Skip to main content

Research Repository

Advanced Search

All Outputs (1084)

Automatically structuring domain knowledge from text: an overview of current research. (2011)
Journal Article
CLARK, M., KIM, Y., KRUSCHWITZ, U., SONG, D., ALBAKOUR, D., DIGNUM, S., BERESI, U. C., FASLI, M. and DE ROECK, A. 2012. Automatically structuring domain knowledge from text: an overview of current research. Information processing and management [online], 48(3), pages 552-568. Available from: https://doi.org/10.1016/j.ipm.2011.07.002

This paper presents an overview of automatic methods for building domain knowledge structures (domain models) from text collections. Applications of domain models have a long history within knowledge engineering and artificial intelligence. In the la... Read More about Automatically structuring domain knowledge from text: an overview of current research..

Plan recommendation for well engineering. (2011)
Conference Proceeding
THOMSON, R., MASSIE, S., CRAW, S., AHRIZ, H. and MILLS, I. 2011. Plan recommendation for well engineering. In Mehrotra, K.G., Mohan, C.K., Oh, J.C., Varshney, P.K. and Ali, M. (eds.) Modern approaches in applied intelligence: proceedings of the 24th International conference on industrial, engineering and other applications of applied intelligent systems (IEA/AIE 2011), 28 June - 1 July 2011, Syracuse, USA. Lecture notes in computer science, 6704. Berlin: Springer [online], part II, pages 436-445. Available from: https://doi.org/10.1007/978-3-642-21827-9_45

Good project planning provides the basis for successful offshore well drilling projects. In this domain, planning occurs in two phases: an onshore phase develops a project plan; and an offshore phase implements the plan and tracks progress. The Perfo... Read More about Plan recommendation for well engineering..

Motivating all our students? (2011)
Conference Proceeding
BOUVIER, D., CARTER, J., CARDELL-OLIVER, R., HAMILTON, M., KURKOVSKY, S., MARKHAM, S., MCCLUNG, O.W., MCDERMOTT, R., RIEDESEL, C., SHI, J. and WHITE, S. 2011. Motivating all our students? In Proceedings of the 16th Innovation and technology in computer science education annual conference: working group reports (ITiCSE-WGR '11), 27-29 June 2011, Darmstadt, Germany. New York: ACM [online], pages 1-18. Available from: https://doi.org/10.1145/2078856.2078858

Academics expend a large amount of time and effort to sustain and enhance the motivation of undergraduate students. Typically based on a desire to ensure that all students achieve their full potential, approaches are based on an understanding that st... Read More about Motivating all our students?.

Do we know each other or is it just our devices? A federated context model for describing social activity across devices. (2011)
Presentation / Conference
GIONIS, G., DESRUELLE, H., BLOMME, D., LYLE, J., FAILY, S. and BASSBOUSS, L. 2011. Do we know each other or is it just our devices? A federated context model for describing social activity across devices. Presented at the Federated social web Europe conference, 3-5 June 2011, Berlin, Germany.

The availability of connected devices is rapidly growing. In our everyday life, we already use a multitude of personal devices that are connected to the Internet. The number of shipped smart-phones at the end of 2010 even surpassed the traditional co... Read More about Do we know each other or is it just our devices? A federated context model for describing social activity across devices..

Security goes to ground: on the applicability of security entrepreneurship to grassroot activism. (2011)
Presentation / Conference
FAILY, S. 2011. Security goes to ground: on the applicability of security entrepreneurship to grassroot activism. Presented at the Workshop on HCI, politics and the city, part of the 29th Annual CHI conference on human factors in computing systems (CHI 2011), 7-8 May 2011, Vancouver, Canada.

Designing security for grassroot movements raises several challenges not particular to the organisations that are catered to by conventional approaches to security design. Drawing on analogies between Social Entrepreneurship and Grassroot Activism, a... Read More about Security goes to ground: on the applicability of security entrepreneurship to grassroot activism..

Persona cases: a technique for grounding personas. (2011)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2011. Persona cases: a technique for grounding personas. In Proceedings of the 29th Annual CHI conference on human factors in computing systems (CHI 2011), 7-12 May 2011, Vancouver, Canada. New York: ACM [online], pages 2267-2270. Available from: https://doi.org/10.1145/1978942.1979274

Personas are a popular technique in User-Centered Design, however their validity can be called into question. While the techniques used to developed personas and their integration with other design activities provide some measure of validity, a perso... Read More about Persona cases: a technique for grounding personas..

