Skip to main content

Research Repository

Advanced Search

Outputs (3343)

Robot companions for citizens: roadmapping the potential for future robots In empowering older people. (2012)
Presentation / Conference Contribution
Prescott, T. J., Epton, T., Evers, V., McKee, K., Hawley, M., Webb, T., Benyon, D., Conran, S., Strand, R., Buning, M. D. C., Verschure, P., & Dario, P. (2012, May). Robot companions for citizens: roadmapping the potential for future robots In empowering older people

The Future Emerging Technologies (FET) Flagship Candi- date "Robot Companions for Citizens" (RCC) proposes a transformative initiative, addressing a cross-domain grand scientific and technological challenge, to develop a new class of machines and emb... Read More about Robot companions for citizens: roadmapping the potential for future robots In empowering older people..

Many-to-Many embedded multicast addressing and access control method. (2012)
Patent
Romdhani, I. (2012). Many-to-Many embedded multicast addressing and access control method

A new addressing scheme for multicast IP with an extended scope field to include access rights. A new addressing scheme for multicast communications is disclosed. A new extended scope field is used which embeds a plurality of hierarchical scopes and... Read More about Many-to-Many embedded multicast addressing and access control method..

Security issues of a publicly accessible cloud computing infrastructure. (2012)
Presentation / Conference Contribution
Russell, G., & Macfarlane, R. (2012, June). Security issues of a publicly accessible cloud computing infrastructure

Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accidental or deliberate acts by users can be dangerous to other systems. This pape... Read More about Security issues of a publicly accessible cloud computing infrastructure..

A forensic image description language for generating test images. (2012)
Presentation / Conference Contribution
Russell, G., Macfarlane, R., & Ludwiniak, R. (2012). A forensic image description language for generating test images. In Proceedings of the 6th International Conference on Cybercrime Forensics Education & Training

Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study. At Edinburgh Napier University this topic has been taught with flexible an... Read More about A forensic image description language for generating test images..

A Hyper-Heuristic classifier for one dimensional bin packing problems: Improving classification accuracy by attribute evolution. (2012)
Presentation / Conference Contribution
Sim, K., Hart, E., & Paechter, B. (2012, September). A Hyper-Heuristic classifier for one dimensional bin packing problems: Improving classification accuracy by attribute evolution. Presented at International Conference on Parallel Problem Solving from Nature

A hyper-heuristic for the one dimensional bin packing problem is presented that uses an Evolutionary Algorithm (EA) to evolve a set of attributes that characterise a problem instance. The EA evolves divisions of variable quantity and dimension that r... Read More about A Hyper-Heuristic classifier for one dimensional bin packing problems: Improving classification accuracy by attribute evolution..

Sketching concatenative synthesis: audiovisual Isomorphism in reduced modes. (2012)
Presentation / Conference Contribution
Tsiros, A., LePlâtre, G., & Smyth, M. (2012). Sketching concatenative synthesis: audiovisual Isomorphism in reduced modes. In 9th Sound and Music Computing Conference (409-507)

This paper presents a prototype allowing the control of a concatenative synthesis algorithm using a 2D sketching interface. The design of the system is underpinned by a preliminary discussion in which isomorphisms between auditory and visual phen... Read More about Sketching concatenative synthesis: audiovisual Isomorphism in reduced modes..

Evolution pattern for service evolution in clouds. (2012)
Presentation / Conference Contribution
Wang, Z., Liu, X., & Chalmers, K. (2012). Evolution pattern for service evolution in clouds. In The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012)

The proposed research will focus on developing a novel approach to solve Software Service Evolution problems in Computing Clouds. The approach will support dynamic evolution of the software service in clouds via a set of discovered evolution pat... Read More about Evolution pattern for service evolution in clouds..

A model checking based approach to automatic test suite generation for testing web services and BPEL. (2012)
Presentation / Conference Contribution
Zhao, H., Sun, J., & Liu, X. (2012, December). A model checking based approach to automatic test suite generation for testing web services and BPEL

With the rapid increase of Web Service applications, the reliability of web service and service composition has drawn particular attention from researchers and industries. Many methods for testing and verifying the reliability have been discussed, ho... Read More about A model checking based approach to automatic test suite generation for testing web services and BPEL..

