Skip to main content

Research Repository

Advanced Search

All Outputs (20)

Requirements sensemaking using concept maps. (2012)
Conference Proceeding
FAILY, S., LYLE, J., PAUL, A., ATZENI, A., BLOMME, D., DESRUELLE, H. and BANGALORE, K. 2012. Requirements sensemaking using concept maps. In Winckler, M., Forbrig, P. and Bernhaupt, R. (eds.) Human-centered software engineering: proceedings of the 4th International conference on human-centered software engineering (HCSE 2012), 29-31 October 2012, Toulouse, France. Lecture notes in computer science, 7623. Heidelberg: Springer [online], pages 217-232. Available from: https://doi.org/10.1007/978-3-642-34347-6_13

Requirements play an important role in software engineering, but their perceived usefulness means that they often fail to be properly maintained. Traceability is often considered a means for motivating and maintaining requirements, but this is diffic... Read More about Requirements sensemaking using concept maps..

On the design and development of webinos: a distributed mobile application middleware. (2012)
Conference Proceeding
LYLE, J., FAILY, S., FLÉCHAIS, I., PAUL, A., GÖKER, A., MYRHAUG, H., DESRUELLE, H. and MARTIN, A. 2012. On the design and development of webinos: a distributed mobile application middleware. In Göschka, K.M. and Haridi, S. (eds.) Distributed applications and interoperable systems: proceedings of the 12th International Federation for Information Processing (IFIP) Working Group 6.1 international conference on distributed applications and interoperable systems (DAIS 2012), 13-16 June 2012, Stockholm, Sweden. Lecture notes in computer science, 7272. Heidelberg: Springer [online], pages 140-147. Available from: https://doi.org/10.1007/978-3-642-30823-9_12

As personal devices become smarter, opportunities arise for sharing services, applications and data between them. While web technologies hold the promise of being a unifying layer, browsers lack functionality for supporting inter-device communication... Read More about On the design and development of webinos: a distributed mobile application middleware..

Adaptive dynamic control of quadrupedal robotic gaits with artificial reaction networks. (2012)
Conference Proceeding
GERRARD, C.E., MCCALL, J., COGHILL, G.M. and MACLEOD, C. 2012. Adaptive dynamic control of quadrupedal robotic gaits with artificial reaction networks. In Huang, T., Zeng, Z., Li, C. and Leung, C.S. (eds.) Proceedings of the 19th International conference on neural information processing (ICONIP 2012), 12-15 November 2012, Doha, Qatar. Lecture notes in computer science, 7663. Berlin: Springer [online], part I, pages 280-287. Available from: https://doi.org/10.1007/978-3-642-34475-6_34

The Artificial Reaction Network (ARN) is a bio-inspired connectionist paradigm based on the emerging field of Cellular Intelligence. It has properties in common with both AI and Systems Biology techniques including Artificial Neural Networks, Petri N... Read More about Adaptive dynamic control of quadrupedal robotic gaits with artificial reaction networks..

Improving bag-of-visual-words model with spatial-temporal correlation for video retrieval. (2012)
Conference Proceeding
WANG, L., SONG, D. and ELYAN, E. 2012. Improving bag-of-visual-words model with spatial-temporal correlation for video retrieval. In Proceedings of the 21st Association for Computing Machinery (ACM) international conference on information and knowledge management (CIKM'12), 29 October - 2 November 2012, Maui, USA. New York: ACM [online], pages 1303-1312. Available from: https://doi.org/10.1145/2396761.2398433

Most of the state-of-art approaches to Query-by-Example (QBE) video retrieval are based on the Bag-of-visual-Words (BovW) representation of visual content. It, however, ignores the spatial-temporal information, which is important for similarity measu... Read More about Improving bag-of-visual-words model with spatial-temporal correlation for video retrieval..

