Skip to main content

Research Repository

Advanced Search

All Outputs (78)

Generating easy and hard problems using the proximate optimality principle. [Dataset] (2015)
Dataset
MCCALL, J.A.W., CHRISTIE, L.A. and BROWNLEE, A.E.I. 2015. Generating easy and hard problems using the proximate optimality principle. [Dataset]

These data were gathered to investigate the hypothesis that coherent functions will be easy and anti-coherent functions will be hard for a hillclimber. We generated 10 coherent functions for each length on bit-strings of length 6-100 and the same num... Read More about Generating easy and hard problems using the proximate optimality principle. [Dataset].

Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS). (2015)
Conference Proceeding
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2015. Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS). In Proceedings of the 2015 International Information Society conference 2015 (i-Society 2015), 9-11 November 2015, London, UK. Piscataway: IEEE [online], pages 59-66. Available from: https://doi.org/10.1109/i-Society.2015.7366859

One of the key concerns of implementing multitenancy (i.e., serving multiple tenants with a single instance of an application) on the cloud is how to enable the required degree of isolation between tenants, so that the required performance of one ten... Read More about Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS)..

Graph based gene/protein prediction and clustering over uncertain medical databases. (2015)
Journal Article
BANO, S. and RAO, K.R. 2015. Graph based gene/protein prediction and clustering over uncertain medical databases. Journal of theoretical and applied information technology [online], 82(3), pages 347-352. Available from: https://www.jatit.org/volumes/Vol82No3/2Vol82No3.pdf

Clustering over protein or gene data is now a popular issue in biomedical databases. In general, large sets of gene tags are clustered using high computation techniques over gene or protein distributed data. Most of the traditional clustering techniq... Read More about Graph based gene/protein prediction and clustering over uncertain medical databases..

Usability and security by design: a case study in research and development. (2015)
Conference Proceeding
FAILY, S., LYLE, J., FLÉCHAIS, I. and SIMPSON, A. 2015. Usability and security by design: a case study in research and development. In Proceedings of the 2015 Workshop on useable security (USEC 2015), co-located with the 2015 Network and distributed system security symposium (NDSS 2015), 8 February 2015, San Diego, USA. Reston: Internet Society [online]. Available from: https://doi.org/10.14722/usec.2015.23012

There is ongoing interest in utilising user experiences associated with security and privacy to better inform system design and development. However, there are few studies demonstrating how, together, security and usability design techniques can help... Read More about Usability and security by design: a case study in research and development..

Digital rights management: the four perspectives of developers, distributors, users and lawyers. (2015)
Conference Proceeding
MCDONALD, N., FAILY, S., FAVALE, M. and GATZIDIS, C. 2015. Digital rights management: the four perspectives of developers, distributors, users and lawyers. In Furnell, S.M. and Clarke, N.L. (eds.) Proceedings of the 9th International symposium on human aspects of information security and assurance (HAISA 2015), 1-3 July 2015, Mytilene, Greece. Plymouth: Plymouth University, pages 276-285.

Digital Rights Management (DRM) refers to a collection of security mechanisms that are widely deployed on a number of copyright-protected digital assets. However, despite the existence of a number of studies of the technical architectures of rights m... Read More about Digital rights management: the four perspectives of developers, distributors, users and lawyers..

Ethical dilemmas and dimensions in penetration testing. (2015)
Conference Proceeding
FAILY, S., MCALANEY, J. and IACOB, C. 2015. Ethical dilemmas and dimensions in penetration testing. In Furnell, S.M. and Clarke, N.L. (eds.) Proceedings of the 9th International symposium on human aspects of information security and assurance (HAISA 2015), 1-3 July 2015, Mytilene, Greece. Plymouth: Plymouth University, pages 233-242.

Penetration testers are required to attack systems to evaluate their security, but without engaging in unethical behaviour while doing so. Despite work on hacker values and studies into security practice, there is little literature devoted to the eth... Read More about Ethical dilemmas and dimensions in penetration testing..

Using gamification to incentivize sustainable urban mobility. (2015)
Conference Proceeding
KAZHAMIAKIN, R., MARCONI, A., PERILLO, M., PISTORE, M., VALETTO, G., PIRAS, L., AVESANI, F. and PERRI, N. 2015. Using gamification to incentivize sustainable urban mobility. In Proceedings of 1st Institute of Electrical and Electronics Engineers (IEEE) International smart cities conference 2015 (ISC2-2015), 25-28 October 2015, Guadalajara, Mexico. Piscataway: IEEE [online], article ID 7366196. Available from: https://doi.org/10.1109/ISC2.2015.7366196

Sustainable urban mobility is an important dimension in a Smart City, and one of the key issues for city sustainability. However, innovative and often costly mobility policies and solutions introduced by cities are liable to fail, if not combined wit... Read More about Using gamification to incentivize sustainable urban mobility..

