Skip to main content

Research Repository

Advanced Search

All Outputs (517)

Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence. (2014)
Conference Proceeding
RATTADILOK, P. and PETROVSKI, A. 2014. Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence. In Proceedings of the 2014 IEEE symposium on evolving and autonomous learning systems (EALS 2014), part of the 2014 IEEE symposium series on computational intelligence (SSCI 2014), 9-12 December 2014, Orlando, USA. New York: IEEE [online], article number 7009508, pages 87-94. Available from: https://doi.org/10.1109/EALS.2014.7009508

A generic framework for evolving and autonomously controlled systems has been developed and evaluated in this paper. A three-phase approach aimed at identification, classification of anomalous data and at prediction of its consequences is applied to... Read More about Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence..

Eliciting and visualising trust expectations using persona trust characteristics and goal models. (2014)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2014. Eliciting and visualising trust expectations using persona trust characteristics and goal models. In Lanubile, F. and Ali, R. (eds.) Proceedings of the 6th International workshop on social software engineering (SSE 2014), 17 November 2014, Hong Kong, China. New York: ACM [online], pages 17-24. Available from: https://doi.org/10.1145/2661685.2661690

Developers and users rely on trust to simplify complexity when building and using software. Unfortunately, the invisibility of trust and the richness of a system's context of use means that factors influencing trust are difficult to see, and assessin... Read More about Eliciting and visualising trust expectations using persona trust characteristics and goal models..

Age, technology usage, and cognitive characteristics in relation to perceived disorientation and reported website ease of use. (2014)
Conference Proceeding
CRABB, M. and HANSON, V.L. 2014. Age, technology usage, and cognitive characteristics in relation to perceived disorientation and reported website ease of use. In Proceedings of the 16th International Association for Computing Machinery (ACM) Special Interest Group on Accessible computing (SIGACCESS) conference on computers and accessibility (ASSETS '14), 20-22 October 2014, Rochester, USA. New York: ACM [online], pages 193-200. Available from: https://doi.org/10.1145/2661334.2661356

Comparative studies including older and younger adults are becoming more common in HCI, generally used to compare how these two different age groups will approach a task. However, it is unclear whether user 'age' is the underlying factor that differe... Read More about Age, technology usage, and cognitive characteristics in relation to perceived disorientation and reported website ease of use..

The learner experience of student-led international group project work in software engineering. (2014)
Conference Proceeding
MCDERMOTT, R., BASS, J. and LALCHANDANI, J.P. 2014. The learner experience of student-led international group project work in software engineering. In Proceedings of the 2014 Frontiers in education conference (FIE 2014): opening innovations and internationalization in engineering education, 22-25 October 2014, Madrid, Spain. Piscataway: IEEE [online], article number 7044181. Available from: https://doi.org/10.1109/FIE.2014.7044181

Software development has become increasingly globalized because of technological innovation, the evolution of work and business processes, as well as prevailing educational systems and national policies [1]. This paper addresses the challenges faced... Read More about The learner experience of student-led international group project work in software engineering..

Subject-level quality assurance in computing: experiences from three national perspectives. (2014)
Conference Proceeding
MCDERMOTT, R., DANIELS, M. and LARUSDOTTIR, M. 2014. Subject-level quality assurance in computing: experiences from three national perspectives. In Proceedings of the 2014 Frontiers in education conference (FIE 2014): opening innovations and internationalization in engineering education, 22-25 October 2014, Madrid, Spain. Piscataway: IEEE [online], article number 7044182. Available from: https://doi.org/10.1109/FIE.2014.7044182

This paper examines some aspects of the Quality Assurance processes in Computing departments in three European universities. We first examine the operation of a quality assurance activity in the School of Computer Science in Iceland. The next case is... Read More about Subject-level quality assurance in computing: experiences from three national perspectives..

