Recent Submissions

  • High-density shallow shear wave velocity characterisation of the urban Christchurch, New Zealand region 

    McGann CR; Bradley BA; Cubrinovski M (University of Canterbury, Christchurch, New Zealand, 2015)
    This report summarizes the development of a region-wide surficial soil shear wave velocity (Vs ) model based on the unique combination of a large high-spatial-density database of cone penetration test (CPT) logs in the ...
  • Mobile Phone Text Entry 

    Butts, Lee (University of Canterbury, 2001)
    The rapid growth of Short Message Service (SMS) text messaging has meant that a fast and efficient text input method is a very important aspect of a mobile phone interface. The best way to test a new method is an empirical ...
  • Forces of Nature 

    Creek, Alan (University of Canterbury, 2001)
    Many systems in the modern world are readily represented as graphs; with nodes representing objects within the system, and edges the relationships between them. The effectiveness of visualisations of complex systems is ...
  • Towards scalable interfaces using spatial cues for document management 

    Edwards, Eddie (University of Canterbury, 2001)
    Document management is an unavoidable task. Previous research evaluated the effect of building document management systems exploiting spatial memory. It was proven that spatial memory enhances retrieval tasks for systems ...
  • Medium access control protocols for WDM optical networks 

    Mollard, Robert (University of Canterbury, 2001)
    Wavelength-division multiplexing (WDM) has emerged as the most popular technology for utilising the huge bandwidth of optical fibre. This paper surveys medium access control protocols for the star, bus and ring WDM ...
  • Music Selection for Internet Radio 

    Weiss, Alex (University of Canterbury, 2000)
    Music. Radio. The internet. Three very interesting fields which are linked in this project on internet radio stations. A comparative study of existing radio stations is performed. Weaknesses and problems in current ...
  • An Animated Pedagogical Agent for SQL-Tutor 

    Suraweera, Pramuditha (University of Canterbury, 1999)
    Animated pedagogical agents are animated characters that inhabit interactive learning environments. In addition to providing problem-solving advice in response to a student’s actions, they are also able to play a powerful ...
  • Creating and evaluating a model for a user in a rehabilitative virtual-reality environment 

    Ogden, Scott (University of Canterbury, 2014)
    The ICTG research group is currently working on a Stroke Rehabilitation virtual reality system to improve prospective memory. In this system there is a need to give the user relevant feedback at the appropriate time. To ...
  • Neuromorphic Computing with Reservoir Neural Networks on Memristive Hardware 

    Stockdill, Aaron (University of Canterbury, 2016)
    Building an artificial brain is a goal as old as computer science. Neuromorphic computing takes this in new directions by attempting to physically simulate the human brain. In 2008 this goal received renewed interest due ...
  • Use of Metrics and their Visualisations in Software Engineering Projects 

    Armstrong, Edward; (University of Canterbury, 2016)
    In this paper, we describe an observational investigation that explores whether creating visualisation systems using software metrics promotes reflection. We presented metric visualisations to six groups, in separate ...
  • Assisted Resource Management in the New Zealand Rural Fire Service 

    Curtis-Black, Andrew (University of Canterbury, 2015)
    There exists a need for more efficient tools and processes for use in the emergency services. Of particular interest to the authors of this report and to our industry sponsor, Tait Communications, is the idea of ...
  • Creating a simulation to assess performance of MAC-level opportunistic forwarding schemes in linear cluster topologies 

    Hope, Daniel (University of Canterbury, 2015)
    The goal of this project was to create a software simulation of a wireless network. The wireless nodes should use a CSMA MAC protocol and should be able to have their back off distributions changed so the performance ...
  • Applying Bytecode Level Automatic Exploit Generation to Embedded Systems 

    Ruffell, Matthew (University of Canterbury, 2015)
    Finding vulnerabilities in software is a difficult task, typically undertaken by experts. Developers have little of the required knowledge to find complex vulnerabilities in their software products before release. Automation ...
  • Social Media in Software Development 

    Reiher, Johann; Galster, Matthias (University of Canterbury, 2015)
    —Using Drupal as a case study, we investigate the use of sentiment analysis on bulk sets of tweets in order to extract useful emotional trends relating to the development/release cycle. We offer extensive filtering of ...
  • Myo Gesture Control Armband for Medical Applications 

    Abduo, Mahmoud; Galster, Matthias (University of Canterbury, 2015)
    Through studying the relationship between surface electromyography and hand kinematics, hand-amputees may be able to recover a significant part of their lost functionality using noninvasive methods. By investigating the ...
  • Open-sourcing CS education: Computer Science Field Guide 2.0 

    Kroese, Marcus Stenfert (University of Canterbury, 2016)
    This report details efforts made towards reworking the publishing infrastructure of the Computer Science Field Guide (CSFG). It deconstructs the old system, examines implementation options for a new CSFG publishing system. ...
  • Novel Methods for Reflective Symmetry Detection in Scanned 3D Models 

    Stephenson, Matthew (University of Canterbury, 2015)
    The concept of detecting symmetry within 3D models has received an extensive amount of research within the past decade. Numerous algorithms have been proposed to identify reflective symmetry within 3D meshes and to extract ...
  • A Similarity Ranking of Python Programs 

    Avery, Jonathan Wardell (University of Canterbury, 2015)
    Detection of similar programs is a highly studied problem. Detecting similar code is an important strategy for detecting badly modularized code, finding vulnerabilities due to error prone copy-paste programming methodologies, ...
  • Mary Had a Little Lambda: Implementing a Minimal Lisp for Assisting with Education 

    Bell, Andrew (University of Canterbury, 2016)
    In this report, we describe the implementation of a minimal version of Lisp for use in teaching programmers who have some experience in another language. We discuss the reasons why learning Lisp is beneficial, and what ...

View more