Skip to main content

Research Repository

Advanced Search

Outputs (53)

Crime risk evaluation within information sharing between the Police and community partners. (2011)
Journal Article
Uthmani, O., Buchanan, W. J., Lawson, A., Scott, R., Schafer, B., & Fan, L. (2011). Crime risk evaluation within information sharing between the Police and community partners. Information and Communications Technology Law, 20, 57-81. https://doi.org/10.1080/13600834.2011.578922

The aim of this paper is to provide profiles for crimes which can be used to model the context for information sharing between the police and community partner organisations. This context can then be integrated with information-sharing syntax used by... Read More about Crime risk evaluation within information sharing between the Police and community partners..

Designing for engagement (2011)
Journal Article
Turner, P., Flint, T., & Turner, S. (2011). Designing for engagement. Infrastructure journal,

The city in cinema: how popular culture can influence research agendas. (2011)
Journal Article
Smyth, M., Helgason, I., Mitrovic, I., & Zaffiro, G. (2011). The city in cinema: how popular culture can influence research agendas. Procedia Computer Science, 7, 110-113. https://doi.org/10.1016/j.procs.2011.12.033

Where can researchers find inspiration for the transformative applications, concepts and infrastructures that they believe will characterise the next decade? One approach to predicting the future is to reflect on the visions of the future that have b... Read More about The city in cinema: how popular culture can influence research agendas..

Interaction strategies for an affective conversational agent (2011)
Journal Article
Smith, C., Crook, N., Dobnik, S., Charlton, D., Boye, J., Pulman, S., …Cavazza, M. (2011). Interaction strategies for an affective conversational agent. Presence: Teleoperators and Virtual Environments, 20, 395-411. https://doi.org/10.1162/PRES_a_00063

The development of embodied conversational agents (ECA) as companions brings several challenges for both affective and conversational dialogue. These include challenges in generating appropriate affective responses, selecting the overall shape of the... Read More about Interaction strategies for an affective conversational agent.

Heaven and Hell: visions for pervasive adaptation (2011)
Journal Article
Paechter, B., Pitt, J., Serbedzija, N., Michael, K., Willies, J., & Helgason, I. (2011). Heaven and Hell: visions for pervasive adaptation. Procedia Computer Science, 7, 81-82. https://doi.org/10.1016/j.procs.2011.12.025

With everyday objects becoming increasingly smart and the “info-sphere” being enriched with nano-sensors and networked to computationally-enabled devices and services, the way we interact with our environment has changed significantly, and will conti... Read More about Heaven and Hell: visions for pervasive adaptation.

Representations and evolutionary operators for the scheduling of pump operations in water distribution networks. (2011)
Journal Article
Lopez-Ibanez, M., Tumula, P., & Paechter, B. (2011). Representations and evolutionary operators for the scheduling of pump operations in water distribution networks. Evolutionary Computation, 19, 429-467. https://doi.org/10.1162/EVCO_a_00035

Reducing the energy consumption of water distribution networks has never had more significance. The greatest energy savings can be obtained by carefully scheduling the operations of pumps. Schedules can be defined either implicitly, in terms of other... Read More about Representations and evolutionary operators for the scheduling of pump operations in water distribution networks..

Minimising collateral damage: privacy-preserving Investigative data acquisition platform. (2011)
Journal Article
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2011). Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach, 4, 12-31. https://doi.org/10.4018/jitsa.2011070102

Investigators define invasion of privacy during their operations as collateral damage. Inquiries that require gathering data about potential suspects from third parties, such as banks, Internet Service Providers (ISPs) or employers are likely to impa... Read More about Minimising collateral damage: privacy-preserving Investigative data acquisition platform..

Research directions in data wrangling: Visualizations and transformations for usable and credible data (2011)
Journal Article
Kandel, S., Heer, J., Plaisant, C., Kennedy, J., Ham, F. V., Riche, N. H., …Buono, P. (2011). Research directions in data wrangling: Visualizations and transformations for usable and credible data. Information Visualization, Octobe, 271-288. https://doi.org/10.1177/1473871611415994

In spite of advances in technologies for working with data, analysts still spend an inordinate amount of time diagnosing data quality issues and manipulating data into a usable form. This process of ‘data wrangling’ often constitutes the most tedious... Read More about Research directions in data wrangling: Visualizations and transformations for usable and credible data.

Capture and analysis of racing gameplay metrics (2011)
Journal Article
Jimenez, E., Mitchell, K., & Seron, F. (2011). Capture and analysis of racing gameplay metrics. IEEE Software, 28, 46-52. https://doi.org/10.1109/MS.2011.71

This article presents a flexible, extendable system called Tracktivity that can capture gameplay metrics in any type of leaderboard-based video game. This system incorporates novel visualizations, including a dynamic competition balancing (DCB) measu... Read More about Capture and analysis of racing gameplay metrics.