Skip to main content

Research Repository

Advanced Search

All Outputs (2047)

Colours in office buildings under a clear sunny sky: the occupants' point of view. (2011)
Presentation / Conference Contribution
BELAKEHAL, A., TABET AOUL, K. and BENNADJI, A. 2011. Colours in office buildings under a clear sunny sky: the occupants' point of view. In Erkin, E., Kamuran, A. (eds.) Proceedings of 8th National lighting congress of the Turkish National Lighting Committee 2011 (ATMK 8), 14-15 April 2011, Istanbul, Turkey, pages 115-122. Instanbul: Aydınlatma Türk Milli Komitesi (ATMK).

This paper presents the results of a Daylight P.O.E. research undertaken in an office building in the city of Biskra, Algeria. The field work took place during summer in the building of La Caisse Nationale de l’Assurance Sociale (a major state insura... Read More about Colours in office buildings under a clear sunny sky: the occupants' point of view..

Two requirements for usable and secure software engineering. (2011)
Presentation / Conference Contribution
FAILY, S. 2011. Two requirements for usable and secure software engineering. Presented at the 1st Software and usable security aligned for good engineering workshop (SAUSAGE 2011), 5-6 April 2011, Gaithersburg, USA.

Despite the acknowledged need for systems to be both usable and secure, we lack guidance on how developers might build such systems. Based on recent research, we believe evidence exists that blending techniques from Security, Usability, and Software... Read More about Two requirements for usable and secure software engineering..

Modeling a proton exchange membrane (PEM) fuel cell system as a hybrid power supply for standalone applications. (2011)
Presentation / Conference Contribution
ALI, D. and AKLIL-D'HALLUIN, D.D. 2011. Modeling a proton exchange membrane (PEM) fuel cell system as a hybrid power supply for standalone applications. In Proceedings of 2011 Asia-Pacific power and energy engineering conference (APPEEC 2011), 25-28 March 2011, Wuhan, China. Piscataway: IEEE [online], article 5749114. Available from: https://doi.org/10.1109/APPEEC.2011.5749114

Fuel Cells (FC) can help in contributing to environmental pressures by maximizing the use of renewables in the energy production and using hydrogen produced with no CO 2 emission from Renewable Energy Systems (RES). FCs also contributes to energy sec... Read More about Modeling a proton exchange membrane (PEM) fuel cell system as a hybrid power supply for standalone applications..

Increasing the penetration of renewables by stabilizing the grid through the use of energy storage: fuel cell technologies. (2011)
Presentation / Conference Contribution
GAZEY, R., ALI, D. and AKLIL, D. 2011. Increasing the penetration of renewables by stabilizing the grid through the use of energy storage; fuel cell technologies. Presented at the 2011 Institute for Innovation, Design and Sustainability (IDEAS) annual conference, February 2011, Aberdeen, UK.

One of the main solutions to increase the penetration of renewables is to provide the ability to store energy. Electrical power generated by renewables (such as wind, hydro, solar) would be stored at times when renewable power production is high. The... Read More about Increasing the penetration of renewables by stabilizing the grid through the use of energy storage: fuel cell technologies..

Situation awareness in context-aware case-based decision support. (2011)
Presentation / Conference Contribution
NWIABU, N., ALLISON, I., HOLT, P., LOWIT, P. and OYENEYIN, B. 2011. Situation awareness in context-aware case-based decision support. In Proceedings of the 2011 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA 2011), 22-24 February 2011, Miami, USA. New York: IEEE [online], article number 5753761, pages 9-16. Available from: https://doi.org/10.1109/COGSIMA.2011.5753761

Humans naturally reuse recalled knowledge to solve problems and this includes understanding the context i.e. the information that identifies or characterizes these problems. For problems in complex and dynamic environments, providing effective soluti... Read More about Situation awareness in context-aware case-based decision support..

A model of security culture for e-science. (2011)
Presentation / Conference Contribution
FAILY, S. and FLÉCHAIS, I. 2011. A model of security culture for e-science. In Clarke, N., Furnell, S. and Von Solms, R. (eds.) Proceedings of the South African information security multi-conference (SAISMC 2010), 17-18 May 2010, Port Elizabeth, South Africa. Plymouth: University of Plymouth, pages 154-164.

There is a need to understand the cultural issues affecting security in large, distributed and heterogeneous systems; such systems are typified by e-Science projects. We present a model of security culture for e-Science, grounded both in the security... Read More about A model of security culture for e-science..

Assessing professional skills in engineering education. (2011)
Presentation / Conference Contribution
CAJANDER, Å., DANIELS, M., MCDERMOTT, R. and VON KONSKY, B.R. 2011. Assessing professional skills in engineering education. In Hamer, J. and Raadt, M. de (eds.) Proceedings of the 13th Australasian computing education conference (ACE 2011), 17-20 January 2011, Perth, Australia. Sydney: Conferences in research and practice in information technology (CRPIT) [online], 114, pages 145-154. Available from: http://crpit.com/Vol114.html.

In this paper, we report the results of introducing a face-to- face Peer Assisted Study Scheme (PASS) and an electronic Peer Assisted Study Scheme (ePASS) into a first year introductory programming unit, core to four undergraduate IT degrees. PASS is... Read More about Assessing professional skills in engineering education..

The role of networking in the growth processes of family firms: an international study. (2010)
Presentation / Conference Contribution
JACK, S., DRAKOPOULOU DODD, S. and ANDERSON, A.R. 2010. The role of networking in the growth processes of family firms: an international study. In Hadjielias, E. and Barton, T. (eds.) Proceedings of the 10th Annual world family business research conference (IFERA 2010): long term perspectives on family business: theory, practice, policy, 6-9 July 2010, Lancaster, UK. Lancaster: Lancaster University Management School.

The paper aims to investigate the role of networks in the growth processes of family firms. The study adds to two main stream of literature, drawing together theoretical developments from the family firm realm and networking theory, to investigate th... Read More about The role of networking in the growth processes of family firms: an international study..

Office buildings' daylighting design in hot arid regions: forms, codes and occupants' point of view. (2010)
Presentation / Conference Contribution
BELAKEHAL, A., BENNADJI, A. and AOUL, K. 2010. Office buildings' daylighting design in hot arid regions: forms, codes and occupants' point of view. In Abdo, A.M.A. and Akash, B.A. (eds.) Proceedings of the 2010 International engineering conference on hot arid regions (IECHAR-2010): challenges, technologies and opportunities, 1-2 March 2010, Al-Ahsa, Saudi Arabia. Al-Ahsa: King Faisal University, pages 343-347.

In hot and arid regions, contemporary designers need more daylighting related information in order to achieve an environmental friendly and energy efficient architecture design. This paper presents the results of a Post Occupancy Evaluation research... Read More about Office buildings' daylighting design in hot arid regions: forms, codes and occupants' point of view..

The secret lives of assumptions: developing and refining assumption personas for secure system design. (2010)
Presentation / Conference Contribution
FAILY, S. and FLÉCHAIS, I. 2010. The secret lives of assumptions: developing and refining assumption personas for secure system design. In Bernhaupt, R., Forbrig, P., Gulliksen, J. and Lárusdóttir, M. (eds.) Human-centred software engineering: proceedings of the 3rd International conference on human-centred software engineering (HCSE 2010), 14-15 October 2010, Reykjavik, Iceland. Lecture notes in computer science, 6409. Berlin: Springer [online], pages 111-118. Available from: https://doi.org/10.1007/978-3-642-16488-0_9

Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats endangering it. Often, however, personas need to be partly derived from assump... Read More about The secret lives of assumptions: developing and refining assumption personas for secure system design..

