Skip to main content

Research Repository

Advanced Search

All Outputs (1084)

Automated inferential measurement system for traffic surveillance: enhancing situation awareness of UAVs by computational intelligence. (2014)
Conference Proceeding
RATTADILOK, P. and PETROVSKI, A. 2014. Automated inferential measurement system for traffic surveillance: enhancing situation awareness of UAVs by computational intelligence. In Proceedings of the 2014 IEEE symposium on computational intelligence in control and automation (CICA 2014), part of the 2014 IEEE symposium series on computational intelligence (SSCI 2014), 9-12 December 2014, Orlando, USA. New York: IEEE [online], article number 7013256, pages 229-236. Available from: https://doi.org/10.1109/CICA.2014.7013256

An adaptive inferential measurement framework for control and automation systems has been proposed in the paper and tested on simulated traffic surveillance data. The use of the framework enables making inferences related to the presence of anomalies... Read More about Automated inferential measurement system for traffic surveillance: enhancing situation awareness of UAVs by computational intelligence..

Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence. (2014)
Conference Proceeding
RATTADILOK, P. and PETROVSKI, A. 2014. Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence. In Proceedings of the 2014 IEEE symposium on evolving and autonomous learning systems (EALS 2014), part of the 2014 IEEE symposium series on computational intelligence (SSCI 2014), 9-12 December 2014, Orlando, USA. New York: IEEE [online], article number 7009508, pages 87-94. Available from: https://doi.org/10.1109/EALS.2014.7009508

A generic framework for evolving and autonomously controlled systems has been developed and evaluated in this paper. A three-phase approach aimed at identification, classification of anomalous data and at prediction of its consequences is applied to... Read More about Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence..

Finding and resolving security misusability with misusability cases. (2014)
Journal Article
FAILY, S. and FLÉCHAIS, I. 2016. Finding and resolving security misusability with misusability cases. Requirements engineering [online], 21(2), pages 209-223. Available from: https://doi.org/10.1007/s00766-014-0217-8

Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa. One way of using scenarios to bridge security and usability involves explicitly descr... Read More about Finding and resolving security misusability with misusability cases..

Backchannel chat: peaks and troughs in a Twitter response to three televised debates during the Scottish Independence Referendum campaign 2014. (2014)
Working Paper
PEDERSEN, S., BAXTER, G., BURNETT, S., GOKER, A., CORNEY, D., and MARTIN, C. 2014. Backchannel chat: peaks and troughs in a Twitter response to three televised debates during the Scottish Independence Referendum campaign 2014. Aberdeen Business School working paper series, 7(2).

Social-networking services such as Twitter offer users the potential to participate in public debate. When used whilst watching a television programme, Twitter allows backchannel discussion and debate in real time, which can add a new dimension and p... Read More about Backchannel chat: peaks and troughs in a Twitter response to three televised debates during the Scottish Independence Referendum campaign 2014..

Learning pseudo-tags to augment sparse tagging in hybrid music recommender systems. (2014)
Journal Article
HORSBURGH, B., CRAW, S. and MASSIE, S. 2015. Learning pseudo-tags to augment sparse tagging in hybrid music recommender systems. Artificial intelligence [online], 219, pages 25-39. Available from: https://doi.org/10.1016/j.artint.2014.11.004

Online recommender systems are an important tool that people use to find new music. To generate recommendations, many systems rely on tag representations of music. Such systems however suffer from tag sparsity, whereby tracks lack a strong tag repres... Read More about Learning pseudo-tags to augment sparse tagging in hybrid music recommender systems..

Eliciting and visualising trust expectations using persona trust characteristics and goal models. (2014)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2014. Eliciting and visualising trust expectations using persona trust characteristics and goal models. In Lanubile, F. and Ali, R. (eds.) Proceedings of the 6th International workshop on social software engineering (SSE 2014), 17 November 2014, Hong Kong, China. New York: ACM [online], pages 17-24. Available from: https://doi.org/10.1145/2661685.2661690

Developers and users rely on trust to simplify complexity when building and using software. Unfortunately, the invisibility of trust and the richness of a system's context of use means that factors influencing trust are difficult to see, and assessin... Read More about Eliciting and visualising trust expectations using persona trust characteristics and goal models..

What is the influence of genre during the perception of structured text for retrieval and search? (2014)
Thesis
CLARK, M.J. 2014. What is the influence of genre during the perception of structured text for retrieval and search? Robert Gordon University, PhD thesis.

