This community houses research from the Faculty of Computing and Mathematical Sciences at the University of Waikato.

Sub-communities within Computing and Mathematical Sciences

Collections in Computing and Mathematical Sciences

  • From event streams to process models and back: Challenges and opportunities

    Soffer, Pnina; Hinze, Annika; Koschmider, Agnes; Ziekow, Holger; Di Ciccio, Claudio; Koldehofe, Boris; Kopp, Oliver; Jacobsen, Arno; Suermeli, Jan; Son, Wei (Pergamon-Elsevier Science Ltd, 2019)
    The domains of complex event processing (CEP) and business process management (BPM) have different origins but for many aspects draw on similar concepts. While specific combinations of BPM and CEP have attracted research ...
  • Exploring orientation cues in both digital and physical books

    Vanderschantz, Nicholas; Timpany, Claire; Hinze, Annika; Du, Yuchen (BISL, 2017)
    Electronic books (eBooks) and eReaders are now a commonplace tool in the reading experience for many readers. Yet these have long received mixed reviews. Designing suitable interactions that support successful eReading ...
  • Visual semantic enrichment for ereading

    Coleman, Michael; Hinze, Annika (BISL, 2017)
    The current transition from physical to electronic books opens up opportunities to present semantic information about a book’s content. This paper reports on a project that aims to improve the eBook reading experience by ...
  • Radical research honesty in a post-truth society

    Twidale, Michael B.; Nichols, David M. (iSchools, 2019)
    It seems that in much current research, big truths have to be protected by a bodyguard of little white lies, and a phalanx of unreported inconvenient truths. What would happen if we told the truth about how we really do ...
  • Research using electronic health records: not all de-identified datasets are created equal

    Yogarajan, Vithya; Ragupathy, Rajan (CSIRO Publishing, 2019)
    We read the article Research using electronic health records: balancing confidentiality and public good by Wallis et al. with great interest. The authors note general practices need to trust de-identification processes ...
  • Integrating user design and formal models within PVSio-Web

    Watson, Nathaniel; Reeves, Steve; Masci, Paolo (2018)
    Creating formal models of interactive systems has wide reaching benefits, not only for verifying low-level correctness, but also as a tool for ensuring user interfaces behave logically and consistently. Despite this, tools ...
  • Hierarchical modelling of manufacturing systems using discrete event systems and the conflict preorder

    Malik, Robi; Leduc, Ryan (SPRINGER, 2015-06-01)
    This paper introduces Hierarchical Interface-Based Supervisory Control using the Conflict Preorder and applies it to the design of two manufacturing systems models of practical scale. Hierarchical Interface-Based Supervisory ...
  • Applying the Reason Model to enhance health record research in the age of 'big data'.

    Ragupathy, Rajan; Yogarajan, Vithya (2018)
    There is considerable international interest in applying powerful data research techniques (‘big data’) to health records.¹ This will become increasingly viable in New Zealand as previously siloed records held by private ...
  • Personal data collection in the workplace: ethical and technical challenges

    Bowen, Judy; Hinze, Annika; Griffiths, Christopher; Kumar, Vimal; Bainbridge, David (2017)
    Forestry is a dangerous work environment and collecting data on site to identify and warn about hazardous situations is challenging. In this paper, we discuss our attempts at creating continuous data-collection methods ...
  • The applicability of ambient sensors as proximity evidence for NFC transactions

    Shepherd, Carlton; Gurulian, Iakovos; Frank, Eibe; Markantonakis, Konstantinos; Akram, Raja Naeem; Panaousis, Emmanouil; Mayes, Keith (IEEE Computer Society, 2017)
    Near Field Communication (NFC) has enabled mobile phones to emulate contactless smart cards. Similar to contactless smart cards, they are also susceptible to relay attacks. To counter these, a number of methods have been ...
  • How kids see search: a visual analysis of internet search engines

    Vanderschantz, Nicholas; Hinze, Annika (BISL, 2017)
    Through previous studies into children’s internet search practice, we have gained insight into the taught strategies, information behaviour, and common errors children experience while searching. This paper analyses the ...
  • Killing Tensors and Variable Separation for Hamilton-Jacobi and Helmholtz Equations

    Kalnins, Ernie G.; Miller, W., Jr. (SIAM Publications, 1980)
    Every separable coordinate system for the Hamilton-Jacobi equation on a Riemannian manifold Vₙ corresponds to a family of n-1 Killing tensors in involution, but the converse is false. For general n we find a practical ...
  • Hypergeometric expansions of Heun polynomials

    Kalnins, Ernie G.; Miller, W., Jr. (SIAM Publications, 1991)
    The product of two Heun polynomials is expanded in terms of products of two Jacobi polynomials. This is done by making crucial use of group theory and the knowledge of separable coordinate systems on the n-sphere. The ...
  • WASSA-2017 shared task on emotion intensity

    Mohmmad, Saif M.; Bravo-Marquez, Felipe (Association for Computational Linguistics, 2017)
    We present the first shared task on detecting the intensity of emotion felt by the speaker of a tweet. We create the first datasets of tweets annotated for anger, fear, joy, and sadness intensities using a technique called ...
  • Separation of variables for the Hamilton-Jacobi equation on complex projective spaces

    Boyer, C.P.; Kalnins, Ernie G.; Winternitz, P. (SIAM Publication, 1985)
    The additive separation of variables in the Hamilton-Jacobi equation and the multiplicative separation of variables in the Laplace-Beltrami equation are studied for the complex projective space C Pⁿ considered as a Riemannian ...
  • Linear dimensionality reduction in linear time: Johnson-Lindenstrauss-type guarantees for random subspace

    Lim, Nick; Durrant, Robert J. (2017)
    We consider the problem of efficient randomized dimensionality reduction with norm-preservation guarantees. Specifically we prove data-dependent Johnson-Lindenstrauss-type geometry preservation guarantees for Ho's random ...
  • Using swarm optimization to enhance autoencoder’s images

    Doaud, Maisa; Mayo, Michael (2017)
    Autoencoders learn data representations through reconstruction. Robust training is the key factor affecting the quality of the learned representations and, consequently, the accuracy of the application that use them. ...
  • A study of children’s search query formulation habits

    Vanderschantz, Nicholas; Hinze, Annika (2017)
    The strategies children use for digital information search in educational settings are rarely explored. Open questions remain on such fundamental issues as to which information-seeking strategies children employ, how they ...
  • Sentence initial bundles: A comparative study between Chinese master’s L2 theses and published writing

    Li, Liang; Franken, Margaret; Wu, Shaoqun (Asian EFL Journal Press, 2018)
    Lexical bundles, like recurrent multi-word combinations, act as discourse frames in a register and so are potentially significant as markers of expertise. The present study compared sentence initial lexical bundles (i.e. ...
  • Good vibrations: artificial ambience-based relay attack detection

    Gurulian, Iakovos; Markantonakis, Konstantinos; Frank, Eibe; Akram, Raja Naeem (IEEE Computer Society, 2018)
    Relay attacks are passive man in the middle attacks, aiming to extend the physical distance of devices involved in a transaction beyond their operating environment, within the restricted time-frame. In the field of ...

View more