Skip to main content

Research Repository

Advanced Search

Outputs (218)

Scalpel and Metaphor: The Ceremony of Organ Harvest in Gothic Science Fiction (2015)
Journal Article
Wasson, S.-P. (2015). Scalpel and Metaphor: The Ceremony of Organ Harvest in Gothic Science Fiction. Gothic Studies, 17(1), 104-123. https://doi.org/10.7227/GS.17.1.8

In organ transfer, tissue moves through a web of language. Metaphors reclassify the tissue to enable its redeployment, framing the process for practitioners and public. The process of marking off tissue as transferrable in legal and cultural terms pa... Read More about Scalpel and Metaphor: The Ceremony of Organ Harvest in Gothic Science Fiction.

Plenary presentation and panel (2015)
Presentation / Conference Contribution
Fotheringham, J. (2015, May). Plenary presentation and panel. Paper presented at Policy and Practice Summit for senior managers and student representatives (QAA Scotland

No abstract available.

A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. (2015)
Presentation / Conference Contribution
Fang, D., Liu, X., & Romdhani, I. (2015, May). A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. Presented at Fifth International Conference on Cloud Computing, GRIDs, and Virtualization

As cloud services propagate along with the rapid development of cloud computing, issues raised in service selection and retrieval processes become increasingly critical. While many approaches are proposed on the specification and discovery of cloud s... Read More about A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval..

Visual techniques to support exploratory analysis of temporal graph data. (2015)
Presentation / Conference Contribution
Kerracher, N., Kennedy, J., Chalmers, K., & Graham, M. (2016, May). Visual techniques to support exploratory analysis of temporal graph data. Presented at EuroVis '15

Recently, much research has focused on developing techniques for the visual representation of temporal graph data. This paper takes a wider look at the visual techniques involved in exploratory analysis of such data, considering the variety of sub ta... Read More about Visual techniques to support exploratory analysis of temporal graph data..

AGADE Using Personal Preferences and World Knowledge to Model Agent Behaviour (2015)
Presentation / Conference Contribution
Farrenkopf, T., Guckert, M., & Urquhart, N. (2015, June). AGADE Using Personal Preferences and World Knowledge to Model Agent Behaviour. Presented at International Conference on Practical Applications of Agents and Multi-Agent Systems PAAMS 2015, Salamanca, Spain

BDI agents provide a common well established approach for building multi-agent simulations. In this paper we demonstrate how semantic technologies can be used to model agent behaviour. Beliefs, desires and intentions are mapped flexibly to correspond... Read More about AGADE Using Personal Preferences and World Knowledge to Model Agent Behaviour.

A Miniaturised Monopole Wideband Antenna with Reconfigurable Band Rejection for WLAN/WiMAX (2015)
Presentation / Conference Contribution
Elfergani, I. T. E., Hussaini, A. S., See, C. H., Rodriguez, J., Abd-Alhameed, R., & Marques, P. (2014, November). A Miniaturised Monopole Wideband Antenna with Reconfigurable Band Rejection for WLAN/WiMAX. Presented at WICON 2014, Lisbon, POrtugal

This paper proposes a tuneable band-rejected miniaturised monopole antenna. The band-notching was achieved by printing an inner chorded crescent shape over the surface of the substrate. By placing a small varactor between the inner and outer arches,... Read More about A Miniaturised Monopole Wideband Antenna with Reconfigurable Band Rejection for WLAN/WiMAX.

Apple and Starbucks could have avoided being hacked if they'd taken this simple step (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Apple and Starbucks could have avoided being hacked if they'd taken this simple step

Apple and Starbucks are two of the world’s most trusted companies, but their reputations were recently tarnished thanks to some novice cybersecurity mistakes. Both setup systems that could have allowed hackers to break into customers' accounts by rep... Read More about Apple and Starbucks could have avoided being hacked if they'd taken this simple step.

‘Ethics, discourse, experience’. (2015)
Presentation / Conference Contribution
Neill, C. (2015, May). ‘Ethics, discourse, experience’. Presented at Association for Psychoanalysis and Psychotherapy in Ireland

Vulnerability analysis. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, May). Vulnerability analysis. Presented at Advanced Threat Protection

The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the biggest names to fall victim in the last 12 months. The result is that massive a... Read More about Vulnerability analysis..

Cyber-Green: idealism in the information age (2015)
Journal Article
Duff, A. S. (2015). Cyber-Green: idealism in the information age. Journal of Information, Communication and Ethics in Society, 13(2), 146-164. https://doi.org/10.1108/jices-10-2014-0049

Purpose
This paper retrieves relevant aspects of the work of idealist thinker T.H. Green in order to improve comprehension of, and policy responses to, various dilemmas facing contemporary ‘information societies’.

Design/methodology/approach
The... Read More about Cyber-Green: idealism in the information age.

The Uniform Customs and Practice for Documentary Credit (the UCP): Are they merely a set of Contractual Terms? (2015)
Journal Article
Chhina, R. K. (2015). The Uniform Customs and Practice for Documentary Credit (the UCP): Are they merely a set of Contractual Terms?. Banking and Finance Law Review, 30(2), 245-265

The paper examines the true legal nature of the Uniform Customs and Practice for Documentary Credit (the UCP) by applying the test: whether the UCP Rules will be applied or at least referred to by courts even when not expressly referred to by the par... Read More about The Uniform Customs and Practice for Documentary Credit (the UCP): Are they merely a set of Contractual Terms?.

Promoting passion in an innovation and enterprise culture. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, April). Promoting passion in an innovation and enterprise culture. Presented at Exploring 21st Century Organisational Culture: inclusivity, agility and innovation

This presentation will show how organisations can encourage a culture of innovation and enterprise, including showcasing examples of good practice and how management styles can be created to encourage innovation. This will include the usage of intern... Read More about Promoting passion in an innovation and enterprise culture..

Is There Such A Thing as Southeast Asian Photography? (2015)
Presentation / Conference Contribution
Supartono, A. (2015, April). Is There Such A Thing as Southeast Asian Photography?. Paper presented at Making Southeast Asian Cultures: From Region to World

The photography scene in Southeast Asia has developed regionally since the early days of the camera. The flourishing commercial photographic studios in the region (thanks to the success of colonial enterprises that provided sufficient clientele) witn... Read More about Is There Such A Thing as Southeast Asian Photography?.

A Task Taxonomy for Temporal Graph Visualisation (2015)
Journal Article
Kerracher, N., Kennedy, J., & Chalmers, K. (2015). A Task Taxonomy for Temporal Graph Visualisation. IEEE Transactions on Visualization and Computer Graphics, 21(10), 1160-1172. https://doi.org/10.1109/tvcg.2015.2424889

By extending and instantiating an existing formal task framework, we define a task taxonomy and task design space for temporal graph visualisation. We discuss the process involved in their generation, and describe how the design space can be ‘sliced... Read More about A Task Taxonomy for Temporal Graph Visualisation.

Mobilfunk 5G Die ferngesteuerte Welt (2015)
Newspaper / Magazine
Thuemmler, C. (2015). Mobilfunk 5G Die ferngesteuerte Welt

Erst die neue Mobilfunkgeneration 5G soll den Durchbruch für
die Industrie 4.0 bringen. Während die Forschung schon um die
ersten Patente wetteifert, fürchten Kritiker das Ende der
Netzneutralität

New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). (2015)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2015, April). New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). Paper presented at Cybercrime and Cyberterrorism - the EU Research roadmap

DFET creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the development of a virtual (cloud-based) cybercrime training environment to i... Read More about New forensic investigation and training methods in a virtual environment (cloud) (D-FET project)..