Doing More With Less: A Multitask Deep Learning Approach in Plant Phenotyping
Dobrescu, A., Giuffrida, M. V., & Tsaftaris, S. A. (2020)
Doing More With Less: A Multitask Deep Learning Approach in Plant Phenotyping. Frontiers in Plant Science, 11, https://doi.org/10.3389/fpls.2020.00141
Image-based plant phenotyping has been steadily growing and this has steeply increased the need for more efficient image analysis techniques capable of evaluating multiple pla...
Democratic Participation through Crocheted Memes.
Taylor-Smith, E., Smith, C. F., & Smyth, M. (2018)
Democratic Participation through Crocheted Memes. In SMSociety '18 Proceedings of the 9th International Conference on Social Media and Society, (178-186). https://doi.org/10.1145/3217804.3217910
In a UK city, various crocheted protest banners have appeared, containing political statements concerning planned developments in their locations. Photos of these banners are ...
UK public library roles and value: a focus group analysis
Appleton, L., Hall, H., Duff, A., & Raeside, R. (2018)
UK public library roles and value: a focus group analysis. Journal of Librarianship and Information Science, 50(3), (275-283). ISSN 0961-0006
Findings from a study of the advantages and disadvantages accrued by individuals from their public library use, and the impact of this on citizenship at individual and communi...
Powers, S. T. (2016)
Defection. In Encyclopedia of Evolutionary Psychological Science, 1-4. BioMed Central. doi:10.1007/978-3-319-16999-6_1616-1
No abstract available.
The institutional approach for modeling the evolution of human societies
Powers, S. (2016)
The institutional approach for modeling the evolution of human societies. In Proceedings of the Artificial Life Conference 2016https://doi.org/10.7551/978-0-262-33936-0-ch011
Artificial Life is concerned with understanding the dynamics of human societies. A defining feature of any human society is its institutions. However, defining exactly what an...
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...
Instant messaging: using log files to identify patterns of interaction in group of teenage users.
Davison, B., & Buckner, K. (2005)
Instant messaging: using log files to identify patterns of interaction in group of teenage users. In A. Sloane (Ed.), Home-oriented informatics and telematics : proceedings of the IFIP WG 9.3 HOIT2005 conference. , (277-290). https://doi.org/10.1007/11402985_20
This paper presents preliminary findings on teenagers’ use of instant messaging (IM) as an example of an Internet technology. The results are quantitative, being drawn from th...
Young People and e-Democracy: Creating a Culture of Participation
Masters, Z., Masters, Z., Macintosh, A., & Smith, E. (2003)
Young People and e-Democracy: Creating a Culture of Participation. In R. Traunmuller (Ed.), Lecture Notes in Computer Science; Electronic Government, 15-22. doi:10.1007/978-3-540-30078-6_3
Research originally suggested that new technologies, particularly the Internet, provided a useful mechanism for engaging young people - an otherwise largely disenfranchised gr...