Now showing items 21-40 of 1558

  • Neural networks for predicting the output of wind flow simulations over complex topographies

    Mayo, Michael; Wakes, Sarah; Anderson, Chris (IEEE, 2018)
    We use deep learning techniques to model computational fluid dynamics (CFD) simulations of wind flow over a complex topography. Our motivation is to "speed up" the optimisation of CFD-based simulations (such as the 3D wind ...
  • MaxGain: Regularisation of neural networks by constraining activation magnitudes

    Gouk, Henry; Pfahringer, Bernhard; Frank, Eibe; Cree, Michael J. (Springer, 2019)
    Effective regularisation of neural networks is essential to combat overfitting due to the large number of parameters involved. We present an empirical analogue to the Lipschitz constant of a feed-forward neural network, ...
  • Software for students to sketch interface designs

    Plimmer, Beryl; Apperley, Mark (ACM Press, 2003)
    This paper describes the development and evaluation of an electronic sketch environment for interface design. The tool provides a pen-based interface on an electronic whiteboard for designing Visual Basic forms, it is ...
  • Proximity assurances based on natural and artificial ambient environments

    Gurulian, Iakovos; Markantonakis, Konstantinos; Shepherd, Carlton; Frank, Eibe; Akram, Raja Naeem (Spinger, 2017)
    Relay attacks are passive man-in-the-middle attacks that aim to extend the physical distance of devices involved in a transaction beyond their operating environment. In the field of smart cards, distance bounding protocols ...
  • Acquiring metadata to support biographies of museum artefacts

    Zhao, Can; Twidale, Michael B.; Nichols, David M. (Springer, 2018)
    Museum collections are primarily experienced in physical museums. Metadata and linked data have the potential to support new models of interaction with heritage objects outside museums. Object biographies are a conceptual ...
  • Estimating the growth in Mordell-Weil ranks and Shafarevich-Tate groups over Lie extensions

    Delbourgo, Daniel; Lei, Antonio (Springer, 2017)
    Let E/Q be an elliptic curve, p > 3 a good ordinary prime for E, and K∞ a p-adic Lie extension of a number field k. Under some standard hypotheses, we study the asymptotic growth in both the Mordell–Weil rank and ...
  • Verification of the diagnosability of discrete-event systems in waters

    McGrath, Nicholas (Department of Computer Science, The University of Waikato, 2018-11-21)
    The task of detecting faults and reacting to them appropriately is a crucial aspect of a building a stable system. If a fault cannot be directly observed, its occurrence must be inferred from what can be observed. In the ...
  • Using augmented reality to enhance children’s books

    Vanderschantz, Nicholas; Hinze, Annika; AL-Hashami, Aysha (Department of Computer Science, The University of Waikato, 2018)
    This paper reports a case study on using Augmented Reality in children's books in which we explored the use of various types of interactions at different levels. The paper describes the design process and the insights ...
  • Use of video shadow for small group interaction awareness on a large interactive display surface

    Apperley, Mark; McLeod, Laurie; Masoodian, Masood; Paine, Lance; Phillips, Malcolm; Rogers, Bill; Thomson, Kirsten (Australian Computer Society, Inc, 2003)
    This paper reports work done as part of the Large Interactive Display Surface(LIDS) project at the University of Waikato. One application of the LIDS equipment is distributed meeting support. In this context large display ...
  • Maximum margin principal components

    Luo, Xianghui; Durrant, Robert J. (2017)
    Principal Component Analysis (PCA) is a very successful dimensionality reduction technique, widely used in predictive modeling. A key factor in its widespread use in this domain is the fact that the projection of a dataset ...
  • Pushing the boundaries with bdrmapIT: mapping router ownership at internet scale

    Marder, Alexander; Luckie, Matthew John; Dhamdhere, Amogh; Huffaker, Bradley; claffy, kc; Smith, Jonathan M. (ACM, 2018)
    Two complementary approaches to mapping network boundaries from traceroute paths recently emerged [27,31]. Both approaches apply heuristics to inform inferences extracted from traceroute measurement campaigns. bdrmap [27] ...
  • Transferring sentiment knowledge between words and tweets

    Bravo-Marquez, Felipe; Frank, Eibe; Pfahringer, Bernhard (IOS Press, 2018)
    Message-level and word-level polarity classification are two popular tasks in Twitter sentiment analysis. They have been commonly addressed by training supervised models from labelled data. The main limitation of these ...
  • A virtual cocktail party: Supporting informal social interactions in a virtual conference

    Rogers, Bill; Masoodian, Masood; Apperley, Mark (ACM, 2018)
    Whilst the primary purpose of conferences is work — formal exchange and sharing of information — they almost always also include elements of play: Informal social and entertainment elements, such as receptions, dinners, ...
  • Mining algorithmic complexity in full-text scholarly documents

    Bakar, Abu; Safder, Iqra; Hassan, Saeed-Ul (The University of Waikato, 2018)
    Non-textual document elements (NTDE) like charts, diagrams, algorithms play an important role to present key information in scientific documents [1]. Recent advancements in information retrieval systems tap this information ...
  • Mining scientific trends based on topics in conference call for papers

    Bakar, Abu; Arshad, Noor; Safder, Iqra; Hassan, Saeed-Ul (The University of Waikato, 2018)
    Ever since analyzing scientific topics and evolution of technology have become vital for researchers, academics, funding institutes and research administration departments, there is a crucial need to mine scientific trends ...
  • Exploring research data management from a data user’s perspective

    Wu, Yejun (The University of Waikato, 2018)
    Current research data management practices focus more on data col-lecting, curating and sharing than on supporting data use and reuse. This re-search studies research data management from a data user’s perspective and aims ...
  • Deep feature engineering using full-text publications

    Safder, Iqra; Batool, Hafsa; Hassan, Saeed-Ul (The University of Waikato, 2018)
    We have observed a rapid proliferation in scientific literature and advancements in web technologies has shifted information dissemination to digital libraries [1]. In general, the research conducted by scientific community ...
  • A framework for bibliographic recommendation system based on Heterogeneous Retrieval Model?

    Anthony, Poonam; Bhowmick, Plaban Kumar (The University of Waikato, 2018)
    In this paper, we propose an architectural framework for recommending heterogeneous resources in a digital library.We present an outline of our proposed recommendation framework, and discuss brie its performance over ...
  • Clustering of research papers based on sentence roles

    Fukuda, Satoshi; Tomiura, Yoichi (The University of Waikato, 2018)
    In an academic paper search, particularly a search to confirm the originality of a us-er’s research and to create survey articles, it is important that the search returns com-prehensive results related to the user’s ...
  • Using topic modeling to understand workplace health and safety ownership

    Goh, Dion Hoe-Lian; Lee, Chei Sian; Theng, Yin Leng; Zheng, Han; Aung, Htet Htet; Aroor, Megha Rani; Lee, Edmund Wei Jian; Li, Chen (The University of Waikato, 2018)
    This paper is a first step in understanding the concept of workplace health and safety ownership. Using topic modeling, we identified three major themes in the literature, including work related to interventions, issues ...