Now showing items 1-20 of 1584

  • Design and the fourth industrial revolution. Dangers and opportunities for a mutating discipline

    Garcia Ferrari, Tomás (Taylor & Francis (Routledge), 2017)
    The nature of design has always been related to socio-technological forces. In the twentieth century, the first and second orders of design were central in the establishment of graphic and industrial design. In the early ...
  • Maumahara Papahou: A mobile augmented reality memory treasure box based on Māori mnemonic aids

    Taia, Ivy; Hinze, Annika; Vanderschantz, Nicholas; Keegan, Te Taka Adrian Gregory (2019)
    He aha te mea nui o te ao? He tangata, he tangata, he tangata. What is the most important thing in the world? It is people, it is people, it is people. Traumatic brain injury (TBI) is a worldwide “silent epidemic” causing ...
  • Insider threat modeling: An adversarial risk analysis approach

    Joshi, Chaitanya; Rios Insua, David; Rios, Jesus (2019)
    Insider threats entail major security issues in geopolitics, cyber security and business organizations. Most earlier work in the field has focused on standard game theoretic approaches. We provide here two alternative, ...
  • Exploration of association rule mining for coding consistency and completeness assessment in inpatient administrative health data.

    Peng, Mingkai; Sundararajan, Vijaya; Williamson, Tyler; Minty, Evan P.; Smith, Tony C.; Doktorchik, Chelsea T.A.; Quan, Hude (2018)
    OBJECTIVE: Data quality assessment is a challenging facet for research using coded administrative health data. Current assessment approaches are time and resource intensive. We explored whether association rule mining (ARM) ...
  • The University of Waikato usability laboratory

    Thomson, Kirsten; Apperley, Mark (2001)
    The University of Waikato Usability Laboratory is an environment where researchers are able to study and assess the usability of products while being used by their intended users. It allows for flexible configuration, and ...
  • FreeForm: Informal form design on a large interactive display surface

    Plimmer, Beryl; Apperley, Mark (2001)
    This demonstration shows the tool we have developed for hand-sketching user interfaces. Our motivation for developing this tool is to provide an environment where novice programmers can move freely along the design continuum ...
  • Evaluting a sketch environment for novice programmers

    Plimmer, Beryl; Apperley, Mark (ACM Press, 2003)
    This paper describes the evaluation of an electronic sketch interface design tool for novice programmers. A comparative study was undertaken with small groups using two different shared space environments; a conventional ...
  • A survey of neural network-based cancer prediction models from microarray data

    Daoud, Maisa; Mayo, Michael (Elsevier, 2019)
    Neural networks are powerful tools used widely for building cancer prediction models from microarray data. We review the most recently proposed models to highlight the roles of neural networks in predicting cancer from ...
  • AffectiveTweets: a Weka package for analyzing affect in tweets

    Bravo-Marquez, Felipe; Frank, Eibe; Pfahringer, Bernhard; Mohammad, Saif M. (Microtome Publishing, 2019)
    AffectiveTweets is a set of programs for analyzing emotion and sentiment of social media messages such as tweets. It is implemented as a package for the Weka machine learning workbench and provides methods for calculating ...
  • WekaDeeplearning4j: A deep learning package for weka based on Deeplearning4j

    Lang, Steven; Bravo-Marquez, Felipe; Beckham, Christopher J.; Hall, Mark A.; Frank, Eibe (Elsevier BV, 2019)
    Deep learning is a branch of machine learning that generates multi-layered representations of data, commonly using artificial neural networks, and has improved the state-of-the-art in various machine learning tasks (e.g., ...
  • Ensembles of nested dichotomies with multiple subset evaluation

    Leathart, Tim; Frank, Eibe; Pfahringer, Bernhard; Holmes, Geoffrey (Springer, 2019)
    A system of nested dichotomies (NDs) is a method of decomposing a multiclass problem into a collection of binary problems. Such a system recursively applies binary splits to divide the set of classes into two subsets, and ...
  • Prior Robustness for Bayesian Implementation of the Fault Tree Analysis

    Joshi, Chaitanya; Ruggeri, Fabrizio; Wilson, Simon P. (IEEE, 2018)
    We propose a prior robustness approach for the Bayesian implementation of the fault tree analysis (FTA). FTA is often used to evaluate risk in large, safety critical systems but has limitations due to its static structure. ...
  • The effect of surface tension on free-surface flow induced by a point sink

    Hocking, Graeme Charles; Nguyen, H.H.N.; Forbes, L.K.; Stokes, Tim E. (Cambridge University Press, 2016)
    The steady, axisymmetric flow induced by a point sink (or source) submerged in an inviscid fluid of infinite depth is computed and the resulting deformation of the free surface is obtained. The effect of surface tension ...
  • Algebraic properties of If-Then-Else and commutative three-valued tests

    Soo, Khi-Ui; Stokes, Tim E. (2019)
    This paper establishes a finite axiomatization of possibly non-halting computer programs and tests, with the if-then-else operation. The model is a two-sorted algebra, with one sort being the programs and the other being ...
  • Counterexample Computation in Compositional Nonblocking Verification

    Malik, Robi; Ware, Simon (Elsevier, 2018)
    This paper describes algorithms to compute a counterexample when compositional nonblocking verification determines that a discrete event system is blocking. Counterexamples are an important feature of model checking that ...
  • Optimal Task Scheduling in a Flexible Manufacturing System using Model Checking

    Malik, Robi; Pena, Patícia N. (Elsevier Ltd., 2018)
    This paper demonstrates the use of model checking to solve the problem of optimal task scheduling in a flexible manufacturing system. The system is modelled as a discrete event system, for which the least restrictive safe ...
  • Computing L-Invariants for the Symmetric Square of an Elliptic Curve

    Delbourgo, Daniel; Gilmore, Hamish (Taylor & Francis, 2019)
    Let E be an elliptic curve over Q, and p≠2 a prime of good ordinary reduction. The p-adic L-function for Sym²E always vanishes at s = 1, even though the complex L-function does not have a zero there. The L-invariant itself ...
  • Health information research privacy standards should include Māori perspectives on privacy

    Ragupathy, Rajan; Yogarajan, Vithya; Luoni, Chris (New Zealand Medical Association, 2019)
    Secondary research using health records and other personal health data (henceforth referred to as health information research) is a valuable tool for tackling New Zealand’s health and social challenges. It requires however ...
  • Boosting decision stumps for dynamic feature selection on data streams

    Barddal, Jean Paul; Enembreck, Fabrício; Gomes, Heitor Murilo; Bifet, Albert; Pfahringer, Bernhard (2019)
    Feature selection targets the identification of which features of a dataset are relevant to the learning task. It is also widely known and used to improve computation times, reduce computation requirements, and to decrease ...
  • K₁-congruences for three-dimensional Lie groups

    Delbourgo, Daniel; Chao, Qin (Springer, 2019)
    We completely describe K₁ (Zₚ [[G∞]]) and its localisations by using an infinite family of p-adic congruences, where G∞ is any solvable p-adic Lie group of dimension 3. This builds on earlier work of Kato when ...