Skip to main content

Research Repository

Advanced Search

Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010, July). Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes. Presented at 2010 IEEE International Conference on Web Services

Context-awareness and adaptability are important and desirable properties of service-based processes designed to provide personalized services. Most of the existing approaches focus on the adaptation at the process instance level [1] which involves e... Read More about Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes.

Split Second Motion Blur (2010)
Presentation / Conference Contribution
Ritchie, M., Modern, G., & Mitchell, K. (2010, July). Split Second Motion Blur. Presented at GRAPHInternational Conference on Computer Graphics and Interactive Techniques

Motion blur is key to delivering a sense of speed in interactive video game rendering. Further, simulating accurate camera optical exposure properties and reduction of temporal aliasing brings us closer to high quality real-time rendering productions... Read More about Split Second Motion Blur.

Comparative study on connected component labeling algorithms for embedded video processing systems. (2010)
Presentation / Conference Contribution
Walczyk, R., Armitage, A., & Binnie, D. (2010, July). Comparative study on connected component labeling algorithms for embedded video processing systems. Presented at The 2010 International Conference on Image Processing, Computer Vision, and Pattern Recognition

The objective of this paper is to carry out a detailed analysis of the most popular connected components labeling (CCL) algorithms for binary images. This study investigates their usability for processing streaming data and suitability for implementa... Read More about Comparative study on connected component labeling algorithms for embedded video processing systems..

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems (2010)
Presentation / Conference Contribution
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010, July). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. Presented at European Conference on Information Warfare and Security, Thessaloniki

There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat such threats, multiple lines of defence are applied to a network including... Read More about Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems.

Intrusion detection using GSAD model for HTTP traffic on web services (2010)
Presentation / Conference Contribution
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. P. (2010, June). Intrusion detection using GSAD model for HTTP traffic on web services. Presented at Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ - IWCMC '10

Intrusion detection systems are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. Hypertext Transport Protocol (HTTP) is used for new applications without much interference. In this paper, w... Read More about Intrusion detection using GSAD model for HTTP traffic on web services.

FPGA implementation of hot spot detection in infrared video. (2010)
Presentation / Conference Contribution
Walczyk, R., Armitage, A., & Binnie, D. (2010, June). FPGA implementation of hot spot detection in infrared video. Paper presented at IET Irish Systems & Signals Conference

This paper describes a Hardware Description Language (HDL) based fully customizable module for real-time infrared (IR) hot spot detection and feature extraction from a video stream. The aim of the research was to investigate and evaluate possible sol... Read More about FPGA implementation of hot spot detection in infrared video..

Manipulation and optimization techniques for Boolean logic (2010)
Journal Article
Al-Jassani, B. A., Urquhart, N. B., & Almaini, A. E. A. (2010). Manipulation and optimization techniques for Boolean logic. IET computers & digital techniques / IET, 4, 227-239. https://doi.org/10.1049/iet-cdt.2009.0007

In this study, new techniques and algorithms are presented for the derivation and optimisation of mixed polarity Reed Muller (MPRM) and mixed polarity dual Reed Muller (MPDRM) functions. The first algorithm is used for bidirectional conversion betwee... Read More about Manipulation and optimization techniques for Boolean logic.

Experimental host-and network-based analyser and detector for Botnets (2010)
Thesis
Jacob, B. Experimental host-and network-based analyser and detector for Botnets. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4026

Botnets are networks of malware-infected machines that are controlled by an adversary are the cause of a large number of problems on the internet [1]. They are increasing faster than any other type of malware and have created a huge army of hosts ove... Read More about Experimental host-and network-based analyser and detector for Botnets.

A new probabilistic Linear Exponential Backoff scheme for MANETs (2010)
Presentation / Conference Contribution
Yassein, M. B., Manaseer, S., Al-hassan, A. A., Taye', Z. A., & Al-Dubai, A. Y. (2010, April). A new probabilistic Linear Exponential Backoff scheme for MANETs. Presented at 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), Atlanta, USA

Broadcasting is an essential operation in Mobile ad hoc Networks (MANETs) environments. It is used in the initial phase of route discovery process in many reactive protocols. Although broadcasting is simple, it causes the well known broadcast storm p... Read More about A new probabilistic Linear Exponential Backoff scheme for MANETs.

New network paradigms (2010)
Book
(2010). E. Altman, T. Basar, E. Hart, D. Miorandi, A. Moustakas, & S. Toumpis (Eds.), New network paradigms. Elsevier

Spaces of interaction (2010)
Presentation / Conference Contribution
Benyon, D., Hook, K., & Nigay, L. (2010, April). Spaces of interaction. Presented at ACM-BCS Visions of Computer Science 2010 International Academic Research Conference, The University of Edinburgh

As the world becomes increasingly computationally enabled, so our view of human-computer interaction (HCI) needs to evolve. The proliferation of wireless connectivity and mobile devices in all their various forms moves people from being outside a com... Read More about Spaces of interaction.

Alting barriers: synchronisation with choice in Java using JCSP (2010)
Journal Article
Welch, P., Brown, N., Moores, J., Chalmers, K., & Sputh, B. (2010). Alting barriers: synchronisation with choice in Java using JCSP. Concurrency and Computation: Practice and Experience, 22(8), 1049-1062. https://doi.org/10.1002/cpe.1471

Communicating Sequential Processes for Java (JCSP) is a mature library that implements CSP-derived concurrency primitives in Java. A JCSP system is a hierarchical network of autonomous processes communicating over synchronous (optionally buffered) ch... Read More about Alting barriers: synchronisation with choice in Java using JCSP.

Novel information sharing architecture between the Police and their community partners. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., & Lawson, A. (2010, February). Novel information sharing architecture between the Police and their community partners. Presented at Scottish Networking Event 2010

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing architecture between the Police and their community partners..

Tradeoffs between latency, complexity and load balancing with multicast algorithms (2010)
Journal Article
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2010). Tradeoffs between latency, complexity and load balancing with multicast algorithms. IEEE Transactions on Computers, 59, 159-173. https://doi.org/10.1109/TC.2009.104

The increasing number of collective communication-based services with a mass interest and the parallel increasing demand for service quality are paving the way toward end-to-end QoS guarantees. Although many multicast algorithms in interconnection ne... Read More about Tradeoffs between latency, complexity and load balancing with multicast algorithms.

User experience at Edinburgh Napier University. (2010)
Presentation / Conference Contribution
Turner, S., & Turner, P. (2010, February). User experience at Edinburgh Napier University. Paper presented at BCS workshop on user experience competencies

Using real-world geospatial data with evolutionary algorithms. (2010)
Presentation / Conference Contribution
Urquhart, N. B. (2010, January). Using real-world geospatial data with evolutionary algorithms. Paper presented at Universities' Transport Study Group

Developments in the field of Geographical Information Systems (GIS) have increased the availability of on-line road network data and associated routing services. The ability to integrate such data and services into web sites and other business system... Read More about Using real-world geospatial data with evolutionary algorithms..

The end of cognition? (2009)
Journal Article
Turner, P. (2009). The end of cognition?. Human Technology: An Interdisciplinary Journal on Humans in ICT Environments, 5, 5-11