DSpace Collection:
http://hdl.handle.net/2381/1116
20150828T14:56:53Z

The infinitary lambda calculus of the infinite eta Böhm trees
http://hdl.handle.net/2381/32973
Title: The infinitary lambda calculus of the infinite eta Böhm trees
Authors: Severi, Paula; de Vries, FerJan
Abstract: In this paper, we introduce a strong form of eta reduction called etabang that we use to construct a confluent and normalising infinitary lambda calculus, of which the normal forms correspond to Barendregt's infinite eta Böhm trees. This new infinitary perspective on the set of infinite eta Böhm trees allows us to prove that the set of infinite eta Böhm trees is a model of the lambda calculus. The model is of interest because it has the same local structure as Scott's D∞models, i.e. two finite lambda terms are equal in the infinite eta Böhm model if and only if they have the same interpretation in Scott's D∞models.
20150824T14:09:28Z

Mobile learning in a human geography field course
http://hdl.handle.net/2381/32345
Title: Mobile learning in a human geography field course
Authors: Jarvis, Claire; Tate, Nicholas; Dickie, Jennifer; Brown, Gavin
Editors: Mitchell, J.
Abstract: This paper reports on reusable mobile digital learning resources designed to assist human geography undergraduate students in exploring the geographies of life in Dublin. Developing active learning that goes beyond data collection to encourage observation and thinking in the field is important. Achieving this in the context of large class sizes presents several challenges. Combining insitu learning with spatiallyaccurate historical and contemporary multimedia, we developed a set of locationaware digital mobile tools or ‘mediascapes’. We explore how scaffolding can be achieved in such a context, focusing on the development of students’ observational, enquiry and thinking skills in the field.
20150603T09:03:12Z

The Price of Anarchy for Selfish Ring Routing is Two
http://hdl.handle.net/2381/32326
Title: The Price of Anarchy for Selfish Ring Routing is Two
Authors: Chen, Xujin; Doerr, Benjamin; Doerr, Carola; Hu, Xiaodong; Ma, Weidong; van Stee, Rob
Abstract: We analyze the network congestion game with atomic players, asymmetric strategies, and the maximum latency among all players as social cost. This important social cost function is much less understood than the average latency. We show that the price of anarchy is at most two, when the network is a ring and the link latencies are linear. Our bound is tight. This is the first sharp bound for the maximum latency objective.
Description: © ACM, 2014. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ACM Transactions on Economics and Computation archive
Volume 2 Issue 2, June 2014 http://doi.acm.org/10.1145/2548545
20150601T14:53:47Z

SIGACT news online algorithms column 24: 2014 so far
http://hdl.handle.net/2381/32323
Title: SIGACT news online algorithms column 24: 2014 so far
Authors: van Stee, Rob
Abstract: In this column, I will discuss some recent papers in online algorithms. It is pleasing to see there
were a number of papers about online algorithms in the top conferences this year. If I have missed
your paper and you want to write about it or about any other topic in online algorithms, don't
hesitate to contact me!
20150601T10:55:27Z

The Description Logic SHIQ with a Flexible Metamodelling Hierarchy
http://hdl.handle.net/2381/32284
Title: The Description Logic SHIQ with a Flexible Metamodelling Hierarchy
Authors: Severi, Paula G.; Motz, Regina; Rohrer, Edelweis
Abstract: This work is motivated by a realworld case study where it is necessary to integrate and relate existing ontologies through metamodelling. For this, we introduce the Description Logic SHIQM which is obtained from SHIQ byadding statements that equate individuals to concepts in a knowledge base. In this new extension, concepts can be individuals of another concept (called metaconcept) which itself can be an individual of yet another concept (called meta metaconcept ) and so on. We define an algorithm that checks consistency of SHIQM by modifying the Tableau algorithm for SHIQ. From the practical point of view, this has the advantage that we can reuse the code of existing OWL reasoners. From the theoretical point of view, it has a similar advantage of reuse. We make use of the existing results and proofs that lead to correctness of the algorithm for SHIQ in order to prove correctness of the algorithm for SHIQM.
20150519T10:58:05Z

