Now showing items 78-97 of 114

  • Migrating software products to the cloud: an adaptive STS perspective. 

    Werfs, Marc; Baxter, Gordon; Allison, Ian K.; Sommerville, Ian (IIAM (International Information Management Association) http://www.iima.org/index.php?option=com_phocadownload&view=category&download=507:223werfs&id=83:jitim223&Itemid=77, 2013)
    WERFS, M., BAXTER, G., ALLISON, I. K. and SOMMERVILLE, I., 2013. Migrating software products to the cloud: an adaptive STS perspective. Journal of International Technology and Information Management, 22 (3), pp. 37-54.
    Cloud computing, as a disruptive innovation, has the potential to adversely affect companies. The effects can be particularly extreme for small and medium sized enterprises (SMEs). Subsequently, considerations of organisational ...
  • Multi-source video multicast in internet-connected wireless mesh networks. 

    Tu, Wanqing; Sreenan, Cormac; Jha, Sanjay; Zhang, Qian (IEEE https://doi.org/10.1109/TMC.2017.2691706, 2017-04-06)
    TU, W., SREENAN, C.J., JHA, S. and ZHANG, Q. 2017. Multi-source video multicast in internet-connected wireless mesh networks. IEEE transactions on mobile computing [online], 16(12), pages 3431-3444. Available from: https://doi.org/10.1109/TMC.2017.2691706
    Wireless mesh networks (WMNs) connect to the Internet via access gateways. This paper studies multi-sourcevideo multicast in Internet-connected WMNs. The focus is onthe design of a shareable integrated multicast that allows ...
  • Multiple case study approach to identify aggravating variables of insider threats in information systems. 

    Nicho, Mathew; Kamoun, Faouzi (Association for Information Systems. http://aisel.aisnet.org/cais/vol35/iss1/18, 2014)
    NICHO, M. and KAMOUN, F., 2014. Multiple case study approach to identify aggravating variables of insider threats in information systems. Communications of the Association for Information Systems, Volume 35, Article 18.
    Malicious insiders present a serious threat to information systems due to privilege of access, knowledge of internal computer resources, and potential threats on the part of disgruntled employees or insiders collaborating ...
  • Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules. 

    Heron, Michael James; Belford, Pauline Helen (ACM http://dx.doi.org/10.1145/2874239.2874304, 2015-09-01)
    HERON, M.J. and BELFORD, P. 2015. Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules. ACM SIGCAS computers and society [online], 45(3), pages 438-444. Available from: http://dx.doi.org/10.1145/2874239.2874304
    Tools for algorithmically detecting plagiarism have become very popular, but none of these tools offers an effective and reliable way to identify plagiarism within academic software development. As a result, the identification ...
  • New trends on digitisation of complex engineering drawings. 

    Moreno-García, Carlos Francisco; Elyan, Eyad; Jayne, Chrisina (Springer https://doi.org/10.1007/s00521-018-3583-1, 2018-06-13)
    MORENO-GARCIA, C.F., ELYAN, E. and JAYNE, C. 2018. New trends on digitisation of complex engineering drawings. Neural computing and applications [online], OnlineFirst. Available from: https://doi.org/10.1007/s00521-018-3583-1
    Engineering drawings are commonly used across different industries such as oil and gas, mechanical engineering and others. Digitising these drawings is becoming increasingly important. This is mainly due to the legacy of ...
  • Non-traditional skills in undergraduate medical education: the development of a teaching programme. 

    Brady, Chevonne; Zarb, Mark (Sage https://doi.org/10.1177/0036933018776837, 2018-05-27)
    BRADY, C. and ZARB, M. 2018. Non-traditional skills in undergraduate medical education: the development of a teaching programme. Scottish medical journal [online], 63(3), pages 80-81. Available from: https://doi.org/10.1177/0036933018776837
    As a junior doctor in what is an increasingly struggling healthcare system, I am concerned to see that many of my junior and senior colleagues have opted not to continue onto the next stage of training. Whilst entrepreneurship, ...
  • On the relationship between variational level set-based and SOM-based active contours. 

