Skip to main content

Research Repository

Advanced Search

All Outputs (33)

Migrating software products to the cloud: an adaptive STS perspective. (2013)
Journal Article
WERFS, M., BAXTER, G., ALLISON, I. K. and SOMMERVILLE, I. 2013. Migrating software products to the cloud: an adaptive STS perspective. Journal of international technology and information management [online], 22(3), pp. 37-54. Available from: https://scholarworks.lib.csusb.edu/jitim/vol22/iss3/3

Cloud computing, as a disruptive innovation, has the potential to adversely affect companies. The effects can be particularly extreme for small and medium sized enterprises (SMEs). Subsequently, considerations of organisational resilience should be m... Read More about Migrating software products to the cloud: an adaptive STS perspective..

Personal PKI for the smart device era. (2013)
Conference Proceeding
LYLE, J., PAVERD, A., KING-LACROIX, J., ATZENI, A., VIRJI, H., FLÉCHAIS, I. and FAILY, S. 2013. Personal PKI for the smart device era. In De Capitani di Vimercati, S. and Mitchell, C. (eds.) Public key infrastructures, services and applications: revised selected papers from the 9th European workshop on public key infrastructures, services and applications (EuroPKI 2012), 13-14 September 2012, Pisa, Italy. Lecture notes in computer science, 7868. Heidelberg: Springer [online], pages 69-84. Available from: https://doi.org/10.1007/978-3-642-40012-4_5

As people use an increasing number of smart devices for their everyday computing, it is surprising that these powerful, internet-enabled devices are rarely connected together to create personal networks. The webinos project is an attempt to make this... Read More about Personal PKI for the smart device era..

Continuous integration for web-based software infrastructures: lessons learned on the webinos project. (2013)
Conference Proceeding
SU, T., LYLE, J., ATZENI, A., FAILY, S., VIRJI, H., NTANOS, C. and BOTSIKAS, C. 2013. Continuous integration for web-based software infrastructures: lessons learned on the webinos project. In Bertacco, V. and Legay, A. (eds.) Hardware and software: verification and testing: proceedings of the 9th International Haifa verification conference (HVC 2013), 5-7 November 2013, Haifa, Israel. Lecture notes in computer science, 8244. Cham: Springer [online], pages 145-150. Available from: https://doi.org/10.1007/978-3-319-03077-7_10

Testing web-based software infrastructures is challenging. The need to interact with different services running on different devices, with different expectations for security and privacy contributes not only to the complexity of the infrastructure, b... Read More about Continuous integration for web-based software infrastructures: lessons learned on the webinos project..

Content based video retrieval via spatial-temporal information discovery. (2013)
Thesis
WANG, L. 2013. Content based video retrieval via spatial-temporal information discovery. Robert Gordon University, PhD thesis.

Content based video retrieval (CBVR) has been strongly motivated by a variety of realworld applications. Most state-of-the-art CBVR systems are built based on Bag-of-visual- Words (BovW) framework for visual resources representation and access. The f... Read More about Content based video retrieval via spatial-temporal information discovery..

The asset replacement problem state of the art. (2013)
Book Chapter
ANSARIPOOR, A.H., OLIVEIRA, F.S. and LIRET, A. 2013. The asset replacement problem state of the art. In Owusu, G., O'Brien, P., McCall, J. and Doherty, N.F. (eds.) Transforming field and service operations: methodologies for successful technology-driven business transformation. Berlin: Springer [online], chapter 14, pages 213-233. Available from: https://doi.org/10.1007/978-3-642-44970-3_14

This book chapter outlines the different modelling approaches for realising sustainable operations of asset replacement and studying the impact of the economic life, the repair-cost limit and comprehensive cost minimisation models. In particular it a... Read More about The asset replacement problem state of the art..

Exploring aspects of cell intelligence with artificial reaction networks. (2013)
Journal Article
GERRARD, C. E., MCCALL, J., COGHILL, G. M. and MACLEOD, C. 2014. Exploring aspects of cell intelligence with artificial reaction networks. Soft computing [online], 18(10), pages 1899-1912. Available from: https://doi.org/10.1007/s00500-013-1174-8

The Artificial Reaction Network (ARN) is a Cell Signalling Network inspired connectionist representation belonging to the branch of A-Life known as Artificial Chemistry. Its purpose is to represent chemical circuitry and to explore computational prop... Read More about Exploring aspects of cell intelligence with artificial reaction networks..