HIAWSC: An Immune Algorithm Based Heuristic Web Service Composition Framework
http://hdl.handle.net/2381/32251
Title: HIAWSC: An Immune Algorithm Based Heuristic Web Service Composition Framework
Authors: Xu, J.; ReiffMarganiec, Stephan
Abstract: The introduction of of web services has led to web service composition being a focus of many researchers. Composing web services using workflows is seen as the most realistic method from an industrial viewpoint. Amongst other method, the use of natural computing methods has been proposed previously to automate web service composition. The need for a fast response when computing the most suitable sequence of services is addressed in this paper. In particular, we propose a novel heuristic immune algorithm with an efficient encoding and mutation method. The algorithm involves two steps: an immune selection operation, which is maintaining antibody population diversity and the clonal selection. The use of a vaccine during the evolution provides heuristic information that accelerates the convergence. Our experimental results illustrate that the proposed heuristic immune algorithm is very effective in improving the convergence speed. We also provide a schema analysis for this method.
20150508T14:39:51Z

Tree Compression with Top Trees Revisited
http://hdl.handle.net/2381/32187
Title: Tree Compression with Top Trees Revisited
Authors: HübschleSchneider, L.; Raman, Rajeev
Abstract: We revisit tree compression with top trees (Bille et al. Information & Computation 2015), and present several improvements to the compressor and its analysis. By significantly reducing the amount of information stored and guiding the compression step using a RePairinspired heuristic, we obtain a fast compressor achieving good compression ratios, addressing an open problem posed by Bille et al. We show how, with relatively small overhead, the compressed file can be converted into an inmemory representation that supports basic navigation operations in worstcase logarithmic time without decompression. We also show a much improved worstcase bound on the size of the output of toptree compression (answering an open question posed in a talk on this algorithm by Weimann in 2012).
20150507T10:28:34Z

Random access to grammarcompressed strings and trees
http://hdl.handle.net/2381/32182
Title: Random access to grammarcompressed strings and trees
Authors: Bille, P.; Landau, G. M.; Raman, Rajeev; Sadakane, K.; Satti, S. R.; Weimann, O.
Abstract: Grammar based compression, where one replaces a long string by a small contextfree
grammar that generates the string, is a simple and powerful paradigm that captures (sometimes with
slight reduction in efficiency) many of the popular compression schemes, including the LempelZiv
family, RunLength Encoding, BytePair Encoding, Sequitur, and RePair. In this paper, we present
a novel grammar representation that allows efficient random access to any character or substring
without decompressing the string.
Let S be a string of length N compressed into a contextfree grammar S of size n. We present
two representations of S achieving O(log N) random access time, and either O(n·αk(n)) construction
time and space on the pointer machine model, or O(n) construction time and space on the RAM.
Here, αk(n) is the inverse of the k th row of Ackermann’s function. Our representations also efficiently
support decompression of any substring in S: we can decompress any substring of length m in the
same complexity as a single random access query and additional O(m) time. Combining these
results with fast algorithms for uncompressed approximate string matching leads to several efficient
algorithms for approximate string matching on grammar compressed strings without decompression.
For instance, we can find all approximate occurrences of a pattern P with at most k errors in time
O(n(min{Pk, k^4 + P} + log N) + occ), where occ is the number of occurrences of P in S. Finally,
we generalize our results to navigation and other operations on grammarcompressed ordered trees.
All of the above bounds significantly improve the currently best known results. To achieve these
bounds, we introduce several new techniques and data structures of independent interest, including
a predecessor data structure, two “biased” weighted ancestor data structures, and a compact
representation of heavy paths in grammars.
Description: AMS subject classifications. 68P05, 68P30
20150507T10:26:27Z

