Items where division is "Faculties > Sciences > School of Computing"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator's name | Item Type | Date | No Grouping
Jump to: ? | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | Ö
Number of items at this level: 1727.

?

?agalj, Mario and Perkovi?, Toni and Bugari?, Marin and Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:https://doi.org/10.1016/j.pmcj.2014.09.002) (Full text available)
[img]
Preview

A

Aaron, Samuel and Orchard, Dominic A. and Blackwell, Alan F. (2014) Temporal semantics for a live coding language. In: Proceedings of the 2nd ACM SIGPLAN international workshop on Functional art, music, modeling & design. Association for Computing Machinery pp. 37-47. ISBN 978-1-4503-3039-8. (doi:https://doi.org/10.1145/2633638.2633648) (Full text available)
[img]
Preview

Abdullah, Sophiana Chua and Cooley, Roger (2000) The use of constraint logic programming in the development of adaptive tests. In: Gauthier, Gilles and Frasson, Claude and VanLehn, Kurt, eds. Intelligent Tutoring Systems, Proceedings. Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence, 1839. Springer-Verlag Berlin p. 650. ISBN 3-540-67655-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Abowd, Gregory D. and Dey, Anind K. and Brown, Peter J. and Davies, Nigel and Smith, Mark E. and Steggles, Pete (1999) Towards a better understanding of context and context-awareness. In: Gellersen, Hans, ed. Handheld and Ubiquitous Computing, Proceedings. Lecture Notes in Computer Science, 1707. Springer-Verlag Berlin, Berlin pp. 304-307. ISBN 3-540-66550-1. (doi:https://doi.org/10.1007/3-540-48157-5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Abreu, João and Bocchi, Laura and Fiadeiro, José Luiz and Lopes, Antónia (2007) Specifying and Composing Interaction Protocols for Service-Oriented System Modelling. In: Formal Techniques for Networked and Distributed Systems – FORTE 2007. 27th IFIP WG 6.1 International Conference, Tallinn, Estonia, June 27-29, 2007. Proceedings. Lecture Notes in Computer Science, 4574. Springer pp. 358-373. ISBN 978-3-540-73195-5. E-ISBN 978-3-540-73196-2. (doi:https://doi.org/10.1007/978-3-540-73196-2_23) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ackerman, Margareta and Goel, Ashok and Johnson, Colin G. and Jordanous, Anna and Leon, Carlos and Perez y Perez, Rafael and Toivonen, Hannu and Ventura, Dan (2017) Teaching Computational Creativity. In: Goel, Ashok and Jordanous, Anna and Pease, Alison, eds. Proceedings of the Eighth International Conference on Computational Creativity. Georgia Institute of Technology, Atlanta, Georgia, US pp. 9-16. ISBN 978-0-692-89564-1. (Full text available)
[img]
Preview

Adams, Stephen (2017) Data-Driven Refactorings for Haskell. Doctor of Philosophy (PhD) thesis, University of Kent,. (Full text available)
[img]
Preview

Adda, Mo and Martin, Jean-Baptise and Owen, Gareth and Peart, A. (2006) Simultion of a Wireless Senor Network for Image Processing. IADAT-tcn, . pp. 35-37. ISSN 84-933971-4-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Adegboye, Adesola and Kampouridis, Michael and Johnson, Colin G. (2018) Regression genetic programming for estimating trend end in foreign exchange market. In: 2017 IEEE Symposium Series on Computational Intelligence (SSCI) Proceedings. IEEE ISBN 978-1-5386-2727-3. E-ISBN 978-1-5386-2726-6. (doi:https://doi.org/10.1109/SSCI.2017.8280833) (Full text available)
[img]
Preview

Adi, R.W. and Tio, C.M.M. and McLoughlin, Ian Vince (2000) Hardware architecture for data concealment using sub-band coding,. IEEE APCCAS 2000. 2000 IEEE Asia-Pacific Conference on Circuits and Systems. Electronic Communication Systems. (Cat. No.00EX394), . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Adi, R.W. and Tio, C.M.M and McLoughlin, Ian Vince (2000) Hardware architecture for data concealment using sub-band coding, LSB coding and pseudo-random bit stream generators. In: , 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119). IEEE pp. 221-225. ISBN 0-7803-6355-8. (doi:https://doi.org/10.1109/TENCON.2000.892261) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Agrafiotis, Ioannis and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. and Upton, David (2016) The Relative Effectiveness of widely used Risk Controls and the Real Value of Compliance. Project report. University of Oxford, Oxford, UK (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Agrafiotis, Ioannis and Nurse, Jason R. C. and Buckley, Oliver and Legg, Phil and Creese, Sadie and Goldsmith, Michael (2015) Identifying attack patterns for insider threat detection. Computer Fraud & Security, (7). pp. 9-17. (doi:https://doi.org/10.1016/S1361-3723(15)30066-X) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Agrafiotis, Ioannis and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie and Upton, David (2018) A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, . ISSN 2057-2085. E-ISSN 2057-2093. (doi:https://doi.org/10.1093/cybsec/tyy006) (Full text available)
[img]
Preview
[img]
Preview

Ahmad, Jumana and Swan, Garrett and Bowman, Howard and Wyble, Brad and Nobre, Anna C. and Shapiro, Kimron L. and McNab, Fiona (2017) Competitive interactions affect working memory performance for both simultaneous and sequential stimulus presentation. Scientific Reports, 7 (4785). ISSN 2045-2322. (doi:https://doi.org/10.1038/s41598-017-05011-x) (Full text available)
[img]
Preview

Ahmadi, Farzaneh and McLoughlin, Ian Vince (2012) Measuring resonances of the vocal tract using frequency sweeps at the lips. In: , The 5th International Symposium on Communications, Control and Signal Processing. 2-4 May 2012. IEEE pp. 1-5. ISBN 978-1-4673-0274-6. (doi:https://doi.org/10.1109/ISCCSP.2012.6217814) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh and McLoughlin, Ian Vince (2013) A new mechanical index for gauging the human bioeffects of low frequency ultrasound. In: Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE. Engineering in Medicine and Biology Society (EMBC), 2013 35th Annual International Conference of the IEEE. IEEE pp. 1964-1967. (doi:https://doi.org/10.1109/EMBC.2013.6609913) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh and McLoughlin, Ian Vince (2009) The use of low frequency ultrasonics in speech processing. In: Signal processing. Itech Book Publishers, Vienna, Austria, pp. 503-528. ISBN 978-953-7619-91-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh and McLoughlin, Ian Vince (2010) The use of low-frequency ultrasonics in speech processing. In: Miron, Sebastian, ed. Signal Processing. Intech, pp. 503-528. ISBN 978-953-7619-91-6. (doi:https://doi.org/10.5772/8538) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh and McLoughlin, Ian Vince and Chauhan, Sunita and Ter-Haar, Gail (2012) Bio-effects and safety of low-intensity, low-frequency ultrasonic exposure. Progress in biophysics and molecular biology, 108 (3). pp. 119-138. (doi:https://doi.org/10.1016/j.pbiomolbio.2012.01.004) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh and McLoughlin, Ian Vince and Sharifzadeh, Hamid Reza (2008) Analysis-by-synthesis method for whisper-speech reconstruction. In: IEEE Asia Pacific Conference on Circuits and Systems, 2008. APCCAS 2008. IEEE pp. 1280-1283. ISBN 978-1-4244-2341-5. E-ISBN 978-1-4244-2342-2. (doi:https://doi.org/10.1109/APCCAS.2008.4746261) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh and McLoughlin, Ian Vince and Sharifzadeh, Hamid Reza (2010) Autoregressive Modelling for Linear Prediction of Ultrasonic Speech. In: Eleventh Annual Conference of the International Speech Communication Association. ISCA ISBN 978-1-61782-123-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh and McLoughlin, Ian Vince and Sharifzadeh, Hamid Reza (2010) Linear predictive analysis for ultrasonic speech. Electronics Letters, 46 (6). pp. 387-388. ISSN 0013-5194. (doi:https://doi.org/10.1049/el.2010.3521) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ahmadi, Farzaneh and McLoughlin, Ian Vince and Sharifzadeh, Hamid Reza (2010) Talking Ultrasound. Electronics letters, 46 (6). p. 383. (doi:https://doi.org/10.1049/el.2010.9019) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Akehurst, David H. (2004) MDA-Transformations from Relations. In: ECOOP 2004 Workshop Reader, Workshop on Model Driven Development (WMDD 2004). (Full text available)
[img]
Preview

Akehurst, David H. (2004) Proceedings of Second European Workshop on Model Driven Architecture (MDA) with an emphasis on Methodologies and Transformations. Technical report. kent university (Full text available)
[img]
Preview

Akehurst, David H. (2004) Proposal for a Model Driven Approach to Creating a Tool to Support the RM-ODP. In: Workshop on ODP for Enterprise Computing (WODPEC 2004). , Monterey, California (Full text available)
[img]
Preview

Akehurst, David H. (2004) Relations in OCL. In: Workshop OCL and Model Driven Engineering. , Lisbon, Portugal (Full text available)
[img]
Preview

Akehurst, David H. (2004) Validating BPEL Specifications using OCL. Technical report. kent university (Full text available)
[img]
Preview

Aktypi, Angeliki and Nurse, Jason R. C. and Goldsmith, Michael (2017) Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks. In: Proceedings of the 2017 International Workshop on Multimedia Privacy and Security. ACM ISBN 978-1-4503-5206-2. (doi:https://doi.org/10.1145/3137616.3137617) (Full text available)
[img]
Preview

Al-Sudani, Sahar and Ramaswamy, Palaniappan (2019) Predicting Students’ Final Degree Classification Using an Extended Profile. Education and Information Technologies, . ISSN 1360-2357. E-ISSN 1573-7608. (doi:https://doi.org/10.1007/s10639-019-09873-8) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

Alahmadi, Bushra A. and Legg, Philip .A. and Nurse, Jason R. C. (2015) Using Internet Activity Profiling for Insider-Threat Detection. In: Proceedings of the 17th International Conference on Enterprise Information Systems - (Volume 2). SciTePress pp. 709-720. ISBN 978-989-758-097-0. (doi:https://doi.org/10.5220/0005480407090720) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Albakri, Adham and de Lemos, Rogerio and Boiten, Eerke Albert (2019) Sharing Cyber Threat Intelligence under the General Data Protection Regulation. In: Annual Privacy Forum 2019, 13-14 June 2019, Rome, Italy. (In press) (Full text available)
[img]
Preview

Alentorn, Amadeo and Moraglio, Alberto (2010) Heuristic Portfolio Optimisation for a Hedge Fund Strategy using the Geometric Nelder-Mead Algorithm. In: 2010 UK Workshop on Computational Intelligence (UKCI 2010). ISBN 978-1-4244-8774-5. (Full text available)
[img]
Preview

Ali, Edries Abdelhadi (2001) Integration of Security and Reliability in a Distributed Collaborative Environment. Doctor of Philosophy (PhD) thesis, Computing Laboratory. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ali, Mohammed Aamir and Arief, Budi and Emms, Martin and van Moorsel, Aad (2017) Does The Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Security & Privacy, 15 (2). pp. 78-86. ISSN 1540-7993. (Full text available)
[img]
Preview

Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science, 10292 . Springer International Publishing AG, pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:https://doi.org/10.1007/978-3-319-58460-7_13) (Full text available)
[img]
Preview

Allen, Jaqui and Sharifzadeh, Hamid Reza and McLoughlin, Ian Vince and Sarrafzadeh, A and Ardekani, Iman T (2016) Acoustic analysis and computerised reconstruction of speech in laryngectomised individuals. In: 137th Annual Meeting of American Laryngological Association (ALA), Combined Otolaryngology Spring Meetings (COSM 2016), 18-19 May 2016, Chicago, USA. (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Allington, Daniel and Dueck, Byron and Jordanous, Anna (2015) Networks of Value in Electronic Music : SoundCloud, London, and the Importance of Place. Cultural Trends, 24 (3). pp. 211-222. ISSN 0954-8963. E-ISSN 1469-3690. (doi:https://doi.org/10.1080/09548963.2015.1066073) (Full text available)
[img]
Preview

Allington, Daniel and Jordanous, Anna and Dueck, Byron (2015) Music, value, and networks in the digital world. http://valuingelectronicmusic.org (Full text available)
[img]
Preview

Allwright, James and Pritchard, David and Jones, Stephen and Stephens, Nelson and Peel, Andrew and Makinson, Gordon and Steel, John and Liddell, Heather (1995) High Performance Computing For All. In: Alexander, Sylvia and Magee, Patricia, eds. Proceedings of the 3rd Annual Conference on the Teaching of Computing. CTI, Dublin City University (Full text available)
[img]
Preview
[img]
Preview

Alqahtani, Saeed Ibrahim and Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, New York, NY, USA Article No. 19. ISBN 978-1-4503-5257-4. (doi:https://doi.org/10.1145/3098954.3098984) (Full text available)
[img]
Preview

Alrayes, Bedour and Kafal?, Özgür and Stathis, Kostas (2014) CONAN: A heuristic strategy for Concurrent Negotiating Agents: Extended Abstract. In: AAMAS '14 Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems. ACM pp. 1585-1586. ISBN 978-1-4503-2738-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Alrayes, Bedour and Kafal?, Özgür and Stathis, Kostas (2017) Concurrent bilateral negotiation for open e-markets: The Conan strategy. Knowledge and Information Systems, . ISSN 0219-1377. (doi:https://doi.org/10.1007/s10115-017-1125-2) (Full text available)
[img]
Preview

Alrayes, Bedour and Kafal?, Özgür and Stathis, Kostas (2016) RECON: A Robust multi-agent Environment for simulating COncurrent Negotiations. In: Recent advances in agent-based complex automated negotiation. Studies in Computational Intelligence . Springer, pp. 157-174. ISBN 978-3-319-30305-5. (doi:https://doi.org/10.1007/978-3-319-30307-9_10) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Alsallakh, Bilal and Micallef, Luana and Aigner, Wolfgang and Hauser, Helwig and Miksch, Silvia and Rodgers, Peter (2016) The State-of-the-Art of Set Visualization. Computer Graphics Forum, 35 (1). pp. 234-260. ISSN 1467-8659. (doi:https://doi.org/10.1111/cgf.12722) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Alsheddy, A. and Kampouridis, Michael (2012) Off-line Parameter Tuning for Guided Local Search Using Genetic Programming. In: IEEE World Congress on Evolutionary Computation (WCCI). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Alsufyani, Abdulmajeed (2015) Detecting Salient Information Using RSVP and the P3: Computational and EEG Explorations. Doctor of Philosophy (PhD) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Alsufyani, Abdulmajeed and Hajilou, Omid and Zoumpoulaki, Alexia and Filetti, Marco and Solomon, Christopher J. and Gibson, Stuart J. and Alroobaea, Roobaea and Bowman, Howard (2019) Breakthrough Percepts of Famous Faces. Psychophysiology, 56 (1). e13279. ISSN 0048-5772. (doi:https://doi.org/10.1111/psyp.13279) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Altadmri, Amjad and Ahmed, Amr (2009) Automatic semantic video annotation in wide domain videos based on similarity and commonsense knowledgebases. In: IEEE International Conference on Signal and Image Processing Applications (ICSIPA)., 18-19th November 2009, Malaysia. (Full text available)
[img]
Preview

Altadmri, Amjad and Ahmed, Amr (2009) Video databases annotation enhancing using commonsense knowledgebases for indexing and retrieval. In: The 13th IASTED International Conference on Artificial Intelligence and Soft Computing, September 7 - 9, 2009, Palma de Mallorca, Spain. (Full text available)
[img]
Preview

Altadmri, Amjad and Ahmed, Amr (2009) VisualNet: Commonsense knowledgebase for video and image indexing and retrieval application. In: IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)., 20-22 Nov. 2009, Shanghai. (Full text available)
[img]
Preview

Altadmri, Amjad and Ahmed, Amr (2014) A framework for automatic semantic video annotation: Utilizing similarity and commonsense knowledge bases. Multimedia Tools and Applications, 72 (2). pp. 1167-1191. ISSN 1380-7501. E-ISSN 1573-7721. (doi:https://doi.org/10.1007/s11042-013-1363-6) (Full text available)
[img]
Preview

Altadmri, Amjad and Ahmed, Amr and Mohtasseb, Haytham (2012) Semantic levels of domain-independent commonsense knowledgebase for visual indexing and retrieval applications. In: 19th International Conference on Neural Information Processing (ICONIP), November 12-15, 2012, Doha, Qatar. (Full text available)
[img]
Preview

Aluko, B. and Smonou, D. and Kampouridis, Michael and Tsang, E. (2014) Combining different meta-heuristics to improve the predictability of a financial forecasting algorithm. In: IEEE Computational Intelligence for Financial Engineering & Economics (CIFEr). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Amaral, Marco A and Javarone, Marco A. (2018) Heterogeneous update mechanisms in evolutionary games: mixing innovative and imitative dynamics. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 97 (4). ISSN 1063-651X. (doi:https://doi.org/10.1103/PhysRevE.97.042305) (Full text available)
[img]
Preview

Anderson, Tom and Arief, Budi and Basit, Tehmina and Borup, Rosie and Rutherford, Louise (2015) How To Succeed in Cyberspace. In: ICERI2015: 8TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION. ICERI Proceedings. pp. 6074-6083. ISBN 978-84-608-2657-6. (doi:WOS:000377304006024) (Full text available)
[img]
Preview

Andersson, Jesper and Baresi, Luciano and Bencomo, Nelly and de Lemos, Rogerio and Gorla, Alessandra and Inverardi, Paola and Vogel, Thomas (2013) Software Engineering Processes for Self-Adaptive Systems. In: Software Engineering for Self-Adaptive Systems II International Seminar. Lecture Notes in Computer Science . Springer, pp. 51-75. ISBN 978-3-642-35812-8. E-ISBN 978-3-642-35813-5. (doi:https://doi.org/10.1007/978-3-642-35813-5_3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Andersson, Jesper and de Lemos, Rogerio and Malek, Sam and Weyns, Danny (2009) Reflecting on self-adaptive software systems. In: UNSPECIFIED. (doi:https://doi.org/10.1109/SEAMS.2009.5069072) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Andersson, Jesper and de Lemos, Rogério and Malek, Sam and Weyns, Danny (2009) Modeling Dimensions for Self-Adaptive Systems. In: Software Engineering for Self-Adaptive Systems. Lecture Notes in Computer Science/Programming and Software Engineering (5525). Springer, pp. 27-47. ISBN 978-3-642-02160-2. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Andreotti, Fernando and Phan, Huy and Cooray, Navin and Lo, Christine and Hu, Michele T.M. and De Vos, Maarten (2018) Multichannel Sleep Stage Classification and Transfer Learning using Convolutional Neural Networks. In: 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society: Learning from the Past, Looking to the Future. IEEE, Honolulu, Hawaii pp. 171-174. ISBN 978-1-5386-3646-6. (doi:https://doi.org/10.1109/EMBC.2018.8512214) (Full text available)
[img]
Preview

Andreotti, Fernando and Phan, Huy and De Vos, Maarten (2018) Visualising Convolutional Neural Network Decisions in Automatic Sleep Scoring. In: CEUR Workshop Proceedings. Joint Workshop on Artificial Intelligence in Health (AIH) 2018. CEUR Workshop Proceedings, Stockholm, Sweden pp. 70-81. (Full text available)
[img]
Preview

Andrews, S. and Palaniappan, Ramaswamy and Kamel, N. (2005) Single trial VEP source separation through sandwich spectral power ratio method. In: Proceedings of the 1st International Conference on Computers, Communications, & Signal Processing. IEEE ISBN 978-1-4244-0011-9. (doi:https://doi.org/10.1109/CCSP.2005.4977147) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Andrews, S. and Palaniappan, Ramaswamy and Kiong, L.C. and Mastorakis, N. (2009) Singular value decomposition based feature classification for single trial brain-computer interface design. In: ICCOMP'09 Proceedings of the WSEAES 13th international conference on Computers. ACM pp. 46-53. ISBN 978-960-474-099-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Andrews, Samraj and Kamel, nidal and Ngo, David and Palaniappan, Ramaswamy (2005) Appropriate normalisation for selective eigen rate method in separating principal components of VEP and EEG in BCI. Multimedia Cyberscape Journal, . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Andrews, Samraj and Palaniappan, Ramaswamy and Kamel, Nidal (2005) Extracting Single Trial Visual Evoked Potentials using Selective Eigen-Rate Principal Components. Proceedings of World Academy of Science, Engineering and Technology, 7 . pp. 330-333. ISSN 1307-6884. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ang, Li Ming and McLoughlin, Ian Vince (2012) Multitouch wall displays for informational interactive collaborative space. In: Multi-touch Wall Displays for Informational and Interactive Collaborative Space. Communications in Computer and Information Science . Springer, pp. 318-338. ISBN 978-3-642-29757-1. (doi:https://doi.org/10.1007/978-3-642-29758-8_17) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anggadjaja, Erwin and McLoughlin, Ian Vince (2013) Cross-layer MIMO-link exploiting packet re-routing mechanisms and adaptive modulation in diverse channel condition. In: Telecommunication Networks and Applications Conference (ATNAC), 2013 Australasian. Telecommunication Networks and Applications Conference (ATNAC), 2013 Australasian. IEEE pp. 148-153. ISBN 978-1-4799-1081-6. (doi:https://doi.org/10.1109/ATNAC.2013.6705372) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anggadjaja, Erwin and McLoughlin, Ian Vince (2010) Point-to-point OMNeT++ based simulation of reliable transmission using realistic segmentation and reassembly with error control. In: Proceedings - 2010 2nd International Conference on Advances in Computing, Control and Telecommunication Technologies, ACT 2010. IEEE pp. 125-128. ISBN 978-1-4244-8746-2. E-ISBN 978-0-7695-4269-0. (doi:https://doi.org/10.1109/ACT.2010.25) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anggadjaja, Erwin and McLoughlin, Ian Vince (2012) The use of OMNeT++ modelling in WSN. In: Modelling WSNs Using OMNeT++. IGI Global, p. 22. (doi:https://doi.org/10.4018/978-1-4666-0321-9.ch018) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anggadjaja, Erwin and McLoughlin, Ian Vince and Lau, Chiew Tong (2015) Cross-layer TCP/IP segmentation, re-routing and adaptive modulation techniques to exploit instantaneous BER variations on parallel subchannels. Australian Journal of Electrical and Electronics Engineering, . pp. 1-13. ISSN 1448-837X. E-ISSN 2205-362X. (doi:https://doi.org/10.1080/1448837X.2015.1093677) (Full text available)
[img]

Aniceto, Natália and Freitas, Alex A. and Bender, Andreas and Ghafourian, Taravat (2016) Simultaneous prediction of four ATP-binding cassette transporters substrates using multi-label QSAR. Molecular Informatics, 35 (10). pp. 514-528. ISSN 1868-1751. (doi:https://doi.org/10.1002/minf.201600036) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Aniceto, Natália and Freitas, Alex A. and Bender, Andreas and Ghafourian, Taravat (2016) A novel applicability domain technique for mapping predictive reliability across the chemical space of a QSAR: reliability-density neighbourhood. Journal of Cheminformatics, 8 (1). p. 69. ISSN 1758-2946. (doi:https://doi.org/10.1186/s13321-016-0182-y) (Full text available)
[img]
Preview

Ansaloni, Danilo and Kell, Stephen and Zheng, Yudi and Bulej, Walter and Truma (2013) Enabling Modularity and Re-use in Dynamic Program Analysis Tools for the Java Virtual Machine. In: ECOOP 2013 – Object-Oriented Programming 27th European Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 352-377. ISBN 978-3-642-39037-1. E-ISBN 978-3-642-39038-8. (doi:https://doi.org/10.1007/978-3-642-39038-8_15) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anshelevich, Elliot and Owens, Scott and Lamiraux, Florent and Kavraki, Lydia E. (2000) Deformable Volumes in Path Planning Applications. In: Proceedings - IEEE International Conference on Robotics and Automation. IEEE Press pp. 2290-2295. (doi:https://doi.org/10.1109/ROBOT.2000.846368) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Arapinis, Myrto and Cheval, Vincent and Delaune, Stéphanie (2015) Composing security protocols: from confidentiality to privacy. In: Focardi, Ricardo and Myers, Andrew, eds. Principles of Security and Trust. Lecture Notes in Computer Science. Springer Berlin Heidelberg, London, UK pp. 324-343. ISBN 978-3-662-46666-7. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img] [img]

Arief, Budi and Besnard, Denis (2003) Technical and Human Issues in Computer-Based Systems Security. Technical report. CS-TR-790 (Full text available)
[img]
Preview

Arief, Budi and Bin Adzmi, Mohd Azeem (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 2 - Defenders and Victims. IEEE Security & Privacy, 13 (2). pp. 84-88. ISSN 1540-7993. (doi:https://doi.org/10.1109/MSP.2015.44) (Full text available)
[img]
Preview

Arief, Budi and Bin Adzmi, Mohd Azeem and Gross, Thomas (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 1 - Attackers. IEEE Security & Privacy, 13 (1). pp. 71-76. ISSN 1540-7993. (doi:https://doi.org/10.1109/MSP.2015.19) (Full text available)
[img]
Preview

Arief, Budi and Blythe, Phil and Fairchild, Richard and Selvarajah, Kirusnapillai and Tully, Alan (2008) Integrating Smartdust into Intelligent Transportation System. In: 10th International Conference on Application of Advanced Technologies in Transportation (AATT 2008), 27-31 May 2008, Athens, Greece. (Full text available)
[img]
Preview

Arief, Budi and Bosio, Diana and Gacek, Cristina and Rouncefield, Mark (2002) Dependability Issues in Open Source Software - DIRC Project Activity 5 Final Report. Technical report. CS-TR-760 (Full text available)
[img]
Preview

Arief, Budi and Coleman, Joey and Greathead, David (2010) How Paranoid Are You?: Issues in Location Information of Ambient Systems. Technical report. CS-TR-1219 (Full text available)
[img]
Preview

Arief, Budi and Coopamootoo, Kovila P.L. and Emms, Martin and van Moorsel, Aad (2014) Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse. In: WPES '14 Proceedings of the 13th Workshop on Privacy in the Electronic Society. WPES '14. ACM pp. 201-204. ISBN 978-1-4503-3148-7. (doi:https://doi.org/10.1145/2665943.2665965) (Full text available)
[img]
Preview

Arief, Budi and Gacek, Cristina and Lawrie, Tony (2001) Software Architectures and Open Source Software – Where can Research Leverage the Most? In: ICSE '01 Proceedings of the 23rd International Conference on Software Engineering. ACM pp. 3-5. ISBN 0-7695-1050-7. (Full text available)
[img]
Preview

Arief, Budi and Greathead, David and Coventry, Lynne and van Moorsel, Aad (2011) Towards the Implementation of an Internet-based Neighbourhood Watch Scheme. In: 3rd International Conference on Computational Aspects of Social Networks (CASoN), 19-22 October 2011, Salamanca, Spain. (Full text available)
[img]
Preview

Arief, Budi and Iliasov, Alexei and Romanovsky, Alexander (2007) On developing open mobile fault tolerant agent systems. In: Choren, R. and Garcia, A. and Giese, H. and Leung, H.-f. and Lucena, C. and Romanovsky, A., eds. Software Engineering for Multi-Agent Systems V. Lecture Notes in Computer Science . Springer, Shanghai, pp. 21-40. ISBN 978-3-540-73130-6. (doi:https://doi.org/10.1007/978-3-540-73131-3_2) (Full text available)
[img]
Preview

Arief, Budi and Iliasov, Alexei and Romanovsky, Alexander (2006) On using the CAMA framework for developing open mobile fault tolerant agent systems. In: Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems. pp. 29-36. ISBN 978-1-59593-395-9. (doi:https://doi.org/10.1145/1138063.1138070) (Full text available)
[img]
Preview

Arief, Budi and Iliasov, Alexei and Romanovsky, Alexander (2007) Rigorous Development of Ambient Campus Applications that can Recover from Errors. In: Workshop on Methods, Models and Tools for Fault-Tolerance (MeMoT 2007), at the International Conference on Integrated Formal Methods 2007 (IFM 2007), 3 July 2007. (Full text available)
[img]
Preview

Arief, Budi and Little, Mark and Shrivastava, Santosh and Speirs, Neil and Wheater, Stuart (1999) Specifying distributed system services. British Telecom technology journal, 17 (2). pp. 126-136. ISSN 0265-0193. (doi:https://doi.org/10.1023/A:1009650219559) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Arief, Budi and Speirs, Neil (1999) Automatic Generation of Distributed System Simulations from UML. In: 13th European Simulation Multiconference (ESM'99), 1-4 June, 1999, Warsaw, Poland. (Full text available)
[img]
Preview

Arief, Budi and Speirs, Neil (1999) Simulation Generation from UML Like Specifications. In: IASTED Applied Modelling and Simulation (AMS'99), Cairns, Australia. (Full text available)
[img]
Preview

Arief, Budi and Speirs, Neil (2000) A UML tool for an automatic generation of simulation programs. In: WOSP '00 Proceedings of the 2nd international workshop on Software and performance. pp. 71-76. ISBN 1-58113-195-X. (doi:https://doi.org/10.1145/350391.350408) (Full text available)
[img]
Preview

Arief, Budi and von Arnim, Axel (2008) TRACKSS approach to improving road safety through sensors collaboration on vehicle and in infrastructure. In: Vehicular Technology Conference, 2008. VTC 2008-Fall. IEEE 68th. IEEE ISBN 978-1-4244-1722-3. (doi:https://doi.org/10.1109/VETECF.2008.439) (Full text available)
[img]
Preview

