Breadcrumbs

Research Publications 2016

  • Alcock, S., Möller, J. P., & Nelson, R. (2016) “Sneaking past the firewall: Quantifying the unexpected traffic on major TCP and UDP Ports.” Proc ACM SIGCOMM Internet Measurement Conference, (IMC), Santa Monica, California, 231-237. doi:10.1145/2987443.2987447
  • Bainbridge, D. (2016) “Building digital library collections with Greenstone 3 tutorial.” In N. Fuhr, L. Kovacs, T. Risse, & W. Nejdl (Eds.), Proc 20th International Conference on Theory and Practice of Digital Libraries, LNCS 9819, Hannover, Germany, 468-470. Springer.
  • Beckham, C., Hall, M., & Frank, E. (2016) “WekaPyScript: Classification, regression, and filter schemes for WEKA implemented in Python.” Journal of Open Research Software, 4, e33. doi:10.5334/jors.108
  • Bowen, J., & Dittmar, A. (2016) “A semi-formal framework for describing interaction design spaces.” Proc 8th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS '16), Brussels, Belgium, 229-238. ACM. doi:10.1145/2933242.2933247
  • Bravo Marquez, F., Frank, E., & Pfahringer, B. (2016) “Annotate-Sample-Average (ASA): A new distant supervision approach for Twitter sentiment analysis.” In G. A. Kaminka, M. Fox, P. Bouquet, E. Hullermeier, V. Dignum, F. Dignum, & F. VanHarmelen (Eds.), Proc 22nd European Conference on Artificial Intelligence 498-506) Hague, Netherlands: IOS Press. doi:10.3233/978-1-61499-672-9-498
  • Bravo Marquez, F., Frank, E., & Pfahringer, B. (2016) “Building a Twitter opinion lexicon from automatically-annotated tweets.” Knowledge-Based Systems 108(15) 65-78. Elseiver. doi:10.1016/j.knosys.2016.05.018
  • Bravo Marquez, F., Frank, E., & Pfahringer, B. (2016) “From opinion lexicons to sentiment classification of tweets and vice versa: a transfer learning approach.” Proc 2016 IEEE/WIC/ACM International Conference on Web Intelligence, Omaha, Nebraska, 145-152. IEEE Computer Society. doi:10.1109/WI.2016.29
  • Bravo Marquez, F., Frank, E., Mohammad, S. M., & Pfahringer, B. (2016) “Determining word–emotion associations from tweets by multi-label classification.” Proc 2016 IEEE/WIC/ACM International Conference on Web Intelligence, Omaha, Nebraska, 536-539. IEEE Computer Society. doi:10.1109/WI.2016.90
  • Chaisiri, S., & Ko, R. K. L. (2016) “From reactionary to proactive security: context-aware security policy management and optimization under uncertainty.” Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Tianjin, China, 535-543. IEEE Computer Society. doi:10.1109/TrustCom.2016.0107
  • Coley, A. A., & Lim, W. C. (2016) “Spikes and matter inhomogeneities in massless scalar field models.” Classical and Quantum Gravity, 33(1). doi:10.1088/0264-9381/33/1/015009
  • Coley, A. A., Gregoris, D., & Lim, W. C. (2016) “On the first G(1) stiff fluid spike solution in General Relativity.” Classical and Quantum Gravity, 33(21). doi:10.1088/0264-9381/33/21/215010
  • Cunningham, S. J., Hinze, A., & Nichols, D. M. (2016) “Supporting gender-neutral digital library creation: a case study using the GenderMag toolkit.” In A. Morishima, A. Rauber, & C. L. Liew (Eds.), Digital Libraries: Knowledge, Information, and Data in an Open Access Society: 18th International Conference on Asia-Pacific Digital Libraries, LNCS 10075, Tsukuba, Japan, 45-50. Springer. doi:10.1007/978-3-319-49304-6_6
  • Cunningham, S. J., Nichols, D. M., & Bowen, J. (2016) “Personal video collection management behavior.” Proc 16th IEEE/ACM Joint Conference on Digital Libraries, Newark, New Jersey, 219-220. ACM. doi:10.1145/2910896.2925440
