Gary B. Wills

Orcid: 0000-0001-5771-4088

Affiliations:
  • University of Southampton, UK


According to our database1, Gary B. Wills authored at least 228 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Property Ownership Formal Modelling Using Event-B and iUML-B.
Proceedings of the Rigorous State-Based Methods - 10th International Conference, 2024

2023
ANFIS for risk estimation in risk-based access control model for smart homes.
Multim. Tools Appl., May, 2023

An information security model for an IoT-enabled Smart Grid in the Saudi energy sector.
Comput. Electr. Eng., January, 2023

2022
Designing Serious Game Metrics for Family Caregivers of People with Dementia.
Int. J. Serious Games, 2022

Expert Review of the Land Registration Framework in the Kingdom of Saudi Arabia.
Int. J. ICT Res. Afr. Middle East, 2022

<i>Call for Special Issue Papers: </i> Big Data and the Internet-of-Things in Complex Information Systems: Selections from IoTBDS 2022 and COMPLEXIS 2022: Deadline for Manuscript Submission: September 30, 2022.
Big Data, 2022

A Framework of the Critical Factors for Healthcare Providers to Share Data Securely Using Blockchain.
IEEE Access, 2022

User Configurable Privacy Requirements Elicitation in Cyber-Physical Systems.
Proceedings of the UMAP '22: 30th ACM Conference on User Modeling, Adaptation and Personalization, Barcelona, Spain, July 4, 2022

Provisioning Security in a Next Generation Mobility as a Service System.
Proceedings of the 7th International Conference on Internet of Things, 2022

Using Environmental Data for IoT Device Energy Harvesting Prediction.
Proceedings of the 7th International Conference on Internet of Things, 2022

An Information Security Model for an IoT-enabled Smart Grid.
Proceedings of the 7th International Conference on Internet of Things, 2022

Using Big Data Analytics to Combat Retail Fraud.
Proceedings of the 4th International Conference on Finance, 2022

2021
Guest Editorial: Advanced Deep Learning Techniques for COVID-19.
IEEE Trans. Ind. Informatics, 2021

Fuzzy Logic with Expert Judgment to Implement an Adaptive Risk-Based Access Control Model for IoT.
Mob. Networks Appl., 2021

Exploring the impact of gamification on student engagement and involvement with e-learning systems.
Interact. Learn. Environ., 2021

The VoIP PBX Honeypot Advance Persistent Threat Analysis.
Proceedings of the 6th International Conference on Internet of Things, 2021

2020
Special issue on fog/edge computing in Enterprise Multimedia Security [SI 1138T].
Multim. Tools Appl., 2020

Special Issue: Latest Development, Recommendations and Selections from Internet of Things, Big Data and Security.
Internet Things, 2020

Internet of Things Forensics: A Review.
Internet Things, 2020

Developing a Framework and an Instrument for Measuring System Openness.
Int. J. Organ. Collect. Intell., 2020

Recommendations from cold starts in big data.
Computing, 2020

A Review of Blockchain in Internet of Things and AI.
Big Data Cogn. Comput., 2020

Investigating Trusted Records for Employment and Education.
Proceedings of the 5th International Conference on Internet of Things, 2020

A Framework for Data Sharing between Healthcare Providers using Blockchain.
Proceedings of the 5th International Conference on Internet of Things, 2020

A Survey on Machine Learning for Stock Price Prediction: Algorithms and Techniques.
Proceedings of the 2nd International Conference on Finance, 2020

FLOPTICS: A Novel Automated Gating Technique for Flow Cytometry Data.
Proceedings of the 5th International Conference on Complexity, 2020

2019
Corrigendum to: "An exploratory study for investigating the critical success factors for cloud migration in the Saudi Arabian higher education context" [Telematics and Informatics, 34 (2017) 664-678].
Telematics Informatics, 2019

Corrigendum to: "A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies" [Telematics and Informatics, 34 (2017) 996-1010].
Telematics Informatics, 2019

Analysing cross-cultural design in advergames: a comparison between the UK and Brazil.
EAI Endorsed Trans. Serious Games, 2019

Experts reviews of a cloud forensic readiness framework for organizations.
J. Cloud Comput., 2019

An efficient security risk estimation technique for Risk-based access control model for IoT.
Internet Things, 2019

Importance-Performance Analysis based SWOT analysis.
Int. J. Inf. Manag., 2019

Towards a framework for the successful implementation of a government cloud in Saudi Arabia.
Int. J. Bus. Process. Integr. Manag., 2019