Critical thinking, peer-writing, and the importance of feedback. (2014)
Conference Proceeding
CAJANDER, A., DANIELS, M., PETERS, A.-K. and MCDERMOTT, R. 2014. Critical thinking, peer-writing, and the importance of feedback. In Proceedings of the 2014 Frontiers in education conference (FIE 2014): opening innovations and internationalization in engineering education, 22-25 October 2014, Madrid, Spain. Piscataway: IEEE [online], article number 7044234. Available from: https://doi.org/10.1109/FIE.2014.7044234

Critical thinking is one of the key competencies listed by OECD (Organisation for Economic Co-operation and Development) [1], a central European Community organization, and is also mentioned as a learning outcome for higher education by international... Read More about Critical thinking, peer-writing, and the importance of feedback..

Authorisation in context: incorporating context-sensitivity into an access control framework. (2014)
Conference Proceeding
FAILY, S., LYLE, J., FLÉCHAIS, I., ATZENI, A., CAMERONI, C., MYRHAUG, H., GÖKER, A. and KLEINFELD, R. 2014. Authorisation in context: incorporating context-sensitivity into an access control framework. In Proceedings of the 28th International BCS human computer interaction conference (HCI 2014): sand, sea and sky: holiday HCI, 9-12 September 2014, Southport, UK. Swindon: BCS, pages 189-194. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/hci2014.29

With sensitive information about ourselves now distributed across personal devices, people need to make access control decisions for different contexts of use. However, despite advances in improving the usability of access control for both developers... Read More about Authorisation in context: incorporating context-sensitivity into an access control framework..

Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014). (2014)
Conference Proceeding
BECKERS, K., FAILY, S., LEE, S.-W. and MEAD, N. (eds.) 2014. Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014), co-located with the 22nd IEEE international requirements engineering conference (RE 2014), 25 August 2014, Karlskrona, Sweden. Piscataway: IEEE [online]. Available from: https://ieeexplore.ieee.org/xpl/conhome/6883269/proceeding

The main focus of ESPRE is to bring together practitioners and researchers interested in security and privacy requirements. ESPRE probes the interfaces between requirements engineering, security and privacy, and takes the first step in evolving secur... Read More about Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014)..

Scrum master activities: process tailoring in large enterprise projects. (2014)
Conference Proceeding
BASS, J.M. 2014. Scrum master activities: process tailoring in large enterprise projects. In Proceedings of the 9th IEEE international conference on global software engineering (ICGSE 2014), 18-21 August 2014, Shanghai, China. Los Alamitos: IEEE Computer Society [online], article number 6915249, pages 6-15. Available from: https://doi.org/10.1109/ICGSE.2014.24

This paper explores practitioner descriptions of agile method tailoring in large-scale offshore or outsourced enterprise projects. Specifically, tailoring of the scrum master role is investigated. The scrum master acts as a facilitator for software d... Read More about Scrum master activities: process tailoring in large enterprise projects..

Minimal walsh structure and ordinal linkage of monotonicity-invariant function classes on bit strings. (2014)
Conference Proceeding
CHRISTIE, L.A., MCCALL, J.A.W. and LONIE, D.P. 2014. Minimal walsh structure and ordinal linkage of monotonicity-invariant function classes on bit strings. In Igel, C. (ed.) Proceedings of the 2014 Genetic and evolutionary computation conference (GECCO 2014): a recombination of the 23rd International conference on genetic algorithms (ICGA-2014), and the 19th Annual genetic programming conference (GP-2014), 12-16 July 2014, Vancouver, Canada. New York: ACM [online], pages 333-340. Available from: https://doi.org/10.1145/2576768.2598240

Problem structure, or linkage, refers to the interaction between variables in a black-box fitness function. Discovering structure is a feature of a range of algorithms, including estimation of distribution algorithms (EDAs) and perturbation methods (... Read More about Minimal walsh structure and ordinal linkage of monotonicity-invariant function classes on bit strings..

