Items where division is "Faculties > Sciences > School of Computing"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator's name | Item Type | Date | No Grouping
Jump to: ? | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | Ö
Number of items at this level: 1623.

?

?agalj, Mario, Perkovi?, Toni, Bugari?, Marin, Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:10.1016/j.pmcj.2014.09.002)
[img]
Preview

A

Aaron, Samuel, Orchard, Dominic A., Blackwell, Alan F. (2014) Temporal semantics for a live coding language. In: Proceedings of the 2nd ACM SIGPLAN international workshop on Functional art, music, modeling & design. . pp. 37-47. Association for Computing Machinery ISBN 978-1-4503-3039-8. (doi:10.1145/2633638.2633648)
[img]
Preview

Abdullah, Sophiana Chua and Cooley, Roger (2000) The use of constraint logic programming in the development of adaptive tests. In: Gauthier, Gilles and Frasson, Claude and VanLehn, Kurt, eds. Intelligent Tutoring Systems 5th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, p. 650. ISBN 978-3-540-67655-3. E-ISBN 978-3-540-45108-2. (doi:10.1007/3-540-45108-0_73) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Abowd, Gregory D. and Dey, Anind K. and Brown, Peter J. and Davies, Nigel and Smith, Mark E. and Steggles, Pete (1999) Towards a Better Understanding of Context and Context-Awareness. In: Gellersen, Hans, ed. Handheld and Ubiquitous Computing First International Symposium. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 304-307. ISBN 978-3-540-66550-2. E-ISBN 978-3-540-48157-7. (doi:10.1007/3-540-48157-5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Abreu, João, Bocchi, Laura, Fiadeiro, José Luiz, Lopes, Antónia (2007) Specifying and Composing Interaction Protocols for Service-Oriented System Modelling. In: Formal Techniques for Networked and Distributed Systems – FORTE 2007. 27th IFIP WG 6.1 International Conference, Tallinn, Estonia, June 27-29, 2007. Proceedings. Lecture Notes in Computer Science , 4574. pp. 358-373. Springer ISBN 978-3-540-73195-5. E-ISBN 978-3-540-73196-2. (doi:10.1007/978-3-540-73196-2_23) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ackerman, Margareta, Goel, Ashok, Johnson, Colin G., Jordanous, Anna, Leon, Carlos, Perez y Perez, Rafael, Toivonen, Hannu, Ventura, Dan (2017) Teaching Computational Creativity. In: Goel, Ashok and Jordanous, Anna and Pease, Alison, eds. Proceedings of the Eighth International Conference on Computational Creativity. . pp. 9-16. Georgia Institute of Technology, Atlanta, Georgia, US ISBN 978-0-692-89564-1.
[img]
Preview

Adams, Stephen (2017) Data-Driven Refactorings for Haskell. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Adda, Mo, Martin, Jean-Baptise, Owen, Gareth, Peart, A. (2006) Simultion of a Wireless Senor Network for Image Processing. IADAT-tcn, . pp. 35-37. ISSN 84-933971-4-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Adegboye, Adesola, Kampouridis, Michael, Johnson, Colin G. (2018) Regression genetic programming for estimating trend end in foreign exchange market. In: 2017 IEEE Symposium Series on Computational Intelligence (SSCI) Proceedings. . IEEE ISBN 978-1-5386-2727-3. E-ISBN 978-1-5386-2726-6. (doi:10.1109/SSCI.2017.8280833)
[img]
Preview

Adi, R.W., Tio, C.M.M., McLoughlin, Ian Vince (2000) Hardware architecture for data concealment using sub-band coding,. IEEE APCCAS 2000. 2000 IEEE Asia-Pacific Conference on Circuits and Systems. Electronic Communication Systems. (Cat. No.00EX394), . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Adi, R.W., Tio, C.M.M, McLoughlin, Ian Vince (2000) Hardware architecture for data concealment using sub-band coding, LSB coding and pseudo-random bit stream generators. In: , 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119). 2. pp. 221-225. IEEE ISBN 0-7803-6355-8. (doi:10.1109/TENCON.2000.892261) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. and Upton, David (2016) The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance. Project report. University of Oxford, Oxford, UK (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Agrafiotis, Ioannis, Nurse, Jason R. C., Buckley, Oliver, Legg, Phil, Creese, Sadie, Goldsmith, Michael (2015) Identifying attack patterns for insider threat detection. Computer Fraud & Security, (7). pp. 9-17. (doi:10.1016/S1361-3723(15)30066-X) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh, McLoughlin, Ian Vince (2012) Measuring resonances of the vocal tract using frequency sweeps at the lips. In: , The 5th International Symposium on Communications, Control and Signal Processing. 2-4 May 2012. . pp. 1-5. IEEE ISBN 978-1-4673-0274-6. (doi:10.1109/ISCCSP.2012.6217814) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh, McLoughlin, Ian Vince (2013) A new mechanical index for gauging the human bioeffects of low frequency ultrasound. In: Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE. Engineering in Medicine and Biology Society (EMBC), 2013 35th Annual International Conference of the IEEE. . pp. 1964-1967. IEEE (doi:10.1109/EMBC.2013.6609913) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh and McLoughlin, Ian Vince (2009) The use of low frequency ultrasonics in speech processing. In: Signal processing. Itech Book Publishers, Vienna, Austria, pp. 503-528. ISBN 978-953-7619-91-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh and McLoughlin, Ian Vince (2010) The use of low-frequency ultrasonics in speech processing. In: Miron, Sebastian, ed. Signal Processing. Intech, pp. 503-528. ISBN 978-953-7619-91-6. (doi:10.5772/8538) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh, McLoughlin, Ian Vince, Chauhan, Sunita, Ter-Haar, Gail (2012) Bio-effects and safety of low-intensity, low-frequency ultrasonic exposure. Progress in biophysics and molecular biology, 108 (3). pp. 119-138. (doi:10.1016/j.pbiomolbio.2012.01.004) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh, McLoughlin, Ian Vince, Sharifzadeh, Hamid Reza (2008) Analysis-by-synthesis method for whisper-speech reconstruction. In: IEEE Asia Pacific Conference on Circuits and Systems, 2008. APCCAS 2008. . pp. 1280-1283. IEEE ISBN 978-1-4244-2341-5. E-ISBN 978-1-4244-2342-2. (doi:10.1109/APCCAS.2008.4746261) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh, McLoughlin, Ian Vince, Sharifzadeh, Hamid Reza (2010) Autoregressive Modelling for Linear Prediction of Ultrasonic Speech. In: Eleventh Annual Conference of the International Speech Communication Association. . ISCA ISBN 978-1-61782-123-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh, McLoughlin, Ian Vince, Sharifzadeh, Hamid Reza (2010) Linear predictive analysis for ultrasonic speech. Electronics Letters, 46 (6). pp. 387-388. ISSN 0013-5194. (doi:10.1049/el.2010.3521) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh, McLoughlin, Ian Vince, Sharifzadeh, Hamid Reza (2010) Talking Ultrasound. Electronics letters, 46 (6). p. 383. (doi:10.1049/el.2010.9019) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Akehurst, David H. (2004) MDA-Transformations from Relations. In: ECOOP 2004 Workshop Reader, Workshop on Model Driven Development (WMDD 2004). .
[img]
Preview

Akehurst, David H. (2004) Proceedings of Second European Workshop on Model Driven Architecture (MDA) with an emphasis on Methodologies and Transformations. Technical report. kent university
[img]
Preview

Akehurst, David H. (2004) Proposal for a Model Driven Approach to Creating a Tool to Support the RM-ODP. In: Workshop on ODP for Enterprise Computing (WODPEC 2004). . , Monterey, California
[img]
Preview

Akehurst, David H. (2004) Relations in OCL. In: Workshop OCL and Model Driven Engineering. . , Lisbon, Portugal
[img]
Preview

Akehurst, David H. (2004) Validating BPEL Specifications using OCL. Technical report. kent university
[img]
Preview

Aktypi, Angeliki, Nurse, Jason R. C., Goldsmith, Michael (2017) Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks. In: Proceedings of the 2017 International Workshop on Multimedia Privacy and Security. . ACM ISBN 978-1-4503-5206-2. (doi:10.1145/3137616.3137617)
[img]
Preview

Al-Sudani, Sahar, Ramaswamy, Palaniappan (2019) Predicting Students’ Final Degree Classification Using an Extended Profile. Education and Information Technologies, . ISSN 1360-2357. E-ISSN 1573-7608. (doi:10.1007/s10639-019-09873-8)
[img]
Preview
[img]

Alahmadi, Bushra A., Legg, Philip .A., Nurse, Jason R. C. (2015) Using Internet Activity Profiling for Insider-Threat Detection. In: Proceedings of the 17th International Conference on Enterprise Information Systems - (Volume 2). 2. pp. 709-720. SciTePress ISBN 978-989-758-097-0. (doi:10.5220/0005480407090720) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Albakri, Adham, de Lemos, Rogerio, Boiten, Eerke Albert (2019) Sharing Cyber Threat Intelligence under the General Data Protection Regulation. In: Annual Privacy Forum 2019, 13-14 June 2019, Rome, Italy. (In press)
[img]
Preview

Alentorn, Amadeo, Moraglio, Alberto (2010) Heuristic Portfolio Optimisation for a Hedge Fund Strategy using the Geometric Nelder-Mead Algorithm. In: 2010 UK Workshop on Computational Intelligence (UKCI 2010). . ISBN 978-1-4244-8774-5.
[img]
Preview

Ali, Edries Abdelhadi (2001) Integration of Security and Reliability in a Distributed Collaborative Environment. Doctor of Philosophy (PhD) thesis, Computing Laboratory. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science, 10292 . Springer International Publishing AG, pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_13)
[img]
Preview

Allen, Jaqui, Sharifzadeh, Hamid Reza, McLoughlin, Ian Vince, Sarrafzadeh, A, Ardekani, Iman T (2016) Acoustic analysis and computerised reconstruction of speech in laryngectomised individuals. In: 137th Annual Meeting of American Laryngological Association (ALA), Combined Otolaryngology Spring Meetings (COSM 2016), 18-19 May 2016, Chicago, USA. (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Allington, Daniel, Dueck, Byron, Jordanous, Anna (2015) Networks of Value in Electronic Music : SoundCloud, London, and the Importance of Place. Cultural Trends, 24 (3). pp. 211-222. ISSN 0954-8963. E-ISSN 1469-3690. (doi:10.1080/09548963.2015.1066073)
[img]
Preview

Allington, Daniel, Jordanous, Anna, Dueck, Byron (2015) Music, value, and networks in the digital world. http://valuingelectronicmusic.org
[img]
Preview

Allwright, James, Pritchard, David, Jones, Stephen, Stephens, Nelson, Peel, Andrew, Makinson, Gordon, Steel, John, Liddell, Heather (1995) High Performance Computing For All. In: Alexander, Sylvia and Magee, Patricia, eds. Proceedings of the 3rd Annual Conference on the Teaching of Computing. . CTI, Dublin City University
[img]
Preview
[img]
Preview

Alqahtani, Saeed Ibrahim, Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. . Article No. 19. ACM, New York, NY, USA ISBN 978-1-4503-5257-4. (doi:10.1145/3098954.3098984)
[img]
Preview

Alrayes, Bedour, Kafali, Ozgur, Stathis, Kostas (2014) CONAN: A heuristic strategy for Concurrent Negotiating Agents: Extended Abstract. In: AAMAS '14 Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems. . pp. 1585-1586. ACM ISBN 978-1-4503-2738-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Alrayes, Bedour, Kafali, Ozgur, Stathis, Kostas (2017) Concurrent bilateral negotiation for open e-markets: The Conan strategy. Knowledge and Information Systems, . ISSN 0219-1377. (doi:10.1007/s10115-017-1125-2)
[img]
Preview

Alrayes, Bedour and Kafali, Ozgur and Stathis, Kostas (2016) RECON: A Robust multi-agent Environment for simulating COncurrent Negotiations. In: Recent advances in agent-based complex automated negotiation. Studies in Computational Intelligence . Springer, pp. 157-174. ISBN 978-3-319-30305-5. (doi:10.1007/978-3-319-30307-9_10) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Alsallakh, Bilal, Micallef, Luana, Aigner, Wolfgang, Hauser, Helwig, Miksch, Silvia, Rodgers, Peter (2016) The State-of-the-Art of Set Visualization. Computer Graphics Forum, 35 (1). pp. 234-260. ISSN 1467-8659. (doi:10.1111/cgf.12722) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Alsheddy, A., Kampouridis, Michael (2012) Off-line Parameter Tuning for Guided Local Search Using Genetic Programming. In: IEEE World Congress on Evolutionary Computation (WCCI). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Alsufyani, Abdulmajeed (2015) Detecting Salient Information Using RSVP and the P3: Computational and EEG Explorations. Doctor of Philosophy (PhD) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Altadmri, Amjad, Ahmed, Amr (2009) Automatic semantic video annotation in wide domain videos based on similarity and commonsense knowledgebases. In: IEEE International Conference on Signal and Image Processing Applications (ICSIPA)., 18-19th November 2009, Malaysia.
[img]
Preview

Altadmri, Amjad, Ahmed, Amr (2009) Video databases annotation enhancing using commonsense knowledgebases for indexing and retrieval. In: The 13th IASTED International Conference on Artificial Intelligence and Soft Computing, September 7 - 9, 2009, Palma de Mallorca, Spain.
[img]
Preview

Altadmri, Amjad, Ahmed, Amr (2009) VisualNet: Commonsense knowledgebase for video and image indexing and retrieval application. In: IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)., 20-22 Nov. 2009, Shanghai.
[img]
Preview

Altadmri, Amjad, Ahmed, Amr (2014) A framework for automatic semantic video annotation: Utilizing similarity and commonsense knowledge bases. Multimedia Tools and Applications, 72 (2). pp. 1167-1191. ISSN 1380-7501. E-ISSN 1573-7721. (doi:10.1007/s11042-013-1363-6)
[img]
Preview

Altadmri, Amjad, Ahmed, Amr, Mohtasseb, Haytham (2012) Semantic levels of domain-independent commonsense knowledgebase for visual indexing and retrieval applications. In: 19th International Conference on Neural Information Processing (ICONIP), November 12-15, 2012, Doha, Qatar.
[img]
Preview

Aluko, B., Smonou, D., Kampouridis, Michael, Tsang, E. (2014) Combining different meta-heuristics to improve the predictability of a financial forecasting algorithm. In: IEEE Computational Intelligence for Financial Engineering & Economics (CIFEr). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anderson, Tom, Arief, Budi, Basit, Tehmina, Borup, Rosie, Rutherford, Louise (2015) How To Succeed in Cyberspace. In: ICERI2015: 8TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION. ICERI Proceedings . pp. 6074-6083. ISBN 978-84-608-2657-6. (doi:WOS:000377304006024)
[img]
Preview

Andersson, Jesper and Baresi, Luciano and Bencomo, Nelly and de Lemos, Rogerio and Gorla, Alessandra and Inverardi, Paola and Vogel, Thomas (2013) Software Engineering Processes for Self-Adaptive Systems. In: Software Engineering for Self-Adaptive Systems II International Seminar. Lecture Notes in Computer Science . Springer, pp. 51-75. ISBN 978-3-642-35812-8. E-ISBN 978-3-642-35813-5. (doi:10.1007/978-3-642-35813-5_3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Andersson, Jesper, de Lemos, Rogerio, Malek, Sam, Weyns, Danny (2009) Reflecting on self-adaptive software systems. In: UNSPECIFIED. (doi:10.1109/SEAMS.2009.5069072) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Andersson, Jesper and de Lemos, Rogério and Malek, Sam and Weyns, Danny (2009) Modeling Dimensions for Self-Adaptive Systems. In: Software Engineering for Self-Adaptive Systems. Lecture Notes in Computer Science/Programming and Software Engineering (5525). Springer, pp. 27-47. ISBN 978-3-642-02160-2. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Andreotti, Fernando, Phan, Huy, Cooray, Navin, Lo, Christine, Hu, Michele T.M., De Vos, Maarten (2018) Multichannel Sleep Stage Classification and Transfer Learning using Convolutional Neural Networks. In: 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society: Learning from the Past, Looking to the Future. . pp. 171-174. IEEE, Honolulu, Hawaii ISBN 978-1-5386-3646-6. (doi:10.1109/EMBC.2018.8512214)
[img]
Preview

Andrews, S., Palaniappan, Ramaswamy, Kamel, N. (2005) Single trial VEP source separation through sandwich spectral power ratio method. In: Proceedings of the 1st International Conference on Computers, Communications, & Signal Processing. . IEEE ISBN 978-1-4244-0011-9. (doi:10.1109/CCSP.2005.4977147) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Andrews, S., Palaniappan, Ramaswamy, Kiong, L.C., Mastorakis, N. (2009) Singular value decomposition based feature classification for single trial brain-computer interface design. In: ICCOMP'09 Proceedings of the WSEAES 13th international conference on Computers. . pp. 46-53. ACM ISBN 978-960-474-099-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Andrews, Samraj, Kamel, nidal, Ngo, David, Palaniappan, Ramaswamy (2005) Appropriate normalisation for selective eigen rate method in separating principal components of VEP and EEG in BCI. Multimedia Cyberscape Journal, . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Andrews, Samraj, Palaniappan, Ramaswamy, Kamel, Nidal (2005) Extracting Single Trial Visual Evoked Potentials using Selective Eigen-Rate Principal Components. Proceedings of World Academy of Science, Engineering and Technology, 7 . pp. 330-333. ISSN 1307-6884. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ang, Li Ming and McLoughlin, Ian Vince (2012) Multitouch wall displays for informational interactive collaborative space. In: Multi-touch Wall Displays for Informational and Interactive Collaborative Space. Communications in Computer and Information Science . Springer, pp. 318-338. ISBN 978-3-642-29757-1. (doi:10.1007/978-3-642-29758-8_17) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anggadjaja, Erwin, McLoughlin, Ian Vince (2013) Cross-layer MIMO-link exploiting packet re-routing mechanisms and adaptive modulation in diverse channel condition. In: Telecommunication Networks and Applications Conference (ATNAC), 2013 Australasian. Telecommunication Networks and Applications Conference (ATNAC), 2013 Australasian. . pp. 148-153. IEEE ISBN 978-1-4799-1081-6. (doi:10.1109/ATNAC.2013.6705372) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anggadjaja, Erwin, McLoughlin, Ian Vince (2010) Point-to-point OMNeT++ based simulation of reliable transmission using realistic segmentation and reassembly with error control. In: Proceedings - 2010 2nd International Conference on Advances in Computing, Control and Telecommunication Technologies, ACT 2010. . pp. 125-128. IEEE ISBN 978-1-4244-8746-2. E-ISBN 978-0-7695-4269-0. (doi:10.1109/ACT.2010.25) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anggadjaja, Erwin and McLoughlin, Ian Vince (2012) The use of OMNeT++ modelling in WSN. In: Modelling WSNs Using OMNeT++. IGI Global, p. 22. (doi:10.4018/978-1-4666-0321-9.ch018) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anggadjaja, Erwin, McLoughlin, Ian Vince, Lau, Chiew Tong (2015) Cross-layer TCP/IP segmentation, re-routing and adaptive modulation techniques to exploit instantaneous BER variations on parallel subchannels. Australian Journal of Electrical and Electronics Engineering, . pp. 1-13. ISSN 1448-837X. E-ISSN 2205-362X. (doi:10.1080/1448837X.2015.1093677)
[img]

Aniceto, Natália, Freitas, Alex A., Bender, Andreas, Ghafourian, Taravat (2016) A novel applicability domain technique for mapping predictive reliability across the chemical space of a QSAR: reliability-density neighbourhood. Journal of Cheminformatics, 8 (1). p. 69. ISSN 1758-2946. (doi:10.1186/s13321-016-0182-y)
[img]
Preview

Ansaloni, Danilo and Kell, Stephen and Zheng, Yudi and Bulej, Walter and Truma (2013) Enabling Modularity and Re-use in Dynamic Program Analysis Tools for the Java Virtual Machine. In: ECOOP 2013 – Object-Oriented Programming 27th European Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 352-377. ISBN 978-3-642-39037-1. E-ISBN 978-3-642-39038-8. (doi:10.1007/978-3-642-39038-8_15) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anshelevich, Elliot, Owens, Scott, Lamiraux, Florent, Kavraki, Lydia E. (2000) Deformable Volumes in Path Planning Applications. In: Proceedings - IEEE International Conference on Robotics and Automation. 3. pp. 2290-2295. IEEE Press (doi:10.1109/ROBOT.2000.846368) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Arapinis, Myrto, Cheval, Vincent, Delaune, Stéphanie (2015) Composing security protocols: from confidentiality to privacy. In: Focardi, Ricardo and Myers, Andrew, eds. Principles of Security and Trust. Lecture Notes in Computer Science . pp. 324-343. Springer Berlin Heidelberg, London, UK ISBN 978-3-662-46666-7. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img] [img]

Arief, Budi and Besnard, Denis (2003) Technical and Human Issues in Computer-Based Systems Security. Technical report. CS-TR-790
[img]
Preview

Arief, Budi, Bin Adzmi, Mohd Azeem (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 2 - Defenders and Victims. IEEE Security & Privacy, 13 (2). pp. 84-88. ISSN 1540-7993. (doi:10.1109/MSP.2015.44)
[img]
Preview

Arief, Budi, Bin Adzmi, Mohd Azeem, Gross, Thomas (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 1 - Attackers. IEEE Security & Privacy, 13 (1). pp. 71-76. ISSN 1540-7993. (doi:10.1109/MSP.2015.19)
[img]
Preview

Arief, Budi, Blythe, Phil, Fairchild, Richard, Selvarajah, Kirusnapillai, Tully, Alan (2008) Integrating Smartdust into Intelligent Transportation System. In: 10th International Conference on Application of Advanced Technologies in Transportation (AATT 2008), 27-31 May 2008, Athens, Greece.
[img]
Preview

Arief, Budi and Bosio, Diana and Gacek, Cristina and Rouncefield, Mark (2002) Dependability Issues in Open Source Software - DIRC Project Activity 5 Final Report. Technical report. CS-TR-760
[img]
Preview

Arief, Budi and Coleman, Joey and Greathead, David (2010) How Paranoid Are You?: Issues in Location Information of Ambient Systems. Technical report. CS-TR-1219
[img]
Preview

Arief, Budi, Coopamootoo, Kovila P.L., Emms, Martin, van Moorsel, Aad (2014) Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. In: WPES '14 Proceedings of the 13th Workshop on Privacy in the Electronic Society. WPES '14 . pp. 201-204. ACM ISBN 978-1-4503-3148-7. (doi:10.1145/2665943.2665965)
[img]
Preview

Arief, Budi, Gacek, Cristina, Lawrie, Tony (2001) Software Architectures and Open Source Software – Where can Research Leverage the Most? In: ICSE '01 Proceedings of the 23rd International Conference on Software Engineering. . pp. 3-5. ACM ISBN 0-7695-1050-7.
[img]
Preview

Arief, Budi, Greathead, David, Coventry, Lynne, van Moorsel, Aad (2011) Towards the Implementation of an Internet-based Neighbourhood Watch Scheme. In: 3rd International Conference on Computational Aspects of Social Networks (CASoN), 19-22 October 2011, Salamanca, Spain.
[img]
Preview

Arief, Budi and Iliasov, Alexei and Romanovsky, Alexander (2007) On developing open mobile fault tolerant agent systems. In: Choren, R. and Garcia, A. and Giese, H. and Leung, H.-f. and Lucena, C. and Romanovsky, A., eds. Software Engineering for Multi-Agent Systems V. Lecture Notes in Computer Science . Springer, Shanghai, pp. 21-40. ISBN 978-3-540-73130-6. (doi:10.1007/978-3-540-73131-3_2)
[img]
Preview

Arief, Budi, Iliasov, Alexei, Romanovsky, Alexander (2006) On using the CAMA framework for developing open mobile fault tolerant agent systems. In: Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems. . pp. 29-36. ISBN 978-1-59593-395-9. (doi:10.1145/1138063.1138070)
[img]
Preview

Arief, Budi, Iliasov, Alexei, Romanovsky, Alexander (2007) Rigorous Development of Ambient Campus Applications that can Recover from Errors. In: Workshop on Methods, Models and Tools for Fault-Tolerance (MeMoT 2007), at the International Conference on Integrated Formal Methods 2007 (IFM 2007), 3 July 2007.
[img]
Preview

Arief, Budi, Little, Mark, Shrivastava, Santosh, Speirs, Neil, Wheater, Stuart (1999) Specifying distributed system services. British Telecom technology journal, 17 (2). pp. 126-136. ISSN 0265-0193. (doi:10.1023/A:1009650219559) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Arief, Budi, Speirs, Neil (1999) Automatic Generation of Distributed System Simulations from UML. In: 13th European Simulation Multiconference (ESM'99), 1-4 June, 1999, Warsaw, Poland.
[img]
Preview

