Skip to main content

Research Repository

Advanced Search

All Outputs (520)

Persona cases: a technique for grounding personas. (2011)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2011. Persona cases: a technique for grounding personas. In Proceedings of the 29th Annual CHI conference on human factors in computing systems (CHI 2011), 7-12 May 2011, Vancouver, Canada. New York: ACM [online], pages 2267-2270. Available from: https://doi.org/10.1145/1978942.1979274

Personas are a popular technique in User-Centered Design, however their validity can be called into question. While the techniques used to developed personas and their integration with other design activities provide some measure of validity, a perso... Read More about Persona cases: a technique for grounding personas..

Situation awareness in context-aware case-based decision support. (2011)
Conference Proceeding
NWIABU, N., ALLISON, I., HOLT, P., LOWIT, P. and OYENEYIN, B. 2011. Situation awareness in context-aware case-based decision support. In Proceedings of the 2011 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA 2011), 22-24 February 2011, Miami, USA. New York: IEEE [online], article number 5753761, pages 9-16. Available from: https://doi.org/10.1109/COGSIMA.2011.5753761

Humans naturally reuse recalled knowledge to solve problems and this includes understanding the context i.e. the information that identifies or characterizes these problems. For problems in complex and dynamic environments, providing effective soluti... Read More about Situation awareness in context-aware case-based decision support..

A model of security culture for e-science. (2011)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2011. A model of security culture for e-science. In Clarke, N., Furnell, S. and Von Solms, R. (eds.) Proceedings of the South African information security multi-conference (SAISMC 2010), 17-18 May 2010, Port Elizabeth, South Africa. Plymouth: University of Plymouth, pages 154-164.

There is a need to understand the cultural issues affecting security in large, distributed and heterogeneous systems; such systems are typified by e-Science projects. We present a model of security culture for e-Science, grounded both in the security... Read More about A model of security culture for e-science..

Assessing professional skills in engineering education. (2011)
Conference Proceeding
CAJANDER, Å., DANIELS, M., MCDERMOTT, R. and VON KONSKY, B.R. 2011. Assessing professional skills in engineering education. In Hamer, J. and Raadt, M. de (eds.) Proceedings of the 13th Australasian computing education conference (ACE 2011), 17-20 January 2011, Perth, Australia. Sydney: Conferences in research and practice in information technology (CRPIT) [online], 114, pages 145-154. Available from: http://crpit.com/Vol114.html.

In this paper, we report the results of introducing a face-to- face Peer Assisted Study Scheme (PASS) and an electronic Peer Assisted Study Scheme (ePASS) into a first year introductory programming unit, core to four undergraduate IT degrees. PASS is... Read More about Assessing professional skills in engineering education..

The secret lives of assumptions: developing and refining assumption personas for secure system design. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. The secret lives of assumptions: developing and refining assumption personas for secure system design. In Bernhaupt, R., Forbrig, P., Gulliksen, J. and Lárusdóttir, M. (eds.) Human-centred software engineering: proceedings of the 3rd International conference on human-centred software engineering (HCSE 2010), 14-15 October 2010, Reykjavik, Iceland. Lecture notes in computer science, 6409. Berlin: Springer [online], pages 111-118. Available from: https://doi.org/10.1007/978-3-642-16488-0_9

Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats endangering it. Often, however, personas need to be partly derived from assump... Read More about The secret lives of assumptions: developing and refining assumption personas for secure system design..

Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis. (2010)
Conference Proceeding
ALLISON, I. 2010. Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis. In Proceedings of the 7th International conference on the quality of information and communications technology (QUATIC 2010), 29 September - 2 October 2010, Porto, Portugal. Los Alamitos: IEEE Computing Society [online], article number 5655656, pages 418-423. Available from: https://doi.org/10.1109/QUATIC.2010.81

Previous work looking at software process improvement (SPI) in small organizations has highlighted difficulties faced by small organizations in implementing SPI successfully, but there is little analysis to understand why this is from an organization... Read More about Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis..

Multi-HDCS: solving DisCSPs with complex local problems cooperatively. (2010)
Conference Proceeding
LEE, D., ARANA, I., AHRIZ, H. and HUI, K. 2009. Multi-HDCS: solving DisCSPs with complex local problems cooperatively. In Huang, X.J., Ghorbani, A.A., Hacid, M.-S. and Yamaguchi, T. (eds.) Proceedings of the 2010 IEEE/WIC/ACM international conference on intelligent agent technology (IAT 2010), co-located with the 2010 IEEE/WIC/ACM international conference on web intelligence (WI 2010), and the joint conference workshops (WI-IAT Workshops 2010), 31 August - 3 September 2010, Toronto, Canada. Los Alamitos: IEEE Computer Society [online], volume 2, article number 5614767, pages 295-302. Available from: https://doi.org/10.1109/WI-IAT.2010.141

We propose Multi-HDCS, a new hybrid approach for solving Distributed CSPs with complex local problems. In Multi-HDCS, each agent concurrently: (i) runs a centralised systematic search for its complex local problem; (ii) participates in a distributed... Read More about Multi-HDCS: solving DisCSPs with complex local problems cooperatively..