Two requirements for usable and secure software engineering. (2011)
Presentation / Conference
FAILY, S. 2011. Two requirements for usable and secure software engineering. Presented at the 1st Software and usable security aligned for good engineering workshop (SAUSAGE 2011), 5-6 April 2011, Gaithersburg, USA.

Despite the acknowledged need for systems to be both usable and secure, we lack guidance on how developers might build such systems. Based on recent research, we believe evidence exists that blending techniques from Security, Usability, and Software... Read More about Two requirements for usable and secure software engineering..

Seeking the philosopher's stone. (2011)
Journal Article
FLÉCHAIS, I. and FAILY, S. 2011. Seeking the philosopher's stone. Interfaces: the quarterly magazine of BCS Interaction Group [online], 86, pages 14-15. Available from: https://www.bcs.org/media/5326/interfaces86-spring2011.pdf

This article describes the unique challenges facing usable security research and design, and introduces three proposals for addressing these. For all intents and purposes, security design is currently a craft, where quality is dependent on individual... Read More about Seeking the philosopher's stone..

Situation awareness in context-aware case-based decision support. (2011)
Conference Proceeding
NWIABU, N., ALLISON, I., HOLT, P., LOWIT, P. and OYENEYIN, B. 2011. Situation awareness in context-aware case-based decision support. In Proceedings of the 2011 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA 2011), 22-24 February 2011, Miami, USA. New York: IEEE [online], article number 5753761, pages 9-16. Available from: https://doi.org/10.1109/COGSIMA.2011.5753761

Humans naturally reuse recalled knowledge to solve problems and this includes understanding the context i.e. the information that identifies or characterizes these problems. For problems in complex and dynamic environments, providing effective soluti... Read More about Situation awareness in context-aware case-based decision support..

A model of security culture for e-science. (2011)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2011. A model of security culture for e-science. In Clarke, N., Furnell, S. and Von Solms, R. (eds.) Proceedings of the South African information security multi-conference (SAISMC 2010), 17-18 May 2010, Port Elizabeth, South Africa. Plymouth: University of Plymouth, pages 154-164.

There is a need to understand the cultural issues affecting security in large, distributed and heterogeneous systems; such systems are typified by e-Science projects. We present a model of security culture for e-Science, grounded both in the security... Read More about A model of security culture for e-science..

A sequence-length sensitive approach to learning biological grammars using inductive logic programming. (2011)
Thesis
MAMER, T. 2011. A sequence-length sensitive approach to learning biological grammars using inductive logic programming. Robert Gordon University, PhD thesis.

This thesis aims to investigate if the ideas behind compression principles, such as the Minimum Description Length, can help us to improve the process of learning biological grammars from protein sequences using Inductive Logic Programming (ILP). Con... Read More about A sequence-length sensitive approach to learning biological grammars using inductive logic programming..

Assessing professional skills in engineering education. (2011)
Conference Proceeding
CAJANDER, Å., DANIELS, M., MCDERMOTT, R. and VON KONSKY, B.R. 2011. Assessing professional skills in engineering education. In Hamer, J. and Raadt, M. de (eds.) Proceedings of the 13th Australasian computing education conference (ACE 2011), 17-20 January 2011, Perth, Australia. Sydney: Conferences in research and practice in information technology (CRPIT) [online], 114, pages 145-154. Available from: http://crpit.com/Vol114.html.

In this paper, we report the results of introducing a face-to- face Peer Assisted Study Scheme (PASS) and an electronic Peer Assisted Study Scheme (ePASS) into a first year introductory programming unit, core to four undergraduate IT degrees. PASS is... Read More about Assessing professional skills in engineering education..

The secret lives of assumptions: developing and refining assumption personas for secure system design. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. The secret lives of assumptions: developing and refining assumption personas for secure system design. In Bernhaupt, R., Forbrig, P., Gulliksen, J. and Lárusdóttir, M. (eds.) Human-centred software engineering: proceedings of the 3rd International conference on human-centred software engineering (HCSE 2010), 14-15 October 2010, Reykjavik, Iceland. Lecture notes in computer science, 6409. Berlin: Springer [online], pages 111-118. Available from: https://doi.org/10.1007/978-3-642-16488-0_9

Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats endangering it. Often, however, personas need to be partly derived from assump... Read More about The secret lives of assumptions: developing and refining assumption personas for secure system design..

