Skip to main content

Research Repository

Advanced Search

All Outputs (78)

A comparative analysis of two globally distributed group projects: a perspective from CSCW/CSCL research. (2015)
Conference Proceeding
MCDERMOTT, R., DANIELS, M., CAJANDER, A., BASS, J. and LALCHANDANI, J.P. 2015. A comparative analysis of two globally distributed group projects: a perspective from CSCW/CSCL research. In Proceedings of the 2015 Frontiers in education conference (FIE 2015): launching a new vision in engineering education, 21-24 October 2015, El Paso, USA. New York: IEEE [online], article number 7344344. Available from: https://doi.org/10.1109/FIE.2015.7344344

Globally distributed group projects are becoming an attractive and increasingly common feature in computer science education. They provide opportunities for students to engage in activities that enhance both their technical skills and wider professio... Read More about A comparative analysis of two globally distributed group projects: a perspective from CSCW/CSCL research..

An energy-efficient full-duplex MAC protocol for distributed wireless networks. (2015)
Journal Article
AL-KADRI, M.O., AIJAZ, A. and NALLANATHAN, A. 2016. An energy-efficient full-duplex MAC protocol for distributed wireless networks. IEEE wireless communications letters [online], 5(1), pages 44-47. Available from: https://doi.org/10.1109/lwc.2015.2492548

In this letter, we present an energy-efficient medium access control (MAC) protocol for distributed full-duplex (FD) wireless network, termed as energy-FDM. The key aspects of the energy-FDM include energy-efficiency, coexistence of distinct types of... Read More about An energy-efficient full-duplex MAC protocol for distributed wireless networks..

Engaging stakeholders during late stage security design with assumption personas. (2015)
Journal Article
FAILY, S. 2015. Engaging stakeholders during late stage security design with assumption personas. Information and computer security [online], 23(4), pages 435-446. Available from: https://doi.org/10.1108/ICS-10-2014-0066

This paper aims to present an approach where assumption personas are used to engage stakeholders in the elicitation and specification of security requirements at a late stage of a system's design. The author has devised an approach for developing ass... Read More about Engaging stakeholders during late stage security design with assumption personas..

Online learning the consensus of multiple correspondences between sets. (2015)
Journal Article
MORENO-GARCÍA, C.F. and SERRATOSA, F. 2015. Online learning the consensus of multiple correspondences between sets. Knowledge-based systems [online], 90, pages 49-57. Available from: https://doi.org/10.1016/j.knosys.2015.09.034

When several subjects solve the assignment problem of two sets, differences on the correspondences computed by these subjects may occur. These differences appear due to several factors. For example, one of the subjects may give more importance to som... Read More about Online learning the consensus of multiple correspondences between sets..

Virtual coaches for mission-based gamified smart communities. (2015)
Presentation / Conference
PIRAS, L., MARCONI, A., VALETTO, G. and PISTORE, M. 2015. Virtual coaches for mission-based gamified smart communities. Presented at Personalization in serious and persuasive games and gamified interactions workshop held at 2nd Computer-human interaction in play symposium 2015 (CHI PLAY 2015), 5-7 October 2015, London, UK [online], paper 10. Available from: http://personalizedgames.tech-experience.at/wp-content/uploads/2015/10/10_Piras-et-al1.pdf

We propose a Virtual Coach for the gamification of participatory applications in complex socio-technical systems like Smart Cities and Smart Communities. In such participatory applications, the user community is an active and essential component. Use... Read More about Virtual coaches for mission-based gamified smart communities..

Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules. (2015)
Journal Article
HERON, M.J. and BELFORD, P. 2015. Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules. ACM SIGCAS computers and society [online], 45(3), pages 438-444. Available from: https://doi.org/10.1145/2874239.2874304

Tools for algorithmically detecting plagiarism have become very popular, but none of these tools offers an effective and reliable way to identify plagiarism within academic software development. As a result, the identification of plagiarism within pr... Read More about Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules..

