Skip to main content

Research Repository

Advanced Search

All Outputs (517)

Assessing professional skills in engineering education. (2011)
Conference Proceeding
CAJANDER, Å., DANIELS, M., MCDERMOTT, R. and VON KONSKY, B.R. 2011. Assessing professional skills in engineering education. In Hamer, J. and Raadt, M. de (eds.) Proceedings of the 13th Australasian computing education conference (ACE 2011), 17-20 January 2011, Perth, Australia. Sydney: Conferences in research and practice in information technology (CRPIT) [online], 114, pages 145-154. Available from: http://crpit.com/Vol114.html.

In this paper, we report the results of introducing a face-to- face Peer Assisted Study Scheme (PASS) and an electronic Peer Assisted Study Scheme (ePASS) into a first year introductory programming unit, core to four undergraduate IT degrees. PASS is... Read More about Assessing professional skills in engineering education..

The secret lives of assumptions: developing and refining assumption personas for secure system design. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. The secret lives of assumptions: developing and refining assumption personas for secure system design. In Bernhaupt, R., Forbrig, P., Gulliksen, J. and Lárusdóttir, M. (eds.) Human-centred software engineering: proceedings of the 3rd International conference on human-centred software engineering (HCSE 2010), 14-15 October 2010, Reykjavik, Iceland. Lecture notes in computer science, 6409. Berlin: Springer [online], pages 111-118. Available from: https://doi.org/10.1007/978-3-642-16488-0_9

Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats endangering it. Often, however, personas need to be partly derived from assump... Read More about The secret lives of assumptions: developing and refining assumption personas for secure system design..

Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis. (2010)
Conference Proceeding
ALLISON, I. 2010. Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis. In Proceedings of the 7th International conference on the quality of information and communications technology (QUATIC 2010), 29 September - 2 October 2010, Porto, Portugal. Los Alamitos: IEEE Computing Society [online], article number 5655656, pages 418-423. Available from: https://doi.org/10.1109/QUATIC.2010.81

Previous work looking at software process improvement (SPI) in small organizations has highlighted difficulties faced by small organizations in implementing SPI successfully, but there is little analysis to understand why this is from an organization... Read More about Organizational factors shaping software process improvement in small-medium sized software teams: a multi-case analysis..

Multi-HDCS: solving DisCSPs with complex local problems cooperatively. (2010)
Conference Proceeding
LEE, D., ARANA, I., AHRIZ, H. and HUI, K. 2009. Multi-HDCS: solving DisCSPs with complex local problems cooperatively. In Huang, X.J., Ghorbani, A.A., Hacid, M.-S. and Yamaguchi, T. (eds.) Proceedings of the 2010 IEEE/WIC/ACM international conference on intelligent agent technology (IAT 2010), co-located with the 2010 IEEE/WIC/ACM international conference on web intelligence (WI 2010), and the joint conference workshops (WI-IAT Workshops 2010), 31 August - 3 September 2010, Toronto, Canada. Los Alamitos: IEEE Computer Society [online], volume 2, article number 5614767, pages 295-302. Available from: https://doi.org/10.1109/WI-IAT.2010.141

We propose Multi-HDCS, a new hybrid approach for solving Distributed CSPs with complex local problems. In Multi-HDCS, each agent concurrently: (i) runs a centralised systematic search for its complex local problem; (ii) participates in a distributed... Read More about Multi-HDCS: solving DisCSPs with complex local problems cooperatively..

To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design. In Proceedings of the 2010 New security paradigms workshop (NSPW 2010), 21-23 September 2010, Concord, USA. New York: ACM [online], pages 73-84. Available from: https://doi.org/10.1145/1900546.1900557

When designing secure systems, we are inundated with an eclectic mix of security and non-security requirements; this makes predicting a successful outcome from the universe of possible security design decisions a difficult problem. We propose augment... Read More about To boldly go where invention isn't secure: applying security entrepreneurship to secure systems design..

