Skip to main content

Research Repository

Advanced Search

Future Perfect (2010)
Presentation / Conference Contribution
Morgan, A., Deane, A., & Flint, T. (2010, June). Future Perfect. Paper presented at Create 10

A workshop exploring the process of creating an immersive location based game driven by narrative. The game is specifically designed to be portable with minimal effort to tailor a meaningful experience in any city-based location.

Soundscape mapping: a tool for evaluating sounds and auditory environments (2010)
Presentation / Conference Contribution
McGregor, I., LePlâtre, G., Turner, P., & Flint, T. (2010, June). Soundscape mapping: a tool for evaluating sounds and auditory environments. Presented at The 16th International Conference on Auditory Display (ICAD-2010)

This paper describes a soundscape mapping tool, and provides an illustration of its use in the evaluation of an in-car auditory interface. The tool addresses three areas: communicating what people are listening to, showing how soundscapes can be visu... Read More about Soundscape mapping: a tool for evaluating sounds and auditory environments.

Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory (2010)
Journal Article
Hall, H., Widen, G., & Paterson, L. (2010). Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory. Libri, 60(2), 117-128. https://doi.org/10.1515/libr.2010.011

This paper focuses on the extent to which online information sharing practice is socially motivated. A key interest is how knowledge of the existing social connections between actors may predict their information sharing behaviour when they move into... Read More about Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory.

Wizard of Oz Experiments for a companion dialogue system: eliciting companionable conversation. (2010)
Presentation / Conference Contribution
Webb, N., Benyon, D., Bradley, J., Hansen, P., & Mival, O. (2010, September). Wizard of Oz Experiments for a companion dialogue system: eliciting companionable conversation

Working within the EU funded COMPANIONS program, we report recent work with a Wizard of Oz (WoZ) dialogue collection system.
COMPANION systems require complex models of dialogue, and new models of evaluation. Wizard of Oz dialogues give us a mechani... Read More about Wizard of Oz Experiments for a companion dialogue system: eliciting companionable conversation..

Evaluating human-machine conversation for appropriateness. (2010)
Presentation / Conference Contribution
Webb, N., Benyon, D., Hansen, P., & Mival, O. (2010, May). Evaluating human-machine conversation for appropriateness. Presented at IREC 2010, Seventh International Conference on Language Resources and Evaluation, Valletta, Malta

Evaluation of complex, collaborative dialogue systems is a difficult task.Traditionally, developers have relied upon subjective feedback from the user,and parametrisation over observable metrics. However, both models place somereliance on the notion... Read More about Evaluating human-machine conversation for appropriateness..

Cross layer neighbourhood load routing for wireless mesh networks. (2010)
Presentation / Conference Contribution
Zhao, L., Al-Dubai, A., & Min, G. (2010, April). Cross layer neighbourhood load routing for wireless mesh networks. Presented at 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW),

Wireless Mesh Network (WMN) has been considered as a key emerging technology to construct next generation wireless communication networks. It combines the advantages of both mobile ad-hoc network (MANET) and traditional fixed network, attracting sign... Read More about Cross layer neighbourhood load routing for wireless mesh networks..

10 Twitter tips in 10 minutes. (2010)
Presentation / Conference Contribution
Hall, H. (2010, March). 10 Twitter tips in 10 minutes. Paper presented at Tweeting while we work: SLA Europe event

No abstract available.

CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010, February). CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications. Presented at 2010 International Conference on Complex, Intelligent and Software Intensive Systems

In a pervasive environment, it is essential for computing applications to be context-aware. However, one of the major challenges is the establishment of a generic and dynamic context model. Many different approaches to modeling the context exist, but... Read More about CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications.

Self-efficacy as a factor in the evaluation of e-petitions. (2009)
Presentation / Conference Contribution
Cruickshank, P., & Smith, C. F. (2009, September). Self-efficacy as a factor in the evaluation of e-petitions

E-petitions are seen as one response to a perceived decline in public trust of political institutions and the associated symptoms of disengagement. In this paper, some current research into epetitioning in Europe is reviewed, and the need to understa... Read More about Self-efficacy as a factor in the evaluation of e-petitions..

Do web pages have personalities? (2009)
Presentation / Conference Contribution
Turner, P., Turner, S., & Wilson, L. (2009, September). Do web pages have personalities?

We are fundamentally social animals: we are geared to understanding each other; to gauging each other's moods and states of mind; and we are very adept at judging each others personalities. This ability to judge personality can also be generalized to... Read More about Do web pages have personalities?.

Forensic verification of operating system activity via novel data, acquisition and analysis techniques (2009)
Thesis
Graves, J. Forensic verification of operating system activity via novel data, acquisition and analysis techniques. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/6699

Digital Forensics is a nascent field that faces a number of technical, procedural and cultural difficulties that must be overcome if it is to be recognised as a scientific discipline, and not just an art. Technical problems involve the need to develo... Read More about Forensic verification of operating system activity via novel data, acquisition and analysis techniques.

Form (2009)
Book Chapter
Kennedy, J., & Cannon, A. (2009). Form. In L. Liu, & M. T. Ă–zsu (Eds.), Encyclopedia of Database Systems. Springer-Verlag

An integrated firewall policy validation tool (2009)
Thesis
Macfarlane, R. An integrated firewall policy validation tool. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/3971

Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manually by network administrators. The development and management of these enfor... Read More about An integrated firewall policy validation tool.

Companions and new forms of interaction design. (2009)
Presentation / Conference Contribution
Mival, O., & Bradley, J. (2009, April). Companions and new forms of interaction design. Presented at The European Future Technologies Conference,

Operational optimisation of water distribution networks (2009)
Thesis
Lopez-Ibanez, M. Operational optimisation of water distribution networks. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/3044

Water distribution networks are a fundamental part of any modern city and their daily operations constitute a significant expenditure in terms of energy and maintenance costs. Careful scheduling of pump operations may lead to significant energy savin... Read More about Operational optimisation of water distribution networks.

FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks (2009)
Journal Article
Tandjaoui, D., Doudou, M., & Romdhani, I. (2009). FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks. International Journal of Grid and High Performance Computing, 1(4), 40-56. https://doi.org/10.4018/jghpc.2009070804

In this article, the authors propose a new hybrid MAC protocol named H-MAC for wireless mesh networks. This protocol combines CSMA and TDMA schemes according to the contention level. In addition, it exploits channel diversity and provides a medium ac... Read More about FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks.

Refactoring data transforms in MaTSE for flexibility. (2009)
Presentation / Conference Contribution
Craig, P., & Kennedy, J. (2009, October). Refactoring data transforms in MaTSE for flexibility

In early prototypes of the Microarray Time-series Explorer
(MaTSE) data transforms were tightly coupled with visualisation components. While this allowed us to achieve our initial objective of developing the application to the level where we were ab... Read More about Refactoring data transforms in MaTSE for flexibility..

Re-architecting Visualizations to Java Swing. (2009)
Presentation / Conference Contribution
Graham, M., & Kennedy, J. (2009, October). Re-architecting Visualizations to Java Swing. Paper presented at REVISE: Refactoring Visualization from Experience, VizWeek Workshop