Skip to main content

Research Repository

Advanced Search

Using extreme characters to teach requirements engineering. (2017)
Conference Proceeding
IACOB, C. and FAILY, S. 2017. Using extreme characters to teach requirements engineering. In Washizaki, H. and Mead, N. (eds.) Proceedings of the 30th IEEE conference on software engineering education and training (CSEET 2017), 7-9 November 2017, Savannah, USA. Los Alamitos: IEEE Computer Society [online], pages 107-111. Available from: https://doi.org/10.1109/CSEET.2017.25

One of the main challenges in teaching Software Engineering as an undergraduate course is making the need for software processes and documentation obvious. Armed with some knowledge of programming, students may feel inclined to skip any development p... Read More about Using extreme characters to teach requirements engineering..

Predicting service levels using neural networks. (2017)
Conference Proceeding
AINSLIE, R., MCCALL, J., SHAKYA, S. and OWUSU, G. 2017. Predicting service levels using neural networks. In Bramer, M. and Petridis, M. (eds.) Artificial intelliegence XXXIV: proceedings of the 37th SGAI International innovative techniques and applications of artifical intelligence conference 2017 (AI 2017), 12-14 December 2017, Cambridge, UK. Lecture notes in computer science, 10630. Cham: Springer [online], pages 411-416. Available from: https://doi.org/10.1007/978-3-319-71078-5_35

In this paper we present a method to predict service levels in utility companies, giving them advanced visibility of expected service outcomes and helping them to ensure adherence to service level agreements made to their clients. Service level adher... Read More about Predicting service levels using neural networks..

Towards computational dialogue types for BIM collaborative design: an initial study. (2017)
Conference Proceeding
TONIOLO, A. and LEON, M. 2017. Towards computational dialogue types for BIM collaborative design: an initial study. In Bistarelli, S., Giacomin, M. and Pazienza, A. (eds.) Proceedings of the 1st Workshop on advances in argumentation in artificial intelligence (AI^3 2017), 16-17 November 2017, Bari, Italy. CEUR workshop proceedings, 2012. Aachen: CEUR-WS [online], session 3: dialogues, real world arguments and applications, pages 79-84. Available from: http://ceur-ws.org/Vol-2012/AI3-2017_paper_8.pdf

Collaborative design is an iterative process of selecting and evaluating solutions under potentially conflicting requirements, a concept central to Building Information Modelling (BIM) implementation. Previous research has shown that design can be be... Read More about Towards computational dialogue types for BIM collaborative design: an initial study..

Goal models for acceptance requirements analysis and gamification design. (2017)
Conference Proceeding
PIRAS, L., PAJA, E., GIORGINI, P. and MYLOPOULOS, J. 2017. Goal models for acceptance requirements analysis and gamification design. In Mayr, H.C., Guizzardi, G., Ma, H. and Pastor, O. (eds.) Conceptual modeling: proceedings of 36th Conceptual modeling international conference 2017 (ER 2017), 6-9 November 2017, Valencia, Spain. Lecture notes in computer science, 10650. Cham: Springer [online], pages 223-230. Available from: https://doi.org/10.1007/978-3-319-69904-2_18

The success of software systems highly depends on user engagement. Thus, to deliver engaging systems, software has to be designed carefully taking into account Acceptance Requirements, such as '70% of users will use the system', and the psychological... Read More about Goal models for acceptance requirements analysis and gamification design..

From requirements to operation: components for risk assessment in a pervasive system of systems. (2017)
Conference Proceeding
KI-ARIES, D., DOGAN, H., FAILY, S., WHITTINGTON, P. and WILLIAMS, C. 2017. From requirements to operation: components for risk assessment in a pervasive system of systems. In Proceedings of the 4th Workshop on evolving security and privacy requirements engineering (ESPRE 2017), part of the 25th IEEE international requirements engineering conference workshops (REW 2017), 4-8 September 2017, Lisbon, Portugal. Los Alamitos: IEEE Computer Society [online], pages 83-89. Available from: https://doi.org/10.1109/REW.2017.36

Framing Internet of Things (IoT) applications as a System of Systems (SoS) can help us make sense of complexity associated with interoperability and emergence. However, assessing the risk of SoSs is a challenge due to the independence of component sy... Read More about From requirements to operation: components for risk assessment in a pervasive system of systems..