Security through usability: a user-centered approach for balanced security policy requirements. (2010)
Presentation / Conference
FAILY, S. and FLÉCHAIS, I. 2010. Security through usability: a user-centered approach for balanced security policy requirements. Presented at the 26th Annual computer security applications conference (ACSAC 2010), 6-10 December 2010, Austin, USA.

Security policy authors face a dilemma. On one hand, policies need to respond to a constantly evolving, well reported threat landscape, the consequences of which have heightened the security awareness of senior managers. On the other hand, the impact... Read More about Security through usability: a user-centered approach for balanced security policy requirements..

Security and usability: searching for the philosopher's stone. (2010)
Presentation / Conference
FLÉCHAIS, I. and FAILY, S. 2010. Security and usability: searching for the philosopher's stone. Presented at the Workshop on the development of EuroSOUPS, 24 November 2010, Newcastle, UK. Hosted on CoCoLab.org [online]. Available from: https://www.cocolab.org/soups/eurosoups

This paper describes the unique challenges facing usable security research and design, and introduces three proposals for addressing these. For all intents and purposes security design is currently a craft, where quality is dependent on individuals a... Read More about Security and usability: searching for the philosopher's stone..

Designing and aligning e-science security culture with design. (2010)
Journal Article
FAILY, S. and FLÉCHAIS, I. 2010. Designing and aligning e-science security culture with design. Information management and computer security [online], 18(5): selected papers from the South African information security multi-conference (SAISMC 2010), 17-18 May 2010, Port Elizabeth, South Africa, pages 339-349. Available from: https://doi.org/10.1108/09685221011095254

The purpose of this paper is to identify the key cultural concepts affecting security in multi-organisational systems, and to align these with design techniques and tools. A grounded theory model of security culture was derived from the related secur... Read More about Designing and aligning e-science security culture with design..

Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis. (2010)
Conference Proceeding
ALLISON, I. 2010. Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis. In Proceedings of the 7th International conference on the quality of information and communications technology (QUATIC 2010), 29 September - 2 October 2010, Porto, Portugal. Los Alamitos: IEEE Computing Society [online], article number 5655656, pages 418-423. Available from: https://doi.org/10.1109/QUATIC.2010.81

Previous work looking at software process improvement (SPI) in small organizations has highlighted difficulties faced by small organizations in implementing SPI successfully, but there is little analysis to understand why this is from an organization... Read More about Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis..

Multi-HDCS: solving DisCSPs with complex local problems cooperatively. (2010)
Conference Proceeding
LEE, D., ARANA, I., AHRIZ, H. and HUI, K. 2009. Multi-HDCS: solving DisCSPs with complex local problems cooperatively. In Huang, X.J., Ghorbani, A.A., Hacid, M.-S. and Yamaguchi, T. (eds.) Proceedings of the 2010 IEEE/WIC/ACM international conference on intelligent agent technology (IAT 2010), co-located with the 2010 IEEE/WIC/ACM international conference on web intelligence (WI 2010), and the joint conference workshops (WI-IAT Workshops 2010), 31 August - 3 September 2010, Toronto, Canada. Los Alamitos: IEEE Computer Society [online], volume 2, article number 5614767, pages 295-302. Available from: https://doi.org/10.1109/WI-IAT.2010.141

We propose Multi-HDCS, a new hybrid approach for solving Distributed CSPs with complex local problems. In Multi-HDCS, each agent concurrently: (i) runs a centralised systematic search for its complex local problem; (ii) participates in a distributed... Read More about Multi-HDCS: solving DisCSPs with complex local problems cooperatively..

Perceiving and using genre by form: an eye-tracking study. (2010)
Journal Article
CLARK, M., RUTHVEN, I. and HOLT, P.O'B. 2010. Perceiving and using genre by form: an eye-tracking study. Libri [online], 60(3), pages 268-280. Available from: https://doi.org/10.1515/libr.2010.023

This paper reports on an approach to the analysis of genre recognition using eye-tracking. The researchers focused on eight different types of e-mail, such as calls for papers, newsletters and spam, which were chosen to represent different genres. Th... Read More about Perceiving and using genre by form: an eye-tracking study..

To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. In Proceedings of the 2010 New security paradigms workshop (NSPW 2010), 21-23 September 2010, Concord, USA. New York: ACM [online], pages 73-84. Available from: https://doi.org/10.1145/1900546.1900557

When designing secure systems, we are inundated with an eclectic mix of security and non-security requirements; this makes predicting a successful outcome from the universe of possible security design decisions a difficult problem. We propose augment... Read More about To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design..