Armas Vega, Esteban and Sandoval Orozco, Ana and García Villalba, Luis and Hernandez-Castro, Julio C. (2018) Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns. Sensors, 18 (10). p. 3372. ISSN 1424-8220. (doi:https://doi.org/10.3390/s18103372) (Full text available)
[img]
Preview

Arumugam, M.S. and Rao, M.V.C. and Palaniappan, Ramaswamy (2005) New hybrid genetic operators for real coded genetic algorithm to compute optimal control of a class of hybrid systems. Applied Soft Computing, 6 (1). pp. 38-52. ISSN 1568-4946. (doi:https://doi.org/10.1016/j.asoc.2004.11.001) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Asensio-Cubero, J. and Gan, J.Q. and Palaniappan, Ramaswamy (2012) Extracting common spatial patterns based on wavelet lifting for brain computer interface design. In: 2012 4th Computer Science and Electronic Engineering Conference (CEEC). IEEE pp. 160-163. ISBN 978-1-4673-2666-7. (doi:https://doi.org/10.1109/CEEC.2012.6375397) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Asensio-Cubero, J. and Gan, J.Q. and Palaniappan, Ramaswamy (2014) Multiresolution analysis of an information based EEG graph representation for motor imagery brain computer interfaces. In: PhyCS 2014 - Proceedings of the International Conference on Physiological Computing Systems. SciTePress pp. 5-12. ISBN 978-989-758-006-2. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Asghar, Hassan Jameel and Steinfeld, Ron and Li, Shujun and Kaafa, Mohamed Ali and Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. (doi:https://doi.org/10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Asirvadam, Vijanth S. and McLoone, Sean F. and Palaniappan, Ramaswamy (2008) Bio-Signal Identification using Simple Growing RBF-Network (OLACA). In: Icias 2007: International Conference on Intelligent & Advanced Systems, Proceedings. IEEE pp. 263-267. ISBN 978-1-4244-1355-3. (doi:https://doi.org/10.1109/ICIAS.2007.4658387) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Aslan, Ça?r? B. and Sa?lam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of 9th International Conference on Social Media & Society. ACM ISBN 978-1-4503-6334-1. (doi:https://doi.org/10.1145/3217804.3217919) (Full text available)
[img]
Preview

Augusto, Juan Carlos and Gomez, Rodolfo (2002) A Temporal Logic View of Paradigm Specifications. In: Proceedings of 14th. International Conference on Software Engineering and Knowledge Engineering (SEKE'02). ACM, New York pp. 497-503. ISBN 1-58113-556-4. (doi:http://doi.acm.org/10.1145/568760.568847) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Aumayr, Dominik and Marr, Stefan and Béra, Clément and Gonzalez Boix, Elisa and Mössenböck, Hanspeter (2018) Efficient and Deterministic Record & Replay for Actor Languages. In: Proceedings of the 15th International Conference on Managed Languages and Runtimes. (doi:https://doi.org/10.1145/3237009.3237015) (Full text available)
[img]
Preview

Avoine, Gildas and Beaujeant, Antonin and Hernandez-Castro, Julio C. and Demay, Louis and Teuwen, Philippe (2016) A Survey of Security and Privacy Issues in ePassport Protocols. ACM Computing Surveys, 48 (3). pp. 1-37. ISSN 0360-0300. (doi:https://doi.org/10.1145/2825026) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Axon, Louise M. and Alahmadi, Bushra and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2018) Sonification in security operations centres: what do security practitioners think? In: Proceedings of the 2018 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). Internet Society ISBN 1-891562-53-3. (doi:https://doi.org/10.14722/usec.2018.23024) (Full text available)
[img]
Preview

Axon, Louise and Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. (2016) Reflecting on the Use of Sonification for Network Monitoring. In: ThinkMind. IARIA pp. 254-261. ISBN 978-1-61208-493-0. (Full text available)
[img]
Preview

Axon, Louise and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie (2017) A Formalised Approach to Designing Sonification Systems for Network-Security Monitoring. International Journal on Advances in Security, 10 . pp. 26-47. ISSN 1942-2636. (Full text available)
[img]
Preview

Ayara, Modupe (2005) An Immune-Inspired Solution for Adaptable Error Detection in Embedded Systems. Doctor of Philosophy (PhD) thesis, Computing Laboratory. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ayara, Modupe and Timmis, Jon and de Lemos, Rogerio and Forrest, Simon (2005) Immunising Automated Teller Machines. In: 4th International Conference in Artificial Immune Systems (ICARIS 2005), August 2005, Banff, Canada. (doi:https://doi.org/10.1007/11536444_31) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ayara, Modupe and Timmis, Jon and de Lemos, Rogério and de Castro, Leandro N. and Duncan, Ross (2003) Tolerating Faults in Embedded Systems Based on Artificial Immune Systems. In: Fast Abstracts Supplement of the 4th European Dependable Computing Conference (EDCC-4). Lecture Notes in Computer Science. pp. 27-28. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Azmat, Freeha and Bocchi, Laura and Fiadeiro, José Luiz (2011) Early Model-Analysis of Logistics Systems. In: Service-Oriented Computing. ICSOC 2010 International Workshops, PAASC, WESOA, SEE, and SOC-LOG. Lecture Notes in Computer Science, 6568. Springer pp. 225-236. ISBN 978-3-642-19393-4. E-ISBN 978-3-642-19394-1. (doi:https://doi.org/10.1007/978-3-642-19394-1_25) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

B

Bada, Maria and Nurse, Jason R. C. (2019) Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs). Information and Computer Security, . ISSN 2056-4961. (In press) (doi:https://doi.org/10.1108/ICS-07-2018-0080) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Bada, Maria and Sasse, Angela and Nurse, Jason R. C. (2015) Cyber Security Awareness Campaigns: Why do they fail to change behaviour? In: International Conference on Cyber Security for Sustainable Society. (Full text available)
[img]
Preview

Baghaei, N and McLoughlin, Ian Vince (2004) Channel estimation complexity reduction using caching. In: , Emerging Technologies: Frontiers of Mobile and Wireless Communication, 2004. Proceedings of the IEEE 6th Circuits and Systems Symposium on. IEEE pp. 209-212. ISBN 0-7803-7938-1. (doi:https://doi.org/10.1109/CASSET.2004.1322956) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Baghaie, A and Kuo, S and McLoughlin, Ian Vince (2004) FPGA implementation of space-time block coding systems. In: , Emerging Technologies: Frontiers of Mobile and Wireless Communication, 2004. Proceedings of the IEEE 6th Circuits and Systems Symposium on. pp. 591-594. ISBN 0-7803-7938-1. (doi:https://doi.org/10.1109/CASSET.2004.1321957) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Baghaie, M A and McLoughlin, Ian Vince and Martin, P A and Mehrotra, K and Taylor, D P (2006) Transmit Antenna Selection for UHF MIMO Linking. In: , Spring IEEE Vehicular Technology Conference. IEEE pp. 2640-2644. ISBN 0-7803-9391-0. (doi:https://doi.org/10.1109/VETECS.2006.1683346) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bailey, Christopher J. (2012) Application of Self-Adaptive techniques to federated authorization models. In: 2012 International Conference on Software Engineering (ICSE 2012) Doctoral Symposium. , 2012 International Conference on Software Engineering (ICSE 2012) Doctoral Symposium pp. 1495-1498. (doi:https://doi.org/10.1109/ICSE.2012.6227053) (Full text available)
[img]
Preview

Bailey, Christopher and Chadwick, David W. and de Lemos, Rogerio (2014) Self-adaptive federated authorization infrastructures. Journal of Computer and System Sciences, 80 (5). pp. 935-952. ISSN 0022-0000. (doi:https://doi.org/10.1016/j.jcss.2014.02.003) (Full text available)
[img]
Preview

Bailey, Christopher and Chadwick, David W. and de Lemos, Rogerio and Siu, Kristy W. S. (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Lectures Notes in Computer Science . Springer, Berlin, Germany, pp. 100-111. ISBN 978-3-642-38997-9. E-ISBN 978-3-642-38998-6. (doi:https://doi.org/10.1007/978-3-642-38998-6_14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bailey, Christopher and Chadwick, David W and de Lemos, Rogério and Siu, Kristy WS (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet. Springer Berlin Heidelberg, pp. 100-111. (Full text available)
[img]
Preview

Bailey, Christopher and Montrieux, Lionel and de Lemos, Rogerio and Yu, Yijun and Wermelinger, Michel (2014) Run-time Generation, Transformation, and Verification of Access Control Models for Self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. (Full text available)
[img]
Preview

Baker, Jason and Cunei, Antonio and Kalibera, Tomas and Pizlo, Filip and Vitek, Jan (2009) Accurate garbage collection in uncooperative environments revisited. Concurrency and Computation: Practice and Experience, 21 (12). pp. 182-196. (doi:https://doi.org/10.1002/cpe.1391) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Baker, Robert (2017) A Method for Graph Drawing Utilising Patterns. Doctor of Philosophy (PhD) thesis, University of Kent,. (Full text available)
[img]
Preview

Bakkers, A.W.P. and Bruis, R. and Roebbers, Herman W. and Schaller, Nan C. and Schwirtz, M.H. and Sunder, J.P.E. and Wijbrans, K.C.J. and Welch, Peter H. (1993) Training for Transputer Technologies. In: Parallel Processing in Education. Hungarian Academic of Sciences (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ball, Rudi and Grant, James and So, Jonathan and Spurrett, Victoria and de Lemos, Rogerio (2007) Dependable and Secure Distributed Storage System for Ad Hoc Networks. In: Sixth International Conference on Ad-Hoc Networks and Wireless (Ad Hoc NOW 2007), September 2007, Morelia, Mexico. (doi:https://doi.org/10.1007/978-3-540-74823-6_11) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Balli, T. and Palaniappan, Ramaswamy (2008) EEG time series analysis with exponential autoregressive modelling. In: 2008 Canadian Conference on Electrical and Computer Engineering. IEEE pp. 485-488. ISBN 978-1-4244-1643-1. (doi:https://doi.org/10.1109/CCECE.2008.4564581) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Balli, T. and Palaniappan, Ramaswamy (2009) A combined linear & nonlinear approach for classification of epileptic EEG signals. In: Proceedings of the 4th International IEEE/EMBS Conference on Neural Engineering. IEEE pp. 714-717. ISBN 978-1-4244-2073-5. (doi:https://doi.org/10.1109/NER.2009.5109396) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Balli, T. and Palaniappan, Ramaswamy and Bhattacharya, J. (2009) Minimising prediction error for optimal nonlinear modelling of EEG signals using genetic algorithm. In: Proceedings of the 4th International IEEE/EMBS Conference on Neural Engineering. IEEE pp. 363-366. ISBN 978-1-4244-2073-5. (doi:https://doi.org/10.1109/NER.2009.5109308) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Balli, T. and Palaniappan, Ramaswamy and Mandic, D.P. (2007) On the linearity/non-linearity of mental activity EEG for brain-computer interface design. In: IFMBE Proceedings. Springer pp. 451-454. ISBN 978-3-540-68016-1. (doi:https://doi.org/10.1007/978-3-540-68017-8_114) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Balli, Tugce and Palaniappan, Ramaswamy (2009) A Combined Linear & Nonlinear Approach for Classification of Epileptic EEG Signals. In: Proceedings of the 4th International IEEE/EMBS Conference on Neural Engineering. IEEE pp. 707-710. ISBN 978-1-4244-2072-8. (doi:https://doi.org/10.1109/NER.2009.5109396) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Balli, Tugce and Palaniappan, Ramaswamy (2009) Nonlinear Approach to Brain Signal Modeling. In: Encyclopedia of Information Science and Technology. IGI Global, pp. 2834-2839. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barardo, Diogo G. and Newby, Danielle and Thornton, Daniel and Ghafourian, Taravat and Pedro de Magalhães, João and Freitas, Alex A. (2017) Machine learning for predicting lifespan-extending chemical compounds. Aging, 9 (7). pp. 1721-1737. ISSN 1945-4589. (doi:https://doi.org/10.18632/aging.101264) (Full text available)
[img]
Preview

Bareham, Corinne and Allanson, Judith and Roberts, Neil and Hutchinson, Peter and Pickard, John D. and Menon, David K. and Chennu, Srivas (2018) Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field. Longitudinal Bedside Assessments of Brain Networks in Disorders of Consciousness: Case Reports from the Field, . ISSN 1664-2295. E-ISSN 1664-2295. (doi:https://doi.org/10.3389/fneur.2018.00676) (Full text available)
[img]
Preview

Barnes, David J. and Brown, Peter J., eds. (1986) Software engineering 86. IEE Computing Series No 6/Cm006 . P. Peregrinus on behalf of the Institution of Electrical Engineers, 433 pp. ISBN 978-0-86341-082-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J. (2014) pgn-extract: A Portable Game Notation (PGN) Manipulator for Chess Games. University of Kent Web download. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J. and Bovey, John D. (1986) Managing command submission in a multiple-window environment. Software Engineering Journal, 1 (5). pp. 177-183. ISSN 0268-6961. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J. and Bovey, John D. and Brown, Peter J. and Siemon, HP (1985) Some UNIX tools to exploit a workstation,". In: Integrated Project Support Environments. Peter Peregrinus Ltd, p. 68. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J. and Chu, Dominique (2015) Guide to Simulation and Modeling for Biosciences. Simulation Foundations, Methods and Applications . Springer, 339 pp. ISBN 978-1-4471-6761-7. E-ISBN 978-1-4471-6762-4. (doi:https://doi.org/10.1007/978-1-4471-6762-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J. and Hopkins, Tim (2000) Improving the Quality of Scientific Software. In: First SIAM Conference on Computational Science and Engineering, September 2000, Washington, DC. (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J. and Kölling, Michael (2012) Objects First with Java - A Practical Introduction using BlueJ. Pearson Education, 560 pp. ISBN 978-0-13-283554-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, David J. and Russell, Mark T and Wheadon, Mark C (1988) Developing and adapting UNIX tools for workstations. In: EUUG Conference Proceedings. pp. 321-333. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, Frederick R.M. (2000) Blocking System Calls in KRoC/Linux. In: Welch, Peter H. and Bakkers, A.W.P., eds. Communicating Process Architectures 2000. Concurrent Systems Engineering Series, 58. IOS Press pp. 155-178. ISBN 1-58603-077-9. (Full text available)
[img]
Preview
[img]
Preview

Barnes, Frederick R.M. (2003) Dynamics and Pragmatics for High Performance Concurrency. Doctor of Philosophy (PhD) thesis, University of Kent at Canterbury. (Full text available)
[img]
Preview

Barnes, Frederick R.M. (2003) occwserv: An occam Web-Server. In: Broenink, Jan F. and Hilderink, Gerald H., eds. Communicating Process Architectures 2003. Concurrent Systems Engineering Series, 61. IOS Press, Amsterdam, The Netherlands pp. 251-268. ISBN 1-58603-381-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, Frederick R.M. (2001) tranx86 -- an Optimising ETC to IA32 Translator. In: Chalmers, Alan and Mirmehdi, Majid and Muller, Henk, eds. Communicating Process Architectures 2001. Concurrent Systems Engineering Series (59). IOS Press, Amsterdam, The Netherlands pp. 265-282. ISBN 1-58603-202-X. (Full text available)
[img]
Preview
[img]
Preview

Barnes, Frederick R.M. and Beuran, R. and Dobinson, R.W. and LeVine, M.J. and Martin, B. and Lokier, J. and Meirosu, C. (2002) Testing Ethernet Networks for the ATLAS Data Collection System. IEEE Transactions on Nuclear Science, 49 (2). pp. 516-520. ISSN 0018-9499. (doi:https://doi.org/10.1109/TNS.2002.1003791) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, Frederick R.M. and Jacobsen, Christian L. and Vinter, Brian (2003) RMoX: A Raw-Metal occam Experiment. In: Broenink, Jan F. and Hilderink, Gerald H., eds. Communicating Process Architectures 2003. Concurrent Systems Engineering Series, 61. IOS Press, Amsterdam, The Netherlands pp. 269-288. ISBN 1-58603-381-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, Frederick R.M. and Welch, Peter H. (2001) Mobile Data, Dynamic Allocation and Zero Aliasing: an occam Experiment. In: Communicating Process Architectures 2001. (Full text available)
[img]
Preview
[img]
Preview

Barnes, Frederick R.M. and Welch, Peter H. (2002) Prioritised Dynamic Communicating Processes: Part 1. In: Pascoe, James and Welch, Peter H. and Loader, Roger and Sunderam, Vaidy, eds. Communicating Process Architectures 2002. Concurrent Systems Engineering, 60. IOS Press, IOS Press, Amsterdam, The Netherlands pp. 321-352. ISBN 1-58603-268-2. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barnes, Frederick R.M. and Welch, Peter H. (2002) Prioritised Dynamic Communicating Processes: Part 2. In: Pascoe, James and Welch, Peter H. and Loader, Roger and Sunde, Vaidy, eds. Communicating Process Architectures 2002. Concurrent Systems Engineering, 60. IOS Press, IOS Press, Amsterdam, The Netherlands pp. 353-370. ISBN 1-58603-268-2. (Full text available)
[img]
Preview
[img]
Preview

Barnes, Frederick R.M. and Welch, Peter H. (2003) Prioritised Dynamic Communicating and Mobile Processes. IEE Proceedings: Software, 150 (2). pp. 121-136. ISSN 1462-5970. (doi:https://doi.org/10.1049/ip-sen:20030182) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bartoletti, M. and Lange, Julien and Scalas, A. and Zunino, R. (2014) Choreographies in the wild. Science of Computer Programming, 109 . pp. 36-60. ISSN 0167-6423. (doi:https://doi.org/10.1016/j.scico.2014.11.015) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Basu, Anirban and Vaidya, Jaideep and Kikuchi, Hiroaki and Dimitrakos, Theo and Nair, Srijith K. (2012) Privacy preserving collaborative filtering for SaaS enabling PaaS clouds. Journal of Cloud Computing: Advances, Systems and Applications, 1 (1). p. 8. ISSN 2192-113X. (doi:https://doi.org/10.1186/2192-113X-1-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Batty, Mark (2017) Compositional relaxed concurrency. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 375 (2104). ISSN 1364-503X. E-ISSN 1471-2962. (doi:https://doi.org/10.1098/rsta.2015.0406) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

Beadle, Lawrence (2009) Semantic and Structural Analysis of Genetic Programming. Doctor of Philosophy (PhD) thesis, Computing. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Beckett, David J. (1997) 30% Accessible - A Survey of the UK Wide Web. In: Genesereth, Michael.R. and Patterson, Anna, eds. Proceedings of the Sixth World Wide Web Conference. Elsevier, Holland pp. 1367-1375. (doi:https://doi.org/10.1016/S0169-7552(97)00059-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Beckett, David J. (1995) IAFA Templates in use as Internet Metadata. World Wide Web Journal -- Proceedings of the Fourth International World-Wide Web Conference, 1 (1). pp. 135-143. ISSN 1085-2301. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Beckett, David J. (1998) Polishing Your Searches. Ariadne, 1 (16). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Beckett, David J. and Smith, Neil (1996) The ACademic DireCtory - AC/DC. Technical report. UKC, University of Kent, Canterbury, UK (Full text available)
[img]
Preview
[img]
Preview

Beckett, David J. and Welch, Peter H. (1996) Emulating a secure multicasting bus using occam 2.1. In: Oneill, B.C. and Transputer User, Grp, eds. Proceedings of the 19th world occam and transputer user group technical meeting on Parallel processing developments. I O S Press pp. 59-73. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Beckett, David J. and Welch, Peter H. (1996) A Strict occam Design Tool. In: Jesshope, C.R. and Shafarenko, A., eds. Proceedings of UK Parallel ''96. Springer-Verlag, London, Guildford, UK pp. 53-69. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bekhet, Saddam and Ahmed, Amr and Altadmri, Amjad and Hunter, Andrew (2015) Compressed video matching: Frame-to-frame revisited. Multimedia Tools and Applications, . pp. 1-16. ISSN 1380-7501. E-ISSN 1573-7721. (doi:https://doi.org/10.1007/s11042-015-2887-8) (Full text available)
[img]
Preview

Beller-Hann, Ildiko (1995) Central-Asia Reader - the Rediscovery of History - PaKSOY,HB. American Ethnologist, 22 (3). pp. 650-651. ISSN 0094-0496. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bello Orgaz, Gema and Hernandez-Castro, Julio C. and Camacho, David (2015) A Survey of Social Web Mining Applications for Disease Outbreak Detection. In: UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Benigni, F. and Brogi, A. and Buchholz, J-L. and Jacquet, J-M. and Lange, J. and Popescu, R. (2008) Secure P2P Programming on Top of Tuple Spaces. In: 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. pp. 54-59. ISBN 978-0-7695-3315-5. (doi:https://doi.org/10.1109/WETICE.2008.29) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Benoy, Patricia Mary (2002) Polyhedral Domains for Abstract Interpretation in Logic Programming. Doctor of Philosophy (PhD) thesis, University of Kent, Canterbury. (Full text available)
[img]
Preview
[img]
Preview

Berry, Michael (2015) The Design and Implementation of a Notional Machine for teaching Introductory Programming. Doctor of Philosophy (PhD) thesis, University of Kent. (Full text available)
[img]
Preview

Berry, Michael and Kölling, Michael (2014) The State Of Play: A Notional Machine for Learning Programming. In: Proceedings of the 19th Annual Conference on Innovation and Technology in Computer Science Education. (Full text available)
[img]
Preview

Berry, Michael and Kölling, Michael (2013) The design and implementation of a notional machine for teaching introductory programming. In: WiPSE '13. Proceedings of the 8th Workshop in Primary and Secondary Computing Education. ACM, New York pp. 25-28. ISBN 978-1-4503-2455-7. (doi:https://doi.org/10.1145/2532748.2532765) (Full text available)
[img]
Preview

Besnard, Denis and Arief, Budi (2003) Computer security impaired by legal users. Technical report. CS-TR-794 (Full text available)
[img]
Preview

Besnard, Denis and Arief, Budi (2004) Computer security impaired by legitimate users. Computers and Security, 23 (3). pp. 253-264. ISSN 0167-4048. (doi:https://doi.org/10.1016/j.cose.2003.09.002) (Full text available)
[img]
Preview

Beukema, Steve and Gonzalez-Lara, Laura E. and Finoia, Paola and Kamau, Evelyn and Allanson, Judith and Chennu, Srivas and Gibson, Raechelle M. and Pickard, John D. and Owen, Adrian M. and Cruse, Damian (2016) A hierarchy of event-related potential markers of auditory processing in disorders of consciousness. NeuroImage: Clinical, 12 . pp. 359-371. ISSN 2213-1582. (doi:https://doi.org/10.1016/j.nicl.2016.08.003) (Full text available)
[img]
Preview

Blommestijn, R. and Lange, Julien and Taylor, C. and Winton, A. (2009) Proximity-1: Simulating the CCSDS Proximity-1 Protocol for ExoMars. In: Ouwehand, L., ed. DAta Systems In Aerospace (DASIA). Proceedings of DASIA 2009 Data Systems in Aerospace. ESA Special Publication. ISBN 978-92-9221-233-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, L. and Lange, Julien and Tuosto, E. (2012) Three algorithms and a methodology for amending contracts for choreographies. Scientific Annals of Computer Science, 22 (1). pp. 61-104. ISSN 1843-8121. (doi:https://doi.org/10.7561/SACS.2012.1.61) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, L. and Lange, Julien and Yoshida, N. (2015) Meeting deadlines together. In: Aceto, Luca and de Frutos Escrig, David, eds. Leibniz International Proceedings in Informatics, LIPIcs. 26th International Conference on Concurrency Theory (CONCUR 2015). Schloss Dagstuhl - Leibniz-Zentrum für Informatik pp. 283-296. ISBN 978-3-939897-91-0. (doi:https://doi.org/10.4230/LIPIcs.CONCUR.2015.283) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura (2017) Monitoring Networks through Multiparty Session Types. Theoretical Computer Science, 669 . pp. 33-58. ISSN 0304-3975. (doi:https://doi.org/10.1016/j.tcs.2017.02.009) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]
Preview

Bocchi, Laura and Chen, Tzu-Chun and Demangeon, Romain and Honda, Kohei and Yoshida, Nobuko (2013) Monitoring Networks through Multiparty Session Types. In: Formal Techniques for Distributed Systems Joint IFIP WG 6.1 International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 50-65. ISBN 978-3-642-38591-9. E-ISBN 978-3-642-38592-6. (doi:https://doi.org/10.1007/978-3-642-38592-6_5) (Full text available)
[img]
Preview

Bocchi, Laura and Ciancarini, Paolo (2006) On the Impact of Formal Methods in the SOA. Electronic Notes in Theoretical Computer Science, 160 . pp. 113-126. ISSN 1571-0661. (doi:https://doi.org/10.1016/j.entcs.2006.05.018) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura and Demangeon, Romain (2013) Embedding Session Types in HML. In: Electronic Proceedings in Theoretical Computer Science. pp. 53-62. (doi:https://doi.org/10.4204/EPTCS.137.5) (Full text available)
[img]
Preview

Bocchi, Laura and Fiadeiro, José Luiz and Lapadula, Alessandro and Pugliese, Rosario and Tiezzi, Francesco (2009) From Architectural to Behavioural Specification of Services. Electronic Notes in Theoretical Computer Science, 253 (1). pp. 3-21. ISSN 1571-0661. (doi:https://doi.org/10.1016/j.entcs.2009.09.025) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura and Gorton, Stephen and Reiff-Marganiec, Stephan (2008) Engineering Service Oriented Applications: From StPowla Processes to SRML Models. In: Fundamental Approaches to Software Engineering. 11th International Conference, FASE 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings. Lecture Notes in Computer Science, 4961. Springer pp. 163-178. ISBN 978-3-540-78742-6. E-ISBN 978-3-540-78743-3. (doi:https://doi.org/10.1007/978-3-540-78743-3_13) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura and Hong, Yi and Lopes, Antónia and Fiadeiro, José Luiz (2008) From BPEL to SRML: A Formal Transformational Approach. In: Web Services and Formal Methods. 4th International Workshop, WS-FM 2007 Proceedings. Lecture Notes in Computer Science, 4937. Springer pp. 92-107. ISBN 978-3-540-79229-1. E-ISBN 978-3-540-79230-7. (doi:https://doi.org/10.1007/978-3-540-79230-7_7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura and Lange, Julien and Tuosto, E. (2011) Amending Contracts for Choreographies. In: Electronic Proceedings in Theoretical Computer Science. Proceedings Fourth Interaction and Concurrency Experience. pp. 111-129. (doi:https://doi.org/10.4204/EPTCS.59.10) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura and Lucchi, Roberto (2006) Atomic Commit and Negotiation in Service Oriented Computing. In: Coordination Models and Languages. 8th International Conference, COORDINATION 2006, Proceedings. Lecture Notes in Computer Science, 4038. Springer pp. 16-27. ISBN 978-3-540-34694-4. E-ISBN 978-3-540-34695-1. (doi:https://doi.org/10.1007/11767954_2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura and Mahmud, Hoger and Rebay-Salisbury, Katharina and Tuosto, Emilio (2013) Virtual models for archaeology. Archeologia e Calcolatori, 24 (1). pp. 305-324. ISSN 1120-6861. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura and Melgratti, Hernán (2014) On the Behaviour of General-Purpose Applications on Cloud Storages. In: Web Services and Formal Methods 10th International Workshop. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 29-47. ISBN 978-3-319-08259-2. E-ISBN 978-3-319-08260-8. (doi:https://doi.org/10.1007/978-3-319-08260-8_3) (Full text available)
[img]
Preview

Bocchi, Laura and Melgratti, Hernán and Tuosto, Emilio (2014) Resolving Non-Determinism in Choreographies. In: Programming Languages and Systems 23rd European Symposium on Programming. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 493-512. ISBN 978-3-642-54832-1. E-ISBN 978-3-642-54833-8. (doi:https://doi.org/10.1007/978-3-642-54833-8_26) (Full text available)
[img]
Preview

Bocchi, Laura and Murgia, Maurizio and Vasconcelos, Vasco Thudichum and Yoshida, Nobuko (2019) Asynchronous timed session types: from duality to time-sensitive processes. In: Programming Languages and Systems. Springer, pp. 583-610. ISBN 978-3-030-17183-4. E-ISBN 978-3-030-17184-1. (doi:https://doi.org/10.1007/978-3-030-17184-1_21) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

Bocchi, Laura and Tuosto, Emilio (2015) Attribute-based transactions in service oriented computing. Mathematical Structures in Computer Science, 25 (3). pp. 619-665. ISSN 0960-1295. (doi:https://doi.org/10.1017/S0960129512000904) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura and Tuosto, Emilio (2010) A Java Inspired Semantics for Transactions in SOC. In: 5th International Symposium on Trustworthy Global Computing (TGC). Lecture Notes in Computer Science, 6084. Springer pp. 120-134. ISBN 978-3-642-15639-7. E-ISBN 978-3-642-15640-3. (doi:https://doi.org/10.1007/978-3-642-15640-3_9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura and Tuosto, Emilio (2010) Testing Attribute-Based Transactions in SOC. In: International Conference on Formal Techniques for Distributed Systems (FORTE). Lecture Notes in Computer Science, 6117. Springer pp. 87-94. (doi:https://doi.org/10.1007/978-3-642-13464-7_8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bocchi, Laura and Yang, Weizhen and Yoshida, Nobuko (2014) Timed Multiparty Session Types. In: Baldan, Paolo and Gorla, Daniele, eds. CONCUR 2014 – Concurrency Theory 25th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 419-434. ISBN 978-3-662-44583-9. E-ISBN 978-3-662-44584-6. (doi:https://doi.org/10.1007/978-3-662-44584-6_29) (Full text available)
[img]
Preview