Design as code: facilitating collaboration between usability and security engineers using CAIRIS. (2017)
Conference Proceeding
FAILY, S. and IACOB, C. 2017. Design as code: facilitating collaboration between usability and security engineers using CAIRIS. In Proceedings of the 4th Workshop on evolving security and privacy requirements engineering (ESPRE 2017), part of the 25th IEEE international requirements engineering conference workshops (REW 2017), 4-8 September 2017, Lisbon, Portugal. Los Alamitos: IEEE Computer Society [online], pages 76-82. Available from: https://doi.org/10.1109/REW.2017.23

Designing usable and secure software is hard without tool-support. Given the importance of requirements, CAIRIS was designed to illustrate the form tool-support for specifying usable and secure systems might take. While CAIRIS supports a broad range... Read More about Design as code: facilitating collaboration between usability and security engineers using CAIRIS..

Managing information security risk using integrated governance risk and compliance. (2017)
Conference Proceeding
NICHO, M., KHAN, S. and RAHMAN, M.S.M.K. 2017. Managing information security risk using integrated governance risk and compliance. In Proceedings of the 2017 International conference on computer and applications (ICCA 2017), 6-7 September 2017, Dubai, UAE. New York: IEEE [online], article number pages 8079741, 56-66. Available from: https://doi.org/10.1109/COMAPP.2017.8079741

This paper aims to demonstrate the building blocks of an IT Governance Risk and Compliance (IT GRC) model as well the phased stages of the optimal integration of IT GRC frameworks, standards and model through a longitudinal study. A qualitative longi... Read More about Managing information security risk using integrated governance risk and compliance..

Lexicon induction for interpretable text classification. (2017)
Conference Proceeding
CLOS, J. and WIRATUNGA, N. 2017. Lexicon induction for interpretable text classification. In Kampus, J., Tsakonas, G., Manolopoulos, Y., Iliadis, L. and Karydis, I. (eds.) Proceedings of the 21st International conference on theory and practice of digital libraries (TPDL 2017): research and advanced technology for digital libraries, 18-21 September 2017, Thessaloniki, Greece. Lecture notes in computer science, 10450. Cham: Springer [online], pages 498-510. Available from: https://doi.org/10.1007/978-3-319-67008-9_39

The automated classification of text documents is an active research challenge in document-oriented information systems, helping users browse massive amounts of data, detecting likely authors of unsigned work, or analyzing large corpora along predefi... Read More about Lexicon induction for interpretable text classification..

Taxonomic corpus-based concept summary generation for document annotation. (2017)
Conference Proceeding
NKISI-ORJI, I., WIRATUNGA, N., HUI, K.-Y., HEAVEN, R. and MASSIE, S. 2017. Taxonomic corpus-based concept summary generation for document annotation. In Kampus, J., Tsakonas, G., Manolopoulos, Y., Iliadis, L. and Karydis, I. (eds.) Proceedings of the 21st International conference on theory and practice of digital libraries (TPDL 2017): research and advanced technology for digital libraries, 18-21 September 2017, Thessaloniki, Greece. Lecture notes in computer science, 10450. Cham: Springer [online], pages 49-60. Available from: https://doi.org/10.1007/978-3-319-67008-9_5

Semantic annotation is an enabling technology which links documents to concepts that unambiguously describe their content. Annotation improves access to document contents for both humans and software agents. However, the annotation process is a chall... Read More about Taxonomic corpus-based concept summary generation for document annotation..

Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks. (2017)
Conference Proceeding
MAVROEIDIS, V. and NICHO, M. 2017. Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks. In Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V. and Szczypiorski, K. (eds.) Computer network security: Proceedings of the 7th International Mathematical methods, models and architectures for computer network security conference (MMM-ACNS 2017), 28-30 August 2017, Warsaw, Poland. Lecture notes in computer science, 10466. Cham: Springer [online], pages 313-324. Available from: https://doi.org/10.1007/978-3-319-65127-9_25

The two-dimensional quick response (QR) codes can be misleading due to the difficulty in differentiating a genuine QR code from a malicious one. Since, the vulnerability is practically part of their design, scanning a malicious QR code can direct the... Read More about Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks..