Assessing and generating test sets in terms of behavioural adequacy
http://hdl.handle.net/2381/31971
Title: Assessing and generating test sets in terms of behavioural adequacy
Authors: Fraser, G.; Walkinshaw, Neil
Editors: Offutt, J.
Abstract: Identifying a finite test set that adequately captures the essential behaviour of a program such that all faults are identified is a wellestablished problem. This is traditionally addressed with syntactic adequacy metrics (e.g. branch coverage), but these can be impractical and may be misleading even if they are satisfied. One intuitive notion of adequacy, which has been discussed in theoretical terms over the past three decades, is the idea of behavioural coverage: If it is possible to infer an accurate model of a system from its test executions, then the test set can be deemed to be adequate. Despite its intuitive basis, it has remained almost entirely in the theoretical domain because inferred models have been expected to be exact (generally an infeasible task) and have not allowed for any pragmatic interim measures of adequacy to guide test set generation. This paper presents a practical approach to incorporate behavioural coverage. Our bestest approach (1) enables the use of machine learning algorithms to augment standard syntactic testing approaches and (2) shows how searchbased testing techniques can be applied to generate test sets with respect to this criterion. An empirical study on a selection of Java units demonstrates that test sets with higher behavioural coverage significantly outperform current baseline test criteria in terms of detected faults.
20150410T10:17:43Z

Resolving nondeterminism in choreographies
http://hdl.handle.net/2381/31873
Title: Resolving nondeterminism in choreographies
Authors: Bocchi, L.; Melgratti, H.; Tuosto, Emilio
Abstract: Resolving nondeterministic choices of choreographies is a crucial task. We introduce a novel notion of realisability for choreographies called wholespectrum implementation that rules out deterministic implementations of roles that, no matter which context they are placed in, will never follow one of the branches of a nondeterministic choice. We show that, under some conditions, it is decidable whether an implementation is wholespectrum. As a case study, we analyse the POP protocol under the lens of wholespectrum implementation. © 2014 SpringerVerlag.
20150316T11:59:32Z

Inferring Extended Finite State Machine Models from Software Executions
http://hdl.handle.net/2381/31765
Title: Inferring Extended Finite State Machine Models from Software Executions
Authors: Walkinshaw, Neil; Taylor, R.; Derrick, J.
Editors: Robbes, R.; Oliveto, R.; Di Penta, M.
Abstract: The ability to reverseengineer models of software behaviour is valuable for a wide range of software maintenance, validation and verification tasks. Current reverseengineering techniques focus either on controlspecific behaviour (e.g., in the form of Finite State Machines), or dataspecific behaviour (e.g., as pre / postconditions or invariants). However, typical software behaviour is usually a product of the two; models must combine both aspects to fully represent the software's operation. Extended Finite State Machines (EFSMs) provide such a model. Although attempts have been made to infer EFSMs, these have been problematic. The models inferred by these techniques can be nondeterministic, the inference algorithms can be inflexible, and only applicable to traces with specific characteristics. This paper presents a novel EFSM inference technique that addresses the problems of inflexibility and nondeterminism. It also adapts an experimental technique from the field of Machine Learning to evaluate EFSM inference techniques, and applies it to three diverse software systems.
20150304T16:59:57Z

Querycompetitive algorithms for cheapest set problems under uncertainty
http://hdl.handle.net/2381/31664
Title: Querycompetitive algorithms for cheapest set problems under uncertainty
Authors: Erlebach, Thomas; Hoffmann, Michael; Kammer, F.
Abstract: Considering the model of computing under uncertainty where element weights are uncertain but can be obtained at a cost by query operations, we study the problem of identifying a cheapest (minimumweight) set among a given collection of feasible sets using a minimum number of queries of element weights. For the general case we present an algorithm that makes at most d·OPT+d queries, where d is the maximum cardinality of any given set and OPT is the optimal number of queries needed to identify a cheapest set. For the minimum multicut problem in trees with d terminal pairs, we give an algorithm that makes at most d·OPT+1 queries. For the problem of computing a minimumweight base of a given matroid, we give an algorithm that makes at most 2·OPT queries, generalizing a known result for the minimum spanning tree problem. For each of our algorithms we give matching lower bounds.
20150213T10:03:39Z

