Architecture, Computing & Engineering
Title | Architecture, Computing & Engineering |
---|---|
ACE | |
Type | School |
University | UEL |
Dean | Dr Seyed Ghorashi |
Research Administrator | Mrs Nazmin Uddin |
Research Degrees Leader | Dr Andrew Arewa |
Dr Ameer Al-Nemrat | |
Examination Officer | Mrs Nazmin Uddin |
Latest research outputs
Sort by Date Title
Investigation on the Turning Parameters for Surface Roughness using Taguchi Analysis
Rajasekaran, T., Palanikumar, K. and Arunachalam, S. 2013. Investigation on the Turning Parameters for Surface Roughness using Taguchi Analysis. Procedia Engineering. 51, pp. 781-790. https://doi.org/10.1016/j.proeng.2013.01.112Article
Robust Control of Diesel Drivelines
Fallahi, A. 2013. Robust Control of Diesel Drivelines. PhD Thesis University of East London School of Architecture, Computing and Engineering https://doi.org/10.15123/PUB.3076PhD Thesis
An empirical study on the implementation and evaluation of a goal-driven software development risk management model
Islam, S., Mouratidis, Haralambos and Weippl, Edgar R. 2013. An empirical study on the implementation and evaluation of a goal-driven software development risk management model. Information and Software Technology. 56 (2), pp. 117-133. https://doi.org/10.1016/j.infsof.2013.06.003Article
Virtual Machine and Code Generator for PLC-Systems
Gasser, Thomas 2013. Virtual Machine and Code Generator for PLC-Systems. MPhil Thesis University of East London School of Architecture, Computing and Engineering https://doi.org/10.15123/PUB.4018MPhil Thesis
The Performance of RANS Models for Prediction of Flows in Meandering Channels
Ghani, U., Marriott, M. and Wormleaton, P. 2013. The Performance of RANS Models for Prediction of Flows in Meandering Channels. Life Sciences Journal. 10 (10s), pp. 121-132.Article
Response of Beam-To-Column Web Cleated Joints For FRP Pultruded Members
Qureshi, J. and Mottram, J. Toby 2013. Response of Beam-To-Column Web Cleated Joints For FRP Pultruded Members. Journal of Composites for Construction. 18 (2), pp. 1-11. https://doi.org/10.1061/(ASCE)CC.1943-5614.0000392Article
Hygrothermal performance of hemp based thermal insulation materials in the UK
Latif, E. 2013. Hygrothermal performance of hemp based thermal insulation materials in the UK. PhD Thesis University of East London School of Architecture, Computing and Engineering https://doi.org/10.15123/PUB.3454PhD Thesis
Spiking neural network connectivity and its potential for temporal sensory processing and variable binding
Wall, J. and Glackin, C. 2013. Spiking neural network connectivity and its potential for temporal sensory processing and variable binding. Frontiers in Computational Neuroscience. 7 (182), pp. 1-2. https://doi.org/10.3389/fncom.2013.00182Article
Spiking Neural Network Connectivity and its Potential for Temporal Sensory Processing and Variable Binding
Wall, J. and Glackin, C. 2013. Spiking Neural Network Connectivity and its Potential for Temporal Sensory Processing and Variable Binding. Frontiers Media SA.Book
Performance evaluation of the Cognitive Packet Network in the presence of network worms
Sakellari, G. 2011. Performance evaluation of the Cognitive Packet Network in the presence of network worms. Performance Evaluation. 68 (10), pp. 927-937.Article
Using energy criteria to admit flows in a wired network
Sakellari, G., Morfopoulou, Cristina, Mahmoodi, Toktam and Gelenbe, Erol 2012. Using energy criteria to admit flows in a wired network. in: Gelenbe, Erol and Lent, Ricardo (ed.) Computer and information sciences III Heidelberg Springer. pp. 63-72Book chapter
A Framework to Recognise Daily Life Activities with Wireless Proximity and Object Usage Data
Azam, M.A., Loo, J., Naeem, U., Khan, S.K.A., Lasebae, A. and Gemikonakli, O. 2012. A Framework to Recognise Daily Life Activities with Wireless Proximity and Object Usage Data. in: Proceedings of 23rd IEEE International Symposium on Personal, Indoor and Mobile Radio Communication 2012 IEEE. pp. 590-595Book chapter
