Skip to main content

Research Repository

Advanced Search

Outputs (78)

A case study of Facebook use: outlining a multi-layer strategy for higher education. (2015)
Journal Article
MENZIES, R., PETRIE, K. and ZARB, M. 2017. A case study of Facebook use: outlining a multi-layer strategy for higher education. Education and information technologies [online], 22(1), pages 39-53. Available from: https://doi.org/10.1007/s10639-015-9436-y

Many students are looking to appropriate social networking sites, amongst them, Facebook, to enhance their learning experience. A growing body of literature reports on the motivation of students and staff to engage with Facebook as a learning platfor... Read More about A case study of Facebook use: outlining a multi-layer strategy for higher education..

Designing a context-aware cyber physical system for detecting security threats in motor vehicles. (2015)
Conference Proceeding
PETROVSKI, A., RATTADILOK, P. and PETROVSKI, S. 2015. Designing a context-aware cyber physical system for detecting security threats in motor vehicles. In Proceedings of the 8th International conference on security of information and networks (SIN'15), 8-10 September 2015, Sochi, Russia. New York: ACM [online], pages 267-270. Available from: https://doi.org/10.1145/2799979.2800029

An adaptive multi-tiered framework, which can be utilised for designing a context-aware cyber physical system is proposed in the paper and is applied within the context of providing data availability by monitoring electromagnetic interference. The ad... Read More about Designing a context-aware cyber physical system for detecting security threats in motor vehicles..

Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS). (2015)
Journal Article
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2015. Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS). International journal of intelligent computing research [online], 6(3), pages 601-612. Available from: https://doi.org/10.20533/ijicr.2042.4655.2015.0075

When implementing multitenancy for cloud-hosted applications, one of the main challenges to overcome is how to enable the required degree of isolation between tenants so that the required performance, resource utilization, and access privileges of on... Read More about Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS)..

Combining search strategies for distributed constraint satisfaction. (2015)
Thesis
MAGAJI, A.S-M. 2015. Combining search strategies for distributed constraint satisfaction. Robert Gordon University, PhD thesis.

Many real-life problems such as distributed meeting scheduling, mobile frequency allocation and resource allocation can be solved using multi-agent paradigms. Distributed constraint satisfaction problems (DisCSPs) is a framework for describing such p... Read More about Combining search strategies for distributed constraint satisfaction..

Bring your own heritage: final project report. (2015)
Report
TAIT, E., LAING, R., GRINNALL, A., BURNETT, S., ISAACS, J. and SCOTT, J. 2015. Bring your own heritage: final project report. Aberdeen: Robert Gordon University.

Public libraries have traditionally played a role in the acquisition and curation of local studies collections, and cultural heritage is recognised as a core area of activity for libraries aiming to increase patron numbers (Danish Agency for Librarie... Read More about Bring your own heritage: final project report..

A practitioner reflection on teaching computer ethics with case studies and psychology. (2015)
Journal Article
HERON, M. and BELFORD, P. 2015. A practitioner reflection on teaching computer ethics with case studies and psychology. Brookes ejournal of learning and teaching [online], 7(1). Available from: http://bejlt.brookes.ac.uk/paper/a-practitioner-reflection-on-teaching-computer-ethics-with-case-studies-and-psychology/

Three issues complicate teaching computer ethics in an undergraduate course. The first relates to the often technically intensive knowledge required to fully understand the complexity of real world examples. The second relates to the pedagogic expect... Read More about A practitioner reflection on teaching computer ethics with case studies and psychology..

Power and perception in the scandal in academia. (2015)
Journal Article
HERON, M.J. and BELFORD, P. 2015. Power and perception in the scandal in academia. ACM SIGCAS computers and society [online], 45(2), pages 11-19. Available from: https://doi.org/10.1145/2809957.2809961

The Scandal in Academia is a large-scale fictional ethical case study of around 17,000 words and fourteen separate revelations. They are delivered as newspaper extracts from a newspaper reporting on an ongoing crisis at a Scottish educational institu... Read More about Power and perception in the scandal in academia..

Music recommenders: user evaluation without real users? (2015)
Conference Proceeding
CRAW, S., HORSBURGH, B. and MASSIE, S. 2015. Music recommenders: user evaluation without real users? In Yang, Q. and Woolridge, M. (eds.) Proceedings of the 24th International joint conference on artificial intelligence (IJCAI-15), 25-31 July 2015, Buenos Aires, Argentina. Palo Alto: AAAI Press [online], pages 1749-1755. Available from: https://www.ijcai.org/Proceedings/15/Papers/249.pdf

Good music recommenders should not only suggest quality recommendations, but should also allow users to discover new/niche music. User studies capture explicit feedback on recommendation quality and novelty, but can be expensive, and may have difficu... Read More about Music recommenders: user evaluation without real users?.

Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. (2015)
Journal Article
KALUTARAGE, H.K., SHAIKH, S.A., WICKRAMASINGHE, I.P., ZHOU, Q. and JAMES, A.E. 2015. Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. Computers and electrical engineering [online], 47, pages 327-344. Available from: https://doi.org/10.1016/j.compeleceng.2015.07.007

Stealthy attackers move patiently through computer networks – taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a chall... Read More about Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks..

Virtual teams and employability in global software engineering education. (2015)
Conference Proceeding
BASS, J.M., MCDERMOTT, R. and LALCHANDANI, J.T. 2015. Virtual teams and employability in global software engineering education. In Proceedings of the 10th IEEE international conference on global software engineering (ICGSE 2015), 13-16 July 2015, Ciudad Real, Spain. Piscataway: IEEE [online], article number 7224489, pages 115-124. Available from: https://doi.org/10.1109/ICGSE.2015.21

Universities face many challenges when creating opportunities for student experiences of global software engineering. We provide a model for introducing global software engineering into the computing curriculum. Our model is based on a three year col... Read More about Virtual teams and employability in global software engineering education..