Skip to main content

Research Repository

Advanced Search

Evolution pattern verification for services evolution in clouds with model driven architecture. (2013)
Journal Article
Wang, Z., Chalmers, K., & Liu, X. (2013). Evolution pattern verification for services evolution in clouds with model driven architecture. International Journal for e-Learning Security, 3, 340-349. https://doi.org/10.20533/ijels.2046.4568.2013.0042

In this paper we will provide some discovered evolution patterns and its detailed underlying constitution components. Following the featured orientated model driven product line engineering approach for service evolution in clouds, an analysis on... Read More about Evolution pattern verification for services evolution in clouds with model driven architecture..

The “Book Problem” and its neural correlates (2013)
Journal Article
Turner, P. (2013). The “Book Problem” and its neural correlates. AI & society, https://doi.org/10.1007/s00146-013-0491-x

Presence research can tell us why we feel present in the real world and can experience presence while using virtual reality technology (and movies and games) but has strikingly less to say on why we feel present in the scenes described in a book. Jus... Read More about The “Book Problem” and its neural correlates.

How we cope with digital technology. (2013)
Journal Article
Turner, P. (2013). How we cope with digital technology. Synthesis lectures on human-centered informatics, 6(3), 1-109. https://doi.org/10.2200/S00519ED2V01Y201307HCI018

Digital technology has become a defining characteristic of modern life. Almost everyone uses it, we all rely on it, and many of us own a multitude of devices. What is more, we all expect to be able to use these technologies “straight out the box.” Th... Read More about How we cope with digital technology..

A scaleable and trusted e-Health eco-system: safi.re (2013)
Presentation / Conference Contribution
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April). A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013

At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main components: a trust framework; governance rules; and strong access controls. The sys... Read More about A scaleable and trusted e-Health eco-system: safi.re.

The challenges of Big Data: future risks, governance and trust. (2013)
Presentation / Conference Contribution
Buchanan, W. J. (2013, March). The challenges of Big Data: future risks, governance and trust. Paper presented at The Future of Cyber Security 2013

The emphasis in computer security is moving from end point security towards data controls, and this is becoming an increasing threat as we move into an era build around Big Data. This presentation thus outlines the change in emphasis of security cont... Read More about The challenges of Big Data: future risks, governance and trust..

e-Health in the Cloud (2013)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2013, January). e-Health in the Cloud. Presented at Future of e-Health

This presentation outlines how risk assessors can be used to create holistic care. A key focus is on the security infrastructure and in new risk assessors such as the frailty index.

A Privacy preserving method using privacy enhancing techniques for location based services (2012)
Journal Article
Buchanan, W. J., Kwecka, Z., & Ekonomou, E. (2012). A Privacy preserving method using privacy enhancing techniques for location based services. Mobile Networks and Applications, https://doi.org/10.1007/s11036-012-0362-6

Two of the major changes within computing, at the present time, are the move towards service-oriented architectures and the increasing usage of mobile devices to access these services. Along with this, as these devices are often moving, extra context... Read More about A Privacy preserving method using privacy enhancing techniques for location based services.

VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees (2012)
Journal Article
Paterson, T., Graham, M., Kennedy, J., & Law, A. (2012). VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees. BMC Bioinformatics, 13(Suppl 8), S5. https://doi.org/10.1186/1471-2105-13-S8-S5

Pedigree genotype datasets are used for analysing genetic inheritance and to map genetic markers and traits. Such datasets consist of hundreds of related animals genotyped for thousands of genetic markers and invariably contain multiple errors in bot... Read More about VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees.

A comparison of techniques for name matching (2012)
Journal Article
Peng, T., Li, L., & Kennedy, J. (2012). A comparison of techniques for name matching. GSTF journal on computing, 2,

Information explosion is a problem for everyone nowadays. It is a great challenge to all kinds of businesses to maintain high quality of data in their information applications, such as data integration, text and web mining, information retrieval, sea... Read More about A comparison of techniques for name matching.

E-Health: chances and challenges of distributed, service oriented architectures (2012)
Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012). E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,

Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remain affordable for governments and individuals. Mobile technology and cloud c... Read More about E-Health: chances and challenges of distributed, service oriented architectures.