Two-part segmentation of text documents. (2012)
Conference Proceeding
DEEPAK, P., VISWESWARIAH, K., WIRATUNGA, N. and SANI, S. 2012. Two-part segmentation of text documents. In Proceedings of the 21st Association for Computing Machinery (ACM) International conference on information and knowledge management (CIKM'12), 29 October - 02 November 2012, Maui, USA. New York: ACM [online], pages 793-802. Available from: https://dx.doi.org/10.1145/2396761.2396862

We consider the problem of segmenting text documents that have a two-part structure such as a problem part and a solution part. Documents of this genre include incident reports that typically involve description of events relating to a problem follow... Read More about Two-part segmentation of text documents..

Student reflections on collaborative technology in a globally distributed student project. (2012)
Conference Proceeding
MCDERMOTT, R., DANIELS, M., CAJANDER, A., CULLHED, M., CLEAR, T. and LAXER, C. 2012. Student reflections on collaborative technology in a globally distributed student project. In Proceedings of the 2012 Frontiers in education conference (FIE 2012): soaring to new heights in engineering education, 3-6 October 2012, Seattle, USA. Piscataway, NJ: IEEE [online], article number 6462410. Available from: https://doi.org/10.1109/FIE.2012.6462410

Collaborative Technology (CT) plays an important role in overcoming the challenges of globally distributed projects. It enables collaboration, but the specific choice of technology also imposes constraints on how projects are conducted. Over the past... Read More about Student reflections on collaborative technology in a globally distributed student project..

Categorizing how students use collaborative technologies in a globally distributed project. (2012)
Conference Proceeding
CAJANDER, A., DANIELS, M., CULLHED, M., CLEAR, T., MCDERMOTT, R. and LAXER, C. 2012. Categorizing how students use collaborative technologies in a globally distributed project. In Proceedings of the 2012 Frontiers in education conference (FIE 2012): soaring to new heights in engineering education, 3-6 October 2012, Seattle, USA. Piscataway, NJ: IEEE [online], article number 6462411. Available from: https://doi.org/10.1109/FIE.2012.6462411

Possibilities for collaboration in globally distributed projects have radically changed with the introduction of new Collaborative Technologies (CTs) in the Web 2.0 era. The use of such technologies in the context of students collaborating in a globa... Read More about Categorizing how students use collaborative technologies in a globally distributed project..

Model-driven architectural risk analysis using architectural and contextualised attack patterns. (2012)
Conference Proceeding
FAILY, S., LYLE, J., NAMILUKO, C., ATZENI, A. and CAMERONI, C. 2012. Model-driven architectural risk analysis using architectural and contextualised attack patterns. In Proceedings of the 1st Model-driven security workshop (MDsec 2012), co-located with the 15th International conference on model-driven engineering languages and systems (MoDELS 2012), 1-5 October 2012, Innsbruck, Austria. New York: ACM [online], article number 3. Available from: https://doi.org/10.1145/2422498.2422501

A secure system architecture is often based on a variety of design and security model elements. Without some way of evaluating the impact of these individual design elements in the face of possible attacks, design flaws may weaken a software architec... Read More about Model-driven architectural risk analysis using architectural and contextualised attack patterns..

Proceedings of the Designing interactive secure systems workshop (DISS 2012). (2012)
Conference Proceeding
FAILY, S., FLÉCHAIS, I. and COLES-KEMP, L. (eds.) 2012. Proceedings of the Designing interactive secure systems workshop (DISS 2012), part of the 26th International BCS human computer interaction conference (HCI 2012): people and computers, 11 September 2012, Birmingham, UK. Swindon: BCS [online], article numbers 62-70. Preface available from: https://doi.org/10.14236/ewic/HCI2012.70

In recent years, the field of usable security has attracted researchers from HCI and Information Security, and led to a better understanding of the interplay between human factors and security mechanisms. Despite these advances, designing systems whi... Read More about Proceedings of the Designing interactive secure systems workshop (DISS 2012)..