Evaluating degrees of multitenancy isolation: a case study of cloud-hosted GSD tools. (2015)
Conference Proceeding
OCHEI, L.C., BASS, J.M. and PETROVSKI, A. 2015. Evaluating degrees of multitenancy isolation: a case study of cloud-hosted GSD tools. In Proceedings of the 2015 International conference on cloud and autonomic computing (ICCAC 2015), 21-25 September 2015, Boston, USA. Piscataway: IEEE [online], pages 101-112. Available from: https://doi.org/10.1109/ICCAC.2015.17

Multitenancy is an essential cloud computing property where a single instance of an application serves multiple tenants. Multitenancy introduces significant challenges when deploying application components to the cloud due to the demand for different... Read More about Evaluating degrees of multitenancy isolation: a case study of cloud-hosted GSD tools..

A fine-grained Random Forests using class decomposition: an application to medical diagnosis. (2015)
Journal Article
ELYAN, E. and GABER, M.M. 2015. A fine-grained Random Forests using class decomposition: an application to medical diagnosis. Neural computing and applications [online], 27(8), pages 2279-2288. Available from: https://doi.org/10.1007/s00521-015-2064-z

Class decomposition describes the process of segmenting each class into a number of homogeneous subclasses. This can be naturally achieved through clustering. Utilising class decomposition can provide a number of benefits to supervised learning, espe... Read More about A fine-grained Random Forests using class decomposition: an application to medical diagnosis..

Case-base maintenance with multi-objective evolutionary algorithms. (2015)
Journal Article
LUPIANI, E., MASSIE, S., CRAW, S., JUAREZ, J.M. and PALMA, J. 2016. Case-base maintenance with multi-objective evolutionary algorithms. Journal of intelligent information systems [online], 46(2), pages 259-284. Available from: https://doi.org/10.1007/s10844-015-0378-z

Case-Base Reasoning is a problem-solving methodology that uses old solved problems, called cases, to solve new problems. The case-base is the knowledge source where the cases are stored, and the amount of stored cases is critical to the problem-solvi... Read More about Case-base maintenance with multi-objective evolutionary algorithms..

Understanding the diverse needs of subtitle users in a rapidly evolving media landscape. (2015)
Conference Proceeding
ARMSTRONG, M., BROWN, A., CRABB, M., HUGHES, C.J., JONES, R. and SANDFORD, J. 2015. Understanding the diverse needs of subtitle users in a rapidly evolving media landscape. In Proceedings of the 2015 International broadcasting convention (IBC) (IBC 2015), 10-14 September 2015, Amsterdam, Netherlands. Stevenage: IET [online]. Available from: https://doi.org/10.1049/ibc.2015.0032

Audiences are increasingly using services such as video on demand and the web to watch television programmes. Broadcasters need to make subtitles available across all these new platforms. These platforms also create new design opportunities for subti... Read More about Understanding the diverse needs of subtitle users in a rapidly evolving media landscape..

A case study of Facebook use: outlining a multi-layer strategy for higher education. (2015)
Journal Article
MENZIES, R., PETRIE, K. and ZARB, M. 2017. A case study of Facebook use: outlining a multi-layer strategy for higher education. Education and information technologies [online], 22(1), pages 39-53. Available from: https://doi.org/10.1007/s10639-015-9436-y

Many students are looking to appropriate social networking sites, amongst them, Facebook, to enhance their learning experience. A growing body of literature reports on the motivation of students and staff to engage with Facebook as a learning platfor... Read More about A case study of Facebook use: outlining a multi-layer strategy for higher education..

Designing a context-aware cyber physical system for detecting security threats in motor vehicles. (2015)
Conference Proceeding
PETROVSKI, A., RATTADILOK, P. and PETROVSKI, S. 2015. Designing a context-aware cyber physical system for detecting security threats in motor vehicles. In Proceedings of the 8th International conference on security of information and networks (SIN'15), 8-10 September 2015, Sochi, Russia. New York: ACM [online], pages 267-270. Available from: https://doi.org/10.1145/2799979.2800029

An adaptive multi-tiered framework, which can be utilised for designing a context-aware cyber physical system is proposed in the paper and is applied within the context of providing data availability by monitoring electromagnetic interference. The ad... Read More about Designing a context-aware cyber physical system for detecting security threats in motor vehicles..

Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS). (2015)
Journal Article
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2015. Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS). International journal of intelligent computing research [online], 6(3), pages 601-612. Available from: https://doi.org/10.20533/ijicr.2042.4655.2015.0075

When implementing multitenancy for cloud-hosted applications, one of the main challenges to overcome is how to enable the required degree of isolation between tenants so that the required performance, resource utilization, and access privileges of on... Read More about Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS)..

