Items where Subject is "Q Science > QA Mathematics (inc Computing science) > QA 75 Electronic computers. Computer science"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator's name | Item Type | Date | No Grouping
Number of items at this level: 307.

Welch, Peter H. and Kerridge, Jon M. and Barnes, Frederick R.M., eds. (2006) Communicating Process Architectures 2006: WoTUG-29 Proceedings. Concurrent Systems Engineering , 64 . IOS Press, US, Amsterdam, 400 pp. ISBN 9781586036713. (The full text of this publication is not available from this repository)

McEwan, Alistair A. and Schneider, S. and Ifill, W. and Welch, Peter H., eds. (2007) Communicating Process Architectures 2007: WoTUG-30. Concurrent Systems Engineering , 65 . IOS Press, US, Amsterdam, 528 pp. ISBN 9781586037673. (The full text of this publication is not available from this repository)

Aichernig, Bernhard K. and Boiten, Eerke and Derrick, John and Groves, Lindsay, eds. (2007) Proceedings of the 11th Refinement Workshop (REFINE 2006)Macao, China 31 October 2006. Electronic Notes in Theoretical Computer Science , 187 . Elsevier, 188 pp. ISBN 1571-0661. (The full text of this publication is not available from this repository)

Boiten, Eerke and Derrick, John and Smith, G., eds. (2008) Proceedings of the BCS-FACS Refinement Workshop (REFINE 2007). Electronic Notes in Theoretical Computer Science , 201 . Elsevier, 264 pp. (The full text of this publication is not available from this repository)

Abdullah, Sophiana Chua and Cooley, Roger (2000) The use of constraint logic programming in the development of adaptive tests. In: 5th International Conference on Intelligent Tutoring Systems (ITS 2000), June 2000, Montreal, Canada. (The full text of this publication is not available from this repository)

Akehurst, David H. (2000) An 00 visual language definition approach supporting multiple views. In: IEEE International Symposium on Visual Languages, September 10 - 13th 2000, Seattle, Washington, USA. (Full text available)
[img]
Preview

Alcaide, Almudena and Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Bayesian rational exchange. International Journal of Information Security, 7 (1). pp. 85-100. ISSN 1615-5262. (Access to this publication is restricted)
[img]

Alcaide, Almudena and Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Cryptanalysis of Syverson's Rational Exchange Protocol. International Journal of Network Security, 7 (2). pp. 151-156. ISSN 2152-5064. (Access to this publication is restricted)
[img]

Anzellotti, G. and Battiti, Roberto and Lazzizzera, I. and Soncini, G. and Zorat, Alessandro and Sartori, Alvise and Tecchiolli, Giampietro and Lee, Peter (1995) Totem:. a Highly Parallel Chip for Triggering Applications with Inductive Learning Based on the Reactive Tabu Search. In: 4th International Workshop on Software Engineering, Artificial Intelligence, and Expert Systems for High Energy and Nuclear Physics (AIHENP 95), Pisa, Italy. (The full text of this publication is not available from this repository)

Ayad, Mohamed and Fleischmann, Peter (2008) On the decomposition of rational functions. Journal of Symbolic Computation, 43 (4 ). 259-274 . ISSN 0747-7171. (The full text of this publication is not available from this repository)

Bailey, Christopher and Chadwick, David W and de Lemos, Rogério and Siu, Kristy WS (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet. Springer Berlin Heidelberg, pp. 100-111. (The full text of this publication is not available from this repository)

Barnes, David J. and Hopkins, Tim (2000) The evolution and testing of a medium sized numerical package. In: International Workshop on Modern Software Tools for Scientific Computing (SciTools 98), Oslo, Norway. (The full text of this publication is not available from this repository)

Barrero, David and Hernandez-Castro, Julio C. and Peris-Lopez, Pedro and Camacho, David (2014) A genetic tango attack against the David–Prasad RFID ultra‐lightweight authentication protocol. Expert Systems, 31 (1). pp. 9-19. ISSN 0266-4720. (Full text available)
[img]
Preview

Bassett, Eryl E. and Brooks, Stephen P. and Morgan, Byron J. T. (1994) Minitab macros for multivariate analysis. Computational Statistics and Data Analysis, 17 (1). pp. 100-101. ISSN 0167-9473. (The full text of this publication is not available from this repository)

Battiti, Roberto and Lee, Peter and Sartori, Alvise and Tecchiolli, Giampietro (1995) Special-purpose parallel architectures for high-performance machine learning. In: International Conference and Exhibition on High-Performance Computing and Networking, Milan, Italy. (The full text of this publication is not available from this repository)

Beckett, David J. (1995) Combined Log System. In: 3rd International World-Wide Web Conference, Darmstadt, Germany. (Full text available)
[img]
Preview

Beckett, David J. and Welch, Peter H. (1996) Emulating a secure multicasting bus using occam 2.1. In: Oneill, B.C. and Transputer User, Grp, eds. Concurrent Systems Engineering Series. I O S Press pp. 59-73. ISBN 90-5199-261-0. (The full text of this publication is not available from this repository)

Blasco Alis, Jorge and Hernandez-Castro, Julio C. and Tapiador, Juan E. and Ribagorda, Arturo (2012) Bypassing information leakage protection with trusted applications. Computers and Security, 31 (4). pp. 557-568. ISSN 0167-4080. (Access to this publication is restricted)
[img]

Blasco Alis, Jorge and Hernandez-Castro, Julio C. and de Fuentes, Jose Maria and Ramos, Benjamin (2012) A framework for avoiding steganography usage over HTTP. Journal of Network and Computer Applications, 35 (1). pp. 491-501. ISSN 1084-8045. (Access to this publication is restricted)
[img]

Boiten, Eerke (2014) Russia and China prepare to fight US internet domination. . The Conversation UK Internet only. (Full text available)
[img]

Boiten, Eerke and Derrick, John and Bowman, Howard and Steen, Maarten (1999) Constructive consistency checking for partial specification in Z. Science of Computer Programming, 35 (1). pp. 29-75. ISSN 0167-6423. (Full text available)
[img]
Preview
[img]
Preview

Bovey, John D. (1993) A graphical retrieval-system. Journal of Information Science, 19 (3). pp. 179-187. ISSN 0165-5515. (The full text of this publication is not available from this repository)

Bovey, John D. (1995) Building a Thesaurus for a Collection of Cartoon Drawings. Journal of Information Science, 21 (2). pp. 115-122. ISSN 1352-7460. (The full text of this publication is not available from this repository)

Bovey, John D. (1996) Event-based personal retrieval. Journal of Information Science, 22 (5). pp. 357-366. ISSN 0165-5515. (Full text available)
[img]
Preview
[img]
Preview

Bowman, Howard and Blair, Gordon S. and Blair, Lynne and Chetwynd, Amanda G. (1995) Formal description of distributed multimedia systems: An assessment of potential techniques. Computer Communications, 18 (12). pp. 964-977. ISSN 0140-3664. (The full text of this publication is not available from this repository)

Bowman, Howard and Blair, Gordon S. and Blair, Lynne and Chetwynd, Amanda G. (1993) Time Versus Abstraction In Formal Description. In: FORTE 93 - IFIP 6th International Conference on Formal Description Techniques, Boston, Ma. (The full text of this publication is not available from this repository)

Bowman, Howard and Derrick, John and Brinksma, E. (2000) Selected papers from the Second IFIP Int'l Conference on Formal Methods for Open Object Based Distributed Systems, 1997. IEEE Transactions on Software Engineering, 26 (7). pp. 577-578. ISSN 0098-5589. (The full text of this publication is not available from this repository)

Bowman, Howard and Derrick, John and Linington, Peter F. and Steen, Maarten (1996) Cross-viewpoint consistency in open distributed processing. Software Engineering Journal, 11 (1). pp. 44-57. ISSN 0268-6961. (The full text of this publication is not available from this repository)

Bowman, Howard and Filetti, Marco and Alsufyani, Abdulmajeed and Janssen, Dirk P. and Su, Li (2014) Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough. PLoS ONE, 9 (3). e90595. ISSN 1932-6203. (Full text available)
[img]
Preview

Bowman, Howard and Filetti, Marco and Wyble, Brad and Olivers, Christian (2013) Attention is more than prediction precision [Commentary on target article]. Behavioral and Brain Sciences, 36 (3). pp. 206-208. ISSN 0140-525X. (Full text available)
[img]
Preview

Brooks, Stephen P. and Morgan, Byron J. T. (1994) Automatic Starting Point Selection For Function Optimization. Statistics and Computing, 4 (3). pp. 173-177. ISSN 0960-3174. (The full text of this publication is not available from this repository)

Brown, Chloë and Efstratiou, Christos and Leontiadis, Ilias and Quercia, Daniele and Mascolo, Cecilia and Scott, James and Key, Peter (2014) The Architecture of Innovation: Tracking Face-to-Face Interactions with UbiComp Technologies. In: ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), 13-17 Sep 2014, Seattle, WA, USA. (Full text available)
[img]
Preview

Brown, Neil C.C. (2004) C++CSP Networked. In: Communicating Process Architectures 2004. (Full text available)
[img]
Preview

Buchberger, Bruno and Craciun, Adrian and Jebelean, Tudor and Kovacs, Laura and Temur, Kutsia and Koji, Nakagawa and Piroi, Florina and Popov, Nikolaj and Robu, Judit and Rosenkranz, Markus and Windsteiger, Wolfgang (2006) Theorema: Towards computer-aided mathematical theory exploration. Journal of Applied Logic, 4 (4). pp. 470-504. ISSN 1570-8683. (The full text of this publication is not available from this repository)

Cakic, Jovan (2000) Intelligent infrastructure that support system's changes. In: 13th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE 2000), New Orleans, Louisiana. (The full text of this publication is not available from this repository)

Canuto, Anne and Howells, Gareth and Fairhurst, Michael (2000) An investigation of the effects of variable vigilance within the RePART neuro-fuzzy network. Journal of Intelligent & Robotic Systems, 29 (4). pp. 317-334. ISSN 0921-0296. (The full text of this publication is not available from this repository)

Canuto, Anne and Howells, Gareth and Fairhurst, Michael (2000) The use of confidence measures to enhance combination strategies in multi-network neuro-fuzzy systems. Connection Science, 12 (3-4). pp. 315-331. ISSN 0954-0091. (The full text of this publication is not available from this repository)

Carter, Janet (1999) Collaboration or Plagiarism: What happens when students work together. In: Manaris, B., ed. Proceedings of the 4th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE'99). SIGCSE Bulletin : A Quarterly Publication of the Special Interest Group on Computer Science Education, 31. Assoc Computing Machinery, Krakow, Poland pp. 52-55. ISBN 1-58113-087-2. (The full text of this publication is not available from this repository)

