Skip to main content

Research Repository

Advanced Search

All Outputs (399)

Guest editorial preface: special issue on Evolving security and privacy requirements engineering (ESPRE'14) 2014, Sweden. (2015)
Journal Article
BECKERS, K., FAILY, S., LEE, S.-W. and MEAD, N. 2015. Guest editorial preface: special issue on Evolving security and privacy requirements engineering (ESPRE'14) 2014, Sweden. International journal of secure software engineering [online], 6(1), pages iv-vii. Available from: https://bit.ly/3pGkcZD

At the Evolving Security and Privacy Requirements Engineering (ESPRE) workshop, practitioners and researchers interested in security and privacy requirements gather to discuss significant issues in the field. In particular, ESPRE participants probe t... Read More about Guest editorial preface: special issue on Evolving security and privacy requirements engineering (ESPRE'14) 2014, Sweden..

The Internet of Things: the future or the end of mechatronics. (2015)
Journal Article
BRADLEY, D., RUSSELL, D., FERGUSON, I., ISAACS, J., MACLEOD, A. and WHITE, R. 2015. The Internet of Things: the future or the end of mechatronics. Mechatronics [online], 27, pages 57-74. Available from: https://doi.org/10.1016/j.mechatronics.2015.02.005

The advent and increasing implementation of user configured and user oriented systems structured around the use of cloud configured information and the Internet of Things is presenting a new range and class of challenges to the underlying concepts of... Read More about The Internet of Things: the future or the end of mechatronics..

Integer linear programming for the Bayesian network structure learning problem. (2015)
Journal Article
BARTLETT, M. and CUSSENS, J. 2017. Integer linear programming for the Bayesian network structure learning problem. Artificial intelligence [online], 244, pages 258-271. Available from: https://doi.org/10.1016/j.artint.2015.03.003

Bayesian networks are a commonly used method of representing conditional probability relationships between a set of variables in the form of a directed acyclic graph (DAG). Determination of the DAG which best explains observed data is an NP-hard prob... Read More about Integer linear programming for the Bayesian network structure learning problem..

All of your co-workers are gone: story, substance, and the empathic puzzler. (2015)
Journal Article
HERON, M.J. and BELFORD, P.H. 2015. All of your co-workers are gone: story, substance, and the empathic puzzler. Journal of games criticism [online], 2(1). Available at: http://www.gamescriticism.org/articles/heronbelford-2-1

Narrative games such as The Walking Dead, Gone Home, Dear Esther and The Stanley Parable are difficult to situate into the general framework of game genres that are popularly, albeit informally, understood by mainstream audiences. They are too unabas... Read More about All of your co-workers are gone: story, substance, and the empathic puzzler..

Multiple case study approach to identify aggravating variables of insider threats in information systems. (2014)
Journal Article
NICHO, M. and KAMOUN, F. 2014. Multiple case study approach to identify aggravating variables of insider threats in information systems. Communications of the association for information systems [online], 35, Article 18. Available from: http://aisel.aisnet.org/cais/vol35/iss1/18

Malicious insiders present a serious threat to information systems due to privilege of access, knowledge of internal computer resources, and potential threats on the part of disgruntled employees or insiders collaborating with external cybercriminals... Read More about Multiple case study approach to identify aggravating variables of insider threats in information systems..

Fast and efficient palmprint identification of a small sample within a full image. (2014)
Journal Article
MORENO-GARCIA, C.F. and SERRATOSA, F. 2014. Fast and efficient palmprint identification of a small sample within a full image. Computación y sistemas [online], 18(4), pages 683-691. Available from: https://doi.org/10.13053/CyS-18-4-2059

In some fields like forensic research, experts demand that a found sample of an individual can be matched with its full counterpart contained in a database. The found sample may present several characteristics that make this matching more difficult t... Read More about Fast and efficient palmprint identification of a small sample within a full image..

Finding and resolving security misusability with misusability cases. (2014)
Journal Article
FAILY, S. and FLÉCHAIS, I. 2016. Finding and resolving security misusability with misusability cases. Requirements engineering [online], 21(2), pages 209-223. Available from: https://doi.org/10.1007/s00766-014-0217-8

Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa. One way of using scenarios to bridge security and usability involves explicitly descr... Read More about Finding and resolving security misusability with misusability cases..

