Skip to main content

Research Repository

Advanced Search

All Outputs (66)

The Prometheus database for taxonomy (2000)
Presentation / Conference Contribution
Raguenaud, C., Kennedy, J., & Barclay, P. (2000, July). The Prometheus database for taxonomy. Presented at Proceedings. 12th International Conference on Scientific and Statistica Database Management

This paper presents the work carried out in the Prometheus project and its motivation, taxonomy. Taxonomy presents challenges to common database systems. Because of its complexity and the necessary treatments applied to its data, common database mode... Read More about The Prometheus database for taxonomy.

Software agents and computer network security. (2000)
Presentation / Conference Contribution
Pikoulas, J., Mannion, M., & Buchanan, W. J. (2000, April). Software agents and computer network security

Preventing unauthorised access to corporate information systems is essential for many organisations. To address this problem we built a security enhancement software system using software agents, in which a core software agent resides on a server and... Read More about Software agents and computer network security..

Stone Soup (2000)
Presentation / Conference Contribution
Paechter, B., Fogarty, T. C., Burke, E., Cumming, A., & Rankin, B. (2000). Stone Soup. In Practice and Theory of Automated Timetabling III

Speed and scale up software re-engineering with abstraction patterns and rules. (2000)
Presentation / Conference Contribution
Liu, X., Yang, H., Zedan, H., & Cau, A. (2000, November). Speed and scale up software re-engineering with abstraction patterns and rules. Presented at International Symposium on Principles of Software Evolution, 2000

Software reengineering is an essential part of software evolution. Two important issues faced by software reengineering techniques are the time involved and the ability to cope with the scale of software systems. Unless these two issues have been add... Read More about Speed and scale up software re-engineering with abstraction patterns and rules..

Designing non-speech sounds to support navigation in mobile phone menus. (2000)
Presentation / Conference Contribution
LePlâtre, G., & Brewster, S. A. (2000). Designing non-speech sounds to support navigation in mobile phone menus.

This paper describes a framework for integrating non-speech audio to hierarchical menu structures where the visual feedback is limited. In the first part of this paper, emphasis is put on how to extract sound design principles from actual navigation... Read More about Designing non-speech sounds to support navigation in mobile phone menus..

Enhancing the performance of a GA through visualisation. (2000)
Presentation / Conference Contribution
Hart, E., & Ross, P. (2000). Enhancing the performance of a GA through visualisation. In Proceedings of GECCO-2000

This article describes a new tool for visualising genetic algorithms, (GAs) which is designed in order to allow the implicit mechanisms of the GA | i.e. crossover and mutation | to be thoroughly analysed. This allows the user to determine whether th... Read More about Enhancing the performance of a GA through visualisation..

A comparison of set-based and graph-based visualisations of overlapping classification hierarchies. (2000)
Presentation / Conference Contribution
Graham, M., Kennedy, J., & Hand, C. (2000, May). A comparison of set-based and graph-based visualisations of overlapping classification hierarchies. Presented at ACM Advanced Visual Interfaces (AVI) 2000

The visualisation of hierarchical information sets has been a staple of Information Visualisation since the field came into being in the early 1990's. However, at present, support for visualising the correlations between multiple, overlapping sets of... Read More about A comparison of set-based and graph-based visualisations of overlapping classification hierarchies..

Solving CSPs with evolutionary algorithms using self-adaptive constraint weights. (2000)
Presentation / Conference Contribution
Eiben, A. E., Jansen, B., Michalewicz, Z., & Paechter, B. (2000, July). Solving CSPs with evolutionary algorithms using self-adaptive constraint weights. Presented at Genetic and Evolutionary Computation Conference (GECCO-2000)

This paper examines evolutionary algorithms (EAs) extended by various penalty-based approaches to solve constraint satisfaction problems (CSPs). In some approaches, the penalties are set in advance and they do not change during a run. In other appro... Read More about Solving CSPs with evolutionary algorithms using self-adaptive constraint weights..

Non-contractual trust, design, and human and computer interactions (2000)
Presentation / Conference Contribution
Marsh, S., Davenport, E., Dibben, M., Friedman, B., March, S., Rosenbaum, H., & Thimbleby, H. (2000). Non-contractual trust, design, and human and computer interactions. In CHI 2000 Proceedings (239-240). https://doi.org/10.1145/633292.633432

How might trust be a component of human-computer based interaction? There are a number of dimensions involving different combinations of humans, systems and computer agents. Recent studies of trust in the workplace indicate that trust has many attrib... Read More about Non-contractual trust, design, and human and computer interactions.

Localisation, globalisation, and SMEs in European tourism: the ‘virtual enterprise model of intervention’. (2000)
Presentation / Conference Contribution
Davenport, E. (2000). Localisation, globalisation, and SMEs in European tourism: the ‘virtual enterprise model of intervention’. In Proceedings of ASIS 2000, Technical Papers Volume (309-319)

Discussion of the effect of globalization on SMEs (small and medium enterprises) in Europe focuses on a case study of a current European Commission (EC) project, Net Quality, which is based on the virtual enterprise as an intervention model that may... Read More about Localisation, globalisation, and SMEs in European tourism: the ‘virtual enterprise model of intervention’..

Conceptual Modelling for Database User Interfaces (2000)
Presentation / Conference Contribution
Cooper, R., McKirdy, J., Griffiths, T., Barclay, P. J., Paton, N. W., Gray, P., Kennedy, J., & Goble, C. (2000, May). Conceptual Modelling for Database User Interfaces. Presented at Visual Database Systems - VDB5, 2000, Fukuoka, Japan

Model-based user interface development environments show promise for improving the speed of production and quality user interfaces. Such systems usually have seperate descriptions of domain, task and presentation to structure. The Teallach system app... Read More about Conceptual Modelling for Database User Interfaces.

Real-world applications of evolutionary computing (2000)
Presentation / Conference Contribution
Cagnoni, S., Poli, R., Smith, G. D., Corne, D., Oates, M., Hart, E., …Fogarty, T. C. (2000). Real-world applications of evolutionary computing. In Proceedings of EvoWorkshops 2000

This book constitutes the refereed proceedings of six workshops on evolutionary computation held concurrently as EvoWorkshops 2000 in Edinburgh, Scotland, UK, in April 2000. The 37 revised papers presented were carefully reviewed and selected by the... Read More about Real-world applications of evolutionary computing.

Enhancing network management using mobile agents. (2000)
Presentation / Conference Contribution
Buchanan, W. J., Naylor, M., & Scott, A. (2000, April). Enhancing network management using mobile agents

Agent mobility addresses some limitations faced by classic client/server architecture, namely, in minimising bandwidth consumption, in supporting adaptive network load balancing and in solving problems caused by intermittent or unreliable network con... Read More about Enhancing network management using mobile agents..

Using non-speech sounds in mobile computing devices. (2000)
Presentation / Conference Contribution
Brewster, S. A., LePlâtre, G., & Crease, M. (2000). Using non-speech sounds in mobile computing devices. In C. Johnson (Ed.), First Workshop on Human-Computer Interaction with Mobile Devices (26-29)