Breadcrumbs

Research Publications 2015

  • Bainbridge, D. (2015) "And we did it our way: a case for crowdsourcing in a digital library for musicology." Proc Second International Workshop on Digital Libraries for Musicology (DLfM '15), Knoxville, Tennessee, 1-8. ACM. doi:10.1145/2785527.2785529
  • Bowen, J. (2015) "Creating models of interactive systems with the support of lightweight reverse-engineering tools." Proc Seventh ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS'15), Duisburg, Germany, 110-119. ACM, New York, NY. doi:10.1145/2774225.2774840
  • Bowen, J., Hinze, A. and Cunningham, S. J. (2015) "Into the woods." Beckmann, C. and Gross, T. (eds), INTERACT 2015 Adjunct Proceedings: Fifthteenth IFIP TC 13 International Conference on Human-Computer Interaction, Bamberg, Germany, 137-143. University of Bamberg Press. online proceedings
  • Bravo-Marquez, F., Frank, E. and Pfahringer, B. (2015) "From unlabelled tweets to Twitter-specific opinion words." Proc thirty-eighth International ACM SIGIR Conference on Research and Development (SIGIR '15), Santiago, Chile, 743-746. ACM.doi:10.1145/2766462.2767770
  • Bravo-Marquez, F., Frank, E. and Pfahringer, B. (2015) "Positive, Negative, or Neutral: Learning an Expanded Opinion Lexicon from Emoticon-annotated Tweets." Proc Twenty-fourth International Joint Conference on Artificial Intelligence (IJCAI 2015), Buenos Aires, Argentina, 1229-1235. online paper
  • Dang, C. T., Masoodian, M. and André, E. (2015) "Private focus portals to shared energy visualizations." Beckmann, C. and Gross, T. (eds), INTERACT 2015 Adjunct Proceedings: Fifthteenth IFIP TC 13 International Conference on Human-Computer Interaction,Bamberg, Germany, 585-594. University of Bamberg Press. online proceedings
  • Delamore, B. (2015) An extensible web application vulnerability assessment and testing framework. MSc(Research) Thesis, The University of Waikato. hdl:10289/9497
  • Delamore, B. and Ko, R. K. L. (2015) "Security as a service (SecaaS)—An overview." Ko, R. K. L. and Choo, K.-K. R. (eds), In The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues, Chapter 9, 187-203. Elsevier Inc.
  • Drogemuller, R., Boulaire, F., Ledwich, G., Buys, L., Utting, M., Vine, D., Morris, P. and Arefi, A. (2015) "Aggregating energy supply and demand." Mahdavi, A., Martens, B. and Scherer, R. (eds), eWork and eBusiness in Architecture, Engineering and Construction - Proceedings of the Tenth European Conference on Product and Process Modelling (ECPPM 2014), Vienna, 425-430. CRC Press.
  • Fitzgerald, A., Wu, S. and Marín, M. J. (2015) "FLAX: Flexible and open corpus-based language collections development." Borthwick, K., Corradini, E. and Dickens, A. (eds), In 10 years of the LLAS elearning symposium: case studies in good practice, Chapter 19, 215-227. Research-publishing.net, Dublin Ireland. doi:10.14705/rpnet.2015.000281
  • Grout, C., Rogers, W., Apperley, M. and Jones, S. (2015) "Reading text in an immersive head-mounted display." Hinze, A., Nichols, D. M. and Masoodian, M. (eds), Proc Fifteenth New Zealand Conference on Human-Computer Interaction (CHINZ 2015),Hamilton, New Zealand, 9-16. ACM, New York. doi:10.1145/2808047.2808055
  • Hinze, A., Littewood, H. and Bainbridge, D. (2015) "Mobile annotation of geo-locations in digital books." Kapidakis, S., Mazurek, C. and Werla, M. (eds), Proc Nineteenth International Conference on Theory and Practice of Digital Libraries (TPDL 2015), LNCS 9316, Poznań, Poland, 338-342. Springer. doi:10.1007/978-3-319-24592-8_30
  • Hinze, A., Nichols, D. M. and Masoodian, M. (eds), (2015) Proceedings of the Fifteenth New Zealand Conference on Human-Computer Interaction (CHINZ 2015). Hamilton, New Zealand, 87 pages. ACM, New York. doi:10.1145/2808047
  • Hinze, A., Taube-Schock, C., Bainbridge, D., Matamua, R. and Downie, J. S. (2015) "Improving access to large-scale digital libraries through semantic-enhanced search and disambiguation." Proc Fifteenth IEEE/ACM Joint Conference on Digital Libraries (JCDL '15), Knoxville, Tennessee, USA, 147-156 ACM, New York, NY. doi:10.1145/2756406.2756920
  • Hinze, A. and Voisard, A. (2015) "EVA: An event algebra supporting complex event specification." Information Systems 48, 1-25. doi:10.1016/j.is.2014.07.003
