Computing and Information Systems - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 10 of 13
  • Item
    Thumbnail Image
    Death and the Internet: Consumer issues for planning and managing digital legacies (2nd edition)
    Nansen, B ; van der Nagel, E ; Kohn, T ; Arnold, M ; Gibbs, M (Australian Communications Consumer Action Network, 2017-12-01)
  • Item
    Thumbnail Image
    Esports Spectatorship in Australia
    Gibbs, M ; Carter, M ; Cumming, D ; Fordyce, R ; Witkowski, E (Networked Society Institute, 2018)
    Esports – the organised, professional and spectated play of competitive digital games – has evolved into a massive global industry in the past decade. Boasting significant market value and broad global audience reach, esports is driven by modern highspeed internet infrastructure and live-streaming platforms like Twitch.tv. However, esports has yet to take hold as an industry in Australia, largely due to geographical isolation from major esports regions compounded by Australia’s traditionally lacklustre network infrastructure. Although the esports industry relies on various revenue streams, sponsorship and advertising deals provide the industry’s main source of funding. Teams, tournaments and esports organisations of various sizes are sponsored by major international companies like Intel, Samsung and Mercedes-Benz. This is unsurprising considering the global reach of esports. According to the ‘market intelligence’ firm Newzoo (2017), the esports audience in 2017 is estimated to be 385 million, with rough half of those being ‘enthusiasts’ and the other half ‘occasional viewers’. Furthermore, they estimate that the esports industry generated roughly US $696 million in revenue through ticket sales, media rights, game publisher fees, advertising and merchandise, sponsorship, media rights, in-game microtransactions, and betting in 2017. Newzoo estimates this amount to grow to US $906 million in 2018. Revenue growth for the esports industry has been significant, with current estimates pointing to a year-over-year growth of 41% in 2017, of which US$517 million is in advertising, sponsorship, and media rights (Newzoo 2017). While global industry reports are optimistic about the future of esports, the Australian esports scene is limited in comparison to overseas markets. In this report, we start by approximating the size of the esports market in Australia by comparing publicly available statistics and collecting a list of major global and Australian esports events. Secondly, we provide an overview of key Australian esports titles, explaining how they’re played as esports and their place within the Australian esports landscape. Thirdly, we explore the practice of spectating esports and discuss motivations behind esports spectatorship. We then present a preliminary study consisting of 18 semi-structured interviews with esports spectators regarding their engagement with and consumption of esports content. From our findings, we identify and detail three salient categories of non-exclusive esports spectator types: players, fans and recruits. We conclude with a summary of key changes in the Australia esports landscape during 2018 and important upcoming developments.
  • Item
    Thumbnail Image
    Timestamp Repair for Business Process Event Logs
    Conforti, R ; La Rosa, M ; ter Hofstede, A ( 2018-04-05)
    This paper contributes an approach for automatically correcting timestamp errors in business process execution logs. These errors are quite common in practice due to the logging granularity or the performance load of the logging system. Analyzing logs that have not been properly screened for such problems is likely to lead to wrong or misleading process insights. The proposed approach revolves around two techniques: one to reorder events with erroneous timestamps, the other to assign an estimated timestamp to each such event. The approach has been implemented in a software tool and extensively evaluated in different settings, using both synthetic and real-life logs. The experiments show that the approach significantly reduces the amount of incorrect timestamps, while the reordering of events scales well to large and complex datasets. The evaluation is complemented by a case study in the meat & livestock domain showing the usefulness of the approach in practice.
  • Item
    Thumbnail Image
    Behavioural Quotients for Precision and Recall in Process Mining
    Polyvyanyy, A ; Solti, A ; Weidlich, M ; Di Ciccio, C ; Mendling, J ( 2018)
    The comparison of the languages of software systems, i.e., their behaviours in terms of specified executions, is a prerequisite for many applications, reaching from system validation through management of a system's evolution to conformance checking of observed and expected behaviour. If two systems are not language-equivalent, the quantification of behavioural differences enables conclusions on the extent of deviation. Such quantifications are commonly done in a relative manner: A quotient is defined over some measure of two languages, which have potentially been derived via algebraic operations. However, there exists no systematic approach for defining quotients and it is unclear which measures enable meaningful comparisons of systems having infinite behaviours. This paper introduces a framework for defining language quotients. We instantiate the framework with cardinality-based and entropy-based measures to handle finite and infinite behaviours, and prove important properties of the quotients. We demonstrate application of quotients in the field of process mining to capture precision and recall between a log of recorded system executions and a model of expected system executions. An experimental evaluation of the quotients using our open-source implementation demonstrates their feasibility and indicates that the quotients enable a monotonic assessment, unlike state-of-the-art measures in process mining.
  • Item
    No Preview Available
  • Item
  • Item
    Thumbnail Image
    The 12 Best Practices of Contract Management
    CULLEN, S (Open Windows, 2015)
  • Item
    Thumbnail Image
    Anti-personnel landmine detection based on GPR and IR imaging: a review
    Bhuiyan, Alauddin ; Nath, Baikunth ( 2006-04)
    Ground penetrating radar (GPR) and Infrared (IR) camera have become two established sensors for detecting buried anti-personnel mines (APM) which contain no or a little metal. This report reviews the detection techniques of APM using GPR and IR, and describes particular situations where each technique is feasible. We provide an analysis for fusion based detection and classification of APM. We discuss the GPR and IR data acquisition, signal processing and image processing methods. We also include a comparative study of these two sensors with respect to signal processing and target detection procedures. The report discusses the strengths and weaknesses of each of the sensors based on data capturing efficiency, overcoming environmental difficulties and sensor technology. Finally, we emphasize that a geometrical feature based sensor fusion, combining GPR and IR, for detection and classification of APM may be the most effective technique.
  • Item
    Thumbnail Image
    A monomial ν-SV method for regression
    SHILTON, ALISTAIR ; Lai, Daniel ; PALANISWAMI, MARIMUTHU ( 2007)
    In the present paper we describe a new formulation for Support Vector regression (SVR), namely monomial ν-SVR. Like the standard ν-SVR, the monomial ν-SVR method automatically adjusts the radius of insensitivity (the tube width, epsilon) to suit the training data. However, by replacing Vapnik’s epsilon-insensitive cost with a more general monomial epsilon-insensitive cost (and likewise replacing the linear tube shrinking term with a monomial tube shrinking term), the performance of the monomial ν-SVR is improved for data corrupted by a wider range of noise distributions. We focus on the quadric form of monomial ν-SVR and show that the dual form of this is simpler than the standard ν-SVR. We show that, like Suykens’ Least-Squares SVR (LS-SVR) method (and unlike standard ν-SVR), the quadric ν-SVR dual has a unique global solution. Comparisons are made between the asymptotic efficiency of our method and that of standard ν-SVR and LS-SVR which demonstrate the superiority of our method for the special case of higher order polynomial noise. These theoretical predictions are validated using experimental comparisons with the alternative approaches of standard ν-SVR, LS-SVR and weighted LS-SVR.
  • Item
    Thumbnail Image
    Grid security: practices, middleware, and outlook
    SINNOTT, RICHARD (National e-Science Centre, 2005)
    Middleware, Practices and Outlook report was funded by JISC to explore the landscape of Grid security. The report summarises experiences of existing Grid middleware and practices today including Public Key Infrastructures and their limitations. A review of advanced authorisation technologies and developments within the Internet2 community are also explored with regard to their potential impact upon Grid based e-Research.