Skip to main content

Items where division is "Faculties > Sciences > School of Computing"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator's name | Item Type | Date | No Grouping
Number of items at this level: 1635.

2019

Al-Sudani, Sahar, Ramaswamy, Palaniappan (2019) Predicting Students’ Final Degree Classification Using an Extended Profile. Education and Information Technologies, . ISSN 1360-2357. E-ISSN 1573-7608. (doi:10.1007/s10639-019-09873-8)
[img]
Preview
[img]

Albakri, Adham, de Lemos, Rogerio, Boiten, Eerke Albert (2019) Sharing Cyber Threat Intelligence under the General Data Protection Regulation. In: Annual Privacy Forum 2019, 13-14 June 2019, Rome, Italy. (In press)
[img]
Preview

Bravetti, Mario, Carbone, Marco, Lange, Julien, Yoshida, Nobuko, Zavattaro, Gianluigi (2019) A Sound Algorithm for Asynchronous Session Subtyping. In: 30th International Conference on Concurrency Theory (CONCUR 2019), 26-31 Aug 2019, Amsterdam, The Netherlands. (In press)
[img]
Preview

Camacho-Collados, Jose, Espinosa-Anke, Luis, Jameel, Shoaib, Schockaert, Steven (2019) A Latent Variable Model for Learning Distributional Relation Vectors. In: International Joint Conferences on Artificial Intelligence. . (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Chapman, Peter, Stapleton, Gem, Rodgers, Peter, Touloumis, Anestis, Blake, Andrew, Delaney, Aidan (2019) The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers. PLOS ONE, 14 (3). e0211234. ISSN 1932-6203. (doi:10.1371/journal.pone.0211234)
[img]
Preview

Chhonker, Ananya, de Lemos, Rogerio (2019) Microservices Architectures and Technical Debt: A Self-adaptation View. In: International Conference on Microservices (Microservices 2019), 19-21 February 2019, Dortmund, Germany.
[img]

Correia, António, Jameel, Shoaib, Schneider, Daniel, Fonseca, Benjamim, Paredes, Hugo (2019) The Effect of Scientific Collaboration on CSCW Research: A Scientometric Study. In: Proceedings of the 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design. . (In press)
[img]
Preview

Cramer, Sam, Kampouridis, Michael, Freitas, Alex A., Alexandridis, Antonis (2019) Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives. Swarm and Evolutionary Computation, 46 . pp. 184-200. ISSN 2210-6502. E-ISSN 2210-6510. (doi:10.1016/j.swevo.2019.01.008)
[img]
Preview
[img]

Dilley, Nicolas, Lange, Julien (2019) An Empirical Study of Messaging Passing Concurrency in Go Projects. In: Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering. . IEEE ISBN 978-1-72810-591-8. (doi:10.1109/SANER.2019.8668036)
[img]
Preview

Fabris, Fabio, Palmer, Daniel, de Magalhaes, João Pedro, Freitas, Alex A. (2019) Comparing enrichment analysis and machine learning for identifying gene properties that discriminate between gene classes. Briefings in Bioinformatics, . ISSN 1477-4054. (doi:10.1093/bib/bbz028) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fan, Wenjun (2019) Enabling Privacy-preserving Sharing of Cyber Threat Information in the Cloud. In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing. . (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Fan, Wenjun (2019) HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design. IEEE Journal on Selected Areas in Communications, 37 (3). 683 -697. ISSN 0733-8716. (doi:10.1109/JSAC.2019.2894307)
[img]
Preview

Freitas, Alex A. (2019) Investigating the Role of Simpson’s Paradox in the Analysis of Top-Ranked Features in High-Dimensional Bioinformatics Datasets. Briefings in Bioinformatics, . E-ISSN 1477-4054. (doi:10.1093/bib/bby126) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Halgas, Lukas, Agrafiotis, Ioannis, Nurse, Jason R. C. (2019) Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs). In: 2019 World Conference on Information Security Applications. . (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hope, Thomas M.H., Friston, Karl J., Price, Cathy J., Leff, Alex P., Rotshtein, Pia, Bowman, Howard (2019) Recovery After Stroke: Not So Proportional After All? Brain, 142 (1). pp. 15-22. ISSN 0006-8950. E-ISSN 1460-2156. (doi:10.1093/brain/awy302) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hull, Gavin, John, Henna, Arief, Budi (2019) Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses. Crime Science, 8 (2). (doi:10.1186/s40163-019-0097-9)
[img]
Preview
[img]

Imperatori, Laura Sophie, Betta, Monica, Cecchetti, Luca, Canales-Johnson, Andrés, Ricciardi, Emiliano, Pietrini, Pietro, Siclari, Francesca, Chennu, Srivas, Bernardi, Giulio (2019) EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions. Scientific Reports, 9 . p. 8894. E-ISSN 2045-2322. (doi:10.1038/s41598-019-45289-7)
[img]
Preview
[img]

Johnson, Colin G. (2019) Solving the Rubik’s Cube with Learned Guidance Functions. In: Proceedings of the 2018 IEEE Symposium Series on Computational Intelligence. . pp. 2082-2089. ISBN 978-1-5386-9277-6. E-ISBN 978-1-5386-9276-9. (doi:10.1109/SSCI.2018.8628626)
[img]
Preview

Johnson, Colin G., McCormack, Jon, Santos, Iria, Romero, Juan (2019) Understanding Aesthetics and Fitness Measures in Evolutionary Art Systems. Complexity, 2019 . ISSN 1076-2787. (doi:10.1155/2019/3495962)
[img]
Preview

Kell, Stephen (2019) Unix, Plan 9 and the Lurking Smalltalk. In: Reflections on Programming Systems. Philosophical Studies Series . Springer. ISBN 978-3-319-97225-1. E-ISBN 978-3-319-97226-8. (In press) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kiss, Tamas, DesLauriers, James, Gesmier, Gregoire, Terstyanszky, Gabor, Pierantoni, Gabriele, Oun, Osama Abu, Taylor, Simon J.E., Anagnostou, Anastasia, Kovacs, Jozsef (2019) A cloud-agnostic queuing system to support the implementation of deadline-based application execution policies. Future Generation Computer Systems, 101 . pp. 99-111. ISSN 0167-739X. (doi:10.1016/j.future.2019.05.062)
[img]
Preview

Lange, Julien, Yoshida, Nobuko (2019) Verifying Asynchronous Interactions via Communicating Session Automata. In: 31st International Conference on Computer-Aided Verification (CAV 2019). . Springer
[img]
Preview
[img]
Preview

Lin, Yuzhou, De Wilde, Philippe, Palaniappan, Ramaswamy, Li, Ling (2019) Muscle Connectivity Analysis for Hand Gesture Recognition via sEMG. In: 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) Proceedings. . pp. 848-852. IEEE ISBN 978-988-14-7685-2. (doi:10.23919/APSIPA.2018.8659570)
[img]
Preview

Malmi, Lauri and Utting, Ian and Ko, Andrew J (2019) Tools and Environments. In: Fincher, S A and Robins, A V, eds. The Cambridge handbook of computing education research. Cambridge University Press, pp. 639-662. ISBN 978-1-108-72189-9. (doi:10.1017/9781108654555)
[img]
Preview

Nouh, Mariam, Nurse, Jason R. C., Webb, Helena, Goldsmith, Michael (2019) Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement. In: Proceedings of the 2019 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). . Internet Society (In press)
[img]
Preview

Nurse, Jason R. C. (2019) Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:10.1093/oxfordhb/9780198812746.013.35) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Bada, Maria (2019) The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:10.1093/oxfordhb/9780198812746.013.36) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Palsma, Jurgen, Adegboye, Adesola (2019) Optimising Directional Changes trading strategies with different algorithms. In: 2019 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION. . , We (In press)
[img] [img]
Preview

Phan, Huy (2019) Beyond Equal-Length Snippets: How Long is Sufficient to Recognize an Audio Scene? In: 2019 AES Conference on Audio Forensics. . The Audio Engineering Society (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Phan, Huy (2019) Fusion of End-to-End Deep Learning Models for Sequence-to-Sequence Sleep Staging. In: 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2019). . IEEE (In press)
[img]
Preview

Rigger, Manuel, Marr, Stefan, Adams, Bram, Mössenböck, Hanspeter (2019) Understanding GCC Builtins to Develop Better Tools. In: Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ESEC/FSE . ACM ISBN 978-1-4503-5572-8. (In press) (doi:10.1145/3338906.3338907)
[img]
Preview

Roberts, Richard, Marr, Stefan, Homer, Michael, Noble, James (2019) Transient Typechecks are (Almost) Free. In: 33rd European Conference on Object-Oriented Programming, 15-19 July 2019, London, UK. (doi:10.4230/LIPIcs.ECOOP.2019.5)
[img]
Preview

Romero, Juan, Johnson, Colin G., Jon, McCormack (2019) Editorial: Complex Systems in Aesthetics and Arts. Complexity, 2019 . p. 9836102. ISSN 1076-2787. E-ISSN 1099-0526. (doi:10.1155/2019/9836102)
[img]
Preview

Rowe, Reuben, Férée, Hugo, Thompson, Simon, Owens, Scott (2019) ROTOR: A Tool for Renaming Values in OCaml’s Module System. In: 2019 IEEE/ACM 3rd International Workshop on Refactoring. 2019 IEEE/ACM 3rd International Workshop on Refactoring. . IEEE/ACM, USA (In press) (doi:10.1109/IWoR.2019.00013) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sharrad, Joanna, Chitil, Olaf, Wang, Meng (2019) Delta Debugging Type Errors with a Blackbox Compiler. In: Proceedings of the 30th Symposium on Implementation and Application of Functional Languages. . pp. 13-24. ACM ISBN 978-1-4503-7143-8. (doi:10.1145/3310232.3310243)
[img]
Preview

Torres Lopez, Carmen, Gurdeep Singh, Robbert, Marr, Stefan, Gonzalez Boix, Elisa, Scholliers, Christophe (2019) Multiverse Debugging: Non-deterministic Debugging for Non-deterministic Programs. In: 33rd European Conference on Object-Oriented Programming, 15-19 July 2019, London, UK. (doi:10.4230/LIPIcs.ECOOP.2019.27)
[img]
Preview

Webb, Helena, Nurse, Jason R. C., Bezuidenhout, Louise, Jirotka, Marina (2019) Lab Hackathons to Overcome Laboratory Equipment Shortages in Africa: Opportunities and Challenges. In: 2019 CHI Conference on Human Factors in Computing Systems Extended Abstracts. . ACM ISBN 978-1-4503-5971-9. (In press) (doi:10.1145/3290607.3299063)
[img]
Preview

Witon, Adrien J-B. (2019) EEG-Based Mental States Identification. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

de Lemos, Rogerio, Grzes, Marek (2019) Self-adaptive Artificial Intelligence. In: 2019 IEEE/ACM 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS). . (In press)
[img]
Preview

2018

Gonzalez Boix, Elisa and Marr, Stefan, eds. (2018) Meta'16 Workshop Special Issue. The Journal of Object Technology, 17 (1). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Thompson, Simon, ed. (2018) Proceedings of the Sixth Workshop on Trends in Functional Programming in Education. EPTCS, 60 pp. (doi:10.4204/EPTCS.270) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Marr, Stefan and Sartor, Jennifer B., eds. (2018) <Programming>'18 Companion: Conference Companion of the 2nd International Conference on Art, Science, and Engineering of Programming. ACM E-ISBN 978-1-4503-5513-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogerio and Ghezzi, Carlo and Garlan, David and Giese, Holger, eds. (2018) Software Engineering for Self-Adaptive Systems III. Assurances. Springer, Cham (doi:10.1007/978-3-319-74183-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Adegboye, Adesola, Kampouridis, Michael, Johnson, Colin G. (2018) Regression genetic programming for estimating trend end in foreign exchange market. In: 2017 IEEE Symposium Series on Computational Intelligence (SSCI) Proceedings. . IEEE ISBN 978-1-5386-2727-3. E-ISBN 978-1-5386-2726-6. (doi:10.1109/SSCI.2017.8280833)
[img]
Preview

Andreotti, Fernando, Phan, Huy, Cooray, Navin, Lo, Christine, Hu, Michele T.M., De Vos, Maarten (2018) Multichannel Sleep Stage Classification and Transfer Learning using Convolutional Neural Networks. In: 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society: Learning from the Past, Looking to the Future. . pp. 171-174. IEEE, Honolulu, Hawaii ISBN 978-1-5386-3646-6. (doi:10.1109/EMBC.2018.8512214)
[img]
Preview

Armas Vega, Esteban, Sandoval Orozco, Ana, García Villalba, Luis, Hernandez-Castro, Julio C. (2018) Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns. Sensors, 18 (10). p. 3372. ISSN 1424-8220. (doi:10.3390/s18103372)
[img]
Preview

Aslan, Ça?r? B., Sa?lam, Rahime Belen, Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of 9th International Conference on Social Media & Society. . ACM ISBN 978-1-4503-6334-1. (doi:10.1145/3217804.3217919)
[img]
Preview

Aumayr, Dominik, Marr, Stefan, Béra, Clément, Gonzalez Boix, Elisa, Mössenböck, Hanspeter (2018) Efficient and Deterministic Record & Replay for Actor Languages. In: Proceedings of the 15th International Conference on Managed Languages and Runtimes. . (doi:10.1145/3237009.3237015)
[img]
Preview

Axon, Louise M., Alahmadi, Bushra, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2018) Sonification in security operations centres: what do security practitioners think? In: Proceedings of the 2018 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). . Internet Society ISBN 1-891562-53-3. (doi:10.14722/usec.2018.23024)
[img]
Preview

Bareham, Corinne, Allanson, Judith, Roberts, Neil, Hutchinson, Peter, Pickard, John D., Menon, David K., Chennu, Srivas (2018) Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field. Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field, . ISSN 1664-2295. E-ISSN 1664-2295. (doi:10.3389/fneur.2018.00676)
[img]
Preview

Bouraoui, Zied, Jameel, Shoaib, Schockaert, Steven (2018) Relation Induction in Word Embeddings Revisited. In: The 27th International Conference on Computational Linguistics (COLING 2018). . pp. 1627-1637. ISBN 978-1-948087-50-6.
[img]
Preview

Cervantes, Alejandro, Sloan, Tom, Hernandez-Castro, Julio C., Isasi, Pedro (2018) System steganalysis with automatic fingerprint extraction. PLOS ONE, 13 (4). e0195737. ISSN 1932-6203. (doi:10.1371/journal.pone.0195737)
[img]

Chari, Guido, Garbervetsky, Diego, Marr, Stefan, Ducasse, Stéphane (2018) Fully Reflective Execution Environments: Virtual Machines for More Flexible Software. IEEE Transactions on Software Engineering, . ISSN 0098-5589. (doi:10.1109/TSE.2018.2812715)
[img]
Preview

Cohen, Liron and Rowe, Reuben N. S. (2018) Infinitary and Cyclic Proof Systems for Transitive Closure Logic. Technical report. University of Kent (Submitted)
[img]
Preview

Comsa, Iulia M., Bekinschtein, Tristan A., Chennu, Srivas (2018) Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness. Brain Topography, . ISSN 0896-0267. E-ISSN 1573-6792. (doi:10.1007/s10548-018-0689-9)
[img]
Preview
[img]

Contrastin, Mistral, Orchard, Dominic A., Rice, Andrew C. (2018) Automatic reordering for dataflow safety of Datalog. In: Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming. Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming. . ACM ISBN 978-1-4503-6441-6. (doi:10.1145/3236950.3236954)
[img]

Daloze, Benoit, Tal, Arie, Marr, Stefan, Mössenböck, Hanspeter, Petrank, Erez (2018) Parallelization of Dynamic Languages: Synchronizing Built-in Collections. Proceedings of the ACM on Programming Languages, 2 (OOPSLA). ISSN 2475-1421. E-ISSN 2475-1421. (doi:10.1145/3276478)
[img]
Preview

Dib, Fadi (2018) Improved Neighbourhood Search-Based Methods for Graph Layout. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Dib, Fadi K., Rodgers, Peter (2018) Graph drawing using tabu search coupled with path relinking. PLOS ONE, 13 (5). e0197103. ISSN 1932-6203. (doi:10.1371/journal.pone.0197103)
[img]
Preview

Dziallas, Sebastian (2018) Characterising Graduateness in Computing Education: A Narrative Approach. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Dziallas, Sebastian, Fincher, Sally (2018) “I told you this last time, right?”: Re-visiting narratives of STEM education. In: ICER'18. 2018 ACM Conference on International Computing Education Research. . pp. 223-231. ACM Digital Library, Espoo, Finland ISBN 978-1-4503-5628-2. (doi:10.1145/3230977.3230989)
[img]
Preview

Fabris, Fabio (2018) Meta-Learning for Hierarchical Classification and Applications in Bioinformatics. International Journal of Computer and Information Engineering, 12 (7). ISSN 2010-3921.
[img]
Preview
[img]
Preview

Fan, Wenjun, Du, Zhihui, Fernandez, David, Villagra, Victor A. (2018) Enabling an Anatomic View to Investigate Honeypot Systems: A Survey. IEEE Systems Journal, 12 (4). pp. 3906-3919. ISSN 1932-8184. (doi:10.1109/JSYST.2017.2762161)
[img]
Preview
[img]
Preview

Freitas, Alex A., Pinto Junior, Jony A., Plastino, Alexandre, Neumann, Nadine M. (2018) Is P-value<0.05 Enough? Two Case Studies in Classifiers Evaluation. In: Annals of the National Meeting of Artificial and Computational Intelligence (ENIAC). . pp. 94-103. (doi:10.5753/eniac.2018.4407)
[img]
Preview

Férée, Hugo, Hym, Samuel, Mayero, Micaela, Moyen, Jean-Yves, Nowak, David (2018) Formal Proof of Polynomial-Time Complexity with Quasi-Interpretations. In: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs. . ACM ISBN 978-1-4503-5586-5. (doi:10.1145/3167097) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Giubilo, Fabio, Sajjad, Ali, Shackleton, Mark, Chadwick, David W., Fan, Wenjun, de Lemos, Rogério (2018) An Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services. In: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). . IEEE ISBN 978-1-5386-0598-1. E-ISBN 978-1-908320-93-3. (doi:10.23919/ICITST.2017.8356404)
[img]
Preview

Goncalves, E.C., Freitas, Alex A., Plastino, Alexandre (2018) A survey of genetic algorithms for multi-label classification. In: Proceedings of the 2018 IEEE Congress on Evolutionary Computation (CEC 2018). Proceedings of the 2018 IEEE Congress on Evolutionary Computation (CEC 2018). . pp. 981-988. IEEE, New York, NY, USA ISBN 978-1-5090-6017-7. (doi:10.1109/CEC.2018.8477927)
[img]
Preview

Gonzalez Boix, Elisa, Marr, Stefan (2018) Introduction to the Meta’16 Workshop Special Issue. Journal of Object Technology, 17 (1). pp. 1-2. ISSN 1660-1769. (doi:10.5381/jot.2018.17.1.e1)
[img]
Preview

González Fernández, Edgar, Sandoval Orozco, Ana, García Villalba, Luis, Hernandez-Castro, Julio C. (2018) Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts. Sensors (Basel, Switzerland), 18 (9). ISSN 1424-8220. (doi:10.3390/s18092804)
[img]
Preview

Guo, Hui, Kafalı, Özgur, Jeukeng, Anne-Liz, Williams, Laurie, Singh, Munindar P. (2018) Poster: Extraction of Security Requirements from Textual Artifacts. In: Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS). (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Guo, Hui, Kafalı, Özgur, Singh, Munindar (2018) Extraction of Natural Language Requirements from Breach Reports Using Event Inference. In: 2018 5th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE). . pp. 22-28. IEEE ISBN 978-1-5386-8404-7. (doi:10.1109/AIRE.2018.00009) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hanson, Richard J., Hopkins, Tim (2018) Remark on Algorithm 539: A Modern Fortran Reference Implementation for Carefully Computing the Euclidean Norm. ACM Transactions on Mathematical Software, 44 (3). pp. 1-23. ISSN 0098-3500. E-ISSN 1557-7295. (doi:10.1145/3134441)
[img]
Preview

Happa, Jassim, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie, Williams, Rebecca (2018) An Ethics Framework for Research into Heterogeneous Systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. . IET ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0026)
[img]
Preview

Harrison, Joseph (2018) Automatic detection of core Erlang message passing errors. In: Proceedings of the 17th ACM SIGPLAN International Workshop on Erlang - Erlang 2018. Erlang 2018 Proceedings of the 17th ACM SIGPLAN International Workshop on Erlang. . pp. 37-48. ACM Press ISBN 978-1-4503-5824-8. (doi:10.1145/3239332.3242765) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hopkins, Jack, Kafalı, Özgur, Alrayes, Bedour, Stathis, Kostas (2018) Pirasa: strategic protocol selection for e-commerce agents. Electronic Markets, . ISSN 1019-6781. E-ISSN 1422-8890. (doi:10.1007/s12525-018-0307-4)
[img]
Preview
[img]
Preview

Hopkins, Tim, Kılıç, Emrah (2018) An analytical approach: Explicit inverses of periodic tridiagonal matrices. Journal of Computational and Applied Mathematics, 335 . pp. 207-226. ISSN 0377-0427. (doi:10.1016/j.cam.2017.11.038)
[img]
Preview

Jameel, Shoaib, Bouraoui, Zied, Schockaert, Steven (2018) Unsupervised Learning of Distributional Relation Vectors. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, ACL 2018. . Association for Computational Linguistics ISBN 978-1-948087-32-2.
[img]
Preview

Jameel, Shoaib, Fu, Zihao, Shi, Bei, Lam, Wai, Schockart, Steven (2018) Word Embedding as Maximum A Posteriori Estimation. In: Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI 2019). . (In press)
[img]
Preview

Jarchi, Delaram, Rodgers, Sarah J., Tarassenko, Lionel, Clifton, David A. (2018) Accelerometry-Based Estimation of Respiratory Rate for Post-Intensive Care Patient Monitoring. IEEE Sensors Journal, 18 (12). pp. 4981-4989. ISSN 1530-437X. (doi:10.1109/JSEN.2018.2828599)
[img]
Preview

Javarone, Marco A., Marinazzo, Daniele (2018) Dilution of Ferromagnets via a Random Graph-Based Strategy. Complexity, 2018 . Article ID 2845031. ISSN 1076-2787. (doi:10.1155/2018/2845031)
[img]
Preview

Johnson, Colin G., Swan, Jerry, Edwin, Brady (2018) Subtype Polymorphism à la carte via Machine Learning on Dependent Types. In: ML4PL. 2nd International Workshop on Machine Learning Techniques for Programming Languages. . ACM ISBN ACM ISBN 123-4567-24-567/08/06. (doi:10.475/123_4)
[img]
Preview

Jordanous, Anna (2018) Creativity vs quality: why the distinction matters when evaluating computational creativity systems. In: The 5th Computational Creativity Symposium at the AISB Convention 2018, 4-6 April 2018, Liverpool, UK. (In press)
[img]
Preview

Kafalı, Özgur, Torroni, Paolo (2018) Comodo: Collaborative Monitoring of Commitment Delegations. Expert Systems with Applications, 105 . pp. 144-158. ISSN 0957-4174. (doi:10.1016/j.eswa.2018.03.057)
[img]
Preview

Kalonaris, Stefano, Jordanous, Anna (2018) Computational Music Aesthetics: a survey and some thoughts. In: 3rd Conference on Computational Simulation of Musical Creativity, 20-22 August 2018, Dublin, Ireland.
[img]
Preview

Kell, Stephen (2018) The inevitable death of VMs: a progress report. In: Programming'18 Companion Conference Companion of the 2nd International Conference on Art, Science, and Engineering of Programming. . pp. 61-62. ACM, New York, NY, USA ISBN 978-1-4503-5513-1. (doi:10.1145/3191697.3191728) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Koch, Philipp, Phan, Huy, Maass, Marco, Katzberg, Fabrice, Mertins, Alfred (2018) Recurrent Neural Network Based Early Prediction of Future Hand Movements. In: 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society: Learning from the Past, Looking to the Future. . pp. 4710-4713. IEEE, Honolulu, Hawaii E-ISBN 978-1-5386-3646-6. (doi:10.1109/EMBC.2018.8513145)
[img]
Preview

