Skip to main content

Research Repository

Advanced Search

Outputs (107)

Enhanced Methods of Coursework Provision in Computer Networks. (2005)
Presentation / Conference Contribution
Buchanan, W. J., & Saliou, L. (2004, June). Enhanced Methods of Coursework Provision in Computer Networks. Presented at ITRE 2004. 2nd International Conference Information Technology: Research and Education, London, England, UK

Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from students for increased amounts of hands-on, practical work. This paper pres... Read More about Enhanced Methods of Coursework Provision in Computer Networks..

Analysis and migration of location-finding methods for GSM and 3G networks. (2004)
Presentation / Conference Contribution
Buchanan, W. J., Munoz, J., Manson, R., & Raja, K. A. (2004, October). Analysis and migration of location-finding methods for GSM and 3G networks. Presented at 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on, London

This paper initially reviews the current range of location techniques on GSM networks, such as Cell-ID, GPS, AGPS, time difference of arrival (TDOA) and E-OTD (enhanced observed time difference). It shows how these techniques can be applied to the fu... Read More about Analysis and migration of location-finding methods for GSM and 3G networks..

Covert channel analysis and detection using reverse proxy servers. (2004)
Presentation / Conference Contribution
Buchanan, W. J., & Llamas, D. (2004, June). Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC)

Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls, and most other forms of network intrusion detection systems. In fact, mos... Read More about Covert channel analysis and detection using reverse proxy servers..

An agent based Bayesian forecasting model for enhanced network security. (2001)
Presentation / Conference Contribution
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001, April). An agent based Bayesian forecasting model for enhanced network security. Presented at ECBS 2001

Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and validation. They also tend to be centralized in their approach which makes... Read More about An agent based Bayesian forecasting model for enhanced network security..

Multiple traffic signal control using a genetic algorithm (1999)
Presentation / Conference Contribution
Kalganova, T., Russell, G., & Cumming, A. (1999, December). Multiple traffic signal control using a genetic algorithm. Presented at 4th International Conference on Artificial Neural Networks and Genetic Algorithms, ICANNGA '99

Optimising traffic signal timings for a multiple-junction road network is a difficult but important problem. The essential difficulty of this problem is that the traffic signals need to coordinate their behaviours to achieve the common goal of optimi... Read More about Multiple traffic signal control using a genetic algorithm.

Lightweight threads for portable software (1993)
Presentation / Conference Contribution
Russell, G. (1993, January). Lightweight threads for portable software. Presented at Networking-the Next Generation, UKUUG/SUKUG Conference

No abstract available.