  • Cunningham, S. J., Nichols, D. M., & Bowen, J. (2016) “Students and their videos: implications for a video digital library.” In A. Morishima, A. Rauber, & C. L. Liew (Eds.), Digital Libraries: Knowledge, Information and Data in an Open Access Society: 18th International Conference on Asia-Pacific Digital Libraries, LNCS 10075, Tsukuba, Japan, 37-42. Springer. doi:10.1007/978-3-319-49304-6_5
  • Cunningham, S. J., Nichols, D. M., Hinze, A., & Bowen, J. (2016) “What's news? Encounters with news in everyday life: A study of behaviours and attitudes.” International Journal on Digital Libraries, 17(3), 257-271. doi:10.1007/s00799-016-0187-1
  • Czyz, J., Luckie, M., Allman, M., & Bailey, M. (2016) “Don't forget to lock the back door! A characterization of IPv6 network security policy.” Proc Network and Distributed System Security Symposium 2016, San Diego, California, 15 pages. Internet Society. doi:10.14722/ndss.2016.23047
  • Derrick, J., Boiten, E., & Reeves, S. (eds) (2016) “Proceedings of the Seventeenth International Workshop on Refinement, EPTCS 209.” Refine@FM 2015, Oslo, Norway. doi:10.4204/EPTCS.209
  • Flori, C. (2016) “Space–time from topos quantum theory.” In I. Licata (Ed.), Beyond Peaceful Coexistence: The Emergence of Space, Time and Quantum, 221-263. Imperial College Press. doi:10.1142/9781783268320_0009
  • Garae, J., Ko, R. K. L., & Chaisiri, S. (2016) “UVisP: User-centric visualization of data provenance with gestalt principles.” Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Tianjin, China, 1923-1930. IEEE Computer Society. doi:10.1109/TrustCom.2016.0294
  • Garcia Ferrari, T. (2016) “Design Futures: the role of Design in a Software Society.” First SDN (Swiss Design Network) Design Research Winter Summit, Grandhotel Giessbach, Switzerland. SDN - Swiss Design Network.
  • Hinze, A., & Dighe, A. (2016) “Tracking and re-finding printed material using a personal digital library.” In N. Fuhr, L. Kovács, T. Risse, & W. Nejdl (Eds.), Research and Advanced Technology for Digital Libraries: 20th International Conference on Theory and Practice of Digital Libraries, LNCS 9819, Hannover, Germany, 94-106. Springer. doi:10.1007/978-3-319-43997-6_8
  • Hinze, A., Bainbridge, D., & Cunningham, S. J. (2016) “The challenge of creating geo-location markup for digital books.” In N. Fuhr, L. Kovács, T. Risse, & W. Nejdl (Eds.), Research and Advanced Technology for Digital Libraries: 20th International Conference on Theory and Practice of Digital Libraries, LNCS 9819, Hannover, Germany, 294-306. Springer. doi:10.1007/978-3-319-43997-6_23
  • Hinze, A., Bainbridge, D., Cunningham, S. J., & Downie, J. S. (2016) “Low-cost semantic enhancement to digital library metadata and indexing: simple yet effective strategies.” Proc 16th ACM/IEEE-CS on Joint Conference on Digital Libraries, Newark, NJ, 93-102. ACM. doi:10.1145/2910896.2910910
  • Hinze, A., Coleman, M., Cunningham, S. J., & Bainbridge, D. (2016) “Semantic Bookworm: mining literary resources revisited.” Proc 16th ACM/IEEE-CS on Joint Conference on Digital Libraries, Newark, NJ, 227-228. ACM. doi:10.1145/2910896.2925444
  • Ko, R., & Choo, K. K. R. (2016) “Message from the TSCloud 2016 Symposium Chairs.” Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Tianjin, China. doi:10.1109/TrustCom.2016.0015
  • Konig, J., Witten, I. H., & Wu, S. (2016) “A mobile reader for language learners.” In L. E. Dyson, W. Ng, & J. Fergusson (Eds.), Proc 15th World Conference on Mobile and Contextual Learning: Mobile Learning Futures - Sustaining Quality Research and Practice in Mobile Learning, Sydney, Australia, 141-143.