Mitigating circumstances in cybercrime: a position paper. (2015)
Conference Proceeding
ALI, R., MCALANEY, J., FAILY, S., PHALP, K. and KATOS, V. 2015. Mitigating circumstances in cybercrime: a position paper. In Wu, Y., Min, G., Georgalas, N., Hu, J., Atzori, L., Jin, X., Jarvis, S., Liu, L. and Agüero Calvo, R. (eds.) CIT/IUCC/DASC/PICom 2015: proceedings of the 3rd International workshop on cybercrimes and emerging web environments (CEWE 2015), part of the 13th IEEE international conference on dependable, autonomic and secure computing (DASC 2015), co-located with the 15th IEEE international conference on computer and information technology (CIT 2015), the 14th IEEE international conference on ubiquitous computing and communications (IUCC 2015), and the 13th IEEE international conference on pervasive intelligence and computing (PICom 2015), 26-28 October 2015, Liverpool, UK. Los Alamitos: IEEE Computer Society [online], pages 1972-1976. Available from: https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.292

This paper argues the need for considering mitigating circumstances in cybercrime. Mitigating circumstances are conditions which moderate the culpability of an offender of a committed offence. Our argument is based on several observations. The cybers... Read More about Mitigating circumstances in cybercrime: a position paper..

Viewing art on a tablet computer: A well-being intervention for people with dementia and their caregivers. (2015)
Journal Article
TYACK, C., CAMIC, P.M., HERON, M.J. and HULBERT, S. 2017. Viewing art on a tablet computer: A well-being intervention for people with dementia and their caregivers. Journal of applied gerontology [online], 36(7), pages 864-894. Available from: https://doi.org/10.1177/0733464815617287

Art-based interventions have been shown to be beneficial for the well-being of people with dementia and their caregivers. This article explored whether such interventions can be delivered via a touchscreen tablet device displaying art images. Method:... Read More about Viewing art on a tablet computer: A well-being intervention for people with dementia and their caregivers..

Fuzzy ethics: or how I learned to stop worrying and love the bot. (2015)
Journal Article
HERON, M.J. and BELFORD, P. 2015. Fuzzy ethics: or how I learned to stop worrying and love the bot. ACM SIGCAS computers and society [online], 45(4), pages 4-6. Available from: https://doi.org/10.1145/2856428.2856429

The recent death of a Volkswagen worker at the hand of a factory robot has resulted in a number of editorials and opinion pieces discussing moral responsibility and robots. In this short response piece we outline some of the wider context of this dis... Read More about Fuzzy ethics: or how I learned to stop worrying and love the bot..

ClusterNN: a hybrid classification approach to mobile activity recognition. (2015)
Conference Proceeding
BASHIR, S., DOOLAN, D. and PETROVSKI, A. 2015. ClusterNN: a hybrid classification approach to mobile activity recognition. In Chen, L.L., Steinbauer, M., Khalil, I. and Anderst-Kotsis, G. (eds.) Proceedings of the 13th International advances in mobile computing and multimedia conference (MoMM 2015), 11-13 December 2015, Brussels, Belguim. New York: ACM [online], pages 263-267. Available from: https://doi.org/10.1145/2837126.2837140

Mobile activity recognition from sensor data is based on supervised learning algorithms. Many algorithms have been proposed for this task. One of such algorithms is the K-nearest neighbour (KNN) algorithm. However, since KNN is an instance based algo... Read More about ClusterNN: a hybrid classification approach to mobile activity recognition..

Human aspects of digital rights management: the perspective of content developers. [Conference Paper] (2015)
Presentation / Conference
FAVALE, M., MCDONALD, N., FAILY, S. and GATZIDIS, C. 2015. Human aspects of digital rights management: the perspective of content developers. Presented at the 4th International workshop on artificial intelligence and IP law (AIIP 2015): the story(s) of copyright, 9 December 2015, Braga, Portugal.

Legal norms and social behaviours are some of the human aspects surrounding the effectiveness and future of DRM security. Further exploration of these aspects would help unravel the complexities of the interaction between rights protection security a... Read More about Human aspects of digital rights management: the perspective of content developers. [Conference Paper].

Music recommendation: audio neighbourhoods to discover music in the long tail. (2015)
Conference Proceeding
CRAW, S., HORSBURGH, B. and MASSIE, S. 2015. Music recommendation: audio neighbourhoods to discover music in the long tail. In Hüllermeier, E. and Minor, M. (eds.) Proceedings of the 23rd international conference on case-based reasoning research and development (ICCBR 2015), 28-30 September 2015, Frankfurt am Main, Germany. Lecture notes in computer science, 9343. Cham: Springer [online], pages 73-87. Available from: https://doi.org/10.1007/978-3-319-24586-7_6

Millions of people use online music services every day and recommender systems are essential to browse these music collections. Users are looking for high quality recommendations, but also want to discover tracks and artists that they do not already... Read More about Music recommendation: audio neighbourhoods to discover music in the long tail..

