Computing and Mathematical Sciences Papers: Recently added

Now showing items 1-20 of 1360

  • Bundle-driven move analysis: Sentence initial lexical bundles in PhD abstracts

    Li, Liang; Franken, Margaret; Wu, Shaoqun (Elsevier, 2020)
    Rhetorical moves are discoursal units that perform communicative functions in a given genre. They have been manually identified in many previous studies taking a corpus-based approach, and these studies have provided ...
  • Towards transforming OpenFlow rulesets to fit fixed-function pipelines

    Sanger, Richard; Luckie, Matthew John; Nelson, Richard (ACM, 2020)
    OpenFlow feature support differs between devices due to devicespecific hardware constraints. OpenFlow places the burden of addressing these differences on the controller, which increases development cost and restricts ...
  • Mutually orthogonal binary frequency squares

    Britz, Thomas; Cavenagh, Nicholas J.; Mammoliti, Adam; Wanless, Ian M. (The Electronic Journal of Combinatorics, 2020)
    A frequency square is a matrix in which each row and column is a permutation of the same multiset of symbols. We consider only binary frequency squares of order n with n/2 zeros and n/2 ones in each row and column. Two ...
  • How to generalise demonic composition

    Stokes, Tim E. (Springer Verlag, 2020)
    Demonic composition is defined on the set of binary relations over the non-empty set X, 𝑅𝑒𝑙𝑋, and is a variant of standard or “angelic” composition. It arises naturally in the setting of the theory of non-deterministic ...
  • Narrative navigation: visualizing story order and locations in augmented reality

    Zhang, Qimo; Hinze, Annika; Vanderschantz, Nicholas (2020)
    Narrative Navigation connects mobile storytelling with geolocations and Augmented Reality (AR). Narrative Navigation is designed to help users better understand a story. In this paper, we introduce our mobile app prototype ...
  • A glimpse into the past, present, and future of engineering interactive computing systems

    Bowen, Judy; Vanderdonckt, Jean; Winckler, Marco (ACM, 2020)
    The area of Engineering Interactive Computing Systems (EICS) is often defined as the intersection between Software Engineering (SE) and Human-Computer Interaction (HCI). In this paper, we provide an overview of what EICS ...
  • vrfinder: Finding outbound addresses in traceroute

    Marder, Alexander; Luckie, Matthew John; Huffaker, Bradley; claffy, kc (ACM, 2020)
    Current methods to analyze the Internet's router-level topology with paths collected using traceroute assume that the source address for each router in the path is either an inbound or off-path address on each router. In ...
  • Participatory design in Māori cultural contexts

    Bowen, Judy; Hinze, Annika (Cardiff University Press, 2020)
    The Hakituri project aims to develop practical and ethical wearable monitoring solutions for workers in hazardous industries. We identified specific challenges pertinent to our participatory design process for this project ...
  • Urban narrative: Value based urban design

    Mackness, Kate; Dyer, Mark; Dyer, Rachel; Hinze, Annika; Garcia Ferrari, Tomás; Wu, Shaoqun; Wilkins, Rebekah; Weng, Min-Hsien (2019)
    Urban Narrative focuses on the social dimension within urban design which is often overlooked in practice which examines human values and needs as a means to inform design practice. The project has been working in partnership ...
  • Synthesis of least restrictive controllable supervisors for extended finite-state machines with variable abstraction

    Malik, Robi; Teixeira, Marcelo (Springer, 2020)
    This paper presents an algorithm that combines modular synthesis for extended finite-state machines (EFSM) with abstraction of variables by symbolic manipulation, in order to compute least restrictive controllable supervisors. ...
  • On the computation of counterexamples in compositional nonblocking verification

    Malik, Robi; Ware, Simon (Springer, 2020)
    This paper describes algorithms to compute a counterexample when compositional nonblocking verification determines that a discrete event system is blocking. Counterexamples are an important feature of model checking that ...
  • Trends on Engineering Interactive Systems: an overview of works presented in workshops at EICS 2019

    Distante, Damiano; Winckler, Marco; Bernhaupt, Regina; Bowen, Judy; Campos, José Creissac; Müller, Florian; Palanque, Philippe; Van den Bergh, Jan; Weyers, Benjamin; Voit, Alexandra (ACM, 2019)
    Workshops are a great opportunity for identifying innovative topics of research that might require discussion and maturation. This paper summarizes the outcomes of the workshops track of the 11th Engineering Interactive ...
  • A Coloured Petri Net approach to model and analyze safety-critical interactive systems

    Jaidka, Sapna; Reeves, Steve; Bowen, Judy (IEEE, 2019)
    To gain confidence in safety-critical interactive systems, formal modelling and analysis plays a vital role. The aim of this paper is to use Coloured Petri Nets to model and analyze safety-critical interactive systems. We ...
  • Current educational technology use for digital information acquisition by young New Zealand children

    Vanderschantz, Nicholas; Hinze, Annika; Cunningham, Sally Jo (ACS, 2014)
    Improving children`s information acquisition using digital documents is an under-studied field. We performed a survey with both teachers and parents to highlight the current use of technology and digital information by ...
  • Hybrid Hashtags: #YouKnowYoureAKiwiWhen Your Tweet Contains Māori and English

    Trye, David; Calude, Andreea S.; Bravo-Marquez, Felipe; Keegan, Te Taka Adrian Gregory
    Twitter constitutes a rich resource for investigating language contact phenomena. In this paper, we report findings from the analysis of a large-scale diachronic corpus of over one million tweets, containing loanwords from ...
  • Multiple level enhancement of children's picture books with augmented reality

    Vanderschantz, Nicholas; Hinze, Annika; AL-Hashami, Aysha (Springer, 2018)
    This paper reports a case study on using Augmented Reality (AR) in children’s books. in which we explored the use of various types of interactions at different levels. An AR enhanced 2-page spread is developed to explore ...
  • Embedding Java classes with code2vec: improvements from variable obfuscation

    Compton, Rhys; Frank, Eibe; Patros, Panagiotis; Koay, Abigail (ACM, 2020)
    Automatic source code analysis in key areas of software engineering, such as code security, can benefit from Machine Learning (ML). However, many standard ML approaches require a numeric representation of data and cannot ...
  • Domain specific transfer learning using image mixing and stochastic image selection

    Coup, Sheldon; Vetrova, Varara; Frank, Eibe; Tappenden, Rachael (2019)
    Can a gradual transition from the source to the target dataset improve knowledge transfer when fine-tuning a convolutional neural network to a new domain? Can we use training examples from general image datasets to improve ...
  • A review of Automatic end-to-end De-Identification: Is High Accuracy the Only Metric?

    Yogarajan, Vithya; Pfahringer, Bernhard; Mayo, Michael (Taylor & Francis Inc, 2020)
    De-identification of electronic health records (EHR) is a vital step towards advancing health informatics research and maximising the use of available data. It is a two-step process where step one is the identification of ...
  • Comparing high dimensional word embeddings trained on medical text to bag-of-words for predicting medical codes

    Yogarajan, Vithya; Gouk, Henry; Smith, Tony C.; Mayo, Michael; Pfahringer, Bernhard (Springer, 2020)
    Word embeddings are a useful tool for extracting knowledge from the free-form text contained in electronic health records, but it has become commonplace to train such word embeddings on data that do not accurately reflect ...