Special Issue: Intelligent Management of Cloud, IoT and Big Data Applications.
J. Grid Comput., 2019

Chapter Three - Intersections between IoT and distributed ledger.
Adv. Comput., 2019

Chapter One - Technical aspects of blockchain and IoT.
Adv. Comput., 2019

A Security Framework to Protect Data in Cloud Storage.
Proceedings of the 4th International Conference on Internet of Things, 2019

Linux Patch Management: With Security Assessment Features.
Proceedings of the 4th International Conference on Internet of Things, 2019

Application of Business Process Modelling and Blockchain Technology for Financial Cloud.
Proceedings of the International Conference on Finance, 2019

IoT Forensics: A State-of-the-Art Review, Challenges and Future Directions.
Proceedings of the 4th International Conference on Complexity, 2019

2018
An empirical study of factors influencing cloud adoption among private sector organisations.
Telematics Informatics, 2018

The Application of Anthropomorphic Gamification within Transitional Healthcare: A conceptual framework.
EAI Endorsed Trans. Serious Games, 2018

Support dementia carers in game.
EAI Endorsed Trans. Serious Games, 2018

How to Analyze Data from Unlisted but Rich Firms: From the Perspective of Data and Analysis.
IT Prof., 2018

Can visual familiarity influence attitudes towards brands? An exploratory study of advergame design and cross-cultural consumer behaviour.
Entertain. Comput., 2018

A Multi-core architecture for a hybrid information system.
Comput. Electr. Eng., 2018

Fog Computing and the Internet of Things: A Review.
Big Data Cogn. Comput., 2018

The Feasibility of using V2G to Face the Peak Demand in Warm Countries.
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems, 2018

Towards Mapping the Security Challenges of the Internet of Things (IoT) Supply Chain.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018

XACML for Building Access Control Policies in Internet of Things.
Proceedings of the 3rd International Conference on Internet of Things, 2018

Internet of Nano Things: Security Issues and Applications.
Proceedings of the 2018 2nd International Conference on Cloud and Big Data Computing, 2018

Game for Supporting Dementia Carers.
Proceedings of the IEEE Games, Entertainment, Media Conference, 2018

Intelligence of Things: Opportunities & Challenges.
Proceedings of the 3rd Cloudification of the Internet of Things, 2018

2017
An exploratory study for investigating the critical success factors for cloud migration in the Saudi Arabian higher education context.
Telematics Informatics, 2017

A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies.
Telematics Informatics, 2017

Metrics Feedback Cycle: measuring and improving user engagement in gamified eLearning systems.
Int. J. Serious Games, 2017

Exploring avatar roles for motivational effects in gameful environments.
EAI Endorsed Trans. Creative Technol., 2017

Expert-interviews led analysis of EEVi - A model for effective visualization in cyber-security.
Proceedings of the 14th IEEE Symposium on Visualization for Cyber Security, 2017

An Agent Trading on Behalf of V2G Drivers in a Day-ahead Price Market.
Proceedings of the 3rd International Conference on Vehicle Technology and Intelligent Transport Systems, 2017

A Framework for Cloud Forensic Readiness in Organizations.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

Developing an Adaptive Risk-Based Access Control Model for the Internet of Things.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Integration of Cloud Computing with Internet of Things: Challenges and Open Issues.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

An event-based access control for IoT.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things.
Proceedings of the 2nd International Conference on Internet of Things, 2017

A Proposed Best-practice Framework for Information Security Governance.
Proceedings of the 2nd International Conference on Internet of Things, 2017

An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things.
Proceedings of the 2nd International Conference on Internet of Things, 2017

An Integrated Model to Investigate an Individual's Behavioural Towards using Cloud Computing.
Proceedings of the 2nd International Conference on Internet of Things, 2017

Keynote speaker 3: Looking after our IP in supply chain.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Factors affecting the implementation of information assurance for eGovernment in Indonesia.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Clustering Goal-Driven Security Factors for Protecting Data in Cloud Storage using Exploratory Factor Analysis (EFA): An Empirical Study.
Proceedings of the CLOSER 2017, 2017

The Impact of Cloud Forensic Readiness on Security.
Proceedings of the CLOSER 2017, 2017

Immersion and Narrative Design in Educational Games Across Cultures.
Proceedings of the Serious Games and Edutainment Applications, Volume II, 2017