Visualisation techniques to support public interpretation of future climate change and land-use choices: a case study from N-E Scotland. (2015)
Journal Article
WANG, C., MILLER, D., BROWN, I., JIANG, Y. and CASTELLAZZI, M. 2015. Visualisation techniques to support public interpretation of future climate change and land-use choices: a case study from N-E Scotland. International journal of digital earth [online], 9(6), pages 586-605. Available from: https://doi.org/10.1080/17538947.2015.1111949

Mitigating and adapting to climate change includes a requirement to evaluate the role of future land uses in delivering robust integrated responses that are sensitive to local landscape contexts. In practice, this emphasises the need for community en... Read More about Visualisation techniques to support public interpretation of future climate change and land-use choices: a case study from N-E Scotland..

Insourcing a government information system an analysis using institutions and the capability approach. (2015)
Conference Proceeding
OMAR, A., BASS, J.M. and LOWIT, P. 2015. Insourcing a government information system an analysis using institutions and the capability approach. In Proceedings of the 2015 International conference on information society (i-Society 2015), 9-11 November 2015, London, UK. PiscatawayJ: IEEE [online], pages 91-96. Available from: https://doi.org/10.1109/i-Society.2015.7366866

This study explores the effectiveness of insourcing in the Malaysian Government. The research discusses the factors and issues of insourcing in a Malaysian government agency in the context of post contract termination of an outsourcing agreement. A q... Read More about Insourcing a government information system an analysis using institutions and the capability approach..

An alternative design for electrostatically accelerated ion beam fusion. (2015)
Journal Article
MACLEOD, C. and GERRARD, C.E. 2015. An alternative design for electrostatically accelerated ion beam fusion. Journal of the British Interplanetary Society [online], 68, pages 336-341. Available from: http://www.jbis.org.uk/paper.php?p=2015.68.336

Inertial Electrostatic Confinement (IEC) is an alternative approach to nuclear fusion which uses electrostatically accelerated ions instead of hot plasmas. The best known device that utilises the principle is the Farnsworth-Hirsch Fusor. It has been... Read More about An alternative design for electrostatically accelerated ion beam fusion..

Online news videos: the UX of subtitle position. (2015)
Conference Proceeding
CRABB, M., JONES, R., ARMSTRONG, M. and HUGHES, C.J. 2015. Online news videos: the UX of subtitle position. In Proceedings of the 17th International Association for Computing Machinery (ACM) SIGACCESS conference on computers and accessibility (ASSETS '15), 26-28 October 2015, Lisbon, Portugal. New York: ACM [online], pages 215-222. Available from: http://doi.acm.org/10.1145/2700648.2809866

Millions of people rely on subtitles when watching video content. The current change in media viewing behaviour involving computers has resulted in a large proportion of people turning to online sources as opposed to regular television for news infor... Read More about Online news videos: the UX of subtitle position..

The development of a framework for understanding the UX of subtitles. (2015)
Conference Proceeding
CRABB, M., JONES, R. and ARMSTRONG, M. 2015. The development of a framework for understanding the UX of subtitles. In Proceedings of the 17th International Association for Computing Machinery (ACM) SIGACCESS conference on computers and accessibility (ASSETS '15), 26-28 October 2015, Lisbon, Portugal. New York: ACM [online], pages 347-348. Available from: http://doi.acm.org/10.1145/2700648.2811372

Approximately 10% of the television audience use subtitles (captioning) to support their viewing experience. Subtitles enable viewers to participate in an experience that is often taken for granted by the general audience. However, when reviewing sub... Read More about The development of a framework for understanding the UX of subtitles..

The transport disruption ontology. (2015)
Conference Proceeding
CORSAR, D., MARKOVIC, M., EDWARDS, P. and NELSON, J.D. 2015. The transport disruption ontology. In Arenas, M., Corcho, O., Simperl, E., Strohmaier, M., d'Aquin, M., Srinivas, K., Groth, P., Dumontier, M., Heflin, J., Thirunarayan, K. and Staab, S. (eds.). The sematic web - ISWC 2015: proceedings of the 14th International semantic web conference 2015 (ISWC 2015), 11-15 October 2015, Bethleham, PA, USA, 9367. Lecture notes in computer science. Cham: Springer [online], pages 329-336. Available from: https://doi.org/10.1007/978-3-319-25010-6_22

This paper presents the Transport Disruption ontology, a formal framework for modelling travel and transport related events that have a disruptive impact on traveller's journeys. We discuss related models , describe how transport events and their imp... Read More about The transport disruption ontology..

Competencies for paradigm shift 'survival'. (2015)
Conference Proceeding
DANIELS, M., CAJANDER, A., ECKERDAL, A., LIND, M., NYLEN, A., CLEAR, T. and MCDERMOTT, R. 2015. Competencies for paradigm shift 'survival'. In Proceedings of the 2015 Frontiers in education conference (FIE 2015): launching a new vision in engineering education, 21-24 October 2015, El Paso, USA. New York: IEEE [online], article number 7344255. Available from: https://doi.org/10.1109/FIE.2015.7344255

The rapid development in the IT area brings a series of shifts, in underlying theories, technology and work practices. In the normal course of events, most changes are evolutionary, with small, incremental improvements being made to theoretical under... Read More about Competencies for paradigm shift 'survival'..