Carter, Janet and Jenkins, Tony (1999) Gender and programming: What's going on? In: ITICSE '99: Proceedings of the 4th Annual SIGCSE/SIGCUE Conference on Innovation and Technology in Computer Science Education. SIGCSE Bulletin : A Quarterly Publication of the Special Interest Group on Computer Science Education, 31. Assoc Computing Machinery, Cracow, Poland pp. 1-4. ISBN 1-58113-087-2. (The full text of this publication is not available from this repository)

Chadwick, David W and Inman, George (2013) The Trusted Attribute Aggregation Service (TAAS)-Providing an Attribute Aggregation Layer for Federated Identity Management. In: Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. (Full text available)
[img]
Preview
[img]
Preview

Chadwick, David W. and Su, L. and Laborde, Romain (2006) Coordinating access control in grid services. In: 7th International Middleware Conference, November 27th - December 1st 2006, Melbourne, Australia. (Full text available)
[img]
Preview

Chadwick, David W. and Zhao, Gansen and Otenko, Sassa and Laborde, Romain and Su, Linying and Nguyen, Tuan Anh (2008) PERMIS: a modular authorization infrastructure. In: 5th UK e-Science All Hands Meeting (AHM 2006), September 8th - 21st 2006, Nottingham, England. (Full text available)
[img]
Preview

Chen, Huankai and Wang, Frank Z. and Helian, Na (2013) A Cost-Efficient and Reliable Resource Allocation Model Based on Cellular Automaton Entropy for Cloud Project Scheduling. International Journal of Advanced Computer Science and Applications, 4 (4). pp. 7-14. ISSN 2156-5570. (Full text available)
[img]
Preview

Chen, Wanlong and Yang, Xiao and Wang, Frank Z. (2013) Delayed Switching Applied to Memristor Content Addressable Memory Cell. In: World Congress on Engineering 2013, July 3 - 5, 2013, London. (Access to this publication is restricted)
[img]

Chen, Xian and Megson, G.M (1995) A General Methodology of Partition and Mapping for Given Regular Arrays. IEEE Transactions on Parallel and Distributed Systems, 6 (10). pp. 1100-1107. ISSN 1045-9219. (The full text of this publication is not available from this repository)

Cheng, Russell C.H. (1995) Bootstrap methods in computer simulation experiments. In: 1995 Winter Simulation Conference, Arlington, Va. (The full text of this publication is not available from this repository)

Cheng, Russell C.H. (1994) Selecting Input Models. In: 1994 Winter Simulation Conference, Lake Buena Vista, Fl. (The full text of this publication is not available from this repository)

Cheng, Russell C.H. and Holland, Wayne S. (1998) Two-point methods for assessing variability in simulation output. Journal of Statistical Computation and Simulation, 60 (3). pp. 183-205. ISSN 0094-9655. (The full text of this publication is not available from this repository)

Cheng, Russell C.H. and Holland, Wayne S. and Hughes, N.A. (1996) Selection of input models using bootstrap goodness-of-fit. In: Charnes, J.M. and Morrice, D.J. and Brunner, D.T. and Swain, J.J. and Management Sci, Inst Operat Res and Management Sci, Coll Simulat Ieee and Comp Soc, eee Syst Man and Cybernet Soc, nst Ind Engineers Nist Soc and Comp Simulat, Int, eds. Proceedings of the 28th conference on Winter simulation. I.E.E.E pp. 199-206. ISBN 0-7803-3383-7. (The full text of this publication is not available from this repository)

Cheng, Russell C.H. and Traylor, L. (1995) Characterization of material strength properties using probabilistic mixture models. In: 7th International Conference on Computational Methods and Experimental Measurements (CMEM 95), Capri, Italy. (The full text of this publication is not available from this repository)

Chivers, Daniel and Rodgers, Peter (2013) Exploring Local Optima in Schematic Layout. In: Visual Languages and Computing (VLC) in The 19th International Conference on Distributed Multimedia Systems (DMS 2013), 8-10 August 2013, Brighton. (Full text available)
[img]
Preview

Chu, Dominique and Barnes, David J. and Perkins, Samuel (2014) Amorphous computing in the presence of stochastic disturbances. Biosystems, 125 . pp. 32-42. ISSN 03032647. (In press) (The full text of this publication is not available from this repository)

Clear, David and Ibbetson, Alan L. and Collinson, Peter (1994) Exporting Home on Demand to PCS. In: 8th Systems Administration Conference (LISA VIII), San Diego, Ca. (The full text of this publication is not available from this repository)

Cobbah, W.G.K. and Fairhurst, Michael (2000) Computer analysis of handwriting dynamics during dopamimetic tests in Parkinson's disease. In: 26th Euromicro Conference, Maastricht, Netherlands. (The full text of this publication is not available from this repository)

Colchester, Alan C. F. and Ourselin, Sébastien and Zhu, Yonggen and Bardinet, Eric and He, Yang and Roche, Alexis and Al-Sarraj, Safa and Nailon, Bill and Ironside, James and Ayache, Nicholas (2000) 3-D reconstruction of macroscopic optical brain slice images. In: 3rd International Conference on Medical Image Computing and Computer-Assisted Intervention, Pittsburgh, Pennsylvania. (The full text of this publication is not available from this repository)

Cronk, Jonathan and Sharp, John A. (1995) A framework for deciding what to outsource in information technology. Journal of Information Technology, 10 (4). pp. 259-267. ISSN 0268-3962. (The full text of this publication is not available from this repository)

Cross, M. and Keech, M. and Liddell, Heather and Steel, John and Walshaw, C and Welch, Peter H. (1995) Implementing a strategy for the promotion of high performance computing in the UK. In: International Conference and Exhibition on High-Performance Computing and Networking, Milan, Italy. (The full text of this publication is not available from this repository)

Dallas, I. (1993) UCSG UNIX applications workshop, university-of-kent, July 6 and 7 1993. University Computing, 15 (4). pp. 195-200. ISSN 0265-4385. (The full text of this publication is not available from this repository)

Davies, Nigel and Davy, M.J. and Blair, Gordon S. and Mariani, John A. (1993) Object invocation and management in the zenith distributed multimedia information-system. Information and Software Technology, 35 (5). pp. 259-266. ISSN 0950-5849. (The full text of this publication is not available from this repository)

Dealmeida, F.A. and Welch, Peter H. (1994) A Parallel Emulator for a Multi-Processor Dataflow Machine. In: 1994 World Transputer Congress (WTC 94) - Transputer Applications and Systems 94, Como, Italy. (The full text of this publication is not available from this repository)

Dent, Alan and Hanna, Keith (1993) Reasoning about array structures using a dependently typed logic. In: Agnew, David and Claesen, Luc J. M. and Camposano, Raul, eds. IFIP transactions a-computer science and technology. Elsevier Science Publ B V pp. 207-224. ISBN 0-444-81641-0. (The full text of this publication is not available from this repository)

Derrick, John and Boiten, Eerke (1998) Testing refinements by refining tests. In: 11th International Conference of Z Users on the Z Formal Specification Notation (ZUM 98), SEP 24-26, 1998, Berlin, Germany. (Full text available)
[img]
Preview
[img]
Preview

Dunn, Stuart and Hedges, Mark and Jordanous, Anna and Storz, Christoph (2012) Comparing the informatics of text and Cultural Heritage: the SAWS project. In: Computer Applications and Quantitative Methods in Archaeology, 2012, Southampton, UK. (The full text of this publication is not available from this repository)

Dziallas, Sebastian and Fincher, Sally (2014) Learning to Learn: The Co-Evolution of an Institution and its Students. In: Frontiers in Education, October 22-25 2014, Madrid. (The full text of this publication is not available from this repository)

Edwards, Marion and Cooley, Roger (1993) Expertise in Expert-Systems - Knowledge Acquisition for Biological Expert-Systems. Computer Applications in the Biosciences, 9 (6). pp. 657-665. ISSN 0266-7061. (The full text of this publication is not available from this repository)

Edwards, Michael R. (1997) Developing a model of expertise for a taxonomic expert system. In: Bridge, Paul and Jeffries, Peter and Morse, David R. and Scott, Peter R., eds. Information Technology, Plant Pathology and Biodiversity. Cabi Publishing. Cabi Publishing-C a B Int, Wallingford pp. 183-196. ISBN 0-85199-217-X. (The full text of this publication is not available from this repository)

Efstratiou, Christos and Leontiadis, Ilias and Picone, Marco and Rachuri, Kiran and Mascolo, Cecilia and Crowcroft, Jon (2012) Sense and Sensibility in a Pervasive World. In: Proceedings of 10th International Conference on Pervasive Computing (PERVASIVE 2012), June 2012, Newcastle, UK. (Full text available)
[img]
Preview

Elsehely, Ehab and Sobhy, Mohammed (2000) Real time radar target detection under jamming conditions using wavelet transform on FPGA device. IEEE International Symposium On Circuits and Systems, 4 . pp. 545-548. (The full text of this publication is not available from this repository)

Elston, David A. and Jayasinghe, G. and Buckland, Stephen T. and MacMillan, Douglas C. and Aspinall, R.J. (1997) Adapting regression equations to minimize the mean squared error of predictions made using covariate data from a GIS. International Journal of Geographical Information Science, 11 (3). pp. 265-280. ISSN 1365-8816 . (Access to this publication is restricted)
[img]

Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Alcaide, Almudena and Ribagorda, Arturo (2008) On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security, 3 (2). pp. 166-172. ISSN 1556-6013. (Access to this publication is restricted)
[img]

Fairhurst, Michael and Rahman, Ahmad Fuad Rezaur (1996) A new multi-expert architecture for high performance object recognition. In: Conference on Machine Vision Applications, Architectures, and Systems Integration V, NOV 18-19, 1996, Boston, Ma. (The full text of this publication is not available from this repository)

Faridani, A. and Dimond, Keith R. (1994) A Transputer-Based Vision System for Mobile Robots. In: 7th Conference of the North-American-Transputer-Users-Group (NATUG-7), Atlanta, Ga. (The full text of this publication is not available from this repository)

Filho, E.C.D.B.C. and Fairhurst, Michael and Bisset, D.L. (1991) Adaptive pattern-recognition using goal seeking neurons. Pattern Recognition Letters, 12 (3). pp. 131-138. ISSN 0167-8655. (The full text of this publication is not available from this repository)

Fincher, Sally and Knox, Daniel (2013) The Porous Classroom: Professional Practices in the Computing Curriculum. IEEE Computer, 46 (9). pp. 44-51. ISSN 0018-9162. (The full text of this publication is not available from this repository)

Forrester, Michael A. (1994) Hyperemedia and Indexing - Identifying Approprate Models from User Studies. In: Raitt, David I. and Jeapes, Ben, eds. 7th International Online Information Meeting Longon, England. International online information meeting. Information Today Inc, 143 Old Marlton Pike, Medford, NJ 08055, Medford, USA pp. 313-324. ISBN 0-904933-85-7. (The full text of this publication is not available from this repository)

