Investigating the interaction design challenges of developing applications and services for multi-touch, multi-user collaboration technologies.
(2010)
Presentation / Conference Contribution
Mival, O. (2010). Investigating the interaction design challenges of developing applications and services for multi-touch, multi-user collaboration technologies. In Proceedings Create 2010, Edinburgh, June 2010
All Outputs (160)
Analysis of malicious affiliate network activity as a test case for an investigatory framework. (2010)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., Old, L. J., Batey, A., & Rahman, A. (2010, July). Analysis of malicious affiliate network activity as a test case for an investigatory frameworkCurrently there is a great deal of literature surrounding methods that can be used to de-tect click-fraud, but there is very little published work on actual cases of click-through fraud. The aim of this paper is to present the details of a real-life... Read More about Analysis of malicious affiliate network activity as a test case for an investigatory framework..
Hallelujah! using topical examples to Illustrate ethical and business Issues for engineers. (2010)
Presentation / Conference Contribution
McEwan, T., & Cairncross, S. (2010). Hallelujah! using topical examples to Illustrate ethical and business Issues for engineers. In Proceedings of FIE 2010 (S3E-1). https://doi.org/10.1109/FIE.2010.5673348Technically-oriented undergraduate students are often reluctant to engage with “Legal, Social, Ethical and Professional Issues”. In particular many learners appear to have an increasingly cavalier attitude to intellectual property in digital media. M... Read More about Hallelujah! using topical examples to Illustrate ethical and business Issues for engineers..
Clonal selection from first principles. (2010)
Presentation / Conference Contribution
McEwan, C., & Hart, E. (2010, July). Clonal selection from first principlesClonal selection is the keystone of mainstream immunology and computational systems based on immunological principles. For the latter, clonal selection is often interpreted as an asexual variant of natural selection, and thus, tend to be variation... Read More about Clonal selection from first principles..
Modelling infection spread using location tracking. (2010)
Journal Article
Mason, A. M., Dingle, N. J., Knottenbelt, W. J., Bell, D., Buchanan, W. J., & Thuemmler, C. (2010). Modelling infection spread using location tracking. International Journal of Healthcare Technology and Management, 11, 442-461. https://doi.org/10.1504/IJHTM.2010.036925The precision of location tracking technology has improved greatly over the last few decades. We aim to show that by tracking the locations of individuals in a closed environment, it is now possible to record the nature and frequency of interactions... Read More about Modelling infection spread using location tracking..
Improving data quality in data warehousing applications (2010)
Presentation / Conference Contribution
Li, L., Peng, T., & Kennedy, J. (2010, June). Improving data quality in data warehousing applications. Presented at Proceedings of the 12th International Conference on Enterprise Information SystemsThere is a growing awareness that high quality of data is a key to today’s business success and dirty data that exits within data sources is one of the reasons that cause poor data quality. To ensure high quality, enterprises need to have a process,... Read More about Improving data quality in data warehousing applications.
Achieve semantic-based precise component selection via an ontology model interlinking application domain and MVICS. (2010)
Presentation / Conference Contribution
Li, C., Liu, X., & Kennedy, J. (2010, July). Achieve semantic-based precise component selection via an ontology model interlinking application domain and MVICS. Presented at The 22nd International Conference on Software Engineering and Knowledge Engineering (SEKE'10)
Privacy-preserving data acquisition protocol. (2010)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010, July). Privacy-preserving data acquisition protocolCurrent investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity... Read More about Privacy-preserving data acquisition protocol..
A model-driven approach to flexible multi-level customization of SaaS applications. (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010). A model-driven approach to flexible multi-level customization of SaaS applications. In Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering (SEKE'10)
Towards self-aware PerAda systems. (2010)
Presentation / Conference Contribution
Hart, E., & Paechter, B. (2010, July). Towards self-aware PerAda systemsPervasive Adaptation (PerAda) refers to massive-scale pervasive information and communication systems which are capable of autonomously adapting to highly dynamic and open technological and user contexts. PerAda systems are thus a special case of col... Read More about Towards self-aware PerAda systems..
Finding common ground: Interdisciplinary workshops for Interaction design education. (2010)
Presentation / Conference Contribution
Hand, C., Mitrovic, I., & Smyth, M. (2010). Finding common ground: Interdisciplinary workshops for Interaction design education.
Research: why bother? (2010)
Journal Article
Hall, H., & Clapton, J. (2010). Research: why bother?. Public Library Journal, 25(3), 18-21This article explains why librarianship research is so important for practice, and the value of CILIP's Library and Information Research Group.
