Skip to main content

Research Repository

Advanced Search

IS Degrees: Sociotechnical or Technosocial? - A Reflective Analysis. (2013)
Presentation / Conference Contribution
Coady, J., Berg, T., & Pooley, R. (2012, August). IS Degrees: Sociotechnical or Technosocial? - A Reflective Analysis. Presented at ISD Conference

This paper describes a reflective and empirical investigation by staff involved in delivery of the Heriot-Watt University Information Systems undergraduate degree. It looks particularly at the practical relevance of the IS 2010 model curriculum, aski... Read More about IS Degrees: Sociotechnical or Technosocial? - A Reflective Analysis..

Verifying the CPA Networking Stack using SPIN/Promela. (2013)
Presentation / Conference Contribution
Chalmers, K., & Kerridge, J. (2013, August). Verifying the CPA Networking Stack using SPIN/Promela. Presented at 35th WoTUG conference on concurrent and parallel programming

This paper presents a verification of the CPA Networking Stack, using the SPIN Model Checker. Our work shows that the system developed for general networking within CPA applications works under the conditions defined for it. The model itself focuses... Read More about Verifying the CPA Networking Stack using SPIN/Promela..

An immune network approach for self-adaptive ensembles of autonomic components: a case study in swarm robotics. (2013)
Presentation / Conference Contribution
Capodieci, N., Hart, E., & Cabri, G. (2013, September). An immune network approach for self-adaptive ensembles of autonomic components: a case study in swarm robotics

We describe an immune inspired approach to achieve self-expression within an ensemble, i.e. enabling an ensemble of autonomic components to dynamically change their coordination pattern during the runtime execution of a given task. Building on previo... Read More about An immune network approach for self-adaptive ensembles of autonomic components: a case study in swarm robotics..

Designing self-aware adaptive systems: from autonomic computing to cognitive immune networks. (2013)
Presentation / Conference Contribution
Capodieci, N., Hart, E., & Cabri, G. (2013, September). Designing self-aware adaptive systems: from autonomic computing to cognitive immune networks. Presented at IEEE Conference on Self-Organising and Self-Adaptative Systems (SASO)

An autonomic system is composed of ensembles of heterogeneous autonomic components in which large sets of components are dynamically added and removed. Nodes within such an ensemble should cooperate to achieve system or human goals, and systems are e... Read More about Designing self-aware adaptive systems: from autonomic computing to cognitive immune networks..

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., Varga, J., & Anderson, C. (2013, April). Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. Presented at CSP 2013: Cyber Security and Privacy

We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, organisations and units, into a formal definition, and then implement these as... Read More about Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture..

Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., & Clayton, J. (2013, June). Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. Presented at Cyberforensics 2013, Cardiff, UK

There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other electronic devices increases, and as the storage capacity of these devices i... Read More about Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter..

Scenarios for Companions. (2013)
Book Chapter
Benyon, D., & Mival, O. (2013). Scenarios for Companions. In Your Virtual Butler: the making of (79-96). Springer Berlin / Heidelberg. https://doi.org/10.1007/978-3-642-37346-6_8

This paper is concerned with understanding the needs of Companion owners (the people formerly known as ‘users’). The problem with developing technologies such as companions is in knowing what the requirements are. People cannot really be expected to... Read More about Scenarios for Companions..

Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds (2013)
Journal Article
Wei, H., Wang, Z., Liu, X., Chalmers, K., & Cheng, G. (2013). Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds. Journal of Industrial and Intelligent Information, 1(1), 6-9. https://doi.org/10.12720/jiii.1.1.6-9

The proposed research will focus on developing a novel approach to solve Software Service Evolution problems in Computing Clouds. The approach will support dynamic evolution of the software service in clouds via a set of discovered evolution patterns... Read More about Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds.

Understanding Iconography: a method to allow rich picture interpretation to improve (2013)
Thesis
Berg, T. Understanding Iconography: a method to allow rich picture interpretation to improve. (Thesis). Heriot-Watt University. http://researchrepository.napier.ac.uk/id/eprint/7207

Information Systems for complex situations often fail to adequately deliver quality and suitability. One reason for this failure is an inability to identify comprehensive user requirements. Seldom do all stakeholders, especially those "invisible‟ or... Read More about Understanding Iconography: a method to allow rich picture interpretation to improve.