Heuristics-based detection to improve text/graphics segmentation in complex engineering drawings. (2017)
Conference Proceeding
MORENO-GARC√ćA, C.F., ELYAN, E. and JAYNE, C. 2017. Heuristics-based detection to improve text/graphics segmentation in complex engineering drawings. In Boracchi, G., Iliadis, L., Jayne, C. and Likas, A. (eds.) Engineering applications of neural networks: proceedings of the 18th International engineering applications of neural networks (EANN 2017), 25-27 August 2017, Athens, Greece. Communications in computer and information science, 744. Cham: Springer [online], pages 87-98. Available from: https://doi.org/10.1007/978-3-319-65172-9_8

The demand for digitisation of complex engineering drawings becomes increasingly important for the industry given the pressure to improve the efficiency and time effectiveness of operational processes. There have been numerous attempts to solve this... Read More about Heuristics-based detection to improve text/graphics segmentation in complex engineering drawings..

Applying contextual integrity to open data publishing. (2017)
Conference Proceeding
HENRIKSEN-BULMER, J. and FAILY, S. 2017. Applying contextual integrity to open data publishing. In Hall, L., Flint, T., O'Hara, S. and Turner, P. (eds.) Proceedings of the 31st International BCS human computer interaction conference (HCI 2017), 3-6 July 2017, Sunderland, UK. Swindon: BCS, paper number 95. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/HCI2017.95

Open data publishing by both corporate and public bodies has increased significantly in recent years and this type of data could soon be developing into a real commodity. However, not all organisations pay sufficient heed to privacy as part of the de... Read More about Applying contextual integrity to open data publishing..

Learning deep and shallow features for human activity recognition. (2017)
Conference Proceeding
SANI, S., MASSIE, S., WIRATUNGA, N. and COOPER, K. 2017. Learning deep and shallow features for human activity recognition. In Li, G., Ge, Y, Zhang, Z., Jin, Z. and Blumenstein, M. (eds.) Knowledge science, engineering and management: proceedings of the 10th International knowledge science, engineering and management conference (KSEM 2017), 19-20 August 2017, Melbourne, Australia. Lecture notes in computer science, 10412. Cham: Springer [online], pages 469-482. Available from: https://doi.org/10.1007/978-3-319-63558-3_40

selfBACK is an mHealth decision support system used by patients for the self-management of Lower Back Pain. It uses Human Activity Recognition from wearable sensors to monitor user activity in order to measure their adherence to prescribed physical a... Read More about Learning deep and shallow features for human activity recognition..

System design considerations for risk perception. (2017)
Conference Proceeding
M'MANGA, A., FAILY, S., MCALANEY, J. and WILLIAMS, C. 2017. System design considerations for risk perception. In Assar, S., Pastor, O. and Mouratidis, H. (eds.) Proceedings of the 11th IEEE international conference on research challeneges in information science (RCIS 2017), 10-12 May 2017, Brighton, UK. Piscataway: IEEE [online], pages 322-327. Available from: https://doi.org/10.1109/RCIS.2017.7956554

The perception of risk is a driver for security analysts' decision making. However, security analysts may have conflicting views of a risk based on personal, system and environmental factors. This difference in perception and opinion, may impact effe... Read More about System design considerations for risk perception..

Re-framing "the AMN": a case study eliciting and modelling a system of systems using the Afghan Mission Network. (2017)
Conference Proceeding
KI-ARIES, D., FAILY, S., DOGAN, H. and WILLIAMS, C. 2017. Re-framing "the AMN": a case study eliciting and modelling a system of systems using the Afghan Mission Network. In Assar, S., Pastor, O. and Mouratidis, H. (eds.) Proceedings of the 11th IEEE international conference on research challenges in information science (RCIS 2017), 10-12 May 2017, Brighton, UK. Piscataway: IEEE [online], pages 103-108. Available from: https://doi.org/10.1109/RCIS.2017.7956524

The term System of Systems (SoS) is often used to classify an arrangement of independent and interdependent systems delivering unique capabilities. There appear to be many examples of SoSs, but the term has become a source of confusion. While many ap... Read More about Re-framing "the AMN": a case study eliciting and modelling a system of systems using the Afghan Mission Network..

Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques. (2017)
Conference Proceeding
PIRAS, L., PAJA, E., GIORGINI, P., MYLOPOULOS, J., CUEL, R. and PONTE, D. 2017. Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques. In Assar, S., Pastor, O. and Mouratidis, H. (eds.) Proceedings of 11th Institute of Electrical and Electronic Engineers (IEEE) Research challenges in information science international conference 2017 (RCIS 2017), 10-12 May 2017, Brighton, UK. Piscataway: IEEE [online], pages 255-265. Available from: https://doi.org/10.1109/RCIS.2017.7956544

Gamificationis a powerful paradigm and a set of best practices used to motivate people carrying out a variety of ICT–mediated tasks. Designing gamification solutions and applying them to a given ICT system is a complex and expensive process (in time,... Read More about Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques..

A convolutional Siamese network for developing similarity knowledge in the SelfBACK dataset. (2017)
Conference Proceeding
MARTIN, K., WIRATUNGA, N., SANI, S., MASSIE, S. and CLOS, J. 2017. A convolutional Siamese network for developing similarity knowledge in the SelfBACK dataset. In Sanchez-Ruiz, A.A. and Kofod-Petersen, A. (eds.) Workshop proceedings of the 25th International conference on case-based reasoning (ICCBR 2017), 26-29 June 2017, Trondheim, Norway. CEUR workshop proceedings, 2028. Aachen: CEUR-WS [online], session 2: case-based reasoning and deep learning workshop (CBRDL-2017), pages 85-94. Available from: http://ceur-ws.org/Vol-2028/paper8.pdf

The Siamese Neural Network (SNN) is a neural network architecture capable of learning similarity knowledge between cases in a case base by receiving pairs of cases and analysing the differences between their features to map them to a multi-dimensiona... Read More about A convolutional Siamese network for developing similarity knowledge in the SelfBACK dataset..

Learning deep features for kNN-based human activity recognition. (2017)
Conference Proceeding
SANI, S., WIRATUNGA, N. and MASSIE, S. 2017. Learning deep features for kNN-based human activity recognition. In Sanchez-Ruiz, A.A. and Kofod-Petersen, A. (eds.) Workshop proceedings of the 25th International conference on case-based reasoning (ICCBR 2017), 26-29 June 2017, Trondheim, Norway. CEUR workshop proceedings, 2028. Aachen: CEUR-WS [online], session 2: case-based reasoning and deep learning workshop (CBRDL-2017), pages 95-103. Available from: http://ceur-ws.org/Vol-2028/paper9.pdf

A CBR approach to Human Activity Recognition (HAR) uses the kNN algorithm to classify sensor data into different activity classes. Different feature representation approaches have been proposed for sensor data for the purpose of HAR. These include sh... Read More about Learning deep features for kNN-based human activity recognition..

kNN sampling for personalised human recognition. (2017)
Conference Proceeding
SANI, S., WIRATUNGA, N., MASSIE, S. and COOPER, K. 2017. kNN sampling for personalised human recognition. In Aha, D.W. and Lieber, J. (eds.) Case-based reasoning research and development: proceedings of the 25th International case-based reasoning conference (ICCBR 2017), 26-28 June 2017, Trondheim, Norway. Lecture notes in computer science, 10339. Cham: Springer [online], pages 330-344. Available from: https://doi.org/10.1007/978-3-319-61030-6_23

The need to adhere to recommended physical activity guidelines for a variety of chronic disorders calls for high precision Human Activity Recognition (HAR) systems. In the SelfBACK system, HAR is used to monitor activity types and intensities to enab... Read More about kNN sampling for personalised human recognition..

A random key based estimation of distribution algorithm for the permutation flowshop scheduling problem. (2017)
Conference Proceeding
AYODELE, M., MCCALL, J., REGNIER-COUDERT, O. and BOWIE, L. 2017. A random key based estimation of distribution algorithm for the permutation flowshop scheduling problem. In Proceedings of the 2017 IEEE congress on evolutionary computation (CEC 2017), 5-8 June 2017, San Sebastian, Spain. New York: IEEE [online], article number 7969591, pages 2364-2371. Available from: https://doi.org/10.1109/CEC.2017.7969591

Random Key (RK) is an alternative representation for permutation problems that enables application of techniques generally used for continuous optimisation. Although the benefit of RKs to permutation optimisation has been shown, its use within Estima... Read More about A random key based estimation of distribution algorithm for the permutation flowshop scheduling problem..