Staff directory

Search for a surname in the box below and then click "Search" to search for Staff. 

If you want to get in touch but you don’t know who to contact, fill in our enquiry form and one of our advisers will get back to you as soon as possible.

Date


Research Areas

People

Output Type

Download Available

Library Of Congress

Dewey Decimal

2187 results

Modelling a field-scale compressed air energy storage in porous rock reservoirs

Conference Proceeding
Yang, L., Guo, C., Li, C., He, Q., Zhang, K., & Cai, Z. (2020)
Modelling a field-scale compressed air energy storage in porous rock reservoirs. In Volume 4: Proceedings of 11th International Conference on Applied Energy, Part 3, Sweden, 2019
Compressed Air Energy Storage (CAES) is one of the promising methods to store the surplus solar and wind energy in a grid scale . In this study, we used a non...

Athos: An Extensible DSL for Model Driven Traffic and Transport Simulation

Conference Proceeding
Hoffmann, B., Urquhart, N., Chalmers, K., & Guckert, M. (2020)
Athos: An Extensible DSL for Model Driven Traffic and Transport Simulation
Multi-agent systems may be considered appropriate tools for simulating complex systems such as those based around traffic and transportation networks. Modelling traffic partic...

Computing degree apprenticeships: An opportunity to address gender imbalance in the IT sector?

Conference Proceeding
Smith, S., Taylor-Smith, E., Fabian, K., Barr, M., Berg, T., Cutting, D., …Zarb, M. (in press)
Computing degree apprenticeships: An opportunity to address gender imbalance in the IT sector?
This paper explores the potential for new work-based apprenticeship degrees to encourage more women into computing degrees and the IT sector. In the UK, women are currently un...

Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment

Conference Proceeding
Chacon, J., Mckeown, S., & Macfarlane, R. (in press)
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment
Attacks by Advanced Persistent Threats (APTs) have been shown to be difficult to detect using traditional signature-and anomaly-based intrusion detection approaches. Deception...

Testing And Hardening IoT Devices Against the Mirai Botnet

Conference Proceeding
Kelly, C., Pitropakis, N., McKeown, S., & Lambrinoudakis, C. (in press)
Testing And Hardening IoT Devices Against the Mirai Botnet
A large majority of cheap Internet of Things (IoT) devices that arrive brand new, and are configured with out-of-the-box settings, are not being properly secured by the manufa...

Research Impact Value and Library and Information Science (RIVAL): development, implementation and outcomes of a Scottish network for LIS researchers and practitioners

Conference Proceeding
Hall, H., & Ryan, B. (in press)
Research Impact Value and Library and Information Science (RIVAL): development, implementation and outcomes of a Scottish network for LIS researchers and practitioners. In Proceedings of the 83rd Annual Meeting of the Association for Information Science and Technology
The research-practice gap in Library and Information Science (LIS) is well documented, especially in respect of the difficulties of translating research into practice, and res...

A Distributed Trust Framework for Privacy-Preserving Machine Learning

Conference Proceeding
Abramson, W., Hall, A. J., Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (in press)
A Distributed Trust Framework for Privacy-Preserving Machine Learning
When training a machine learning model, it is standard procedure for the researcher to have full knowledge of both the data and model. However, this engenders a lack of trust ...

A mechanism to promote social behaviour in household load balancing

Conference Proceeding
Brooks, N. A., Powers, S. T., & Borg, J. M. (in press)
A mechanism to promote social behaviour in household load balancing. In Proceedings of the Artificial Life Conference 2020 (ALIFE 2020)
Reducing the peak energy consumption of households is essential for the effective use of renewable energy sources, in order to ensure that as much household demand as possible...

Fast Probabilistic Consensus with Weighted Votes

Conference Proceeding
Müller, S., Penzkofer, A., Ku´smierz, B., Camargo, D., & Buchanan, W. J. (in press)
Fast Probabilistic Consensus with Weighted Votes
The fast probabilistic consensus (FPC) is a voting consensus protocol that is robust and efficient in Byzantine infrastructure. We propose an adaption of the FPC to a setting ...

Agile Implementation and Expansive Learning: Identifying Contradictions and Their Resolution Using an Activity Theory Perspective

Conference Proceeding
Chita, P., Cruickshank, P., Smith, C., & Richards, K. (2020)
Agile Implementation and Expansive Learning: Identifying Contradictions and Their Resolution Using an Activity Theory Perspective. In Agile Processes in Software Engineering and Extreme Programming. , (3-19). https://doi.org/10.1007/978-3-030-49392-9_1
A key challenge organisations face when transitioning to agile delivery methods is that of quickly and effectively learning new ways of working. This study posits that fundame...

Date


Date


Date


Date