Skip to main content

Research Repository

Advanced Search

All Outputs (517)

Inferential measurements for situation awareness: enhancing traffic surveillance by machine learning. (2013)
Conference Proceeding
RATTADILOK, P. and PETROVSKI, A. 2013. Inferential measurements for situation awareness: enhancing traffic surveillance by machine learning. In Proceedings of the 2013 IEEE international conference on computational intelligence and virtual environments for measurement systems and applications (CIVEMSA 2013), 15-17 July 2013, Milan, Italy. New York: IEEE [online], article number 6617402, pages 93-98. Available from: https://doi.org/10.1109/CIVEMSA.2013.6617402

The paper proposes a generic approach to building inferential measurement systems. The large amount of data needed to be acquired and processed by such systems necessitates the use of machine learning techniques. In this study, an inferential measure... Read More about Inferential measurements for situation awareness: enhancing traffic surveillance by machine learning..

A multi-objective evolutionary algorithm fitness function for case-base maintenance. (2013)
Conference Proceeding
LUPIANI, E., CRAW, S., MASSIE, S., JUAREZ, J.M. and PALMA, J.T. 2013. A multi-objective evolutionary algorithm fitness function for case-base maintenance. In Delany, S.J. and Ontañón, S. (eds.) Case-based reasoning research and development: proceedings of the 21st International conference on case-based reasoning (ICCBR 2013), 8-11 July 2013, Saratoga Springs, USA. Lecture notes in computer science, 7969. Berlin: Springer [online], pages 218-232. Available from: https://doi.org/10.1007/978-3-642-39056-2_16

Case-Base Maintenance (CBM) has two important goals. On the one hand, it aims to reduce the size of the case-base. On the other hand, it has to improve the accuracy of the CBR system. CBM can be represented as a multi-objective optimization problem t... Read More about A multi-objective evolutionary algorithm fitness function for case-base maintenance..

Security patterns considered harmful? (2013)
Conference Proceeding
FAILY, S. 2013. Security patterns considered harmful? In Proceedings of the 2nd International workshop on cyberpatterns (Cyberpatterns 2013): unifying design patterns with security, attack and forensic patterns, 8-9 July 2013, Abingdon, UK. Oxford: Oxford Brookes University, pages 108-109.

While a useful source of repeatable security knowledge, ambiguity about what security patterns are and how they might be applied call into question their reliability as a design tool. To provoke discussion about their usefulness, this paper claims th... Read More about Security patterns considered harmful?.

Proceedings of the Workshop on web applications and secure hardware (WASH 2013). (2013)
Conference Proceeding
LYLE, J., FAILY, S. and WINANDY, M. (eds.) 2013. Proceedings of the Workshop on web applications and secure hardware (WASH 2013), co-located with the 6th International conference on trust and trustworthy computing (TRUST 2013), 20 June 2013, London, UK. CEUR workshop proceedings, 1011. Aachen: CEUR-WS [online]. Available from: http://ceur-ws.org/Vol-1011/

Web browsers are becoming the platform of choice for applications that need to work across a wide range of different devices, including mobile phones, tablets, PCs, TVs and in-car systems. However, for web applications which require a higher level of... Read More about Proceedings of the Workshop on web applications and secure hardware (WASH 2013)..

User perceptions of relevance and its effect on retrieval in a smart textile archive. (2013)
Conference Proceeding
HORSBURGH, B., CRAW, S., WILLIAMS, D., BURNETT, S., MORRISON, K. and MARTIN, S. 2013. User perceptions of relevance and its effect on retrieval in a smart textile archive. In Delany, S.J. and Ontañón, S. (eds.) Case-based reasoning research and development: proceedings of the 21st International conference on case-based reasoning (ICCBR 2013), 8-11 July 2013, Saratoga Springs, USA. Lecture notes in computer science, 7969. Berlin: Springer [online], pages 149-163. Available from: https://doi.org/10.1007/978-3-642-39056-2_11

The digitisation of physical textiles archives is an important process for the Scottish textiles industry. This transformation creates an easy access point to a wide breadth of knowledge, which can be used to understand historical context and inspire... Read More about User perceptions of relevance and its effect on retrieval in a smart textile archive..