Arief, Budi, Speirs, Neil (1999) Simulation Generation from UML Like Specifications. In: IASTED Applied Modelling and Simulation (AMS'99), Cairns, Australia.
[img]
Preview

Arief, Budi, Speirs, Neil (2000) A UML tool for an automatic generation of simulation programs. In: WOSP '00 Proceedings of the 2nd international workshop on Software and performance. . pp. 71-76. ISBN 1-58113-195-X. (doi:10.1145/350391.350408)
[img]
Preview

Arief, Budi, von Arnim, Axel (2008) TRACKSS approach to improving road safety through sensors collaboration on vehicle and in infrastructure. In: Vehicular Technology Conference, 2008. VTC 2008-Fall. IEEE 68th. . IEEE ISBN 978-1-4244-1722-3. (doi:10.1109/VETECF.2008.439)
[img]
Preview

Armas Vega, Esteban, Sandoval Orozco, Ana, García Villalba, Luis, Hernandez-Castro, Julio C. (2018) Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns. Sensors, 18 (10). p. 3372. ISSN 1424-8220. (doi:10.3390/s18103372)
[img]
Preview

Arumugam, M.S., Rao, M.V.C., Palaniappan, Ramaswamy (2005) New hybrid genetic operators for real coded genetic algorithm to compute optimal control of a class of hybrid systems. Applied Soft Computing, 6 (1). pp. 38-52. ISSN 1568-4946. (doi:10.1016/j.asoc.2004.11.001) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Asensio-Cubero, J., Gan, J.Q., Palaniappan, Ramaswamy (2012) Extracting common spatial patterns based on wavelet lifting for brain computer interface design. In: 2012 4th Computer Science and Electronic Engineering Conference (CEEC). . pp. 160-163. IEEE ISBN 978-1-4673-2666-7. (doi:10.1109/CEEC.2012.6375397) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Asensio-Cubero, J., Gan, J.Q., Palaniappan, Ramaswamy (2014) Multiresolution analysis of an information based EEG graph representation for motor imagery brain computer interfaces. In: PhyCS 2014 - Proceedings of the International Conference on Physiological Computing Systems. . pp. 5-12. SciTePress ISBN 978-989-758-006-2. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Asghar, Hassan Jameel, Steinfeld, Ron, Li, Shujun, Kaafa, Mohamed Ali, Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. (doi:10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Asirvadam, Vijanth S., McLoone, Sean F., Palaniappan, Ramaswamy (2008) Bio-Signal Identification using Simple Growing RBF-Network (OLACA). In: Icias 2007: International Conference on Intelligent & Advanced Systems, Proceedings. . pp. 263-267. IEEE ISBN 978-1-4244-1355-3. (doi:10.1109/ICIAS.2007.4658387) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Aslan, Ça?r? B., Sa?lam, Rahime Belen, Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of 9th International Conference on Social Media & Society. . ACM ISBN 978-1-4503-6334-1. (doi:10.1145/3217804.3217919)
[img]
Preview

Augusto, Juan Carlos, Gomez, Rodolfo (2002) A Temporal Logic View of Paradigm Specifications. In: Proceedings of 14th. International Conference on Software Engineering and Knowledge Engineering (SEKE'02). . pp. 497-503. ACM, New York ISBN 1-58113-556-4. (doi:10.1145/568760.568847) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Aumayr, Dominik, Marr, Stefan, Béra, Clément, Gonzalez Boix, Elisa, Mössenböck, Hanspeter (2018) Efficient and Deterministic Record & Replay for Actor Languages. In: Proceedings of the 15th International Conference on Managed Languages and Runtimes. . (doi:10.1145/3237009.3237015)
[img]
Preview

Avoine, Gildas, Beaujeant, Antonin, Hernandez-Castro, Julio C., Demay, Louis, Teuwen, Philippe (2016) A Survey of Security and Privacy Issues in ePassport Protocols. ACM Computing Surveys, 48 (3). pp. 1-37. ISSN 0360-0300. (doi:10.1145/2825026) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Axon, Louise M., Alahmadi, Bushra, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2018) Sonification in security operations centres: what do security practitioners think? In: Proceedings of the 2018 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). . Internet Society ISBN 1-891562-53-3. (doi:10.14722/usec.2018.23024)
[img]
Preview

Ayara, Modupe (2005) An Immune-Inspired Solution for Adaptable Error Detection in Embedded Systems. Doctor of Philosophy (PhD) thesis, Computing Laboratory. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ayara, Modupe and Timmis, Jon and de Lemos, Rogerio and Forrest, Simon (2005) Immunising Automated Teller Machines. In: Artificial Immune Systems 4th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 404-417. ISBN 978-3-540-28175-7. E-ISBN 978-3-540-31875-0. (doi:10.1007/11536444_31) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ayara, Modupe, Timmis, Jon, de Lemos, Rogério, de Castro, Leandro N., Duncan, Ross (2003) Tolerating Faults in Embedded Systems Based on Artificial Immune Systems. In: Fast Abstracts Supplement of the 4th European Dependable Computing Conference (EDCC-4). Lecture Notes in Computer Science . pp. 27-28. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Azmat, Freeha, Bocchi, Laura, Fiadeiro, José Luiz (2011) Early Model-Analysis of Logistics Systems. In: Service-Oriented Computing. ICSOC 2010 International Workshops, PAASC, WESOA, SEE, and SOC-LOG. Lecture Notes in Computer Science , 6568. pp. 225-236. Springer ISBN 978-3-642-19393-4. E-ISBN 978-3-642-19394-1. (doi:10.1007/978-3-642-19394-1_25) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

B

Bada, Maria, Sasse, Angela, Nurse, Jason R. C. (2015) Cyber Security Awareness Campaigns: Why do they fail to change behaviour? In: International Conference on Cyber Security for Sustainable Society.
[img]
Preview

Baghaei, N, McLoughlin, Ian Vince (2004) Channel estimation complexity reduction using caching. In: , Emerging Technologies: Frontiers of Mobile and Wireless Communication, 2004. Proceedings of the IEEE 6th Circuits and Systems Symposium on. 1. pp. 209-212. IEEE ISBN 0-7803-7938-1. (doi:10.1109/CASSET.2004.1322956) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Baghaie, A, Kuo, S, McLoughlin, Ian Vince (2004) FPGA implementation of space-time block coding systems. In: , Emerging Technologies: Frontiers of Mobile and Wireless Communication, 2004. Proceedings of the IEEE 6th Circuits and Systems Symposium on. 2. pp. 591-594. ISBN 0-7803-7938-1. (doi:10.1109/CASSET.2004.1321957) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Baghaie, M A, McLoughlin, Ian Vince, Martin, P A, Mehrotra, K, Taylor, D P (2006) Transmit Antenna Selection for UHF MIMO Linking. In: , Spring IEEE Vehicular Technology Conference. 6. pp. 2640-2644. IEEE ISBN 0-7803-9391-0. (doi:10.1109/VETECS.2006.1683346) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bailey, Christopher J. (2012) Application of Self-Adaptive techniques to federated authorization models. In: 2012 International Conference on Software Engineering (ICSE 2012) Doctoral Symposium. . pp. 1495-1498. , 2012 International Conference on Software Engineering (ICSE 2012) Doctoral Symposium (doi:10.1109/ICSE.2012.6227053)
[img]
Preview

Bailey, Christopher, Chadwick, David W., de Lemos, Rogerio (2014) Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, 80 (5). pp. 935-952. ISSN 0022-0000. (doi:10.1016/j.jcss.2014.02.003)
[img]
Preview

Bailey, Christopher and Chadwick, David W. and de Lemos, Rogerio and Siu, Kristy W. S. (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Lectures Notes in Computer Science . Springer, Berlin, Germany, pp. 100-111. ISBN 978-3-642-38997-9. E-ISBN 978-3-642-38998-6. (doi:10.1007/978-3-642-38998-6_14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bailey, Christopher and Chadwick, David W and de Lemos, Rogério and Siu, Kristy WS (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet. Springer Berlin Heidelberg, pp. 100-111.
[img]
Preview

Bailey, Christopher, Montrieux, Lionel, de Lemos, Rogerio, Yu, Yijun, Wermelinger, Michel (2014) Run-time Generation, Transformation, and Verification of Access Control Models for Self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems.
[img]
Preview

Baker, Jason, Cunei, Antonio, Kalibera, Tomas, Pizlo, Filip, Vitek, Jan (2009) Accurate garbage collection in uncooperative environments revisited. Concurrency and Computation: Practice and Experience, 21 (12). pp. 182-196. (doi:10.1002/cpe.1391) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Baker, Robert (2017) A Method for Graph Drawing Utilising Patterns. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Bakkers, A.W.P., Bruis, R., Roebbers, Herman W., Schaller, Nan C., Schwirtz, M.H., Sunder, J.P.E., Wijbrans, K.C.J., Welch, Peter H. (1993) Training for Transputer Technologies. In: Parallel Processing in Education. . Hungarian Academic of Sciences (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ball, Rudi and Grant, James and So, Jonathan and Spurrett, Victoria and de Lemos, Rogerio (2007) Dependable and Secure Distributed Storage System for Ad Hoc Networks. In: Ad-Hoc, Mobile, and Wireless Networks 6th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 142-152. ISBN 978-3-540-74822-9. E-ISBN 978-3-540-74823-6. (doi:10.1007/978-3-540-74823-6_11) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Balli, T., Palaniappan, Ramaswamy (2008) EEG time series analysis with exponential autoregressive modelling. In: 2008 Canadian Conference on Electrical and Computer Engineering. . pp. 485-488. IEEE ISBN 978-1-4244-1643-1. (doi:10.1109/CCECE.2008.4564581) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Balli, T., Palaniappan, Ramaswamy (2009) A combined linear & nonlinear approach for classification of epileptic EEG signals. In: Proceedings of the 4th International IEEE/EMBS Conference on Neural Engineering. . pp. 714-717. IEEE ISBN 978-1-4244-2073-5. (doi:10.1109/NER.2009.5109396) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Balli, T., Palaniappan, Ramaswamy, Bhattacharya, J. (2009) Minimising prediction error for optimal nonlinear modelling of EEG signals using genetic algorithm. In: Proceedings of the 4th International IEEE/EMBS Conference on Neural Engineering. . pp. 363-366. IEEE ISBN 978-1-4244-2073-5. (doi:10.1109/NER.2009.5109308) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Balli, T., Palaniappan, Ramaswamy, Mandic, D.P. (2007) On the linearity/non-linearity of mental activity EEG for brain-computer interface design. In: IFMBE Proceedings. 15. pp. 451-454. Springer ISBN 978-3-540-68016-1. (doi:10.1007/978-3-540-68017-8_114) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Balli, Tugce, Palaniappan, Ramaswamy (2009) A Combined Linear & Nonlinear Approach for Classification of Epileptic EEG Signals. In: Proceedings of the 4th International IEEE/EMBS Conference on Neural Engineering. . pp. 707-710. IEEE ISBN 978-1-4244-2072-8. (doi:10.1109/NER.2009.5109396) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Balli, Tugce and Palaniappan, Ramaswamy (2009) Nonlinear Approach to Brain Signal Modeling. In: Encyclopedia of Information Science and Technology. IGI Global, pp. 2834-2839. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barardo, Diogo G., Newby, Danielle, Thornton, Daniel, Ghafourian, Taravat, Pedro de Magalhães, João, Freitas, Alex A. (2017) Machine learning for predicting lifespan-extending chemical compounds. Aging, 9 (7). pp. 1721-1737. ISSN 1945-4589. (doi:10.18632/aging.101264)
[img]
Preview

Bareham, Corinne, Allanson, Judith, Roberts, Neil, Hutchinson, Peter, Pickard, John D., Menon, David K., Chennu, Srivas (2018) Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field. Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field, . ISSN 1664-2295. E-ISSN 1664-2295. (doi:10.3389/fneur.2018.00676)
[img]
Preview

Barnes, David J. and Brown, Peter J., eds. (1986) Software engineering 86. IEE Computing Series No 6/Cm006 . P. Peregrinus on behalf of the Institution of Electrical Engineers, 433 pp. ISBN 978-0-86341-082-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J. (2014) pgn-extract: A Portable Game Notation (PGN) Manipulator for Chess Games. University of Kent Web download. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J., Bovey, John D. (1986) Managing command submission in a multiple-window environment. Software Engineering Journal, 1 (5). pp. 177-183. ISSN 0268-6961. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J. and Bovey, John D. and Brown, Peter J. and Siemon, HP (1985) Some UNIX tools to exploit a workstation,". In: Integrated Project Support Environments. Peter Peregrinus Ltd, p. 68. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J., Chu, Dominique (2015) Guide to Simulation and Modeling for Biosciences. Simulation Foundations, Methods and Applications . Springer, 339 pp. ISBN 978-1-4471-6761-7. E-ISBN 978-1-4471-6762-4. (doi:10.1007/978-1-4471-6762-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J., Hopkins, Tim (2000) Improving the Quality of Scientific Software. In: First SIAM Conference on Computational Science and Engineering, September 2000, Washington, DC. (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J., Kölling, Michael (2012) Objects First with Java - A Practical Introduction using BlueJ. Pearson Education, 560 pp. ISBN 978-0-13-283554-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J., Russell, Mark T, Wheadon, Mark C (1988) Developing and adapting UNIX tools for workstations. In: EUUG Conference Proceedings. . pp. 321-333. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, Frederick R.M. (2000) Blocking System Calls in KRoC/Linux. In: Welch, Peter H. and Bakkers, A.W.P., eds. Communicating Process Architectures 2000. Concurrent Systems Engineering . IOS Press, Amsterdam, Netherlands, pp. 155-178. ISBN 978-1-58603-077-3.
[img]
Preview
[img]
Preview

Barnes, Frederick R.M. (2003) Dynamics and Pragmatics for High Performance Concurrency. Doctor of Philosophy (PhD) thesis, University of Kent at Canterbury.
[img]
Preview

Barnes, Frederick R.M. (2003) occwserv: An occam Web-Server. In: Broenink, Jan F. and Hilderink, Gerald H., eds. Communicating Process Architectures 2003. Concurrent Systems Engineering . IOS Press, Amsterdam, Netherlands, pp. 251-268. ISBN 978-1-58603-381-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, Frederick R.M. (2001) tranx86 -- an Optimising ETC to IA32 Translator. In: Chalmers, Alan and Mirmehdi, Majid and Muller, Henk, eds. Communicating Process Architectures 2001. Concurrent Systems Engineering . IOS Press, Amsterdam, Netherlands, pp. 265-282. ISBN 978-1-58603-202-9.
[img]
Preview
[img]
Preview

Barnes, Frederick R.M., Beuran, R., Dobinson, R.W., LeVine, M.J., Martin, B., Lokier, J., Meirosu, C. (2002) Testing Ethernet Networks for the ATLAS Data Collection System. IEEE Transactions on Nuclear Science, 49 (2). pp. 516-520. ISSN 0018-9499. (doi:10.1109/TNS.2002.1003791) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, Frederick R.M. and Jacobsen, Christian L. and Vinter, Brian (2003) RMoX: A Raw-Metal occam Experiment. In: Broenink, Jan F. and Hilderink, Gerald H., eds. Communicating Process Architectures 2003. Concurrent Systems Engineering . IOS Press, Amsterdam, Netherlands, pp. 269-288. ISBN 978-1-58603-381-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, Frederick R.M. and Welch, Peter H. (2001) Mobile Data, Dynamic Allocation and Zero Aliasing: an occam Experiment. In: Chalmers, Alan and Mirmehdi, Majid and Muller, Henk, eds. Communicating Process Architectures 2001. Concurrent Systems Engineering . IOS Press, Amsterdam, Netherlands, pp. 243-264. ISBN 978-1-58603-202-9.
[img]
Preview
[img]
Preview

Barnes, Frederick R.M. and Welch, Peter H. (2002) Prioritised Dynamic Communicating Processes: Part 1. In: Pascoe, James and Welch, Peter H. and Loader, Roger and Sunderam, Vaidy, eds. Communicating Process Architectures 2002. Concurrent Systems Engineering . IOS Press, Amsterdam, Netherlands, pp. 321-352. ISBN 978-1-58603-268-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, Frederick R.M. and Welch, Peter H. (2002) Prioritised Dynamic Communicating Processes: Part 2. In: Pascoe, James and Welch, Peter H. and Loader, Roger and Sunde, Vaidy, eds. Communicating Process Architectures 2002. Concurrent Systems Engineering . IOS Press, Amsterdam, Netherlands, pp. 353-370. ISBN 978-1-58603-268-5.
[img]
Preview
[img]
Preview

Barnes, Frederick R.M., Welch, Peter H. (2003) Prioritised Dynamic Communicating and Mobile Processes. IEE Proceedings: Software, 150 (2). pp. 121-136. ISSN 1462-5970. (doi:10.1049/ip-sen:20030182) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bartoletti, M., Lange, Julien, Scalas, A., Zunino, R. (2014) Choreographies in the wild. Science of Computer Programming, 109 . pp. 36-60. ISSN 0167-6423. (doi:10.1016/j.scico.2014.11.015) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Basu, Anirban, Vaidya, Jaideep, Kikuchi, Hiroaki, Dimitrakos, Theo, Nair, Srijith K. (2012) Privacy preserving collaborative filtering for SaaS enabling PaaS clouds. Journal of Cloud Computing: Advances, Systems and Applications, 1 (1). p. 8. ISSN 2192-113X. (doi:10.1186/2192-113X-1-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Batty, Mark (2017) Compositional relaxed concurrency. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 375 (2104). ISSN 1364-503X. E-ISSN 1471-2962. (doi:10.1098/rsta.2015.0406)
[img]
Preview
[img]

Beadle, Lawrence (2009) Semantic and Structural Analysis of Genetic Programming. Doctor of Philosophy (PhD) thesis, Computing. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Beckett, David J. (1997) 30% Accessible - A Survey of the UK Wide Web. In: Genesereth, Michael.R. and Patterson, Anna, eds. Proceedings of the Sixth World Wide Web Conference. Proceedings of the Sixth World Wide Web Conference. 29. pp. 1367-1375. Elsevier, Amsterdam, Netherlands (doi:10.1016/S0169-7552(97)00059-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Beckett, David J. (1995) IAFA Templates in use as Internet Metadata. World Wide Web Journal -- Proceedings of the Fourth International World-Wide Web Conference, 1 (1). pp. 135-143. ISSN 1085-2301. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Beckett, David J. (1998) Polishing Your Searches. Ariadne, 1 (16). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Beckett, David J. and Smith, Neil (1996) The ACademic DireCtory - AC/DC. Technical report. UKC, University of Kent, Canterbury, UK
[img]
Preview
[img]
Preview

Beckett, David J. and Welch, Peter H. (1996) Emulating a secure multicasting bus using occam 2.1. In: Oneill, B.C. and Transputer User, Grp, eds. Proceedings of the 19th world occam and transputer user group technical meeting on Parallel processing developments. Concurrent Systems Engineering Series . IOS Press, Amsterdam, Netherlands, pp. 59-73. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Beckett, David J., Welch, Peter H. (1996) A Strict occam Design Tool. In: Jesshope, C.R. and Shafarenko, A., eds. Proceedings of UK Parallel ''96. . pp. 53-69. Springer-Verlag, London, Guildford, UK (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bekhet, Saddam, Ahmed, Amr, Altadmri, Amjad, Hunter, Andrew (2015) Compressed video matching: Frame-to-frame revisited. Multimedia Tools and Applications, . pp. 1-16. ISSN 1380-7501. E-ISSN 1573-7721. (doi:10.1007/s11042-015-2887-8)
[img]
Preview

Beller-Hann, Ildiko (1995) Central-Asia Reader - the Rediscovery of History - PaKSOY,HB. American Ethnologist, 22 (3). pp. 650-651. ISSN 0094-0496. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bello Orgaz, Gema, Hernandez-Castro, Julio C., Camacho, David (2015) A Survey of Social Web Mining Applications for Disease Outbreak Detection. In: UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Benigni, F., Brogi, A., Buchholz, J-L., Jacquet, J-M., Lange, J., Popescu, R. (2008) Secure P2P Programming on Top of Tuple Spaces. In: 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. . pp. 54-59. ISBN 978-0-7695-3315-5. (doi:10.1109/WETICE.2008.29) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Benoy, Patricia Mary (2002) Polyhedral Domains for Abstract Interpretation in Logic Programming. Doctor of Philosophy (PhD) thesis, University of Kent, Canterbury.
[img]
Preview
[img]
Preview

Berry, Michael (2015) The Design and Implementation of a Notional Machine for teaching Introductory Programming. Doctor of Philosophy (PhD) thesis, University of Kent.
[img]
Preview

Berry, Michael, Kölling, Michael (2014) The State Of Play: A Notional Machine for Learning Programming. In: Proceedings of the 19th Annual Conference on Innovation and Technology in Computer Science Education. .
[img]
Preview

Berry, Michael, Kölling, Michael (2013) The design and implementation of a notional machine for teaching introductory programming. In: WiPSE '13. Proceedings of the 8th Workshop in Primary and Secondary Computing Education. . pp. 25-28. ACM, New York ISBN 978-1-4503-2455-7. (doi:10.1145/2532748.2532765)
[img]
Preview

Besnard, Denis and Arief, Budi (2003) Computer security impaired by legal users. Technical report. CS-TR-794
[img]
Preview

Besnard, Denis, Arief, Budi (2004) Computer security impaired by legitimate users. Computers and Security, 23 (3). pp. 253-264. ISSN 0167-4048. (doi:10.1016/j.cose.2003.09.002)
[img]
Preview

Beukema, Steve, Gonzalez-Lara, Laura E., Finoia, Paola, Kamau, Evelyn, Allanson, Judith, Chennu, Srivas, Gibson, Raechelle M., Pickard, John D., Owen, Adrian M., Cruse, Damian and others. (2016) A hierarchy of event-related potential markers of auditory processing in disorders of consciousness. NeuroImage: Clinical, 12 . pp. 359-371. ISSN 2213-1582. (doi:10.1016/j.nicl.2016.08.003)
[img]
Preview

Blommestijn, R., Lange, Julien, Taylor, C., Winton, A. (2009) Proximity-1: Simulating the CCSDS Proximity-1 Protocol for ExoMars. In: Ouwehand, L., ed. DAta Systems In Aerospace (DASIA). Proceedings of DASIA 2009 Data Systems in Aerospace. ESA Special Publication . ISBN 978-92-9221-233-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, L., Lange, Julien, Tuosto, E. (2012) Three algorithms and a methodology for amending contracts for choreographies. Scientific Annals of Computer Science, 22 (1). pp. 61-104. ISSN 1843-8121. (doi:10.7561/SACS.2012.1.61) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, L., Lange, Julien, Yoshida, N. (2015) Meeting deadlines together. In: Aceto, Luca and de Frutos Escrig, David, eds. Leibniz International Proceedings in Informatics, LIPIcs. 26th International Conference on Concurrency Theory (CONCUR 2015). 42. pp. 283-296. Schloss Dagstuhl - Leibniz-Zentrum für Informatik ISBN 978-3-939897-91-0. (doi:10.4230/LIPIcs.CONCUR.2015.283) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura and Chen, Tzu-Chun and Demangeon, Romain and Honda, Kohei and Yoshida, Nobuko (2013) Monitoring Networks through Multiparty Session Types. In: Formal Techniques for Distributed Systems Joint IFIP WG 6.1 International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 50-65. ISBN 978-3-642-38591-9. E-ISBN 978-3-642-38592-6. (doi:10.1007/978-3-642-38592-6_5)
[img]
Preview

Bocchi, Laura, Ciancarini, Paolo (2006) On the Impact of Formal Methods in the SOA. Electronic Notes in Theoretical Computer Science, 160 . pp. 113-126. ISSN 1571-0661. (doi:10.1016/j.entcs.2006.05.018) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura, Demangeon, Romain (2013) Embedding Session Types in HML. In: Electronic Proceedings in Theoretical Computer Science. 137 (1). pp. 53-62. (doi:10.4204/EPTCS.137.5)
[img]
Preview

