Research explorer tool

12 results

Identity and belonging for graduate apprenticeships in computing: the experience of first cohort degree apprentices in Scotland

Conference Proceeding
Taylor-Smith, E., Smith, S., & Smith, C. (2019)
Identity and belonging for graduate apprenticeships in computing: the experience of first cohort degree apprentices in Scotland. In Proceedings of the 24th Annual Conference on Innovation & Technology in Computer Science Education (ITiCSE’19), (2-8). https://doi.org/10.1145/3304221.3319753
In September 2017, our university’s first graduate apprentices began degrees in Software Development, Cybersecurity, and Information Technology Management for Business. This s...

Getting in, getting on: fragility in student and graduate identity

Journal Article
Smith, S., Sobolewska, E., & Hunter, D. (2019)
Getting in, getting on: fragility in student and graduate identity. Higher Education Research and Development, 38(5), 1046-1060. https://doi.org/10.1080/07294360.2019.1612857
Over a period of three years this longitudinal study explored new approaches to consider student identity during the transition from university to employment. Students were fo...

An implementation of the extended technology acceptance model for understanding students' perceptions of learning management systems: a study within tertiary institutions in Saudia Arabia

Presentation / Conference
Rutter, M. J., Alshehri, A. & Smith, S. (2017, March)
An implementation of the extended technology acceptance model for understanding students' perceptions of learning management systems: a study within tertiary institutions in Saudia Arabia. Poster presented at 11th annual International Technology, Education and Development Conference, Valencia
The rapid evolution of e-learning around the world is inspiring many educational and business institutions to adopt it. E-learning is motivated by compelling advantages such a...

An exploration of professional identity in the information technology sector

Thesis
Smith, S. (2016)
An exploration of professional identity in the information technology sector. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/9731
At present the Information Technology profession appears to be dogged by high profile project failure, high graduate unemployment rates, employers unable to recruit suitable s...

A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments

Book Chapter
Jaroucheh, Z., Liu, X., & Smith, S. (2014)
A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments. In Software Design and Development, (71-95). IGI Global. https://doi.org/10.4018/978-1-4666-4301-7.ch005
Context-awareness is considered to be the cornerstone technique for developing pervasive computing applications that are flexible, adaptable, and capable of acting autonomousl...

Jabber-based cross-domain efficient and privacy-ensuring context management framework.

Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2013)
Jabber-based cross-domain efficient and privacy-ensuring context management framework. International Journal of Advanced Computer Science and Applications, 4, 84
In pervasive environments, context-aware applications require a global knowledge of the context information distributed in different spatial domains in order to establish cont...

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications

Conference Proceeding
Jaroucheh, Z., Liu, X., Smith, S., & Zhao, H. (2011)
Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. In 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW),, 351-355. doi:10.1109/compsacw.2011.65
Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context informat...

An approach to domain-based scalable context management architecture in pervasive environments

Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2012)
An approach to domain-based scalable context management architecture in pervasive environments. Personal and Ubiquitous Computing, 16(6), 741-755. https://doi.org/10.1007/s00779-011-0422-0
In pervasive environments, context management systems are expected to administrate large volume of contextual information that is captured from spatial to nonspatial elements....

Recognize contextual situation in pervasive environments using process mining techniques

Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2011)
Recognize contextual situation in pervasive environments using process mining techniques. Journal of Ambient Intelligence and Humanized Computing, 2(1), 53-69. https://doi.org/10.1007/s12652-010-0038-7
Research in pervasive computing and ambience intelligence aims to enable users to interact with the environment in a context-aware way. To achieve this, a complex set of featu...

Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications

Conference Proceeding
Jaroucheh, Z., Liu, X., & Smith, S. (2010)
Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications. In Proceedings of IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technologies (WI-IAT 2010), 611-614. doi:10.1109/wi-iat.2010.25
Context-aware computing is widely accepted as a promising paradigm to enable seamless computing. Several middlewares and ontology-based models for describing context informati...