Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment

Article


Tawil, Abdel-Rahman H., Taweel, Adel, Naeem, U., Montebello, Matthew, Bashroush, R. and Al-Nemrat, A. 2014. Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment. Journal of Intelligent Information Systems. 43 (1), pp. 1-32. https://doi.org/10.1007/s10844-013-0300-5
AuthorsTawil, Abdel-Rahman H., Taweel, Adel, Naeem, U., Montebello, Matthew, Bashroush, R. and Al-Nemrat, A.
Abstract

Research and development activities relating to the grid have generally focused on applications where data is stored in files. However, many scientific and commercial applications are highly dependent on Information Servers (ISs) for storage and organization of their data. A data-information system that supports operations on multiple information servers in a grid environment is referred to as an interoperable grid system. Different perceptions by end-users of interoperable systems in a grid environment may lead to different reasons for integrating data. Even the same user might want to integrate the same distributed data in various ways to suit different needs, roles or tasks. Therefore multiple mediator views are needed to support this diversity. This paper describes our approach to supporting semantic interoperability in a heterogeneous multi-information server grid environment. It is based on using Integration Operators for generating multiple semantically rich RDF/OWL-based user defined mediator views above the grid participating ISs. These views support different perceptions of the distributed and heterogeneous data available. A set of grid services are developed for the implementation of the mediator views.

KeywordsIntegration operators; Semantic interoperability; Mediator views; Information Servers; Data integration; Service-based architecture; Grid services
JournalJournal of Intelligent Information Systems
Journal citation43 (1), pp. 1-32
ISSN0925-9902
1573-7675
Year2014
PublisherSpringer Verlag
Accepted author manuscript
Digital Object Identifier (DOI)https://doi.org/10.1007/s10844-013-0300-5
Publication dates
Print29 Jan 2014
Publication process dates
Deposited08 Mar 2017
Accepted03 Dec 2013
Copyright informationThe final publication is available at Springer via https://link.springer.com/article/10.1007/s10844-013-0300-5
Permalink -

https://repository.uel.ac.uk/item/85qwv

Download files

  • 192
    total views
  • 276
    total downloads
  • 1
    views this month
  • 3
    downloads this month

Export as

Related outputs

The Impact of CISO Appointment Announcements on the Market Value of Firms
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2022. The Impact of CISO Appointment Announcements on the Market Value of Firms. 17th International Conference on Cyber Warfare and Security (ICCWS 2022). Albany, New York, USA 17 - 18 Mar 2022 Academic Conferences International (ACI).
The Impact of Data Breach Announcements on Company Value in European Markets
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2021. The Impact of Data Breach Announcements on Company Value in European Markets. WEIS 2021: The 20th Annual Workshop on the Economics of Information Security. 28 - 29 Jun 2021
The Impact of GDPR Infringement Fines on the Market Value of Firms
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2021. The Impact of GDPR Infringement Fines on the Market Value of Firms. ECCWS 2021- Proceeding of the 20th European Conference on Cyber Warfare and Security. 24 - 25 Jun 2021 Academic Conferences International (ACI). https://doi.org/10.34190/EWS.21.088
SWOT Analysis of Information Security Management System ISO 27001
Akinyemi, I., Schatz, D. and Bashroush, R. 2020. SWOT Analysis of Information Security Management System ISO 27001. International Journal of Services Operations and Informatics. 10 (4), p. 305–329. https://doi.org/10.1504/IJSOI.2020.111297
Optimizing server refresh cycles: The case for circular economy with an aging Moore’s Law
Bashroush, R., Rteil, N., Kenny, R. and Wynne, A. 2020. Optimizing server refresh cycles: The case for circular economy with an aging Moore’s Law. IEEE Transactions on Sustainable Computing. 7 (1), pp. 189-200. https://doi.org/10.1109/TSUSC.2020.3035234
Case Studies for achieving a Return on Investment with a Hardware Refresh in Organizations with Small Data Centers
Doyle, J. and Bashroush, R. 2020. Case Studies for achieving a Return on Investment with a Hardware Refresh in Organizations with Small Data Centers. IEEE Transactions on Sustainable Computing. 6 (4), pp. 599-611. https://doi.org/10.1109/TSUSC.2020.3031450
Towards Efficient and Scalable Data-Intensive Content Delivery: State-of-the-Art, Issues and Challenges
Kilanioti, Irene, Fernández-Montes, Alejandro, Fernández-Cerero, Damián, Karageorgos, Anthony, Mettouris, Christos, Nejkovic, Valentina, Albanis, Nikolas, Bashroush, R. and Papadopoulos, George A. 2019. Towards Efficient and Scalable Data-Intensive Content Delivery: State-of-the-Art, Issues and Challenges. in: Kołodziej, Joanna and González-Vélez, Horacio (ed.) High-Performance Modelling and Simulation for Big Data Applications: Selected Results of the COST Action IC1406 cHiPSet Springer, Cham.
