Items where Division is "Leeds Beckett University (pre-2020) > Faculty of Arts, Environment and Technology > Computing and Creative Technologies and Engineering" and Year is 2015
Up a level |
Alsufyani, R and Safdari, F and Chang, V (2015) "Migration of cloud services and deliveries to higher education." In: Proceedings of ESaaSA 2015 - 2nd International Workshop on Emerging Software as a Service and Analytics, In conjuction with the 5th International Conference on Cloud Computing and Services Science - CLOSER 2015. UNSPECIFIED, 86 - 94. ISBN 9789897581106
Altahhan, A (2015) Deep feature-action processing with mixture of updates. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9492. pp. 1-10. ISSN 0302-9743 DOI: https://doi.org/10.1007/978-3-319-26561-2_1
Andrews, PCS and Harris, J (2015) OnetoOne:24/2/15 John Harris talks to Penny Andrews. [Audio]
Bagheri Zadeh, P and Sheikh Akbari, A (2015) "Evaluation of Wavelet Transform Families in Image Resolution Enhancement." In: 2nd IET International Conference on Intelligent Signal Processing 2015 (ISP). IET. ISBN 978-1-78561-136-0
Bagheri Zadeh, P and Sheikh Akbari, A and Buggy, T (2015) DCT image codec using variance of sub-regions. DE GRUYTER OPEN: Open Computer Science, 5 (1). 13 - 21. ISSN 2299-1093 DOI: https://doi.org/10.1515/comp-2015-0003
Butterfield, EM and Schreuders, ZC (2015) Student Led Data Recovery Services: Providing Digital Forensics students with relevant work experience. In: The first UK Workshop on Cybersecurity Training & Education (Vibrant Workshop 2015), 11 June 2015, Liverpool.
Campbell, J and Chang, V and Hosseinian Far, A (2015) Philosophising data: A critical reflection on the ‘hidden’ issues. International Journal of Organizational and Collective Intelligence, 5 (1). ISSN 1947-9344 DOI: https://doi.org/10.4018/IJOCI.2015010101
Chand, K and Ramachandran, M and Kor, AL (2015) Simulation of cloud data security processes and performance. Communications in Computer and Information Science, 534. 285 - 295. ISSN 1865-0929 DOI: https://doi.org/10.1007/978-3-319-23276-8_26
Chang, V (2015) Towards a Big Data system disaster recovery in a Private Cloud. Ad Hoc Networks, 35. 65 - 82. ISSN 1570-8705 DOI: https://doi.org/10.1016/j.adhoc.2015.07.012
Chang, V (2015) A cybernetics Social Cloud. Journal of Systems and Software. ISSN 0164-1212 DOI: https://doi.org/10.1016/j.jss.2015.12.031
Chang, V and Kuo, YH and Ramachandran, M (2015) Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57. 24 - 41. ISSN 0167-739X DOI: https://doi.org/10.1016/j.future.2015.09.031
Chang, V and Ramachandran, M (2015) "Quality of service for financial modeling and prediction as a service." In: Proceedings of ESaaSA 2015 - 2nd International Workshop on Emerging Software as a Service and Analytics, In conjuction with the 5th International Conference on Cloud Computing and Services Science - CLOSER 2015. UNSPECIFIED, 5 - 15. ISBN 9789897581106
Chang, V and Ramachandran, M (2015) Towards Achieving Data Security with the Cloud Computing Adoption Framework. IEEE Transactions on Services Computing, 9 (1). 138 - 151. ISSN 1939-1374 DOI: https://doi.org/10.1109/TSC.2015.2491281
Chang, V and Ramachandran, M and Yao, Y and Kuo, YH and Li, CS (2015) A resiliency framework for an enterprise cloud. International Journal of Information Management, 36 (1). 155 - 166. ISSN 0268-4012 DOI: https://doi.org/10.1016/j.ijinfomgt.2015.09.008
Chang, V and Walters, RJ and Wills, G (2015) Monte Carlo simulation as a service in the Cloud. International Journal of Business Process Integration and Management, 7 (3). 262 - 271. ISSN 1741-8763 DOI: https://doi.org/10.1504/IJBPIM.2015.071245
Cristea, V and Pattinson, C and Kor, AL (2015) ENERGY CONSUMPTION OF MOBILE PHONES.
