Skip to main content

Research Repository

Advanced Search

All Outputs (393)

A practitioner reflection on teaching computer ethics with case studies and psychology. (2015)
Journal Article
HERON, M. and BELFORD, P. 2015. A practitioner reflection on teaching computer ethics with case studies and psychology. Brookes ejournal of learning and teaching [online], 7(1). Available from: http://bejlt.brookes.ac.uk/paper/a-practitioner-reflection-on-teaching-computer-ethics-with-case-studies-and-psychology/

Three issues complicate teaching computer ethics in an undergraduate course. The first relates to the often technically intensive knowledge required to fully understand the complexity of real world examples. The second relates to the pedagogic expect... Read More about A practitioner reflection on teaching computer ethics with case studies and psychology..

Power and perception in the scandal in academia. (2015)
Journal Article
HERON, M.J. and BELFORD, P. 2015. Power and perception in the scandal in academia. ACM SIGCAS computers and society [online], 45(2), pages 11-19. Available from: https://doi.org/10.1145/2809957.2809961

The Scandal in Academia is a large-scale fictional ethical case study of around 17,000 words and fourteen separate revelations. They are delivered as newspaper extracts from a newspaper reporting on an ongoing crisis at a Scottish educational institu... Read More about Power and perception in the scandal in academia..

Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. (2015)
Journal Article
KALUTARAGE, H.K., SHAIKH, S.A., WICKRAMASINGHE, I.P., ZHOU, Q. and JAMES, A.E. 2015. Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. Computers and electrical engineering [online], 47, pages 327-344. Available from: https://doi.org/10.1016/j.compeleceng.2015.07.007

Stealthy attackers move patiently through computer networks – taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a chall... Read More about Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks..

Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm. (2015)
Journal Article
BANO, S. and RAO, K.R. 2015. Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm. International journal of electrical and computer engineering [online], 5(3), pages 483-490. Available from: http://doi.org/10.11591/ijece.v5i3.pp483-490

In this paper we propose a method that aims to reduce processing overheads by avoiding the need to choose between natural language processing tools such as part-of-speech taggers and parsers. Moreover, we suggest a structure for the immediate creatio... Read More about Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm..

Cross-layer topology design for network coding based wireless multicasting. (2015)
Journal Article
VIEN, Q.-T., TU, W., NGUYEN, H.X. and TRESTIAN, R. 2015. Cross-layer topology design for network coding based wireless multicasting. Computer networks [online], 88, pages 27-39. Available from: https://doi.org/10.1016/j.comnet.2015.06.005

This paper considers wireless multicast networks where network coding (NC) is applied to improve network throughput. A novel joint topology and cross-layer design is proposed to maximise the network throughput subject to various quality-of-service co... Read More about Cross-layer topology design for network coding based wireless multicasting..

Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening. (2015)
Journal Article
RAHIM, S.S., JAYNE, C., PALADE, V. and SHUTTLEWORTH, J. 2016. Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening. Neural computing and applications [online], 27(5), pages 1149-1164. Available from: https://doi.org/10.1007/s00521-015-1929-5.

Regular eye screening is essential for the early detection and treatment of the diabetic retinopathy. This paper presents a novel automatic screening system for diabetic retinopathy that focuses on the detection of the earliest visible signs of retin... Read More about Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening..

Performance comparison of generational and steady-state asynchronous multi-objective evolutionary algorithms for computationally-intensive problems. (2015)
Journal Article
ZAVOIANU, A.-C., LUGHOFER, E., KOPPELSTÄTTER, W., WEIDENHOLZER, G., AMRHEIN, W. and KLEMENT, E.P. 2015. Performance comparison of generational and steady-state asynchronous multi-objective evolutionary algorithms for computationally-intensive problems. Knowledge-based systems [online], 87, pages 47-60. Available from: https://doi.org/10.1016/j.knosys.2015.05.029

In the last two decades, multi-objective evolutionary algorithms (MOEAs) have become ever more used in scientific and industrial decision support and decision making contexts the require an a posteriori articulation of preference. The present work is... Read More about Performance comparison of generational and steady-state asynchronous multi-objective evolutionary algorithms for computationally-intensive problems..

