In this paper we report the concept and initial prototype of a device that can be used to support evidence recovery at a crime scene. The key elements are radio frequency identifi...
Chris Baber, Paul Smith, James Cross, Damien Zasik...
— Systolic online algorithms for the multiplication of univariate polynomials and of multiple precision integers are synthesised using a novel method based on the following funct...
Dominance analysis from graph theory allows one to locate subordinated software elements in a rooted dependency graph. It identifies the nesting structure for a dependency graph ...
We present a new methodology for generating and adapting octree meshes for terascale applications. Our approach combines existing methods, such as parallel octree decomposition and...
The UK National Health Service (NHS) is currently undergoing an intensive review into the way patient care is designed, delivered and recorded. One important element of this is the...
Kirsty Bradbrook, Graham Winstanley, David Glasspo...