Skip to main content

Research Repository

Advanced Search

The game is aFoot, Watson: DeepQA systems and the future of HCI (2012)
Book Chapter
Keates, S., & Varker, P. (2012). The game is aFoot, Watson: DeepQA systems and the future of HCI. In M. M. Soares, & F. Rebelo (Eds.), Advances in Usability Evaluation Part II (341-348). CRC Press. https://doi.org/10.1201/b12324-40

In February 2011, the IBM Watson DeepQA (deep question and answer) system took part in a special challenge, pitting its question and answer capability against former Jeopardy!TM grand champions in a televised match. Watson emerged victorious from the... Read More about The game is aFoot, Watson: DeepQA systems and the future of HCI.

Double-clicking poverty: the diffusion of ICT in the hotel sector in Addis Ababa, Ethiopia (2012)
Presentation / Conference Contribution
Demeke, W. (2012, December). Double-clicking poverty: the diffusion of ICT in the hotel sector in Addis Ababa, Ethiopia. Paper presented at University of West London, MPhil/PhD Conference Presentation

According to the United Nations Development Program, Information and Communication Technology (ICT) has a significant impact on the reduction of poverty in developing countries. In addition, a number of studies emphasise the positive developmental im... Read More about Double-clicking poverty: the diffusion of ICT in the hotel sector in Addis Ababa, Ethiopia.

A model checking based approach to automatic test suite generation for testing web services and BPEL. (2012)
Presentation / Conference Contribution
Zhao, H., Sun, J., & Liu, X. (2012, December). A model checking based approach to automatic test suite generation for testing web services and BPEL

With the rapid increase of Web Service applications, the reliability of web service and service composition has drawn particular attention from researchers and industries. Many methods for testing and verifying the reliability have been discussed, ho... Read More about A model checking based approach to automatic test suite generation for testing web services and BPEL..

Software reuse in the emerging cloud computing era. (2012)
Book
Yang, H., & Liu, X. (2012). Software reuse in the emerging cloud computing era. IGI Global Publishing. https://doi.org/10.4018/978-1-4666-0897-9

With the rapid development of computing hardware, high-speed network, web programming, distributed and parallel computing, and other technologies, cloud computing has recently emerged as a commercial reality. Software Reuse in the Emerging Cloud Comp... Read More about Software reuse in the emerging cloud computing era..

A new analytical model for multi-hop cognitive radio networks (2012)
Journal Article
Wu, Y., Min, G., & Al-Dubai, A. (2012). A new analytical model for multi-hop cognitive radio networks. IEEE Transactions on Wireless Communications, 11, 1643-1648. https://doi.org/10.1109/TWC.2012.030812.111106

The cognitive radio (CR) is an emerging technique for increasing the utilisation of communication resources by allowing the unlicensed users to employ the under-utilised spectrum. In this paper, a new analytical performance model is developed to eval... Read More about A new analytical model for multi-hop cognitive radio networks.

Evolution pattern for service evolution in clouds. (2012)
Presentation / Conference Contribution
Wang, Z., Liu, X., & Chalmers, K. (2012, December). Evolution pattern for service evolution in clouds

The proposed research will focus on
developing a novel approach to solve Software Service
Evolution problems in Computing Clouds. The
approach will support dynamic evolution of the
software service in clouds via a set of discovered
evolution pat... Read More about Evolution pattern for service evolution in clouds..

Novel tracking of rogue network packets using danger theory approach (2012)
Journal Article
Uwagbole, S., Buchanan, W. J., & Fan, L. (2012). Novel tracking of rogue network packets using danger theory approach. Proceedings of the ... international conference on information warfare and security, 277-286

Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hacking groups, such as Anonymous and Lulzsec. These groups often aim to disrupt computer networks and gain access to private confidential data. A typica... Read More about Novel tracking of rogue network packets using danger theory approach.

Enlightened trial and error (2012)
Journal Article
Turner, P., Turner, S., & Flint, T. (2012). Enlightened trial and error. Interaction Design and Architecture(s) IxDetA, 13/14, 64-83

Human-computer interaction as a rationalistic, engineering discipline has been taught successfully for more than 25 years. The established narrative is one of designing usable systems for users, some of whom have been described as “naïve”, safely ins... Read More about Enlightened trial and error.

Sketching concatenative synthesis: audiovisual Isomorphism in reduced modes. (2012)
Presentation / Conference Contribution
Tsiros, A., LePlâtre, G., & Smyth, M. (2012, July). Sketching concatenative synthesis: audiovisual Isomorphism in reduced modes. Presented at 9th Sound and Music Computing Conference

This paper presents a prototype allowing the control of a
concatenative synthesis algorithm using a 2D sketching
interface. The design of the system is underpinned by a
preliminary discussion in which isomorphisms between
auditory and visual phen... Read More about Sketching concatenative synthesis: audiovisual Isomorphism in reduced modes..

