Skip to main content

Research Repository

Advanced Search

All Outputs (520)

BPGA-EDA for the multi-mode resource constrained project scheduling problem. (2016)
Conference Proceeding
AYODELE, M., MCCALL, J. and REGNIER-COUDERT, O. 2016. BPGA-EDA for the multi-mode resource constrained project scheduling problem. In Proceedings of the 2016 IEEE congress on evolutionary computation (CEC 2016), 24-29 July 2016, Vancouver, Canada. Piscataway, NJ: IEEE [online], article number 7744222, pages 3417-3424. Available from: https://doi.org/10.1109/CEC.2016.7744222

The Multi-mode Resource Constrained Project Scheduling Problem (MRCPSP) has been of research interest for over two decades. The problem is composed of two interacting sub problems: mode assignment and activity scheduling. These problems cannot be sol... Read More about BPGA-EDA for the multi-mode resource constrained project scheduling problem..

Motivation, optimal experience and flow in first year computing science. (2016)
Conference Proceeding
MCDERMOTT, R., ZARB, M., DANIELS, M., CAJANDER, Å. and CLEAR, T. 2016. Motivation, optimal experience and flow in first year computing science. In Proceedings of the 2016 Association for Computing Machinery (ACM) conference on innovation and technology in computer science education (ITiCSE '16), 9-13 July 2016, Arequipa, Peru. New York: ACM [online], pages 206-211. Available from: https://doi.org/10.1145/2899415.2899474

We examine the concept of motivation from the perspective of Self Determination Theory and give a brief overview of relevant results. We also consider the optimal state known as Flow and give an account of its conceptualisation in the theory due to C... Read More about Motivation, optimal experience and flow in first year computing science..

Student concerns regarding transition into higher education CS. (2016)
Conference Proceeding
SIEGEL, A.A. and ZARB, M. 2016. Student concerns regarding transition into higher education CS. In Proceedings of the 21st Association for Computing Machinery (ACM) Innovation and technology in computer science education 2016 conference (ITiCSE 2016), 11-13 July 2016, Arequipa, Peru. New York: ACM [online], pages 23-28. Available from: https://doi.org/10.1145/2899415.2909581

This paper discusses a study where 249 students from 18 secondary schools around Scotland who were on the verge of applying to study Computing Science at a higher education institution were surveyed on their concerns about the upcoming transition. Pr... Read More about Student concerns regarding transition into higher education CS..

Novice programmers and the problem description effect. (2016)
Conference Proceeding
BOUVIER, D., LOVELLETTE, E., MATTA, J., ALSHAIGY, B., BECKER, B.A., CRAIG, M., JACKOVA, J., MCCARTNEY, R., SANDERS, K. and ZARB, M. 2016. Novice programmers and the problem description effect. In Proceedings of the Innovation and technology in computer science education on working group reports 2016 (ITiCSE-WGR '16), 9-13 July 2016, Arequipa, Peru. New York: ACM [online], pages 103-118. Available from: https://doi.org/10.1145/3024906.3024912

It is often debated whether a problem presented in a straightforward minimalist fashion is better, or worse, for learning than the same problem presented with a real-life or concrete context. The presentation, contextualization, or problem descriptio... Read More about Novice programmers and the problem description effect..

Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system. (2016)
Conference Proceeding
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2016. Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system. In Zhang, J., Miller, J.A. and Xu, X. (eds.) Proceedings of the 13th Institute of Electrical and Electronics Engineers (IEEE) International services computing conference 2016 (SCC 2016), 27 June - 2 July 2016, San Francisco, USA. Piscataway: IEEE [online], pages 379-386. Available from: https://doi.org/10.1109/SCC.2016.56

Implementing the required degree of isolation between tenants is one of the significant challenges for deploying a multitenant application on the cloud. This paper applies COMITRE (Component-based approach to multitenancy isolation through request re... Read More about Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system..