Security predictions — A way to reduce uncertainty
Schatz, D. and Bashroush, R. 2019. Security predictions — A way to reduce uncertainty. Journal of Information Security and Applications. 45, pp. 107-116. https://doi.org/10.1016/j.jisa.2019.01.009
Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All
Ebenuwa, S., Sharif, S., Al-Nemrat, A., Al-Bayatti, A. H., Alalwan, N., Alzahrani, A. I. and Alfarraj, O. 2019. Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All. Symmetry. 11 (Art. 1504). https://doi.org/10.3390/sym11121504
A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control
Uddin, M., Islam, S. and Al-Nemrat, A. 2019. A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control. IEEE Access. 7 (Art. 166676). https://doi.org/10.1109/ACCESS.2019.2947377
Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data
Ebenuwa, S., Sharif, M., Alazab, Mamoun and Al-Nemrat, A. 2019. Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data. IEEE Access. 7, pp. 24649-24666. https://doi.org/10.1109/ACCESS.2019.2899578
Deep Learning Approach for Intelligent Intrusion Detection System
Vinayakumar, R., Alazab, Mamoun, Soman, K. P., Poornachandran, Prabaharan, Al-Nemrat, A. and Venkatraman, Sitalakshmi 2019. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access. 7, pp. 41525-41550. https://doi.org/10.1109/ACCESS.2019.2895334
Towards a More Representative Definition of Cyber Security
Schatz, Daniel, Bashroush, R. and Wall, J. 2017. Towards a More Representative Definition of Cyber Security. Journal of Digital Forensics, Security and Law. 12 (2), pp. 53-74. https://doi.org/10.15394/jdfsl.2017.1476
Tracking Functional Decline using Ambient Intelligence for Alzheimer's Patients
Lee, Sin Wee, Naeem, U., Anthony, Richard, Tawil, A., Azam, Muhammad Awais and Preston, David 2014. Tracking Functional Decline using Ambient Intelligence for Alzheimer's Patients. in: Dogru, Ali H. and Suh, Sang (ed.) Proceedings of the 19th International Conference on Transformative Science and Engineering, Business and Social Innovation Society for Design and Process Science. pp. 107-116
Inference of Activities with Unexpected Actions Using Pattern Mining
Nasreen, Shamila, Azam, Muhammad Awais, Naeem, U. and Ghazanfar, Mustansar Ali 2015. Inference of Activities with Unexpected Actions Using Pattern Mining. in: UbiComp/ISWC'15 Adjunct: Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers Association for Computing Machinery (ACM). pp. 1479-1488
Inference of Hygiene Behaviours While Recognising Activities of Daily Living
Naeem, U., Tawil, Abdel-Rahman, Semelis, Ivans, Judah, Gaby and Aunger, Robert 2015. Inference of Hygiene Behaviours While Recognising Activities of Daily Living. in: Mansoor, Wathiq, Maamar, Zakaria and Rabhi, Fethi (ed.) ICCASA '14: Proceedings of the 3rd International Conference on Context-Aware Systems and Applications ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering). pp. 154-161
Representing Variability in Software Architecture: A Systematic Literature Review
Haider, U., Woods, E. and Bashroush, R. 2018. Representing Variability in Software Architecture: A Systematic Literature Review. International Journal of Software Engineering and Computer Systems. 4 (2), pp. 19-37. https://doi.org/10.15282/ijsecs.4.2.2018.2.0046
Neural Predictors of Gait Stability When Walking Freely in the Real-World.