Lange, Julien, Ng, Nicholas, Toninho, Bernardo, Yoshida, Nobuko (2018) A Static Verification Framework for Message Passing in Go using Behavioural Types. In: Proceedings of the 40th International Conference on Software Engineering: Software Engineering Education and Training. . pp. 1137-1148. ACM ISBN 978-1-4503-5660-2. (doi:10.1145/3180155.3180157)
[img]
Preview
[img]

Langroudi, George, Jordanous, Anna, Li, Ling (2018) Music Emotion Capture: emotion-based generation of music using EEG. In: Emotion Modelling and Detection in Social Media and Online Interaction symposium at the AISB 2018 Convention, 4-6 April 2018, Liverpool, UK.
[img]
Preview

Li, Shujun, Ho, Anthony TS, Wang, Zichi, Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. MPS'18: 2nd International Workshop on Multimedia Privacy and Security Proceedings. . ACM ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267365)
[img]
Preview

Li, Zengxi, Song, Yan, Dai, Li-Rong, McLoughlin, Ian Vince (2018) Source-Aware Context Network for Single-Channel Multi-speaker Speech Separation. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). . pp. 681-685. IEEE ISBN 978-1-5386-4659-5. E-ISBN 978-1-5386-4658-8. (doi:10.1109/ICASSP.2018.8461578)
[img]
Preview

Marr, Stefan, Daloze, Benoit (2018) Few Versatile vs. Many Specialized Collections: How to design a collection library for exploratory programming? In: Proceedings of Programming Experience Workshop (PX/18). PX/18 . pp. 135-143. ACM ISBN 978-1-4503-5513-1. (doi:10.1145/3191697.3214334)
[img]
Preview

Marr, Stefan, Roberts, Richard, Noble, James (2018) Newspeak and Truffle: A Platform for Grace? In: Grace'18, 2018-11-04, Boston, MA, USA. (Unpublished)
[img]
Preview

Martin, Alejandro, Hernandez-Castro, Julio C., Camacho, David (2018) An in-Depth Study of the Jisut Family of Android Ransomware. IEEE Access, 6 . pp. 57205-57218. ISSN 2169-3536. (doi:10.1109/ACCESS.2018.2873583)
[img]
Preview

McBride, Jack, Arief, Budi, Hernandez-Castro, Julio C. (2018) Security Analysis of Contiki IoT Operating System. In: ACM Digital Library. 2018 International Conference on Embedded Wireless Systems and Networks (EWSN). . pp. 278-283. ISBN 978-0-9949886-2-1.
[img]
Preview

McBride, Jack, Hernandez-Castro, Julio C., Arief, Budi (2018) Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override. In: Proceedings of the 2017 International Workshop on Secure Internet of Things SIoT 2017. . IEEE ISBN 978-1-5386-4541-3. (doi:10.1109/SIoT.2017.00009)
[img]
Preview

McKeown, Lewis, Jordanous, Anna (2018) An Evaluation of the Impact of Constraints on the Perceived Creativity of Narrative Generating Software. In: Pachet, François and Jordanous, Anna and León, Carlos, eds. Proceedings of the Ninth International Conference on Computational Creativity. . pp. 16-23. Association of Computational Creativity ISBN 978-989-54-1600-4.
[img]
Preview

Miao, Xiaoxiao, McLoughlin, Ian Vince, Yao, Shengyu, Yan, Yonghong (2018) Improved Conditional Generative Adversarial Net Classification For Spoken Language Recognition. In: 2018 IEEE Workshop on Spoken Language Technology SLT 2018 Proceedings. . IEEE ISBN 978-1-5386-4334-1. (doi:10.1109/SLT.2018.8639522)
[img]
Preview

Michelmann, Sebastian, Staresina, Bernhard, Bowman, Howard, Hanslmayr, Simon (2018) Speed of time-compressed forward replay flexibly changes in human episodic memory. Nature Human Behavior, . E-ISSN 2397-3374. (doi:10.1038/s41562-018-0491-4)
[img]
Preview

Miranda, Enrico S., Fabris, Fabio, Nascimento, Chrystian G. M., Freitas, Alex A., Oliveira, Alexandre C. M. (2018) Meta-Learning for Recommending Metaheuristics for the MaxSAT Problem. In: IEEE Conference on Intelligent Systems. 2018 7th Brazilian Conference on Intelligent Systems (BRACIS). . pp. 169-174. IEEE, USA ISBN 978-1-5386-8023-0. (doi:10.1109/BRACIS.2018.00037)
[img]
Preview
[img]

Montrieux, Lionel and de Lemos, Rogerio and Bailey, Christopher (2018) Challenges in Engineering Self-adaptive Authorisation Infrastructures. In: Yu, Yijun, ed. Engineering Adaptive Software Systems. Springer, pp. 1-40. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C., Radanliev, Petar, Creese, Sadie, Roure, David De (2018) If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. . IET ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0001)
[img]
Preview

Oliveira, Luiz O.V.B. and Otero, Fernando E.B. and Pappa, Gisele L. (2018) A Generic Framework for Building Dispersion Operators in the Semantic Space. In: Genetic Programming Theory and Practice XIV. Genetic and Evolutionary Computation . Springer, pp. 179-195. ISBN 978-3-319-97088-2. E-ISBN 978-3-319-97087-5. (doi:10.1007/978-3-319-97088-2_12)
[img]
Preview

Orchard, Dominic A. (2018) Complexity bounds for container functors and comonads. Information and Computation, . ISSN 0890-5401. (doi:10.1016/j.ic.2018.05.008)
[img]
Preview
[img]
Preview

Patlatzoglou, Konstantinos and Chennu, Srivas and Boly, Melanie and Noirhomme, Quentin and Bonhomme, Vincent and Brichant, Jean-Francois and Gosseries, Olivia and Laureys, Steven (2018) Deep Neural Networks for Automatic Classification of Anesthetic-Induced Unconsciousness. In: Brain Informatics. Springer, Germany. ISBN 978-3-030-05586-8. (doi:10.1007/978-3-030-05587-5_21)
[img]
Preview

Pease, Alison and Jordanous, Anna (2018) Report on the Eighth International Conference on Computational Creativity. Review of: Eighth International Conference on Computational Creativity by UNSPECIFIED. AI Magazine, 39 (1). pp. 62-64. ISSN 0738-4602. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Phan, Huy, Andreotti, Fernando, Cooray, Navin, Chén, Oliver Y., De Vos, Maarten (2018) DNN Filter Bank Improves 1-Max Pooling CNN for Single-Channel EEG Automatic Sleep Stage Classification. In: 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society: Learning from the Past, Looking to the Future. . pp. 453-456. IEEE, Honolulu, Hawaii E-ISBN 978-1-5386-3646-6. (doi:10.1109/EMBC.2018.8512286)
[img]
Preview

Phan, Huy, Koch, Philipp, McLoughlin, Ian Vince, Mertins, A. (2018) Enabling Early Audio Event Detection With Neural Networks. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing Proceedings. . pp. 141-145. IEEE ISBN 978-1-5386-4659-5. E-ISBN 978-1-5386-4658-8. (doi:10.1109/ICASSP.2018.8461859)
[img]
Preview

Phan, Huy, Krawczyk-Becker, Martin, Gerkmann, Timo, Mertins, Alfred (2018) Weighted and Multi-Task Loss for Rare Audio Event Detection. In: 2018 IEEE International Conference on Acoustics, Speech, and Signal Processing: Proceedings. . pp. 336-340. IEEE, Calgary, Canada ISBN 978-1-5386-4658-8. (doi:10.1109/ICASSP.2018.8461353)
[img]
Preview

Radanliev, Petar, De Roure, David, Nurse, Jason R. C., Nicolescu, Razvan, Huth, Michael, Cannady, C, Montalvo, RM (2018) Integration of Cyber Security Frameworks, Models and Approaches for Building Design Principles for the Internet-of-Things in Industry 4.0. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. . IET E-ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0041)
[img]
Preview

Rigger, Manuel, Marr, Stefan, Kell, Stephen, Leopoldseder, David, Mössenböck, Hanspeter (2018) An Analysis of x86-64 Inline Assembly in C Programs. ACM SIGPLAN Notices, 53 (3). pp. 84-99. ISSN 0362-1340. E-ISSN 1558-1160. (doi:10.1145/3186411.3186418)
[img]
Preview

Rigger, Manuel, Marr, Stefan, Kell, Stephen, Leopoldseder, David, Mössenböck, Hanspeter (2018) A Survey of x86-64 Inline Assembly in C Programs. In: Proceedings of the 14th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. . ACM, New York, USA ISBN 978-1-4503-5579-7. (doi:10.1145/3186411.3186418) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rivera-Lillo, Gonzalo, Rojas-Li?bano, Daniel, Burgos, Pablo, Egan?a, Jose, Chennu, Srivas, Maldonado, Pedro (2018) Reduced delta-band modulation underlies the loss of P300 responses in disorders of consciousness. Clinical Neurophysiology, . ISSN 1388-2457. (doi:10.1016/j.clinph.2018.09.104) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Rizzi, Caroline and Johnson, Colin G. and Vargas, Patricia (2018) Fear Learning for Flexible Decision Making in RoboCup: A Discussion. In: Akiyama, Hidehisa and Obst, Oliver and Sammut, Claude and Tonidandel, Flavio, eds. RoboCup 2017: Robot World Cup XXI. Lecture Notes in Artificial Intelligence, 11175 . Springer, Germany, pp. 59-70. ISBN 978-3-030-00307-4. E-ISBN 978-3-030-00308-1. (doi:10.1007/978-3-030-00308-1_5)
[img]
Preview

Sandim Eleute?rio, Jane D. A. and de Franc?a, Breno B. N. and Rubira, Cecilia M. F. and de Lemos, Rogerio (2018) Realising Variability in Dynamic Software Product Line Solutions. In: Software Engineering for Variability Intensive Systems: Foundations and Applications. CRC Press. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Schmitz, Roland and Li, Shujun and Grecos, Christos and Zhang, Xinpeng (2018) Commutative Watermarking-Encryption of Multimedia Data Based on Histograms. In: Bhattacharyya, Siddhartha, ed. Intelligent Innovations in Multimedia Data Engineering and Management. IGI Global, USA, pp. 141-163. ISBN 978-1-5225-8783-5. E-ISBN 978-1-5225-7108-7. (doi:10.4018/978-1-5225-7107-0.ch006) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sharifzadeh, Hamid Reza, Mehdinezhad, Hanie, Allen, Jaqui, McLoughlin, Ian Vince, Ardekani, Iman T (2018) Formant Smoothing for Quality Improvement of Post-Laryngectomised Speech Reconstruction. In: Proceedings of the 2017 International Conference on Orange Technologies (ICOT). . IEEE ISBN 978-1-5386-3275-8. (doi:10.1109/ICOT.2017.8336076) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Shirazibeheshti, Amirali, Cooke, Jennifer, Chennu, Srivas, Adapa, Ram, Menon, David K., Hojjatoleslami, Ali, Witon, Adrien, Li, Ling, Bekinschtein, Tristan, Bowman, Howard and others. (2018) Placing Meta-stable States of Consciousness within the Predictive Coding Hierarchy: the Deceleration of the Accelerated Prediction Error. Consciousness and Cognition, 63 . pp. 123-142. ISSN 1053-8100. (doi:10.1016/j.concog.2018.06.010)
[img]
Preview

Sirur, Sean, Nurse, Jason R. C., Webb, Helena (2018) Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR). In: International Workshop on Multimedia Privacy and Security (MPS) at the 25th ACM Conference on Computer and Communications Security (CCS). CCS-MPS . pp. 88-95. ACM ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267368)
[img]
Preview

Sloan, Thomas (2018) System Steganalysis: Implementation Vulnerabilities and Side-Channel Attacks Against Digital Steganography Systems. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Song, Yan, Wang, Peiseng, Hong, Xinhai, McLoughlin, Ian Vince (2018) Fisher Vector based CNN architecture for Image Classification. In: 2017 IEEE International Conference on Image Processing. . IEEE ISBN 978-1-5090-2175-8. (doi:10.1109/ICIP.2017.8296344) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Spangsberg, Thomas Hvid, Fincher, Sally, Dziallas, Sebastian (2018) Non-Traditional Novices’ Perceptions of Learning to Program: A Framework of Developing Mental Models. In: IEEE 2018 Frontiers in Education Conference (FIE) Proceedings. . IEEE (doi:10.1109/FIE.2018.8659301) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Spinney, Richard E., Prokopenko, Mikhail, Chu, Dominique (2018) Information ratchets exploiting spatially structured information reservoirs. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 98 (2). ISSN 2470-0045. (doi:10.1103/PhysRevE.98.022124)
[img]
Preview

Sturgess, Jack, Nurse, Jason R. C., Zhao, Jun (2018) A capability-oriented approach to assessing privacy risk in smart home ecosystems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. . IET E-ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0037)
[img]
Preview

Swan, Jerry, Johnson, Colin G., Brady, Edwin C. (2018) Subtype polymorphism à la carte via machine learning on dependent types. In: ISSTA/ECOOP 2018 Workshops. . pp. 14-16. ACM, New York, NY, USA ISBN 978-1-4503-5939-9. (doi:10.1145/3236454.3236469)
[img]
Preview
[img]

Thibaut, Aurore, Chennu, Srivas, Chatelle, Camille, Martens, Géraldine, Annen, Jitka, Cassol, Helena, Laureys, Steven (2018) Theta network centrality correlates with tDCS response in disorders of consciousness. Brain Stimulation, . ISSN 1935-861X. (doi:10.1016/j.brs.2018.09.002)
[img]
Preview

Thompson, Simon and Lamela Seijas, Pablo (2018) Marlowe: Financial Contracts on Blockchain. In: Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice. Lecture Notes in Computer Science . Springer-Verlag Berlin, Switzerland. ISBN 978-3-030-03427-6. (doi:10.1007/978-3-030-03427-6_27) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img] [img]

Torres Lopez, Carmen and Marr, Stefan and Gonzalez Boix, Elisa and Mössenböck, Hanspeter (2018) A Study of Concurrency Bugs and Advanced Development Support for Actor-based Programs. In: Ricci, Alessandro and Haller, Philipp, eds. Programming with Actors: State-of-the-Art and research Perspectives. Lect.Notes ComputerState-of-the-Art Surveys, 10789 . Springer. ISBN 978-3-030-00302-9. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Tussyadiah, Iis, Li, Shujun, Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, Juho and Neidhardt, Julia, eds. Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019. . pp. 278-290. Springer Nature Switzerland AG, Cham, Switzerland ISBN 978-3-030-05939-2. E-ISBN 978-3-030-05940-8. (doi:10.1007/978-3-030-05940-8_22)
[img]
Preview

Ugawa, Tomoharu and Jones, Richard (2018) Model Checking Transactional Sapphire. Technical report. School of Computing, University of Kent, Kent, UK (Unpublished)
[img]
Preview

da Silva, P.N., Plastino, Alexandre, Freitas, Alex A. (2018) A Novel Genetic Algorithm for Feature Selection in Hierarchical Feature Spaces. In: Proceedings of the SIAM International Conference on Data Mining (SDM18). . pp. 738-746. E-ISBN 978-1-61197-532-1. (doi:10.1137/1.9781611975321.83) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogerio and Garlan, David and Ghezzi, Carlo and Giese, Holger and Andersson, Jesper and Litoiu, Marin and Schmerl, Bradley and Weyns, Danny and Baresi, Luciano and Bencomo, Nelly and Brun, Yuriy and Camara, Javier and Calinescu, Radu and Cohen, Myra B. and Gorla, Alessandra and Grassi, Vincenzo and Grunske, Lars and Inverardi, Paola and Jezequel, Jean-Marc and Malek, Sam and Mirandola, Raffaela and Mori, Marco and Müller, Hausi A. and Rouvoy, Romain and Rubira, Cecília M. F. and Rutten, Eric and Shaw, Mary and Tamburrelli, Giordano and Tamura, Gabriel and Villegas, Norha M. and Vogel, Thomas and Zambonelli, Franco (2018) Software Engineering for Self-Adaptive Systems: Research Challenges in the Provision of Assurances. In: de Lemos, Rogerio and Garlan, D. and Giese, H., eds. Software Engineering for Self-Adaptive Systems III. Assurances. Lecture Notes on Computer Science . Springer. ISBN 978-3-319-74182-6. (doi:10.1007/978-3-319-74183-3_1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogerio, Sedgewick, Peter (2018) Self-adaptation made easy with Blockchains. In: Proceedings of 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. . ACM ISBN 978-1-4503-5715-9. (doi:10.1145/3194133.3194150)
[img]
Preview

de Sá, Alex G. C. and Freitas, Alex A. and Pappa, Gisele L. (2018) Automated Selection and Configuration of Multi-Label Classification Algorithms with Grammar-Based Genetic Programming. In: Auger, Anne and Fonseca, Carlos M. and Lourenço, Nuno and Machado, Penousal and Paquete, Luís and Whitley, Darrell, eds. Parallel Problem Solving from Nature – PPSN XV. Lecture Notes in Computer Science . Springer, pp. 308-320. ISBN 978-3-319-99258-7. (doi:10.1007/978-3-319-99259-4_25) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

2017

Ackerman, Margareta, Goel, Ashok, Johnson, Colin G., Jordanous, Anna, Leon, Carlos, Perez y Perez, Rafael, Toivonen, Hannu, Ventura, Dan (2017) Teaching Computational Creativity. In: Goel, Ashok and Jordanous, Anna and Pease, Alison, eds. Proceedings of the Eighth International Conference on Computational Creativity. . pp. 9-16. Georgia Institute of Technology, Atlanta, Georgia, US ISBN 978-0-692-89564-1.
[img]
Preview

Adams, Stephen (2017) Data-Driven Refactorings for Haskell. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Aktypi, Angeliki, Nurse, Jason R. C., Goldsmith, Michael (2017) Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks. In: Proceedings of the 2017 International Workshop on Multimedia Privacy and Security. . ACM ISBN 978-1-4503-5206-2. (doi:10.1145/3137616.3137617)
[img]
Preview

Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science, 10292 . Springer International Publishing AG, pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_13)
[img]
Preview

Alqahtani, Saeed Ibrahim, Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. . Article No. 19. ACM, New York, NY, USA ISBN 978-1-4503-5257-4. (doi:10.1145/3098954.3098984)
[img]
Preview

Alrayes, Bedour, Kafalı, Özgur, Stathis, Kostas (2017) Concurrent bilateral negotiation for open e-markets: The Conan strategy. Knowledge and Information Systems, . ISSN 0219-1377. (doi:10.1007/s10115-017-1125-2)
[img]
Preview

Baker, Robert (2017) A Method for Graph Drawing Utilising Patterns. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Barardo, Diogo G., Newby, Danielle, Thornton, Daniel, Ghafourian, Taravat, Pedro de Magalhães, João, Freitas, Alex A. (2017) Machine learning for predicting lifespan-extending chemical compounds. Aging, 9 (7). pp. 1721-1737. ISSN 1945-4589. (doi:10.18632/aging.101264)
[img]
Preview

Batty, Mark (2017) Compositional relaxed concurrency. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 375 (2104). ISSN 1364-503X. E-ISSN 1471-2962. (doi:10.1098/rsta.2015.0406)
[img]
Preview
[img]

Burcham, Morgan, Al-Zyoud, Mahran, Carver, Jeffrey C., Alsaleh, Mohammed, Du, Hongying, Gilani, Fida, Jiang, Jun, Rahman, Akond, Kafalı, Özgur, Al-Shaer, Ehab, and others. (2017) Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers. In: Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp. . pp. 13-23. ACM ISBN 978-1-4503-5274-1. (doi:10.1145/3055305.3055307) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chari, Guido, Garbervetsky, Diego, Marr, Stefan (2017) Fully-reflective VMs for Ruling Software Adaptation. In: Proceedings of the 39th International Conference on Software Engineering Companion. (doi:10.1109/ICSE-C.2017.144)
[img]
Preview

Chari, Guido, Garbervetsky, Diego, Marr, Stefan (2017) A Metaobject Protocol for Optimizing Application-Specific Run-Time Variability. In: Proceedings of the 11th Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems. (doi:10.1145/3098572.3098577)
[img]
Preview

Chawdhary, Aziem and King, Andy (2017) Compact Difference Bound Matrices. In: Chang, Evan, ed. 15th Asian Symposium on Programming Languages and Systems. Lecture Notes in Computer Science . Springer, pp. 471-490. ISBN 978-3-319-71236-9. (doi:10.1007/978-3-319-71237-6_23)
[img]
Preview

Chen, Wanlong (2017) Memristor Content Addressable Memory: Theory, Design and Application. Doctor of Philosophy (PhD) thesis, University of Kent. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Cheval, Vincent, Comon-Lundh, Hubert, Delaune, Stéphanie (2017) A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation, 255 (part 1). pp. 94-125. ISSN 0890-5401. E-ISSN 1090-2651. (doi:10.1016/j.ic.2017.05.004)
[img]
Preview

Chitil, Olaf, Faddegon, Maarten, Runciman, Colin (2017) A Lightweight Hat: Simple Type-Preserving Instrumentation for Self-Tracing Lazy Functional Programs. In: Proceedings of Implementation and Application of Functional Languages, IFL 2016. (10). ACM ISBN 978-1-4503-4767-9. (doi:10.1145/3064899.3064904)
[img]
Preview

Duraisingam, A., Palaniappan, Ramaswamy, Andrews, S. (2017) Cognitive task difficulty analysis using EEG and data mining. In: Proceedings of the 2017 Conference on Emerging Devices and Smart Systems (ICEDSS). . pp. 52-57. IEEE ISBN 978-1-5090-5555-5. (doi:10.1109/ICEDSS.2017.8073658) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dziallas, Sebastian, Fincher, Sally, Johnson, Colin G., Utting, Ian (2017) The Year in Computing Initiative. In: 5th Annual Symposium of the United Kingdom & Ireland Engineering Education Research Network. . Aston University, Birmingham, UK ISBN 978-1-85449-443-6.
[img]
Preview

Eisl, Josef, Marr, Stefan, Würthinger, Thomas, Mössenböck, Hanspeter (2017) Trace Register Allocation Policies: Compile-time vs. Performance Trade-offs. In: Proceedings of the 14th International Conference on Managed Languages and Runtimes. (doi:10.1145/3132190.3132209)
[img]
Preview

Fabris, Fabio (2017) New Probabilistic Graphical Models and Meta-Learning Approaches for Hierarchical Classification, with Applications in Bioinformatics and Ageing. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview
[img]

Fabris, Fabio, Freitas, Alex A., de Magalhaes, João Pedro (2017) A Review of Supervised Machine Learning Applied to Ageing Research. Biogerontology, 18 (2). pp. 171-188. ISSN 1389-5729. E-ISSN 1573-6768. (doi:10.1007/s10522-017-9683-y)
[img]
Preview
[img]
Preview

Faddegon, Maarten (2017) Algorithmic debugging for complex lazy functional programs. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Flur, Shaked, Sarkar, Susmit, Pulte, Christopher, Nienhuis, Kyndylan, Maranget, Luc, Gray, Kathryn E., Sezgin, Ali, Batty, Mark, Sewell, Peter (2017) Mixed-Size Concurrency: ARM, POWER, C/C++11, and SC. In: ACM SIGPLAN Notices - POPL '17. POPL 2017 Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. 52 (1). ACM ISBN 978-1-4503-4660-3. (doi:10.1145/3009837.3009839)
[img]
Preview

Goel, Ashok, Jordanous, Anna, Pease, Alison (2017) Preface: Proceedings of the Eighth International Conference on Computational Creativity, ICCC 2017, Atlanta — 19 - 23 June. In: Goel, Ashok and Jordanous, Anna and Pease, Alison, eds. 8th International Conference on Computational Creativity. . ACC ISBN 978-0-692-89564-1.
[img]
Preview

