Skip to main content

Research Repository

Advanced Search

All Outputs (1090)

Music recommenders: user evaluation without real users? (2015)
Conference Proceeding
CRAW, S., HORSBURGH, B. and MASSIE, S. 2015. Music recommenders: user evaluation without real users? In Yang, Q. and Woolridge, M. (eds.) Proceedings of the 24th International joint conference on artificial intelligence (IJCAI-15), 25-31 July 2015, Buenos Aires, Argentina. Palo Alto: AAAI Press [online], pages 1749-1755. Available from: https://www.ijcai.org/Proceedings/15/Papers/249.pdf

Good music recommenders should not only suggest quality recommendations, but should also allow users to discover new/niche music. User studies capture explicit feedback on recommendation quality and novelty, but can be expensive, and may have difficu... Read More about Music recommenders: user evaluation without real users?.

Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. (2015)
Journal Article
KALUTARAGE, H.K., SHAIKH, S.A., WICKRAMASINGHE, I.P., ZHOU, Q. and JAMES, A.E. 2015. Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. Computers and electrical engineering [online], 47, pages 327-344. Available from: https://doi.org/10.1016/j.compeleceng.2015.07.007

Stealthy attackers move patiently through computer networks – taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a chall... Read More about Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks..

Analysing creative image search information needs. (2015)
Conference Proceeding
GOKER, A., KONKOVA, E., MACFARLANE, A. 2015. Analysing creative image search information needs. In Proceedings of the 2015 ISKO UK biennial conference: knowledge organization - making a difference, 13-14 July 2015, London, UK. London: ISKO [online]. Available from: http://www.iskouk.org/content/analysing-creative-image-search-information-needs

Creative professionals in advertising, marketing, design and journalism search for images to visually represent a concept for their project. The main purpose of this paper is to present an analysis of documents known as briefs to find search facets,... Read More about Analysing creative image search information needs..

The mystery of security design. (2015)
Presentation / Conference
VALLINDRAS, A. and FAILY, S. 2015. The mystery of security design. Presented at the 29th British human computer interaction conference (British HCI 2015), 13-17 July 2015, Lincoln, UK.

Designing for security is hard without security getting in the way of design. Unfortunately, security is often promoted through fear, uncertainty, and doubt (FUD). As a result, the scale of FUD has now become so great that it hinders people's ability... Read More about The mystery of security design..

Virtual teams and employability in global software engineering education. (2015)
Conference Proceeding
BASS, J.M., MCDERMOTT, R. and LALCHANDANI, J.T. 2015. Virtual teams and employability in global software engineering education. In Proceedings of the 10th IEEE international conference on global software engineering (ICGSE 2015), 13-16 July 2015, Ciudad Real, Spain. Piscataway: IEEE [online], article number 7224489, pages 115-124. Available from: https://doi.org/10.1109/ICGSE.2015.21

Universities face many challenges when creating opportunities for student experiences of global software engineering. We provide a model for introducing global software engineering into the computing curriculum. Our model is based on a three year col... Read More about Virtual teams and employability in global software engineering education..

Generating easy and hard problems using the proximate optimality principle. (2015)
Conference Proceeding
MCCALL, J.A.W., CHRISTIE, L.A. and BROWNLEE, A.E.I. 2015. Generating easy and hard problems using the proximate optimality principle. In Silva, S. (ed.) Proceedings of the companion publication of the 2015 annual conference on genetic and evolutionary computation (GECCO Companion '15), 11-15 July 2015, Madrid, Spain. New York: ACM [online], pages 767-768. Available from: https://doi.org/10.1145/2739482.2764890

We present an approach to generating problems of variable difficulty based on the well-known Proximate Optimality Principle (POP), often paraphrased as similar solutions have similar fitness. We explore definitions of this concept in terms of metrics... Read More about Generating easy and hard problems using the proximate optimality principle..

Challenges and recommendations for the design and conduct of global software engineering courses: a systematic review. (2015)
Conference Proceeding
CLEAR, T., BEECHAM, S., BARR, J., DANIELS, M., MCDERMOTT, R., OUDSHOORN, M., SAVICKAITE, A. and NOLL, J. 2015. Challenges and recommendations for the design and conduct of global software engineering courses: a systematic review. In Proceedings of the 2015 Innovation and technology in computer science education on working group reports (ITiCSE-WGR '15), 4-8 July 2015, Vilnius, Lithuania. New York: ACM [online], pages 1-39. Available from: https://doi.org/10.1145/2858796.2858797

Context: Global Software Engineering (GSE) has become the predominant form of software development for global companies and has given rise to a demand for students trained in GSE. In response, universities are developing courses and curricula around... Read More about Challenges and recommendations for the design and conduct of global software engineering courses: a systematic review..

Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm. (2015)
Journal Article
BANO, S. and RAO, K.R. 2015. Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm. International journal of electrical and computer engineering [online], 5(3), pages 483-490. Available from: http://doi.org/10.11591/ijece.v5i3.pp483-490

In this paper we propose a method that aims to reduce processing overheads by avoiding the need to choose between natural language processing tools such as part-of-speech taggers and parsers. Moreover, we suggest a structure for the immediate creatio... Read More about Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm..

A case study into the accessibility of text-parser based interaction. (2015)
Conference Proceeding
HERON, M.J. 2015. A case study into the accessibility of text-parser based interaction. In Proceedings of the 7th Association for Computing Machinery (ACM) Special Interest group on Computer-Human Interaction (SIGCHI) symposium on engineering interactive computing systems (EICS'15), 23-26 June 2015, Duisburg, Germany. New York: ACM [online], pages 74-83. Available from: https://doi.org/10.1145/2774225.2774833

The academic issues surrounding the accessibility of video games are reasonably well understood although compensations and inclusive design have not yet been comprehensively adopted by professional game developers. Several sets of guidelines have bee... Read More about A case study into the accessibility of text-parser based interaction..

Perserverance measures and attainment in first year computing science students. (2015)
Conference Proceeding
MCDERMOTT, R., DANIELS, M. and CAJANDER, A. 2015. Perserverance measures and attainment in first year computing science students. In Proceedings of the 2015 Association for Computing Machinery (ACM) Innovation and technology in computer science education conference (ITiCSE '15), 4-8 July 2015, Vilnius, Lithuania. New York: ACM [online], pages 302-307. Available from: https://doi.org/10.1145/2729094.2742625

We investigate the link between concepts of perseverance such as conscientiousness and grit, and the academic attainment of first year computing students. We review the role that perseverance plays in learning models, as well as describing the trait... Read More about Perserverance measures and attainment in first year computing science students..

Cross-layer topology design for network coding based wireless multicasting. (2015)
Journal Article
VIEN, Q.-T., TU, W., NGUYEN, H.X. and TRESTIAN, R. 2015. Cross-layer topology design for network coding based wireless multicasting. Computer networks [online], 88, pages 27-39. Available from: https://doi.org/10.1016/j.comnet.2015.06.005

This paper considers wireless multicast networks where network coding (NC) is applied to improve network throughput. A novel joint topology and cross-layer design is proposed to maximise the network throughput subject to various quality-of-service co... Read More about Cross-layer topology design for network coding based wireless multicasting..

Embedding professional practice into the cybersecurity curriculum using ethics. (2015)
Presentation / Conference
FAILY, S. and JONES, M. 2015. Embedding professional practice into the cybersecurity curriculum using ethics. Presented at the UK workshop on cybersecurity training and education, 11 June 2015, Liverpool, UK.

Cybersecurity graduates are ready to tackle the technical problems they might face, but employability needs to be incorporated into the curriculum should they wish to tackle ill-defined professional challenges as well. We describe how employability w... Read More about Embedding professional practice into the cybersecurity curriculum using ethics..

Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening. (2015)
Journal Article
RAHIM, S.S., JAYNE, C., PALADE, V. and SHUTTLEWORTH, J. 2016. Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening. Neural computing and applications [online], 27(5), pages 1149-1164. Available from: https://doi.org/10.1007/s00521-015-1929-5.

Regular eye screening is essential for the early detection and treatment of the diabetic retinopathy. This paper presents a novel automatic screening system for diabetic retinopathy that focuses on the detection of the earliest visible signs of retin... Read More about Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening..