Blue sky thinking? (2013)
Journal Article
Hamoudi, J., & Cruickshank, P. (2013). Blue sky thinking?. The Journal of the Law Society of Scotland, 18-22

Review of the results of research into the factors that influence legal firms considering whether to adopt cloud-based IT solutions. The article can be read for free here: http://www.journalonline.co.uk/Magazine/58-11/1013300.aspx

MaTSE: the gene expression time-series explorer (2013)
Journal Article
Craig, P., Cannon, A., Kukla, R., & Kennedy, J. (2013). MaTSE: the gene expression time-series explorer. BMC Bioinformatics, 14(Suppl 19), https://doi.org/10.1186/1471-2105-14-s19-s1

Background
High throughput gene expression time-course experiments provide a perspective on biological functioning recognized as having huge value for the diagnosis, treatment, and prevention of diseases. There are however significant challenges to... Read More about MaTSE: the gene expression time-series explorer.

A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks (2013)
Presentation / Conference Contribution
Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2013, September). A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks. Presented at 2013 5th Computer Science and Electronic Engineering Conference (CEEC), Colchester, UK

Optical and wireless integration scheme merges the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of the wireless counterparts for the Subscriber Stations (SSs). It is also financially viab... Read More about A mathematical model for a GA-based dynamic excess bandwidth allocation algorithm for hybrid PON and wireless technology integrations for next generation broadband access networks.

Novel Two-Stage Audiovisual Speech Filtering in Noisy Environments (2013)
Journal Article
Abel, A., & Hussain, A. (2014). Novel Two-Stage Audiovisual Speech Filtering in Noisy Environments. Cognitive Computation, 6(2), 200-217. https://doi.org/10.1007/s12559-013-9231-2

In recent years, the established link between the various human communication production domains has become more widely utilised in the field of speech processing. In this work, we build on previous work by the authors and present a novel two-stage a... Read More about Novel Two-Stage Audiovisual Speech Filtering in Noisy Environments.

Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework (2013)
Journal Article
Ikram, A., Anjum, A., Hill, R., Antonopoulos, N., Liu, L., & Sotiriadis, S. (2015). Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience, 27(8), 1966-1984. https://doi.org/10.1002/cpe.3131

Summary
The evolution of communication protocols, sensory hardware, mobile and pervasive devices, alongside social and cyber‐physical networks, has made the Internet of things (IoT) an interesting concept with inherent complexities as it is realised... Read More about Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework.

Approaches to the classification of high entropy file fragments. (2013)
Journal Article
Penrose, P., Macfarlane, R., & Buchanan, W. J. (2013). Approaches to the classification of high entropy file fragments. Digital Investigation, 10(4), 372-384. https://doi.org/10.1016/j.diin.2013.08.004

In this paper we propose novel approaches to the problem of classifying high entropy file fragments. We achieve 97% correct classification for encrypted fragments and 78% for compressed. Although classification of file fragments is central to the sci... Read More about Approaches to the classification of high entropy file fragments..

Designing interactive systems : a comprehensive guide to HCI, UX and interaction design (2013)
Book
Benyon, D. (2013). Designing interactive systems : a comprehensive guide to HCI, UX and interaction design. (Third edition). Pearson Education

Designing Interactive Systems is the most authoritative textbook in the areas of human–computer interaction (HCI), usability, consumer experience and interaction design. David Benyon has updated the book based on extensive user feedback to provide a... Read More about Designing interactive systems : a comprehensive guide to HCI, UX and interaction design.

Cloud migration for SMEs in a Service Oriented Approach. (2013)
Presentation / Conference Contribution
Nussbaumer, N., & Liu, X. (2013, July). Cloud migration for SMEs in a Service Oriented Approach

Cloud computing has gained immense momentum during recent years and has ultimately become a viable solutions not only for larger firms, but also for small and medium-sized enterprises (SMEs). For smaller companies to stay competitive, many have there... Read More about Cloud migration for SMEs in a Service Oriented Approach..

Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games (2013)
Journal Article
Liu, L., Jones, A., Antonopoulos, N., Ding, Z., & Zhan, Y. (2015). Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games. Multimedia Tools and Applications, 74(8), 2763-2780. https://doi.org/10.1007/s11042-013-1662-y

Massively Multiplayer Online Games are networked games that allow a large number of people to play together. Classically MMOG worlds are hosted on many powerful servers and players that move around the world are passed from server to server as they p... Read More about Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games.

On and Offline Tangible Interaction: Studying the Secret Lives of Augmented Objects (2013)
Presentation / Conference Contribution
Oakley, I., & Esteves, A. (2013, July). On and Offline Tangible Interaction: Studying the Secret Lives of Augmented Objects. Presented at 2013 International Symposium on Ubiquitous Virtual Reality, Daejeon, South Korea

The smart, augmented objects that appear in systems that support tangible interaction have a dual life. While they can exhibit complex digital behaviors in the technological context they are designed for, they are also static, standard physical objec... Read More about On and Offline Tangible Interaction: Studying the Secret Lives of Augmented Objects.