Pizzamiglio, S., Abdalla, H., Naeem, U. and Turner, D. 2018. Neural Predictors of Gait Stability When Walking Freely in the Real-World. Journal of NeuroEngineering and Rehabilitation. 15 (11). https://doi.org/10.1186/s12984-018-0357-z
A Comprehensive Reasoning Framework for Hardware Refresh in Data Centers
Bashroush, R. 2018. A Comprehensive Reasoning Framework for Hardware Refresh in Data Centers. IEEE Transactions on Sustainable Computing. 3 (4), pp. 209-220. https://doi.org/10.1109/TSUSC.2018.2795465
The ALI Architecture Description Language
Haider, U., McGregor, John D. and Bashroush, R. 2018. The ALI Architecture Description Language. ACM SIGSOFT Software Engineering Notes. 43 (4), pp. 52-52. https://doi.org/10.1145/3282517.3282545
Functional Connectivity Evaluation for Infant EEG Signals based on Artificial Neural Network
Sharif, M., Naeem, U., Islam, S. and Karami, A. 2018. Functional Connectivity Evaluation for Infant EEG Signals based on Artificial Neural Network. Arai, Kohei, Kapoor, Supriya and Bhatia, Rahul (ed.) Intelligent Systems Conference (IntelliSys) 2018. London, UK 06 - 07 Sep 2018 Springer, Cham. https://doi.org/10.1007/978-3-030-01057-7_34
The Application of a Semantic-Based Process Mining Framework on a Learning Process Domain
Okoye, Kingsley, Islam, S., Naeem, U., Sharif, M., Azam, Muhammad Awais and Karami, A. 2018. The Application of a Semantic-Based Process Mining Framework on a Learning Process Domain. Arai, Kohei, Kapoor, Supriya and Bhatia, Rahul (ed.) Intelligent Systems Conference (IntelliSys) 2018. London, UK 06 - 07 Sep 2018 Springer, Cham. https://doi.org/10.1007/978-3-030-01054-6_96
Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing
Ehatisham-ul-Haq, Muhammad, Azam, Muhammad Awais, Loo, Jonathan, Shuang, Kai, Islam, S., Naeem, U. and Amin, Yasar 2017. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing. Sensors. 17 (9), p. 2043. https://doi.org/10.3390/s17092043
Identifying Smartphone Users based on their Activity Patterns via Mobile Sensing
Ehatisham-ul-Haq, M., Azam, Muhammad Awais, Naeem, U., Rѐhman, Shafiq Ur and Khalid, Asra 2017. Identifying Smartphone Users based on their Activity Patterns via Mobile Sensing. Procedia Computer Science. 113, pp. 202-209. https://doi.org/10.1016/j.procs.2017.08.349
Taskification – Gamification of Tasks
Naeem, U., Islam, S., Sharif, M., Sudakov, Sergey and Azam, Awais 2017. Taskification – Gamification of Tasks. in: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers Association for Computing Machinery (ACM). pp. 631-634
SignalSense - Towards Quality Service
Islam, S., Sharif, M., Naeem, U. and Geehan, James 2017. SignalSense - Towards Quality Service. in: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers Association for Computing Machinery (ACM). pp. 627-630
CrimeSafe - Helping you stay safe
Islam, S., Naeem, U., Sharif, M. and Dovnarovic, Arnold 2017. CrimeSafe - Helping you stay safe. in: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers Association for Computing Machinery (ACM). pp. 642-645
Neural correlates of single- and dual-task walking in the real world
Pizzamiglio, Sara, Naeem, U., Abdalla, H. and Turner, D. 2017. Neural correlates of single- and dual-task walking in the real world. Frontiers in Human Neuroscience. 11, p. Art 460. https://doi.org/10.3389/fnhum.2017.00460
Content Discovery Advertisements: An Explorative Analysis
Jadhav Balaji, R., Baravalle, Andres, Al-Nemrat, A. and Falcarin, P. 2017. Content Discovery Advertisements: An Explorative Analysis. in: Jahankhani, Hamid, Carlile, Alex, Emmett, David, Hosseinian-Far, Amin, Brown, Guy, Sexton, Graham and Jamal, Arshad (ed.) Global Security, Safety and Sustainability - The Security Challenges of the Connected World Springer Verlag.
