Skip to main content

Research Repository

Advanced Search

Outputs (161)

A systematic mapping study of empirical studies on software cloud testing methods (2017)
Presentation / Conference Contribution
Ahmad, A. A., Brereton, P., & Andras, P. (2017, July). A systematic mapping study of empirical studies on software cloud testing methods. Presented at 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Prague, Czech Republic

Context: Software has become more complicated, dynamic, and asynchronous than ever, making testing more challenging. With the increasing interest in the development of cloud computing, and increasing demand for cloud-based services, it has become ess... Read More about A systematic mapping study of empirical studies on software cloud testing methods.

An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment (2017)
Presentation / Conference Contribution
Liu, X., & Liu, Q. (2017, July). An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. Presented at 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, Guangdong, China

Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to imbalance of slow tasks distribution. Speculative execution (SE) presents a way to d... Read More about An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment.

Maximum Entropy in Nilsson's Probabilistic Logic (2017)
Presentation / Conference Contribution
Kane, T. B. (1989, August). Maximum Entropy in Nilsson's Probabilistic Logic. Presented at International Joint Conference on Artificial Intelligence

Nilsson's Probabilistic Logic is a set theoretic mechanism for reasoning with uncertainty. We propose a new way of looking at the probability constraints enforced by the framework, which allows the expert to include conditional probabilities in the s... Read More about Maximum Entropy in Nilsson's Probabilistic Logic.

Defining the UK information worker: the CILIP-ARA Workforce Mapping Project (2017)
Presentation / Conference Contribution
Hall, H. (2017, August). Defining the UK information worker: the CILIP-ARA Workforce Mapping Project. Presented at McMaster Library Symposium 2017, Hamilton, Canada

In 2014 the Chartered Institute of Library and Information Professionals (CILIP) and the Archives and Records Association (ARA) made a call to commission a team to undertake a workforce mapping project. The purpose of this work was to enhance underst... Read More about Defining the UK information worker: the CILIP-ARA Workforce Mapping Project.

Research into social media information practices, and social media information practices for research (2017)
Presentation / Conference Contribution
Hall, H. (2017, August). Research into social media information practices, and social media information practices for research. Presented at DeGroote Business School, McMaster University, research seminar series, Hamilton, Canada

The Centre for Social Informatics (CSI) at Edinburgh Napier University in Scotland has built a track record for its research into information behaviours and social media use. Early projects completed in the mid-noughties focused on the value of soci... Read More about Research into social media information practices, and social media information practices for research.

Using supervised machine learning algorithms to detect suspicious URLs in online social networks (2017)
Presentation / Conference Contribution
Al-Janabi, M., Quincey, E. D., & Andras, P. (2017, July). Using supervised machine learning algorithms to detect suspicious URLs in online social networks. Presented at 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia

The increasing volume of malicious content in social networks requires automated methods to detect and eliminate such content. This paper describes a supervised machine learning classification model that has been built to detect the distribution of m... Read More about Using supervised machine learning algorithms to detect suspicious URLs in online social networks.

A novel substitution box for encryption based on Lorenz equations (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017, July). A novel substitution box for encryption based on Lorenz equations. Presented at 2017 International Conference on Circuits, System and Simulation (ICCSS), London, United Kingdom

Complexity of an encryption algorithm is highly dependent on nonlinear components that drive actual security. Only nonlinear component in all traditional encryption algorithms is mainly Substitution Box (S-Box). In block ciphers, the relationship bet... Read More about A novel substitution box for encryption based on Lorenz equations.

Simultaneous context inference and mapping using mm-Wave for indoor scenarios (2017)
Presentation / Conference Contribution
Yassin, A., Nasser, Y., Awad, M., & Al-Dubai, A. (2017, May). Simultaneous context inference and mapping using mm-Wave for indoor scenarios. Presented at 2017 IEEE International Conference on Communications (ICC), Paris, France

We introduce in this paper two main approaches, Triangulateration (TL) and Angle-Difference-of-Arrival (ADoA) for indoor localization and mapping using single-anchor and millimeter wave (MMW) propagation characteristics. Then, we perform context infe... Read More about Simultaneous context inference and mapping using mm-Wave for indoor scenarios.

Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT (2017)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017, May). Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. Presented at 2017 IEEE International Conference on Communications (ICC)

Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopted for routing information maintenance in such networks. This algorithm is o... Read More about Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT.

Tailoring methodological bricolage to investigate non-discretionary use of digital technology (2017)
Presentation / Conference Contribution
Sobolewska, E. (2017, July). Tailoring methodological bricolage to investigate non-discretionary use of digital technology. Presented at BHCI 2017: Digital Make Believe, Sunderland, UK

Digital technology appears to be an integral part of everyday life: at homes, workplaces, during leisure time; mediating interactions, demanding attention and engagement. In the age of cloud computing, social media, and ubiquitous mobile devices, it... Read More about Tailoring methodological bricolage to investigate non-discretionary use of digital technology.