MultiType Display Calculus for Propositional Dynamic Logic
http://hdl.handle.net/2381/31644
Title: MultiType Display Calculus for Propositional Dynamic Logic
Authors: Frittella, S.; Greco, G.; Kurz, Alexander; Palmigiano, A.
Abstract: We introduce a multitype display calculus for Propositional Dynamic
Logic (PDL). This calculus is complete w.r.t. PDL, and enjoys Belnapstyle
cutelimination and subformula property.
20150211T11:12:31Z

A Multitype Display Calculus for Dynamic Epistemic Logic
http://hdl.handle.net/2381/31643
Title: A Multitype Display Calculus for Dynamic Epistemic Logic
Authors: Frittella, S.; Greco, G.; Kurz, Alexander; Palmigiano, A.; Sikimić, V.
Abstract: In the present paper, we introduce a multitype display calculus for dynamic
epistemic logic, which we refer to as Dynamic Calculus. The displayapproach
is suitable to modularly chart the space of dynamic epistemic logics
on weakerthanclassical propositional base. The presence of types endows
the language of the Dynamic Calculus with additional expressivity, allows
for a smooth prooftheoretic treatment, and paves the way towards a general
methodology for the design of proof systems for the generality of dynamic
logics, and certainly beyond dynamic epistemic logic. We prove that
the Dynamic Calculus adequately captures BaltagMossSolecki’s dynamic
epistemic logic, and enjoys Belnapstyle cut elimination.
20150211T11:06:46Z

A ProofTheoretic Semantic Analysis of Dynamic Epistemic Logic
http://hdl.handle.net/2381/31596
Title: A ProofTheoretic Semantic Analysis of Dynamic Epistemic Logic
Authors: Frittella, S.; Greco, G.; Kurz, Alexander H.; Palmigiano, A.; Sikimić, V.
Editors: Aucher, G.; Hjortland, O.; Roy, O.
Abstract: The present article provides an analysis of the existing proof systems for dynamic epistemic logic from the viewpoint of prooftheoretic semantics. Dynamic epistemic logic is one of the bestknown members of a family of logical systems that have been successfully applied to diverse scientific disciplines, but the prooftheoretic treatment of which presents many difficulties. After an illustration of the prooftheoretic semantic principles most relevant to the treatment of logical connectives, we turn to illustrating the main features of display calculi, a prooftheoretic paradigm that has been successfully employed to give a prooftheoretic semantic account of modal and substructural logics. Then, we review some of the most significant proposals of proof systems for dynamic epistemic logics, and we critically reflect on them in the light of the previously introduced prooftheoretic semantic principles. The contributions of the present article include a generalization of Belnap's cutelimination metatheorem for display calculi, and a revised version of the displaystyle calculus D.EAK [30]. We verify that the revised version satisfies the previously mentioned prooftheoretic semantic principles, and show that it enjoys cutelimination as a consequence of the generalized metatheorem.
20150204T16:21:31Z

Mining sequential patterns from probabilistic databases
http://hdl.handle.net/2381/28949
Title: Mining sequential patterns from probabilistic databases
Authors: Muzammal, Muhammad; Raman, Rajeev
Abstract: This paper considers the problem of sequential pattern mining (SPM) in
probabilistic databases. Specifically, we consider SPM in situations where there is uncertainty
in associating an event with a source, model this kind of uncertainty in the probabilistic
database framework and consider the problem of enumerating all sequences
whose expected support is sufficiently large. We give an algorithm based on dynamic
programming to compute the expected support of a sequential pattern. Next, we propose
three algorithms for mining sequential patterns from probabilistic databases. The
first two algorithms are based on the candidate generation framework – one each based
on a breadthfirst (similar to GSP) and a depthfirst (similar to SPAM) exploration
of the search space. The third one is based on the pattern growth framework (similar
to PrefixSpan). We propose optimizations that mitigate the effects of the expensive
dynamic programming computation step. We give an empirical evaluation of the probabilistic
SPM algorithms and the optimizations, and demonstrate the scalability of the
algorithms in terms of CPU time and the memory usage. We also demonstrate the
effectiveness of the probabilistic SPM framework in extracting meaningful sequences in
the presence of noise.
Description: The file associated with this record is embargoed until 12 months after the date of publication. The final published version may be available through the links above.
20140626T13:15:31Z