Recognizing activities of daily living from patterns and extraction of web knowledge
Ihianle, I., Naeem, U., Tawil, A. and Azam, Muhammad Awais 2016. Recognizing activities of daily living from patterns and extraction of web knowledge. in: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct - UbiComp '16 New York, NY, USA Association for Computing Machinery (ACM). pp. 1255-1262
Using semantic-based approach to manage perspectives of process mining: Application on improving learning process domain data
Kingsley, Okoye, Tawil, Abdel-Rahman H., Naeem, U., Islam, S. and Lamine, Elyes 2017. Using semantic-based approach to manage perspectives of process mining: Application on improving learning process domain data. in: 2016 IEEE International Conference on Big Data (Big Data) IEEE. pp. 3529-3538
Inference Engine Based on a Hierarchical Structure for Detecting Everyday Activities within the Home
Naeem, U., Tawil, A., Semelis, Ivans, Azam, Muhammad Awais and Ghazanfar, Mustansar Ali 2017. Inference Engine Based on a Hierarchical Structure for Detecting Everyday Activities within the Home. in: Bi, Yaxin, Kapoor, Supriya and Bhatia, Rahul (ed.) Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016 Springer, Cham. pp. 969-986
A Semantic Reasoning Method Towards Ontological Model for Automated Learning Analysis
Okoye, Kingsley, Tawil, A., Naeem, U. and Lamine, Elyes 2015. A Semantic Reasoning Method Towards Ontological Model for Automated Learning Analysis. in: Pillay, Nelishia, Engelbrecht, Andries P., Abraham, Ajith, Plessis, Mathys C. du, Snášel, Václav and Muda, Azah Kamilah (ed.) Advances in Nature and Biologically Inspired Computing Cham, Switzerland Springer International Publishing.
A dynamic segmentation based activity discovery through topic modelling
Kennedy, Ihianle Isibor, Naeem, U. and Tawil, A. 2016. A dynamic segmentation based activity discovery through topic modelling. in: IET International Conference on Technologies for Active and Assisted Living (TechAAL) IEEE.
Jolinar: Analysing the Energy Footprint of Software Applications (demo)
Noureddine, A., Islam, S. and Bashroush, R. 2016. Jolinar: Analysing the Energy Footprint of Software Applications (demo). in: Proceedings of the 25th International Symposium on Software Testing and Analysis New York, NY, USA Association for Computing Machinery (ACM). pp. 445-448
Semantic-Based Model Analysis Towards Enhancing Information Values of Process Mining: Case Study of Learning Process Domain
Okoye, Kingsley, Tawila, Abdel-Rahman H., Naeem, U., Islam, S. and Lamine, Elyes 2017. Semantic-Based Model Analysis Towards Enhancing Information Values of Process Mining: Case Study of Learning Process Domain. in: Abraham, Ajith, Cherukuri, Aswani Kumar, Madureira, Ana Maria and Muda, Azah Kamilah (ed.) Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2016) Springer, Cham.
Security countermeasures in the cyber-world
Bendovschi, Andreea and Al-Nemrat, A. 2016. Security countermeasures in the cyber-world. in: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) IEEE. pp. 1-7
Measuring sustainability for an effective Information System audit from public organization perspective
Lope Abdul Rahman, Alifah Aida, Islam, S. and Al-Nemrat, A. 2015. Measuring sustainability for an effective Information System audit from public organization perspective. in: Research Challenges in Information Science (RCIS), 2015 IEEE 9th International Conference on IEEE. pp. 42-51
ARP cache poisoning mitigation and forensics investigation
Mangut, Heman Awang, Al-Nemrat, A., Benzaid, Chafika and Tawil, Abdel-Rahman H. 2015. ARP cache poisoning mitigation and forensics investigation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1392-1397
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation
Al-Nemrat, A. and Benzaid, Chafika 2015. Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1380-1385
Intelligent Detection of MAC Spoofing Attack in 802.11 Network
Benzaid, Chafika, Boulgheraif, Abderrahman, Dahmane, Fatma Zohra, Al-Nemrat, A. and Zeraoulia, Khaled 2016. Intelligent Detection of MAC Spoofing Attack in 802.11 Network. in: Proceedings of the 17th International Conference on Distributed Computing and Networking Association for Computing Machinery (ACM).