Designing blended spaces. (2012)
Presentation / Conference Contribution
Benyon, D., Mival, O., & Ayan, S. (2012, September). Designing blended spaces

We present an approach to the design of mixed reality spaces that aims to create a more harmonized and unified user experience. We refer to these as blended spaces. Blended spaces draw upon a description of physical and digital spaces in terms of the... Read More about Designing blended spaces..

Location as interaction: designing blended spaces for digital tourism. (2012)
Presentation / Conference Contribution
Benyon, D., Mival, O., Ayan, S., O'Keefe, B., & Mokey, S. (2012, September). Location as interaction: designing blended spaces for digital tourism. Presented at Third International Workshop on Human-Computer Interaction, Tourism and Cultural Heritage (HCITOCH 2012):

Future risks – Including the rise of the hacktivism. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, June). Future risks – Including the rise of the hacktivism. Presented at National Information Security Conference (NISC)

As organisations move towards infrastructures which are highly dependent on their Web infrastructure, they are now at great risk from external parties who can use a number of motivations, such as for a political agenda, to compromise their activities... Read More about Future risks – Including the rise of the hacktivism..

Aspects of lifelikeness: a framework for optional interactions with public installations (2012)
Presentation / Conference Contribution
Helgason, I., Smyth, M., & Speed, C. (2012, September). Aspects of lifelikeness: a framework for optional interactions with public installations. Presented at Designing Interactive Systems DIS 2012, Newcastle, UK

This poster presents a framework for the design and evaluation of “optional interactions” with publicly sited, non-utilitarian installations. These kinds of encounters, where an engaging experience of interaction itself is the design goal, can be reg... Read More about Aspects of lifelikeness: a framework for optional interactions with public installations.

Technical evaluation of an e-health platform. (2012)
Presentation / Conference Contribution
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012, July). Technical evaluation of an e-health platform. Presented at IADIS International Conference e-Health 2012

Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation of e-Health platforms under three main categories: usability evaluation, l... Read More about Technical evaluation of an e-health platform..

Security issues of a publicly accessible cloud computing infrastructure. (2012)
Presentation / Conference Contribution
Russell, G., & Macfarlane, R. (2012, June). Security issues of a publicly accessible cloud computing infrastructure

Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accidental or deliberate acts by users can be dangerous to other systems. This pape... Read More about Security issues of a publicly accessible cloud computing infrastructure..

A forensic image description language for generating test images. (2012)
Presentation / Conference Contribution
Russell, G., Macfarlane, R., & Ludwiniak, R. (2012, September). A forensic image description language for generating test images

Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study. At Edinburgh Napier University this topic has been taught with flexible an... Read More about A forensic image description language for generating test images..

Implementation and evaluation of a botnet analysis and detection method in a virtual environment (2012)
Thesis
Waheed, S. Implementation and evaluation of a botnet analysis and detection method in a virtual environment. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/5667

Botnets are one of the biggest cyber threats. Botnets based on concepts that used for the development of malware or viruses before origin of the Internet in 1990s. Botnet is a form of malware controlled by a Botmaster using Command and Control (C&C).... Read More about Implementation and evaluation of a botnet analysis and detection method in a virtual environment.

MaTSE: The microarray time-series explorer (2012)
Presentation / Conference Contribution
Craig, P., Cannon, A., Kukla, R., & Kennedy, J. (2012, October). MaTSE: The microarray time-series explorer. Presented at 2012 IEEE Symposium on Biological Data Visualization (BioVis)

This paper describes the design, development and evaluation of the Microarray Time-Series Explorer (MaTSE), a novel information visualization application for the exploratory analysis of large scale microarray timeseries data. The software combines a... Read More about MaTSE: The microarray time-series explorer.

Evolution for the sustainability of Internetware. (2012)
Presentation / Conference Contribution
Fang, D., Liu, X., Liu, L., & Yang, H. (2012, October). Evolution for the sustainability of Internetware. Presented at Fourth Asia-Pacific Symposium on Internetware

Along with the green attentions and efforts on energy efficiency of computer hardware and embedded systems, software relevant sustainability issues are becoming increasingly focused, as a part of Green Information Technology (GIT). Undoubtedly, softw... Read More about Evolution for the sustainability of Internetware..