Bocchi, Laura, Fiadeiro, José Luiz, Lapadula, Alessandro, Pugliese, Rosario, Tiezzi, Francesco (2009) From Architectural to Behavioural Specification of Services. Electronic Notes in Theoretical Computer Science, 253 (1). pp. 3-21. ISSN 1571-0661. (doi:10.1016/j.entcs.2009.09.025) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura, Gorton, Stephen, Reiff-Marganiec, Stephan (2008) Engineering Service Oriented Applications: From StPowla Processes to SRML Models. In: Fundamental Approaches to Software Engineering. 11th International Conference, FASE 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings. Lecture Notes in Computer Science , 4961. pp. 163-178. Springer ISBN 978-3-540-78742-6. E-ISBN 978-3-540-78743-3. (doi:10.1007/978-3-540-78743-3_13) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura, Hong, Yi, Lopes, Antónia, Fiadeiro, José Luiz (2008) From BPEL to SRML: A Formal Transformational Approach. In: Web Services and Formal Methods. 4th International Workshop, WS-FM 2007 Proceedings. Lecture Notes in Computer Science , 4937. pp. 92-107. Springer ISBN 978-3-540-79229-1. E-ISBN 978-3-540-79230-7. (doi:10.1007/978-3-540-79230-7_7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura, Lange, Julien, Tuosto, E. (2011) Amending Contracts for Choreographies. In: Electronic Proceedings in Theoretical Computer Science. Proceedings Fourth Interaction and Concurrency Experience. 59. pp. 111-129. (doi:10.4204/EPTCS.59.10) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura, Lucchi, Roberto (2006) Atomic Commit and Negotiation in Service Oriented Computing. In: Coordination Models and Languages. 8th International Conference, COORDINATION 2006, Proceedings. Lecture Notes in Computer Science , 4038. pp. 16-27. Springer ISBN 978-3-540-34694-4. E-ISBN 978-3-540-34695-1. (doi:10.1007/11767954_2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura, Mahmud, Hoger, Rebay-Salisbury, Katharina, Tuosto, Emilio (2013) Virtual models for archaeology. Archeologia e Calcolatori, 24 (1). pp. 305-324. ISSN 1120-6861. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura and Melgratti, Hernán (2014) On the Behaviour of General-Purpose Applications on Cloud Storages. In: Web Services and Formal Methods 10th International Workshop. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 29-47. ISBN 978-3-319-08259-2. E-ISBN 978-3-319-08260-8. (doi:10.1007/978-3-319-08260-8_3)
[img]
Preview

Bocchi, Laura and Melgratti, Hernán and Tuosto, Emilio (2014) Resolving Non-Determinism in Choreographies. In: Programming Languages and Systems 23rd European Symposium on Programming. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 493-512. ISBN 978-3-642-54832-1. E-ISBN 978-3-642-54833-8. (doi:10.1007/978-3-642-54833-8_26)
[img]
Preview

Bocchi, Laura, Tuosto, Emilio (2015) Attribute-based transactions in service oriented computing. Mathematical Structures in Computer Science, 25 (3). pp. 619-665. ISSN 0960-1295. (doi:10.1017/S0960129512000904) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura, Tuosto, Emilio (2010) A Java Inspired Semantics for Transactions in SOC. In: 5th International Symposium on Trustworthy Global Computing (TGC). Lecture Notes in Computer Science , 6084. pp. 120-134. Springer ISBN 978-3-642-15639-7. E-ISBN 978-3-642-15640-3. (doi:10.1007/978-3-642-15640-3_9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura, Tuosto, Emilio (2010) Testing Attribute-Based Transactions in SOC. In: International Conference on Formal Techniques for Distributed Systems (FORTE). Lecture Notes in Computer Science , 6117. pp. 87-94. Springer (doi:10.1007/978-3-642-13464-7_8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura and Yang, Weizhen and Yoshida, Nobuko (2014) Timed Multiparty Session Types. In: Baldan, Paolo and Gorla, Daniele, eds. CONCUR 2014 – Concurrency Theory 25th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 419-434. ISBN 978-3-662-44583-9. E-ISBN 978-3-662-44584-6. (doi:10.1007/978-3-662-44584-6_29)
[img]
Preview

Bocchi, Laura, Yoshida, Nobuko, Lange, Julien (2015) Meeting Deadlines Together. In: Aceto, Luca and de Frutos-Escrig, David, eds. International Conference on Concurrency Theory (CONCUR). LIPIcs , 42. pp. 283-296. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik ISBN 978-3-939897-91-0. (doi:10.4230/LIPIcs.CONCUR.2015.283)
[img]
Preview

Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2014) FoI reveals cynical logic that compromises NHS data privacy. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2015) Google’s lip service to privacy cannot conceal that its profits rely on your data. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) How to commit a bank robbery (or stop one) using the internet. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2014) Introducing extra operations in refinement. Formal Aspects of Computing, 26 (2). pp. 305-317. ISSN 0934-5043. (doi:10.1007/s00165-012-0266-z)
[img]
Preview

Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2015) NHS care.data still leaks like a sinking ship, but ministers set sail regardless. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2014) Outdated laws put your health data in jeopardy. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2015) Patients will resist medical record sharing if NHS bosses ignore their privacy fears. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2015) Privacy watchdog takes first step against those undermining right to be forgotten. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2014) Time for some truth about who is feeding off our NHS data. . The Conversation Internet only. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Boiten, Eerke Albert (2013) The UK government is working in a Snowden-free bubble. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2015) We are right to fear spy ‘database of everything’ if even politicians know little about it. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2014) Your NHS data is completely anonymous – until it isn’t. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) iPhone hack shows security isn’t at our fingertips just yet. . Scientific American Internet only.
[img]

Boiten, Eerke Albert, Derrick, John, Bowman, Howard, Steen, Maarten (1999) Constructive consistency checking for partial specification in Z. Science of Computer Programming, 35 (1). pp. 29-75. ISSN 0167-6423. (doi:10.1016/S0167-6423(99)00006-4)
[img]
Preview
[img]
Preview

Boiten, Eerke Albert and Jacob, Jeremy (2014) Sealed containers in Z. In: Ait Ameur, Y. and Schewe, K.-D., eds. Abstract State Machines, Alloy, B, TLA, VDM, and Z 4th International Conference. Lecture Notes in Computer Science, 8477 . Springer, Berlin, Germany, pp. 136-141. ISBN 978-3-662-43651-6. E-ISBN 978-3-662-43652-3. (doi:10.1007/978-3-662-43652-3_12)
[img]
Preview

Bolla, Damiano (1994) IPP Routing Architecture. Technical report. versity of Kent, Computing Laboratory, University of Kent, Canterbury, UK
[img]
Preview
[img]
Preview

Bonetta, Daniele, Salucci, Luca, Marr, Stefan, Binder, Walter (2016) GEMs: Shared-memory Parallel Programming for Node.js. In: ACM SIGPLAN Notices. OOPSLA 2016 Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications. . pp. 531-547. ACM ISBN 978-1-4503-4444-9. (doi:10.1145/2983990.2984039)
[img]
Preview

Boudeville, Olivier and Cesarini, Francesco and Chechina, Natalia and Lundin, Kenneth and Papaspyrou, Nikolaos and Sagonas, Konstantinos and Thompson, Simon and Trinder, Phil and Wiger, Ulf (2013) RELEASE: A High-level Paradigm for Reliable Large-scale Server Software. In: Trends in Functional Programming 13th International Symposium. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 263-278. ISBN 978-3-642-40446-7. E-ISBN 978-3-642-40447-4. (doi:10.1007/978-3-642-40447-4_17)
[img]
Preview

Bouraoui, Zied, Jameel, Shoaib, Schockaert, Steven (2018) Relation Induction in Word Embeddings Revisited. In: The 27th International Conference on Computational Linguistics (COLING 2018). . pp. 1627-1637. ISBN 978-1-948087-50-6.
[img]
Preview

Bovey, John D. (1996) Event-based personal retrieval. Journal of Information Science, 22 (5). pp. 357-366. ISSN 0165-5515. (doi:10.1177/016555159602200504)
[img]
Preview
[img]
Preview

Bovey, John D. (1993) A graphical retrieval-system. Journal of Information Science, 19 (3). pp. 179-187. ISSN 0165-5515. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard, Boiten, Eerke Albert, Derrick, John, Steen, Maarten (1999) Strategies for consistency checking based on unification. Science of Computer Programming, 33 (3). pp. 261-298. ISSN 0167-6423. (doi:10.1016/S0167-6423(98)00017-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard, Derrick, John, Linington, Peter F., Steen, Maarten (1996) Cross-viewpoint consistency in open distributed processing. Software Engineering Journal, 11 (1). pp. 44-57. ISSN 0268-6961. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard, Filetti, Marco, Alsufyani, Abdulmajeed, Janssen, Dirk P., Su, Li (2014) Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough. PLoS ONE, 9 (3). e90595. ISSN 1932-6203. (doi:10.1371/journal.pone.0090595)
[img]
Preview

Bowman, Maggie (1997) Development of a Technical Reports Service at the Higher Education National Software Archive in the UK. Program: Electronic Library and Information Systems, 31 (2). pp. 147-159. ISSN 0033-0337. (doi:10.1108/EUM0000000006885) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bretschneider, T, Ramesh, B, Gupta, V, McLoughlin, Ian Vince (2004) Low-cost space-borne processing on a reconfigurable parallel architecture. Proceedings of the International Conference on Engineering of Reconfigurable Systems and Algorithms, . pp. 93-99. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bretschneider, Timo, Soo, David L H, McLoughlin, Ian Vince (2007) Proceedings of the 3rd Asian Space Conference, 21-23 March 2007, NTU@ one-north Campus, Singapore. School of Computer Engineering, Nanyang Technological University (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S., de Lemos, Rogério, Martins, Eliane, Moraes, R., Rubira, Cecilia M. F. (2009) Architectural-Based Validation of Fault-Tolerant Software. In: Proceedings of the Symposium on Dependable Computing, 2009. . pp. 103-110. ISBN 978-1-4244-4678-0. (doi:10.1109/LADC.2009.34) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S., de Lemos, Rogério, Martins, Eliane, Rubira, Cecilia M. F. (2007) Architecture-centric Fault Tolerance with Exception Handling. In: Proceedings of the Third Latin-American Conference on Dependable Computing. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S., de Lemos, Rogério, Rubira, Cecilia M. F. (2008) Architecting Fault Tolerance using Abstractions. In: Supplemental Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008) - Fast Abstracts. . G28-G29. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S. and de Lemos, Rogério and Rubira, Cecilia M. F. (2008) Development of Fault-Tolerant Software Systems Based on Architectural Abstractions. In: Software Architecture Second European Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 131-147. ISBN 978-3-540-88029-5. E-ISBN 978-3-540-88030-1. (doi:10.1007/978-3-540-88030-1_11) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S., de Lemos, Rogério, Rubira, Cecilia M. F. (2008) Verification of Exception Control Flows and Handlers Based on Architectural Scenarios. In: High Assurance Systems Engineering (HASE) Symposium, 2008. . pp. 177-186. ISBN 978-0-7695-3482-4. (doi:10.1109/HASE.2008.11) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S., de Lemos, Rogério, Rubira, Cecilia M. F. (2009) Verifying Architectural Variabilities in Software Fault Tolerance Techniques. In: Software Architecture, 2009 & European Conference on Software Architecture. WICSA/ECSA 2009. Joint Working IEEE/IFIP Conference on. . pp. 231-240. ISBN 978-1-4244-4984-2. (doi:10.1109/WICSA.2009.5290809) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S., de Lemos, Rogério, Rubira, Cecilia M. F., Martins, Eliane (2009) Architecting Fault Tolerance with Exception Handling: Verification and Validation. Journal of Computer Science and Technology, 24 (2). pp. 212-237. ISSN 1000-9000. (doi:10.1007/s11390-009-9219-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brostoff, Sacha, Sassea, M.Angela, Chadwick, David W., Cunningham, James, Mbanaso, Uche, Otenko, Sassa (2004) RBAC What? Development of a Role-Based Access Control Policy Writing Tool for E-Scientists. In: Workshop on Grid Security Practice and Experience, Oxford, UK. 35. pp. 835-856. (doi:10.1002/spe.691)
[img] [img]
Preview

Brown, Heather (1997) Active Alice: Active Paper for Active Learning. In: Proceedings of ALT-C 97. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather (1993) Desktop Publishing. In: Ralston, Anthony and Reilly, Edwin D., eds. Encyclopedia of Computer Science. Van Nostrand Reinhold, pp. 426-429. ISBN 0-442-27679-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather, Cole, Fred C. (1992) Editing Structured Documents: Problems and Solutions. Electronic Publishing: Origination, Dissemination and Design, 5 (4). pp. 209-216. ISSN 0894-3982. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Cole, Fred C. (1993) ODA extensions for quality and flexibility. In: Evans, Cliff D. and Walker, Raymond S. and Meek, Brian L., eds. User Needs in Information Technology Standards. Computer Weekly Professional Series . Butterworth-Heinemann, pp. 148-160. ISBN 0-7506-1559-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather, Cole, Fred C., Oxborrow, Elizabeth (1993) An Object-Oriented Toolkit for ODA and HyperODA. In: Proceedings of SigDoc'93. . pp. 29-41. ISBN 0-89791-630-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Harding, Robert K. and Lay, Steve and Robinson, Peter and Sheppard, Dan and Watts, Richard (1998) Active Alice: Using Real Paper to Interact with Electronic Text. In: Hersch, Roger and Andre, Jacques and Brown, Heather, eds. Electronic Publishing, Artistic Imaging, and Digital Typography. Lecture Notes in Computer Science (1375). Springer-Verlag, pp. 407-419. ISBN 3-540-64298-6. (doi:10.1007/BFb0053257) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather, Harding, Robert K., Lay, Steve, Robinson, Peter, Sheppard, Dan, Watts, Richard (1998) Active Paper for Active Learning. ALT-J, 6 (1). pp. 95-101. ISSN 0968-7769. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Robinson, Peter (1999) Integrating Paper and Digital Documents. In: Vince, John A. and Earnshaw, Rae A., eds. Digital media: the future. Springer Verlag. ISBN 1-85233-246-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather, Utting, Ian (1992) Teaching Electronic Publishing to Computer Scientists. Electronic Publishing: Origination, Dissemination and Design, 5 (2). pp. 91-96. ISSN 0894-3982. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather, Utting, Ian (1992) Teaching Electronic Publishing to Computer Scientists. In: Andre, Jacques, ed. Teaching Electronic Publishing. . pp. 97-105. Bigre (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Wusteman, Judith (1996) Acrobat, Mosaic and Guide as Vehicles for Electronic Journals. In: Earnshaw, Rae A. and Vince, John A., eds. Digital Media and Electronic Publishing. Academic Press, pp. 65-89. ISBN 0-12-227756-2. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather, Wusteman, Judith (1995) Acrobat, Mosaic and Guide as vehicles for Electronic Journals. New Review of Information Networking, 1 . pp. 33-60. ISSN 1361-4576. (doi:10.1080/13614579509516845) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather, Wusteman, Judith (1995) Electronic journals using Guide. In: Collier, Mel and Arnold, Kathryn, eds. Electronic Library and Visual Information Research: ELVIRA 2. . pp. 92-106. ISBN 0-85142-354-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Neil C. C., Kölling, Michael, Altadmri, Amjad (2016) Position Paper: Lack of Keyboard Support Cripples Block-Based Programming. In: 2015 IEEE Blocks and Beyond Workshop (Blocks and Beyond). . pp. 59-61. IEEE E-ISBN 978-1-4673-8367-7. (doi:10.1109/BLOCKS.2015.7369003)
[img]
Preview

Brown, Neil C.C., Kölling, Michael (2013) A Tale of Three Sites: Resource and Knowledge Sharing Amongst Computer Science Educators. In: ICER 2013. Proceedings of the 2013 ACM Conference on International Computing Education Research. . pp. 27-34. ACM, New York ISBN 978-1-4503-2243-0. (doi:10.1145/2493394.2493398)
[img]
Preview

Brown, Peter J. (1990) Assessing the Quality of Hypertext Documents (keynote address to ECHT''90). In: Rizk, A., ed. Hypertext: Concepts, Systems and Applications. Cambridge University Press, pp. 1-12. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1996) Building Novel Software: the Researcher and the Market-place. In: Milner, Robin and Wand, I., eds. Computing Tomorrow: Future Directions in Computer Science. Cambridge University Press, pp. 21-32.
[img]
Preview
[img]
Preview

Brown, Peter J. (1974) Macro Processors and Techniques for Portable Software. Wiley (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1982) Pascal from BASIC. Addison-Wesley (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1998) Some Lessons for Location-aware Applications. In: First Workshop on Human Computer Interaction with Mobile Devices, 21-23rd May 1998, Department of Computing Science, University of Glasgow, Scotland. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1984) Starting with UNIX. Addison-Wesley (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1996) The Stick-e Document: a Framework for Creating Context-aware Applications. In: Proceedings of EP''96, Palo Alto. . pp. 259-272. also published in it EP--odd (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1995) Taking a Stroll down Babel Street. In: Davidson, A., ed. Humor the Computer. MIT Press, Cambridge, Mass., pp. 165-168. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1998) Triggering information by context. Personal Technologies, 2 (1). pp. 1-9. ISSN 0949-2054. (doi:10.1007/BF01581843)
[img]

Brown, Peter J. (1992) UNIX GUIDE: Lessons from Ten Years'' Development. In: Lucarella, D., ed. Proceedings of the ACM conference on Hypertext. ACM Press, New York, pp. 63-70. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1986) Viewing Documents on a Screen. In: Lambert, Steve and Ropiequet, Suzanne, eds. CD ROM: the New Papyrus. Microsoft Press, Redmond, Wa., pp. 175-184. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1979) Writing Interactive Compilers and Interpreters. Wiley (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J., Bovey, John D., Chen, Xian (1997) Context-aware Applications: from the Laboratory to the Marketplace. IEEE Personal Communications, 4 (5). pp. 58-64. ISSN 1070-9916. (doi:10.1109/98.626984) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J., Brown, Heather (1995) Embedded or Separate Hypertext Mark-up: is it an Issue? Electronic Publishing: Origination, Dissemination and Design, 8 (1). pp. 1-13. ISSN 0894-3982. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J., Welch, Peter H. (1984) Compiler Servers for the Cambridge Ring. The Coordinated Programme of Research in Distributed Computing Systems (1977..1984) -- Final Report (SERC), . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bryans, Jeremy and Arief, Budi (2006) Security implications of structure. In: Besnard, Denis and Gacek, Cristina and Jones, Cliff, eds. Structure for Dependability: Computer-Based Systems from an Interdisciplinary Perspective. Springer London, London, pp. 217-227. ISBN 978-1-84628-110-5. E-ISBN 978-1-84628-111-2. (doi:10.1007/1-84628-111-3_11) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Brysbaert, Ann, Bocchi, Laura, Tuosto, Emilio (2012) Relating archaeological chaîne opératoire and process mining in computer science. Archeologia e Calcolatori, . pp. 165-186. ISSN 1120-6861. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Buckley, Oliver, Nurse, Jason R. C., Legg, Philip A., Goldsmith, Michael, Creese, Sadie (2014) Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. In: 2014 Workshop on Socio-Technical Aspects in Security and Trust. . IEEE E-ISBN 978-1-4799-7901-1. (doi:10.1109/STAST.2014.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Buckner, Ian (1997) UKC ANSAware Survival Guide. Technical report. University of Kent at Canterbury, Computing Laboratory, Computing Laboratory, University of Kent at Canterbury, Canterbury, CT2 7NF
[img]
Preview
[img]
Preview

Buckner, Ian (1997) UKC ANSAware Survival Guide (for Modula-3). Technical report. University of Kent at Canterbury, Computing Laboratory, Computing Laboratory, University of Kent at Canterbury, Canterbury, CT2 7NF
[img]
Preview
[img]
Preview

Buckner, Ian and Penny, Ian (1997) UKC Orbix Survival Guide. Technical report. University of Kent at Canterbury, Computing Laboratory, University of Kent at Canterbury, Canterbury, CT2 7NF
[img]
Preview
[img]
Preview

Bujorianu, Manuela L. and Bujorianu, Marius C. (2004) Extending UML: A Foundational Approach to Heterogeneity. CSD-UMl'04 3rd International Workshop on Critical Systems Development with UML. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Burcham, Morgan, Al-Zyoud, Mahran, Carver, Jeffrey C., Alsaleh, Mohammed, Du, Hongying, Gilani, Fida, Jiang, Jun, Rahman, Akond, Kafali, Ozgur, Al-Shaer, Ehab, and others. (2017) Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers. In: Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp. . pp. 13-23. ACM ISBN 978-1-4503-5274-1. (doi:10.1145/3055305.3055307) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

UNSPECIFIED (2003) IMPROVEMENTS RELATING TO RADIO COMMUNICATION SYSTEMS. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

UNSPECIFIED (2003) Radio communication systems. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

C

C.M.M., Tio, I.V., McLoughlin, R.W., Adi, Tio, C M M, McLoughlin, Ian Vince, Adi, R W (2002) Perceptual audio data concealment and watermarking scheme using direct frequency domain substitution. IEE Proceedings - Vision, Image & Signal Processing, 149 (6). p. 335. ISSN 1350-245X. (doi:10.1049/ip-vis:20020664) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cámara, Javier and de Lemos, Rogério and Ghezzi, Carlo, eds. (2013) Assurances for Self-Adaptive Systems: Principles, Models, and Techniques. Springer Publishing Company, Incorporated (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cakic, Jovan (2003) A High-level Framework for Policy-based Management of Distributed Systems. Doctor of Philosophy (PhD) thesis, Computing Laboratory. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cakic, Jovan (2000) Intelligent infrastructure that support system's changes. In: Loganantharaj, Rasiah and Palm, Gunther and Ali, Moonis, eds. Intelligent Problem Solving. Methodologies and Approaches 13th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 351-356. ISBN 978-3-540-67689-8. E-ISBN 978-3-540-45049-8. (doi:10.1007/3-540-45049-1_43) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Camacho-Collados, Jose, Espinosa-Anke, Luis, Jameel, Shoaib, Schockaert, Steven (2019) A Latent Variable Model for Learning Distributional Relation Vectors. In: International Joint Conferences on Artificial Intelligence. . (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Camara, Javier, Correia, Pedro, de Lemos, Rogerio, Garlan, David, Gomes, Pedro, Schmerl, Bradley, Ventura, Rafael (2015) Incorporating Architecture-Based Self-Adaptation into an Adaptive Industrial Software System. Journal of Systems and Software, . ISSN 0164-1212. (doi:10.1016/j.jss.2015.09.021)
[img]
Preview

Camara, Javier, Correia, Pedro, de Lemos, Rogério, Garlan, David, Gomes, Pedro, Schmerl, Bradley, Ventura, Rafael (2013) Evolving an adaptive industrial software system to use architecture-based self-adaptation. In: UNSPECIFIED. (doi:10.1109/SEAMS.2013.6595488) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Camara, Javier, Lemos, Rogerio de, Laranjeiro, Nuno, Ventura, Rafael, Vieira, Marco (2013) Robustness Evaluation of Controllers in Self-Adaptive Software Systems. In: Sixth Latin-American Symposium on Dependable Computing (LADC 2013), 1-5 April 2013, Rio de Janeiro, RJ, Brazil. (doi:10.1109/LADC.2013.17) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cameron, Claire, Ostashevsky, Luba (2013) Science Gets Down With Miles Davis and Bernini: Analyzing music and sculpture in the digital age. . Online magazine.
[img]

Camilleri, Juanito, Zammit, Vincent (1994) Symbolic Animation as a Proof Tool. In: Melham, Thomas F. and Camilleri, Juanito, eds. Proceedings of the 7th International Workshop on Higher Order Logic Theorem Proving and its Applications, Valletta, Malta. Lecture Notes in Computer Science , 859. pp. 113-127. Springer-Verlag ISBN 3-540-58450-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Campos, Marcília A., da Silva, Erick Lopes, de Carvalho Pedrosa, Diogo, de Castro e Silva, Jorge Luiz, Loureiro, Janine A., Ferraz, Carlos A.G. (2004) NetBook: uma ferramenta para avaliação de desempenho de sistemas de comunicação. In: Proceedings of the 22nd Brazilian Symposium on Computer Networks - III Tools Special Session. . pp. 967-974. , Gramado/RS
[img]
Preview

Canales-Johnson, Andrés, Silva, Carolina, Huepe, David, Rivera-Rei, Álvaro, Noreika, Valdas, Garcia, María del Carmen, Silva, Walter, Ciraolo, Carlos, Vaucheret, Esteban, Sedeño, Lucas, and others. (2015) Auditory Feedback Differentially Modulates Behavioral and Neural Markers of Objective and Subjective Performance When Tapping to Your Heartbeat. Cerebral Cortex, 25 (11). pp. 4490-4503. ISSN 1047-3211. E-ISSN 1460-2199. (doi:10.1093/cercor/bhv076) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Canuto, Anne, Howells, Gareth, Fairhurst, Michael (2000) An investigation of the effects of variable vigilance within the RePART neuro-fuzzy network. Journal of Intelligent & Robotic Systems, 29 (4). pp. 317-334. ISSN 0921-0296. (doi:10.1023/A:1008159908688) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Canuto, Anne, Howells, Gareth, Fairhurst, Michael (2000) The use of confidence measures to enhance combination strategies in multi-network neuro-fuzzy systems. Connection Science, 12 (3-4). pp. 315-331. ISSN 0954-0091. (doi:10.1080/09540090010014089) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Carter, Janet (1999) Collaboration or Plagiarism: What happens when students work together. In: 4th Annual SIGCSE/SIGCUE Conference on Innovation and Technology in Computer Science Education (ITICSE 99), Jun 27-Jul 01, 1999, Krakow, Poland. (doi:10.1145/384267.305848) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Carter, Janet, Jenkins, Tony (1999) Gender and programming: What's going on? In: 4th Annual SIGCSE/SIGCUE Conference on Innovation and Technology in Computer Science Education (ITICSE 99), Jun 27-Jul 01, 1999, Krakow, Poland. (doi:10.1145/384267.305824) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Carvalho, Rodrigo, Goldsmith, Michael, Nurse, Jason R. C. (2015) Online banking malware ontology. In: International Crime and Intelligence Analysis Conference (ICIA). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Casson, Alexander J., Vazquez Galvez, Arturo, Jarchi, Delaram (2016) Gyroscope vs. accelerometer measurements of motion from wrist PPG during physical exercise. ICT Express, 2 (4). pp. 175-179. ISSN 2405-9595. (doi:10.1016/j.icte.2016.11.003)
[img]
Preview

