Visual comparison and exploration of natural history collections
Graham, M., Kennedy, J., & Downey, L. (2006)
Visual comparison and exploration of natural history collections. In A. Celentano, & P. Mussio (Eds.), Advanced Visual Interfaces (AVI) 2006, Proceedings of the International Working Conference, 310-313. doi:10.1145/1133265.1133329
Natural history museum collections contain a wealth of specimen level data that is now opening up for digital access. However, current interfaces to access and manipulate this...
Spaces of interaction
Benyon, D., Hook, K., & Nigay, L. (2010)
Spaces of interaction. In Proceedings of the 2010 ACM-BCS Visions of Computer Science Conference, 1-7
As the world becomes increasingly computationally enabled, so our view of human-computer interaction (HCI) needs to evolve. The proliferation of wireless connectivity and mobi...
Appliance Recognition Based on Continuous Quadratic Programming
Liu, X., & Liu, Q. (2018)
Appliance Recognition Based on Continuous Quadratic Programming. In Proceedings of 4th International Conference on Cloud Computing and Security (ICCCS 2018), (63-72). https://doi.org/10.1007/978-3-030-00018-9_6
The detailed information of residents' electricity consumption is of great significance to the planning of the use of electrical appliances and the reduction of electrical ene...
A Multiple Viewed Interrelated Ontology Model for Holistic Component Specification and Retrieval
Li, C., Liu, X., & Kennedy, J. (2009)
A Multiple Viewed Interrelated Ontology Model for Holistic Component Specification and Retrieval. In S. Abrahão, J. Verner, T. Jiang, A. Kiumi, T. Kim, & D. Ślęzak (Eds.), Advances in Software Engineering. ASEA 2009 (50-60). https://doi.org/10.1007/978-3-642-10619-4_7
Despite the success that Component-Based Development has achieved so far, component mismatch remains as a major hurdle for wider and smoother component reuse due to the lack o...
For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems
Pitt, J., & Hart, E. (2017)
For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W),. https://doi.org/10.1109/fas-w.2017.119
This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional ...
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse
Kintis, P., Miramirkhani, N., Lever, C., Chen, Y., Romero-Gómez, R., Pitropakis, N., …Antonakakis, M. (2017)
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. In CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Securityhttps://doi.org/10.1145/3133956.3134002
Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific typ...
Privacy Parameter Variation using RAPPOR on a Malware Dataset
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018)
Privacy Parameter Variation using RAPPOR on a Malware Dataset. In Proceedings of 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), (8). https://doi.org/10.1109/TrustCom/BigDataSE.2018.00133
Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of...
Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010)
Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In J. Demergis (Ed.), Proceedings of 9th European Conference on Information Warfare and Security. , (190-200
There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat...
Application of the Grouping Genetic Algorithm to University Course Timetabling
Lewis, R., Lewis, R. M. R., & Paechter, B. (2005)
Application of the Grouping Genetic Algorithm to University Course Timetabling. In J. Gottlieb, & G. Raidl (Eds.), Evolutionary Computation in Combinatorial Optimization, 144-153. https://doi.org/10.1007/978-3-540-31996-2_14
University Course Timetabling-Problems (UCTPs) involve the allocation of resources (such as rooms and timeslots) to all the events of a university, satisfying a set of hard-co...
Improving data quality in data warehousing applications
Li, L., Peng, T., & Kennedy, J. (2010)
Improving data quality in data warehousing applications. In J. Filipe, & J. Cordeiro (Eds.), Proceedings of the 12th International Conference on Enterprise Information Systems, 379-382. https://doi.org/10.5220/0002903903790382
There is a growing awareness that high quality of data is a key to today’s business success and dirty data that exits within data sources is one of the reasons that cause poor...