Skip to main content

Research Repository

Advanced Search

Outputs (3322)

Semantic description of cloud service agreements (2015)
Presentation / Conference Contribution
Greenwell, R., Liu, X., & Chalmers, K. (2015). Semantic description of cloud service agreements. In Science and Information Conference (SAI), 2015 (823-831). https://doi.org/10.1109/sai.2015.7237239

To provide cloud services as a utility there must be a mechanism for comprehensively and precisely specifying cloud service agreements to reduce differences in service perception between customers and suppliers. This paper proposes a description... Read More about Semantic description of cloud service agreements.

Meeting the challenges of LIS research: a national coalition approach. (2015)
Presentation / Conference Contribution
Hall, H. (2015, June). Meeting the challenges of LIS research: a national coalition approach. Paper presented at Third International Seminar on Education and Research in Library and Information Science

The UK Library and Information Science (LIS) Research Coalition was established in 2009 as a three-year project by its founding: the British Library, the Chartered Institute of Library and Information Professionals, JISC, the Museums, Libraries and A... Read More about Meeting the challenges of LIS research: a national coalition approach..

Opening keynote. (2015)
Presentation / Conference Contribution
Hall, H. (2015, June). Opening keynote. Paper presented at Research minded: supporting, understanding, conducting research workshop

A research agenda for metaheuristic standardization. (2015)
Presentation / Conference Contribution
Hart, E., & Sim, K. (2015, June). A research agenda for metaheuristic standardization. Paper presented at 11th Metaheuristics International Conference

We propose that the development of standardized, explicit, machine-readable descriptions of metaheuris- tics will greatly advance scientific progress in the field. In particular, we advocate a purely functional description of metaheuristics — separat... Read More about A research agenda for metaheuristic standardization..

A Lifelong Learning Hyper-heuristic Method for Bin Packing (2015)
Journal Article
Hart, E., Sim, K., & Paechter, B. (2015). A Lifelong Learning Hyper-heuristic Method for Bin Packing. Evolutionary Computation, 23(1), 37-67. https://doi.org/10.1162/EVCO_a_00121

We describe a novel Hyper-heuristic system which continuously learns over time to solve a combinatorial optimisation problem. The system continuously generates new heuristics and samples problems from its environment; representative problems and heur... Read More about A Lifelong Learning Hyper-heuristic Method for Bin Packing.

Improving survivability in environment-driven distributed evolutionary algorithms through explicit relative fitness and fitness proportionate communication. (2015)
Presentation / Conference Contribution
Hart, E., Steyven, A., & Paechter, B. (2015, July). Improving survivability in environment-driven distributed evolutionary algorithms through explicit relative fitness and fitness proportionate communication. Presented at Proceedings of the 2015 on Genetic and Evolutionary Computation Conference - GECCO '15

Ensuring the integrity of a robot swarm in terms of maintaining a stable population of functioning robots over long periods of time is a mandatory prerequisite for building more complex systems that achieve user-defined tasks. mEDEA is an environ... Read More about Improving survivability in environment-driven distributed evolutionary algorithms through explicit relative fitness and fitness proportionate communication..

How can information literacy be modelled from a lifelong learning perspective? (2015)
Presentation / Conference Contribution
Irving, C., Hall, H., & Brettle, A. (2015, June). How can information literacy be modelled from a lifelong learning perspective?. Paper presented at Information: interactions and impact (i3) 2015

Traditionally much research into information literacy has focused on one area: it prioritises investigations into the information literacy skills of those in education. Provision for students in higher education (for example, Bruce, Edwards & Lupton,... Read More about How can information literacy be modelled from a lifelong learning perspective?.

Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable (2015)
Presentation / Conference Contribution
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015, October). Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random variables and Nakagami-m random variable can be applied in performance analysis... Read More about Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable.

Real-time monitoring of privacy abuses and intrusion detection in android system (2015)
Presentation / Conference Contribution
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015, August). Real-time monitoring of privacy abuses and intrusion detection in android system. Presented at International Conference on Human Aspects of Information Security, Privacy, and Trust, Los Angeles, CA, USA

In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from 'normal' apps. We also investigated the injection technolog... Read More about Real-time monitoring of privacy abuses and intrusion detection in android system.

The Internet of Things: a security point of view. (2016)
Journal Article
Li, S., Tryfonas, T., & Li, H. (2016). The Internet of Things: a security point of view. Internet Research, 26(2), 337-359. https://doi.org/10.1108/IntR-07-2014-0173

Purpose -- To provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications. Design/methodology/approa... Read More about The Internet of Things: a security point of view..

