Skip to main content

Research Repository

Advanced Search

Outputs (2130)

Making it “pay a bit better”: design challenges for micro rural enterprise
Presentation / Conference Contribution
Crabtree, A., & Chamberlain, A. Making it “pay a bit better”: design challenges for micro rural enterprise. Presented at 17th ACM conference on Computer Supported Cooperative Work & Social Computing (CSCW'14)

This paper reports on a field study of small market in Wales undertaken as part of broader research project aimed at developing IT solutions to support rural enterprise. The project is predicated on the assumption that the primary challenge facing ru... Read More about Making it “pay a bit better”: design challenges for micro rural enterprise.

Enabling the new economic actor: personal data regulation and the digital economy
Presentation / Conference Contribution
Crabtree, A. Enabling the new economic actor: personal data regulation and the digital economy. Presented at IEEE 2nd Workshop on Legal and Technical Issues in Cloud Computing and Cloud-Supported Internet of Things

This paper offers a sociological perspective on data protection regulation and its relevance to the design of digital technologies that exploit or ‘trade in’ personal data. From this perspective, proposed data protection regulations in Europe and the... Read More about Enabling the new economic actor: personal data regulation and the digital economy.

Improving security requirements adequacy: an interval type 2 fuzzy logic security assessment system
Presentation / Conference Contribution
Hibshi, H., Breaux, T. D., & Wagner, C. Improving security requirements adequacy: an interval type 2 fuzzy logic security assessment system. Presented at IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2016)

Organizations rely on security experts to improve the security of their systems. These professionals use background knowledge and experience to align known threats and vulnerabilities before selecting mitigation options. The substantial depth of expe... Read More about Improving security requirements adequacy: an interval type 2 fuzzy logic security assessment system.

Rural Enterprise as an Agent for Technology Development and Facilitation in the Digital Economy
Presentation / Conference Contribution
Valchovska, S., Chamberlain, A., Crabtree, A., Greenhalgh, C., Davies, M., Glover, K., & Rodden, T. Rural Enterprise as an Agent for Technology Development and Facilitation in the Digital Economy. Presented at DE 2013: Open Digital

This paper outlines recent developments in the Scaling the Rural Enterprise (SRE) research project – an interdisciplinary project that combines the expertise of social scientists, computer scientists and software developers, in order to inform the de... Read More about Rural Enterprise as an Agent for Technology Development and Facilitation in the Digital Economy.

Exploration of the ordering for a sequential airport ground movement algorithm
Book
Ravizza, S., & Atkin, J. A. Exploration of the ordering for a sequential airport ground movement algorithm. School of Computer Science

Guiding aircraft around the airport's surface while ensuring conflict-free routings is an important problem at airports. Sequential routing and scheduling algorithms can be advantageous for providing fast online solutions for decision support systems... Read More about Exploration of the ordering for a sequential airport ground movement algorithm.

Clustering breast cancer data by consensus of different validity indices
Presentation / Conference Contribution
Soria, D., Garibaldi, J. M., Ambrogi, F., Lisboa, P. J., Boracchi, P., & Biganzoli, E. M. Clustering breast cancer data by consensus of different validity indices. Presented at International Conference on Advances in Medical, Signal and Information Processing (4th)

Clustering algorithms will, in general, either partition a given data set into a pre-specified number of clusters or will produce a hierarchy of clusters. In this paper we analyse several different clustering techniques and apply them to a particular... Read More about Clustering breast cancer data by consensus of different validity indices.

Modularity and implementation of mathematical operational semantics
Presentation / Conference Contribution
Jaskelioff, M. J., Ghani, N., & Hutton, G. Modularity and implementation of mathematical operational semantics. Presented at Second Workshop on Mathematically Structured Functional Programming (MSFP 2008)

Structural operational semantics is a popular technique for specifying the meaning of programs by means of inductive clauses. One seeks syntactic restrictions on those clauses so that the resulting operational semantics is well-behaved. This approa... Read More about Modularity and implementation of mathematical operational semantics.

IWAVE: Interactive Web-based Algorithm Visualization Environment
Book
Moss, B. IWAVE: Interactive Web-based Algorithm Visualization Environment. Virtual Learning Lab, University of Nottingham, UK. Manuscript submitted for publication

This report discusses one of the challenges faced
in the teaching and learning of introductory computer
programming. The demographic of students has changed considerably in recent years, and teaching styles must adapt accordingly to suit the change... Read More about IWAVE: Interactive Web-based Algorithm Visualization Environment.