default search action
Colin Pattinson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j6]Yanrong Lu, Fucheng Liao, Jiamei Deng, Colin Pattinson:
Cooperative optimal preview tracking for linear descriptor multi-agent systems. J. Frankl. Inst. 356(2): 908-934 (2019) - 2018
- [j5]Adrian J. Pullin, Colin Pattinson, Ah-Lian Kor:
Building Realistic Mobility Models for Mobile Ad Hoc Networks. Informatics 5(2): 22 (2018) - 2017
- [j4]Mohammad Shahadat Hossain, Saifur Rahaman, Ah-Lian Kor, Karl Andersson, Colin Pattinson:
A Belief Rule Based Expert System for Datacenter PUE Prediction under Uncertainty. IEEE Trans. Sustain. Comput. 2(2): 140-153 (2017) - [c24]Galamoyo Male, Ebrahim Shaghouei, Colin Pattinson:
Towards the development of a Culture Aware Reference Architecture for mobile technology: A tools and methodology perspective. AFRICON 2017: 968-973 - 2016
- [c23]Asif Iqbal, Colin Pattinson, Ah-Lian Kor:
Managing Energy Efficiency in the Cloud Computing Environment Using SNMPv3: A Quantitative Analysis of Processing and Power Usage. DASC/PiCom/DataCom/CyberSciTech 2016: 239-244 - [c22]Michail Papanderou, Ah-Lian Kor, Colin Pattinson:
Evaluation of ICT Environmental Impact for an SME. DASC/PiCom/DataCom/CyberSciTech 2016: 245-250 - [c21]Latifah M. AlHarbi, Colin Pattinson:
Effective Green IT Strategy in a UK Higher Education Institute. DASC/PiCom/DataCom/CyberSciTech 2016: 251-256 - [c20]Jeanette Shaw, Ah-Lian Kor, Colin Pattinson:
An Evaluation of the Impact of Remote Collaboration Tools on Corporate Sustainability. DASC/PiCom/DataCom/CyberSciTech 2016: 257-262 - 2015
- [c19]Colin Pattinson, Peter Olawale Olaoluwa, Ah-Lian Kor:
A Comparative Study on the Energy Consumption of PHP Single and Double Quotes. DSDIS 2015: 232-239 - 2013
- [c18]Samantha J. Dixon, Mark Dixon, Edward Halpin, Colin Pattinson:
A Modelling Based Notation for the Automated Extraction and Analysis of Social Networking Data. ICWE Workshops 2013: 340-344 - 2012
- [c17]Kemal Hajdarevic, Colin Pattinson, Kemal Kozaric, Amela Hadzic:
Information security measurement infrastructure for KPI visualization. MIPRO 2012: 1543-1548 - [c16]Francis Owusu, Colin Pattinson:
The Current State of Understanding of the Energy Efficiency of Cloud Computing. TrustCom 2012: 1948-1953 - 2011
- [j3]Colin Pattinson, Denise Oram, Margaret Ross:
Sustainability and Social Responsibility in Raising Awareness of Green Issues through Developing Tertiary Academic Provision: A Case Study. Int. J. Hum. Cap. Inf. Technol. Prof. 2(4): 1-10 (2011) - [c15]Kemal Hajdarevic, Colin Pattinson, Amela Hadzic, Jasmin Hadzigrahic:
New forensic method for measuring dynamic changes of EMF level limits using smart dust. ICAT 2011: 1-5 - [c14]Kemal Hajdarevic, Colin Pattinson:
EMF hot-spot creation avoidance in office and home-office environments. MIPRO 2011: 658-663 - 2010
- [c13]Julius Eiweck, Colin Pattinson, Reinhold Behringer, Alexander K. Seewald:
A New Approach for Outlier Detection in Near Real Time. EMS 2010: 477-483 - [c12]Xuhua Ji, Colin Pattinson:
AHP Implemented Security Assessment and Security Weight Verification. SocialCom/PASSAT 2010: 1026-1031
2000 – 2009
- 2009
- [c11]Colin Pattinson:
Using Converging Technology to Bring Social Networking to Commerce. CSE (4) 2009: 1099-1102 - [c10]Colin Pattinson, Kemal Hajdarevic:
Trojan detection using MIB-based IDS / IPS system. ICAT 2009: 1-5 - 2008
- [c9]Adrian J. Pullin, Steve Presland, Colin Pattinson:
Using Ship Movement in the Irish Sea for MANET Evaluation. EMS 2008: 394-399 - [c8]Colin Pattinson, Tahir Siddiqui:
A Performance Evaluation of an Ultra-Thin Client System. ICE-B 2008: 5-11 - [c7]Colin Pattinson, Linton Robinson:
A Study of the Effectiveness of "Wake up on LAN" as a Means of Power Management. ICE-B 2008: 73-76 - 2007
- [j2]Colin Pattinson, Kemal Hajdarevic:
Timing considerations in detecting resource starvation attacks using statistical profiles. Int. J. Electron. Secur. Digit. Forensics 1(2): 194-205 (2007) - 2005
- [c6]Kiran Voderhobli, Colin Pattinson:
Building Virtual Network Management Scenarios. Parallel and Distributed Computing and Networks 2005: 94-99 - 2004
- [c5]Colin Pattinson, Kemal Hajdarevic:
Training Network Managers to Recognise Intrusion Attacks. ICETE (2) 2004: 269-274 - 2001
- [c4]Colin Pattinson:
A Study of the Behaviour of the Simple Network Management Protocol. DSOM 2001: 305-314 - 2000
- [j1]Colin Pattinson:
A simulated network management information base. J. Netw. Comput. Appl. 23(2): 93-107 (2000)
1990 – 1999
- 1998
- [c3]Colin Pattinson, Tony Dacre:
A network model for network management teaching. ACSE 1998: 62-66 - 1996
- [c2]Colin Pattinson:
The use of OSI as a framework for the teaching of computer communications. ACSE 1996: 153-158 - [c1]Colin Pattinson:
Network management teaching - managing a simulated network. ITiCSE 1996: 233
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint