Skip to main content

Research Repository

Advanced Search

Outputs (78)

The mystery of security design. (2015)
Presentation / Conference
VALLINDRAS, A. and FAILY, S. 2015. The mystery of security design. Presented at the 29th British human computer interaction conference (British HCI 2015), 13-17 July 2015, Lincoln, UK.

Designing for security is hard without security getting in the way of design. Unfortunately, security is often promoted through fear, uncertainty, and doubt (FUD). As a result, the scale of FUD has now become so great that it hinders people's ability... Read More about The mystery of security design..

Analysing creative image search information needs. (2015)
Conference Proceeding
GOKER, A., KONKOVA, E., MACFARLANE, A. 2015. Analysing creative image search information needs. In Proceedings of the 2015 ISKO UK biennial conference: knowledge organization - making a difference, 13-14 July 2015, London, UK. London: ISKO [online]. Available from: http://www.iskouk.org/content/analysing-creative-image-search-information-needs

Creative professionals in advertising, marketing, design and journalism search for images to visually represent a concept for their project. The main purpose of this paper is to present an analysis of documents known as briefs to find search facets,... Read More about Analysing creative image search information needs..

Generating easy and hard problems using the proximate optimality principle. (2015)
Conference Proceeding
MCCALL, J.A.W., CHRISTIE, L.A. and BROWNLEE, A.E.I. 2015. Generating easy and hard problems using the proximate optimality principle. In Silva, S. (ed.) Proceedings of the companion publication of the 2015 annual conference on genetic and evolutionary computation (GECCO Companion '15), 11-15 July 2015, Madrid, Spain. New York: ACM [online], pages 767-768. Available from: https://doi.org/10.1145/2739482.2764890

We present an approach to generating problems of variable difficulty based on the well-known Proximate Optimality Principle (POP), often paraphrased as similar solutions have similar fitness. We explore definitions of this concept in terms of metrics... Read More about Generating easy and hard problems using the proximate optimality principle..

Challenges and recommendations for the design and conduct of global software engineering courses: a systematic review. (2015)
Conference Proceeding
CLEAR, T., BEECHAM, S., BARR, J., DANIELS, M., MCDERMOTT, R., OUDSHOORN, M., SAVICKAITE, A. and NOLL, J. 2015. Challenges and recommendations for the design and conduct of global software engineering courses: a systematic review. In Proceedings of the 2015 Innovation and technology in computer science education on working group reports (ITiCSE-WGR '15), 4-8 July 2015, Vilnius, Lithuania. New York: ACM [online], pages 1-39. Available from: https://doi.org/10.1145/2858796.2858797

Context: Global Software Engineering (GSE) has become the predominant form of software development for global companies and has given rise to a demand for students trained in GSE. In response, universities are developing courses and curricula around... Read More about Challenges and recommendations for the design and conduct of global software engineering courses: a systematic review..

Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm. (2015)
Journal Article
BANO, S. and RAO, K.R. 2015. Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm. International journal of electrical and computer engineering [online], 5(3), pages 483-490. Available from: http://doi.org/10.11591/ijece.v5i3.pp483-490

In this paper we propose a method that aims to reduce processing overheads by avoiding the need to choose between natural language processing tools such as part-of-speech taggers and parsers. Moreover, we suggest a structure for the immediate creatio... Read More about Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm..

A case study into the accessibility of text-parser based interaction. (2015)
Conference Proceeding
HERON, M.J. 2015. A case study into the accessibility of text-parser based interaction. In Proceedings of the 7th Association for Computing Machinery (ACM) Special Interest group on Computer-Human Interaction (SIGCHI) symposium on engineering interactive computing systems (EICS'15), 23-26 June 2015, Duisburg, Germany. New York: ACM [online], pages 74-83. Available from: https://doi.org/10.1145/2774225.2774833

The academic issues surrounding the accessibility of video games are reasonably well understood although compensations and inclusive design have not yet been comprehensively adopted by professional game developers. Several sets of guidelines have bee... Read More about A case study into the accessibility of text-parser based interaction..

Perserverance measures and attainment in first year computing science students. (2015)
Conference Proceeding
MCDERMOTT, R., DANIELS, M. and CAJANDER, A. 2015. Perserverance measures and attainment in first year computing science students. In Proceedings of the 2015 Association for Computing Machinery (ACM) Innovation and technology in computer science education conference (ITiCSE '15), 4-8 July 2015, Vilnius, Lithuania. New York: ACM [online], pages 302-307. Available from: https://doi.org/10.1145/2729094.2742625

We investigate the link between concepts of perseverance such as conscientiousness and grit, and the academic attainment of first year computing students. We review the role that perseverance plays in learning models, as well as describing the trait... Read More about Perserverance measures and attainment in first year computing science students..

Cross-layer topology design for network coding based wireless multicasting. (2015)
Journal Article
VIEN, Q.-T., TU, W., NGUYEN, H.X. and TRESTIAN, R. 2015. Cross-layer topology design for network coding based wireless multicasting. Computer networks [online], 88, pages 27-39. Available from: https://doi.org/10.1016/j.comnet.2015.06.005

This paper considers wireless multicast networks where network coding (NC) is applied to improve network throughput. A novel joint topology and cross-layer design is proposed to maximise the network throughput subject to various quality-of-service co... Read More about Cross-layer topology design for network coding based wireless multicasting..

Embedding professional practice into the cybersecurity curriculum using ethics. (2015)
Presentation / Conference
FAILY, S. and JONES, M. 2015. Embedding professional practice into the cybersecurity curriculum using ethics. Presented at the UK workshop on cybersecurity training and education, 11 June 2015, Liverpool, UK.

Cybersecurity graduates are ready to tackle the technical problems they might face, but employability needs to be incorporated into the curriculum should they wish to tackle ill-defined professional challenges as well. We describe how employability w... Read More about Embedding professional practice into the cybersecurity curriculum using ethics..

Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening. (2015)
Journal Article
RAHIM, S.S., JAYNE, C., PALADE, V. and SHUTTLEWORTH, J. 2016. Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening. Neural computing and applications [online], 27(5), pages 1149-1164. Available from: https://doi.org/10.1007/s00521-015-1929-5.

Regular eye screening is essential for the early detection and treatment of the diabetic retinopathy. This paper presents a novel automatic screening system for diabetic retinopathy that focuses on the detection of the earliest visible signs of retin... Read More about Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening..