Skip to main content

Research Repository

Advanced Search

Outputs (147)

Beyond broadcast and consume: modification of provider-user information behaviours in social media space (2011)
Presentation / Conference Contribution
Hall, H. (2011, August). Beyond broadcast and consume: modification of provider-user information behaviours in social media space. Presented at ISSOME 2011: Information Science and Social Media International Conference,

Keynote presentation.

Presentation slides can be found on slideshare https://www.slideshare.net/HazelHall/2011-hall-issomefinland

Evaluating a vehicle auditory display: comparing a designer's expectations with listeners' experiences (2011)
Presentation / Conference Contribution
McGregor, I., Larsson, P., & Turner, P. (2011, August). Evaluating a vehicle auditory display: comparing a designer's expectations with listeners' experiences. Presented at 29th conference of the European Association of Cognitive Ergonomics, Rostock, Germany

This paper illustrates a method for the early evaluation of auditory displays in context. A designer was questioned about his expectations of an auditory display for Heavy Goods Vehicles, and the results were compared to the experiences of 10 listene... Read More about Evaluating a vehicle auditory display: comparing a designer's expectations with listeners' experiences.

Cognitive Computation Special Issue on Cognitive Behavioural Systems (2011)
Journal Article
Esposito, A., Vinciarelli, A., Haykin, S., Hussain, A., & Faundez-Zanuy, M. (2011). Cognitive Computation Special Issue on Cognitive Behavioural Systems. Cognitive Computation, 3(3), 417-418. https://doi.org/10.1007/s12559-011-9107-2

Cognitive processes, such as inference, categorization, and memory, are not independent from their physical instantiations. Individuals’ choices, perception, and actions emerge and are dynamically affected and enhanced by the interaction between sens... Read More about Cognitive Computation Special Issue on Cognitive Behavioural Systems.

Hybrid optical and wireless technology integrations for next generation broadband access networks (2011)
Presentation / Conference Contribution
Owusu, G., Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2011, May). Hybrid optical and wireless technology integrations for next generation broadband access networks. Presented at 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, Dublin, Ireland

Hybrid optical and wireless technology integrations have been considered as one of the most promising candidates for the next generation broadband access networks for quite some time. The integration scheme provides the bandwidth advantages of the op... Read More about Hybrid optical and wireless technology integrations for next generation broadband access networks.

Agent-based computing from multi-agent systems to agent-based models: A visual survey (2011)
Journal Article
Niazi, M., & Hussain, A. (2011). Agent-based computing from multi-agent systems to agent-based models: A visual survey. Scientometrics, 89, 479-499. https://doi.org/10.1007/s11192-011-0468-9

Agent-based computing is a diverse research domain concerned with the building of intelligent software based on the concept of “agents”. In this paper, we use Scientometric analysis to analyze all sub-domains of agent-based computing. Our data consis... Read More about Agent-based computing from multi-agent systems to agent-based models: A visual survey.

Understanding the “e‐petitioner” (2011)
Journal Article
Cruickshank, P., & Smith, C. (2011). Understanding the “e‐petitioner”. Transforming government: people, process and policy, 5(4), 319-329. https://doi.org/10.1108/17506161111173577

Purpose: This article considers the ways in which large-scale e-participation projects can be evaluated. It argues that existing evaluation approaches can be improved upon by taking a closer look at the characteristics of the users of such systems, b... Read More about Understanding the “e‐petitioner”.

PIR sensor array for hand motion recognition (2011)
Presentation / Conference Contribution
Wojtczuk, P., Armitage, A., Binnie, D., & Chamberlain, T. (2011, August). PIR sensor array for hand motion recognition. Paper presented at SensorDevices 2011

Abstract—In this paper we present our work towards a hand gesture recognition system realised with a passive thermal infrared sensor array. In contrast with the majority of recent research activities into gesture recognition, which focus on the compl... Read More about PIR sensor array for hand motion recognition.

Risk analysis for criminal context in information sharing policies. (2011)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., & Lawson, A. (2011, August). Risk analysis for criminal context in information sharing policies. Paper presented at SCONE - the Scottish Networking event

This presentation outlines of a novel system which maps the information sharing between two domains. It involves the definition of a formalized information sharing policy, which maps the organisation infrastructure which is exposed for the sharing be... Read More about Risk analysis for criminal context in information sharing policies..

Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. (2011)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011, August). Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing. Paper presented at SCONE-the Scottish Networking Event

This presentation focuses on outlining criminal activity within affiliate marketing related to click-through and ID theft crime, based on real-life crime data. It shows the mechanisms that criminals might use in order to act fraudulently, and present... Read More about Detection framework for the reduction of click-through and ID theft fraud in affiliate marketing..

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications (2011)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., Smith, S., & Zhao, H. (2011, July). Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. Presented at 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops

Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context information is naturally distributed among different spatial or logical domains. Ma... Read More about Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications.