School of Computer and Mathematical Sciences
Computing and mathematics are important for changing the world as well as dealing with a changing world. Many of the major problems currently facing the planet, such as energy conservation, climate control, finding new drugs for disease, preventing identity theft and the criminal activity on the Internet, all rely on new ways to use computing and of finding new mathematical solutions to global problems.
The School of Computer and Mathematical Sciences has strong research interests in Applied Mathematics and Computer Science, especially Astronomy and Cosmology, Computational and Mathematical Finance, Distributed and Adhoc Networks, Mobile Systems, Computer Graphics and Game Programming.
Items in these collections are protected by the Copyright Act 1994 (New Zealand). These works may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use:
 Any use you make of these works must be for research or private study purposes only, and you may not make them available to any other person.
 Authors control the copyright of their works. You will recognise the author’s right to be identified as the author of the work, and due acknowledgement will be made to the author where appropriate.
 You will obtain the author’s permission before publishing any material from the work.
Recently Added

Challenges and recommendations for the design and conduct of Global Software Engineering courses: a systematic review
(Association for Computing Machinery (ACM), 2015)Context: Global Software Engineering (GSE) has become the predominant form of software development for global companies and has given rise to a demand for students trained in GSE. In response, universities are developing ... 
Multiple preemptive EDCA for emergency medium access control in distributed WLANs
(Springer, 2016)The increasingly use of wireless local area networks (WLANs) in public safety and emergency network services demands for a strict quality of service (QoS) guarantee especially a large number of users report an emergency ... 
Face search in encrypted domain
(Springer, 2015)Visual information of images and videos usually is encrypted for the purposes of security applications. Straightforward manipulations on the encrypted data without requiring any decryption have the advantage of speed over ... 
Event analogy for privacy preservation in visual surveillance
(Springer, 2015)Privacy preservation as a thorny problem in surveillance has been arisen because of its relevance to human right, however it has not been completely solved yet today. In this paper, we investigate this existing problem ... 
A multiagent framework for dependable adaptation of evolving system architectures
(IEEE, 2015)We present a multiagent framework for the formal verification of componentbased systems after changes such as addition, removal and modification of components. The core of our approach is an Agent Verification Engine ... 
A foundation programme preparing students for future study in Computing and Engineering Degrees
(IEEE, 2016)This paper presents the Certificate of Science and Technology (CertScT) a predegree programme at Auckland University of Technology in New Zealand, developed with the aim of preparing students to undertake degree level ... 
Analysing university students' abilities in making assumptions in a ballistics model: a case study
(The Bronx Colleges of the City University of New York, 2016)This paper investigates abilities of two groups of university students in making assumptions in a ballistics model. The first group consisted of postgraduate students majoring in applied mathematics from a New Zealand ... 
Why the Kemeny Time is a constant
(De Gruyter Open, 2016)We present a new fundamental intuition for why the Kemeny feature of a Markov chain is a constant. This new perspective has interesting further implications. 
Accurate calculations of Stationary Distributions and Mean First Passage Times in Markov Renewal Processes and Markov Chains
(De Gruyter Open, 2016)This article describes an accurate procedure for computing the mean first passage times of a finite irreducible Markov chain and a Markov renewal process. The method is a refinement to the Kohlas, Zeit fur Oper Res, ... 
EMAC: an evolutionary solution for collision avoidance in wireless ad hoc networks
(Elsevier, 2016)Transmission collision is a main cause of throughput degradation and nondeterministic latency in wireless networks. Existing collisionavoidance mechanisms for distributed wireless networks are mostly based on the random ... 
A definition for a sustainable computing educator
(Computing and Information Technology Research and Education, New Zealand (CITRENZ), 2015)The concept of sustainability has been penetrating the education sector for some time. In addition to degrees in sustainability, numerous majors, and indeed whole institutions have been imbuing their curricula with a ... 
Everybody must cut code! Educational imperative, fad or fantasy?
(Association for Computing Machinery (ACM), 2015)No abstract. 
Competencies for paradigm shift 'survival'
(IEEE, 2015)The rapid development in the IT area brings a series of shifts, in underlying theories, technology and work practices. In the normal course of events, most changes are evolutionary, with small, incremental improvements ... 
Slicing the Pi: devicespecific IEC 61499 design
(IEEE, 2015)The IEC 61499 Function Block standard describes an architecture to support the development and reuse of software components for distributed and embedded industrial control and automation systems. Often distributed over ... 
Air pollution and fog detection through vehicular sensors
(IEEE Xplore, 2015)We describe a method for the automatic recognition of air pollution and fog from a vehicle. Our system consists of sensors to acquire main data from cameras as well as from Light Detection and Recognition (LIDAR) instruments. ... 
A smartphonebased postdisaster management mechanism using WiFi tethering
(IEEE, 2015)Natural disasters often cause the breakdown of the power grid in the affected areas hampering telecommunication services. In the absence of electrical power undamaged cellular base stations switch to battel") backup to ... 
Comparisonbased systemlevel fault diagnosis protocols for mobile adhoc networks: a survey
(Elsevier, 2016)Fault diagnosis is crucial for the successful deployment and operation of mobile adhoc networks (MANETs). Comparisonbased fault diagnosis is a practical approach to identify the status of nodes based on tasks they execute. ... 
Model prior distribution for variable selection in linear regression models
(Cornell University Library, 2016)In this work we discuss a novel model prior probability for variable selection in linear regression. The idea is to determine the prior mass in an objective sense, by considering the worth of each of the possible regression ... 
Noninformative reparameterisations for locationscale mixtures
(Cornell University Library, 2016)While mixtures of Gaussian distributions have been studied for more than a century (Pearson, 1894), the construction of a reference Bayesian analysis of those models still remains unsolved, with a general prohibition of ... 
Use of ensembles of Fourier spectra in capturing recurrent concepts in data streams
(IEEE, 2015)In this research, we apply ensembles of Fourier encoded spectra to capture and mine recurring concepts in a data stream environment. Previous research showed that compact versions of Decision Trees can be obtained by ...