Research explorer tool

Date


People

Download Available

Library Of Congress

Dewey Decimal

469 results

Assessing the Relative Importance of an E-learning system Usability Design Characteristics Based on Students' Preferences

Journal Article
Rutter, M. J., Smith, S., & Alshehri, A. (2019)
Assessing the Relative Importance of an E-learning system Usability Design Characteristics Based on Students' Preferences. European Journal of Educational Research, 8(3), 839-855. https://doi.org/10.12973/eu-jer.8.3.839
This study considers the interaction between an e-learning system, the Blackboard system, and the students who use it in Saudi Arabia. While previous work exists, there is lim...

A Data-driven Statistical Approach to Customer Behaviour Analysis and Modelling in Online Freemium Games

Thesis
Singh Roy, A. A Data-driven Statistical Approach to Customer Behaviour Analysis and Modelling in Online Freemium Games. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2090355
The video games industry is one of the most attractive and lucrative segments in the entertainment and digital media, with big business of more than $150 billion worldwide. A ...

The Social Impact of Digital Youth Work: What Are We Looking For?

Journal Article
Webster, G., Pawluczuk, A., Smith, C., & Hall, H. (2019)
The Social Impact of Digital Youth Work: What Are We Looking For?. Media and Communication, 7(2), 59-68. https://doi.org/10.17645/mac.v7i2.1907
Digital youth work is an emerging field of research and practice which seeks to investigate and support youth-centred digital literacy initiatives. Whilst digital youth work p...

Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput?

Journal Article
Barakat, B., Keates, S., Wassell, I., & Arshad, K. (2019)
Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput?. IEEE Communications Letters, 23(6), 987-990. https://doi.org/10.1109/LCOMM.2019.2907935
The Zero-Wait (ZW) policy is widely held to achieve maximum information 'freshness', i.e., to achieve minimum Peak Age (PA) and maximum throughput, for real-time Internet-of-T...

Deep Precomputed Radiance Transfer for Deformable Objects

Journal Article
Li, Y., Wiedemann, P., & Mitchell, K. (2019)
Deep Precomputed Radiance Transfer for Deformable Objects. Proceedings of the ACM on Computer Graphics and Interactive Techniques, 2(1), 1-16. https://doi.org/10.1145/3320284
We propose, DeepPRT, a deep convolutional neural network to compactly encapsulate the radiance transfer of a freely deformable object for rasterization in real-time. With pre...

Wattom: a Consumption and Grid Aware Smart Plug with Mid-air Controls

Conference Proceeding
Quintal, F., Esteves, A., Caires, F., Baptiste, V., & Mendes, P. (2019)
Wattom: a Consumption and Grid Aware Smart Plug with Mid-air Controls. In TEI '19 Proceedings of the Thirteenth International Conference on Tangible, Embedded, and Embodied Interaction, (307-313). https://doi.org/10.1145/3294109.3295642
This paper presents Wattom, a highly interactive ambient eco-feedback smart plug that aims to support a more sustainable use of electricity by being tightly coupled to users' ...

Designing Motion Matching for Real-World Applications: Lessons from Realistic Deployments

Conference Proceeding
Verweij, D., Esteves, A., Bakker, S., & Khan, V. (2019)
Designing Motion Matching for Real-World Applications: Lessons from Realistic Deployments. In TEI '19 Proceedings of the Thirteenth International Conference on Tangible, Embedded, and Embodied Interaction, (645-656). https://doi.org/10.1145/3294109.3295628
Amongst the variety of (multi-modal) interaction techniques that are being developed and explored, the Motion Matching paradigm provides a novel approach to selection and cont...

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Conference Proceeding
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019)
Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data)https://doi.org/10.1109/BigData.2018.8621922
Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exis...

Eidolon360 – A VR Experience

Conference Proceeding
Hood, B., & Flint, T. (2018)
Eidolon360 – A VR Experience. In Proceedings of xCoAx 2018
Eidolon360 is a virtual reality artwork and experience that is interacted with through VR headsets. The viewer, reclining on a bed within the exhibition space, experiences a 3...

An optimized Speculative Execution Strategy Based on Local Data Prediction in Heterogeneous Hadoop Environment

Journal Article
Jin, D., Liu, Q., Liu, X., & Linge, N. (2019)
An optimized Speculative Execution Strategy Based on Local Data Prediction in Heterogeneous Hadoop Environment. Journal of Computers, 30(3), 130-142. https://doi.org/10.3966/199115992019063003010
Hadoop is a famous parallel computing framework that is applied to process large-scale data, but there exists such a task in hadoop framework, which is called “Straggling task...

Date


Date


Date


Date