Date


People

Download Available

Dewey Decimal

194 results

Refactoring data transforms in MaTSE for flexibility.

Presentation / Conference
Craig, P., & Kennedy, J. (2009, October)
Refactoring data transforms in MaTSE for flexibility
In early prototypes of the Microarray Time-series Explorer (MaTSE) data transforms were tightly coupled with visualisation components. While this allowed us to achieve our ini...

An expert system for the performance control of rotating machinery.

Thesis
Pearson, W. N. An expert system for the performance control of rotating machinery. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6888
This research presented in this thesis examines the application of feed forward neural networks to the performance control of a gas transmission compressor. It is estimated th...

Conducting Performance Evaluation of an e-Health Platform

Book
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012)
Conducting Performance Evaluation of an e-Health Platform. In T. Issa, P. Isaías, & P. Kommers (Eds.), Advances in Business Information Systems and Analytics; Information Systems and Technology for Organizations in a Networked Society, 295-315. IGI Global Publishing. doi:10.4018/978-1-4666-4062-7.ch016
For increased awareness and adoption of e-Health implementations, results from evaluation must be catered towards three primary perspectives: organizational, end-user and tech...

HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society

Thesis
van Deursen Hazelhoff Roelfze, N. (2014)
HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6921
This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations...

Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory

Journal Article
Hall, H., Widen, G., & Paterson, L. (2010)
Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory. Libri, 60(2), 117-128. https://doi.org/10.1515/libr.2010.011
This paper focuses on the extent to which online information sharing practice is socially motivated. A key interest is how knowledge of the existing social connections between...

An empirical study of the impact of information technology on corporate financial reporting: a contingency perspective

Thesis
Xiao, Z. An empirical study of the impact of information technology on corporate financial reporting: a contingency perspective. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3605
This thesis investigates whether information technology [IT] ameliorates or exacerbates the information asymmetry between management and external users of financial informatio...

Monitoring the conformance of planning decisions to urban land use policies using Information Extraction and GeoVisualisation

Thesis
Combe, C. Monitoring the conformance of planning decisions to urban land use policies using Information Extraction and GeoVisualisation. (Thesis)
Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/2455
In this thesis two existing computer science techniques are used to solve a specific problem in the field of ‘spatial planning’. The problem to be addressed is monitoring the ...

A framework for information visualisation

Journal Article
Kennedy, J., Mitchell, K., & Barclay, P. J. (1996)
A framework for information visualisation. SIGMOD record, 25, 30-34
In this paper we examine the issues involved in developing information visualisation systems and present a framework for their construction. The framework addresses the compon...

Formal methods for the re-engineering of computing systems.

Conference Proceeding
Liu, X., Yang, H., & Zedan, H. (1997)
Formal methods for the re-engineering of computing systems. In COMPSAC '97-21st International Computer Software and Applications Conference, 409-414. https://doi.org/10.1109/CMPSAC.1997.625024
This paper presents a short review of formal methods and their use in the re-engineering of computing systems. Five classes of formal notations and theories, namely state/mode...

Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput?

Journal Article
Barakat, B., Keates, S., Wassell, I., & Arshad, K. (2019)
Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput?. IEEE Communications Letters, 23(6), 987-990. https://doi.org/10.1109/LCOMM.2019.2907935
The Zero-Wait (ZW) policy is widely held to achieve maximum information 'freshness', i.e., to achieve minimum Peak Age (PA) and maximum throughput, for real-time Internet-of-T...