Bocchi, Laura and Yoshida, Nobuko and Lange, Julien (2015) Meeting Deadlines Together. In: Aceto, Luca and de Frutos-Escrig, David, eds. International Conference on Concurrency Theory (CONCUR). LIPIcs, 42. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik pp. 283-296. ISBN 978-3-939897-91-0. (doi:https://doi.org/10.4230/LIPIcs.CONCUR.2015.283) (Full text available)
[img]
Preview

Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) FoI reveals cynical logic that compromises NHS data privacy. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2015) Google’s lip service to privacy cannot conceal that its profits rely on your data. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) How to commit a bank robbery (or stop one) using the internet. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) Introducing extra operations in refinement. Formal Aspects of Computing, 26 (2). pp. 305-317. ISSN 0934-5043. (doi:https://doi.org/10.1007/s00165-012-0266-z) (Full text available)
[img]
Preview

Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2015) NHS care.data still leaks like a sinking ship, but ministers set sail regardless. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) Outdated laws put your health data in jeopardy. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2015) Patients will resist medical record sharing if NHS bosses ignore their privacy fears. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2015) Privacy watchdog takes first step against those undermining right to be forgotten. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) Time for some truth about who is feeding off our NHS data. . The Conversation Internet only. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Boiten, Eerke Albert (2013) The UK government is working in a Snowden-free bubble. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2015) We are right to fear spy ‘database of everything’ if even politicians know little about it. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) Your NHS data is completely anonymous – until it isn’t. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) iPhone hack shows security isn’t at our fingertips just yet. . Scientific American Internet only. (Full text available)
[img]

Boiten, Eerke Albert and Derrick, John and Bowman, Howard and Steen, Maarten (1999) Constructive consistency checking for partial specification in Z. Science of Computer Programming, 35 (1). pp. 29-75. ISSN 0167-6423. (doi:https://doi.org/10.1016/S0167-6423(99)00006-4) (Full text available)
[img]
Preview
[img]
Preview

Boiten, Eerke Albert and Jacob, Jeremy (2014) Sealed containers in Z. In: Ait Ameur, Y. and Schewe, K.-D., eds. Abstract State Machines, Alloy, B, TLA, VDM, and Z 4th International Conference. Lecture Notes in Computer Science, 8477 . Springer, Berlin, Germany, pp. 136-141. ISBN 978-3-662-43651-6. E-ISBN 978-3-662-43652-3. (doi:https://doi.org/10.1007/978-3-662-43652-3_12) (Full text available)
[img]
Preview

Bolla, Damiano (1994) IPP Routing Architecture. Technical report. versity of Kent, Computing Laboratory, University of Kent, Canterbury, UK (Full text available)
[img]
Preview
[img]
Preview

Bonetta, Daniele and Salucci, Luca and Marr, Stefan and Binder, Walter (2016) GEMs: Shared-memory Parallel Programming for Node.js. In: ACM SIGPLAN Notices. OOPSLA 2016 Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications. ACM pp. 531-547. ISBN 978-1-4503-4444-9. (doi:https://doi.org/10.1145/2983990.2984039) (Full text available)
[img]
Preview

Boudeville, Olivier and Cesarini, Francesco and Chechina, Natalia and Lundin, Kenneth and Papaspyrou, Nikolaos and Sagonas, Konstantinos and Thompson, Simon and Trinder, Phil and Wiger, Ulf (2013) RELEASE: A High-level Paradigm for Reliable Large-scale Server Software. In: Trends in Functional Programming 13th International Symposium. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 263-278. ISBN 978-3-642-40446-7. E-ISBN 978-3-642-40447-4. (doi:https://doi.org/10.1007/978-3-642-40447-4_17) (Full text available)
[img]
Preview

Bouraoui, Zied and Jameel, Shoaib and Schockaert, Steven (2018) Relation Induction in Word Embeddings Revisited. In: The 27th International Conference on Computational Linguistics (COLING 2018). pp. 1627-1637. ISBN 978-1-948087-50-6. (Full text available)
[img]
Preview

Bouraoui, Zied and Shoaib, Jameel and Schockaert, Steven (2017) Inductive Reasoning about Ontologies Using Conceptual Spaces. In: AAAI. AAAI (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Bovey, John D. (1996) Event-based personal retrieval. Journal of Information Science, 22 (5). pp. 357-366. ISSN 0165-5515. (doi:https://doi.org/10.1177/016555159602200504) (Full text available)
[img]
Preview
[img]
Preview

Bovey, John D. (1993) A graphical retrieval-system. Journal of Information Science, 19 (3). pp. 179-187. ISSN 0165-5515. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard and Boiten, Eerke Albert and Derrick, John and Steen, Maarten (1999) Strategies for consistency checking based on unification. Science of Computer Programming, 33 (3). pp. 261-298. ISSN 0167-6423. (doi:https://doi.org/10.1016/S0167-6423(98)00017-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard and Derrick, John and Linington, Peter F. and Steen, Maarten (1996) Cross-viewpoint consistency in open distributed processing. Software Engineering Journal, 11 (1). pp. 44-57. ISSN 0268-6961. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard and Filetti, Marco and Alsufyani, Abdulmajeed and Janssen, Dirk P. and Su, Li (2014) Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough. PLoS ONE, 9 (3). e90595. ISSN 1932-6203. (doi:https://doi.org/10.1371/journal.pone.0090595) (Full text available)
[img]
Preview

Bowman, Maggie (1997) Development of a Technical Reports Service at the Higher Education National Software Archive in the UK. Program: Electronic Library and Information Systems, 31 (2). pp. 147-159. ISSN 0033-0337. (doi:https://doi.org/10.1108/EUM0000000006885) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bretschneider, T and Ramesh, B and Gupta, V and McLoughlin, Ian Vince (2004) Low-cost space-borne processing on a reconfigurable parallel architecture. Proceedings of the International Conference on Engineering of Reconfigurable Systems and Algorithms, . pp. 93-99. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bretschneider, Timo and Soo, David L H and McLoughlin, Ian Vince (2007) Proceedings of the 3rd Asian Space Conference, 21-23 March 2007, NTU@ one-north Campus, Singapore. School of Computer Engineering, Nanyang Technological University (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S. and de Lemos, Rogério and Martins, Eliane and Moraes, R. and Rubira, Cecilia M. F. (2009) Architectural-Based Validation of Fault-Tolerant Software. In: Proceedings of the Symposium on Dependable Computing, 2009. pp. 103-110. ISBN 978-1-4244-4678-0. (doi:https://doi.org/10.1109/LADC.2009.34) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S. and de Lemos, Rogério and Martins, Eliane and Rubira, Cecilia M. F. (2007) Architecture-centric Fault Tolerance with Exception Handling. In: Proceedings of the Third Latin-American Conference on Dependable Computing. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S. and de Lemos, Rogério and Rubira, Cecilia M. F. (2008) Architecting Fault Tolerance using Abstractions. In: Supplemental Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008) - Fast Abstracts. G28-G29. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S. and de Lemos, Rogério and Rubira, Cecilia M. F. (2008) Development of Fault-Tolerant Software Systems Based on Architectural Abstractions. In: Software Architecture. Lecture Notes in Computer Science, 5292. Springer pp. 131-147. ISBN 978-3-540-88029-5. (doi:https://doi.org/10.1007/978-3-540-88030-1_11) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S. and de Lemos, Rogério and Rubira, Cecilia M. F. (2008) Verification of Exception Control Flows and Handlers Based on Architectural Scenarios. In: High Assurance Systems Engineering (HASE) Symposium, 2008. pp. 177-186. ISBN 978-0-7695-3482-4. (doi:https://doi.org/10.1109/HASE.2008.11) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S. and de Lemos, Rogério and Rubira, Cecilia M. F. (2009) Verifying Architectural Variabilities in Software Fault Tolerance Techniques. In: Software Architecture, 2009 & European Conference on Software Architecture. WICSA/ECSA 2009. Joint Working IEEE/IFIP Conference on. pp. 231-240. ISBN 978-1-4244-4984-2. (doi:https://doi.org/10.1109/WICSA.2009.5290809) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brito, Patrick H. S. and de Lemos, Rogério and Rubira, Cecilia M. F. and Martins, Eliane (2009) Architecting Fault Tolerance with Exception Handling: Verification and Validation. Journal of Computer Science and Technology, 24 (2). pp. 212-237. ISSN 1000-9000. (doi:https://doi.org/10.1007/s11390-009-9219-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brostoff, Sacha and Sassea, M.Angela and Chadwick, David W. and Cunningham, James and Mbanaso, Uche and Otenko, Sassa (2004) RBAC What? Development of a Role-Based Access Control Policy Writing Tool for E-Scientists. In: Workshop on Grid Security Practice and Experience, Oxford, UK. pp. 835-856. (doi:https://doi.org/10.1002/spe.691) (Full text available)
[img] [img]
Preview

Brown, Heather (1997) Active Alice: Active Paper for Active Learning. In: Proceedings of ALT-C 97. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather (1993) Desktop Publishing. In: Ralston, Anthony and Reilly, Edwin D., eds. Encyclopedia of Computer Science. Van Nostrand Reinhold, pp. 426-429. ISBN 0-442-27679-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Cole, Fred C. (1992) Editing Structured Documents: Problems and Solutions. Electronic Publishing: Origination, Dissemination and Design, 5 (4). pp. 209-216. ISSN 0894-3982. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Cole, Fred C. (1993) ODA extensions for quality and flexibility. In: Evans, Cliff D. and Walker, Raymond S. and Meek, Brian L., eds. User Needs in Information Technology Standards. Computer Weekly Professional Series . Butterworth-Heinemann, pp. 148-160. ISBN 0-7506-1559-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Cole, Fred C. and Oxborrow, Elizabeth (1993) An Object-Oriented Toolkit for ODA and HyperODA. In: Proceedings of SigDoc'93. pp. 29-41. ISBN 0-89791-630-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Harding, Robert K. and Lay, Steve and Robinson, Peter and Sheppard, Dan and Watts, Richard (1998) Active Alice: Using Real Paper to Interact with Electronic Text. In: Hersch, Roger and Andre, Jacques and Brown, Heather, eds. Electronic Publishing, Artistic Imaging, and Digital Typography. Lecture Notes in Computer Science (1375). Springer-Verlag, pp. 407-419. ISBN 3-540-64298-6. (doi:https://doi.org/10.1007/BFb0053257) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Harding, Robert K. and Lay, Steve and Robinson, Peter and Sheppard, Dan and Watts, Richard (1998) Active Paper for Active Learning. ALT-J, 6 (1). pp. 95-101. ISSN 0968-7769. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Robinson, Peter (1999) Integrating Paper and Digital Documents. In: Vince, John A. and Earnshaw, Rae A., eds. Digital media: the future. Springer Verlag. ISBN 1-85233-246-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Utting, Ian (1992) Teaching Electronic Publishing to Computer Scientists. Electronic Publishing: Origination, Dissemination and Design, 5 (2). pp. 91-96. ISSN 0894-3982. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Utting, Ian (1992) Teaching Electronic Publishing to Computer Scientists. In: Andre, Jacques, ed. Teaching Electronic Publishing. Bigre pp. 97-105. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Wusteman, Judith (1996) Acrobat, Mosaic and Guide as Vehicles for Electronic Journals. In: Earnshaw, Rae A. and Vince, John A., eds. Digital Media and Electronic Publishing. Academic Press, pp. 65-89. ISBN 0-12-227756-2. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Wusteman, Judith (1995) Acrobat, Mosaic and Guide as vehicles for Electronic Journals. New Review of Information Networking, 1 . pp. 33-60. ISSN 1361-4576. (doi:https://doi.org/10.1080/13614579509516845) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Heather and Wusteman, Judith (1995) Electronic journals using Guide. In: Collier, Mel and Arnold, Kathryn, eds. Electronic Library and Visual Information Research: ELVIRA 2. pp. 92-106. ISBN 0-85142-354-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Neil C. C. and Altadmri, Amjad (2017) Novice Java Programming Mistakes: Large-Scale Data vs. Educator Beliefs. ACM Transactions on Computing Education (TOCE), 7 (2). ISSN 1946-6226. (doi:https://doi.org/10.1145/2994154) (Full text available)
[img]
Preview

Brown, Neil C. C. and Kölling, Michael and Altadmri, Amjad (2016) Position Paper: Lack of Keyboard Support Cripples Block-Based Programming. In: 2015 IEEE Blocks and Beyond Workshop (Blocks and Beyond). IEEE pp. 59-61. E-ISBN 978-1-4673-8367-7. (doi:https://doi.org/10.1109/BLOCKS.2015.7369003) (Full text available)
[img]
Preview

Brown, Neil C.C. and Kölling, Michael (2013) A Tale of Three Sites: Resource and Knowledge Sharing Amongst Computer Science Educators. In: ICER 2013. Proceedings of the 2013 ACM Conference on International Computing Education Research. ACM, New York pp. 27-34. ISBN 978-1-4503-2243-0. (doi:https://doi.org/10.1145/2493394.2493398) (Full text available)
[img]
Preview

Brown, Peter J. (1990) Assessing the Quality of Hypertext Documents (keynote address to ECHT''90). In: Rizk, A., ed. Hypertext: Concepts, Systems and Applications. Cambridge University Press, pp. 1-12. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1996) Building Novel Software: the Researcher and the Market-place. In: Milner, Robin and Wand, I., eds. Computing Tomorrow: Future Directions in Computer Science. Cambridge University Press, pp. 21-32. (Full text available)
[img]
Preview
[img]
Preview

Brown, Peter J. (1974) Macro Processors and Techniques for Portable Software. Wiley (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1982) Pascal from BASIC. Addison-Wesley (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1998) Some Lessons for Location-aware Applications. In: First Workshop on Human Computer Interaction with Mobile Devices, 21-23rd May 1998, Department of Computing Science, University of Glasgow, Scotland. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1984) Starting with UNIX. Addison-Wesley (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1996) The Stick-e Document: a Framework for Creating Context-aware Applications. In: Proceedings of EP''96, Palo Alto. also published in it EP--odd pp. 259-272. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1995) Taking a Stroll down Babel Street. In: Davidson, A., ed. Humor the Computer. MIT Press, Cambridge, Mass., pp. 165-168. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1998) Triggering information by context. Personal Technologies, 2 (1). pp. 1-9. ISSN 0949-2054. (doi:https://doi.org/10.1007/BF01581843) (Full text available)
[img]

Brown, Peter J. (1992) UNIX GUIDE: Lessons from Ten Years'' Development. In: Lucarella, D., ed. Proceedings of the ACM conference on Hypertext. ACM Press, New York, pp. 63-70. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1986) Viewing Documents on a Screen. In: Lambert, Steve and Ropiequet, Suzanne, eds. CD ROM: the New Papyrus. Microsoft Press, Redmond, Wa., pp. 175-184. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. (1979) Writing Interactive Compilers and Interpreters. Wiley (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. and Bovey, John D. and Chen, Xian (1997) Context-aware Applications: from the Laboratory to the Marketplace. IEEE Personal Communications, 4 (5). pp. 58-64. ISSN 1070-9916. (doi:https://doi.org/10.1109/98.626984) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. and Brown, Heather (1995) Embedded or Separate Hypertext Mark-up: is it an Issue? Electronic Publishing: Origination, Dissemination and Design, 8 (1). pp. 1-13. ISSN 0894-3982. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Peter J. and Welch, Peter H. (1984) Compiler Servers for the Cambridge Ring. The Coordinated Programme of Research in Distributed Computing Systems (1977..1984) -- Final Report (SERC), . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bryans, Jeremy and Arief, Budi (2006) Security implications of structure. In: Besnard, Denis and Gacek, Cristina and Jones, Cliff, eds. Structure for Dependability: Computer-Based Systems from an Interdisciplinary Perspective. Springer London, London, pp. 217-227. ISBN 978-1-84628-110-5. E-ISBN 978-1-84628-111-2. (doi:https://doi.org/10.1007/1-84628-111-3_11) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Brysbaert, Ann and Bocchi, Laura and Tuosto, Emilio (2012) Relating archaeological chaîne opératoire and process mining in computer science. Archeologia e Calcolatori, . pp. 165-186. ISSN 1120-6861. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Buckley, Oliver and Nurse, Jason R. C. (2019) The Language of Biometrics: Analysing Public Perceptions. Journal of Information Security and Applications, . E-ISSN 2214-2126. (doi:https://doi.org/10.1016/j.jisa.2019.05.001) (Full text available)
[img]
Preview

Buckley, Oliver and Nurse, Jason R. C. and Legg, Philip A. and Goldsmith, Michael and Creese, Sadie (2014) Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. In: 2014 Workshop on Socio-Technical Aspects in Security and Trust. IEEE E-ISBN 978-1-4799-7901-1. (doi:https://doi.org/10.1109/STAST.2014.10) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Buckner, Ian (1997) UKC ANSAware Survival Guide. Technical report. University of Kent at Canterbury, Computing Laboratory, Computing Laboratory, University of Kent at Canterbury, Canterbury, CT2 7NF (Full text available)
[img]
Preview
[img]
Preview

Buckner, Ian (1997) UKC ANSAware Survival Guide (for Modula-3). Technical report. University of Kent at Canterbury, Computing Laboratory, Computing Laboratory, University of Kent at Canterbury, Canterbury, CT2 7NF (Full text available)
[img]
Preview
[img]
Preview

Buckner, Ian and Penny, Ian (1997) UKC Orbix Survival Guide. Technical report. University of Kent at Canterbury, Computing Laboratory, University of Kent at Canterbury, Canterbury, CT2 7NF (Full text available)
[img]
Preview
[img]
Preview

Bujorianu, Manuela L. and Bujorianu, Marius C. (2004) Extending UML: A Foundational Approach to Heterogeneity. CSD-UMl'04 3rd International Workshop on Critical Systems Development with UML. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Burcham, Morgan and Al-Zyoud, Mahran and Carver, Jeffrey C. and Alsaleh, Mohammed and Du, Hongying and Gilani, Fida and Jiang, Jun and Rahman, Akond and Kafal?, Özgür and Al-Shaer, Ehab and Williams, Laurie (2017) Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers. In: Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp. ACM pp. 13-23. ISBN 978-1-4503-5274-1. (doi:https://doi.org/10.1145/3055305.3055307) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

UNSPECIFIED (2003) IMPROVEMENTS RELATING TO RADIO COMMUNICATION SYSTEMS. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

UNSPECIFIED (2003) Radio communication systems. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

C

C.M.M., Tio and I.V., McLoughlin and R.W., Adi and Tio, C M M and McLoughlin, Ian Vince and Adi, R W (2002) Perceptual audio data concealment and watermarking scheme using direct frequency domain substitution. IEE Proceedings - Vision, Image & Signal Processing, 149 (6). p. 335. ISSN 1350-245X. (doi:https://doi.org/10.1049/ip-vis:20020664) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cámara, Javier and de Lemos, Rogério and Ghezzi, Carlo, eds. (2013) Assurances for Self-Adaptive Systems: Principles, Models, and Techniques. Springer Publishing Company, Incorporated (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cakic, Jovan (2003) A High-level Framework for Policy-based Management of Distributed Systems. Doctor of Philosophy (PhD) thesis, Computing Laboratory. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cakic, Jovan (2000) Intelligent infrastructure that support system's changes. In: Loganantharaj, Rasiah and Palm, Gunther and Ali, Moonis, eds. Intelligent Problem Solving. Methodologies and Approaches. Springer-Verlag Berlin pp. 351-356. ISBN 3-540-67689-9. (doi:https://doi.org/10.1007/3-540-45049-1_43) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Camara, Javier and Correia, Pedro and de Lemos, Rogerio and Garlan, David and Gomes, Pedro and Schmerl, Bradley and Ventura, Rafael (2015) Incorporating Architecture-Based Self-Adaptation into an Adaptive Industrial Software System. Journal of Systems and Software, . ISSN 0164-1212. (doi:https://doi.org/10.1016/j.jss.2015.09.021) (Full text available)
[img]
Preview

Camara, Javier and Correia, Pedro and de Lemos, Rogério and Garlan, David and Gomes, Pedro and Schmerl, Bradley and Ventura, Rafael (2013) Evolving an adaptive industrial software system to use architecture-based self-adaptation. In: UNSPECIFIED. (doi:https://doi.org/10.1109/SEAMS.2013.6595488) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Camara, Javier and Lemos, Rogerio de and Laranjeiro, Nuno and Ventura, Rafael and Vieira, Marco (2013) Robustness Evaluation of Controllers in Self-Adaptive Software Systems. In: Sixth Latin-American Symposium on Dependable Computing (LADC 2013), 1-5 April 2013, Rio de Janeiro, RJ, Brazil. (doi:https://doi.org/10.1109/LADC.2013.17) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cameron, Claire and Ostashevsky, Luba (2013) Science Gets Down With Miles Davis and Bernini: Analyzing music and sculpture in the digital age. . Online magazine. (Full text available)
[img]

Camilleri, Juanito and Zammit, Vincent (1994) Symbolic Animation as a Proof Tool. In: Melham, Thomas F. and Camilleri, Juanito, eds. Proceedings of the 7th International Workshop on Higher Order Logic Theorem Proving and its Applications, Valletta, Malta. Lecture Notes in Computer Science, 859. Springer-Verlag pp. 113-127. ISBN 3-540-58450-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Campos, Marcília A. and da Silva, Erick Lopes and de Carvalho Pedrosa, Diogo and de Castro e Silva, Jorge Luiz and Loureiro, Janine A. and Ferraz, Carlos A.G. (2004) NetBook: uma ferramenta para avaliação de desempenho de sistemas de comunicação. In: Proceedings of the 22nd Brazilian Symposium on Computer Networks - III Tools Special Session. , Gramado/RS pp. 967-974. (Full text available)
[img]
Preview

Canales-Johnson, Andrés and Silva, Carolina and Huepe, David and Rivera-Rei, Álvaro and Noreika, Valdas and Garcia, María del Carmen and Silva, Walter and Ciraolo, Carlos and Vaucheret, Esteban and Sedeño, Lucas and Couto, Blas and Kargieman, Lucila and Baglivo, Fabricio and Sigman, Mariano and Chennu, Srivas and Ibáñez, Agustín and Rodríguez, Eugenio and Bekinschtein, Tristan A. (2015) Auditory Feedback Differentially Modulates Behavioral and Neural Markers of Objective and Subjective Performance When Tapping to Your Heartbeat. Cerebral Cortex, 25 (11). pp. 4490-4503. ISSN 1047-3211. E-ISSN 1460-2199. (doi:https://doi.org/10.1093/cercor/bhv076) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Canuto, Anne and Howells, Gareth and Fairhurst, Michael (2000) An investigation of the effects of variable vigilance within the RePART neuro-fuzzy network. Journal of Intelligent & Robotic Systems, 29 (4). pp. 317-334. ISSN 0921-0296. (doi:https://doi.org/10.1023/A:1008159908688) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Canuto, Anne and Howells, Gareth and Fairhurst, Michael (2000) The use of confidence measures to enhance combination strategies in multi-network neuro-fuzzy systems. Connection Science, 12 (3-4). pp. 315-331. ISSN 0954-0091. (doi:https://doi.org/10.1080/09540090010014089) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Carter, Janet (1999) Collaboration or Plagiarism: What happens when students work together. In: 4th Annual SIGCSE/SIGCUE Conference on Innovation and Technology in Computer Science Education (ITICSE 99), Jun 27-Jul 01, 1999, Krakow, Poland. (doi:https://doi.org/10.1145/384267.305848) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Carter, Janet and Jenkins, Tony (1999) Gender and programming: What's going on? In: 4th Annual SIGCSE/SIGCUE Conference on Innovation and Technology in Computer Science Education (ITICSE 99), Jun 27-Jul 01, 1999, Krakow, Poland. (doi:https://doi.org/10.1145/384267.305824) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Carvalho, Rodrigo and Goldsmith, Michael and Nurse, Jason R. C. (2015) Online banking malware ontology. In: International Crime and Intelligence Analysis Conference (ICIA). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Casson, Alexander J. and Vazquez Galvez, Arturo and Jarchi, Delaram (2016) Gyroscope vs. accelerometer measurements of motion from wrist PPG during physical exercise. ICT Express, 2 (4). pp. 175-179. ISSN 2405-9595. (doi:https://doi.org/10.1016/j.icte.2016.11.003) (Full text available)
[img]
Preview

Castle, Tom (2012) Evolving High-Level Imperative Program Trees with Genetic Programming. Doctor of Philosophy (PhD) thesis, University of Kent. (Full text available)
[img]
Preview

Cedric, Tio M M and Adi, Robertus Wahendro and McLoughlin, Ian Vince (2000) Data concealment in audio using a nonlinear frequency distribution. 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119), 1 . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cedric, Tio M M and Adi, Robertus Wahendro and McLoughlin, Ian Vince (2000) Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency-domain LSB insertion. In: , TENCON 2000. Proceedings. TENCON 2000. Proceedings. IEEE pp. 275-278. ISBN 0-7803-6355-8. (doi:https://doi.org/10.1109/TENCON.2000.893586) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cervantes, Alejandro and Sloan, Tom and Hernandez-Castro, Julio C. and Isasi, Pedro (2018) System steganalysis with automatic fingerprint extraction. PLOS ONE, 13 (4). e0195737. ISSN 1932-6203. (doi:https://doi.org/10.1371/journal.pone.0195737) (Full text available)
[img]

Chadwick, David (2013) A Trust Model for ABFAB Trust Routers. . Internet. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. (2004) PKI Past, Present and Future. In: First EuroPKI Workshop, Samos. (Full text available)
[img]
Preview

Chadwick, David W. and Dimitrakos, Theo and Dam, Kerstin Kleese-Van and Randal, Damian Mac and Matthews, Brian and Otenko, Alexander (2004) Multilayer Privilege Management for Dynamic Collaborative Scientific Communities. In: Workshop on Grid Security Practice and Experience, Oxford, UK. II 7-14. (Full text available)
[img]
Preview

Chadwick, David W. and Lievens, Stijn F and den Hartog, Jerry I and Pashalidis, Andreas and Alhadeff, Joseph (2011) My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud. In: 2011 IEEE 4th International Conference on Cloud Computing. IEEE pp. 752-753. ISBN 978-1-4577-0836-7. E-ISBN 978-0-7695-4460-1. (doi:https://doi.org/10.1109/CLOUD.2011.113) (Full text available)
[img]
Preview

Chadwick, David W. and Lunt, Graeme and Zhao, Gansen (2004) Secure Role-based Messaging. In: Chadwick, David W. and Preneel, Bart, eds. Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2004),Windermere, UK. Springer-Verlag pp. 263-275. ISBN 0-387-24485-9. (Full text available)
[img]
Preview

Chadwick, David W. and Otenko, Sassa and Xu, Wensheng (2005) Adding Distributed Trust Management to Shibboleth. In: NIST 4th Annual PKI Workshop. , Gaithersberg, USA pp. 3-14. (Full text available)
[img]
Preview

Chadwick, David W and Casenove, Matteo and Siu, Kristy (2013) My private cloud--granting federated access to cloud resources. Journal of Cloud Computing, 2 (1). pp. 1-16. ISSN 2192-113X. (doi:https://doi.org/10.1186/2192-113X-2-3) (Full text available)
[img]
Preview

Chadwick, David W and Hibbert, Mark (2012) F-SAMS: Reliably Identifying Attributes and Their Identity Providers in a Federation. In: On the Move to Meaningful Internet Systems: OTM 2012 Workshops. Springer Berlin Heidelberg, pp. 231-241. (Full text available)
[img]
Preview

Chadwick, David W and Hibbert, Mark (2013) Towards Automated Trust Establishment in Federated Identity Management. In: Trust Management VII. Springer Berlin Heidelberg, pp. 33-48. (Full text available)
[img]
Preview

