Skip to main content

Research Repository

Advanced Search

Outputs (261)

Augmented creativity: bridging the real and virtual worlds to enhance creative play (2015)
Presentation / Conference Contribution
Zünd, F., Ryffel, M., Magnenat, S., Marra, A., Nitti, M., Kapadia, M., Noris, G., Mitchell, K., Gross, M., & Sumner, R. W. (2015, November). Augmented creativity: bridging the real and virtual worlds to enhance creative play. Presented at SIGGRAPH ASIA 2015 Mobile Graphics and Interactive Applications on - SA '15

Augmented Reality (AR) holds unique and promising potential to bridge between real-world activities and digital experiences, allowing users to engage their imagination and boost their creativity. We propose the concept of Augmented Creativity as empl... Read More about Augmented creativity: bridging the real and virtual worlds to enhance creative play.

A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks (2015)
Journal Article
Moradpoor Sheykhkanloo, N. (2015). A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(6), 1443-1453

Thousands of organisations store important and confidential information related to them, their customers, and their business partners in databases all across the world. The stored data ranges from less sensitive (e.g. first name, last name, date of b... Read More about A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks.

A critical analysis of e-government evaluation models at national and local municipal levels (2015)
Journal Article
Zahran, D. I., Al-Nuaim, H. A., Rutter, M. J., & Benyon, D. (2015). A critical analysis of e-government evaluation models at national and local municipal levels. Electronic Journal of e-Government, 13, 28-42

The importance of e-government models lies in their offering a basis to measure and guide e-government. There is still no agreement on how to assess a government online. Most of the e-government models are not based on research, nor are they validate... Read More about A critical analysis of e-government evaluation models at national and local municipal levels.

Making co-op work: An exploration of student attitudes to co-op programs (2015)
Presentation / Conference Contribution
Smith, S., Berg, T., & Smith, C. (2015, October). Making co-op work: An exploration of student attitudes to co-op programs. Presented at 2015 IEEE Frontiers in Education Conference (FIE)

Engineering and computing at university both have a long tradition of co-operative education which plays a vital role in developing students' applied skills and giving confidence to both students and potential employers. Co-op education refers to rel... Read More about Making co-op work: An exploration of student attitudes to co-op programs.

Maths and Mobile Technologies: Student Attitudes and Perceptions (2015)
Presentation / Conference Contribution
Fabian, K. (2018, October). Maths and Mobile Technologies: Student Attitudes and Perceptions. Presented at 14th European Conference on Elearning

Approaches that advocate the contextualized teaching of mathematics have been around for years but the ubiquity of mobile devices together with the potential to bridge classroom learning to real-world has added a new angle to contextualizing mathemat... Read More about Maths and Mobile Technologies: Student Attitudes and Perceptions.

Towards an augmented authenticator in the Cloud (2015)
Presentation / Conference Contribution
Pitropakis, N., Yfantopoulos, N., Geneiatakis, D., & Lambrinoudakis, C. (2014, December). Towards an augmented authenticator in the Cloud. Presented at 2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Noida, India

Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive information. Meanwhile, there are several approaches applying security and privacy p... Read More about Towards an augmented authenticator in the Cloud.

Automatically Detecting Fallacies in System Safety Arguments (2015)
Presentation / Conference Contribution
Wells, S., Yuan, T., Manandhar, S., & Kelly, T. (2015, October). Automatically Detecting Fallacies in System Safety Arguments. Paper presented at 15th International Workshop on Computational Models of Natural Argument(CMNA15), Bertinoro, Italy

Safety cases play a significant role in the development of safety-critical systems. The key components in a safety case are safety arguments, that are designated to demonstrate that the system is acceptably safe. Inappropriate reasoning with safety a... Read More about Automatically Detecting Fallacies in System Safety Arguments.

Introducing ALIAS (2015)
Presentation / Conference Contribution
Wells, S., & LaGreca, R. (2015, October). Introducing ALIAS. Paper presented at 15th International Workshop on Computation Models of Natural Argument

ALIAS is a Python library for constructing, manipulating, storing, visualising, and converting argumentation structues. It is available with full source code under a copyleft license and aims to become a Swiss Army Knife for working with arguments in... Read More about Introducing ALIAS.

Inspired counter based broadcasting in dynamic source routing protocol. (2015)
Presentation / Conference Contribution
Yassein, M. B., & Al-Dubai, A. (2015, October). Inspired counter based broadcasting in dynamic source routing protocol. Paper presented at 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2015)

The broadcast storm problem is one of the most
challenging issues in Mobile ad Hoc Networks (MANETs).
However, it is still a challenging problem despite the great deal
of related works and existing solutions. Dynamic Source
Routing Protocol (DSR)... Read More about Inspired counter based broadcasting in dynamic source routing protocol..

The limits of pretending (2015)
Journal Article
Turner, P., Hetherington, R., Turner, S., & Kosek, M. (2015). The limits of pretending. Digital Creativity, 26(3-4), 304-317. https://doi.org/10.1080/14626268.2015.1091778

We propose that pretending is a cognitive faculty which enables us to create and immerse ourselves in possible worlds. These worlds range from the veridical to the fantastic and are frequently realised as stories varying from the fictional to the sci... Read More about The limits of pretending.