BioVis 2011 Conference Proceedings. (2011)
Presentation / Conference Contribution
(2011, October). BioVis 2011 Conference Proceedings

The rapidly expanding field of biology creates enormous challenges for computational visualization techniques for enabling researchers to gain insight from their large and highly complex data sets. The goal of the BioVis 2011 symposium is to create t... Read More about BioVis 2011 Conference Proceedings..

A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). (2011)
Presentation / Conference Contribution
Buchanan, W. J., Flandrin, F., Macfarlane, R., & Graves, J. (2011). A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In Cyberforensics 2011

This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system uses realistic background traffic along with attacking traffic, with four... Read More about A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS)..

DACAR platform for eHealth services cloud. (2011)
Presentation / Conference Contribution
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011). DACAR platform for eHealth services cloud. . https://doi.org/10.1109/CLOUD.2011.31

The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services, but concerns over service integration, large scale deployment, and securit... Read More about DACAR platform for eHealth services cloud..

An engineering-Informed modelling approach to AIS. (2011)
Presentation / Conference Contribution
Hart, E., & Davoudani, D. (2011). An engineering-Informed modelling approach to AIS. In Proceedings of International Conference on Artificial Immune Systems (ICARIS 2010) (240-253). https://doi.org/10.1007/978-3-642-22371-6_22

A recent shift in thinking in Artificial Immune Systems (AIS) advocates developing a greater understanding of the underlying biological systems that serve as inspiration for engineering such systems by developing abstract computational models of t... Read More about An engineering-Informed modelling approach to AIS..

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications (2011)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., Smith, S., & Zhao, H. (2011, July). Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. Presented at 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops

Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context information is naturally distributed among different spatial or logical domains. Ma... Read More about Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications.

Combined vs. Separate Views in Matrix-based Graph Analysis and Comparison. (2011)
Presentation / Conference Contribution
Melville, A., Graham, M., & Kennedy, J. (2011). Combined vs. Separate Views in Matrix-based Graph Analysis and Comparison. In 15th International Conference on Information Visualisation (IV), 2011. https://doi.org/10.1109/IV.2011.49

While much work has been done in the area of visualization for analysis of graphs, relatively little research exists into how best to use visualization for comparing graphs. We have developed a suite of general graph comparison questions that can be... Read More about Combined vs. Separate Views in Matrix-based Graph Analysis and Comparison..

Affliate advertising fraud and an investigatory fraud framework. (2011)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011). Affliate advertising fraud and an investigatory fraud framework. In CyberForensics 2011

This paper outlines the details of a real-life scam, which involves creating fraudulent Web sites which pretend to sell goods, but are actually used to perform click-through crime or use identity fraud to claim commission on the sale of goods. It inv... Read More about Affliate advertising fraud and an investigatory fraud framework..

Evaluating the VIPER pedigree visualisation: detecting inheritance inconsistencies in genotyped pedigrees. (2011)
Presentation / Conference Contribution
Paterson, T., Graham, M., Kennedy, J., & Law, A. (2011, October). Evaluating the VIPER pedigree visualisation: detecting inheritance inconsistencies in genotyped pedigrees. Presented at 1st IEEE Symposium on Biological Data Visualization

VIPER (Visual Pedigree Explorer) is a tool for exploring large complex animal pedigrees and their associated genotype data. The tool combines a novel, space-efficient visualisation of the pedigree structure with an inheritance-checking algorithm. Thi... Read More about Evaluating the VIPER pedigree visualisation: detecting inheritance inconsistencies in genotyped pedigrees..

Creation of an online virtual Cisco router learning environment. (2011)
Presentation / Conference Contribution
Rietsche, R., Russell, G., & Karduck, A. P. (2011, July). Creation of an online virtual Cisco router learning environment. Presented at Computers and Advanced Technology in Education

Online learning environments are an important aspect to many University courses. They allow flexibility in student approaches, and permit students from a range of backgrounds to take part in education. This paper considers an online learning environm... Read More about Creation of an online virtual Cisco router learning environment..

Student behaviour in a flexible learning course framework. (2011)
Presentation / Conference Contribution
Russell, G., & Cumming, A. (2011). Student behaviour in a flexible learning course framework. In Proceedings of the IADIS International Conference on e-Learning (181-188)

Flexible learning approaches to education are important in modern Universities. Students should be able to choose how they will study their courses, and educators should be prepared to support students in their choices, and guide students to employ s... Read More about Student behaviour in a flexible learning course framework..