Chadwick, David W and Siu, Kristy and Lee, Craig and Fouillat, Yann and Germonville, Damien (2014) Adding Federated Identity Management to OpenStack. Journal of Grid Computing, 12 (1). pp. 3-27. ISSN 1570-7873. E-ISSN 1572-9184. (doi:https://doi.org/10.1007/s10723-013-9283-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chambers, John C and Zhang, Weihua and Sehmi, Joban S. and Li, Xinzhong and Wass, Mark N. and Van der Harst, Pim and Holm, Hilma and Sanna, Serena and Kavousi, Maryam and Baumeister, Sebastian E and Coin, Lachlan J and Deng, Guohong and Gieger, Christian and Heard-Costa, Nancy L and Hottenga, Jouke-Jan and Kühnel, Brigitte and Kumar, Vinod and Lagou, Vasiliki and Liang, Liming and Luan, Jian'an and Vidal, Pedro Marques and Mateo Leach, Irene and O'Reilly, Paul F and Peden, John F and Rahmioglu, Nilufer and Soininen, Pasi and Speliotes, Elizabeth K and Yuan, Xin and Thorleifsson, Gudmar and Alizadeh, Behrooz Z and Atwood, Larry D and Borecki, Ingrid B and Brown, Morris J and Charoen, Pimphen and Cucca, Francesco and Das, Debashish and de Geus, Eco J C and Dixon, Anna L and Döring, Angela and Ehret, Georg and Eyjolfsson, Gudmundur I and Farrall, Martin and Forouhi, Nita G and Friedrich, Nele and Goessling, Wolfram and Gudbjartsson, Daniel F and Harris, Tamara B and Hartikainen, Anna-Liisa and Heath, Simon and Hirschfield, Gideon M and Hofman, Albert and Homuth, Georg and Hyppönen, Elina and Janssen, Harry L A and Johnson, Toby and Kangas, Antti J and Kema, Ido P and Kühn, Jens P and Lai, Sandra and Lathrop, Mark and Lerch, Markus M and Li, Yun and Liang, T Jake and Lin, Jing-Ping and Loos, Ruth J F and Martin, Nicholas G and Moffatt, Miriam F and Montgomery, Grant W and Munroe, Patricia B and Musunuru, Kiran and Nakamura, Yusuke and O'Donnell, Christopher J and Olafsson, Isleifur and Penninx, Brenda W and Pouta, Anneli and Prins, Bram P and Prokopenko, Inga and Puls, Ralf and Ruokonen, Aimo and Savolainen, Markku J and Schlessinger, David and Schouten, Jeoffrey N L and Seedorf, Udo and Sen-Chowdhry, Srijita and Siminovitch, Katherine A and Smit, Johannes H and Spector, Timothy D and Tan, Wenting and Teslovich, Tanya M and Tukiainen, Taru and Uitterlinden, Andre G and Van der Klauw, Melanie M and Vasan, Ramachandran S and Wallace, Chris and Wallaschofski, Henri and Wichmann, H-Erich and Willemsen, Gonneke and Würtz, Peter and Xu, Chun and Yerges-Armstrong, Laura M and Abecasis, Goncalo R and Ahmadi, Kourosh R and Boomsma, Dorret I and Caulfield, Mark and Cookson, William O and van Duijn, Cornelia M and Froguel, Philippe and Matsuda, Koichi and McCarthy, Mark I and Meisinger, Christa and Mooser, Vincent and Pietiläinen, Kirsi H and Schumann, Gunter and Snieder, Harold and Sternberg, Michael J.E. and Stolk, Ronald P and Thomas, Howard C and Thorsteinsdottir, Unnur and Uda, Manuela and Waeber, Gérard and Wareham, Nicholas J and Waterworth, Dawn M and Watkins, Hugh and Whitfield, John B and Witteman, Jacqueline C M and Wolffenbuttel, Bruce H R and Fox, Caroline S and Ala-Korpela, Mika and Stefansson, Kari and Vollenweider, Peter and Völzke, Henry and Schadt, Eric E and Scott, James and Järvelin, Marjo-Riitta and Elliott, Paul and Kooner, Jaspal S (2011) Genome-wide association study identifies loci influencing concentrations of liver enzymes in plasma. Nature Genetics, 43 (11). pp. 1131-1138. ISSN 1061-4036. (doi:https://doi.org/10.1038/ng.970) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chan, Syin (1992) Recompression of Still Images. Technical report. UKC, University of Kent, Canterbury, UK (Full text available)
[img]
Preview
[img]
Preview

UNSPECIFIED (2002) METHOD AND APPARATUS FOR SPEECH ENHANCEMENT IN A SPEECH COMMUNICATION SYSTEM. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chari, Guido and Garbervetsky, Diego and Marr, Stefan (2016) Building Efficient and Highly Run-time Adaptable Virtual Machines. In: ACM SIGPLAN Notices. DLS 2016 Proceedings of the 12th Symposium on Dynamic Languages. ACM pp. 60-71. ISBN 978-1-4503-4445-6. (doi:https://doi.org/10.1145/2989225.2989234) (Full text available)
[img]
Preview

Chari, Guido and Garbervetsky, Diego and Marr, Stefan (2017) Fully-reflective VMs for Ruling Software Adaptation. In: Proceedings of the 39th International Conference on Software Engineering Companion. (doi:https://doi.org/10.1109/ICSE-C.2017.144) (Full text available)
[img]
Preview

Chari, Guido and Garbervetsky, Diego and Marr, Stefan (2017) A Metaobject Protocol for Optimizing Application-Specific Run-Time Variability. In: Proceedings of the 11th Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems. (doi:https://doi.org/10.1145/3098572.3098577) (Full text available)
[img]
Preview

Chari, Guido and Garbervetsky, Diego and Marr, Stefan and Ducasse, Stéphane (2018) Fully Reflective Execution Environments: Virtual Machines for More Flexible Software. IEEE Transactions on Software Engineering, . ISSN 0098-5589. (doi:https://doi.org/10.1109/TSE.2018.2812715) (Full text available)
[img]
Preview

Chatelle, Camille and Chennu, Srivas and Noirhomme, Quentin and Cruse, Damian and Owen, Adrian M. and Laureys, Steven (2012) Brain-computer interfacing in disorders of consciousness. Brain Injury, 26 (12). pp. 1510-1522. ISSN 0269-9052. E-ISSN 1362-301X. (doi:https://doi.org/10.3109/02699052.2012.698362) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chawdhary, Aziem and King, Andy (2017) Compact Difference Bound Matrices. In: Chang, Evan, ed. 15th Asian Symposium on Programming Languages and Systems. Lecture Notes in Computer Science . Springer, pp. 471-490. ISBN 978-3-319-71236-9. (doi:https://doi.org/10.1007/978-3-319-71237-6_23) (Full text available)
[img]
Preview

Chechina, Natalia and MacKenzie, Kenneth and Thompson, Simon and Trinder, Phil and Boudeville, Olivier and Fordos, Viktoria and Hoch, csaba and Ghaffari, Amir and Moro Hernandez, Mario (2017) Evaluating Scalable Distributed Erlang for Scalability and Reliability. IEEE Transactions on Parallel and Distributed Systems, 28 (8). pp. 2244-2257. ISSN 1045-9219. (doi:https://doi.org/10.1109/TPDS.2017.2654246) (Full text available)
[img]
Preview

Chen, Huankai (2016) Entropy-Based Resource Management in Complex Cloud Environment. Doctor of Philosophy (PhD) thesis, University of Kent,. (Full text available)
[img]
Preview

Chen, Huankai and Wang, Frank Z. (2015) Spark on Entropy: A Reliable & Efficient Scheduler for Low-latency Parallel Jobs in Heterogeneous Cloud. In: Local Computer Networks Conference Workshops (LCN Workshops), 2015 IEEE 40th. IEEE E-ISBN 978-1-4673-6773-8. (doi:https://doi.org/10.1109/LCNW.2015.7365918) (Full text available)
[img]
Preview

Chen, Huankai and Wang, Frank Z. and Helian, Na (2013) A Cost-Efficient and Reliable Resource Allocation Model Based on Cellular Automaton Entropy for Cloud Project Scheduling. International Journal of Advanced Computer Science and Applications, 4 (4). pp. 7-14. ISSN 2156-5570. (Full text available)
[img]
Preview

Chen, Jing and McLoughlin, Ian Vince and Chang, Hsung Pin and Chang, Da-Wei and Chiang, Mei-Ling and Chung, Yeh-Ching (2012) Message from WEISS-12 Workshop Chairs. In: UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chen, S.-H. and Kampouridis, Michael and Tsang, E. (2010) Microstructure Dynamics and Agent-Based Financial Markets. In: Proceedings of the 11th International Workshop on Multi-Agent-Based Simulation (MABS 2010). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chen, S.-H. and Kampouridis, Michael and Tsang, E. (2011) Microstructure Dynamics and Agent-Based Financial Markets. In: Multi-Agent-Based Simulation XI, 11th International Workshop, Revised Papers, LNAI. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chen, Tzu-Chun and Bocchi, Laura and Deniélou, Pierre-Malo and Honda, Kohei and Yoshida, Nobuko (2012) Asynchronous Distributed Monitoring for Multiparty Session Enforcement. In: 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers. Lecture Notes in Computer Science, 7173. Springer pp. 25-45. ISBN 978-3-642-30064-6. E-ISBN 978-3-642-30065-3. (doi:https://doi.org/10.1007/978-3-642-30065-3_2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chen, Wanlong (2017) Memristor Content Addressable Memory: Theory, Design and Application. Doctor of Philosophy (PhD) thesis, University of Kent. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Chen, Wanlong and Yang, Xiao and Wang, Frank Z. (2013) Delayed Switching Applied to Memristor Content Addressable Memory Cell. In: Proceedings of the World Congress on Engineering 2013. International Association of Engineers pp. 354-357. ISBN 978-988-19251-0-7. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Chen, Xian and Megson, G.M (1995) A General Methodology of Partition and Mapping for Given Regular Arrays. IEEE Transactions on Parallel and Distributed Systems, 6 (10). pp. 1100-1107. ISSN 1045-9219. (doi:https://doi.org/10.1109/71.473518) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Betty H. C. and de Lemos, Rogério and Giese, Holger and Inverardi, Paola and Magee, Jeff and Andersson, Jesper and Becker, Basil (2009) Software Engineering for Self-Adaptive Systems: A Research Roadmap. In: Software Engineering for Self-Adaptive Systems. Lecture Notes in Computer Science, 5525 . Springer, Berlin, pp. 1-26. ISBN 978-3-642-02161-9. (doi:https://doi.org/10.1007/978-3-642-02161-9_1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H. (1995) Bootstrap methods in computer simulation experiments. In: Alexopoulos, C. and Kang, K. and Lilegdon, W.R and Goldsman, D., eds. 1995 Winter Simulation Conference Proceedings. I E E E pp. 171-177. ISBN 0-7803-3018-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H. and Traylor, L. (1995) Characterization of material strength properties using probabilistic mixture models. In: Carlomagno, G.M. and Brebbia, C.A., eds. Computational Methods and Experimental Measurement VII. Computational Mechanics Publications Ltd pp. 553-560. ISBN 1-85312-313-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chennu, S. and Noreika, V. and Gueorguiev, D. and Shtyrov, Y. and Bekinschtein, T. A. and Henson, R. (2016) Silent Expectations: Dynamic Causal Modeling of Cortical Prediction and Attention to Sounds That Weren't. Journal of Neuroscience, 36 (32). pp. 8305-8316. ISSN 0270-6474. E-ISSN 1529-2401. (doi:https://doi.org/10.1523/JNEUROSCI.1125-16.2016) (Full text available)
[img]
Preview

Chennu, Srivas (2008) On Feature Binding in Space and Time. In: University of Kent Postgraduate Conference. (Full text available)
[img]
Preview

Chennu, Srivas and Bekinschtein, Tristan A. (2012) Arousal modulates auditory attention and awareness: insights from sleep, sedation and disorders of consciousness. Frontiers in Psychology, 3 (00065). pp. 1-9. E-ISSN 1664-1078. (doi:https://doi.org/10.3389/fpsyg.2012.00065) (Full text available)
[img]
Preview

Chennu, Srivas and Finoia, Paola and Kamau, Evelyn and Allanson, Judith and Williams, Guy B. and Monti, Martin M. and Noreika, Valdas and Arnatkeviciute, Aurina and Canales-Johnson, Andrés and Olivares, Francisco and Cabezas-Soto, Daniela and Menon, David K. and Pickard, John D. and Owen, Adrian M. and Bekinschtein, Tristan A. (2014) Spectral signatures of reorganised brain networks in disorders of consciousness. PLoS Computational Biology, 10 (10). e1003887. ISSN 1553-734X. E-ISSN 1553-7358. (doi:https://doi.org/10.1371/journal.pcbi.1003887) (Full text available)
[img]
Preview

Chennu, Srivas and Finoia, Paola and Kamau, Evelyn and Monti, Martin M. and Allanson, Judith and Pickard, John D. and Owen, Adrian M. and Bekinschtein, Tristan A. (2013) Dissociable endogenous and exogenous attention in disorders of consciousness. NeuroImage: Clinical, 3 . pp. 450-461. E-ISSN 2213-1582. (doi:https://doi.org/10.1016/j.nicl.2013.10.008) (Full text available)
[img]
Preview

Chennu, Srivas and Habel, Kai and Langer, Klaus-Dieter (2006) Protected Ethernet Rings for Optical Access Networks. In: Proceedings of the 7th ITG Symposium on Photonic Networks. Informationstechnische Gesellschaft, Berlin pp. 29-36. ISBN 3-8007-2959-8. (Full text available)
[img]
Preview

Chennu, Srivas and Habel, Kai and Langer, Klaus-Dieter (2006) QoS-aware Traffic Protection for Access Rings. In: Proceedings of NOC 2006. pp. 165-174. ISBN 3923613401. (Full text available)
[img]

Chennu, Srivas and Nagaraj, Vishwas (2001) Mobile Ad Hoc Networks. In: Institute of Engineers technical seminar. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chennu, Srivas and Nagaraj, Vishwas (2001) Parallel Computing using Linux Clusters: PFract - A Parallel Fractal Generation Program. In: Computer Society of India technical seminar. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chennu, Srivas and Noreika, Valdas and Gueorguiev, David and Blenkmann, Alejandro and Kochen, Silvia and Ibáñez, Agustín and Owen, Adrian M. and Bekinschtein, Tristan A. (2013) Expectation and Attention in Hierarchical Auditory Prediction. Journal of Neuroscience, 33 (27). pp. 11194-11205. ISSN 0270-6474. E-ISSN 1529-2401. (doi:https://doi.org/10.1523/JNEUROSCI.0114-13.2013) (Full text available)
[img]
Preview

Chennu, Srivas and O’Connor, Stuart and Adapa, Ram and Menon, David K. and Bekinschtein, Tristan A. (2016) Brain Connectivity Dissociates Responsiveness from Drug Exposure during Propofol-Induced Transitions of Consciousness. PLoS Computational Biology, 12 (1). pp. 1-17. ISSN 1553-734X. E-ISSN 1553-7358. (doi:10.1371%2Fjournal.pcbi.1004669) (Full text available)
[img]
Preview

Chennu, Srivas and Stamatakis, Emmanuel A and Menon, David K (2016) The see-saw brain: recovering consciousness after brain injury. The Lancet Neurology, 15 (8). pp. 830-842. ISSN 1474-4422. E-ISSN 1474-4465. (doi:https://doi.org/10.1016/S1474-4422(16)30027-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheung, Steven and Darvariu, Victor and Ghica, Dan R. and Muroya, Koko and Rowe, Reuben (2018) A functional perspective on machine learning via programmable induction and abduction. In: Lecture Notes in Artificial Intelligence. Proceedings of the Fourteenth International Symposium on Functional and Logic Programming (FLOPS 2018) 9-11 May, 2018, Nagoya, Japan. Lecture Notes in Computer Science. Springer, Switzerland ISBN 978-3-319-90686-7. (doi:https://doi.org/10.1007/978-3-319-90686-7_6) (Full text available)
[img]
Preview

Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie (2017) A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation, 255 (part 1). pp. 94-125. ISSN 0890-5401. E-ISSN 1090-2651. (doi:https://doi.org/10.1016/j.ic.2017.05.004) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Cheval, Vincent and Cortier, Véronique (2015) Timing attacks: symbolic framework and proof techniques. In: Focardi, Riccardo and Myers, Andrew, eds. Lecture Notes in Computer Science. Principles of Security and Trust. Springer Berlin Heidelberg, London, UK pp. 280-299. ISBN 978-3-662-46665-0. E-ISBN 978-3-662-46666-7. (doi:https://doi.org/10.1007/978-3-662-46666-7_15) (Full text available)
[img]
Preview
[img]
Preview

Chhonker, Ananya and de Lemos, Rogerio (2019) Microservices Architectures and Technical Debt: A Self-adaptation View. In: International Conference on Microservices (Microservices 2019), 19-21 February 2019, Dortmund, Germany. (Full text available)
[img]

Chitil, Olaf and Faddegon, Maarten and Runciman, Colin (2017) A Lightweight Hat: Simple Type-Preserving Instrumentation for Self-Tracing Lazy Functional Programs. In: Proceedings of Implementation and Application of Functional Languages, IFL 2016. ACM ISBN 978-1-4503-4767-9. (doi:https://doi.org/10.1145/3064899.3064904) (Full text available)
[img]
Preview

Chivers, Daniel (2014) Improving Automated Layout Techniques for the Production of Schematic Diagrams. Doctor of Philosophy (PhD) thesis, University of Kent,. (Full text available)
[img]
Preview

Chong, F and Pawlikowski, K and McLoughlin, Ian Vince (2003) Evaluation of ITU-T G. 728 as a voice over IP codec for Chinese speech. In: , Proceedings of the Australian Telecommunications Networks and Applications Conference 2003 (ATNAC 03â??). pp. 8-10. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chong, Fong Loong and McLoughlin, Ian Vince and Pawlikowski, Krzysztof (2005) A methodology for improving PESQ accuracy for Chinese speech. In: , TENCON 2005 2005 IEEE Region 10. pp. 1-6. ISBN 0-7803-9311-2. (doi:https://doi.org/10.1109/TENCON.2005.301105) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chu, Dominique (2007) Evolving Genetic Regulatory Networks for Systems Biology. In: Proceedings of IEEE Congress on Evolutionary Computation 2007, Singapore, Sept 25-27 2007. pp. 875-882. ISBN 978-1-4244-1339-3. (doi:https://doi.org/10.1109/CEC.2007.4424562) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chu, Dominique (2013) Evolving Parameters for a Noisy Bio-System. In: 2013 IEEE Symposium Series on Computational Intelligence, 16th - 19th April, 2013, Singapore. (Full text available)
[img]
Preview

Chu, Dominique (2018) Performance limits and trade-offs in entropy-driven biochemical computers. Journal of Theoretical Biology, 443 . pp. 1-9. ISSN 0022-5193. (doi:https://doi.org/10.1016/j.jtbi.2018.01.022) (Full text available)
[img]
Preview
[img]
Preview

Chu, Dominique (2013) Replaying the tape of evolution: Evolving parameters for a simple bacterial metabolism. In: IEEE CEC 2013 : IEEE Congress on Evolutionary Computation, 20th - 23rd June, 2013, Cancun, Mexico. (Full text available)
[img]
Preview

Chu, Dominique (2013) The Science Myth: God, society, the self and what we will never know. Iff Books, London, 437 pp. ISBN 1-78279-047-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chu, Dominique (2018) A thermodynamically consistent model of finite state machines. Journal of the Royal Society Interface Focus, . ISSN 2042-8898. E-ISSN 2042-8898. (doi:https://doi.org/10.1098/rsfs.2018.0037) (Full text available)
[img]
Preview

Chu, Dominique (2018) The thermodynamics of quasi-deterministic digital computers. Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, 97 (2). ISSN 1063-651X. (doi:https://doi.org/10.1103/PhysRevE.97.022121) (Full text available)
[img]
Preview

Chu, Dominique and Barnes, David J. (2015) Evolving strategies for single-celled organisms in multi-nutrient environments. In: Proceedings of the European Conference on Artificial Life 2015. MIT Press pp. 226-233. (doi:https://doi.org/10.7551/978-0-262-33027-5-ch046) (Full text available)
[img]
Preview

Chu, Dominique and Barnes, David J. and von der Haar, Tobias (2011) The role of tRNA and ribosome competition in coupling the expression of different mRNAs in Saccharomyces cerevisiae. Nucleic Acids Research, 39 (15). pp. 6705-6714. ISSN 0305-1048. (doi:https://doi.org/10.1093/nar/gkr300) (Full text available)
[img]
Preview

Chu, Dominique and Thompson, James and von der Haar, Tobias (2014) Charting the dynamics of translation. Bio Systems, 119 (1). pp. 1-9. ISSN 1872-8324. (doi:https://doi.org/10.1016/j.biosystems.2014.02.005) (Full text available)
[img]
Preview

Chua, Leon O. and Sbitnev, Valery and Hyongsuk, Kim (2012) Neurons are poised near the edge of chaos. International Journal of Bifurcation and Chaos, 22 (04). 1250098- 1. ISSN 0218-1274. (doi:https://doi.org/10.1142/S0218127412500988) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chua, Leon O. and Sbitnev, Valery and Kim, Hyongsuk (2012) HODGKIN–HUXLEY AXON IS MADE OF MEMRISTORS. International Journal of Bifurcation and Chaos, 22 (03). pp. 1230011-1. ISSN 0218-1274. (doi:https://doi.org/10.1142/S021812741230011X) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chén, Oliver Y. and Cao, Hengyi and Reinen, Jenna and Qian, Tianchen and Gou, Jiangtao and Phan, Huy and Vos, Maarten De and Cannon, Tyrone (2019) Resting-state brain information flow predicts cognitive flexibility in humans. Scientific reports, 9 . p. 3879. ISSN 2045-2322. (doi:https://doi.org/10.1038/s41598-019-40345-8) (Full text available)
[img]
Preview

Cohen, Liron and Rowe, Reuben (2018) Uniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent. In: Leibniz International Proceedings in Informatics. Proceedings of the 27th EACSL Annual Conference on Computer Science Logic, CSL 2018. LIPICS (doi:https://doi.org/10.4230/LIPIcs.CSL.2018.16) (Full text available)
[img]
Preview

Cohen, Liron and Rowe, Reuben N. S. (2018) Infinitary and Cyclic Proof Systems for Transitive Closure Logic. Technical report. University of Kent (Submitted) (Full text available)
[img]
Preview

Cohen, Liron and Rowe, Reuben and Zohar, Yoni (2019) Towards Automated Reasoning in Herbrand Structures. Journal of Logic and Computation, . ISSN 0955-792X. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Cole, Fred C. and Oxborrow, Elizabeth and Brown, Heather (1992) An Object-Oriented Toolkit for Structured Documents. In: Vanoirbeek, C. and Coray, G., eds. EP92: Proceedings of Electronic Publishing 92. Cambridge Series on Electronic Publishing. Cambridge University Press pp. 95-111. ISBN 0-521-43277-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Comsa, Iulia M. and Bekinschtein, Tristan A. and Chennu, Srivas (2018) Transient topographical dynamics of the electroencephalogram predict brain connectivity and behavioural responsiveness during drowsiness. Brain Topography, . ISSN 0896-0267. E-ISSN 1573-6792. (doi:https://doi.org/10.1007/s10548-018-0689-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

Contrastin, Mistral and Danish, Matthew and Rice, Andrew C. and Orchard, Dominic A. (2016) Supporting Software Sustainability with Lightweight Specifications. In: CEUR Workshop Proceedings. Proceedings of the Fourth Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE4). (Full text available)
[img]
Preview

Contrastin, Mistral and Orchard, Dominic A. and Rice, Andrew C. (2018) Automatic reordering for dataflow safety of Datalog. In: Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming. Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming. ACM ISBN 978-1-4503-6441-6. (doi:https://doi.org/10.1145/3236950.3236954) (Full text available)
[img]

Contrastin, Mistral and Rice, Andrew and Danish, Matthew and Orchard, Dominic A. (2015) Units-of-Measure Correctness in Fortran Programs. Computing in Science & Engineering, 18 (1). pp. 102-107. ISSN 1521-9615. (doi:https://doi.org/10.1109/MCSE.2016.17) (Full text available)
[img]
Preview

Cooke, Jennifer, Ann (2016) Interacting with consciousness: An investigation into the neural signatures of conscious processing using the global-local auditory task. Doctor of Philosophy (PhD) thesis, University of Kent,. (Full text available)
[img]
Preview

Cooper, Ian (1994) Indexing the World. Technical report. University of Kent, Computing Laboratory, University of Kent, Canterbury, UK (Full text available)
[img]
Preview
[img]
Preview

Cooper, Ian (1998) Web Resource Re-discovery - Personal Resource Storage and Retrieval on the World Wide Web. Doctor of Philosophy (PhD) thesis, University of Kent at Canterbury. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cooper, Ian and Shufflebotham, Royston (1995) PDA Web Browsers: Implementation Issues. Technical report. University of Kent, Computing Laboratory, University of Kent, Canterbury, UK (Full text available)
[img]
Preview
[img]
Preview

Corneli, Joseph and Guckelsberger, Christian and Jordanous, Anna and Pease, Alison and Colton, Simon and Erden, Yasemin J. (2017) Conference Report: AISB Members Workshop VII: Serendipity Symposium. AISB Quarterly, 147 . pp. 10-15. ISSN 0268-4179. E-ISSN 0268-4179. (Full text available)
[img]
Preview

Corneli, Joseph and Jordanous, Anna and Shepperd, Rosie and Llano, Maria Teresa and Misztal, Joanna and Colton, Simon and Guckelsberger, Christian (2015) Computational Poetry Workshop: Making Sense of Work in Progress. In: 6th International Conference on Computational Creativity, June 29 - July 2, 2015, Utah, US. (Full text available)
[img]
Preview

Correa, Elon S. and Freitas, Alex A. and Johnson, Colin G. (2008) A New Discrete Particle Swarm Algorithm Applied to Attribute Selection in a Bioinformatics Data Set. In: GECCO '06: Proceedings of the 8th Annual Conference on Genetic and Evolutionary Computation. ACM, New York, USA pp. 35-42. ISBN 1-59593-186-4. (doi:https://doi.org/10.1145/1143997.1144003) (Full text available)
[img]
Preview

Correia, António and Jameel, Shoaib and Schneider, Daniel and Fonseca, Benjamim and Paredes, Hugo (2019) The Effect of Scientific Collaboration on CSCW Research: A Scientometric Study. In: Proceedings of the 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design. (In press) (Full text available)
[img]
Preview

Cota, Navin Gupta and Palaniappan, Ramaswamy (2008) Enhanced target detection using P300 and gamma band analysis. Neuroscience Research, 61 . ISSN 0168-0102. (Full text available)
[img]

Cramer, Sam and Kampouridis, Michael and Freitas, Alex A. (2018) Decomposition Genetic Programming: An Extensive Evaluation on Rainfall Prediction in the Context of Weather Derivatives. Applied Soft Computing, 70 . pp. 208-224. ISSN 1568-4946. (doi:https://doi.org/10.1016/j.asoc.2018.05.016) (Full text available)
[img]
Preview

Cramer, Sam and Kampouridis, Michael and Freitas, Alex A. and Alexandridis, Antonis (2016) Predicting Rainfall in the Context of Rainfall Derivatives Using Genetic Programming. In: 2015 IEEE Symposium Series on Computational Intelligence. IEEE pp. 711-718. ISBN 978-1-4799-7560-0. (doi:https://doi.org/10.1109/SSCI.2015.108) (Full text available)
[img]
Preview

Cramer, Sam and Kampouridis, Michael and Freitas, Alex A. and Alexandridis, Antonis (2017) Pricing Rainfall Based Futures Using Genetic Programming. In: Lecture Notes in Computer Science. Applications of Evolutionary Computation. Springer pp. 17-33. ISBN 978-3-319-55848-6. (doi:10.1007%2F978-3-319-55849-3_2) (Full text available)
[img]
Preview

Cramer, Sam and Kampouridis, Michael and Freitas, Alex A. and Alexandridis, Antonis (2019) Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives. Swarm and Evolutionary Computation, 46 . pp. 184-200. ISSN 2210-6502. E-ISSN 2210-6510. (doi:https://doi.org/10.1016/j.swevo.2019.01.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

Cramer, Sam and Kampouridis, Michael and Freitas, Alex A. and Alexandridis, Antonis (2017) An extensive evaluation of seven machine learning methods for rainfall prediction in weather derivatives. Expert Systems with Applications, 85 . pp. 169-181. ISSN 0957-4174. (doi:https://doi.org/10.1016/j.eswa.2017.05.029) (Full text available)
[img]
Preview

Creese, Sadie and Gibson-Robinson, Thomas and Goldsmith, Michael and Hodges, Duncan and Kim, Dee and Love, Oriana and Nurse, Jason R. C. and Pike, Bill and Schultz, Jean (2014) Tools for Understanding Identity. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST). IEEE E-ISBN 978-1-4799-1535-4. (doi:https://doi.org/10.1109/THS.2013.6699064) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Creese, Sadie and Goldsmith, Michael and Nurse, Jason R. C. and Phillips, Elizabeth (2012) A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE pp. 1124-1131. ISBN 978-1-4673-2172-3. (doi:https://doi.org/10.1109/TrustCom.2012.22) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Cronk, Jonathan and Sharp, John A. (1995) A framework for deciding what to outsource in information technology. Journal of Information Technology, 10 (4). pp. 259-267. ISSN 0268-3962. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cruse, Damian and Beukema, Steve and Chennu, Srivas and Malins, Jeffrey G. and Owen, Adrian M. and McRae, Ken (2014) The reliability of the N400 in single subjects: Implications for patients with disorders of consciousness. NeuroImage: Clinical, 4 . pp. 788-799. E-ISSN 2213-1582. (doi:https://doi.org/10.1016/j.nicl.2014.05.001) (Full text available)
[img]
Preview

Cruse, Damian and Chennu, Srivas and Chatelle, Camille and Bekinschtein, Tristan A. and Fernández-Espejo, Davinia and Pickard, John D. and Laureys, Steven and Owen, Adrian M. (2012) Bedside detection of awareness in the vegetative state? - Authors' reply. Lancet, 379 (9827). p. 1702. ISSN 0140-6736. E-ISSN 1474-547X. (doi:https://doi.org/10.1016/S0140-6736(12)60715-6) (Full text available)
[img]
Preview

Cruse, Damian and Chennu, Srivas and Chatelle, Camille and Bekinschtein, Tristan A. and Fernández-Espejo, Davinia and Pickard, John D. and Laureys, Steven and Owen, Adrian M. (2013) Reanalysis of "Bedside detection of awareness in the vegetative state: a cohort study" - Authors' reply. Lancet, 381 (9863). pp. 291-292. ISSN 0140-6736. E-ISSN 1474-547X. (doi:https://doi.org/10.1016/S0140-6736(13)60126-9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cruse, Damian and Chennu, Srivas and Chatelle, Camille and Bekinschtein, Tristan A and Fernández-Espejo, Davinia and Pickard, John D and Laureys, Steven and Owen, Adrian M (2011) Bedside detection of awareness in the vegetative state: a cohort study. Lancet, 378 (9809). pp. 2088-2094. ISSN 0140-6736. E-ISSN 1474-547X. (doi:https://doi.org/10.1016/S0140-6736(11)61224-5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cruse, Damian and Chennu, Srivas and Chatelle, Camille and Fernández-Espejo, Davinia and Bekinschtein, Tristan A. and Pickard, John D. and Laureys, Steven and Owen, Adrian M. (2012) Relationship between aetiology and covert cognition in the minimally-conscious state. Neurology, 78 (11). pp. 816-822. ISSN 0028-3878. E-ISSN 1526-632X. (doi:https://doi.org/10.1212/WNL.0b013e318249f764) (Full text available)
[img]
Preview

