Search concepts
|
Selected filters
|
- 4,800 - 4,850 out of 5,824 results
Search results
-
Conference contribution
Towards improving the efficacy of code-based verification in internet voting
Kulyk, O., Volkamer, M., Müller, M. & Renaud, K., 7 Aug 2020, Financial Cryptography and Data Security: FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Bernhard, M., Bracciali, A., Camp, L. J., Matsuo, S., Maurushat, A., Rønne, P. B. & Sala, M. (eds.). Cham: Springer, p. 291-309 19 p. (Lecture Notes in Computer Science (LNCS); vol. 12063).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile2 Citations (Scopus)141 Downloads (Pure) -
Towards the improvement of self-service systems via emotional virtual agents
Martin, C. J., Ball, L. D., Archibald, J. & Carson, L., 10 Sep 2012, Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers. Swindon: BCS Learning & Development Ltd., p. 351-356 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile60 Downloads (Pure) -
Training air traffic controllers through digital mobile applications versus traditional methods
Smy, P., Donald, I., Falconer, R. E. & Scott-Brown, K., 17 Nov 2020, Proceedings of the 14th International Conference on Game Based Learning, ECGBL 2020. Fotaris, P. (ed.). Reading: Academic Conferences and Publishing International Ltd. (ACPI), p. 547-557 11 p. (European Conference on Games Based Learning).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile95 Downloads (Pure) -
Trend of mathematical models in microbial fuel cell for environmental energy refinery from waste/water
Oh, S. T., 2010, EKC 2009 Proceedings of the EU-Korea Conference on Science and Technology. Lee, J. H., Lee, H. & Kim, J-S. (eds.). Berlin: Springer-Verlag, p. 25-30 5 p. (Springer Proceedings in Physics; vol. 135).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Trends in microbial fuel cells for the environmental energy refinery from waste/water
Oh, S., 2008, EKC2008 Proceedings of the EU-Korea conference on Science and Technology. Yoo, S-D. (ed.). Berlin: Springer-Verlag, p. 495-498 4 p. (Springer Proceedings in Physics; vol. 124).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Trie compression for GPU accelerated multi-pattern matching
Bellekens, X., Seeam, A., Tachtatzis, C. & Atkinson, R., 28 Feb 2017, Proceedings of the 9th International Conferences on Pervasive Patterns and Applications. International Academy, Research, and Industry Association (IARIA)Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile64 Downloads (Pure) -
Triple joint transform correlator
Zhang, H., Cartwright, C. M., Ding, M. & Gillespie, G. A., 9 Mar 1999, SPIE proceedings: Optical pattern recognition X. Casasent, D. P. & Chao, T-H. (eds.). Orlando, FL, Vol. 3715. p. 185-196 12 p. (SPIE Proceedings; vol. 3715).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Trust and reputation policy-based mechanisms for self-protection in autonomic communications
Serrano, M., van der Meer, S., Strassner, J., De Paoli, S., Kerr, A. & Storni, C., 30 Jun 2009, Autonomic and trusted computing: 6th international conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 : proceedings. Nieto, J. G., Reif, W., Wang, G. & Indulska, J. (eds.). Berlin: Springer-Verlag, p. 249-267 19 p. (Lecture Notes in Computer Science (LNCS); vol. 5586).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Twist and learn: interface learning in 3DOF exploration of 3D scatterplots
Shovman, M., Szymkowiak, A., Bown, J. L. & Scott-Brown, K. C., 18 Apr 2015, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: Association for Computing Machinery (ACM), p. 313-316 4 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Undermining: social engineering using open source intelligence gathering
Ball, L., Ewan, G. & Coull, N., 2012, Proceedings of the International Conference on Knowledge Discovery and Information Retrieval. Fred, A. & Filipe, J. (eds.). Scitepress Digital Library, Vol. 1: KDIR. p. 275-280 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile11 Citations (Scopus)606 Downloads (Pure) -
Urban tree detection and species classification using aerial imagery
Oghaz, M. M. D., Saheer, L. B. & Zarrin, J., 7 Jul 2022, Intelligent Computing: Proceedings of the 2022 Computing Conference. Arai, K. (ed.). Cham: Springer International Publishing AG, Vol. 2. p. 469-483 15 p. (Lecture Notes in Networks and Systems; vol. 507).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Usability and biometric verification at the ATM interface
Coventry, L., De Angeli, A. & Johnson, G., 28 Jul 2003, CHI '03 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Association for Computing Machinery (ACM), p. 153-160 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
82 Citations (Scopus) -
Usability challenges in emerging markets
Aziz, M., Riley, C. & Johnson, G., 2008, ICEIS 2008: Proceedings of the Tenth International conference on Enterprise Information Systems Vol HCI. Cordeiro, J. & Filipe, J. (eds.). Scitepress Digital Library, Vol. 5. p. 160-165 6 p. (ICEIS - International Conference on Enterprise Information Systems).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access2 Citations (Scopus) -
Usability engineering at NCR (Scotland) Ltd
Coventry, L., Johnson, G. & Westwater, M., 1996, People and computers XI: proceedings of HCI’96. Sasse, M. A., Cunningham, R. J. & Winder, R. L. (eds.). London: Springer-Verlag, Vol. 2. 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Use of an agile bridge in the development of assistive technology