Water, water, every where: nuances for a water industry critical infrastructure specification exemplar. (2016)
Conference Proceeding
FAILY, S., STERGIOPOULOS, G., KATOS, V. and GRITZALIS, D. 2016. Water, water, every where: nuances for a water industry critical infrastructure specification exemplar. In Rome, E., Theocharidou, M. and Wolthusen, S. (eds.) Critical information infrastructures security: revised selected papers from the proceedings of the 10th International conference on critical information infrastructures security (CRITIS 2015), 5-7 October 2015, Berlin, Germany. Lecture notes in computer science, 9578. Cham: Springer [online], pages 243-246. Available from: https://doi.org/10.1007/978-3-319-33331-1_20

The water infrastructure is critical to human life, but little attention has been paid to the nuances of the water industry. Without such attention, evaluating security innovation in this domain without compromising the productivity goals when delive... Read More about Water, water, every where: nuances for a water industry critical infrastructure specification exemplar..

Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS). (2015)
Conference Proceeding
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2015. Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS). In Proceedings of the 2015 International Information Society conference 2015 (i-Society 2015), 9-11 November 2015, London, UK. Piscataway: IEEE [online], pages 59-66. Available from: https://doi.org/10.1109/i-Society.2015.7366859

One of the key concerns of implementing multitenancy (i.e., serving multiple tenants with a single instance of an application) on the cloud is how to enable the required degree of isolation between tenants, so that the required performance of one ten... Read More about Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS)..

Ethical dilemmas and dimensions in penetration testing. (2015)
Conference Proceeding
FAILY, S., MCALANEY, J. and IACOB, C. 2015. Ethical dilemmas and dimensions in penetration testing. In Furnell, S.M. and Clarke, N.L. (eds.) Proceedings of the 9th International symposium on human aspects of information security and assurance (HAISA 2015), 1-3 July 2015, Mytilene, Greece. Plymouth: Plymouth University, pages 233-242.

Penetration testers are required to attack systems to evaluate their security, but without engaging in unethical behaviour while doing so. Despite work on hacker values and studies into security practice, there is little literature devoted to the eth... Read More about Ethical dilemmas and dimensions in penetration testing..

Digital rights management: the four perspectives of developers, distributors, users and lawyers. (2015)
Conference Proceeding
MCDONALD, N., FAILY, S., FAVALE, M. and GATZIDIS, C. 2015. Digital rights management: the four perspectives of developers, distributors, users and lawyers. In Furnell, S.M. and Clarke, N.L. (eds.) Proceedings of the 9th International symposium on human aspects of information security and assurance (HAISA 2015), 1-3 July 2015, Mytilene, Greece. Plymouth: Plymouth University, pages 276-285.

Digital Rights Management (DRM) refers to a collection of security mechanisms that are widely deployed on a number of copyright-protected digital assets. However, despite the existence of a number of studies of the technical architectures of rights m... Read More about Digital rights management: the four perspectives of developers, distributors, users and lawyers..

Usability and security by design: a case study in research and development. (2015)
Conference Proceeding
FAILY, S., LYLE, J., FLÉCHAIS, I. and SIMPSON, A. 2015. Usability and security by design: a case study in research and development. In Proceedings of the 2015 Workshop on useable security (USEC 2015), co-located with the 2015 Network and distributed system security symposium (NDSS 2015), 8 February 2015, San Diego, USA. Reston: Internet Society [online]. Available from: https://doi.org/10.14722/usec.2015.23012

There is ongoing interest in utilising user experiences associated with security and privacy to better inform system design and development. However, there are few studies demonstrating how, together, security and usability design techniques can help... Read More about Usability and security by design: a case study in research and development..

Using gamification to incentivize sustainable urban mobility. (2015)
Conference Proceeding
KAZHAMIAKIN, R., MARCONI, A., PERILLO, M., PISTORE, M., VALETTO, G., PIRAS, L., AVESANI, F. and PERRI, N. 2015. Using gamification to incentivize sustainable urban mobility. In Proceedings of 1st Institute of Electrical and Electronics Engineers (IEEE) International smart cities conference 2015 (ISC2-2015), 25-28 October 2015, Guadalajara, Mexico. Piscataway: IEEE [online], article ID 7366196. Available from: https://doi.org/10.1109/ISC2.2015.7366196

Sustainable urban mobility is an important dimension in a Smart City, and one of the key issues for city sustainability. However, innovative and often costly mobility policies and solutions introduced by cities are liable to fail, if not combined wit... Read More about Using gamification to incentivize sustainable urban mobility..