Implementing a co-ordinated and strategic approach to Library and Information Science research: the work of the UK Library and Information Science Research Coalition (2010)
Presentation / Conference Contribution
Hall, H., & Brazier, C. (2010, August). Implementing a co-ordinated and strategic approach to Library and Information Science research: the work of the UK Library and Information Science Research Coalition. Presented at World Library and Information Congress: 76th IFLA General Conference and AssemblyIn recent years there has been growing recognition amongst the UK library and information profession of a need for a co-ordinated and strategic approach to Library and Information Science (LIS) research. Therefore in March 2009 the British Library (B... Read More about Implementing a co-ordinated and strategic approach to Library and Information Science research: the work of the UK Library and Information Science Research Coalition.
Promoting the priorities of practitioner research engagement. (2010)
Journal Article
Hall, H. (2010). Promoting the priorities of practitioner research engagement. Journal of Librarianship and Information Science, 42(2), 83-88. https://doi.org/10.1177/0961000610363978One of the aims of the Library and Information Science Research Coalition is to promote library and information science practitioner research. Successfully meeting this aim should result in greater use of the existing knowledge base and the creation... Read More about Promoting the priorities of practitioner research engagement..
A survey of multiple tree visualisation. (2010)
Journal Article
Graham, M., & Kennedy, J. (2010). A survey of multiple tree visualisation. Information Visualization, 9, 235-252. https://doi.org/10.1057/ivs.2009.29This paper summarises the state-of-the-art in multiple tree visualisations. It discusses the spectrum of current representation techniques used on single trees, pairs of trees and finally multiple trees, in order to identify which representations are... Read More about A survey of multiple tree visualisation..
Design Issues for Peer-to-Peer Massively Multiplayer Online Games. (2010)
Journal Article
Fan, L., Trinder, P., & Taylor, H. (2010). Design Issues for Peer-to-Peer Massively Multiplayer Online Games. International Journal of Advanced Media and Communication, 4, 108-125. https://doi.org/10.1504/IJAMC.2010.032138Massively Multiplayer Online Games (MMOGs) are increasing in both popularity and scale, and while classical Client/Server (C/S) architectures convey some benefits, they suffer from significant technical and commercial drawbacks. This realisation has... Read More about Design Issues for Peer-to-Peer Massively Multiplayer Online Games..
Deadline-Driven Auctions for NPC Host Allocation on P2P MMOGs. (2010)
Journal Article
Fan, L., Trinder, P., & Taylor, H. (2010). Deadline-Driven Auctions for NPC Host Allocation on P2P MMOGs. International Journal of Advanced Media and Communication, 4, 140-153. https://doi.org/10.1504/IJAMC.2010.032140We present the design, implementation and evaluation of Deadline-Driven Auctions (DDAs), a novel task-mapping infrastructure for heterogeneous distributed environments. DDA is primarily designed for hosting Non-Player Characters (NPCs) in P2P Massive... Read More about Deadline-Driven Auctions for NPC Host Allocation on P2P MMOGs..
The age of access? Information policy and social progress. (2010)
Book Chapter
Duff, A. (2010). The age of access? Information policy and social progress. In S. Papathanassopoulos, & R. Negrine (Eds.), Communications Policy: Theories and Issues (49-64). Palgrave Publishers
Daniel Bell's theory of the information society. (2010)
Book Chapter
Duff, A. (2010). Daniel Bell's theory of the information society. In B. Smart (Ed.), Post-Industrial Society (201-232). SAGE PublicationsDaniel Bell is recognised to be the foremost writer on the information society. The paper expounds his writings in detail, showing their development from the 1960s to the 1990s. It is argued that his position has always contained three distinguishabl... Read More about Daniel Bell's theory of the information society..
Signing an e-petition as a transition from lurking to participation. (2010)
Book Chapter
Cruickshank, P., Edelmann, N., & Smith, C. F. (2010). Signing an e-petition as a transition from lurking to participation. In J. Chappellet, O. Glassey, M. Janssen, A. Macintosh, J. Scholl, E. Tambouris, & M. Wimmer (Eds.), Electronic Government and Electronic Participation (275-282). TraunerAs one form of online political participation, the e-petitioning is seen as a response to a perceived decline in public trust of political institutions and the associated symptoms of political disengagement. This paper uses the psychological concept... Read More about Signing an e-petition as a transition from lurking to participation..