Skip to main content

Research Repository

Advanced Search

Outputs (164)

Making co-op work: An exploration of student attitudes to co-op programs (2015)
Presentation / Conference Contribution
Smith, S., Berg, T., & Smith, C. (2015). Making co-op work: An exploration of student attitudes to co-op programs. In Frontiers in Education Conference (FIE), 2015. 32614 2015. IEEE (1-6). https://doi.org/10.1109/fie.2015.7344173

Engineering and computing at university both have a long tradition of co-operative education which plays a vital role in developing students' applied skills and giving confidence to both students and potential employers. Co-op education refers to rel... Read More about Making co-op work: An exploration of student attitudes to co-op programs.

Maths and Mobile Technologies: Student Attitudes and Perceptions (2015)
Presentation / Conference Contribution
Fabian, K. (2015). Maths and Mobile Technologies: Student Attitudes and Perceptions. In Proceedings of the 14th European Conference on Elearning (696)

Approaches that advocate the contextualized teaching of mathematics have been around for years but the ubiquity of mobile devices together with the potential to bridge classroom learning to real-world has added a new angle to contextualizing mathemat... Read More about Maths and Mobile Technologies: Student Attitudes and Perceptions.

Towards an augmented authenticator in the Cloud (2015)
Presentation / Conference Contribution
Pitropakis, N., Yfantopoulos, N., Geneiatakis, D., & Lambrinoudakis, C. (2014, December). Towards an augmented authenticator in the Cloud. Presented at 2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Noida, India

Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive information. Meanwhile, there are several approaches applying security and privacy p... Read More about Towards an augmented authenticator in the Cloud.

Automatically Detecting Fallacies in System Safety Arguments (2015)
Presentation / Conference Contribution
Wells, S., Yuan, T., Manandhar, S., & Kelly, T. (2015, October). Automatically Detecting Fallacies in System Safety Arguments. Paper presented at 15th International Workshop on Computational Models of Natural Argument(CMNA15), Bertinoro, Italy

Safety cases play a significant role in the development of safety-critical systems. The key components in a safety case are safety arguments, that are designated to demonstrate that the system is acceptably safe. Inappropriate reasoning with safety a... Read More about Automatically Detecting Fallacies in System Safety Arguments.

Introducing ALIAS (2015)
Presentation / Conference Contribution
Wells, S., & LaGreca, R. (2015, October). Introducing ALIAS. Paper presented at 15th International Workshop on Computation Models of Natural Argument

ALIAS is a Python library for constructing, manipulating, storing, visualising, and converting argumentation structues. It is available with full source code under a copyleft license and aims to become a Swiss Army Knife for working with arguments in... Read More about Introducing ALIAS.

Inspired counter based broadcasting in dynamic source routing protocol. (2015)
Presentation / Conference Contribution
Yassein, M. B., & Al-Dubai, A. (2015, October). Inspired counter based broadcasting in dynamic source routing protocol. Paper presented at 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2015)

The broadcast storm problem is one of the most challenging issues in Mobile ad Hoc Networks (MANETs). However, it is still a challenging problem despite the great deal of related works and existing solutions. Dynamic Source Routing Protocol (DSR)... Read More about Inspired counter based broadcasting in dynamic source routing protocol..

The future of professionalising informatics: a university education perspective. (2015)
Presentation / Conference Contribution
Smith, S., & Phillips, I. (2015, October). The future of professionalising informatics: a university education perspective. Paper presented at 11th European Computer Science Summit

In March 2015, the Shadbolt Review group was established in the UK to review course accreditation of computer science university courses. The Council of Professors and Heads of Computing is represented on the review group alongside industry, funding... Read More about The future of professionalising informatics: a university education perspective..

Shared Usability - a support mechanism to product and service system design for older adults (2015)
Presentation / Conference Contribution
Shore, L., White, P., & Dempsey, H. (2015). Shared Usability - a support mechanism to product and service system design for older adults. In Proceedings of the Human Factors and Ergonomics Society Europe Chapter 2015 Annual Conference

Globally the Older Adult population is increasing; people are living longer, often with physical or functional limitations whilst remaining in their own home. This indicates a requirement of responsibility by Associated Stakeholders to support ageing... Read More about Shared Usability - a support mechanism to product and service system design for older adults.

Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach (2015)
Presentation / Conference Contribution
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015, September). Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. Presented at Proceedings of the 2015 Federated Conference on Computer Science and Information Systems

In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the design of WSN energy efficient algorithms and standards. The standard IEEE 80... Read More about Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach.

Sticky-Policy enabled authenticated OOXML for Health Care (2015)
Presentation / Conference Contribution
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2015). Sticky-Policy enabled authenticated OOXML for Health Care. In Proceedings of BCS Health Informatics Scotland 2015 Conference. https://doi.org/10.14236/ewic/HIS2015.3

This paper proposes a secure medical document sharing construction, which addresses confidentiality and authenticity concerns related to cloud-based data protection issues. The paper extends the popular Office Open XML (OOXML) document format with eX... Read More about Sticky-Policy enabled authenticated OOXML for Health Care.