19 results

Finding middle ground? Multi-objective Natural Language Generation from time-series data

Conference Proceeding
Gkatzia, D., Hastie, H., & Lemon, O. (2014)
Finding middle ground? Multi-objective Natural Language Generation from time-series data. In Proceedings of the 14th Conference of the European Chapter of the Association for Computational Linguistics, volume 2: Short Papers. https://doi.org/10.3115/v1/e14-4041
A Natural Language Generation (NLG) system is able to generate text from nonlinguistic data, ideally personalising the content to a user’s specific needs. In some cases, howev...

Research grounded support of student learning in Higher Education: The importance of dialogue and subject embedded, contextualised language and content.

Thesis
Richards, K. Research grounded support of student learning in Higher Education: The importance of dialogue and subject embedded, contextualised language and content. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1532248
This aim of this thesis is to demonstrate how the research that has been conducted by the author, as illustrated through the publications presented, adds to the domain of acad...

Engineering Sustainable and Adaptive Systems in Dynamic and Unpredictable Environments

Conference Proceeding
Cardoso, R. P., Rossetti, R. J. F., Hart, E., Kurka, D. B., & Pitt, J. (2018)
Engineering Sustainable and Adaptive Systems in Dynamic and Unpredictable Environments. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation. Distributed Systems, 221-240. https://doi.org/10.1007/978-3-030-03424-5_15
Electronic institutions are socially-inspired multi-agent systems, typically operating under a set of policies, which are required to determine system operation and to deal wi...

Increasing Trust in Meta-Heuristics by Using MAP-Elites

Conference Proceeding
Urquhart, N., Guckert, M., & Powers, S. (2019)
Increasing Trust in Meta-Heuristics by Using MAP-Elites. In GECCO '19 Companion, (1345-1348). https://doi.org/10.1145/3319619.3326816
Intelligent AI systems using approaches containing emergent elements often encounter acceptance problems. Results do not get sufficiently explained and the procedure itself ca...

Identity and belonging for graduate apprenticeships in computing: the experience of first cohort degree apprentices in Scotland

Conference Proceeding
Taylor-Smith, E., Smith, S., & Smith, C. (2019)
Identity and belonging for graduate apprenticeships in computing: the experience of first cohort degree apprentices in Scotland. In Proceedings of the 24th Annual Conference on Innovation & Technology in Computer Science Education (ITiCSE’19) (2-8). https://doi.org/10.1145/3304221.3319753
In September 2017, our university’s first graduate apprentices began degrees in Software Development, Cybersecurity, and Information Technology Management for Business. This s...

A novel adaptive routing and switching scheme for software-defined vehicular Networks

Conference Proceeding
Zhoa, L., Zhao, W., Gong, C., Al-Dubai, A., & Min, G. (2019)
A novel adaptive routing and switching scheme for software-defined vehicular Networks. In Proceedings of the IEEE International Conference on Communicationshttps://doi.org/10.1109/ICC.2019.8761365
Software-Defined Vehicular Networks (SDVNs) technology has been attracting significant attention as it can make Vehicular Ad Hoc Network (VANET) more efficient and intelligent...

SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application.

Journal Article
Jan, M. A., Zhang, W., Usman, M., Tan, Z., Khan, F., & Luo, E. (2019)
SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. Journal of Network and Computer Applications, 137, 1-10. https://doi.org/10.1016/j.jnca.2019.02.023
The Internet of Things (IoT) has the potential to transform communities around the globe into smart cities. The massive deployment of sensor-embedded devices in the smart citi...

IoT Forensics: Amazon Echo as a Use Case

Journal Article
Li, S., Li, S., Choo, K. R., Sun, Q., Buchanan, W. J., & Cao, J. (2019)
IoT Forensics: Amazon Echo as a Use Case. IEEE Internet of Things, 1-11. https://doi.org/10.1109/jiot.2019.2906946
Internet of Things (IoT) are increasingly common in our society, and can be found in civilian settings as well as sensitive applications such as battlefields and national secu...

BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN

Conference Proceeding
Boukria, S., Guerroumi, M., & Romdhani, I. (2020)
BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN. In 2019 IEEE Symposium on Computers and Communications (ISCC) (1034-1039). https://doi.org/10.1109/ISCC47284.2019.8969780
Software Defined Networking (SDN) technology increases the evolution of Internet and network development. SDN, with its logical centralization of controllers and global networ...

Universal access in the work-place: a case study.

Conference Proceeding
Keates, S., Clarkson, J., Coy, J., & Robinson, P. (1999)
Universal access in the work-place: a case study. In Proceedings of the 5th ERCIM Workshop on User Interfaces for All
Universal Access belongs not only in the research laboratory, but also in an industrial environment. Many countries have set out specific legal requirements for companies to m...