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities
Sarantinos, Nikolaos, Benzaid, Chafika, Arabiat, Omar and Al-Nemrat, A. 2017. Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. in: 2016 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1782-1787
Architectural Principles for Energy-Aware Internet-Scale Applications
Bashroush, R. and Woods, E. 2017. Architectural Principles for Energy-Aware Internet-Scale Applications. IEEE Software. 34 (3), pp. 14-17. https://doi.org/10.1109/MS.2017.60
A Scalable Malware Classification based on Integrated Static and Dynamic Features
Bounouh, Tewfik, Brahimi, Zakaria, Al-Nemrat, A. and Benzaid, Chafika 2017. A Scalable Malware Classification based on Integrated Static and Dynamic Features. 11th International Conference on Global Security, Safety, and Sustainability (ICGS3) 2017. London, UK 18 - 20 Jan 2017 Springer International Publishing. https://doi.org/10.1007/978-3-319-51064-4_10
High-Frequency Intermuscular Coherence between Arm Muscles during Robot-Mediated Motor Adaptation
Pizzamiglio, Sara, De Lillo, Martina, Naeem, U., Abdalla, Hassan and Turner, D. 2017. High-Frequency Intermuscular Coherence between Arm Muscles during Robot-Mediated Motor Adaptation. Frontiers in Physiology. 7 (668), pp. 1-14. https://doi.org/10.3389/fphys.2016.00668
CASE Tool support for variability management in software product lines
Bashroush, R., Garba, M., Rabiser, R., Groher, I. and Botterweck, G. 2017. CASE Tool support for variability management in software product lines. ACM Computing Surveys. 50 (Art. 14). https://doi.org/10.1145/3034827
gUML: Reasoning about Energy at Design Time by Extending UML Deployment Diagrams with Data Centre Contextual Information
Jebraeil, Nigar, Noureddine, A., Doyle, J., Islam, S. and Bashroush, R. 2017. gUML: Reasoning about Energy at Design Time by Extending UML Deployment Diagrams with Data Centre Contextual Information. in: 2017 IEEE World Congress on Services (SERVICES) IEEE. pp. In Press
Cloud Strife: Expanding the Horizons of Cloud Gaming Services
Doyle, J., Islam, S., Bashroush, R. and O'Mahony, Donal 2017. Cloud Strife: Expanding the Horizons of Cloud Gaming Services. in: 2017 IEEE World Congress on Services (SERVICES) IEEE.
A Mutlimodal Approach to Measure the Levels Distraction of Pedestrians using Mobile Sensing
Pizzamiglio, S., Naeem, U., ur Réhman, Shafiq, Sharif, M., Abdalla, H. and Turner, D. 2017. A Mutlimodal Approach to Measure the Levels Distraction of Pedestrians using Mobile Sensing. Procedia Computer Science. 113, pp. 89-96. https://doi.org/10.1016/j.procs.2017.08.297
Recognition of Activities of Daily Living from Topic Model
Ihianle, I., Naeem, U. and Tawil, A. 2016. Recognition of Activities of Daily Living from Topic Model. Procedia Computer Science. 98, pp. 24-31. https://doi.org/10.1016/j.procs.2016.09.007
Fast authentication in wireless sensor networks
Benzaid, Chafika, Lounis, Karim, Al-Nemrat, A., Badache, Nadjib and Alazab, Mamoun 2014. Fast authentication in wireless sensor networks. Future Generation Computer Systems. 55, pp. 362-375.
Recognition Framework for Inferring Activities of Daily Living Based on Pattern Mining
Nasreen, Shamila, Azam, Muhammad Awais, Naeem, U., Ghazanfar, Mustansar Ali and Khalid, Asra 2016. Recognition Framework for Inferring Activities of Daily Living Based on Pattern Mining. Arabian Journal for Science and Engineering. 41 (8), pp. 3113-3126. https://doi.org/10.1007/s13369-016-2091-9
MUSA: A Scalable Multi-Touch and Multi-Perspective Variability Management Tool
Garba, Muhammad, Noureddine, Adel and Bashroush, R. 2016. MUSA: A Scalable Multi-Touch and Multi-Perspective Variability Management Tool. in: 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA) IEEE. pp. 299-302
Economic Valuation for Information Security Investment: A Systematic Literature Review
Schatz, Daniel and Bashroush, R. 2016. Economic Valuation for Information Security Investment: A Systematic Literature Review. Information Systems Frontiers. 19 (5), pp. 1205-1228. https://doi.org/10.1007/s10796-016-9648-8
Modelling large-scale information systems using ADLs – An industrial experience report
Woods, Eoin and Bashroush, R. 2014. Modelling large-scale information systems using ADLs – An industrial experience report. The Journal of Systems and Software. 99 (1), pp. 97-108.
The Impact Of Repeated Data Breach Events On Organisations’ Market Value
Schatz, Daniel and Bashroush, R. 2016. The Impact Of Repeated Data Breach Events On Organisations’ Market Value. Information and Computer Security. 24 (1), pp. 73-92.