Mitigating circumstances in cybercrime: a position paper. (2015)
Conference Proceeding
ALI, R., MCALANEY, J., FAILY, S., PHALP, K. and KATOS, V. 2015. Mitigating circumstances in cybercrime: a position paper. In Wu, Y., Min, G., Georgalas, N., Hu, J., Atzori, L., Jin, X., Jarvis, S., Liu, L. and Agüero Calvo, R. (eds.) CIT/IUCC/DASC/PICom 2015: proceedings of the 3rd International workshop on cybercrimes and emerging web environments (CEWE 2015), part of the 13th IEEE international conference on dependable, autonomic and secure computing (DASC 2015), co-located with the 15th IEEE international conference on computer and information technology (CIT 2015), the 14th IEEE international conference on ubiquitous computing and communications (IUCC 2015), and the 13th IEEE international conference on pervasive intelligence and computing (PICom 2015), 26-28 October 2015, Liverpool, UK. Los Alamitos: IEEE Computer Society [online], pages 1972-1976. Available from: https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.292

This paper argues the need for considering mitigating circumstances in cybercrime. Mitigating circumstances are conditions which moderate the culpability of an offender of a committed offence. Our argument is based on several observations. The cybers... Read More about Mitigating circumstances in cybercrime: a position paper..

ClusterNN: a hybrid classification approach to mobile activity recognition. (2015)
Conference Proceeding
BASHIR, S., DOOLAN, D. and PETROVSKI, A. 2015. ClusterNN: a hybrid classification approach to mobile activity recognition. In Chen, L.L., Steinbauer, M., Khalil, I. and Anderst-Kotsis, G. (eds.) Proceedings of the 13th International advances in mobile computing and multimedia conference (MoMM 2015), 11-13 December 2015, Brussels, Belguim. New York: ACM [online], pages 263-267. Available from: https://doi.org/10.1145/2837126.2837140

Mobile activity recognition from sensor data is based on supervised learning algorithms. Many algorithms have been proposed for this task. One of such algorithms is the K-nearest neighbour (KNN) algorithm. However, since KNN is an instance based algo... Read More about ClusterNN: a hybrid classification approach to mobile activity recognition..

Music recommendation: audio neighbourhoods to discover music in the long tail. (2015)
Conference Proceeding
CRAW, S., HORSBURGH, B. and MASSIE, S. 2015. Music recommendation: audio neighbourhoods to discover music in the long tail. In Hüllermeier, E. and Minor, M. (eds.) Proceedings of the 23rd international conference on case-based reasoning research and development (ICCBR 2015), 28-30 September 2015, Frankfurt am Main, Germany. Lecture notes in computer science, 9343. Cham: Springer [online], pages 73-87. Available from: https://doi.org/10.1007/978-3-319-24586-7_6

Millions of people use online music services every day and recommender systems are essential to browse these music collections. Users are looking for high quality recommendations, but also want to discover tracks and artists that they do not already... Read More about Music recommendation: audio neighbourhoods to discover music in the long tail..

Insourcing a government information system an analysis using institutions and the capability approach. (2015)
Conference Proceeding
OMAR, A., BASS, J.M. and LOWIT, P. 2015. Insourcing a government information system an analysis using institutions and the capability approach. In Proceedings of the 2015 International conference on information society (i-Society 2015), 9-11 November 2015, London, UK. PiscatawayJ: IEEE [online], pages 91-96. Available from: https://doi.org/10.1109/i-Society.2015.7366866

This study explores the effectiveness of insourcing in the Malaysian Government. The research discusses the factors and issues of insourcing in a Malaysian government agency in the context of post contract termination of an outsourcing agreement. A q... Read More about Insourcing a government information system an analysis using institutions and the capability approach..