Software for interactive secure systems design: lessons learned developing and applying CAIRIS. (2012)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2012. Software for interactive secure systems design: lessons learned developing and applying CAIRIS. In Faily, S., Fléchais, I. and Coles-Kemp, L. (eds.) Proceedings of the Designing interactive secure systems workshop (DISS 2012), part of the 26th International BCS human computer interaction conference (HCI 2012): people and computers, 11 September 2012, Birmingham, UK. Swindon: BCS [online], article number 64. Available from: https://doi.org/10.14236/ewic/HCI2012.64

As systems become more complex, the potential for security vulnerabilities being introduced increases. If we are to provide assurances about systems we design then we need the means of analysing, managing, and generally making sense of the data that... Read More about Software for interactive secure systems design: lessons learned developing and applying CAIRIS..

Secure system? Challenge accepted: finding and resolving security failures using security premortems. (2012)
Conference Proceeding
FAILY, S., PARKIN, S. and LYLE, J. 2012. Secure system? Challenge accepted: finding and resolving security failures using security premortems. In Faily, S., Fléchais, I. and Coles-Kemp, L. (eds.) Proceedings of the Designing interactive secure systems workshop (DISS 2012), part of the 26th International BCS human computer interaction conference (HCI 2012): people and computers, 11 September 2012, Birmingham, UK. Swindon: BCS [online], article number 66. Available from: https://doi.org/10.14236/ewic/HCI2012.66

Risk-driven approaches are dominant in secure systems design; these aim to elicit and treat vulnerabilities and the threats exploiting them. Such approaches, however, are so focused on driving risks out of system design, they fail to recognise the us... Read More about Secure system? Challenge accepted: finding and resolving security failures using security premortems..

Temporal patterns in artificial reaction networks. (2012)
Conference Proceeding
GERRARD, C., MCCALL, J., COGHILL, G.M. and MACLEOD, C. 2012. Temporal patterns in artificial reaction networks. In Villa, A.E.P., Duch, W., Érdi, P., Masulli, F. and Palm, G. (eds.) Artificial neural networks and machine learning: proceedings of the 22nd International conference on artificial neural networks (ICANN 2012), 11-14 September 2012, Lausanne, Switzerland. Lecture notes in computer science, 7552. Berlin: Springer [online], part I, pages 1-8. Available from: https://doi.org/10.1007/978-3-642-33269-2_1

The Artificial Reaction Network (ARN) is a bio-inspired connectionist paradigm based on the emerging field of Cellular Intelligence. It has properties in common with both AI and Systems Biology techniques including Artificial Neural Networks, Petri N... Read More about Temporal patterns in artificial reaction networks..

Looking for genre: the use of structural features during search tasks with Wikipedia. (2012)
Conference Proceeding
CLARK, M., RUTHVEN, I., O'BRIAN HOLT, P. and SONG, D. 2012. Looking for genre: the use of structural features during search tasks with Wikipedia. In Proceedings of the 4th Information interaction in context symposium (IIIX'12), 21-24 August 2012, Nijmegen, Netherlands. New York: ACM [online], pages 145-154. Available from: https://doi.org/10.1145/2362724.2362751

This paper reports on our task-based observational, logged, questionnaire study and analysis of ocular behavior pertaining to the interaction of structural features of text in Wikipedia using eye tracking. We set natural and realistic tasks searching... Read More about Looking for genre: the use of structural features during search tasks with Wikipedia..

Cross-platform access control for mobile web applications. (2012)
Conference Proceeding
LYLE, J., MONTELEONE, S., FAILY, S., PATTI, D. and RICCIATO, F. 2012. Cross-platform access control for mobile web applications. In Proceedings of the 2012 IEEE international symposium on policies for distributed systems and networks (POLICY 2012), 16-18 July 2012, Chapel Hill, USA. Los Alamitos: IEEE Computer Society [online], pages 37-44. Available from: https://doi.org/10.1109/POLICY.2012.9

Web browsers are a common platform for delivering cross-platform applications. However, they currently fail to provide consistent access control for security and privacy sensitive JavaScript APIs, such as geolocation and local storage. This problem i... Read More about Cross-platform access control for mobile web applications..

