Skip to main content

Research Repository

Advanced Search

Outputs (16)

Installation address (2009)
Presentation / Conference
Hall, M. (2009, October). Installation address. Presented at Vice-Chancellor's Installation Address, University of Salford

Killing off Mickey Mouse: Open knowledge, open innovation (2009)
Presentation / Conference
Hall, M. (2009, September). Killing off Mickey Mouse: Open knowledge, open innovation. Presented at Education in a Changing Environment Conference : Critical Voices, Critical Times, University of Salford

Mickey Mouse will be eighty-one next month. The anthropomorphic mouse keeps his eternal youth through the application of patent and copyright legislation, which ensures a constant flow of revenues from reproduction rights. Vigilant lawyers seek out... Read More about Killing off Mickey Mouse: Open knowledge, open innovation.

Performance of database driven network applications from the user perspective (2009)
Journal Article
Tang, S., YongFeng, H., & Yip, Y. J. (2009). Performance of database driven network applications from the user perspective. Transactions on internet and information systems (Seoul), 3(3), 235-250. https://doi.org/10.3837/tiis.2009.03.002

An understanding of performance of database driven network applications is critical in combating slow performance of e-commerce web sites, besides efficient web page design, and high quality and well-maintained web server equipment. This paper descri... Read More about Performance of database driven network applications from the user perspective.

XML data integrity based on concatenated hash function (2009)
Journal Article
Liu, B., Lu, J., & Yip, Y. (2009). XML data integrity based on concatenated hash function. International journal of computer science and information security (Pittsburgh, Pa.), 1(1), 31-40

Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting. Through... Read More about XML data integrity based on concatenated hash function.

Enterprising initiatives (2009)
Journal Article
Morris, H. (2009). Enterprising initiatives. Times higher education supplement, 50

The European Universities for Entrepreneurship (EUEREK) project team that conducted this study, and variously authored the book's 11 chapters, chose these particular institutions because they wanted to examine how entrepreneurialism flourishes and... Read More about Enterprising initiatives.

A series-parallel XML multisignature scheme for XML data authentication (2009)
Journal Article
Liu, B., Lu, J., & Yip, Y. (2009). A series-parallel XML multisignature scheme for XML data authentication. International journal of computer science and network security, 9(2), 236-247

XML signature technology is the major approach for ensuring XML data authentication. An XML signature should satisfy multiple data authentication requirements for XML data which pass a hierarchical network of responsibilities. Through investigation,... Read More about A series-parallel XML multisignature scheme for XML data authentication.

An order-clique-based approach for mining maximal co-locations (2009)
Journal Article
Wang, L., Zhou, L., Lu, J., & Yip, Y. (2009). An order-clique-based approach for mining maximal co-locations. Information Sciences, 179(19), 3370-3382. https://doi.org/10.1016/j.ins.2009.05.023

Most algorithms for mining spatial co-locations adopt an Apriori-like approach to generate size-k prevalence co-locations after size-(k − 1) prevalence co-locations. However, generating and storing the co-locations and table instances is costly. A no... Read More about An order-clique-based approach for mining maximal co-locations.

Conference programme & proceedings (2009)
Presentation / Conference
SPARC. (2009, January). Conference programme & proceedings. Presented at SPARC, University of Salford