Cruse, Damian and Chennu, Srivas and Fernández-Espejo, Davinia and Payne, William L. and Young, G. Bryan and Owen, Adrian M. (2012) Detecting Awareness in the Vegetative State: Electroencephalographic Evidence for Attempted Movements to Command. PLoS ONE, 7 (11). e49933. ISSN 1932-6203. E-ISSN 1932-6203. (doi:10.1371%2Fjournal.pone.0049933) (Full text available)
[img]
Preview

Curtis, Tony (1994) PEST: A Knowledge Based System for Product Promotions. Technical report. University of Kent, Computing Laboratory, University of Kent, Canterbury, UK (Full text available)
[img]
Preview
[img]
Preview

Cvetkovic, Bozidara and Janko, Vito and Romero, Alfonso E and Kafal?, Özgür and Stathis, Kostas and Lustrek, Mitja (2016) Activity recognition for diabetic patients using a smartphone. Journal of medical systems, 40 (12). p. 256. ISSN 0148-5598. (doi:https://doi.org/10.1007/s10916-016-0598-y) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Czajkowski, Marcin and Grzes, Marek and Kretowski, Marek (2014) Multi-test Decision Tree and its Application to Microarray Data Classification. Artificial Intelligence in Medicine, 61 (1). pp. 35-44. ISSN 0933-3657. (doi:https://doi.org/10.1016/j.artmed.2014.01.005) (Full text available)
[img]
Preview

Czech, Zbigniew and Mikanik, Wojciech (1996) Randomized PRAM Simulation Using T9000 Transputers. Technical report. UKC, University of Kent, Canterbury, UK (Full text available)
[img]
Preview
[img]
Preview

Cámara, Javier and de Lemos, Rogerio and Laranjeiro, Nuno and Ventura, Rafael and Vieira, Marco (2014) Robustness evaluation of the rainbow framework for self-adaptation. In: UNSPECIFIED. (doi:https://doi.org/10.1145/2554850.2554935) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cámara, Javier and de Lemos, Rogerio and Laranjeiro, Nuno and Ventura, Rafael and Vieira, Marco (2014) Testing the robustness of controllers for self-adaptive systems. Journal of the Brazilian Computer Society, 20 (1). p. 1. ISSN 1678-4804. (doi:https://doi.org/10.1186/1678-4804-20-1) (Full text available)
[img]
Preview

Cámara, Javier and de Lemos, Rogério (2012) Evaluation of Resilience in Self-Adaptive Systems Using Probabilistic Model-Checking. In: Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2012 ICSE Workshop on. pp. 53-62. ISBN 978-1-4673-1788-7. (doi:https://doi.org/10.1109/SEAMS.2012.6224391) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cámara, Javier and de Lemos, Rogério (2012) Towards Run-time Evaluation of Resilience in Self-Adaptive Systems. In: Proceedings of the 17th Conference on Software Engineering and Databases (JISBD'12). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cámara, Javier and de Lemos, Rogério and Vieira, Marco and Almeida, Raquel and Ventura, Rafael (2013) Architecture-based Resilience Evaluation for Self-adaptive Systems. Computing, 95 (8). pp. 689-722. ISSN 1436-5057. (doi:https://doi.org/10.1007/s00607-013-0311-7) (Full text available)
[img]
Preview

D

Dallas, I. (1993) UCSG UNIX applications workshop, university-of-kent, July 6 and 7 1993. University Computing, 15 (4). pp. 195-200. ISSN 0265-4385. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Daloze, Benoit and Marr, Stefan and Bonetta, Daniele and Mössenböck, Hanspeter (2016) Efficient and Thread-Safe Objects for Dynamically-Typed Languages. In: ACM SIGPLAN Notices. OOPSLA 2016 Proceedings of the 2016 ACM International Conference on Object Oriented Programming Systems Languages & Applications. ACM pp. 642-659. ISBN 978-1-4503-4444-9. (doi:https://doi.org/10.1145/2983990.2984001) (Full text available)
[img]
Preview

Daloze, Benoit and Tal, Arie and Marr, Stefan and Mössenböck, Hanspeter and Petrank, Erez (2018) Parallelization of Dynamic Languages: Synchronizing Built-in Collections. Proceedings of the ACM on Programming Languages, 2 (OOPSLA). ISSN 2475-1421. E-ISSN 2475-1421. (doi:https://doi.org/10.1145/3276478) (Full text available)
[img]
Preview

Damsgaard Jensen, Christian and Marsh, Stephen and Dimitrakos, Theo and Murayama, Yuko, eds. (2015) Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology, 454 . Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:https://doi.org/10.1007/978-3-319-18491-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Daniel, Joshua and Dimitrakos, Theo and El-Moussa, Fadi and Ducatel, Gery and Pawar, Pramod and Sajjad, Ali (2015) Seamless Enablement of Intelligent Protection for Enterprise Cloud Applications through Service Store. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom). pp. 1021-1026. ISBN 978-1-4799-4092-9. E-ISBN 978-1-4799-4093-6. (doi:https://doi.org/10.1109/CloudCom.2014.92) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Daniel, Joshua and El-Moussa, Fadi and Ducatel, Géry and Pawar, Pramod and Sajjad, Ali and Rowlingson, Robert and Dimitrakos, Theo (2015) Integrating Security Services in Cloud Service Stores. In: Trust Management IX. IFIP Advances in Information and Communication Technology. Trust Management IX. IFIP Advances in Information and Communication Technology, 454. Springer pp. 226-239. ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:https://doi.org/10.1007/978-3-319-18491-3_19) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Davies, Nigel and Davy, M.J. and Blair, Gordon S. and Mariani, John A. (1993) Object invocation and management in the zenith distributed multimedia information-system. Information and Software Technology, 35 (5). pp. 259-266. ISSN 0950-5849. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Day, Warren (1992) Farming: towards a rigorous definition and efficient transputer implementation. In: Allen, Alastair, ed. Transputer Systems -- Ongoing Research, Proceedings of WoTUG 15. IOS Press, Netherlands, University of Aberdeen, UK pp. 49-62. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Day, Warren and Hill, Steve (1993) Farming: Towards a Rigorous Definition and Efficient Transputer Implementation. Technical report. University of Kent, Computing Laboratory, University of Kent, Canterbury, UK (Full text available)
[img]
Preview
[img]
Preview

De Castro Lima, Antonio Cesar and Descardeci, José Ricardo and Giarola, Attilio José (1992) Circular Microstrip Antenna on a Spherical Surface. Microwave and Optical Technology Letters, 5 (5). pp. 221-224. ISSN 0895-2477. (doi:https://doi.org/10.1002/mop.4650050506) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

De Koster, Joeri and Marr, Stefan and D'Hondt, Theo (2012) Synchronization Views for Event-loop Actors. In: Proceedings of the 17th ACM SIGPLAN symposium on Principles and Practice of Parallel Programming. (doi:https://doi.org/10.1145/2145816.2145873) (Full text available)
[img]
Preview

De Koster, Joeri and Marr, Stefan and D'Hondt, Theo and Van Cutsem, Tom (2014) Domains: safe sharing among actors. Science of Computer Programming, 98, Pa . pp. 140-158. ISSN 0167-6423. (doi:https://doi.org/10.1016/j.scico.2014.02.008) (Full text available)
[img]
Preview

De Koster, Joeri and Marr, Stefan and Van Cutsem, Tom and D'Hondt, Theo (2016) Domains: Sharing State in the Communicating Event-Loop Actor Model. Computer Languages, Systems & Structures, 45 . pp. 132-160. ISSN 1477-8424. (doi:https://doi.org/10.1016/j.cl.2016.01.003) (Full text available)
[img]
Preview

de Lemos, Rogério and Gacek, Cristina and Romanovsky, Alexander, eds. (2003) Architecting Dependable Systems. Springer-Verlag, Berlin, Heidelberg (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

De Wael, Mattias and Marr, Stefan and De Fraine, Bruno and Van Cutsem, Tom and De Meuter, Wolfgang (2015) Partitioned Global Address Space Languages. ACM Computing Surveys, 47 (4). 62:1-62:27. ISSN 0360-0300. (doi:https://doi.org/10.1145/2716320) (Full text available)
[img]
Preview

De Wael, Mattias and Marr, Stefan and De Meuter, Wolfgang (2014) Data Interface + Algorithms = Efficient Programs: Separating Logic from Representation to Improve Performance. In: Proceedings of the 9th Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems. (doi:https://doi.org/10.1145/2633301.2633303) (Full text available)
[img]
Preview

De Wael, Mattias and Marr, Stefan and Van Cutsem, Tom (2014) Fork/Join Parallelism in the Wild: Documenting Patterns and Anti-Patterns in Java Programs using the Fork/Join Framework. In: Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java Platform: Virtual Machines, Languages, and Tools. (doi:https://doi.org/10.1145/2647508.2647511) (Full text available)
[img]
Preview

Chadwick, David W. and de Decker, Bart, eds. (2012) Communications and Multimedia Security: Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security. Springer-Verlag ISBN 3-642-32804-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Delaney, Aidan and Stapleton, Gem and Taylor, John and Thompson, Simon (2013) On the expressiveness of spider diagrams and commutative star-free regular languages. Journal of Visual Languages and Computing, 24 (4). pp. 273-288. ISSN 1045-926X. (doi:https://doi.org/10.1016/j.jvlc.2013.02.001) (Full text available)
[img]
Preview

Demiralp, S.V. (1996) Configuring Distributed occam Programs using Doc. In: Arabnia, Hamid R., ed. Proceedings of the PDPTA''96. CSREA, Athens, Georgia, Sunnyvale, California, USA pp. 1152-1162. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dent, Alan and Hanna, Keith (1993) Reasoning about array structures using a dependently typed logic. In: Agnew, David and Claesen, Luc J. M. and Camposano, Raul, eds. IFIP transactions a-computer science and technology. North Holland, pp. 207-224. ISBN 0-444-81641-0. (doi:https://doi.org/10.1016/B978-0-444-81641-2.50022-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Derrick, John and Boiten, Eerke Albert (1999) Calculating upward and downward simulations of state-based specifications. Information and Software Technology, 41 (13). pp. 917-923. ISSN 0950-5849. (doi:https://doi.org/10.1016/S0950-5849(99)00044-0) (Full text available)
[img]
Preview
[img]
Preview

Derrick, John and Boiten, Eerke Albert (1999) Non-atomic refinement in Z. In: 1st World Congress on Formal Methods in the Development of Computing Systems (FM 99), SEP 20-24, 1999, Toulouse, France. (doi:https://doi.org/10.1007/3-540-48118-4_28) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Derrick, John and Boiten, Eerke Albert (2003) Recent advances in refinement. In: Borger, Egon and Gargantini, Angelo and Riccobene, Elvinia, eds. Abstract State Machines 2003. Lecture Notes in Computer Science, 2589 (2589). Springer Berlin Heidelberg pp. 33-56. ISBN 3-540-00624-9. (doi:https://doi.org/10.1007/3-540-36498-6_3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Derrick, John and Boiten, Eerke Albert (1998) Testing refinements by refining tests. In: Bowen, Jonathan P. and Fett, A. and Hinchey, Michael G., eds. ZUM '98: The Z Formal Specification Notation. Lecture Notes in Computer Science, 1493. Springer, Berlin pp. 265-283. ISBN 3-540-65070-9. (Full text available)
[img]
Preview
[img]
Preview

Derrick, John and Boiten, Eerke Albert and Bowman, Howard and Steen, Maarten (1999) Viewpoints and consistency: translating LOTOS to Object-z. Computer Standards and Interfaces, 21 (3). pp. 251-272. ISSN 0920-5489. (doi:https://doi.org/10.1016/S0920-5489(99)00010-0) (Full text available)
[img]
Preview
[img]
Preview

Derrick, John and Walkinshaw, Neil and Arts, Thomas and Benac Earle, Clara and Cesarini, Francesco and Fredlund, Lars-Ake and Gulias, Victor and Hughes, John and Thompson, Simon (2010) Property-Based Testing - The ProTest Project. In: Formal Methods for Components and Objects. Lecture Notes in Computer Science, 6286 . Springer, pp. 250-271. ISBN 978-3-642-17070-6. E-ISBN 978-3-642-17071-3. (doi:https://doi.org/10.1007/978-3-642-17071-3_13) (Full text available)
[img]
Preview

Devlin, Matthieu and Nurse, Jason R. C. and Hodges, Duncan and Goldsmith, Michael and Creese, Sadie (2015) Predicting Graphical Passwords. In: HAS 2015: Human Aspects of Information Security, Privacy, and Trust. 9190. Springer pp. 23-35. ISBN 978-3-319-20375-1. E-ISBN 978-3-319-20376-8. (doi:https://doi.org/10.1007/978-3-319-20376-8_3) (Full text available)
[img]
Preview

Di Ventra, Massimiliano and Pershin, Yuriy V. and Chua, Leon O. (2009) Circuit Elements With Memory: Memristors, Memcapacitors, and Meminductors. Proceedings of the IEEE, 97 (10). pp. 1717-1724. ISSN 0018-9219. (doi:https://doi.org/10.1109/JPROC.2009.2021077) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dib, Fadi (2018) Improved Neighbourhood Search-Based Methods for Graph Layout. Doctor of Philosophy (PhD) thesis, University of Kent,. (Full text available)
[img]
Preview

Dib, Fadi K. and Rodgers, Peter (2018) Graph drawing using tabu search coupled with path relinking. PLOS ONE, 13 (5). e0197103. ISSN 1932-6203. (doi:https://doi.org/10.1371/journal.pone.0197103) (Full text available)
[img]
Preview

Dilley, Nicolas and Lange, Julien (2019) An Empirical Study of Messaging Passing Concurrency in Go Projects. In: Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering. IEEE ISBN 978-1-72810-591-8. (doi:https://doi.org/10.1109/SANER.2019.8668036) (Full text available)
[img]
Preview

Dimitrakos, Theo and Martrat, Josep and Wesner, Stefan, eds. (2010) Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise: A selection of common capabilities validated in real-life business trials by the BEinGRID consortium. Springer Berlin Heidelberg ISBN 978-3-642-04086-3. E-ISBN 978-3-642-04086-3. (doi:https://doi.org/10.1007/978-3-642-04086-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dimitrakos, Theo (2014) Context-Aware Multifactor Authentication Based on Dynamic Pin. In: SEC 2014: ICT Systems Security and Privacy Protection. Springer pp. 330-338. ISBN 978-3-642-55414-8. E-ISBN 978-3-642-55415-5. (doi:https://doi.org/10.1007/978-3-642-55415-5_27) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dimitrakos, Theo (2015) Foreword: Towards Trusted Cloud Ecosystems. In: IFIP Advances in Information and Communication Technology. 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology (IFIPAICT), 454. Springer pp. 215-216. ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:https://doi.org/10.1007/978-3-319-18491-3_17) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dimmich, Damian J. and Jacobsen, Christian L. and Jadud, Matthew C. (2006) Concurrency: The Next Generation. In: Proceedings of Postgraduate Conference 2006: Computing Laboratory Technical Report. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ding, Zhong-Qiang Q and McLoughlin, Ian Vince and Tan, Eng-Chong C (2003) Extension of proposal of standards for intelligibility tests of Chinese speech: CDRT-tone. IEE Proceedings-Vision, Image and Signal Processing, 150 (1). pp. 1-5. ISSN 1350-245X. (doi:https://doi.org/10.1049/ip-vis:20030161) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ding, Zhongqiang Q and McLoughlin, Ian Vince and Tan, E C (2001) How to track pitch pulse in LP residual - Joint Time-Frequency Distribution Approach. In: Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing. pp. 43-46. ISBN 0-7803-7080-5. (doi:https://doi.org/10.1109/PACRIM.2001.953518) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ding, Zhongqiang and McLoughlin, Ian Vince and Tan, E C (2001) How to track pitch pulses in LP residual ? - joint time-frequency. 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233), 1 . pp. 43-46. (doi:https://doi.org/10.1109/PACRIM.2001.953518) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dodds, Mike and Batty, Mark and Gotsman, Alexey (2018) Compositional Verification of Compiler Optimisations on Relaxed Memory. In: Lecture Notes in Computer Science. Programming Languages and Systems: 27th European Symposium on Programming, ESOP 2018 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018 Proceedings. Springer ISBN 978-3-319-89883-4. (doi:https://doi.org/10.1007/978-3-319-89884-1_36) (Full text available)
[img]
Preview

Dominic, Orchard and Mistral, Contrastin and Matthew, Danish and Andrew, Rice (2017) Verifying Spatial Properties of Array Computations. Journal of Proceedings of the ACM, 1 (OOPSLA). p. 75. ISSN 2475-1421. E-ISSN 2475-1421. (doi:https://doi.org/10.1145/3133899) (Full text available)
[img]
Preview

Douglas, Andrew (1996) A Compiled Functional Language with a Martin-Lof Type System. Doctor of Philosophy (PhD) thesis, Computing Laboratory, University of Kent at Canterbury. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dowle, James and Kuo, Shyh Hao and Mehrotra, Kishore and McLoughlin, Ian Vince (2006) FPGA-based MIMO and Space-Time Processing Platform. In: , EURASIP Journal of Applied Signal Processing special issue on MIMO implementation. pp. 1-14. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dubois, Julie L. N. and Lavignac, Nathalie (2010) Synthesis and physicochemical characterisation of novel poly(amidoamine)s. In: 3rd International Symposium “Cellular delivery of therapeutic Macromolecules 2010”, 26-29/06/2010, Cardiff, UK. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dunn, Stuart and Hedges, Mark and Jordanous, Anna and Storz, Christoph (2012) Comparing the informatics of text and Cultural Heritage: the SAWS project. In: Computer Applications and Quantitative Methods in Archaeology, 2012, Southampton, UK. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Duraisingam, A. and Palaniappan, Ramaswamy and Andrews, S. (2017) Cognitive task difficulty analysis using EEG and data mining. In: Proceedings of the 2017 Conference on Emerging Devices and Smart Systems (ICEDSS). IEEE pp. 52-57. ISBN 978-1-5090-5555-5. (doi:https://doi.org/10.1109/ICEDSS.2017.8073658) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dziallas, Sebastian (2018) Characterising Graduateness in Computing Education: A Narrative Approach. Doctor of Philosophy (PhD) thesis, University of Kent,. (Full text available)
[img]
Preview

Dziallas, Sebastian and Fincher, Sally (2018) “I told you this last time, right?”: Re-visiting narratives of STEM education. In: ICER'18. 2018 ACM Conference on International Computing Education Research. ACM Digital Library, Espoo, Finland pp. 223-231. ISBN 978-1-4503-5628-2. (doi:https://doi.org/10.1145/3230977.3230989) (Full text available)
[img]
Preview

Dziallas, Sebastian and Fincher, Sally and Johnson, Colin G. and Utting, Ian (2017) The Year in Computing Initiative. In: 5th Annual Symposium of the United Kingdom & Ireland Engineering Education Research Network. Aston University, Birmingham, UK ISBN 978-1-85449-443-6. (Full text available)
[img]
Preview

da Gracca Campos Pimentel, Maria (1992) Showing the destination of hypertext links: a new approach for Guide. Technical report. UKC, University of Kent, Canterbury, UK (Full text available)
[img]
Preview
[img]
Preview

da Silva, Carlos Eduardo and Diniz, Thomas and Cacho, Nelio and de Lemos, Rogerio (2018) Self-adaptive Authorisation in OpenStack Cloud Platform. Journal of Internet Services and Applications, 9 (19). ISSN 1867-4828. E-ISSN 1869-0238. (doi:https://doi.org/10.1186/s13174-018-0090-7) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

da Silva, Carlos Eduardo and de Lemos, Rogerio (2011) Dynamic plans for integration testing of self-adaptive software systems. In: UNSPECIFIED. (doi:https://doi.org/10.1145/1988008.1988029) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

da Silva, Carlos Eduardo and de Lemos, Rogério (2013) Dynamic Management of Integration Testing for Self-Adaptive Systems. In: Workshop on Dependable in Adaptive and Self-Managing Systems (WDAS 2013). ISBN 978-85-7669-274-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

da Silva, Carlos Eduardo and de Lemos, Rogério (2011) A Framework for Automatic Generation of Processes for Self-Adaptive Software Systems. Informatica, 35 (1). pp. 3-13. ISSN 0350-5596. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

da Silva, Erick Lopes (2004) Qualidade de Serviço em Aplicações de Telemedicina. In: UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

da Silva, Erick Lopes (2006) Um Modelo de Segurança Para o Canal de Interatividade do Sistema Brasileiro de TV Digital: Arquitetura e Implementação. Other masters thesis, Federal University of Pernambuco. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

da Silva, Erick Lopes and Assad, Rodrigo Elia and Ferraz, Carlos A.G. and Fried, Mario (2006) Um Modelo de Segurança para o Canal de Interatividade da TV Digital: Arquitetura e Implementação. In: Proceeding of the 8th International Symposium on System and Information Security (SSI 2006). , São Paulo/SP- Brazil (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

da Silva, P.N. and Plastino, Alexandre and Freitas, Alex A. (2018) A Novel Genetic Algorithm for Feature Selection in Hierarchical Feature Spaces. In: Proceedings of the SIAM International Conference on Data Mining (SDM18). pp. 738-746. E-ISBN 978-1-61197-532-1. (doi:https://doi.org/10.1137/1.9781611975321.83) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Balthasar, Thibault and Hernandez-Castro, Julio C. (2017) An Analysis of Bitcoin Laundry Services. In: Lecture Notes in Computer Science. Springer-Verlag Berlin pp. 297-312. ISBN 978-3-319-70289-6. E-ISBN 978-3-319-70290-2. (doi:https://doi.org/10.1007/978-3-319-70290-2_18) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Carvalho, Paulo Manuel Martins (1996) Interaction of Periodic Bursty Traffic Flows in ATM Networks. Doctor of Philosophy (PhD) thesis, Computing Laboratory, University of Kent at Canterbury. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogerio (2007) Architectural Reconfiguration of Software Systems using Atomic Actions. In: Supplemental Proceedings of the 36th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2006). Fast Abstracts. pp. 174-175. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogerio (2007) Architectural fault tolerance using exception handling. In: Architecting dependable systems IV. Springer-Verlag, Berlin, Heidelberg, pp. 142-162. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogerio (2000) A Co-operative Object-Oriented Architecture for Adaptive Systems. In: Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the. IEEE Computer Society pp. 120-128. ISBN 0-7695-0604-6. (doi:https://doi.org/10.1109/ECBS.2000.839869) (Full text available)
[img]
Preview
[img]
Preview

de Lemos, Rogerio Foreword. In: Mistrík, Ivan and Galster, Matthias and Maxim, Bruce and Bahsoon, Rami, eds. Software Engineering for Variability Intensive Systems: Foundations and Applications. CRC Press. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Lemos, Rogerio (2001) Representing Exceptional Behaviour at the earlier Phases of Software Development. In: Proceedings of the 11th Brazilian Symposium of Fault-Tolerant Computing (SCTF). pp. 233-236. (Full text available)
[img]
Preview

de Lemos, Rogerio and Bailey, Christopher (2018) Evaluating Self-Adaptive Authorisation Infrastructures through Gamification. In: International Conference on Dependable Systems and Networks Proceedings. Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2018). IEEE ISBN 978-1-5386-5595-5. (doi:https://doi.org/10.1109/DSN.2018.00058) (Full text available)
[img]
Preview

de Lemos, Rogerio and Garlan, David and Ghezzi, Carlo and Giese, Holger and Andersson, Jesper and Litoiu, Marin and Schmerl, Bradley and Weyns, Danny and Baresi, Luciano and Bencomo, Nelly and Brun, Yuriy and Camara, Javier and Calinescu, Radu and Cohen, Myra B. and Gorla, Alessandra and Grassi, Vincenzo and Grunske, Lars and Inverardi, Paola and Jezequel, Jean-Marc and Malek, Sam and Mirandola, Raffaela and Mori, Marco and Müller, Hausi A. and Rouvoy, Romain and Rubira, Cecília M. F. and Rutten, Eric and Shaw, Mary and Tamburrelli, Giordano and Tamura, Gabriel and Villegas, Norha M. and Vogel, Thomas and Zambonelli, Franco (2018) Software Engineering for Self-Adaptive Systems: Research Challenges in the Provision of Assurances. In: de Lemos, Rogerio and Garlan, D. and Giese, H., eds. Software Engineering for Self-Adaptive Systems III. Assurances. Lecture Notes on Computer Science . Springer. ISBN 978-3-319-74182-6. (doi:https://doi.org/10.1007/978-3-319-74183-3_1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogerio and Giese, Holger and Müller, Hausi A. and Shaw, Mary and Andersson, Jesper and Litoiu, Marin and Schmerl, Bradley and Tamura, Gabriel and Villegas, Norha M. and Vogel, Thomas and Weyns, Danny and Baresi, Luciano and Becker, Basil and Bencomo, Nelly and Brun, Yuriy and Cukic, Bojan and Desmarais, Ron and Dustdar, Schahram and Engels, Gregor and Geihs, Kurt and Göschka, Karl M. and Gorla, Alessandra and Grassi, Vincenzo and Inverardi, Paola and Karsai, Gabor and Kramer, Jeff and Lopes, Antónia and Magee, Jeff and Malek, Sam and Mankovskii, Serge and Mirandola, Raffaela and Mylopoulos, John and Nierstrasz, Oscar and Pezzè, Mauro and Prehofer, Christian and Schäfer, Wilhelm and Schlichting, Rick and Smith, Dennis B. and Sousa, João Pedro and Tahvildari, Ladan and Wong, Kenny and Wuttke, Jochen (2013) Software Engineering for Self-Adaptive Systems: A Second Research Roadmap. In: Software Engineering for Self-Adaptive Systems II International Seminar. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 1-32. ISBN 978-3-642-35812-8. E-ISBN 978-3-642-35813-5. (doi:https://doi.org/10.1007/978-3-642-35813-5_1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogerio and Grzes, Marek (2019) Self-adaptive Artificial Intelligence. In: 2019 IEEE/ACM 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS). (In press) (Full text available)
[img]
Preview

de Lemos, Rogerio and Sedgewick, Peter (2018) Self-adaptation made easy with Blockchains. In: Proceedings of 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. ACM ISBN 978-1-4503-5715-9. (doi:https://doi.org/10.1145/3194133.3194150) (Full text available)
[img]
Preview

de Lemos, Rogerio and de Castro Guerra, Paulo Asterio (2005) Software Architectures for Dependable Systems. In: Dependable Computing. Lecture Notes in Computer Science, 3747. pp. 263-264. ISBN 978-3-540-29572-3. (doi:https://doi.org/10.1007/11572329_22) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Lemos, Rogério and Gacek, Cristina and Romanovsky, Alexander, eds. (2005) Architecting Dependable Systems III. Lecture Notes in Computer Science . Springer, Berlin, 357 pp. ISBN 978-3-540-28968-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogério (2006) Architectural Reconfiguration using Coordinated Atomic Actions. In: Proceedings of the ICSE 2006 Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2006). ACM, New York pp. 44-50. ISBN 1-59593-403-0. (doi:https://doi.org/10.1145/1137677.1137686) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogério (2016) Foreword. In: Mistrik, Ivan and Ali, Nour and Kazman, Rick and Grundy, John and Schmerl, Bradley, eds. Managing Trade-offs in Adaptable Software Architectures. Morgan Kaufmann, Cambridge, MA, USA, xxix-xxx. ISBN 978-0-12-802855-1. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Lemos, Rogério (2009) On Architecting Software Fault Tolerance using Abstractions. Electronic Notes in Theoretical Computer Science, 236 . pp. 21-32. ISSN 1571-0661. (doi:https://doi.org/10.1016/j.entcs.2009.03.012) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogério (2004) Self-* and Predictability: are these conflicting System Capabilities? In: Proceedings of the International Workshop on Self-* Properties in Complex Information Systems (SELF-STAR 2004). pp. 105-108. ISBN 978-3-540-26009-7. (Full text available)
[img]
Preview

de Lemos, Rogério and Gacek, Cristina and Romanovsky, Alexander, eds. (2004) Architecting Dependable Systems II. Lecture Notes in Computer Science, 3069 . Springer, 363 pp. ISBN 978-3-540-23168-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogério and Gacek, Cristina and Romanovsky, Alexander (2003) Architectural Mismatch Tolerance. In: de Lemos, Rogério and Gacek, Cristina and Romanovsky, Alexander, eds. Architecting Dependable Systems. Lecture Notes in Computer Science . Springer, pp. 175-196. ISBN 3-540-40727-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogério and Potena, Pasqualina (2016) Identifying and Handling Uncertainties in the Feedback Control Loop. In: Mistrik, Ivan and Ali, Nour and Kazman, Rick and Grundy, John and Schmerl, Bradley, eds. Managing Trade-offs in Adaptable Software Architectures. Morgan Kaufmann, Cambridge, MA, USA, pp. 353-367. E-ISBN 978-0-12-802855-1. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Lemos, Rogério and Timmis, Jon and Ayara, Modupe and Forrest, Simon (2007) Immune-inspired adaptable error detection for automated teller machines. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 37 (5). pp. 873-886. ISSN 1094-6977. (doi:https://doi.org/10.1109/TSMCC.2007.900662) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Leusse, Pierre and Periorellis, Panos and Dimitrakos, Theo and Nair, Srijith K. (2009) Self Managed Security Cell, a Security Model for the Internet of Things and Services. In: 1st International Conference on Advances in Future Internet, AFIN. Advances in Future Internet, AFIN. IEEE Xplore pp. 47-52. ISBN 978-0-7695-3664-4. (doi:https://doi.org/10.1109/AFIN.2009.15) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Oliveira, Lariza Laura and Freitas, Alex A. and Tinós, Renato (2017) Multi-objective genetic algorithms in the study of the genetic code’s adaptability. Information Sciences, 425 . pp. 48-61. ISSN 0020-0255. (doi:https://doi.org/10.1016/j.ins.2017.10.022) (Full text available)
[img]
Preview

de Sá, Alex G. C. and Freitas, Alex A. and Pappa, Gisele L. (2018) Automated Selection and Configuration of Multi-Label Classification Algorithms with Grammar-Based Genetic Programming. In: Auger, Anne and Fonseca, Carlos M. and Lourenço, Nuno and Machado, Penousal and Paquete, Luís and Whitley, Darrell, eds. Parallel Problem Solving from Nature – PPSN XV. Lecture Notes in Computer Science . Springer, pp. 308-320. ISBN 978-3-319-99258-7. (doi:https://doi.org/10.1007/978-3-319-99259-4_25) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

de Vries, Patrick and Johnson, Colin G. and Blomfield, Ian C. (2010) Modelling fim expression in Escherichia coli K12. In: International Conference on Computational Systems-Biology and Bioinformatics. Communications in Computer and Information Science. Springer, Heidelberg pp. 14-25. ISBN 978-3-642-16749-2. E-ISBN 978-3-642-16750-8. (doi:https://doi.org/10.1007/978-3-642-16750-8_2) (Full text available)
[img]
Preview

du Boulay, Benedict and Patel, Mukesh J. and Taylor, Chris (1992) Programming Environments for Novices. In: Proc. of NATO Advanced Research Workshop on Cognitive Models and Intelligent Environments. , Genoa, Italy pp. 105-107. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