Activities of daily life recognition using process representation modelling to support intention analysis
Naeem, U., Bashroush, R., Anthony, Richard, Azam, Muhammad Awais, Tawil, Abdel Rahman, Lee, S. and Mou-Ling, Dennis 2015. Activities of daily life recognition using process representation modelling to support intention analysis. International Journal of Pervasive Computing and Communications. 11 (3), pp. 347-371. https://doi.org/10.1108/IJPCC-01-2015-0002
Novel centroid selection approaches for KMeans-clustering based recommender systems
Zahra, Sobia, Ghazanfar, Mustansar Ali, Khalid, Asra, Azam, Muhammad Awais, Naeem, U. and Prugel-Bennett, Adam 2015. Novel centroid selection approaches for KMeans-clustering based recommender systems. Information Sciences. 320, pp. 156-189.
An Analysis of Honeypot Programs and the Attack Data Collected
Moore, C. and Al-Nemrat, A. 2015. An Analysis of Honeypot Programs and the Attack Data Collected. in: Jahankhani, Hamid, Carlile, Alex, Akhgar, Babak, Taal, Amie, Hessami, Ali G. and Hosseinian-Far, Amin (ed.) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security Springer International Publishing.
Semantic Process Mining Towards Discovery and Enhancement of Learning Model Analysis
Okoye, Kingsley, Tawil, Abdel Rahman H., Naeem, U. and Lamine, Elyes 2015. Semantic Process Mining Towards Discovery and Enhancement of Learning Model Analysis. in: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems IEEE. pp. 363-370
A Semantic Rule-based Approach Supported by Process Mining for Personalised Adaptive Learning
Okoye, Kingsley, Tawil, A., Naeem, U., Bashroush, Rabih and Lamine, Elyes 2014. A Semantic Rule-based Approach Supported by Process Mining for Personalised Adaptive Learning. Procedia Computer Science. 37, pp. 203-210.
Frequent Pattern Mining Algorithms for Finding Associated Frequent Patterns for Data Streams: A Survey
Nasreen, Shamila, Azam, Muhammad Awais, Shehzad, Khurram, Naeem, U. and Ghazanfar, Mustansar Ali 2014. Frequent Pattern Mining Algorithms for Finding Associated Frequent Patterns for Data Streams: A Survey. Procedia Computer Science. 37, pp. 109-116.
Statistical Sampling Approach to Investigate Child Pornography Cases
Sarantinos, N., Al-Nemrat, A. and Naeem, U. 2013. Statistical Sampling Approach to Investigate Child Pornography Cases. 2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC). Sydney NSW, Australia 21 - 22 Nov 2013 IEEE. https://doi.org/10.1109/CTC.2013.14
A Framework to Recognise Daily Life Activities with Wireless Proximity and Object Usage Data
Azam, M.A., Loo, J., Naeem, U., Khan, S.K.A., Lasebae, A. and Gemikonakli, O. 2012. A Framework to Recognise Daily Life Activities with Wireless Proximity and Object Usage Data. in: Proceedings of 23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communication 2012 IEEE. pp. 590-595
Behavioural Patterns Analysis of Low Entropy People Using Proximity Data
Azam, M.A., Loo, J., Khan, S.K.A., Naeem, U., Adeel, M. and Ejaz, Waleed 2012. Behavioural Patterns Analysis of Low Entropy People Using Proximity Data. Innovative Information Science & Technology Research Group.
Using an Architecture Description Language to Model a Large- Scale Information System – An Industrial Experience Report
Woods, Eoin and Bashroush, R. 2012. Using an Architecture Description Language to Model a Large- Scale Information System – An Industrial Experience Report. Proceedings of the Joint 10th Working IEEE/IFIP Conference on Software Architecture & 6th European Conference on Software Architecture. Helsinki Finland Aug 2012
The contribution of architecture description languages to the evaluation of software architectures
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2004. The contribution of architecture description languages to the evaluation of software architectures.
Using the NaSr Architectural Style to Solve the Broken Hyperlink Problem
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2004. Using the NaSr Architectural Style to Solve the Broken Hyperlink Problem.
Towards an Automated Evaluation Process for Software Architectures
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2004. Towards an Automated Evaluation Process for Software Architectures.
A Real-time Network Emulator: ADLARS Case Study
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2004. A Real-time Network Emulator: ADLARS Case Study.
A Network Architectural Style for Real-time Systems: NaSr
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2004. A Network Architectural Style for Real-time Systems: NaSr.
Deriving Product Architectures from an ADLARS Described Reference Architecture using Leopard
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2004. Deriving Product Architectures from an ADLARS Described Reference Architecture using Leopard.
Feature Guided Architecture Development for Embedded System Families
Brown, John, Bashroush, R., Gillan, Charles, Spence, Ivor and Kilpatrick, Peter 2005. Feature Guided Architecture Development for Embedded System Families.