2016
Understanding the Impact of the Interconnection Network Performance of Multi-core Cluster Architectures.
J. Comput., 2016

Model and experimental development for Business Data Science.
Int. J. Inf. Manag., 2016

Web 2.0 - The past and the future.
Int. J. Inf. Manag., 2016

Organisational sustainability modelling - An emerging service and analytics model for evaluating Cloud Computing adoption with two case studies.
Int. J. Inf. Manag., 2016

Review of economic bubbles.
Int. J. Inf. Manag., 2016

Critical success factors (CSFs) for information technology governance (ITG).
Int. J. Inf. Manag., 2016

A model to compare cloud and non-cloud storage of Big Data.
Future Gener. Comput. Syst., 2016

Editorial for FGCS special issue: Big Data in the cloud.
Future Gener. Comput. Syst., 2016

Formal Modelling of Data Integration Systems Security Policies.
Data Sci. Eng., 2016

The design of a hybrid cultural model for Arabic gamified systems.
Comput. Hum. Behav., 2016

A Framework to Secure the Virtual Machine Image in Cloud Computing.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

EEVi - framework for evaluating the effectiveness of visualization in cyber-security.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Automated penetration testing based on a threat model.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

A framework for cloud computing adoption by Saudi government overseas agencies.
Proceedings of the Fifth International Conference on Future Communication Technologies, 2016

Data security in cloud computing.
Proceedings of the Fifth International Conference on Future Communication Technologies, 2016

Goal-based security components for cloud storage security framework: a preliminary study.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

Latest Trends, Frameworks and Examples in Information Systems, Big Data and Cloud Computing.
Proceedings of the COMPLEXIS 2016, 2016

2015
An Analytical Model of Multi-Core Multi-Cluster Architecture (MCMCA).
Open J. Cloud Comput., 2015

Emerging Software as a Service and Analytics.
Open J. Cloud Comput., 2015

Epilogue: Summary and Outlook.
Open J. Big Data, 2015

Introductory Editorial.
Open J. Big Data, 2015

Reflective evaluation of civil society development: A case study of RLabs Cape Town, South Africa.
J. Community Informatics, 2015

A conceptualization of intended learning outcomes supporting self-regulated learners in indicating learning paths.
J. Comput. Assist. Learn., 2015

Monte Carlo simulation as a service in the Cloud.
Int. J. Bus. Process. Integr. Manag., 2015

The Dreams Plan: A Blupoint Strategy for e-Education Provision in South Africa.
Electron. J. Inf. Syst. Dev. Ctries., 2015

Analysing threats in cloud storage.
Proceedings of the 2015 World Congress on Internet Security, 2015

Linked data-driven decision support for accessible travelling.
Proceedings of the 12th Web for All Conference, 2015

Simulation and Mathematical Analysis of Multi-core Cluster Architecture.
Proceedings of the UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, 2015

Cultural persuasive affordances in advergaming design across cultures: a conceptual model.
Proceedings of the 19th International Academic Mindtrek Conference, 2015

Success Factors for the Implementation of a Private Government Cloud in Saudi Arabia.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Factors Affecting an Organisation's Decision to Adopt Cloud Services in Saudi Arabia.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

The Wheel of Sukr: A Framework for Gamifying Diabetes Self-Management in Saudi Arabia.
Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015)/ The 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2015)/ Affiliated Workshops, 2015

Using Goal-Question-Metric (GQM) Approach to Assess Security in Cloud Storage.
Proceedings of the Enterprise Security - Second International Workshop, 2015

Security in Organisations: Governance, Risks and Vulnerabilities in Moving to the Cloud.
Proceedings of the Enterprise Security - Second International Workshop, 2015

Protecting Document Outside Enterprise Network: A Confirmed Framework.
Proceedings of the Enterprise Security - Second International Workshop, 2015

Evaluation Metrics for VM Allocation Mechanisms in Desktop Clouds.
Proceedings of the ESaaSA 2015, 2015

Factors Influencing the Implementation of a Private Government Cloud in Saudi Arabia.
Proceedings of the ESaaSA 2015, 2015

Towards an Integrated Conceptual Model for Cloud Adoption in Saudi Arabia.
Proceedings of the ESaaSA 2015, 2015

An Overview of Cloud Services Adoption Challenges in Higher Education Institutions.
Proceedings of the ESaaSA 2015, 2015

