Ian Warren | Deakin University (original) (raw)
Papers by Ian Warren
Pipelines 2002, 2002
The UK water industry has utilized spray applied linings for water mains rehabilitation since the... more The UK water industry has utilized spray applied linings for water mains rehabilitation since the early 1900's. The original process used cement mortar but over the last 20 years this has been succeeded by epoxy resin with over 11 000 miles of pipe lined. Although offering a ...
Chromosome research : an international journal on the molecular, supramolecular and evolutionary aspects of chromosome biology, Jan 22, 2015
Since their discovery, a growing body of evidence has emerged demonstrating that transposable ele... more Since their discovery, a growing body of evidence has emerged demonstrating that transposable elements are important drivers of species diversity. These mobile elements exhibit a great variety in structure, size and mechanisms of transposition, making them important putative actors in organism evolution. The vertebrates represent a highly diverse and successful lineage that has adapted to a wide range of different environments. These animals also possess a rich repertoire of transposable elements, with highly diverse content between lineages and even between species. Here, we review how transposable elements are driving genomic diversity and lineage-specific innovation within vertebrates. We discuss the large differences in TE content between different vertebrate groups and then go on to look at how they affect organisms at a variety of levels: from the structure of chromosomes to their involvement in the regulation of gene expression, as well as in the formation and evolution of no...
Peer-to-peer systems have gained widespread popularity for supporting resource location and distr... more Peer-to-peer systems have gained widespread popularity for supporting resource location and distribution applications. To response to this, a number of peer-to-peer network architectures have been developed, each supporting a subset of application types, though no unifying P2P network architecture has emerged that is suitable for supporting today's diverse peer-to-peer systems. The heterogeneous and dynamic environments in which peer-to-peer applications operate has also driven the development of a number of adaptation schemes, though current peer-to-peer platforms offer no specific support for adaptive mechanisms. This paper describes AdPtP, a peer-to-peer framework that provides support for diverse applications and inherent support for adaptation.
Peer-to-peer environments are highly heterogeneous and are likely to become more so due to the pr... more Peer-to-peer environments are highly heterogeneous and are likely to become more so due to the proliferation of mobile Internet access technologies and the development of novel peer-to- peer applications. Adaptation is essential in such heterogeneous systems in order to exploit the resources available on diverse nodes and tailor network services to meet the needs of diverse applications. We argue that existing support for resource awareness and adaptation in peer-to-peer systems is inadequate and we propose a framework for developing peer-to-peer systems with generic and extensible support for resource awareness and adaptation. A hybrid peer-to-peer model similar to Structella is used in this framework as a novel mechanism for supporting resource awareness and adaptation.
2009 13th Enterprise Distributed Object Computing Conference Workshops, 2009
Practitioner Series, 1999
Page 1. THE RENAISSANCE OF LEGACY SYSTEMS Ian Warren (University of Bradford) with contributions ... more Page 1. THE RENAISSANCE OF LEGACY SYSTEMS Ian Warren (University of Bradford) with contributions from Jane Ransom (Lancaster University, UK) Markus Breuer (GEI debis, Germany) Claude Villermain (CAP Gemini Innovation, France) John Favaro (Intecs, Italy) ...
2008 12th Enterprise Distributed Object Computing Conference Workshops, 2008
13th IEEE International Conference on Engineering of Complex Computer Systems (iceccs 2008), 2008
13th IEEE International Conference on Engineering of Complex Computer Systems (iceccs 2008), 2008
doi.ieeecomputersociety.org
General Chairs Michael G. Hinchey, Loyola College in Maryland, USA Gillian Dobbie, The University... more General Chairs Michael G. Hinchey, Loyola College in Maryland, USA Gillian Dobbie, The University of Auckland, New Zealand ... Program Co-Chairs Jin Song Dong, National University of Singapore, Singapore Jing Sun, The University of Auckland, New Zealand ... Workshop Chair Steve Reeves, The University of Waikato, New Zealand ... Special Session Chairs Jim Woodcock, University of York, United Kingdom Tiziana Margaria, University of Potsdam, Germany Bernhard Steffen, University of Dortmund, Germany Roy Sterritt, University of Ulster, ...
computer.org
Paul Bailes, The University of Queensland, Australia Paul Bannerman, NICTA, Australia Muhammad Al... more Paul Bailes, The University of Queensland, Australia Paul Bannerman, NICTA, Australia Muhammad Ali Babar, University of Limerick, Ireland Rachel Cardell-Oliver, University of Western Australia, Australia Diane Corney, Queensland University of Technology, Australia Ewen Denney, NASA Ames Research Center, USA Jens Dietrich, Massey University, New Zealand Colin Fidge, Queensland University of Technology, Australia Lance Fung, Murdoch University, Australia Ian Gorton, Pacific Northwest National Laboratory, USA Douglas ...