Online news videos: the UX of subtitle position. (2015)
Conference Proceeding
CRABB, M., JONES, R., ARMSTRONG, M. and HUGHES, C.J. 2015. Online news videos: the UX of subtitle position. In Proceedings of the 17th International Association for Computing Machinery (ACM) SIGACCESS conference on computers and accessibility (ASSETS '15), 26-28 October 2015, Lisbon, Portugal. New York: ACM [online], pages 215-222. Available from: http://doi.acm.org/10.1145/2700648.2809866

Millions of people rely on subtitles when watching video content. The current change in media viewing behaviour involving computers has resulted in a large proportion of people turning to online sources as opposed to regular television for news infor... Read More about Online news videos: the UX of subtitle position..

The development of a framework for understanding the UX of subtitles. (2015)
Conference Proceeding
CRABB, M., JONES, R. and ARMSTRONG, M. 2015. The development of a framework for understanding the UX of subtitles. In Proceedings of the 17th International Association for Computing Machinery (ACM) SIGACCESS conference on computers and accessibility (ASSETS '15), 26-28 October 2015, Lisbon, Portugal. New York: ACM [online], pages 347-348. Available from: http://doi.acm.org/10.1145/2700648.2811372

Approximately 10% of the television audience use subtitles (captioning) to support their viewing experience. Subtitles enable viewers to participate in an experience that is often taken for granted by the general audience. However, when reviewing sub... Read More about The development of a framework for understanding the UX of subtitles..

The transport disruption ontology. (2015)
Conference Proceeding
CORSAR, D., MARKOVIC, M., EDWARDS, P. and NELSON, J.D. 2015. The transport disruption ontology. In Arenas, M., Corcho, O., Simperl, E., Strohmaier, M., d'Aquin, M., Srinivas, K., Groth, P., Dumontier, M., Heflin, J., Thirunarayan, K. and Staab, S. (eds.). The sematic web - ISWC 2015: proceedings of the 14th International semantic web conference 2015 (ISWC 2015), 11-15 October 2015, Bethleham, PA, USA, 9367. Lecture notes in computer science. Cham: Springer [online], pages 329-336. Available from: https://doi.org/10.1007/978-3-319-25010-6_22

This paper presents the Transport Disruption ontology, a formal framework for modelling travel and transport related events that have a disruptive impact on traveller's journeys. We discuss related models , describe how transport events and their imp... Read More about The transport disruption ontology..

A comparative analysis of two globally distributed group projects: a perspective from CSCW/CSCL research. (2015)
Conference Proceeding
MCDERMOTT, R., DANIELS, M., CAJANDER, A., BASS, J. and LALCHANDANI, J.P. 2015. A comparative analysis of two globally distributed group projects: a perspective from CSCW/CSCL research. In Proceedings of the 2015 Frontiers in education conference (FIE 2015): launching a new vision in engineering education, 21-24 October 2015, El Paso, USA. New York: IEEE [online], article number 7344344. Available from: https://doi.org/10.1109/FIE.2015.7344344

Globally distributed group projects are becoming an attractive and increasingly common feature in computer science education. They provide opportunities for students to engage in activities that enhance both their technical skills and wider professio... Read More about A comparative analysis of two globally distributed group projects: a perspective from CSCW/CSCL research..

Competencies for paradigm shift 'survival'. (2015)
Conference Proceeding
DANIELS, M., CAJANDER, A., ECKERDAL, A., LIND, M., NYLEN, A., CLEAR, T. and MCDERMOTT, R. 2015. Competencies for paradigm shift 'survival'. In Proceedings of the 2015 Frontiers in education conference (FIE 2015): launching a new vision in engineering education, 21-24 October 2015, El Paso, USA. New York: IEEE [online], article number 7344255. Available from: https://doi.org/10.1109/FIE.2015.7344255

The rapid development in the IT area brings a series of shifts, in underlying theories, technology and work practices. In the normal course of events, most changes are evolutionary, with small, incremental improvements being made to theoretical under... Read More about Competencies for paradigm shift 'survival'..