Research explorer tool

Date


People

Output Type

Download Available

Dewey Decimal

723 results

Speculative and Critical Design in Education: Practice and Perspectives

Conference Proceeding
Helgason, I., Smyth, M., Encinas, E., & Mitrović, I. (2020)
Speculative and Critical Design in Education: Practice and Perspectives. https://doi.org/10.1145/3393914.3395907
This full-day, interdisciplinary workshop will address the use of Speculative and Critical Design (SCD), Design Fiction, and related practices, including those that use provoc...

Ethnographic Fictions: Research for Speculative Design

Conference Proceeding
Helgason, I., & Smyth, M. (2020)
Ethnographic Fictions: Research for Speculative Design. https://doi.org/10.1145/3393914.3395872
Ethnographically informed research that investigates people's lived experiences, emotions, attitudes and behaviours inevitably draws primarily on current and past situations. ...

Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds: Pattern Data Structure

Conference Proceeding
Wang, Z., & Chalmers, K. (2013)
Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds: Pattern Data Structure. In The 7th International Conference on Complex, Intelligent, and Software Intensive Systeme (CISIS 2013) July 3rd - July 5th, 2013, Taichung, Taiwan, 471-474. doi:10.1109/cisis.2013.86
Evolution pattern will be defined as an Xml Schema document, the generation of pattern aspect is the process of generating xml instance from its related Xml Schema definition ...

Exploratory Navigation for Runners Through Geographic Area Classification with Crowd-Sourced Data

Conference Proceeding
McGookin, D., Gkatzia, D., & Hastie, H. (2015)
Exploratory Navigation for Runners Through Geographic Area Classification with Crowd-Sourced Data. In Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, (357-361). https://doi.org/10.1145/2785830.2785879
Navigation when running is exploratory, characterised by both starting and ending in the same location, and iteratively foraging the environment to find areas with the most su...

Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter.

Conference Proceeding
Buchanan, W. J., Macfarlane, R., & Clayton, J. (2013)
Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. In G. Weir, & M. Daley (Eds.), Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013)
There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other e...

Evaluating the VIPER pedigree visualisation: detecting inheritance inconsistencies in genotyped pedigrees.

Conference Proceeding
Paterson, T., Graham, M., Kennedy, J., & Law, A. (2011)
Evaluating the VIPER pedigree visualisation: detecting inheritance inconsistencies in genotyped pedigrees. In 2011 IEEE Symposium on Biological Data Visualization (BioVis), 119-126. https://doi.org/10.1109/BioVis.2011.6094056
VIPER (Visual Pedigree Explorer) is a tool for exploring large complex animal pedigrees and their associated genotype data. The tool combines a novel, space-efficient visualis...

Evaluation of a networked learning environment: training and transferability issues.

Conference Proceeding
Buckner, K., & Davenport, E. (1996)
Evaluation of a networked learning environment: training and transferability issues. In M. Beaulieu, E. Davenport, & N. O. Pors (Eds.), Library and information studies : research and professional practice : proceedings of the 2nd British-Nordic Conference on Library and Information Studies, 5-18
No abstract available.

Facilitating reuse in database applications with scenario-based component adaptation and generation

Conference Proceeding
Wang, B., Liu, X., & Kerridge, J. (2002)
Facilitating reuse in database applications with scenario-based component adaptation and generation. In Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications, 527-534. doi:10.1109/iri.2003.1251461
The development of database application systems will beneft from high reusabiliiy because similar design circumstances recur frequently in database developments. However, rese...

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016)
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirem...

Instant messaging: using log files to identify patterns of interaction in group of teenage users.

Conference Proceeding
Davison, B., & Buckner, K. (2005)
Instant messaging: using log files to identify patterns of interaction in group of teenage users. In A. Sloane (Ed.), Home-oriented informatics and telematics : proceedings of the IFIP WG 9.3 HOIT2005 conference, 277 - 290. https://doi.org/10.1007/11402985_20
This paper presents preliminary findings on teenagers’ use of instant messaging (IM) as an example of an Internet technology. The results are quantitative, being drawn from th...