Now showing items 1-20 of 1552

  • Hierarchical modelling of manufacturing systems using discrete event systems and the conflict preorder

    Malik, Robi; Leduc, Ryan (SPRINGER, 2015-06-01)
    This paper introduces Hierarchical Interface-Based Supervisory Control using the Conflict Preorder and applies it to the design of two manufacturing systems models of practical scale. Hierarchical Interface-Based Supervisory ...
  • Applying the Reason Model to enhance health record research in the age of 'big data'.

    Ragupathy, Rajan; Yogarajan, Vithya (2018)
    There is considerable international interest in applying powerful data research techniques (‘big data’) to health records.¹ This will become increasingly viable in New Zealand as previously siloed records held by private ...
  • Personal data collection in the workplace: ethical and technical challenges

    Bowen, Judy; Hinze, Annika; Griffiths, Christopher; Kumar, Vimal; Bainbridge, David (2017)
    Forestry is a dangerous work environment and collecting data on site to identify and warn about hazardous situations is challenging. In this paper, we discuss our attempts at creating continuous data-collection methods ...
  • The applicability of ambient sensors as proximity evidence for NFC transactions

    Shepherd, Carlton; Gurulian, Iakovos; Frank, Eibe; Markantonakis, Konstantinos; Akram, Raja Naeem; Panaousis, Emmanouil; Mayes, Keith (IEEE Computer Society, 2017)
    Near Field Communication (NFC) has enabled mobile phones to emulate contactless smart cards. Similar to contactless smart cards, they are also susceptible to relay attacks. To counter these, a number of methods have been ...
  • How kids see search: a visual analysis of internet search engines

    Vanderschantz, N; Hinze, A (BISL, 2017)
    Through previous studies into children’s internet search practice, we have gained insight into the taught strategies, information behaviour, and common errors children experience while searching. This paper analyses the ...
  • Killing Tensors and Variable Separation for Hamilton-Jacobi and Helmholtz Equations

    Kalnins, Ernie G.; Miller, W., Jr. (SIAM Publications, 1980)
    Every separable coordinate system for the Hamilton-Jacobi equation on a Riemannian manifold Vₙ corresponds to a family of n-1 Killing tensors in involution, but the converse is false. For general n we find a practical ...
  • Hypergeometric expansions of Heun polynomials

    Kalnins, Ernie G.; Miller, W., Jr. (SIAM Publications, 1991)
    The product of two Heun polynomials is expanded in terms of products of two Jacobi polynomials. This is done by making crucial use of group theory and the knowledge of separable coordinate systems on the n-sphere. The ...
  • WASSA-2017 shared task on emotion intensity

    Mohmmad, Saif M.; Bravo-Marquez, Felipe (Association for Computational Linguistics, 2017)
    We present the first shared task on detecting the intensity of emotion felt by the speaker of a tweet. We create the first datasets of tweets annotated for anger, fear, joy, and sadness intensities using a technique called ...
  • Separation of variables for the Hamilton-Jacobi equation on complex projective spaces

    Boyer, C.P.; Kalnins, Ernie G.; Winternitz, P. (SIAM Publication, 1985)
    The additive separation of variables in the Hamilton-Jacobi equation and the multiplicative separation of variables in the Laplace-Beltrami equation are studied for the complex projective space C Pⁿ considered as a Riemannian ...
  • Linear dimensionality reduction in linear time: Johnson-Lindenstrauss-type guarantees for random subspace

    Lim, Nick; Durrant, Robert J. (2017)
    We consider the problem of efficient randomized dimensionality reduction with norm-preservation guarantees. Specifically we prove data-dependent Johnson-Lindenstrauss-type geometry preservation guarantees for Ho's random ...
  • Using swarm optimization to enhance autoencoder’s images

    Doaud, Maisa; Mayo, Michael (2017)
    Autoencoders learn data representations through reconstruction. Robust training is the key factor affecting the quality of the learned representations and, consequently, the accuracy of the application that use them. ...
  • A study of children’s search query formulation habits

    Vanderschantz, Nicholas; Hinze, Annika (2017)
    The strategies children use for digital information search in educational settings are rarely explored. Open questions remain on such fundamental issues as to which information-seeking strategies children employ, how they ...
  • Sentence initial bundles: A comparative study between Chinese master’s L2 theses and published writing

    Li, Liang; Franken, Margaret; Wu, Shaoqun (Asian EFL Journal Press, 2018)
    Lexical bundles, like recurrent multi-word combinations, act as discourse frames in a register and so are potentially significant as markers of expertise. The present study compared sentence initial lexical bundles (i.e. ...
  • Good vibrations: artificial ambience-based relay attack detection

    Gurulian, Iakovos; Markantonakis, Konstantinos; Frank, Eibe; Akram, Raja Naeem (IEEE Computer Society, 2018)
    Relay attacks are passive man in the middle attacks, aiming to extend the physical distance of devices involved in a transaction beyond their operating environment, within the restricted time-frame. In the field of ...
  • Neural networks for predicting the output of wind flow simulations over complex topographies

    Mayo, Michael; Wakes, Sarah; Anderson, Chris (IEEE, 2018)
    We use deep learning techniques to model computational fluid dynamics (CFD) simulations of wind flow over a complex topography. Our motivation is to "speed up" the optimisation of CFD-based simulations (such as the 3D wind ...
  • MaxGain: Regularisation of neural networks by constraining activation magnitudes

    Gouk, Henry; Pfahringer, Bernhard; Frank, Eibe; Cree, Michael J. (Springer, 2019)
    Effective regularisation of neural networks is essential to combat overfitting due to the large number of parameters involved. We present an empirical analogue to the Lipschitz constant of a feed-forward neural network, ...
  • Software for students to sketch interface designs

    Plimmer, Beryl; Apperley, Mark (ACM Press, 2003)
    This paper describes the development and evaluation of an electronic sketch environment for interface design. The tool provides a pen-based interface on an electronic whiteboard for designing Visual Basic forms, it is ...
  • Proximity assurances based on natural and artificial ambient environments

    Gurulian, Iakovos; Markantonakis, Konstantinos; Shepherd, Carlton; Frank, Eibe; Akram, Raja Naeem (Spinger, 2017)
    Relay attacks are passive man-in-the-middle attacks that aim to extend the physical distance of devices involved in a transaction beyond their operating environment. In the field of smart cards, distance bounding protocols ...
  • Acquiring metadata to support biographies of museum artefacts

    Zhao, Can; Twidale, Michael B.; Nichols, David M. (Springer, 2018)
    Museum collections are primarily experienced in physical museums. Metadata and linked data have the potential to support new models of interaction with heritage objects outside museums. Object biographies are a conceptual ...
  • Estimating the growth in Mordell-Weil ranks and Shafarevich-Tate groups over Lie extensions

    Delbourgo, Daniel; Lei, Antonio (Springer, 2017)
    Let E/Q be an elliptic curve, p > 3 a good ordinary prime for E, and K∞ a p-adic Lie extension of a number field k. Under some standard hypotheses, we study the asymptotic growth in both the Mordell–Weil rank and ...