A Generic Reference Software Architecture for Load Balancing Over Mirrored Web Servers: NaSr Case Study
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2005. A Generic Reference Software Architecture for Load Balancing Over Mirrored Web Servers: NaSr Case Study.
ADLARS: An Architecture Description Language for Software Product Lines
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2005. ADLARS: An Architecture Description Language for Software Product Lines.
Weaving Behaviour into Feature Models for Embedded System Families
Brown, John, Gawley, Rachel, Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Gillan, Charles 2006. Weaving Behaviour into Feature Models for Embedded System Families.
Towards More Flexible Architecture Description Languages for Industrial Applications
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2006. Towards More Flexible Architecture Description Languages for Industrial Applications. in:
Towards Performance Related Decision Support for Model Driven Engineering of Enterprise SOA Applications
Fritzsche, M, Gilani, Wasif, Spence, Ivor, Kilpatrick, Peter, Brown, John and Bashroush, R. 2008. Towards Performance Related Decision Support for Model Driven Engineering of Enterprise SOA Applications. in: Schierferdecker, Ina and Hartman, Alan (ed.) Model Driven Architecture – Foundations and Applications Springer.
A Multiple Views Model for Variability Management in Software Product Lines
Bashroush, R., Spence, Ivor, Kilpatrick, Peter, Brown, John and Gillan, Charles 2008. A Multiple Views Model for Variability Management in Software Product Lines. Proceedings of the Second International Workshop on Variability Modelling of Software-intensive Systems (VaMoS2008). Essen, Germany 16 - 18 Jan 2008
ALI: An Extensible Architecture Description Language for Industrial Applications
Bashroush, R., Spence, Ivor, Kilpatrick, Peter, Brown, John, Gilani, Wasif and Fritzsche, M 2008. ALI: An Extensible Architecture Description Language for Industrial Applications. in: Springer.
Towards Performance Related Decision Support for Model Driven Engineering of Enterprise SOA Applications
Bashroush, R. and Spence, Ivor 2008. Towards Performance Related Decision Support for Model Driven Engineering of Enterprise SOA Applications. in: Proceedings of 15th IEEE International Conference on Engineering of Computer-Based Systems (ECBS) IEEE. pp. 57-65
A Scalable Multiple Perspective Variability Management CASE Tool
Bashroush, R. 2010. A Scalable Multiple Perspective Variability Management CASE Tool. 14th International Software Product Line Conference (SPLC). South Korea Sep 2010
A NUI Based Multiple Perspective Variability Modelling CASE Tool
Bashroush, R. 2010. A NUI Based Multiple Perspective Variability Modelling CASE Tool. in: Babar, Muhammad Ali and Gorton, IAn (ed.) Software Architecture: Proceedings of 4th European Conference, ECSA 2010, Copenhagen, Denmark, August 23-26, 2010 Springer.
Logical Reasoning and Decision Making
Ong, D, Khaddaj, Souheil and Bashroush, R. 2011. Logical Reasoning and Decision Making. 10th IEEE International Conference on Cybernetic Intelligent Systems. London Aug 2011
A Provisioning Model towards OAuth 2.0 Optimization
Nouriddine, Moustafa and Bashroush, R. 2011. A Provisioning Model towards OAuth 2.0 Optimization. 10th IEEE International Conference on Cybernetic Intelligent Systems. London Sep 2011
A Performance Optimization Model towards OAuth 2.0 Adoption in the Enterprise
Nouriddine, Moustafa and Bashroush, R. 2011. A Performance Optimization Model towards OAuth 2.0 Adoption in the Enterprise. Proceedings of the 7th International Conference on Global Security, Safety & Sustainability (ICGS3). Greece Aug 2011
Modality Cost Analysis: A Methodology for Cost Effective Datacenter Capacity Planning in the Cloud
Nouriddine, Moustafa and Bashroush, R. 2011. Modality Cost Analysis: A Methodology for Cost Effective Datacenter Capacity Planning in the Cloud.
Modality Cost Analysis Based Methodology for Cost Effective Datacenter Capacity Planning in the Cloud
Nouriddine, Moustafa and Bashroush, R. 2011. Modality Cost Analysis Based Methodology for Cost Effective Datacenter Capacity Planning in the Cloud. Ubiquitous Computing and Communication Journal.