Grimmer, Matthias, Marr, Stefan, Kahlhofer, Mario, Wimmer, Christian, Würthinger, Thomas, Mössenböck, Hanspeter (2017) Applying Optimizations for Dynamically-typed Languages to Java. In: Proceedings of the 14th International Conference on Managed Languages and Runtimes. ManLang'17 . pp. 12-22. ACM ISBN 978-1-4503-5340-3. (doi:10.1145/3132190.3132202)
[img]
Preview

Grzes, Marek (2017) Reward Shaping in Episodic Reinforcement Learning. In: Proc. of the 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2017). . pp. 565-573. ACM
[img]
Preview

Helal, Ayah, Otero, Fernando E.B. (2017) Automatic design of ant-miner mixed attributes for classification rule discovery. In: GECCO '17: Proceedings of the Genetic and Evolutionary Computation Conference. . pp. 433-440. ACM ISBN 978-1-4503-4920-8. (doi:10.1145/3071178.3071306)
[img]
Preview

Howe, Jacob M. and Robbins, Ed and King, Andy (2017) Theory Learning with Symmetry Breaking. In: Pientka, Brigitte, ed. International Symposium on Principles and Practice of Declarative Programming. ACM, Namur, Belgium, pp. 85-96. ISBN 978-1-4503-5291-8. (doi:10.1145/3131851.3131861)
[img]
Preview

Jameel, Shoaib, Bouraoui, Zied, Schockaert, Steven (2017) MEmbER: Max-Margin Based Embeddings for Entity Retrieval. In: SIGIR '17 Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval. Proceedings of the 40th International ACM SIGIR. . pp. 783-792. ACM ISBN 978-1-4503-5022-8. (doi:10.1145/3077136.3080803)
[img]
Preview

Jarchi, Delaram, Casson, Alexander J. (2017) Towards Photoplethysmography-Based Estimation of Instantaneous Heart Rate During Physical Activity. IEEE Transactions on Biomedical Engineering, 64 (9). pp. 2042-2053. ISSN 0018-9294. (doi:10.1109/TBME.2017.2668763) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Jordan, Tobias, De Wilde, Philippe, Buarque de Lima Neto, Fernando (2017) Modeling Contagion of Behavior in Friendship Networks as Coordination Games. In: Advances in Social Simulation 2015. Advances in Intelligent Systems and Computing (AISC) , 528. pp. 181-194. Springer ISBN 978-3-319-47252-2. E-ISBN 978-3-319-47253-9. (doi:10.1007/978-3-319-47253-9_15)
[img]
Preview

Jordanous, Anna (2017) Co-creativity and perceptions of computational agents in co-creativity. In: Proceedings of the Eighth International Conference on Computational Creativity. . pp. 159-166. ACC ISBN 978-0-692-89564-1.
[img]
Preview

Jordanous, Anna (2017) How can we write software that can communicate creatively? In: Proceedings of the 4th AISB Symposium on Computational Creativity. .
[img]
Preview

Jordanous, Anna (2017) Review. Review of: Computation and the humanities : towards an oral history of digital humanities by Nyhan, J. and Flinn A., A.. ACM Computing Reviews, (Sep'17). Review #: CR145551. E-ISSN 1530-6585.
[img]

Kafalı, Özgur, Ajmeri, Nirav, Singh, Munindar P. (2017) Formal Understanding of Tradeoffs among Liveness and Safety Requirements. In: 2016 IEEE 24th International Requirements Engineering Conference Workshops. . pp. 17-18. IEEE ISBN 978-1-5090-3694-3. (doi:10.1109/REW.2016.017) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafalı, Özgur, Ajmeri, Nirav, Singh, Munindar P. (2017) Kont: Computing tradeoffs in normative multiagent systems. In: Proceedings of the 31st Conference on Artificial Intelligence (AAAI). . pp. 3006-3012.
[img]
Preview

Kafalı, Özgur, Ajmeri, Nirav, Singh, Munindar P. (2017) Normative Requirements in Sociotechnical Systems. In: 2016 IEEE 24th International Requirements Engineering Conference Workshops. . pp. 259-260. IEEE ISBN 978-1-5090-3694-3. (doi:10.1109/REW.2016.049) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafalı, Özgur, Jones, Jasmine, Petruso, Megan, Williams, Laurie, Singh, Munindar P. (2017) How Good is a Security Policy against Real Breaches? A HIPAA Case Study. In: 2017 IEEE/ACM 39th International Conference on Software Engineering. . pp. 530-540. ISBN 978-1-5386-3868-2. (doi:10.1109/ICSE.2017.55)
[img]
Preview

Kafalı, Özgur, Romero, Alfonso E., Stathis, Kostas (2017) Agent-oriented activity recognition in the event calculus: An application for diabetic patients. Computational Intelligence, 33 (4). pp. 899-925. ISSN 0824-7935. (doi:10.1111/coin.12121) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafalı, Özgur, Singh, Munindar P. (2017) Improving Cybersecurity: User Accountability and Sociotechnical Systems. . IEEE Online. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kampouridis, Michael, Adegboye, Adesola, Johnson, Colin G. (2017) Evolving Directional Changes Trading Strategies with a New Event-based Indicator. In: Shi, Y. et al., ed. Lecture Notes in Computer Science. Lecture Notes in Computer Science . pp. 727-738. ISBN 978-3-319-68758-2. E-ISBN 978-3-319-68759-9.
[img]
Preview

Kapinchev, Konstantin (2017) Scalable Parallel Optimization of Digital Signal Processing in the Fourier Domain. Doctor of Philosophy (PhD) thesis, University of Kent.
[img]
Preview

Kell, Stephen (2017) Some were meant for C: the endurance of an unmanageable language. In: Onward! 2017 Proceedings of the 2017 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software. . ACM, New York, NY, USA ISBN 978-1-4503-5530-8. (doi:10.1145/3133850.3133867) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Knox, Daniel (2017) A Cartography of Practice. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Koch, Philipp, Phan, Huy, Maass, Marco, Katzberg, Fabrice, Mertins, Alfred (2017) Early Prediction of Future Hand Movements Using sEMG Data. In: 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society: Smarter Technology for a Healthier World. . pp. 54-57. IEEE (doi:10.1109/EMBC.2017.8036761)
[img]
Preview

Kuttikat, Anoop, Noreika, Valdas, Chennu, Srivas, Shenker, Nicholas, Bekinschtein, Tristan, Brown, Christopher A. (2017) Altered Neurocognitive Processing of Tactile Stimuli in Patients with Complex Regional Pain Syndrome (CRPS). The Journal of Pain, 19 (4). pp. 395-409. ISSN 1526-5900. (doi:10.1016/j.jpain.2017.11.008)
[img]
Preview

Lamela Seijas, Pablo (2017) Model construction, evolution, and use in testing of software systems. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Lange, Julien, Ng, Nicholas, Toninho, Bernardo, Yoshida, Nobuko (2017) Fencing off go: liveness and safety for channel-based programming. In: Castagna, Giuseppe and Gordon, Andrew D., eds. Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. . pp. 748-761. ACM ISBN 978-1-4503-4660-3. (doi:10.1145/3009837.3009847)
[img]
Preview

Lange, Julien and Tuosto, Emilio and Yoshida, Nobuko (2017) A Tool for Choreography-Based Analysis of Message-Passing Software. In: Behavioural Types: from Theory to Tools. River Publishers. ISBN 978-87-93519-82-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lange, Julien, Yoshida, N. (2017) On the undecidability of asynchronous session subtyping. In: Esparza, J. and Murawski, A., eds. Lecture Notes in Computer Science. Foundations of Software Science and Computation Structures. FoSSaCS 2017. 10203 (10203). pp. 441-457. Springer ISBN 978-3-662-54457-0. (doi:10.1007/978-3-662-54458-7_26) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Maass, Marco, Ahlborg, Mandy, Bakenecker, Anna, Katzberg, Fabrice, Phan, Huy, Buzug, Thorsten M., Mertins, Alfred (2017) A Trajectory Study for Obtaining MPI System Matrices in a Compressed-Sensing Framework. International Journal on Magnetic Particle Imaging, 3 (2). (doi:10.18416/ijmpi.2017.1706005)
[img]
Preview

Marr, Stefan, Torres Lopez, Carmen, Aumayr, Dominik, Gonzalez Boix, Elisa, Mössenböck, Hanspeter (2017) A Concurrency-Agnostic Protocol for Multi-Paradigm Concurrent Debugging Tools. In: Proceedings of the 13th ACM SIGPLAN International Symposium on Dynamic Languages. (doi:10.1145/3133841.3133842)
[img]
Preview

Mazaheri, A., Segaert, K., Olichney, J., Yang, J-C, Niu, Y-Q, Shapiro, Kimron L., Bowman, Howard (2017) EEG oscillations during word processing predict MCI conversion to Alzheimer's disease. NeuroImage: Clinical, 17 . pp. 188-197. ISSN 2213-1582. (doi:10.1016/j.nicl.2017.10.009)
[img]
Preview

Mazur, Radoslaw, Katzberg, Fabrice, Phan, Huy, Mertins, Alfred (2017) Room Equalization Based on Measurements of Moving Microphones. In: 2017 Hands-Free Speech Communications and Microphone Arrays Hscma 2017 Proceedings. . pp. 121-125. IEEE, San Francisco, USA ISBN 978-1-5090-5925-6. (doi:10.1109/HSCMA.2017.7895574)
[img]
Preview

Menendez, Hector, Otero, Fernando E.B., Camacho, David (2017) Extending the SACOC algorithm through the Nystrom method for Dense Manifold Data Analysis. International Journal of Bio-Inspired Computation, 10 (2). pp. 127-135. ISSN 1758-0366. E-ISSN 1758-0374. (doi:10.1504/IJBIC.2017.085894)
[img]
Preview
[img]
Preview

Mercier, Daniel, Chawdhary, Aziem, Jones, Richard E. (2017) dynStruct: An automatic reverse engineering tool for structure recovery and memory use analysis. In: 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER). . pp. 497-501. Institute of Electrical and Electronics Engineers ISBN 978-1-5090-5502-9. E-ISBN 978-1-5090-5501-2. (doi:10.1109/SANER.2017.7884661)
[img]
Preview

Mikolas, Janota, Radu, Grigore, Vasco, Manquinho (2017) On the Quest for an Acyclic Graph. In: 24th RCRA International Workshop on "Experimental Evaluation of Algorithms for solving problems with combinatorial explosion", 14-15 Nov 2017, Bari, Italy. (Unpublished)
[img]
Preview

Mouli, S., Palaniappan, Ramaswamy (2017) Eliciting higher SSVEP response from LED visual stimulus with varying luminosity levels. In: 2016 International Conference for Students on Applied Engineering (ICSAE). . pp. 201-206. IEEE ISBN 978-1-4673-9053-8. (doi:10.1109/ICSAE.2016.7810188) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mouli, S., Palaniappan, Ramaswamy (2017) Hybrid BCI utilising SSVEP and P300 event markers for reliable and improved classification using LED stimuli. In: 2017 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE). . pp. 127-131. IEEE ISBN 978-1-5090-4752-9. (doi:10.1109/ISCAIE.2017.8074963) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mouli, Surej (2017) DESIGN OF PORTABLE LED VISUAL STIMULUS AND SSVEP ANALYSIS FOR VISUAL FATIGUE REDUCTION AND IMPROVED ACCURACY. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Nouh, Mariam, Nurse, Jason R. C., Goldsmith, Michael (2017) Towards Designing a Multipurpose Cybercrime Intelligence Framework. In: Brynielsson, Joel and Johansson, Fredrik, eds. 2016 European Intelligence and Security Informatics Conference (EISIC 2016). . IEEE ISBN 978-1-5090-2856-6. (doi:10.1109/EISIC.2016.018)
[img]
Preview

Orchard, Dominic A. and Yoshida, Nobuko (2017) Session Types with Linearity in Haskell. In: Gay, S. and Ravara, A., eds. Behavioural Types: from Theory to Tools. River Publishers Series in Automation, Control and Robotics . River Publishers, pp. 219-241. ISBN 978-87-93519-82-4. E-ISBN 978-87-93519-81-7. (doi:10.13052/rp-9788793519817)
[img]
Preview
[img]
Preview

Osadchy, Margarita, Hernandez-Castro, Julio C., Gibson, Stuart J., Dunkelman, Orr, Perez-Cabo, Daniel (2017) No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, with Applications to CAPTCHA Generation. IEEE Transactions on Information Forensics and Security, . ISSN 1556-6013. (doi:10.1109/TIFS.2017.2718479)
[img]
Preview

Otero, Fernando E.B. (2017) MYRA: A Java Ant Colony Optimization Framework for Classification Algorithms. In: GECCO '17 Proceedings of the Genetic and Evolutionary Computation Conference Companion. . pp. 1247-1254. ACM, New York, USA ISBN 978-1-4503-4939-0. (doi:10.1145/3067695.3082471)
[img]
Preview

Pedersen, Jan B., Welch, Peter H. (2017) The symbiosis of concurrency and verification: teaching and case studies. Formal Aspects of Computing, 30 (2). pp. 239-277. ISSN 0934-5043. (doi:10.1007/s00165-017-0447-x)
[img]
Preview

Phan, Huy, Hertel, Lars, Maass, Marco, Koch, Philipp, Mazur, Radoslaw, Mertins, Alfred (2017) Improved Audio Scene Classification based on Label-Tree Embeddings and Convolutional Neural Networks. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 25 (6). pp. 1278-1290. ISSN 2329-9290. E-ISSN 2329-9304. (doi:10.1109/TASLP.2017.2690564)
[img]
Preview

Phan, Huy, Koch, P., Katzberg, F., Maass, Marco, Mazur, M., McLoughlin, Ian Vince, Mertins, A. (2017) What makes audio event detection harder than classification? In: 2017 25th European Signal Processing Conference (EUSIPCO). . IEEE ISBN 978-0-9928626-7-1. (doi:10.23919/EUSIPCO.2017.8081709)
[img]
Preview
[img]
Preview

Phan, Huy, Koch, Philipp, Hertel, Lars, Maass, Marco, Mazur, Radoslaw, Mertins, Alfred (2017) CNN-LTE: A Class of 1-X Pooling Convolutional Neural Networks on Label Tree Embeddings for Audio Scene Classification. In: 2017 IEEE International Conference on Acoustics, Speech, and Signal Processing Proceedings. . pp. 136-140. IEEE, New Orleans, USA ISBN 978-1-5090-4117-6. (doi:10.1109/ICASSP.2017.7952133)
[img]
Preview

Phan, Huy, Koch, Philipp, Katzberg, Fabrice, Maass, Marco, Mazur, Radoslaw, Mertins, Alfred (2017) Audio Scene Classification with Deep Recurrent Neural Networks. In: Proceedings of Interspeech. . pp. 3043-3047. International Speech Communication Association, Stockholm, Sweden (doi:10.21437/Interspeech.2017-101)
[img]
Preview

Pickering, Todd, Jordanous, Anna (2017) Applying Narrative Theory to Aid Unexpectedness in a Self-Evaluative Story Generation System. In: Proceedings of the Eighth International Conference on Computational Creativity. . pp. 213-220. ISBN 978-0-692-89564-1.
[img]
Preview

Pimás, Javier, Burroni, Javier, Arnaud, Jean Baptiste, Marr, Stefan (2017) Garbage Collection and Efficiency in Dynamic Metacircular Runtimes. In: Proceedings of the 13th ACM SIGPLAN International Symposium on Dynamic Languages. (doi:10.1145/3133841.3133845)
[img]
Preview

Pomsuwan, Tossapol (2017) FEATURE SELECTION FOR THE CLASSIFICATION OF LONGITUDINAL HUMAN AGEING DATA. Master of Research (MRes) thesis, University of Kent,.
[img]
Preview

Pomsuwan, Tossapol, Freitas, Alex A. (2017) Feature Selection for the Classification of Longitudinal Human Ageing Data. In: 2017 IEEE International Conference on Data Mining Workshops. . pp. 739-746. IEEE, USA ISBN 978-1-5386-1480-8. E-ISBN 978-1-5386-3800-2. (doi:10.1109/ICDMW.2017.102)
[img]
Preview

Pérez Méndez, Alejandro, López Millán, Gabriel, Marín López, Rafael, Chadwick, David W., Schechtman Sette, Ioram (2017) Integrating an AAA-based federation mechanism for OpenStack-The CLASSe view. Concurrency and Computation: Practice and Experience, 29 (12). e4148. ISSN 1532-0626. (doi:10.1002/cpe.4148)
[img]
Preview

Qian, Mengjie, McLoughlin, Ian Vince, Guo, Wu, Dai, Li-Rong (2017) Mismatched Training Data Enhancement for Automatic Recognition of Children’s Speech using DNN-HMM. In: Proc. 10th International Symposium on Chinese Spoken Language Processing. . IEEE ISBN 978-1-5090-4295-1. E-ISBN 978-1-5090-4294-4. (doi:10.1109/ISCSLP.2016.7918386)
[img]
Preview

Rashid, Md Mamunur (2017) Non-Grid Opportunistic Resources for (Big Data) Volunteer Computing. Doctor of Philosophy (PhD) thesis, University of Kent. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Rizzi Raymundo, Caroline (2017) SAFEL - A Situation-aware Fear Learning Model. Doctor of Philosophy (PhD) thesis, University of Kent, Heriot-Watt University. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Robbins, Ed (2017) Solvers for Type Recovery and Decompilation of Binaries. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Rowe, Reuben, Brotherston, James (2017) Automatic cyclic termination proofs for recursive procedures in separation logic. In: Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs. . pp. 53-65. ACM ISBN 978-1-4503-4705-1. (doi:10.1145/3018610.3018623)
[img]
Preview

Salama, Khalid M., Abdelbar, Ashraf M., Helal, Ayah, Freitas, Alex A. (2017) Instance-based classification with ant colony optimization. Intelligent Data Analysis, 21 (4). pp. 913-944. ISSN 1088-467X. (doi:10.3233/IDA-160031) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Si, Xujie, Zhang, Xin, Grigore, Radu, Naik, Mayur (2017) Maximum Satisfiability in Software Analysis: Applications and Techniques. In: Lecture Notes in Computer Science. Computer Aided Verification: 29th International Conference, CAV 2017 Heidelberg, Germany, July 24–28, 2017 Proceedings, Part I. 10426. pp. 68-94. Springer ISBN 978-3-319-63386-2. (doi:10.1007/978-3-319-63387-9_4)
[img]
Preview

Simione, Luca, Akyurek, Elkan, Vastola, Valentina, Raffone, Antonino, Bowman, Howard (2017) Illusions of Integration are Subjectively Impenetrable: Phenomenological Experience of Lag 1 Percepts during Dual-target RSVP. Consciousness and Cognition, 51 . pp. 181-192. ISSN 1053-8100. (doi:10.1016/j.concog.2017.03.004)
[img]
Preview

Smith, Connor Lane (2017) Optimal Sharing Graphs for Substructural Higher-order Rewriting Systems. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Tranquille, Dominique, Stapleton, Gem, Burton, Jim, Rodgers, Peter (2017) Evaluating the effects of size in linesets. In: Proceedings of the 10th International Symposium on Visual Information Communication and Interaction. . pp. 121-128. ACM ISBN 978-1-4503-5292-5. (doi:10.1145/3105971.3105978)
[img]
Preview

Vandercammen, Maarten, Marr, Stefan, De Roover, Coen (2017) A Flexible Framework for Studying Trace-Based Just-In-Time Compilation. Computer Languages, Systems & Structures, 51 . pp. 22-47. ISSN 1477-8424. (doi:10.1016/j.cl.2017.07.005)
[img]
Preview

Wiiliams, Nick, Li, Shujun (2017) Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model. In: Proceedings of 2017 3rd IEEE International Conference on Cybernetics. . pp. 471-478. IEEE, USA ISBN 978-1-5386-2201-8. E-ISBN 978-1-5386-2200-1. (doi:10.1109/CYBConf.2017.7985810)
[img]
Preview

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2017) Privacy is the boring bit: User perceptions and behaviour in the Internet-of-Things. In: 15th International Conference on Privacy‚ Security and Trust (PST), August 28-30, 2017, Calgary, canada.
[img]
Preview

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2017) Privacy salience: Taxonomies and research opportunities. Privacy and Identity Management – Facing Up To Next Steps, IFIP Advances in Information and Communication Technology, . (doi:10.1007/978-3-319-55783-0_18)
[img]
Preview

Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 251-264. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_17)
[img]
Preview

Zhao, Liming, Perez-Delgado, Carlos, Fitzsimons, Joseph, Benjamin, Simon (2017) A measurement driven analog of adiabatic quantum computation for frustration-free Hamiltonians. arXiv, . (Submitted)
[img]
Preview

de Oliveira, Lariza Laura, Freitas, Alex A., Tinós, Renato (2017) Multi-objective genetic algorithms in the study of the genetic code’s adaptability. Information Sciences, 425 . pp. 48-61. ISSN 0020-0255. (doi:10.1016/j.ins.2017.10.022)
[img]
Preview

2016

Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. and Upton, David (2016) The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance. Project report. University of Oxford, Oxford, UK (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Allen, Jaqui, Sharifzadeh, Hamid Reza, McLoughlin, Ian Vince, Sarrafzadeh, A, Ardekani, Iman T (2016) Acoustic analysis and computerised reconstruction of speech in laryngectomised individuals. In: 137th Annual Meeting of American Laryngological Association (ALA), Combined Otolaryngology Spring Meetings (COSM 2016), 18-19 May 2016, Chicago, USA. (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Alrayes, Bedour and Kafalı, Özgur and Stathis, Kostas (2016) RECON: A Robust multi-agent Environment for simulating COncurrent Negotiations. In: Recent advances in agent-based complex automated negotiation. Studies in Computational Intelligence . Springer, pp. 157-174. ISBN 978-3-319-30305-5. (doi:10.1007/978-3-319-30307-9_10) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Alsallakh, Bilal, Micallef, Luana, Aigner, Wolfgang, Hauser, Helwig, Miksch, Silvia, Rodgers, Peter (2016) The State-of-the-Art of Set Visualization. Computer Graphics Forum, 35 (1). pp. 234-260. ISSN 1467-8659. (doi:10.1111/cgf.12722) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Aniceto, Natália, Freitas, Alex A., Bender, Andreas, Ghafourian, Taravat (2016) A novel applicability domain technique for mapping predictive reliability across the chemical space of a QSAR: reliability-density neighbourhood. Journal of Cheminformatics, 8 (1). p. 69. ISSN 1758-2946. (doi:10.1186/s13321-016-0182-y)
[img]
Preview

Avoine, Gildas, Beaujeant, Antonin, Hernandez-Castro, Julio C., Demay, Louis, Teuwen, Philippe (2016) A Survey of Security and Privacy Issues in ePassport Protocols. ACM Computing Surveys, 48 (3). pp. 1-37. ISSN 0360-0300. (doi:10.1145/2825026) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Beukema, Steve, Gonzalez-Lara, Laura E., Finoia, Paola, Kamau, Evelyn, Allanson, Judith, Chennu, Srivas, Gibson, Raechelle M., Pickard, John D., Owen, Adrian M., Cruse, Damian and others. (2016) A hierarchy of event-related potential markers of auditory processing in disorders of consciousness. NeuroImage: Clinical, 12 . pp. 359-371. ISSN 2213-1582. (doi:10.1016/j.nicl.2016.08.003)
[img]
Preview

Bonetta, Daniele, Salucci, Luca, Marr, Stefan, Binder, Walter (2016) GEMs: Shared-memory Parallel Programming for Node.js. In: ACM SIGPLAN Notices. OOPSLA 2016 Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications. . pp. 531-547. ACM ISBN 978-1-4503-4444-9. (doi:10.1145/2983990.2984039)
[img]
Preview

Brown, Neil C. C., Kölling, Michael, Altadmri, Amjad (2016) Position Paper: Lack of Keyboard Support Cripples Block-Based Programming. In: 2015 IEEE Blocks and Beyond Workshop (Blocks and Beyond). . pp. 59-61. IEEE E-ISBN 978-1-4673-8367-7. (doi:10.1109/BLOCKS.2015.7369003)
[img]
Preview