    Abdelsamea, Mohammed M.; Gnecco, Giorgio; Gaber, Mohamed Medhat; Elyan, Eyad (Hindawi Publishing Corporation. http://dx.doi.org/10.1155/2015/109029, 2015-03)
    ABDELSAMEA, M. M., GNECCO, G., GABER, M. M. and ELYAN, E., 2015. On the relationship between variational level set-based and SOM-based active contours. Computational Intelligence and Neuroscience, Volume 2015, Article ID 109029.
    Most Active Contour Models (ACMs) deal with the image segmentation problem as a functional optimization problem, as they work on dividing an image into several regions by optimizing a suitable functional. Among ACMs, ...
  • The online dissemination of nature-health concepts: lessons from sentiment analysis of social media relating to "Nature-Deficit Disorder". 

    Palomino, Marco; Taylor, Tim; Goker, Ayse; Isaacs, John; Warber, Sara (MDPI https://doi.org/10.3390/ijerph13010142, 2016-01-19)
    PALOMINO, M., TAYLOR, T., GOKER, A., ISAACS, J. and WARBER, S. 2016. The online dissemination of nature-health concepts: lessons from sentiment analysis of social media relating to "Nature-Deficit Disorder". International journal of environmental research and public health [online], 13(1), article number 142. Available from: https://doi.org/10.3390/ijerph13010142.
    Evidence continues to grow supporting the idea that restorative environments, green exercise, and nature-based activities positively impact human health. Nature-deficit disorder, a journalistic term proposed to describe ...
  • Optimal resource allocation in wireless-powered OFDM relay networks. 

    Huang, Gaofei; Tu, Wanqing (Elsevier https://dx.doi.org/10.1016/j.comnet.2016.05.006, 2016-05-11)
    HUANG, G. and TU, W. 2016. Optimal resource allocation in wireless-powered OFDM relay networks. Computer networks [online], 104, pages 94-107. Available from: https://dx.doi.org/10.1016/j.comnet.2016.05.006.
    This paper studies resource allocation in wireless-powered orthogonal-frequency-division multiplexing (OFDM) amplify-and-forward (AF) or decode-and-forward (DF) relay networks with time-switching (TS) based relaying. Our ...
  • Pacman's canon in C#: a quantum interpretation of video game canon. 

    Heron, Michael James (Springer https://doi.org/10.1007/s40869-017-0036-5, 2017-05-22)
    HERON, M. 2017. Pacman's canon in C#: a quantum interpretation of video game canon. The computer games journal [online], 6(3), pages 135-151. Available from: https://doi.org/10.1007/s40869-017-0036-5
    The topic of what constitutes canon with a video game is an under-explored topic in critical discussion. We rely, as a field, on largely intuitive and insubstantial parameters for the elements that we choose to analyse. ...
  • Perceiving and using genre by form - an eye-tracking study. 

    Clark, Malcolm John; Ruthven, Ian; Holt, Patrik (De Gruyter. http://dx.doi.org/10.1515/libr.2010.023, 2010-09)
    CLARK, M., RUTHVEN, I. and HOLT, P. O’B., 2010. Perceiving and using genre by form – an eye-tracking study. Libri, 60 (3), pp. 268-280.
    This paper reports on an approach to the analysis of genre recognition using eye-tracking. The researchers focused on eight different types of e-mail, such as calls for papers, newsletters and spam, which were chosen to ...
  • Power and perception in the scandal in academia. 

    Heron, Michael James; Belford, Pauline Helen (ACM http://dx.doi.org/10.1145/2809957.2809961, 2015-07-30)
    HERON, M.J. and BELFORD, P. 2015. Power and perception in the scandal in academia. ACM SIGCAS computers and society [online], 45(2), pages 11-19. Available from: http://dx.doi.org/10.1145/2809957.2809961
    The Scandal in Academia is a large-scale fictional ethical case study of around 17,000 words and fourteen separate revelations. They are delivered as newspaper extracts from a newspaper reporting on an ongoing crisis at a ...
  • A practitioner reflection on teaching computer ethics with case studies and psychology. 

    Heron, Michael James; Belford, Pauline Helen (Oxford Brookes University http://bejlt.brookes.ac.uk/paper/a-practitioner-reflection-on-teaching-computer-ethics-with-case-studies-and-psychology/, 2015-09-01)
    HERON, M. and BELFORD, P., 2015. A practitioner reflection on teaching computer ethics with case studies and psychology. Brookes eJournal of Learning and Teaching, Vol 7(1).
    Three issues complicate teaching computer ethics in an undergraduate course. The first relates to the often technically intensive knowledge required to fully understand the complexity of real world examples. The second ...
  • A process model for implementing information systems security governance. 