To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. In Proceedings of the 2010 New security paradigms workshop (NSPW 2010), 21-23 September 2010, Concord, USA. New York: ACM [online], pages 73-84. Available from: https://doi.org/10.1145/1900546.1900557

When designing secure systems, we are inundated with an eclectic mix of security and non-security requirements; this makes predicting a successful outcome from the universe of possible security design decisions a difficult problem. We propose augment... Read More about To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design..

Barry is not the weakest link: eliciting secure system requirements with personas. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. Barry is not the weakest link: eliciting secure system requirements with personas. In Proceedings of the 24th International BCS human computer interaction conference (HCI 2010): games are a serious business, 6-10 September 2010, Dundee, UK. Swindon: BCS, pages 124-132. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/HCI2010.17

Building secure and usable systems means specifying systems for the people using it and the tasks they carry out, rather than vice-versa. User-centred design approaches encourage an early focus on users and their contexts of use, but these need to be... Read More about Barry is not the weakest link: eliciting secure system requirements with personas..

Automatic features characterization from 3d facial images. (2010)
Conference Proceeding
ELYAN, E. and UGAIL, H. 2010. Automatic features characterization from 3d facial images. In Arabnia, H.R., Deligiannidis, L. and Solo, A.M.G. (eds.) Proceedings of the 14th International computer graphics and virtual reality conference (CGVR 2010), 12-15 July 2010, Las Vegas, USA. Georgia, USA: CSREA Press, pages 67-73.

This paper presents a novel and computationally fast method for automatic identification of symmetry profile from 3D facial images. The algorithm is based on the concepts of computational geometry which yield fast and accurate results. In order to de... Read More about Automatic features characterization from 3d facial images..

Developing tools to encourage reflection in first year students blogs. (2010)
Conference Proceeding
MCDERMOTT, R., BRINDLEY, G. and ECCLESTON, G. 2010. Developing tools to encourage reflection in first year students blogs. In Proceedings of the 15th Innovation and technology in computer science education annual conference (ITiCSE '10), 26-30 June 2010, Ankara, Turkey. New York: ACM [online], pages 147-151. Available from: https://doi.org/10.1145/1822090.1822132

The pedagogical basis of a project aimed at encouraging students to engage in reflective activities using blogs to document their learning experiences is described. It also gives some details of the practical implementation of this work. Activities w... Read More about Developing tools to encourage reflection in first year students blogs..

A meta-model for usable secure requirements engineering. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. A meta-model for usable secure requirements engineering. In Proceedings of the 2010 ICSE workshop on software engineering for secure systems (SESS '10): co-located with the 32nd ACM/IEEE international conference on software engineering (ICSE 2010), 2-8 May 2010, Cape Town, South Africa. New York: ACM [online], pages 29-35. Available from: https://doi.org/10.1145/1809100.1809105

There is a growing recognition of the need for secure software engineering approaches addressing both technical and human factors. Existing approaches to secure software engineering focus on the need for technical security to the detriment of usabili... Read More about A meta-model for usable secure requirements engineering..

Analysing and visualising security and usability in IRIS. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. Analysing and visualising security and usability in IRIS. In Proceedings of the 5th International conference on availability, reliability and security (ARES 2010), 15-18 February 2010, Krakow, Poland. Los Alamitos: IEEE Computer Society [online], pages 543-548. Available from: https://doi.org/10.1109/ares.2010.28

Despite a long-standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a challenge. Balancing security and usability is difficult due to human biases in s... Read More about Analysing and visualising security and usability in IRIS..

Empathetic consultancy: a reflective approach to ICTD. (2009)
Conference Proceeding
BASS, J.M. 2009. Empathetic consultancy: a reflective approach to ICTD. In Byrne, E., Nicholson, B. and Salem, F. (eds.) Assessing the contribution of ICT to development goals: proceedings of the 10th International conference on social implications of computers in developing countries (ICT4D 2009), 26-28 May 2009, Dubai, UAE. Dubai: International Federation for Information Processing, pages 315-324.

Empathetic Consulting articulates positive characteristics of long-term ICT capacity building engagements using external advisors. Consultants need to demonstrate commitment to capacity building rather than service delivery, flexibility in adaptation... Read More about Empathetic consultancy: a reflective approach to ICTD..

A hybrid approach to solving coarse-grained DisCSPs. (2009)
Conference Proceeding
LEE, D., ARANA, I., AHRIZ, H. and HUI, K.-Y. 2009. A hybrid approach to solving coarse-grained DisCSPs. In Proceedings of the 8th International conference on autonomous agents and multiagent systems (AAMAS 2009), 10-15 May 2009, Budapest, Hungary. Richland, South Carolina: International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS) [online], pages 1235-1236. Available from: http://www.aamas-conference.org/Proceedings/aamas09/pdf/02_Extended_Abstract/C_SP_0555.pdf

A coarse-grained Distributed Constraint Satisfaction Problem (DisCSP) consists of several loosely connected constraint satisfaction subproblems, each assigned to an individual agent. We present Multi-Hyb, a two-phase concurrent hybrid approach for so... Read More about A hybrid approach to solving coarse-grained DisCSPs..