Page 1. v 2009 13th Enterprise Distributed Object Computing Conference Workshops, EDOCW Proceedin... more Page 1. v 2009 13th Enterprise Distributed Object Computing Conference Workshops, EDOCW Proceedings of the IEEE EDOC 2009 Workshops and Short Papers Edited by Vladimir Tosic Table of Contents Proceedings of the IEEE EDOC 2009 Workshops and Short Papers: Editor's Message Vladimir Tosic iii Dynamic and Declarative Business Processes (DDBP) 2009 organized by Dragan Ga��evi��, Georg Grossmann, Sylvain Hall�� Dynamic and Declarative Business Processes: Editorial Dragan Ga��evi��, Georg Grossmann, Sylvain Hall�� 1 ...
The term "crime" is often "taken-for-granted" and poorly defined in contemporary Australian and I... more The term "crime" is often "taken-for-granted" and poorly defined in contemporary Australian and International research. There is also considerable debate amongst scholars working in different theoretical traditions about the appropriate definition of crime. This reflects broader public division about the types of behaviour or people that are classed as criminal.
In recent years, Australian governments of various ideological persuasions at local, state and te... more In recent years, Australian governments of various ideological persuasions at local, state and territory and federal levels have introduced a range of zonal governing techniques to manage the flow of people in urban spaces. Zonal governance involves the identification and formal declaration of a specific urban geographic region to enable police and security personnel to deploy special powers and allied forms of surveillance technologies as a supplement to their conventional public order maintenance functions.
Despite the impetus towards open flows or movement within sovereign territories or larger territorial groupings, such as the European Union, considerable governmental effort has been directed towards the use of new forms of criminal law to re-territorialize urban space through new administrative, property law and regulatory measures. These low-level spatial demarcations introduce various supplementary police powers and discretionary procedures that enhance surveillance within a declared area to increase the level of contemporary urban security. Of particular concern is the legal right to ban or exclude “undesirable” individuals and groups from entering or using certain designated urban zones, to prevent antisocial or violent behavior usually associated with alcohol consumption.
To date, most discussion of the impact of banning and related surveillance measures focuses on illegal migration through ports of entry into sovereign nations and the commensurate burdens this creates for both citizens and non-citizens to authenticate their movements at national geographic borders. This logic is permeating more localized forms of regulation adopted by Australian local and mid-tier state and territory governments to control the movement of people in and out of major event sites and in the urban night-time economy.
A survey of recent reforms in the state of Victoria reveals how this new logic of mass-surveillance aims to promote greater levels of urban security while reshaping the conventional order maintenance functions of both the public and private police. This chapter describes these procedures and their impact in sanctioning the efficient screening of people to promote order in specific zones within the contemporary Australian urban environment, at the expense of more progressive and inclusive crime prevention initiatives. We focus on two exemplars of the intensification of surveillance through zonal governance techniques: ‘major events’ and ‘designated alcohol zones’.
This volume examines the emerging field of corporate security in a range of loss prevention setti... more This volume examines the emerging field of corporate security in a range of loss prevention settings, including fraud, national security, shopping malls, university campuses and entertainment precincts. The 13 original chapters comprise original research from Canada, the United States, England and Australia, examining the problematic tensions between state policing and oversight of the corporate security sector, and the economic, cultural and safety issues that underly these tensions.
Warren and Palmer’s chapter draws on a sample of 13 security licensing appeals from New South Wales decided between 2011 and 2013. Their analysis reveals how processes of oversight of the security industry are largely based on inclusion, exclusion or undisclosed ‘criminal intelligence’ rather than improving safety through greater compliance with legislative requirements. The cases described in this chapter illustrate how these inconsistencies have limited potential to reduce violence associated with security activity in the Australian night-time economy. In broader terms the chapter explores the complexities and limits of public licensing and civil compensation as accountability mechanisms.
Whether privacy is an adequate legal safeguard against intrusive government or private sector act... more Whether privacy is an adequate legal safeguard against intrusive government or private sector activity remains open for further exploration. The criminal law has always imposed limits on the ability of police to enter private premises and seize property associated with criminal activity, while preserving the rights of “mass private” property owners and their agents to selectively exclude people from entering or remaining on their premises. The appropriate balance between these issues and “the right to be let alone” is often determined by judicial rulings in individual cases. However, the balance between a claimant’s personal rights to be free from undue surveillance and the broader public interest in preventing crime or promoting safety is not always clear. New forms of personal data collection and dissemination through ICTs reconfigure the balance between private and public knowledge (Australian Law Reform Commission 2008), while social network analysis is increasingly deployed by law enforcement agencies to detect and prevent crime. Our ongoing research interrogates how the concept of privacy can be reconciled with the growing use of dataveillance, data mining, and social network analysis to prevent crime and antisocial behavior.