    Nicho, Mathew (Emerald https://doi.org/10.1108/ICS-07-2016-0061, 2018-02-01)
    NICHO, M. 2018. A process model for implementing information systems security governance. Information and computer security [online], 26(1), pages 10-38. Available from: https://doi.org/10.1108/ICS-07-2016-0061
    Purpose: The frequent and increasingly potent cyber-attacks due to lack of an optimal mix of technical as well as non-technical IT controls, has led to increased adoption of security governance controls by organizations. ...
  • (Re)presenting heritage: laser scanning and 3D visualisations for cultural resilience and community engagement. 

    Tait, Elizabeth; Laing, Richard Alexander; Grinnall, Andy; Burnett, Simon M.; Isaacs, John (SAGE https://dx.doi.org/10.1177/0165551516636306, 2016-03-11)
    TAIT, E., LAING, R., GRINNALL, A., BURNETT, S. and ISAACS, J. 2016. (Re)presenting heritage: laser scanning and 3D visualisations for cultural resilience and community engagement. Journal of information science [online], 42(3), pages 420-433. Available from: https://dx.doi.org/10.1177/0165551516636306
    Cultural heritage is increasingly being viewed as an economic asset for geographic areas who aim to capitalise in the surge in interest in local history and heritage tourism from members of the public. Digital technologies ...
  • Refinement complements verification and validation 

    Craw, Susan (Elsevier http://dx.doi.org/10.1006/ijhc.1996.0012, 1996-02)
    CRAW, S., 1996. Refinement complements verification and validation. International Journal of Human Computer Studies, 44 (2), pp. 245-256
    Knowledge based systems are being applied in ever increasing numbers. The development of knowledge acquisition tools has eased the “Knowledge Acquisition Bottleneck”. More recently there has been a demand for mechanisms ...
  • Refinement in response to validation. 

    Craw, Susan; Sleeman, D. (Elsevier http://dx.doi.org/10.1016/0957-4174(94)E0025-P, 1995-07)
    CRAW, S. and SLEEMAN, D., 1995. Refinement in response to validation. Expert Systems with Applications, 8 (3), pp. 343-349
    Knowledge-based systems (KBSs) are being applied in ever increasing numbers. In parallel with the development of knowledge acquisition tools is the demand for mechanisms to assure their quality, particularly in safety ...
  • Region-based memetic algorithm with archive for multimodal optimsation. 

    Lacroix, Benjamin; Molina, Daniel; Herrera, Francisco (Elsevier https://dx.doi.org/10.1016/j.ins.2016.05.049, 2016-06-02)
    LACROIX, B., MOLINA, D. and HERRERA, F. 2016. Region-based memetic algorithm with archive for multimodal optimsation. Information sciences [online], 367-368, pages 719-746. Available from: https://dx.doi.org/10.1016/j.ins.2016.05.049
    In this paper we propose a specially designed memetic algorithm for multimodal optimisation problems. The proposal uses a niching strategy, called region-based niching strategy, that divides the search space in predefined ...
  • Relation discovery from web data for competency management. 

    Zhu, Jianhan; Goncalves, Alexandre L.; Uren, Victoria; Motta, Enrico; Pacheco, Roberto; Eisenstadt, Marc; Song, Dawei (IOS Press, 2007-12)
    ZHU, J., GONCALVES, A. L., UREN, V. S., MOTTA, E., PACHECO, R., EISENSTADT, M. and SONG, D., 2007. Relation discovery from web data for competency management. Web Intelligence and Agent Systems, 5 (4), pp. 405-417.
    In current organizations, valuable enterprise knowledge is often buried under rapidly expanding huge amount of unstructured information in the form of web pages, blogs, and other forms of human text communications. ...
  • Retrieval, reuse, revision and retention in case-based reasoning 

    Craw, Susan (Cambridge University Press http://dx.doi.org/10.1017/S0269888906000646, 2005)
    De Mantaras, Ramon Lopez et al, 2005. Retrieval, reuse, revision and retention in case-based reasoning. Knowledge Engineering Review, 20 (3), pp. 215-240.
    Case-based reasoning (CBR) is an approach to problem solving that emphasizes the role of prior experience during future problem solving (i.e., new problems are solved by reusing and if necessary adapting the solutions to ...