Skip to main content

Research Repository

Advanced Search

Crime risk evaluation within information sharing between the Police and community partners. (2011)
Journal Article
Uthmani, O., Buchanan, W. J., Lawson, A., Scott, R., Schafer, B., & Fan, L. (2011). Crime risk evaluation within information sharing between the Police and community partners. Information and Communications Technology Law, 20, 57-81. https://doi.org/10.1080/13600834.2011.578922

The aim of this paper is to provide profiles for crimes which can be used to model the context for information sharing between the police and community partner organisations. This context can then be integrated with information-sharing syntax used by... Read More about Crime risk evaluation within information sharing between the Police and community partners..

Interaction strategies for an affective conversational agent (2011)
Journal Article
Smith, C., Crook, N., Dobnik, S., Charlton, D., Boye, J., Pulman, S., …Cavazza, M. (2011). Interaction strategies for an affective conversational agent. Presence: Teleoperators and Virtual Environments, 20, 395-411. https://doi.org/10.1162/PRES_a_00063

The development of embodied conversational agents (ECA) as companions brings several challenges for both affective and conversational dialogue. These include challenges in generating appropriate affective responses, selecting the overall shape of the... Read More about Interaction strategies for an affective conversational agent.

Heaven and Hell: visions for pervasive adaptation (2011)
Journal Article
Paechter, B., Pitt, J., Serbedzija, N., Michael, K., Willies, J., & Helgason, I. (2011). Heaven and Hell: visions for pervasive adaptation. Procedia Computer Science, 7, 81-82. https://doi.org/10.1016/j.procs.2011.12.025

With everyday objects becoming increasingly smart and the “info-sphere” being enriched with nano-sensors and networked to computationally-enabled devices and services, the way we interact with our environment has changed significantly, and will conti... Read More about Heaven and Hell: visions for pervasive adaptation.

Representations and evolutionary operators for the scheduling of pump operations in water distribution networks. (2011)
Journal Article
Lopez-Ibanez, M., Tumula, P., & Paechter, B. (2011). Representations and evolutionary operators for the scheduling of pump operations in water distribution networks. Evolutionary Computation, 19, 429-467. https://doi.org/10.1162/EVCO_a_00035

Reducing the energy consumption of water distribution networks has never had more significance. The greatest energy savings can be obtained by carefully scheduling the operations of pumps. Schedules can be defined either implicitly, in terms of other... Read More about Representations and evolutionary operators for the scheduling of pump operations in water distribution networks..

Minimising collateral damage: privacy-preserving Investigative data acquisition platform. (2011)
Journal Article
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2011). Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach, 4, 12-31. https://doi.org/10.4018/jitsa.2011070102

Investigators define invasion of privacy during their operations as collateral damage. Inquiries that require gathering data about potential suspects from third parties, such as banks, Internet Service Providers (ISPs) or employers are likely to impa... Read More about Minimising collateral damage: privacy-preserving Investigative data acquisition platform..

Research directions in data wrangling: Visualizations and transformations for usable and credible data (2011)
Journal Article
Kandel, S., Heer, J., Plaisant, C., Kennedy, J., Ham, F. V., Riche, N. H., …Buono, P. (2011). Research directions in data wrangling: Visualizations and transformations for usable and credible data. Information Visualization, Octobe, 271-288. https://doi.org/10.1177/1473871611415994

In spite of advances in technologies for working with data, analysts still spend an inordinate amount of time diagnosing data quality issues and manipulating data into a usable form. This process of ‘data wrangling’ often constitutes the most tedious... Read More about Research directions in data wrangling: Visualizations and transformations for usable and credible data.

Capture and analysis of racing gameplay metrics (2011)
Journal Article
Jimenez, E., Mitchell, K., & Seron, F. (2011). Capture and analysis of racing gameplay metrics. IEEE Software, 28, 46-52. https://doi.org/10.1109/MS.2011.71

This article presents a flexible, extendable system called Tracktivity that can capture gameplay metrics in any type of leaderboard-based video game. This system incorporates novel visualizations, including a dynamic competition balancing (DCB) measu... Read More about Capture and analysis of racing gameplay metrics.

Relationship and role transformations in social media environments. (2011)
Journal Article
Hall, H. (2011). Relationship and role transformations in social media environments. Electronic Library, 29(4), 421-428

Based on a keynote paper presented at Internet Librarian International 2010 this article argues that the way in which librarians conceive a number of relationships – between themselves, social media tools, and end-users – determines the boundaries of... Read More about Relationship and role transformations in social media environments..

Project output versus influence in practice: impact as a dimension of research quality (2011)
Journal Article
Hall, H. (2011). Project output versus influence in practice: impact as a dimension of research quality. Evidence based library and information practice, 6(4),

In an environment where resources are few, research funders are expected to focus on projects that demonstrate value for money. Thus, in the context of service provision, proposed research projects should actively contribute to the building of an evi... Read More about Project output versus influence in practice: impact as a dimension of research quality.

Visualising errors in animal pedigree genotype data (2011)
Journal Article
Graham, M., Kennedy, J., Paterson, T., & Law, A. (2011). Visualising errors in animal pedigree genotype data. Computer Graphics Forum, 30, 1011-1020. https://doi.org/10.1111/j.1467-8659.2011.01950.x

Genetic analysis of a breeding animal population involves determining the inheritance pattern of genotypes for multiple genetic markers across the individuals in the population pedigree structure. However, experimental pedigree genotype data invariab... Read More about Visualising errors in animal pedigree genotype data.

Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. (2011)
Journal Article
Buchanan, W. J., Graves, J., Bose, N., Macfarlane, R., Davison, B., & Ludwiniak, R. (2011). Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference,

This paper focuses on the integration of virtualised environments within the teaching of computer security and digital forensics, and includes three case studies. The first case study involves assessing student perception on the usage of VMware Works... Read More about Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs..

How academic IT departments manage changing IT environments (2011)
Journal Article
Buchanan, W. J. (2011). How academic IT departments manage changing IT environments. VitAL Magazine, 5, 26-32

Matching what industry wants with what applicants want is a major problem for any IT academic department is matching what the jobs market requires to the types of courses which appeal to applicants. At the current time there is massive demand in the... Read More about How academic IT departments manage changing IT environments.

OSCAM-optimized stereoscopic camera control for interactive 3D (2011)
Journal Article
Oskam, T., Hornung, A., Bowles, H., Mitchell, K., & Gross, M. (2011). OSCAM-optimized stereoscopic camera control for interactive 3D. ACM transactions on graphics, 30, 189. https://doi.org/10.1145/2024156.2024223

This paper presents a controller for camera convergence and interaxial separation that specifically addresses challenges in interactive stereoscopic applications like games. In such applications, unpredictable viewer- or object-motion often compromis... Read More about OSCAM-optimized stereoscopic camera control for interactive 3D.

OSCAM - Optimized Stereoscopic Camera Control for Interactive 3D (2011)
Journal Article
Oskam, T., Hornung, A., Bowles, H., Mitchell, K., & Gross, M. (2011). OSCAM - Optimized Stereoscopic Camera Control for Interactive 3D. ACM transactions on graphics, 30, 189:1-189:8. https://doi.org/10.1145/2070781.2024223

This paper presents a controller for camera convergence and interaxial separation that specifically addresses challenges in interactive stereoscopic applications like games. In such applications, unpredictable viewer- or object-motion often compromis... Read More about OSCAM - Optimized Stereoscopic Camera Control for Interactive 3D.

Formal security policy implementations in network firewalls. (2011)
Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012). Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003

Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. Ther... Read More about Formal security policy implementations in network firewalls..

Demo Hour: Anthony Otten, Daniel Schulze, Mie Sorensen, Di Mainstone, Tim Murray-Browne (2011)
Journal Article
Helgason, I. (2011). Demo Hour: Anthony Otten, Daniel Schulze, Mie Sorensen, Di Mainstone, Tim Murray-Browne. Interactions, 18, 8-9. https://doi.org/10.1145/2008176.2008179

These Demo Hour projects were curated by Ingi Helgason, a researcher and design lecturer at Edinburgh Napier University and the Open University. The projects were presented at Create ‘10, hosted by Edinburgh Napier University, as part of the conferen... Read More about Demo Hour: Anthony Otten, Daniel Schulze, Mie Sorensen, Di Mainstone, Tim Murray-Browne.

State assignment for sequential circuits using multi-objective genetic algorithm (2011)
Journal Article
Al-Jassani, B. A., Urquhart, N. B., & Almaini, A. E. A. (2011). State assignment for sequential circuits using multi-objective genetic algorithm. IET Computers and Digital Techniques, 5, 296-305. https://doi.org/10.1049/iet-cdt.2010.0045

In this study, a new approach using a multi-objective genetic algorithm (MOGA) is proposed to determine the optimal state assignment with less area and power dissipations for completely and incompletely specified sequential circuits. The goal is to f... Read More about State assignment for sequential circuits using multi-objective genetic algorithm.

Achieving Consensus within SSM. (2011)
Journal Article
Berg, T., Pooley, R., & Queenan, J. (2011). Achieving Consensus within SSM. International journal of humanities and social science, 1, 231-239

SSM is a socio-technical system methodology offering tools for analysing complex situations. This modelling approach identifies differing worldviews of the system by encouraging discussion and debate. Academic ethical studies of moral philosophy ha... Read More about Achieving Consensus within SSM..

The Rawls-Tawney theorem and the digital divide in postindustrial society (2011)
Journal Article
Duff, A. (2011). The Rawls-Tawney theorem and the digital divide in postindustrial society. Journal of the American Society for Information Science and Technology, 62, 604-612. https://doi.org/10.1002/asi.21470

The digital divide continues to challenge political and academic circles worldwide. A range of policy solutions is briefly evaluated, from laissez-faire on the right to “arithmetic” egalitarianism on the left. The article recasts the digital divide a... Read More about The Rawls-Tawney theorem and the digital divide in postindustrial society.