Casson, Alexander J., Vazquez Galvez, Arturo, Jarchi, Delaram (2016) Gyroscope vs. accelerometer measurements of motion from wrist PPG during physical exercise. ICT Express, 2 (4). pp. 175-179. ISSN 2405-9595. (doi:10.1016/j.icte.2016.11.003)
[img]
Preview

Chari, Guido, Garbervetsky, Diego, Marr, Stefan (2016) Building Efficient and Highly Run-time Adaptable Virtual Machines. In: ACM SIGPLAN Notices. DLS 2016 Proceedings of the 12th Symposium on Dynamic Languages. 52 (2). pp. 60-71. ACM ISBN 978-1-4503-4445-6. (doi:10.1145/2989225.2989234)
[img]
Preview

Chen, Huankai (2016) Entropy-Based Resource Management in Complex Cloud Environment. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Chennu, S., Noreika, V., Gueorguiev, D., Shtyrov, Y., Bekinschtein, T. A., Henson, R. (2016) Silent Expectations: Dynamic Causal Modeling of Cortical Prediction and Attention to Sounds That Weren't. Journal of Neuroscience, 36 (32). pp. 8305-8316. ISSN 0270-6474. E-ISSN 1529-2401. (doi:10.1523/JNEUROSCI.1125-16.2016)
[img]
Preview

Chennu, Srivas, O’Connor, Stuart, Adapa, Ram, Menon, David K., Bekinschtein, Tristan A. (2016) Brain Connectivity Dissociates Responsiveness from Drug Exposure during Propofol-Induced Transitions of Consciousness. PLoS Computational Biology, 12 (1). pp. 1-17. ISSN 1553-734X. E-ISSN 1553-7358. (doi:10.1371/journal.pcbi.1004669)
[img]
Preview

Chennu, Srivas, Stamatakis, Emmanuel A, Menon, David K (2016) The see-saw brain: recovering consciousness after brain injury. The Lancet Neurology, 15 (8). pp. 830-842. ISSN 1474-4422. E-ISSN 1474-4465. (doi:10.1016/S1474-4422(16)30027-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Contrastin, Mistral, Danish, Matthew, Rice, Andrew C., Orchard, Dominic A. (2016) Supporting Software Sustainability with Lightweight Specifications. In: CEUR Workshop Proceedings. Proceedings of the Fourth Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE4). 1686.
[img]
Preview

Cooke, Jennifer, Ann (2016) Interacting with consciousness: An investigation into the neural signatures of conscious processing using the global-local auditory task. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Cramer, Sam, Kampouridis, Michael, Freitas, Alex A., Alexandridis, Antonis (2016) Predicting Rainfall in the Context of Rainfall Derivatives Using Genetic Programming. In: 2015 IEEE Symposium Series on Computational Intelligence. . pp. 711-718. IEEE ISBN 978-1-4799-7560-0. (doi:10.1109/SSCI.2015.108)
[img]
Preview

Cvetkovic, Bozidara, Janko, Vito, Romero, Alfonso E, Kafalı, Özgur, Stathis, Kostas, Lustrek, Mitja (2016) Activity recognition for diabetic patients using a smartphone. Journal of medical systems, 40 (12). p. 256. ISSN 0148-5598. (doi:10.1007/s10916-016-0598-y) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Daloze, Benoit, Marr, Stefan, Bonetta, Daniele, Mössenböck, Hanspeter (2016) Efficient and Thread-Safe Objects for Dynamically-Typed Languages. ACM SIGPLAN Notices, 51 (10). pp. 642-659. ISSN 0362-1340. E-ISSN 1558-1160. (doi:10.1145/2983990.2984001)
[img]
Preview

De Koster, Joeri, Marr, Stefan, Van Cutsem, Tom, D'Hondt, Theo (2016) Domains: Sharing State in the Communicating Event-Loop Actor Model. Computer Languages, Systems & Structures, 45 . pp. 132-160. ISSN 1477-8424. (doi:10.1016/j.cl.2016.01.003)
[img]
Preview

Everett, Richard, Nurse, Jason R. C., Erola, Arnau (2016) The Anatomy of Online Deception: What Makes Automated Text Convincing? In: 31st Annual ACM Symposium on Applied Computing (SAC). (doi:10.1145/2851613.2851813)
[img]
Preview

Garner, Tom, Jordanous, Anna (2016) Emergent Perception and Video Games that Listen: Applying Sonic Virtuality for Creative and Intelligent NPC Behaviours. In: 2nd Computational Creativity and Games Workshop. .
[img]
Preview

Gibson, R. M., Chennu, S., Fernandez-Espejo, D., Naci, L., Owen, A. M., Cruse, D. (2016) Somatosensory attention identifies both overt and covert awareness in disorders of consciousness. Annals of Neurology, 80 (3). pp. 412-423. ISSN 0364-5134. E-ISSN 1531-8249. (doi:10.1002/ana.24726)
[img]
Preview

Happa, Jassim, Fairclough, Graham, Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2016) A Pragmatic System-failure Assessment and Response Model. In: 2nd International Conference on Information Systems Security and Privacy. .
[img]
Preview

Hertel, Lars, Phan, Huy, Mertins, Alfred (2016) Comparing Time and Frequency Domain for Audio Event Recognition Using Deep Learning. In: IEEE International Joint Conference on Neural Networks (IJCNN 2016). . pp. 3407-3411. IEEE, Vancouver, BC, Canada ISBN 978-1-5090-0619-9. (doi:10.1109/IJCNN.2016.7727635)
[img]
Preview

Jarchi, Delaram, Lo, Benny, Wong, Charence, Ieong, Edmund, Nathwani, Dinesh, Yang, Guang-Zhong (2016) Gait Analysis From a Single Ear-Worn Sensor: Reliability and Clinical Evaluation for Orthopaedic Patients. IEEE Transactions on Neural Systems and Rehabilitation Engineering, 24 (8). pp. 882-892. ISSN 1534-4320. (doi:10.1109/TNSRE.2015.2477720) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Johnson, Colin G. (2016) Fitness in Evolutionary Art and Music: A Taxonomy and Future Prospects. Fitness in evolutionary art and music: a taxonomy and future prospects, 9 (1). pp. 4-25. ISSN 1754-8853. E-ISSN 1754-8861. (doi:10.1504/IJART.2016.075406)
[img]
Preview

Jordanous, Anna (2016) Four PPPPerspectives on Computational Creativity in theory and in practice. Connection Science, 28 (2). pp. 194-216. ISSN 0954-0091. E-ISSN 1360-0494. (doi:10.1080/09540091.2016.1151860)
[img]
Preview

Jordanous, Anna (2016) Has computational creativity successfully made it "Beyond the Fence" in musical theatre? In: Proceedings of the 7th International Conference on Computational Creativity. 7th International Conference on Computational Creativity. . pp. 303-310. Sony CSL ISBN 978-2-7466-9155-1.
[img]
Preview

Jordanous, Anna (2016) Language and Music. In: Jones, Rodney, ed. Routledge Handbook of Language and Creativity. Routledge. ISBN 978-0-415-83973-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2016) The longer term value of creativity judgements in computational creativity. In: Proceedings of AISB 2016’s Third International Symposium on Computational Creativity (CC2016). .
[img]
Preview

Jungjit, Suwimol (2016) New Multi-Label Correlation-Based Feature Selection Methods for Multi-Label Classification and Application in Bioinformatics. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Kafalı, Özgur, Singh, Munindar P., Williams, Laurie (2016) Nane: Identifying misuse cases using temporal norm enactments. In: Proceedings: 2016 IEEE 24th International Requirements Engineering Conference. . pp. 136-145. ISBN 978-1-5090-4121-3. (doi:10.1109/RE.2016.34)
[img]
Preview

Kafalı, Özgur, Singh, Munindar P., Williams, Laurie (2016) Toward a normative approach for forensicability: Extended Abstract. In: Proceedings of the Symposium and Bootcamp on the Science of Security. . pp. 65-67. ACM ISBN 978-1-4503-4277-3. (doi:10.1145/2898375.2898386) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kell, Stephen (2016) Dynamically Diagnosing Type Errors in Unsafe Code. In: Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications. OOPSLA 2016 . pp. 800-819. ACM, New York, NY, USA ISBN 978-1-4503-4444-9. (doi:10.1145/2983990.2983998) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Kell, Stephen, Mulligan, Dominic P., Sewell, Peter (2016) The Missing Link: Explaining ELF Static Linking, Semantically. In: Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications. OOPSLA 2016 . pp. 607-623. ACM, New York, NY, USA ISBN 978-1-4503-4444-9. (doi:10.1145/2983990.2983996) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Kim, Yong-Kyuk and Kattan, Ahmed and Kampouridis, Michael and Yoon, Yourim, eds. (2016) Discrete Dynamics in Evolutionary Computation and Its Applications. Discrete Dynamics in Nature and Society, 2016 . pp. 1-2. ISSN 1026-0226. (doi:10.1155/2016/6043597)
[img]
Preview

Kotiadis, Kathy, Tako, Antuela (2016) A Facilitation Workshop for the Implementation Stage: A Case Study in health care. In: Proceedings of the Operational Research Society Simulation Workshop 2016 (SW16). 8th Simulation Workshop (SW16). . pp. 165-174.
[img]
Preview

Kuttikat, Anoop, Noreika, Valdas, Shenker, Nicholas, Chennu, Srivas, Bekinschtein, Tristan, Brown, Christopher Andrew (2016) Neurocognitive and Neuroplastic Mechanisms of Novel Clinical Signs in CRPS. Frontiers in Human Neuroscience, 10 (16). pp. 1-13. E-ISSN 1662-5161. (doi:10.3389/fnhum.2016.00016)
[img]
Preview

Lamela Seijas, Pablo, Thompson, Simon (2016) Identifying and introducing interfaces and callbacks using Wrangler. In: Proceedings of the 28th Symposium on the Implementation and Application of Functional Programming Languages. . ACM ISBN 978-1-4503-4767-9. (doi:10.1145/3064899.3064909) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Lange, Julien, Yoshida, Nobuko (2016) Characteristic formulae for session types. In: Chechik, M. and Raskin, J.F., eds. Lecture Notes in Computer Science. Tools and Algorithms for the Construction and Analysis of Systems. TACAS 2016. 9636. pp. 833-850. Springer ISBN 978-3-662-49673-2. (doi:10.1007/978-3-662-49674-9_52) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Li, Jingjie, McLoughlin, Ian Vince, Liu, Cong, Xue, Shaofei, Wei, Si (2016) Multi-task deep neural network acoustic models with model adaptation using discriminative speaker identity for whisper recognition. In: IEEE International Conference on Acoustics Speech and Signal Processing. 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). . pp. 4969-4973. Institute of Electrical and Electronics Engineers (IEEE), South Brisbane, QLD (doi:10.1109/ICASSP.2015.7178916)
[img]
Preview

Li, Zheng-xi, Song, Yan, McLoughlin, Ian Vince, Dai, Li-Rong (2016) Compact Convolutional Neural Network Transfer Learning For Small-Scale Image Classification. In: Acoustics, Speech and Signal Processing (ICASSP), 2016 IEEE International Conference on. Proceedings 2016 International Conference on Acoustics, Speech and Signal Processing. . IEEE E-ISBN 978-1-4799-9988-0. (doi:10.1109/ICASSP.2016.7472175) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Liza, Farhana Ferdousi, Grzes, Marek (2016) An Improved Crowdsourcing Based Evaluation Technique for Word Embedding Methods. In: The 54th Annual Meeting of the Association for Computational Linguistics. . pp. 55-61. The Association for Computational Linguistics, USA ISBN 978-1-945626-14-2.
[img]

Ma, Jin, Song, Yan, McLoughlin, Ian Vince, Dai, Li-Rong, Ye, Zhong-Fu (2016) LID-senone Extraction via Deep Neural Networks for End-to-End Language Identification. In: Odyssey 2016: The Speaker and Language Recognition Workshop. . pp. 210-216.
[img]
Preview

Maass, Marco, Bente, Klaas, Ahlborg, Mandy, Medimagh, Hanne, Phan, Huy, Buzug, Thorsten M., Mertins, Alfred (2016) Optimized Compression of MPI System Matrices Using a Symmetry-Preserving Secondary Orthogonal Transform. International Journal on Magnetic Particle Imaging, 2 (1). pp. 1-5. ISSN 2365-9033. (doi:10.18416/ijmpi.2016.1607002)
[img]
Preview

Marr, Stefan, Daloze, Benoit, Mössenböck, Hanspeter (2016) Cross-Language Compiler Benchmarking: Are We Fast Yet? In: ACM SIGPLAN Notices. DLS 2016 Proceedings of the 12th Symposium on Dynamic Languages. 52 (2). pp. 120-131. ACM ISBN 978-1-4503-4445-6. (doi:10.1145/2989225.2989232)
[img]
Preview

Marr, Stefan and Jul, Eric, eds. (2016) Proceedings of the 11th Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems. ICOOOLPS '16 . ACM ISBN 978-1-4503-4837-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

McCall, Davin (2016) Novice Programmer Errors - Analysis and Diagnostics. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

McLoughlin, Ian Vince (2016) Speech and Audio Processing: a MATLAB-based approach. Cambridge University Press, Cambridge, UK, 400 pp. ISBN 978-1-107-08546-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mouli, Surej, Palaniappan, Ramaswamy (2016) Radial Photic Stimulation for Maximal EEG Response for BCI Applications. In: 9th International Conference on Human System Interaction. . IEEE E-ISBN 978-1-5090-1729-4. (doi:10.1109/HSI.2016.7529658)
[img]
Preview

Mycroft, Alan, Orchard, Dominic A., Petricek, Tomas (2016) Effect Systems Revisited - Control-Flow Algebra and Semantics. Lecture Notes in Computer Science, . pp. 1-32. ISSN 0302-9743. (doi:10.1007/978-3-319-27810-0_1)
[img]
Preview

Naccache, Lionel, Sitt, Jacobo, King, Jean-Rémi, Rohaut, Benjamin, Faugeras, Frédéric, Chennu, Srivas, Strauss, Mélanie, Valente, Mélanie, Engemann, Denis, Raimondo, Federico, and others. (2016) Reply: Replicability and impact of statistics in the detection of neural responses of consciousness. Brain, . pp. 1-3. ISSN 0006-8950. E-ISSN 1460-2156. (doi:10.1093/brain/aww060) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C. and Agrafiotis, Ioannis and Erola, Arnau and Bada, Maria and Roberts, Taylor and Williams, Meredydd and Goldsmith, Michael and Creese, Sadie (2016) An Independent Assessment of the Procedural Components of the Estonian Internet Voting System. Working paper. University of Oxford
[img]
Preview

Nurse, Jason R. C., Erola, Arnau, Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2016) Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things. In: 2015 International Workshop on Secure Internet of Things (SIoT). . pp. 5-14. IEEE, Germany ISBN 978-1-4673-7769-0. (doi:10.1109/SIOT.2015.10)
[img]
Preview

Orchard, Dominic, Yoshida, Nobuko (2016) Using session types as an effect system. In: Gay, Simon and Alglave, Jade, eds. Electronic Proceedings in Theoretical Computer Science. Proceedings Eighth International Workshop on Programming Language Approaches to Concurrency- and Communication-cEntric Software. 203. pp. 1-13. Open Publishing Association (doi:10.4204/EPTCS.203.1)
[img]
Preview

Orozco, Ana Lucila Sandoval, Corripio, Jocelin Rosales, González, David Manuel Arenas, Villalba, Luis Javier García, Hernandez-Castro, Julio C. (2016) Theia: a tool for the forensic analysis of mobile devices pictures. Computing, 98 (12). pp. 1251-1286. ISSN 0010-485X. E-ISSN 1436-5057. (doi:10.1007/s00607-015-0482-5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Owens, Scott, Myreen, Magnus O., Kumar, Ramana, Tan, Yong Kiam (2016) Functional Big-step Semantics. In: Lecture Notes in Computer Science. Lecture Notes in Computer Science. 9632. Springer (doi:10.1007/978-3-662-49498-1_23)
[img]
Preview

Panda, Rajanikant, Bharath, Rose Dawn, Upadhyay, Neeraj, Mangalore, Sandhya, Chennu, Srivas, Rao, Shobini L (2016) Temporal dynamics of the default mode network characterise meditation induced alterations in consciousness. Frontiers in Human Neuroscience, 10 (00372). pp. 1-12. ISSN 1662-5161. (doi:10.3389/fnhum.2016.00372)
[img]
Preview

Perera, R., Lange, Julien, Gay, S. (2016) Multiparty compatibility for concurrent objects. In: Electronic Proceedings in Theoretical Computer Science, EPTCS. Electronic Proceedings in Theoretical Computer Science, EPTCS. 211. pp. 73-82. Open Publishing Association (doi:10.4204/EPTCS.211.8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Petricek, Tomas, Guerra, Gustavo, Syme, Don (2016) Types from Data: Making Structured Data First-class Citizens in F#. In: PLDI 2016. Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation. PLDI '16 . pp. 477-490. ACM, New York, NY, USA ISBN 978-1-4503-4261-2. (doi:10.1145/2908080.2908115)
[img]
Preview

Pham, Thinh H, Fahmy, Suhaib A, McLoughlin, Ian Vince (2016) Spectrally efficient emission mask shaping for OFDM cognitive radios. Digital Signal Processing, 50 . pp. 150-161. ISSN 1051-2004. E-ISSN 1095-4333. (doi:10.1016/j.dsp.2015.12.008)
[img]
Preview
[img]

Pham, Thinh Hung, Fahmy, Suhaib A, McLoughlin, Ian Vince (2016) Efficient Integer Frequency Offset Estimation Architecture for Enhanced OFDM Synchronization. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 24 (4). pp. 1412-1420. ISSN 1063-8210. (doi:10.1109/TVLSI.2015.2453207)
[img]
Preview

Phan, Huy, Hertel, Lars, Maass, Marco, Koch, Philipp, Mertins, Alfred (2016) Label Tree Embeddings for Acoustic Scene Classification. In: Proceedings of the 24th ACM international conference on Multimedia. . pp. 486-490. ACM, Amsterdam, The Netherlands ISBN 978-1-4503-3603-1. (doi:10.1145/2964284.2967268)
[img]
Preview

Phan, Huy, Hertel, Lars, Maass, Marco, Mazur, Radoslaw, Mertins, Alfred (2016) Learning Representations for Nonspeech Audio Events through Their Similarities to Speech Patterns. IEEE/ACM Transactions on Audio, Speech and Language Processing, 24 (4). pp. 807-822. ISSN 2329-9290. E-ISSN 2329-9304. (doi:10.1109/TASLP.2016.2530401)
[img]
Preview

Phan, Huy, Hertel, Lars, Maass, Marco, Mertins, Alfred (2016) Robust Audio Event Recognition with 1-Max Pooling Convolutional Neural Networks. In: Proceedings of Interspeech. . pp. 3653-3657. ISCA, San Francisco, USA (doi:10.21437/Interspeech.2016-123)
[img]
Preview

Phan, Huy, Maass, Marco, Hertel, Lars, Mazur, Radoslaw, McLoughlin, Ian Vince, Merins, Alfred (2016) Learning Compact Structural Representations For Audio Events Using Regressor Banks. In: 2016 IEEE International Conference on Acoustics, Speech, and Signal Processing Proceedings. . IEEE ISBN 978-1-4799-9988-0. (doi:10.1109/ICASSP.2016.7471667) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Price, Thomas W., Brown, Neil C.C., Lipovac, Dragan, Barnes, Tiffany, Kölling, Michael (2016) Evaluation of a Frame-based Programming Editor. In: ICER '16 Proceedings of the 2016 ACM Conference on International Computing Education Research. . pp. 33-42. ACM, New York, USA ISBN 978-1-4503-4449-4. (doi:10.1145/2960310.2960319)
[img]
Preview

Rashid, Tabish, Agrafiotis, Ioannis, Nurse, Jason R. C. (2016) A New Take on Detecting Insider Threats: Exploring the use of Hidden Markov Models. In: MIST '16: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats. . ACM ISBN 978-1-4503-4571-2. (doi:10.1145/2995959.2995964)
[img]
Preview

Rizzi Raymundo, Caroline, Johnson, Colin G., Fabris, Fabio, Vargas, Patricia A. (2016) A Situation-Aware Fear Learning (SAFEL) Model for Robots. Neurocomputing, 221 . pp. 32-47. ISSN 0925-2312. (doi:10.1016/j.neucom.2016.09.035)
[img]
Preview

Rizzi, Caroline, Johnson, Colin G., Vargas, Patricia A. (2016) Improving the predictive performance of SAFEL: A Situation-Aware FEar Learning model. In: 25th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN). . pp. 736-742. IEEE ISBN 978-1-5090-3930-2. E-ISBN 978-1-5090-3929-6. (doi:10.1109/ROMAN.2016.7745201)
[img]
Preview
[img]

Salucci, Luca, Bonetta, Daniele, Marr, Stefan, Binder, Walter (2016) Generic Messages: Capability-based Shared Memory Parallelism for Event-loop Systems. In: Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. (doi:10.1145/2851141.2851184)
[img]
Preview

Samraj, A., Rajendran, K., Palaniappan, Ramaswamy (2016) A segmented-mean feature extraction method for glove-based system to enhance physiotherapy for accurate and speedy recuperation of limbs. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI). . pp. 1983-1988. IEEE ISBN 978-1-5090-2028-7. (doi:10.1109/ICACCI.2016.7732342) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Shackleton, Mark B., El-Moussa, Fadi, Rowlingson, Robert, Healing, Alex, Crowther, John, Daniel, Joshua, Dimitrakos, Theo, Sajjad, Ali (2016) Deploying Visual Analytics Through a Multi-cloud Service Store with Encrypted Big Data (Short Paper). In: Debruyne, Christophe and Panetto, Hervé and Meersman, Robert and Dillon, Tharam and Kühn, Eva and O'Sullivan, Declan and Ardagna, Claudio Agostino, eds. Lecture Notes in Computer Science. On the Move to Meaningful Internet Systems: OTM 2016 Conferences. Lecture Notes in Computer Science (LNCS) , 10033. pp. 883-889. Springer ISBN 978-3-319-48471-6. E-ISBN 978-3-319-48472-3. (doi:10.1007/978-3-319-48472-3_55) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sharifzadeh, Hamid R, Ardekani, Iman T, McLoughlin, Ian Vince (2016) Comparative whisper vowel space for Singapore English and British English accents. In: 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA). . pp. 258-262. Institute of Electrical and Electronics Engineers (IEEE) ISBN 978-988-14-7680-7. (doi:10.1109/APSIPA.2015.7415516)
[img]
Preview

Sharifzadeh, Hamid Reza, HajiRassouliha, Amir, McLoughlin, Ian Vince, Ardekani, Imam (2016) Phonated Speech Reconstruction Using Twin Mapping Models. In: The 15th IEEE International Symposium on Signal Processing and Information Technology, 7-10 December 2015, Abu Dhabi. (doi:10.1109/ISSPIT.2015.7394247) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Song, Yan, Cui, Ruilian, Hong, Xinhai, McLoughlin, Ian Vince, Shi, Jiong, Dai, Lirong (2016) Improved language identification using deep bottleneck network. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). . pp. 4200-4204. IEEE, South Brisbane, QLD (doi:10.1109/ICASSP.2015.7178762)
[img]
Preview

Song, Yan, Cui, Ruilian, McLoughlin, Ian Vince, Dai, Li-Rong (2016) Improvements on Deep Bottleneck Network based I-Vector Representation for Spoken Language Identification. In: Odyssey 2016: The Speaker and Language Recognition Workshop. . pp. 140-145.
[img]
Preview

Tan, Yong Kiam, Myreen, Magnus O., Kumar, Ramana, Fox, Anthony, Owens, Scott, Norrish, Michael (2016) A New Verified Compiler Backend for CakeML. In: International Conference on Functional Programming, Sep 2016, Nara, Japan. (doi:10.1145/2951913.2951924)
[img]
Preview

Thompson, Simon, Horpacsi, Daniel, Koszegi, Judit (2016) Towards Trustworthy Refactoring in Erlang. In: Hamilton, Geoff and Lisitsa, Alexei and Nemytykh, Andrei P., eds. Electronic Proceedings in Theoretical Computer Science. Proceedings of the Fourth International Workshop on Verification and Program Transformation (VPT 2016). 216. pp. 83-103. (doi:10.4204/EPTCS.216.5)
[img]
Preview

Thompson, Simon and Lamela Seijas, Pablo and Adams, Darryl (2016) Scripting smart contracts for distributed ledger technology. Technical report. Cryptology ePrint Archive (Unpublished)
[img]
Preview

Vastardis, N., Kampouridis, Michael, Yang, K. (2016) A user behaviour-driven smart-home gateway for energy management. Journal of Ambient Intelligence and Smart Environments, 8 (6). pp. 583-602. ISSN 1876-1364. E-ISSN 1876-1372. (doi:10.3233/AIS-160403)
[img]
Preview

Wazan, Ahmad Samer, Laborde, Romain, Chadwick, David W., Barrere, Francois, Benzekri, Abdelmalek (2016) How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches. In: Local Computer Networks (LCN), 2016 IEEE 41st Conference on. Local Computer Networks (LCN), 2016 IEEE 41st Conference on. . pp. 531-534. Institute of Electrical and Electronics Engineers ISBN 978-1-5090-2055-3. E-ISBN 978-1-5090-2054-6. (doi:10.1109/LCN.2016.85)
[img]
Preview

Williams, Meredydd, Axon, Louise, Nurse, Jason R. C., Creese, Sadie (2016) Future scenarios and challenges for security and privacy. In: IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), Bologna, Italy. (doi:10.1109/RTSI.2016.7740625)
[img]
Preview

Williams, Meredydd, Nurse, Jason R. C., Creese, Sadie (2016) The perfect storm: The privacy paradox and the Internet-of-Things. In: 11th International Conference on Availability‚ Reliability and Security (ARES 2016), 31 Aug.-2 Sept. 2016, Salzburg, Austria. (doi:10.1109/ARES.2016.25)
[img]
Preview

Xie, Zhi-Peng, Du, Jun, McLoughlin, Ian Vince, Xu, Yong, Ma, Feng, Wang, Haikun (2016) Deep Neural Network for Robust Speech Recognition With Auxiliary Features From Laser-Doppler Vibrometer Sensor. In: Proc. 10th International Symposium on Chinese Spoken Language Processing. . IEEE ISBN 978-1-5090-4295-1. E-ISBN 978-1-5090-4294-4. (doi:10.1109/ISCSLP.2016.7918400)
[img]
Preview
[img]
Preview

Xie, Zhi-Peng, McLoughlin, Ian Vince, Zhang, Hao-min, Song, Yan, Xiao, Wei (2016) A new variance-based approach for discriminative feature extraction in machine hearing classification using spectrogram features. Digital Signal Processing, . ISSN 1051-2004. (doi:10.1016/j.dsp.2016.04.005)
[img]
Preview
[img]

Yuvaraj, Rajamanickam, Murugappan, Murugappan, Palaniappan, Ramaswamy (2016) The Effect of Lateralization of Motor Onset and Emotional Recognition in PD Patients Using EEG. Brain Topography, . pp. 1-10. ISSN 0896-0267. E-ISSN 1573-6792. (doi:10.1007/s10548-016-0524-0)
[img]
Preview

Zhang, Hao-min, McLoughlin, Ian Vince, Song, Yan (2016) Robust Sound Event Detection in Continuous Audio Environments. In: Understanding speech processing in humans and machines : 17th Annual Conference of the International Speech Communication Association (INTERSPEECH 2016). . Red Hook, NY Curran Associates ISBN 978-1-5108-3313-5. (doi:10.21437/Interspeech.2016-392)
[img]
Preview

Zhang, Haomin, McLoughlin, Ian Vince, Song, Yan (2016) Robust sound event recognition using convolutional neural networks. In: IEEE International Conference on Acoustics Speech and Signal Processing. 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). . pp. 559-563. Institute of Electrical and Electronics Engineers, South Brisbane, QLD (doi:10.1109/ICASSP.2015.7178031)
[img]
Preview

Zhao, Liming, Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2016) Fast graph operations in quantum computation. Physical Review A, 93 (3). 032314. ISSN 2469-9926. E-ISSN 2469-9934. (doi:10.1103/PhysRevA.93.032314)
[img]
Preview

Zheng, Yudi, Kell, Stephen, Bulej, Lubomir, Sun, Haiyang, Binder, Walter (2016) Comprehensive Multiplatform Dynamic Program Analysis for Java and Android. IEEE Software, 33 (4). pp. 55-63. ISSN 0740-7459. (doi:10.1109/MS.2015.151)
[img]
Preview

Zoumpoulaki, Alexia (2016) Detecting Perceptual Breakthrough in RSVP with Applications in Deception Detection Methodological, Behavioural and Electrophysiological Explorations. Doctor of Philosophy (PhD) thesis, University of Kent, EPSRC. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Lemos, Rogério (2016) Foreword. In: Mistrik, Ivan and Ali, Nour and Kazman, Rick and Grundy, John and Schmerl, Bradley, eds. Managing Trade-offs in Adaptable Software Architectures. Morgan Kaufmann, Cambridge, MA, USA, xxix-xxx. ISBN 978-0-12-802855-1. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Lemos, Rogério and Potena, Pasqualina (2016) Identifying and Handling Uncertainties in the Feedback Control Loop. In: Mistrik, Ivan and Ali, Nour and Kazman, Rick and Grundy, John and Schmerl, Bradley, eds. Managing Trade-offs in Adaptable Software Architectures. Morgan Kaufmann, Cambridge, MA, USA, pp. 353-367. E-ISBN 978-0-12-802855-1. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

2015

?agalj, Mario, Perkovi?, Toni, Bugari?, Marin, Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:10.1016/j.pmcj.2014.09.002)
[img]
Preview

Agrafiotis, Ioannis, Nurse, Jason R. C., Buckley, Oliver, Legg, Phil, Creese, Sadie, Goldsmith, Michael (2015) Identifying attack patterns for insider threat detection. Computer Fraud & Security, (7). pp. 9-17. (doi:10.1016/S1361-3723(15)30066-X) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Alahmadi, Bushra A., Legg, Philip .A., Nurse, Jason R. C. (2015) Using Internet Activity Profiling for Insider-Threat Detection. In: Proceedings of the 17th International Conference on Enterprise Information Systems - (Volume 2). 2. pp. 709-720. SciTePress ISBN 978-989-758-097-0. (doi:10.5220/0005480407090720) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Allington, Daniel, Dueck, Byron, Jordanous, Anna (2015) Networks of Value in Electronic Music : SoundCloud, London, and the Importance of Place. Cultural Trends, 24 (3). pp. 211-222. ISSN 0954-8963. E-ISSN 1469-3690. (doi:10.1080/09548963.2015.1066073)
[img]
Preview

Allington, Daniel, Jordanous, Anna, Dueck, Byron (2015) Music, value, and networks in the digital world. http://valuingelectronicmusic.org
[img]
Preview

Alsufyani, Abdulmajeed (2015) Detecting Salient Information Using RSVP and the P3: Computational and EEG Explorations. Doctor of Philosophy (PhD) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Anderson, Tom, Arief, Budi, Basit, Tehmina, Borup, Rosie, Rutherford, Louise (2015) How To Succeed in Cyberspace. In: ICERI2015: 8TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION. ICERI Proceedings . pp. 6074-6083. ISBN 978-84-608-2657-6. (doi:WOS:000377304006024)
[img]
Preview

Anggadjaja, Erwin, McLoughlin, Ian Vince, Lau, Chiew Tong (2015) Cross-layer TCP/IP segmentation, re-routing and adaptive modulation techniques to exploit instantaneous BER variations on parallel subchannels. Australian Journal of Electrical and Electronics Engineering, . pp. 1-13. ISSN 1448-837X. E-ISSN 2205-362X. (doi:10.1080/1448837X.2015.1093677)
[img]

Arapinis, Myrto, Cheval, Vincent, Delaune, Stéphanie (2015) Composing security protocols: from confidentiality to privacy. In: Focardi, Ricardo and Myers, Andrew, eds. Principles of Security and Trust. Lecture Notes in Computer Science . pp. 324-343. Springer Berlin Heidelberg, London, UK ISBN 978-3-662-46666-7. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img] [img]

Arief, Budi, Bin Adzmi, Mohd Azeem (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 2 - Defenders and Victims. IEEE Security & Privacy, 13 (2). pp. 84-88. ISSN 1540-7993. (doi:10.1109/MSP.2015.44)
[img]
Preview

Arief, Budi, Bin Adzmi, Mohd Azeem, Gross, Thomas (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 1 - Attackers. IEEE Security & Privacy, 13 (1). pp. 71-76. ISSN 1540-7993. (doi:10.1109/MSP.2015.19)
[img]
Preview

Asghar, Hassan Jameel, Steinfeld, Ron, Li, Shujun, Kaafa, Mohamed Ali, Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. (doi:10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Bada, Maria, Sasse, Angela, Nurse, Jason R. C. (2015) Cyber Security Awareness Campaigns: Why do they fail to change behaviour? In: International Conference on Cyber Security for Sustainable Society.
[img]
Preview

Barnes, David J., Chu, Dominique (2015) Guide to Simulation and Modeling for Biosciences. Simulation Foundations, Methods and Applications . Springer, 339 pp. ISBN 978-1-4471-6761-7. E-ISBN 978-1-4471-6762-4. (doi:10.1007/978-1-4471-6762-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bekhet, Saddam, Ahmed, Amr, Altadmri, Amjad, Hunter, Andrew (2015) Compressed video matching: Frame-to-frame revisited. Multimedia Tools and Applications, . pp. 1-16. ISSN 1380-7501. E-ISSN 1573-7721. (doi:10.1007/s11042-015-2887-8)
[img]
Preview

Bello Orgaz, Gema, Hernandez-Castro, Julio C., Camacho, David (2015) A Survey of Social Web Mining Applications for Disease Outbreak Detection. In: UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Berry, Michael (2015) The Design and Implementation of a Notional Machine for teaching Introductory Programming. Doctor of Philosophy (PhD) thesis, University of Kent.
[img]
Preview

Bocchi, L., Lange, Julien, Yoshida, N. (2015) Meeting deadlines together. In: Aceto, Luca and de Frutos Escrig, David, eds. Leibniz International Proceedings in Informatics, LIPIcs. 26th International Conference on Concurrency Theory (CONCUR 2015). 42. pp. 283-296. Schloss Dagstuhl - Leibniz-Zentrum für Informatik ISBN 978-3-939897-91-0. (doi:10.4230/LIPIcs.CONCUR.2015.283) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura, Tuosto, Emilio (2015) Attribute-based transactions in service oriented computing. Mathematical Structures in Computer Science, 25 (3). pp. 619-665. ISSN 0960-1295. (doi:10.1017/S0960129512000904) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura, Yoshida, Nobuko, Lange, Julien (2015) Meeting Deadlines Together. In: Aceto, Luca and de Frutos-Escrig, David, eds. International Conference on Concurrency Theory (CONCUR). LIPIcs , 42. pp. 283-296. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik ISBN 978-3-939897-91-0. (doi:10.4230/LIPIcs.CONCUR.2015.283)
[img]
Preview

Boiten, Eerke Albert (2015) Google’s lip service to privacy cannot conceal that its profits rely on your data. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2015) NHS care.data still leaks like a sinking ship, but ministers set sail regardless. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2015) Patients will resist medical record sharing if NHS bosses ignore their privacy fears. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2015) Privacy watchdog takes first step against those undermining right to be forgotten. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2015) We are right to fear spy ‘database of everything’ if even politicians know little about it. . The Conversation Internet only.
[img]

Camara, Javier, Correia, Pedro, de Lemos, Rogerio, Garlan, David, Gomes, Pedro, Schmerl, Bradley, Ventura, Rafael (2015) Incorporating Architecture-Based Self-Adaptation into an Adaptive Industrial Software System. Journal of Systems and Software, . ISSN 0164-1212. (doi:10.1016/j.jss.2015.09.021)
[img]
Preview

Canales-Johnson, Andrés, Silva, Carolina, Huepe, David, Rivera-Rei, Álvaro, Noreika, Valdas, Garcia, María del Carmen, Silva, Walter, Ciraolo, Carlos, Vaucheret, Esteban, Sedeño, Lucas, and others. (2015) Auditory Feedback Differentially Modulates Behavioral and Neural Markers of Objective and Subjective Performance When Tapping to Your Heartbeat. Cerebral Cortex, 25 (11). pp. 4490-4503. ISSN 1047-3211. E-ISSN 1460-2199. (doi:10.1093/cercor/bhv076) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Carvalho, Rodrigo, Goldsmith, Michael, Nurse, Jason R. C. (2015) Online banking malware ontology. In: International Crime and Intelligence Analysis Conference (ICIA). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chen, Huankai, Wang, Frank Z. (2015) Spark on Entropy: A Reliable & Efficient Scheduler for Low-latency Parallel Jobs in Heterogeneous Cloud. In: Local Computer Networks Conference Workshops (LCN Workshops), 2015 IEEE 40th. . IEEE E-ISBN 978-1-4673-6773-8. (doi:10.1109/LCNW.2015.7365918)
[img]
Preview

Cheval, Vincent, Cortier, Véronique (2015) Timing attacks: symbolic framework and proof techniques. In: Focardi, Riccardo and Myers, Andrew, eds. Lecture Notes in Computer Science. Principles of Security and Trust. . pp. 280-299. Springer Berlin Heidelberg, London, UK ISBN 978-3-662-46665-0. E-ISBN 978-3-662-46666-7. (doi:10.1007/978-3-662-46666-7_15)
[img]
Preview
[img]
Preview

Chu, Dominique, Barnes, David J. (2015) Evolving strategies for single-celled organisms in multi-nutrient environments. In: Proceedings of the European Conference on Artificial Life 2015. . pp. 226-233. MIT Press (doi:10.7551/978-0-262-33027-5-ch046)
[img]
Preview

Contrastin, Mistral, Rice, Andrew, Danish, Matthew, Orchard, Dominic A. (2015) Units-of-Measure Correctness in Fortran Programs. Computing in Science & Engineering, 18 (1). pp. 102-107. ISSN 1521-9615. (doi:10.1109/MCSE.2016.17)
[img]
Preview

Corneli, Joseph, Jordanous, Anna, Shepperd, Rosie, Llano, Maria Teresa, Misztal, Joanna, Colton, Simon, Guckelsberger, Christian (2015) Computational Poetry Workshop: Making Sense of Work in Progress. In: 6th International Conference on Computational Creativity, June 29 - July 2, 2015, Utah, US.
[img]
Preview

Damsgaard Jensen, Christian and Marsh, Stephen and Dimitrakos, Theo and Murayama, Yuko, eds. (2015) Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology, 454 . Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Daniel, Joshua, Dimitrakos, Theo, El-Moussa, Fadi, Ducatel, Gery, Pawar, Pramod, Sajjad, Ali (2015) Seamless Enablement of Intelligent Protection for Enterprise Cloud Applications through Service Store. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom). . pp. 1021-1026. ISBN 978-1-4799-4092-9. E-ISBN 978-1-4799-4093-6. (doi:10.1109/CloudCom.2014.92) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Daniel, Joshua, El-Moussa, Fadi, Ducatel, Géry, Pawar, Pramod, Sajjad, Ali, Rowlingson, Robert, Dimitrakos, Theo (2015) Integrating Security Services in Cloud Service Stores. In: Trust Management IX. IFIP Advances in Information and Communication Technology. Trust Management IX. IFIP Advances in Information and Communication Technology , 454. pp. 226-239. Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3_19) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

De Wael, Mattias, Marr, Stefan, De Fraine, Bruno, Van Cutsem, Tom, De Meuter, Wolfgang (2015) Partitioned Global Address Space Languages. ACM Computing Surveys, 47 (4). 62:1-62:27. ISSN 0360-0300. (doi:10.1145/2716320)
[img]
Preview

Devlin, Matthieu, Nurse, Jason R. C., Hodges, Duncan, Goldsmith, Michael, Creese, Sadie (2015) Predicting Graphical Passwords. In: HAS 2015: Human Aspects of Information Security, Privacy, and Trust. 9190 . pp. 23-35. Springer ISBN 978-3-319-20375-1. E-ISBN 978-3-319-20376-8. (doi:10.1007/978-3-319-20376-8_3)
[img]
Preview

Dimitrakos, Theo (2015) Foreword: Towards Trusted Cloud Ecosystems. In: IFIP Advances in Information and Communication Technology. 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology (IFIPAICT) , 454. pp. 215-216. Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3_17) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fabris, Fabio, Freitas, Alex A., Tullet, Jennifer M.A. (2015) An Extensive Empirical Comparison of Probabilistic Hierarchical Classifiers in Datasets of Ageing-Related Genes. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 13 (6). pp. 1045-1058. ISSN 1545-5963. E-ISSN 1557-9964. (doi:10.1109/TCBB.2015.2505288)
[img]
Preview

Gonzalez-Gadea, Maria Luz, Chennu, Srivas, Bekinschtein, Tristan A., Rattazzi, Alexia, Beraudi, Ana, Tripicchio, Paula, Moyano, Beatriz, Soffita, Yamila, Steinberg, Laura, Adolfi, Federico, and others. (2015) Predictive coding in autism spectrum disorder and attention deficit hyperactivity disorder. Journal of Neurophysiology, 114 (5). pp. 2625-2636. ISSN 0022-3077. E-ISSN 1522-1598. (doi:10.1152/jn.00543.2015) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gootjes-Dreesbach, Ellis Luise (2015) Awareness & Perception in Rapid Serial Visual Presentation. Doctor of Philosophy (PhD) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Gouvas, Panagiotis, Kalaboukas, Konstantinos, Ledakis, Giannis, Dimitrakos, Theo, Daniel, Joshua, Ducatel, Gery, Rodriguez Dominguez, Nuria (2015) A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project. In: IFIP Advances in Information and Communication Technology. Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015. IFIP Advances in Information and Communication Technology (IFIPAICT) , 454 (454). pp. 217-225. Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3_18) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Greenhow, Keith, Johnson, Colin G. (2015) Regioned Downsample for ANN Image Classification: Alternate Selection Methods. In: 2015 SAI Intelligent Systems Conference (IntelliSys). . pp. 793-797. IEEE, Red Hood, NY, USA ISBN 978-1-4673-7607-5. (doi:10.1109/IntelliSys.2015.7361231)
[img]
Preview

Hajdusek, Michal, Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2015) Device-independent verifiable blind quantum computation. arXiv preprint arXiv:1502.02563, . (Unpublished)
[img]
Preview

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2015) UK has little to be proud of as survey reveals sorry state of European cybersecurity. . The Conversation Internet only.
[img]

Hopkins, Jack, Kafalı, Özgur, Stathis, Kostas (2015) Open Game Tournaments in STARLITE: Demonstration. In: AAMAS '15 Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. . pp. 1927-1928. ACM ISBN 978-1-4503-3413-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Idachaba, Unekwu Solomon (2015) A Bio-Inspired Cache Management Policy for Cloud Computing Environments using the Artificial Bee Colony Algorithm. Doctor of Philosophy (PhD) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Jordanous, Anna (2015) Four PPPPerspectives on Computational Creativity. In: AISB 2015 Symposium on Computational Creativity, 20-22nd May, 2015, Canterbury, Kent, UK.
[img]
Preview

Jordanous, Anna (2015) Review: Hacking choreography: dance and live coding: [Sicchio K. Computer Music Journal 38 (1): 31-39, 2014. ]. Review of: Hacking choreography: dance and live coding Sicchio K. Computer Music Journal 38 (1): 31-39, 2014. Type: Article by UNSPECIFIED. ACM Computing Reviews, . p. 1. (doi:CR143411) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2015) Review: What makes you clever : the puzzle of intelligence. Review of: What makes you clever : the puzzle of intelligence (Partridge, 2014, World Scientific Publishing Co, Inc.) by UNSPECIFIED. ACM Computing Reviews, . CR143090. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafalı, Özgur, Schaechtle, Ulrich, Stathis, Kostas (2015) HYDRA: A HYbrid Diagnosis and monitoRing Architecture for diabetes. In: 2014 IEEE 16th International Conference on E-health Networking, Application & Services (Healthcom). . pp. 531-536. IEEE ISBN 978-1-4799-6644-8. (doi:10.1109/HealthCom.2014.7001898) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafalı, Özgur, Yolum, Pinar (2015) Pisagor: A proactive software agent for monitoring interactions. Knowledge and Information Systems, 47 (1). pp. 215-239. ISSN 0219-1377. (doi:10.1007/s10115-015-0848-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kell, Stephen (2015) Towards a Dynamic Object Model Within Unix Processes. In: 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (Onward!), October 25 - 30, 2015, Pittsburgh, PA, USA. (doi:10.1145/2814228.2814238) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Kirschner, Aaron, Cruse, Damian, Chennu, Srivas, Owen, Adrian M., Hampshire, Adam (2015) A P300-based cognitive assessment battery. Brain and Behavior, 5 (6). pp. 1-14. ISSN 2162-3279. E-ISSN 2157-9032. (doi:10.1002/brb3.336)
[img]
Preview

Lange, Julien, Tuosto, E., Yoshida, N. (2015) From Communicating Machines to Graphical Choreographies. In: ACM SIGPLAN NOTICES. POPL 2015 Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. 50 (1). pp. 221-232. ACM ISBN 978-1-4503-3300-9. (doi:10.1145/2676726.2676964) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Li, Huiqing, Thompson, Simon (2015) Safe Concurrency Introduction through Slicing. In: Proceedings of the 2015 Workshop on Partial Evaluation and Program Manipulation. . pp. 103-113. ACM SIGPLAN ISBN 978-1-4503-3297-2. (doi:10.1145/2678015.2682533)
[img]
Preview

Lustrek, Mitja, Cvetkovic, Bozidara, Mirchevska, Violeta, Kafalı, Özgur, Romero, Alfonso E., Stathis, Kostas (2015) Recognising lifestyle activities of diabetic patients with a smartphone. In: Proceedings of the 2015 9th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth). . pp. 317-324. IEEE ISBN 978-1-63190-045-7. (doi:10.4108/icst.pervasivehealth.2015.259118) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Maass, Marco and Phan, Huy and Möller, Anita and Mertins, Alfred (2015) Cosine-Sine Modulated Filter Banks for Motion Estimation and Correction. In: Battiato, Sebastiano and Blanc-Talon, Jacques and Gallo, Giovanni and Philips, Wilfried and Popescu, Dan and Scheunders, Paul, eds. Advanced Concepts for Intelligent Vision Systems 16th International Conference. Lecture Notes in Computer Science . Springer, Catania, Italy, pp. 195-204. ISBN 978-3-319-25902-4. E-ISBN 978-3-319-25903-1. (doi:10.1007/978-3-319-25903-1_17) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Marr, Stefan, Ducasse, Stéphane (2015) Tracing vs. Partial Evaluation: Comparing Meta-Compilation Approaches for Self-Optimizing Interpreters. In: ACM SIGPLAN Notices. OOPSLA 2015 Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications. 50 (10). pp. 821-839. ACM ISBN 978-1-4503-3689-5. (doi:10.1145/2814270.2814275)
[img]
Preview

Marr, Stefan, Seaton, Chris, Ducasse, Stéphane (2015) Zero-Overhead Metaprogramming: Reflection and Metaobject Protocols Fast and without Compromises. In: ACM SIGPLAN Notices. PLDI 2015 Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation. 50 (6). pp. 545-554. ACM Press ISBN 978-1-4503-3468-6. (doi:10.1145/2737924.2737963)
[img]
Preview

Matsuda, Kazutaka, Wang, Meng (2015) Applicative Bidirectional Programming with Lenses. In: ACM SIGPLAN International Conference on Functional Programming, 31 August – 2 September, 2015, Vancouver, British Columbia, Canada.
[img]
Preview

Mazur, Radoslaw, Phan, Huy, Mertins, Alfred (2015) A Clustering Approach for Solving the Spatial Aliasing Problem in Convolutive Blind Source Separation. In: 20th IEEE International Conference on Digital Signal Processing (DSP 2015). . pp. 679-683. IEEE, Singapore ISBN 978-1-4799-8058-1. (doi:10.1109/ICDSP.2015.7251961) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

