Skip to main content

Research Repository

Advanced Search

All Outputs (1096)

The learner experience of student-led international group project work in software engineering. (2014)
Conference Proceeding
MCDERMOTT, R., BASS, J. and LALCHANDANI, J.P. 2014. The learner experience of student-led international group project work in software engineering. In Proceedings of the 2014 Frontiers in education conference (FIE 2014): opening innovations and internationalization in engineering education, 22-25 October 2014, Madrid, Spain. Piscataway: IEEE [online], article number 7044181. Available from: https://doi.org/10.1109/FIE.2014.7044181

Software development has become increasingly globalized because of technological innovation, the evolution of work and business processes, as well as prevailing educational systems and national policies [1]. This paper addresses the challenges faced... Read More about The learner experience of student-led international group project work in software engineering..

Subject-level quality assurance in computing: experiences from three national perspectives. (2014)
Conference Proceeding
MCDERMOTT, R., DANIELS, M. and LARUSDOTTIR, M. 2014. Subject-level quality assurance in computing: experiences from three national perspectives. In Proceedings of the 2014 Frontiers in education conference (FIE 2014): opening innovations and internationalization in engineering education, 22-25 October 2014, Madrid, Spain. Piscataway: IEEE [online], article number 7044182. Available from: https://doi.org/10.1109/FIE.2014.7044182

This paper examines some aspects of the Quality Assurance processes in Computing departments in three European universities. We first examine the operation of a quality assurance activity in the School of Computer Science in Iceland. The next case is... Read More about Subject-level quality assurance in computing: experiences from three national perspectives..

Critical thinking, peer-writing, and the importance of feedback. (2014)
Conference Proceeding
CAJANDER, A., DANIELS, M., PETERS, A.-K. and MCDERMOTT, R. 2014. Critical thinking, peer-writing, and the importance of feedback. In Proceedings of the 2014 Frontiers in education conference (FIE 2014): opening innovations and internationalization in engineering education, 22-25 October 2014, Madrid, Spain. Piscataway: IEEE [online], article number 7044234. Available from: https://doi.org/10.1109/FIE.2014.7044234

Critical thinking is one of the key competencies listed by OECD (Organisation for Economic Co-operation and Development) [1], a central European Community organization, and is also mentioned as a learning outcome for higher education by international... Read More about Critical thinking, peer-writing, and the importance of feedback..

Authorisation in context: incorporating context-sensitivity into an access control framework. (2014)
Conference Proceeding
FAILY, S., LYLE, J., FLÉCHAIS, I., ATZENI, A., CAMERONI, C., MYRHAUG, H., GÖKER, A. and KLEINFELD, R. 2014. Authorisation in context: incorporating context-sensitivity into an access control framework. In Proceedings of the 28th International BCS human computer interaction conference (HCI 2014): sand, sea and sky: holiday HCI, 9-12 September 2014, Southport, UK. Swindon: BCS, pages 189-194. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/hci2014.29

With sensitive information about ourselves now distributed across personal devices, people need to make access control decisions for different contexts of use. However, despite advances in improving the usability of access control for both developers... Read More about Authorisation in context: incorporating context-sensitivity into an access control framework..

Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014). (2014)
Conference Proceeding
BECKERS, K., FAILY, S., LEE, S.-W. and MEAD, N. (eds.) 2014. Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014), co-located with the 22nd IEEE international requirements engineering conference (RE 2014), 25 August 2014, Karlskrona, Sweden. Piscataway: IEEE [online]. Available from: https://ieeexplore.ieee.org/xpl/conhome/6883269/proceeding

The main focus of ESPRE is to bring together practitioners and researchers interested in security and privacy requirements. ESPRE probes the interfaces between requirements engineering, security and privacy, and takes the first step in evolving secur... Read More about Proceedings of the 1st IEEE international workshop on evolving security and privacy requirements engineering (ESPRE 2014)..

Scrum master activities: process tailoring in large enterprise projects. (2014)
Conference Proceeding
BASS, J.M. 2014. Scrum master activities: process tailoring in large enterprise projects. In Proceedings of the 9th IEEE international conference on global software engineering (ICGSE 2014), 18-21 August 2014, Shanghai, China. Los Alamitos: IEEE Computer Society [online], article number 6915249, pages 6-15. Available from: https://doi.org/10.1109/ICGSE.2014.24

This paper explores practitioner descriptions of agile method tailoring in large-scale offshore or outsourced enterprise projects. Specifically, tailoring of the scrum master role is investigated. The scrum master acts as a facilitator for software d... Read More about Scrum master activities: process tailoring in large enterprise projects..

Computational aspects of cellular intelligence and their role in artificial intelligence. (2014)
Thesis
GERRARD, C.E. 2014. Computational aspects of cellular intelligence and their role in artificial intelligence. Robert Gordon University, PhD thesis.

The work presented in this thesis is concerned with an exploration of the computational aspects of the primitive intelligence associated with single-celled organisms. The main aim is to explore this Cellular Intelligence and its role within Artificia... Read More about Computational aspects of cellular intelligence and their role in artificial intelligence..

How product owner teams scale agile methods to large distributed enterprises. (2014)
Journal Article
BASS, J.M. 2015. How product owner teams scale agile methods to large distributed enterprises. Empirical software engineering [online], 20(6), pages 1525-1557. Available from: https://doi.org/10.1007/s10664-014-9322-z

Software development teams in large scale offshore enterprise development programmes are often under intense pressure to deliver high quality software within challenging time contraints. Project failures can attract adverse publicity and damage corpo... Read More about How product owner teams scale agile methods to large distributed enterprises..

Build-to-last: strength to weight 3D printed objects. (2014)
Journal Article
LU, L., SHARF, A., ZHAO, H., WEI, Y., FAN., Q., CHEN, X., SAVOYE, Y., TU, C., COHEN-OR, D. and CHEN, B. 2014. Build-to-last: strength to weight 3D printed objects. ACM transactions on graphics [online], 33(4), article No. 97. Available from: https://doi.org/10.1145/2601097.2601168

The emergence of low-cost 3D printers steers the investigation of new geometric problems that control the quality of the fabricated object. In this paper, we present a method to reduce the material cost and weight of a given object while providing a... Read More about Build-to-last: strength to weight 3D printed objects..

Minimal walsh structure and ordinal linkage of monotonicity-invariant function classes on bit strings. (2014)
Conference Proceeding
CHRISTIE, L.A., MCCALL, J.A.W. and LONIE, D.P. 2014. Minimal walsh structure and ordinal linkage of monotonicity-invariant function classes on bit strings. In Igel, C. (ed.) Proceedings of the 2014 Genetic and evolutionary computation conference (GECCO 2014): a recombination of the 23rd International conference on genetic algorithms (ICGA-2014), and the 19th Annual genetic programming conference (GP-2014), 12-16 July 2014, Vancouver, Canada. New York: ACM [online], pages 333-340. Available from: https://doi.org/10.1145/2576768.2598240

Problem structure, or linkage, refers to the interaction between variables in a black-box fitness function. Discovering structure is a feature of a range of algorithms, including estimation of distribution algorithms (EDAs) and perturbation methods (... Read More about Minimal walsh structure and ordinal linkage of monotonicity-invariant function classes on bit strings..

Do you feel like a hero yet? (2014)
Journal Article
HERON, M.J. and BELFORD, P.H. 2014. Do you feel like a hero yet? Externalized morality in video games. Journal of games criticism [online], 1(2). Available from: http://www.gamescriticism.org/articles/heronbelford-1-2

Video games have a long tradition of including elements of moral decision making within their ludic and narrative structures. While the success of these endeavours has been mixed, the systems used to express moral choices within a game have grown mor... Read More about Do you feel like a hero yet?.

Applications and design of cooperative multi-agent ARN-based systems. (2014)
Journal Article
GERRARD, C.E., MCCALL, J., MACLEOD, C. and COGHILL, G.M. 2015. Applications and design of cooperative multi-agent ARN-based systems. Soft computing [online], 19(6), pages 1581-1594. Available from: https://doi.org/10.1007/s00500-014-1330-9

The Artificial Reaction Network (ARN) is an Artificial Chemistry inspired by Cell Signalling Networks (CSNs). Its purpose is to represent chemical circuitry and to explore the computational properties responsible for generating emergent high-level be... Read More about Applications and design of cooperative multi-agent ARN-based systems..

Online reviews as first class artifacts in mobile app development. (2014)
Conference Proceeding
IACOB, C., HARRISON, R. and FAILY, S. 2014. Online reviews as first class artifacts in mobile app development. In Memmi, G. and Blanke, U. (eds.) Mobile computing, applications and services: revised selected papers from the proceedings of the 5th International conference on mobile computing, applications and services (MobiCase 2013), 7-8 November 2013, Paris, France. Lecture notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 130. Cham: Springer [online], pages 47-53. Available from: https://doi.org/10.1007/978-3-319-05452-0_4

This paper introduces a framework for developing mobile apps. The framework relies heavily on app stores and, particularly, on online reviews from app users. The underlying idea is that app stores are proxies for users because they contain direct fee... Read More about Online reviews as first class artifacts in mobile app development..