Castle, Tom (2012) Evolving High-Level Imperative Program Trees with Genetic Programming. Doctor of Philosophy (PhD) thesis, University of Kent.
[img]
Preview

Cedric, Tio M M, Adi, Robertus Wahendro, McLoughlin, Ian Vince (2000) Data concealment in audio using a nonlinear frequency distribution. 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119), 1 . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cedric, Tio M M, Adi, Robertus Wahendro, McLoughlin, Ian Vince (2000) Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency-domain LSB insertion. In: , TENCON 2000. Proceedings. TENCON 2000. Proceedings. 1. pp. 275-278. IEEE ISBN 0-7803-6355-8. (doi:10.1109/TENCON.2000.893586) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cervantes, Alejandro, Sloan, Tom, Hernandez-Castro, Julio C., Isasi, Pedro (2018) System steganalysis with automatic fingerprint extraction. PLOS ONE, 13 (4). e0195737. ISSN 1932-6203. (doi:10.1371/journal.pone.0195737)
[img]

Chadwick, David (2013) A Trust Model for ABFAB Trust Routers. . Internet. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2004) PKI Past, Present and Future. In: First EuroPKI Workshop, Samos. .
[img]
Preview

Chadwick, David W., Dimitrakos, Theo, Dam, Kerstin Kleese-Van, Randal, Damian Mac, Matthews, Brian, Otenko, Alexander (2004) Multilayer Privilege Management for Dynamic Collaborative Scientific Communities. In: Workshop on Grid Security Practice and Experience, Oxford, UK. . II 7-14.
[img]
Preview

Chadwick, David W., Lievens, Stijn F, den Hartog, Jerry I, Pashalidis, Andreas, Alhadeff, Joseph (2011) My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud. In: 2011 IEEE 4th International Conference on Cloud Computing. . pp. 752-753. IEEE ISBN 978-1-4577-0836-7. E-ISBN 978-0-7695-4460-1. (doi:10.1109/CLOUD.2011.113)
[img]
Preview

Chadwick, David W. and Lunt, Graeme and Zhao, Gansen (2004) Secure Role-based Messaging. In: Chadwick, David W. and Preneel, Bart, eds. Communications and Multimedia Security 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security. IFIP — The International Federation for Information Processing . Springer, pp. 263-275. ISBN 978-0-387-24485-3. E-ISBN 978-0-387-24486-0. (doi:10.1007/0-387-24486-7_20)
[img]
Preview

Chadwick, David W., Otenko, Sassa, Xu, Wensheng (2005) Adding Distributed Trust Management to Shibboleth. In: NIST 4th Annual PKI Workshop. . pp. 3-14. , Gaithersberg, USA
[img]
Preview

Chadwick, David W, Casenove, Matteo, Siu, Kristy (2013) My private cloud--granting federated access to cloud resources. Journal of Cloud Computing, 2 (1). pp. 1-16. ISSN 2192-113X. (doi:10.1186/2192-113X-2-3)
[img]
Preview

Chadwick, David W and Hibbert, Mark (2012) F-SAMS: Reliably Identifying Attributes and Their Identity Providers in a Federation. In: On the Move to Meaningful Internet Systems: OTM 2012 Workshops. Springer Berlin Heidelberg, pp. 231-241.
[img]
Preview

Chadwick, David W and Hibbert, Mark (2013) Towards Automated Trust Establishment in Federated Identity Management. In: Trust Management VII. Springer Berlin Heidelberg, pp. 33-48.
[img]
Preview

Chadwick, David W, Siu, Kristy, Lee, Craig, Fouillat, Yann, Germonville, Damien (2014) Adding Federated Identity Management to OpenStack. Journal of Grid Computing, 12 (1). pp. 3-27. ISSN 1570-7873. E-ISSN 1572-9184. (doi:10.1007/s10723-013-9283-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chambers, John C, Zhang, Weihua, Sehmi, Joban S., Li, Xinzhong, Wass, Mark N., Van der Harst, Pim, Holm, Hilma, Sanna, Serena, Kavousi, Maryam, Baumeister, Sebastian E, and others. (2011) Genome-wide association study identifies loci influencing concentrations of liver enzymes in plasma. Nature Genetics, 43 (11). pp. 1131-1138. ISSN 1061-4036. (doi:10.1038/ng.970) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chan, Syin (1992) Recompression of Still Images. Technical report. UKC, University of Kent, Canterbury, UK
[img]
Preview
[img]
Preview

UNSPECIFIED (2002) METHOD AND APPARATUS FOR SPEECH ENHANCEMENT IN A SPEECH COMMUNICATION SYSTEM. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chapman, Peter, Stapleton, Gem, Rodgers, Peter, Touloumis, Anestis, Blake, Andrew, Delaney, Aidan (2019) The efficacy of Euler diagrams and linear diagrams for visualizing set cardinality using proportions and numbers. PLOS ONE, 14 (3). e0211234. ISSN 1932-6203. (doi:10.1371/journal.pone.0211234)
[img]
Preview

Chari, Guido, Garbervetsky, Diego, Marr, Stefan (2016) Building Efficient and Highly Run-time Adaptable Virtual Machines. In: ACM SIGPLAN Notices. DLS 2016 Proceedings of the 12th Symposium on Dynamic Languages. 52 (2). pp. 60-71. ACM ISBN 978-1-4503-4445-6. (doi:10.1145/2989225.2989234)
[img]
Preview

Chari, Guido, Garbervetsky, Diego, Marr, Stefan (2017) Fully-reflective VMs for Ruling Software Adaptation. In: Proceedings of the 39th International Conference on Software Engineering Companion. (doi:10.1109/ICSE-C.2017.144)
[img]
Preview

Chari, Guido, Garbervetsky, Diego, Marr, Stefan (2017) A Metaobject Protocol for Optimizing Application-Specific Run-Time Variability. In: Proceedings of the 11th Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems. (doi:10.1145/3098572.3098577)
[img]
Preview

Chari, Guido, Garbervetsky, Diego, Marr, Stefan, Ducasse, Stéphane (2018) Fully Reflective Execution Environments: Virtual Machines for More Flexible Software. IEEE Transactions on Software Engineering, . ISSN 0098-5589. (doi:10.1109/TSE.2018.2812715)
[img]
Preview

Chatelle, Camille, Chennu, Srivas, Noirhomme, Quentin, Cruse, Damian, Owen, Adrian M., Laureys, Steven (2012) Brain-computer interfacing in disorders of consciousness. Brain Injury, 26 (12). pp. 1510-1522. ISSN 0269-9052. E-ISSN 1362-301X. (doi:10.3109/02699052.2012.698362) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chawdhary, Aziem and King, Andy (2017) Compact Difference Bound Matrices. In: Chang, Evan, ed. 15th Asian Symposium on Programming Languages and Systems. Lecture Notes in Computer Science . Springer, pp. 471-490. ISBN 978-3-319-71236-9. (doi:10.1007/978-3-319-71237-6_23)
[img]
Preview

Chen, Huankai (2016) Entropy-Based Resource Management in Complex Cloud Environment. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Chen, Huankai, Wang, Frank Z. (2015) Spark on Entropy: A Reliable & Efficient Scheduler for Low-latency Parallel Jobs in Heterogeneous Cloud. In: Local Computer Networks Conference Workshops (LCN Workshops), 2015 IEEE 40th. . IEEE E-ISBN 978-1-4673-6773-8. (doi:10.1109/LCNW.2015.7365918)
[img]
Preview

Chen, Huankai, Wang, Frank Z., Helian, Na (2013) A Cost-Efficient and Reliable Resource Allocation Model Based on Cellular Automaton Entropy for Cloud Project Scheduling. International Journal of Advanced Computer Science and Applications, 4 (4). pp. 7-14. ISSN 2156-5570.
[img]
Preview

Chen, Jing, McLoughlin, Ian Vince, Chang, Hsung Pin, Chang, Da-Wei, Chiang, Mei-Ling, Chung, Yeh-Ching (2012) Message from WEISS-12 Workshop Chairs. In: UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chen, S.-H., Kampouridis, Michael, Tsang, E. (2010) Microstructure Dynamics and Agent-Based Financial Markets. In: Proceedings of the 11th International Workshop on Multi-Agent-Based Simulation (MABS 2010). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chen, S.-H., Kampouridis, Michael, Tsang, E. (2011) Microstructure Dynamics and Agent-Based Financial Markets. In: Multi-Agent-Based Simulation XI, 11th International Workshop, Revised Papers, LNAI. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chen, Tzu-Chun, Bocchi, Laura, Deniélou, Pierre-Malo, Honda, Kohei, Yoshida, Nobuko (2012) Asynchronous Distributed Monitoring for Multiparty Session Enforcement. In: 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers. Lecture Notes in Computer Science , 7173. pp. 25-45. Springer ISBN 978-3-642-30064-6. E-ISBN 978-3-642-30065-3. (doi:10.1007/978-3-642-30065-3_2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chen, Wanlong (2017) Memristor Content Addressable Memory: Theory, Design and Application. Doctor of Philosophy (PhD) thesis, University of Kent. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Chen, Wanlong, Yang, Xiao, Wang, Frank Z. (2013) Delayed Switching Applied to Memristor Content Addressable Memory Cell. In: Proceedings of the World Congress on Engineering 2013. I. pp. 354-357. International Association of Engineers ISBN 978-988-19251-0-7. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Chen, Xian, Megson, G.M (1995) A General Methodology of Partition and Mapping for Given Regular Arrays. IEEE Transactions on Parallel and Distributed Systems, 6 (10). pp. 1100-1107. ISSN 1045-9219. (doi:10.1109/71.473518) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Betty H. C. and de Lemos, Rogério and Giese, Holger and Inverardi, Paola and Magee, Jeff and Andersson, Jesper and Becker, Basil (2009) Software Engineering for Self-Adaptive Systems: A Research Roadmap. In: Software Engineering for Self-Adaptive Systems. Lecture Notes in Computer Science, 5525 . Springer, Berlin, pp. 1-26. ISBN 978-3-642-02161-9. (doi:10.1007/978-3-642-02161-9_1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H. (1995) Bootstrap methods in computer simulation experiments. In: Alexopoulos, C. and Kang, K. and Lilegdon, W.R and Goldsman, D., eds. 1995 Winter Simulation Conference Proceedings. . pp. 171-177. I E E E ISBN 0-7803-3018-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H., Traylor, L. (1995) Characterization of material strength properties using probabilistic mixture models. In: Carlomagno, G.M. and Brebbia, C.A., eds. Computational Methods and Experimental Measurement VII. . pp. 553-560. Computational Mechanics Publications Ltd ISBN 1-85312-313-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chennu, S., Noreika, V., Gueorguiev, D., Shtyrov, Y., Bekinschtein, T. A., Henson, R. (2016) Silent Expectations: Dynamic Causal Modeling of Cortical Prediction and Attention to Sounds That Weren't. Journal of Neuroscience, 36 (32). pp. 8305-8316. ISSN 0270-6474. E-ISSN 1529-2401. (doi:10.1523/JNEUROSCI.1125-16.2016)
[img]
Preview

Chennu, Srivas (2008) On Feature Binding in Space and Time. In: University of Kent Postgraduate Conference.
[img]
Preview

Chennu, Srivas, Bekinschtein, Tristan A. (2012) Arousal modulates auditory attention and awareness: insights from sleep, sedation and disorders of consciousness. Frontiers in Psychology, 3 (00065). pp. 1-9. E-ISSN 1664-1078. (doi:10.3389/fpsyg.2012.00065)
[img]
Preview

Chennu, Srivas, Finoia, Paola, Kamau, Evelyn, Allanson, Judith, Williams, Guy B., Monti, Martin M., Noreika, Valdas, Arnatkeviciute, Aurina, Canales-Johnson, Andrés, Olivares, Francisco, and others. (2014) Spectral signatures of reorganised brain networks in disorders of consciousness. PLoS Computational Biology, 10 (10). e1003887. ISSN 1553-734X. E-ISSN 1553-7358. (doi:10.1371/journal.pcbi.1003887)
[img]
Preview

Chennu, Srivas, Finoia, Paola, Kamau, Evelyn, Monti, Martin M., Allanson, Judith, Pickard, John D., Owen, Adrian M., Bekinschtein, Tristan A. (2013) Dissociable endogenous and exogenous attention in disorders of consciousness. NeuroImage: Clinical, 3 . pp. 450-461. E-ISSN 2213-1582. (doi:10.1016/j.nicl.2013.10.008)
[img]
Preview

Chennu, Srivas, Habel, Kai, Langer, Klaus-Dieter (2006) Protected Ethernet Rings for Optical Access Networks. In: Proceedings of the 7th ITG Symposium on Photonic Networks. . pp. 29-36. Informationstechnische Gesellschaft, Berlin ISBN 3-8007-2959-8.
[img]
Preview

Chennu, Srivas, Habel, Kai, Langer, Klaus-Dieter (2006) QoS-aware Traffic Protection for Access Rings. In: Proceedings of NOC 2006. . pp. 165-174. ISBN 3923613401.
[img]

Chennu, Srivas, Nagaraj, Vishwas (2001) Mobile Ad Hoc Networks. In: Institute of Engineers technical seminar. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chennu, Srivas, Nagaraj, Vishwas (2001) Parallel Computing using Linux Clusters: PFract - A Parallel Fractal Generation Program. In: Computer Society of India technical seminar. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chennu, Srivas, Noreika, Valdas, Gueorguiev, David, Blenkmann, Alejandro, Kochen, Silvia, Ibáñez, Agustín, Owen, Adrian M., Bekinschtein, Tristan A. (2013) Expectation and Attention in Hierarchical Auditory Prediction. Journal of Neuroscience, 33 (27). pp. 11194-11205. ISSN 0270-6474. E-ISSN 1529-2401. (doi:10.1523/JNEUROSCI.0114-13.2013)
[img]
Preview

Chennu, Srivas, O’Connor, Stuart, Adapa, Ram, Menon, David K., Bekinschtein, Tristan A. (2016) Brain Connectivity Dissociates Responsiveness from Drug Exposure during Propofol-Induced Transitions of Consciousness. PLoS Computational Biology, 12 (1). pp. 1-17. ISSN 1553-734X. E-ISSN 1553-7358. (doi:10.1371/journal.pcbi.1004669)
[img]
Preview

Chennu, Srivas, Stamatakis, Emmanuel A, Menon, David K (2016) The see-saw brain: recovering consciousness after brain injury. The Lancet Neurology, 15 (8). pp. 830-842. ISSN 1474-4422. E-ISSN 1474-4465. (doi:10.1016/S1474-4422(16)30027-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheval, Vincent, Comon-Lundh, Hubert, Delaune, Stéphanie (2017) A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation, 255 (part 1). pp. 94-125. ISSN 0890-5401. E-ISSN 1090-2651. (doi:10.1016/j.ic.2017.05.004)
[img]
Preview

Cheval, Vincent, Cortier, Véronique (2015) Timing attacks: symbolic framework and proof techniques. In: Focardi, Riccardo and Myers, Andrew, eds. Lecture Notes in Computer Science. Principles of Security and Trust. . pp. 280-299. Springer Berlin Heidelberg, London, UK ISBN 978-3-662-46665-0. E-ISBN 978-3-662-46666-7. (doi:10.1007/978-3-662-46666-7_15)
[img]
Preview
[img]
Preview

Chhonker, Ananya, de Lemos, Rogerio (2019) Microservices Architectures and Technical Debt: A Self-adaptation View. In: International Conference on Microservices (Microservices 2019), 19-21 February 2019, Dortmund, Germany.
[img]

Chitil, Olaf, Faddegon, Maarten, Runciman, Colin (2017) A Lightweight Hat: Simple Type-Preserving Instrumentation for Self-Tracing Lazy Functional Programs. In: Proceedings of Implementation and Application of Functional Languages, IFL 2016. (10). ACM ISBN 978-1-4503-4767-9. (doi:10.1145/3064899.3064904)
[img]
Preview

Chivers, Daniel (2014) Improving Automated Layout Techniques for the Production of Schematic Diagrams. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Chong, F, Pawlikowski, K, McLoughlin, Ian Vince (2003) Evaluation of ITU-T G. 728 as a voice over IP codec for Chinese speech. In: , Proceedings of the Australian Telecommunications Networks and Applications Conference 2003 (ATNAC 03â??). . pp. 8-10. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chong, Fong Loong, McLoughlin, Ian Vince, Pawlikowski, Krzysztof (2005) A methodology for improving PESQ accuracy for Chinese speech. In: , TENCON 2005 2005 IEEE Region 10. . pp. 1-6. ISBN 0-7803-9311-2. (doi:10.1109/TENCON.2005.301105) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chu, Dominique (2007) Evolving Genetic Regulatory Networks for Systems Biology. In: Proceedings of IEEE Congress on Evolutionary Computation 2007, Singapore, Sept 25-27 2007. . pp. 875-882. ISBN 978-1-4244-1339-3. (doi:10.1109/CEC.2007.4424562) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chu, Dominique (2013) Evolving Parameters for a Noisy Bio-System. In: 2013 IEEE Symposium Series on Computational Intelligence, 16th - 19th April, 2013, Singapore.
[img]
Preview

Chu, Dominique (2013) Replaying the tape of evolution: Evolving parameters for a simple bacterial metabolism. In: IEEE CEC 2013 : IEEE Congress on Evolutionary Computation, 20th - 23rd June, 2013, Cancun, Mexico.
[img]
Preview

Chu, Dominique (2013) The Science Myth: God, society, the self and what we will never know. Iff Books, London, 437 pp. ISBN 1-78279-047-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chu, Dominique, Barnes, David J. (2015) Evolving strategies for single-celled organisms in multi-nutrient environments. In: Proceedings of the European Conference on Artificial Life 2015. . pp. 226-233. MIT Press (doi:10.7551/978-0-262-33027-5-ch046)
[img]
Preview

Chu, Dominique, Barnes, David J., von der Haar, Tobias (2011) The role of tRNA and ribosome competition in coupling the expression of different mRNAs in Saccharomyces cerevisiae. Nucleic Acids Research, 39 (15). pp. 6705-6714. ISSN 0305-1048. (doi:10.1093/nar/gkr300)
[img]
Preview

Chu, Dominique, Thompson, James, von der Haar, Tobias (2014) Charting the dynamics of translation. Bio Systems, 119 (1). pp. 1-9. ISSN 1872-8324. (doi:10.1016/j.biosystems.2014.02.005)
[img]
Preview

Chua, Leon O., Sbitnev, Valery, Hyongsuk, Kim (2012) Neurons are poised near the edge of chaos. International Journal of Bifurcation and Chaos, 22 (04). 1250098- 1. ISSN 0218-1274. (doi:10.1142/S0218127412500988) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chua, Leon O., Sbitnev, Valery, Kim, Hyongsuk (2012) HODGKIN–HUXLEY AXON IS MADE OF MEMRISTORS. International Journal of Bifurcation and Chaos, 22 (03). pp. 1230011-1. ISSN 0218-1274. (doi:10.1142/S021812741230011X) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cohen, Liron and Rowe, Reuben N. S. (2018) Infinitary and Cyclic Proof Systems for Transitive Closure Logic. Technical report. University of Kent (Submitted)
[img]
Preview

Cole, Fred C., Oxborrow, Elizabeth, Brown, Heather (1992) An Object-Oriented Toolkit for Structured Documents. In: Vanoirbeek, C. and Coray, G., eds. EP92: Proceedings of Electronic Publishing 92. Cambridge Series on Electronic Publishing . pp. 95-111. Cambridge University Press ISBN 0-521-43277-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Comsa, Iulia M., Bekinschtein, Tristan A., Chennu, Srivas (2018) Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness. Brain Topography, . ISSN 0896-0267. E-ISSN 1573-6792. (doi:10.1007/s10548-018-0689-9)
[img]
Preview
[img]

Contrastin, Mistral, Danish, Matthew, Rice, Andrew C., Orchard, Dominic A. (2016) Supporting Software Sustainability with Lightweight Specifications. In: CEUR Workshop Proceedings. Proceedings of the Fourth Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE4). 1686.
[img]
Preview

Contrastin, Mistral, Orchard, Dominic A., Rice, Andrew C. (2018) Automatic reordering for dataflow safety of Datalog. In: Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming. Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming. . ACM ISBN 978-1-4503-6441-6. (doi:10.1145/3236950.3236954)
[img]

Contrastin, Mistral, Rice, Andrew, Danish, Matthew, Orchard, Dominic A. (2015) Units-of-Measure Correctness in Fortran Programs. Computing in Science & Engineering, 18 (1). pp. 102-107. ISSN 1521-9615. (doi:10.1109/MCSE.2016.17)
[img]
Preview

Cooke, Jennifer, Ann (2016) Interacting with consciousness: An investigation into the neural signatures of conscious processing using the global-local auditory task. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Cooper, Ian (1994) Indexing the World. Technical report. University of Kent, Computing Laboratory, University of Kent, Canterbury, UK
[img]
Preview
[img]
Preview

Cooper, Ian (1998) Web Resource Re-discovery - Personal Resource Storage and Retrieval on the World Wide Web. Doctor of Philosophy (PhD) thesis, University of Kent at Canterbury. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cooper, Ian and Shufflebotham, Royston (1995) PDA Web Browsers: Implementation Issues. Technical report. University of Kent, Computing Laboratory, University of Kent, Canterbury, UK
[img]
Preview
[img]
Preview

Corneli, Joseph, Jordanous, Anna, Shepperd, Rosie, Llano, Maria Teresa, Misztal, Joanna, Colton, Simon, Guckelsberger, Christian (2015) Computational Poetry Workshop: Making Sense of Work in Progress. In: 6th International Conference on Computational Creativity, June 29 - July 2, 2015, Utah, US.
[img]
Preview

Correa, Elon S., Freitas, Alex A., Johnson, Colin G. (2008) A New Discrete Particle Swarm Algorithm Applied to Attribute Selection in a Bioinformatics Data Set. In: GECCO '06: Proceedings of the 8th Annual Conference on Genetic and Evolutionary Computation. . pp. 35-42. ACM, New York, USA ISBN 1-59593-186-4. (doi:10.1145/1143997.1144003)
[img]
Preview

Correia, António, Jameel, Shoaib, Schneider, Daniel, Fonseca, Benjamim, Paredes, Hugo (2019) The Effect of Scientific Collaboration on CSCW Research: A Scientometric Study. In: Proceedings of the 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design. . (In press)
[img]
Preview

Cota, Navin Gupta, Palaniappan, Ramaswamy (2008) Enhanced target detection using P300 and gamma band analysis. Neuroscience Research, 61 . ISSN 0168-0102.
[img]

Cramer, Sam, Kampouridis, Michael, Freitas, Alex A., Alexandridis, Antonis (2016) Predicting Rainfall in the Context of Rainfall Derivatives Using Genetic Programming. In: 2015 IEEE Symposium Series on Computational Intelligence. . pp. 711-718. IEEE ISBN 978-1-4799-7560-0. (doi:10.1109/SSCI.2015.108)
[img]
Preview

Cramer, Sam, Kampouridis, Michael, Freitas, Alex A., Alexandridis, Antonis (2019) Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives. Swarm and Evolutionary Computation, 46 . pp. 184-200. ISSN 2210-6502. E-ISSN 2210-6510. (doi:10.1016/j.swevo.2019.01.008)
[img]
Preview
[img]