Behavioural Patterns Analysis of Low Entropy People Using Proximity Data
Azam, M.A., Loo, J., Khan, S.K.A., Naeem, U., Adeel, M. and Ejaz, Waleed 2012. Behavioural Patterns Analysis of Low Entropy People Using Proximity Data. Innovative Information Science & Technology Research Group.Report
Comparative Study on the Position of Shunt Active Power Filters in 25 kV AC Railway Systems
Park, Haneol, Song, Joongho and Hosny, W. 2012. Comparative Study on the Position of Shunt Active Power Filters in 25 kV AC Railway Systems. IETE Technical Review. 29 (5), pp. 421-431.Article
Geofencing Components and Existing Models
Ijeh, Anthony C., Preston, D., Imafidon, Chris O., Watmon, Titus Bitek, Uwaechie, Annette O., Nwabude, Aaron Aniagolu and Kujabi, Ebrina 2010. Geofencing Components and Existing Models. Lecture Notes in Engineering and Computer Science. 2181 (1), pp. 823-828.Article
Beware, win or lose: Domestic violence and the World Cup
Brimicombe, A. and Cafe, Rebecca 2011. Beware, win or lose: Domestic violence and the World Cup. Significance. 9 (5), pp. 32-35.Article
Patterns of Creation and Usage of Wikipedia Content
Capiluppi, Andrea, Pimentel, Ana Claudia Duarte and Boldyreff, C. 2012. Patterns of Creation and Usage of Wikipedia Content. 14th IEEE International Symposium on Web Systems Evolution (WSE 2012). Riva del Garda (TN), Italy 28 Sep 2012Conference paper
Using an Architecture Description Language to Model a Large- Scale Information System – An Industrial Experience Report
Woods, Eoin and Bashroush, R. 2012. Using an Architecture Description Language to Model a Large- Scale Information System – An Industrial Experience Report. Proceedings of the Joint 10th Working IEEE/IFIP Conference on Software Architecture & 6th European Conference on Software Architecture. Helsinki Finland Aug 2012Conference paper
The Pandora Project: Advanced Training Environment for Crisis Scenarios
Dastbaz, Mohammad, Boldyreff, Cornelia and Arafa, Yasmine 2010. The Pandora Project: Advanced Training Environment for Crisis Scenarios. 16th ACM international conference on Supporting group work (GROUP'10). Sanibel (FL), USA 07 - 10 Nov 2010Conference paper
A Framework for Developing a Collaborative Training Environment for Crisis Management
Arafa, Yasmine, Boldyreff, Cornelia, Dastbaz, Mohammad and Liu, Hao 2011. A Framework for Developing a Collaborative Training Environment for Crisis Management. COLLA 2011, The First International Conference on Advanced Collaborative Networks, Systems and Applications. Luxembourg 19 - 24 Jun 2011Conference paper
A Framework to Support Collaborative Software Development and Reusability
Arafa, Yasmine, Boldyreff, Cornelia and Dastbaz, Mohammad 2011. A Framework to Support Collaborative Software Development and Reusability. COLLA 2011, The First International Conference on Advanced Collaborative Networks, Systems and Applications. Luxembourg 09 - 24 Jun 2011Conference paper
A High Level Service-Based Approach to Software Component Integration
Arafa, Yasmine, Boldyreff, Cornelia, Dastbaz, Mohammad and Liu, Hao 2012. A High Level Service-Based Approach to Software Component Integration. 1st International workshop on New Trends in Service Oriented Architecture for massive Knowledge processing in Modern Enterprise (SOA-KME). Palermo, Italy 04 - 06 Jul 2012Conference paper
Human Factors in Software Security Risk Management
Islam, S. 2008. Human Factors in Software Security Risk Management. in: Proceedings of the first international workshop on Leadership and management in software architecture Association for Computing Machinery (ACM). pp. 13-16Book chapter
Software Development Risk Management Model – A Goal Driven Approach