Pipelines 2002, 2002
The UK water industry has utilized spray applied linings for water mains rehabilitation since the... more The UK water industry has utilized spray applied linings for water mains rehabilitation since the early 1900's. The original process used cement mortar but over the last 20 years this has been succeeded by epoxy resin with over 11 000 miles of pipe lined. Although offering a ...
Chromosome research : an international journal on the molecular, supramolecular and evolutionary aspects of chromosome biology, Jan 22, 2015
Since their discovery, a growing body of evidence has emerged demonstrating that transposable ele... more Since their discovery, a growing body of evidence has emerged demonstrating that transposable elements are important drivers of species diversity. These mobile elements exhibit a great variety in structure, size and mechanisms of transposition, making them important putative actors in organism evolution. The vertebrates represent a highly diverse and successful lineage that has adapted to a wide range of different environments. These animals also possess a rich repertoire of transposable elements, with highly diverse content between lineages and even between species. Here, we review how transposable elements are driving genomic diversity and lineage-specific innovation within vertebrates. We discuss the large differences in TE content between different vertebrate groups and then go on to look at how they affect organisms at a variety of levels: from the structure of chromosomes to their involvement in the regulation of gene expression, as well as in the formation and evolution of no...
Peer-to-peer systems have gained widespread popularity for supporting resource location and distr... more Peer-to-peer systems have gained widespread popularity for supporting resource location and distribution applications. To response to this, a number of peer-to-peer network architectures have been developed, each supporting a subset of application types, though no unifying P2P network architecture has emerged that is suitable for supporting today's diverse peer-to-peer systems. The heterogeneous and dynamic environments in which peer-to-peer applications operate has also driven the development of a number of adaptation schemes, though current peer-to-peer platforms offer no specific support for adaptive mechanisms. This paper describes AdPtP, a peer-to-peer framework that provides support for diverse applications and inherent support for adaptation.
Peer-to-peer environments are highly heterogeneous and are likely to become more so due to the pr... more Peer-to-peer environments are highly heterogeneous and are likely to become more so due to the proliferation of mobile Internet access technologies and the development of novel peer-to- peer applications. Adaptation is essential in such heterogeneous systems in order to exploit the resources available on diverse nodes and tailor network services to meet the needs of diverse applications. We argue that existing support for resource awareness and adaptation in peer-to-peer systems is inadequate and we propose a framework for developing peer-to-peer systems with generic and extensible support for resource awareness and adaptation. A hybrid peer-to-peer model similar to Structella is used in this framework as a novel mechanism for supporting resource awareness and adaptation.
2009 13th Enterprise Distributed Object Computing Conference Workshops, 2009
Practitioner Series, 1999
Page 1. THE RENAISSANCE OF LEGACY SYSTEMS Ian Warren (University of Bradford) with contributions ... more Page 1. THE RENAISSANCE OF LEGACY SYSTEMS Ian Warren (University of Bradford) with contributions from Jane Ransom (Lancaster University, UK) Markus Breuer (GEI debis, Germany) Claude Villermain (CAP Gemini Innovation, France) John Favaro (Intecs, Italy) ...
2008 12th Enterprise Distributed Object Computing Conference Workshops, 2008
13th IEEE International Conference on Engineering of Complex Computer Systems (iceccs 2008), 2008
13th IEEE International Conference on Engineering of Complex Computer Systems (iceccs 2008), 2008
doi.ieeecomputersociety.org
General Chairs Michael G. Hinchey, Loyola College in Maryland, USA Gillian Dobbie, The University... more General Chairs Michael G. Hinchey, Loyola College in Maryland, USA Gillian Dobbie, The University of Auckland, New Zealand ... Program Co-Chairs Jin Song Dong, National University of Singapore, Singapore Jing Sun, The University of Auckland, New Zealand ... Workshop Chair Steve Reeves, The University of Waikato, New Zealand ... Special Session Chairs Jim Woodcock, University of York, United Kingdom Tiziana Margaria, University of Potsdam, Germany Bernhard Steffen, University of Dortmund, Germany Roy Sterritt, University of Ulster, ...
computer.org
Paul Bailes, The University of Queensland, Australia Paul Bannerman, NICTA, Australia Muhammad Al... more Paul Bailes, The University of Queensland, Australia Paul Bannerman, NICTA, Australia Muhammad Ali Babar, University of Limerick, Ireland Rachel Cardell-Oliver, University of Western Australia, Australia Diane Corney, Queensland University of Technology, Australia Ewen Denney, NASA Ames Research Center, USA Jens Dietrich, Massey University, New Zealand Colin Fidge, Queensland University of Technology, Australia Lance Fung, Murdoch University, Australia Ian Gorton, Pacific Northwest National Laboratory, USA Douglas ...
