Skip to main content

Research Repository

Advanced Search

All Outputs (9)

Performance of database driven network applications from the user perspective (2009)
Journal Article
Tang, S., YongFeng, H., & Yip, Y. J. (2009). Performance of database driven network applications from the user perspective. Transactions on internet and information systems (Seoul), 3(3), 235-250. https://doi.org/10.3837/tiis.2009.03.002

An understanding of performance of database driven network applications is critical in combating slow performance of e-commerce web sites, besides efficient web page design, and high quality and well-maintained web server equipment. This paper descri... Read More about Performance of database driven network applications from the user perspective.

XML data integrity based on concatenated hash function (2009)
Journal Article
Liu, B., Lu, J., & Yip, Y. (2009). XML data integrity based on concatenated hash function. International journal of computer science and information security (Pittsburgh, Pa.), 1(1), 31-40

Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting. Through... Read More about XML data integrity based on concatenated hash function.

Enterprising initiatives (2009)
Journal Article
Morris, H. (2009). Enterprising initiatives. Times higher education supplement, 50

The European Universities for Entrepreneurship (EUEREK) project team that conducted this study, and variously authored the book's 11 chapters, chose these particular institutions because they wanted to examine how entrepreneurialism flourishes and... Read More about Enterprising initiatives.

A series-parallel XML multisignature scheme for XML data authentication (2009)
Journal Article
Liu, B., Lu, J., & Yip, Y. (2009). A series-parallel XML multisignature scheme for XML data authentication. International journal of computer science and network security, 9(2), 236-247

XML signature technology is the major approach for ensuring XML data authentication. An XML signature should satisfy multiple data authentication requirements for XML data which pass a hierarchical network of responsibilities. Through investigation,... Read More about A series-parallel XML multisignature scheme for XML data authentication.

New knowledge and the university (2009)
Journal Article
Hall, M. (2009). New knowledge and the university. Anthropology Southern Africa, 32(1/2), 69-76

What forms of knowledge have legitimacy in the contemporary university? By using Actor-Network Theory to unravel the strands in a recent dispute about access to skeletons from a burial ground in Cape Town. This paper shows how circulating systems of... Read More about New knowledge and the university.

New Subjectivities: Capitalist, Colonial Subject and Archaeologist. Review of "Capitalism in Colonial Contexts". Society for Historical Archaeology, Albuquerque, January 2008 (2009)
Journal Article
Hall, M. (2009). New Subjectivities: Capitalist, Colonial Subject and Archaeologist. Review of "Capitalism in Colonial Contexts". Society for Historical Archaeology, Albuquerque, January 2008. Archaeologies, 5(1), 3-17. https://doi.org/10.1007/s11759-008-9086-4

The sub-discipline of Historical Archaeology continues to push out its borders from its origins as the archaeology of British colonial settlement in North America. This review article evaluates the contribution of a set of papers presented at the Soc... Read More about New Subjectivities: Capitalist, Colonial Subject and Archaeologist. Review of "Capitalism in Colonial Contexts". Society for Historical Archaeology, Albuquerque, January 2008.

Journal rankings and the ABS journal quality guide (2009)
Journal Article
Morris, H., Kelly, A., & Harvey, C. (2009). Journal rankings and the ABS journal quality guide. Management Decision, 47(9), 1441-1451. https://doi.org/10.1108/00251740910995648

Purpose – The purpose of this paper is to provide an outline of the arguments for and against different types of journal ranking lists, and, against this background, an account of the development of the Association of Business Schools' (ABS) Journal... Read More about Journal rankings and the ABS journal quality guide.

An order-clique-based approach for mining maximal co-locations (2009)
Journal Article
Wang, L., Zhou, L., Lu, J., & Yip, Y. (2009). An order-clique-based approach for mining maximal co-locations. Information Sciences, 179(19), 3370-3382. https://doi.org/10.1016/j.ins.2009.05.023

Most algorithms for mining spatial co-locations adopt an Apriori-like approach to generate size-k prevalence co-locations after size-(k − 1) prevalence co-locations. However, generating and storing the co-locations and table instances is costly. A no... Read More about An order-clique-based approach for mining maximal co-locations.