  • Laing, S. J., & Masoodian, M. (2016) “A study of the influence of visual imagery on graphic design ideation.” Design Studies, 45, Part B, 187-209. doi:10.1016/j.destud.2016.04.002
  • Leathart, T., Pfahringer, B., & Frank, E. (2016) “Building ensembles of adaptive nested dichotomies with random-pair selection.” In P. Frasconi, N. Landwehr, G. Manco, & J. Vreeken (Eds.), Proc Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Part II, LNAI 9852, Riva del Garda, Italy, 179-194. Springer. doi:10.1007/978-3-319-46227-1_12
  • Luckie, M. J., Dhamdhere, A., Huffaker, B., Clark, D., & claffy, K. (2016) “bdrmap: Inference of borders between IP networks.” Proc 2016 ACM Conference on Internet Measurement, Santa Monica, California, 381-396. ACM. doi:10.1145/2987443.2987467
  • Malik, R. (2016) “Programming a fast explicit conflict checker.” Proc 13th International Workshop on Discrete Event Systems, Xi'an China, 438-443. IEEE. doi:10.1109/WODES.2016.7497885
  • Malik, R., & Teixeira, M. (2016) “An algorithm for the synthesis of least restrictive controllable supervisors for extended finite-state machines.” Working Paper 01/2016, Department of Computer Science, The University of Waikato. hdl:10289/9841
  • Malik, R., & Teixeira, M. (2016) “Modular supervisor synthesis for extended finite-state machines subject to controllability.” Proc 13th International Workshop on Discrete Event Systems, Xi'an China, 91-96. IEEE. doi:10.1109/WODES.2016.7497831
  • Masoodian, M., Mohd Yusof, A. B., & Rogers, B. (2016) “Identifying problems associated with focus and context awareness in 3D modelling tasks.” Interacting with Computers, 28(1), 125-147. doi:10.1093/iwc/iwu039
  • Mato, P., Keegan, T. T., & Naera, L. (2016) “How usable is a smartphone with a Māori-language interface?” MAI Journal: A New Zealand Journal of Indigenous Scholarship, 5(1), 17-32. doi:10.20507/MAIJournal.2016.5.1.2
  • Mayo, M. J., & Omranian, S. (2016) “Towards a new evolutionary subsampling technique for heuristic optimisation of load disaggregators.” In H. Cao, J. Li, & R. Wang (Eds.), Trends and Applications in Knowledge Discovery and Data Mining, PAKDD 2016 Workshops, Revised Selected Papers, LNCS 9794, Auckland, 3-14. Springer. doi:10.1007/978-3-319-42996-0_1
  • Mayo, M. J., & Zheng, C. (2016) “BlockCopy-based operators for evolving efficient wind farm layouts.” Proc 2016 IEEE Congress on Evolutionary Computation, Vancouver, Canada, 1085-1092. IEEE. doi:10.1109/CEC.2016.7743909
  • Mayo, M. J., Daoud, M., & Zheng, C. (2016) “Randomising block sizes for BlockCopy-based wind farm layout optimisation.” In G. Leu, H. K. Singh, & S. Elsayed (Eds.), Proc 20th Asia Pacific Symposium on Intelligent and Evolutionary Systems, Canberra, Australia, 277-289. Springer. doi:10.1007/978-3-319-49049-6_20
  • Mayo, M., & Bifet, A. (2016) “Deferral classification of evolving temporal dependent data streams.” Proc 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, 952-954. ACM. doi:10.1145/2851613.2851890
  • Mayo, M., & Daoud, M. (2016) “Informed mutation of wind farm layouts to maximise energy harvest.” Renewable Energy 89, 437-448. doi:10.1016/j.renene.2015.12.006
  • Mohajerani, S., Malik, R., & Fabian, M. (2016) “Compositional supervisor synthesis with state merging and transition removal.” Working Paper 02/2016, Department of Computer Science, The University of Waikato. hdl:10289/9889
  • Mohajerani, S., Malik, R., & Fabian, M. (2016) “Compositional synthesis of supervisors in the form of state machines and state maps.” Automatica, 76, 277-281. doi:10.1016/j.automatica.2016.10.012
  • Moon, J., Lin, H. T., & Eulenstein, O. (2016) “Consensus properties and their large-scale applications for the gene duplication problem.” Journal of Bioinformatics and Computational Biology, 14(03), 1642005. doi:10.1142/S0219720016420051
  • Mueller, P., Thampi, S. M., Alam Bhuiyan, M. Z., Ko, R., Doss, R., & Alcaraz Calero, J. M. (2016) “Preface: Proc 4th International Symposium on Security in Computing and Communications. In P. Mueller, S. M. Thampi, M. Z. Alam Bhuiyan, R. Ko, R. Doss, & J. M. Alcaraz Calero (Eds.), Proc 4th International Symposium on Security in Computing and Communications, CCIS, Jaipur, India, 625. Springer. doi:10.1007/978-981-10-2738-3
  • Potanin, A., Murphy, G. C., Reeves, S., & Dietrich, J. (eds) (2016) “Proceedings of the 23rd Asian-Pacific Software Engineering Conference.” Hamilton, NZ. IEEE. doi:10.1109/APSEC.2016.004
  • Read, J., Reutemann, P., Pfahringer, B., & Holmes, G. (2016) “MEKA: A multi-label/multi-target extension to WEKA.” Journal of Machine Learning Research, 17(21), 1-5.