  • Kasi, M. (2015) Semantic in-network complex event processing for an energy efficient wireless sensor network. PhD Thesis, The University of Waikato. hdl:10289/9227
  • Keegan, T. T., Mato, P. and Ruru, S. (2015) "Using Twitter in an Indigenous language: An analysis of te reo Māori tweets." Alternative: An International Journal for Indigenous Peoples 11(1), 59-75. online journal
  • Ko, R. K. L. and Choo, K.-K. R. (2015) "Cloud security ecosystem." Ko, R. K. L. and Choo, K.-K. R. (eds), In The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues, Chapter 1, 1-14. Elsevier Inc. doi:10.1016/B978-0-12-801595-7.00001-X
  • Ko, R. and Choo, K.-K. R. (2015) "The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues.". Elsevier Inc. doi:10.1016/B978-0-12-801595-7.09991-2
  • Laing, S. and Masoodian, M. (2015) "A study of the role of visual information in supporting ideation in graphic design." Journal of the Association for Information Science and Technology 66(6), 1199-1211. doi:10.1002/asi.23231
  • Liesaputra, V., Yongchareon, S. and Chaisiri, S. (2015) "Efficient process model discovery using maximal pattern mining." Motahari-Nezhad, H. R., Recker, J. and Weidlich, M. (eds), Proc Thirteenth International Conference on Business Process Management (BPM 2015), LNCS 9253, Innsbruck, Austria, 441-456. Springer. doi:10.1007/978-3-319-23063-4_29
  • Luz, S., Masoodian, M. and Cesario, M. (2015) "Disease surveillance and patient care in remote regions: an exploratory study of collaboration among healthcare professionals in Amazonia." Behaviour & Information Technology 34(6), 548-565.doi:10.1080/0144929X.2013.853836
  • Malik, R. (2015) "Advanced selfloop removal in compositional nonblocking verification of discrete event systems." Proc IEEE International Conference on Automation Science and Engineering (CASE), Gothenburg, Sweden, 819-824. IEEE.doi:10.1109/CoASE.2015.7294182
  • Malik, R. and Leduc, R. (2015) "Hierarchical modelling of manufacturing systems using discrete event systems and the conflict preorder." Discrete Event Dynamic Systems 25(1-2), 177-201. doi:10.1007/s10626-014-0185-7
  • Masoodian, M., André, E. and Rist, T. (2015) "Fostering smart energy applications." Abascal, J., Barbosa, S., Fetter, M., et al. (eds), Proc Fifthteenth IFIP TC 13 International Conference on Human-Computer Interaction (INTERACT 2015), LNCS 9296, Bamberg, Germany, 657-658. Springer. doi:10.1007/978-3-319-22723-8_88
  • Masoodian, M., Lugrin, B., Bühling, R. and André, E. (2015) "Visualization support for comparing energy consumption data." Banissi, E., Bannatyne, M. W. M., Bouali, F., et al. (eds), Proc Nineteenth International Conference on Information Visualisation (IV 2015), Barcelona, Spain, 28-34. IEEE, Los Alamitos, CA. doi:10.1109/iV.2015.17
  • Masoodian, M., Luz, S., Cesario, M., Cesario, R. R., Roger, B. and Borges, D. A. (2015) "A serious game for improving community-based prevention of neglected diseases." Proc IEEE 28th International Symposium on Computer-Based Medical Systems (CBMS 2015), São Paulo, Brazil, 286-291. IEEE Computer Society. doi:10.1109/CBMS.2015.17
  • Masoodian, M., Mohd Yusof, A. b. and Rogers, B. (2015) "Focus and context awareness visualization techniques for 3D modelling tasks using multi-layered displays." Banissi, E., Bannatyne, M. W. M., Bouali, F., et al. (eds), Proc Nineteenth International Conference on Information Visualisation (IV 2015), Barcelona, Spain, 183-188. IEEE, Los Alamitos, CA. doi:10.1109/iV.2015.41
  • Masoodian, M., Mohd Yusof, A. b. and Rogers, B. (2015) "Supporting focus and context awareness in 3D modelling tasks using multi-layered displays." Computer Graphics Forum 34(6), 1-12. doi:10.1111/cgf.12513
  • Mato, P. (2015) "Translated application interfaces - issues of engagement." Hinze, A., Nichols, D. M. and Masoodian, M. (eds), Proc Fifteenth New Zealand Conference on Human-Computer Interaction (CHINZ 2015), Hamilton, New Zealand, 1-4. ACM, New York. doi:10.1145/2808047.2808061
  • Mohajerani, S., Malik, R. and Fabian, M. (2015) "A framework for compositional nonblocking verification of extended finite-state machines." Discrete Event Dynamic Systems, 1-52. doi:10.1007/s10626-015-0217-y