Creese, Sadie, Gibson-Robinson, Thomas, Goldsmith, Michael, Hodges, Duncan, Kim, Dee, Love, Oriana, Nurse, Jason R. C., Pike, Bill, Schultz, Jean (2014) Tools for Understanding Identity. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST). . IEEE E-ISBN 978-1-4799-1535-4. (doi:10.1109/THS.2013.6699064) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Creese, Sadie, Goldsmith, Michael, Nurse, Jason R. C., Phillips, Elizabeth (2012) A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. . pp. 1124-1131. IEEE ISBN 978-1-4673-2172-3. (doi:10.1109/TrustCom.2012.22) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Cronk, Jonathan, Sharp, John A. (1995) A framework for deciding what to outsource in information technology. Journal of Information Technology, 10 (4). pp. 259-267. ISSN 0268-3962. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cruse, Damian, Beukema, Steve, Chennu, Srivas, Malins, Jeffrey G., Owen, Adrian M., McRae, Ken (2014) The reliability of the N400 in single subjects: Implications for patients with disorders of consciousness. NeuroImage: Clinical, 4 . pp. 788-799. E-ISSN 2213-1582. (doi:10.1016/j.nicl.2014.05.001)
[img]
Preview

Cruse, Damian, Chennu, Srivas, Chatelle, Camille, Bekinschtein, Tristan A., Fernández-Espejo, Davinia, Pickard, John D., Laureys, Steven, Owen, Adrian M. (2012) Bedside detection of awareness in the vegetative state? - Authors' reply. Lancet, 379 (9827). p. 1702. ISSN 0140-6736. E-ISSN 1474-547X. (doi:10.1016/S0140-6736(12)60715-6)
[img]
Preview

Cruse, Damian, Chennu, Srivas, Chatelle, Camille, Bekinschtein, Tristan A., Fernández-Espejo, Davinia, Pickard, John D., Laureys, Steven, Owen, Adrian M. (2013) Reanalysis of "Bedside detection of awareness in the vegetative state: a cohort study" - Authors' reply. Lancet, 381 (9863). pp. 291-292. ISSN 0140-6736. E-ISSN 1474-547X. (doi:10.1016/S0140-6736(13)60126-9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cruse, Damian, Chennu, Srivas, Chatelle, Camille, Bekinschtein, Tristan A, Fernández-Espejo, Davinia, Pickard, John D, Laureys, Steven, Owen, Adrian M (2011) Bedside detection of awareness in the vegetative state: a cohort study. Lancet, 378 (9809). pp. 2088-2094. ISSN 0140-6736. E-ISSN 1474-547X. (doi:10.1016/S0140-6736(11)61224-5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cruse, Damian, Chennu, Srivas, Chatelle, Camille, Fernández-Espejo, Davinia, Bekinschtein, Tristan A., Pickard, John D., Laureys, Steven, Owen, Adrian M. (2012) Relationship between aetiology and covert cognition in the minimally-conscious state. Neurology, 78 (11). pp. 816-822. ISSN 0028-3878. E-ISSN 1526-632X. (doi:10.1212/WNL.0b013e318249f764)
[img]
Preview

Cruse, Damian, Chennu, Srivas, Fernández-Espejo, Davinia, Payne, William L., Young, G. Bryan, Owen, Adrian M. (2012) Detecting Awareness in the Vegetative State: Electroencephalographic Evidence for Attempted Movements to Command. PLoS ONE, 7 (11). e49933. ISSN 1932-6203. E-ISSN 1932-6203. (doi:10.1371/journal.pone.0049933)
[img]
Preview

Curtis, Tony (1994) PEST: A Knowledge Based System for Product Promotions. Technical report. University of Kent, Computing Laboratory, University of Kent, Canterbury, UK
[img]
Preview
[img]
Preview

Cvetkovic, Bozidara, Janko, Vito, Romero, Alfonso E, Kafali, Ozgur, Stathis, Kostas, Lustrek, Mitja (2016) Activity recognition for diabetic patients using a smartphone. Journal of medical systems, 40 (12). p. 256. ISSN 0148-5598. (doi:10.1007/s10916-016-0598-y) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Czajkowski, Marcin, Grzes, Marek, Kretowski, Marek (2014) Multi-test Decision Tree and its Application to Microarray Data Classification. Artificial Intelligence in Medicine, 61 (1). pp. 35-44. ISSN 0933-3657. (doi:10.1016/j.artmed.2014.01.005)
[img]
Preview

Czech, Zbigniew and Mikanik, Wojciech (1996) Randomized PRAM Simulation Using T9000 Transputers. Technical report. UKC, University of Kent, Canterbury, UK
[img]
Preview
[img]
Preview

Cámara, Javier, de Lemos, Rogerio, Laranjeiro, Nuno, Ventura, Rafael, Vieira, Marco (2014) Robustness evaluation of the rainbow framework for self-adaptation. In: UNSPECIFIED. (doi:10.1145/2554850.2554935) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cámara, Javier, de Lemos, Rogerio, Laranjeiro, Nuno, Ventura, Rafael, Vieira, Marco (2014) Testing the robustness of controllers for self-adaptive systems. Journal of the Brazilian Computer Society, 20 (1). p. 1. ISSN 1678-4804. (doi:10.1186/1678-4804-20-1)
[img]
Preview

Cámara, Javier, de Lemos, Rogério (2012) Evaluation of Resilience in Self-Adaptive Systems Using Probabilistic Model-Checking. In: Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2012 ICSE Workshop on. . pp. 53-62. ISBN 978-1-4673-1788-7. (doi:10.1109/SEAMS.2012.6224391) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cámara, Javier, de Lemos, Rogério (2012) Towards Run-time Evaluation of Resilience in Self-Adaptive Systems. In: Proceedings of the 17th Conference on Software Engineering and Databases (JISBD'12). . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cámara, Javier, de Lemos, Rogério, Vieira, Marco, Almeida, Raquel, Ventura, Rafael (2013) Architecture-based Resilience Evaluation for Self-adaptive Systems. Computing, 95 (8). pp. 689-722. ISSN 1436-5057. (doi:10.1007/s00607-013-0311-7)
[img]
Preview

D

Dallas, I. (1993) UCSG UNIX applications workshop, university-of-kent, July 6 and 7 1993. University Computing, 15 (4). pp. 195-200. ISSN 0265-4385. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Daloze, Benoit, Marr, Stefan, Bonetta, Daniele, Mössenböck, Hanspeter (2016) Efficient and Thread-Safe Objects for Dynamically-Typed Languages. ACM SIGPLAN Notices, 51 (10). pp. 642-659. ISSN 0362-1340. E-ISSN 1558-1160. (doi:10.1145/2983990.2984001)
[img]
Preview

Daloze, Benoit, Tal, Arie, Marr, Stefan, Mössenböck, Hanspeter, Petrank, Erez (2018) Parallelization of Dynamic Languages: Synchronizing Built-in Collections. Proceedings of the ACM on Programming Languages, 2 (OOPSLA). ISSN 2475-1421. E-ISSN 2475-1421. (doi:10.1145/3276478)
[img]
Preview

Damsgaard Jensen, Christian and Marsh, Stephen and Dimitrakos, Theo and Murayama, Yuko, eds. (2015) Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology, 454 . Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Daniel, Joshua, Dimitrakos, Theo, El-Moussa, Fadi, Ducatel, Gery, Pawar, Pramod, Sajjad, Ali (2015) Seamless Enablement of Intelligent Protection for Enterprise Cloud Applications through Service Store. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom). . pp. 1021-1026. ISBN 978-1-4799-4092-9. E-ISBN 978-1-4799-4093-6. (doi:10.1109/CloudCom.2014.92) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Daniel, Joshua, El-Moussa, Fadi, Ducatel, Géry, Pawar, Pramod, Sajjad, Ali, Rowlingson, Robert, Dimitrakos, Theo (2015) Integrating Security Services in Cloud Service Stores. In: Trust Management IX. IFIP Advances in Information and Communication Technology. Trust Management IX. IFIP Advances in Information and Communication Technology , 454. pp. 226-239. Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3_19) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Davies, Nigel, Davy, M.J., Blair, Gordon S., Mariani, John A. (1993) Object invocation and management in the zenith distributed multimedia information-system. Information and Software Technology, 35 (5). pp. 259-266. ISSN 0950-5849. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Day, Warren (1992) Farming: towards a rigorous definition and efficient transputer implementation. In: Allen, Alastair, ed. Transputer Systems -- Ongoing Research, Proceedings of WoTUG 15. . pp. 49-62. IOS Press, Netherlands, University of Aberdeen, UK (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Day, Warren and Hill, Steve (1993) Farming: Towards a Rigorous Definition and Efficient Transputer Implementation. Technical report. University of Kent, Computing Laboratory, University of Kent, Canterbury, UK
[img]
Preview
[img]
Preview

De Castro Lima, Antonio Cesar, Descardeci, José Ricardo, Giarola, Attilio José (1992) Circular Microstrip Antenna on a Spherical Surface. Microwave and Optical Technology Letters, 5 (5). pp. 221-224. ISSN 0895-2477. (doi:10.1002/mop.4650050506) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

De Koster, Joeri, Marr, Stefan, D'Hondt, Theo (2012) Synchronization Views for Event-loop Actors. In: Proceedings of the 17th ACM SIGPLAN symposium on Principles and Practice of Parallel Programming. (doi:10.1145/2145816.2145873)
[img]
Preview

De Koster, Joeri, Marr, Stefan, D'Hondt, Theo, Van Cutsem, Tom (2014) Domains: safe sharing among actors. Science of Computer Programming, 98, Pa . pp. 140-158. ISSN 0167-6423. (doi:10.1016/j.scico.2014.02.008)
[img]
Preview

De Koster, Joeri, Marr, Stefan, Van Cutsem, Tom, D'Hondt, Theo (2016) Domains: Sharing State in the Communicating Event-Loop Actor Model. Computer Languages, Systems & Structures, 45 . pp. 132-160. ISSN 1477-8424. (doi:10.1016/j.cl.2016.01.003)
[img]
Preview

de Lemos, Rogério and Gacek, Cristina and Romanovsky, Alexander, eds. (2003) Architecting Dependable Systems. Springer-Verlag, Berlin, Heidelberg (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

De Wael, Mattias, Marr, Stefan, De Fraine, Bruno, Van Cutsem, Tom, De Meuter, Wolfgang (2015) Partitioned Global Address Space Languages. ACM Computing Surveys, 47 (4). 62:1-62:27. ISSN 0360-0300. (doi:10.1145/2716320)
[img]
Preview

De Wael, Mattias, Marr, Stefan, De Meuter, Wolfgang (2014) Data Interface + Algorithms = Efficient Programs: Separating Logic from Representation to Improve Performance. In: Proceedings of the 9th Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems. (doi:10.1145/2633301.2633303)
[img]
Preview

De Wael, Mattias, Marr, Stefan, Van Cutsem, Tom (2014) Fork/Join Parallelism in the Wild: Documenting Patterns and Anti-Patterns in Java Programs using the Fork/Join Framework. In: Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines, Languages, and Tools. (doi:10.1145/2647508.2647511)
[img]
Preview

Chadwick, David W. and de Decker, Bart, eds. (2012) Communications and Multimedia Security: Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security. Springer-Verlag ISBN 3-642-32804-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Delaney, Aidan, Stapleton, Gem, Taylor, John, Thompson, Simon (2013) On the expressiveness of spider diagrams and commutative star-free regular languages. Journal of Visual Languages and Computing, 24 (4). pp. 273-288. ISSN 1045-926X. (doi:10.1016/j.jvlc.2013.02.001)
[img]
Preview

Demiralp, S.V. (1996) Configuring Distributed occam Programs using Doc. In: Arabnia, Hamid R., ed. Proceedings of the PDPTA''96. . pp. 1152-1162. CSREA, Athens, Georgia, Sunnyvale, California, USA (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dent, Alan and Hanna, Keith (1993) Reasoning about array structures using a dependently typed logic. In: Agnew, David and Claesen, Luc J. M. and Camposano, Raul, eds. IFIP transactions a-computer science and technology. North Holland, pp. 207-224. ISBN 0-444-81641-0. (doi:10.1016/B978-0-444-81641-2.50022-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Derrick, John, Boiten, Eerke Albert (1999) Calculating upward and downward simulations of state-based specifications. Information and Software Technology, 41 (13). pp. 917-923. ISSN 0950-5849. (doi:10.1016/S0950-5849(99)00044-0)
[img]
Preview
[img]
Preview

Derrick, John and Boiten, Eerke Albert (1999) Non-atomic refinement in Z. In: Wing, Jeannetter M. and Woodchck, Jim and Davies, Jim, eds. FM’99 — Formal Methods World Congress on Formal Methods in the Development of Computing Systems. Lecture Notes In Computer Science, 2 . Springer-Verlag Berlin, Berlin, Germany, pp. 1477-1496. ISBN 978-3-540-66588-5. E-ISBN 978-3-540-48118-8. (doi:10.1007/3-540-48118-4_28) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Derrick, John and Boiten, Eerke Albert (2003) Recent advances in refinement. In: Borger, Egon and Gargantini, Angelo and Riccobene, Elvinia, eds. Abstract State Machines 2003 Advances in Theory and Practice 10th International Workshop. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 33-56. ISBN 978-3-540-00624-4. E-ISBN 978-3-540-36498-6. (doi:10.1007/3-540-36498-6_3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Derrick, John and Boiten, Eerke Albert (1998) Testing refinements by refining tests. In: Bowen, Jonathan P. and Fett, A. and Hinchey, Michael G., eds. ZUM ’98: The Z Formal Specification Notation 11th International Conference of Z Users. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 265-283. ISBN 978-3-540-65070-6. E-ISBN 978-3-540-49676-2. (doi:10.1007/978-3-540-49676-2_19)
[img]
Preview
[img]
Preview

Derrick, John, Boiten, Eerke Albert, Bowman, Howard, Steen, Maarten (1999) Viewpoints and consistency: translating LOTOS to Object-z. Computer Standards and Interfaces, 21 (3). pp. 251-272. ISSN 0920-5489. (doi:10.1016/S0920-5489(99)00010-0)
[img]
Preview
[img]
Preview

Derrick, John and Walkinshaw, Neil and Arts, Thomas and Benac Earle, Clara and Cesarini, Francesco and Fredlund, Lars-Ake and Gulias, Victor and Hughes, John and Thompson, Simon (2010) Property-Based Testing - The ProTest Project. In: Formal Methods for Components and Objects. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 250-271. ISBN 978-3-642-17070-6. E-ISBN 978-3-642-17071-3. (doi:10.1007/978-3-642-17071-3_13)
[img]
Preview

Devlin, Matthieu, Nurse, Jason R. C., Hodges, Duncan, Goldsmith, Michael, Creese, Sadie (2015) Predicting Graphical Passwords. In: HAS 2015: Human Aspects of Information Security, Privacy, and Trust. 9190 . pp. 23-35. Springer ISBN 978-3-319-20375-1. E-ISBN 978-3-319-20376-8. (doi:10.1007/978-3-319-20376-8_3)
[img]
Preview

Di Ventra, Massimiliano, Pershin, Yuriy V., Chua, Leon O. (2009) Circuit Elements With Memory: Memristors, Memcapacitors, and Meminductors. Proceedings of the IEEE, 97 (10). pp. 1717-1724. ISSN 0018-9219. (doi:10.1109/JPROC.2009.2021077) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dib, Fadi (2018) Improved Neighbourhood Search-Based Methods for Graph Layout. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Dib, Fadi K., Rodgers, Peter (2018) Graph drawing using tabu search coupled with path relinking. PLOS ONE, 13 (5). e0197103. ISSN 1932-6203. (doi:10.1371/journal.pone.0197103)
[img]
Preview

Dilley, Nicolas, Lange, Julien (2019) An Empirical Study of Messaging Passing Concurrency in Go Projects. In: Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering. . IEEE ISBN 978-1-72810-591-8. (doi:10.1109/SANER.2019.8668036)
[img]
Preview

Dimitrakos, Theo and Martrat, Josep and Wesner, Stefan, eds. (2010) Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise: A selection of common capabilities validated in real-life business trials by the BEinGRID consortium. Springer Berlin Heidelberg ISBN 978-3-642-04086-3. E-ISBN 978-3-642-04086-3. (doi:10.1007/978-3-642-04086-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dimitrakos, Theo (2014) Context-Aware Multifactor Authentication Based on Dynamic Pin. In: SEC 2014: ICT Systems Security and Privacy Protection. . pp. 330-338. Springer ISBN 978-3-642-55414-8. E-ISBN 978-3-642-55415-5. (doi:10.1007/978-3-642-55415-5_27) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dimitrakos, Theo (2015) Foreword: Towards Trusted Cloud Ecosystems. In: IFIP Advances in Information and Communication Technology. 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology (IFIPAICT) , 454. pp. 215-216. Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3_17) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dimmich, Damian J., Jacobsen, Christian L., Jadud, Matthew C. (2006) Concurrency: The Next Generation. In: Proceedings of Postgraduate Conference 2006: Computing Laboratory Technical Report. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ding, Zhong-Qiang Q, McLoughlin, Ian Vince, Tan, Eng-Chong C (2003) Extension of proposal of standards for intelligibility tests of Chinese speech: CDRT-tone. IEE Proceedings-Vision, Image and Signal Processing, 150 (1). pp. 1-5. ISSN 1350-245X. (doi:10.1049/ip-vis:20030161) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ding, Zhongqiang Q, McLoughlin, Ian Vince, Tan, E C (2001) How to track pitch pulse in LP residual - Joint Time-Frequency Distribution Approach. In: Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing. 1. pp. 43-46. ISBN 0-7803-7080-5. (doi:10.1109/PACRIM.2001.953518) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ding, Zhongqiang, McLoughlin, Ian Vince, Tan, E C (2001) How to track pitch pulses in LP residual ? - joint time-frequency. 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233), 1 . pp. 43-46. (doi:10.1109/PACRIM.2001.953518) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Douglas, Andrew (1996) A Compiled Functional Language with a Martin-Lof Type System. Doctor of Philosophy (PhD) thesis, Computing Laboratory, University of Kent at Canterbury. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dowle, James, Kuo, Shyh Hao, Mehrotra, Kishore, McLoughlin, Ian Vince (2006) FPGA-based MIMO and Space-Time Processing Platform. In: , EURASIP Journal of Applied Signal Processing special issue on MIMO implementation. (34653). pp. 1-14. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dubois, Julie L. N., Lavignac, Nathalie (2010) Synthesis and physicochemical characterisation of novel poly(amidoamine)s. In: 3rd International Symposium “Cellular delivery of therapeutic Macromolecules 2010”, 26-29/06/2010, Cardiff, UK. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dunn, Stuart, Hedges, Mark, Jordanous, Anna, Storz, Christoph (2012) Comparing the informatics of text and Cultural Heritage: the SAWS project. In: Computer Applications and Quantitative Methods in Archaeology, 2012, Southampton, UK. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Duraisingam, A., Palaniappan, Ramaswamy, Andrews, S. (2017) Cognitive task difficulty analysis using EEG and data mining. In: Proceedings of the 2017 Conference on Emerging Devices and Smart Systems (ICEDSS). . pp. 52-57. IEEE ISBN 978-1-5090-5555-5. (doi:10.1109/ICEDSS.2017.8073658) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dziallas, Sebastian (2018) Characterising Graduateness in Computing Education: A Narrative Approach. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Dziallas, Sebastian, Fincher, Sally (2018) “I told you this last time, right?”: Re-visiting narratives of STEM education. In: ICER'18. 2018 ACM Conference on International Computing Education Research. . pp. 223-231. ACM Digital Library, Espoo, Finland ISBN 978-1-4503-5628-2. (doi:10.1145/3230977.3230989)
[img]
Preview

Dziallas, Sebastian, Fincher, Sally, Johnson, Colin G., Utting, Ian (2017) The Year in Computing Initiative. In: 5th Annual Symposium of the United Kingdom & Ireland Engineering Education Research Network. . Aston University, Birmingham, UK ISBN 978-1-85449-443-6.
[img]
Preview

da Gracca Campos Pimentel, Maria (1992) Showing the destination of hypertext links: a new approach for Guide. Technical report. UKC, University of Kent, Canterbury, UK
[img]
Preview
[img]
Preview

da Silva, Carlos Eduardo, de Lemos, Rogerio (2011) Dynamic plans for integration testing of self-adaptive software systems. In: UNSPECIFIED. (doi:10.1145/1988008.1988029) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

da Silva, Carlos Eduardo, de Lemos, Rogério (2013) Dynamic Management of Integration Testing for Self-Adaptive Systems. In: Workshop on Dependable in Adaptive and Self-Managing Systems (WDAS 2013). . ISBN 978-85-7669-274-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

da Silva, Carlos Eduardo, de Lemos, Rogério (2011) A Framework for Automatic Generation of Processes for Self-Adaptive Software Systems. Informatica, 35 (1). pp. 3-13. ISSN 0350-5596. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

da Silva, Erick Lopes (2004) Qualidade de Serviço em Aplicações de Telemedicina. In: UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

da Silva, Erick Lopes (2006) Um Modelo de Segurança Para o Canal de Interatividade do Sistema Brasileiro de TV Digital: Arquitetura e Implementação. Other masters thesis, Federal University of Pernambuco. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

da Silva, Erick Lopes, Assad, Rodrigo Elia, Ferraz, Carlos A.G., Fried, Mario (2006) Um Modelo de Segurança para o Canal de Interatividade da TV Digital: Arquitetura e Implementação. In: Proceeding of the 8th International Symposium on System and Information Security (SSI 2006). . , São Paulo/SP- Brazil (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

da Silva, P.N., Plastino, Alexandre, Freitas, Alex A. (2018) A Novel Genetic Algorithm for Feature Selection in Hierarchical Feature Spaces. In: Proceedings of the SIAM International Conference on Data Mining (SDM18). . pp. 738-746. E-ISBN 978-1-61197-532-1. (doi:10.1137/1.9781611975321.83) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Carvalho, Paulo Manuel Martins (1996) Interaction of Periodic Bursty Traffic Flows in ATM Networks. Doctor of Philosophy (PhD) thesis, Computing Laboratory, University of Kent at Canterbury. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogerio (2007) Architectural Reconfiguration of Software Systems using Atomic Actions. In: Supplemental Proceedings of the 36th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2006). Fast Abstracts . pp. 174-175. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogerio (2007) Architectural fault tolerance using exception handling. In: Architecting dependable systems IV. Springer-Verlag, Berlin, Heidelberg, pp. 142-162. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogerio (2000) A Co-operative Object-Oriented Architecture for Adaptive Systems. In: Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the. . pp. 120-128. IEEE Computer Society ISBN 0-7695-0604-6. (doi:10.1109/ECBS.2000.839869)
[img]
Preview
[img]
Preview

de Lemos, Rogerio Foreword. In: Mistrík, Ivan and Galster, Matthias and Maxim, Bruce and Bahsoon, Rami, eds. Software Engineering for Variability Intensive Systems: Foundations and Applications. CRC Press. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Lemos, Rogerio (2001) Representing Exceptional Behaviour at the earlier Phases of Software Development. In: Proceedings of the 11th Brazilian Symposium of Fault-Tolerant Computing (SCTF). . pp. 233-236.
[img]
Preview

de Lemos, Rogerio and Garlan, David and Ghezzi, Carlo and Giese, Holger and Andersson, Jesper and Litoiu, Marin and Schmerl, Bradley and Weyns, Danny and Baresi, Luciano and Bencomo, Nelly and Brun, Yuriy and Camara, Javier and Calinescu, Radu and Cohen, Myra B. and Gorla, Alessandra and Grassi, Vincenzo and Grunske, Lars and Inverardi, Paola and Jezequel, Jean-Marc and Malek, Sam and Mirandola, Raffaela and Mori, Marco and Müller, Hausi A. and Rouvoy, Romain and Rubira, Cecília M. F. and Rutten, Eric and Shaw, Mary and Tamburrelli, Giordano and Tamura, Gabriel and Villegas, Norha M. and Vogel, Thomas and Zambonelli, Franco (2018) Software Engineering for Self-Adaptive Systems: Research Challenges in the Provision of Assurances. In: de Lemos, Rogerio and Garlan, D. and Giese, H., eds. Software Engineering for Self-Adaptive Systems III. Assurances. Lecture Notes on Computer Science . Springer. ISBN 978-3-319-74182-6. (doi:10.1007/978-3-319-74183-3_1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogerio and Giese, Holger and Müller, Hausi A. and Shaw, Mary and Andersson, Jesper and Litoiu, Marin and Schmerl, Bradley and Tamura, Gabriel and Villegas, Norha M. and Vogel, Thomas and Weyns, Danny and Baresi, Luciano and Becker, Basil and Bencomo, Nelly and Brun, Yuriy and Cukic, Bojan and Desmarais, Ron and Dustdar, Schahram and Engels, Gregor and Geihs, Kurt and Göschka, Karl M. and Gorla, Alessandra and Grassi, Vincenzo and Inverardi, Paola and Karsai, Gabor and Kramer, Jeff and Lopes, Antónia and Magee, Jeff and Malek, Sam and Mankovskii, Serge and Mirandola, Raffaela and Mylopoulos, John and Nierstrasz, Oscar and Pezzè, Mauro and Prehofer, Christian and Schäfer, Wilhelm and Schlichting, Rick and Smith, Dennis B. and Sousa, João Pedro and Tahvildari, Ladan and Wong, Kenny and Wuttke, Jochen (2013) Software Engineering for Self-Adaptive Systems: A Second Research Roadmap. In: Software Engineering for Self-Adaptive Systems II International Seminar. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 1-32. ISBN 978-3-642-35812-8. E-ISBN 978-3-642-35813-5. (doi:10.1007/978-3-642-35813-5_1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogerio, Grzes, Marek (2019) Self-adaptive Artificial Intelligence. In: 2019 IEEE/ACM 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS). . (In press)
[img]
Preview