2014
Electronic Identity
Springer Briefs in Cybersecurity, Springer, ISBN: 978-1-4471-6449-4, 2014

Evaluation of Node Failures in Cloud Computing Using Empirical Data.
Open J. Cloud Comput., 2014

Anomaly detection system: Towards a framework for enterprise log management of security services.
Proceedings of the 2014 World Congress on Internet Security, 2014

Component for 3D printing provenance framework: Security properties components for provenance framework.
Proceedings of the 2014 World Congress on Internet Security, 2014

Preventing document leakage through active document.
Proceedings of the 2014 World Congress on Internet Security, 2014

A survey of open accessibility data.
Proceedings of the International Web for All Conference, 2014

Resolving coreference and security issues of linked data by focusing on OWL: Same As: A method for similarity matching score on linked data.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Exposing data leakage in Data Integration Systems.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Developing SWOT Analysis from Customer Satisfaction Surveys.
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014

Open Accessibility Data Interlinking.
Proceedings of the Computers Helping People with Special Needs, 2014

Developing a New Framework for Evaluating Arabic Dyslexia Training Tools.
Proceedings of the Computers Helping People with Special Needs, 2014

Security Challenges in Cloud Storages.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Factors Influencing an Organisation's Intention to Adopt Cloud Computing in Saudi Arabia.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Towards a Framework for Securing a Document outside an Organisational Firewall.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Performance Evaluation of Multi-Core Multi-Cluster Architecture (MCMCA).
Proceedings of the ESaaSA 2014, 2014

A View at Desktop Clouds.
Proceedings of the ESaaSA 2014, 2014

Citizen Intention to Adopt e-Government Services in Saudi Arabia.
Proceedings of the ESaaSA 2014, 2014

2013
RLabs: A South African Perspective on a Community-driven Approach to Community Information.
J. Community Informatics, 2013

Profiling the Educational Value of Computer Games.
IxD&A, 2013

The development that leads to the Cloud Computing Business Framework.
Int. J. Inf. Manag., 2013

A qualitative case study of LifeGuide: Users' experiences of software for developing Internet-based behaviour change interventions.
Health Informatics J., 2013

Enriching media fragments with named entities for video classification.
Proceedings of the 22nd International World Wide Web Conference, 2013

Approaches to maintaining provenance throughout the additive manufacturing process.
Proceedings of the 2013 World Congress on Internet Security, 2013

A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Investigating Factors for Knowledge Sharing Using Web Technologies.
Proceedings of the 13th International Conference on Knowledge Management and Knowledge Technologies, 2013

SecureDIS: A framework for secure Data Integration Systems.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Designing and Diagramming an Intended Learning Outcome Structure: A Case Study from the Instructors' Perspective.
Proceedings of the IEEE 13th International Conference on Advanced Learning Technologies, 2013

The Development of Semantic Feedback for Teaching and Learning in Physical Education.
Proceedings of the IEEE 13th International Conference on Advanced Learning Technologies, 2013

A Conceptual Model of Intended Learning Outcomes Supporting Curriculum Development.
Proceedings of the Conceptual Modeling - 32th International Conference, 2013

2012
An information system to support the engineering designer.
J. Intell. Manuf., 2012

Approaches to Modeling the Gas-Turbine Maintenance Process.
J. Comput. Inf. Sci. Eng., 2012

Applying Linked Data in Multimedia Annotations.
Int. J. Semantic Comput., 2012

Mobile Instant Messaging used to Provide Support and Advice to South African Youth.
Int. J. ICT Res. Dev. Afr., 2012

Business Integration as a Service.
Int. J. Cloud Appl. Comput., 2012

Synote: Weaving Media Fragments and Linked Data.
Proceedings of the WWW2012 Workshop on Linked Data on the Web, 2012

Unsupervised Clustering Approach for Network Anomaly Detection.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Application of Bagging, Boosting and Stacking to Intrusion Detection.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2012

Feedback in the Motor Skill Domain.
Proceedings of the 12th IEEE International Conference on Advanced Learning Technologies, 2012

Towards a Volunteer Cloud Architecture.
Proceedings of the Computer Performance Engineering - 9th European Workshop, 2012

Cloud Storage and Bioinformatics in a Private Cloud Deployment: Lessons for Data Intensive Research.
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012

Cloud Storage in a Private Cloud Deployment - Lessons for Data Intensive Research.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2011
Managing dynamic enterprise and urgent workloads on clouds using layered queuing and historical performance models.
Simul. Model. Pract. Theory, 2011

Synote: development of a Web-based tool for synchronized annotations.
New Rev. Hypermedia Multim., 2011

Case Studies and Organisational Sustainability Modelling Presented by Cloud Computing Business Framework.
Int. J. Web Serv. Res., 2011

The Financial Clouds Review.
Int. J. Cloud Appl. Comput., 2011

Organisational Sustainability Modelling for Return on Investment (ROI): Case Studies Presented by a National Health Service (NHS) Trust UK.
J. Comput. Inf. Technol., 2011

Empirical Investigation on Agile Methods Usage: Issues Identified from Early Adopters in Malaysia.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2011

Towards Business Integration as a Service 2.0 (BIaaS 2.0).
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

Pedagogy in Computer-Based Sport Training.
Proceedings of the ICALT 2011, 2011

2010
NPE A Conceptual Model and Language for the Representation of Norms.
Proceedings of the 10th International Conference on Quality Software, 2010

Resource management of enterprise cloud systems using layered queuing and historical performance models.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Towards a Competence Based System for Recommending Study Materials (CBSR).
Proceedings of the ICALT 2010, 2010

A Formative eAssessment Co-Design Case Study.
Proceedings of the ICALT 2010, 2010

A Categorisation of Cloud Computing Business Models.
Proceedings of the 10th IEEE/ACM International Conference on Cluster, 2010

The Impact of Organization, Project and Governance Variables on Software Quality and Project Success.
Proceedings of the 2010 Agile Conference, 2010

Using Factor Analysis to Generate Clusters of Agile Practices (A Guide for Agile Process Improvement).
Proceedings of the 2010 Agile Conference, 2010

A Review of Cloud Business Models and Sustainability.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2009
Pragmatic web service design: An agile approach with the service responsibility and interaction design method.
Comput. Sci. Res. Dev., 2009

Making training more cognitively effective: Making videos interactive.
Br. J. Educ. Technol., 2009

Enhancing Grid Service Discovery with a Semantic Wiki and the Concept Matching Approach.
Proceedings of the Fifth International Conference on Semantics, Knowledge and Grid, 2009

Synote: enhancing multimedia e-learning with synchronised annotation.
Proceedings of the first ACM international workshop on Multimedia technologies for distance learning, 2009

Towards security goals in summative e-assessment security.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

A Conceptual Framework for Serious Games.
Proceedings of the 9th IEEE International Conference on Advanced Learning Technologies, 2009

Synchronised Annotation of Multimedia.
Proceedings of the 9th IEEE International Conference on Advanced Learning Technologies, 2009

A Framework for Pedagogical Feedback in the Motor Skill Domain.
Proceedings of the 9th IEEE International Conference on Advanced Learning Technologies, 2009

Supporting the Running and Analysis of Trials of Web-Based Behavioural Interventions: The LifeGuide.
Proceedings of the Fifth International Conference on e-Science, 2009

2008
Semantics on demand: Can a Semantic Wiki replace a knowledge base?
New Rev. Hypermedia Multim., 2008

An Inquiry-led Personalised Navigation System (IPNS) using multi-dimensional linkbases.
New Rev. Hypermedia Multim., 2008

Knowledge Transfer: From Maintenance to Engine Design.
J. Comput. Inf. Sci. Eng., 2008

(Semantic web) services for e-learning.
Int. J. Knowl. Learn., 2008

A Delivery Engine for QTI Assessments.
Int. J. Emerg. Technol. Learn., 2008

Historical Roots of Agile Methods: Where Did "Agile Thinking" Come From?.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2008

Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems.
Proceedings of the SECRYPT 2008, 2008

A Mobile Toolkit for Placement Learning.
Proceedings of the 8th IEEE International Conference on Advanced Learning Technologies, 2008

Risk Assessment Education: Utilizing Interactive Video for Teaching Health andSafety.
Proceedings of the 8th IEEE International Conference on Advanced Learning Technologies, 2008

The Same, But Different: The Educational Affordances of Different Gaming Genres.
Proceedings of the 8th IEEE International Conference on Advanced Learning Technologies, 2008

Secure Certification for ePortfolios.
Proceedings of the 8th IEEE International Conference on Advanced Learning Technologies, 2008

Electronic Integrity Issues in E-Assessment Security.
Proceedings of the 8th IEEE International Conference on Advanced Learning Technologies, 2008