E

Edwards, Marion and Morse, David R. (1995) The burden is description, not identification - Reply. Trends in Ecology and Evolution, 10 (10). pp. 416-417. ISSN 0169-5347. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Edwards, Marion and Morse, David R. (1995) The potential for computer-aided identification in biodiversity research. Trends in Ecology and Evolution, 10 (4). pp. 153-158. ISSN 0169-5347. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Edwards, Michael R. (1997) Developing a model of expertise for a taxonomic expert system. In: Bridge, Paul and Jeffries, Peter and Morse, David R. and Scott, Peter R., eds. Information Technology, Plant Pathology and Biodiversity. Cabi Publishing. Cabi Publishing-C a B Int, Wallingford pp. 183-196. ISBN 0-85199-217-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Eggenschwiler, Jacqueline and Agrafiotis, Ioannis and Nurse, Jason R. C. (2016) Insider threat response and recovery strategies in financial services firms. Computer Fraud & Security, . ISSN 1361-3723. (doi:https://doi.org/10.1016/S1361-3723(16)30091-4) (Full text available)
[img]
Preview

Eisl, Josef and Marr, Stefan and Würthinger, Thomas and Mössenböck, Hanspeter (2017) Trace Register Allocation Policies: Compile-time vs. Performance Trade-offs. In: Proceedings of the 14th International Conference on Managed Languages and Runtimes. (doi:https://doi.org/10.1145/3132190.3132209) (Full text available)
[img]
Preview

Elsehely, Ehab and Sobhy, Mohammed (2000) Real time radar target detection under jamming conditions using wavelet transform on FPGA device. IEEE International Symposium On Circuits and Systems, 4 . pp. 545-548. (doi:https://doi.org/10.1109/ISCAS.2000.858809) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Emms, Martin and Arief, Budi and Defty, Troy and Hannon, Joseph and Hao, Feng and van Moorsel, Aad (2012) The Dangers of Verify PIN on Contactless Cards. Technical report. CS-TR-1332 (Full text available)
[img]
Preview

Emms, Martin and Arief, Budi and Freitas, Leo and Hannon, Joseph and van Moorsel, Aad (2014) Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN. In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). CCS '14. ACM, New York, NY, USA pp. 716-726. ISBN 978-1-4503-2957-6. (doi:https://doi.org/10.1145/2660267.2660312) (Full text available)
[img]
Preview

Emms, Martin and Arief, Budi and Hannon, Joseph and van Moorsel, Aad (2013) POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards. Technical report. CS-TR-1386 (Full text available)
[img]
Preview

Emms, Martin and Arief, Budi and Little, Nicholas and van Moorsel, Aad (2013) Risks of Offline Verify PIN on Contactless Cards. In: Sadeghi, Ahmad-Reza, ed. Lecture Notes in Computer Science. Lecture Notes in Computer Science LNCS, 7859. Springer Berlin Heidelberg, Berlin pp. 313-321. ISBN 978-3-642-39883-4. E-ISBN 978-3-642-39884-1. (doi:https://doi.org/10.1007/978-3-642-39884-1_26) (Full text available)
[img]
Preview

Emms, Martin and Arief, Budi and van Moorsel, Aad (2014) Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors. In: Preneel, Bart and Ikonomou, Demosthenes, eds. APF 2012: Privacy Technologies and Policy. Lecture Notes in Computer Science. Springer Berlin Heidelberg pp. 203-214. ISBN 978-3-642-54068-4. E-ISBN 978-3-642-54069-1. (doi:https://doi.org/10.1007/978-3-642-54069-1_13) (Full text available)
[img]
Preview

Evans, Andy and Kent, Stuart (1999) Core meta-modelling semantics of UML: The pUML approach. In: France, Robert and Rumpe, Bernhard, eds. Lecture Notes in Computer Science. Lecture Notes in Computer Science, 1723. Springer-Verlag Berlin pp. 140-155. ISBN 3-540-66712-1. (doi:https://doi.org/10.1007/3-540-46852-8_11) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Evered, Mark and Kölling, Michael and Schmolitzky, Axel (1995) A Flexible Object Invocation Language based on Object-Oriented Language Definition. Computer Journal, 38 (3). pp. 181-191. ISSN 0010-4620. (Full text available)
[img]
Preview

Everett, Richard and Nurse, Jason R. C. and Erola, Arnau (2016) The Anatomy of Online Deception: What Makes Automated Text Convincing? In: 31st Annual ACM Symposium on Applied Computing (SAC). (doi:https://doi.org/10.1145/2851613.2851813) (Full text available)
[img]
Preview

Eze, Chika and Nurse, Jason R. C. and Happa, Jassim (2016) Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 7 (1). ISSN 2093-5382. (doi:https://doi.org/10.22667/JOWUA.2016.03.31.039) (Full text available)
[img]
Preview

F

Fabris, Fabio (2018) Meta-Learning for Hierarchical Classification and Applications in Bioinformatics. International Journal of Computer and Information Engineering, 12 (7). ISSN 2010-3921. (Full text available)
[img]
Preview
[img]
Preview

Fabris, Fabio (2017) New Probabilistic Graphical Models and Meta-Learning Approaches for Hierarchical Classification, with Applications in Bioinformatics and Ageing. Doctor of Philosophy (PhD) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

Fabris, Fabio and Freitas, Alex A. and Tullet, Jennifer M.A. (2015) An Extensive Empirical Comparison of Probabilistic Hierarchical Classifiers in Datasets of Ageing-Related Genes. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 13 (6). pp. 1045-1058. ISSN 1545-5963. E-ISSN 1557-9964. (doi:https://doi.org/10.1109/TCBB.2015.2505288) (Full text available)
[img]
Preview

Fabris, Fabio and Freitas, Alex A. and de Magalhaes, João Pedro (2017) A Review of Supervised Machine Learning Applied to Ageing Research. Biogerontology, 18 (2). pp. 171-188. ISSN 1389-5729. E-ISSN 1573-6768. (doi:https://doi.org/10.1007/s10522-017-9683-y) (Full text available)
[img]
Preview
[img]
Preview

Fabris, Fabio and Palmer, Daniel and de Magalhaes, João Pedro and Freitas, Alex A. (2019) Comparing enrichment analysis and machine learning for identifying gene properties that discriminate between gene classes. Briefings in Bioinformatics, . ISSN 1477-4054. (doi:https://doi.org/10.1093/bib/bbz028) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fachin, M.P.G. (1994) The Divide-and-Conquer Method for the Solution of the Symmetric Tridiagonal Eigenproblem and Transputer Implementations. Doctor of Philosophy (PhD) thesis, Computing Laboratory, University of Kent at Canterbury. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Faddegon, Maarten (2017) Algorithmic debugging for complex lazy functional programs. Doctor of Philosophy (PhD) thesis, University of Kent,. (Full text available)
[img]
Preview

Fan, Wenjun (2019) HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design. IEEE Journal on Selected Areas in Communications, 37 (3). 683 -697. ISSN 0733-8716. (doi:https://doi.org/10.1109/JSAC.2019.2894307) (Full text available)
[img]
Preview

Fan, Wenjun and Du, Zhihui and Fernandez, David and Villagra, Victor A. (2018) Enabling an Anatomic View to Investigate Honeypot Systems: A Survey. IEEE Systems Journal, 12 (4). pp. 3906-3919. ISSN 1932-8184. (doi:https://doi.org/10.1109/JSYST.2017.2762161) (Full text available)
[img]
Preview
[img]
Preview

Farnan, Oliver and Nurse, Jason R. C. (2016) Exploring a Controls-Based Assessment of Infrastructure Vulnerability. In: 10th Risks and Security of Internet and Systems. CRiSIS 2015, July 20-22 2015, Greece. (doi:https://doi.org/10.1007/978-3-319-31811-0_9) (Full text available)
[img]
Preview

Fatema, Kaniz (2013) Adding Privacy Protection to Policy Based Authorisation Systems. Doctor of Philosophy (PhD) thesis, University of Kent,. (Full text available)
[img]
Preview

Fatema, Kaniz and Chadwick, David (2014) Resolving Policy Conflicts-Integrating Policies from Multiple Authors. In: UNSPECIFIED. (Full text available)
[img]
Preview

Fatema, Kaniz and Chadwick, David W. and Lievens, Stijin F. (2011) A Multi-privacy Policy Enforcement System. In: Fischer-Hubner, Simone and Duquenoy, Penny and Hansen, Marit and Leenes, Ronald and Zhang, Ge, eds. Privacy and Identity Management for Life. IFIP Advances in Information and Communication Technology, 352 (2011). Springer, Boston, pp. 297-310. ISBN 978-3-642-20768-6. (doi:https://doi.org/10.1007/978-3-642-20769-3_24) (Full text available)
[img]
Preview

Fernandes, G.P.A. (1998) Distributed Platform Support for Service Management. Doctor of Philosophy (PhD) thesis, University of Kent at Canterbury. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fernandes, G.P.A. (1993) T'ecnicas de Compilacc~ao para Sistemas Distribu'idos}. Other masters thesis, Escola de Engenharia, Universidade do Minho. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fernandes, G.P.A. and Derrick, John (1997) Formal Specification and Testing of a Management Architecture. In: Lazar, Aurel and Saracco, Roberto and Stadler, Rolf, eds. Integrated Network Management V - Integrated management in a virtual world. 5th IFIP/IEEE International Symposium on Integrated Network Management. Chapman & Hall, 2-6 Boundary Row, London, England Se1 8hn, San Diego, California, USA pp. 473-484. ISBN 0-412-80960-5. (Full text available)
[img]
Preview
[img]
Preview

Fernandes, G.P.A. and Derrick, John (1996) Formal Specification of Distributed Services Management. In: Spaniol, Otto and Linnhoff-Popien, Claudia and Meyer, Bernd, eds. Trends in Distributed Systems' 96. Verlag der Augustinus Buchhandlung, Aachen, Germany pp. 96-103. ISBN 3-86073-473-3. (Full text available)
[img]
Preview
[img]
Preview

Fernandes, G.P.A. and Hungate, J. (1995) Comparison of POSIX Open System Environment (OSE) and Open Distributed Processing (ODP) Reference Models. Technical report. Computer Systems Laboratory,U.S.A, Distributed Systems Engineering, Computer Systems Laboratory, Technology Administration, U.S. Department of Commerce, Gaithersburg, MD 20899, U.S.A. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ferrer, Ana Juan and Hernandez, Francisco and Tordsson, Johan and Elmroth, Erik and Ali-Eldin, Ahmed and Zsing, Csilla and Sivert, Raul and Guitart, Jordi and Badia, Rosa M. and Djemame, Karim and Ziegler, Wolfgang and Dimitrakos, Theo and Nair, Srijith K. and Kousiouris, George and Konstanteli, Kleopatra and Varvarigou, Theodora and Hudzia, Benoit and Kipp, Alexander and Wesner, Stefan and Corrales, Marcelo and Forgo, Nikolaus and Sharif, Tabassum and Sheridan, Craig (2012) OPTIMIS: A holistic approach to cloud service provisioning. Future Generation Computer Systems, 28 (1). pp. 66-77. ISSN 0167-739X. (doi:https://doi.org/10.1016/j.future.2011.05.022) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fincher, Sally (2013) The Diarists' Audience. In: Stanley, Liz, ed. Documents of Life Revisited: Narrative and Biographical Methodology for a 21st Century Critical Humanism. Ashgate, pp. 77-92. ISBN 978-1-4094-4289-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fincher, Sally (2012) Using Narrative Methodology. University of Kent at Canterbury, Canterbury, 52 pp. ISBN 978-1-902671-78-9. (Full text available)
[img]
Preview

Fincher, Sally and Knox, Daniel (2013) The Porous Classroom: Professional Practices in the Computing Curriculum. IEEE Computer, 46 (9). pp. 44-51. ISSN 0018-9162. (doi:https://doi.org/10.1109/MC.2013.261) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Flur, Shaked and Sarkar, Susmit and Pulte, Christopher and Nienhuis, Kyndylan and Maranget, Luc and Gray, Kathryn E. and Sezgin, Ali and Batty, Mark and Sewell, Peter (2017) Mixed-Size Concurrency: ARM, POWER, C/C++11, and SC. In: ACM SIGPLAN Notices - POPL '17. POPL 2017 Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. ACM ISBN 978-1-4503-4660-3. (doi:https://doi.org/10.1145/3009837.3009839) (Full text available)
[img]
Preview

NCR Corporation (Dayton, OH) (2009) A Method of Determining the Cause of an Error State in an Apparatus. US Patent 7,600,671. (doi:US Patent 7,600,671) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Freitas, Alex A. (2014) Contrasting meta-learning and hyper-heuristic research: the role of evolutionary algorithms. Genetic Programming and Evolvable Machines, 15 (1). pp. 3-35. ISSN 1389-2576. E-ISSN 1573-7632. (doi:https://doi.org/10.1007/s10710-013-9186-9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Freitas, Alex A. (2019) Investigating the Role of Simpson’s Paradox in the Analysis of Top-Ranked Features in High-Dimensional Bioinformatics Datasets. Briefings in Bioinformatics, . E-ISSN 1477-4054. (doi:https://doi.org/10.1093/bib/bby126) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Freitas, Alex A. and Pinto Junior, Jony A. and Plastino, Alexandre and Neumann, Nadine M. (2018) Is P-value<0.05 Enough? Two Case Studies in Classifiers Evaluation. In: Annals of the National Meeting of Artificial and Computational Intelligence (ENIAC). pp. 94-103. (doi:https://doi.org/10.5753/eniac.2018.4407) (Full text available)
[img]
Preview

Friston, Karl J. and Rosch, Richard and Parr, Thomas and Price, Cathy and Bowman, Howard (2017) Deep temporal models and active inference. Neuroscience & Biobehavioral Reviews, 77 . pp. 388-402. ISSN 0149-7634. (doi:https://doi.org/10.1016/j.neubiorev.2017.04.009) (Full text available)
[img]
Preview

Férée, Hugo (2017) Game semantics approach to higher-order complexity. Journal of Computer and System Sciences, 87 . pp. 1-15. ISSN 0022-0000. (doi:https://doi.org/10.1016/j.jcss.2017.02.003) (Full text available)
[img]
Preview

Férée, Hugo and Gomaa, Walid and Hoyrup, Mathieu (2014) Analytical properties of resource-bounded real functionals. Journal of Complexity, 30 (5). pp. 647-671. ISSN 0885-064X. E-ISSN 1090-2708. (doi:https://doi.org/10.1016/j.jco.2014.02.008) (Full text available)
[img]
Preview

Férée, Hugo and Hym, Samuel and Mayero, Micaela and Moyen, Jean-Yves and Nowak, David (2018) Formal Proof of Polynomial-Time Complexity with Quasi-Interpretations. In: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs. ACM ISBN 978-1-4503-5586-5. (doi:https://doi.org/10.1145/3167097) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

G

Gacek, Cristina and Arief, Budi (2004) The Many Meanings of Open Source. IEEE Software, 21 (1). pp. 34-40. ISSN 0740-7459. (doi:https://doi.org/10.1109/MS.2004.1259206) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Gacek, Cristina and Lawrie, Tony and Arief, Budi (2002) Interdisciplinary Insights on Open Source. In: Proceedings of the Open Source Software Development Workshop, 25th - 26th February, 2002, Newcastle upon Tyne, U.K.. (Full text available)
[img]
Preview

Gajardo-Vidal, Andrea and Lorca-Puls, Diego L. and Crinion, Jennifer T. and White, Jitrachote and Seghier, Mohamed L. and Leff, Alex P. and Hope, Thomas M.H. and Ludersdorfer, Philipp and Green, David W. and Bowman, Howard and Price, Cathy J. (2018) How distributed processing produces false negatives in voxel-based lesion-deficit analyses. Neuropsychologia, . ISSN 0028-3932. (doi:https://doi.org/10.1016/j.neuropsychologia.2018.02.025) (Full text available)
[img]
Preview

Gao, Qiang and Blow, Keith J. and Holding, David J. and Marshall, Ian W. (2003) Determining Design Parameters for Ad-hoc Wireless Sensor Networks. In: ETFA 2003: IEEE Cpnference on Emerging Technologies and Factory Automation, VOL 1, Proceedings. IEEE, Lisbon pp. 545-550. ISBN 0-7803-7937-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Garner, Tom and Jordanous, Anna (2016) Emergent Perception and Video Games that Listen: Applying Sonic Virtuality for Creative and Intelligent NPC Behaviours. In: 2nd Computational Creativity and Games Workshop. (Full text available)
[img]
Preview

Gaspar, Jaime and Boiten, Eerke Albert (2014) Simple composition theorems of one-way functions -- proofs and presentations. Technical report. IACR EPrints (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Genaim, Samir and King, Andy (2008) Inferring non-suspension conditions for logic programs with dynamic scheduling. ACM Transactions on Computational Logic, 9 (3). pp. 182-196. ISSN 1529-3785. (doi:https://doi.org/10.1145/1352582.1352585) (Full text available)
[img]
Preview

Gerig, Guido and Welti, Daniel and Guttmann, Charles and Colchester, Alan C. F. and Szekely, Gabor (1998) Exploring the discrimination power of the time domain for segmentation and characterization of lesions in serial MR data. In: Wells, William M. and Colchester, Alan C. F. and Delp, Scott, eds. Medical Image Computing and Computer-Assisted Interventation. Lecture Notes in Computer Science, 1496. Springer-Verlag Berlin, Berlin pp. 469-480. ISBN 3-540-65136-5. (doi:https://doi.org/10.1007/BFb0056232) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ghafouri-Shiraz, H and McLoughlin, Ian Vince (1991) High accuracy displacement measurements for integrated optical components. In: Trans. IEICE, National Convention Record. IEICE p. 1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ghafouri-Shiraz, H and McLoughlin, Ian Vince (1991) The implementation of a high accuracy optical measurement technique of particular interest to miniature optics. Microwave and Optical Technology Letters, 4 (12). pp. 524-527. (doi:https://doi.org/10.1002/mop.4650041204) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ghosh, Siddhartha and Ryan, Nick S. (2005) Ubiquitous Data Capture for Cultural Heritage Research. In: Ryan, Nick S. and Cinotti, Tullio Salmon and Raffa, Guiseppe, eds. Smart Environments and their Applications to Cultural Heritage. EPOCH Publication. Archaeolingua, Budapest, Hungary, Tokyo, Japan pp. 19-22. (Full text available)
[img]
Preview

Giasemidis, Georgios and Kaplis, Nikolaos and Agrafiotis, Ioannis and Nurse, Jason R. C. (2018) A semi-supervised approach to message stance classification. IEEE Transactions on Knowledge and Data Engineering, . ISSN 1041-4347. E-ISSN 1558-2191. (doi:https://doi.org/10.1109/TKDE.2018.2880192) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Giasemidis, Georgios and Singleton, Colin and Agrafiotis, Ioannis and Nurse, Jason R. C. and Pilgrim, Alan and Willis, Chris (2016) Determining the veracity of rumours on Twitter. In: 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part I. Part of the Lecture Notes in Computer Science book series. Springer, Germany pp. 185-205. ISBN 978-3-319-47879-1. (doi:https://doi.org/10.1007/978-3-319-47880-7_12) (Full text available)
[img]
Preview

Gibson, R. M. and Chennu, S. and Fernandez-Espejo, D. and Naci, L. and Owen, A. M. and Cruse, D. (2016) Somatosensory attention identifies both overt and covert awareness in disorders of consciousness. Annals of Neurology, 80 (3). pp. 412-423. ISSN 0364-5134. E-ISSN 1531-8249. (doi:https://doi.org/10.1002/ana.24726) (Full text available)
[img]
Preview

Gibson, Raechelle M. and Chennu, Srivas and Owen, Adrian M. and Cruse, Damian (2014) Complexity and familiarity enhance single-trial detectability of imagined movements with electroencephalography. Clinical Neurophysiology, 125 (8). pp. 1556-1567. ISSN 1388-2457. E-ISSN 1872-8952. (doi:https://doi.org/10.1016/j.clinph.2013.11.034) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Giubilo, Fabio and Sajjad, Ali and Shackleton, Mark and Chadwick, David W. and Fan, Wenjun and de Lemos, Rogério (2018) An Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services. In: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE ISBN 978-1-5386-0598-1. E-ISBN 978-1-908320-93-3. (doi:https://doi.org/10.23919/ICITST.2017.8356404) (Full text available)
[img]
Preview

Goel, Ashok and Jordanous, Anna and Pease, Alison (2017) Preface: Proceedings of the Eighth International Conference on Computational Creativity, ICCC 2017, Atlanta — 19 - 23 June. In: Goel, Ashok and Jordanous, Anna and Pease, Alison, eds. 8th International Conference on Computational Creativity. ACC ISBN 978-0-692-89564-1. (Full text available)
[img]
Preview

Gomez, Rodolfo and Augusto, Juan Carlos and Galton, Antony (2000) Implementation and Testing of a Set of Event Detection Operators. Technical report. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gomez, Rodolfo and Augusto, Juan Carlos and Galton, Antony (2001) Testing an Event Specification Language. In: Proceedings of the 13th. International Conference on Software Engineering and Knowledge Engineering (SEKE'01). , Buenos Aires, Argentina pp. 341-345. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gonzalez Boix, Elisa and Marr, Stefan (2018) Introduction to the Meta’16 Workshop Special Issue. Journal of Object Technology, 17 (1). pp. 1-2. ISSN 1660-1769. (doi:https://doi.org/10.5381/jot.2018.17.1.e1) (Full text available)
[img]
Preview

Gonzalez-Gadea, Maria Luz and Chennu, Srivas and Bekinschtein, Tristan A. and Rattazzi, Alexia and Beraudi, Ana and Tripicchio, Paula and Moyano, Beatriz and Soffita, Yamila and Steinberg, Laura and Adolfi, Federico and Sigman, Mariano and Marino, Julian and Manes, Facundo and Ibanez, Agustin (2015) Predictive coding in autism spectrum disorder and attention deficit hyperactivity disorder. Journal of Neurophysiology, 114 (5). pp. 2625-2636. ISSN 0022-3077. E-ISSN 1522-1598. (doi:https://doi.org/10.1152/jn.00543.2015) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gonzalez-Velazquez, Antonio and Sacks, Lionel and Marshall, Ian W. (2002) Ad-hoc Sensor Network Experimentation using the RCX by Mindstorms. In: Proceedings of IFIPWG6.7 Workshop. (Full text available)
[img]
Preview

Gonzalez-Velazquez, Antonio and Sacks, Lionel and Marshall, Ian W. (2002) Simple Spontaneous Mechanism for Flexible Data Communication in Wireless Ad-hoc Sensor Networks. In: Proceedings of LCS. (Full text available)
[img]
Preview

González Fernández, Edgar and Sandoval Orozco, Ana and García Villalba, Luis and Hernandez-Castro, Julio C. (2018) Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts. Sensors (Basel, Switzerland), 18 (9). ISSN 1424-8220. (doi:https://doi.org/10.3390/s18092804) (Full text available)
[img]
Preview

Gootjes-Dreesbach, Ellis Luise (2015) Awareness & Perception in Rapid Serial Visual Presentation. Doctor of Philosophy (PhD) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Gounaropoulos, Alex and Johnson, Colin Graeme (2007) A Neural Network Approach for Synthesising Timbres from Adjectives. In: Proceedings of the 4th Sound and Music Computing Conference (SMC07). National and Kapodistrian University of Athens, Athens, Greece ISBN 978-960-6608-75-9. (Full text available)
[img]
Preview

Gouvas, Panagiotis and Kalaboukas, Konstantinos and Ledakis, Giannis and Dimitrakos, Theo and Daniel, Joshua and Ducatel, Gery and Rodriguez Dominguez, Nuria (2015) A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project. In: IFIP Advances in Information and Communication Technology. Trust Management IX: 9th IFIP WG 11.11 International Conference, IFIPTM 2015. IFIP Advances in Information and Communication Technology (IFIPAICT), 454 (454). Springer pp. 217-225. ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:https://doi.org/10.1007/978-3-319-18491-3_18) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Grant, J. and So, J. and de Lemos, Rogério (2007) Intrusion Tolerance in Ad Hoc Networks through Swarms of Fragments Replicas. In: Supplemental Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2007). pp. 386-387. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Greathead, David and Coventry, Lynne and Arief, Budi and van Moorsel, Aad (2012) Deriving Requirements for an Online Community Interaction Scheme: Indications from Older Adults. In: ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2012) Extended Abstracts on Human Factors in Computing Systems. , Austin, Texas, USA pp. 1541-1546. ISBN 978-1-4503-1016-1. (doi:https://doi.org/10.1145/2212776.2223669) (Full text available)
[img]
Preview

Greenhow, Keith and Johnson, Colin G. (2014) Region Based Image Preprocessor for Feed-Forward Perceptron Based Systems. In: Zeng, Zhigang and Li, Yangmin and King, Irwin, eds. Advances in Neural Networks – ISNN 2014. Advances in Neural Networks – ISNN 2014, 11th International Symposium on Neural Networks. Lecture Notes in Computer Science. Springer pp. 414-422. ISBN 978-3-319-12435-3. E-ISBN 978-3-319-12436-0. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Greenhow, Keith and Johnson, Colin G. (2015) Regioned Downsample for ANN Image Classification: Alternate Selection Methods. In: 2015 SAI Intelligent Systems Conference (IntelliSys). IEEE, Red Hood, NY, USA pp. 793-797. ISBN 978-1-4673-7607-5. (doi:https://doi.org/10.1109/IntelliSys.2015.7361231) (Full text available)
[img]
Preview

Grigore, Radu and Kiefer, Stefan (2018) Selective Monitoring. In: Leibniz International Proceedings in Informatics. LIPICS, Germany (doi:https://doi.org/10.4230/LIPIcs.CONCUR.2018.20) (Full text available)
[img]
Preview

Grimmer, Matthias and Marr, Stefan and Kahlhofer, Mario and Wimmer, Christian and Würthinger, Thomas and Mössenböck, Hanspeter (2017) Applying Optimizations for Dynamically-typed Languages to Java. In: Proceedings of the 14th International Conference on Managed Languages and Runtimes. ManLang'17. ACM pp. 12-22. ISBN 978-1-4503-5340-3. (doi:https://doi.org/10.1145/3132190.3132202) (Full text available)
[img]
Preview

Grosso, Sergio and Tully, Alan and Arief, Budi and Marques, Antonio and Matoses, Manuel Serrano (2006) Collaborations among in-vehicle and infrastructure-based sensing technology for automotive applications: The EMMA and TRACKSS EU Projects. In: IET Seminar on RFID and Electronic Vehicle Identification in Road Transport. , Newcastle pp. 57-65. ISBN 978-0-86341-734-4. (doi:https://doi.org/10.1049/ic:20060135) (Full text available)
[img]
Preview

Grzes, Marek (2017) Reward Shaping in Episodic Reinforcement Learning. In: Proc. of the 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2017). ACM pp. 565-573. (Full text available)
[img]
Preview

Grzes, Marek and Hoey, Jesse (2013) On the Convergence of Techniques that Improve Value Iteration. In: Neural Networks (IJCNN), The 2013 International Joint Conference. Proceedings of International Joint Conference on Neural Networks (IJCNN). pp. 1-8. ISBN 978-1-4673-6128-6. (doi:https://doi.org/10.1109/IJCNN.2013.6706982) (Full text available)
[img]
Preview

Grzes, Marek and Poupart, Pascal (2014) POMDP Planning and Execution in an Augmented Space. In: Alessio Lomuscio, Paul Scerri, Ana Bazzan, and Michael Huhns (eds.), Proceedings of the 13th International Con- ference on Autonomous Agents and Multiagent Systems (AAMAS 2014). Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS). pp. 757-764. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Grzes, Marek and Poupart, Pascal and Hoey, Jesse (2013) Controller Compilation and Compression for Resource Constrained Applications. In: Perny, Patrice and Pirlot, Marc and Tsoukias, Alexis, eds. Third International Conference, ADT 2013, Bruxelles, Belgium, November 12-14, 2013, Proceedings. Proceedings of International Conference on Algorithmic Decision Theory (ADT). Lecture Notes in Computer Science. Springer pp. 193-207. ISBN 978-3-642-41574-6. E-ISBN 978-3-642-41575-3. (doi:https://doi.org/10.1007/978-3-642-41575-3_15) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Grzes, Marek and Poupart, Pascal and Hoey, Jesse (2013) Isomorph-Free Branch and Bound Search for Finite State Controllers. In: Proceedings of International Joint Conference on Artificial Intelligence (IJCAI). (Full text available)
[img]
Preview