de Lemos, Rogerio, Sedgewick, Peter (2018) Self-adaptation made easy with Blockchains. In: Proceedings of 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. . ACM ISBN 978-1-4503-5715-9. (doi:10.1145/3194133.3194150)
[img]
Preview

de Lemos, Rogerio, de Castro Guerra, Paulo Asterio (2005) Software Architectures for Dependable Systems. In: Dependable Computing. Lecture Notes in Computer Science , 3747. pp. 263-264. ISBN 978-3-540-29572-3. (doi:10.1007/11572329_22) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Lemos, Rogério and Gacek, Cristina and Romanovsky, Alexander, eds. (2005) Architecting Dependable Systems III. Lecture Notes in Computer Science . Springer, Berlin, 357 pp. ISBN 978-3-540-28968-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogério (2006) Architectural Reconfiguration using Coordinated Atomic Actions. In: Proceedings of the ICSE 2006 Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2006). . pp. 44-50. ACM, New York ISBN 1-59593-403-0. (doi:10.1145/1137677.1137686) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogério (2016) Foreword. In: Mistrik, Ivan and Ali, Nour and Kazman, Rick and Grundy, John and Schmerl, Bradley, eds. Managing Trade-offs in Adaptable Software Architectures. Morgan Kaufmann, Cambridge, MA, USA, xxix-xxx. ISBN 978-0-12-802855-1. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Lemos, Rogério (2009) On Architecting Software Fault Tolerance using Abstractions. Electronic Notes in Theoretical Computer Science, 236 . pp. 21-32. ISSN 1571-0661. (doi:10.1016/j.entcs.2009.03.012) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogério (2004) Self-* and Predictability: are these conflicting System Capabilities? In: Proceedings of the International Workshop on Self-* Properties in Complex Information Systems (SELF-STAR 2004). . pp. 105-108. ISBN 978-3-540-26009-7.
[img]
Preview

de Lemos, Rogério and Gacek, Cristina and Romanovsky, Alexander, eds. (2004) Architecting Dependable Systems II. Lecture Notes in Computer Science, 3069 . Springer, 363 pp. ISBN 978-3-540-23168-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogério and Gacek, Cristina and Romanovsky, Alexander (2003) Architectural Mismatch Tolerance. In: de Lemos, Rogério and Gacek, Cristina and Romanovsky, Alexander, eds. Architecting Dependable Systems. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 175-196. ISBN 978-3-540-40727-0. E-ISBN 978-3-540-45177-8. (doi:10.1007/3-540-45177-3_8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogério and Potena, Pasqualina (2016) Identifying and Handling Uncertainties in the Feedback Control Loop. In: Mistrik, Ivan and Ali, Nour and Kazman, Rick and Grundy, John and Schmerl, Bradley, eds. Managing Trade-offs in Adaptable Software Architectures. Morgan Kaufmann, Cambridge, MA, USA, pp. 353-367. E-ISBN 978-0-12-802855-1. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Lemos, Rogério, Timmis, Jon, Ayara, Modupe, Forrest, Simon (2007) Immune-inspired adaptable error detection for automated teller machines. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 37 (5). pp. 873-886. ISSN 1094-6977. (doi:10.1109/TSMCC.2007.900662) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Leusse, Pierre, Periorellis, Panos, Dimitrakos, Theo, Nair, Srijith K. (2009) Self Managed Security Cell, a Security Model for the Internet of Things and Services. In: 1st International Conference on Advances in Future Internet, AFIN. Advances in Future Internet, AFIN. . pp. 47-52. IEEE Xplore ISBN 978-0-7695-3664-4. (doi:10.1109/AFIN.2009.15) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Oliveira, Lariza Laura, Freitas, Alex A., Tinós, Renato (2017) Multi-objective genetic algorithms in the study of the genetic code’s adaptability. Information Sciences, 425 . pp. 48-61. ISSN 0020-0255. (doi:10.1016/j.ins.2017.10.022)
[img]
Preview

de Sá, Alex G. C. and Freitas, Alex A. and Pappa, Gisele L. (2018) Automated Selection and Configuration of Multi-Label Classification Algorithms with Grammar-Based Genetic Programming. In: Auger, Anne and Fonseca, Carlos M. and Lourenço, Nuno and Machado, Penousal and Paquete, Luís and Whitley, Darrell, eds. Parallel Problem Solving from Nature – PPSN XV. Lecture Notes in Computer Science . Springer, pp. 308-320. ISBN 978-3-319-99258-7. (doi:10.1007/978-3-319-99259-4_25) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Vries, Patrick, Johnson, Colin G., Blomfield, Ian C. (2010) Modelling fim expression in Escherichia coli K12. In: International Conference on Computational Systems-Biology and Bioinformatics. Communications in Computer and Information Science . pp. 14-25. Springer, Heidelberg ISBN 978-3-642-16749-2. E-ISBN 978-3-642-16750-8. (doi:10.1007/978-3-642-16750-8_2)
[img]
Preview

du Boulay, Benedict, Patel, Mukesh J., Taylor, Chris (1992) Programming Environments for Novices. In: Proc. of NATO Advanced Research Workshop on Cognitive Models and Intelligent Environments. . pp. 105-107. , Genoa, Italy (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

E

Edwards, Marion, Morse, David R. (1995) The burden is description, not identification - Reply. Trends in Ecology and Evolution, 10 (10). pp. 416-417. ISSN 0169-5347. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Edwards, Marion, Morse, David R. (1995) The potential for computer-aided identification in biodiversity research. Trends in Ecology and Evolution, 10 (4). pp. 153-158. ISSN 0169-5347. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Edwards, Michael R. (1997) Developing a model of expertise for a taxonomic expert system. In: Bridge, Paul and Jeffries, Peter and Morse, David R. and Scott, Peter R., eds. Information Technology, Plant Pathology and Biodiversity. Cabi Publishing . pp. 183-196. Cabi Publishing-C a B Int, Wallingford ISBN 0-85199-217-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Eisl, Josef, Marr, Stefan, Würthinger, Thomas, Mössenböck, Hanspeter (2017) Trace Register Allocation Policies: Compile-time vs. Performance Trade-offs. In: Proceedings of the 14th International Conference on Managed Languages and Runtimes. (doi:10.1145/3132190.3132209)
[img]
Preview

Elsehely, Ehab, Sobhy, Mohammed (2000) Real time radar target detection under jamming conditions using wavelet transform on FPGA device. IEEE International Symposium On Circuits and Systems, 4 . pp. 545-548. (doi:10.1109/ISCAS.2000.858809) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Emms, Martin and Arief, Budi and Defty, Troy and Hannon, Joseph and Hao, Feng and van Moorsel, Aad (2012) The Dangers of Verify PIN on Contactless Cards. Technical report. CS-TR-1332
[img]
Preview

Emms, Martin, Arief, Budi, Freitas, Leo, Hannon, Joseph, van Moorsel, Aad (2014) Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN. In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). CCS '14 . pp. 716-726. ACM, New York, NY, USA ISBN 978-1-4503-2957-6. (doi:10.1145/2660267.2660312)
[img]
Preview

Emms, Martin and Arief, Budi and Hannon, Joseph and van Moorsel, Aad (2013) POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards. Technical report. CS-TR-1386
[img]
Preview

Emms, Martin, Arief, Budi, Little, Nicholas, van Moorsel, Aad (2013) Risks of Offline Verify PIN on Contactless Cards. In: Sadeghi, Ahmad-Reza, ed. Lecture Notes in Computer Science. Lecture Notes in Computer Science LNCS , 7859. pp. 313-321. Springer Berlin Heidelberg, Berlin ISBN 978-3-642-39883-4. E-ISBN 978-3-642-39884-1. (doi:10.1007/978-3-642-39884-1_26)
[img]
Preview

Emms, Martin, Arief, Budi, van Moorsel, Aad (2014) Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. In: Preneel, Bart and Ikonomou, Demosthenes, eds. APF 2012: Privacy Technologies and Policy. Lecture Notes in Computer Science . pp. 203-214. Springer Berlin Heidelberg ISBN 978-3-642-54068-4. E-ISBN 978-3-642-54069-1. (doi:10.1007/978-3-642-54069-1_13)
[img]
Preview

Evans, Andy and Kent, Stuart (1999) Core meta-modelling semantics of UML: The pUML approach. In: France, Robert and Rumpe, Bernhard, eds. «UML»’99 — The Unified Modeling Language Beyond the Standard Second International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 140-155. ISBN 978-3-540-66712-4. E-ISBN 978-3-540-46852-3. (doi:10.1007/3-540-46852-8_11) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Evered, Mark, Kölling, Michael, Schmolitzky, Axel (1995) A Flexible Object Invocation Language based on Object-Oriented Language Definition. Computer Journal, 38 (3). pp. 181-191. ISSN 0010-4620.
[img]
Preview

Everett, Richard, Nurse, Jason R. C., Erola, Arnau (2016) The Anatomy of Online Deception: What Makes Automated Text Convincing? In: 31st Annual ACM Symposium on Applied Computing (SAC). (doi:10.1145/2851613.2851813)
[img]
Preview

F

Fabris, Fabio (2018) Meta-Learning for Hierarchical Classification and Applications in Bioinformatics. International Journal of Computer and Information Engineering, 12 (7). ISSN 2010-3921.
[img]
Preview
[img]
Preview

Fabris, Fabio (2017) New Probabilistic Graphical Models and Meta-Learning Approaches for Hierarchical Classification, with Applications in Bioinformatics and Ageing. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview
[img]

Fabris, Fabio, Freitas, Alex A., Tullet, Jennifer M.A. (2015) An Extensive Empirical Comparison of Probabilistic Hierarchical Classifiers in Datasets of Ageing-Related Genes. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 13 (6). pp. 1045-1058. ISSN 1545-5963. E-ISSN 1557-9964. (doi:10.1109/TCBB.2015.2505288)
[img]
Preview

Fabris, Fabio, Freitas, Alex A., de Magalhaes, João Pedro (2017) A Review of Supervised Machine Learning Applied to Ageing Research. Biogerontology, 18 (2). pp. 171-188. ISSN 1389-5729. E-ISSN 1573-6768. (doi:10.1007/s10522-017-9683-y)
[img]
Preview
[img]
Preview

Fabris, Fabio, Palmer, Daniel, de Magalhaes, João Pedro, Freitas, Alex A. (2019) Comparing enrichment analysis and machine learning for identifying gene properties that discriminate between gene classes. Briefings in Bioinformatics, . ISSN 1477-4054. (doi:10.1093/bib/bbz028) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fachin, M.P.G. (1994) The Divide-and-Conquer Method for the Solution of the Symmetric Tridiagonal Eigenproblem and Transputer Implementations. Doctor of Philosophy (PhD) thesis, Computing Laboratory, University of Kent at Canterbury. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Faddegon, Maarten (2017) Algorithmic debugging for complex lazy functional programs. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Fan, Wenjun (2019) Enabling Privacy-preserving Sharing of Cyber Threat Information in the Cloud. In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing. . (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Fan, Wenjun (2019) HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design. IEEE Journal on Selected Areas in Communications, 37 (3). 683 -697. ISSN 0733-8716. (doi:10.1109/JSAC.2019.2894307)
[img]
Preview

Fan, Wenjun, Du, Zhihui, Fernandez, David, Villagra, Victor A. (2018) Enabling an Anatomic View to Investigate Honeypot Systems: A Survey. IEEE Systems Journal, 12 (4). pp. 3906-3919. ISSN 1932-8184. (doi:10.1109/JSYST.2017.2762161)
[img]
Preview
[img]
Preview

Fatema, Kaniz (2013) Adding Privacy Protection to Policy Based Authorisation Systems. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Fatema, Kaniz, Chadwick, David (2014) Resolving Policy Conflicts-Integrating Policies from Multiple Authors. In: UNSPECIFIED.
[img]
Preview

Fatema, Kaniz and Chadwick, David W. and Lievens, Stijin F. (2011) A Multi-privacy Policy Enforcement System. In: Fischer-Hubner, Simone and Duquenoy, Penny and Hansen, Marit and Leenes, Ronald and Zhang, Ge, eds. Privacy and Identity Management for Life. IFIP Advances in Information and Communication Technology, 352 (2011). Springer, Boston, pp. 297-310. ISBN 978-3-642-20768-6. (doi:10.1007/978-3-642-20769-3_24)
[img]
Preview

Fernandes, G.P.A. (1998) Distributed Platform Support for Service Management. Doctor of Philosophy (PhD) thesis, University of Kent at Canterbury. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fernandes, G.P.A. (1993) T'ecnicas de Compilacc~ao para Sistemas Distribu'idos}. Other masters thesis, Escola de Engenharia, Universidade do Minho. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fernandes, G.P.A., Derrick, John (1997) Formal Specification and Testing of a Management Architecture. In: Lazar, Aurel and Saracco, Roberto and Stadler, Rolf, eds. Integrated Network Management V - Integrated management in a virtual world. 5th IFIP/IEEE International Symposium on Integrated Network Management . pp. 473-484. Chapman & Hall, 2-6 Boundary Row, London, England Se1 8hn, San Diego, California, USA ISBN 0-412-80960-5.
[img]
Preview
[img]
Preview

Fernandes, G.P.A., Derrick, John (1996) Formal Specification of Distributed Services Management. In: Spaniol, Otto and Linnhoff-Popien, Claudia and Meyer, Bernd, eds. Trends in Distributed Systems' 96. . pp. 96-103. Verlag der Augustinus Buchhandlung, Aachen, Germany ISBN 3-86073-473-3.
[img]
Preview
[img]
Preview

Fernandes, G.P.A. and Hungate, J. (1995) Comparison of POSIX Open System Environment (OSE) and Open Distributed Processing (ODP) Reference Models. Technical report. Computer Systems Laboratory,U.S.A, Distributed Systems Engineering, Computer Systems Laboratory, Technology Administration, U.S. Department of Commerce, Gaithersburg, MD 20899, U.S.A. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ferrer, Ana Juan, Hernandez, Francisco, Tordsson, Johan, Elmroth, Erik, Ali-Eldin, Ahmed, Zsing, Csilla, Sivert, Raul, Guitart, Jordi, Badia, Rosa M., Djemame, Karim, and others. (2012) OPTIMIS: A holistic approach to cloud service provisioning. Future Generation Computer Systems, 28 (1). pp. 66-77. ISSN 0167-739X. (doi:10.1016/j.future.2011.05.022) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fincher, Sally (2013) The Diarists' Audience. In: Stanley, Liz, ed. Documents of Life Revisited: Narrative and Biographical Methodology for a 21st Century Critical Humanism. Ashgate, pp. 77-92. ISBN 978-1-4094-4289-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fincher, Sally (2012) Using Narrative Methodology. University of Kent at Canterbury, Canterbury, 52 pp. ISBN 978-1-902671-78-9.
[img]
Preview

Fincher, Sally, Knox, Daniel (2013) The Porous Classroom: Professional Practices in the Computing Curriculum. IEEE Computer, 46 (9). pp. 44-51. ISSN 0018-9162. (doi:10.1109/MC.2013.261) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Flur, Shaked, Sarkar, Susmit, Pulte, Christopher, Nienhuis, Kyndylan, Maranget, Luc, Gray, Kathryn E., Sezgin, Ali, Batty, Mark, Sewell, Peter (2017) Mixed-Size Concurrency: ARM, POWER, C/C++11, and SC. In: ACM SIGPLAN Notices - POPL '17. POPL 2017 Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. 52 (1). ACM ISBN 978-1-4503-4660-3. (doi:10.1145/3009837.3009839)
[img]
Preview

NCR Corporation (Dayton, OH) (2009) A Method of Determining the Cause of an Error State in an Apparatus. US Patent 7,600,671. (doi:US Patent 7,600,671) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Freitas, Alex A. (2014) Contrasting meta-learning and hyper-heuristic research: the role of evolutionary algorithms. Genetic Programming and Evolvable Machines, 15 (1). pp. 3-35. ISSN 1389-2576. E-ISSN 1573-7632. (doi:10.1007/s10710-013-9186-9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Freitas, Alex A. (2019) Investigating the Role of Simpson’s Paradox in the Analysis of Top-Ranked Features in High-Dimensional Bioinformatics Datasets. Briefings in Bioinformatics, . E-ISSN 1477-4054. (doi:10.1093/bib/bby126) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Freitas, Alex A., Pinto Junior, Jony A., Plastino, Alexandre, Neumann, Nadine M. (2018) Is P-value<0.05 Enough? Two Case Studies in Classifiers Evaluation. In: Annals of the National Meeting of Artificial and Computational Intelligence (ENIAC). . pp. 94-103. (doi:10.5753/eniac.2018.4407)
[img]
Preview

Férée, Hugo, Gomaa, Walid, Hoyrup, Mathieu (2014) Analytical properties of resource-bounded real functionals. Journal of Complexity, 30 (5). pp. 647-671. ISSN 0885-064X. E-ISSN 1090-2708. (doi:10.1016/j.jco.2014.02.008)
[img]
Preview

Férée, Hugo, Hym, Samuel, Mayero, Micaela, Moyen, Jean-Yves, Nowak, David (2018) Formal Proof of Polynomial-Time Complexity with Quasi-Interpretations. In: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs. . ACM ISBN 978-1-4503-5586-5. (doi:10.1145/3167097) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

G

Gacek, Cristina, Arief, Budi (2004) The Many Meanings of Open Source. IEEE Software, 21 (1). pp. 34-40. ISSN 0740-7459. (doi:10.1109/MS.2004.1259206) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Gacek, Cristina, Lawrie, Tony, Arief, Budi (2002) Interdisciplinary Insights on Open Source. In: Proceedings of the Open Source Software Development Workshop, 25th - 26th February, 2002, Newcastle upon Tyne, U.K..
[img]
Preview

Gao, Qiang, Blow, Keith J., Holding, David J., Marshall, Ian W. (2003) Determining Design Parameters for Ad-hoc Wireless Sensor Networks. In: ETFA 2003: IEEE Cpnference on Emerging Technologies and Factory Automation, VOL 1, Proceedings. 1. pp. 545-550. IEEE, Lisbon ISBN 0-7803-7937-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Garner, Tom, Jordanous, Anna (2016) Emergent Perception and Video Games that Listen: Applying Sonic Virtuality for Creative and Intelligent NPC Behaviours. In: 2nd Computational Creativity and Games Workshop. .
[img]
Preview

Gaspar, Jaime and Boiten, Eerke Albert (2014) Simple composition theorems of one-way functions -- proofs and presentations. Technical report. IACR EPrints (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Genaim, Samir, King, Andy (2008) Inferring non-suspension conditions for logic programs with dynamic scheduling. ACM Transactions on Computational Logic, 9 (3). pp. 182-196. ISSN 1529-3785. (doi:10.1145/1352582.1352585)
[img]
Preview

Gerig, Guido and Welti, Daniel and Guttmann, Charles and Colchester, Alan C. F. and Szekely, Gabor (1998) Exploring the discrimination power of the time domain for segmentation and characterization of lesions in serial MR data. In: Wells, William M. and Colchester, Alan C. F. and Delp, Scott, eds. Medical Image Computing and Computer-Assisted Intervention — MICCAI’98 First International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 469-480. ISBN 978-3-540-65136-9. E-ISBN 978-3-540-49563-5. (doi:10.1007/BFb0056232) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ghafouri-Shiraz, H, McLoughlin, Ian Vince (1991) High accuracy displacement measurements for integrated optical components. In: Trans. IEICE, National Convention Record. . p. 1. IEICE (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ghafouri-Shiraz, H, McLoughlin, Ian Vince (1991) The implementation of a high accuracy optical measurement technique of particular interest to miniature optics. Microwave and Optical Technology Letters, 4 (12). pp. 524-527. (doi:10.1002/mop.4650041204) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ghosh, Siddhartha, Ryan, Nick S. (2005) Ubiquitous Data Capture for Cultural Heritage Research. In: Ryan, Nick S. and Cinotti, Tullio Salmon and Raffa, Guiseppe, eds. Smart Environments and their Applications to Cultural Heritage. EPOCH Publication . pp. 19-22. Archaeolingua, Budapest, Hungary, Tokyo, Japan
[img]
Preview

Gibson, R. M., Chennu, S., Fernandez-Espejo, D., Naci, L., Owen, A. M., Cruse, D. (2016) Somatosensory attention identifies both overt and covert awareness in disorders of consciousness. Annals of Neurology, 80 (3). pp. 412-423. ISSN 0364-5134. E-ISSN 1531-8249. (doi:10.1002/ana.24726)
[img]
Preview

Gibson, Raechelle M., Chennu, Srivas, Owen, Adrian M., Cruse, Damian (2014) Complexity and familiarity enhance single-trial detectability of imagined movements with electroencephalography. Clinical Neurophysiology, 125 (8). pp. 1556-1567. ISSN 1388-2457. E-ISSN 1872-8952. (doi:10.1016/j.clinph.2013.11.034) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Giubilo, Fabio, Sajjad, Ali, Shackleton, Mark, Chadwick, David W., Fan, Wenjun, de Lemos, Rogério (2018) An Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services. In: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). . IEEE ISBN 978-1-5386-0598-1. E-ISBN 978-1-908320-93-3. (doi:10.23919/ICITST.2017.8356404)
[img]
Preview

Goel, Ashok, Jordanous, Anna, Pease, Alison (2017) Preface: Proceedings of the Eighth International Conference on Computational Creativity, ICCC 2017, Atlanta — 19 - 23 June. In: Goel, Ashok and Jordanous, Anna and Pease, Alison, eds. 8th International Conference on Computational Creativity. . ACC ISBN 978-0-692-89564-1.
[img]
Preview

Gomez, Rodolfo and Augusto, Juan Carlos and Galton, Antony (2000) Implementation and Testing of a Set of Event Detection Operators. Technical report. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gomez, Rodolfo, Augusto, Juan Carlos, Galton, Antony (2001) Testing an Event Specification Language. In: Proceedings of the 13th. International Conference on Software Engineering and Knowledge Engineering (SEKE'01). . pp. 341-345. , Buenos Aires, Argentina (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Goncalves, E.C., Freitas, Alex A., Plastino, Alexandre (2018) A survey of genetic algorithms for multi-label classification. In: Proceedings of the 2018 IEEE Congress on Evolutionary Computation (CEC 2018). Proceedings of the 2018 IEEE Congress on Evolutionary Computation (CEC 2018). . pp. 981-988. IEEE, New York, NY, USA ISBN 978-1-5090-6017-7. (doi:10.1109/CEC.2018.8477927)
[img]
Preview

Gonzalez Boix, Elisa, Marr, Stefan (2018) Introduction to the Meta’16 Workshop Special Issue. Journal of Object Technology, 17 (1). pp. 1-2. ISSN 1660-1769. (doi:10.5381/jot.2018.17.1.e1)
[img]
Preview

Gonzalez-Gadea, Maria Luz, Chennu, Srivas, Bekinschtein, Tristan A., Rattazzi, Alexia, Beraudi, Ana, Tripicchio, Paula, Moyano, Beatriz, Soffita, Yamila, Steinberg, Laura, Adolfi, Federico, and others. (2015) Predictive coding in autism spectrum disorder and attention deficit hyperactivity disorder. Journal of Neurophysiology, 114 (5). pp. 2625-2636. ISSN 0022-3077. E-ISSN 1522-1598. (doi:10.1152/jn.00543.2015) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gonzalez-Velazquez, Antonio, Sacks, Lionel, Marshall, Ian W. (2002) Ad-hoc Sensor Network Experimentation using the RCX by Mindstorms. In: Proceedings of IFIPWG6.7 Workshop. .
[img]
Preview

Gonzalez-Velazquez, Antonio, Sacks, Lionel, Marshall, Ian W. (2002) Simple Spontaneous Mechanism for Flexible Data Communication in Wireless Ad-hoc Sensor Networks. In: Proceedings of LCS. .
[img]
Preview

González Fernández, Edgar, Sandoval Orozco, Ana, García Villalba, Luis, Hernandez-Castro, Julio C. (2018) Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts. Sensors (Basel, Switzerland), 18 (9). ISSN 1424-8220. (doi:10.3390/s18092804)
[img]
Preview

