Skip to main content

Research Repository

Advanced Search

An Affordance-based Framework for CVE Evaluation (2002)
Presentation / Conference Contribution
Turner, P., & Turner, S. (2002, December). An Affordance-based Framework for CVE Evaluation. Presented at Human computer interaction (Annual conference) 2002, London, England

We argue that a conceptual framework is required to support the
practical evaluation of collaborative virtual environments. We propose
such a framework based on an extended, three level concept of
affordance. The application of the framework is il... Read More about An Affordance-based Framework for CVE Evaluation.

Towards a scalable broadcast in wormhole-switched mesh networks (2002)
Presentation / Conference Contribution
Al-Dubai, A. Y., Ould-Khaoua, M., & Mackenzie, L. M. (2002, March). Towards a scalable broadcast in wormhole-switched mesh networks. Presented at 2002 ACM symposium on Applied computing - SAC '02, Madrid, Spain

Broadcast algorithms for wormhole--switched meshes have been widely reported in the literature. However, most of these
algorithms handle broadcast in a sequential manner and do not scale well with the network size. As a consequence, many parallel ap... Read More about Towards a scalable broadcast in wormhole-switched mesh networks.

Towards reusable and reconfigurable models for the WWW (2002)
Presentation / Conference Contribution
Brown, E., & Buchanan, W. (2002, August). Towards reusable and reconfigurable models for the WWW. Presented at 26th Annual International Computer Software and Applications, Oxford, UK

Reuse and component design have extensively been applied to software engineering, but reuse and formal design methods in WWW-based system is still in its infancy. Most WWW developers currently design WWW content for the most efficient delivery and do... Read More about Towards reusable and reconfigurable models for the WWW.

An investigation into virtual representations of real places. (2002)
Presentation / Conference Contribution
Arnspang, J., Benyon, D., Fahle, M., Granum, E., Madsen, C., Pajdla, T., Peleg, S., Smyth, M., Turner, P., Turner, S., & Weinshall, D. (2002, October). An investigation into virtual representations of real places. Presented at Fifth Annual International Workshop on Presence

The paper describes the main themes of a recently funded research project under the European Communitys Future and Emerging Technologies Presence initiative. The aim of the research is to develop new tools for empirical and theoretical studies of pre... Read More about An investigation into virtual representations of real places..

Solving a real world routing problem using multiple evolutionary algorithms. (2002)
Presentation / Conference Contribution
Urquhart, N. B., Ross, P., Paechter, B., & Chisholm, K. (2002, September). Solving a real world routing problem using multiple evolutionary algorithms. Presented at 7th International Conference PPSN: International Conference on Parallel Problem Solving from Nature-, Granada, Spain

This paper investigates the solving of a real world routing problem using evolutionary algorithms embedded within a Multi-agent system (MAS). An architecture for the MAS is proposed and mechanisms for controlling the interactions of agents are invest... Read More about Solving a real world routing problem using multiple evolutionary algorithms..

Telling Tales: Narratives Of Classification And Control In The Design Of Taxonomic Software. (2002)
Presentation / Conference Contribution
Turner, S., Turner, P., Raguenaud, C., & Kennedy, J. (2002, September). Telling Tales: Narratives Of Classification And Control In The Design Of Taxonomic Software. Presented at Design Research Society Conference: Common Ground, September, 2002

This paper draws on concepts from the structuralist analysis of narrative to explore aspects of
the role of stories in the small group design process. A brief review of relevant narratological
concepts is provided. Their application in a preliminar... Read More about Telling Tales: Narratives Of Classification And Control In The Design Of Taxonomic Software..

Invisibility Vs Transparency (2002)
Presentation / Conference Contribution
Smith, E., Macintosh, A., & Whyte, A. (2002, September). Invisibility Vs Transparency. Presented at HCI 2002

Invisibility vs transparency.

Representations in Human-Computer Systems development. (2002)
Journal Article
Benyon, D. (2002). Representations in Human-Computer Systems development. Cognition, Technology and Work, 4, 180-196. https://doi.org/10.1007/s101110200017

When system developers design a computer system (or other information artefact), they must inevitably make judgements as to how to abstract the domain and how to represent this abstraction in their designs. Over the years human–computer interaction,... Read More about Representations in Human-Computer Systems development..

Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report (2002)
Presentation / Conference Contribution
Al-Dubai, A., & Ould-Khaoua, M. (2001, April). Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report. Presented at 20th IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, USA

Broadcast is an important collective communication operation required by many real-world parallel applications. This paper proposes the Coded Path Routing (or CPR for short) as a new approach for designing efficient broadcast algorithms for wormhole-... Read More about Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report.

An intelligent agent security intrusion system (2002)
Presentation / Conference Contribution
Pikoulas, J., Buchanan, W., Mannion, M., & Triantafyllopoulos, K. (2002, April). An intelligent agent security intrusion system. Presented at Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, Lund, Sweden

Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing network, thus they must be protected at different levels of the OSI mo... Read More about An intelligent agent security intrusion system.

A distributed resource evolutionary algorithm machine. (2002)
Presentation / Conference Contribution
Paechter, B., Baeck, T., Schoenauer, M., Eiben, A. E., Merelo GuervĂłs, J. J., Sebag, M., & Fogarty, T. C. (2000, July). A distributed resource evolutionary algorithm machine. Presented at 2000 Congress on Evolutionary Computation

This paper describes a project funded by the
European Commission’ which seeks to provide the
technology and software infrastructure necessary to
support the next generation of evolving infohabitants in
a way that makes that infrastructure univers... Read More about A distributed resource evolutionary algorithm machine..

Managing complex taxonomic data in an object-oriented database. (2002)
Thesis
Raguenaud, C. Managing complex taxonomic data in an object-oriented database. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/6572

This thesis addresses the problem of multiple overlapping classifications in object-oriented databases through the example of plant taxonomy. These multiple overlapping classifications are independent simple classifications that share information (no... Read More about Managing complex taxonomic data in an object-oriented database..

Internet simulations for teaching, learning and research: an investigation of e-commerce interactions and practice in the Virtual Economy. (2002)
Journal Article
Horton, K., Davenport, E., Hall, H., & Rosenbaum, H. (2002). Internet simulations for teaching, learning and research: an investigation of e-commerce interactions and practice in the Virtual Economy. Education for Information, 20(3/4), 237-252

In this paper we report upon the Virtual Economy (VE), an Internet simulation which operated for the first time in Spring 2000 involving students at Indiana University, USA and at Napier University, Edinburgh, UK. During 2001, the VE was extended to... Read More about Internet simulations for teaching, learning and research: an investigation of e-commerce interactions and practice in the Virtual Economy..

An efficient adaptive broadcast algorithm for the mesh network (2001)
Presentation / Conference Contribution
Al-Dubai, A., & Ould-Khaoua, M. (2001, June). An efficient adaptive broadcast algorithm for the mesh network

Most existing broadcast algorithms proposed for the mesh do not scale well with the network size. Furthermore, they have been mainly based on deterministic routing, which cannot exploit the alternative paths provided by mesh topology to reduce commun... Read More about An efficient adaptive broadcast algorithm for the mesh network.

Towards optimal broadcasting in wormhole-routed meshes (2001)
Presentation / Conference Contribution
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2001, June). Towards optimal broadcasting in wormhole-routed meshes. Presented at PDPTA '2001

Most existing broadcast algorithms proposed for the mesh do not scale well with the network size. Furthermore, they have been mainly based on deterministic routing, which cannot exploit the alternative paths provided by mesh topology to reduce commun... Read More about Towards optimal broadcasting in wormhole-routed meshes.

Investigating ubiquitous computing in the home. (2001)
Presentation / Conference Contribution
Baillie, L., & Benyon, D. (2001, September). Investigating ubiquitous computing in the home

In this paper, we describe a series of workshops which were carried out in homes of five
families in Scotland. The aim of the workshops was to explore the requirements that people have for
new technologies in a household environment. The workshops... Read More about Investigating ubiquitous computing in the home..

An agent based Bayesian forecasting model for enhanced network security. (2001)
Presentation / Conference Contribution
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001, April). An agent based Bayesian forecasting model for enhanced network security. Presented at ECBS 2001

Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and validation. They also tend to be centralized in their approach which makes... Read More about An agent based Bayesian forecasting model for enhanced network security..