Waikato University crest

Department of
Computer Science
Tari Rorohiko

Computing and Mathematical Sciences

Recent Seminars

Events Index

Towards Linked Data Enrichment using Open Information Extraction

Dr Amal Zouaq
Royal Military College of Canada, Ontario, Canada
Tuesday 21 October 2014
The Semantic Web and Linked Data movements aim at converting the Web unstructured and semi-structured content into a "web of data". The purpose is to help users (both human and software agents) to find, share, and combine information more easily and ultimately to enable large scale machine reasoning, using knowledge bases accessible on the Web. The last decade has witnessed the development of several knowledge bases such as DBPedia, Yago and Freebase. These knowledge bases are generally extracted from Web semi-structured content such as Wikipedia Infoboxes. By contrast, our work is mostly focused on the extraction of knowledge from unstructured textual content.

This talk will explore how open information extraction (a domain-independent and unsupervised knowledge extraction paradigm) can contribute to a) the extraction of structured content (entities, topics, relations) from free-text domain corpora and b) the enrichment of current Linked Data knowledge bases. In particular, we will focus on open relation extraction, which aims at linking (Web) entities with meaningful relations. Experiments and challenges around the quality of the extracted entities and relations and the measurement of such quality will be briefly discussed.


Behind the scenes: Mobile Apps

Rodney Macfarlane
MEA Mobile, Hamilton, NZ
Wednesday 16 July 2014
IMEA Mobile has offices in Hamilton, Auckland and Wellington, New Zealand as well as a US based office in New Haven, Connecticut. They provide a full service digital agency with the capability in-house to complete any digital or marketing communications project. Last year, MEA Mobile acquired the Hamilton creative agency, Verdict. More recently, they have acquired Wellington design firm, Vertigo.

Rodney Macfarlane has extensive commercial and technology management experience. His experience includes leading negotiations on international technology transactions valued at USD60M, the successful commercialization of a novel technology currently running on millions of devices, and the management of significant international intellectual property portfolios for multi-national clients.


Towards agile research

Mike Twidale
Graduate School of Library and Information Science, University of Illinois, USA
Tuesday 1 July 2014
Agile software development is a powerful and effective alternative to more carefully pre-planned software processes – especially in coping with novel contexts and those where the requirements keep on changing. That sounds a lot like certain research projects. The talk will explore questions such as: What might Agile Research look like? Where might it be particularly needed and effective? How might we go about designing agile research methods? Can we use a version of the Agile Manifesto to inform us? How might we design better ways to study things where more conventional approaches are too expensive, slow, or mess up what we want to study? Can teaching agile research help new research students to get started? What might an Agile University look like?


Simulated life and death increases learning opportunities?

Corey Schou
College of Business, Idaho State University, USA
Wednesday 18 June 2014
This presentation discusses the Cyber Defence Simulation developed and used as a teaching tool for future cyber security professional. The tool was developed to educated cyber security professionals to be a well-trained practitioners. It also help them understand how challenging it is to secure a system and defend against a persistent adversary.

Professor Corey D. Schou, Ph.D. is a frequent public speaker and an active researcher with over 300 books, papers, articles, and, other presentations. His interests include information assurance, software engineering, secure applications development, security and privacy, collaborative decision-making, and the impact of technology on organization structure.

He has been described in the press as the father of the knowledge base used world-wide to establish computer security and information assurance. He was responsible for compiling and editing computer security training standards for the United States Government.

In 2003 he was selected as the first University Professor at Idaho State University. He directs the Informatics Research Institute and the National Information Assurance Training and Education Center. His program was recognized by the United States Government as a Center of Academic Excellence in Information Assurance and is a leading institution in the CyberCorps/Scholarship for Service program.

In addition to his academic accomplishments, he holds a broad spectrum of certifications including CCFP - Certified Cyber Forensics Professional, CSSLP - Certified Secure Software Lifecycle Professional, HCISPP - HealthCare Information Security and Privacy Practitioner, CISSP®-ISSAP®: Information Systems Security Architecture Professional, and CISSP-ISSMP: Information Systems Security Management Professional.

Corey is currently in NZ and visiting the UoW Cyber Security Lab as a Fulbright Specialist.


Detection of Data Leakage

Ting Gao
Department of Computer Science, The University of Waikato, Hamilton
Tuesday 20 May 2014
The antivirus way of protecting our computers is not very effective, and recent research has shown that only approximately 40% of the malware can be detected by traditional antivirus software. On top of this, cyber criminals have become more professionally organised. New ways of defending our computer security needs to be proposed. Our research attempts to defend by detecting and prevent data leakages (both intentional and unintentional). This presentation will explain how this project works on defending end user’s data and some challenges encountered during its development.

Ting is an honours student in the department nearing the end of his COMP591 project, which he started in the B-semester of 2013. Due to the numbers involved, this talk is in lieu of participating in the honours day conference involving students in the A-B semester cycle of the course.


Events Index