Computing and Mathematical Sciences Papers

 

This collection houses research from the Faculty of Computing and Mathematical Sciences at the University of Waikato.

  • Microsoft Translator Hub for Māori language

    Keegan, Te Taka Adrian Gregory; Cairns, Jasmin (2018)
    Recent improvements in Machine Translation (MT) software has opened new possibilities for applications of automatic language translation. But can these opportunities exist for the smaller, minority languages of the world? ...
  • Domain and range operations in semigroups and rings

    Stokes, Tim E. (Taylor and Francis, 2015)
    A D-semigroup S is a semigroup equipped with an operation D satisfying laws asserting that for a ∈ S, D(a) is the smallest e in some set of idempotents U ⊆ S for which ea = a. D-semigroups correspond to left-reduced ...
  • Making use of and adapting MOOCs text resources for language learning

    Wu, Shaoqun; Fitzgerald, Alannah; Franken, Margaret (2019)
    Massive Open Online Courses are becoming popular educational vehicles through which universities reach out to non-traditional audiences. Many enrollees hail from other countries and cultures, and struggle to cope with the ...
  • Stochastic gradient trees

    Gouk, Henry; Pfahringer, Bernhard; Frank, Eibe (PMLR, 2019)
    We present an algorithm for learning decision trees using stochastic gradient information as the source of supervision. In contrast to previous approaches to gradient-based tree learning, our method operates in the incremental ...
  • The MIREX Grand Challenge: A Framework of Holistic User-Experience Evaluation in Music Information Retrieval

    Hu, Xiao; Lee, Jin Ha; Bainbridge, David; Choi, Kahyun; Organisciak, Peter; Downie, J. Stephen (Wiley, 2017)
    Music Information Retrieval (MIR) evaluation has traditionally focused on system‐centered approaches where components of MIR systems are evaluated against predefined data sets and golden answers (i.e., ground truth). There ...
  • Network hygiene, incentives, and regulation: Deployment of source address validation in the internet

    Luckie, Matthew John; Beverly, Robert; Koga, Ryan; Keys, Ken; Kroll, Joshua A.; claffy, kc (ACM Press, 2019)
    The Spoofer project has collected data on the deployment and characteristics of IP source address validation on the Internet since 2005. Data from the project comes from participants who install an active probing client ...
  • Learning regexes to extract router names from hostnames

    Luckie, Matthew John; Huffaker, Bradley; claffy, kc (ACM Press, 2019)
    We present the design, implementation, evaluation, and validation of a system that automatically learns to extract router names (router identifiers) from hostnames stored by network operators in different DNS zones, which ...
  • Introducing machine learning concepts with WEKA.

    Smith, Tony C.; Frank, Eibe (2016)
    This chapter presents an introduction to data mining with machine learning. It gives an overview of various types of machine learning, along with some examples. It explains how to download, install, and run the WEKA data ...
  • The impact of router outages on the AS-level internet

    Luckie, Matthew John; Beverly, Robert (ACM, 2017)
    We propose and evaluate a new metric for understanding the dependence of the AS-level Internet on individual routers. Whereas prior work uses large volumes of reachability probes to infer outages, we design an efficient ...
  • Inferring persistent interdomain congestion

    Dhamdhere, Amogh; Clark, David D.; Gamero-Garrido, Alexander; Luckie, Matthew John; Mok, Ricky K. P.; Akiwate, Gautam; Gogia, Kabir; Bajpai, Vaibhav; Snoeren, Alex C.; claffy, kc (ACM, 2018)
    There is significant interest in the technical and policy communities regarding the extent, scope, and consumer harm of persistent interdomain congestion. We provide empirical grounding for discussions of interdomain ...
  • Maximum gradient dimensionality reduction

    Luo, Xianghui; Durrant, Robert J. (IEEE, 2018)
    We propose a novel dimensionality reduction approach based on the gradient of the regression function. Our approach is conceptually similar to Principal Component Analysis, however instead of seeking a low dimensional ...
  • Testing the promise of access to justice through online courts

    Toy-Cronin, Bridgette; Irvine, Bridget; Nichols, David M.; Cunningham, Sally Jo; Tkacukova, Tatiana (Boom Uitgevers Den Haag, 2018)
    Modernization is increasingly knocking on the courthouse door. Many common law countries are investigating ways to introduce technology to improve civil courts, including the introduction of online courts. These state-led ...
  • The use of Māori words in National Science Challenge online discourse

    Calude, Andreea S.; Stevenson, Louise; Whaanga, Hēmi; Keegan, Te Taka Adrian Gregory (Taylor & Francis, 2019)
    New Zealand English is well-known for its heavy borrowing of words from Māori. This lexical component, unique to New Zealand English alone has been studied intensely over the last 50 years, particularly in newspaper media. ...
  • Adoption of international privacy standards in New Zealand health information research.

    Yogarajan, Vithya; Ragupathy, Rajan (2019)
    The use of patient health information in secondary research (henceforth referred as health information research) has many potential health and economic benefits for New Zealand, but patient privacy must be protected in the ...
  • Chinese postgraduates' explanation of the sources of sentence initial bundles in their thesis writing

    Li, Liang; Franken, Margaret; Wu, Shaoqun (2018)
    Lexical bundles, recurrent multiword combinations in a register, are extremely common and important discourse building blocks in academic writing. An increasing number of studies have investigated lexical bundles in academic ...
  • Automatic end-to-end De-identification: Is high accuracy the only metric?

    Yogarajan, Vithya; Pfahringer, Bernhard; Mayo, Michael (2019)
    De-identification of electronic health records (EHR) is a vital step towards advancing health informatics research and maximising the use of available data. It is a two-step process where step one is the identification of ...
  • Finite dissipation in anisotropic magnetohydrodynamic turbulence

    Bandyopadhyay, R.; Oughton, Sean; Wan, M.; Matthaeus, William H.; Chhiber, R.; Parashar, Tulasi N. (American Physical Society, 2018)
    In the presence of an externally supported, mean magnetic field, a turbulent, conducting medium, such as plasma, becomes anisotropic. This mean magnetic field, which is separate from the fluctuating, turbulent part of the ...
  • Māori language procreation on social media

    Keegan, Te Taka Adrian Gregory (2019)
    The Māori language has taken seed and grown on social media. This presentation will examine this presence, exploring the forms it has taken and the influence it is having. It will look at Facebook groups devoted to the ...
  • Biosensing by Learning: Cancer Detection as Iterative optimization.

    Chen, Yifan; Sharifi, Neda; Holmes, Geoffrey; Cheang, U. Kei (IEEE, 2018)
    We propose a novel cancer detection procedure (CDP) based on an iterative optimization method. The global minimum of a tumor-induced biological cost function indicates the tumor location, the domain of the cost function ...
  • Modelling fractal-structured smart microgrids: Exploring signals and protocols

    Apperley, Mark (IARIA, 2019)
    This paper discusses some of the issues surrounding the interconnection of smart microgrids, with a focus on fractal structures, their implementation, management, operation, and potential effectiveness. It builds on a basic ...

View more