McGough, Andrew Stephen, Arief, Budi, Gamble, Carl, Wall, David, Brennan, John, Fitzgerald, John, van Moorsel, Aad, Alwis, Sujeewa, Theodoropoulos, Georgios, Ruck-Keene, Ed and others. (2015) Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 6 (4). pp. 3-46. ISSN 2093-5374. E-ISSN 2093-5382.
[img]
Preview

McGough, Andrew Stephen, Wall, David, Brennan, John, Theodoropoulos, Georgios, Ruck-Keene, Ed, Arief, Budi, Gamble, Carl, Fitzgerald, John, van Moorsel, Aad, Alwis, Sujeewa and others. (2015) Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). In: MIST '15 Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats. 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST’15). . pp. 1-12. ACM, New York, NY, USA ISBN 978-1-4503-3824-0. (doi:10.1145/2808783.2808785)
[img]
Preview

McLoughlin, Ian Vince, Sharifzadeh, Hamid Reza, Tan, Su Lim, Li, Jingjie, Song, Yan (2015) Reconstruction of Phonated Speech from Whispers Using Formant-Derived Plausible Pitch Modulation. ACM Transactions on Accessible Computing, 6 (4). pp. 1-21. (doi:10.1145/2737724)
[img]
Preview

McLoughlin, Ian Vince, Song, Yan (2015) Low Frequency Ultrasonic Voice Activity Detection using Convolutional Neural Networks. In: Proc. Interspeech 2015. . (Unpublished)
[img]
Preview

McLoughlin, Ian Vince, Zhang, Hao-min, Xie, Zhi-Peng, Song, Yan, Xiao, Wei (2015) Robust Sound Event Classification using Deep Neural Networks. Audio, Speech, and Language Processing, IEEE/ACM Transactions on, 23 (3). pp. 540-552. ISSN 2329-9290. (doi:10.1109/TASLP.2015.2389618)
[img]
Preview

Modi, Bala (2015) FPGA-based High Throughput Regular Expression Pattern Matching for Network Intrusion Detection Systems. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Mole, Matthew Robert (2015) A study of thread-local garbage collection for multi-core systems. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Mouli, S. and Palaniappan, Ramaswamy and Sillitoe, I.P. (2015) A configurable, inexpensive, portable, multi-channel, multi-frequency, multi-chromatic RGB LED system for SSVEP stimulation. In: Hassanien, A. and Azar, A., eds. Brain-Computer Interfaces. Intelligent Systems Reference Library . Springer, pp. 241-269. ISBN 978-3-319-10977-0. (doi:10.1007/978-3-319-10978-7_9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mouli, Surej, Palaniappan, Ramaswamy, Sillitoe, Ian P., Gan, John Q. (2015) Quantification of SSVEP responses using multi-chromatic LED stimuli: Analysis on colour, orientation and frequency. In: Computer Science and Electronic Engineering Conference (CEEC). 7th Computer Science and Electronic Engineering Conference. . pp. 93-98. (doi:10.1109/CEEC.2015.7332706)
[img]
Preview

Naccache, Lionel, King, Jean-Rémi, Sitt, Jacobo, Engemann, Denis, El Karoui, Imen, Rohaut, Benjamin, Faugeras, Frédéric, Chennu, Srivas, Strauss, Mélanie, Bekinschtein, Tristan, and others. (2015) Neural detection of complex sound sequences or of statistical regularities in the absence of consciousness? Brain, 10.109 . pp. 1-3. ISSN 0006-8950. E-ISSN 1460-2156. (doi:10.1093/brain/awv190) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Newby, D., Freitas, Alex A., Ghafourian, Taravat (2015) Comparing Multi-Label Classification Methods for Provisional Biopharmaceutics Class Prediction. Molecular Pharmaceutics, 12 (1). pp. 87-102. ISSN 1543-8384. E-ISSN 1543-8392.
[img]
Preview

Nouh, Mariam, Nurse, Jason R. C., Goldsmith, Michael (2015) Identifying Key-Players in Online Activist Groups on Facebook Social Network. In: 2015 IEEE International Conference on Data Mining Workshop (ICDMW), 14-17 November 2015, Atlantic City, NJ, USA. (doi:10.1109/ICDMW.2015.88)
[img]
Preview
[img]
Preview

Nurse, Jason R. C. (2015) Exploring the risks to identity security and privacy in cyberspace. XRDS: Crossroads, The ACM Magazine, 21 (3). pp. 42-47. ISSN 1528-4972. E-ISSN 1528-4980. (doi:10.1145/2730912) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen, Price, Darren, Jones, Glyn (2015) Information trustworthiness as a solution to the misinformation problems in social media. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen (2015) Tag clouds with a twist: using tag clouds coloured by information's trustworthiness to support situational awareness. Journal of Trust Management, 2 (10). E-ISSN 2196-064X. (doi:10.1186/s40493-015-0021-5)
[img]
Preview

Nurse, Jason R. C., Erola, Arnau, Goldsmith, Michael, Creese, Sadie (2015) Investigating the leakage of sensitive personal and organisational information in email headers. Journal of Internet Services and Information Security, 5 (1). pp. 70-84. ISSN 2182-2069. E-ISSN 2182-2077. (doi:10.22667/JISIS.2015.02.31.070)
[img]
Preview

Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie, Lamberts, Koen (2015) Technology and information trust for supporting risky decisions based on social-media content. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. . pp. 461-468. IEEE E-ISBN 978-1-5090-0154-5. (doi:10.1109/CIT/IUCC/DASC/PICOM.2015.66) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Palaniappan, Ramaswamy and Sihra, Tarsem (2015) Brain prints for biometrics: An introduction and review of current trends. In: Khosrow-Pour, Mehdi, ed. Encyclopedia of Information Science and Technology. IGI Global. ISBN 978-1-4666-5888-2. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Petricek, Tomas (2015) Against a Universal Definition of 'Type'. In: Proceedings of Onward! 2015: ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software. . pp. 254-266. ACM, New York, NY, USA ISBN 978-1-4503-3688-8. (doi:10.1145/2814228.2814249)
[img]
Preview

Phan, Huy, Hertel, Lars, Maass, Marco, Mazur, Radoslaw, Mertins, Alfred (2015) Audio Phrases for Audio Event Recognition. In: 23rd European Signal Processing Conference (EUSIPCO 2015). . pp. 2546-2550. IEEE, Nice, France E-ISBN 978-0-9928626-3-3. (doi:10.1109/EUSIPCO.2015.7362844)
[img]
Preview

Phan, Huy, Hertel, Lars, Maass, Marco, Mazur, Radoslaw, Mertins, Alfred (2015) Representing Nonspeech Audio Signals through Speech Classification Models. In: 16th Annual Conference of the International Speech Communication Association (INTERSPEECH 2015). . pp. 3441-3445. ISCA, Dresden, Germany
[img]
Preview

Phan, Huy, Maass, Marco, Hertel, Lars, Mazur, Radoslaw, Mertins, Alfred (2015) A Multi-Channel Fusion Framework for Audio Event Detection. In: IEEE Workshop on Applications of Signal Processing to Audio and Acoustics (WASPAA 2015). . pp. 1-5. IEEE, New York, USA ISBN 978-1-4799-7450-4. (doi:10.1109/WASPAA.2015.7336889)
[img]
Preview

Phan, Huy, Maass, Marco, Mazur, Radoslaw, Mertins, Alfred (2015) Early Event Detection in Audio Streams. In: IEEE International Conference on Multimedia and Expo (ICME 2015). . pp. 1-6. IEEE, Torino, Italy E-ISBN 978-1-4799-7082-7. (doi:10.1109/ICME.2015.7177439)
[img]
Preview

Phillips, Elizabeth, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2015) Applying Social Network Analysis to Security. In: International Conference on Cyber Security for Sustainable Society. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Phillips, Elizabeth, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2015) Extracting Social Structure from DarkWeb Forums. In: 5th International Conference on Social Media Technologies‚ Communication‚ and Informatics (SOTICS '15). (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Phillips, Estelle M., Pugh, Derek (2015) How to Get a PhD. Open University Press/McGraw-Hill, London, UK, 280 pp. ISBN 978-0-335-26412-4. E-ISBN 978-0-335-26413-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Phon-Amnuaisuk, Somnuk, Palaniappan, Ramaswamy (2015) Exploring Swarm-Based Visual Effects. In: Intelligent and Evolutionary Systems, Series Proceedings in Adaptation, Learning and Optimization. 5. pp. 333-341. Springer (doi:10.1007/978-3-319-27000-5_27)
[img]
Preview

Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2015) Iterated gate teleportation and blind quantum computation. Physical Review Letters: Moving Physics Forward, 114 (22). p. 220502. ISSN 0031-9007. E-ISSN 1079-7114. (doi:10.1103/PhysRevLett.114.220502)
[img]
Preview

Rizzi Raymundo, C., Johnson, C. G., Vargas, P. A. (2015) An Architecture for Emotional and Context-Aware Associative Learning for Robot Companions. In: 2015 24th IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN). . pp. 31-36. IEEE (doi:10.1109/ROMAN.2015.7333699)
[img]
Preview

Rowe, Reuben (2015) Encoding the Factorisation Calculus. In: Electronic Proceedings in Theoretical Computer Science. Proceedings of the Combined 22th International Workshop on Expressiveness in Concurrency and 12th Workshop on Structural Operational Semantics. 190. pp. 76-90. (doi:10.4204/EPTCS.190.6)
[img]
Preview

Sandoval Orozco, Ana Lucila, Corripio, Jocelin Rosales, García Villalba, Luis Javier, Hernandez-Castro, Julio C. (2015) Image source acquisition identification of mobile devices based on the use of features. Multimedia Tools and Applications, 75 (12). pp. 7087-7111. ISSN 1380-7501. E-ISSN 1573-7721. (doi:10.1007/s11042-015-2633-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sandoval Orozco, Ana Lucila, Garcia Villalba, Luis Javier, Arenas Gonzalez, David Manuel, Rosales Corripio, Jocelin, Hernandez-Castro, Julio C., Gibson, Stuart James (2015) Smartphone image acquisition forensics using sensor fingerprint. Institute of Engineering and Technology, Computer Vision,, 9 (5). pp. 723-731. ISSN 1751-9632. E-ISSN 1751-9640. (doi:10.1049/iet-cvi.2014.0243) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Shirazibeheshti, Amirali (2015) The effect of sedation on conscious processing: Computational analysis of the EEG response to auditory irregularity. Doctor of Science (DSc) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Simon, .., Clear, Alison, Carter, Janet, Cross, Gerry, Radenski, Atanas, Tudor, Liviana, Tonnisson, Eno (2015) What's in a Name?: International Interpretations of Computing Education Terminology. ITICSE-WGR '15 Proceedings of the 2015 ITiCSE on Working Group Reports, . pp. 173-186. ISSN 9781450341462. (doi:10.1145/2858796.2858803) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Song, Yan, Hong, Xinhai, Jiang, Bing, Cui, Ruilian, McLoughlin, Ian Vince, Dai, Lirong (2015) Deep Bottleneck Network based i-vector representation for Language Identification. In: Proc. Interspeech 2015. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Song, Yan, McLoughlin, Ian Vince, Dai, Li-Rong (2015) Deep Bottleneck Feature for Image Classification. In: ACM International Conference on Multimedia Information Retrieval (ICMR), June 2015, Shanghai. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Song, Yan, McLoughlin, Ian Vince, Dai, Lirong (2015) Deep Bottleneck Feature for Image Classification. In: Proceedings of the 5th ACM on International Conference on Multimedia Retrieval. . pp. 491-494. ACM, New York, NY, USA ISBN 978-1-4503-3274-3. (doi:10.1145/2671188.2749314)
[img]
Preview

Sun, Haiyang and Zheng, Yudi and Bulej, Lubomir and Kell, Stephen and Binder, Walter (2015) Analyzing Distributed Multi-platform Java and Android Applications with ShadowVM. In: Programming Languages and Systems 13th Asian Symposium. Lecture Notes in Computer Science, 9458 . Springer, Cham, Switzerland, pp. 356-365. ISBN 978-3-319-26528-5. (doi:10.1007/978-3-319-26529-2_19) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sun, Haiyang, Zheng, Yudi, Bulej, Lubomí, Binder, Walter, Kell, Stephen (2015) Custom Full-coverage Dynamic Program Analysis for Android. In: SPLASH Companion 2015 Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, Programming, Languages and Applications: Software for Humanity. . pp. 7-8. ACM, New York, NY, USA ISBN 978-1-4503-3722-9. (doi:10.1145/2814189.2814190) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Tako, Antuela, Kotiadis, Kathy (2015) PartiSim: A multi-methodology framework to support facilitated simulation modelling in healthcare. European Journal of Operational Research, 244 (2). pp. 555-564. ISSN 0377-2217. (doi:10.1016/j.ejor.2015.01.046)
[img] [img]
Preview

Vandercammen, Maarten, Nicolay, Jens, Marr, Stefan, De Koster, Joeri, D'Hondt, Theo, De Roover, Coen (2015) A Formal Foundation for Trace-Based JIT Compilers. In: Proceedings of the 13th International Workshop on Dynamic Analysis. (doi:10.1145/2823363.2823369)
[img]
Preview

Vu, Quang, Colombo, Maurizio, Asal, Rasool, Sajjad, Ali, El-Moussa, Fadi Ali, Dimitrakos, Theo (2015) Secure Cloud Storage: A Framework for Data Protection as a Service in the Multi-cloud Environment. In: Communications and Network Security (CNS), 2015 IEEE Conference on. . pp. 638-642. (doi:10.1109/CNS.2015.7346879)
[img]
Preview

Wan, Cen (2015) Novel Hierarchical Feature Selection Methods for Classification and Their Application to Datasets of Ageing-Related Genes. Doctor of Philosophy (PhD) thesis, University of Kent. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Wu, Tina, Nurse, Jason R. C. (2015) Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems. Journal of Digital Forensics, Security and Law, 10 (4). pp. 79-96. ISSN 1558-7215.
[img]
Preview

Wyble, Brad, Bowman, Howard, Nieuwenstein, Mark (2015) Comment: On the interplay between working memory consolidation and attentional selection in controlling conscious access: parallel processing at a cost—a comment on ‘The interplay of attention and consciousness in visual search, attentional blink and working memory consolidation’. Philosophical Transactions of the Royal Society B: Biological Sciences, 370 (1661). p. 1471. ISSN 0962-8436.
[img]
Preview

Xu, Yan, McLoughlin, Ian Vince, Song, Yan, Wu, Kui (2015) Improved i-vector representation for speaker diarization. Circuits, Systems, and Signal Processing, . pp. 1-12. ISSN 0278-081X. E-ISSN 1531-5878. (doi:10.1007/s00034-015-0206-2)
[img]
Preview

Zhang, Lingwei, Deng, Yuhui, Zhu, Weiheng, Zhou, Jipeng, Wang, Frank Z. (2015) Skewly replicating hot data to construct a power-efficient storage cluster. Journal of Network and Computer Applications (IF=2.762, ranked A at ERA), 50 . pp. 168-179. (doi:10.1016/j.jnca.2014.06.005) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Zoumpoulaki, Alexia, Alsufyani, Abdulmajeed, Bowman, Howard (2015) Resampling the peak, some dos and don'ts. Psychophysiology, 52 (3). pp. 444-448. ISSN 0048-5772.
[img]
Preview

Zoumpoulaki, Alexia, Alsufyani, Abdulmajeed, Filetti, Marco, Brammer, Mick, Bowman, Howard (2015) Latency as a Region Contrast: Measuring ERP Latency Differences with Dynamic Time Warping. Psychophysiology, . pp. 1-46. ISSN 0048-5772.
[img]
Preview

2014

Aaron, Samuel, Orchard, Dominic A., Blackwell, Alan F. (2014) Temporal semantics for a live coding language. In: Proceedings of the 2nd ACM SIGPLAN international workshop on Functional art, music, modeling & design. . pp. 37-47. Association for Computing Machinery ISBN 978-1-4503-3039-8. (doi:10.1145/2633638.2633648)
[img]
Preview

Alrayes, Bedour, Kafalı, Özgur, Stathis, Kostas (2014) CONAN: A heuristic strategy for Concurrent Negotiating Agents: Extended Abstract. In: AAMAS '14 Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems. . pp. 1585-1586. ACM ISBN 978-1-4503-2738-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Altadmri, Amjad, Ahmed, Amr (2014) A framework for automatic semantic video annotation: Utilizing similarity and commonsense knowledge bases. Multimedia Tools and Applications, 72 (2). pp. 1167-1191. ISSN 1380-7501. E-ISSN 1573-7721. (doi:10.1007/s11042-013-1363-6)
[img]
Preview

Aluko, B., Smonou, D., Kampouridis, Michael, Tsang, E. (2014) Combining different meta-heuristics to improve the predictability of a financial forecasting algorithm. In: IEEE Computational Intelligence for Financial Engineering & Economics (CIFEr). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Arief, Budi, Coopamootoo, Kovila P.L., Emms, Martin, van Moorsel, Aad (2014) Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. In: WPES '14 Proceedings of the 13th Workshop on Privacy in the Electronic Society. WPES '14 . pp. 201-204. ACM ISBN 978-1-4503-3148-7. (doi:10.1145/2665943.2665965)
[img]
Preview

Asensio-Cubero, J., Gan, J.Q., Palaniappan, Ramaswamy (2014) Multiresolution analysis of an information based EEG graph representation for motor imagery brain computer interfaces. In: PhyCS 2014 - Proceedings of the International Conference on Physiological Computing Systems. . pp. 5-12. SciTePress ISBN 978-989-758-006-2. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bailey, Christopher, Chadwick, David W., de Lemos, Rogerio (2014) Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, 80 (5). pp. 935-952. ISSN 0022-0000. (doi:10.1016/j.jcss.2014.02.003)
[img]
Preview

Bailey, Christopher, Montrieux, Lionel, de Lemos, Rogerio, Yu, Yijun, Wermelinger, Michel (2014) Run-time Generation, Transformation, and Verification of Access Control Models for Self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems.
[img]
Preview

Barnes, David J. (2014) pgn-extract: A Portable Game Notation (PGN) Manipulator for Chess Games. University of Kent Web download. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bartoletti, M., Lange, Julien, Scalas, A., Zunino, R. (2014) Choreographies in the wild. Science of Computer Programming, 109 . pp. 36-60. ISSN 0167-6423. (doi:10.1016/j.scico.2014.11.015) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Berry, Michael, Kölling, Michael (2014) The State Of Play: A Notional Machine for Learning Programming. In: Proceedings of the 19th Annual Conference on Innovation and Technology in Computer Science Education. .
[img]
Preview

Bocchi, Laura and Melgratti, Hernán (2014) On the Behaviour of General-Purpose Applications on Cloud Storages. In: Web Services and Formal Methods 10th International Workshop. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 29-47. ISBN 978-3-319-08259-2. E-ISBN 978-3-319-08260-8. (doi:10.1007/978-3-319-08260-8_3)
[img]
Preview

Bocchi, Laura and Melgratti, Hernán and Tuosto, Emilio (2014) Resolving Non-Determinism in Choreographies. In: Programming Languages and Systems 23rd European Symposium on Programming. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 493-512. ISBN 978-3-642-54832-1. E-ISBN 978-3-642-54833-8. (doi:10.1007/978-3-642-54833-8_26)
[img]
Preview

Bocchi, Laura and Yang, Weizhen and Yoshida, Nobuko (2014) Timed Multiparty Session Types. In: Baldan, Paolo and Gorla, Daniele, eds. CONCUR 2014 – Concurrency Theory 25th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 419-434. ISBN 978-3-662-44583-9. E-ISBN 978-3-662-44584-6. (doi:10.1007/978-3-662-44584-6_29)
[img]
Preview

Boiten, Eerke Albert (2014) FoI reveals cynical logic that compromises NHS data privacy. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2014) Introducing extra operations in refinement. Formal Aspects of Computing, 26 (2). pp. 305-317. ISSN 0934-5043. (doi:10.1007/s00165-012-0266-z)
[img]
Preview

Boiten, Eerke Albert (2014) Outdated laws put your health data in jeopardy. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2014) Time for some truth about who is feeding off our NHS data. . The Conversation Internet only. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Boiten, Eerke Albert (2014) Your NHS data is completely anonymous – until it isn’t. . The Conversation Internet only.
[img]

Boiten, Eerke Albert and Jacob, Jeremy (2014) Sealed containers in Z. In: Ait Ameur, Y. and Schewe, K.-D., eds. Abstract State Machines, Alloy, B, TLA, VDM, and Z 4th International Conference. Lecture Notes in Computer Science, 8477 . Springer, Berlin, Germany, pp. 136-141. ISBN 978-3-662-43651-6. E-ISBN 978-3-662-43652-3. (doi:10.1007/978-3-662-43652-3_12)
[img]
Preview

Bowman, Howard, Filetti, Marco, Alsufyani, Abdulmajeed, Janssen, Dirk P., Su, Li (2014) Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough. PLoS ONE, 9 (3). e90595. ISSN 1932-6203. (doi:10.1371/journal.pone.0090595)
[img]
Preview

Buckley, Oliver, Nurse, Jason R. C., Legg, Philip A., Goldsmith, Michael, Creese, Sadie (2014) Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. In: 2014 Workshop on Socio-Technical Aspects in Security and Trust. . IEEE E-ISBN 978-1-4799-7901-1. (doi:10.1109/STAST.2014.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Chadwick, David W, Siu, Kristy, Lee, Craig, Fouillat, Yann, Germonville, Damien (2014) Adding Federated Identity Management to OpenStack. Journal of Grid Computing, 12 (1). pp. 3-27. ISSN 1570-7873. E-ISSN 1572-9184. (doi:10.1007/s10723-013-9283-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chennu, Srivas, Finoia, Paola, Kamau, Evelyn, Allanson, Judith, Williams, Guy B., Monti, Martin M., Noreika, Valdas, Arnatkeviciute, Aurina, Canales-Johnson, Andrés, Olivares, Francisco, and others. (2014) Spectral signatures of reorganised brain networks in disorders of consciousness. PLoS Computational Biology, 10 (10). e1003887. ISSN 1553-734X. E-ISSN 1553-7358. (doi:10.1371/journal.pcbi.1003887)
[img]
Preview

Chivers, Daniel (2014) Improving Automated Layout Techniques for the Production of Schematic Diagrams. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Chu, Dominique, Thompson, James, von der Haar, Tobias (2014) Charting the dynamics of translation. Bio Systems, 119 (1). pp. 1-9. ISSN 1872-8324. (doi:10.1016/j.biosystems.2014.02.005)
[img]
Preview

Creese, Sadie, Gibson-Robinson, Thomas, Goldsmith, Michael, Hodges, Duncan, Kim, Dee, Love, Oriana, Nurse, Jason R. C., Pike, Bill, Schultz, Jean (2014) Tools for Understanding Identity. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST). . IEEE E-ISBN 978-1-4799-1535-4. (doi:10.1109/THS.2013.6699064) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cruse, Damian, Beukema, Steve, Chennu, Srivas, Malins, Jeffrey G., Owen, Adrian M., McRae, Ken (2014) The reliability of the N400 in single subjects: Implications for patients with disorders of consciousness. NeuroImage: Clinical, 4 . pp. 788-799. E-ISSN 2213-1582. (doi:10.1016/j.nicl.2014.05.001)
[img]
Preview

Czajkowski, Marcin, Grzes, Marek, Kretowski, Marek (2014) Multi-test Decision Tree and its Application to Microarray Data Classification. Artificial Intelligence in Medicine, 61 (1). pp. 35-44. ISSN 0933-3657. (doi:10.1016/j.artmed.2014.01.005)
[img]
Preview