Genaim, Samir and King, Andy (2008) Inferring non-suspension conditions for logic programs with dynamic scheduling. ACM Transactions on Computational Logic, 9 (3). pp. 182-196. ISSN 1529-3785. (Full text available)
[img]
Preview

Gerig, Guido and Welti, Daniel and Guttmann, Charles and Colchester, Alan C. F. and Szekely, Gabor (2000) Exploring the discrimination power of the time domain for segmentation and characterization of active lesions in serial MR data. Medical Image Analysis, 4 (1). pp. 31-42. ISSN 1361-8415 . (The full text of this publication is not available from this repository)

Gerig, Guido and Welti, Daniel and Guttmann, Charles and Colchester, Alan C. F. and Szekely, Gabor (1998) Exploring the discrimination power of the time domain for segmentation and characterization of lesions in serial MR data. In: 1st International Conference on Medical Image Computing and Computer-Assisted Intervention (MICCAI 98), Oct 11-13, 1998, Cambridge, Massachusetts. (The full text of this publication is not available from this repository)

Glenat, Stephanie and Heutte, Laurent and Paquet, Thierry and Guest, Richard and Fairhurst, Michael and Linnell, Tristan A. (2008) The Development of a computer-assisted tool for the assessment of neuropsychological drawing tasks. International Journal of Information Technology & Decision Making, 7 (4). pp. 751-767. ISSN 0219-6220. (The full text of this publication is not available from this repository)

Guest, Richard and Fairhurst, Michael and Potter, Jonathan (2000) Automated extraction of image segments from clinically diagnostic hand-drawn geometric shapes. Proceedsings of the 26th Euromicro Conference, Vols I and II . A440-A446. ISSN 1089-6503 . (The full text of this publication is not available from this repository)

Guest, Richard and Fairhurst, Michael and Potter, Jonathan and Donnelly, Nick (2000) Analysing constructional aspects of figure completion for the diagnosis of visuospatial neglect. International Conference on Pattern Recognition, 4 . pp. 316-319. ISSN 1051-4651. (The full text of this publication is not available from this repository)

Haas, S. and Thornley, D.A. and Zhu, M. and Dobinson, R.W. and Heeley, R. and Madsen, N.A.H. and Martin, B. (1998) Results from the Macrame 1024 node switching network. In: International Conference on Computing in High Energy Physics (CHEP 97), Apr 07-11, 1997 , Berlin, Germany. (The full text of this publication is not available from this repository)

Haas, S. and Thornley, D.A. and Zhu, M. and Dobinson, R.W. and Martin, B. (1998) The Macrame 1024 node switching network. Microprocessors and Microsystems, 21 (7-8). pp. 511-518. ISSN 0141-9331. (The full text of this publication is not available from this repository)

Hanna, Keith (1998) Reasoning about imperfect digital systems. In: Moller, Bernhard Moller and Tucker, John V, eds. Prospects for Hardware Foundations. Lecture Notes in Computer Science, 1546 . Springer-Verlag Berlin, Berlin, pp. 333-355. ISBN 0302-9743. (The full text of this publication is not available from this repository)

Hanna, Keith (2000) Reasoning about analog-level implementations of digital systems. Formal Methods in System Design, 16 (2). pp. 127-158. ISSN 0925-9856. (The full text of this publication is not available from this repository)

Hanna, Keith and Daeche, Neil (1992) The Veritas Design Logic - a Users View. IFIP Transactions A-Computer Science And Technology , 10 . pp. 301-310. ISSN 0926-5473 . (The full text of this publication is not available from this repository)

Hanna, Keith and Daeche, Neil (1992) The Veritas Design Logic - a Users View. In: International Conf on Theorem Provers in Circuit Design : Theory, Practice and Experience, June 22-24, 1992, Nijmegen, Netherlands. (The full text of this publication is not available from this repository)

Hanna, Keith and Daeche, Neil and Howells, Gareth (1992) Implementation of the Veritas Design Logic. In: International Conference On Theorem Provers in Circuit Design : Theory, Practice And Experience. IFIP Transactions A-Computer Science and Technology , 10. Elsevier Science BV , Nijmegen, Netherlands pp. 77-94. ISBN 0-444-89686-4. (The full text of this publication is not available from this repository)

Hedges, Mark and Jordanous, Anna and Dunn, Stuart and Roueché, Charlotte and Kuster, Marc W and Selig, Thomas and Bittorf, Michael and Artes, Waldemar (2012) New models for collaborative textual scholarship. In: 6th IEEE International Conference on Digital Ecosystems Technologies (DEST 2012), 2012, Campione d'Italia, Switzerland. (Full text available)
[img]
Preview

Hernandez-Castro, Julio C. and Boiten, Eerke (2014) Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014 (2). pp. 5-8. ISSN 1361-3723. (Full text available)
[img]
Preview

Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Peris-Lopez, Pedro and Ribagorda, Arturo (2008) Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. Journal of Information Science and Engineering, 24 (5). pp. 1485-1504. ISSN 1530-9827. (Access to this publication is restricted)
[img]

Hernandez-Castro, Julio C. and Estévez-Tapiador, Juan M. and Peris-Lopez, Pedro and Clark, John A. and Talbi, El-Ghazali (2012) Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. International Journal of Foundations of Computer Science, 23 (2). pp. 543-553. ISSN 0129-0541 . (Access to this publication is restricted)
[img]

Hernandez-Castro, Julio C. and Tapiador, Juan E. and Palomar, Esther and Romero-Gonzalez, Angel (2010) Blind Steganalysis of Mp3stego. Journal of Information Science and Engineering, 26 (5). pp. 1787-1799. ISSN 1530-9827. (Access to this publication is restricted)
[img]

Hesketh, Richard (1991) Perly - unix with buttons. Software: Practice and Experience, 21 (11). pp. 1165-1187. ISSN 0038-0644. (The full text of this publication is not available from this repository)

Hill, Steve (1995) Parallel imperative functional programming. In: 18th Technical Meeting of the World-occam-and-Transputer-User-Group (WoTUG-18), Manchester, England. (The full text of this publication is not available from this repository)

Hill, Steve (1995) The Lazy Z-Buffer. Information Processing Letters, 55 (2). pp. 65-70. ISSN 0020-0190. (The full text of this publication is not available from this repository)

Hobbs, M.H.W. (2000) Email groups for learning and assessment. In: 5th Annual SIGCSE/SIGCUE Conference on Innovation and Technology in Computer Science Education (ITICSE 2000), JUL 11-13, 2000, Helsinki, Finland. (The full text of this publication is not available from this repository)

Holden, Nicholas and Freitas, Alex A. (2008) Improving the performance of hierarchical classification with swarm intelligence. In: 6th European Conference on Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, March 26th - 28th 2008, Naples, Italy. (The full text of this publication is not available from this repository)

Hopkins, Tim (1992) Remark on Algorithm-540. Acm Transactions on Mathematical Software, 18 (3). pp. 343-344. ISSN 0098-3500. (The full text of this publication is not available from this repository)

Hopkins, Tim (1996) Restructuring software: A case study. Software: Practice and Experience, 26 (8). pp. 967-982. ISSN 0038-0644. (Full text available)
[img]
Preview
[img]
Preview

Hopkins, Tim and Welch, Peter H. (1996) Transputer data-flow solution for systems of linear equations. Concurrency-Practice and Experience, 8 (8). pp. 569-580. ISSN 1040-3108. (The full text of this publication is not available from this repository)

Hou, Peixin and Hojjatoleslami, Ali and Petrou, Maria and Underwood, Craig Ian and Kittler, Josef (1998) Improved JPEG coding for remote sensing. In: International Conference on Pattern Recognition, 1998, Brisbane. (The full text of this publication is not available from this repository)

Howe, Jacob M. and King, Andy (2000) Abstracting numeric constraints with Boolean functions. Information Processing Letters, 75 (1-2). pp. 17-23. ISSN 0020-0190. (Full text available)
[img]
Preview
[img]

Howells, Gareth and Fairhurst, Michael and Bisset, D.L. (1995) BCN - A Novel Network Architecture for ram-Based Neurons. Pattern Recognition Letters, 16 (3). pp. 297-303. ISSN 0167-8655. (The full text of this publication is not available from this repository)

Howells, Gareth and Fairhurst, Michael and Bisset, D.L. (1994) BCN - an Architecture for Weightless Ram-Base Neural Networks. In: 1994 IEEE International Conference on Neural Networks (ICNN 94) - 1st IEEE World Congress on Computational Intelligence, Orlando, Fl. (The full text of this publication is not available from this repository)

Howells, Gareth and Fairhurst, Michael and Bisset, D.L. (1995) PCN: The Probabilistic Convergence Network. In: 1995 IEEE International Conference on Neural Networks (ICNN 95), Perth, Australia. (The full text of this publication is not available from this repository)

Howells, Gareth and Fairhurst, Michael and Rahman, Fuad (2000) An exploration of a new paradigm for weightless RAM-based neural networks. Connection Science, 12 (1). pp. 65-90. ISSN 0954-0091. (The full text of this publication is not available from this repository)

Ibbetson, Alan L. and Linington, Peter F. and Penny, Ian and Smith, Abraham B. and Tripp, Gerald (1996) Reducing the cost of remote procedure call. In: IFIP/IEEE International Conference on Distributed Platforms, FEB, 1996, Dresden, Germany. (The full text of this publication is not available from this repository)

Iqbal, Musaddar and Freitas, Alex A. and Johnson, Colin G. (2008) Protein interaction inference using particle swarm optimization algorithm. In: 6th European Conference on Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, March 26th - 28th 2008, Naples, Italy. (The full text of this publication is not available from this repository)

Jordanous, Anna (2011) Computer Models of Musical Creativity? A review of Cope (2005). Review of: Computer Models of Musical Creativity. David Cope (2005). MIT Press by UNSPECIFIED. AISB Quarterly, 132 (-). p. 10. ISSN 1476-3036. (Full text available)
[img]
Preview

Jordanous, Anna (2009) Conference Report: The Fourth Conference on Interdisciplinary Musicology (CIM08). Review of: Fourth Conference on Interdisciplinary Musicology, 2008 (CIM08) by UNSPECIFIED. AISB Quarterly, 128 (-). pp. 8-9. ISSN 1476-3036. (Full text available)
[img]
Preview

Jordanous, Anna (2010) Conference Review: Empirical approaches to Performance: Empirical Musicology II conference (25-26 March 2010, School of Music, University of Leeds, UK). Review of: Empirical approaches to Performance: Empirical Musicology II conference 2010 by UNSPECIFIED. Excursions, 1 (1). p. 1. ISSN 2044-4095. (The full text of this publication is not available from this repository)

Jordanous, Anna (2012) Evaluating computational creativity: a standardised procedure for evaluating creative systems and its application. Doctor of Philosophy (PhD) thesis, University of Sussex. (Full text available)
[img]
Preview