A Hyper-Heuristic classifier for one dimensional bin packing problems: Improving classification accuracy by attribute evolution. (2012)
Presentation / Conference Contribution
Sim, K., Hart, E., & Paechter, B. (2012, September). A Hyper-Heuristic classifier for one dimensional bin packing problems: Improving classification accuracy by attribute evolution. Presented at International Conference on Parallel Problem Solving from Nature

A hyper-heuristic for the one dimensional bin packing problem is presented that uses an Evolutionary Algorithm (EA) to evolve a set of attributes that characterise a problem instance. The EA evolves divisions of variable quantity and dimension that r... Read More about A Hyper-Heuristic classifier for one dimensional bin packing problems: Improving classification accuracy by attribute evolution..

Robot companions for citizens: roadmapping the potential for future robots In empowering older people. (2012)
Presentation / Conference Contribution
Prescott, T. J., Epton, T., Evers, V., McKee, K., Hawley, M., Webb, T., Benyon, D., Conran, S., Strand, R., Buning, M. D. C., Verschure, P., & Dario, P. (2012, May). Robot companions for citizens: roadmapping the potential for future robots In empowering older people

The Future Emerging Technologies (FET) Flagship Candi- date "Robot Companions for Citizens" (RCC) proposes a transformative initiative, addressing a cross-domain grand scientific and technological challenge, to develop a new class of machines and emb... Read More about Robot companions for citizens: roadmapping the potential for future robots In empowering older people..

Performance modelling and analysis of cognitive mesh networks (2012)
Journal Article
Min, G., Wu, Y., & Al-Dubai, A. (2012). Performance modelling and analysis of cognitive mesh networks. IEEE Transactions on Communications, 60, 1474-1478. https://doi.org/10.1109/TCOMM.2012.041212.110075A

A new analytical model is proposed to investigate the delay and throughput in cognitive mesh networks. The validity of the model is demonstrated via extensive simulation experiments. The model is then used to evaluate the effects of the number of lic... Read More about Performance modelling and analysis of cognitive mesh networks.

RDF recipes for context-aware interoperability in pervasive systems. (2012)
Presentation / Conference Contribution
Kosek, A., Syed, A., & Kerridge, J. (2010, June). RDF recipes for context-aware interoperability in pervasive systems. Presented at IEEE Symposium on Computers and Communications 2010

Nowadays home automation systems integrate many devices from security system, heating, ventilation and air conditioning system, lighting system or audio-video systems. Every time a new device is installed, problems with connecting it to other devices... Read More about RDF recipes for context-aware interoperability in pervasive systems..

A unified approach for the dynamic evolution of context-aware services. (2012)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2012, January). A unified approach for the dynamic evolution of context-aware services. Presented at International Conference on Innovations in Computers, Information and Communication - ICICIC 2012

Redeeming pedigree data with an interactive error cleaning visualisation. (2012)
Presentation / Conference Contribution
Graham, M., Kennedy, J., Paterson, T., & Law, A. (2012, May). Redeeming pedigree data with an interactive error cleaning visualisation. Presented at AVI 2012

We describe a visual data cleansing application for pedigree genotype data, which is used to redeem otherwise unusable pedigree data sets. Biologists and bioinformaticians dynamically and iteratively mask pieces of information from a dirty data set a... Read More about Redeeming pedigree data with an interactive error cleaning visualisation..

Everyday listening to auditory displays: lessons from acoustic ecology. (2012)
Presentation / Conference Contribution
Droumeva, M., & McGregor, I. (2012, June). Everyday listening to auditory displays: lessons from acoustic ecology. Presented at The 18th International Conference on Auditory Display (ICAD2012), Atlanta, Georgia

In order to design auditory displays that function well within the cultural, informational and acoustic ecology of everyday situations designers as well as researchers in psychoacoustics need to continue to gain a better understanding of how listener... Read More about Everyday listening to auditory displays: lessons from acoustic ecology..

Oil well placement optimization using niche particle swarm optimization. (2012)
Presentation / Conference Contribution
Cheng, G., An, Y., Wang, Z., & Zhu, K. (2012, November). Oil well placement optimization using niche particle swarm optimization

A challenging problem in oil field development project is the optimization of multi-wells placement because of the increasing in optimization variable quantities and searching space size. To overcome the limitation of traditional optimization with st... Read More about Oil well placement optimization using niche particle swarm optimization..

Iterative image warping (2012)
Journal Article
Bowles, H., Mitchell, K., Sumner, R., Moore, J., & Gross, M. (2012). Iterative image warping. Computer Graphics Forum, 31, 237-246. https://doi.org/10.1111/j.1467-8659.2012.03002.x

Animated image sequences often exhibit a large amount of inter-frame coherence which standard rendering algorithms and pipelines are ill-equipped to exploit, limiting their efficiency. To address this inefficiency we transfer rendering results across... Read More about Iterative image warping.