Skip to main content

Research Repository

Advanced Search

Outputs (3343)

General and craniofacial development are complex adaptive processes influenced by diversity (2014)
Journal Article
Hart, E., Brook, A. H., Brook-O'Donnell, M., Hone, A., Hughes, T., & Smith, R. (2014). General and craniofacial development are complex adaptive processes influenced by diversity. Australian Dental Journal, 59(S1), 13-22. https://doi.org/10.1111/adj.12158

Complex systems are present in such diverse areas as social systems, economies, ecosystems and Biology and, therefore, are highly relevant to dental research, education and practice. A Complex Adaptive System in biological development is a dynamic pr... Read More about General and craniofacial development are complex adaptive processes influenced by diversity.

Communicating Process Architectures 2014 (2014)
Presentation / Conference Contribution
(2014). Communicating Process Architectures 2014. In P. H. Welch, F. R. M. Barnes, J. F. Broenink, K. Chalmers, T. Gibson-Robinson, R. Ivimey-Cook, …M. L. Smith (Eds.), Communicating Process Architectures 2014

CPA 2014 is one of an annual series of conferences organised over almost thirty years concerned with the design of parallel systems inspired by the Theory of Communicating Sequential Processes (CSP) of C. A. R. Hoare. Particular aims are the promotio... Read More about Communicating Process Architectures 2014.

'Kraken'. (2014)
Book Chapter
Alder, E. (2014). 'Kraken'. In J. Weinstock (Ed.), The Ashgate Encyclopedia of Literary and Cinematic Monsters. Ashgate Publishing

'Sea Monsters'. (2014)
Book Chapter
Alder, E. (2014). 'Sea Monsters'. In J. Weinstock (Ed.), The Ashgate Encyclopedia of Literary and Cinematic MonstersAshgate Publishing

Evaluating the Impact of Clutter in Euler Diagrams. (2014)
Presentation / Conference Contribution
Alqadah, M., Stapleton, G., Howse, J., & Chapman, P. (2014, July). Evaluating the Impact of Clutter in Euler Diagrams

Euler diagrams, used to visualize data and as a basis for visual languages, are an effective representation of information, but they can become cluttered. Previous research established a measure of Euler diagram clutter, empirically shown to correspo... Read More about Evaluating the Impact of Clutter in Euler Diagrams..

Garmin satnav forensic methods and artefacts: an exploratory study. (2014)
Thesis
Arbelet, A. (2014). Garmin satnav forensic methods and artefacts: an exploratory study. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7334

Over ten years ago, major changes in the Global Positioning System (GPS) technology led to its explosion in popularity. GPS devices are now ubiquitous, escorting their users everywhere they go, and potentially recording the entirety of their whereabo... Read More about Garmin satnav forensic methods and artefacts: an exploratory study..

Temporal Multivariate Networks. (2014)
Book Chapter
Archambault, D., Abello, J., Kennedy, J., Kobourov, S., Ma, K., Miksch, S., Muelder, C., & Telea, A. C. (2014). Temporal Multivariate Networks. In A. Kerren, H. Purchase, & M. Ward (Eds.), Multivariate Network Visualization (151-175). Springer-Verlag. https://doi.org/10.1007/978-3-319-06793-3_8

In this chapter, we define, characterize, and summarize the data and visualization techniques relating to temporal multivariate networks. Section 2.1.1 provides definitions and examples that characterize the networks we address in this chapter. We fu... Read More about Temporal Multivariate Networks..

Silence, Melancholia and Science Fiction: Jonathan Glazer's Under the Skin. (2014)
Presentation / Conference Contribution
Artt, S. (2014, August). Silence, Melancholia and Science Fiction: Jonathan Glazer's Under the Skin. Paper presented at Becoming Scotland

In 'On the Melancholic Imaginary' Julia Kristeva notes that epochs of crisis are especially prone to black humour and melancholy: "In times of crisis... melancholy imposes itself, lays down its archaeology, produces its representations and its knowle... Read More about Silence, Melancholia and Science Fiction: Jonathan Glazer's Under the Skin..