DECMO2: a robust hybrid and adaptive multi-objective evolutionary algorithm. (2014)
Journal Article
ZAVOIANU, A.-C., LUGHOFER, E., BRAMERDORFER, G., AMRHEIN, W. and KLEMENT, E.P. 2015. DECMO2: a robust hybrid and adaptive multi-objective evolutionary algorithm. Soft computing [online], 19(12), pages 3551-3569. Available from: https://doi.org/10.1007/s00500-014-1308-7

We describe a hybrid and adaptive coevolutionary optimization method that can efficiently solve a wide range of multi-objective optimization problems (MOOPs) as it successfully combines positive traits from three main classes of multi-objective evolu... Read More about DECMO2: a robust hybrid and adaptive multi-objective evolutionary algorithm..

Evaluating the implications of attack and security patterns with premortems. (2014)
Book Chapter
FAILY, S., PARKIN, S. and LYLE, J. 2014. Evaluating the implications of attack and security patterns with premortems. In Blackwell, C. and Zhu, H. (eds.) Cyberpatterns: unifying design patterns with security and attack patterns. Cham: Springer [online], chapter 16, pages 199-209. Available from: https://doi.org/10.1007/978-3-319-04447-7_16

Security patterns are a useful way of describing, packaging and applying security knowledge which might otherwise be unavailable. However, because patterns represent partial knowledge of a problem and solution space, there is little certainty that ad... Read More about Evaluating the implications of attack and security patterns with premortems..

Real-time topic detection with bursty n-grams: RGU's submission to the 2014 SNOW challenge. (2014)
Conference Proceeding
MARTIN, C. and GOKER, A. 2014. Real-time topic detection with bursty n-grams: RGU's submission to the 2014 SNOW challenge. In Proceedings of the 2014 Social news on the web data challenge (SNOW-DC 2014), 8th April 2014, Seoul, Korea. CEUR workshop proceedings, 1150. Aachen: CEUR-WS [online], pages 9-16. Available from http://ceur-ws.org/Vol-1150/martin.pdf

Twitter is becoming an ever more popular platform for discovering and sharing information about current events, both personal and global. The scale and diversity of messages makes the discovery and analysis of breaking news very challenging. Nonethel... Read More about Real-time topic detection with bursty n-grams: RGU's submission to the 2014 SNOW challenge..

Cloud computing: adoption issues for sub-Saharan African SMEs. (2014)
Journal Article
DAHIRU, A. A., BASS, J. and ALLISON, I. 2014. Cloud computing: adoption issues for sub-Saharan African SMEs. Electronic journal of information systems in developing countries [online], 62(1), pages 1-17. Available from: https://doi.org/10.1002/j.1681-4835.2014.tb00439.x

This paper explores the emergence and adoption of cloud computing by small and medium-sized enterprises (SMEs) and points towards its implications for developing countries in sub-Saharan Africa. Several studies have shown the importance of technologi... Read More about Cloud computing: adoption issues for sub-Saharan African SMEs..

Evaluating industry-inspired pair programming communication guidelines with undergraduate students. (2014)
Conference Proceeding
ZARB, M., HUGHES, J. and RICHARDS, J. 2014. Evaluating industry-inspired pair programming communication guidelines with undergraduate students. In Proceedings of the 45th Association for Computing Machinery (ACM) technical symposium on computer science education (SIGCSE 2014), 5-8 March 2014, Atlanta, USA. New York: ACM [online], pages 361-366. Available from: https://doi.org/10.1145/2538862.2538980

A set of industry-inspired pair programming guidelines have been derived from qualitative examinations of expert pairs in order to aid novice programmers with their intra-pair communication. This research describes the evaluation of these guidelines... Read More about Evaluating industry-inspired pair programming communication guidelines with undergraduate students..

Multi-objective particle swarm optimisation: methods and applications. (2014)
Thesis
AL MOUBAYED, N. 2014. Multi-objective particle swarm optimisation: methods and applications. Robert Gordon University, PhD thesis.

Solving real life optimisation problems is a challenging engineering venture. Since the early days of research on optimisation it was realised that many problems do not simply have one optimisation objective. This led to the development of multi-obje... Read More about Multi-objective particle swarm optimisation: methods and applications..