Doney, P and Fabri, M (2015) Seeking New Insights: A Design Thinking Approach to Persuasive Technology Aimed at Supporting Clients of a Weight Management Program. In: Romanian HCI Conference - RoCHI 2015, 24 Sep 2015 - 25 Sep 2015, Bucharest.
Fabri, M (2015) Thinking with a New Purpose: Lessons Learned from Teaching Design Thinking Skills to Creative Technology Students. Lecture Notes in Computer Science, 9186. 32 - 43. ISSN 1611-3349 DOI: https://doi.org/10.1007/978-3-319-20886-2_4
Gu, F and Flórez-Revuelta, F and Monekosso, D and Remagnino, P (2015) Marginalised Stacked Denoising Autoencoders for Robust Representation of Real-Time Multi-View Action Recognition. Sensors (Basel, Switzerland), 15 (7). 17209 - 17231. DOI: https://doi.org/10.3390/s150717209
Hosseinian Far, A and Chang, V (2015) Sustainability of Strategic Information Systems in Emergent vs. Prescriptive Strategic Management. International Journal of Organizational and Collective Intelligence, 5 (1). ISSN 1947-9344 DOI: https://doi.org/10.4018/IJOCI.2015100101
Kor, A and Pattinson, C and Imam, I and AlSaleemi, I and Omotosho, O (2015) Applications, Energy Consumption and Measurement. Information and Digital Technologies (IDT), 2015 International Conference on. 161 - 171. DOI: https://doi.org/10.1109/DT.2015.7222967
Kor, AL and Pattinson, C and Pope, R and Schulte, A (2015) An Integrated Healthcare System and Services for Empowering Patients.
Love, DJO and Adshead, D and Boisvert, C and Spencer, P (2015) Changing Culture: Educating the Next Computer Scientists. DOI: https://doi.org/10.1145/2729094.2742610
Mallik, B and Sheikh Akbari, A and Bagheri Zadeh, P (2015) "HEVC based Stereo Video codec." In: 2nd IET International Conference on Intelligent Signal Processing 2015 (ISP). IET. ISBN 978-1-78561-136-0
Marino, MD and Li, KC (2015) Implications of Shallower Memory Controller Transaction Queues in Scalable Memory Systems. Journal of Supercomputing. ISSN 1573-0484 DOI: https://doi.org/10.1007/s11227-015-1485-x
Marino, MD and Li, KC (2015) Reducing Memory Controller Transaction Queue Size in Scalable Memory Systems. The 2015 World Congress on Information Technology Applications and Services: Advanced Mobile, Communications, Security, Multimedia, Vehicular, Cloud, IoT, and Computing.
Muhd Azmi, S and Bujang, N and Kor, A and Pattinson, C (2015) A Comparative Study on the Energy Efficiency of 4th Gen Intel Core Processor vs 3rd Gen Intel Core Processor. In: The 2015 International Conference on Embedded Systems and Applications, 27–30 July 2015, Las Vegas.
Nikolopoulou, M and Martin, K and Dalton, B (2015) Shaping pedestrian movement through playful interventions in security planning: what do field surveys suggest? Journal of Urban Design, 21 (1). 84 - 104. ISSN 1357-4809 DOI: https://doi.org/10.1080/13574809.2015.1106913
Olauluwa, P and Kor, AL and Pattinson, C (2015) PHP Single and Double Quotes: Does It Make a Difference to Energy Consumption?
