Items where Subject is "Q Science > QA Mathematics > QA0075 Electronic computers. Computer science > QA0076.75 Computer software"

Up a level
Export as [feed] RSS
Group by: Name | Item Type
Jump to: A | B | C | G | H | I | J | L | M | N | P | Q | S | T | V | W
Number of items at this level: 54.

A

Al-Jepoori, M. and Al-Khanjari, Z. (2018) Framework for handling data veracity in big data. International Journal of Computer Science and Software Engineering, 7 (6). pp. 138-141. ISSN E-ISSN: 2409-4285.

Alham, M., Li, M., Liu, Y., Ponraj, M. and Qi, M. (2012) A distributed SVM ensemble for image classification and annotation. In: UNSPECIFIED, ed. 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE. pp. 1581-1584 ISBN 9781467300254

Azhar, M. H. B., Badicioiu, A. and Barton, T. (2016) A wearable brain-computer interface controlled robot. In: Research and Knowledge Exchange Conference 2016, 22nd September, 2016, Canterbury Christ Church University, Canterbury, Kent, UK.

Azhar, M. H. B. and Barton, T. (2017) Forensic analysis of secure ephemeral messaging applications on Android platforms. In: UNSPECIFIED, ed. Global Security, Safety and Sustainability - The Security Challenges of the Connected World: 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings. Communications in Computer and Information Science, 630. Springer. pp. 27-41 ISBN 9783319510637

Azhar, M. H. B., Barton, T., Casey, A. and Sakel, M. (2017) BCI controlled robotic arm as assistance to the rehabilitation of neurologically disabled patients. In: Research and Knowledge Exchange Conference 2017.

Azhar, M. H. B., Barton, T. and Islam, T. (2018) Drone forensic analysis using open source tools. Journal of Digital Forensics, Security and Law, 13 (1). pp. 7-30. ISSN 1558-7223.

B

Bartlette, S. (2014) Discussing the Tinnitus Awareness app. Restored Hearing blog.

Bartlette, S. (2015) Sharing effective tools and practices in web design. In: Web Teaching Day Conference, 22nd May, 2015, Greenwich University, London.

Bartlette, S. (2014) Tinnitus Awareness app. In: UNSPECIFIED. [Artefact]

Barton, T. and Azhar, M. (2017) Forensic analysis of popular UAV systems. Emerging Security Technologies (EST), 2017 Seventh International Conference on. ISSN 2472-7601.

Barton, T. and Azhar, M. (2018) Open source forensics for a multi-platform drone system. In: Matousek, P. and Schmiedecker, M., eds. 9th EAI International Conference on Digital Forensics & Cyber Crime. Springer. pp. 83-96 ISBN 9783319736976

Barton, T. and Azhar, M. H. B. (2016) Forensic analysis of the recovery of Wickr’s ephemeral data on Android platforms. In: Klemas, T. and Falk, R., eds. CYBER 2016 : The First International Conference on Cyber-Technologies and Cyber-Systems. IARIA. pp. 35-40 ISBN 978161208512-8

Bertolo, E. (2008) Web 2.0: Unlearned lessons from previous virtual learning environments. Bioscience Education e-Journal, 11. ISSN 1479-7860.

Brighouse, B. and Edgar-Nevill, D. (2003) Delivery of courseware using CD-ROM media. In: Chambers, J., ed. Selected Papers from the 14th International Conference on College Teaching and Learning. Jacksonville, Florida, USA: Center for the Advancement of Teaching and Learning, Florida Community College at Jacksonville. pp. 25-34 ISBN 1931997012

C

Caruana, G., Li, M. and Qi, M. (2011) A MapReduce based parallel SVM for large scale spam filtering. In: Caruana, G., ed. Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2011. IEEE. pp. 2659-2662 ISBN 9781612841809

Cherry, D., Li, M. and Qi, M. (2012) A distributed storage system for archiving broadcast media content. In: UNSPECIFIED, ed. Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications. IGI Global. pp. 669-679

G

Garrido, P., Repulles, F., Sanguesa, J.A., Gallardo, J., Torres, V., Tramullas, J. and Bloor, A. (2016) AINA: Disney animation information as educational resources. In: ICALT 2016 : 18th International Conference on Advanced Learning Technologies, 24th-25th October, 2016, Paris.

