Date


People

Download Available

Dewey Decimal

262 results

Using mobile technologies for mathematics: effects on student attitudes and achievement

Journal Article
Fabian, K., Topping, K. J., & Barron, I. G. (2018)
Using mobile technologies for mathematics: effects on student attitudes and achievement. Educational Technology Research and Development, 66(5), 1119-1139. https://doi.org/10.1007/s11423-018-9580-3
The ubiquity of mobile devices together with its potential to bridge classroom learning to real-world has added a new angle to contextualising mathematics learning. This study...

Head-mounted displays as opera glasses: using mixed-reality to deliver an egalitarian user experience during live events

Conference Proceeding
Bishop, C., Esteves, A., & McGregor, I. (2017)
Head-mounted displays as opera glasses: using mixed-reality to deliver an egalitarian user experience during live events. In ICMI 2017 Proceedings of the 19th ACM International Conference on Multimodal Interactionhttps://doi.org/10.1145/3136755.3136781
This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-...

An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs

Conference Proceeding
Liu, X., & Liu, Q. (2017)
An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. In X. Sun, H. C. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security (ICCCS 2017), (450-459). https://doi.org/10.1007/978-3-319-68505-2_39
With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. Ho...

Insider threat detection using principal component analysis and self-organising map

Conference Proceeding
Moradpoor, N., Brown, M., & Russell, G. (2017)
Insider threat detection using principal component analysis and self-organising map. In 10th International Conference on Security of Information and Networks (SIN 2017)https://doi.org/10.1145/3136825.3136859
An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data wh...

Emergence of hierarchy from the evolution of individual influence in an agent-based model

Conference Proceeding
Perret, C., Powers, S. T., & Hart, E. (2017)
Emergence of hierarchy from the evolution of individual influence in an agent-based model. In Proceedings of the 14th European Conference on Artificial Life 2017, (348-355
The sudden transition from egalitarian groups to hierarchical societies that occurred with the origin of agriculture is one of the most striking features of the evolution of h...

IRIDiuM+: deep media storytelling with non-linear light field video

Conference Proceeding
Kosek, M., Koniaris, B., Sinclair, D., Markova, D., Rothnie, F., Smoot, L., & Mitchell, K. (2017)
IRIDiuM+: deep media storytelling with non-linear light field video. In SIGGRAPH '17 ACM SIGGRAPH 2017 VR Village. https://doi.org/10.1145/3089269.3089277
We present immersive storytelling in VR enhanced with non-linear sequenced sound, touch and light. Our Deep Media (Rose 2012) aim is to allow for guests to physically enter re...

Image-based Emotion Feedback: How Does the Crowd Feel? And Why?

Conference Proceeding
Robb, D. A., Padilla, S., Methven, T. S., Kalkreuter, B., & Chantler, M. J. (2017)
Image-based Emotion Feedback: How Does the Crowd Feel? And Why?. In DIS '17 Proceedings of the 2017 Conference on Designing Interactive Systems, (451-463). https://doi.org/10.1145/3064663.3064665
In previous work we developed a method for interior designers to receive image-based feedback about a crowd’s emotions when viewing their designs. Although the designers clear...

AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks

Conference Proceeding
Rotärmel, S., Farrenkopf, T., Guckert, M., & Urquhart, N. (2017)
AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks. In Y. Demazeau, P. Davidsson, J. Bajo, & Z. Vale (Eds.), Advances in Practical Applications of Cyber-Physical Multi-Agent Systems: The PAAMS Collection. , (355-358). https://doi.org/10.1007/978-3-319-59930-4_37
AGADE-TRAFFIC is a tool for simulating traffic flow in networks. Traffic participants are modelled as NetLogo agents and are visualised in a graphical user interface. Geograph...

Understanding Concept Maps: A Closer Look at How People Organise Ideas

Conference Proceeding
Padilla, S., Methven, T. S., Robb, D. A., & Chantler, M. J. (2017)
Understanding Concept Maps: A Closer Look at How People Organise Ideas. In CHI '17 Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, (815-827). https://doi.org/10.1145/3025453.3025977
Research into creating visualisations that organise ideas into concise concept maps often focuses on implicit mathematical and statistical theories which are built around algo...

The next cyberattack could come from sound waves

Other
Buchanan, B. (2017)
The next cyberattack could come from sound waves. https://theconversation.com/the-next-cyberattack-could-come-from-sound-waves-74716
You might think your smartphone or laptop is relatively safe from cyber attacks thanks to anti-virus and encryption software. But your devices are increasingly at risk from “s...