Skip to main content

Research Repository

Advanced Search

Outputs (582)

Unveiling NLG Human-Evaluation Reproducibility: Lessons Learned and Key Insights from Participating in the ReproNLP Challenge (2023)
Conference Proceeding
Watson, L., & Gkatzia, D. (2023). Unveiling NLG Human-Evaluation Reproducibility: Lessons Learned and Key Insights from Participating in the ReproNLP Challenge. In Proceedings of the 3rd Workshop on Human Evaluation of NLP Systems (69-74)

Human evaluation is crucial for NLG systems as it provides a reliable assessment of the quality, effectiveness, and utility of generated language outputs. However, concerns about the reproducibility of such evaluations have emerged, casting doubt on... Read More about Unveiling NLG Human-Evaluation Reproducibility: Lessons Learned and Key Insights from Participating in the ReproNLP Challenge.

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks (2023)
Conference Proceeding
Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., & Canberk, B. (2023). Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. In 2023 IEEE Globecom Workshops (GC Wkshps). https://doi.org/10.1109/GCWkshps58843.2023.10465218

As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to deploy infrastructure closer to end-users, enhancing accessibility. However, t... Read More about Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks.

Thou Shalt Not Squander Life – Comparing Five Approaches to Argument Strength (2023)
Journal Article
Zenker, F., Dębowska-Kozłowska, K., Godden, D., Selinger, M., & Wells, S. (2023). Thou Shalt Not Squander Life – Comparing Five Approaches to Argument Strength. Studies in Logic, Grammar and Rhetoric, 68(1), 133-167. https://doi.org/10.2478/slgr-2023-0007

Different approaches analyze the strength of a natural language argument in different ways. This paper contrasts the dialectical, structural, probabilistic (or Bayesian), computational, and empirical approaches by exemplarily applying them to a singl... Read More about Thou Shalt Not Squander Life – Comparing Five Approaches to Argument Strength.

The stuff we swim in: Regulation alone will not lead to justifiable trust in AI (2023)
Journal Article
Powers, S. T., Linnyk, O., Guckert, M., Hannig, J., Pitt, J., Urquhart, N., …Weber, T. (2023). The stuff we swim in: Regulation alone will not lead to justifiable trust in AI. IEEE technology & society magazine, 42(4), 95-106. https://doi.org/10.1109/MTS.2023.3341463

Information technology is used ubiquitously and has become an integral part of everyday life. With the ever increasing pervasiveness and persuasiveness of Artificial Intelligence (AI), the function of socio-technical systems changes and must be consi... Read More about The stuff we swim in: Regulation alone will not lead to justifiable trust in AI.

Students’ gendered experiences of male-dominated Computing and Engineering courses (2023)
Conference Proceeding
Taylor-Smith, E., Smith, S., & Fabian, K. (2023). Students’ gendered experiences of male-dominated Computing and Engineering courses.

How does it feel to be in a gender minority on a STEM programme? Does it have an impact on individual students? Via an online survey (n=255), undergraduate students on Computing and Engineering programmes were asked whether they felt that gender had... Read More about Students’ gendered experiences of male-dominated Computing and Engineering courses.

Investing in degree apprenticeships: Analysing experiences through Conservation of Resources Theory (2023)
Conference Proceeding
Taylor-Smith, E., Smith, S., & Bratton, A. (2023). Investing in degree apprenticeships: Analysing experiences through Conservation of Resources Theory.

Degree apprentices have reported finding work-life-study balance challenging. This study uses the Theory of Conservation of Resources (COR) to investigate the resources invested and gained by apprentices in the achievement of their goal of a degree w... Read More about Investing in degree apprenticeships: Analysing experiences through Conservation of Resources Theory.

Reliability Analysis of Fault Tolerant Memory Systems (2023)
Conference Proceeding
Yigit, Y., Maglaras, L., Amine Ferrag, M., Moradpoor, N., & Lambropoulos, G. (2023). Reliability Analysis of Fault Tolerant Memory Systems. In 2023 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). https://doi.org/10.1109/SEEDA-CECNSM61561.2023.10470763

This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modelled using Markov chains to address transient errors. The study revolves around the application of scrubbing methods in conjunction... Read More about Reliability Analysis of Fault Tolerant Memory Systems.

Informative Causality-based Vehicle Trajectory Prediction Architecture for Domain Generalization (2023)
Conference Proceeding
Mao, C., Zhao, L., Min, G., Hawbani, A., Al-Dubai, A. Y., & Zomaya, A. Y. (2023). Informative Causality-based Vehicle Trajectory Prediction Architecture for Domain Generalization. In GLOBECOM 2023 - 2023 IEEE Global Communications Conference. https://doi.org/10.1109/GLOBECOM54140.2023.10437409

Vehicle trajectory prediction is a promising technology for improving the performance of Cellular Vehicle-to Everything (C-V2X) applications by providing future road states. Various vehicle trajectory prediction methods have been proposed to increase... Read More about Informative Causality-based Vehicle Trajectory Prediction Architecture for Domain Generalization.

YASF: A Vendor-Agnostic Framework for Serverless Computing (2023)
Conference Proceeding
Giacomini, M., & Ullah, A. (2023). YASF: A Vendor-Agnostic Framework for Serverless Computing. In M. van Steen, & C. Pahl (Eds.), Proceedings of the 13th International Conference on Cloud Computing and Services Science (46-56). https://doi.org/10.5220/0011847700003488

The serverless execution model allows application developers to deploy their software using tiny functions with zero administration, no handling of resource provisioning, monitoring and scaling. Due to such advantages, the serverless model emerged as... Read More about YASF: A Vendor-Agnostic Framework for Serverless Computing.

Video Games, Historical Representation and Soft Power (2023)
Journal Article
Donald, I., Webber, N., & Wright, E. (2023). Video Games, Historical Representation and Soft Power. Journal of Gaming and Virtual Worlds, 15(2), 105-127. https://doi.org/10.1386/jgvw_00075_1

This article explores how historical video games have become tools for UK and Chinese ‘soft power’ or ‘public diplomacy’ and the role of historical representation in portraying cultural identity in the global marketplace. In the UK, state support has... Read More about Video Games, Historical Representation and Soft Power.