Page 1. v 2009 13th Enterprise Distributed Object Computing Conference Workshops, EDOCW Proceedin... more Page 1. v 2009 13th Enterprise Distributed Object Computing Conference Workshops, EDOCW Proceedings of the IEEE EDOC 2009 Workshops and Short Papers Edited by Vladimir Tosic Table of Contents Proceedings of the IEEE EDOC 2009 Workshops and Short Papers: Editor's Message Vladimir Tosic iii Dynamic and Declarative Business Processes (DDBP) 2009 organized by Dragan Ga��evi��, Georg Grossmann, Sylvain Hall�� Dynamic and Declarative Business Processes: Editorial Dragan Ga��evi��, Georg Grossmann, Sylvain Hall�� 1 ...
The term "crime" is often "taken-for-granted" and poorly defined in contemporary Australian and I... more The term "crime" is often "taken-for-granted" and poorly defined in contemporary Australian and International research. There is also considerable debate amongst scholars working in different theoretical traditions about the appropriate definition of crime. This reflects broader public division about the types of behaviour or people that are classed as criminal.
In recent years, Australian governments of various ideological persuasions at local, state and te... more In recent years, Australian governments of various ideological persuasions at local, state and territory and federal levels have introduced a range of zonal governing techniques to manage the flow of people in urban spaces. Zonal governance involves the identification and formal declaration of a specific urban geographic region to enable police and security personnel to deploy special powers and allied forms of surveillance technologies as a supplement to their conventional public order maintenance functions.
Despite the impetus towards open flows or movement within sovereign territories or larger territorial groupings, such as the European Union, considerable governmental effort has been directed towards the use of new forms of criminal law to re-territorialize urban space through new administrative, property law and regulatory measures. These low-level spatial demarcations introduce various supplementary police powers and discretionary procedures that enhance surveillance within a declared area to increase the level of contemporary urban security. Of particular concern is the legal right to ban or exclude “undesirable” individuals and groups from entering or using certain designated urban zones, to prevent antisocial or violent behavior usually associated with alcohol consumption.
To date, most discussion of the impact of banning and related surveillance measures focuses on illegal migration through ports of entry into sovereign nations and the commensurate burdens this creates for both citizens and non-citizens to authenticate their movements at national geographic borders. This logic is permeating more localized forms of regulation adopted by Australian local and mid-tier state and territory governments to control the movement of people in and out of major event sites and in the urban night-time economy.
A survey of recent reforms in the state of Victoria reveals how this new logic of mass-surveillance aims to promote greater levels of urban security while reshaping the conventional order maintenance functions of both the public and private police. This chapter describes these procedures and their impact in sanctioning the efficient screening of people to promote order in specific zones within the contemporary Australian urban environment, at the expense of more progressive and inclusive crime prevention initiatives. We focus on two exemplars of the intensification of surveillance through zonal governance techniques: ‘major events’ and ‘designated alcohol zones’.
This volume examines the emerging field of corporate security in a range of loss prevention setti... more This volume examines the emerging field of corporate security in a range of loss prevention settings, including fraud, national security, shopping malls, university campuses and entertainment precincts. The 13 original chapters comprise original research from Canada, the United States, England and Australia, examining the problematic tensions between state policing and oversight of the corporate security sector, and the economic, cultural and safety issues that underly these tensions.
Warren and Palmer’s chapter draws on a sample of 13 security licensing appeals from New South Wales decided between 2011 and 2013. Their analysis reveals how processes of oversight of the security industry are largely based on inclusion, exclusion or undisclosed ‘criminal intelligence’ rather than improving safety through greater compliance with legislative requirements. The cases described in this chapter illustrate how these inconsistencies have limited potential to reduce violence associated with security activity in the Australian night-time economy. In broader terms the chapter explores the complexities and limits of public licensing and civil compensation as accountability mechanisms.
Whether privacy is an adequate legal safeguard against intrusive government or private sector act... more Whether privacy is an adequate legal safeguard against intrusive government or private sector activity remains open for further exploration. The criminal law has always imposed limits on the ability of police to enter private premises and seize property associated with criminal activity, while preserving the rights of “mass private” property owners and their agents to selectively exclude people from entering or remaining on their premises. The appropriate balance between these issues and “the right to be let alone” is often determined by judicial rulings in individual cases. However, the balance between a claimant’s personal rights to be free from undue surveillance and the broader public interest in preventing crime or promoting safety is not always clear. New forms of personal data collection and dissemination through ICTs reconfigure the balance between private and public knowledge (Australian Law Reform Commission 2008), while social network analysis is increasingly deployed by law enforcement agencies to detect and prevent crime. Our ongoing research interrogates how the concept of privacy can be reconciled with the growing use of dataveillance, data mining, and social network analysis to prevent crime and antisocial behavior.