Items where Subject is "Q Science > QA Mathematics > QA75 Electronic computers. Computer science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: B | F | I | J | M | O | S | V | W | Z
Number of items at this level: 23.


Bakeer, Ali (2017) A New model for E-business Deployment in Libyan Public Universities. PhD thesis, University of Gloucestershire.

Bin Ishaq Alseiari, Khalid (2015) The Management of Risk Awareness in Relation to Information Technology (MERIT). PhD thesis, University of Gloucestershire.

Bouyerbou, Hafidha and Bechkoum, Kamal and Benblidia, Nadjia and Lepage, Richard (2014) Ontology-based semantic classification of satellite images: Case of major disasters. In: IEEE International Geoscience and Remote Sensing Symposium (IGARSS), JUL 13-18, 2014, Quebec, CANADA.


Forti, Yousef and Bechkoum, Kamal and Turner, Scott and Ajit, Suraj (2014) The adoption of e-government in Arab Countries - The case of Libya. In: Proceedings of the 14th European Conference on e-Government: ECEG 2014. Academic Conferences International Publishing (ACIP), Reading, pp. 319-327. ISBN 9781909507364


Ikram, Ahsan and Anjum, Ashiq and Bessis, Nik (2015) A cloud resource management model for the creation and orchestration of social communities. Simulation Modelling Practice and Theory, 50. pp. 130-150. ISSN 1569-190X

Ikram, Ahsan and Anjum, Ashiq and Hill, Richard and Antonopoulos, Nick and Liu, Lu and Sotiriadis, Stelios (2015) Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience, 27 (8). pp. 1966-1984. ISSN 1532-0626

Irons, Alastair and Thomas, Paula (2016) Problem based learning in digital forensics. Higher Education Pedagogies, 1 (1). pp. 95-105. ISSN 2375-2696


Jones, Peter and Comfort, Daphne and Hillier, David (2013) The changing geography of data centres in the UK. Geography, 98 (1). pp. 18-23. ISSN 0016-7487

Jones, Peter and Hillier, David and Comfort, Daphne and Clarke-Hill, Colin M (2013) Data centres in the UK: property and planning issues. Property Management, 31 (2). pp. 103-114. ISSN 0263-7472

Jones, Peter and Hillier, David and Comfort, Daphne and Clarke-Hill, Colin M (2013) Towards sustainable data centre operations in the UK. Journal of Property Investment and Finance, 31 (1). pp. 89-100. ISSN 1463-578X


Maqtary, Naseebah and Mohsen, Abdulqader and Bechkoum, Kamal (2017) Group Formation Techniques in Computer-Supported Collaborative Learning: A Systematic Literature Review. Technology, Knowledge and Learning. pp. 1-22. ISSN 2211-1662 (In Press)


Olzmann, Matthias (2014) A New Conceptual and Operational Framework for the Switching of IT Outsourcing Providers. DBA thesis, University of Gloucestershire.


Salem, Abobaker (2015) Key success factors impacting foreign direct investment and technology transfer: a comparative study of Libya and Egypt. PhD thesis, University of Gloucestershire.

Schiepp, Thomas (2015) A Simulation Method for Design and Development of Magnetic Shape Memory Actuators. PhD thesis, University of Gloucestershire.

Sun, Jiyu and Ling, Mingze and Wang, Yueming and Chen, Donghui and Zhang, Shujun and Tong, Jin and Wang, Shuang (2014) Quasi-Static and Dynamic Nanoindentation of Some Selected Biomaterials. Journal of Bionic Engineering, 11 (1). pp. 144-150. ISSN 16726529


Verschueren, Ricardo (2014) Models of computation: A numeric analysis and performance evaluation. Masters thesis, University of Gloucestershire.


Win, Thu Yein and Tianfield, Huaglory and Mair, Quentin (2017) Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing. IEEE Transactions on Big Data (99). pp. 1-15. ISSN 2332-7790

Win, Thu Yein and Tianfield, Huaglory and Mair, Quentin (2016) Detection of Malware and Kernel-Level Rootkits in Cloud Computing Environments. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, 3-5 November 2015, New York, United States.

Win, Thu Yein and Tianfield, Huaglory and Mair, Quentin (2014) Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection. In: 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, 8-11 December 2014, London, United Kingdom.

Win, Thu Yein and Tianfield, Huaglory and Mair, Quentin and Said, Taimur Al and Rana, Omer F. (2014) Virtual Machine Introspection. In: SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks, September 09 - 11, 2014, Glasgow, United Kingdom.

Wynn, Martin G (2007) Developing your Information Systems for Growth. In: Growing Gloucestershire Conference, June 2007, The Park, University of Gloucestershire, Cheltenham. (Unpublished)

Wynn, Martin G and Wise, John and Howes, Michael (2002) Key Technologies of the New Information Age. In: Bridge Series October 2002 Seminar Presentation, October 2002, University of Gloucestershire.


Zhang, Xu (2012) A new method for generic three dimensional human face modelling for emotional bio-robots. PhD thesis, University of Gloucestershire.

This list was generated on Sun Feb 18 17:56:54 2018 UTC.

University Of Gloucestershire

Bookmark and Share

Find Us On Social Media:

Social Media Icons Facebook Twitter Google+ YouTube Pinterest Linkedin

Other University Web Sites

University of Gloucestershire, The Park, Cheltenham, Gloucestershire, GL50 2RH. Telephone +44 (0)844 8010001.