Date


Download Available

79 results

Exploring knowledge sharing in distributed organisations: report on research in progress

Conference Proceeding
Hall, H. (2002)
Exploring knowledge sharing in distributed organisations: report on research in progress. In KMSS 2002: the new scope of knowledge management in theory and in practice
Published academic research and reported practice in the professional press indicate that social capital is a driver of knowledge management. This paper reports on progress to...

PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing

Journal Article
Zhu, R., Yu, T., Tan, Z., Du, W., Zhao, L., Li, J., & Xia, X. (2019)
PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing. IEEE Access, 8, 1475-1485. https://doi.org/10.1109/ACCESS.2019.2962066
Outlier detection over sliding window is a fundamental problem in the domain of streaming data management, which has been studied over 10 years. The key of supporting outlier ...

Optimisation and Illumination of a Real-world Workforce Scheduling and Routing Application via Map-Elites

Conference Proceeding
Urquhart, N., & Hart, E. (2018)
Optimisation and Illumination of a Real-world Workforce Scheduling and Routing Application via Map-Elites. In Parallel Problem Solving from Nature – PPSN XV 15th International Conference, Coimbra, Portugal, September 8–12, 2018, Proceedings, Part Ihttps://doi.org/10.1007/978-3-319-99253-2_39
Workforce Scheduling and Routing Problems (WSRP) are very common in many practical domains, and usually have a number of objectives. Illumination algorithms such as Map-Elites...

'Hyperlocal e-democracy'? The experience of Scotland's Community Councils.

Conference Proceeding
Cruickshank, P., Ryan, B., & Smith, C. F. (2014)
'Hyperlocal e-democracy'? The experience of Scotland's Community Councils. In P. Parycek, & N. Edelmann (Eds.), CeDEM14 Proceedings, (73-84
This paper is motivated by the need to understand the reality of the use of the now well-established opportunities offered by the internet to engage with citizens. Building on...

Applying user testing data to UEM performance metrics.

Conference Proceeding
Chattratichart, J., & Brodie, J. (2004)
Applying user testing data to UEM performance metrics. In CHI EA '04 CHI '04 Extended Abstracts on Human Factors in Computing Systems, 1119-1122. doi:10.1145/985921.986003
The lack of standard assessment criteria for reliably comparing usability evaluation methods (UEMs) is an important gap in HCI knowledge. Recently, metrics for assessing thoro...

An agent based Bayesian forecasting model for enhanced network security.

Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001. , (247-254). https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...

Culture & biometrics: regional differences in the perception of biometric authentication technologies

Journal Article
Riley, C. W., Buckner, K., Johnson, G., & Benyon, D. (2009)
Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & society, 24, 295-306. https://doi.org/10.1007/s00146-009-0218-1
Previous research has identified user concerns about biometric authentication technology, but most of this research has been conducted in European contexts. There is a lack of...

Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study

Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...

Distance Measurement Methods for Improved Insider Threat Detection

Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...

A social-technological alignment matrix.

Conference Proceeding
Thuemmler, C., Mival, O., Lim, A. K., Holanec, I., & Fricker, S. (2015)
A social-technological alignment matrix. In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 200-205. https://doi.org/10.1109/healthcom.2014.7001841
This paper refers to the term " implementation " as the Especially in health care this has proven to be a very critical phase Although strategies such as requirements engineer...