Filter
Conference contribution

Search results

  • 2014

    Fine-grained provenance of user's interpretations in a collaborative visualization architecture

    Al-Naser, A., Rasheed, M., Irving, D. & Brooke, J. M., 2014, Proceedings of 5th International Conference on Information Visualization Theory annd Applications (IVAPP). p. 253-262 10 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • 2013

    A Study on Classification in Imbalanced and Partially-Labelled Data Streams

    Lyon, R. J., Brooke, J. M., Knowles, J. D. & Stappers, B. W., 2013, Systems, Man, and Cybernetics (SMC), 2013 IEEE International Conference on. p. 1506-1511 6 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • A visualization architecture for collaborative analytical and data provenance activities

    Al-Naser, A., Rasheed, M., Irving, D. & Brooke, J. M., 2013, Proceedings of the International Conference on Information Visualisation|Proc. Int. Conf. Inf. Visual.. IEEE, p. 253-262 9 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    File
    228 Downloads (Pure)
  • 2011

    HELIO: Discovery and analysis of data in heliophysics

    Bentley, R., Brooke, J., Csillaghy, A., Fellows, D., Le Blanc, A., Messerotti, M., Pérez-Suárez, D., Pierantoni, G. & Soldati, M., 2011, Proceedings - 2011 7th IEEE International Conference on eScience, eScience 2011|Proc. - IEEE Int. Conf. eScience, eScience. Stockholms: IEEE, p. 248-255 7 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • 2010

    A distributed computing architecture to support field engineering in networked systems

    Khan, K., Haines, R. & Brooke, J. M., 2010, CISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems|CISIS - Int. Conf. Complex, Intelligent Softw. Intensive Syst.. p. 54-61 7 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • Towards sybil resistant authentication in mobile ad hoc networks

    Hashmi, S. & Brooke, J., 2010, Proceedings - 4th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010|Proc. - Int. Conf. Emerg. Secur. Inf., Syst. Technol., SECURWARE. p. 17-24 7 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • 2009

    A software based approach for trusted agent execution on malicious host

    Hashmi, S. & Brooke, J., 2009, Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009|Proc. - IEEE Int. Conf. Comput. Sci. Eng., CSE. Vol. 2. p. 837-846 9 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • Formal Modelling of a Usable Identity Management Solution for Virtual Organisations

    Haidar, A. N., Coveney, P. V., Abdallah, A. E., Ryan, P. Y. A., Beckles, B., Brooke, J. M. & Jones, M. A. S., 2009, FAVO. p. 41-50 10 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • 2008

    Authentication mechanisms for mobile Ad-hoc networks and resistance to sybil attack

    Hashmi, S. & Brooke, J., 2008, Proceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys.|Int. Conf. Emerg. Secur. Inf., Syst. Technol., SECURWARE, Incl. DEPEND: Int. Workshop Dependability Secur. Complex Crit. Inf.. p. 120-126 6 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • avaBLAST: A fast way of doing all versus all BLAST

    Alam, I., Nadeem, S. A. & Brooke, J. M., 2008, 2008 Cairo International Biomedical Engineering Conference, CIBEC 2008|Cairo Int. Biomed. Eng. Conf., CIBEC.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • Towards Time Limited Secure Agent Execution on a Malicious Host

    Hashmi, S. & Brooke, J., 2008, Proceedings of the IFIP International Conference on Network and Parallel Computing. p. 155-162 8 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • Towards time limited secure agent execution on malicious host: A concept paper

    Hashmi, S. & Brooke, J., 2008, Proceedings - 2008 IFIP International Conference on Network and Parallel Computing, NPC 2008|Proc. - IFIP Int. Conf. Netw. Parallel Comput., NPC. p. 155-162 7 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • 2007

    Knowledge of the Grid: A Grid Ontology

    Parkin, M., van den Burghe, S., Corcho, O., Snelling, D., Brooke, J., Bubak, M. (Editor), Turala, M. (Editor) & Wiatr, K. (Editor), 2007, Proceedings of Cracow Grid Workshop - CGW’06, October 15-18 2006. Bubak, M., Turala, M. & Wiatr, K. (eds.). p. 111-118 8 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • 2006

    A Framework and Negotiation Protocol for Service Contracts

    Parkin, M., Kuo, D. & Brooke, J., 2006, Proceedings of the 2006 International Conference on Services Computing (SCC06). p. 253-256 4 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • Negotiating Contracts on the Grid

    Kuo, D., Parkin, M. & Brooke, J., 2006, Proceedings of eChallenges e-2006 Conference. p. 60-66 7 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • 2005

    An architecture for distributed Grid brokering

    Brooke, J. M. & Fellows, D. K., 2005, Lecture Notes in Computer Science|Lect. Notes Comput. Sci.. Cunha, J. C. & Medeiros, P. D. (eds.). Vol. 3648. p. 475-484 9 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • A PDA client for the computational grid

    Brooke, J. & Parkin, M., 2005, Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE|Proc. Workshop Enabling Technol. Infrastruct. Collab. Enterp. WET. Vol. 2005. p. 325-330 5 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • Evaluating high-throughput reliable multicast for grid applications in production networks

    Barcellos, M. P., Nekovee, M., Koyabe, M., Daw, M. & Brooke, J., 2005, 2005 IEEE International Symposium on Cluster Computing and the Grid, CCGrid 2005|Int. Symp. Cluster Comput. Grid. Vol. 1. p. 442-449 7 p.

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • Implementing a secure, service oriented accounting system for computational economies

    Ainsworth, J. D., MacLaren, J. & Brooke, J. M., 2005, 2005 IEEE International Symposium on Cluster Computing and the Grid, CCGrid 2005|Int. Symp. Cluster Comput. Grid. Vol. 2. p. 654-660 6 p.

    Research output: Chapter in Book/Conference proceedingConference contribution