Online reviews as first class artifacts in mobile app development. (2014)
Conference Proceeding
IACOB, C., HARRISON, R. and FAILY, S. 2014. Online reviews as first class artifacts in mobile app development. In Memmi, G. and Blanke, U. (eds.) Mobile computing, applications and services: revised selected papers from the proceedings of the 5th International conference on mobile computing, applications and services (MobiCase 2013), 7-8 November 2013, Paris, France. Lecture notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 130. Cham: Springer [online], pages 47-53. Available from: https://doi.org/10.1007/978-3-319-05452-0_4

This paper introduces a framework for developing mobile apps. The framework relies heavily on app stores and, particularly, on online reviews from app users. The underlying idea is that app stores are proxies for users because they contain direct fee... Read More about Online reviews as first class artifacts in mobile app development..

Real-time topic detection with bursty n-grams: RGU's submission to the 2014 SNOW challenge. (2014)
Conference Proceeding
MARTIN, C. and GOKER, A. 2014. Real-time topic detection with bursty n-grams: RGU's submission to the 2014 SNOW challenge. In Proceedings of the 2014 Social news on the web data challenge (SNOW-DC 2014), 8th April 2014, Seoul, Korea. CEUR workshop proceedings, 1150. Aachen: CEUR-WS [online], pages 9-16. Available from http://ceur-ws.org/Vol-1150/martin.pdf

Twitter is becoming an ever more popular platform for discovering and sharing information about current events, both personal and global. The scale and diversity of messages makes the discovery and analysis of breaking news very challenging. Nonethel... Read More about Real-time topic detection with bursty n-grams: RGU's submission to the 2014 SNOW challenge..

Evaluating industry-inspired pair programming communication guidelines with undergraduate students. (2014)
Conference Proceeding
ZARB, M., HUGHES, J. and RICHARDS, J. 2014. Evaluating industry-inspired pair programming communication guidelines with undergraduate students. In Proceedings of the 45th Association for Computing Machinery (ACM) technical symposium on computer science education (SIGCSE 2014), 5-8 March 2014, Atlanta, USA. New York: ACM [online], pages 361-366. Available from: https://doi.org/10.1145/2538862.2538980

A set of industry-inspired pair programming guidelines have been derived from qualitative examinations of expert pairs in order to aid novice programmers with their intra-pair communication. This research describes the evaluation of these guidelines... Read More about Evaluating industry-inspired pair programming communication guidelines with undergraduate students..

Personal PKI for the smart device era. (2013)
Conference Proceeding
LYLE, J., PAVERD, A., KING-LACROIX, J., ATZENI, A., VIRJI, H., FLÉCHAIS, I. and FAILY, S. 2013. Personal PKI for the smart device era. In De Capitani di Vimercati, S. and Mitchell, C. (eds.) Public key infrastructures, services and applications: revised selected papers from the 9th European workshop on public key infrastructures, services and applications (EuroPKI 2012), 13-14 September 2012, Pisa, Italy. Lecture notes in computer science, 7868. Heidelberg: Springer [online], pages 69-84. Available from: https://doi.org/10.1007/978-3-642-40012-4_5

As people use an increasing number of smart devices for their everyday computing, it is surprising that these powerful, internet-enabled devices are rarely connected together to create personal networks. The webinos project is an attempt to make this... Read More about Personal PKI for the smart device era..

Continuous integration for web-based software infrastructures: lessons learned on the webinos project. (2013)
Conference Proceeding
SU, T., LYLE, J., ATZENI, A., FAILY, S., VIRJI, H., NTANOS, C. and BOTSIKAS, C. 2013. Continuous integration for web-based software infrastructures: lessons learned on the webinos project. In Bertacco, V. and Legay, A. (eds.) Hardware and software: verification and testing: proceedings of the 9th International Haifa verification conference (HVC 2013), 5-7 November 2013, Haifa, Israel. Lecture notes in computer science, 8244. Cham: Springer [online], pages 145-150. Available from: https://doi.org/10.1007/978-3-319-03077-7_10

Testing web-based software infrastructures is challenging. The need to interact with different services running on different devices, with different expectations for security and privacy contributes not only to the complexity of the infrastructure, b... Read More about Continuous integration for web-based software infrastructures: lessons learned on the webinos project..