Learning pseudo-tags to augment sparse tagging in hybrid music recommender systems. (2014)
Journal Article
HORSBURGH, B., CRAW, S. and MASSIE, S. 2015. Learning pseudo-tags to augment sparse tagging in hybrid music recommender systems. Artificial intelligence [online], 219, pages 25-39. Available from: https://doi.org/10.1016/j.artint.2014.11.004

Online recommender systems are an important tool that people use to find new music. To generate recommendations, many systems rely on tag representations of music. Such systems however suffer from tag sparsity, whereby tracks lack a strong tag repres... Read More about Learning pseudo-tags to augment sparse tagging in hybrid music recommender systems..

How product owner teams scale agile methods to large distributed enterprises. (2014)
Journal Article
BASS, J.M. 2015. How product owner teams scale agile methods to large distributed enterprises. Empirical software engineering [online], 20(6), pages 1525-1557. Available from: https://doi.org/10.1007/s10664-014-9322-z

Software development teams in large scale offshore enterprise development programmes are often under intense pressure to deliver high quality software within challenging time contraints. Project failures can attract adverse publicity and damage corpo... Read More about How product owner teams scale agile methods to large distributed enterprises..

Build-to-last: strength to weight 3D printed objects. (2014)
Journal Article
LU, L., SHARF, A., ZHAO, H., WEI, Y., FAN., Q., CHEN, X., SAVOYE, Y., TU, C., COHEN-OR, D. and CHEN, B. 2014. Build-to-last: strength to weight 3D printed objects. ACM transactions on graphics [online], 33(4), article No. 97. Available from: https://doi.org/10.1145/2601097.2601168

The emergence of low-cost 3D printers steers the investigation of new geometric problems that control the quality of the fabricated object. In this paper, we present a method to reduce the material cost and weight of a given object while providing a... Read More about Build-to-last: strength to weight 3D printed objects..

Do you feel like a hero yet? (2014)
Journal Article
HERON, M.J. and BELFORD, P.H. 2014. Do you feel like a hero yet? Externalized morality in video games. Journal of games criticism [online], 1(2). Available from: http://www.gamescriticism.org/articles/heronbelford-1-2

Video games have a long tradition of including elements of moral decision making within their ludic and narrative structures. While the success of these endeavours has been mixed, the systems used to express moral choices within a game have grown mor... Read More about Do you feel like a hero yet?.

Applications and design of cooperative multi-agent ARN-based systems. (2014)
Journal Article
GERRARD, C.E., MCCALL, J., MACLEOD, C. and COGHILL, G.M. 2015. Applications and design of cooperative multi-agent ARN-based systems. Soft computing [online], 19(6), pages 1581-1594. Available from: https://doi.org/10.1007/s00500-014-1330-9

The Artificial Reaction Network (ARN) is an Artificial Chemistry inspired by Cell Signalling Networks (CSNs). Its purpose is to represent chemical circuitry and to explore the computational properties responsible for generating emergent high-level be... Read More about Applications and design of cooperative multi-agent ARN-based systems..

DECMO2: a robust hybrid and adaptive multi-objective evolutionary algorithm. (2014)
Journal Article
ZAVOIANU, A.-C., LUGHOFER, E., BRAMERDORFER, G., AMRHEIN, W. and KLEMENT, E.P. 2015. DECMO2: a robust hybrid and adaptive multi-objective evolutionary algorithm. Soft computing [online], 19(12), pages 3551-3569. Available from: https://doi.org/10.1007/s00500-014-1308-7

We describe a hybrid and adaptive coevolutionary optimization method that can efficiently solve a wide range of multi-objective optimization problems (MOOPs) as it successfully combines positive traits from three main classes of multi-objective evolu... Read More about DECMO2: a robust hybrid and adaptive multi-objective evolutionary algorithm..