Encoding range minima and range top2 queries
http://hdl.handle.net/2381/28856
Title: Encoding range minima and range top2 queries
Authors: Davoodi, Pooya; Navarro, Gonzalo; Raman, Rajeev; Rao, S. Srinivasa
Abstract: We consider the problem of encoding range minimum queries (RMQs): given an array A[1..n] of distinct totally ordered values, to preprocess A and create a data structure that can answer the query RMQ(i,j), which returns the index containing the smallest element in A[i..j], without access to the array A at query time. We give a data structure whose space usage is 2n+o(n) bits, which is asymptotically optimal for worstcase data, and answers RMQs in O(1) worstcase time. This matches the previous result of Fischer and Heun, but is obtained in a more natural way. Furthermore, our result can encode the RMQs of a random array A in 1.919n+o(n) bits in expectation, which is not known to hold for Fischer and Heun’s result. We then generalize our result to the encoding range top2 query (RT2Q) problem, which is like the encoding RMQ problem except that the query RT2Q(i,j) returns the indices of both the smallest and second smallest elements of A[i..j]. We introduce a data structure using 3.272n+o(n) bits that answers RT2Qs in constant time, and also give lower bounds on the effective entropy of the RT2Q problem.
20140528T10:49:40Z

Optimal indexes for sparse bit vectors
http://hdl.handle.net/2381/28854
Title: Optimal indexes for sparse bit vectors
Authors: Golynski, Alexander; Orlandi, Alessio; Raman, Rajeev; Rao, S. Srinivasa
Abstract: We consider the problem of supporting rank and select operations on a bit vector of length m with n 1bits. The problem is considered in the succinct index model, where the bit vector is stored in "readonly" memory and an additional data structure, called the index is created during preprocessing to help answer the above queries. We give asymptotically optimal densitysensitive tradeoffs, involving both m and n, that relate the size of the index to the number of accesses to the bit vector (and processing time) needed to answer the above queries. The results are particularly interesting for the case where n=o(m).
20140527T10:19:32Z

An empirical evaluation of extendible arrays
http://hdl.handle.net/2381/28738
Title: An empirical evaluation of extendible arrays
Authors: Joannou, Stelios; Raman, Rajeev
Editors: Pardalos, PM; Rebennack, S
Abstract: We study the performance of several alternatives for implementing extendible arrays, which allow random access to elements stored
in them, whilst allowing the arrays to be grown and shrunk. The study
not only looks at the basic operations of grow/shrink and accessing data, but also the effects of memory fragmentation on performance.
Description: The final publication is
available at link.springer.com
20140409T10:40:44Z

Cellcycle regulation of NOTCH signaling during C. elegans vulval development
http://hdl.handle.net/2381/28643
Title: Cellcycle regulation of NOTCH signaling during C. elegans vulval development
Authors: NusserStein, Stefanie; Beyer, Antje; Rimann, Ivo; Adamczyk, Magdalene; Piterman, Nir; Hajnal, Alex; Fisher, Jasmin
Abstract: C. elegans vulval development is one of the best‐characterized systems to study cell fate specification during organogenesis. The detailed knowledge of the signaling pathways determining vulval precursor cell (VPC) fates permitted us to create a computational model based on the antagonistic interactions between the epidermal growth factor receptor (EGFR)/RAS/MAPK and the NOTCH pathways that specify the primary and secondary fates, respectively. A key notion of our model is called bounded asynchrony, which predicts that a limited degree of asynchrony in the progression of the VPCs is necessary to break their equivalence. While searching for a molecular mechanism underlying bounded asynchrony, we discovered that the termination of NOTCH signaling is tightly linked to cell‐cycle progression. When single VPCs were arrested in the G1 phase, intracellular NOTCH failed to be degraded, resulting in a mixed primary/secondary cell fate. Moreover, the G1 cyclins CYD‐1 and CYE‐1 stabilize NOTCH, while the G2 cyclin CYB‐3 promotes NOTCH degradation. Our findings reveal a synchronization mechanism that coordinates NOTCH signaling with cell‐cycle progression and thus permits the formation of a stable cell fate pattern.
20140307T13:50:41Z