Performance comparison of generational and steady-state asynchronous multi-objective evolutionary algorithms for computationally-intensive problems. (2015)
Journal Article
ZAVOIANU, A.-C., LUGHOFER, E., KOPPELSTÄTTER, W., WEIDENHOLZER, G., AMRHEIN, W. and KLEMENT, E.P. 2015. Performance comparison of generational and steady-state asynchronous multi-objective evolutionary algorithms for computationally-intensive problems. Knowledge-based systems [online], 87, pages 47-60. Available from: https://doi.org/10.1016/j.knosys.2015.05.029

In the last two decades, multi-objective evolutionary algorithms (MOEAs) have become ever more used in scientific and industrial decision support and decision making contexts the require an a posteriori articulation of preference. The present work is... Read More about Performance comparison of generational and steady-state asynchronous multi-objective evolutionary algorithms for computationally-intensive problems..

Dynamic subtitles: the user experience. (2015)
Conference Proceeding
BROWN, A., JONES, R., CRABB, M., SANDFORD, J., BROOKS, M., ARMSTRONG, M. and JAY, C. 2015. Dynamic subtitles: the user experience. In Proceedings of the Association for Computing Machinery (ACM) International conference on interactive experiences for TV and online video (TVX 2015), 03-05 June 2015, Brussels, Belgium. New York: ACM [online], pages 103-112. Available from: https://doi.org/10.1145/2745197.2745204

Subtitles (closed captions) on television are typically placed at the bottom-centre of the screen. However, placing subtitles in varying positions, according to the underlying video content ('dynamic subtitles'), has the potential to make the overall... Read More about Dynamic subtitles: the user experience..

A role allocation model for IT controls in a cloud environment. (2015)
Journal Article
KHAN, S., NICHO, M. and COOPER, G. 2015. A role allocation model for IT controls in a cloud environment. Review of business information systems [online], 19(1), pages 5-14. Available from: https://doi.org/10.19030/rbis.v19i1.9253

The rapid adoption of cloud computing by organizations, along with the need to comply with relevant IT governance (ITG) controls, has increased the complexity of governance in the cloud. This transition from a classical data center to a virtualized d... Read More about A role allocation model for IT controls in a cloud environment..

An association rule dynamics and classification approach to event detection and tracking in Twitter. (2015)
Thesis
ADEDOYIN-OLOWE, M. 2015. An association rule dynamics and classification approach to event detection and tracking in Twitter. Robert Gordon University, PhD thesis.

Twitter is a microblogging application used for sending and retrieving instant on-line messages of not more than 140 characters. There has been a surge in Twitter activities since its launch in 2006 as well as steady increase in event detection resea... Read More about An association rule dynamics and classification approach to event detection and tracking in Twitter..

Twitter response to televised political debates in Election 2015. (2015)
Book Chapter
PEDERSEN, S., BAXTER, G., BURNETT, S., MACLEOD, I., GOKER, A., HERON, M., ISAACS, J., ELYAN, E. and KALICIAK, L. 2015. Twitter response to televised political debates in Election 2015. In Jackson, D. and Thorsen, E. (eds.) UK election analysis 2015: media, voters and the campaign: early reflections from leading UK academics. Poole: Bournemouth University, centre for the study of journalism, culture and community [online], page 73. Available from: http://www.electionanalysis.uk/uk-election-analysis-2015/section-6-social-media/twitter-response-to-televised-political-debates-in-election-2015/

The advent of social media such as Twitter has revolutionised our conversations about live television events. In the days before the Internet, conversation about television programmes was limited to those sitting on the sofa with you and people you m... Read More about Twitter response to televised political debates in Election 2015..

Autonomic behavioural framework for structural parallelism over heterogeneous multi-core systems. (2015)
Thesis
GOLI, M. 2015. Autonomic behavioural framework for structural parallelism over heterogeneous multi-core systems. Robert Gordon University, PhD thesis.

With the continuous advancement in hardware technologies, significant research has been devoted to design and develop high-level parallel programming models that allow programmers to exploit the latest developments in heterogeneous multi-core/many-co... Read More about Autonomic behavioural framework for structural parallelism over heterogeneous multi-core systems..

Correspondence consensus of two sets of correspondences through optimisation functions. (2015)
Journal Article
MORENO-GARCÍA, C.F. and SERRATOSA, F. 2017. Correspondence consensus of two sets of correspondences through optimisation functions. Pattern analysis and applications [online], 20(1), pages 201-213. Available from: https://doi.org/10.1007/s10044-015-0486-y

We present a consensus method which, given the two correspondences between sets of elements generated by separate entities, enounces a final correspondence consensus considering the existence of outliers. Our method is based on an optimisation techni... Read More about Correspondence consensus of two sets of correspondences through optimisation functions..