Cámara, Javier, de Lemos, Rogerio, Laranjeiro, Nuno, Ventura, Rafael, Vieira, Marco (2014) Robustness evaluation of the rainbow framework for self-adaptation. In: UNSPECIFIED. (doi:10.1145/2554850.2554935) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cámara, Javier, de Lemos, Rogerio, Laranjeiro, Nuno, Ventura, Rafael, Vieira, Marco (2014) Testing the robustness of controllers for self-adaptive systems. Journal of the Brazilian Computer Society, 20 (1). p. 1. ISSN 1678-4804. (doi:10.1186/1678-4804-20-1)
[img]
Preview

De Koster, Joeri, Marr, Stefan, D'Hondt, Theo, Van Cutsem, Tom (2014) Domains: safe sharing among actors. Science of Computer Programming, 98, Pa . pp. 140-158. ISSN 0167-6423. (doi:10.1016/j.scico.2014.02.008)
[img]
Preview

De Wael, Mattias, Marr, Stefan, De Meuter, Wolfgang (2014) Data Interface + Algorithms = Efficient Programs: Separating Logic from Representation to Improve Performance. In: Proceedings of the 9th Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems. (doi:10.1145/2633301.2633303)
[img]
Preview

De Wael, Mattias, Marr, Stefan, Van Cutsem, Tom (2014) Fork/Join Parallelism in the Wild: Documenting Patterns and Anti-Patterns in Java Programs using the Fork/Join Framework. In: Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines, Languages, and Tools. (doi:10.1145/2647508.2647511)
[img]
Preview

Dimitrakos, Theo (2014) Context-Aware Multifactor Authentication Based on Dynamic Pin. In: SEC 2014: ICT Systems Security and Privacy Protection. . pp. 330-338. Springer ISBN 978-3-642-55414-8. E-ISBN 978-3-642-55415-5. (doi:10.1007/978-3-642-55415-5_27) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Emms, Martin, Arief, Budi, Freitas, Leo, Hannon, Joseph, van Moorsel, Aad (2014) Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN. In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). CCS '14 . pp. 716-726. ACM, New York, NY, USA ISBN 978-1-4503-2957-6. (doi:10.1145/2660267.2660312)
[img]
Preview

Emms, Martin, Arief, Budi, van Moorsel, Aad (2014) Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. In: Preneel, Bart and Ikonomou, Demosthenes, eds. APF 2012: Privacy Technologies and Policy. Lecture Notes in Computer Science . pp. 203-214. Springer Berlin Heidelberg ISBN 978-3-642-54068-4. E-ISBN 978-3-642-54069-1. (doi:10.1007/978-3-642-54069-1_13)
[img]
Preview

Fatema, Kaniz, Chadwick, David (2014) Resolving Policy Conflicts-Integrating Policies from Multiple Authors. In: UNSPECIFIED.
[img]
Preview

Freitas, Alex A. (2014) Contrasting meta-learning and hyper-heuristic research: the role of evolutionary algorithms. Genetic Programming and Evolvable Machines, 15 (1). pp. 3-35. ISSN 1389-2576. E-ISSN 1573-7632. (doi:10.1007/s10710-013-9186-9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Férée, Hugo, Gomaa, Walid, Hoyrup, Mathieu (2014) Analytical properties of resource-bounded real functionals. Journal of Complexity, 30 (5). pp. 647-671. ISSN 0885-064X. E-ISSN 1090-2708. (doi:10.1016/j.jco.2014.02.008)
[img]
Preview

Gaspar, Jaime and Boiten, Eerke Albert (2014) Simple composition theorems of one-way functions -- proofs and presentations. Technical report. IACR EPrints (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gibson, Raechelle M., Chennu, Srivas, Owen, Adrian M., Cruse, Damian (2014) Complexity and familiarity enhance single-trial detectability of imagined movements with electroencephalography. Clinical Neurophysiology, 125 (8). pp. 1556-1567. ISSN 1388-2457. E-ISSN 1872-8952. (doi:10.1016/j.clinph.2013.11.034) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Greenhow, Keith, Johnson, Colin G. (2014) Region Based Image Preprocessor for Feed-Forward Perceptron Based Systems. In: Zeng, Zhigang and Li, Yangmin and King, Irwin, eds. Advances in Neural Networks – ISNN 2014. Advances in Neural Networks – ISNN 2014, 11th International Symposium on Neural Networks. Lecture Notes in Computer Science . pp. 414-422. Springer ISBN 978-3-319-12435-3. E-ISBN 978-3-319-12436-0. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Grzes, Marek, Poupart, Pascal (2014) POMDP Planning and Execution in an Augmented Space. In: Alessio Lomuscio, Paul Scerri, Ana Bazzan, and Michael Huhns (eds.), Proceedings of the 13th International Con- ference on Autonomous Agents and Multiagent Systems (AAMAS 2014). Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS). . pp. 757-764. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Grzes, Marek, Poupart, Pascal, Yang, Xiao, Hoey, Jesse (2014) Energy Efficient Execution of POMDP Policies. IEEE Transactions on Cybernetics, PP (99). ISSN 2168-2267. (doi:10.1109/TCYB.2014.2375817)
[img]
Preview

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2014) Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014 (2). pp. 5-8. ISSN 1361-3723. (doi:10.1016/S1361-3723(14)70461-0)
[img]
Preview

Hernandez-Castro, Julio C., Boiten, Eerke Albert, Barnoux, Magali F.L. (2014) Second Kent Cyber Security Survey. . Internet only.
[img]
Preview

Jarchi, Delaram, Wong, Charence, Kwasnicki, Richard Mark, Heller, Ben, Tew, Garry A., Yang, Guang-Zhong (2014) Gait Parameter Estimation From a Miniaturized Ear-Worn Sensor Using Singular Spectrum Analysis and Longest Common Subsequence. IEEE Transactions on Biomedical Engineering, 61 (4). pp. 1261-1273. ISSN 0018-9294. (doi:10.1109/TBME.2014.2299772) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Jiang, Bing, Song, Yan, Wei, Si, Liu, Jun-Hua, McLoughlin, Ian Vince, Dai, Li-Rong (2014) Deep bottleneck features for spoken language identification. PloS one, 9 (7). e100795-e100795. (doi:10.1371/journal.pone.0100795) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jiang, Bing, Song, Yan, Wei, Si, McLoughlin, Ian Vince, Dai, Li-Rong (2014) Task-Aware Deep Bottleneck Features for Spoken Language Identification. Interspeech 2014, . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jiang, Bing, Song, Yan, Wei, Si, Wang, Meng-Ge, McLoughlin, Ian Vince, Dai, Li-Rong (2014) Performance evaluation of deep bottleneck features for spoken language identification. In: Chinese Spoken Language Processing (ISCSLP), 2014 9th International Symposium on. Chinese Spoken Language Processing (ISCSLP), 2014 9th International Symposium on. . pp. 143-147. IEEE ISBN 978-1-4799-4219-0. (doi:10.1109/ISCSLP.2014.6936580) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Johnson, Colin G. (2014) Is it Time for Computational Creativity to Grow Up and Start being Irresponsible? In: Fifth International Conference on Computational Creativity. . (Unpublished)
[img]
Preview

Jordanous, Anna (2014) Review of Digital Da Vinci: Computers in the Arts and Sciences (2014, Springer). Review of: Digital Da Vinci: Computers in the Arts and Sciences (2014, Springer) by UNSPECIFIED. ACM Computing Reviews, . p. 1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2014) Review of Emotional Lexicons: Continuity and Change in the Vocabulary of Feeling 1700-2000 by Ute Frevert et al.Anna Jordanous believes this book's strengths lie in its contextual diversity and in the thoroughness of the compilation and usage of reference sources. Review of: Emotional Lexicons: Continuity and Change in the Vocabulary of Feeling 1700-2000 by Ute Frevert et al. by UNSPECIFIED. Reviews in History, . p. 1682.
[img]

Jordanous, Anna (2014) Stepping Back to Progress Forwards: Setting Standards for Meta-Evaluation of Computational Creativity. In: Proceedings of the 5th International Conference on Computational Creativity. .
[img]
Preview

Jordanous, Anna (2014) What is Computational Creativity? . CreativityPost.com Online web platform. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna and Allington, Daniel (2014) Network analysis - code for the Valuing Electronic Music project. github Python code.
[img]

Jordanous, Anna, Allington, Daniel, Dueck, Byron (2014) Online Networks and the Production of Value in Electronic Music. In: Digital Music Research Network Network One-Day Workshop (DMRN+9), 16 Dec 2014, Queen Mary's, London. (Unpublished)
[img] [img]

Jordanous, Anna, Allington, Daniel, Dueck, Byron (2014) Using online networks to analyse the value of electronic music. In: Proceedings of the 5th International Conference on Computational Creativity. .
[img]
Preview

Jordanous, Anna and Fox, Simon (2014) fba-solution-pack-measurement. github php Drupal module.
[img]

Jungjit, Suwimol, Kapinchev, Konstantin (2014) Postgraduate Conference 2014: Technical report 1-14. In: School of Computing Mini Conference, School of Computing - Canterbury Campus.
[img]
Preview

Kafalı, Özgur, Günay, Akin, Yolum, Pinar (2014) GOSU: Computing GOal SUpport with commitments in multiagent systems. In: ECAI'14 Proceedings of the Twenty-first European Conference on Artificial Intelligence. . pp. 477-482. IOS Press ISBN 978-1-61499-418-3. (doi:10.3233/978-1-61499-419-0-477)
[img]
Preview

Kafalı, Özgur, Romero, Alfonso E., Stathis, Kostas (2014) Activity recognition for an agent-oriented personal health system. In: Lecture Notes in Computer Science. PRIMA 2014: Principles and Practice of Multi-Agent Systems. 8861. pp. 254-269. Springer ISBN 978-3-319-13190-0. (doi:10.1007/978-3-319-13191-7_21) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kattan, A., Kampouridis, Michael (2014) Generalisation Enhancement via Input Space Transformation: A GP Approach. In: EuroGP 2014,.
[img]
Preview

Kattan, A., Kampouridis, Michael, Ong, Y.-S., Mehamdi, K. (2014) Transformation of Input Space using Statistical Moments: EA-Based Approach. In: IEEE World Congress on Evolutionary Computation (WCCI). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kell, Stephen (2014) In Search of Types. In: Onward! 2014 Proceedings of the 2014 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software. . pp. 227-241. ACM, New York, NY, USA ISBN 978-1-4503-3210-1. (doi:10.1145/2661136.2661154) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Kotiadis, Kathy, Tako, Antuela, Vasilakis, Christos (2014) A participative and facilitative conceptual modelling framework for discrete event simulation studies in healthcare. Journal of the Operation Research Society, 65 (2). pp. 197-213. ISSN 0160-5682.
[img]
Preview

Li, Huiqing, Thompson, Simon (2014) Improved semantics and implementation through property-based testing with QuickCheck. In: Proceedings of the 9th International Workshop on Automation of Software Test. . pp. 50-56. (doi:10.1145/2593501.2593509)
[img]
Preview

Li, Huiqing, Thompson, Simon, Lamela Seijas, Pablo, Francisco, Miguel Angel (2014) Automating property-based testing of evolving web services. In: Proceedings of ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM'13). . pp. 169-180. (doi:10.1145/2543728.2543741)
[img]
Preview

Li, Jing-jie, McLoughlin, Ian Vince, Dai, Li-Rong, Ling, Zhen-hua (2014) Whisper-to-speech conversion using restricted Boltzmann machine arrays. Electronics Letters, 50 (24). pp. 1781-1782. ISSN 0013-5194. E-ISSN 1350-911X. (doi:10.1049/el.2014.1645)
[img]
Preview

Li, Jingjie, McLoughlin, Ian Vince, Song, Yan (2014) Reconstruction of pitch for whisper-to-speech conversion of Chinese. In: , The 9th International Symposium on Chinese Spoken Language Processing. . pp. 206-210. IEEE ISBN 978-1-4799-4219-0. (doi:10.1109/ISCSLP.2014.6936709) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Li, Jiyuan, Meng, Lingkui, Wang, Frank Z., Zhang, Wen, Cai, Yang (2014) A Map-Reduce-enabled SOLAP cube for large-scale remotely sensed data aggregation. Computers & Geosciences, 70 . pp. 110-119. ISSN 0098-3004. (doi:10.1016/j.cageo.2014.05.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Maass, Marco, Phan, Huy, Mertins, Alfred (2014) Design of Cosine-Sine Modulated Filter Banks without DC Leakage. In: 19th IEEE International Conference on Digital Signal Processing (DSP 2014). . pp. 486-491. IEEE, Hong Kong, China E-ISBN 978-1-4799-4612-9. (doi:10.1109/ICDSP.2014.6900713) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Marr, Stefan, Pape, Tobias, De Meuter, Wolfgang (2014) Are We There Yet? Simple Language Implementation Techniques for the 21st Century. IEEE Software, 31 (5). pp. 60-67. ISSN 0740-7459. (doi:10.1109/MS.2014.98)
[img]
Preview

Marr, Stefan, Renaux, Thierry, Hoste, Lode, De Meuter, Wolfgang (2014) Parallel Gesture Recognition with Soft Real-Time Guarantees. Science of Computer Programming, 98 (2). pp. 159-183. ISSN 0167-6423. E-ISSN 1872-7964. (doi:10.1016/j.scico.2014.02.012)
[img]
Preview

McCall, Davin, Kölling, Michael (2014) Meaningful Categorisation of Novice Programmer Errors. In: Frontiers In Education Conference 2014 Proceedings. .
[img]
Preview

McLoughlin, Ian Vince (2014) Super-Audible Voice Activity Detection. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 22 (9). pp. 1424-1433. (doi:10.1109/TASLP.2014.2335055) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

McLoughlin, Ian Vince, Song, Yan (2014) Mouth State Detection From Low-Frequency Ultrasonic Reflection. Circuits, Systems, and Signal Processing, 34 (4). pp. 1279-1304. ISSN 0278-081X. E-ISSN 1531-5878. (doi:10.1007/s00034-014-9904-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

McLoughlin, Ian Vince, Xie, Zhi-Peng (2014) Speech playback geometry for smart homes. In: , The 18th IEEE International Symposium on Consumer Electronics (ISCE 2014). Consumer Electronics (ISCE 2014), The 18th IEEE International Symposium on. . pp. 1-2. IEEE ISBN 978-1-4799-4592-4. (doi:10.1109/ISCE.2014.6884428) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

McLoughlin, Ian Vince, Xu, Yan, Song, Yan (2014) Tone confusion in spoken and whispered Mandarin Chinese. In: , The 9th International Symposium on Chinese Spoken Language Processing. 12-14 Sept. 2014. . pp. 313-316. IEEE ISBN 978-1-4799-4219-0. (doi:10.1109/ISCSLP.2014.6936708) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Micallef, Luana (2014) Succeeding by Failing. Think, 11 . p. 47. ISSN 2306-0735. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mouli, Surej, Palaniappan, Ramaswamy, Sillitoe, Ian P. (2014) Arduino based configurable LED stimulus design for multi-frequency SSVEP-BCI. In: Proceedings of the IEEE EMBS UKRI Postgraduate Conference on Biomedical Engineering. .
[img]
Preview

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen, Price, Darren, Jones, Glyn (2014) Managing the influence of social media using information trust. In: Social Influence in the Information Age Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie, Lamberts, Koen (2014) Two sides of the coin: measuring and communicating the trustworthiness of online information. Journal of Trust Management, 1 (5). E-ISSN 2196-064X. (doi:10.1186/2196-064X-1-5)
[img]
Preview

Nurse, Jason R. C., Buckley, Oliver, Legg, Philip A., Goldsmith, Michael, Creese, Sadie, Wright, Gordon R.T., Whitty, Monica (2014) Understanding Insider Threat: A Framework for Characterising Attacks. In: 2014 IEEE Security and Privacy Workshops. . IEEE E-ISBN 978-1-4799-5103-1. (doi:10.1109/SPW.2014.38)
[img]
Preview

Nurse, Jason R. C., Legg, Philip A., Buckley, Oliver, Agrafiotis, Ioannis, Wright, Gordon, Whitty, Monica, Upton, David, Goldsmith, Michael, Creese, Sadie (2014) A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches. In: HAS 2014: Human Aspects of Information Security, Privacy, and Trust. . Springer ISBN 978-3-319-07619-5. E-ISBN 978-3-319-07620-1. (doi:10.1007/978-3-319-07620-1_24)
[img]
Preview

Nurse, Jason R. C., Pumphrey, Jess, Gibson-Robinson, Thomas, Goldsmith, Michael, Creese, Sadie (2014) Inferring Social Relationships from Technology-Level Device Connections. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust. . 40 - 47. IEEE ISBN 978-1-4799-3502-4. E-ISBN 978-1-4799-3503-1. (doi:10.1109/PST.2014.6890922) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Orchard, Dominic A. (2014) Computational Semantics with Functional Programming, by Jan van Eijck and Christina Unger. Review of: Computational Semantics with Functional Programming by van Eijck, Jan and Unger, Christina. Journal of Functional Programming, 24 (4). pp. 524-527. ISSN 0956-7968. E-ISSN 1469-7653. (doi:10.1017/S0956796814000057)
[img]
Preview

Orchard, Dominic A., Petricek, Tomas (2014) Embedding effect systems in Haskell. In: Proceedings of the 2014 ACM SIGPLAN symposium on Haskell. . pp. 13-24. ISBN 978-1-4503-3041-1. (doi:10.1145/2633357.2633368)
[img]
Preview

Orchard, Dominic A., Petricek, Tomas, Mycroft, Alan (2014) The semantic marriage of monads and effects. CoRR, abs/14 . (Unpublished)
[img]
Preview

Otero, Fernando E.B., Masegosa, Antonio D., Terrazas, Germán (2014) Thematic issue on advances in nature inspired cooperative strategies for optimization. Memetic Computing, 6 (3). pp. 147-148. ISSN 1865-9284. E-ISSN 1865-9292. (doi:10.1007/s12293-014-0140-z) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Otupiri, R., Akowuah, E. K., Haxha, Shyqyri, Ademgil, H., AbdelMalek, Fathi, Aggoun, A. (2014) A Novel Birefrigent Photonic Crystal Fiber Surface Plasmon Resonance Biosensor. IEEE Photonics Journal, 6 (4). pp. 1-11. ISSN 1943-0655. (doi:10.1109/JPHOT.2014.2335716) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Paes, B.C., Plastino, A., Freitas, Alex A. (2014) Exploring attribute selection in hierarchical classification. Journal of Information and Data Management, 5 (1). pp. 124-133. ISSN 2178-7107. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Palaniappan, Ramaswamy, Andrews, S. (2014) Achieving stability of ECG biometric features through binaural brain entrainment. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I). . pp. 1208-1210. IEEE E-ISBN 978-1-4799-6629-5. (doi:10.1109/IC3I.2014.7019629) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Pawar, Pramod S., Rajarajan, Muttukrishnan, Dimitrakos, Theo, Zisman, Andrea (2014) Trust Assessment Using Cloud Broker. In: IFIPTM 2014: Trust Management VIII. 430. pp. 237-244. (doi:10.1007/978-3-662-43813-8_18) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Petricek, Tomas and Syme, Don (2014) The F# Computation Expression Zoo. In: Flatt, Matthew and Guo, Hai-Feng, eds. Practical Aspects of Declarative Languages. Lecture Notes in Computer Science . Springer, New York, NY, USA, pp. 33-48. ISBN 978-3-319-04131-5. (doi:10.1007/978-3-319-04132-2_3)
[img]
Preview

Pham, Thinh H., Fahmy, Suhaib A., McLoughlin, Ian Vince (2014) Efficient multi-standard cognitive radios on FPGAs. In: , 2014 24th International Conference on Field Programmable Logic and Applications (FPL). . pp. 1-2. IEEE ISBN 978-3-00-044645-0. (doi:10.1109/FPL.2014.6927380)
[img]
Preview

Pham, Thinh H., McLoughlin, Ian Vince, Fahmy, Suhaib A. (2014) Shaping spectral leakage for IEEE 802.11 p vehicular communications. Vehicular Technology Conference (VTC Spring), 2014 IEEE 79th, . pp. 1-5. (doi:10.1109/VTCSpring.2014.7023089) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Pham, Thinh H., McLoughlin, Ian Vince, Fahmy, Suhaib A. (2014) Shaping spectral leakage for IEEE 802.11 p vehicular communications. In: Vehicular Technology Conference (VTC Spring), 2014, 18-21 May 2014, Seoul, Korea.
[img]
Preview

Pham, Thinh Hung, McLoughlin, Ian Vince, Fahmy, Suhaib A. (2014) Robust and Efficient OFDM Synchronization for FPGA-Based Radios. Circuits, Systems, and Signal Processing, 33 (8). pp. 2475-2493. ISSN 0278-081X. E-ISSN 1531-5878. (doi:10.1007/s00034-014-9747-z) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Phan, Huy, Maass, Marco, Mazur, Radoslaw, Mertins, Alfred (2014) Acoustic Event Detection and Localization with Regression Forests. In: 15th Annual Conference of the International Speech Communication Association (INTERSPEECH 2014). . pp. 2524-2528. ISCA
[img]
Preview

Phan, Huy, Maaß, Marco, Mazur, Radoslaw, Mertins, Alfred (2014) Random Regression Forests for Acoustic Event Detection and Classification. IEEE/ACM Transactions on Audio, Speech and Language Processing, 23 (1). pp. 20-31. ISSN 2329-9290. E-ISSN 2329-9304. (doi:10.1109/TASLP.2014.2367814)
[img]
Preview

Phan, Huy, Mertins, Alfred (2014) Exploring Superframe Co-occurrence for Acoustic Event Recognition. In: 22nd European Signal Processing Conference (EUSIPCO 2014). . pp. 631-635. IEEE, Lisbon, Portugal ISBN 978-0-9928626-1-9.
[img]
Preview

Rizzi Raymundo, Caroline, Johnson, Colin Graeme (2014) An Artificial Synaptic Plasticity Mechanism for Classical Conditioning with Neural Networks. In: Zeng, Zhigang and Li, Yangmin and King, Irwin, eds. Advances in Neural Networks – ISNN 2014. Advances in Neural Networks – ISNN 2014. Lecture Notes in Computer Science . pp. 213-221. Springer ISBN 978-3-319-12435-3. E-ISBN 978-3-319-12436-0. (doi:10.1007/978-3-319-12436-0_24)
[img]
Preview

Rowe, Reuben N.S., van Bakel, S.J. (2014) Semantic Types and Approximation for Featherweight Java. Theoretical Computer Science, 517 . pp. 34-74. ISSN 0304-3975. (doi:10.1016/j.tcs.2013.08.017)
[img]
Preview

Serim, Baris, Thanh Tung, Vuong, Ruotsalo, Tuukka, Micallef, Luana, Jacucci, Giulio (2014) mailVis: Visualizing Emailbox for Re-finding Emails. In: IEEE VIS 2014 Posters, Paris, France.
[img]
Preview
[img]

Shao, M., Smonou, D., Kampouridis, Michael, Tsang, E. (2014) Guided Fast Local Search for Speeding Up a Financial Forecasting Algorithm. In: IEEE Computational Intelligence for Financial Engineering & Economics (CIFEr). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Silles, Christopher Anthony (2014) Provenance-Aware CXXR. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Song, Yan, Guo, Wu, Dai, Li-Rong, McLoughlin, Ian Vince (2014) A spectral based visual matching method for image classification. In: , 2014 International Conference on Audio, Language and Image Processing. 7-9 July 2014. . pp. 666-670. IEEE ISBN 978-1-4799-3903-9. (doi:10.1109/ICALIP.2014.7009878) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Song, Yan, McLoughlin, Ian Vince, Dai, Li-Rong (2014) Local coding based matching kernel method for image classification. PloS one, 9 (8). e103575-e103575. (doi:10.1371/journal.pone.0103575) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Su, Li, Gomez, Rodolfo, Bowman, Howard (2014) Analysing neurobiological models using communicating automata. Formal Aspects of Computing, 26 (6). pp. 1169-1204. ISSN 0934-5043. (doi:10.1007/s00165-014-0294-y) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Supratak, A, Li, L, Guo, Y (2014) Feature Extraction with Stacked Autoencoders for Epileptic Seizure Detection. In: Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE. . pp. 4184-4187. IEEE (doi:10.1109/EMBC.2014.6944546) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Tako, Antuela, Kotiadis, Kathy, Vasilakis, Christos, Miras, Alexander, Le Roux, Carel W (2014) Improving patient waiting times: a simulation study of an obesity care service. Improving patient waiting times: a simulation study of an obesity care service, 23 (5). pp. 373-381. ISSN 2044-5415. (doi:10.1136/bmjqs-2013-002107)
[img]
Preview

