Skip to main content

Research Repository

Advanced Search

DISCOVERing the impact of reality (poster session) (2000)
Presentation / Conference Contribution
Dawson, L., Turner, S., Turner, P., Dawson, L., & Munro, A. (2000, September). DISCOVERing the impact of reality (poster session). Presented at Proceedings of the third international conference on Collaborative virtual environments - CVE '00

In this poster paper, we introduce the DISCOVER project, which
is developing a CVE for teams to practice managing emergencies
in offshore and maritime domains. Many factors constrain design
in such contexts. Here we describe just one of them, the... Read More about DISCOVERing the impact of reality (poster session).

HCI 2000 Volume II (2000)
Presentation / Conference Contribution
Turner, S., & Turner, P. (2000). HCI 2000 Volume II.

Uncovering the context for collaboration. (2000)
Presentation / Conference Contribution
Turner, P., & Turner, S. (2000). Uncovering the context for collaboration. In Proceedings of the 7th UK VR-SIG Conference

Cui Bono? (2000)
Presentation / Conference Contribution
Turner, P., & Turner, S. (2000). Cui Bono?. In Proceedings of the 1st French-British Virtual Reality International Workshop

No abstract available.

British political parties: continuity and change in the information age. (2000)
Book Chapter
Smith, C. F. (2000). British political parties: continuity and change in the information age. In I. Horrocks, J. Hoff, & P. Tops (Eds.), Democratic Governance and New Technology: Technologically Mediated Innovations in Political Practice in Western Europe (72-87). Routledge

Software agents and computer network security. (2000)
Presentation / Conference Contribution
Pikoulas, J., Mannion, M., & Buchanan, W. J. (2000, April). Software agents and computer network security

Preventing unauthorised access to corporate information systems is essential for many organisations. To address this problem we built a security enhancement software system using software agents, in which a core software agent resides on a server and... Read More about Software agents and computer network security..

Stone Soup (2000)
Presentation / Conference Contribution
Paechter, B., Fogarty, T. C., Burke, E., Cumming, A., & Rankin, B. (2000). Stone Soup. In Practice and Theory of Automated Timetabling III

Speed and scale up software re-engineering with abstraction patterns and rules. (2000)
Presentation / Conference Contribution
Liu, X., Yang, H., Zedan, H., & Cau, A. (2000, November). Speed and scale up software re-engineering with abstraction patterns and rules. Presented at International Symposium on Principles of Software Evolution, 2000

Software reengineering is an essential part of software evolution. Two important issues faced by software reengineering techniques are the time involved and the ability to cope with the scale of software systems. Unless these two issues have been add... Read More about Speed and scale up software re-engineering with abstraction patterns and rules..

Designing non-speech sounds to support navigation in mobile phone menus. (2000)
Presentation / Conference Contribution
LePlâtre, G., & Brewster, S. A. (2000). Designing non-speech sounds to support navigation in mobile phone menus.

This paper describes a framework for integrating non-speech audio to hierarchical menu structures where the visual feedback is limited. In the first part of this paper, emphasis is put on how to extract sound design principles from actual navigation... Read More about Designing non-speech sounds to support navigation in mobile phone menus..

Enhancing the performance of a GA through visualisation. (2000)
Presentation / Conference Contribution
Hart, E., & Ross, P. (2000). Enhancing the performance of a GA through visualisation. In Proceedings of GECCO-2000

This article describes a new tool for visualising genetic algorithms, (GAs) which is designed in order to allow the implicit mechanisms
of the GA | i.e. crossover and mutation | to be thoroughly analysed. This allows the user to determine whether th... Read More about Enhancing the performance of a GA through visualisation..

Solving CSPs with evolutionary algorithms using self-adaptive constraint weights. (2000)
Presentation / Conference Contribution
Eiben, A. E., Jansen, B., Michalewicz, Z., & Paechter, B. (2000, July). Solving CSPs with evolutionary algorithms using self-adaptive constraint weights. Presented at Genetic and Evolutionary Computation Conference (GECCO-2000)

This paper examines evolutionary algorithms (EAs) extended by various penalty-based approaches to solve constraint satisfaction
problems (CSPs). In some approaches, the penalties are set in advance and they do not change during a run. In other appro... Read More about Solving CSPs with evolutionary algorithms using self-adaptive constraint weights..

Narratives of new media in Scottish households: the evolution of a framework of enquiry. (2000)
Journal Article
Davenport, E., Higgins, M., & Somerville, I. (2000). Narratives of new media in Scottish households: the evolution of a framework of enquiry. Journal of the American Society for Information Science and Technology, 51, 900-912. https://doi.org/10.1002/1097-4571%282000%2951%3A103.0.CO%3B2-U

The authors describe a study of the social dynamics of new media in Scottish households. The evolving project drew on dialogues with multiple household members elicited in group conversations. This approach to interviews captured different and confli... Read More about Narratives of new media in Scottish households: the evolution of a framework of enquiry..

Non-contractual trust, design, and human and computer interactions (2000)
Presentation / Conference Contribution
Marsh, S., Davenport, E., Dibben, M., Friedman, B., March, S., Rosenbaum, H., & Thimbleby, H. (2000). Non-contractual trust, design, and human and computer interactions. In CHI 2000 Proceedings (239-240). https://doi.org/10.1145/633292.633432

How might trust be a component of human-computer based interaction? There are a number of dimensions involving different combinations of humans, systems and computer agents. Recent studies of trust in the workplace indicate that trust has many attrib... Read More about Non-contractual trust, design, and human and computer interactions.

Knowledge management; semantic drift or conceptual shift? (2000)
Journal Article
Davenport, E., & Cronin, B. (2000). Knowledge management; semantic drift or conceptual shift?. Journal of Education for Library and Information Science, 41(4), 294-306. https://doi.org/10.2307/40324047

This paper offers an exploration of knowledge management (KM), a concept only partially understood in domains that use the term. Three such domains are described: library and information science (LIS), business administration, and organization theory... Read More about Knowledge management; semantic drift or conceptual shift?.

Enhancing network management using mobile agents. (2000)
Presentation / Conference Contribution
Buchanan, W. J., Naylor, M., & Scott, A. (2000, April). Enhancing network management using mobile agents

Agent mobility addresses some limitations faced by classic client/server architecture, namely, in minimising bandwidth consumption, in supporting adaptive network load balancing and in solving problems caused by intermittent or unreliable network con... Read More about Enhancing network management using mobile agents..

Distributed systems and networks. (2000)
Book
Buchanan, W. J. (2000). Distributed systems and networks. McGraw-Hill

This book provides the student with comprehensive coverage of both networks and system architecture. It aims to introduce the most widely used networking protocols and distributed systems, covering recent developments in distributed processing and th... Read More about Distributed systems and networks..

Computer busses. (2000)
Book
Buchanan, W. J. (2000). Computer busses. Newton, MA, USA: Butterworth-Heinemann

Using non-speech sounds in mobile computing devices. (2000)
Presentation / Conference Contribution
Brewster, S. A., LePlâtre, G., & Crease, M. (2000). Using non-speech sounds in mobile computing devices. In C. Johnson (Ed.), First Workshop on Human-Computer Interaction with Mobile Devices (26-29)