2007
Adaptive Personal Information Environment based on the Semantic Web.
J. Digit. Inf., 2007

AnnAnn and AnnAnn.Net: Tools for Teaching Programming.
J. Comput., 2007

Agile Software Assurance.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2007

Data Mining to Support Engineering Design Decision.
Proceedings of the The First International Workshop on Semantic Web and Web 2.0 in Architectural, 2007

Finding the Right Tool for the Community: Bringing a Wiki-Type Editor to the World of Reusable Learning Objects.
Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies, 2007

Towards a Canonical View of Peer Assessment.
Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies, 2007

Is Less Actually More? The Usefulness of Educational Mini-games.
Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies, 2007

Lesson learnt from a large-scale industrial semantic web application.
Proceedings of the HYPERTEXT 2007, 2007


Community Tools for Repurposing Learning Objects.
Proceedings of the Creating New Learning Experiences on a Global Scale, 2007

The Service Responsibility and Interaction Design Method: Using an Agile Approach for Web Service Design.
Proceedings of the Fifth IEEE European Conference on Web Services (ECOWS 2007), 2007

2006
Adaptive Personal Information Environment Based on Semantic Web.
Proceedings of the Adaptive and Personalized Semantic Web, 2006

Extending the role of a healthcare digital library environment to support orthopaedic research.
Health Informatics J., 2006

On a service-oriented approach for an engineering knowledge desktop.
Proceedings of the 15th international conference on World Wide Web, 2006

Knowledge Management for a Large Service-Oriented Corporation.
Proceedings of the Practical Aspects of Knowledge Management, 6th International Conference, 2006

ANNANN - Next Steps for Scaffolding Learning About Programs.
Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies, 2006

The e-Learning Assessment Landscape.
Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies, 2006

Design Patterns for Wrapping Similar Legacy Systems with Common Service Interfaces.
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006

Knowledge engineering from frontline support to preliminary design.
Proceedings of the 2006 ACM Symposium on Document Engineering, 2006

Adaptation in Adaptable Personal Information Environment.
Proceedings of the Adaptive Hypermedia and Adaptive Web-Based Systems, 2006

Personalised Navigation System with Multidimensional Linkbases.
Proceedings of the Adaptive Hypermedia and Adaptive Web-Based Systems, 2006

2005
The Dynamic Review Journal: a scholarly archive.
New Rev. Hypermedia Multim., 2005

Hypermedia maintenance support applications: Benefits and development costs.
Comput. Ind., 2005

Towards Grid Services for a Virtual Research Environment.
Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, 2005

A Grid Services Implementation for a Virtual Research Environment.
Proceedings of the 1st International ELeGI Conference on Advanced Technology for Enhanced Learning, 2005

Bringing the semantic web to the office desktop.
Proceedings of the 2005 ACM Symposium on Document Engineering, 2005

2004
The Designers' Workbench: Using Ontologies and Constraints for Configuration.
Proceedings of the Applications and Innovations in Intelligent Systems XII, 2004

Issues in Moving to a Semantic Web for a Large Corporation.
Proceedings of the Practical Aspects of Knowledge Management, 5th International Conference, 2004

Extending the role of the digital library: computer support for creating articles.
Proceedings of the HYPERTEXT 2004, 2004

Adaptive Link Services for the Semantic Web.
Proceedings of the Engineering Knowledge in the Age of the Semantic Web, 2004

Towards a Knowledge-Aware Office Environment.
Proceedings of the Engineering Knowledge in the Age of the Semantic Web, 2004

The case for explicit knowledge in documents.
Proceedings of the 2004 ACM Symposium on Document Engineering, 2004

2003
Evaluation of a hypermedia maintenance support application.
Comput. Ind., 2003

2002
Open hypermedia for product support.
Int. J. Syst. Sci., 2002

Design Issues for Agent-Based Resource Locator Systems.
Proceedings of the Practical Aspects of Knowledge Management, 4th International Conference, 2002

2001
A review of the benefits of using hypermedia manuals.
Proceedings of the HYPERTEXT 2001, 2001

2000
Towards A New Authoring Methodology for Large-Scale Hypermedia Applications.
Multim. Tools Appl., 2000

Industrial strength hypermedia: design, implementation and application.
Int. J. Comput. Integr. Manuf., 2000

1999
The Application of a Hypermedia Research System in Industry.
Proceedings of the HYPERTEXT '99, 1999


  Loading...