Search
Now showing items 1-10 of 30
CAPTURE - Cooperatively Applied Positioning Techniques Utilizing Range Extensions
(IEEE, 2014-10-27)
The most commonly implemented Indoor Location
Based Solution uses existing Wi-Fi network components to locate
devices within its range. While this technique offers obvious
economic rewards by utilizing a preinstalled ...
Computing careers and Irish higher education: A labour market anomaly
(IP Publishing Ltd, 2007)
This paper explores the impact of developments in the Irish economy and labour market on computing course development in the Irish Higher Education (HE)
sector. Extant computing courses change, or new courses are introduced, ...
Deploying enterprise solutions to the cloud - issues and vulnerabilities
(2012)
Legacy enterprise applications provide unique challenges for software security personnel. The
size and historical nature of these systems can result in vulnerabilities that do not have the
appropriate countermeasures ...
The capabilities of XML and its interaction with legacy databases
(2003)
This thesis endeavours to establish which of the applications within the Extensible
Markup Language (XML) available at present, meet the requirements of a modem
business engaging in Electronic Commerce (E-Commerce) ...
To Wireless Fidelity and Beyond - CAPTURE, Extending Indoor Positioning Systems
(IEEE, 2014-10-24)
The benefits of context aware computing and
specifically the context that location can provide to applications
and systems has been heavily documented in recent times.
Moreover the move from traditional outdoor ...
An augmented penetration testing framework for Mobile Devices on 802.11 ac Wireless Networks
(2015-05)
In combination with the rapid growth of mobile device ownership worldwide and some reported high profile cybersecurity issues, rigorous security testing techniques are required to ensure that sensitive corporate and domestic ...
A comparison between Cloud Solutions with focus on DevOps tooling
(2015-05)
The DevOps philosophy keeps gaining popularity due to its practices that allow
companies to quickly deliver software changes to their customers. Along with this
advent, Cloud Solutions continue to expand their customer ...
Cooperatively Extending the Range of Indoor Localisation
(IET, 2013-06-17)
̶Whilst access to location based information has been mostly possible in the
outdoor arena through the use of GPS, the provision of accurate positioning estimations and
broad coverage in the indoor environment has proven ...
Lightweight cryptography and authentication protocols for secure communications between resource-limited devices and wireless sensor networks: evaluation and implementation
(2010)
This dissertation examines the theoretical context for the security of wireless communication between ubiquitous computing devices and presents an implementation that addresses this need. The number of Resource-Limited ...