Designing blended spaces: historical echoes, testing a framework for digital tourism. (2014)
Journal Article
Ayan, S., & Benyon, D. (2014). Designing blended spaces: historical echoes, testing a framework for digital tourism. International Journal of Architectonic, Spatial, and Environmental Design, 7(2), 1-12

This work relates heavily to blended space theory and the trajectories approach previously done in this field. Imaz and Benyon have introduced the ideas of conceptual blending to analyze developments in HCI and software engineering. Benford explains... Read More about Designing blended spaces: historical echoes, testing a framework for digital tourism..

Considerations about the Analysis of ITS Data of Bicycle Sharing Systems (2014)
Journal Article
Bordagaray, M., Fonzone, A., dell’Olio, L., & Ibeas, A. (2014). Considerations about the Analysis of ITS Data of Bicycle Sharing Systems. Procedia Social and Behavioral Sciences, 162, 340-349. https://doi.org/10.1016/j.sbspro.2014.12.215

Handling and managing data automatically collected by Intelligent Transport Systems (ITS) is a major opportunity and challenge for transport professionals nowadays. This study guides the management of smartcard data from public bikes by providing cri... Read More about Considerations about the Analysis of ITS Data of Bicycle Sharing Systems.

IoT for a shock warning system
Preprint / Working Paper
Brogan, J., Thuemmler, C., Mival, O., & Fricker, S. (2014). IoT for a shock warning system

This technical paper details the interdependencies between Internet of Things (IoT) and latest Future Internet (FI) technology, demonstrated by using the example of a smart connected health (SCH) use case, for the monitoring and prevention of shock i... Read More about IoT for a shock warning system.

The performance of employee-owned businesses in Scotland: some preliminary empirical evidence (2014)
Journal Article
Brown, R., McQuaid, R. W., Raeside, R., & Canduela, J. (2014). The performance of employee-owned businesses in Scotland: some preliminary empirical evidence. Fraser of Allander Institute Economic Commentary, 37(3), 108-123

In recent years, there has been a growing focus on promoting the concept of employee-ownership of businesses within public policy. One of the strong drivers of this is an assumption that these businesses out-perform conventionally structured business... Read More about The performance of employee-owned businesses in Scotland: some preliminary empirical evidence.

Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, September). Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities. Paper presented at 7th International Conference on Security of Information and Networks (SIN 2014)

This presentation will outline some new research related to the Heartbleed vulnerability, and cover the full technical details of the threat, with a live demo. Along with it will show how Heartbleed is detected on networked device, and some new resea... Read More about Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities..

Creating engaging and stimulating Web based material (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, January). Creating engaging and stimulating Web based material. Presented at LTT 2014

This presentation outlines the collaboration between Edinburgh Napier University and Bright Red Publishing

Discrete Logarithms within Computer and Network Security. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, April). Discrete Logarithms within Computer and Network Security. Presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium

As we move into an Information Age, the requirement for computer security increases by the day, only in terms of privacy, but also in terms of proving identity and in verifying the integrity of data. Unfortunately many of the most widely used public... Read More about Discrete Logarithms within Computer and Network Security..

How the love of one teenager brought Tweetdeck to its knees. (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). How the love of one teenager brought Tweetdeck to its knees

TweetDeck, a Twitter app with millions of users, is back online after a rather surprising security scare. For several hours, the service was taken down all because a 19-year-old user tried to add a cute heart to his messages.

The New Enlightenment in Scotland. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, January). The New Enlightenment in Scotland. Paper presented at Secure Scotland

Scotland, as a nation, has been built on enterprise and innovation, and, at one time, led the world in terms of enlightenment for its scientific and cultural approach. This presentation outlines the current growth of confidence in Scotland as a place... Read More about The New Enlightenment in Scotland..

Traffic light hacking shows the Internet of Things must come with better security. (2014)
Newspaper / Magazine
Buchanan, W. J. (2014). Traffic light hacking shows the Internet of Things must come with better security

The growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercept data or take control of devices. Often this sort of critical infrastructu... Read More about Traffic light hacking shows the Internet of Things must come with better security..