Gootjes-Dreesbach, Ellis Luise (2015) Awareness & Perception in Rapid Serial Visual Presentation. Doctor of Philosophy (PhD) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Gounaropoulos, Alex, Johnson, Colin Graeme (2007) A Neural Network Approach for Synthesising Timbres from Adjectives. In: Proceedings of the 4th Sound and Music Computing Conference (SMC07). . National and Kapodistrian University of Athens, Athens, Greece ISBN 978-960-6608-75-9.
[img]
Preview

Gouvas, Panagiotis, Kalaboukas, Konstantinos, Ledakis, Giannis, Dimitrakos, Theo, Daniel, Joshua, Ducatel, Gery, Rodriguez Dominguez, Nuria (2015) A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project. In: IFIP Advances in Information and Communication Technology. Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015. IFIP Advances in Information and Communication Technology (IFIPAICT) , 454 (454). pp. 217-225. Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3_18) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Grant, J., So, J., de Lemos, Rogério (2007) Intrusion Tolerance in Ad Hoc Networks through Swarms of Fragments Replicas. In: Supplemental Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2007). . pp. 386-387. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Greathead, David, Coventry, Lynne, Arief, Budi, van Moorsel, Aad (2012) Deriving Requirements for an Online Community Interaction Scheme: Indications from Older Adults. In: ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2012) Extended Abstracts on Human Factors in Computing Systems. . pp. 1541-1546. , Austin, Texas, USA ISBN 978-1-4503-1016-1. (doi:10.1145/2212776.2223669)
[img]
Preview

Greenhow, Keith, Johnson, Colin G. (2014) Region Based Image Preprocessor for Feed-Forward Perceptron Based Systems. In: Zeng, Zhigang and Li, Yangmin and King, Irwin, eds. Advances in Neural Networks – ISNN 2014. Advances in Neural Networks – ISNN 2014, 11th International Symposium on Neural Networks. Lecture Notes in Computer Science . pp. 414-422. Springer ISBN 978-3-319-12435-3. E-ISBN 978-3-319-12436-0. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Greenhow, Keith, Johnson, Colin G. (2015) Regioned Downsample for ANN Image Classification: Alternate Selection Methods. In: 2015 SAI Intelligent Systems Conference (IntelliSys). . pp. 793-797. IEEE, Red Hood, NY, USA ISBN 978-1-4673-7607-5. (doi:10.1109/IntelliSys.2015.7361231)
[img]
Preview

Grimmer, Matthias, Marr, Stefan, Kahlhofer, Mario, Wimmer, Christian, Würthinger, Thomas, Mössenböck, Hanspeter (2017) Applying Optimizations for Dynamically-typed Languages to Java. In: Proceedings of the 14th International Conference on Managed Languages and Runtimes. ManLang'17 . pp. 12-22. ACM ISBN 978-1-4503-5340-3. (doi:10.1145/3132190.3132202)
[img]
Preview

Grosso, Sergio, Tully, Alan, Arief, Budi, Marques, Antonio, Matoses, Manuel Serrano (2006) Collaborations among in-vehicle and infrastructure-based sensing technology for automotive applications: The EMMA and TRACKSS EU Projects. In: IET Seminar on RFID and Electronic Vehicle Identification in Road Transport. 2006 (11613). pp. 57-65. , Newcastle ISBN 978-0-86341-734-4. (doi:10.1049/ic:20060135)
[img]
Preview

Grzes, Marek (2017) Reward Shaping in Episodic Reinforcement Learning. In: Proc. of the 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2017). . pp. 565-573. ACM
[img]
Preview

Grzes, Marek, Hoey, Jesse (2013) On the Convergence of Techniques that Improve Value Iteration. In: Neural Networks (IJCNN), The 2013 International Joint Conference. Proceedings of International Joint Conference on Neural Networks (IJCNN). . pp. 1-8. ISBN 978-1-4673-6128-6. (doi:10.1109/IJCNN.2013.6706982)
[img]
Preview

Grzes, Marek, Poupart, Pascal (2014) POMDP Planning and Execution in an Augmented Space. In: Alessio Lomuscio, Paul Scerri, Ana Bazzan, and Michael Huhns (eds.), Proceedings of the 13th International Con- ference on Autonomous Agents and Multiagent Systems (AAMAS 2014). Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS). . pp. 757-764. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Grzes, Marek, Poupart, Pascal, Hoey, Jesse (2013) Controller Compilation and Compression for Resource Constrained Applications. In: Perny, Patrice and Pirlot, Marc and Tsoukias, Alexis, eds. Third International Conference, ADT 2013, Bruxelles, Belgium, November 12-14, 2013, Proceedings. Proceedings of International Conference on Algorithmic Decision Theory (ADT). Lecture Notes in Computer Science . pp. 193-207. Springer ISBN 978-3-642-41574-6. E-ISBN 978-3-642-41575-3. (doi:10.1007/978-3-642-41575-3_15) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Grzes, Marek, Poupart, Pascal, Hoey, Jesse (2013) Isomorph-Free Branch and Bound Search for Finite State Controllers. In: Proceedings of International Joint Conference on Artificial Intelligence (IJCAI). .
[img]
Preview

Grzes, Marek, Poupart, Pascal, Yang, Xiao, Hoey, Jesse (2014) Energy Efficient Execution of POMDP Policies. IEEE Transactions on Cybernetics, PP (99). ISSN 2168-2267. (doi:10.1109/TCYB.2014.2375817)
[img]
Preview

Guest, Richard and Fairhurst, Michael and Potter, Jonathan (2000) Automated extraction of image segments from clinically diagnostic hand-drawn geometric shapes. In: Vajda, F., ed. Proceedings of the 26th Euromicro Conference. IEEE, A440-A446. ISBN 0-7695-0780-8. (doi:10.1109/EURMIC.2000.874527) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Guitierrez, Carlos Ramierez (1998) A Theory of Episodic Memory for Case-based Reasoning and its Implementation. Doctor of Philosophy (PhD) thesis, University of Kent at Canterbury. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Guo, Hui, Kafali, Ozgur, Jeukeng, Anne-Liz, Williams, Laurie, Singh, Munindar P. (2018) Poster: Extraction of Security Requirements from Textual Artifacts. In: Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS). (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Guo, Hui, Kafali, Ozgur, Singh, Munindar (2018) Extraction of Natural Language Requirements from Breach Reports Using Event Inference. In: 2018 5th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE). . pp. 22-28. IEEE ISBN 978-1-5386-8404-7. (doi:10.1109/AIRE.2018.00009) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Gupta, C.N., Palaniappan, Ramaswamy (2009) Denoising cyclostationary framework for enhanced electrocardiogram analysis. In: 2007 Computers in Cardiology. . pp. 93-96. ISBN 978-1-4244-2533-4. (doi:10.1109/CIC.2007.4745429) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, C.N., Palaniappan, Ramaswamy, Rajan, S., Swaminathan, S., Krishnan, S.M. (2005) Segmentation and classification of heart sounds. In: Proceedings of the Canadian Conference on Electrical and Computer Engineering 2005. 2005. pp. 1678-1681. IEEE ISBN 0-7803-8885-2. (doi:10.1109/CCECE.2005.1557305) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, C.N., Palaniappan, Ramaswamy, Swaminathan, S. (2005) Classification of homomorphic segmented phonocardiogram signals using grow and learn network. In: 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference. . pp. 4251-4254. IEEE ISBN 978-0-7803-8740-9. (doi:10.1109/IEMBS.2005.1615403) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, C.N., Palaniappan, Ramaswamy, Swaminathan, S., Krishnan, S.M. (2007) Neural network classification of homomorphic segmented heart sounds. Applied Soft Computing, 7 (1). pp. 286-297. ISSN 1568-4946. (doi:10.1016/j.asoc.2005.06.006) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, Cota Navin, Khan, Yusuf U, Palaniappan, Ramaswamy, Sepulveda, Francisco (2009) Wavelet framework for improved target detection in oddball paradigms using P300 and gamma band analysis. International Journal of Biomedical Soft-computing and Human Sciences, 14 (2). pp. 61-67. ISSN 2185-2421. (doi:10.24466/ijbschs.14.2_63) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, Cota Navin and Palaniappan, Ramaswamy (2009) Biometric paradigm using visual evoked potential. In: Encyclopedia of Information Science and Technology. IGI Global, pp. 362-368. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, Cota Navin, Palaniappan, Ramaswamy (2012) Using High-Frequency Electroencephalogram in Visual and Auditory-Based Brain-Computer Interface Designs. EContact!, 14 (2). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, Cota Navin, Palaniappan, Ramaswamy, Paramesran, Raveendran (2012) Exploiting the P300 paradigm for cognitive biometrics. International Journal of Cognitive Biometrics, 1 (1). pp. 26-38. ISSN 2042-6461. (doi:10.1504/IJCB.2012.046513) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

H

Haas, S. and Thornley, D.A. and Zhu, M. and Dobinson, R.W. and Heeley, R. and Madsen, N.A.H. and Martin, B. (1997) The Macrame 1024 node switching network. In: Hertzberger, Bob and Sloot, Peter M. A., eds. High-Performance Computing and Networking International Conference and Exhibition. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 870-877. ISBN 978-3-540-62898-9. E-ISBN 978-3-540-69041-2. (doi:10.1007/BFb0031658)
[img]
Preview
[img]
Preview

Haas, S., Thornley, D.A., Zhu, M., Dobinson, R.W., Heeley, R., Madsen, N.A.H., Martin, B. (1998) Results from the Macrame 1024 node switching network. In: Computer Physics Communications. 110. pp. 206-210. Elsevier (doi:10.1016/S0010-4655(97)00178-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Haas, S., Thornley, D.A., Zhu, M., Dobinson, R.W., Martin, B. (1998) The Macrame 1024 node switching network. Microprocessors and Microsystems, 21 (7-8). pp. 511-518. ISSN 0141-9331. (doi:10.1016/S0141-9331(98)00044-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hajdusek, Michal, Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2015) Device-independent verifiable blind quantum computation. arXiv preprint arXiv:1502.02563, . (Unpublished)
[img]
Preview

Hanna, Keith (2000) Reasoning about analog-level implementations of digital systems. Formal Methods in System Design, 16 (2). pp. 127-158. ISSN 0925-9856. (doi:10.1023/A:1008791128550) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith (1998) Reasoning about imperfect digital systems. In: Moller, Bernhard Moller and Tucker, John V, eds. Prospects for Hardware Foundations ESPRIT Working Group 8533 NADA. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 333-355. ISBN 978-3-540-65461-2. E-ISBN 978-3-540-49254-2. (doi:10.1007/3-540-49254-2_10) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith, Daeche, Neil (1987) An Algebraic Approach to Computational Logic. In: Dybjer, Peter and Nordstrom, B., eds. Proc Workshop on Programming Logic. . pp. 300-326. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith, Daeche, Neil (1986) Specification and Verification of Digital Systems using Higher-Order Logic. Proc. IEE, Part E, . pp. 242-254. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith, Daeche, Neil (1992) The Veritas Design Logic - a Users View. IFIP Transactions A-Computer Science And Technology, 10 . pp. 301-310. ISSN 0926-5473. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith, Daeche, Neil (1992) The Veritas Design Logic - a Users View. In: Stavridou, V. and Melham, Thomas F. and Boute, R.T., eds. IFIP Transactions A-Computer Science And Technology. 10. pp. 301-310. Elsevier Science Publ B V ISBN 0-444-89686-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith and Daeche, Neil and Howells, Gareth (1992) Implementation of the Veritas Design Logic. In: International Conference On Theorem Provers in Circuit Design : Theory, Practice And Experience. IFIP Transactions A-Computer Science and Technology, 10 . Elsevier Science, Nijmegen, Netherlands, pp. 77-94. ISBN 0-444-89686-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith, Daeche, Neil, Longley, Mark (1990) Specification and Verification using Dependent Types. IEEE Transactions Software Engineering, SE-16 (9). pp. 949-964. (doi:10.1109/32.58783) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanson, Richard J., Hopkins, Tim (2018) Remark on Algorithm 539: A Modern Fortran Reference Implementation for Carefully Computing the Euclidean Norm. ACM Transactions on Mathematical Software, 44 (3). pp. 1-23. ISSN 0098-3500. E-ISSN 1557-7295. (doi:10.1145/3134441)
[img]
Preview

Happa, Jassim, Fairclough, Graham, Nurse, Jason R. C., Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2016) A Pragmatic System-failure Assessment and Response Model. In: 2nd International Conference on Information Systems Security and Privacy. .
[img]
Preview

Happa, Jassim, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie, Williams, Rebecca (2018) An Ethics Framework for Research into Heterogeneous Systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. . IET ISBN 978-1-78561-843-7. (doi:10.1049/cp.2018.0026)
[img]
Preview

Harrison, Joseph (2018) Automatic detection of core Erlang message passing errors. In: Proceedings of the 17th ACM SIGPLAN International Workshop on Erlang - Erlang 2018. Erlang 2018 Proceedings of the 17th ACM SIGPLAN International Workshop on Erlang. . pp. 37-48. ACM Press ISBN 978-1-4503-5824-8. (doi:10.1145/3239332.3242765) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hatton, Leslie (1999) Repetitive failure, feedback and the lost art of diagnosis. Journal of Systems and Software, 47 (2-3). pp. 183-188. ISSN 0164-1212. (doi:10.1016/S0164-1212(99)00038-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

He, Pei, Johnson, Colin G., Wang, HouFeng (2011) Modeling grammatical evolution by automaton. Science China Information Sciences, 54 (12). pp. 2544-2553. ISSN 1674-733X. E-ISSN 1869-1919. (doi:10.1007/s11432-011-4411-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hedges, Mark, Jordanous, Anna, Dunn, Stuart, Roueché, Charlotte, Kuster, Marc W, Selig, Thomas, Bittorf, Michael, Artes, Waldemar (2012) New models for collaborative textual scholarship. In: 6th IEEE International Conference on Digital Ecosystems Technologies (DEST 2012), 2012, Campione d'Italia, Switzerland.
[img]
Preview

Helal, Ayah, Otero, Fernando E.B. (2017) Automatic design of ant-miner mixed attributes for classification rule discovery. In: GECCO '17: Proceedings of the Genetic and Evolutionary Computation Conference. . pp. 433-440. ACM ISBN 978-1-4503-4920-8. (doi:10.1145/3071178.3071306)
[img]
Preview

Hellyer, Laurence, Beadle, Lawrence (2009) Detecting Plagarism in Microsoft Excel Assignments. In: White, Hazel, ed. 10th Annual Conference of the Subject Centre for Information and Computer Sciences. . pp. 130-134. HE Academy ISBN 978-0-9559676-6-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hellyer, Laurence and Ritson, Carl G. and Simpson, Jonathan (2010) Proceedings of the 2010 School of Computing Postgraduate Conference. Technical report. , University of Kent, Canterbury, Kent CT2 7NF, UK (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Henderson, Philip J. and Webb, David J. and Jackson, David A. and Zhang, Leishi and Bennion, Ian (1999) Highly-multiplexed grating-sensors for temperature-referenced quasi-static measurements of strain in concrete bridges. In: Kim, Byung-Yong and Hotate, K., eds. 13th International Conference on Optical Fiber Sensors. Proceedings of SPIE . SPIE, pp. 320-323. ISBN 0-8194-3228-8. (doi:10.1117/12.2302033) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2014) Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014 (2). pp. 5-8. ISSN 1361-3723. (doi:10.1016/S1361-3723(14)70461-0)
[img]
Preview

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2013) First Kent Cyber Security Survey. . Internet only.
[img]
Preview

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2015) UK has little to be proud of as survey reveals sorry state of European cybersecurity. . The Conversation Internet only.
[img]

Hernandez-Castro, Julio C., Boiten, Eerke Albert, Barnoux, Magali F.L. (2014) Second Kent Cyber Security Survey. . Internet only.
[img]
Preview

Hersch, Roger, Andre, Jacques, Brown, Heather (1998) Electronic Publishing, Artistic Imaging, and Digital Typography. Lecture Notes in Computer Science . Springer-Verlag, 574 pp. ISBN 3-540-64298-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hertel, Lars, Phan, Huy, Mertins, Alfred (2016) Comparing Time and Frequency Domain for Audio Event Recognition Using Deep Learning. In: IEEE International Joint Conference on Neural Networks (IJCNN 2016). . pp. 3407-3411. IEEE, Vancouver, BC, Canada ISBN 978-1-5090-0619-9. (doi:10.1109/IJCNN.2016.7727635)
[img]
Preview

Hesketh, Richard (1991) Perly - unix with buttons. Software: Practice and Experience, 21 (11). pp. 1165-1187. ISSN 0038-0644. (doi:10.1002/spe.4380211103) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hierons, R., Derrick, John (2000) Editorial: Special issue on specification-based testing. Software Testing Verification & Reliability, 10 (4). pp. 201-202. ISSN 0960-0833. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hobbs, M.H.W. (1995) Analysis of a retail branch network: a problem of catchment areas. In: Fisher, Peter, ed. Inovations in GIS 2. Taylor &amp; Francis, pp. 151-161. ISBN 0-7484-0269-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hobbs, M.H.W. (2000) Email groups for learning and assessment. In: Joyce, Donald, ed. SIGCSE Bulletin. 32 (3). p. 183. ACM ISBN 1-58113-207-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hobbs, M.H.W. (1996) Spatial clustering using a genetic algorithm. In: Parker, David, ed. Innovatins in GIS 3. Taylor &amp; Francis, pp. 85-95. ISBN 0-7484-0459-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hocko, Michal, Kalibera, Tomas (2010) Reducing performance non-determinism via cache-aware page allocation strategies. In: Proceedings of the first joint WOSP/SIPEW International Conference on Performance Engineering. . pp. 182-196. ACM ISBN 978-1-60558-563-5. (doi:10.1145/1712605.1712640) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hodges, D., Nurse, Jason R. C., Goldsmith, M., Creese, S. (2012) Identity attribution across CyberSpace and the Natural Space. In: The International Crime and Intelligence Analysis Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Holden, Nicholas and Freitas, Alex A. (2008) Improving the performance of hierarchical classification with swarm intelligence. In: Marchiori, Elena and Moore, Jason H., eds. Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics 6th European Conference. Lecture Notes in Computer Science, 4973 . Springer, Berlin, Germany, pp. 48-60. ISBN 978-3-540-78756-3. E-ISBN 978-3-540-78757-0. (doi:10.1007/978-3-540-78757-0_5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hope, Thomas M.H., Friston, Karl J., Price, Cathy J., Leff, Alex P., Rotshtein, Pia, Bowman, Howard (2019) Recovery After Stroke: Not So Proportional After All? Brain, 142 (1). pp. 15-22. ISSN 0006-8950. E-ISSN 1460-2156. (doi:10.1093/brain/awy302) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hopkins, Jack, Kafali, Ozgur, Alrayes, Bedour, Stathis, Kostas (2018) Pirasa: strategic protocol selection for e-commerce agents. Electronic Markets, . ISSN 1019-6781. E-ISSN 1422-8890. (doi:10.1007/s12525-018-0307-4)
[img]
Preview
[img]
Preview

Hopkins, Jack, Kafali, Ozgur, Stathis, Kostas (2015) Open Game Tournaments in STARLITE: Demonstration. In: AAMAS '15 Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. . pp. 1927-1928. ACM ISBN 978-1-4503-3413-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hopkins, Tim (1998) Certification of Algorithm 734: A Fortran 90 code for unconstrained nonlinear minimization. Acm Transactions on Mathematical Software, 24 (3). pp. 351-354. ISSN 0098-3500. (doi:10.1145/292395.292460) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hopkins, Tim (1997) Is the quality of numerical subroutine code improving? In: International Workshop on Modern Software Tools for Scientific Computing, Sep 16-18, 1996, Oslo, Norway.
[img]
Preview
[img]
Preview

Hopkins, Tim (1996) Restructuring software: A case study. Software: Practice and Experience, 26 (8). pp. 967-982. ISSN 0038-0644. (doi:10.1002/(SICI)1097-024X(199608)26:8<967::AID-SPE41>3.0.CO;2-G)
[img]
Preview
[img]
Preview

Hopkins, Tim, K?l?ç, Emrah (2018) An analytical approach: Explicit inverses of periodic tridiagonal matrices. Journal of Computational and Applied Mathematics, 335 . pp. 207-226. ISSN 0377-0427. (doi:10.1016/j.cam.2017.11.038)
[img]
Preview

Hopkins, Tim, Morse, David R. (1997) The implementation and visualisation of a large spatial individual-based model. In: IFIP TC5 WG5.11 International Symposium on Environmental Software Systems (ISESS 97), Apr 28-May 02, 1997, Dalta Whistler, Canada. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hopkins, Tim, Welch, Peter H. (1996) Transputer data-flow solution for systems of linear equations. Concurrency-Practice and Experience, 8 (8). pp. 569-580. ISSN 1040-3108. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hosu, Vlad, Hahn, Franz, Jenadeleh, Mohsen, Lin, Hanhe, Men, Hui, Szirányi, Tamás, Li, Shujun, Saupe, Dietmar (2017) The Konstanz Natural Video Database (KoNViD-1k). In: 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX). Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience. . IEEE, Germany ISBN 978-1-5386-4025-8. E-ISBN 978-1-5386-4024-1. (doi:10.1109/QoMEX.2017.7965673)
[img]
Preview

Hoverd, Tim, Sampson, Adam T. (2010) A Transactional Architecture for Simulation. In: ICECCS 2010: Fifteenth IEEE International Conference on Engineering of Complex Computer Systems. . pp. 286-290. IEEE Press
[img]
Preview

Howard, Sam, Silla Jr, Carlos N., Johnson, Colin G. (2011) Automatic Lyrics-based Music Genre Classification in a Multilingual Setting. In: Proceeedings of the Thirteenth Brazilian Symposium on Computer Music. .
[img]
Preview

Howe, Jacob M. (1998) A `Permutation-free' Calculus for Lax Logic. Technical report.
[img]
Preview
[img]
Preview

Howe, Jacob M. (1998) Proof Search Issues in Some Non-Classical Logics. Doctor of Philosophy (PhD) thesis, University of St Andrews.
[img] [img]
Preview

Howe, Jacob M. (1996) Theorem Proving and Partial Proof Search for Intuitionistic Propositional Logic Using a Permutation-free Calculus with Loop-Checking. Technical report.
[img]
Preview
[img]
Preview

Howe, Jacob M., King, Andy (2000) Abstracting numeric constraints with Boolean functions. Information Processing Letters, 75 (1-2). pp. 17-23. ISSN 0020-0190. (doi:10.1016/S0020-0190(00)00081-8)
[img]
Preview
[img]

Howe, Jacob M. and Robbins, Ed and King, Andy (2017) Theory Learning with Symmetry Breaking. In: Pientka, Brigitte, ed. International Symposium on Principles and Practice of Declarative Programming. ACM, Namur, Belgium, pp. 85-96. ISBN 978-1-4503-5291-8. (doi:10.1145/3131851.3131861)
[img]
Preview

Howells, Gareth, Fairhurst, Michael, Bisset, D.L. (1995) BCN - A Novel Network Architecture for ram-Based Neurons. Pattern Recognition Letters, 16 (3). pp. 297-303. ISSN 0167-8655. (doi:10.1016/0167-8655(94)00098-N) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Huan, N-J, Palaniappan, Ramaswamy (2004) Brain computer interface design using mental task classification. Multimedia Cyberscape Journal, . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Huan, N.-J., Palaniappan, Ramaswamy (2004) Electroencephalogram signal classification using linear discriminant analysis for brain-computer interface design. In: Proceedings of Multimedia International Symposium on Information and Communication Technologies, 7-8 Oct 2004, Putrajaya, Malaysia. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Huan, N.-J., Palaniappan, Ramaswamy (2004) Neural network classification of autoregressive features from electroencephalogram signals for brain-computer interface design. Journal of Neural Engineering, 1 (3). pp. 142-150. ISSN 1741-2560. (doi:10.1088/1741-2560/1/3/003) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Huang, P., Marshall, Ian W. (2002) New Flooding Control Schemes Applied in Route Initialisation for the Ad-hoc On Demand Routing Protocols. In: Proceedings of LCS. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Huay, Y E, McLoughlin, Ian Vince (2001) Error Detection and Correction for microsatellite software running on {COTS} processors. In: , Proceedings of the IEEE Int. Conference on Information, Communications and Signal Processing. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hull, Gavin, John, Henna, Arief, Budi (2019) Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses. Crime Science, 8 (2). (doi:10.1186/s40163-019-0097-9)
[img]
Preview
[img]

Hungate, J. and Fernandes, G.P.A. (1995) Distributed Systems: Survey of Open Management Approaches. Technical report. , Distributing Systems Engineering, Computer Systems Laboratory, Technology Administration, U.S. Department of Commerce, Gaithersburg, MD 20899, U.S.A. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Huth, Carly L, Chadwick, David W, Claycomb, William, You, Ilsun (2013) Guest editorial: A brief overview of data leakage and insider threats. Information Systems Frontiers, 15 (1). pp. 1-4. ISSN 1387-3326. E-ISSN 1572-9419. (doi:10.1007/s10796-013-9419-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

