Skip to main content

Research Repository

Advanced Search

Inclusive design for ordinary users in extraordinary circumstances (2009)
Conference Proceeding
Keates, S. (2009). Inclusive design for ordinary users in extraordinary circumstances. In C. Stephanidis (Ed.), Universal Access in Human-Computer Interaction. Addressing Diversity. 5th International Conference, UAHCI 2009, Proceedings, Part I (525-534). https://doi.org/10.1007/978-3-642-02707-9_59

Universal access is commonly interpreted as focusing on designing for users with atypical requirements ? specifically users with disabilities or older adults. However, universal access is also about providing access to users in all situations and cir... Read More about Inclusive design for ordinary users in extraordinary circumstances.

Cognitive impairments, HCI and daily living (2009)
Conference Proceeding
Keates, S., Kozloski, J., & Varker, P. (2009). Cognitive impairments, HCI and daily living. In C. Stephanidis (Ed.), Universal Access in Human-Computer Interaction. Addressing Diversity. 5th International Conference, UAHCI 2009, Proceedings, Part I (366-374). https://doi.org/10.1007/978-3-642-02707-9_42

As computer systems become increasingly more pervasive in everyday life, it is simultaneously becoming ever more important that the concept of universal access is accepted as a design mantra. While many physical impairments and their implications for... Read More about Cognitive impairments, HCI and daily living.

Intrusion Detection Using Geometrical Structure (2009)
Conference Proceeding
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. (2009). Intrusion Detection Using Geometrical Structure. In Fourth International Conference on Frontier of Computer Science and Technology, 2009. FCST '09 (327-333). https://doi.org/10.1109/fcst.2009.97

We propose a statistical model, namely Geometrical Structure Anomaly Detection (GSAD) to detect intrusion using the packet payload in the network. GSAD takes into account the correlations among the packet payload features arranged in a geometrical st... Read More about Intrusion Detection Using Geometrical Structure.

A Multiple Viewed Interrelated Ontology Model for Holistic Component Specification and Retrieval (2009)
Conference Proceeding
Li, C., Liu, X., & Kennedy, J. (2009). A Multiple Viewed Interrelated Ontology Model for Holistic Component Specification and Retrieval. In S. Abrahão, J. Verner, T. Jiang, A. Kiumi, T. Kim, & D. Ślęzak (Eds.), Advances in Software Engineering. ASEA 2009 (50-60). https://doi.org/10.1007/978-3-642-10619-4_7

Despite the success that Component-Based Development has achieved so far, component mismatch remains as a major hurdle for wider and smoother component reuse due to the lack of effective and automated approaches to component specification and retriev... Read More about A Multiple Viewed Interrelated Ontology Model for Holistic Component Specification and Retrieval.

Strengthening the Forward Variable Selection Stopping Criterion (2009)
Conference Proceeding
Herrera, L. J., Rubio, G., Pomares, H., Paechter, B., Guillén, A., & Rojas, I. (2009). Strengthening the Forward Variable Selection Stopping Criterion. In Artificial Neural Networks – ICANN 2009 (215-224). https://doi.org/10.1007/978-3-642-04277-5_22

Given any modeling problem, variable selection is a preprocess step that selects the most relevant variables with respect to the output variable. Forward selection is the most straightforward strategy for variable selection; its application using the... Read More about Strengthening the Forward Variable Selection Stopping Criterion.

Practical interaction design. (2009)
Conference Proceeding
Turner, P., & Turner, S. (2009). Practical interaction design. In HCI Educators 2009 - Playing with our education (18-19)

Practical Interaction Design (PID) is a method for teaching interaction design. It incorporates elements of ‘pure’ interaction design and human–computer interaction (HCI) to convey some of the playful flavour of the former with the tool-rich pra... Read More about Practical interaction design..

The end of cognition? (2009)
Journal Article
Turner, P. (2009). The end of cognition?. Human Technology: An Interdisciplinary Journal on Humans in ICT Environments, 5, 5-11

Presence and consciousness. (2009)
Book Chapter
Turner, P. (2009). Presence and consciousness. In D. Benyon, M. Smyth, & I. Helgason (Eds.), Presence for everyone: a short guide to presence research (21-24). Peach Consortium

Radio frequency identification (RFID) in pervasive healthcare (2009)
Journal Article
Fekri, A. H., Thuemmler, C., Buchanan, W., Fekri, H., & Lawson, A. (2009). Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management, 10(1/2), 119. https://doi.org/10.1504/ijhtm.2009.023731

Active and passive RFID (Radio Frequency Identification) technology are available and licensed for the use in hospitals, and can be used to establish highly reliable pervasive environments within healthcare facilities. They should not be understood a... Read More about Radio frequency identification (RFID) in pervasive healthcare.

Using social networking tools to promote eParticipation initiatives. (2009)
Conference Proceeding
Taylor-Smith, E., & Lindner, R. (2009). Using social networking tools to promote eParticipation initiatives. In A. Prosser, & P. Parycek (Eds.), Proceedings of EDEM 2009 - Conference on Electronic Democracy, September 7-8, 2009, Vienna (115-121)

This paper describes the context and background of the conference workshop “Social networking tools and widgets to promote or expand eParticipation initiatives”. Social networking tools form many people’s main Internet destination and communication m... Read More about Using social networking tools to promote eParticipation initiatives..