Security through usability: a user-centered approach for balanced security policy requirements. (2010)
Presentation / Conference Contribution
FAILY, S. and FLÉCHAIS, I. 2010. Security through usability: a user-centered approach for balanced security policy requirements. Presented at the 26th Annual computer security applications conference (ACSAC 2010), 6-10 December 2010, Austin, USA.

Security policy authors face a dilemma. On one hand, policies need to respond to a constantly evolving, well reported threat landscape, the consequences of which have heightened the security awareness of senior managers. On the other hand, the impact... Read More about Security through usability: a user-centered approach for balanced security policy requirements..

Security and usability: searching for the philosopher's stone. (2010)
Presentation / Conference Contribution
FLÉCHAIS, I. and FAILY, S. 2010. Security and usability: searching for the philosopher's stone. Presented at the Workshop on the development of EuroSOUPS, 24 November 2010, Newcastle, UK. Hosted on CoCoLab.org [online]. Available from: https://www.cocolab.org/soups/eurosoups

This paper describes the unique challenges facing usable security research and design, and introduces three proposals for addressing these. For all intents and purposes security design is currently a craft, where quality is dependent on individuals a... Read More about Security and usability: searching for the philosopher's stone..

Designing and aligning e-science security culture with design. (2010)
Presentation / Conference Contribution
FAILY, S. and FLÉCHAIS, I. 2010. Designing and aligning e-science security culture with design. Information management and computer security [online], 18(5): selected papers from the South African information security multi-conference (SAISMC 2010), 17-18 May 2010, Port Elizabeth, South Africa, pages 339-349. Available from: https://doi.org/10.1108/09685221011095254

The purpose of this paper is to identify the key cultural concepts affecting security in multi-organisational systems, and to align these with design techniques and tools. A grounded theory model of security culture was derived from the related secur... Read More about Designing and aligning e-science security culture with design..

Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis. (2010)
Presentation / Conference Contribution
ALLISON, I. 2010. Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis. In Proceedings of the 7th International conference on the quality of information and communications technology (QUATIC 2010), 29 September - 2 October 2010, Porto, Portugal. Los Alamitos: IEEE Computing Society [online], article number 5655656, pages 418-423. Available from: https://doi.org/10.1109/QUATIC.2010.81

Previous work looking at software process improvement (SPI) in small organizations has highlighted difficulties faced by small organizations in implementing SPI successfully, but there is little analysis to understand why this is from an organization... Read More about Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis..

Feature recognition and tool path generation for 5 axis STEP-NC machining of free form/irregular contoured surfaces. (2010)
Presentation / Conference Contribution
ANBALAGAN, A. 2010. Feature recognition and tool path generation for 5 axis STEP-NC machining of free form/irregular contoured surfaces. In Katalinic, B. (ed.) Proceedings of 21st Danube Adria Association for Automation and Manufacturing (DAAAM) international symposium 2010: intelligent manufacturing and automation, 20-23 October 2010, Zadar, Croatia. Vienna: DAAAM International [online], article ID 618, pages 1235-1236. Available from: https://www.daaam.info/Downloads/Pdfs/proceedings/proceedings_2010/24469_Symp_2_head.pdf

This research paper presents a five step algorithm to generate tool paths for machining Free form / Irregular Contoured Surface(s) (FICS) by adopting STEP-NC (AP-238) format. In the first step, a parametrized CAD model with FICS is created or importe... Read More about Feature recognition and tool path generation for 5 axis STEP-NC machining of free form/irregular contoured surfaces..