Music-inspired texture representation. (2012)
Conference Proceeding
HORSBURGH, B., CRAW, S. and MASSIE, S. 2012. Music-inspired texture representation. In Proceedings of the 26th Association for the Advancement of Artificial Intelligence conference on artificial intelligence (AAAI-12), co-located with the 2012 Symposium on educational advances in artificial intelligence (EAAI-12), 22-26 July 2012, Toronto, Canada. Palo Alto: AAAI Press [online], pages 52-58. Available from: https://www.aaai.org/ocs/index.php/AAAI/AAAI12/paper/view/5041

Techniques for music recommendation are increasingly relying on hybrid representations to retrieve new and exciting music. A key component of these representations is musical content, with texture being the most widely used feature. Current technique... Read More about Music-inspired texture representation..

Tool-supported premortems with attack and security patterns. (2012)
Conference Proceeding
FAILY, S., LYLE, J. and PARKIN, S. 2012. Tool-supported premortems with attack and security patterns. In Proceedings of the 1st International workshop on cyberpatterns (Cyberpatterns 2012): unifying design patterns with security, attack and forensic patterns, 9-10 July 2012, Abingdon, UK. Oxford: Oxford Brookes University, pages 10-11.

Security patterns are a useful technique for packaging and applying security knowledge. However, because patterns represent partial knowledge of a problem and solution space, there is little certainty that addressing the consequences of one problem w... Read More about Tool-supported premortems with attack and security patterns..

The webinos project. (2012)
Conference Proceeding
FUHRHOP, C., LYLE, J. and FAILY, S. 2012. The webinos project. In Proceedings of the 21st Annual conference on World Wide Web companion (WWW 2012 Companion), 16-20 April 2012, Lyon, France. New York: ACM [online], pages 263-266. Available from: https://doi.org/10.1145/2187980.2188024

This poster paper describes the webinos project and presents the architecture and security features developed in webinos. It highlights the main objectives and concepts of the project and describes the architecture derived to achive the objectives.

Case-based situation awareness. (2012)
Conference Proceeding
NWIABU, N., ALLISON, I., HOLT, P., LOWIT, P. and OYENEYIN, B. 2012. Case-based situation awareness. In Proceedings of the 2012 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA 2012), 6-8 March 2012, New Orleans, USA. New York: IEEE [online], article number 6188388, pages 22-29. Available from: https://doi.org/10.1109/CogSIMA.2012.6188388

Situation-aware case-based decision support (SACBDS) systems comprise two distinct parts: situation awareness (SA) and case-based reasoning (CBR). The SA part keeps a finite history of the time space information of the domain and uses rules to interp... Read More about Case-based situation awareness..

User interface design for situation-aware decision support systems. (2012)
Conference Proceeding
NWIABU, N., ALLISON, I., HOLT, P., LOWIT, P. and OYENEYIN, B. 2012. User interface design for situation-aware decision support systems. In Proceedings of the 2012 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA 2012), 6-8 March 2012, New Orleans, USA. New York: IEEE [online], article number 6188405, pages 332-339. Available from: https://doi.org/10.1109/CogSIMA.2012.6188405

Information recall about general situations incurs memory and cognitive loads on operators. Recognition of information for specific situations identified with users context and the state of the world is helpful to operators in performing tasks in com... Read More about User interface design for situation-aware decision support systems..

Influences on agile practice tailoring in enterprise software development. (2012)
Conference Proceeding
BASS, J.M. 2012. Influences on agile practice tailoring in enterprise software development. In Proceedings of Agile India 2012, 17-19 February 2012, Bengaluru, India. Los Alamitos: IEEE Computer Society [online], article number 6170020, pages 1-9. Available from: https://doi.org/10.1109/AgileIndia.2012.15

Agile development projects have become a reality in large enterprises using offshore development models. A case study involving seven international companies with offices in Bangalore, India, and London, UK was conducted, including interviews with 19... Read More about Influences on agile practice tailoring in enterprise software development..