A role allocation model for IT controls in a cloud environment. (2015)
Journal Article
KHAN, S., NICHO, M. and COOPER, G. 2015. A role allocation model for IT controls in a cloud environment. Review of business information systems [online], 19(1), pages 5-14. Available from: https://doi.org/10.19030/rbis.v19i1.9253

The rapid adoption of cloud computing by organizations, along with the need to comply with relevant IT governance (ITG) controls, has increased the complexity of governance in the cloud. This transition from a classical data center to a virtualized d... Read More about A role allocation model for IT controls in a cloud environment..

Correspondence consensus of two sets of correspondences through optimisation functions. (2015)
Journal Article
MORENO-GARCÍA, C.F. and SERRATOSA, F. 2017. Correspondence consensus of two sets of correspondences through optimisation functions. Pattern analysis and applications [online], 20(1), pages 201-213. Available from: https://doi.org/10.1007/s10044-015-0486-y

We present a consensus method which, given the two correspondences between sets of elements generated by separate entities, enounces a final correspondence consensus considering the existence of outliers. Our method is based on an optimisation techni... Read More about Correspondence consensus of two sets of correspondences through optimisation functions..

Context rank based hierarchical clustering algorithm on medical databases (CRBHCA). (2015)
Journal Article
BANO, S. and RAO, K.R. 2015. Context rank based hierarchical clustering algorithm on medical databases (CRBHCA). Journal of theoretical and applied information technology [online], 75(2), pages 199-211. Available from: https://www.jatit.org/volumes/Vol75No2/10Vol75No2.pdf

In this paper we propose a method that aims to reduce processing overheads by avoiding the need to choose between natural language processing tools such as part-of-speech taggers and parsers. Moreover, we suggest a structure for the immediate creatio... Read More about Context rank based hierarchical clustering algorithm on medical databases (CRBHCA)..

Early fusion and query modification in their dual late fusion forms. (2015)
Journal Article
KALICIAK, L., MYRHAUG, H., GOKER, A. and SONG, D. 2015. Early fusion and query modification in their dual late fusion forms. Journal of advances in information fusion [online], 10(2), pages 183-198. Available from: http://isif.org/journal/10/2/1557-6418

In this paper, we prove that specific widely used models in Content-based Image Retrieval for information fusion are interchangeable. In addition, we show that even advanced, non-standard fusion strategies can be represented in dual forms. These mode... Read More about Early fusion and query modification in their dual late fusion forms..

An analysis of age, technology usage, and cognitive characteristics within information retrieval tasks. (2015)
Journal Article
CRABB, M. and HANSON, V.L. 2016. An analysis of age, technology usage, and cognitive characteristics within information retrieval tasks. ACM transactions on accessible computing (TACCESS) [online], 8(3): papers from the proceedings of the 16th International Association of Computing Machinery Special Interest Group on Accessibility (ACM SIGACCESS) conference on computers and accessibility (ASSETS 2014), 20-22 October 2014, Rochester, USA, article number 10. Available from: https://doi.org/10.1145/2856046

This work presents two studies that aim to discover whether age can be used as a suitable metric for distinguishing performance between individuals or if other factors can provide greater insight. Information retrieval tasks are used to test the perf... Read More about An analysis of age, technology usage, and cognitive characteristics within information retrieval tasks..

Breaking the communication barrier: guidelines to aid communication within pair programming. (2015)
Journal Article
ZARB, M. and HUGHES, J. 2015. Breaking the communication barrier: guidelines to aid communication within pair programming. Computer science education [online], 25(2), pages 120-151. Available from: https://doi.org/10.1080/08993408.2015.1033125

Pair programming is a software development technique with many cited benefits in learning and teaching. However, it is reported that novice programmers find several barriers to pairing up, typically due to the added communication that is required of... Read More about Breaking the communication barrier: guidelines to aid communication within pair programming..