Jordanous, Anna (2011) Evaluating evaluation: Assessing progress in computational creativity research. In: International Conference on Computational Creativity 2011, 2011, Mexico City, Mexico. (Full text available)
[img]
Preview

Jordanous, Anna (2009) Evaluating machine creativity. In: Seventh ACM conference on Creativity and cognition, 2009, Berkeley, CA. (Full text available)
[img]
Preview

Jordanous, Anna (2013) Introducing Computational Creativity Research. . CreativityPost.com Internet. (The full text of this publication is not available from this repository)

Jordanous, Anna (2014) Review. Review of: Digital Da Vinci: Computers in the Arts and Sciences (2014, Springer) by UNSPECIFIED. ACM Computing Reviews . p. 1. (Submitted) (The full text of this publication is not available from this repository)

Jordanous, Anna (2013) Review: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. Type: Proceedings. Review of: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. by UNSPECIFIED. ACM Computing Reviews . CR141093. ISSN 1308-0745. (The full text of this publication is not available from this repository)

Jordanous, Anna (2007) Score following: An artificially intelligent musical accompanist. Master of Science (MSc) thesis, University of Edinburgh, UK.. (Full text available)
[img]
Preview

Jordanous, Anna (2012) A Standardised Procedure for Evaluating Creative Systems: Computational Creativity Evaluation Based on What it is to be Creative. Cognitive Computation, 4 (3). pp. 246-279. ISSN 1866-9956. (The full text of this publication is not available from this repository)

Jordanous, Anna (2014) What is Computational Creativity? . CreativityPost.com Online web platform. (The full text of this publication is not available from this repository)

Jordanous, Anna and Allington, Daniel and Dueck, Byron (2014) Using online networks to analyse the value of electronic music. In: International Conference on Computational Creativity, 2014, Ljubljana, Slovenia. (Full text available)
[img]
Preview

Jordanous, Anna and Keller, Bill (2012) Creativity Ontology. http://purl.org/creativity/ontology. (Full text available)
[img]

Jordanous, Anna and Keller, Bill (2012) Weaving creativity into the Semantic Web: a language-processing approach. In: International Conference on Computational Creativity 2012, 2012, Dublin, Ireland. (Full text available)
[img]
Preview

Jordanous, Anna and Lawrence, K Faith and Hedges, Mark and Tupman, Charlotte (2012) Exploring manuscripts: sharing ancient wisdoms across the semantic web. In: International Conference on Web Intelligence, Mining and Semantics, 2012, Craiova, Romania. (Full text available)
[img]
Preview

Jordanous, Anna and Lawrence, K. Faith and Tupman, Charlotte (2013) Sharing Ancient Wisdoms: Dataset. RDF. Located at: http://www.ancientwisdoms.ac.uk/library/data/. (The full text of this publication is not available from this repository)

Jordanous, Anna and Roueché, Charlotte and Tupman, Charlotte and Lawrence, K. Faith and Hedges, Mark and Wakelnig, Elvira and Searby, Denis (2013) Sharing Ancient Wisdoms (SAWS) ontology. http://www.ancientwisdoms.ac.uk/. (Full text available)
[img]

Jordanous, Anna and Smaill, Alan (2008) Artificially intelligent accompaniment using Hidden Markov Models to model musical structure. In: Conference on Interdisciplinary Musicology, 2008, Thessaloniki, Greece. (Full text available)
[img]
Preview

Jordanous, Anna and Smaill, Alan (2009) Investigating the role of score following in automatic musical accompaniment. Journal of New Music Research, 38 (2). pp. 197-209. ISSN 0929-8215. (Full text available)
[img]

Jordanous, Anna and Stanley, Alan and Tupman, Charlotte (2012) Contemporary transformation of ancient documents for recording and retrieving maximum information: when one form of markup is not enough. In: Balisage: The Markup Conference 2012. Balisage Series on Markup Technologies (The full text of this publication is not available from this repository)

Jordanous, Anna and Tupman, Charlotte (2013) Sharing Ancient Wisdoms - supporting code. ancientwisdoms.ac.uk XSLT stylesheets. (The full text of this publication is not available from this repository)

Jordanous, Anna and Tupman, Charlotte and Stanley, Alan (2013) Contemporary solutions to retrieve and publish information in ancient documents using RDF and Islandora. In: Digital Humanities 2013, 2013, Lincoln, Nebraska. (The full text of this publication is not available from this repository)

Justo, George R. R. and Welch, Peter H. (1992) Serialization as a Paradigm for the Engineering of Parallel Programs. In: Etiemble, D. and Syre, J.C., eds. Parle 92 : Parallel Architectures And Languages Europe. Lecture Notes in Computer Science, 605. Springer-Verlag Berlin, Berlin, Berlin pp. 975-976. ISBN 3-540-55599-4 . (The full text of this publication is not available from this repository)

Justo, George R. R. and Welch, Peter H. (1993) Serialization as a paradigm for the engineering of parallel programs. Computers and Artificial Intelligence, 12 (3). pp. 229-249. ISSN 0232-0274. (The full text of this publication is not available from this repository)

Kahrs, Stefan and Sannella, Don (1998) Reflections on the design of a specification language. In: Astesiano, Egidio, ed. Lecture Notes in Computer Science. Springer-Verlag Berlin pp. 154-170. ISBN 3-540-64303-6. (The full text of this publication is not available from this repository)

Kaijian, Shi and Jian, Sun (1991) A relational graphical editing method for PCB design. Computer-Aided Design, 23 (1). pp. 92-94. ISSN 0010-4485. (The full text of this publication is not available from this repository)

Kalli, Kyriacos and Jackson, David A. (1995) Dynmic-Response of High-Resolution Ring-Resonator Optical Spectrometers to time-Varing Input Signals. In: UNSPECIFIED. (The full text of this publication is not available from this repository)

Kalli, Kyriacos and Rao, Yun Jiang and Webb, David J. and Jackson, David A. (1995) Potential of fibre optic point and distributed fibre optic sensors for structural monitoring. In: 7th Conference on Sensors and Their Applications, Dublin, Ireland. (The full text of this publication is not available from this repository)

Kemp, Zarine P. (1995) Multimedia and Spatial Information Systems. IEEE Multimedia, 2 (4). pp. 68-76. ISSN 1070-986X. (The full text of this publication is not available from this repository)

Kemp, Zarine P. and Kowalczyk, Arek (1994) Incorporating the Temporal Dimension in a GIS. In: 1st National Conference on GIS Research - UK, Keele, England. (The full text of this publication is not available from this repository)

Kemp, Zarine P. and Oxborrow, Elizabeth and Davy, M.J. and Linington, Peter F. and Thearle, R. and Blair, Gordon S. and Dark, P. and Davies, N.A. and Mariani, John A. and Snape, C. (1992) Zenith System for Object Management In Distributed Multimedia Design Environments. Information and Software Technology, 34 (7). pp. 427-436. ISSN 0950-5849. (The full text of this publication is not available from this repository)

Khalil, Omar and Hernandez-Castro, Julio C. and Asis, Benjamon (2013) A study on the false positive rate of Stegdetect. Digital Investigation, 9 (3). pp. 235-245. ISSN 1742-2876. (Full text available)
[img]
Preview

Laborde, Romain and Kamel, Michel and Barrere, Francois and Benzekri, Abdelmalek (2007) Implementation of a formal security policy refinement process in WBEM architecture. Journal of Network and Systems Management,, 15 (2). pp. 241-266. ISSN 1064-7570 . (The full text of this publication is not available from this repository)

Laffey, Des (2007) Paid search: The innovation that changed the Web. Business Horizons, 50 (3). pp. 211-218. ISSN 0007-6813. (The full text of this publication is not available from this repository)

Laffey, Des (2007) The ultimate bluff: a case study of partygaming.com. Journal of Information Technology, 22 (4). pp. 479-488. ISSN 0268-3962 . (The full text of this publication is not available from this repository)

Lam, K.P. and Horne, E. (1993) Enhanced Kernel Estimation Technique For Pattern-Classification. Electronics Letters, 29 (24). pp. 2130-2131. ISSN 0013-5194. (The full text of this publication is not available from this repository)

Lam, K.P. and Horne, E. (1993) Novel Technique To Combine Bws And Fws Classifiers. Electronics Letters, 29 (19). pp. 1702-1704. ISSN 0013-5194. (The full text of this publication is not available from this repository)

Lamb, John D. (1998) A note on the weighted matching with penalty problem. Pattern Recognition Letters, 19 (3-4). pp. 261-263. ISSN 0167-8655. (The full text of this publication is not available from this repository)

Langford, Duncan and Brown, Peter J. (1993) Creating hypertext documents - Is it worth the effort. Aslib Proceedings, 45 (4). pp. 91-95. ISSN 0001-253X. (The full text of this publication is not available from this repository)

Lauder, Anthony and Dumas, Marlon and Frohner, Akos and Oliver, Ian (2000) PhDOOS 2000: The 10th Ph.D. workshop on object-oriented systems. In: Malaenfant, Jacques and Moisan, Sabine and Moreira, Ana, eds. Object-Oriented Technology: Ecoop 2000 Workshop Reader: Ecoop 2000 Workshops, Panels, and Posters Sophia Antipolis and Cannes, France, June 12-16, 2000 Proceedings. Lecture Notes in Computer Science, 1964 . Springer Verlag Berlin, pp. 78-92. ISBN 3-540-41513-0. (The full text of this publication is not available from this repository)

Lee, Howard and Kemp, Zarine P. (1997) Towards a multiple placement land suitability evaluation framework. In: 7th International Symposium on Spatial Data Handling (SDH 96), 1996, Delft, Netherlands. (The full text of this publication is not available from this repository)

Leech, Helen K. and Kemp, Zarine P. (1998) Supporting complex spatiotemporal analysis in GIS. In: Carver, S., ed. Investigation in GIS5. Taylor & Francis Ltd pp. 151-161. ISBN 0-7484-0810-X. (The full text of this publication is not available from this repository)

Lins, Rafael D. (1992) A Multiprocessor Shared Memory Architecture for Parallel Cyclic Reference Counting. In: 18th Symposium On Microprocessing And Microprogramming ( Euromicro-92 ) : Software And Hardware : Specification And Design. Microprocessing And Microprogramming ( Euromicro-92 ) : Software And Hardware : Specification And Design, 35. Elsevier Science Bv, Paris, France pp. 563-568. (The full text of this publication is not available from this repository)

Lins, Rafael D. and Neto, Mario Guimaraes and Neto, Leopoldo Franca and Rosa, Luciano Galdino (1994) An environment for processing images of historical documents. Microprocessing and Microprogramming, 40 (10-12). pp. 939-942. ISSN 0165-6074. (The full text of this publication is not available from this repository)