Prior, S., Waller, A., Black, R. & Kroll, T., 27 Apr 2013, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: Association for Computing Machinery (ACM), p. 1579-1588 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile5 Citations (Scopus)119 Downloads (Pure) -
Use of a vision model to quantify the significance of factors effecting target conspicuity
Gilmore, M. A., Jones, C. K., Haynes, A. W., Tolhurst, D. J., To, M., Troscianko, T., Lovell, P. G., Parraga, C. A. & Pickavance, K., 23 Aug 2006, Targets and Backgrounds XII: Characterization and Representation. 62390R. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 6239).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Citations (Scopus) -
User experience at NCR: an organisational overview
Day, P. N., Johnson, G. I., Rohan, C., Riley, C. & Carlisle, M., 6 Sep 2010, People and computers XXIV Games are a serious business: proceedings of HCI 2010 the 24th BCS Interaction Specialist Group conference, University of Abertay, Dundee, UK 6-10 September 2010. McEwan, T. & McKinnon, L. M. (eds.). Swindon: BCS Learning & Development Ltd., p. 195-203 9 p. (Electronic Workshops in Computing (eWiC)).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile1 Citation (Scopus)32 Downloads (Pure) -
User research in a scientific software development project
Sloan, D., MacAulay, C., Forbes, P., Loynton, S. & Gregor, P., 1 Sep 2009, People and Computers XXIII Celebrating People and Technology - Proceedings of HCI 2009. Blackwell, A. (ed.). BCS, The Chartered Institute for IT, p. 423-429 7 p. (People and Computers XXIII Celebrating People and Technology - Proceedings of HCI 2009).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access5 Citations (Scopus) -
Users’ mental models of automated teller machines: an exploratory study
Henneman, R. L., Knutson, M. & Johnson, G. I., 1993, Proceedings of the Annual AT&T Human Factors and Behavioral Sciences Symposium ’93. Holmdel, NJ: AT&T Bell Laboratories, p. 53-57 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Uses of peer assessment in database teaching and learning
Paterson, J., Wilson, J. N. & Leimich, P., 2012, Data security and security data: 27th British National Conference on Databases, BNCOD 27 Dundee, UK, June 29 – July 1, 2010 Revised Selected Papers. MacKinnon, L. M. (ed.). Berlin: Springer, p. 135-146 12 p. (Lecture Notes in Computer Science; vol. 6121).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile2 Citations (Scopus)180 Downloads (Pure) -
Using a dashboard-based statistical information system to support online learning: the Tourism Monitor project
MacKinnon, L. M., Velvin, J., Graven, O. H. & Bacon, L., 19 Oct 2015, Proceedings of E-Learn: : World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education. Ho, C. & Lin, G. (eds.). Association for the Advancement of Computing in Education, Vol. 2015. p. 1126-1135 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Using a fuzzy inference system to control a pumped storage hydro plant
King, D. J., Bradley, D. A., Mansoor, S. P., Jones, D. I., Aris, F. C. & Jones, G. R., 2001, Proceedings of the 10th IEEE International Conference on Fuzzy Systems. Piscataway, NJ: IEEE , Vol. 3. p. 1008-1011 4 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile7 Citations (Scopus)122 Downloads (Pure) -
Using gamification to improve information security behavior: a password strength experiment
Ophoff, J. & Dietz, F., 19 Jun 2019, Information security education: education in proactive information security: 12th IFIP WG 11.8 world conference WISE 12, Lisbon, Portugal, June 25–27, 2019, proceedings. Drevin, L. & Theocharidou, M. (eds.). Cham: Springer, p. 157-169 13 p. (IFIP Advances in Information and Communication Technology (IFIPAICT); vol. 557).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile6 Citations (Scopus)169 Downloads (Pure) -
Using generative adversarial networks to create graphical user Interfaces for video games
Acornley, C., 18 Oct 2021, ICMI'21: proceedings 23rd ACM International Conference on Multimodal Interaction. New York: Association for Computing Machinery (ACM), p. 802–806 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile80 Downloads (Pure) -
Using motion-sensing remote controls with older adults
von Bruhn Hinné, T. & Keates, S., 2011, Universal access in Human-Computer Interaction: users diversity. London: Springer-Verlag, Vol. 2. p. 166-175 10 p. (Lecture Notes in Computer Science; vol. 6766).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Citations (Scopus) -
Using multiple GPUs to accelerate string searching for digital forensic analysis
Bayne, E., Ferguson, R. I., Sampson, A. & Isaacs, J., 22 Sep 2016, SADFE Proceedings 2016. Association of Digital Forensics, Security and Law (ADFSL), p. 67-78 12 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile135 Downloads (Pure) -
Using virtual agents to cue observer attention: assessment of the impact of agent animation
Martinez, S., Sloan, R. J. S., Szymkowiak, A. & Scott-Brown, K. C., 21 Nov 2010, CONTENT 2010: the Second International Conference on Creative Content Technologies November 21-26, 2010 - Lisbon, Portugal. Beklen, A., Ejarque, J., Gentzsch, W., Kanstren, T., Koschel, A., Lee, Y. W., Li, L. & Zemlicka, M. (eds.). International Academy, Research, and Industry Association (IARIA), p. 7-12 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Using web-enabled mobile phones for audience participation in database lectures