H

Heron, M., Hanson, V. L. and Ricketts, I. (2013) Accessibility support for older adults with the ACCESS framework. International Journal of Human-Computer Interaction. ISSN 1044-7318.

I

Iannacci, F. (2006) On the Weickian model in the context of open source software development: some preliminary insights. In: Damiani, E., Fitzgerald, B., Scacchi, W., Scotto, M. and Succi, G., eds. Open Source Systems. IFIP International Federation for Information Processing, 203. Springer. pp. 3-8 ISBN 9780387342252

J

Jackson, S. and Fearon, C. (2014) Exploring the role and influence of expectations in achieving VLE benefit success. British Journal Of Educational Technology, 45 (2). pp. 245-259. ISSN 1467-8535.

L

Li, M. and Qi, M. (2004) Leveraging legacy codes to distributed problem-solving environments: a web services approach. Software: Practice and Experience, 34 (13). pp. 1297-1309. ISSN 0038-0644.

Li, M. and Qi, M. (2003) MAPBOT: A web based map information retrieval system. Information and Software Technology, 45 (10). pp. 691-698. ISSN 0950-5849.

Li, M., Yu, B., Qi, M. and Antonopoulos, N. (2008) Automatically wrapping legacy software into services: a grid case study. Peer-to-Peer Networking and Applications, 1 (2). pp. 139-147. ISSN 1936-6442.

M

Masuwa-Morgan, K. (2008) Introducing AccessOnto: ontology for accessibility requirements specification. In: UNSPECIFIED, ed. First International Workshop on Ontologies in Interactive Systems, 2008. Ontoract '08. Proceedings. Los Alamitos, CA: IEEE Computer Society. pp. 33-38 ISBN 9781424434596

Masuwa-Morgan, K. (2010) Web measurement: tools, practices, recommendations. In: The 21st Annual UKSMA Conference, 14 October 2010, London.

Masuwa-Morgan, K. and Stock, G. (2010) eAssessment and eFeedback: an evidence-based practice in the UK sector. In: Northumbria/EARLI Assessment Conference, 1-3 September 2010, Univerisity of Northumbria.

Meades, A. (2010) Angels and demons in a digital landscape. In: Angels and Demons Conference, 11 June 2010, Canterbury Christ Church University.

Meades, A. (2016) Arcade tales 2 - it survived the 80s and we have spare parts. Canterbury Christ Church University.

Meades, A. (2015) Beyond the animated landscape: videogame glitches and the sublime. In: Pallant, C., ed. Animated Landscapes. New York: Bloomsbury. ISBN 9781628923513

Meades, A. (2010) Imaginary monsters: Game 3.0 and the rise of the transgressive player. Journal of Gaming and Virtual Worlds, 2 (2). pp. 115-134. ISSN 1757-191X.

Meades, A. (2012) More bang for your buck—hardware hacking, real money trade, and transgressive play within console-based first-person shooters. In: Vorhees, G., Call, J. and Whitlock, K., eds. Guns, Grenades, and Grunts: First-Person Shooter Games. Approaches to Digital Game Studies. London: Continuum. pp. 199-223 ISBN 9781441193537

Meades, A. (2013) Why we glitch: process, meaning and pleasure in the discovery, documentation, sharing and use of videogame exploits. Well Played Journal, 2 (2). pp. 79-98. ISSN 2164-344X.

N

Naughton, P. and Azhar, M. H. B. (2017) An investigation on forensic opportunities to recover evidential data from mobile phones and personal computers. In: The Second International Conference on Advances in Cyber-Technologies and Cyber-System, Cyber 2017, 12-16 Nov 2017, Barcelona, Spain. (Unpublished)

P

Pallant, C. (2013) Animating America: Red Dead Redemption (2010) – game structure and game surface. In: Head West: 58th Annual British Association for American Studies Conference, 18th-21st April, 2013, University of Exeter.

Pallant, C. (2013) "Now I know I'm a lowlife": controlling play in GTA: IV, Red Dead Redemption, and LA Noire. In: Wysocki, M., ed. Ctrl-Alt-Play: Essays on Control in Video Gaming. Jefferson, NC: McFarland. pp. 133-145 ISBN 9780786470136

Pallant, C. (2012) Red Dead Redemption (2010): animating game structure and game surface. In: 24th Annual Society for Animation Studies Conference, 25th-27th June, 2012, RMIT University, Melbourne, Australia.