This thesis presents an investigation into the high value of structured text (or form) in the context of genre within Information Retrieval. In particular, how are these structured texts perceived and why are they not more heavily used within Informa... Read More about What is the influence of genre during the perception of structured text for retrieval and search?.

Age, technology usage, and cognitive characteristics in relation to perceived disorientation and reported website ease of use. (2014)
Conference Proceeding
CRABB, M. and HANSON, V.L. 2014. Age, technology usage, and cognitive characteristics in relation to perceived disorientation and reported website ease of use. In Proceedings of the 16th International Association for Computing Machinery (ACM) Special Interest Group on Accessible computing (SIGACCESS) conference on computers and accessibility (ASSETS '14), 20-22 October 2014, Rochester, USA. New York: ACM [online], pages 193-200. Available from: https://doi.org/10.1145/2661334.2661356

Comparative studies including older and younger adults are becoming more common in HCI, generally used to compare how these two different age groups will approach a task. However, it is unclear whether user 'age' is the underlying factor that differe... Read More about Age, technology usage, and cognitive characteristics in relation to perceived disorientation and reported website ease of use..

The learner experience of student-led international group project work in software engineering. (2014)
Conference Proceeding
MCDERMOTT, R., BASS, J. and LALCHANDANI, J.P. 2014. The learner experience of student-led international group project work in software engineering. In Proceedings of the 2014 Frontiers in education conference (FIE 2014): opening innovations and internationalization in engineering education, 22-25 October 2014, Madrid, Spain. Piscataway: IEEE [online], article number 7044181. Available from: https://doi.org/10.1109/FIE.2014.7044181

Software development has become increasingly globalized because of technological innovation, the evolution of work and business processes, as well as prevailing educational systems and national policies [1]. This paper addresses the challenges faced... Read More about The learner experience of student-led international group project work in software engineering..

Subject-level quality assurance in computing: experiences from three national perspectives. (2014)
Conference Proceeding
MCDERMOTT, R., DANIELS, M. and LARUSDOTTIR, M. 2014. Subject-level quality assurance in computing: experiences from three national perspectives. In Proceedings of the 2014 Frontiers in education conference (FIE 2014): opening innovations and internationalization in engineering education, 22-25 October 2014, Madrid, Spain. Piscataway: IEEE [online], article number 7044182. Available from: https://doi.org/10.1109/FIE.2014.7044182

This paper examines some aspects of the Quality Assurance processes in Computing departments in three European universities. We first examine the operation of a quality assurance activity in the School of Computer Science in Iceland. The next case is... Read More about Subject-level quality assurance in computing: experiences from three national perspectives..

Critical thinking, peer-writing, and the importance of feedback. (2014)
Conference Proceeding
CAJANDER, A., DANIELS, M., PETERS, A.-K. and MCDERMOTT, R. 2014. Critical thinking, peer-writing, and the importance of feedback. In Proceedings of the 2014 Frontiers in education conference (FIE 2014): opening innovations and internationalization in engineering education, 22-25 October 2014, Madrid, Spain. Piscataway: IEEE [online], article number 7044234. Available from: https://doi.org/10.1109/FIE.2014.7044234

Critical thinking is one of the key competencies listed by OECD (Organisation for Economic Co-operation and Development) [1], a central European Community organization, and is also mentioned as a learning outcome for higher education by international... Read More about Critical thinking, peer-writing, and the importance of feedback..

Authorisation in context: incorporating context-sensitivity into an access control framework. (2014)
Conference Proceeding
FAILY, S., LYLE, J., FLÉCHAIS, I., ATZENI, A., CAMERONI, C., MYRHAUG, H., GÖKER, A. and KLEINFELD, R. 2014. Authorisation in context: incorporating context-sensitivity into an access control framework. In Proceedings of the 28th International BCS human computer interaction conference (HCI 2014): sand, sea and sky: holiday HCI, 9-12 September 2014, Southport, UK. Swindon: BCS, pages 189-194. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/hci2014.29

With sensitive information about ourselves now distributed across personal devices, people need to make access control decisions for different contexts of use. However, despite advances in improving the usability of access control for both developers... Read More about Authorisation in context: incorporating context-sensitivity into an access control framework..

Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014). (2014)
Conference Proceeding
BECKERS, K., FAILY, S., LEE, S.-W. and MEAD, N. (eds.) 2014. Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014), co-located with the 22nd IEEE international requirements engineering conference (RE 2014), 25 August 2014, Karlskrona, Sweden. Piscataway: IEEE [online]. Available from: https://ieeexplore.ieee.org/xpl/conhome/6883269/proceeding

The main focus of ESPRE is to bring together practitioners and researchers interested in security and privacy requirements. ESPRE probes the interfaces between requirements engineering, security and privacy, and takes the first step in evolving secur... Read More about Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014)..

Scrum master activities: process tailoring in large enterprise projects. (2014)
Conference Proceeding
BASS, J.M. 2014. Scrum master activities: process tailoring in large enterprise projects. In Proceedings of the 9th IEEE international conference on global software engineering (ICGSE 2014), 18-21 August 2014, Shanghai, China. Los Alamitos: IEEE Computer Society [online], article number 6915249, pages 6-15. Available from: https://doi.org/10.1109/ICGSE.2014.24

This paper explores practitioner descriptions of agile method tailoring in large-scale offshore or outsourced enterprise projects. Specifically, tailoring of the scrum master role is investigated. The scrum master acts as a facilitator for software d... Read More about Scrum master activities: process tailoring in large enterprise projects..

Computational aspects of cellular intelligence and their role in artificial intelligence. (2014)
Thesis
GERRARD, C.E. 2014. Computational aspects of cellular intelligence and their role in artificial intelligence. Robert Gordon University, PhD thesis.

The work presented in this thesis is concerned with an exploration of the computational aspects of the primitive intelligence associated with single-celled organisms. The main aim is to explore this Cellular Intelligence and its role within Artificia... Read More about Computational aspects of cellular intelligence and their role in artificial intelligence..

How product owner teams scale agile methods to large distributed enterprises. (2014)
Journal Article
BASS, J.M. 2015. How product owner teams scale agile methods to large distributed enterprises. Empirical software engineering [online], 20(6), pages 1525-1557. Available from: https://doi.org/10.1007/s10664-014-9322-z

Software development teams in large scale offshore enterprise development programmes are often under intense pressure to deliver high quality software within challenging time contraints. Project failures can attract adverse publicity and damage corpo... Read More about How product owner teams scale agile methods to large distributed enterprises..

Build-to-last: strength to weight 3D printed objects. (2014)
Journal Article
LU, L., SHARF, A., ZHAO, H., WEI, Y., FAN., Q., CHEN, X., SAVOYE, Y., TU, C., COHEN-OR, D. and CHEN, B. 2014. Build-to-last: strength to weight 3D printed objects. ACM transactions on graphics [online], 33(4), article No. 97. Available from: https://doi.org/10.1145/2601097.2601168

The emergence of low-cost 3D printers steers the investigation of new geometric problems that control the quality of the fabricated object. In this paper, we present a method to reduce the material cost and weight of a given object while providing a... Read More about Build-to-last: strength to weight 3D printed objects..

Minimal walsh structure and ordinal linkage of monotonicity-invariant function classes on bit strings. (2014)
Conference Proceeding
CHRISTIE, L.A., MCCALL, J.A.W. and LONIE, D.P. 2014. Minimal walsh structure and ordinal linkage of monotonicity-invariant function classes on bit strings. In Igel, C. (ed.) Proceedings of the 2014 Genetic and evolutionary computation conference (GECCO 2014): a recombination of the 23rd International conference on genetic algorithms (ICGA-2014), and the 19th Annual genetic programming conference (GP-2014), 12-16 July 2014, Vancouver, Canada. New York: ACM [online], pages 333-340. Available from: https://doi.org/10.1145/2576768.2598240

Problem structure, or linkage, refers to the interaction between variables in a black-box fitness function. Discovering structure is a feature of a range of algorithms, including estimation of distribution algorithms (EDAs) and perturbation methods (... Read More about Minimal walsh structure and ordinal linkage of monotonicity-invariant function classes on bit strings..

Do you feel like a hero yet? (2014)
Journal Article
HERON, M.J. and BELFORD, P.H. 2014. Do you feel like a hero yet? Externalized morality in video games. Journal of games criticism [online], 1(2). Available from: http://www.gamescriticism.org/articles/heronbelford-1-2

Video games have a long tradition of including elements of moral decision making within their ludic and narrative structures. While the success of these endeavours has been mixed, the systems used to express moral choices within a game have grown mor... Read More about Do you feel like a hero yet?.