Skip to main content

Research Repository

Advanced Search

All Outputs (10)

Multiple case study approach to identify aggravating variables of insider threats in information systems. (2014)
Journal Article
NICHO, M. and KAMOUN, F. 2014. Multiple case study approach to identify aggravating variables of insider threats in information systems. Communications of the association for information systems [online], 35, Article 18. Available from: http://aisel.aisnet.org/cais/vol35/iss1/18

Malicious insiders present a serious threat to information systems due to privilege of access, knowledge of internal computer resources, and potential threats on the part of disgruntled employees or insiders collaborating with external cybercriminals... Read More about Multiple case study approach to identify aggravating variables of insider threats in information systems..

Fast and efficient palmprint identification of a small sample within a full image. (2014)
Journal Article
MORENO-GARCIA, C.F. and SERRATOSA, F. 2014. Fast and efficient palmprint identification of a small sample within a full image. Computación y sistemas [online], 18(4), pages 683-691. Available from: https://doi.org/10.13053/CyS-18-4-2059

In some fields like forensic research, experts demand that a found sample of an individual can be matched with its full counterpart contained in a database. The found sample may present several characteristics that make this matching more difficult t... Read More about Fast and efficient palmprint identification of a small sample within a full image..

Finding and resolving security misusability with misusability cases. (2014)
Journal Article
FAILY, S. and FLÉCHAIS, I. 2016. Finding and resolving security misusability with misusability cases. Requirements engineering [online], 21(2), pages 209-223. Available from: https://doi.org/10.1007/s00766-014-0217-8

Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa. One way of using scenarios to bridge security and usability involves explicitly descr... Read More about Finding and resolving security misusability with misusability cases..

Learning pseudo-tags to augment sparse tagging in hybrid music recommender systems. (2014)
Journal Article
HORSBURGH, B., CRAW, S. and MASSIE, S. 2015. Learning pseudo-tags to augment sparse tagging in hybrid music recommender systems. Artificial intelligence [online], 219, pages 25-39. Available from: https://doi.org/10.1016/j.artint.2014.11.004

Online recommender systems are an important tool that people use to find new music. To generate recommendations, many systems rely on tag representations of music. Such systems however suffer from tag sparsity, whereby tracks lack a strong tag repres... Read More about Learning pseudo-tags to augment sparse tagging in hybrid music recommender systems..

How product owner teams scale agile methods to large distributed enterprises. (2014)
Journal Article
BASS, J.M. 2015. How product owner teams scale agile methods to large distributed enterprises. Empirical software engineering [online], 20(6), pages 1525-1557. Available from: https://doi.org/10.1007/s10664-014-9322-z

Software development teams in large scale offshore enterprise development programmes are often under intense pressure to deliver high quality software within challenging time contraints. Project failures can attract adverse publicity and damage corpo... Read More about How product owner teams scale agile methods to large distributed enterprises..

Build-to-last: strength to weight 3D printed objects. (2014)
Journal Article
LU, L., SHARF, A., ZHAO, H., WEI, Y., FAN., Q., CHEN, X., SAVOYE, Y., TU, C., COHEN-OR, D. and CHEN, B. 2014. Build-to-last: strength to weight 3D printed objects. ACM transactions on graphics [online], 33(4), article No. 97. Available from: https://doi.org/10.1145/2601097.2601168

The emergence of low-cost 3D printers steers the investigation of new geometric problems that control the quality of the fabricated object. In this paper, we present a method to reduce the material cost and weight of a given object while providing a... Read More about Build-to-last: strength to weight 3D printed objects..

Do you feel like a hero yet? (2014)
Journal Article
HERON, M.J. and BELFORD, P.H. 2014. Do you feel like a hero yet? Externalized morality in video games. Journal of games criticism [online], 1(2). Available from: http://www.gamescriticism.org/articles/heronbelford-1-2

Video games have a long tradition of including elements of moral decision making within their ludic and narrative structures. While the success of these endeavours has been mixed, the systems used to express moral choices within a game have grown mor... Read More about Do you feel like a hero yet?.

Applications and design of cooperative multi-agent ARN-based systems. (2014)
Journal Article
GERRARD, C.E., MCCALL, J., MACLEOD, C. and COGHILL, G.M. 2015. Applications and design of cooperative multi-agent ARN-based systems. Soft computing [online], 19(6), pages 1581-1594. Available from: https://doi.org/10.1007/s00500-014-1330-9

The Artificial Reaction Network (ARN) is an Artificial Chemistry inspired by Cell Signalling Networks (CSNs). Its purpose is to represent chemical circuitry and to explore the computational properties responsible for generating emergent high-level be... Read More about Applications and design of cooperative multi-agent ARN-based systems..

DECMO2: a robust hybrid and adaptive multi-objective evolutionary algorithm. (2014)
Journal Article
ZAVOIANU, A.-C., LUGHOFER, E., BRAMERDORFER, G., AMRHEIN, W. and KLEMENT, E.P. 2015. DECMO2: a robust hybrid and adaptive multi-objective evolutionary algorithm. Soft computing [online], 19(12), pages 3551-3569. Available from: https://doi.org/10.1007/s00500-014-1308-7

We describe a hybrid and adaptive coevolutionary optimization method that can efficiently solve a wide range of multi-objective optimization problems (MOOPs) as it successfully combines positive traits from three main classes of multi-objective evolu... Read More about DECMO2: a robust hybrid and adaptive multi-objective evolutionary algorithm..

Cloud computing: adoption issues for sub-Saharan African SMEs. (2014)
Journal Article
DAHIRU, A. A., BASS, J. and ALLISON, I. 2014. Cloud computing: adoption issues for sub-Saharan African SMEs. Electronic journal of information systems in developing countries [online], 62(1), pages 1-17. Available from: https://doi.org/10.1002/j.1681-4835.2014.tb00439.x

This paper explores the emergence and adoption of cloud computing by small and medium-sized enterprises (SMEs) and points towards its implications for developing countries in sub-Saharan Africa. Several studies have shown the importance of technologi... Read More about Cloud computing: adoption issues for sub-Saharan African SMEs..