Multi-Hyb: a hybrid algorithm for solving DisCSPs with complex local problems. (2009)
Conference Proceeding
LEE, D., ARANA, I., AHRIZ, H. and HUI, K.-Y. 2009. Multi-Hyb: a hybrid algorithm for solving DisCSPs with complex local problems. In Baeza-Yates, R., Lang, J., Mitra, S., Parsons, S. and Pasi, G. (eds.) Proceedings of the 2009 IEEE/WIC/ACM international conference on intelligent agent technology (IAT 2009), co-located with the 2009 IEEE/WIC/ACM international conference on web intelligence (WI 2009), and the joint conference workshops (WI-IAT Workshops 2009), 15-18 September 2009, Milan, Italy. Los Alamitos: IEEE Computer Society [online], volume 2, article number 5284811, pages 379-382. Available from: https://doi.org/10.1109/WI-IAT.2009.181

A coarse-grained Distributed Constraint Satisfaction Problem (DisCSP) is a constraint problem where several agents, each responsible for solving one part (a complex local problem), cooperate to determine an overall solution. Thus, agents solve the ov... Read More about Multi-Hyb: a hybrid algorithm for solving DisCSPs with complex local problems..

Interactive surface design and manipulation using PDE-method through Autodesk Maya plug-in. (2009)
Conference Proceeding
ELYAN, E. and UGAIL, H. 2009. Interactive surface design and manipulation using PDE-method through Autodesk Maya plug-in. In Ugail, H., Qahwaji, R.S.R, Earnshaw, R.A. and Willis, P.J. (eds.) Proceedings of the 2009 International conference on Cyberworlds (CYBERWORLDS 2009), 7-11 September 2009, Bradford, UK. Los Alamitos: IEEE Computer Society [online], article number 5279653, pages 119-125. Available from: https://doi.org/10.1109/CW.2009.49

This paper aims to propose a method for geometric design, modelling and shape manipulation using minimum input design parameters. Here, we address the method for the construction of 3D geometry based on the use of Elliptic Partial Differential Equati... Read More about Interactive surface design and manipulation using PDE-method through Autodesk Maya plug-in..

Automatic 3D face recognition using Fourier descriptors. (2009)
Conference Proceeding
ELYAN, E. and UGAIL, H. 2009. Automatic 3D face recognition using Fourier descriptors. In Ugail, H., Qahwaji, R.S.R, Earnshaw, R.A. and Willis, P.J. (eds.) Proceedings of the 2009 International conference on Cyberworlds (CYBERWORLDS 2009), 7-11 September 2009, Bradford, UK. Los Alamitos: IEEE Computer Society [online], article number 5279600, pages 246-252. Available from: https://doi.org/10.1109/CW.2009.48

3D face recognition is attracting more attention due to the recent development in 3D facial data acquisition techniques. It is strongly believed that 3D Face recognition systems could overcome the inherent problems of 2D face recognition such as faci... Read More about Automatic 3D face recognition using Fourier descriptors..

Characterizing pure high-order entanglements in lexical semantic spaces via information geometry. (2009)
Conference Proceeding
HOU, Y. and SONG, D. 2009. Characterizing pure high-order entanglements in lexical semantic spaces via information geometry. In Bruza, P., Sofge, D., Lawless, W., Van Rijsbergen, K. and Klusch, M. (eds.) Proceedings of the 3rd International symposium on quantum interaction (QI 2009), 25-27 March 2009, Saarbrücken, Germany. Lecture notes in computer science, 5494. Berlin: Springer [online], pages 237-250. Available from: https://doi.org/10.1007/978-3-642-00834-4_20

An emerging topic in Quantuam Interaction is the use of lexical semantic spaces, as Hilbert spaces, to capture the meaning of words. There has been some initial evidence that the phenomenon of quantum entanglement exists in a semantic space and can p... Read More about Characterizing pure high-order entanglements in lexical semantic spaces via information geometry..

Dimension-specific search for multimedia retrieval. (2009)
Conference Proceeding
HUANG, Z., SHEN, H.T., SONG, D., LI, X. and RUEGER, S. 2009. Dimension-specific search for multimedia retrieval. In Zhou, X., Yokota, H., Deng, K. and Liu, Q. (eds.) Proceedings of the 14th International conference on database systems for advanced applications (DASFAA 2009), 21-23 April 2009, Brisbane, Australia. Lecture notes in computer science, 5463. Berlin: Springer [online], pages 693-698. Available from: https://doi.org/10.1007/978-3-642-00887-0_60

Observing that current Global Similarity Measures (GSM) which average the effect of few significant differences on all dimensions may cause possible performance limitation, we propose the first Dimension-specific Similarity Measure (DSM) to take loca... Read More about Dimension-specific search for multimedia retrieval..