Sufficiency of Windows Event log as Evidence in Digital Forensics
Ibrahim, Nurdeen, Al-Nemrat, Ameer, Jahankhani, Hamid and Bashroush, R. 2011. Sufficiency of Windows Event log as Evidence in Digital Forensics. Proceedings of the 7th International Conference on Global Security, Safety & Sustainability (ICGS3). Greece Aug 2011
GSi Compliant RAS for Public Private Sector Partnership
Fawzi, Fawzi and Bashroush, R. 2011. GSi Compliant RAS for Public Private Sector Partnership. Proceedings of the 7th International Conference on Global Security, Safety & Sustainability (ICGS3). Greece Aug 2011
Case Study: Using ADLARS to Design and Develop a Real-Time Network Emulator
Bashroush, R., Al-Nemrat, Ameer, Bachrouch, Mohammad and Spence, Ivor 2011. Case Study: Using ADLARS to Design and Develop a Real-Time Network Emulator. Proceedings of the International Conference on Information and Communication Systems (ICICS 2011). Jordan May 2011
Visualizing Variability Models Using Hyperbolic Trees
Bashroush, R., Al-Nemrat, Ameer, Bachrouch, Mohammad and Jahankhani, Hamid 2011. Visualizing Variability Models Using Hyperbolic Trees. Proceedings of the 23rd International Conference on Advanced Information Systems Engineering Forum(CAiSE Forum 2011). London Jun 2011
A Cost Effective Cloud Datacenter Capacity Planning Method Based on Modality Cost Analysis
Bashroush, R. and Nouriddine, Moustafa 2013. A Cost Effective Cloud Datacenter Capacity Planning Method Based on Modality Cost Analysis. International Journal of Communication Networks and Distributed Systems. 11 (3), pp. 250-261.
A Comparison of Two Hidden Markov Approaches to Task Identification in the Home Environment
Naeem, U. and Bigham, John 2007. A Comparison of Two Hidden Markov Approaches to Task Identification in the Home Environment. Proceedings of the 2nd International Conference on Pervasive Computing and Applications, Birmingham, UK, 2007, pp. 383-388
Recognising Activities of Daily Life Using Hierarchical Plans
Naeem, U., Bigham, John and Wang, Jinfu 2007. Recognising Activities of Daily Life Using Hierarchical Plans. Proceedings of the 2nd European Conference on Smart Sensing and Context, LNCS 4793, Lake District, UK, 2007, pp. 175-189
A Hierarchal Approach to Activity Recognition in the Home Environment based on Object Usage
Naeem, U. and Bigham, John 2008. A Hierarchal Approach to Activity Recognition in the Home Environment based on Object Usage. Proceedings of the 2008 Networking and Electronic Commerce Research Conference (NAEC 2008), Lake Garda, Italy, 2008, pp. 48-54
Recognising Activities of Daily Life through the Usage of Everyday Objects around the Home
Naeem, U. and Bigham, John 2009. Recognising Activities of Daily Life through the Usage of Everyday Objects around the Home. Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare. Technologies to Counter Cognitive Decline Workshop London
Challenges in the Application of Feature Modelling in Fixed Line Telecommunications
Gillan, Charles, Kilpatrick, Peter, Spence, Ivor, Brown, T. John, Bashroush, R. and Gawley, Rachel 2007. Challenges in the Application of Feature Modelling in Fixed Line Telecommunications. Proceedings of the First International Workshop on Variability Modelling of Software-intensive Systems (VaMoS 2007), Lemrick, Ireland, Jan 16 -18, 2007. C Gillan
Activity Recognition using a Hierarchical Framework
Naeem, U. and Bigham, John 2008. Activity Recognition using a Hierarchical Framework. Proceedings of the 2nd International Conference on Pervasive Computing Technologies for Healthcare, Ambient Technologies for Diagnosing and Monitoring Chronic Patients Workshop, Tampere, Finland, 2008, IEEE pp. 24-27
Using a Software Product Line Approach in Designing Grid Services
Bashroush, R. and Perrott, Ronald 2005. Using a Software Product Line Approach in Designing Grid Services. 4th UK e-Science All Hands Meeting (AHM2005). Nottingham, UK Sep 2005
Requirements Modelling and Design Notations for Software Product Lines
Brown, T. John, Gawley, Rachel, Spence, Ivor, Kilpatrick, Peter, Gillan, Charles and Bashroush, R. 2007. Requirements Modelling and Design Notations for Software Product Lines. Proceedings of the First International Workshop on Variability Modelling of Software-intensive Systems (VaMoS2007), Lemrick, Ireland, Jan 16-18, 2007. T J. Brown