On the relationship between variational level set-based and SOM-based active contours. (2015)
Journal Article
ABDELSAMEA, M.M., GNECCO, G., GABER, M.M. and ELYAN, E. 2015. On the relationship between variational level set-based and SOM-based active contours. Computational intelligence and neuroscience [online], 2015, article ID 109029. Available from:https://doi.org/10.1155/2015/109029

Most Active Contour Models (ACMs) deal with the image segmentation problem as a functional optimization problem, as they work on dividing an image into several regions by optimizing a suitable functional. Among ACMs, variational level set methods hav... Read More about On the relationship between variational level set-based and SOM-based active contours..

Guest editorial preface: special issue on Evolving security and privacy requirements engineering (ESPRE'14) 2014, Sweden. (2015)
Journal Article
BECKERS, K., FAILY, S., LEE, S.-W. and MEAD, N. 2015. Guest editorial preface: special issue on Evolving security and privacy requirements engineering (ESPRE'14) 2014, Sweden. International journal of secure software engineering [online], 6(1), pages iv-vii. Available from: https://bit.ly/3pGkcZD

At the Evolving Security and Privacy Requirements Engineering (ESPRE) workshop, practitioners and researchers interested in security and privacy requirements gather to discuss significant issues in the field. In particular, ESPRE participants probe t... Read More about Guest editorial preface: special issue on Evolving security and privacy requirements engineering (ESPRE'14) 2014, Sweden..

The Internet of Things: the future or the end of mechatronics. (2015)
Journal Article
BRADLEY, D., RUSSELL, D., FERGUSON, I., ISAACS, J., MACLEOD, A. and WHITE, R. 2015. The Internet of Things: the future or the end of mechatronics. Mechatronics [online], 27, pages 57-74. Available from: https://doi.org/10.1016/j.mechatronics.2015.02.005

The advent and increasing implementation of user configured and user oriented systems structured around the use of cloud configured information and the Internet of Things is presenting a new range and class of challenges to the underlying concepts of... Read More about The Internet of Things: the future or the end of mechatronics..

Integer linear programming for the Bayesian network structure learning problem. (2015)
Journal Article
BARTLETT, M. and CUSSENS, J. 2017. Integer linear programming for the Bayesian network structure learning problem. Artificial intelligence [online], 244, pages 258-271. Available from: https://doi.org/10.1016/j.artint.2015.03.003

Bayesian networks are a commonly used method of representing conditional probability relationships between a set of variables in the form of a directed acyclic graph (DAG). Determination of the DAG which best explains observed data is an NP-hard prob... Read More about Integer linear programming for the Bayesian network structure learning problem..

All of your co-workers are gone: story, substance, and the empathic puzzler. (2015)
Journal Article
HERON, M.J. and BELFORD, P.H. 2015. All of your co-workers are gone: story, substance, and the empathic puzzler. Journal of games criticism [online], 2(1). Available at: http://www.gamescriticism.org/articles/heronbelford-2-1

Narrative games such as The Walking Dead, Gone Home, Dear Esther and The Stanley Parable are difficult to situate into the general framework of game genres that are popularly, albeit informally, understood by mainstream audiences. They are too unabas... Read More about All of your co-workers are gone: story, substance, and the empathic puzzler..

Multiple case study approach to identify aggravating variables of insider threats in information systems. (2014)
Journal Article
NICHO, M. and KAMOUN, F. 2014. Multiple case study approach to identify aggravating variables of insider threats in information systems. Communications of the association for information systems [online], 35, Article 18. Available from: http://aisel.aisnet.org/cais/vol35/iss1/18

Malicious insiders present a serious threat to information systems due to privilege of access, knowledge of internal computer resources, and potential threats on the part of disgruntled employees or insiders collaborating with external cybercriminals... Read More about Multiple case study approach to identify aggravating variables of insider threats in information systems..

Fast and efficient palmprint identification of a small sample within a full image. (2014)
Journal Article
MORENO-GARCIA, C.F. and SERRATOSA, F. 2014. Fast and efficient palmprint identification of a small sample within a full image. Computación y sistemas [online], 18(4), pages 683-691. Available from: https://doi.org/10.13053/CyS-18-4-2059

In some fields like forensic research, experts demand that a found sample of an individual can be matched with its full counterpart contained in a database. The found sample may present several characteristics that make this matching more difficult t... Read More about Fast and efficient palmprint identification of a small sample within a full image..