International Conference Information Technology: Research and Education (111-115). https://doi.org/10.1109/ITRE.2004.1393657

Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from students for increased amounts of hands-on, practical work. This paper pres... Read More about Enhanced Methods of Coursework Provision in Computer Networks..

Visual perception of content-prioritised sign language video quality. (2005)
Presentation / Conference Contribution
Muir, L. J., Richardson, I. E. G., & Hamilton, K. (2005, April). Visual perception of content-prioritised sign language video quality. Presented at The IEE International Conference on Visual Information Engineering (VIE 2005)

Video communication systems currently provide poor quality and performance for deaf people using sign language, particularly at low bit rates. Our previous work, involving eye movement tracking experiments and analysis of visual attention mechanisms... Read More about Visual perception of content-prioritised sign language video quality..

Computerization movements as a frame for E-Government studies. (2005)
Presentation / Conference Contribution
Davenport, E., & Horton, K. (2005, January). Computerization movements as a frame for E-Government studies. Paper presented at Social Informatics Workshop: Extending the Contributions of Professor Rob Kling to the Analysis of Computerization Movements