School of Computer and Mathematical Sciences
Computing and mathematics are important for changing the world as well as dealing with a changing world. Many of the major problems currently facing the planet, such as energy conservation, climate control, finding new drugs for disease, preventing identity theft and the criminal activity on the Internet, all rely on new ways to use computing and of finding new mathematical solutions to global problems.
The School of Computer and Mathematical Sciences has strong research interests in Applied Mathematics and Computer Science, especially Astronomy and Cosmology, Computational and Mathematical Finance, Distributed and Adhoc Networks, Mobile Systems, Computer Graphics and Game Programming.
Items in these collections are protected by the Copyright Act 1994 (New Zealand). These works may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use:
 Any use you make of these works must be for research or private study purposes only, and you may not make them available to any other person.
 Authors control the copyright of their works. You will recognise the author’s right to be identified as the author of the work, and due acknowledgement will be made to the author where appropriate.
 You will obtain the author’s permission before publishing any material from the work.
Recently Added

Challenges and Recommendations for the Design and Conduct of Global Software Engineering Courses: A Systematic Review
(LERO, The Irish Sofware Research Centre, 2015)This SLR we are conducting traverses the many options available to Computer Science (CS) educators teaching CS courses involving global collaboration. The challenges and solutions in conducting global software engineering ... 
‘Follow the Moon’ Development: Writing a Systematic Literature Review on Global Software Engineering Education
(ACM, 2015)This presentation reflects on method and practice in Computer Science Education Research, through introducing the process of conducting a Systematic Literature Review. While Systematic Literature Reviews are an established ... 
The Computation of Key Properties of Markov Chains via Perturbations
(arXiv, Cornell University Library, 2016)Computational procedures for the stationary probability distribution, the group inverse of the Markovian kernel and the mean first passage times of a finite irreducible Markov chain, are developed using perturbations. The ... 
Three Open Problems on the Wijsman Topology
(arXiv, 2016)Since it first emerged in Wijsman's seminal work [29], the Wijsman topology has been intensively studied in the past 50 years. In particular, topological properties of Wijsman hyperspaces, relationships between the Wijsman ... 
Pricing Variance Swaps in a Hybrid Model of Stochastic Volatility and Interest Rate With Regimeswitching
(arXiv, 2016)In this paper, we consider the problem of pricing discretelysampled variance swaps based on a hybrid model of stochastic volatility and stochastic interest rate with regimeswitching. Our modeling framework extends the ... 
Conversing at Many Layers: Implementing Multilayer Onchip Protocol Converters
(2015)The numerous intellectual property blocks of a systemonachip must be integrated so that they can meet systemspecific requirements. However, such integration is not guaranteed due to mismatches between IP protocols. ... 
Oscillation Revisited
(arXiv, 2016)In previous work by Beer and Levi [8, 9], the authors studied the oscillation Ω(f, A) of a function f between metric spaces hX, di and hY, ρi at a nonempty subset A of X, defined so that when A = {x}, we get Ω(f, {x}) ... 
Preparing the Global Software Engineer
(IEEE, 2015)With a goal of preparing software engineering students for practice in today’s global settings, Uppsala University has for some years run courses involving global collaboration. The “IT in Society” course is one such ... 
Error estimates for the Galerkin finite element approximation for a linear second order hyperbolic equation with modal damping
(South African Symposium of Numerical and Applied Mathematics (SANUM), 2016)No abstract. 
Gateway load balancing and routing selection scheme of MANET in disaster scenario
(IEEE, 2015)After disaster occurs like earthquake, it is common results of collapse structure. It is impossible for disaster victims make use of communication devices such as cellular phones, iPad or laptop to communicate with others ... 
Finding a closest match between wifi propagation measurements and models
(IEEE, 2015)In a series of papers by Sarkar and his team conducted radio propagation measurements to study the performance of WiFi in terms of received signal strengths (RSS) in an obstructed office block. The goal of this paper is ... 
A novel network selection mechanism for vehicletoinfrastructure communication
(IEEE, 2016)The commercial deployment of 5G networks require heterogeneous multitier, multiple radio access technologies (RATs) to support vehicletoinfrastructure (V2I) communication with diversified services. Vehicles may need to ... 
Challenges and recommendations for the design and conduct of Global Software Engineering courses: a systematic review
(Association for Computing Machinery (ACM), 2015)Context: Global Software Engineering (GSE) has become the predominant form of software development for global companies and has given rise to a demand for students trained in GSE. In response, universities are developing ... 
Multiple preemptive EDCA for emergency medium access control in distributed WLANs
(Springer, 2016)The increasingly use of wireless local area networks (WLANs) in public safety and emergency network services demands for a strict quality of service (QoS) guarantee especially a large number of users report an emergency ... 
Face search in encrypted domain
(Springer, 2015)Visual information of images and videos usually is encrypted for the purposes of security applications. Straightforward manipulations on the encrypted data without requiring any decryption have the advantage of speed over ... 
Event analogy for privacy preservation in visual surveillance
(Springer, 2015)Privacy preservation as a thorny problem in surveillance has been arisen because of its relevance to human right, however it has not been completely solved yet today. In this paper, we investigate this existing problem ... 
A multiagent framework for dependable adaptation of evolving system architectures
(IEEE, 2015)We present a multiagent framework for the formal verification of componentbased systems after changes such as addition, removal and modification of components. The core of our approach is an Agent Verification Engine ... 
A foundation programme preparing students for future study in Computing and Engineering Degrees
(IEEE, 2016)This paper presents the Certificate of Science and Technology (CertScT) a predegree programme at Auckland University of Technology in New Zealand, developed with the aim of preparing students to undertake degree level ... 
Analysing university students' abilities in making assumptions in a ballistics model: a case study
(The Bronx Colleges of the City University of New York, 2016)This paper investigates abilities of two groups of university students in making assumptions in a ballistics model. The first group consisted of postgraduate students majoring in applied mathematics from a New Zealand ... 
Why the Kemeny Time is a constant
(De Gruyter Open, 2016)We present a new fundamental intuition for why the Kemeny feature of a Markov chain is a constant. This new perspective has interesting further implications.