Skip to main content

Research Repository

Advanced Search

Outputs (179)

Enterprising initiatives (2009)
Journal Article
Morris, H. (2009). Enterprising initiatives. Times higher education supplement, 50

The European Universities for Entrepreneurship (EUEREK) project team that conducted this study, and variously
authored the book's 11 chapters, chose these particular institutions because they wanted to examine how
entrepreneurialism flourishes and... Read More about Enterprising initiatives.

A series-parallel XML multisignature scheme for XML data authentication (2009)
Journal Article
Liu, B., Lu, J., & Yip, Y. (2009). A series-parallel XML multisignature scheme for XML data authentication. International journal of computer science and network security, 9(2), 236-247

XML signature technology is the major approach for ensuring XML data authentication. An XML signature should satisfy multiple data authentication requirements for XML data which pass a hierarchical network of responsibilities. Through investigation,... Read More about A series-parallel XML multisignature scheme for XML data authentication.

Journal rankings and the ABS journal quality guide (2009)
Journal Article
Morris, H., Kelly, A., & Harvey, C. (2009). Journal rankings and the ABS journal quality guide. Management Decision, 47(9), 1441-1451. https://doi.org/10.1108/00251740910995648

Purpose – The purpose of this paper is to provide an outline of the arguments for and against different types of journal ranking lists, and, against this background, an account of the development of the Association of Business Schools' (ABS) Journal... Read More about Journal rankings and the ABS journal quality guide.

New knowledge and the university (2009)
Journal Article
Hall, M. (2009). New knowledge and the university. Anthropology Southern Africa, 32(1/2), 69-76

What forms of knowledge have legitimacy in the contemporary university? By using Actor-Network Theory to unravel the strands in a recent dispute about access to skeletons from a burial ground in Cape Town. This paper shows how circulating systems of... Read More about New knowledge and the university.

An order-clique-based approach for mining maximal co-locations (2009)
Journal Article
Wang, L., Zhou, L., Lu, J., & Yip, Y. (2009). An order-clique-based approach for mining maximal co-locations. Information Sciences, 179(19), 3370-3382. https://doi.org/10.1016/j.ins.2009.05.023

Most algorithms for mining spatial co-locations adopt an Apriori-like approach to generate size-k prevalence co-locations after size-(k − 1) prevalence co-locations. However, generating and storing the co-locations and table instances is costly. A no... Read More about An order-clique-based approach for mining maximal co-locations.

New Subjectivities: Capitalist, Colonial Subject and Archaeologist. Review of "Capitalism in Colonial Contexts". Society for Historical Archaeology, Albuquerque, January 2008 (2009)
Journal Article
Hall, M. (2009). New Subjectivities: Capitalist, Colonial Subject and Archaeologist. Review of "Capitalism in Colonial Contexts". Society for Historical Archaeology, Albuquerque, January 2008. Archaeologies, 5(1), 3-17. https://doi.org/10.1007/s11759-008-9086-4

The sub-discipline of Historical Archaeology continues to push out its borders from its origins as the archaeology of British colonial settlement in North America. This review article evaluates the contribution of a set of papers presented at the Soc... Read More about New Subjectivities: Capitalist, Colonial Subject and Archaeologist. Review of "Capitalism in Colonial Contexts". Society for Historical Archaeology, Albuquerque, January 2008.

More ways to gain status (2008)
Journal Article
Morris, H. (2008). More ways to gain status. Times higher education supplement, 26

When the credit crunch hits public-sector spending decisions in a year or so and the Government seeks to make good recent shortfalls in corporate investment in research and development, it seems likely that public-sector money will be more tightly fo... Read More about More ways to gain status.

A new security architecture for SIP based P2P computer networks (2008)
Journal Article
Yongfeng, H., Tang, S., & Yip, Y. (2008). A new security architecture for SIP based P2P computer networks. Journal of Accounting, Taxation and Performance Evaluation, 2(1),

Many applications are transferred from C/S (Client/Server) mode to P2P (Peer-to-Peer) mode such as VoIP (Voice over IP). This paper presents a new security architecture, i.e. a trustworthy authentication algorithm of peers, for Session Initialize Pro... Read More about A new security architecture for SIP based P2P computer networks.

Grand Designs: Creating an academic law library (2008)
Journal Article
Sales, N. (2008). Grand Designs: Creating an academic law library. Legal Information Management, 8(1), 50-55. https://doi.org/10.1017/S1472669608000108

This article looks at the project to build a new academic Law Library at the University of Salford. It examines the tasks involved, resource planning and communication as well as highlighting successes and issues raised during the construction and de... Read More about Grand Designs: Creating an academic law library.