Illegal pedestrian crossing at signalised junctions in urban areas: the impact of spatial factors. (2015)
Presentation / Conference Contribution
Mayeux, A., Lovreglio, R., Saleh, W., & Fonzone, A. (2015). Illegal pedestrian crossing at signalised junctions in urban areas: the impact of spatial factors. In TRB 94th Annual Meeting Compendium of Papers

Much has still to be done to increase pedestrian safety. Illegal crossing at signalised junctions may increase the risk of accidents at the intersections where it takes place and induce dangerous habits. Therefore efforts to prevent such a harmful be... Read More about Illegal pedestrian crossing at signalised junctions in urban areas: the impact of spatial factors..

Collaborative Diffusion on the GPU for Path-Finding in Games (2015)
Presentation / Conference Contribution
McMillan, C., Hart, E., & Chalmers, K. (2015, April). Collaborative Diffusion on the GPU for Path-Finding in Games. Presented at EvoApplications 2015 European Conference on the Applications of Evolutionary Computation, Copenhagen

Exploiting the powerful processing power available on the GPU in many machines, we investigate the performance of parallelised versions of pathfinding algorithms in typical game environments. We describe a parallel implementation of a collaborative d... Read More about Collaborative Diffusion on the GPU for Path-Finding in Games.

Employer demands from business graduates (2016)
Journal Article
McMurray, S., Dutton, M., McQuaid, R. W., & Richard, A. (2016). Employer demands from business graduates. Education and Training, 58(1), 112-132. https://doi.org/10.1108/et-02-2014-0017

This paper reports on research carried out with employers to determine demand for graduate business and management skills in the Scottish workforce. The research found that the factors which were most important to employers when recruiting graduates... Read More about Employer demands from business graduates.

Is executive compensation a substitute governance mechanism to debt financing and leasing? (2015)
Journal Article
Minhat, M., & Dzolkarnaini, N. (2016). Is executive compensation a substitute governance mechanism to debt financing and leasing?. Applied Economics, 48(14), 1293-1302. https://doi.org/10.1080/00036846.2015.1100247

This study examines whether and how CEO equity incentives relate to financing choices (i.e., debt and leases). Using manually collected CEO compensation and lease data for a sample of large UK firms, we found evidence of a negative relationship betwe... Read More about Is executive compensation a substitute governance mechanism to debt financing and leasing?.

The impact of community grassroots campaigns on public library closures in the UK. (2015)
Presentation / Conference Contribution
Mowbray, J., & Hall, H. (2015, June). The impact of community grassroots campaigns on public library closures in the UK. Paper presented at Information: interactions and impact (i3) 2015

This paper draws on the findings of a 2014 research project related to recent UK public library closures, both threatened and actual. It reports on grassroots community library campaigns that have recently proliferated across the country to fight the... Read More about The impact of community grassroots campaigns on public library closures in the UK..

Could social networking online help NEET young people gain employment? (2015)
Presentation / Conference Contribution
Mowbray, J., Hall, H., & Raeside, R. (2015, June). Could social networking online help NEET young people gain employment?. Paper presented at Information: interactions and impact (i3) 2015

This paper first explores the literature pertaining to social networking in both off-line and online environments, and places it within the context of the study of employment opportunities. Particular focus is given to the prospective use of networki... Read More about Could social networking online help NEET young people gain employment?.

Fast contraband detection in large capacity disk drives (2015)
Presentation / Conference Contribution
Penrose, P., Buchanan, W. J., & Macfarlane, R. (2015, March). Fast contraband detection in large capacity disk drives. Presented at DFRWS 2015 Europe, Dublin, Republic of Ireland

In recent years the capacity of digital storage devices has been increasing at a rate that has left digital forensic services struggling to cope. There is an acknowledgement that current forensic tools have failed to keep up. The workload is such tha... Read More about Fast contraband detection in large capacity disk drives.

The paradigmatic hearts of subjects which their "English" flows through (2016)
Journal Article
Pilcher, N., & Richards, K. (2016). The paradigmatic hearts of subjects which their "English" flows through. Higher Education Research and Development, 35(5), 997-1010. https://doi.org/10.1080/07294360.2016.1138455

Much research into the use of corpora and discourse to support higher education students on pre-sessional and in-sessional courses champions subject specificity. Drawing on the work of writers such as Bakhtin (1981) and Voloshinov (1973), in this art... Read More about The paradigmatic hearts of subjects which their "English" flows through.

Review of e-Health Frameworks. (2015)
Presentation / Conference Contribution
Prajapati, B., Buchanan, W. J., Smales, A., Macfarlane, R., & Spyra, G. (2015). Review of e-Health Frameworks. In Health Informatics Conference 2015

In order to improve the quality of health care and widen the accessibility, health care providers are consistently looking to inject information and communication technology to the traditional health care system (Mair, et al., 2012). This process can... Read More about Review of e-Health Frameworks..