Barry is not the weakest link: eliciting secure system requirements with personas. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. Barry is not the weakest link: eliciting secure system requirements with personas. In Proceedings of the 24th International BCS human computer interaction conference (HCI 2010): games are a serious business, 6-10 September 2010, Dundee, UK. Swindon: BCS, pages 124-132. Hosted on ScienceOpen [online]. Available from: https://doi.org/10.14236/ewic/HCI2010.17

Building secure and usable systems means specifying systems for the people using it and the tasks they carry out, rather than vice-versa. User-centred design approaches encourage an early focus on users and their contexts of use, but these need to be... Read More about Barry is not the weakest link: eliciting secure system requirements with personas..

Automatic features characterization from 3d facial images. (2010)
Conference Proceeding
ELYAN, E. and UGAIL, H. 2010. Automatic features characterization from 3d facial images. In Arabnia, H.R., Deligiannidis, L. and Solo, A.M.G. (eds.) Proceedings of the 14th International computer graphics and virtual reality conference (CGVR 2010), 12-15 July 2010, Las Vegas, USA. Georgia, USA: CSREA Press, pages 67-73.

This paper presents a novel and computationally fast method for automatic identification of symmetry profile from 3D facial images. The algorithm is based on the concepts of computational geometry which yield fast and accurate results. In order to de... Read More about Automatic features characterization from 3d facial images..

Developing tools to encourage reflection in first year students blogs. (2010)
Conference Proceeding
MCDERMOTT, R., BRINDLEY, G. and ECCLESTON, G. 2010. Developing tools to encourage reflection in first year students blogs. In Proceedings of the 15th Innovation and technology in computer science education annual conference (ITiCSE '10), 26-30 June 2010, Ankara, Turkey. New York: ACM [online], pages 147-151. Available from: https://doi.org/10.1145/1822090.1822132

The pedagogical basis of a project aimed at encouraging students to engage in reflective activities using blogs to document their learning experiences is described. It also gives some details of the practical implementation of this work. Activities w... Read More about Developing tools to encourage reflection in first year students blogs..

A meta-model for usable secure requirements engineering. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. A meta-model for usable secure requirements engineering. In Proceedings of the 2010 ICSE workshop on software engineering for secure systems (SESS '10): co-located with the 32nd ACM/IEEE international conference on software engineering (ICSE 2010), 2-8 May 2010, Cape Town, South Africa. New York: ACM [online], pages 29-35. Available from: https://doi.org/10.1145/1809100.1809105

There is a growing recognition of the need for secure software engineering approaches addressing both technical and human factors. Existing approaches to secure software engineering focus on the need for technical security to the detriment of usabili... Read More about A meta-model for usable secure requirements engineering..

Analysing and visualising security and usability in IRIS. (2010)
Conference Proceeding
FAILY, S. and FLÉCHAIS, I. 2010. Analysing and visualising security and usability in IRIS. In Proceedings of the 5th International conference on availability, reliability and security (ARES 2010), 15-18 February 2010, Krakow, Poland. Los Alamitos: IEEE Computer Society [online], pages 543-548. Available from: https://doi.org/10.1109/ares.2010.28

Despite a long-standing need to incorporate human factors into security risk analysis, taking a balanced approach to analysing security and usability concerns remains a challenge. Balancing security and usability is difficult due to human biases in s... Read More about Analysing and visualising security and usability in IRIS..

Empathetic consultancy: a reflective approach to ICTD. (2009)
Conference Proceeding
BASS, J.M. 2009. Empathetic consultancy: a reflective approach to ICTD. In Byrne, E., Nicholson, B. and Salem, F. (eds.) Assessing the contribution of ICT to development goals: proceedings of the 10th International conference on social implications of computers in developing countries (ICT4D 2009), 26-28 May 2009, Dubai, UAE. Dubai: International Federation for Information Processing, pages 315-324.

Empathetic Consulting articulates positive characteristics of long-term ICT capacity building engagements using external advisors. Consultants need to demonstrate commitment to capacity building rather than service delivery, flexibility in adaptation... Read More about Empathetic consultancy: a reflective approach to ICTD..