Anomaly monitoring framework based on intelligent data analysis. (2013)
Conference Proceeding
RATTADILOK, P., PETROVSKI, A. and PETROVSKI, S. 2013. Anomaly monitoring framework based on intelligent data analysis. In Yin, H., Tang, K., Gao, Y., Klawonn, F., Lee, M., Weise, T., Li, B. and Yao, X. (eds.) Proceedings of the 14th International conference on intelligent data engineering and automated learning (IDEAL 2013), 20-23 October 2013, Hefei, China. Lecture notes in computer science, 8206. Berlin: Springer [online], pages 134-141. Available from: https://doi.org/10.1007/978-3-642-41278-3_17

Real-time data processing has become an increasingly important challenge as the need for faster analysis of big data widely manifests itself. In this research, several Computational Intelligence methods have been applied for identifying possible anom... Read More about Anomaly monitoring framework based on intelligent data analysis..

Contemplations on results from investigating the personal epistemology of computing students. (2013)
Conference Proceeding
MCDERMOTT, R., PIRIE, I., LAXER, C., CAJANDER, A. and DANIELS, M. 2013. Contemplations on results from investigating the personal epistemology of computing students. In Proceedings of the 2013 Frontiers in education conference (FIE 2013): energizing the future, 23-26 October 2013, Oklahoma City, USA. Piscataway: IEEE [online], article number 6684941, pages 825-831. Available from: https://doi.org/10.1109/FIE.2013.6684941

'Personal Epistemology' is the analysis of the ways in which an individual perceives what constitutes knowledge, its boundaries, how it is justified, and how it is related to learning. While investigation of metacognitive strategies used by students... Read More about Contemplations on results from investigating the personal epistemology of computing students..

An investigation into the cognitive effects of instructional interface visualisations. (2013)
Thesis
AKINLOFA, O.R. 2013. An investigation into the cognitive effects of instructional interface visualisations. Robert Gordon University, PhD thesis.

An investigation is conducted into the cognitive effects of using different computer based instructions media in acquisition of specific novel human skills. With recent rapid advances in computing and multimedia instructional delivery, several contem... Read More about An investigation into the cognitive effects of instructional interface visualisations..

You have e-mail, what happens next? Tracking the eyes for genre. (2013)
Journal Article
CLARK, M., RUTHVEN, I., HOLT, P.O'B., SONG, D. and WATT, S. 2014. You have e-mail, what happens next? Tracking the eyes for genre. Information processing and management [online], 50(1), pages 175-198. Available: https://doi.org/10.1016/j.ipm.2013.08.005

This paper reports on an approach to the analysis of form (layout and formatting) during genre recognition recorded using eye tracking. The researchers focused on eight different types of e-mail, such as calls for papers, newsletters and spam, which... Read More about You have e-mail, what happens next? Tracking the eyes for genre..

Combining biochemical network motifs within an ARN-agent control system. (2013)
Conference Proceeding
GERRARD, C.E., MCCALL, J., MACLEOD, C. and COGHILL, G.M. 2013. Combining biochemical network motifs within an ARN-agent control system. In Jin, Y. and Thomas, S.A. (eds.) Proceedings of the 13th UK workshop on computational intelligence (UKCI 2013), 9-11 September 2013, Guildford, UK. New York: IEEE [online], article number 6651281, pages 8-15. Available from: https://doi.org/10.1109/UKCI.2013.6651281

The Artificial Reaction Network (ARN) is an Artificial Chemistry representation inspired by cell signaling networks. The ARN has previously been applied to the simulation of the chemotaxis pathway of Escherichia coli and to the control of limbed robo... Read More about Combining biochemical network motifs within an ARN-agent control system..

Partial structure learning by subset Walsh transform. (2013)
Conference Proceeding
CHRISTIE, L.A., LONIE, D.P. and MCCALL, J.A.W. 2013. Partial structure learning by subset Walsh transform. In Jin, Y. and Thomas, S.A. (eds.) Proceedings of the 13th UK workshop on computational intelligence (UKCI 2013), 9-11 September 2013, Guildford, UK. New York: IEEE [online], article number 6651297, pages 128-135. Available from: https://doi.org/10.1109/UKCI.2013.6651297

Estimation of distribution algorithms (EDAs) use structure learning to build a statistical model of good solutions discovered so far, in an effort to discover better solutions. The non-zero coefficients of the Walsh transform produce a hypergraph rep... Read More about Partial structure learning by subset Walsh transform..

Security lessons learned building concept apps for webinos. (2013)
Presentation / Conference
FAILY, S. and LYLE, J. 2013. Security lessons learned building concept apps for webinos. Presented at the Human aspects in mobile apps engineering workshop (HAMAE 2013), part of the 27th International BCS human computer interaction conference (HCI 2013): the Internet of Things, 9 September 2013, London, UK.

Concept applications provide a means for tackling security infrastructure problems. Not only do they provide feedback to infrastructure design, they can also inform subsequent research activities. However, to directly influence the architectural desi... Read More about Security lessons learned building concept apps for webinos..

