Date


Output Type

Download Available

24 results

An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules

Journal Article
Habibullah, S., Liu, X., & Tan, Z. (2018)
An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules. International Journal of Computer Theory and Engineering, 10(5), 164-169. https://doi.org/10.7763/ijcte.2018.v10.1219
Evolving legacy enterprise systems into a lean system architecture has been on the agendas of many enterprises. Recent advance in legacy system evaluation is in favour of micr...

Sticky policies approach within cloud computing

Journal Article
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2017)
Sticky policies approach within cloud computing. Computers and Security, 70, 366-375. https://doi.org/10.1016/j.cose.2017.07.005
This paper discusses a secure document sharing approach, which addresses confidentiality, integrity and authenticity concerns related to cloud-based data sharing. This researc...

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm

Journal Article
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914
Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification bu...

An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework

Journal Article
Fang, D., Liu, X., Romdhani, I., & Pahl, C. (2015)
An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework. Journal of cloud computing advances, systems and applications, 4(1), https://doi.org/10.1186/s13677-015-0039-3
Cloud computing offers various computational resources via convenient on-demand service provision. Currently, heterogeneous services and cloud resources are usually utilized a...

Technology for supporting care staff in residential homes.

Journal Article
Webster, G., & Hanson, V. L. (2014)
Technology for supporting care staff in residential homes. ACM transactions on accessible computing, 5, 8. https://doi.org/10.1145/2543577
Care staff, those who attend to the day-to-day needs of people in residential facilities, represent an important segment of the health-care provision of those entrusted to the...

Cloud-based identity and identity meta-data: secure and control own data in globalization era.

Journal Article
Spyra, G., Buchanan, W. J., Cruickshank, P., & Ekonomou, E. (2014)
Cloud-based identity and identity meta-data: secure and control own data in globalization era. International Journal of Reliable and Quality E-Healthcare, 3, https://doi.org/10.4018/ijrqeh.2014010105
This paper proposes a new identity, and its underlying meta-data, model. The approach enables secure spanning of identity meta-data across many boundaries such as health-care,...

Helium: visualization of large scale plant pedigrees.

Journal Article
Shaw, P., Graham, M., Kennedy, J., Milne, I., & Marshall, D. F. (2014)
Helium: visualization of large scale plant pedigrees. BMC Bioinformatics, 15, https://doi.org/10.1186/1471-2105-15-259
Plant breeders use an increasingly diverse range of data types to identify lines with desirable characteristics suitable to be taken forward in plant breeding programmes. Ther...

Tangible possibilities—envisioning interactions in public space

Journal Article
Smyth, M., & Helgason, I. (2013)
Tangible possibilities—envisioning interactions in public space. Digital Creativity, 24(1), 75-87. https://doi.org/10.1080/14626268.2013.769454
This article explores approaches to envisionment in the field of interaction design. Design fictions are introduced as a method to articulate future possibilities. Three case ...

Ontology definition and construction, and epistemological adequacy for systems interoperability: a practitioner analysis.

Journal Article
Lumsden, J., Hall, H., & Cruickshank, P. (2011)
Ontology definition and construction, and epistemological adequacy for systems interoperability: a practitioner analysis. Journal of Information Science, 37(3), 246-253. https://doi.org/10.1177/0165551511401804
Ontology development is considered to be a useful approach to the design and implementation of interoperable systems. This literature review and commentary examines the curren...

Triangulation in practice.

Journal Article
Turner, P., & Turner, S. (2009)
Triangulation in practice. Virtual Reality, 13, 171-181. https://doi.org/10.1007/s10055-009-0117-2
Triangulation is the means by which an alternate perspective is used to validate, challenge or extend existing findings. It is frequently used when the field of study is diffi...