A hybrid approach to solving coarse-grained DisCSPs. (2009)
Conference Proceeding
LEE, D., ARANA, I., AHRIZ, H. and HUI, K.-Y. 2009. A hybrid approach to solving coarse-grained DisCSPs. In Proceedings of the 8th International conference on autonomous agents and multiagent systems (AAMAS 2009), 10-15 May 2009, Budapest, Hungary. Richland, South Carolina: International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS) [online], pages 1235-1236. Available from: http://www.aamas-conference.org/Proceedings/aamas09/pdf/02_Extended_Abstract/C_SP_0555.pdf

A coarse-grained Distributed Constraint Satisfaction Problem (DisCSP) consists of several loosely connected constraint satisfaction subproblems, each assigned to an individual agent. We present Multi-Hyb, a two-phase concurrent hybrid approach for so... Read More about A hybrid approach to solving coarse-grained DisCSPs..

Multi-Hyb: a hybrid algorithm for solving DisCSPs with complex local problems. (2009)
Conference Proceeding
LEE, D., ARANA, I., AHRIZ, H. and HUI, K.-Y. 2009. Multi-Hyb: a hybrid algorithm for solving DisCSPs with complex local problems. In Baeza-Yates, R., Lang, J., Mitra, S., Parsons, S. and Pasi, G. (eds.) Proceedings of the 2009 IEEE/WIC/ACM international conference on intelligent agent technology (IAT 2009), co-located with the 2009 IEEE/WIC/ACM international conference on web intelligence (WI 2009), and the joint conference workshops (WI-IAT Workshops 2009), 15-18 September 2009, Milan, Italy. Los Alamitos: IEEE Computer Society [online], volume 2, article number 5284811, pages 379-382. Available from: https://doi.org/10.1109/WI-IAT.2009.181

A coarse-grained Distributed Constraint Satisfaction Problem (DisCSP) is a constraint problem where several agents, each responsible for solving one part (a complex local problem), cooperate to determine an overall solution. Thus, agents solve the ov... Read More about Multi-Hyb: a hybrid algorithm for solving DisCSPs with complex local problems..

Interactive surface design and manipulation using PDE-method through Autodesk Maya plug-in. (2009)
Conference Proceeding
ELYAN, E. and UGAIL, H. 2009. Interactive surface design and manipulation using PDE-method through Autodesk Maya plug-in. In Ugail, H., Qahwaji, R.S.R, Earnshaw, R.A. and Willis, P.J. (eds.) Proceedings of the 2009 International conference on Cyberworlds (CYBERWORLDS 2009), 7-11 September 2009, Bradford, UK. Los Alamitos: IEEE Computer Society [online], article number 5279653, pages 119-125. Available from: https://doi.org/10.1109/CW.2009.49

This paper aims to propose a method for geometric design, modelling and shape manipulation using minimum input design parameters. Here, we address the method for the construction of 3D geometry based on the use of Elliptic Partial Differential Equati... Read More about Interactive surface design and manipulation using PDE-method through Autodesk Maya plug-in..

Automatic 3D face recognition using Fourier descriptors. (2009)
Conference Proceeding
ELYAN, E. and UGAIL, H. 2009. Automatic 3D face recognition using Fourier descriptors. In Ugail, H., Qahwaji, R.S.R, Earnshaw, R.A. and Willis, P.J. (eds.) Proceedings of the 2009 International conference on Cyberworlds (CYBERWORLDS 2009), 7-11 September 2009, Bradford, UK. Los Alamitos: IEEE Computer Society [online], article number 5279600, pages 246-252. Available from: https://doi.org/10.1109/CW.2009.48

3D face recognition is attracting more attention due to the recent development in 3D facial data acquisition techniques. It is strongly believed that 3D Face recognition systems could overcome the inherent problems of 2D face recognition such as faci... Read More about Automatic 3D face recognition using Fourier descriptors..