Liu, Yang and Kwok, Yu-Kwong and Wang, Jiangzhou (2007) An adaptive packet scheduling algorithm for efficient downlink bandwidth allocation in UWB based wireless infrastructure networks. Computer Communications, 30 (9). pp. 2087-2095. ISSN 0140-3664. (The full text of this publication is not available from this repository)

Liu, Yang and Kwok, Yu-Kwong and Wang, Jiangzhou (2008) Downlink TCP performance under cross layer rate and power allocation in infrastructure TH-PPM UWB networks. Journal of Supercomputing, 44 (3). pp. 199-216. ISSN 0920-8542. (The full text of this publication is not available from this repository)

Mansfield, Elizabeth L. (1996) The differential algebra package diffgrob2. Mapletech, 3 (2). pp. 33-37. ISSN 1061-5733. (The full text of this publication is not available from this repository)

Mansfield, Elizabeth L. and Clarkson, Peter (1997) Applications of the differential algebra package diffgrob2 to classical symmetries of differential equations. Journal of Symbolic Computation, 23 (5-6). pp. 517-533. ISSN 0747-7171. (The full text of this publication is not available from this repository)

Mansfield, Elizabeth L. and Clarkson, Peter (1997) Symmetries and exact solutions for a 2+1-dimensional shallow water wave equation. Mathematics and Computers in Simulation, 43 (1). pp. 39-55. ISSN 0378-4754. (The full text of this publication is not available from this repository)

Mansfield, Elizabeth L. and Reid, G.J. and Clarkson, Peter (1998) Nonclassical reductions of a 3+1-cubic nonlinear Schrodinger system. Computer Physics Communications, 115 (2-3). pp. 460-488. ISSN 0010-4655. (The full text of this publication is not available from this repository)

Minelly, S. and Kelly, Stephen W. and Bahra, R. (1996) Clinical trial of the non-invasive recording of His-Purkinje system signals. In: 23rd Annual Scientific Meeting on Computers in Cardiology, Sep 08-11, 1996, Indianapolis, In. (The full text of this publication is not available from this repository)

Mingers, John (2014) Problems with SNIP. Journal of Informetrics, 8 (4). pp. 890-894. ISSN 1751-1577. (Full text available)
[img]
Preview

Mingers, John (2002) Real-izing Information Systems: Critical Realism as an Underpinning Philosophy for Information Systems. In: International Conference on Information Systems, December 15-18th 2002, Barcelona. (The full text of this publication is not available from this repository)

Mirlohi, H.R. and Kelly, Stephen W. and Manley, Maxwell C. G. (1994) New technique for assessment of velopharyngeal function. Medical and Biological Engineering and Computing, 32 (5). pp. 562-566. ISSN 0140-0118. (The full text of this publication is not available from this repository)

Mitrokotsa, Aikaterini and Dimitrakakis, Christos and Peris-Lopez, Pedro and Hernandez-Castro, Julio C. (2010) Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters, 14 (2). pp. 121-123. ISSN 1089-7798. (Full text available)
[img]
Preview

Montanari, Carlos A. and Tute, M.S. and Beezer, Anthony E. and Mitchell, John C. (1996) Determination of receptor-bound drug conformations by QSAR using flexible fitting to derive a molecular similarity index. Journal of Computer-Aided Molecular Design, 10 (1). pp. 67-73. ISSN 0920-654X. (The full text of this publication is not available from this repository)

Moores, James (1999) CCSP - A portable CSP-based run-time system supporting C and occam. In: Cook, Barry M., ed. Concurrent Systems Engineering Series. Concurrent Systems Engineering Series, 57. I O S Press, Netherland pp. 147-168. ISBN 90-5199-480-X. (The full text of this publication is not available from this repository)

Mudelsee, Manfred (2000) Ramp function regression: a tool for quantifying climate transitions. Computers and Geosciences, 26 (3). pp. 293-307. ISSN 0098-3004. (The full text of this publication is not available from this repository)

Nawaz, Sarfraz and Efstratiou, Christos and Mascolo, Cecilia (2013) ParkSense: A Smartphone Based Sensing System For On-Street Parking. In: Proceedings of the 19th ACM International Conference on Mobile Computing and Networking (MOBICOM 2013), September 2013, Miami, FL, USA. (Full text available)
[img]
Preview

Nieto-Barajas, Luis E. and Walker, Stephen G. (2007) A Bayesian semi-parametric bivariate failure time model. Computational Statistics and Data Analysis, 51 (12). pp. 6102-6113. ISSN 0167-9473 . (The full text of this publication is not available from this repository)

Nitsos, Kallikratidas and Dagiuklas, Tasos and Al-Raweshidy, Hamed S. (2000) High Speed Wireless Internet Access: Combination of MPLS and BRAN HIPERLAN/2 technologies. In: IFIP-TC6/European Commission International Conference, May 14-19, 2000, Paris, France. (The full text of this publication is not available from this repository)

Oshea, P.J. and Wilson, E. (1997) European law databases: an experiment in retrieval. In: Wagner, R., ed. : Database and Expert Systems Applications, 1997. Proceedings., Eighth International Workshop on. I.E.E.E, Computer Soc Press pp. 227-232. ISBN 0-8186-8148-9. (The full text of this publication is not available from this repository)

Osman, Ibrahim H. (1999) A unified-metaheuristic framework. In: 12th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE-99), May 31-Jun 03, 1999, Cairo, Egypt. (The full text of this publication is not available from this repository)

Otero, Fernando E.B. and Masegosa, Antonio D. and Terrazas, Germán (2014) Thematic issue on advances in nature inspired cooperative strategies for optimization. Memetic Computing, 6 (3). pp. 147-148. ISSN 1865-9284. (The full text of this publication is not available from this repository)

Paar, C. and Fleischmann, Peter and Soria-Rodriguez, P. (1999) Fast arithmetic for public-key algorithms in Galois fields with composite exponents. IEEE Transactions on Computers, 48 (10). pp. 1025-1034. ISSN 0018-9340. (The full text of this publication is not available from this repository)

Palomar, Esther and Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Secure content access and replication in pure P2P networks. Computer Communications, 31 (2). pp. 266-279. ISSN 0140-3664. (Access to this publication is restricted)
[img]

Pang, P.C.W and Pepper, Matthew G. and Ducker, D.A (1995) Monitoring respiratory activity in neonates using diaphragmatic electromyograph. Medical and Biological Engineering and Computing, 33 (3). pp. 385-390. ISSN 0140-0118. (The full text of this publication is not available from this repository)

Pappa, Gisele L. and Freitas, Alex A. (2007) Discovering new rule induction algorithms with grammar-based genetic programming. In: Maimon, Oded and Rokach, Lior, eds. Soft Computing for Knowledge Discovery and Data Mining. Springer, New York, pp. 133-152. ISBN 9780387699349. (The full text of this publication is not available from this repository)

Paschalakis, Stavros and Fairhurst, Michael and Allgrove, C. (1999) Wordlength estimation for the enhancement of hand-written word recognition. In: 7th IEE Conference on Image Processing and its Applications (IPA99), Jul 12-15, 1999, Manchester, England. (The full text of this publication is not available from this repository)

Paschalakis, Stavros and Lee, Peter (2000) Combined geometric transformation and illumination invariant object recognition in RGB color images. In: 15th International Conference on Pattern Recognition (ICPR-2000), Sep 03-07 2000, Barcelona, Spain. (The full text of this publication is not available from this repository)

Paschalakis, Stavros and Lee, Peter (1999) Pattern recognition in grey level images using moment based invariant features. In: 7th IEE Conference on Image Processing and its Applications (IPA99), Jul 12-15, 1999, Manchester, England. (The full text of this publication is not available from this repository)

Paschalakis, Stavros and Lee, Peter (2000) Statistical pattern recognition using the Normalized Complex Moment Components vector. Advances in Pattern Recognition , 1876 . pp. 532-539. ISSN 0302-9743 . (The full text of this publication is not available from this repository)

Pascoe, Jason (1998) Adding generic contextual capabilities to wearable computers. In: 2nd International Symposium on Wearable Computers. Ieee Computer Soc pp. 92-99. ISBN 0-8186-9074-7. (Full text available)
[img] [img]
Preview

Pascoe, Jason and Ryan, Nick S. and Morse, David R. (1999) Issues in developing context-aware computing. In: 1st International Symposium on Handheld and Ubiquitous Computing (HUC 99), Sep 27-29, 1999, Karlsruhe, Germany. (The full text of this publication is not available from this repository)

Pearson, J.K and Bisset, D.L. (1994) Neural Networks in the Clifford Domain. 1994 IEEE International Conference on Neural Networks, 1-7 . pp. 1465-1469. (The full text of this publication is not available from this repository)

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2009) Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards and Interfaces, 31 (2). pp. 372-380. ISSN 0920-5489. (Access to this publication is restricted)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2009) LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards and Interfaces, 31 (1). pp. 88-97. ISSN 0920-5489. (Access to this publication is restricted)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2009) An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. Journal of Information Science and Engineering, 25 (1). pp. 33-57. ISSN 1530-9827. (Access to this publication is restricted)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Tapiador, Juan E. and Li, Tieyan and Li, Yingjiu (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54 (9). pp. 1502-1508. ISSN 1389-1286. (Access to this publication is restricted)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Tapiador, Juan E. and van der Lubbe, Jan C. A. (2011) Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence, 24 (6). pp. 1061-1069. ISSN 0952-1976. (Access to this publication is restricted)
[img]

Peris-Lopez, Pedro and Li, Tieyan and Hernandez-Castro, Julio C. (2010) Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Transactions on information and systems, E93-D (3). pp. 518-527. ISSN 1745-1353. (Full text available)
[img]
Preview

Peris-Lopez, Pedro and Li, Tieyan and Hernandez-Castro, Julio C. and Tapiador, Juan E. (2009) Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Computer Communications, 32 (7-10). pp. 1185-1193. ISSN 0140-3664. (Access to this publication is restricted)
[img]

Peris-Lopez, Pedro and Orfila, Agustin and Hernandez-Castro, Julio C. and van der Lubbe, Jan C. A. (2011) Flaws on RFID grouping-proofs. Guidelines for future sound protocols. Journal of Network and Computer Applications, 34 (3). pp. 833-845. ISSN 1084-8045. (Access to this publication is restricted)
[img]

Peris-Lopez, Pedro and Orfila, Agustin and Palomar, Esther and Hernandez-Castro, Julio C. (2012) A secure distance-based RFID identification protocol with an off-line back-end database. Personal and Ubiquitous Computing, 16 (3). pp. 351-365. ISSN 1617-4909. (Access to this publication is restricted)
[img]

Picazo Sanchez, Pablo and Martin, Lara and Peris-Lopez, Pedro and Hernandez-Castro, Julio C. (2013) Cryptanalysis of the RNTS system. The Journal of Supercomputing, 65 (2). pp. 949-960. ISSN 0920-8542. (Full text available)
[img]
Preview

