Skip to main content

Research Repository

Advanced Search

Architectures for persistence (1993)
Journal Article
Russell, G., & Cockshott, W. P. (1993). Architectures for persistence. Microprocessors and Microsystems, 17(3), 117-130. https://doi.org/10.1016/0141-9331%2893%2990042-6

Persistent object oriented architectures have been researched for many years, deriving initially from the Manchester University Atlas machine. In reality, however, few actual implementations of persistent architectures exist. In the first half of thi... Read More about Architectures for persistence.

Control of a large massively parallel database machine using SQL catalogue extensions, and a DSDL in preference to an operating system (1992)
Presentation / Conference Contribution
Unwalla, M., & Kerridge, J. (1992, July). Control of a large massively parallel database machine using SQL catalogue extensions, and a DSDL in preference to an operating system. Presented at Advanced Database Systems: 10th British National Conference on Databases, BNCOD 10, Aberdeen, Scotland

The IDIOMS parallel database machine supports large applications where integrated OLTP and MIS is required. It can be considered a relational engine, and SQL is used as the MIS query language. We make some comparisons between IDIOMS and other databas... Read More about Control of a large massively parallel database machine using SQL catalogue extensions, and a DSDL in preference to an operating system.

Simulation of three-dimensional finite-difference time-domain method on limited memory systems. (1991)
Presentation / Conference Contribution
Buchanan, W. J., & Gupta, N. K. (1991, November). Simulation of three-dimensional finite-difference time-domain method on limited memory systems. Presented at International Conference on Computation in Electromagnetics

The authors discuss techniques in the modelling of electromagnetic fields using finite difference time domain (FDTD) methods applied to 80Ă—86-based PCs or limited memory computers. Electrical modelling of structures is currently carried out mainly in... Read More about Simulation of three-dimensional finite-difference time-domain method on limited memory systems..

The Design of the IDIOMS Parallel Database Machine (1991)
Presentation / Conference Contribution
Kerridge, J. M. (1991, December). The Design of the IDIOMS Parallel Database Machine. Presented at 9th British National Conference on Databases (BNCOD), Wolverhampton Polytechnic, UK

Design, abstract data types and occam (1989)
Presentation / Conference Contribution
Kerridge, J., Wright, S., & Oates, R. (1989, April). Design, abstract data types and occam. Presented at 10th Occam User Group Technical Meeting, Enschede, The Netherlands

A design methodology is presented whereby abstract data types are mapped onto occam processes. For each function a command and reply protocol is specified. Attention is paid to the formal specification. The method may be useful in obtaining a paralle... Read More about Design, abstract data types and occam.

Towards a Tool Kit For the Systems Analyst (1987)
Journal Article
Benyon, D., & Skidmore, S. (1987). Towards a Tool Kit For the Systems Analyst. Computer Journal, 30(1), 2-7. https://doi.org/10.1093/comjnl/30.1.2

A review of the major systems analysis methodologies is undertaken in order to examine the aspects of information systems (IS) which they seem best able to represent. The importance of a collection of techniques – the analyst's tool kit – is stressed... Read More about Towards a Tool Kit For the Systems Analyst.

Communicating parallel processes (1986)
Journal Article
Kerridge, J., & Simpson, D. (1986). Communicating parallel processes. Software: Practice and Experience, 16(1), 63-86. https://doi.org/10.1002/spe.4380160106

By considering the problem of an event timer it is shown that the commonly available synchronizing facilities (monitors, CSP, distributed processes) are not able to always satisfactorily model the requirements of several processes which must run in p... Read More about Communicating parallel processes.

British Computer Society / CODASYL Data Base Administration Working Group (DBAWG): An Architecture and Language Syntax for Distributed Databases for the Network Model. (1984)
Presentation / Conference Contribution
Alexander, H. H., Beetstra, T., Bell, D., Cannan, S. J., Dee, E. G., Doyle, P., Fitzgerald, G., French, C., Jefferys, J. O., Kerridge, J. M., Pilgrim, W. R., Rabone, D., Ras, F. G., Reilly, M., Robinson, H. M., Stacey, G. M., & Weatherhead, A. J. (1984, January). British Computer Society / CODASYL Data Base Administration Working Group (DBAWG): An Architecture and Language Syntax for Distributed Databases for the Network Model

Open-loop transversal equaliser of optimal length (1983)
Journal Article
Rutter, M., & Cowan, C. F. N. (1983). Open-loop transversal equaliser of optimal length. Electronics Letters, 19, 208-210. https://doi.org/10.1049/el%3A19830144

As a rule, in equaliser training algorithms complexity
increases with efficiency. Unfortunately, complex recursive
algorithms do not suit high-bandwidth systems. This letter
describes a nonrecursive technique for the derivation of the
weight vect... Read More about Open-loop transversal equaliser of optimal length.

IoT for a shock warning system
Preprint / Working Paper
Brogan, J., Thuemmler, C., Mival, O., & Fricker, S. IoT for a shock warning system

This technical paper details the interdependencies between Internet of Things (IoT) and latest Future Internet (FI) technology, demonstrated by using the example of a smart connected health (SCH) use case, for the monitoring and prevention of shock i... Read More about IoT for a shock warning system.

Who would you trust to identify you in accessing your health record?
Presentation / Conference Contribution
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., Fan, L., Lo, O., & Lawson, A. Who would you trust to identify you in accessing your health record?

Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper outlines a joint project between Edinburgh Napier University and miiCard [10]... Read More about Who would you trust to identify you in accessing your health record?.