  • Ruckstuhl, K., Kawharu, M., Jackson, A. -M., Keegan, T. T., Shadbolt, M., Hudson, M., Kukutai, T., Hikuroa, D. (2016) “National science challenges in Aotearoa-New Zealand: opportunity or business as usual?” Proc International Indigenous Research Conference 2016, Auckland, 82. Nga Pae o te Maramatanga.
  • Scoon, C., & Ko, R. K. L. (2016) “The data privacy matrix project: towards a global alignment of data privacy laws.” Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Tianjin, China, 1998-2005. IEEE Computer Society. doi:10.1109/TrustCom.2016.0305
  • Short, C., Garcia Ferrari, T., & Quijano, M. (2016) “HfG-Archiv Ulm Online. De la realidad exclusiva a la virtualidad inclusiva.” RChD: creación y pensamiento, 1(1), 13-25. doi:10.5354/0718-2430.2016.44192
  • Smith, T. C., & Frank, E. (2016) “Introducing machine learning concepts with WEKA.” In E. Mathé, & S. Davis (Eds.), Statistical Genomics: Methods and Protocols, Vol. 1418, 353-378. Springer. doi:10.1007/978-1-4939-3578-9_17
  • Soo, C. -E. K. (2016) “I am Supernova.” In C. Soddu, & E. Colabella (Eds.), Proc XIX Generative Art Conference, Florence, Italy, 452-453. Domus Argenia Publisher.
  • Stricot-Tarboton, S., Chaisiri, S., & Ko, R. K. L. (2016) “Taxonomy of man-in-the-middle attacks on HTTPS.” Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Tianjin, China, 527-534. IEEE Computer Society. doi:10.1109/TrustCom.2016.0106
  • Vanderschantz, N. R. (2016) “KidsQuestions: Assisting children's digital information seeking.” PhD Thesis, hdl:10289/10811
  • Velásquez, J. D., Covacevich, Y., Molina, F., Marrese-Taylor, E., Rodríguez, C., & Bravo Marquez, F. (2016) “DOCODE 3.0 (DOcument COpy DEtector): A system for plagiarism detection by applying an information fusion process from multiple documental data sources.” Information Fusion, 27, 64-75. doi:10.1016/j.inffus.2015.05.006
  • Will, M. A., & Ko, R. K. L. (2016) “Computing mod with a variable lookup table.” In P. Mueller, S. M. Thampi, M. Z. Alam Bhuiyan, R. Ko, R. Doss, & J. M. Alcaraz Calero (Eds.), Proc 4th International Symposium on Security in Computing and Communications, CCIS 625, Jaipur, India, 3-17. Springer. doi:10.1007/978-981-10-2738-3_1
  • Will, M. A., Ko, R. K. L., & Witten, I. H. (2016) “Privacy preserving computation by fragmenting individual bits and distributing gates.” Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Tianjin, China, 900-908. IEEE Computer Society. doi:10.1109/TrustCom.2016.0154
  • Witten, I. H. (2016) “Ian H. Witten: A stroll through the gardens of computer science.” In C. S. Calude (Ed.), The Human Face of Computing 9, 127-138. Imperial College Press. doi:10.1142/9781783266449_0009
  • Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016) Data mining: Practical machine learning tools and techniques. (4th ed.) Morgan Kaufmann.
  • Wu, S., & Li, L. (2016) "Application of FLAX in academic English in vocabulary teaching." 2016 International Symposium on CALL. Qingdao, China.
  • Wu, S., & Witten, I. H. (2016) “Transcending concordance: augmenting academic text for L2 writing.” International Journal of Computer-Assisted Language Learning and Teaching, 6(2), 1-18. doi:10.4018/IJCALLT.2016040101
  • Wu, S., Li, L., Witten, I. H., & Yu, A. (2016) “Constructing a collocation learning system from the Wikipedia corpus.” International Journal of Computer-Assisted Language Learning and Teaching (IJCALLT), 6(3), 18-35. doi:10.4018/IJCALLT.2016070102
  • Wu, S., Pammi, K., & Yu, A. (2016) “Location-based vocabulary learning app.” In L. E. Dyson, W. Ng, & J. Fergusson (Eds.), Proc 15th World Conference on Mobile and Contextual Learning: Mobile Learning Futures - Sustaining Quality Research and Practice in Mobile Learning, Sydney, Australia, 287-290.
  • Yu, A., Wu, S., Witten, I. H., & Konig, J. (2016) “Learning collocations with FLAX apps.” In L. E. Dyson, W. Ng, & J. Fergusson (Eds.), Proc 15th World Conference on Mobile and Contextual Learning: Mobile Learning Futures - Sustaining Quality Research and Practice in Mobile Learning, Sydney, Australia, 291-294.