Strongly complete logics for coalgebras
http://hdl.handle.net/2381/28587
Title: Strongly complete logics for coalgebras
Authors: Kurz, Alexander; Rosicky, Jiri
Abstract: Coalgebras for a functor model different types of transition systems in a uniform way. This paper focuses on a uniform account of finitary logics for setbased coalgebras. In particular, a general construction of a logic from an arbitrary setfunctor is given and proven to be strongly complete under additional assumptions. We proceed in three parts. Part I argues that sifted colimit preserving functors are those functors that preserve universal algebraic structure. Our main theorem here states that a functor preserves sifted colimits if and only if it has a finitary presentation by operations and equations. Moreover, the presentation of the category of algebras for the functor is obtained compositionally from the presentations of the underlying category and of the functor. Part II investigates algebras for a functor over indcompletions and extends the theorem of J{'o}nsson and Tarski on canonical extensions of Boolean algebras with operators to this setting. Part III shows, based on Part I, how to associate a finitary logic to any finitesets preserving functor T. Based on Part II we prove the logic to be strongly complete under a reasonable condition on T.
20140214T10:52:40Z

Completeness for the coalgebraic cover modality
http://hdl.handle.net/2381/28586
Title: Completeness for the coalgebraic cover modality
Authors: Kupke, Clemens; Kurz, Alexander; Venema, Yde
Abstract: We study the finitary version of the coalgebraic logic introduced by L.Moss. The syntax of this logic, which is introduced uniformly with respect to a coalgebraic type functor, required to preserve weak pullbacks, extends that of classical propositional logic with a socalled coalgebraic cover modality depending on the type functor. Its semantics is defined in terms of a categorically defined relation lifting operation. As the main contributions of our paper we introduce a derivation system, and prove that it provides a sound and complete axiomatization for the collection of coalgebraically valid inequalities. Our soundness and completeness proof is algebraic, and we employ Pattinson's stratification method, showing that our derivation system can be stratified in countably many layers, corresponding to the modal depth of the formulas involved. In the proof of our main result we identify some new concepts and obtain some auxiliary results of independent interest. We survey properties of the notion of relation lifting, induced by an arbitrary but fixed set functor. We introduce a category of Boolean algebra presentations, and establish an adjunction between it and the category of Boolean algebras. Given the fact that our derivation system involves only formulas of depth one, it can be encoded as a endofunctor on Boolean algebras. We show that this functor is finitary and preserves embeddings, and we prove that the LindenbaumTarski algebra of our logic can be identified with the initial algebra for this functor.
20140214T10:40:06Z

Succinct representations of permutations and functions
http://hdl.handle.net/2381/28330
Title: Succinct representations of permutations and functions
Authors: Munro, J. Ian; Raman, Rajeev; Raman, Venkatesh; Rao, Satti Srinivasa
Abstract: We investigate the problem of succinctly representing an arbitrary permutation, π, on {0, . . . , n−1} so that π[superscript k](i) can be computed quickly for any i and any (positive or negative) integer power k. A representation taking (1 + ϵ)n lg n + O(1) bits suffices to compute arbitrary powers in constant time, for any positive constant ϵ ≤ 1. A representation taking the optimal ⌈lg n!⌉ + o(n) bits can be used to compute arbitrary powers in O(lg n/ lg lg n) time.
We then consider the more general problem of succinctly representing an arbitrary function, f : [n] → [n] so that f[superscript k](i) can be computed quickly for any i and any integer power k. We give a representation that takes (1 + ϵ)n lg n + O(1) bits, for any positive constant ϵ ≤ 1, and computes arbitrary positive powers in constant time. It can also be used to compute f[superscript k](i), for any negative integer k, in optimal O(1+  f[superscript k](i) ) time. We place emphasis on the redundancy, or the space beyond the informationtheoretic lower bound that the data structure uses in order to support operations efficiently. A number of lower bounds have recently been shown on the redundancy of data structures. These lower bounds confirm the space–time optimality of some of our solutions.
Furthermore, the redundancy of one of our structures "surpasses" a recent lower bound by Golynski [Golynski, SODA 2009], thus demonstrating the limitations of this lower bound.
Description: NOTICE: this is the author’s version of a work that was accepted for publication in Theoretical Computer Science. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Theoretical Computer Science, 2012, 438, pp. 4788, DOI: 10.1016/j.tcs.2012.03.005.
20131028T12:29:09Z