Characterizing pure high-order entanglements in lexical semantic spaces via information geometry. (2009)
Conference Proceeding
HOU, Y. and SONG, D. 2009. Characterizing pure high-order entanglements in lexical semantic spaces via information geometry. In Bruza, P., Sofge, D., Lawless, W., Van Rijsbergen, K. and Klusch, M. (eds.) Proceedings of the 3rd International symposium on quantum interaction (QI 2009), 25-27 March 2009, Saarbrücken, Germany. Lecture notes in computer science, 5494. Berlin: Springer [online], pages 237-250. Available from: https://doi.org/10.1007/978-3-642-00834-4_20

An emerging topic in Quantuam Interaction is the use of lexical semantic spaces, as Hilbert spaces, to capture the meaning of words. There has been some initial evidence that the phenomenon of quantum entanglement exists in a semantic space and can p... Read More about Characterizing pure high-order entanglements in lexical semantic spaces via information geometry..

Dimension-specific search for multimedia retrieval. (2009)
Conference Proceeding
HUANG, Z., SHEN, H.T., SONG, D., LI, X. and RUEGER, S. 2009. Dimension-specific search for multimedia retrieval. In Zhou, X., Yokota, H., Deng, K. and Liu, Q. (eds.) Proceedings of the 14th International conference on database systems for advanced applications (DASFAA 2009), 21-23 April 2009, Brisbane, Australia. Lecture notes in computer science, 5463. Berlin: Springer [online], pages 693-698. Available from: https://doi.org/10.1007/978-3-642-00887-0_60

Observing that current Global Similarity Measures (GSM) which average the effect of few significant differences on all dimensions may cause possible performance limitation, we propose the first Dimension-specific Similarity Measure (DSM) to take loca... Read More about Dimension-specific search for multimedia retrieval..

DynABT: dynamic asynchronous backtracking for dynamic DisCSPs. (2008)
Conference Proceeding
OMOMOWO, B., ARANA, I. and AHRIZ, H. 2008. DynABT: dynamic asynchronous backtracking for dynamic DisCSPs. In Dochev, D., Pistore, M. and Traverso, P. (eds.) Proceedings of the 13th International conference on artificial intelligence: methodology, systems and applications (AIMSA 2008), 4-6 September 2008, Varna, Bulgaria. Lecture notes in computer science, 5253. Berlin: Springer [online], pages 285-296. Available from: https://doi.org/10.1007/978-3-540-85776-1_24

Constraint Satisfaction has been widely used to model static combinatorial problems. However, many AI problems are dynamic and take place in a distributed environment, i.e. the problems are distributed over a number of agents and change over time. Dy... Read More about DynABT: dynamic asynchronous backtracking for dynamic DisCSPs..

A hybrid approach to distributed constraint satisfaction. (2008)
Conference Proceeding
LEE, D., ARANA, I., AHRIZ, H. and HUI, K.-Y. 2008. A hybrid approach to distributed constraint satisfaction. In Dochev, D., Pistore, M. and Traverso, P. (eds.) Proceedings of the 13th International conference on artificial intelligence: methodology, systems and applications (AIMSA 2008), 4-6 September 2008, Varna, Bulgaria. Lecture notes in computer science, 5253. Berlin: Springer [online], pages 375-379. Available from: https://doi.org/10.1007/978-3-540-85776-1_33

We present a hybrid approach to Distributed Constraint Satisfaction which combines incomplete, fast, penalty-based local search with complete, slower systematic search. Thus, we propose the hybrid algorithm PenDHyb where the distributed local search... Read More about A hybrid approach to distributed constraint satisfaction..

Facilitating query decomposition in query language modeling by association rule mining using multiple sliding windows. (2008)
Conference Proceeding
SONG, D., HUANG, Q., RUGER, S. and BRUZA, P. 2008. Facilitating query decomposition in query language modeling by association rule mining using multiple sliding windows. In Macdonald, C., Ounis, I., Plachouras, V., Ruthven I. and White, R.W. (eds.) Advances in information retrieval: proceedings of the 30th European conference on information retrieval (IR) research (ECIR 2008), 30 March - 3 April 2008, Glasgow, UK. Lecture notes in computer science, 4956. Berlin: Springer [online], pages 334-345. Available from: https://doi.org/10.1007/978-3-540-78646-7_31

This paper presents a novel framework to further advance the recent trend of using query decomposition and high-order term relationships in query language modeling, which takes into account terms implicitly associated with different subsets of query... Read More about Facilitating query decomposition in query language modeling by association rule mining using multiple sliding windows..