McCreath, C. & Leimich, P., 2011, Proceedings of the HEA Teaching, Learning and Assessment of Databases (TLAD 11) . Newtownabbey: The Higher Education Academy, p. 37-43 7 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile42 Downloads (Pure) -
Using whole utterance prediction rate to increase conversational rate
Archibald, J. & File, P., 7 Aug 2008, Proceedings of 13th Biennial Conference of the International Society of Augmentative and Alternative Communication, Montreal, Canada, 4-7 August, 2008. ISAACResearch output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Utilizing cone penetration tests for landslide evaluation
Jorat, M. E., Kreiter, S., Mörz, T., Moon, V. & De Lange, W., 2014, Submarine mass movements and their consequences: 6th International Symposium. Krastel, S., Behrmann, J-H., Völker, D., Stipp, M., Berndt, C., Urgeles, R., Chaytor, J., Huhn, K., Strasser, M. & Harbitz, C. B. (eds.). Cham: Springer, p. 55-71 17 p. (Advances in Natural and Technological Hazards Research; vol. 37).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
VIP: a visual approach to user authentication
De Angeli, A., Coutts, M., Coventry, L., Johnson, G. I., Cameron, D. & Fischer, M. H., 22 May 2002, Proceedings of the Working Conference on Advanced Visual Interfaces, AVI 2002. De Marsico, M., Levialdi, S. & Panizzi, E. (eds.). New York: Association for Computing Machinery (ACM), p. 316-323 8 p. (Proceedings of the Workshop on Advanced Visual Interfaces AVI).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access68 Citations (Scopus) -
Virtual scaffolding: constructivism in online learning
MacKinnon, L. M. & Bacon, L., 2016, Proceedings of the International Conference e-Learning 2016: Part of the Multi Conference on Computer Science and Information Systems 2016. Nunes, M. B. & McPherson, M. (eds.). International Association for Development of the Information Society, p. 231-235 5 p. (Computer Science and Information Systems Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access -
Virtua Walker '87: technostalgia for a walking sim from an alternative past
Sloan, R. J. S. & Robertson, P., 26 Feb 2017, Proceedings of the International Conference on Game Jams, Hackathons, and Game Creation Events: ICGJ '17 . New York: Association for Computing Machinery (ACM), p. 44-45 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile1 Citation (Scopus)157 Downloads (Pure) -
Visualisation of device datasets to assist digital forensic investigation
Hales, G., 19 Oct 2017, Proceedings of the International Conference On Cyber Situational Awareness, Data Analytics And Assessment- CyberSA. IEEE , 4 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile2 Citations (Scopus)210 Downloads (Pure) -
Visualization of African knowledge to embody the spirit of African storytelling: principles, practices and evaluation
Van Biljon, J., Renaud, K. & Chimbo, B., 3 Dec 2018, Proceedings of the 2nd African Conference for Human Computer Interaction: Thriving Communities, AfriCHI 2018. Winschiers-Theophilus, H., van Zyl, I., Goagoses, N., Singh Jat, D., Belay, E. G., Orji, R. & Peters, A. (eds.). Association for Computing Machinery (ACM), p. 271-272 2 p. 48Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Vocational training and knowledge development: a deeper understanding
Gilmour, D. J., Simpson, E., Blackwood, D. J., McCallum, C. & Logan, G., 5 Sep 2016, Proceedings of the 32nd Annual ARCOM Conference. Chan, P. W. & Neilson, C. J. N. (eds.). Vol. 1. p. 393-402 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile69 Downloads (Pure) -
Vulnerability anti-patterns: a timeless way to capture poor software practices (Vulnerabilities)
Nafees, T., Coull, N., Ferguson, I. & Sampson, A., 29 Nov 2018, PLoP 17 conference proceedings: 24th conference on pattern languages of programs, October 23-25 October, 2017, Vancouver, Canada. Iba, T., Yoder, J., Burgoyne, A. & Nozaki, K. (eds.). The Hillside Group, 16 p. 23Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile586 Downloads (Pure) -
Watch this! Recent developments and future challenges
Jola, C., 1 Sep 2016, Proceedings IAE 2016: XXIV. Conference of the International Association of Empirical Aesthetics. Leder, H., Forster, M., Gerger, G., Nadal, M., Pelowski, M. & Rosenberg, R. (eds.). International Association of Empirical Aesthetics, p. 39-39 1 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access -
Water for Walami: a strategy game
Simpson, E. & Ogwuda, O. I., 2006, Simulations and games for risk, crisis and security management. Borodzicz, E. (ed.). The Society for the Advancement of Games and Simulations in Education and Training (SAGSET), Vol. 14. p. 91-101 11 p. (International Simulation and Gaming Research Yearbook; vol. 14).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile48 Downloads (Pure) -
WeChat as a remote research tool using WeChat to understand banking with Chinese consumers
Sie, J., Eng, K. W., Zainuddin, S. & Johnson, G. I., 20 Feb 2017, Proceedings 2016 4th International Conference on User Science and Engineering (iUSEr). IEEE , p. 17-22 6 p. (2016 4th International Conference on User Science and Engineering (i-USEr)).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
What can the 'ash cloud' tell us about older adults' technology adoption?