Pinto, Paulo F. and Linington, Peter F. (1994) A language for the specification of interactive and distributed multimedia applications. In: DeMeer, J. and Mahr, B. and Storp, S., eds. Open Distributed Processing II. IFIP Transactions C-Communication Systems , 20 . Elsevier Science Ltd, Oxford, pp. 247-264. ISBN 0-444-81861-8. (The full text of this publication is not available from this repository)

Polimon, Javier and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2008) Automated design of a lightweight block cipher with Genetic Programming. International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Too, 12 (1). pp. 3-14. ISSN 1327-2314. (Full text available)
[img]
Preview

Poll, Erik and Thompson, Simon (2000) Integrating Computer Algebra and Reasoning through the Type System of Aldor. In: 3rd International Workshop on Frontiers of Combining Systems (FroCoS 2000), MAR 22-24, 2000 , Nancy, France. (Full text available)
[img]
Preview

Poll, Erik and Zwanenburg, J. (1999) A logic for abstract data types as existential types. In: 4th International Conference on Typed Lambda Calculi and Applications (TLCA 99), Apr 07-09, 1999, Laquila, Italy. (Full text available)
[img]
Preview
[img]
Preview

Poole, Michael D. (1996) Occam for all - Two approaches to retargeting the INMOS compiler. In: 19th World-Occam-and-Transputer-User-Group Technical Meeting - Parallel Processing Developments (WoTUG-19), Mar 31-Apr 03, 1996, Nottingham, England. (The full text of this publication is not available from this repository)

Poole, Michael D. (1995) Using records and pointers with occam 2.1. In: Nixon, Paddy and Transputer User, Grp, eds. Transputer and Occam Developments. Transputer & Occam Engineering Series, 44 . IOS Press, Amsterdam, pp. 151-162. ISBN 90-5199-222-X. (The full text of this publication is not available from this repository)

Rachuri, Kiran and Efstratiou, Christos and Leontiadis, Ilias and Mascolo, Cecilia and Rentfrow, Peter J. (2013) METIS: Exploring mobile phone sensing offloading for efficiently supporting social sensing applications. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PERCOM 2013). (Full text available)
[img]
Preview

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) A comparative study of decision combination strategies for a novel multiple-expert classifier. In: Sixth International Conference on Image Processing and its Applications, Dublin, Ireland. (The full text of this publication is not available from this repository)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) A comparative study of two different multiple expert architectures for robust object recognition. Machine Vision Applications, Architectures & Systems Integra . Spie - Int Soc Optical Engineering, USA, 296 pp. ISBN 0-8194-2637-7. (The full text of this publication is not available from this repository)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) A new hybrid approach in combining multiple experts to recognise handwritten numerals. Pattern Recognition Letters, 18 (8). pp. 781-790. ISSN 0167-8655. (The full text of this publication is not available from this repository)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1998) An evaluation of multi-expert configurations for the recognition of handwritten numerals. Pattern Recognition, 31 (9). pp. 1255-1273. ISSN 0031-3203. (The full text of this publication is not available from this repository)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1999) Automatic self-configuration of a novel multiple-expert classifier using a genetic algorithm. In: 7th IEE Conference on Image Processing and its Applications (IPA99), Jul 12-15, 1999, Manchester, England. (The full text of this publication is not available from this repository)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) Building multiple prototype classifiers for handwritten character recognition using automatic statistical clustering techniques. In: Sixth International Conference on Image Processing and its Applications, Dublin, Ireland. (The full text of this publication is not available from this repository)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (2000) Comparison of some multiple expert strategies: An investigation of resource prerequisites and achievable performance. In: 15th International Conference on Pattern Recognition (ICPR-2000), SEP 03-07, 2000, Barcelona, Spain. (The full text of this publication is not available from this repository)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1999) Enhancing multiple expert decision combination strategies through exploitation of a priori information sources. IEE Proceedings: Vision Image and Signal Processing, 146 (1). pp. 40-49. ISSN 1350-245X. (The full text of this publication is not available from this repository)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) Introducing new multiple expert decision combination topologies: A case study using recognition of handwritten characters. I E E E, Computer Soc Press, Los Alamitos, CA, 1200 pp. ISBN 0-8186-7899-2. (The full text of this publication is not available from this repository)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) Selective partition algorithm for finding regions of maximum pairwise dissimilarity among statistical class models. Pattern Recognition Letters, 18 (7). pp. 605-611. ISSN 0167-8655. (The full text of this publication is not available from this repository)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1999) Serial combination of multiple experts: A unified evaluation. Pattern Analysis & Applications, 2 (4). pp. 292-311. ISSN 1433-7541. (The full text of this publication is not available from this repository)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael and Hoque, Sanaul and Paschalakis, Stavros (1999) A novel multiple-expert approach to the recognition of handwritten words extracted from British cheques. In: 7th IEE Conference on Image Processing and its Applications (IPA99), Jul 12-15, 1999, Manchester, England. (The full text of this publication is not available from this repository)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael and Lee, Peter (1998) Design considerations in the real-time implementation of multiple expert image classifiers within a modular and flexible multiple-platform design environment. Real-Time Imaging, 4 (5). pp. 361-376. ISSN 1077-2014. (The full text of this publication is not available from this repository)

Read, Dwight and Fischer, Michael D. and Lehman, F. K. (Chit Hlaing) (2014) The Cultural Grounding of Kinship: A Paradigm Shift. L'Homme, 2 (210). pp. 63-89. ISSN 9782713224430. (The full text of this publication is not available from this repository)

Rio, Miguel and Linington, Peter F. (2000) Distributed Quality of Service Multicast Routing with Multiple Metrics for Receiver initiated Joins. In: 8th IEEE International Conference on Networks (ICON 2000), Sep 05-08, 2000, NATL Univ Singapore, Singapore. (Full text available)
[img]
Preview

Ritson, Carl G. and Ugawa, Tomoharu and Jones, Richard E. (2014) Exploring Garbage Collection with Haswell Hardware Transactional Memory. In: ACM/SIGPLAN International Symposium on Memory Management (ISMM14), 12 June 2014, Edinburgh, UK. (In press) (Full text available)
[img]
Preview

Rizzo, Mike (1994) Using Producer and Consumer Manipulators to Extend Stream I/O Formatting in C++. Sigplan Notices, 29 (3). pp. 33-35. ISSN 0362-1340. (The full text of this publication is not available from this repository)

Roberts, Jonathan C. (1998) On encouraging multiple views for visualization. In: Banissi, Ebad and Khosrowshahi, F. and Sarfraz, Muhammad, eds. IEEE Conference on Information Visualization - Proceedings. IEEE Conference on Information Visualization - Proceedings. IEEE Computer Soc, Los Alamitos, CA, USA , Los Alamitos, CA, USA pp. 8-14. ISBN 0-8186-8509-3. (Full text available)
[img] [img]
Preview

Roberts, Jonathan C. (1998) Waltz - An exploratory visualization tool for volume data, using multiform abstract displays. In: Erbacher, Robert F. and Pang, Alex, eds. Visual Data Exploration and Analysis V, Proceedings of SPIE. Proceedings of the Society of Photo-Optical Instrumentation Engineers (SPIE), 3298. SPIE -Int Soc Optical Engineering, Bellingham, WA USA , Bellingham, Washington, USA pp. 112-122. ISBN 0-8194-2738-1. (Full text available)
[img]
Preview

Roberts, Jonathan C. and Hill, Steve (1999) Piecewise linear hypersurfaces using the Marching Cubes Algorithm. In: Conference on Visual Data Exploration and Analysis VI, Jan 27-29, 1999, San Jose, Ca. (Full text available)
[img]
Preview
[img]
Preview

Rodgers, Peter (1998) A graph rewriting programming language for graph drawing. In: 1998 IEEE Symposium on Visual Languages, Proceedings. IEEE Computer Soc, Los Alamitos, CA, USA , Los Alamitos, CA, USA pp. 32-39. ISBN 0-8186-8712-6. (Full text available)
[img]
Preview

Rodgers, Peter (2014) A Survey of Euler Diagrams. Journal of Visual Languages and Computing, 25 (3). pp. 134-155. ISSN 1045-926X. (Full text available)
[img]
Preview

Rodgers, Peter and Baker, Robert and Thompson, Simon and Li, Huiqing (2013) Multi-level Visualization of Concurrent and Distributed Computation in Erlang. In: Visual Languages and Computing (VLC) in The 19th International Conference on Distributed Multimedia Systems (DMS 2013), 8-10 August 2013, Brighton. (Full text available)
[img]
Preview

Rodgers, Peter and Stapleton, Gem and Flower, Jean and Howse, John (2014) Drawing Area-Proportional Euler Diagrams Representing Up To Three Sets. IEEE Transactions on Visualization and Computer Graphics, 20 (1). pp. 56-69. ISSN 1077-2626. (Full text available)
[img]
Preview

Roueché, Charlotte and Searby, Denis and Wakelnig, Elvira and Procházka, Stephan and Hedges, Mark and Lawrence, K. Faith and Jordanous, Anna and Tupman, Charlotte and Lawrence, Keith and Bylund, Måns and Österdahl, Pontus and Dallaji, Ines and Storz, Christoph and Nigst, Lorenz (2013) Sharing Ancient Wisdoms. (The full text of this publication is not available from this repository)

Russell, M. and Hopkins, Tim (1998) CFTP: a caching FTP server. Computer Networks and ISDN Systems, 30 (22-23). pp. 2211-2222. ISSN 0169-7552. (Full text available)
[img]
Preview
[img]
Preview

Ryan, Nick S. and Smith, Dan and Ma, Ling (2006) Acoustic environment as an indicator of social and physical context. Personal and Ubiquitous Computing, 10 (4). pp. 241-254. ISSN 1617-4909. (The full text of this publication is not available from this repository)

Sahami, Mehran and Roach, Steve and Cuadros-Vargas, Ernesto and Danyluk, Andrea and Dodge, Ronald and Fisher, Kathleen and Fincher, Sally and France, Robert and Grossman, Dan and Hawthorne, Beth and Katz, Randy and Kumar, Amruth and LeBlanc, Rich and Reed, Dave and Robinson, Brian H. and Seker, Remzi and Thompson, Alfred (2013) Computer Science Curricula 2013(CS2013). Technical report. ACM Press and IEEE Computer Society Press, New York 10.1145/2534860. (The full text of this publication is not available from this repository)

Salama, Khalid M. and Freitas, Alex A. (2012) ABC-Miner: an ant-based Bayesian classification algorithm. In: Swarm Intelligence: 8th International Conference (ANTS 2012). , September, 2012, Brussels, Belgium. (The full text of this publication is not available from this repository)