Grzes, Marek and Poupart, Pascal and Yang, Xiao and Hoey, Jesse (2014) Energy Efficient Execution of POMDP Policies. IEEE Transactions on Cybernetics, PP (99). ISSN 2168-2267. (doi:https://doi.org/10.1109/TCYB.2014.2375817) (Full text available)
[img]
Preview

Guest, Richard and Fairhurst, Michael and Potter, Jonathan (2000) Automated extraction of image segments from clinically diagnostic hand-drawn geometric shapes. Proceedsings of the 26th Euromicro Conference, Vols I and II, . A440-A446. ISSN 1089-6503. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Guitierrez, Carlos Ramierez (1998) A Theory of Episodic Memory for Case-based Reasoning and its Implementation. Doctor of Philosophy (PhD) thesis, University of Kent at Canterbury. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Guo, Hui and Kafal?, Özgür and Jeukeng, Anne-Liz and Williams, Laurie and Singh, Munindar P. (2018) Poster: Extraction of Security Requirements from Textual Artifacts. In: Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS). (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Guo, Hui and Kafal?, Özgür and Singh, Munindar P. (2018) Extraction and Formal Representation of Natural Language Requirements from Breach Reports. In: Fifth International Workshop on Artificial Intelligence for Requirements Engineering. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Guo, Hui and Kafali, Ozgur and Singh, Munindar (2018) Extraction of Natural Language Requirements from Breach Reports Using Event Inference. In: 2018 5th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE). IEEE pp. 22-28. ISBN 978-1-5386-8404-7. (doi:https://doi.org/10.1109/AIRE.2018.00009) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Gupta, C.N. and Palaniappan, Ramaswamy (2009) Denoising cyclostationary framework for enhanced electrocardiogram analysis. In: 2007 Computers in Cardiology. pp. 93-96. ISBN 978-1-4244-2533-4. (doi:https://doi.org/10.1109/CIC.2007.4745429) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, C.N. and Palaniappan, Ramaswamy and Rajan, S. and Swaminathan, S. and Krishnan, S.M. (2005) Segmentation and classification of heart sounds. In: Proceedings of the Canadian Conference on Electrical and Computer Engineering 2005. IEEE pp. 1678-1681. ISBN 0-7803-8885-2. (doi:https://doi.org/10.1109/CCECE.2005.1557305) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, C.N. and Palaniappan, Ramaswamy and Swaminathan, S. (2005) Classification of homomorphic segmented phonocardiogram signals using grow and learn network. In: 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference. IEEE pp. 4251-4254. ISBN 978-0-7803-8740-9. (doi:https://doi.org/10.1109/IEMBS.2005.1615403) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, C.N. and Palaniappan, Ramaswamy and Swaminathan, S. and Krishnan, S.M. (2007) Neural network classification of homomorphic segmented heart sounds. Applied Soft Computing, 7 (1). pp. 286-297. ISSN 1568-4946. (doi:https://doi.org/10.1016/j.asoc.2005.06.006) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, Cota Navin and Khan, Yusuf U and Palaniappan, Ramaswamy and Sepulveda, Francisco (2009) Wavelet framework for improved target detection in oddball paradigms using P300 and gamma band analysis. International Journal of Biomedical Soft-computing and Human Sciences, 14 (2). pp. 61-67. ISSN 2185-2421. (doi:https://doi.org/10.24466/ijbschs.14.2_63) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, Cota Navin and Palaniappan, Ramaswamy (2009) Biometric paradigm using visual evoked potential. In: Encyclopedia of Information Science and Technology. IGI Global, pp. 362-368. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, Cota Navin and Palaniappan, Ramaswamy (2012) Using High-Frequency Electroencephalogram in Visual and Auditory-Based Brain-Computer Interface Designs. EContact!, 14 (2). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gupta, Cota Navin and Palaniappan, Ramaswamy and Paramesran, Raveendran (2012) Exploiting the P300 paradigm for cognitive biometrics. International Journal of Cognitive Biometrics, 1 (1). pp. 26-38. ISSN 2042-6461. (doi:https://doi.org/10.1504/IJCB.2012.046513) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

H

Haas, S. and Thornley, D.A. and Zhu, M. and Dobinson, R.W. and Heeley, R. and Madsen, N.A.H. and Martin, B. (1997) The Macrame 1024 node switching network. In: Hertzberger, Bob and Sloot, Peter M. A., eds. High-Performance Computing and Networking. Lecture Notes in Computer Science, 1225. Springer-Verlag Berlin pp. 870-877. ISBN 3-540-62898-3. (doi:https://doi.org/10.1007/BFb0031573) (Full text available)
[img]
Preview
[img]
Preview

Haas, S. and Thornley, D.A. and Zhu, M. and Dobinson, R.W. and Heeley, R. and Madsen, N.A.H. and Martin, B. (1998) Results from the Macrame 1024 node switching network. In: Computer Physics Communications. Elsevier pp. 206-210. (doi:https://doi.org/10.1016/S0010-4655(97)00178-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Haas, S. and Thornley, D.A. and Zhu, M. and Dobinson, R.W. and Martin, B. (1998) The Macrame 1024 node switching network. Microprocessors and Microsystems, 21 (7-8). pp. 511-518. ISSN 0141-9331. (doi:https://doi.org/10.1016/S0141-9331(98)00044-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hajdusek, Michal and Pérez-Delgado, Carlos A and Fitzsimons, Joseph F (2015) Device-independent verifiable blind quantum computation. arXiv preprint arXiv:1502.02563, . (Unpublished) (Full text available)
[img]
Preview

Hanna, Keith (2000) Reasoning about analog-level implementations of digital systems. Formal Methods in System Design, 16 (2). pp. 127-158. ISSN 0925-9856. (doi:https://doi.org/10.1023/A:1008791128550) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith (1998) Reasoning about imperfect digital systems. In: Moller, Bernhard Moller and Tucker, John V, eds. Prospects for Hardware Foundations. Lecture Notes in Computer Science, 1546 . Springer-Verlag Berlin, Berlin, pp. 333-355. ISBN 03029743. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith and Daeche, Neil (1987) An Algebraic Approach to Computational Logic. In: Dybjer, Peter and Nordstrom, B., eds. Proc Workshop on Programming Logic. pp. 300-326. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith and Daeche, Neil (1986) Specification and Verification of Digital Systems using Higher-Order Logic. Proc. IEE, Part E, . pp. 242-254. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith and Daeche, Neil (1992) The Veritas Design Logic - a Users View. IFIP Transactions A-Computer Science And Technology, 10 . pp. 301-310. ISSN 0926-5473. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith and Daeche, Neil (1992) The Veritas Design Logic - a Users View. In: Stavridou, V. and Melham, Thomas F. and Boute, R.T., eds. IFIP Transactions A-Computer Science And Technology. Elsevier Science Publ B V pp. 301-310. ISBN 0-444-89686-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith and Daeche, Neil and Howells, Gareth (1992) Implementation of the Veritas Design Logic. In: International Conference On Theorem Provers in Circuit Design : Theory, Practice And Experience. IFIP Transactions A-Computer Science and Technology, 10 . Elsevier Science, Nijmegen, Netherlands, pp. 77-94. ISBN 0-444-89686-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith and Daeche, Neil and Longley, Mark (1990) Specification and Verification using Dependent Types. IEEE Transactions Software Engineering, SE-16 (9). pp. 949-964. (doi:https://doi.org/10.1109/32.58783) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanson, Richard J. and Hopkins, Tim (2018) Remark on Algorithm 539: A Modern Fortran Reference Implementation for Carefully Computing the Euclidean Norm. ACM Transactions on Mathematical Software, 44 (3). pp. 1-23. ISSN 0098-3500. E-ISSN 1557-7295. (doi:https://doi.org/10.1145/3134441) (Full text available)
[img]
Preview

Happa, Jassim and Fairclough, Graham and Nurse, Jason R. C. and Agrafiotis, Ioannis and Goldsmith, Michael and Creese, Sadie (2016) A Pragmatic System-failure Assessment and Response Model. In: 2nd International Conference on Information Systems Security and Privacy. (Full text available)
[img]
Preview

Happa, Jassim and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie and Williams, Rebecca (2018) An Ethics Framework for Research into Heterogeneous Systems. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018. IET ISBN 978-1-78561-843-7. (doi:https://doi.org/10.1049/cp.2018.0026) (Full text available)
[img]
Preview

Harrison, Joseph (2018) Automatic detection of core Erlang message passing errors. In: Proceedings of the 17th ACM SIGPLAN International Workshop on Erlang - Erlang 2018. Erlang 2018 Proceedings of the 17th ACM SIGPLAN International Workshop on Erlang. ACM Press pp. 37-48. ISBN 978-1-4503-5824-8. (doi:https://doi.org/10.1145/3239332.3242765) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hatton, Leslie (1999) Repetitive failure, feedback and the lost art of diagnosis. Journal of Systems and Software, 47 (2-3). pp. 183-188. ISSN 0164-1212. (doi:https://doi.org/10.1016/S0164-1212(99)00038-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

He, Pei and Johnson, Colin G. and Wang, HouFeng (2011) Modeling grammatical evolution by automaton. Science China Information Sciences, 54 (12). pp. 2544-2553. ISSN 1674-733X. E-ISSN 1869-1919. (doi:https://doi.org/10.1007/s11432-011-4411-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hedges, Mark and Jordanous, Anna and Dunn, Stuart and Roueché, Charlotte and Kuster, Marc W and Selig, Thomas and Bittorf, Michael and Artes, Waldemar (2012) New models for collaborative textual scholarship. In: 6th IEEE International Conference on Digital Ecosystems Technologies (DEST 2012), 2012, Campione d'Italia, Switzerland. (Full text available)
[img]
Preview

Hedges, Mark and Jordanous, Anna and Lawrence, K. Faith and Roueché, Charlotte and Tupman, Charlotte (2017) Computer-Assisted Processing of Intertextuality in Ancient Languages. Journal of Data Mining and Digital Humanities, . ISSN 2416-5999. E-ISSN 2416-5999. (Full text available)
[img]
Preview

Helal, Ayah and Otero, Fernando E.B. (2017) Automatic design of ant-miner mixed attributes for classification rule discovery. In: GECCO '17: Proceedings of the Genetic and Evolutionary Computation Conference. ACM pp. 433-440. ISBN 978-1-4503-4920-8. (doi:https://doi.org/10.1145/3071178.3071306) (Full text available)
[img]
Preview

Hellyer, Laurence and Beadle, Lawrence (2009) Detecting Plagarism in Microsoft Excel Assignments. In: White, Hazel, ed. 10th Annual Conference of the Subject Centre for Information and Computer Sciences. HE Academy pp. 130-134. ISBN 978-0-9559676-6-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hellyer, Laurence and Ritson, Carl G. and Simpson, Jonathan (2010) Proceedings of the 2010 School of Computing Postgraduate Conference. Technical report. , University of Kent, Canterbury, Kent CT2 7NF, UK (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Henderson, Philip J. and Webb, David J. and Jackson, David A. and Zhang, Leishi and Bennion, Ian (1999) Highly-multiplexed grating-sensors for temperature-referenced quasi-static measurements of strain in concrete bridges. In: 13th International Conference on Optical Fiber Sensors and Workshop on Device and System Technology Toward Future Optical Fiber Communication and Sensing, Apr 12-16, 1999, Kyongju, South Korea. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hernandez-Castro, Julio C. and Boiten, Eerke Albert (2014) Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014 (2). pp. 5-8. ISSN 1361-3723. (doi:https://doi.org/10.1016/S1361-3723(14)70461-0) (Full text available)
[img]
Preview

Hernandez-Castro, Julio C. and Boiten, Eerke Albert (2013) First Kent Cyber Security Survey. . Internet only. (Full text available)
[img]
Preview

Hernandez-Castro, Julio C. and Boiten, Eerke Albert (2015) UK has little to be proud of as survey reveals sorry state of European cybersecurity. . The Conversation Internet only. (Full text available)
[img]

Hernandez-Castro, Julio C. and Boiten, Eerke Albert and Barnoux, Magali F.L. (2014) Second Kent Cyber Security Survey. . Internet only. (Full text available)
[img]
Preview

Hersch, Roger and Andre, Jacques and Brown, Heather (1998) Electronic Publishing, Artistic Imaging, and Digital Typography. Lecture Notes in Computer Science . Springer-Verlag, 574 pp. ISBN 3-540-64298-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hertel, Lars and Phan, Huy and Mertins, Alfred (2016) Comparing Time and Frequency Domain for Audio Event Recognition Using Deep Learning. In: IEEE International Joint Conference on Neural Networks (IJCNN 2016). IEEE, Vancouver, BC, Canada pp. 3407-3411. ISBN 978-1-5090-0619-9. (doi:https://doi.org/10.1109/IJCNN.2016.7727635) (Full text available)
[img]
Preview

Hesketh, Richard (1991) Perly - unix with buttons. Software: Practice and Experience, 21 (11). pp. 1165-1187. ISSN 0038-0644. (doi:https://doi.org/10.1002/spe.4380211103) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hierons, R. and Derrick, John (2000) Editorial: Special issue on specification-based testing. Software Testing Verification & Reliability, 10 (4). pp. 201-202. ISSN 0960-0833. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hobbs, M.H.W. (1995) Analysis of a retail branch network: a problem of catchment areas. In: Fisher, Peter, ed. Inovations in GIS 2. Taylor &amp; Francis, pp. 151-161. ISBN 0-7484-0269-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hobbs, M.H.W. (2000) Email groups for learning and assessment. In: Joyce, Donald, ed. SIGCSE Bulletin. ACM p. 183. ISBN 1-58113-207-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hobbs, M.H.W. (1996) Spatial clustering using a genetic algorithm. In: Parker, David, ed. Innovatins in GIS 3. Taylor &amp; Francis, pp. 85-95. ISBN 0-7484-0459-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hocko, Michal and Kalibera, Tomas (2010) Reducing performance non-determinism via cache-aware page allocation strategies. In: Proceedings of the first joint WOSP/SIPEW International Conference on Performance Engineering. ACM pp. 182-196. ISBN 978-1-60558-563-5. (doi:https://doi.org/10.1145/1712605.1712640) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hodges, D. and Nurse, Jason R. C. and Goldsmith, M. and Creese, S. (2012) Identity attribution across CyberSpace and the Natural Space. In: The International Crime and Intelligence Analysis Conference. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Holden, Nicholas and Freitas, Alex A. (2008) Improving the performance of hierarchical classification with swarm intelligence. In: Marchiori, Elena and Moore, Jason H., eds. Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, Proceedings. Lecture Notes in Computer Science, 4973. Springer pp. 48-60. ISBN 978-3-540-78756-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hope, Thomas M.H. and Friston, Karl J. and Price, Cathy J. and Leff, Alex P. and Rotshtein, Pia and Bowman, Howard (2019) Recovery After Stroke: Not So Proportional After All? Brain, 142 (1). pp. 15-22. ISSN 0006-8950. E-ISSN 1460-2156. (doi:https://doi.org/10.1093/brain/awy302) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hopkins, Jack and Kafal?, Özgür and Alrayes, Bedour and Stathis, Kostas (2018) Pirasa: strategic protocol selection for e-commerce agents. Electronic Markets, . ISSN 1019-6781. E-ISSN 1422-8890. (doi:https://doi.org/10.1007/s12525-018-0307-4) (Full text available)
[img]
Preview
[img]
Preview

Hopkins, Jack and Kafal?, Özgür and Stathis, Kostas (2015) Open Game Tournaments in STARLITE: Demonstration. In: AAMAS '15 Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. ACM pp. 1927-1928. ISBN 978-1-4503-3413-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hopkins, Tim (1998) Certification of Algorithm 734: A Fortran 90 code for unconstrained nonlinear minimization. Acm Transactions on Mathematical Software, 24 (3). pp. 351-354. ISSN 0098-3500. (doi:https://doi.org/10.1145/292395.292460) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hopkins, Tim (1997) Is the quality of numerical subroutine code improving? In: International Workshop on Modern Software Tools for Scientific Computing, Sep 16-18, 1996, Oslo, Norway. (Full text available)
[img]
Preview
[img]
Preview

Hopkins, Tim (1996) Restructuring software: A case study. Software: Practice and Experience, 26 (8). pp. 967-982. ISSN 0038-0644. (doi:https://doi.org/10.1002/(SICI)1097-024X(199608)26:8<967::AID-SPE41>3.0.CO;2-G) (Full text available)
[img]
Preview
[img]
Preview

Hopkins, Tim and K?l?ç, Emrah (2018) An analytical approach: Explicit inverses of periodic tridiagonal matrices. Journal of Computational and Applied Mathematics, 335 . pp. 207-226. ISSN 0377-0427. (doi:https://doi.org/10.1016/j.cam.2017.11.038) (Full text available)
[img]
Preview

Hopkins, Tim and Morse, David R. (1997) The implementation and visualisation of a large spatial individual-based model. In: IFIP TC5 WG5.11 International Symposium on Environmental Software Systems (ISESS 97), Apr 28-May 02, 1997, Dalta Whistler, Canada. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hopkins, Tim and Welch, Peter H. (1996) Transputer data-flow solution for systems of linear equations. Concurrency-Practice and Experience, 8 (8). pp. 569-580. ISSN 1040-3108. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hosu, Vlad and Hahn, Franz and Jenadeleh, Mohsen and Lin, Hanhe and Men, Hui and Szirányi, Tamás and Li, Shujun and Saupe, Dietmar (2017) The Konstanz Natural Video Database (KoNViD-1k). In: 2017 Ninth International Conference on Quality of Multimedia Experience (QoMEX). Proceedings of the 2017 9th International Conference on Quality of Multimedia Experience. IEEE, Germany ISBN 978-1-5386-4025-8. E-ISBN 978-1-5386-4024-1. (doi:https://doi.org/10.1109/QoMEX.2017.7965673) (Full text available)
[img]
Preview

Hoverd, Tim and Sampson, Adam T. (2010) A Transactional Architecture for Simulation. In: ICECCS 2010: Fifteenth IEEE International Conference on Engineering of Complex Computer Systems. IEEE Press pp. 286-290. (Full text available)
[img]
Preview

Howard, Sam and Silla Jr, Carlos N. and Johnson, Colin G. (2011) Automatic Lyrics-based Music Genre Classification in a Multilingual Setting. In: Proceeedings of the Thirteenth Brazilian Symposium on Computer Music. (Full text available)
[img]
Preview

Howe, Jacob M. (1998) A `Permutation-free' Calculus for Lax Logic. Technical report. (Full text available)
[img]
Preview
[img]
Preview

Howe, Jacob M. (1998) Proof Search Issues in Some Non-Classical Logics. Doctor of Philosophy (PhD) thesis, University of St Andrews. (Full text available)
[img] [img]
Preview

Howe, Jacob M. (1996) Theorem Proving and Partial Proof Search for Intuitionistic Propositional Logic Using a Permutation-free Calculus with Loop-Checking. Technical report. (Full text available)
[img]
Preview
[img]
Preview

Howe, Jacob M. and King, Andy (2000) Abstracting numeric constraints with Boolean functions. Information Processing Letters, 75 (1-2). pp. 17-23. ISSN 0020-0190. (doi:https://doi.org/10.1016/S0020-0190(00)00081-8) (Full text available)
[img]
Preview
[img]

Howe, Jacob M. and King, Andy and Simon, Axel (2019) Incremental Closure for Systems of Two Variables Per Inequality. Theoretical Computer Science, 768 . pp. 1-64. ISSN 0304-3975. (doi:https://doi.org/10.1016/j.tcs.2018.12.001) (Full text available)
[img]
Preview
[img]
Preview

Howe, Jacob M. and Robbins, Ed and King, Andy (2017) Theory Learning with Symmetry Breaking. In: Pientka, Brigitte, ed. International Symposium on Principles and Practice of Declarative Programming. ACM, Namur, Belgium, pp. 85-96. ISBN 978-1-4503-5291-8. (doi:https://doi.org/10.1145/3131851.3131861) (Full text available)
[img]
Preview

Howells, Gareth and Fairhurst, Michael and Bisset, D.L. (1995) BCN - A Novel Network Architecture for ram-Based Neurons. Pattern Recognition Letters, 16 (3). pp. 297-303. ISSN 0167-8655. (doi:https://doi.org/10.1016/0167-8655(94)00098-N) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Huan, N-J and Palaniappan, Ramaswamy (2004) Brain computer interface design using mental task classification. Multimedia Cyberscape Journal, . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Huan, N.-J. and Palaniappan, Ramaswamy (2004) Electroencephalogram signal classification using linear discriminant analysis for brain-computer interface design. In: Proceedings of Multimedia International Symposium on Information and Communication Technologies, 7-8 Oct 2004, Putrajaya, Malaysia. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Huan, N.-J. and Palaniappan, Ramaswamy (2004) Neural network classification of autoregressive features from electroencephalogram signals for brain-computer interface design. Journal of Neural Engineering, 1 (3). pp. 142-150. ISSN 1741-2560. (doi:https://doi.org/10.1088/1741-2560/1/3/003) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Huang, P. and Marshall, Ian W. (2002) New Flooding Control Schemes Applied in Route Initialisation for the Ad-hoc On Demand Routing Protocols. In: Proceedings of LCS. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Huay, Y E and McLoughlin, Ian Vince (2001) Error Detection and Correction for microsatellite software running on {COTS} processors. In: , Proceedings of the IEEE Int. Conference on Information, Communications and Signal Processing. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hull, Gavin and John, Henna and Arief, Budi (2019) Ransomware Deployment Methods and Analysis: Views from a Predictive Model and Human Responses. Crime Science, 8 (2). (doi:https://doi.org/10.1186/s40163-019-0097-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

Hungate, J. and Fernandes, G.P.A. (1995) Distributed Systems: Survey of Open Management Approaches. Technical report. , Distributing Systems Engineering, Computer Systems Laboratory, Technology Administration, U.S. Department of Commerce, Gaithersburg, MD 20899, U.S.A. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hurley-Smith, Darren and Hernandez-Castro, Julio (2018) Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. IEEE Transactions on Information Forensics and Security, 13 (4). pp. 1031-1041. ISSN 1556-6013. E-ISSN 1556-6021. (doi:https://doi.org/10.1109/TIFS.2017.2777342) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Huth, Carly L and Chadwick, David W and Claycomb, William and You, Ilsun (2013) Guest editorial: A brief overview of data leakage and insider threats. Information Systems Frontiers, 15 (1). pp. 1-4. ISSN 1387-3326. E-ISSN 1572-9419. (doi:https://doi.org/10.1007/s10796-013-9419-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

I

Ibbetson, Alan L. and Linington, Peter F. and Penny, Ian and Smith, Abraham B. and Tripp, Gerald (1996) Reducing the cost of remote procedure call. In: Schill, Alexander and Mittasch, Christian and Spaniol, Otto and Popien, Claudia, eds. Distributed Platforms. Chapman & Hall pp. 430-446. ISBN 0-412-73280-7. (doi:https://doi.org/10.1007/978-0-387-34947-3_32) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ibrahim, Azhar Mohd and Venkat, Ibrahim and De Wilde, Philippe (2019) The Impact of Potential Crowd Behaviours on Emergency Evacuation: An Evolutionary Game Theoretic Approach. Journal of Artificial Societies and Social Simulation, 22 (1). ISSN 1460-7425. (doi:https://doi.org/10.18564/jasss.3837) (Full text available)
[img]
Preview

Ibrahim, Azhar Mohd and Venkat, Ibrahim and De Wilde, Philippe (2017) Uncertainty in a spatial evacuation model. Physica A: Statistical Mechanics and its Applications, 479 . pp. 485-497. ISSN 0378-4371. (doi:https://doi.org/10.1016/j.physa.2017.03.024) (Full text available)
[img]
Preview

Idachaba, Unekwu Solomon (2015) A Bio-Inspired Cache Management Policy for Cloud Computing Environments using the Artificial Bee Colony Algorithm. Doctor of Philosophy (PhD) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Iliasov, Alexei and Arief, Budi and Romanovsky, Alexander (2009) Step-wise development of resilient ambient campus scenarios. In: Butler, Michael and Jones, Cliff and Romanovsky, Alexander and Troubitsyna, Elena, eds. Methods, Models and Tools for Fault Tolerance. Lecture Notes in Computer Science . Springer, pp. 297-323. ISBN 03029743. (doi:https://doi.org/10.1007/978-3-642-00867-2_14) (Full text available)
[img]
Preview

Iliasov, Alexei and Romanovsky, Alexander and Arief, Budi and Laibinis, Linas and Troubitsyna, Elena (2007) On rigorous design and implementation of fault tolerant ambient systems. In: 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing,. pp. 141-145. ISBN 978-0-7695-2765-9. (doi:https://doi.org/10.1109/ISORC.2007.46) (Full text available)
[img]
Preview

Iliasov, Alexei and Romanovsky, Alexander and Arief, Budi and Laibinis, Linas and Troubitsyna, Elena (2007) A framework for open distributed system design. In: International Computer Software and Applications Conference. pp. 658-668. ISBN 978-0-7695-2870-0. (doi:https://doi.org/10.1109/COMPSAC.2007.23) (Full text available)
[img]
Preview

Induruwa, A.S. (1999) Growth of Internet Based Services with special reference to Sri Lanka. In: Proceedings of the International Information Technology Conference '99 (IITC '99). Council for Information Technology, Sri Lanka ISBN (on CD ROM). (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Induruwa, A.S. (1999) Information Technology Development in Sri Lanka - A Review. Journal of the National Science Foundation of Sri Lanka, 27 (4). ISSN 1391-4588. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Iqbal, Musaddar and Freitas, Alex A. and Johnson, Colin G. (2008) Protein interaction inference using particle swarm optimization algorithm. In: Marchiori, Elena and Moore, Jason H., eds. Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, Proceedings. Lecture Notes in Computer Science, 4973. Springer pp. 61-70. ISBN 978-3-540-78756-3. (doi:https://doi.org/10.1007/978-3-540-78757-0_6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Itoh, Makoto and Chua, Leon O. (2008) MEMRISTOR OSCILLATORS. International Journal of Bifurcation and Chaos, 18 (11). pp. 3183-3206. ISSN 0218-1274. (doi:https://doi.org/10.1142/S0218127408022354) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Iuga, Cristian and Nurse, Jason R. C. and Erola, Arnau (2016) Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks. Journal of Human-centric Computing and Information Sciences, 6 (8). ISSN 2192-1962. (doi:https://doi.org/10.1186/s13673-016-0065-2) (Full text available)
[img]
Preview

Izziden, Ahmed and Chennu, Srivas (2018) A Neuroscience Study on the Implicit Subconscious Perceptions of Fairness and Islamic Law in Muslims Using the EEG N400 Event Related Potential. Journal of Cognition and Neuroethics, 5 (2). pp. 21-50. ISSN 2166-5087. (Full text available)
[img]
Preview

J

Jackson, Nicholas and Johnson, Colin G. (2012) Evolution of unknotting strategies for knots and braids. In: Proceedings of the AISB/IACAP World Congress 2012. (Full text available)
[img]
Preview

Jafarov, E. and Lievens, S.J. and van der Jeugt, Joris (2008) The Wigner distribution function for the one-dimensional parabose oscillator. Journal of Physics A: Mathematical and Theoretical, 41 (23 (Ar). ISSN 1751-8113. (doi:https://doi.org/10.1088/1751-8113/41/23/235301) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jameel, Shoaib and Bouraoui, Zied and Schockaert, Steven (2017) MEmbER: Max-Margin Based Embeddings for Entity Retrieval. In: SIGIR '17 Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval. Proceedings of the 40th International ACM SIGIR. ACM pp. 783-792. ISBN 978-1-4503-5022-8. (doi:https://doi.org/10.1145/3077136.3080803) (Full text available)
[img]
Preview

Jameel, Shoaib and Bouraoui, Zied and Schockaert, Steven (2018) Unsupervised Learning of Distributional Relation Vectors. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, ACL 2018. Association for Computational Linguistics ISBN 978-1-948087-32-2. (Full text available)
[img]
Preview

Jameel, Shoaib and Fu, Zihao and Shi, Bei and Lam, Wai and Schockart, Steven (2018) Word Embedding as Maximum A Posteriori Estimation. In: Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI 2019). (In press) (Full text available)
[img]
Preview

Jarchi, Delaram and Casson, Alexander J. (2017) Towards Photoplethysmography-Based Estimation of Instantaneous Heart Rate During Physical Activity. IEEE Transactions on Biomedical Engineering, 64 (9). pp. 2042-2053. ISSN 0018-9294. (doi:https://doi.org/10.1109/TBME.2017.2668763) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Jarchi, Delaram and Lo, Benny and Wong, Charence and Ieong, Edmund and Nathwani, Dinesh and Yang, Guang-Zhong (2016) Gait Analysis From a Single Ear-Worn Sensor: Reliability and Clinical Evaluation for Orthopaedic Patients. IEEE Transactions on Neural Systems and Rehabilitation Engineering, 24 (8). pp. 882-892. ISSN 1534-4320. (doi:https://doi.org/10.1109/TNSRE.2015.2477720) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Jarchi, Delaram and Rodgers, Sarah J. and Tarassenko, Lionel and Clifton, David A. (2018) Accelerometry-Based Estimation of Respiratory Rate for Post-Intensive Care Patient Monitoring. IEEE Sensors Journal, 18 (12). pp. 4981-4989. ISSN 1530-437X. (doi:https://doi.org/10.1109/JSEN.2018.2828599) (Full text available)
[img]
Preview

