Skip to main content

Research Repository

Advanced Search

All Outputs (31)

A role allocation model for IT controls in a cloud environment. (2015)
Journal Article
KHAN, S., NICHO, M. and COOPER, G. 2015. A role allocation model for IT controls in a cloud environment. Review of business information systems [online], 19(1), pages 5-14. Available from: https://doi.org/10.19030/rbis.v19i1.9253

The rapid adoption of cloud computing by organizations, along with the need to comply with relevant IT governance (ITG) controls, has increased the complexity of governance in the cloud. This transition from a classical data center to a virtualized d... Read More about A role allocation model for IT controls in a cloud environment..

Correspondence consensus of two sets of correspondences through optimisation functions. (2015)
Journal Article
MORENO-GARCÍA, C.F. and SERRATOSA, F. 2017. Correspondence consensus of two sets of correspondences through optimisation functions. Pattern analysis and applications [online], 20(1), pages 201-213. Available from: https://doi.org/10.1007/s10044-015-0486-y

We present a consensus method which, given the two correspondences between sets of elements generated by separate entities, enounces a final correspondence consensus considering the existence of outliers. Our method is based on an optimisation techni... Read More about Correspondence consensus of two sets of correspondences through optimisation functions..

Context rank based hierarchical clustering algorithm on medical databases (CRBHCA). (2015)
Journal Article
BANO, S. and RAO, K.R. 2015. Context rank based hierarchical clustering algorithm on medical databases (CRBHCA). Journal of theoretical and applied information technology [online], 75(2), pages 199-211. Available from: https://www.jatit.org/volumes/Vol75No2/10Vol75No2.pdf

In this paper we propose a method that aims to reduce processing overheads by avoiding the need to choose between natural language processing tools such as part-of-speech taggers and parsers. Moreover, we suggest a structure for the immediate creatio... Read More about Context rank based hierarchical clustering algorithm on medical databases (CRBHCA)..

Early fusion and query modification in their dual late fusion forms. (2015)
Journal Article
KALICIAK, L., MYRHAUG, H., GOKER, A. and SONG, D. 2015. Early fusion and query modification in their dual late fusion forms. Journal of advances in information fusion [online], 10(2), pages 183-198. Available from: http://isif.org/journal/10/2/1557-6418

In this paper, we prove that specific widely used models in Content-based Image Retrieval for information fusion are interchangeable. In addition, we show that even advanced, non-standard fusion strategies can be represented in dual forms. These mode... Read More about Early fusion and query modification in their dual late fusion forms..

An analysis of age, technology usage, and cognitive characteristics within information retrieval tasks. (2015)
Journal Article
CRABB, M. and HANSON, V.L. 2016. An analysis of age, technology usage, and cognitive characteristics within information retrieval tasks. ACM transactions on accessible computing (TACCESS) [online], 8(3): papers from the proceedings of the 16th International Association of Computing Machinery Special Interest Group on Accessibility (ACM SIGACCESS) conference on computers and accessibility (ASSETS 2014), 20-22 October 2014, Rochester, USA, article number 10. Available from: https://doi.org/10.1145/2856046

This work presents two studies that aim to discover whether age can be used as a suitable metric for distinguishing performance between individuals or if other factors can provide greater insight. Information retrieval tasks are used to test the perf... Read More about An analysis of age, technology usage, and cognitive characteristics within information retrieval tasks..

Breaking the communication barrier: guidelines to aid communication within pair programming. (2015)
Journal Article
ZARB, M. and HUGHES, J. 2015. Breaking the communication barrier: guidelines to aid communication within pair programming. Computer science education [online], 25(2), pages 120-151. Available from: https://doi.org/10.1080/08993408.2015.1033125

Pair programming is a software development technique with many cited benefits in learning and teaching. However, it is reported that novice programmers find several barriers to pairing up, typically due to the added communication that is required of... Read More about Breaking the communication barrier: guidelines to aid communication within pair programming..

On the relationship between variational level set-based and SOM-based active contours. (2015)
Journal Article
ABDELSAMEA, M.M., GNECCO, G., GABER, M.M. and ELYAN, E. 2015. On the relationship between variational level set-based and SOM-based active contours. Computational intelligence and neuroscience [online], 2015, article ID 109029. Available from:https://doi.org/10.1155/2015/109029

Most Active Contour Models (ACMs) deal with the image segmentation problem as a functional optimization problem, as they work on dividing an image into several regions by optimizing a suitable functional. Among ACMs, variational level set methods hav... Read More about On the relationship between variational level set-based and SOM-based active contours..

Guest editorial preface: special issue on Evolving security and privacy requirements engineering (ESPRE'14) 2014, Sweden. (2015)
Journal Article
BECKERS, K., FAILY, S., LEE, S.-W. and MEAD, N. 2015. Guest editorial preface: special issue on Evolving security and privacy requirements engineering (ESPRE'14) 2014, Sweden. International journal of secure software engineering [online], 6(1), pages iv-vii. Available from: https://bit.ly/3pGkcZD

At the Evolving Security and Privacy Requirements Engineering (ESPRE) workshop, practitioners and researchers interested in security and privacy requirements gather to discuss significant issues in the field. In particular, ESPRE participants probe t... Read More about Guest editorial preface: special issue on Evolving security and privacy requirements engineering (ESPRE'14) 2014, Sweden..

The Internet of Things: the future or the end of mechatronics. (2015)
Journal Article
BRADLEY, D., RUSSELL, D., FERGUSON, I., ISAACS, J., MACLEOD, A. and WHITE, R. 2015. The Internet of Things: the future or the end of mechatronics. Mechatronics [online], 27, pages 57-74. Available from: https://doi.org/10.1016/j.mechatronics.2015.02.005

The advent and increasing implementation of user configured and user oriented systems structured around the use of cloud configured information and the Internet of Things is presenting a new range and class of challenges to the underlying concepts of... Read More about The Internet of Things: the future or the end of mechatronics..

Integer linear programming for the Bayesian network structure learning problem. (2015)
Journal Article
BARTLETT, M. and CUSSENS, J. 2017. Integer linear programming for the Bayesian network structure learning problem. Artificial intelligence [online], 244, pages 258-271. Available from: https://doi.org/10.1016/j.artint.2015.03.003

Bayesian networks are a commonly used method of representing conditional probability relationships between a set of variables in the form of a directed acyclic graph (DAG). Determination of the DAG which best explains observed data is an NP-hard prob... Read More about Integer linear programming for the Bayesian network structure learning problem..

All of your co-workers are gone: story, substance, and the empathic puzzler. (2015)
Journal Article
HERON, M.J. and BELFORD, P.H. 2015. All of your co-workers are gone: story, substance, and the empathic puzzler. Journal of games criticism [online], 2(1). Available at: http://www.gamescriticism.org/articles/heronbelford-2-1

Narrative games such as The Walking Dead, Gone Home, Dear Esther and The Stanley Parable are difficult to situate into the general framework of game genres that are popularly, albeit informally, understood by mainstream audiences. They are too unabas... Read More about All of your co-workers are gone: story, substance, and the empathic puzzler..