Attitudes towards User Experience (UX) Measurement
http://hdl.handle.net/2381/28125
Title: Attitudes towards User Experience (UX) Measurement
Authors: Law, LaiChong; van Schaik, Paul
Editors: Wiedenbeck, S
Abstract: User experience (UX), as an immature research area, is still haunted by the challenges of defining the scope of UX in general and operationalising experiential qualities in particular. To explore the basic question whether UX constructs are measurable, we conducted semistructured interviews with eleven UX professionals where a set of questions in relation to UX measurement were explored. The interviewees expressed scepticism as well as ambivalence towards UX measures and shared anecdotes related to such measures in different contexts. Besides, the data suggested that designoriented UX professionals tended to be sceptical about UX measurement. To examine whether such an attitude prevailed in the HCI community, we conducted a survey with essentially the same set of questions used in the interviews. Altogether 367 responses were received; 170 of them were valid and analysed. The survey provided empirical evidence on this issue as a baseline for progress in UX measurement. Overall, results indicated that attitude was favourable and there were nuanced views on details of UX measurement, implying good prospects for its acceptance, given further progress in research and education in UX measurement where UX modelling grounded in theories can play a crucial role. Mutual recognition of the value of objective measures and subjective accounts of user experience can enhance the maturity of this area.
20130903T14:47:00Z

PCTL model checking of Markov chains: Truth and falsity as winning strategies in games
http://hdl.handle.net/2381/26567
Title: PCTL model checking of Markov chains: Truth and falsity as winning strategies in games
Authors: Fecher, H; Huth, M; Piterman, N; Wagner, D
20121024T09:21:52Z

A hierarchy of reverse bisimulations on stable configuration structures
http://hdl.handle.net/2381/26332
Title: A hierarchy of reverse bisimulations on stable configuration structures
Authors: Phillips, I; Ulidowski, I
20121024T09:21:34Z

Enriched Logical Connections
http://hdl.handle.net/2381/21632
Title: Enriched Logical Connections
Authors: Kurz, A; Velebil, J
20121024T09:10:17Z

Soft constraints of difference and equality
http://hdl.handle.net/2381/21619
Title: Soft constraints of difference and equality
Authors: Hebrard, E; Marx, D; O'Sullivan, B; Razgon, I
20121024T09:10:16Z

Relation liftings on preorders and posets
http://hdl.handle.net/2381/21605
Title: Relation liftings on preorders and posets
Authors: Bílková, M; Kurz, A; Petrişan, D; Velebil, J
20121024T09:10:16Z

Finitary functors: From set to Preord and Poset
http://hdl.handle.net/2381/21606
Title: Finitary functors: From set to Preord and Poset
Authors: Balan, A; Kurz, A
20121024T09:10:16Z

The semantics of x86CC multiprocessor machine code
http://hdl.handle.net/2381/20788
Title: The semantics of x86CC multiprocessor machine code
Authors: Sarkar, S; Sewell, P; Nardelli, FZ; Owens, S; Ridge, T; Braibant, T; Myreen, MO; Alglave, J
20121024T09:08:59Z

Efficient algorithms for finding a longest common increasing subsequence
http://hdl.handle.net/2381/20787
Title: Efficient algorithms for finding a longest common increasing subsequence
Authors: Chan, WT; Zhang, Y; Ye, D; Fung, SPY; Zhu, H
20121024T09:08:59Z