Pattinson, C and Cross, R and Kor, A (2015) "Thin Client and Energy efficiency." In: Dastbaz, M and Pattinson, C and Akhgar, B, (eds.) Green Information Technology: A Sustainable Approach. Elsevier. ISBN UNSPECIFIED
Pattinson, C and Kor, A and Braddock, R (2015) "Community Wide Area Network and Mobile ISP." In: Dastbaz, M and Pattinson, C and Akhgar, B, (eds.) Green Information Technology: A Sustainable Approach. Elsevier. ISBN 9780128013793
Pattinson, C and Kor, A and Cross, R (2015) "Critical Issues for Data Center Energy Efficiency." In: Dastbaz, M and Pattinson, C and Akhgar, B, (eds.) Green Information Technology: A Sustainable Approach. Elsevier. ISBN 978-0-12-801379-3
Pattinson, C and Olaoluwa, P and Kor, AL (2015) A Comparative Study on the Energy Consumption of PHP Single and Double Quotes. 232 - 239. DOI: https://doi.org/10.1109/DSDIS.2015.87
Pillai, A and Hu, YF and Halliwell, RA (2015) A pre-emption framework for UMTS compatible satellite system supporting multimedia traffic. International Journal of Satellite Communications and Networking, 33 (2). pp. 147-162. ISSN 0737-2884 DOI: https://doi.org/10.1002/sat.1080
Ramachandran, M (2015) Software security requirements engineering: State of the art. Communications in Computer and Information Science, 534. 313 - 322. ISSN 1865-0929 DOI: https://doi.org/10.1007/978-3-319-23276-8_28
Ramachandran, M and Chang, V (2015) "Financial software as a service: A paradigm for risk modelling and analytics." In: Transportation Systems and Engineering: Concepts, Methodologies, Tools, and Applications. IGI Global, pp. 849-873. ISBN 9781466684744 DOI: https://doi.org/10.4018/978-1-4666-8473-7.ch043
Ramachandran, M and Chang, V (2015) Recommendations and best practices for cloud enterprise security. Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, 2015-F (Februa). 983 - 988. ISSN 2330-2194 DOI: https://doi.org/10.1109/CloudCom.2014.105
Ramachandran, M and Chang, V and Li, CS (2015) "The improved cloud computing adoption framework to deliver secure services." In: Proceedings of ESaaSA 2015 - 2nd International Workshop on Emerging Software as a Service and Analytics, In conjuction with the 5th International Conference on Cloud Computing and Services Science - CLOSER 2015. UNSPECIFIED, 73 - 79. ISBN 9789897581106
Ramachandran, M and Sangaiah, AK and Goa, X-Z and Zheng, X (2015) A fuzzy DEMATEL approach based on intuitionistic fuzzy information for evaluating knowledge transfer effectiveness in GSD projects. International Journal of Innovative Computing and Applications, 6 (3-4). ISSN 1751-6498 DOI: https://doi.org/10.1504/IJICA.2015.073006
Ramachandran, V and Murnane, D and Hammond, RB and Pickering, J and Roberts, KJ and Soufian, M and Forbes, B and Jaffari, S and Martin, GP and Collins, E and Pencheva, K (2015) Formulation pre-screening of inhalation powders using computational atom-atom systematic search method. Molecular pharmaceutics, 12 (1). 18 - 33. ISSN 1543-8384 DOI: https://doi.org/10.1021/mp500335w
Salah El-Din, R and Cairns, P and Clark, J (2015) It's all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks. International Journal of Applied Mathematics, Electronics and Computers, 3 (3). pp. 194-199. ISSN 2147-8228 DOI: https://doi.org/10.18100/ijamec.47036
Schmidt, M and Pattinson, C and Kor, AL (2015) A WEB-BASED ENVIRONMENTAL TOOLKIT TO SUPPORT SMES IN THE IMPLEMENTATION OF AN ENVIRONMENTAL MANAGEMENT SYSTEM.
Schreuders, ZC and Ardern, L (2015) Generating randomised virtualised scenarios for ethical hacking and computer security education: SecGen implementation and deployment. In: The first UK Workshop on Cybersecurity Training & Education (Vibrant Workshop 2015), 11 June 2015, Liverpool.
Schreuders, ZC and Butterfield, EM and Staniforth, P (2015) An open cloud-based virtual lab environment for computer security education: A pilot study evaluation of oVirt. In: The first UK Workshop on Cybersecurity Training & Education (Vibrant Workshop 2015), Liverpool.
Sheikh Akbari, A and Bagheri Zadeh, P and Behringer, R (2015) "Iris segmentation using a non-decimated wavelet transform." In: 2nd IET International Conference on Intelligent Signal Processing 2015 (ISP). IET. ISBN 978-1-78561-136-0
Stevens, RC and Raybould, D (2015) The reality paradox: Authenticity, fidelity, and the real in Battlefield 4. The Soundtrack, 8 (1-2). 57 - 75. ISSN 1751-4207 DOI: https://doi.org/10.1386/st.8.1-2.57_1
Stevens, RC and Raybould, D and McDermott, D (2015) Extreme Ninjas use windows not doors: Addressing video game fidelity through Ludo-Narrative music in the stealth genre. Proceedings of Audio Engineering Society 56th International Conference.