Investigation into the personal epistemology of computer science students. (2013)
Conference Proceeding
MCDERMOTT, R., PIRIE, I., CAJANDER, A., DANIELS, M. and LAXER, C. 2013. Investigation into the personal epistemology of computer science students. In Proceedings of the 18th Association for Computing Machinery (ACM) Innovation and technology in computer science education conference (ITiCSE 2013), 1-3 July 2013, Canterbury, UK. New York: ACM [online], pages 231-236. Available from: https://doi.org/10.1145/2462476.2465589

In this paper, we investigate the personal epistemology of computing students, that is, their conceptions of knowledge and learning. We review some models of personal epistemological development and describe one of the questionnaire tools that have b... Read More about Investigation into the personal epistemology of computer science students..

Guidelines for integrating personas into software engineering tools. (2013)
Conference Proceeding
FAILY, S. and LYLE, J. 2013. Guidelines for integrating personas into software engineering tools. In Proceedings of the 5th ACM SIGCHI symposium on engineering interactive computing systems (EICS 2013), 24-27 June 2013, London, UK. New York: ACM [online], pages 69-74. Available from: https://doi.org/10.1145/2494603.2480318

Personas have attracted the interest of many in the usability and software engineering communities. To date, however, there has been little work illustrating how personas can be integrated into software tools to support these engineering activities.... Read More about Guidelines for integrating personas into software engineering tools..

Artificial chemistry approach to exploring search spaces using artificial reaction network agents. (2013)
Conference Proceeding
GERRARD, C.E., MCCALL, J., MACLEOD, C. and COGHILL, G.M. 2013. Artificial chemistry approach to exploring search spaces using artificial reaction network agents. In Proceedings of the 2013 IEEE congress on evolutionary computation (CEC 2013), 20-23 June 2013, Cancun, Mexico. New York: IEEE [online], article number 6557702, pages 1201-1208. Available from: https://doi.org/10.1109/CEC.2013.6557702

The Artificial Reaction Network (ARN) is a cell signaling network inspired representation belonging to the branch of A-Life known as Artificial Chemistry. It has properties in common with both AI and Systems Biology techniques including Artificial Ne... Read More about Artificial chemistry approach to exploring search spaces using artificial reaction network agents..

Designing interactive secure systems: CHI 2013 special interest group. (2013)
Conference Proceeding
FAILY, S., COLES-KEMP, L., DUNPHY, P., JUST, M., AKAMA, Y. and DE LUCA, A. 2013. Designing interactive secure systems: CHI 2013 special interest group. In Baudisch, P., Beaudouin-Lafon, M. and Mackay, W.E. (eds.) Extended abstracts from the 31st Annual CHI conference on human factors in computing systems (CHI 2013): changing perspectives, 27 April - 2 May 2013, Paris, France. New York: ACM [online], volume 3, pages 2469-2472. Available from: https://doi.org/10.1145/2468356.2468807

Despite a growing interest in the design and engineering of interactive secure systems, there is also a noticeable amount of fragmentation. This has led to a lack of awareness about what research is currently being carried out, and misunderstandings... Read More about Designing interactive secure systems: CHI 2013 special interest group..

Extending the web to support personal network services. (2013)
Conference Proceeding
LYLE, J., NILSSON, C., ISBERG, A. and FAILY, S. 2013. Extending the web to support personal network services. In Proceedings of the 28th Annual ACM symposium on applied computing (SAC 2013), 18-22 March 2013, Coimbra, Portugal. New York: ACM [online], volume 1, pages 711-716. Available from: https://doi.org/10.1145/2480362.2480499

Web browsers are able to access resources hosted anywhere in the world, yet content and features on personal devices remain largely inaccessible. Because of routing, addressing and security issues, web applications are unable to use local sensors, ca... Read More about Extending the web to support personal network services..