Cloud computing: adoption issues for sub-Saharan African SMEs. (2014)
Journal Article
DAHIRU, A. A., BASS, J. and ALLISON, I. 2014. Cloud computing: adoption issues for sub-Saharan African SMEs. Electronic journal of information systems in developing countries [online], 62(1), pages 1-17. Available from: https://doi.org/10.1002/j.1681-4835.2014.tb00439.x

This paper explores the emergence and adoption of cloud computing by small and medium-sized enterprises (SMEs) and points towards its implications for developing countries in sub-Saharan Africa. Several studies have shown the importance of technologi... Read More about Cloud computing: adoption issues for sub-Saharan African SMEs..

Migrating software products to the cloud: an adaptive STS perspective. (2013)
Journal Article
WERFS, M., BAXTER, G., ALLISON, I. K. and SOMMERVILLE, I. 2013. Migrating software products to the cloud: an adaptive STS perspective. Journal of international technology and information management [online], 22(3), pp. 37-54. Available from: https://scholarworks.lib.csusb.edu/jitim/vol22/iss3/3

Cloud computing, as a disruptive innovation, has the potential to adversely affect companies. The effects can be particularly extreme for small and medium sized enterprises (SMEs). Subsequently, considerations of organisational resilience should be m... Read More about Migrating software products to the cloud: an adaptive STS perspective..

Exploring aspects of cell intelligence with artificial reaction networks. (2013)
Journal Article
GERRARD, C. E., MCCALL, J., COGHILL, G. M. and MACLEOD, C. 2014. Exploring aspects of cell intelligence with artificial reaction networks. Soft computing [online], 18(10), pages 1899-1912. Available from: https://doi.org/10.1007/s00500-013-1174-8

The Artificial Reaction Network (ARN) is a Cell Signalling Network inspired connectionist representation belonging to the branch of A-Life known as Artificial Chemistry. Its purpose is to represent chemical circuitry and to explore computational prop... Read More about Exploring aspects of cell intelligence with artificial reaction networks..

You have e-mail, what happens next? Tracking the eyes for genre. (2013)
Journal Article
CLARK, M., RUTHVEN, I., HOLT, P.O'B., SONG, D. and WATT, S. 2014. You have e-mail, what happens next? Tracking the eyes for genre. Information processing and management [online], 50(1), pages 175-198. Available: https://doi.org/10.1016/j.ipm.2013.08.005

This paper reports on an approach to the analysis of form (layout and formatting) during genre recognition recorded using eye tracking. The researchers focused on eight different types of e-mail, such as calls for papers, newsletters and spam, which... Read More about You have e-mail, what happens next? Tracking the eyes for genre..

A framework using institutional analysis and the capability approach in ICT4D. (2013)
Journal Article
BASS, J.M., NICHOLSON, B. and SUBHRAMANIAN, E. 2013. A framework using institutional analysis and the capability approach in ICT4D. Information technologies and international development [online], 9(1), pages 19-35. Available from: http://www.itidjournal.org/index.php/itid/article/view/1028

nstitutional theory and the capability approach have grown inºuential in development research and practice. Both theories offer analytical tools for interpreting and guiding information and communication technology for development (ICT4D) interventi... Read More about A framework using institutional analysis and the capability approach in ICT4D..

Addressing food production planning and control issues through information visualisation: an agile development. (2012)
Journal Article
ALLISON, I.K., STRATTON, R. and ROBEY, D. 2012. Addressing food production planning and control issues through information visualisation: an agile development. Communications of the IIMA, 12(1), pages 1-16.

Food manufacturers have a compelling requirement to address their information management needs in relation to the management of variation in their supply chain and subsequent production processes. However, many organisational information systems are... Read More about Addressing food production planning and control issues through information visualisation: an agile development..

Efficient resource utilization for multi-flow wireless multicasting transmissions. (2012)
Journal Article
TU, W. 2012. Efficient resource utilization for multi-flow wireless multicasting transmissions. IEEE journal on selected areas in communications [online], 30(7), pages 1246-1258. Available from: https://doi.org/10.1109/JSAC.2012.120810

Wireless multimedia services are major applications of next generation wireless networks. This paper is one of the first to study the efficient utilization of network resources for increasing the number of concurrent multimedia flows when a channel b... Read More about Efficient resource utilization for multi-flow wireless multicasting transmissions..