Gibson, L., Forbes, P. & Hanson, V., 31 Dec 2010, ASSETS'10 - Proceedings of the 12th International ACM SIGACCESS Conference on Computers and Accessibility. Barreto, A. (ed.). Association for Computing Machinery (ACM), p. 301-302 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
What did I really vote for? On the usability of verifiable e-voting schemes
Marky, K., Kulyk, O., Renaud, K. & Volkamer, M., 21 Apr 2018, Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. New York: Association for Computing Machinery (ACM), 13 p. 176Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile10 Citations (Scopus)521 Downloads (Pure) -
When eHealth meets the internet of things: pervasive security and privacy challenges
Omoogun, M., Seeam, P., Ramsurrun, V., Bellekens, X. & Seeam, A., 19 Oct 2017, Proceedings of the International Conference on Cyber Security and Protection of Digital Services. IEEE , 7 p. 13Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7 Citations (Scopus) -
Whole life costs and benefits of sustainable urban drainage systems in Dunfermline, Scotland
Wolf, D., Duffy, A. & Heal, K. V., 15 Jan 2015, Proceedings of the 2015 International Low Impact Development conference. Barrett, M. (ed.). Reston: American Society of Civil Engineers (ASCE), p. 419-427 9 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Citations (Scopus) -
Why doesn't Jane protect her privacy?
Renaud, K., Volkamer, M. & Renkema-Padmos, A., 20 Jun 2014, Privacy enhancing technologies: 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, proceedings. De Cristofaro, E. & Murdoch, S. J. (eds.). Cham: Springer, p. 244-262 19 p. (Lecture Notes in Computer Science (LNCS); vol. 8555).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access49 Citations (Scopus) -
Why do people adopt, or reject, smartphone password managers?
Alkaldi, N. & Renaud, K., Jul 2016, EuroUSEC '16: the 1st European Workshop on Usable Security. Darmstadt: Internet Society, 15 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access -
Why do people adopt, or reject, smartphone security tools?
Alkaldi, N. & Renaud, K., 12 Jul 2016, Proceedings of the 10th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2016. Clarke, N. L. & Furnell, S. M. (eds.). Plymouth: Univerisity of Plymouth, p. 135-144 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile2 Citations (Scopus)48 Downloads (Pure) -
WikiRate.org - leveraging collective awareness to understand companies' environmental, social and governance performance
Mills, R., De Paoli, S., Diplaris, S., Gkatziaki, V., Papadopoulos, S., Prasad, S. R., McCutchen, E., Kapadia, V. & Hirche, P., 25 Aug 2016, Internet Science, INSCI2016. Bagnoli, F., Satsiou, A., Stavrakakis, I., Nesi, P., Pacini, G., Welp, Y., Tiropan, T. & DiFranzo, D. (eds.). Chambray: Springer, p. 74-88 15 p. (Lecture Notes in Computer Science; vol. 9934).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile6 Citations (Scopus)155 Downloads (Pure) -
Women and work-life balance: a case of austerity and authenticity
Moir, J., 2014, Proceedings of MAC-EMMT 2014: The 3rd Multidisciplinary Academic Conference in Prague: Economics, Management and Marketing. 1st ed. Prague: MAC Prague consulting s.r.o., 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
X.509 certificate error testing
McLuskie, D. & Bellekens, X., 27 Aug 2018, Proceedings of the 13th International Conference on Availability, Reliability and Security. Association for Computing Machinery (ACM), 8 p. 42Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile162 Downloads (Pure)