  • Neelakanta Sharma, K. (2015) A scalable and fault tolerant OpenFlow controller. MSc Thesis, The University of Waikato. hdl:10289/9617
  • Nichols, D. M. and Cunningham, S. J. (2015) "A scientometric analysis of 15 years of CHINZ conferences." Hinze, A., Nichols, D. M. and Masoodian, M. (eds), Proc Fifteenth New Zealand Conference on Human-Computer Interaction (CHINZ 2015), Hamilton, New Zealand, 73-80. ACM, New York. doi:10.1145/2808047.2808060
  • Ozoh, P. and Apperley, M. (2015) "Simulating electricity consumption pattern for household appliances using demand side strategies - a review." Hinze, A., Nichols, D. M. and Masoodian, M. (eds), Proc Fifteenth New Zealand Conference on Human-Computer Interaction (CHINZ 2015), Hamilton, New Zealand, 65-71. ACM, New York. doi:10.1145/2808047.2808057
  • Pilbrow, C. and Malik, R. (2015) "An algorithm for compositional nonblocking verification using special events." Science of Computer Programming, online first. doi:10.1016/j.scico.2015.05.010
  • Rau, M. M., Seitz, S., Brimioulle, F., Frank, E., Friedrich, O., Gruen, D. and Hoyle, B. (2015) "Accurate photometric redshift probability density estimation - method comparison and application." Monthly Notices of the Royal Astronomical Society 452(4), 3710-3725. doi:10.1093/mnras/stv1567
  • Ren, X. J. (2015) User-guided disambiguation for semantic-enriched search. MSc(Research) Thesis, The University of Waikato.
  • Reutemann, P. and Holmes, G. (2015) "Big data with ADAMS." Fan, W., Bifet, A., Yang, Q., et al. (eds), Proc Fourth International Workshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications (BIGMINE 2015), JMLR Workshop and Conference Proceedings Vol 41, Sydney, Australia, 5-8. JMLR. online paper
  • Rinck, M. (2015) Document DNA: Distributed content-centered provenance data tracking. PhD Thesis, The University of Waikato. hdl:10289/9538
  • Sandar, N. M., Myint, L. M. M. and Chaisiri, S. (2015) "An optimization approach to capacity planning of aggregators and resource provisioning in cloud providers for meteorological sensor network." Duangsuwan, J., Vanichayobon, S. and Preechaveerakul, L. (eds), Proc 12th International Joint Conference on Computer Science and Software Engineering (JCSSE 2015), Songkhla, Thailand, 195-200. IEEE. doi:10.1109/JCSSE.2015.7219795
  • Tan, A. Y. S., Ko, R. K. L., Holmes, G. and Rogers, B. (2015) "Provenance for cloud data accountability." Ko, R. K. L. and Choo, K.-K. R. (eds), In The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues, Chapter 8, 171-185. Elsevier Inc.
  • Thomas, B. M., Stewart, J. M., Bainbridge, D., Nichols, D. M., Rogers, W. J. and Holmes, G. (2015) "Digital libraries unfurled: supporting the New Zealand flag debate." Kapidakis, S., Mazurek, C. and Werla, M. (eds), Proc Nineteenth International Conference on Theory and Practice of Digital Libraries (TPDL 2015), LNCS 9316, Poznań, Poland, 330-333. Springer. doi:10.1007/978-3-319-24592-8_28
  • Vanderschantz, N., Timpany, C. and Hinze, A. (2015) "Design exploration of ebook interfaces for personal ebook libraries on tablet devices." Hinze, A., Nichols, D. M. and Masoodian, M. (eds), Proc Fifteenth New Zealand Conference on Human-Computer Interaction (CHINZ 2015), Hamilton, New Zealand, 21-30. ACM, New York. doi:10.1145/2808047.2808054
  • Whaanga, H., Bainbridge, D., Anderson, M., Scrivener, K., Cader, P., Roa, T. and Keegan, T. T. (2015) "He Matapihi Mā Mua, Mō Muri: The Ethics, Processes, and Procedures Associated with the Digitization of Indigenous Knowledge—The Pei Jones Collection." Cataloging & Classification Quarterly 53(5-6), 520-547. doi:10.1080/01639374.2015.1009670
  • Will, M. A. and Ko, R. K. L. (2015) "A guide to homomorphic encryption." Ko, R. K. L. and Choo, K.-K. R. (eds), In The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues, Chapter 5, 101-127. Elsevier Inc.
  • Witten, I. H. (2016) "Ian H. Witten: A stroll through the gardens of computer science." Calude, C. S. (ed), In The Human Face of Computing, Chapter 9, 127-138. Imperial College Press. doi:10.1142/9781783266449_0009
  • Žliobaitė, I., Bifet, A., Read, J., Pfahringer, B. and Holmes, G. (2015) "Evaluation methods and decision theory for classification of streaming data with temporal dependence." Machine Learning 98(3), 455-482. doi:10.1007/s10994-014-5441-4