Now showing items 1-20 of 1568

  • Computing L-Invariants for the Symmetric Square of an Elliptic Curve

    Delbourgo, Daniel; Gilmore, Hamish (Taylor & Francis, 2019)
    Let E be an elliptic curve over Q, and p≠2 a prime of good ordinary reduction. The p-adic L-function for Sym²E always vanishes at s = 1, even though the complex L-function does not have a zero there. The L-invariant itself ...
  • Health information research privacy standards should include Māori perspectives on privacy

    Ragupathy, Rajan; Yogarajan, Vithya; Luoni, Chris (New Zealand Medical Association, 2019)
    Secondary research using health records and other personal health data (henceforth referred to as health information research) is a valuable tool for tackling New Zealand’s health and social challenges. It requires however ...
  • Boosting decision stumps for dynamic feature selection on data streams

    Barddal, Jean Paul; Enembreck, Fabrício; Gomes, Heitor Murilo; Bifet, Albert; Pfahringer, Bernhard (2019)
    Feature selection targets the identification of which features of a dataset are relevant to the learning task. It is also widely known and used to improve computation times, reduce computation requirements, and to decrease ...
  • K₁-congruences for three-dimensional Lie groups

    Delbourgo, Daniel; Chao, Qin (Springer, 2019)
    We completely describe K₁ (Zₚ [[G∞]]) and its localisations by using an infinite family of p-adic congruences, where G∞ is any solvable p-adic Lie group of dimension 3. This builds on earlier work of Kato when ...
  • Cyber security vulnerabilities in Tonga

    Laulaupea'alu, Siuta; Keegan, Te Taka Adrian Gregory (2019)
    A research project undertaken in Tonga in 2016 showed that Tonga's computer systems are susceptible and can be easily exploited by cybercriminals. This paper builds on that research by identifying areas of vulnerability ...
  • Learning Through Utility Optimization in Regression Tasks

    Branco, Paula; Torgo, Luís; Ribeiro, Rita P.; Frank, Eibe; Pfahringer, Bernhard; Rau, Markus Michael (IEEE, 2017)
    Accounting for misclassification costs is important in many practical applications of machine learning, and cost-sensitive techniques for classification have been studied extensively. Utility-based learning provides a ...
  • Improving Naive Bayes for regression with optimised artificial surrogate data

    Mayo, Michael; Frank, Eibe (2018)
    Can we evolve better training data for machine learning algorithms? To investigate this question we use population-based optimisation algorithms to generate artificial surrogate training data for naive Bayes for regression. ...
  • Long-term hip function in slipped capital femoral epiphysis treated with in situ pinning.

    Bond, Elizabeth C.; Phillips, Paul; Larsen, Peter D.; Hunt, Lynette Anne; Willoughby, Richard (2019)
    BACKGROUND:: In recent years, there has been a trend toward more aggressive management of slipped capital femoral epiphysis (SCFE) with acute anatomical realignment; however, the literature is unclear with regard to the ...
  • Using crowdsourcing marketplaces for network measurements: the case of Spoofer

    Lone, Qasim; Luckie, Matthew; Korczynski, Maciej; Asghari, Hadi; Javed, Mobin; van Eeten, Michel (IEEE, 2018)
    Internet measurement tools are used to make inferences about network policies and practices across the Internet, such as censorship, traffic manipulation, bandwidth, and security measures. Some tools must be run from vantage ...
  • Identifying equivalent SDN forwarding behaviour

    Sanger, Richard; Luckie, Matthew John; Nelson, Richard (ACM, 2019)
    Software-Defined Networking (SDN) enables network operators the flexibility to program their own forwarding rules, providing more than one way to achieve the same behaviour. Verifying equivalence between rulesets is a ...
  • From event streams to process models and back: Challenges and opportunities

    Soffer, Pnina; Hinze, Annika; Koschmider, Agnes; Ziekow, Holger; Di Ciccio, Claudio; Koldehofe, Boris; Kopp, Oliver; Jacobsen, Arno; Suermeli, Jan; Son, Wei (Pergamon-Elsevier Science Ltd, 2019)
    The domains of complex event processing (CEP) and business process management (BPM) have different origins but for many aspects draw on similar concepts. While specific combinations of BPM and CEP have attracted research ...
  • Exploring orientation cues in both digital and physical books

    Vanderschantz, Nicholas; Timpany, Claire; Hinze, Annika; Du, Yuchen (BISL, 2017)
    Electronic books (eBooks) and eReaders are now a commonplace tool in the reading experience for many readers. Yet these have long received mixed reviews. Designing suitable interactions that support successful eReading ...
  • Visual semantic enrichment for ereading

    Coleman, Michael; Hinze, Annika (BISL, 2017)
    The current transition from physical to electronic books opens up opportunities to present semantic information about a book’s content. This paper reports on a project that aims to improve the eBook reading experience by ...
  • Radical research honesty in a post-truth society

    Twidale, Michael B.; Nichols, David M. (iSchools, 2019)
    It seems that in much current research, big truths have to be protected by a bodyguard of little white lies, and a phalanx of unreported inconvenient truths. What would happen if we told the truth about how we really do ...
  • Research using electronic health records: not all de-identified datasets are created equal

    Yogarajan, Vithya; Ragupathy, Rajan (CSIRO Publishing, 2019)
    We read the article Research using electronic health records: balancing confidentiality and public good by Wallis et al. with great interest. The authors note general practices need to trust de-identification processes ...
  • Integrating user design and formal models within PVSio-Web

    Watson, Nathaniel; Reeves, Steve; Masci, Paolo (2018)
    Creating formal models of interactive systems has wide reaching benefits, not only for verifying low-level correctness, but also as a tool for ensuring user interfaces behave logically and consistently. Despite this, tools ...
  • Hierarchical modelling of manufacturing systems using discrete event systems and the conflict preorder

    Malik, Robi; Leduc, Ryan (SPRINGER, 2015-06-01)
    This paper introduces Hierarchical Interface-Based Supervisory Control using the Conflict Preorder and applies it to the design of two manufacturing systems models of practical scale. Hierarchical Interface-Based Supervisory ...
  • Applying the Reason Model to enhance health record research in the age of 'big data'.

    Ragupathy, Rajan; Yogarajan, Vithya (2018)
    There is considerable international interest in applying powerful data research techniques (‘big data’) to health records.¹ This will become increasingly viable in New Zealand as previously siloed records held by private ...
  • Personal data collection in the workplace: ethical and technical challenges

    Bowen, Judy; Hinze, Annika; Griffiths, Christopher; Kumar, Vimal; Bainbridge, David (2017)
    Forestry is a dangerous work environment and collecting data on site to identify and warn about hazardous situations is challenging. In this paper, we discuss our attempts at creating continuous data-collection methods ...
  • The applicability of ambient sensors as proximity evidence for NFC transactions

    Shepherd, Carlton; Gurulian, Iakovos; Frank, Eibe; Markantonakis, Konstantinos; Akram, Raja Naeem; Panaousis, Emmanouil; Mayes, Keith (IEEE Computer Society, 2017)
    Near Field Communication (NFC) has enabled mobile phones to emulate contactless smart cards. Similar to contactless smart cards, they are also susceptible to relay attacks. To counter these, a number of methods have been ...