• Login
    Search 
    •   OUR Archive Home
    • Search
    •   OUR Archive Home
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 97

    • Sort Options:
    • Relevance
    • Title A-Z
    • Title Z-A
    • Date published, oldest first
    • Date published, newest first
    • Date added, oldest first
    • Date added, newest first
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Spatial isomorphism 

    Holt, Alec; MacDonell, Stephen; Benwell, George L
    This research continues with current innovative geocomputational research trends that aim to provide enhanced spatial analysis tools. The coupling of case-based reasoning (CBR) with GIS provides the focus of this paper. ...
    Thumbnail

    Induction of labour for post term pregnancy: An observational study 

    Parry, Emma; Parry, David; Pattison, Neil
    The aim of the study was to compare the 2 management protocols for postterm pregnancy; elective induction of labour at 42 weeks’ gestation and continuing the pregnancy with fetal monitoring while awaiting spontaneous labour. ...
    Thumbnail

    Reasonable security safeguards for small to medium organisations 

    Wolfe, Henry B
    In today’s world most businesses, large and small, depend on their computer(s) to provide vital functions consistently and without interruption. In many organizations the loss of the computer function could mean the ...
    Thumbnail

    Environmental decisions with spatial process modelling 

    Mann, Samuel
    This paper first describes the difficulties inherent in supporting a class of environmental problems, those involved in Regional Environmental Decision Making. A set of conceptual criteria are presented along with discussion ...
    Thumbnail

    Exploiting the advantages of object-oriented programming in the implementation of a database design environment 

    Stanger, Nigel; Pascoe, Richard
    In this paper, we describe the implementation of a database design environment (Swift) that incorporates several novel features: Swift’s data modelling approach is derived from viewpoint-oriented methods; Swift is implemented ...
    Thumbnail

    Infiltrating IT into primary care: A case study 

    Cockcroft, Sophie; Parry, David; Breton, Alice; Abernethy, David; Gillies, John
    Web based approaches to tracking students on placement are receiving much interest in the field of medical education The work presented here describes a web-based solution to the problem of managing data collection from ...
    Thumbnail

    Experimental transformation of a cognitive schema into a display structure 

    Wong, B L William; O’Hare, David; Sallis, Philip
    The purpose of this paper is to report on an experiment conducted to evaluate the feasibility of an empirical approach for translating a cognitive schema into a display structure. This experiment is part of a series of ...
    Thumbnail

    Modifications to Smith’s method for deriving normalised relations from a functional dependency diagram 

    Stanger, Nigel
    Smith’s method is a formal technique for deriving a set of normalised relations from a functional dependency diagram (FDD). Smith’s original rules for deriving these relations are incomplete, as they do not fully address ...
    Thumbnail

    Planning and matchmaking in a multi-agent system for software integration 

    Diaz, Aurora; Cranefield, Stephen; Purvis, Martin
    Computer users employ a collection of software tools to support their day-to-day work. Often the software environment is dynamic with new tools being added as they become available and removed as they become obsolete or ...
    Thumbnail

    Software forensics: extending authorship analysis techniques to computer programs 

    Gray, Andrew; Sallis, Philip; MacDonell, Stephen
    The number of occurrences and severity of computer-based attacks such as viruses and worms, logic bombs, trojan horses, computer fraud, and plagiarism of code have become of increasing concern. In an attempt to better deal ...
    • «
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 10
    • »

    Search OUR Archive | Feedback | Copyright and Disclaimer | Library
     © University of Otago Library, 65 Albany St, PO Box 56, Dunedin, New Zealand
    Email: ourarchive@otago.ac.nz
     

     

    About Usage Statistics

    Filter By

    AuthorMacDonell, Stephen (20)Purvis, Martin (17)Kasabov, Nikola (16)Benwell, George L (14)Cranefield, Stephen (11)... View MorePublication Date1999 (27)1998 (10)1997 (15)1996 (34)1995 (6)1993 (5)Research Type
    Discussion Paper (97)
    Access LevelOpen (97)

    Theses

    Deposit Your ThesisWatch Thesis Deposit demoThesis Information guide

    OUR Archive

    LoginAbout OUR ArchiveOUR Archive Policy

    Search OUR Archive | Feedback | Copyright and Disclaimer | Library
     © University of Otago Library, 65 Albany St, PO Box 56, Dunedin, New Zealand
    Email: ourarchive@otago.ac.nz