Designing e-Participation with Balkan journalists. (2009)
Journal Article
Taylor-Smith, E., & Buckner, K. (2009). Designing e-Participation with Balkan journalists. JeDEM eJournal of eDemocracy and Open Government, 1, 12-20

This paper describes the use of scenarios as a central part of the design methodology, in a project to create an e-participation initiative, working with the national news agencies in 3 Western Balkans countries. The stakeholders in the project came... Read More about Designing e-Participation with Balkan journalists..

Fragments of place : revealing sense of place through shared phone images. (2009)
Digital Artefact
Smyth, M., & Helgason, I. (2009). Fragments of place : revealing sense of place through shared phone images

Is an interactive new media art installation that explores how the sharing of images, normally hidden on mobile phones, can reveal more about people's sense of place and this ultimately shared experience. Traditional views on sense of place, as exemp... Read More about Fragments of place : revealing sense of place through shared phone images..

Messenger in The Barn: networking in a learning environment (2009)
Journal Article
Rutter, M. (2009). Messenger in The Barn: networking in a learning environment. ALT-J : Association for Learning Technology journal, 17, 33-47. https://doi.org/10.1080/09687760802649863

This case study describes the use of a synchronous communication application (MSN Messenger) in a large academic computing environment. It draws on data from interviews, questionnaires and student marks to examine the link between use of the applicat... Read More about Messenger in The Barn: networking in a learning environment.

Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems (2009)
Conference Proceeding
Riley, C., Johnson, G., McCracken, H., & Al-Saffar, A. (2009). Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems. In Human-Computer Interaction – INTERACT 2009 (293-305). https://doi.org/10.1007/978-3-642-03658-3_35

Biometric authentication is the process of establishing an individual’s identity through measurable characteristics of their behaviour, anatomy or physiology. Biometric technologies, such as fingerprint systems, are increasingly being used in a diver... Read More about Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems.

Culture & biometrics: regional differences in the perception of biometric authentication technologies (2009)
Journal Article
Riley, C. W., Buckner, K., Johnson, G., & Benyon, D. (2009). Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & society, 24, 295-306. https://doi.org/10.1007/s00146-009-0218-1

Previous research has identified user concerns about biometric authentication technology, but most of this research has been conducted in European contexts. There is a lack of research that has investigated attitudes towards biometric technology in o... Read More about Culture & biometrics: regional differences in the perception of biometric authentication technologies.

Revisiting the potentialities of a mechanical thesaurus. (2009)
Conference Proceeding
Priss, U., & Old, L. J. (2009). Revisiting the potentialities of a mechanical thesaurus. In R. Ferre (Ed.), Proceedings of the 7th International Conference on Formal Concept Analysis, ICFCA (284-298). https://doi.org/10.1007/978-3-642-01815-2_21

This paper revisits the lattice-based thesaurus models which Margaret Masterman used for machine translation in the 1950’s and 60’s. Masterman’s notions are mapped onto modern, Formal Concept Analysis (FCA) terminology and three of her thesaurus algo... Read More about Revisiting the potentialities of a mechanical thesaurus..

Relation algebra operations on formal contexts (2009)
Conference Proceeding
Priss, U. (2009). Relation algebra operations on formal contexts. In S. Rudolph, F. Dau, & S. O. Kutznetsov (Eds.), Conceptual Structures: Leveraging Semantic Technologies (257-269). https://doi.org/10.1007/978-3-642-03079-6_20

This paper discusses the use of relation algebra operations on formal contexts. These operations are a generalisation of some of the context operations that are described in the standard FCA textbook (Ganter & Wille, 1999). This paper extends previou... Read More about Relation algebra operations on formal contexts.

The FcaFlint software for relation algebra operations on FCA contexts. (2009)
Conference Proceeding
Priss, U. (2009). The FcaFlint software for relation algebra operations on FCA contexts. In Conceptual Structures Tool Interoperability Workshop (13-23)

FcaFlint is a tool that implements context operations for FCA formal contexts. It is part of the FcaStone package. This paper provides an introduction to Relation Algebra operations as used by FcaFlint and discusses the commandline interface and i... Read More about The FcaFlint software for relation algebra operations on FCA contexts..

The semantic structure of Roget’s Thesaurus cross-references. (2009)
Conference Proceeding
Old, L. J. (2009). The semantic structure of Roget’s Thesaurus cross-references. In U. Priss, & G. Angelova (Eds.), Conceptual Structures for Extracting Natural Language Semantics

This study analyzed a database version of Roget’s Thesaurus (Roget’s International Thesaurus, 3rd Edition, 1962) for connectivity patterns among cross-references in order to identify the implicit conceptual structure. Semantic patterns implicit in th... Read More about The semantic structure of Roget’s Thesaurus cross-references..