Dynamic agent prioritisation with penalties in distributed local search. (2013)
Conference Proceeding
SAMBO-MAGAJI, A., ARANA, I. and AHRIZ, H. 2013. Dynamic agent prioritisation with penalties in distributed local search. In Filipe, J. and Fred, A. (eds.) Proceedings of the 5th International conference on agents and artificial intelligence (ICAART 2013), 15-18 February 2013, Barcelona, Spain. Setúbal: Science and Technology Publications [online], volume 1, pages 276-281. Available from: https://doi.org/10.5220/0004259202760281

Distributed Constraint Satisfaction Problems (DisCSPs) solving techniques solve problems which are distributed over a number of agents.The distribution of the problem is required due to privacy, security or cost issues and, therefore centralised prob... Read More about Dynamic agent prioritisation with penalties in distributed local search..

On the design and development of webinos: a distributed mobile application middleware. (2012)
Conference Proceeding
LYLE, J., FAILY, S., FLÉCHAIS, I., PAUL, A., GÖKER, A., MYRHAUG, H., DESRUELLE, H. and MARTIN, A. 2012. On the design and development of webinos: a distributed mobile application middleware. In Göschka, K.M. and Haridi, S. (eds.) Distributed applications and interoperable systems: proceedings of the 12th International Federation for Information Processing (IFIP) Working Group 6.1 international conference on distributed applications and interoperable systems (DAIS 2012), 13-16 June 2012, Stockholm, Sweden. Lecture notes in computer science, 7272. Heidelberg: Springer [online], pages 140-147. Available from: https://doi.org/10.1007/978-3-642-30823-9_12

As personal devices become smarter, opportunities arise for sharing services, applications and data between them. While web technologies hold the promise of being a unifying layer, browsers lack functionality for supporting inter-device communication... Read More about On the design and development of webinos: a distributed mobile application middleware..

Requirements sensemaking using concept maps. (2012)
Conference Proceeding
FAILY, S., LYLE, J., PAUL, A., ATZENI, A., BLOMME, D., DESRUELLE, H. and BANGALORE, K. 2012. Requirements sensemaking using concept maps. In Winckler, M., Forbrig, P. and Bernhaupt, R. (eds.) Human-centered software engineering: proceedings of the 4th International conference on human-centered software engineering (HCSE 2012), 29-31 October 2012, Toulouse, France. Lecture notes in computer science, 7623. Heidelberg: Springer [online], pages 217-232. Available from: https://doi.org/10.1007/978-3-642-34347-6_13

Requirements play an important role in software engineering, but their perceived usefulness means that they often fail to be properly maintained. Traceability is often considered a means for motivating and maintaining requirements, but this is diffic... Read More about Requirements sensemaking using concept maps..

Adaptive dynamic control of quadrupedal robotic gaits with artificial reaction networks. (2012)
Conference Proceeding
GERRARD, C.E., MCCALL, J., COGHILL, G.M. and MACLEOD, C. 2012. Adaptive dynamic control of quadrupedal robotic gaits with artificial reaction networks. In Huang, T., Zeng, Z., Li, C. and Leung, C.S. (eds.) Proceedings of the 19th International conference on neural information processing (ICONIP 2012), 12-15 November 2012, Doha, Qatar. Lecture notes in computer science, 7663. Berlin: Springer [online], part I, pages 280-287. Available from: https://doi.org/10.1007/978-3-642-34475-6_34

The Artificial Reaction Network (ARN) is a bio-inspired connectionist paradigm based on the emerging field of Cellular Intelligence. It has properties in common with both AI and Systems Biology techniques including Artificial Neural Networks, Petri N... Read More about Adaptive dynamic control of quadrupedal robotic gaits with artificial reaction networks..

Improving bag-of-visual-words model with spatial-temporal correlation for video retrieval. (2012)
Conference Proceeding
WANG, L., SONG, D. and ELYAN, E. 2012. Improving bag-of-visual-words model with spatial-temporal correlation for video retrieval. In Proceedings of the 21st Association for Computing Machinery (ACM) international conference on information and knowledge management (CIKM'12), 29 October - 2 November 2012, Maui, USA. New York: ACM [online], pages 1303-1312. Available from: https://doi.org/10.1145/2396761.2398433

Most of the state-of-art approaches to Query-by-Example (QBE) video retrieval are based on the Bag-of-visual-Words (BovW) representation of visual content. It, however, ignores the spatial-temporal information, which is important for similarity measu... Read More about Improving bag-of-visual-words model with spatial-temporal correlation for video retrieval..