Thompson, Simon (2014) How to stand out digitally. In: Jolly, Adam, ed. The Growing Business Handbook. Kogan Page, pp. 129-131. ISBN 978-0-7494-7037-1. E-ISBN 978-0-7494-7038-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Thompson, Simon, Delaney, Aidan, Stapleton, Gem, Taylor, John (2014) A Normal Form for Spider Diagrams of Order. Journal of Visual Languages & Computing, .
[img]
Preview

Tupman, Charlotte and Jordanous, Anna (2014) Sharing Ancient Wisdoms across the Semantic Web using TEI and ontologies. In: Andrews, T.L. and Mace, C., eds. Analysis of Ancient and Medieval Texts and Manuscripts: Digital Approaches. Lectio (LECTIO 1) . Brepols, Belgium. ISBN 978-2-503-55268-2.
[img]
Preview

Xu, Simin, Fahmy, Suhaib A., McLoughlin, Ian Vince (2014) Square-rich fixed point polynomial evaluation on FPGAs. In: , Proceedings of the 2014 ACM/SIGDA international symposium on Field-programmable gate arrays - FPGA '14. FPGA '14 Proceedings of the 2014 ACM/SIGDA international. . pp. 99-108. ACM Press ISBN 978-1-4503-2671-1. (doi:10.1145/2554688.2554779)
[img]
Preview

YANG, XIAO (2014) Memristor based neural networks: Feasibility, theories and approaches. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Yu, Li, Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2014) Limitations on information-theoretically-secure quantum homomorphic encryption. Physical Review A, 90 (5). 050303. (doi:10.1103/PhysRevA.90.050303)
[img]
Preview

Yuvaraj, Rajamanickam, Murugappan, Murugappan, Ibrahim, Norlinah Mohamed, Omar, Mohd Iqbal, Sundaraj, Kenneth, Mohamad, Khairiyah, Palaniappan, Ramaswamy, Mesquita, Edgar, Satiyan, Marimuthu (2014) On the analysis of EEG power, frequency and asymmetry in Parkinson's disease during emotion processing. Behavioral and Brain Functions, 10 . pp. 1-19. ISSN 1744-9081. (doi:10.1186/1744-9081-10-12)
[img]
Preview

Zeng, Wei, Huang, Xianfeng, Müller Arisona, Stefan, McLoughlin, Ian Vince (2014) Classifying watermelon ripeness by analysing acoustic signals using mobile devices. Personal and Ubiquitous Computing, 18 (7). pp. 1753-1762. ISSN 1617-4909. E-ISSN 1617-4917. (doi:10.1007/s00779-013-0706-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Öztürkeri, Can, Johnson, Colin G. (2014) Self-repair ability of evolved self-assembling systems in cellular automata. Genetic Programming and Evolvable Machines, 15 (3). pp. 313-341. ISSN 1389-2576. E-ISSN 1573-7632. (doi:10.1007/s10710-014-9216-2)
[img]
Preview

2013

de Lemos, Rogerio and Giese, Holger and Mu?ller, Hausi and Shaw, Mary, eds. (2013) Software Engineering for Self-Adaptive Systems II: International Seminar Dagstuhl Castle, Germany, October 24-29, 2010 Revised Selected and Invited Papers. Springer (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh, McLoughlin, Ian Vince (2013) A new mechanical index for gauging the human bioeffects of low frequency ultrasound. In: Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE. Engineering in Medicine and Biology Society (EMBC), 2013 35th Annual International Conference of the IEEE. . pp. 1964-1967. IEEE (doi:10.1109/EMBC.2013.6609913) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Andersson, Jesper and Baresi, Luciano and Bencomo, Nelly and de Lemos, Rogerio and Gorla, Alessandra and Inverardi, Paola and Vogel, Thomas (2013) Software Engineering Processes for Self-Adaptive Systems. In: Software Engineering for Self-Adaptive Systems II International Seminar. Lecture Notes in Computer Science . Springer, pp. 51-75. ISBN 978-3-642-35812-8. E-ISBN 978-3-642-35813-5. (doi:10.1007/978-3-642-35813-5_3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anggadjaja, Erwin, McLoughlin, Ian Vince (2013) Cross-layer MIMO-link exploiting packet re-routing mechanisms and adaptive modulation in diverse channel condition. In: Telecommunication Networks and Applications Conference (ATNAC), 2013 Australasian. Telecommunication Networks and Applications Conference (ATNAC), 2013 Australasian. . pp. 148-153. IEEE ISBN 978-1-4799-1081-6. (doi:10.1109/ATNAC.2013.6705372) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ansaloni, Danilo and Kell, Stephen and Zheng, Yudi and Bulej, Walter and Truma (2013) Enabling Modularity and Re-use in Dynamic Program Analysis Tools for the Java Virtual Machine. In: ECOOP 2013 – Object-Oriented Programming 27th European Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 352-377. ISBN 978-3-642-39037-1. E-ISBN 978-3-642-39038-8. (doi:10.1007/978-3-642-39038-8_15) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bailey, Christopher and Chadwick, David W. and de Lemos, Rogerio and Siu, Kristy W. S. (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Lectures Notes in Computer Science . Springer, Berlin, Germany, pp. 100-111. ISBN 978-3-642-38997-9. E-ISBN 978-3-642-38998-6. (doi:10.1007/978-3-642-38998-6_14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bailey, Christopher and Chadwick, David W and de Lemos, Rogério and Siu, Kristy WS (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet. Springer Berlin Heidelberg, pp. 100-111.
[img]
Preview

Berry, Michael, Kölling, Michael (2013) The design and implementation of a notional machine for teaching introductory programming. In: WiPSE '13. Proceedings of the 8th Workshop in Primary and Secondary Computing Education. . pp. 25-28. ACM, New York ISBN 978-1-4503-2455-7. (doi:10.1145/2532748.2532765)
[img]
Preview

Bocchi, Laura and Chen, Tzu-Chun and Demangeon, Romain and Honda, Kohei and Yoshida, Nobuko (2013) Monitoring Networks through Multiparty Session Types. In: Formal Techniques for Distributed Systems Joint IFIP WG 6.1 International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 50-65. ISBN 978-3-642-38591-9. E-ISBN 978-3-642-38592-6. (doi:10.1007/978-3-642-38592-6_5)
[img]
Preview

Bocchi, Laura, Mahmud, Hoger, Rebay-Salisbury, Katharina, Tuosto, Emilio (2013) Virtual models for archaeology. Archeologia e Calcolatori, 24 (1). pp. 305-324. ISSN 1120-6861. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) How to commit a bank robbery (or stop one) using the internet. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) The UK government is working in a Snowden-free bubble. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) iPhone hack shows security isn’t at our fingertips just yet. . Scientific American Internet only.
[img]

Boudeville, Olivier and Cesarini, Francesco and Chechina, Natalia and Lundin, Kenneth and Papaspyrou, Nikolaos and Sagonas, Konstantinos and Thompson, Simon and Trinder, Phil and Wiger, Ulf (2013) RELEASE: A High-level Paradigm for Reliable Large-scale Server Software. In: Trends in Functional Programming 13th International Symposium. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 263-278. ISBN 978-3-642-40446-7. E-ISBN 978-3-642-40447-4. (doi:10.1007/978-3-642-40447-4_17)
[img]
Preview

Brown, Neil C.C., Kölling, Michael (2013) A Tale of Three Sites: Resource and Knowledge Sharing Amongst Computer Science Educators. In: ICER 2013. Proceedings of the 2013 ACM Conference on International Computing Education Research. . pp. 27-34. ACM, New York ISBN 978-1-4503-2243-0. (doi:10.1145/2493394.2493398)
[img]
Preview

Cámara, Javier and de Lemos, Rogério and Ghezzi, Carlo, eds. (2013) Assurances for Self-Adaptive Systems: Principles, Models, and Techniques. Springer Publishing Company, Incorporated (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Camara, Javier, Correia, Pedro, de Lemos, Rogério, Garlan, David, Gomes, Pedro, Schmerl, Bradley, Ventura, Rafael (2013) Evolving an adaptive industrial software system to use architecture-based self-adaptation. In: UNSPECIFIED. (doi:10.1109/SEAMS.2013.6595488) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Camara, Javier, Lemos, Rogerio de, Laranjeiro, Nuno, Ventura, Rafael, Vieira, Marco (2013) Robustness Evaluation of Controllers in Self-Adaptive Software Systems. In: Sixth Latin-American Symposium on Dependable Computing (LADC 2013), 1-5 April 2013, Rio de Janeiro, RJ, Brazil. (doi:10.1109/LADC.2013.17) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cameron, Claire, Ostashevsky, Luba (2013) Science Gets Down With Miles Davis and Bernini: Analyzing music and sculpture in the digital age. . Online magazine.
[img]

Chadwick, David (2013) A Trust Model for ABFAB Trust Routers. . Internet. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W, Casenove, Matteo, Siu, Kristy (2013) My private cloud--granting federated access to cloud resources. Journal of Cloud Computing, 2 (1). pp. 1-16. ISSN 2192-113X. (doi:10.1186/2192-113X-2-3)
[img]
Preview

Chadwick, David W and Hibbert, Mark (2013) Towards Automated Trust Establishment in Federated Identity Management. In: Trust Management VII. Springer Berlin Heidelberg, pp. 33-48.
[img]
Preview

Chen, Huankai, Wang, Frank Z., Helian, Na (2013) A Cost-Efficient and Reliable Resource Allocation Model Based on Cellular Automaton Entropy for Cloud Project Scheduling. International Journal of Advanced Computer Science and Applications, 4 (4). pp. 7-14. ISSN 2156-5570.
[img]
Preview

Chennu, Srivas, Finoia, Paola, Kamau, Evelyn, Monti, Martin M., Allanson, Judith, Pickard, John D., Owen, Adrian M., Bekinschtein, Tristan A. (2013) Dissociable endogenous and exogenous attention in disorders of consciousness. NeuroImage: Clinical, 3 . pp. 450-461. E-ISSN 2213-1582. (doi:10.1016/j.nicl.2013.10.008)
[img]
Preview

Chennu, Srivas, Noreika, Valdas, Gueorguiev, David, Blenkmann, Alejandro, Kochen, Silvia, Ibáñez, Agustín, Owen, Adrian M., Bekinschtein, Tristan A. (2013) Expectation and Attention in Hierarchical Auditory Prediction. Journal of Neuroscience, 33 (27). pp. 11194-11205. ISSN 0270-6474. E-ISSN 1529-2401. (doi:10.1523/JNEUROSCI.0114-13.2013)
[img]
Preview

Chu, Dominique (2013) Evolving Parameters for a Noisy Bio-System. In: 2013 IEEE Symposium Series on Computational Intelligence, 16th - 19th April, 2013, Singapore.
[img]
Preview

Chu, Dominique (2013) Replaying the tape of evolution: Evolving parameters for a simple bacterial metabolism. In: IEEE CEC 2013 : IEEE Congress on Evolutionary Computation, 20th - 23rd June, 2013, Cancun, Mexico.
[img]
Preview

Chu, Dominique (2013) The Science Myth: God, society, the self and what we will never know. Iff Books, London, 437 pp. ISBN 1-78279-047-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cruse, Damian, Chennu, Srivas, Chatelle, Camille, Bekinschtein, Tristan A., Fernández-Espejo, Davinia, Pickard, John D., Laureys, Steven, Owen, Adrian M. (2013) Reanalysis of "Bedside detection of awareness in the vegetative state: a cohort study" - Authors' reply. Lancet, 381 (9863). pp. 291-292. ISSN 0140-6736. E-ISSN 1474-547X. (doi:10.1016/S0140-6736(13)60126-9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cámara, Javier, de Lemos, Rogério, Vieira, Marco, Almeida, Raquel, Ventura, Rafael (2013) Architecture-based Resilience Evaluation for Self-adaptive Systems. Computing, 95 (8). pp. 689-722. ISSN 1436-5057. (doi:10.1007/s00607-013-0311-7)
[img]
Preview

Delaney, Aidan, Stapleton, Gem, Taylor, John, Thompson, Simon (2013) On the expressiveness of spider diagrams and commutative star-free regular languages. Journal of Visual Languages and Computing, 24 (4). pp. 273-288. ISSN 1045-926X. (doi:10.1016/j.jvlc.2013.02.001)
[img]
Preview

Emms, Martin and Arief, Budi and Hannon, Joseph and van Moorsel, Aad (2013) POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards. Technical report. CS-TR-1386
[img]
Preview

Emms, Martin, Arief, Budi, Little, Nicholas, van Moorsel, Aad (2013) Risks of Offline Verify PIN on Contactless Cards. In: Sadeghi, Ahmad-Reza, ed. Lecture Notes in Computer Science. Lecture Notes in Computer Science LNCS , 7859. pp. 313-321. Springer Berlin Heidelberg, Berlin ISBN 978-3-642-39883-4. E-ISBN 978-3-642-39884-1. (doi:10.1007/978-3-642-39884-1_26)
[img]
Preview

Fatema, Kaniz (2013) Adding Privacy Protection to Policy Based Authorisation Systems. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Fincher, Sally (2013) The Diarists' Audience. In: Stanley, Liz, ed. Documents of Life Revisited: Narrative and Biographical Methodology for a 21st Century Critical Humanism. Ashgate, pp. 77-92. ISBN 978-1-4094-4289-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fincher, Sally, Knox, Daniel (2013) The Porous Classroom: Professional Practices in the Computing Curriculum. IEEE Computer, 46 (9). pp. 44-51. ISSN 0018-9162. (doi:10.1109/MC.2013.261) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Grzes, Marek, Hoey, Jesse (2013) On the Convergence of Techniques that Improve Value Iteration. In: Neural Networks (IJCNN), The 2013 International Joint Conference. Proceedings of International Joint Conference on Neural Networks (IJCNN). . pp. 1-8. ISBN 978-1-4673-6128-6. (doi:10.1109/IJCNN.2013.6706982)
[img]
Preview

Grzes, Marek, Poupart, Pascal, Hoey, Jesse (2013) Controller Compilation and Compression for Resource Constrained Applications. In: Perny, Patrice and Pirlot, Marc and Tsoukias, Alexis, eds. Third International Conference, ADT 2013, Bruxelles, Belgium, November 12-14, 2013, Proceedings. Proceedings of International Conference on Algorithmic Decision Theory (ADT). Lecture Notes in Computer Science . pp. 193-207. Springer ISBN 978-3-642-41574-6. E-ISBN 978-3-642-41575-3. (doi:10.1007/978-3-642-41575-3_15) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Grzes, Marek, Poupart, Pascal, Hoey, Jesse (2013) Isomorph-Free Branch and Bound Search for Finite State Controllers. In: Proceedings of International Joint Conference on Artificial Intelligence (IJCAI). .
[img]
Preview

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2013) First Kent Cyber Security Survey. . Internet only.
[img]
Preview

Huth, Carly L, Chadwick, David W, Claycomb, William, You, Ilsun (2013) Guest editorial: A brief overview of data leakage and insider threats. Information Systems Frontiers, 15 (1). pp. 1-4. ISSN 1387-3326. E-ISSN 1572-9419. (doi:10.1007/s10796-013-9419-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Johnson, Colin G. (2013) Artistic and Musical Applications of Internet Search Technologies: Prospects and a Case Study. Digital Creativity, 24 (4). pp. 342-366. ISSN 1462-6268. E-ISSN 1744-3806. (doi:10.1080/14626268.2013.777351)
[img]
Preview

Jordanous, Anna (2013) Introducing Computational Creativity Research. . CreativityPost.com Internet. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2013) Review: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. Type: Proceedings. Review of: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. by UNSPECIFIED. ACM Computing Reviews, . CR141093. ISSN 1308-0745. E-ISSN 1308-0745. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna, Lawrence, K. Faith, Tupman, Charlotte (2013) Sharing Ancient Wisdoms: Dataset. RDF. Located at: http://www.ancientwisdoms.ac.uk/library/data/. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna and Roueché, Charlotte and Tupman, Charlotte and Lawrence, K. Faith and Hedges, Mark and Wakelnig, Elvira and Searby, Denis (2013) Sharing Ancient Wisdoms (SAWS) ontology. http://www.ancientwisdoms.ac.uk/.
[img]

Jordanous, Anna, Stanley, Alan, Tupman, Charlotte (2013) Reusing modern tools and techniques to reproduce and research ancient texts. In: Open Repositories, Prince Edward Island, Canada.
[img]
Preview

Jordanous, Anna and Tupman, Charlotte (2013) Sharing Ancient Wisdoms - supporting code. ancientwisdoms.ac.uk XSLT stylesheets. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna, Tupman, Charlotte, Stanley, Alan (2013) Contemporary solutions to retrieve and publish information in ancient documents using RDF and Islandora. In: Digital Humanities 2013, 2013, Lincoln, Nebraska. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kaegi, Stefan (2013) Waiting... with Rachel and Peter: Podcast funded by Arts Council England/Wellcome Trust. Performance type: Other While You Wait, 2013, Fuel, Roundhouse and King’s Cultural Institute. Podcast.
[img]

Kafalı, Özgur, Bromuri, Stefano, Sindlar, Michal, van der Weide, Tom, Aguilar Pelaez, Eduardo, Schaechtle, Ulrich, Alves, Bruno, Zufferey, Damien, Rodriguez-Villegas, Esther, Schumacher, Michael Ignaz, and others. (2013) Commodity 12: A smart e-health environment for diabetes management. Journal of Ambient Intelligence and Smart Environments, 5 (5). pp. 479-502. ISSN 1876-1364. (doi:10.3233/AIS-130220) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafalı, Özgur, Günay, Akin, Yolum, Pinar (2013) Detecting and predicting privacy violations in online social networks. Distributed and Parallel Databases, 32 (1). pp. 161-190. ISSN 0926-8782. (doi:10.1007/s10619-013-7124-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafalı, Özgur, Günay, Akin, Yolum, Pinar (2013) Protoss: A run time tool for detecting privacy violations in online social networks: Short Paper. In: Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012). . pp. 429-433. IEEE ISBN 978-0-7695-4799-2. (doi:10.1109/ASONAM.2012.76) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafalı, Özgur, Sindlar, Michal, van der Weide, Tom, Stathis, Kostas (2013) ORC: An Ontology Reasoning Component for diabetes. In: Proceedings of the 2nd International Workshop on Artificial Intelligence and Netmedicine (NetMed). . p. 71. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kampouridis, Michael (2013) An initial investigation of choice function hyper-heuristics for the problem of financial forecasting. In: Evolutionary Computation (CEC), 2013 IEEE Congress on. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kampouridis, Michael, Alsheddy, Abdullah, Tsang, Edward (2013) On the investigation of hyper-heuristics on a financial forecasting problem. Annals of Mathematics and Artificial Intelligence, 68 (4). pp. 225-246. ISSN 1573-7470. (doi:10.1007/s10472-012-9283-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kampouridis, Michael, Sim, Kwang Mong (2013) A GP approach for price-speed optimizing negotiation. In: IEEE Congress on Evolutionary Computation (CEC). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kapinchev, Konstantin I., Barnes, Frederick R.M., Bradu, Adrian, Podoleanu, Adrian G.H. (2013) Approaches to General Purpose GPU Acceleration of Digital Signal Processing in Optical Coherence Tomography Systems. In: Proceedings of 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC). . pp. 2576-2580. IEEE (doi:10.1109/SMC.2013.440)
[img]
Preview

Kell, Stephen (2013) The Operating System: Should There Be One? In: PLOS '13 Proceedings of the Seventh Workshop on Programming Languages and Operating Systems. . 8:1-8:7. ACM/PLOS, New York, NY, USA ISBN 978-1-4503-2460-1. (doi:10.1145/2525528.2525534) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Knox, Daniel and Cooke, Jennifer (2013) School of Computing Postgraduate Conference 2013. Technical report. University of Kent School of Computing
[img]
Preview

Lange, Julien, Scalas, Alceste (2013) Choreography Synthesis as Contract Agreement. Electronic Proceedings in Theoretical Computer Science, 131 . pp. 52-67. ISSN 2075-2180. (doi:10.4204/EPTCS.131.6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lawrence, K. Faith, Jordanous, Anna (2013) Gnome on the range: finding the hypertextual narratives in ancient wisdom texts. In: 3rd Narrative and Hypertext Workshop at 24th ACM Conference on Hypertext and Social Media (HYPERTEXT 2013), 2013, Paris, France. (doi:10.1145/2462216.2462220)
[img]
Preview

Legg, Philip A., Moffat, Nick, Nurse, Jason R. C., Happa, Jassim, Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2013) Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (4). pp. 20-37. ISSN 2093-5374. E-ISSN 2093-5382. (doi:10.22667/JOWUA.2013.12.31.020)
[img]
Preview

Li, Huiqing, Thompson, Simon (2013) Multicore Profiling for Erlang Programs Using Percept2. In: Erlang Workshop 2013, 28 September 2013, Boston, USA. (doi:2505305.2505311)
[img]
Preview

Marek, Lukáš, Ansaloni, Danilo, Sarimbekov, Aibek, Sewe, Andreas, Zheng, Yudi, Kell, Stephen, Bulej, Lubomír, Binder, Walter, Tůma, Petr (2013) ShadowVM: Robust and Comprehensive Dynamic Program Analysis for the Java Platform. ACM SIGPLAN Notices, 49 (3). pp. 105-114. ISSN 0362-1340. E-ISSN 1558-1160. (doi:10.1145/2517208.2517219) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

McKay, Fraser, Kölling, Michael (2013) Predictive Modelling for HCI Problems in Novice Program Editors. In: Proceedings of BCS HCI 2013 - The Internet of Things XXVII. . British Computer Society, London, UK
[img]
Preview

McLoughlin, Ian Vince, Li, Jingjie, Song, Yan (2013) Reconstruction of Continuous Voiced Speech from Whispers. Proc. Interspeech 2013, (August). pp. 1022-1026. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

McLoughlin, Ian Vince, Prakash, S. (2013) Mobile Communications Using Source-Selected Multi-Antenna AF Relays Over Dual-Hop Nakagami-m Channels. Wireless Personal Communications, 71 (4). pp. 3045-3057. ISSN 0929-6212. E-ISSN 1572-834X. (doi:10.1007/s11277-012-0989-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

McLoughlin, Ian Vince, Prakash, Shiva (2013) Performance analysis of adaptive modulation and transmit antenna selection with channel prediction errors and feedback delay. IET Communications, 7 (16). pp. 1852-1862. ISSN 1751-8628. E-ISSN 1751-8636. (doi:10.1049/iet-com.2013.0096) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Micallef, Luana (2013) Visualizing Set Relations and Cardinalities Using Venn and Euler Diagrams. Doctor of Philosophy (PhD) thesis, University of Kent.
[img]
Preview

Mouli, S., Palaniappan, Ramaswamy, Sillitoe, I.P., Gan, J.Q. (2013) Performance analysis of multi-frequency SSVEP-BCI using clear and frosted colour LED stimuli. In: Proceedings of the 13th IEEE International Conference on BioInformatics and BioEngineering. . IEEE ISBN 978-1-4799-3163-7. (doi:10.1109/BIBE.2013.6701552) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Newby, Danielle, Freitas, Alex A., Ghafourian, Taravat (2013) Pre-processing feature selection for improved C&RT models for oral absorption. Journal of Chemical Information and Modeling, 53 (10). pp. 2730-2742. ISSN 1549-9596. (doi:10.1021/ci400378j) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nguyen, Son T., Johnson, Colin G. (2013) Protein Secondary Structure Prediction using an Optimised Bayesian Classification Neural Network. In: Proceedings of the 5th International Joint Conference on Computational Intelligence - Volume 1: NCTA. . pp. 451-457. Science and Technology Publications, Setúbal, Portugal ISBN 978-989-8565-77-8. (doi:10.5220/0004538604510457)