Agile method tailoring in distributed enterprises: product owner teams. (2013)
Conference Proceeding
BASS, J.M. 2013. Agile method tailoring in distributed enterprises: product owner teams. In Proceedings of the 8th IEEE international conference on global software engineering (ICGSE 2013), 26-29 August 2013, Bari, Italy. Los Alamitos: IEEE Computer Society [online], article number 6613080, pages 154-163. Available from: https://doi.org/10.1109/ICGSE.2013.27

This paper explores practitioner descriptions of agile method tailoring in large-scale offshore or outsourced enterprise projects. Specifically, tailoring of the product owner role is discussed. The product owner identifies and prioritizes customer r... Read More about Agile method tailoring in distributed enterprises: product owner teams..

Integrating content and semantic representations for music recommendation. (2013)
Thesis
HORSBURGH, B. 2013. Integrating content and semantic representations for music recommendation. Robert Gordon University, PhD thesis.

Music recommender systems are used by millions of people every day to discover new and exciting music. Central to making recommendations is the representation of each track, which may be used to calculate similarity. Content representations capture t... Read More about Integrating content and semantic representations for music recommendation..

Hybrid models for combination of visual and textual features in context-based image retrieval. (2013)
Thesis
KALICIAK, L. 2013. Hybrid models for combination of visual and textual features in context-based image retrieval. Robert Gordon University, PhD thesis.

Visual Information Retrieval poses a challenge to intelligent information search systems. This is due to the semantic gap, the difference between human perception (information needs) and the machine representation of multimedia objects. Most existing... Read More about Hybrid models for combination of visual and textual features in context-based image retrieval..

Inferential measurements for situation awareness: enhancing traffic surveillance by machine learning. (2013)
Conference Proceeding
RATTADILOK, P. and PETROVSKI, A. 2013. Inferential measurements for situation awareness: enhancing traffic surveillance by machine learning. In Proceedings of the 2013 IEEE international conference on computational intelligence and virtual environments for measurement systems and applications (CIVEMSA 2013), 15-17 July 2013, Milan, Italy. New York: IEEE [online], article number 6617402, pages 93-98. Available from: https://doi.org/10.1109/CIVEMSA.2013.6617402

The paper proposes a generic approach to building inferential measurement systems. The large amount of data needed to be acquired and processed by such systems necessitates the use of machine learning techniques. In this study, an inferential measure... Read More about Inferential measurements for situation awareness: enhancing traffic surveillance by machine learning..

A multi-objective evolutionary algorithm fitness function for case-base maintenance. (2013)
Conference Proceeding
LUPIANI, E., CRAW, S., MASSIE, S., JUAREZ, J.M. and PALMA, J.T. 2013. A multi-objective evolutionary algorithm fitness function for case-base maintenance. In Delany, S.J. and Ontañón, S. (eds.) Case-based reasoning research and development: proceedings of the 21st International conference on case-based reasoning (ICCBR 2013), 8-11 July 2013, Saratoga Springs, USA. Lecture notes in computer science, 7969. Berlin: Springer [online], pages 218-232. Available from: https://doi.org/10.1007/978-3-642-39056-2_16

Case-Base Maintenance (CBM) has two important goals. On the one hand, it aims to reduce the size of the case-base. On the other hand, it has to improve the accuracy of the CBR system. CBM can be represented as a multi-objective optimization problem t... Read More about A multi-objective evolutionary algorithm fitness function for case-base maintenance..

Security patterns considered harmful? (2013)
Conference Proceeding
FAILY, S. 2013. Security patterns considered harmful? In Proceedings of the 2nd International workshop on cyberpatterns (Cyberpatterns 2013): unifying design patterns with security, attack and forensic patterns, 8-9 July 2013, Abingdon, UK. Oxford: Oxford Brookes University, pages 108-109.

While a useful source of repeatable security knowledge, ambiguity about what security patterns are and how they might be applied call into question their reliability as a design tool. To provoke discussion about their usefulness, this paper claims th... Read More about Security patterns considered harmful?.

Proceedings of the Workshop on web applications and secure hardware (WASH 2013). (2013)
Conference Proceeding
LYLE, J., FAILY, S. and WINANDY, M. (eds.) 2013. Proceedings of the Workshop on web applications and secure hardware (WASH 2013), co-located with the 6th International conference on trust and trustworthy computing (TRUST 2013), 20 June 2013, London, UK. CEUR workshop proceedings, 1011. Aachen: CEUR-WS [online]. Available from: http://ceur-ws.org/Vol-1011/

Web browsers are becoming the platform of choice for applications that need to work across a wide range of different devices, including mobile phones, tablets, PCs, TVs and in-car systems. However, for web applications which require a higher level of... Read More about Proceedings of the Workshop on web applications and secure hardware (WASH 2013)..