Islam, S. 2009. Software Development Risk Management Model – A Goal Driven Approach. ESEC/FSE'09 Joint 12th European Software Engineering Conference (ESEC) and 17th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-17). Amsterdam, The Netherlands 24 - 28 Aug 2009 Association for Computing Machinery (ACM).Conference paper
Offshore-Outsourced Software Development Risk Management Model
Islam, S. 2009. Offshore-Outsourced Software Development Risk Management Model. pp. 514-519Conference paper
Goal and Risk Factors in Offshore Outsourced Software Development From Vendor's Viewpoint
Islam, S. 2009. Goal and Risk Factors in Offshore Outsourced Software Development From Vendor's Viewpoint. 4th IEEE International Conference on Global Software Engineering. Limerick, Ireland 13 - 16 Jul 2009Conference paper
Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec
Islam, S. 2009. Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec. Requirements Engineering Journal. 15 (1), pp. 63-93.Article
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
Islam, S., Mouratidis, Haralambos and Wager, Stefan 2010. Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations. in: Wieringa, Roel and Persson, Anne (ed.) Requirements Engineering: Foundation for Software Quality Springer.Book chapter
A Framework to Support Alignment of Secure Software Engineering with Legal Regulations
Islam, S. and Mouratidis, Haralambos 2010. A Framework to Support Alignment of Secure Software Engineering with Legal Regulations. Software and Systems Modeling. 10 (3), pp. 369-394.Article
Integrating Risk Management Activities into Requirements Engineering
Islam, S. 2010. Integrating Risk Management Activities into Requirements Engineering. Fourth International Conference on Research Challenges in Information Science (RCIS), pp. 299-310Conference paper
Measuring Security Requirements for Software Security
Islam, S. and Falcarin, P. 2011. Measuring Security Requirements for Software Security. IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS). London 01 - 02 Sep 2011Conference paper
Towards a Framework for Offshore Outsource Software Development Risk Management Model
Islam, S. 2011. Towards a Framework for Offshore Outsource Software Development Risk Management Model. Journal of Software. 6 (1), pp. 38-47.Article
Supporting Requirements Engineers in Recognising Security Issues
Islam, S. 2011. Supporting Requirements Engineers in Recognising Security Issues. in: Lecture Notes in Computer Science Springer.Book chapter
Enhancing Security Requirements Engineering by Organisational Learning
Islam, S. 2012. Enhancing Security Requirements Engineering by Organisational Learning. Requirements Engineering Journal. 17 (1), pp. 35-36.Article
Software protection
Falcarin, P., Collberg, Christian, Atallah, Mikhail and Jakubowski, Mariusz 2011. Software protection. IEEE Software. 28 (2), pp. 24-27.Article
The contribution of architecture description languages to the evaluation of software architectures
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2004. The contribution of architecture description languages to the evaluation of software architectures.Conference paper
Using the NaSr Architectural Style to Solve the Broken Hyperlink Problem
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2004. Using the NaSr Architectural Style to Solve the Broken Hyperlink Problem.Conference paper
Towards an Automated Evaluation Process for Software Architectures
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2004. Towards an Automated Evaluation Process for Software Architectures.Conference paper
A Real-time Network Emulator: ADLARS Case Study
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2004. A Real-time Network Emulator: ADLARS Case Study.Conference paper
A Network Architectural Style for Real-time Systems: NaSr
Bashroush, R., Spence, Ivor, Kilpatrick, Peter and Brown, John 2004. A Network Architectural Style for Real-time Systems: NaSr.Conference paper
429746
total views455904
total downloads9409
views this month8671
downloads this month