Rigorous protocol design in practice: An optical packetswitch MAC in HOL
http://hdl.handle.net/2381/20790
Title: Rigorous protocol design in practice: An optical packetswitch MAC in HOL
Authors: Biltcliffe, A; Ridge, T; Sewell, P; Dales, M; Jansen, S
20121024T09:08:59Z

Verifying Distributed Systems: the Operational Approach
http://hdl.handle.net/2381/20789
Title: Verifying Distributed Systems: the Operational Approach
Authors: Ridge, T
20121024T09:08:59Z

Measuring teachers' readiness for Elearning in higher education institutions associated with the subject of electricity in Turkey
http://hdl.handle.net/2381/20593
Title: Measuring teachers' readiness for Elearning in higher education institutions associated with the subject of electricity in Turkey
Authors: Akaslan, D; Law, ELC
20121024T09:08:51Z

Modelling user experience  An agenda for research and practice
http://hdl.handle.net/2381/20594
Title: Modelling user experience  An agenda for research and practice
Authors: Law, ELC; Van Schaik P
20121024T09:08:51Z

On coalgebras over algebras
http://hdl.handle.net/2381/20595
Title: On coalgebras over algebras
Authors: Balan, A; Kurz, A
20121024T09:08:51Z

Algebraic semantics for coalgebraic logics
http://hdl.handle.net/2381/20607
Title: Algebraic semantics for coalgebraic logics
Authors: Kupke, C; Kurz, A; Pattinson, D
20121024T09:08:51Z

Coalgebraic representations of distributive lattices with operators
http://hdl.handle.net/2381/20605
Title: Coalgebraic representations of distributive lattices with operators
Authors: Bonsangue, MM; Kurz, A; Rewitzky, IM
20121024T09:08:51Z

Stone coalgebras
http://hdl.handle.net/2381/20608
Title: Stone coalgebras
Authors: Kupke, C; Venema, Y; Kupke, C; Kurz, A
20121024T09:08:51Z

Coalgebras and modal expansions of logics
http://hdl.handle.net/2381/20606
Title: Coalgebras and modal expansions of logics
Authors: Kurz, A; Palmigiano, A
20121024T09:08:51Z

Modal logics are coalgebraic
http://hdl.handle.net/2381/20598
Title: Modal logics are coalgebraic
Authors: Cîrstea, C; Kurz, A; Pattinson, D; Schröder, L; Venema, Y
20121024T09:08:51Z

MuMHR: Multipath, multihop hierarchical routing
http://hdl.handle.net/2381/20604
Title: MuMHR: Multipath, multihop hierarchical routing
Authors: Hammoudeh, M; Gaura, E; Kurz, A
20121024T09:08:51Z

Presenting functors on manysorted varieties and applications
http://hdl.handle.net/2381/20599
Title: Presenting functors on manysorted varieties and applications
Authors: Kurz, A; Petrian, D
20121024T09:08:51Z

Coalgebra and logic: A brief overview
http://hdl.handle.net/2381/20600
Title: Coalgebra and logic: A brief overview
Authors: Kurz, A; Palmigiano, A; Venema, Y
20121024T09:08:51Z

Families of symmetries as efficient models of resource binding
http://hdl.handle.net/2381/20603
Title: Families of symmetries as efficient models of resource binding
Authors: Ciancia, V; Kurz, A; Montanari, U
20121024T09:08:51Z

Foreword: Special issue on coalgebraic logic
http://hdl.handle.net/2381/20596
Title: Foreword: Special issue on coalgebraic logic
Authors: Doberkat, EE; Kurz, A
20121024T09:08:51Z

Weak factorizations, fractions and homotopies
http://hdl.handle.net/2381/20602
Title: Weak factorizations, fractions and homotopies
Authors: Kurz, A; Rosický, J
20121024T09:08:51Z

On universal algebra over nominal sets
http://hdl.handle.net/2381/20601
Title: On universal algebra over nominal sets
Authors: Kurz, A; Petrian, D
20121024T09:08:51Z

Equational presentations of functors and monads
http://hdl.handle.net/2381/20597
Title: Equational presentations of functors and monads
Authors: Velebil, J; Kurz, A
20121024T09:08:51Z