Q

Qi, M. (2013) Clear up grey areas: cybercrime legislation progress in China. In: The 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013), 10th-11th June, 2013, Cardiff.

Qi, M. and Edgar-Nevill, D. (2011) Social networking searching and privacy issues. Information Security Technical Report, 16 (2). pp. 74-78. ISSN 1363-4127.

Qi, M., Edgar-Nevill, D., Wang, Y. and Xu, R. (2008) Tracking online trails. International Journal of Electronic Security and Digital Forensics, 1 (4). pp. 353-361. ISSN 1751-911X.

Qi, M., Edgar-Nevill, D., Wang, Y. and Xu, R. (2008) Tracking online trails. In: Jahankhani, H., Revett, K. and Palmer-Brown, D., eds. Global E-Security. Communications in Computer and Information Science, 12. Springer. pp. 48-53 ISBN 9783540694021

S

Sahota, V. and Li, M. (2006) GREMO: a GT4 based Resource Monitor. In: Cox, S. J., ed. Proceedings of the UK e-Science All Hands Meeting 2006. National e-Science Centre. ISBN 0955398800

Sahota, V. and Li, M. (2009) Modeling P2P grid information services with colored Petri nets. In: Wang, L., Jie, W. and Chen, J., eds. Grid Computing: Technology, Services, and Applications. CRC Press. ISBN 9781420067668

Sahota, V., Li, M. and Guo, W. (2006) Resource monitoring with Globus Toolkit 4. In: UNSPECIFIED, ed. Second International Conference on Semantics, Knowledge and Grid, 2006. SKG '06. IEEE. pp. 1-3 ISBN 076952673X

Shortall, A. and Azhar, M. H. B. (2015) Forensic acquisitions of WhatsApp data on popular mobile platforms. In: UNSPECIFIED, ed. Proceedings of the Sixth International Conference on Emerging Security Technologies. IEEE Press. pp. 13-17 ISBN 9781467397995

Stephens, P. (2016) Problem-based learning in cybersecurity at CCCU. In: 12th Annual Teaching Computer Forensics Workshop, 17th November, 2016, University of Sunderland, Sunderland, UK.

T

Tyack, Charles S. M. and Camic, Paul M. (2017) Touchscreen interventions and the wellbeing of people with dementia and caregivers: a systematic review. International Psychogeriatrics. ISSN 1041-6102.

V

Vickers, S., Istance, H. and Heron, M. (2013) Accessible gaming for people with physical and cognitive disabilities: a framework for dynamic adaptation. In: Mackay, W. E., ed. CHI '13 Extended Abstracts on Human Factors in Computing Systems. CHI EA '13. New York: ACM. pp. 19-24 ISBN 9781450319522

W

Walker, R., Kenny, P. and Miao, J. (2007) Exploratory simulation for astrophysics. In: Erbacher, R., Roberts, J., Grohn, M. and Borner, K., eds. Visualization and Data Analysis 2007. SPIE Press. p. 49509 ISBN 0819466085

Wang, Y. and Qi, M. (2012) Computer forensics in communication networks. In: UNSPECIFIED, ed. IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2011). IET Conference Publications (589). Curran. pp. 379-383 ISBN 9781618399571

Williams, J. (2018) Creating and integrating a FLOSS product into UK law enforcement. In: UNSPECIFIED, ed. Open Source Systems: Enterprise Software and Solutions. Springer. ISBN 9783319923741

Williams, J. (2017) Open source internet research tool (OSIRT): an investigative tool for law enforcement officials. In: HEA National Conference for Learning and Teaching in Cyber Security, 5-6 April, 2017, Liverpool.

Williams, J. and Humphries, G. (2018) Analysis of a training package for law enforcement to conduct open source research. International Journal of Cyber Research and Education, 1 (1). ISSN 2577-4816. (In Press)

Williams, Joseph and Stephens, P. (2015) OSIRT: a tool for law enforcement research and investigation. In: 11th Annual Teaching Computer Forensics Workshop, 19th November, 2015, Sunderland, UK.

Williams, Joseph and Stephens, P. (2015) Open source Internet research tool. In: DFRWS EU 2015 Annual Conference, March 23rd-26th, University College Dublin, Dublin, Ireland. (Unpublished)

This list was generated on Wed Oct 17 02:23:00 2018 UTC.

Share

Connect with us

Last edited: 29/06/2016 12:23:00