Skip to main content

Research Repository

Advanced Search

All Outputs (16)

Installation address (2009)
Presentation / Conference
Hall, M. (2009, October). Installation address. Presented at Vice-Chancellor's Installation Address, University of Salford

Killing off Mickey Mouse: Open knowledge, open innovation (2009)
Presentation / Conference
Hall, M. (2009, September). Killing off Mickey Mouse: Open knowledge, open innovation. Presented at Education in a Changing Environment Conference : Critical Voices, Critical Times, University of Salford

Mickey Mouse will be eighty-one next month. The anthropomorphic mouse keeps his eternal youth through the application of patent and copyright legislation, which ensures a constant flow of revenues from reproduction rights. Vigilant lawyers seek out... Read More about Killing off Mickey Mouse: Open knowledge, open innovation.

Performance of database driven network applications from the user perspective (2009)
Journal Article
Tang, S., YongFeng, H., & Yip, Y. J. (2009). Performance of database driven network applications from the user perspective. Transactions on internet and information systems (Seoul), 3(3), 235-250. https://doi.org/10.3837/tiis.2009.03.002

An understanding of performance of database driven network applications is critical in combating slow performance of e-commerce web sites, besides efficient web page design, and high quality and well-maintained web server equipment. This paper descri... Read More about Performance of database driven network applications from the user perspective.

XML data integrity based on concatenated hash function (2009)
Journal Article
Liu, B., Lu, J., & Yip, Y. (2009). XML data integrity based on concatenated hash function. International journal of computer science and information security (Pittsburgh, Pa.), 1(1), 31-40

Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting. Through... Read More about XML data integrity based on concatenated hash function.

Enterprising initiatives (2009)
Journal Article
Morris, H. (2009). Enterprising initiatives. Times higher education supplement, 50

The European Universities for Entrepreneurship (EUEREK) project team that conducted this study, and variously authored the book's 11 chapters, chose these particular institutions because they wanted to examine how entrepreneurialism flourishes and... Read More about Enterprising initiatives.

A series-parallel XML multisignature scheme for XML data authentication (2009)
Journal Article
Liu, B., Lu, J., & Yip, Y. (2009). A series-parallel XML multisignature scheme for XML data authentication. International journal of computer science and network security, 9(2), 236-247

XML signature technology is the major approach for ensuring XML data authentication. An XML signature should satisfy multiple data authentication requirements for XML data which pass a hierarchical network of responsibilities. Through investigation,... Read More about A series-parallel XML multisignature scheme for XML data authentication.

New knowledge and the university (2009)
Journal Article
Hall, M. (2009). New knowledge and the university. Anthropology Southern Africa, 32(1/2), 69-76

What forms of knowledge have legitimacy in the contemporary university? By using Actor-Network Theory to unravel the strands in a recent dispute about access to skeletons from a burial ground in Cape Town. This paper shows how circulating systems of... Read More about New knowledge and the university.

New Subjectivities: Capitalist, Colonial Subject and Archaeologist. Review of "Capitalism in Colonial Contexts". Society for Historical Archaeology, Albuquerque, January 2008 (2009)
Journal Article
Hall, M. (2009). New Subjectivities: Capitalist, Colonial Subject and Archaeologist. Review of "Capitalism in Colonial Contexts". Society for Historical Archaeology, Albuquerque, January 2008. Archaeologies, 5(1), 3-17. https://doi.org/10.1007/s11759-008-9086-4

The sub-discipline of Historical Archaeology continues to push out its borders from its origins as the archaeology of British colonial settlement in North America. This review article evaluates the contribution of a set of papers presented at the Soc... Read More about New Subjectivities: Capitalist, Colonial Subject and Archaeologist. Review of "Capitalism in Colonial Contexts". Society for Historical Archaeology, Albuquerque, January 2008.

Revealing memories from darkness (2009)
Book Chapter
Hall, M. (2009). Revealing memories from darkness. In P. P. A. Funari, A. Zarankin, & M. A. Salerno (Eds.), Memories from darkness : archaeology of repression and resistance in Latin America (177-185). New York: Springer

Nothing is different but everything’s changed (2009)
Book Chapter
Hall, M. (2009). Nothing is different but everything’s changed. In D. L. Featherman, M. Hall, & M. Krislov (Eds.), The next twenty-five years : affirmative action in higher education in the United States and South Africa. Ann Arbor: University of Michigan Press

Journal rankings and the ABS journal quality guide (2009)
Journal Article
Morris, H., Kelly, A., & Harvey, C. (2009). Journal rankings and the ABS journal quality guide. Management Decision, 47(9), 1441-1451. https://doi.org/10.1108/00251740910995648

Purpose – The purpose of this paper is to provide an outline of the arguments for and against different types of journal ranking lists, and, against this background, an account of the development of the Association of Business Schools' (ABS) Journal... Read More about Journal rankings and the ABS journal quality guide.

Conference programme & proceedings (2009)
Presentation / Conference
SPARC. (2009, January). Conference programme & proceedings. Presented at SPARC, University of Salford

An order-clique-based approach for mining maximal co-locations (2009)
Journal Article
Wang, L., Zhou, L., Lu, J., & Yip, Y. (2009). An order-clique-based approach for mining maximal co-locations. Information Sciences, 179(19), 3370-3382. https://doi.org/10.1016/j.ins.2009.05.023

Most algorithms for mining spatial co-locations adopt an Apriori-like approach to generate size-k prevalence co-locations after size-(k − 1) prevalence co-locations. However, generating and storing the co-locations and table instances is costly. A no... Read More about An order-clique-based approach for mining maximal co-locations.