Salhi, Said and Farber, Gerrit and Coves, Anna M. (2008) Semi Dynamic Demand in a Non-Permutation Flowshop with Constrained Resequencing Buffers. In: Lirkov, I. and Margenov, S. and Wasniewski, Jerzy, eds. Large-scale Scientific Computing. Lecture Notes in Computer Science. Lecture Notes in Computer Science, 4818 (8). Springer-Verlag, Berlin, pp. 536-544. ISBN 9783540788256. (The full text of this publication is not available from this repository)

Salvy, Bruno and Shackell, John (1999) Symbolic asymptotics: Multiseries of inverse functions. Journal of Symbolic Computation, 27 (6). pp. 543-563. ISSN 0747-7171. (The full text of this publication is not available from this repository)

Sandoval Orozco, A.L. and Arenas, Gonzalez and Rosales, Corripio and Garcia Villalba, L.J. and Hernandez-Castro, Julio C. (2013) Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing, 1 (1). pp. 1-13. ISSN 1436-5057. (Full text available)
[img]
Preview

Scahill, Mark (1997) Distributed individual-based environmental simulation. In: Denzer, Ralf and Swayne, David A. and Schimak, Gerald, eds. Environmental Software Systems (v. 2). IFIP International Federation for Information Processing S., 2 . Chapman & Hall, Dordrecht, pp. 269-276. ISBN 0-412-81740-3. (The full text of this publication is not available from this repository)

Scaparra, Maria Paola and Church, Richard L. (2008) A bilevel mixed-integer program for critical infrastructure protection planning. Computers and Operations Research, 35 (6). pp. 1905-1923. ISSN 0305-0548 . (The full text of this publication is not available from this repository)

Secker, Andrew D. and Davies, Matthew N. and Freitas, Alex A. and Timmis, Jon and Clark, Edward and Flower, Darren R. (2008) An artificial immune system for evolving amino acid clusters tailored to protein function prediction. In: Bentley, Peter J. and Lee, Doheon and Jung, Sungwon, eds. Artificial Immune Systems. Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence . Springer, pp. 242-253. ISBN 978-3-540-85071-7. (The full text of this publication is not available from this repository)

Secker, Andrew D. and Freitas, Alex A. and Timmis, Jon (2008) AISIID: An artificial immune system for interesting information discovery on the web. Applied Soft Computing, 8 (2). pp. 885-905. ISSN 1568-4946. (The full text of this publication is not available from this repository)

Shaddick, G. and Choo, Louise L. and Walker, Stephen G. (2007) Modelling correlated count data with covariates. Journal of Statistical Computational and Simulation, 77 (11-12). pp. 945-954. ISSN 0094-9655 . (The full text of this publication is not available from this repository)

Sharaiha, Y.M. and Gendreau, M. and Laporte, Gilbert and Osman, Ibrahim H. (1997) A tabu search algorithm for the capacitated shortest spanning tree problem. Networks, 29 (3). pp. 161-171. ISSN 0028-3045. (The full text of this publication is not available from this repository)

Sharp, John A. and Price, D.H.R. (1996) Systematic case study selection based on sample surveys: The case segmentation method. Systems Research and Information Science, 7 (2). pp. 71-81. ISSN 0882-3014. (The full text of this publication is not available from this repository)

Shen, LinLin and Bai, Li and Fairhurst, Michael (2007) Gabor wavelets and General Discriminant Analysis for face identification and verification. Image and Vision Computing, 25 (5). pp. 553-563. ISSN 0262-8856 . (The full text of this publication is not available from this repository)

Sheng, Weiguo and Howells, Gareth and Fairhurst, Michael and Deravi, Farzin (2007) A memetic fingerprint matching algorithm. IEEE Transactions on Information Forensics and Security, 2 (3). pp. 402-412. ISSN 1556-6013. (Full text available)
[img]
Preview

Shibayama, Katsuyuki and Jastrzebski, Adam K. and Walczowski, Les T. and Barnaby, J.E. (1994) A Multi- Mode System for Gaas Circuis. In: 1994 IEEE International Symposium on Circuits and Systems, London, England. (The full text of this publication is not available from this repository)

Shibayama, Katsuyuki and Walczowski, Les T. and Nalbantis, D. and Waller, Winston A.J. (1996) O-2 ADL: An object-oriented analog VLSI design language. In: 2nd International Conference on ASIC, Shanghai, Peoples R China. (The full text of this publication is not available from this repository)

Shibayama, Katsuyuki and Walczowski, Les T. and Waller, Winston A.J. and Nalbantis, D. (1996) A new bipolar op-amp IC synthesis approach. In: 2nd International Conference on ASIC, Shanghai, Peoples R China. (The full text of this publication is not available from this repository)

Sim, Kwang Mong (2012) Agent-Based Cloud Computing. IEEE Transactions On Services Computing, 5 (4). pp. 564-577. ISSN 1939-1374. (Full text available)
[img]
Preview

Sim, Kwang Mong (2009) BLGAN: Bayesian Learning and Genetic Algorithm for Supporting Negotiation With Incomplete Information. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 39 (1). pp. 198-211. ISSN 1083-4419 . (Full text available)
[img]
Preview

Sim, Kwang Mong (2013) Complex and Concurrent Negotiations for Multiple Interrelated e-Markets. IEEE Transactions on Cybernetics, 43 (1). pp. 230-245. ISSN 2168-2267. (Access to this publication is restricted)
[img]

Sim, Kwang Mong (2010) Concurrent Negotiation and Coordination for Grid Resource Coallocation. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 40 (3). pp. 753-766. ISSN 1083-4419. (Access to this publication is restricted)
[img]

Sim, Kwang Mong (2008) Evolving Fuzzy Rules for Relaxed-Criteria Negotiation. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 38 (6). 1486 -1500 . ISSN 1083-4419 . (Full text available)
[img]
Preview

Sim, Kwang Mong (2006) Grid Commerce, Market-Driven G-Negotiation, and Grid Resource Management. IEEE Transactions On Systems, Man, and Cybernetics—Part B: Cybernetics, 36 (6). pp. 1381-1394. ISSN 1083-4419. (Full text available)
[img]
Preview
[img]
Preview

Sim, Kwang Mong (2010) Grid Resource Negotiation: Survey and New Directions. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 40 (3). pp. 245-257. ISSN 1094-6977. (Full text available)
[img]
Preview

Sim, Kwang Mong (2012) A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 42 (3). pp. 713-728. ISSN 1083-4419. (Access to this publication is restricted)
[img]

Sim, Kwang Mong and Gutierrez-Garcia, J. Octavio (2013) Agent-based Cloud service composition. Applied Intelligence, 38 (3). pp. 436-464. ISSN 0924-669X. (In press) (Full text available)
[img]
Preview
[img]
Preview

Sim, Kwang Mong and Gutierrez-Garcia, J. Octavio (2013) A family of heuristics for agent-based elastic Cloud bag-of-tasks concurrent scheduling. Future Generation Computer Systems, 29 (7). pp. 1682-1699. ISSN 0167-739X. (Full text available)
[img]
Preview

Sirlantzis, Konstantinos and Howells, Gareth and Paschalakis, Stavros (1999) A functional neural network prototype for multidimensional data analysis. In: 7th IEE Conference on Image Processing and its Applications (IPA99), Jul 12-15, 1999, Manchester, England. (The full text of this publication is not available from this repository)

Slater, J.B. and Swinnerton-Dyer, P. (1998) Counting points on cubic surfaces, I. Asterisque (251). pp. 1-12. ISSN 0303-1179. (The full text of this publication is not available from this repository)

Smart, Nigel P. (1996) How difficult is it to solve a Thue equation? In: 2nd International Symposium on Algorithmic Number Theory (ANTS-II), Talence, France. (The full text of this publication is not available from this repository)

Smart, Nigel P. (1996) Solving discriminant form equations via unit equations. Journal of Symbolic Computation, 21 (3). pp. 367-374. ISSN 0747-7171. (The full text of this publication is not available from this repository)

Smart, Nigel P. and Siksek, S. (1999) A fast Diffie-Hellman protocol in genus 2. Journal of Cryptology, 12 (1). pp. 67-73. ISSN 0933-2790. (The full text of this publication is not available from this repository)

Smith, Neil (1996) The UK national Web cache - The state of the art. In: 5th International World Wide Web Conference (WWW5), Paris, France. (The full text of this publication is not available from this repository)

Sobhy, Mohammed and Makkey, M.Y. (1998) A new look at analogue computing using switched capacitor circuits. In: ISCAS '98 - Proceedings of the 1998 International Symposium on Circuits and Systems. IEEE, 345 E 47th St, New York, NY 10017 USA , New York pp. 484-487. ISBN 0-7803-4455-3. (The full text of this publication is not available from this repository)

Stephenson, Julie E. and Brown, Clifford and Griffin, Darren K. (2008) Electronic delivery of lectures in the university environment: An empirical comparison of three delivery styles. Computers and Education, 50 (3). pp. 640-651. ISSN 0360-1315. (The full text of this publication is not available from this repository)

Stone, R.D and Morse, David R. (1996) A software development tool for parallel and distributed systems. In: 19th World-Occam-and-Transputer-User-Group Technical Meeting - Parallel Processing Developments (WoTUG-19), Nottingham, England. (The full text of this publication is not available from this repository)

Strang, W. and Khan, H. and Simpson, V. and Slater, C. and Hill, Steve (1993) From hypertext to hypermedia. Second annual conference on multimedia in education and industry . pp. 35-39. (The full text of this publication is not available from this repository)

Swenson, R.L. and Dimond, Keith R. (1998) A universal colour transformation architecture. Pattern Recognition Letters, 19 (9). pp. 805-813. ISSN 0167-8655. (The full text of this publication is not available from this repository)

Tapiador, Juan E. and Hernandez-Castro, Julio C. and Peris-Lopez, Pedro (2012) Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management,, 20 (4). pp. 561-578. ISSN 1064-7570 . (Access to this publication is restricted)
[img]

Tardivel, Gillian M. and Morse, David R. (1998) The role of the user in computer-based species identification. In: Bridge, Paul and Jeffries, Peter and Morse, David R. and Scott, Peter R., eds. Information technology, plant pathology and biodiversity. Cabi Publishing-CAB Int, Oxon, England pp. 247-259. ISBN 0-85199-217-X. (The full text of this publication is not available from this repository)

Taylor, Chris and Derrick, John and Boiten, Eerke (2000) A Case Study in Partial Specification: Consistency and Refinement for Object-Z. In: 3rd IEEE International Conference on Formal Engineering Methods, Sep 04-06, 2000, York, England. (The full text of this publication is not available from this repository)

Thompson, Simon and Lins, Rafael D. (1992) The categorical multi-combinator machine - cmcm. Computer Journal, 35 (2). pp. 170-176. ISSN 0010-4620. (Full text available)
[img]
Preview
[img]
Preview

Timmis, Jon and Hone, Andrew N.W. and Stibor, Thomas and Clark, Edward (2008) Theoretical advances in artificial immune systems. Theoretical Computer Science, 403 (1). pp. 11-32. ISSN 0304-3975. (The full text of this publication is not available from this repository)