Combining search strategies for distributed constraint satisfaction. (2015)
Thesis
MAGAJI, A.S-M. 2015. Combining search strategies for distributed constraint satisfaction. Robert Gordon University, PhD thesis.

Many real-life problems such as distributed meeting scheduling, mobile frequency allocation and resource allocation can be solved using multi-agent paradigms. Distributed constraint satisfaction problems (DisCSPs) is a framework for describing such p... Read More about Combining search strategies for distributed constraint satisfaction..

Bring your own heritage: final project report. (2015)
Report
TAIT, E., LAING, R., GRINNALL, A., BURNETT, S., ISAACS, J. and SCOTT, J. 2015. Bring your own heritage: final project report. Aberdeen: Robert Gordon University.

Public libraries have traditionally played a role in the acquisition and curation of local studies collections, and cultural heritage is recognised as a core area of activity for libraries aiming to increase patron numbers (Danish Agency for Librarie... Read More about Bring your own heritage: final project report..

A practitioner reflection on teaching computer ethics with case studies and psychology. (2015)
Journal Article
HERON, M. and BELFORD, P. 2015. A practitioner reflection on teaching computer ethics with case studies and psychology. Brookes ejournal of learning and teaching [online], 7(1). Available from: http://bejlt.brookes.ac.uk/paper/a-practitioner-reflection-on-teaching-computer-ethics-with-case-studies-and-psychology/

Three issues complicate teaching computer ethics in an undergraduate course. The first relates to the often technically intensive knowledge required to fully understand the complexity of real world examples. The second relates to the pedagogic expect... Read More about A practitioner reflection on teaching computer ethics with case studies and psychology..

Power and perception in the scandal in academia. (2015)
Journal Article
HERON, M.J. and BELFORD, P. 2015. Power and perception in the scandal in academia. ACM SIGCAS computers and society [online], 45(2), pages 11-19. Available from: https://doi.org/10.1145/2809957.2809961

The Scandal in Academia is a large-scale fictional ethical case study of around 17,000 words and fourteen separate revelations. They are delivered as newspaper extracts from a newspaper reporting on an ongoing crisis at a Scottish educational institu... Read More about Power and perception in the scandal in academia..

Music recommenders: user evaluation without real users? (2015)
Conference Proceeding
CRAW, S., HORSBURGH, B. and MASSIE, S. 2015. Music recommenders: user evaluation without real users? In Yang, Q. and Woolridge, M. (eds.) Proceedings of the 24th International joint conference on artificial intelligence (IJCAI-15), 25-31 July 2015, Buenos Aires, Argentina. Palo Alto: AAAI Press [online], pages 1749-1755. Available from: https://www.ijcai.org/Proceedings/15/Papers/249.pdf

Good music recommenders should not only suggest quality recommendations, but should also allow users to discover new/niche music. User studies capture explicit feedback on recommendation quality and novelty, but can be expensive, and may have difficu... Read More about Music recommenders: user evaluation without real users?.

Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. (2015)
Journal Article
KALUTARAGE, H.K., SHAIKH, S.A., WICKRAMASINGHE, I.P., ZHOU, Q. and JAMES, A.E. 2015. Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. Computers and electrical engineering [online], 47, pages 327-344. Available from: https://doi.org/10.1016/j.compeleceng.2015.07.007

Stealthy attackers move patiently through computer networks – taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a chall... Read More about Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks..

Virtual teams and employability in global software engineering education. (2015)
Conference Proceeding
BASS, J.M., MCDERMOTT, R. and LALCHANDANI, J.T. 2015. Virtual teams and employability in global software engineering education. In Proceedings of the 10th IEEE international conference on global software engineering (ICGSE 2015), 13-16 July 2015, Ciudad Real, Spain. Piscataway: IEEE [online], article number 7224489, pages 115-124. Available from: https://doi.org/10.1109/ICGSE.2015.21

Universities face many challenges when creating opportunities for student experiences of global software engineering. We provide a model for introducing global software engineering into the computing curriculum. Our model is based on a three year col... Read More about Virtual teams and employability in global software engineering education..