Anomaly monitoring framework based on intelligent data analysis. (2013)
Conference Proceeding
RATTADILOK, P., PETROVSKI, A. and PETROVSKI, S. 2013. Anomaly monitoring framework based on intelligent data analysis. In Yin, H., Tang, K., Gao, Y., Klawonn, F., Lee, M., Weise, T., Li, B. and Yao, X. (eds.) Proceedings of the 14th International conference on intelligent data engineering and automated learning (IDEAL 2013), 20-23 October 2013, Hefei, China. Lecture notes in computer science, 8206. Berlin: Springer [online], pages 134-141. Available from: https://doi.org/10.1007/978-3-642-41278-3_17

Real-time data processing has become an increasingly important challenge as the need for faster analysis of big data widely manifests itself. In this research, several Computational Intelligence methods have been applied for identifying possible anom... Read More about Anomaly monitoring framework based on intelligent data analysis..

Contemplations on results from investigating the personal epistemology of computing students. (2013)
Conference Proceeding
MCDERMOTT, R., PIRIE, I., LAXER, C., CAJANDER, A. and DANIELS, M. 2013. Contemplations on results from investigating the personal epistemology of computing students. In Proceedings of the 2013 Frontiers in education conference (FIE 2013): energizing the future, 23-26 October 2013, Oklahoma City, USA. Piscataway: IEEE [online], article number 6684941, pages 825-831. Available from: https://doi.org/10.1109/FIE.2013.6684941

'Personal Epistemology' is the analysis of the ways in which an individual perceives what constitutes knowledge, its boundaries, how it is justified, and how it is related to learning. While investigation of metacognitive strategies used by students... Read More about Contemplations on results from investigating the personal epistemology of computing students..

Combining biochemical network motifs within an ARN-agent control system. (2013)
Conference Proceeding
GERRARD, C.E., MCCALL, J., MACLEOD, C. and COGHILL, G.M. 2013. Combining biochemical network motifs within an ARN-agent control system. In Jin, Y. and Thomas, S.A. (eds.) Proceedings of the 13th UK workshop on computational intelligence (UKCI 2013), 9-11 September 2013, Guildford, UK. New York: IEEE [online], article number 6651281, pages 8-15. Available from: https://doi.org/10.1109/UKCI.2013.6651281

The Artificial Reaction Network (ARN) is an Artificial Chemistry representation inspired by cell signaling networks. The ARN has previously been applied to the simulation of the chemotaxis pathway of Escherichia coli and to the control of limbed robo... Read More about Combining biochemical network motifs within an ARN-agent control system..

Partial structure learning by subset Walsh transform. (2013)
Conference Proceeding
CHRISTIE, L.A., LONIE, D.P. and MCCALL, J.A.W. 2013. Partial structure learning by subset Walsh transform. In Jin, Y. and Thomas, S.A. (eds.) Proceedings of the 13th UK workshop on computational intelligence (UKCI 2013), 9-11 September 2013, Guildford, UK. New York: IEEE [online], article number 6651297, pages 128-135. Available from: https://doi.org/10.1109/UKCI.2013.6651297

Estimation of distribution algorithms (EDAs) use structure learning to build a statistical model of good solutions discovered so far, in an effort to discover better solutions. The non-zero coefficients of the Walsh transform produce a hypergraph rep... Read More about Partial structure learning by subset Walsh transform..

Agile method tailoring in distributed enterprises: product owner teams. (2013)
Conference Proceeding
BASS, J.M. 2013. Agile method tailoring in distributed enterprises: product owner teams. In Proceedings of the 8th IEEE international conference on global software engineering (ICGSE 2013), 26-29 August 2013, Bari, Italy. Los Alamitos: IEEE Computer Society [online], article number 6613080, pages 154-163. Available from: https://doi.org/10.1109/ICGSE.2013.27

This paper explores practitioner descriptions of agile method tailoring in large-scale offshore or outsourced enterprise projects. Specifically, tailoring of the product owner role is discussed. The product owner identifies and prioritizes customer r... Read More about Agile method tailoring in distributed enterprises: product owner teams..