Tupman, Charlotte and Hedges, Mark and Jordanous, Anna and Roueché, Charlotte and Lawrence, K. Faith and Wakelnig, Elvira and Dunn, Stuart (2012) Sharing Ancient Wisdoms: developing structures for tracking cultural dynamics by linking moral and philosophical anthologies with their source and recipient texts. In: Digital Humanities, 2012, Hamburg, Germany. (The full text of this publication is not available from this repository)

Tupman, Charlotte and Jordanous, Anna (2014) Sharing Ancient Wisdoms across the Semantic Web using TEI and ontologies. Analysis of Ancient and Medieval Texts and Manuscripts: Digital Approaches. In the series Lectio: Studies in the Transmission of Texts & Ideas, 1 . (In press) (The full text of this publication is not available from this repository)

Tupman, Charlotte and Jordanous, Anna (2012) Sharing Ancient Wisdoms across the Semantic Web using TEI and ontologies. In: Methods and means for digital analysis of ancient and medieval texts and manuscripts, 2012, Leuven, Belgium. (Unpublished) (The full text of this publication is not available from this repository)

Turner, David A. (1995) Elementary strong functional programming. In: 1st International Symposium on Functional Programming Languages in Education (FPLE 95), Dec 04-06, 1995, Nijmegen, Netherlands. (The full text of this publication is not available from this repository)

Vasconcelos, G.C. and Fairhurst, Michael and Bisset, D.L. (1995) EFFICIENT DETECTION OF SPURIOUS INPUTS FOR IMPROVING THE ROBUSTNESS OF MLP NETWORKS IN PRACTICAL APPLICATIONS. Neural Computing & Applications, 3 (4). pp. 202-212. ISSN 0941-0643. (The full text of this publication is not available from this repository)

Vasconcelos, G.C. and Fairhurst, Michael and Bisset, D.L. (1995) INVESTIGATING FEEDFORWARD NEURAL NETWORKS WITH RESPECT TO THE REJECTION OF SPURIOUS PATTERNS. Pattern Recognition Letters, 16 (2). pp. 207-212. ISSN 0167-8655. (The full text of this publication is not available from this repository)

Walczowski, Les T. and Nalbantis, D. and Waller, Winston A.J. and Shi, K. (1997) Analogue layout generation by World Wide Web server-based agents. European Conference on Design Automation . I E E E, Computer Soc Press, USA, 634 pp. ISBN 0-8186-7786-4. (The full text of this publication is not available from this repository)

Waller, Winston A.J. and Aziz, S.M. (1994) A C-Testable Parallel Multipler Using Differencial Casecode Voltage Swish (DCVS) Logic. In: IFIP TC10/WG10.5 International Conference on Very Large Scale Integration (VLSI 93), Grenoble, France. (The full text of this publication is not available from this repository)

Wang, Frank Z. (2014) Lingwei Zhang, Yuhui Deng, Weiheng Zhu, Jipeng Zhou, Frank Wang, "Skewly Replicating Hot Data to Construct a Power-efficient Storage Cluster", Journal of Network and Computer Applications, Elsevier Science, available online 16 July 2014. Journal of Network and Computer Applications, 7 (1). pp. 1-12. ISSN 10.1016/j.jnca.2014.06.005. (The full text of this publication is not available from this repository)

Wang, Frank Z. and Chua, Leon O. and Yang, Xiao and Helian, Na and Tetzlaff, Ronald and Schmidt, Schmidt and Li, Ling and Carrasco, Jose Manuel Garcia and Chen, Wanlong and Chu, Dominique (2013) Adaptive Neuromorphic Architecture (ANA). Neural Networks, 45 (1). pp. 111-116. ISSN 0893-6080. (In press) (Full text available)
[img]
Preview

Wang, Yi and Kerridge, Simon and Smith, Peter and Foster, Simon and Coppin, Steve and Trowell, Setphen (2011) Integration of CERIF, ESB and Cloud in the Development of a National Global Research and Administrative Management System. In: Metadata and Semantic Research. Springer, pp. 245-255. ISBN 9783642247309. (Access to this publication is restricted)
[img]

Webber, J. Beau W. (1989) A Pipe has two ends. Using APL in a multiprocess/multiprocessor environment. A proposal for a flexible but easy to use syntax. Apl Quad Quote, 20 (1). pp. 1-2. (Access to this publication is restricted)
[img] [img]
Preview

Welch, Peter H. and Brown, Neil C.C. and Moores, James and Chalmers, Kevin and Sputh, Bernhard H. C. (2007) Integrating and extending JCSP. In: McEwan, Alistair A. and Schneider, S. and Ifill, W. and Welch, Peter H., eds. Communicating Process Architectures 2007: WoTUG-30. Concurrent Systems Engineering (Volume). IOS Press, US, Amsterdam, pp. 349-370. ISBN 9781586037673. (Full text available)
[img]
Preview

Welch, Peter H. and Justo, George R. R. and Willcock, Colin J. (1993) High-level paradigms for deadlock-free high-performance systems. In: Grebe, R. and Hektor, J. and Hilton, S.C. and Jane, M.R. and Welch, Peter H., eds. Transputer Applications and Systems 93 Transputer Applications and Systems 93. Transputer & Occam Engineering., 36 . IOS press, Amsterdam, pp. 981-1004. ISBN 90-5199-140-1. (The full text of this publication is not available from this repository)

Welch, Peter H. and Wood, David C. (1993) Image tracking in real-time: a transputer emulation of some early mammalian vision processes. Image and Vision Computing, 11 (4). pp. 221-228. ISSN 0262-8856. (The full text of this publication is not available from this repository)

Williamson, Jon (2004) Bayesian nets and causality: philosophical and computational foundations. Oxford University Press, Oxford, 250 pp. ISBN 9780198530794. (The full text of this publication is not available from this repository)

Williamson, Jon (2001) Bayesian networks for logical reasoning. In: Proceedings of the AAAI Fall Symposium on using Uncertainty within Computation. AAAI Press, pp. 136-143. (The full text of this publication is not available from this repository)

Williamson, Jon (2001) Foundations for Bayesian networks. In: Foundations of Bayesianism. Applied Logic Series (24). Kluwer , Dordrecht, pp. 75-115. ISBN 1402002238. (The full text of this publication is not available from this repository)

Williamson, Jon (2005) Objective Bayesian nets. In: Artemov, Sergei and Barringer, Howard and Garcez, Artur d'Avila, eds. We Will Show Them: Essays in Honour of Dov Gabbay. College Publications, pp. 713-730. ISBN 9781904987260. (The full text of this publication is not available from this repository)

Wilson, E. (1992) Guiding lawyers - mapping law into hypertext. Artificial Intelligence Review, 6 (2). pp. 161-189. ISSN 0269-2821. (The full text of this publication is not available from this repository)

Wilson, E. and Lindley, I. and Pullen, S. (1992) Callguide - using programmable hypertext as a shell for call programs. Lecture Notes in Computer Science, 602 . pp. 592-615. ISSN 0302-9743. (The full text of this publication is not available from this repository)

Wilson, Eve (1994) Using Corpora as a Resource in Language Teaching. In: Euro CALL 93 Conference, Hull, England. (The full text of this publication is not available from this repository)

Wood, David C. and Welch, Peter H. (1996) The Kent retargetable occam compiler. In: 19th World-Occam-and-Transputer-User-Group Technical Meeting - Parallel Processing Developments (WoTUG-19), Nottingham, England. (The full text of this publication is not available from this repository)

Wusteman, Judith (1996) Electronic journal formats. Program: Electronic Library and Information Systems, 30 (4). pp. 319-343. ISSN 0033-0337. (The full text of this publication is not available from this repository)

Wusteman, Judith (1992) Explanation-based learning - a survey. Artificial Intelligence Review, 6 (3). pp. 243-262. ISSN 0269-2821. (The full text of this publication is not available from this repository)

Yang, Xiao and Chen, Wanlong and Wang, Frank Z. (2013) A Memristor-CAM (Content Addressable Memory) Cell: New Design and Evaluation. In: International Conference on Computer Science and Information Technology, 30-31 Jan 2013, Dubai. (The full text of this publication is not available from this repository)

Zhang, Leishi and Kujis, J.N. and Liu, Xiaohui (2008) Information visualization for DNA microarray data analysis: A critical review. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 38 (1). pp. 42-54. ISSN 1094-6977. (The full text of this publication is not available from this repository)

Zheng, Yi and Hague, Jim (1991) Dmt - a Demonstration Tool. Software: Practice and Experience, 21 (9). pp. 949-961. ISSN 0038-0644. (The full text of this publication is not available from this repository)

de Abreu Moreira, Dilvan and Walczowski, Les T. (1994) Automated placement for a leaf cell generator. In: International Symposium on Circuits and Systems. Institute of Electrical and Electronics Engineers, Piscataway NJ, A117-A120. ISBN 0-7803-1915-X. (The full text of this publication is not available from this repository)

de Abreu Moreira, Dilvan and Walczowski, Les T. (1997) Using software agents to generate VLSI layouts. IEEE Expert, 12 (6). pp. 26-32. ISSN 0885-9000. (The full text of this publication is not available from this repository)

de Carvalho, Andre C.P.L.F. and Fairhurst, Michael (1998) Applying adaptive logic networks to character recognition. Pattern Recognition Letters, 19 (5-6). pp. 469-473. ISSN 0167-8655. (The full text of this publication is not available from this repository)

de Carvalho, Andre C.P.L.F. and Fairhurst, Michael and Bisset, D.L. (1994) A Modular Boolean Architecture for Pattern Recognition. In: 1994 IEEE International Conference on Neural Networks (ICNN 94) - 1st IEEE World Congress on Computational Intelligence, Orlando, Fl. (The full text of this publication is not available from this repository)

de Carvalho, Andre C.P.L.F. and Fairhurst, Michael and Bisset, D.L. (1994) An Integrated Boolean Neural-Network for Pattern-Classification. Pattern Recognition Letters, 15 (8). pp. 807-813. ISSN 0167-8655. (The full text of this publication is not available from this repository)

de Lemos, Rogério and Timmis, Jon and Ayara, Modupe and Forrest, Simon (2007) Immune-inspired adaptable error detection for automated teller machines. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 37 (5). pp. 873-886. ISSN 1094-6977. (Access to this publication is restricted)
[img]

van Leemput, Koen and Maes, Frederik and Bello, Fernando and Vandermeulen, Dirk and Colchester, Alan C. F. and Suetens, Paul (1999) Automated segmentation of MS lesions from multi-channel MR images. In: 2nd International Conference on Medical Image Computing and Computer-Assisted Intervention (MICCAI 99), Sep 19-22, 1999, Cambridge, England. (The full text of this publication is not available from this repository)

This list was generated on Thu Nov 27 22:03:54 2014 GMT.