Integration of CAD/tool path data for 5-axis STEP-NC machining of free form/irrregular controured surfaces. (2010)
Presentation / Conference Contribution
ANBALAGAN, A. 2010. Integration of CAD/tool path for 5 axis STEP-NC machining of free form/irrregular contoured surfaces. In Katalinic, B. (ed.) Proceedings of 21st Danube Adria Association for Automation and Manufacturing (DAAAM) international symposium 2010: intelligent manufacturing and automation, 20-23 October 2010, Zadar, Croatia. Vienna: DAAAM International [online], article ID 617, pages 1233-1235. Available from: https://www.daaam.info/Downloads/Pdfs/proceedings/proceedings_2010/24469_Symp_1_head.pdf

This research paper presents the work on feature recognition, tool path data generation and integration with STEP-NC (AP-238 format) for features having Free form/Irregular Contoured Surfaces(s) (FICS). Initially, the FICS features are modelled/impor... Read More about Integration of CAD/tool path data for 5-axis STEP-NC machining of free form/irrregular controured surfaces..

Multi-HDCS: solving DisCSPs with complex local problems cooperatively. (2010)
Presentation / Conference Contribution
LEE, D., ARANA, I., AHRIZ, H. and HUI, K. 2009. Multi-HDCS: solving DisCSPs with complex local problems cooperatively. In Huang, X.J., Ghorbani, A.A., Hacid, M.-S. and Yamaguchi, T. (eds.) Proceedings of the 2010 IEEE/WIC/ACM international conference on intelligent agent technology (IAT 2010), co-located with the 2010 IEEE/WIC/ACM international conference on web intelligence (WI 2010), and the joint conference workshops (WI-IAT Workshops 2010), 31 August - 3 September 2010, Toronto, Canada. Los Alamitos: IEEE Computer Society [online], volume 2, article number 5614767, pages 295-302. Available from: https://doi.org/10.1109/WI-IAT.2010.141

We propose Multi-HDCS, a new hybrid approach for solving Distributed CSPs with complex local problems. In Multi-HDCS, each agent concurrently: (i) runs a centralised systematic search for its complex local problem; (ii) participates in a distributed... Read More about Multi-HDCS: solving DisCSPs with complex local problems cooperatively..

Meaningful engagement: computer-based interactive media art in public space. (2010)
Presentation / Conference Contribution
HER, J.-J. and HAMLYN, J., 2010. Meaningful engagement: computer-based interactive media art in public space. In Huang, F. and Wang, R.-C. (eds.) Arts and Technology: revised selected papers from the proceedings of the 1st International conference on arts and technology (ArtsIT 2009), 24-25 September 2009, Yi-Lan, Taiwan. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 30. Berlin: Springer [online], pages 17-24. Available from: https://doi.org/10.1007/978-3-642-11577-6_3

Interactive technologies, including electronic devices are increasingly being utilized as a medium for artistic expression and have been placed in freely accessible public environments with mixed results. When audiences encounter computer-based inter... Read More about Meaningful engagement: computer-based interactive media art in public space..

Barry is not the weakest link: eliciting secure system requirements with personas. (2010)
Presentation / Conference Contribution
FAILY, S. and FLÉCHAIS, I. 2010. Barry is not the weakest link: eliciting secure system requirements with personas. In Proceedings of the 24th International BCS human computer interaction conference (HCI 2010): games are a serious business, 6-10 September 2010, Dundee, UK. Swindon: BCS, pages 124-132. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/HCI2010.17

Building secure and usable systems means specifying systems for the people using it and the tasks they carry out, rather than vice-versa. User-centred design approaches encourage an early focus on users and their contexts of use, but these need to be... Read More about Barry is not the weakest link: eliciting secure system requirements with personas..

To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. (2010)
Presentation / Conference Contribution
FAILY, S. and FLÉCHAIS, I. 2010. To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. In Proceedings of the 2010 New security paradigms workshop (NSPW 2010), 21-23 September 2010, Concord, USA. New York: ACM [online], pages 73-84. Available from: https://doi.org/10.1145/1900546.1900557

When designing secure systems, we are inundated with an eclectic mix of security and non-security requirements; this makes predicting a successful outcome from the universe of possible security design decisions a difficult problem. We propose augment... Read More about To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design..