Two-part segmentation of text documents. (2012)
Conference Proceeding
DEEPAK, P., VISWESWARIAH, K., WIRATUNGA, N. and SANI, S. 2012. Two-part segmentation of text documents. In Proceedings of the 21st Association for Computing Machinery (ACM) International conference on information and knowledge management (CIKM'12), 29 October - 02 November 2012, Maui, USA. New York: ACM [online], pages 793-802. Available from: https://dx.doi.org/10.1145/2396761.2396862

We consider the problem of segmenting text documents that have a two-part structure such as a problem part and a solution part. Documents of this genre include incident reports that typically involve description of events relating to a problem follow... Read More about Two-part segmentation of text documents..

Categorizing how students use collaborative technologies in a globally distributed project. (2012)
Conference Proceeding
CAJANDER, A., DANIELS, M., CULLHED, M., CLEAR, T., MCDERMOTT, R. and LAXER, C. 2012. Categorizing how students use collaborative technologies in a globally distributed project. In Proceedings of the 2012 Frontiers in education conference (FIE 2012): soaring to new heights in engineering education, 3-6 October 2012, Seattle, USA. Piscataway, NJ: IEEE [online], article number 6462411. Available from: https://doi.org/10.1109/FIE.2012.6462411

Possibilities for collaboration in globally distributed projects have radically changed with the introduction of new Collaborative Technologies (CTs) in the Web 2.0 era. The use of such technologies in the context of students collaborating in a globa... Read More about Categorizing how students use collaborative technologies in a globally distributed project..

Student reflections on collaborative technology in a globally distributed student project. (2012)
Conference Proceeding
MCDERMOTT, R., DANIELS, M., CAJANDER, A., CULLHED, M., CLEAR, T. and LAXER, C. 2012. Student reflections on collaborative technology in a globally distributed student project. In Proceedings of the 2012 Frontiers in education conference (FIE 2012): soaring to new heights in engineering education, 3-6 October 2012, Seattle, USA. Piscataway, NJ: IEEE [online], article number 6462410. Available from: https://doi.org/10.1109/FIE.2012.6462410

Collaborative Technology (CT) plays an important role in overcoming the challenges of globally distributed projects. It enables collaboration, but the specific choice of technology also imposes constraints on how projects are conducted. Over the past... Read More about Student reflections on collaborative technology in a globally distributed student project..

Model-driven architectural risk analysis using architectural and contextualised attack patterns. (2012)
Conference Proceeding
FAILY, S., LYLE, J., NAMILUKO, C., ATZENI, A. and CAMERONI, C. 2012. Model-driven architectural risk analysis using architectural and contextualised attack patterns. In Proceedings of the 1st Model-driven security workshop (MDsec 2012), co-located with the 15th International conference on model-driven engineering languages and systems (MoDELS 2012), 1-5 October 2012, Innsbruck, Austria. New York: ACM [online], article number 3. Available from: https://doi.org/10.1145/2422498.2422501

A secure system architecture is often based on a variety of design and security model elements. Without some way of evaluating the impact of these individual design elements in the face of possible attacks, design flaws may weaken a software architec... Read More about Model-driven architectural risk analysis using architectural and contextualised attack patterns..

Temporal patterns in artificial reaction networks. (2012)
Conference Proceeding
GERRARD, C., MCCALL, J., COGHILL, G.M. and MACLEOD, C. 2012. Temporal patterns in artificial reaction networks. In Villa, A.E.P., Duch, W., Érdi, P., Masulli, F. and Palm, G. (eds.) Artificial neural networks and machine learning: proceedings of the 22nd International conference on artificial neural networks (ICANN 2012), 11-14 September 2012, Lausanne, Switzerland. Lecture notes in computer science, 7552. Berlin: Springer [online], part I, pages 1-8. Available from: https://doi.org/10.1007/978-3-642-33269-2_1

The Artificial Reaction Network (ARN) is a bio-inspired connectionist paradigm based on the emerging field of Cellular Intelligence. It has properties in common with both AI and Systems Biology techniques including Artificial Neural Networks, Petri N... Read More about Temporal patterns in artificial reaction networks..