Jarchi, Delaram and Wong, Charence and Kwasnicki, Richard Mark and Heller, Ben and Tew, Garry A. and Yang, Guang-Zhong (2014) Gait Parameter Estimation From a Miniaturized Ear-Worn Sensor Using Singular Spectrum Analysis and Longest Common Subsequence. IEEE Transactions on Biomedical Engineering, 61 (4). pp. 1261-1273. ISSN 0018-9294. (doi:https://doi.org/10.1109/TBME.2014.2299772) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Javarone, Marco A. and Marinazzo, Daniele (2018) Dilution of Ferromagnets via a Random Graph-Based Strategy. Complexity, 2018 . Article ID 2845031. ISSN 1076-2787. (doi:https://doi.org/10.1155/2018/2845031) (Full text available)
[img]
Preview

Jiang, Bing and Song, Yan and Wei, Si and Liu, Jun-Hua and McLoughlin, Ian Vince and Dai, Li-Rong (2014) Deep bottleneck features for spoken language identification. PloS one, 9 (7). e100795-e100795. (doi:https://doi.org/10.1371/journal.pone.0100795) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jiang, Bing and Song, Yan and Wei, Si and McLoughlin, Ian Vince and Dai, Li-Rong (2014) Task-Aware Deep Bottleneck Features for Spoken Language Identification. Interspeech 2014, . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jiang, Bing and Song, Yan and Wei, Si and Wang, Meng-Ge and McLoughlin, Ian Vince and Dai, Li-Rong (2014) Performance evaluation of deep bottleneck features for spoken language identification. In: Chinese Spoken Language Processing (ISCSLP), 2014 9th International Symposium on. Chinese Spoken Language Processing (ISCSLP), 2014 9th International Symposium on. IEEE pp. 143-147. ISBN 978-1-4799-4219-0. (doi:https://doi.org/10.1109/ISCSLP.2014.6936580) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jin, Ma and Song, Yan and McLoughlin, Ian Vince (2017) End-to-end DNN-CNN Classification for Language Identification. In: Proceedings of The World Congress on Engineering 2017. IAENG pp. 119-203. ISBN 978-988-14-0474-9. (Full text available)
[img]
Preview

Jin, Ma and Song, Yan and McLoughlin, Ian Vince and Guo, Wu and Dai, Li-Rong (2017) End-to-End Language Identification Using High-Order Utterance Representation with Bilinear Pooling. In: The proceedings of Interspeech 2017. International Speech Communication Society pp. 2571-2575. (doi:https://doi.org/10.21437/Interspeech.2017-44) (Full text available)
[img]
Preview

Johnson, Colin G. (2013) Artistic and Musical Applications of Internet Search Technologies: Prospects and a Case Study. Digital Creativity, 24 (4). pp. 342-366. ISSN 1462-6268. E-ISSN 1744-3806. (doi:https://doi.org/10.1080/14626268.2013.777351) (Full text available)
[img]
Preview

Johnson, Colin G. (1998) Between-host evolution of mutation-rate and within-host evolution of virulence. In: Proceedings Third German Workshop on Artificial Life. Harri Deutsch (Full text available)
[img]
Preview

Johnson, Colin G. (2012) Connotation in Computational Creativity. Cognitive Computation, 4 (3). pp. 280-291. ISSN 1866-9956. E-ISSN 1866-9964. (doi:https://doi.org/10.1007/s12559-012-9141-8) (Full text available)
[img]
Preview

Johnson, Colin G. (2012) The Creative Computer as Romantic Hero? Computational Creativity Systems and Creative Personæ. In: Proceedings of the Third International Conference on Computational Creativity. pp. 57-61. E-ISBN 978-1-905254-66-8. (Full text available)
[img]
Preview

Johnson, Colin G. (2016) Fitness in Evolutionary Art and Music: A Taxonomy and Future Prospects. Fitness in evolutionary art and music: a taxonomy and future prospects, 9 (1). pp. 4-25. ISSN 1754-8853. E-ISSN 1754-8861. (doi:https://doi.org/10.1504/IJART.2016.075406) (Full text available)
[img]
Preview

Johnson, Colin G. (2012) Fitness in Evolutionary Art and Music: What Has Been Used and What Could Be Used? In: Lecture Notes in Computer Science. EvoMUSART 2012: Evolutionary and Biologically Inspired Music, Sound, Art and Design. Lecture Notes in Computer Science. Springer, Heidelberg pp. 129-140. ISBN 978-3-642-29141-8. E-ISBN 978-3-642-29142-5. (doi:https://doi.org/10.1007/978-3-642-29142-5_12) (Full text available)
[img]
Preview

Johnson, Colin G. (2009) Genetic Programming Crossover: Does It Cross Over? In: EuroGP 2009: Genetic Programming. Lecture Notes in Computer Science. Springer, Heidelberg pp. 97-108. ISBN 978-3-642-01180-1. E-ISBN 978-3-642-01181-8. (doi:https://doi.org/10.1007/978-3-642-01181-8_9) (Full text available)
[img]
Preview

Johnson, Colin G. (2014) Is it Time for Computational Creativity to Grow Up and Start being Irresponsible? In: Fifth International Conference on Computational Creativity. (Unpublished) (Full text available)
[img]
Preview

Johnson, Colin G. (2007) The Non-Classical Mind: Cognitive Science and Non-Classical Computing. In: Schuster, Alfons, ed. Intelligent Computing Everywhere. Springer, London, UK, pp. 45-59. ISBN 978-1-84628-943-9. E-ISBN 978-1-84628-943-9. (doi:https://doi.org/10.1007/978-1-84628-943-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Johnson, Colin G. (2019) Solving the Rubik’s Cube with Learned Guidance Functions. In: Proceedings of the 2018 IEEE Symposium Series on Computational Intelligence. pp. 2082-2089. ISBN 978-1-5386-9277-6. E-ISBN 978-1-5386-9276-9. (doi:https://doi.org/10.1109/SSCI.2018.8628626) (Full text available)
[img]
Preview

Johnson, Colin G. (2008) Student-Generated Podcasts for Learning and Assessment. In: Koli '08 Proceedings of the 8th International Conference on Computing Education Research. ACM, New York, NY, USA pp. 84-87. E-ISBN 978-1-60558-385-3. (doi:https://doi.org/10.1145/1595356.1595371) (Full text available)
[img]
Preview

Johnson, Colin G. (2009) Teaching Natural Computation. IEEE Computational Intelligence Magazine, 4 (1). pp. 24-30. ISSN 1556-603X. (doi:https://doi.org/10.1109/MCI.2008.930984) (Full text available)
[img]
Preview

Johnson, Colin G. and Marsh, Duncan (1998) A CAD Representation of Robot Manipulator Workspace. In: 29th International Symposium on Robotics. (Full text available)
[img]
Preview

Johnson, Colin G. and Marsh, Duncan (1998) A robot programming environment based on free-form CAD modelling. In: Proceedings - IEEE International Conference on Robotics and Automation. Proceedings of the 1998 IEEE International Conference on Robotics and Automation. IEEE Press pp. 194-199. ISBN 0-7803-4300-X. (doi:https://doi.org/10.1109/ROBOT.1998.676372) (Full text available)
[img]
Preview

Johnson, Colin G. and McCormack, Jon and Santos, Iria and Romero, Juan (2019) Understanding Aesthetics and Fitness Measures in Evolutionary Art Systems. Complexity, 2019 . ISSN 1076-2787. (doi:https://doi.org/10.1155/2019/3495962) (Full text available)
[img]
Preview

Johnson, Colin G. and Swan, Jerry and Edwin, Brady (2018) Subtype Polymorphism à la carte via Machine Learning on Dependent Types. In: ML4PL. 2nd International Workshop on Machine Learning Techniques for Programming Languages. ACM ISBN ACM ISBN 123-4567-24-567/08/06. (doi:https://doi.org/10.475/123_4) (Full text available)
[img]
Preview

Johnson, Leslie (1998) Revisiting Simon on the Design of Complex Systems. Systems Research and Information Science, 7 (4). pp. 213-224. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Johnson, Leslie and Stergiou, Maria (1999) BPR - Enabled Systems Engineering. In: Khoong, Chan Meng, ed. Reengineering in Action: The Quest for World-Class Excellence. Imperial College Press, World Scientific Co. ISBN 1-86094-139-7. (Full text available)
[img]

Johnson, Leslie and Stergiou, Maria (1999) Emergent design and development of information systems: The theoretical justification. In: Torres, M. and Sanchez, B. and Wills, E., eds. Systemics, cybernetics and informatics; World multiconference on systemics, cybernetics and informatics. Int Inst Informatics & Systemics, Florida, USA pp. 457-463. ISBN 980-07-5919-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Johnson, Leslie and Stergiou, Maria (1997) Integrating BPR and Systems Development using Meta-Models. In: Proceedings - BPR Year 97 Europe. (Full text available)
[img]

Johnson, Leslie and Stergiou, Maria (1997) The Link between BPR, Evolutionary Delivery and Evolutionary Development. In: Callaos, Nagib and Khoong, Chan Meng and Cohen, Eli, eds. SCI'97 Proceedings - World Multiconference on Systemics, Cybernetics and Informatics. pp. 61-67. ISBN 980-07-4174-7. (Full text available)
[img] [img]
Preview

Johnson, Leslie and Stergiou, Maria (1997) The Necessary Architecture of Self-Regulating Teams. In: Wright, D. and Rudolph, M. and Hanna, V. and Gillingwater, D. and Burns, N., eds. ME-SELA'97 Proceedings - International Conference on Managing Enterprises - Stakeholders, Engineering, Logistics, and Achievement. Mechanical Engieering Publ pp. 93-98. ISBN 1-86058-066-1. (Full text available)
[img] [img]
Preview

Jones, Richard E. (2003) DO garbage collection. Technical report. Kent University, Kent, UK 2-03. (doi:2-03) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jones, Richard E. (2007) Dynamic Memory Management: Challenges for Today and Tomorrow. In: International Lisp Conference. Association of Lisp Users, Cambridge pp. 115-124. ISBN 978-1-59593-618-9. (Full text available)
[img]
Preview

Jones, Richard E. (1995) Introducing More Systematic Quality Assurance Arrangements for Course Approval and Review. In: Middlehurst, Robin, ed. Managing for Quality: Stories and Strategies. Higher Education Quality Council, pp. 15-17. ISBN 1-85824-234-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordan, Tobias and De Wilde, Philippe and Buarque de Lima Neto, Fernando (2017) Modeling Contagion of Behavior in Friendship Networks as Coordination Games. In: Advances in Social Simulation 2015. Advances in Intelligent Systems and Computing (AISC), 528. Springer pp. 181-194. ISBN 978-3-319-47252-2. E-ISBN 978-3-319-47253-9. (doi:https://doi.org/10.1007/978-3-319-47253-9_15) (Full text available)
[img]
Preview

Jordan, Tobias and Oto, Costa and De Wilde, Philippe and Buarque de Lima Neto, Fernando (2017) Link-Prediction to Tackle the Boundary Specification Problem in Social Network Surveys. PLoS ONE, 12 (4). e0176094. ISSN 1932-6203. (doi:https://doi.org/10.1371/journal.pone.0176094) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

Jordanous, Anna (2010) A-Fitness-Function-for-Creativity-in-Jazz-Improvisation-and-Beyond (Jordanous 2010) - code. github Java code. (Full text available)
[img]

Jordanous, Anna (2017) Co-creativity and perceptions of computational agents in co-creativity. In: Proceedings of the Eighth International Conference on Computational Creativity. ACC pp. 159-166. ISBN 978-0-692-89564-1. (Full text available)
[img]
Preview

Jordanous, Anna (2011) Computer Models of Musical Creativity? A review of Cope (2005). Review of: Computer Models of Musical Creativity. David Cope (2005). MIT Press by UNSPECIFIED. AISB Quarterly, 132 (-). p. 10. ISSN 1476-3036. (Full text available)
[img]
Preview

Jordanous, Anna (2009) Conference Report: The Fourth Conference on Interdisciplinary Musicology (CIM08). Review of: Fourth Conference on Interdisciplinary Musicology, 2008 (CIM08) by UNSPECIFIED. AISB Quarterly, 128 (-). pp. 8-9. ISSN 1476-3036. (Full text available)
[img]
Preview

Jordanous, Anna (2010) Conference Review: Empirical approaches to Performance: Empirical Musicology II conference (25-26 March 2010, School of Music, University of Leeds, UK). Review of: Empirical approaches to Performance: Empirical Musicology II conference 2010 by UNSPECIFIED. Excursions, 1 (1). p. 1. ISSN 2044-4095. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2018) Creativity vs quality: why the distinction matters when evaluating computational creativity systems. In: The 5th Computational Creativity Symposium at the AISB Convention 2018, 4-6 April 2018, Liverpool, UK. (In press) (Full text available)
[img]
Preview

Jordanous, Anna (2010) Defining creativity: Finding keywords for creativity using corpus linguistics techniques. In: Proceedings of ICCC-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2011) Evaluating evaluation: Assessing progress in computational creativity research. In: Proceedings of the Second International Conference on Computational Creativity (ICCC-11). pp. 102-107. (Full text available)
[img]
Preview

Jordanous, Anna (2009) Evaluating machine creativity. In: Seventh ACM conference on Creativity and cognition, 2009, Berkeley, CA. (Full text available)
[img]
Preview

Jordanous, Anna (2015) Four PPPPerspectives on Computational Creativity. In: AISB 2015 Symposium on Computational Creativity, 20-22nd May, 2015, Canterbury, Kent, UK. (Full text available)
[img]
Preview

Jordanous, Anna (2016) Four PPPPerspectives on Computational Creativity in theory and in practice. Connection Science, 28 (2). pp. 194-216. ISSN 0954-0091. E-ISSN 1360-0494. (doi:https://doi.org/10.1080/09540091.2016.1151860) (Full text available)
[img]
Preview

Jordanous, Anna (2016) Has computational creativity successfully made it "Beyond the Fence" in musical theatre? In: Proceedings of the 7th International Conference on Computational Creativity. 7th International Conference on Computational Creativity. Sony CSL pp. 303-310. ISBN 978-2-7466-9155-1. (Full text available)
[img]
Preview

Jordanous, Anna (2017) Has computational creativity successfully made it 'Beyond the Fence' in musical theatre? Connection Science, 29 (4). pp. 350-386. ISSN 0954-0091. E-ISSN 1360-0494. (doi:https://doi.org/10.1080/09540091.2017.1345857) (Full text available)
[img]
Preview

Jordanous, Anna (2017) How can we write software that can communicate creatively? In: Proceedings of the 4th AISB Symposium on Computational Creativity. (Full text available)
[img]
Preview

Jordanous, Anna (2011) International Conference on Computational Creativity (review). Review of: International Conference on Computational Creativity 2011 by UNSPECIFIED. AISB Quarterly, . p. 13. (Full text available)
[img]
Preview

Jordanous, Anna (2013) Introducing Computational Creativity Research. . CreativityPost.com Internet. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2016) Language and Music. In: Jones, Rodney, ed. Routledge Handbook of Language and Creativity. Routledge. ISBN 978-0-415-83973-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2010) The Realisation of Creativity in Artificial Music Improvisation and Interpretation. In: Empirical Musicology II, 2010, Leeds, UK. (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2017) Review. Review of: Computation and the humanities : towards an oral history of digital humanities by Nyhan, J. and Flinn A., A.. ACM Computing Reviews, (Sep'17). Review #: CR145551. E-ISSN 1530-6585. (Full text available)
[img]

Jordanous, Anna (2014) Review of Digital Da Vinci: Computers in the Arts and Sciences (2014, Springer). Review of: Digital Da Vinci: Computers in the Arts and Sciences (2014, Springer) by UNSPECIFIED. ACM Computing Reviews, . p. 1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2014) Review of Emotional Lexicons: Continuity and Change in the Vocabulary of Feeling 1700-2000 by Ute Frevert et al.Anna Jordanous believes this book's strengths lie in its contextual diversity and in the thoroughness of the compilation and usage of reference sources. Review of: Emotional Lexicons: Continuity and Change in the Vocabulary of Feeling 1700-2000 by Ute Frevert et al. by UNSPECIFIED. Reviews in History, . p. 1682. (Full text available)
[img]

Jordanous, Anna (2013) Review: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. Type: Proceedings. Review of: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. by UNSPECIFIED. ACM Computing Reviews, . CR141093. ISSN 1308-0745. E-ISSN 1308-0745. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2015) Review: Hacking choreography: dance and live coding: [Sicchio K. Computer Music Journal 38 (1): 31-39, 2014. ]. Review of: Hacking choreography: dance and live coding Sicchio K. Computer Music Journal 38 (1): 31-39, 2014. Type: Article by UNSPECIFIED. ACM Computing Reviews, . p. 1. (doi:CR143411) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2015) Review: What makes you clever : the puzzle of intelligence. Review of: What makes you clever : the puzzle of intelligence (Partridge, 2014, World Scientific Publishing Co, Inc.) by UNSPECIFIED. ACM Computing Reviews, . CR143090. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2007) Score Following: An artificially intelligent musical accompanist (Jordanous 2007, Jordanous & Smaill 2008+2009) - code. github Max/MSP code. (Full text available)
[img]

Jordanous, Anna (2012) A Standardised Procedure for Evaluating Creative Systems: Computational Creativity Evaluation Based on What it is to be Creative. Cognitive Computation, 4 (3). pp. 246-279. ISSN 1866-9956. E-ISSN 1866-9964. (doi:https://doi.org/10.1007/s12559-012-9156-1) (Full text available)
[img]
Preview

Jordanous, Anna (2014) Stepping Back to Progress Forwards: Setting Standards for Meta-Evaluation of Computational Creativity. In: Proceedings of the 5th International Conference on Computational Creativity. (Full text available)
[img]
Preview

Jordanous, Anna (2008) Voice Separation in polyphonic music (Jordanous 2008) - code. github Matlab code. (Full text available)
[img]

Jordanous, Anna (2008) Voice separation in polyphonic music: A data-driven approach. In: Proceedings of the International Computer Music Conference 2008. (Full text available)
[img]
Preview

Jordanous, Anna (2014) What is Computational Creativity? . CreativityPost.com Online web platform. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2010) A fitness function for creativity in jazz improvisation and beyond. In: International Conference on Computational Creativity, 2010, Lisbon, Portugal. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2016) The longer term value of creativity judgements in computational creativity. In: Proceedings of AISB 2016’s Third International Symposium on Computational Creativity (CC2016). (Full text available)
[img]
Preview

Jordanous, Anna and Allington, Daniel (2014) Network analysis - code for the Valuing Electronic Music project. github Python code. (Full text available)
[img]

Jordanous, Anna and Allington, Daniel and Dueck, Byron (2014) Online Networks and the Production of Value in Electronic Music. In: Digital Music Research Network Network One-Day Workshop (DMRN+9), 16 Dec 2014, Queen Mary's, London. (Unpublished) (Full text available)
[img] [img]

Jordanous, Anna and Allington, Daniel and Dueck, Byron (2014) Using online networks to analyse the value of electronic music. In: Proceedings of the 5th International Conference on Computational Creativity. (Full text available)
[img]
Preview

Jordanous, Anna and Fox, Simon (2014) fba-solution-pack-measurement. github php Drupal module. (Full text available)
[img]

Jordanous, Anna and Keller, Bill (2012) Creativity Ontology. http://purl.org/creativity/ontology. (Full text available)
[img]

Jordanous, Anna and Keller, Bill (2016) Modelling Creativity: Identifying Key Components through a Corpus-Based Approach. PLoS ONE, 11 (10). pp. 1-27. ISSN 1932-6203. (doi:https://doi.org/10.1371/journal.pone.0162959) (Full text available)
[img]
Preview

Jordanous, Anna and Keller, Bill (2012) Weaving creativity into the Semantic Web: a language-processing approach. In: International Conference on Computational Creativity. Proceedings of the 3rd International Conference on Computational Creativity. pp. 216-220. (Full text available)
[img]
Preview

Jordanous, Anna and Keller, Bill (2012) What makes a musical improvisation creative? Journal of Interdisciplinary Music Studies, 6 (2). pp. 151-175. ISSN 1307-0401. E-ISSN 1306-9055. (doi:https://doi.org/10.4407/jims.2014.02.003) (Full text available)
[img]
Preview

Jordanous, Anna and Keller, Bill (2011) What makes a musical improvisation creative? In: Proceedings of the 7th Conference on Interdisciplinary Musicology. (Full text available)
[img]
Preview

Jordanous, Anna and Lawrence, K Faith and Hedges, Mark and Tupman, Charlotte (2012) Exploring manuscripts: sharing ancient wisdoms across the semantic web. In: Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics. Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics (WIMS-12). ACM, New York, New York, USA ISBN 978-1-4503-0915-8. (doi:https://doi.org/10.1145/2254129.2254184) (Full text available)
[img]
Preview

Jordanous, Anna and Lawrence, K. Faith and Tupman, Charlotte (2013) Sharing Ancient Wisdoms: Dataset. RDF. Located at: http://www.ancientwisdoms.ac.uk/library/data/. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna and Roueché, Charlotte and Tupman, Charlotte and Lawrence, K. Faith and Hedges, Mark and Wakelnig, Elvira and Searby, Denis (2013) Sharing Ancient Wisdoms (SAWS) ontology. http://www.ancientwisdoms.ac.uk/. (Full text available)
[img]

Jordanous, Anna and Smaill, Alan (2008) Artificially intelligent accompaniment using Hidden Markov Models to model musical structure. In: Conference on Interdisciplinary Musicology, 2008, Thessaloniki, Greece. (Full text available)
[img]
Preview

Jordanous, Anna and Smaill, Alan (2009) Investigating the role of score following in automatic musical accompaniment. Journal of New Music Research, 38 (2). pp. 197-209. ISSN 0929-8215. E-ISSN 1744-5027. (doi:https://doi.org/10.1080/09298210903180245) (Full text available)
[img]
Preview
[img]
Preview

Jordanous, Anna and Stanley, Alan and Tupman, Charlotte (2012) Contemporary transformation of ancient documents for recording and retrieving maximum information: when one form of markup is not enough. In: Balisage: The Markup Conference 2012, 2012, Montreal, Canada. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna and Stanley, Alan and Tupman, Charlotte (2013) Reusing modern tools and techniques to reproduce and research ancient texts. In: Open Repositories, Prince Edward Island, Canada. (Full text available)
[img]
Preview

Jordanous, Anna and Tupman, Charlotte (2013) Sharing Ancient Wisdoms - supporting code. ancientwisdoms.ac.uk XSLT stylesheets. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna and Tupman, Charlotte and Stanley, Alan (2013) Contemporary solutions to retrieve and publish information in ancient documents using RDF and Islandora. In: Digital Humanities 2013, 2013, Lincoln, Nebraska. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jungjit, Suwimol (2016) New Multi-Label Correlation-Based Feature Selection Methods for Multi-Label Classification and Application in Bioinformatics. Doctor of Philosophy (PhD) thesis, University of Kent,. (Full text available)
[img]
Preview

Jungjit, Suwimol and Kapinchev, Konstantin (2014) Postgraduate Conference 2014: Technical report 1-14. In: School of Computing Mini Conference, School of Computing - Canterbury Campus. (Full text available)
[img]
Preview

Justo, George R. R. and Welch, Peter H. (1992) Serialization as a Paradigm for the Engineering of Parallel Programs. In: Etiemble, D. and Syre, J.C., eds. Lecture Notes in Computer Science. Lecture Notes in Computer Science, 605. Springer-Verlag Berlin, Berlin, Berlin pp. 975-976. ISBN 3-540-55599-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Justo, George R. R. and Welch, Peter H. (1993) Serialization as a paradigm for the engineering of parallel programs. Computers and Artificial Intelligence, 12 (3). pp. 229-249. ISSN 0232-0274. (doi:https://doi.org/10.1007/3-540-55599-4_149) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

K

Kaegi, Stefan (2013) Waiting... with Rachel and Peter: Podcast funded by Arts Council England/Wellcome Trust. Performance type: Other While You Wait, 2013, Fuel, Roundhouse and King’s Cultural Institute. Podcast. (Full text available)
[img]

Kafal?, Özgür and Ajmeri, Nirav and Singh, Munindar P. (2017) Formal Understanding of Tradeoffs among Liveness and Safety Requirements. In: 2016 IEEE 24th International Requirements Engineering Conference Workshops. IEEE pp. 17-18. ISBN 978-1-5090-3694-3. (doi:https://doi.org/10.1109/REW.2016.017) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafal?, Özgür and Ajmeri, Nirav and Singh, Munindar P. (2017) Kont: Computing tradeoffs in normative multiagent systems. In: Proceedings of the 31st Conference on Artificial Intelligence (AAAI). pp. 3006-3012. (Full text available)
[img]
Preview

Kafal?, Özgür and Ajmeri, Nirav and Singh, Munindar P. (2017) Normative Requirements in Sociotechnical Systems. In: 2016 IEEE 24th International Requirements Engineering Conference Workshops. IEEE pp. 259-260. ISBN 978-1-5090-3694-3. (doi:https://doi.org/10.1109/REW.2016.049) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafal?, Özgür and Ajmeri, Nirav and Singh, Munindar P. (2016) Revani: Revising and Verifying Normative Specifications for Privacy. IEEE Intelligent Systems, 31 (5). pp. 8-15. ISSN 1541-1672. (doi:https://doi.org/10.1109/MIS.2016.89) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Kafal?, Özgür and Bromuri, Stefano and Sindlar, Michal and van der Weide, Tom and Aguilar Pelaez, Eduardo and Schaechtle, Ulrich and Alves, Bruno and Zufferey, Damien and Rodriguez-Villegas, Esther and Schumacher, Michael Ignaz and Kostas, Stathis (2013) Commodity 12: A smart e-health environment for diabetes management. Journal of Ambient Intelligence and Smart Environments, 5 (5). pp. 479-502. ISSN 1876-1364. (doi:https://doi.org/10.3233/AIS-130220) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafal?, Özgür and Chesani, Federico and Torroni, Paolo (2010) What happened to my commitment? Exception diagnosis among misalignment and misbehavior. In: Leite, João and Torroni, Paolo and Ågotnes, Thomas and Boella, Guido and van der Torre, Leon, eds. Computational Logic in Multi-Agent Systems. Springer, pp. 82-98. ISBN 978-3-642-14976-4. (doi:https://doi.org/10.1007/978-3-642-14977-1_9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafal?, Özgür and Günay, Ak?n and Yolum, P?nar (2013) Detecting and predicting privacy violations in online social networks. Distributed and Parallel Databases, 32 (1). pp. 161-190. ISSN 0926-8782. (doi:https://doi.org/10.1007/s10619-013-7124-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafal?, Özgür and Günay, Ak?n and Yolum, P?nar (2014) GOSU: Computing GOal SUpport with commitments in multiagent systems. In: ECAI'14 Proceedings of the Twenty-first European Conference on Artificial Intelligence. IOS Press pp. 477-482. ISBN 978-1-61499-418-3. (doi:https://doi.org/10.3233/978-1-61499-419-0-477) (Full text available)
[img]
Preview

Kafal?, Özgür and Günay, Ak?n and Yolum, P?nar (2013) Protoss: A run time tool for detecting privacy violations in online social networks: Short Paper. In: Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012). IEEE pp. 429-433. ISBN 978-0-7695-4799-2. (doi:https://doi.org/10.1109/ASONAM.2012.76) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafal?, Özgür and Jones, Jasmine and Petruso, Megan and Williams, Laurie and Singh, Munindar P. (2017) How Good is a Security Policy against Real Breaches? A HIPAA Case Study. In: 2017 IEEE/ACM 39th International Conference on Software Engineering. pp. 530-540. ISBN 978-1-5386-3868-2. (doi:https://doi.org/10.1109/ICSE.2017.55) (Full text available)
[img]
Preview

Kafal?, Özgür and P?nar, Yolum (2015) Pisagor: A proactive software agent for monitoring interactions. Knowledge and Information Systems, 47 (1). pp. 215-239. ISSN 0219-1377. (doi:https://doi.org/10.1007/s10115-015-0848-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafal?, Özgür and Romero, Alfonso E. and Stathis, Kostas (2014) Activity recognition for an agent-oriented personal health system. In: Lecture Notes in Computer Science. PRIMA 2014: Principles and Practice of Multi-Agent Systems. Springer pp. 254-269. ISBN 978-3-319-13190-0. (doi:https://doi.org/10.1007/978-3-319-13191-7_21) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafal?, Özgür and Romero, Alfonso E. and Stathis, Kostas (2017) Agent-oriented activity recognition in the event calculus: An application for diabetic patients. Computational Intelligence, 33 (4). pp. 899-925. ISSN 0824-7935. (doi:https://doi.org/10.1111/coin.12121) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafal?, Özgür and Schaechtle, Ulrich and Stathis, Kostas (2015) HYDRA: A HYbrid Diagnosis and monitoRing Architecture for diabetes. In: 2014 IEEE 16th International Conference on E-health Networking, Application & Services (Healthcom). IEEE pp. 531-536. ISBN 978-1-4799-6644-8. (doi:https://doi.org/10.1109/HealthCom.2014.7001898) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafal?, Özgür and Sindlar, Michal and van der Weide, Tom and Stathis, Kostas (2013) ORC: An Ontology Reasoning Component for diabetes. In: Proceedings of the 2nd International Workshop on Artificial Intelligence and Netmedicine (NetMed). p. 71. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafal?, Özgür and Singh, Munindar P. (2017) Improving Cybersecurity: User Accountability and Sociotechnical Systems. . IEEE Online. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)