I

Ibbetson, Alan L., Linington, Peter F., Penny, Ian, Smith, Abraham B., Tripp, Gerald (1996) Reducing the cost of remote procedure call. In: Schill, Alexander and Mittasch, Christian and Spaniol, Otto and Popien, Claudia, eds. Distributed Platforms. . pp. 430-446. Chapman & Hall ISBN 0-412-73280-7. (doi:10.1007/978-0-387-34947-3_32) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Idachaba, Unekwu Solomon (2015) A Bio-Inspired Cache Management Policy for Cloud Computing Environments using the Artificial Bee Colony Algorithm. Doctor of Philosophy (PhD) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Iliasov, Alexei and Arief, Budi and Romanovsky, Alexander (2009) Step-wise development of resilient ambient campus scenarios. In: Butler, Michael and Jones, Cliff and Romanovsky, Alexander and Troubitsyna, Elena, eds. Methods, Models and Tools for Fault Tolerance. Lecture Notes in Computer Science . Springer, pp. 297-323. ISBN 03029743. (doi:10.1007/978-3-642-00867-2_14)
[img]
Preview

Iliasov, Alexei, Romanovsky, Alexander, Arief, Budi, Laibinis, Linas, Troubitsyna, Elena (2007) On rigorous design and implementation of fault tolerant ambient systems. In: 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing,. . pp. 141-145. ISBN 978-0-7695-2765-9. (doi:10.1109/ISORC.2007.46)
[img]
Preview

Iliasov, Alexei, Romanovsky, Alexander, Arief, Budi, Laibinis, Linas, Troubitsyna, Elena (2007) A framework for open distributed system design. In: International Computer Software and Applications Conference. 2. pp. 658-668. ISBN 978-0-7695-2870-0. (doi:10.1109/COMPSAC.2007.23)
[img]
Preview

Imperatori, Laura Sophie, Betta, Monica, Cecchetti, Luca, Canales-Johnson, Andrés, Ricciardi, Emiliano, Pietrini, Pietro, Siclari, Francesca, Chennu, Srivas, Bernardi, Giulio (2019) EEG functional connectivity metrics wPLI and wSMI account for distinct types of brain functional interactions. Scientific Reports, 9 . p. 8894. E-ISSN 2045-2322. (doi:10.1038/s41598-019-45289-7)
[img]
Preview
[img]

Induruwa, A.S. (1999) Growth of Internet Based Services with special reference to Sri Lanka. In: Proceedings of the International Information Technology Conference '99 (IITC '99). . Council for Information Technology, Sri Lanka ISBN (on CD ROM). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Induruwa, A.S. (1999) Information Technology Development in Sri Lanka - A Review. Journal of the National Science Foundation of Sri Lanka, 27 (4). ISSN 1391-4588. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Iqbal, Musaddar and Freitas, Alex A. and Johnson, Colin G. (2008) Protein interaction inference using particle swarm optimization algorithm. In: Marchiori, Elena and Moore, Jason H., eds. Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics 6th European Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 61-70. ISBN 978-3-540-78756-3. E-ISBN 978-3-540-78757-0. (doi:10.1007/978-3-540-78757-0_6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Itoh, Makoto, Chua, Leon O. (2008) MEMRISTOR OSCILLATORS. International Journal of Bifurcation and Chaos, 18 (11). pp. 3183-3206. ISSN 0218-1274. (doi:10.1142/S0218127408022354) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

J

Jackson, Nicholas, Johnson, Colin G. (2012) Evolution of unknotting strategies for knots and braids. In: Proceedings of the AISB/IACAP World Congress 2012. .
[img]
Preview

Jafarov, E., Lievens, S.J., van der Jeugt, Joris (2008) The Wigner distribution function for the one-dimensional parabose oscillator. Journal of Physics A: Mathematical and Theoretical, 41 (23 (Ar). ISSN 1751-8113. (doi:10.1088/1751-8113/41/23/235301) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jameel, Shoaib, Bouraoui, Zied, Schockaert, Steven (2017) MEmbER: Max-Margin Based Embeddings for Entity Retrieval. In: SIGIR '17 Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval. Proceedings of the 40th International ACM SIGIR. . pp. 783-792. ACM ISBN 978-1-4503-5022-8. (doi:10.1145/3077136.3080803)
[img]
Preview

Jameel, Shoaib, Bouraoui, Zied, Schockaert, Steven (2018) Unsupervised Learning of Distributional Relation Vectors. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, ACL 2018. . Association for Computational Linguistics ISBN 978-1-948087-32-2.
[img]
Preview

Jameel, Shoaib, Fu, Zihao, Shi, Bei, Lam, Wai, Schockart, Steven (2018) Word Embedding as Maximum A Posteriori Estimation. In: Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI 2019). . (In press)
[img]
Preview

Jarchi, Delaram, Casson, Alexander J. (2017) Towards Photoplethysmography-Based Estimation of Instantaneous Heart Rate During Physical Activity. IEEE Transactions on Biomedical Engineering, 64 (9). pp. 2042-2053. ISSN 0018-9294. (doi:10.1109/TBME.2017.2668763) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Jarchi, Delaram, Lo, Benny, Wong, Charence, Ieong, Edmund, Nathwani, Dinesh, Yang, Guang-Zhong (2016) Gait Analysis From a Single Ear-Worn Sensor: Reliability and Clinical Evaluation for Orthopaedic Patients. IEEE Transactions on Neural Systems and Rehabilitation Engineering, 24 (8). pp. 882-892. ISSN 1534-4320. (doi:10.1109/TNSRE.2015.2477720) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Jarchi, Delaram, Rodgers, Sarah J., Tarassenko, Lionel, Clifton, David A. (2018) Accelerometry-Based Estimation of Respiratory Rate for Post-Intensive Care Patient Monitoring. IEEE Sensors Journal, 18 (12). pp. 4981-4989. ISSN 1530-437X. (doi:10.1109/JSEN.2018.2828599)
[img]
Preview

Jarchi, Delaram, Wong, Charence, Kwasnicki, Richard Mark, Heller, Ben, Tew, Garry A., Yang, Guang-Zhong (2014) Gait Parameter Estimation From a Miniaturized Ear-Worn Sensor Using Singular Spectrum Analysis and Longest Common Subsequence. IEEE Transactions on Biomedical Engineering, 61 (4). pp. 1261-1273. ISSN 0018-9294. (doi:10.1109/TBME.2014.2299772) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Javarone, Marco A., Marinazzo, Daniele (2018) Dilution of Ferromagnets via a Random Graph-Based Strategy. Complexity, 2018 . Article ID 2845031. ISSN 1076-2787. (doi:10.1155/2018/2845031)
[img]
Preview

Jiang, Bing, Song, Yan, Wei, Si, Liu, Jun-Hua, McLoughlin, Ian Vince, Dai, Li-Rong (2014) Deep bottleneck features for spoken language identification. PloS one, 9 (7). e100795-e100795. (doi:10.1371/journal.pone.0100795) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jiang, Bing, Song, Yan, Wei, Si, McLoughlin, Ian Vince, Dai, Li-Rong (2014) Task-Aware Deep Bottleneck Features for Spoken Language Identification. Interspeech 2014, . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jiang, Bing, Song, Yan, Wei, Si, Wang, Meng-Ge, McLoughlin, Ian Vince, Dai, Li-Rong (2014) Performance evaluation of deep bottleneck features for spoken language identification. In: Chinese Spoken Language Processing (ISCSLP), 2014 9th International Symposium on. Chinese Spoken Language Processing (ISCSLP), 2014 9th International Symposium on. . pp. 143-147. IEEE ISBN 978-1-4799-4219-0. (doi:10.1109/ISCSLP.2014.6936580) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Johnson, Colin G. (2013) Artistic and Musical Applications of Internet Search Technologies: Prospects and a Case Study. Digital Creativity, 24 (4). pp. 342-366. ISSN 1462-6268. E-ISSN 1744-3806. (doi:10.1080/14626268.2013.777351)
[img]
Preview

Johnson, Colin G. (1998) Between-host evolution of mutation-rate and within-host evolution of virulence. In: Proceedings Third German Workshop on Artificial Life. . Harri Deutsch
[img]
Preview

Johnson, Colin G. (2012) Connotation in Computational Creativity. Cognitive Computation, 4 (3). pp. 280-291. ISSN 1866-9956. E-ISSN 1866-9964. (doi:10.1007/s12559-012-9141-8)
[img]
Preview

Johnson, Colin G. (2012) The Creative Computer as Romantic Hero? Computational Creativity Systems and Creative Personæ. In: Proceedings of the Third International Conference on Computational Creativity. . pp. 57-61. E-ISBN 978-1-905254-66-8.
[img]
Preview

Johnson, Colin G. (2016) Fitness in Evolutionary Art and Music: A Taxonomy and Future Prospects. Fitness in evolutionary art and music: a taxonomy and future prospects, 9 (1). pp. 4-25. ISSN 1754-8853. E-ISSN 1754-8861. (doi:10.1504/IJART.2016.075406)
[img]
Preview

Johnson, Colin G. (2012) Fitness in Evolutionary Art and Music: What Has Been Used and What Could Be Used? In: Evolutionary and Biologically Inspired Music, Sound, Art and Design First International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 129-140. ISBN 978-3-642-29141-8. E-ISBN 978-3-642-29142-5. (doi:10.1007/978-3-642-29142-5_12)
[img]
Preview

Johnson, Colin G. (2009) Genetic Programming Crossover: Does It Cross Over? In: EuroGP 2009: Genetic Programming. Lecture Notes in Computer Science . pp. 97-108. Springer, Heidelberg ISBN 978-3-642-01180-1. E-ISBN 978-3-642-01181-8. (doi:10.1007/978-3-642-01181-8_9)
[img]
Preview

Johnson, Colin G. (2014) Is it Time for Computational Creativity to Grow Up and Start being Irresponsible? In: Fifth International Conference on Computational Creativity. . (Unpublished)
[img]
Preview

Johnson, Colin G. (2007) The Non-Classical Mind: Cognitive Science and Non-Classical Computing. In: Schuster, Alfons, ed. Intelligent Computing Everywhere. Springer, London, UK, pp. 45-59. ISBN 978-1-84628-943-9. E-ISBN 978-1-84628-943-9. (doi:10.1007/978-1-84628-943-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Johnson, Colin G. (2019) Solving the Rubik’s Cube with Learned Guidance Functions. In: Proceedings of the 2018 IEEE Symposium Series on Computational Intelligence. . pp. 2082-2089. ISBN 978-1-5386-9277-6. E-ISBN 978-1-5386-9276-9. (doi:10.1109/SSCI.2018.8628626)
[img]
Preview

Johnson, Colin G. (2008) Student-Generated Podcasts for Learning and Assessment. In: Koli '08 Proceedings of the 8th International Conference on Computing Education Research. . pp. 84-87. ACM, New York, NY, USA E-ISBN 978-1-60558-385-3. (doi:10.1145/1595356.1595371)
[img]
Preview

Johnson, Colin G. (2009) Teaching Natural Computation. IEEE Computational Intelligence Magazine, 4 (1). pp. 24-30. ISSN 1556-603X. (doi:10.1109/MCI.2008.930984)
[img]
Preview

Johnson, Colin G., Marsh, Duncan (1998) A CAD Representation of Robot Manipulator Workspace. In: 29th International Symposium on Robotics. .
[img]
Preview

Johnson, Colin G., Marsh, Duncan (1998) A robot programming environment based on free-form CAD modelling. In: Proceedings - IEEE International Conference on Robotics and Automation. Proceedings of the 1998 IEEE International Conference on Robotics and Automation. . pp. 194-199. IEEE Press ISBN 0-7803-4300-X. (doi:10.1109/ROBOT.1998.676372)
[img]
Preview

Johnson, Colin G., McCormack, Jon, Santos, Iria, Romero, Juan (2019) Understanding Aesthetics and Fitness Measures in Evolutionary Art Systems. Complexity, 2019 . ISSN 1076-2787. (doi:10.1155/2019/3495962)
[img]
Preview

Johnson, Colin G., Swan, Jerry, Edwin, Brady (2018) Subtype Polymorphism à la carte via Machine Learning on Dependent Types. In: ML4PL. 2nd International Workshop on Machine Learning Techniques for Programming Languages. . ACM ISBN ACM ISBN 123-4567-24-567/08/06. (doi:10.475/123_4)
[img]
Preview

Johnson, Leslie (1998) Revisiting Simon on the Design of Complex Systems. Systems Research and Information Science, 7 (4). pp. 213-224. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Johnson, Leslie and Stergiou, Maria (1999) BPR - Enabled Systems Engineering. In: Khoong, Chan Meng, ed. Reengineering in Action: The Quest for World-Class Excellence. Imperial College Press, World Scientific Co. ISBN 1-86094-139-7.
[img]

Johnson, Leslie, Stergiou, Maria (1999) Emergent design and development of information systems: The theoretical justification. In: Torres, M. and Sanchez, B. and Wills, E., eds. Systemics, cybernetics and informatics; World multiconference on systemics, cybernetics and informatics. . pp. 457-463. Int Inst Informatics & Systemics, Florida, USA ISBN 980-07-5919-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Johnson, Leslie, Stergiou, Maria (1997) Integrating BPR and Systems Development using Meta-Models. In: Proceedings - BPR Year 97 Europe. .
[img]

Johnson, Leslie, Stergiou, Maria (1997) The Link between BPR, Evolutionary Delivery and Evolutionary Development. In: Callaos, Nagib and Khoong, Chan Meng and Cohen, Eli, eds. SCI'97 Proceedings - World Multiconference on Systemics, Cybernetics and Informatics. 2. pp. 61-67. ISBN 980-07-4174-7.
[img] [img]
Preview

Johnson, Leslie, Stergiou, Maria (1997) The Necessary Architecture of Self-Regulating Teams. In: Wright, D. and Rudolph, M. and Hanna, V. and Gillingwater, D. and Burns, N., eds. ME-SELA'97 Proceedings - International Conference on Managing Enterprises - Stakeholders, Engineering, Logistics, and Achievement. . pp. 93-98. Mechanical Engieering Publ ISBN 1-86058-066-1.
[img] [img]
Preview

Jones, Richard E. (2003) DO garbage collection. Technical report. Kent University, Kent, UK 2-03. (doi:2-03) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jones, Richard E. (2007) Dynamic Memory Management: Challenges for Today and Tomorrow. In: International Lisp Conference. . pp. 115-124. Association of Lisp Users, Cambridge ISBN 978-1-59593-618-9.
[img]
Preview

Jones, Richard E. (1995) Introducing More Systematic Quality Assurance Arrangements for Course Approval and Review. In: Middlehurst, Robin, ed. Managing for Quality: Stories and Strategies. Higher Education Quality Council, pp. 15-17. ISBN 1-85824-234-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordan, Tobias, De Wilde, Philippe, Buarque de Lima Neto, Fernando (2017) Modeling Contagion of Behavior in Friendship Networks as Coordination Games. In: Advances in Social Simulation 2015. Advances in Intelligent Systems and Computing (AISC) , 528. pp. 181-194. Springer ISBN 978-3-319-47252-2. E-ISBN 978-3-319-47253-9. (doi:10.1007/978-3-319-47253-9_15)
[img]
Preview

Jordanous, Anna (2010) A-Fitness-Function-for-Creativity-in-Jazz-Improvisation-and-Beyond (Jordanous 2010) - code. github Java code.
[img]

Jordanous, Anna (2017) Co-creativity and perceptions of computational agents in co-creativity. In: Proceedings of the Eighth International Conference on Computational Creativity. . pp. 159-166. ACC ISBN 978-0-692-89564-1.
[img]
Preview

Jordanous, Anna (2011) Computer Models of Musical Creativity? A review of Cope (2005). Review of: Computer Models of Musical Creativity. David Cope (2005). MIT Press by UNSPECIFIED. AISB Quarterly, 132 (-). p. 10. ISSN 1476-3036.
[img]
Preview

Jordanous, Anna (2009) Conference Report: The Fourth Conference on Interdisciplinary Musicology (CIM08). Review of: Fourth Conference on Interdisciplinary Musicology, 2008 (CIM08) by UNSPECIFIED. AISB Quarterly, 128 (-). pp. 8-9. ISSN 1476-3036.
[img]
Preview

Jordanous, Anna (2010) Conference Review: Empirical approaches to Performance: Empirical Musicology II conference (25-26 March 2010, School of Music, University of Leeds, UK). Review of: Empirical approaches to Performance: Empirical Musicology II conference 2010 by UNSPECIFIED. Excursions, 1 (1). p. 1. ISSN 2044-4095. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2018) Creativity vs quality: why the distinction matters when evaluating computational creativity systems. In: The 5th Computational Creativity Symposium at the AISB Convention 2018, 4-6 April 2018, Liverpool, UK. (In press)
[img]
Preview

Jordanous, Anna (2010) Defining creativity: Finding keywords for creativity using corpus linguistics techniques. In: Proceedings of ICCC-X. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2011) Evaluating evaluation: Assessing progress in computational creativity research. In: Proceedings of the Second International Conference on Computational Creativity (ICCC-11). . pp. 102-107.
[img]
Preview

Jordanous, Anna (2009) Evaluating machine creativity. In: Seventh ACM conference on Creativity and cognition, 2009, Berkeley, CA.
[img]
Preview

Jordanous, Anna (2015) Four PPPPerspectives on Computational Creativity. In: AISB 2015 Symposium on Computational Creativity, 20-22nd May, 2015, Canterbury, Kent, UK.
[img]
Preview

Jordanous, Anna (2016) Four PPPPerspectives on Computational Creativity in theory and in practice. Connection Science, 28 (2). pp. 194-216. ISSN 0954-0091. E-ISSN 1360-0494. (doi:10.1080/09540091.2016.1151860)
[img]
Preview

Jordanous, Anna (2016) Has computational creativity successfully made it "Beyond the Fence" in musical theatre? In: Proceedings of the 7th International Conference on Computational Creativity. 7th International Conference on Computational Creativity. . pp. 303-310. Sony CSL ISBN 978-2-7466-9155-1.
[img]
Preview

Jordanous, Anna (2017) How can we write software that can communicate creatively? In: Proceedings of the 4th AISB Symposium on Computational Creativity. .
[img]
Preview

Jordanous, Anna (2011) International Conference on Computational Creativity (review). Review of: International Conference on Computational Creativity 2011 by UNSPECIFIED. AISB Quarterly, . p. 13.
[img]
Preview

Jordanous, Anna (2013) Introducing Computational Creativity Research. . CreativityPost.com Internet. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2016) Language and Music. In: Jones, Rodney, ed. Routledge Handbook of Language and Creativity. Routledge. ISBN 978-0-415-83973-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2010) The Realisation of Creativity in Artificial Music Improvisation and Interpretation. In: Empirical Musicology II, 2010, Leeds, UK. (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2017) Review. Review of: Computation and the humanities : towards an oral history of digital humanities by Nyhan, J. and Flinn A., A.. ACM Computing Reviews, (Sep'17). Review #: CR145551. E-ISSN 1530-6585.
[img]

Jordanous, Anna (2014) Review of Digital Da Vinci: Computers in the Arts and Sciences (2014, Springer). Review of: Digital Da Vinci: Computers in the Arts and Sciences (2014, Springer) by UNSPECIFIED. ACM Computing Reviews, . p. 1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2014) Review of Emotional Lexicons: Continuity and Change in the Vocabulary of Feeling 1700-2000 by Ute Frevert et al.Anna Jordanous believes this book's strengths lie in its contextual diversity and in the thoroughness of the compilation and usage of reference sources. Review of: Emotional Lexicons: Continuity and Change in the Vocabulary of Feeling 1700-2000 by Ute Frevert et al. by UNSPECIFIED. Reviews in History, . p. 1682.
[img]

Jordanous, Anna (2013) Review: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. Type: Proceedings. Review of: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. by UNSPECIFIED. ACM Computing Reviews, . CR141093. ISSN 1308-0745. E-ISSN 1308-0745. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2015) Review: Hacking choreography: dance and live coding: [Sicchio K. Computer Music Journal 38 (1): 31-39, 2014. ]. Review of: Hacking choreography: dance and live coding Sicchio K. Computer Music Journal 38 (1): 31-39, 2014. Type: Article by UNSPECIFIED. ACM Computing Reviews, . p. 1. (doi:CR143411) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2015) Review: What makes you clever : the puzzle of intelligence. Review of: What makes you clever : the puzzle of intelligence (Partridge, 2014, World Scientific Publishing Co, Inc.) by UNSPECIFIED. ACM Computing Reviews, . CR143090. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2007) Score Following: An artificially intelligent musical accompanist (Jordanous 2007, Jordanous & Smaill 2008+2009) - code. github Max/MSP code.
[img]

Jordanous, Anna (2012) A Standardised Procedure for Evaluating Creative Systems: Computational Creativity Evaluation Based on What it is to be Creative. Cognitive Computation, 4 (3). pp. 246-279. ISSN 1866-9956. E-ISSN 1866-9964. (doi:10.1007/s12559-012-9156-1)
[img]
Preview

Jordanous, Anna (2014) Stepping Back to Progress Forwards: Setting Standards for Meta-Evaluation of Computational Creativity. In: Proceedings of the 5th International Conference on Computational Creativity. .
[img]
Preview

Jordanous, Anna (2008) Voice Separation in polyphonic music (Jordanous 2008) - code. github Matlab code.
[img]

Jordanous, Anna (2008) Voice separation in polyphonic music: A data-driven approach. In: Proceedings of the International Computer Music Conference 2008. .
[img]
Preview

Jordanous, Anna (2014) What is Computational Creativity? . CreativityPost.com Online web platform. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2010) A fitness function for creativity in jazz improvisation and beyond. In: International Conference on Computational Creativity, 2010, Lisbon, Portugal. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2016) The longer term value of creativity judgements in computational creativity. In: Proceedings of AISB 2016’s Third International Symposium on Computational Creativity (CC2016). .
[img]
Preview

Jordanous, Anna and Allington, Daniel (2014) Network analysis - code for the Valuing Electronic Music project. github Python code.
[img]

Jordanous, Anna, Allington, Daniel, Dueck, Byron (2014) Online Networks and the Production of Value in Electronic Music. In: Digital Music Research Network Network One-Day Workshop (DMRN+9), 16 Dec 2014, Queen Mary's, London. (Unpublished)
[img] [img]

Jordanous, Anna, Allington, Daniel, Dueck, Byron (2014) Using online networks to analyse the value of electronic music. In: Proceedings of the 5th International Conference on Computational Creativity. .
[img]
Preview

Jordanous, Anna and Fox, Simon (2014) fba-solution-pack-measurement. github php Drupal module.
[img]

Jordanous, Anna and Keller, Bill (2012) Creativity Ontology. http://purl.org/creativity/ontology.
[img]

Jordanous, Anna, Keller, Bill (2012) Weaving creativity into the Semantic Web: a language-processing approach. In: International Conference on Computational Creativity. Proceedings of the 3rd International Conference on Computational Creativity. . pp. 216-220.
[img]
Preview

Jordanous, Anna, Keller, Bill (2012) What makes a musical improvisation creative? Journal of Interdisciplinary Music Studies, 6 (2). pp. 151-175. ISSN 1307-0401. E-ISSN 1306-9055. (doi:10.4407/jims.2014.02.003)
[img]
Preview

Jordanous, Anna, Keller, Bill (2011) What makes a musical improvisation creative? In: Proceedings of the 7th Conference on Interdisciplinary Musicology. .
[img]
Preview

Jordanous, Anna, Lawrence, K Faith, Hedges, Mark, Tupman, Charlotte (2012) Exploring manuscripts: sharing ancient wisdoms across the semantic web. In: Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics. Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics (WIMS-12). . ACM, New York, New York, USA ISBN 978-1-4503-0915-8. (doi:10.1145/2254129.2254184)
[img]
Preview

Jordanous, Anna, Lawrence, K. Faith, Tupman, Charlotte (2013) Sharing Ancient Wisdoms: Dataset. RDF. Located at: http://www.ancientwisdoms.ac.uk/library/data/. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna and Roueché, Charlotte and Tupman, Charlotte and Lawrence, K. Faith and Hedges, Mark and Wakelnig, Elvira and Searby, Denis (2013) Sharing Ancient Wisdoms (SAWS) ontology. http://www.ancientwisdoms.ac.uk/.
[img]

Jordanous, Anna, Smaill, Alan (2008) Artificially intelligent accompaniment using Hidden Markov Models to model musical structure. In: Conference on Interdisciplinary Musicology, 2008, Thessaloniki, Greece.
[img]
Preview

Jordanous, Anna, Smaill, Alan (2009) Investigating the role of score following in automatic musical accompaniment. Journal of New Music Research, 38 (2). pp. 197-209. ISSN 0929-8215. E-ISSN 1744-5027. (doi:10.1080/09298210903180245)
[img]
Preview