Items where Subject is "Q Science > QA Mathematics (inc Computing science) > QA 75 Electronic computers. Computer science"
- Library of Congress Subject Areas (61789)
- Q Science (17301)
- QA Mathematics (inc Computing science) (6405)
- QA 75 Electronic computers. Computer science (682)
- QA Mathematics (inc Computing science) (6405)
- Q Science (17301)
Welch, Peter H. and Kerridge, Jon M. and Barnes, Frederick R.M., eds. (2006) Communicating Process Architectures 2006: WoTUG-29 Proceedings. Concurrent Systems Engineering, 64 . IOS Press, US, Amsterdam, 400 pp. ISBN 978-1-58603-671-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:12963) |
Masala, Giovanni Luca and Esposito, Massimo and Maniscalco, Umberto and Calimera, Andrea, eds. (2022) Editorial Language and Vision in Robotics: Emerging Neural and On-Device Approaches. Frontiers in Computer Science, . (KAR id:95273) |
Sirlantzis, Konstantinos, ed. (2006) Recent Advances in Soft Computing. U. of Kent Publishing Services, Canterbury, UK ISBN 1-902671-43-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:9826) |
Szymkowiak, Andrea and Shepherd, Lynsay and Nurse, Jason R. C. and Ziefle, Martina and Brauner, Philipp, eds. (2023) Technology For the Greater Good? The Influence of (Ir)responsible Systems on Human Emotions, Thinking and Behavior. Frontiers in Computer Science, 5 . E-ISSN 2624-9898. (doi:10.3389/fcomp.2023.1341692) (KAR id:98227) |
Abdullah, Sophiana Chua and Cooley, Roger (2000) The use of constraint logic programming in the development of adaptive tests. In: Gauthier, Gilles and Frasson, Claude and VanLehn, Kurt, eds. Intelligent Tutoring Systems 5th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, p. 650. ISBN 978-3-540-67655-3. E-ISBN 978-3-540-45108-2. (doi:10.1007/3-540-45108-0_73) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16039) |
Ackerman, Margareta, Goel, Ashok, Johnson, Colin G., Jordanous, Anna, Leon, Carlos, Perez y Perez, Rafael, Toivonen, Hannu, Ventura, Dan (2017) Teaching Computational Creativity. In: Goel, Ashok and Jordanous, Anna and Pease, Alison, eds. Proceedings of the Eighth International Conference on Computational Creativity. . pp. 9-16. Georgia Institute of Technology, Atlanta, Georgia, USA ISBN 978-0-692-89564-1. (KAR id:61660) |
Agrafiotis, Ioannis, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie, Upton, David (2018) A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, . ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyy006) (KAR id:69076) |
Akehurst, David H. (2000) An 00 visual language definition approach supporting multiple views. In: Proceeding 2000 IEEE International Symposium on Visual Languages. IEEE Computer Society Workshop on Visual Langauages . IEEE, pp. 57-58. ISBN 0-7695-0840-5. (doi:10.1109/VL.2000.874350) (KAR id:16043) |
Akintunde, Michael E., Botoeva, Elena, Kouvaros, Panagiotis, Lomuscio, Alessio (2021) Formal verification of neural agents in non-deterministic environments. Autonomous Agents and Multi-Agent Systems, 36 (1). Article Number 6. ISSN 1387-2532. E-ISSN 1573-7454. (doi:10.1007/s10458-021-09529-3) (KAR id:92680) |
Akintunde, Michael E., Botoeva, Elena, Kouvaros, Panagiotis, Lomuscio, Alessio (2020) Verifying Strategic Abilities of Neural-symbolic Multi-agent Systems. In: Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning. Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning. . pp. 22-32. International Joint Conferences on Artificial Intelligence Organization ISBN 978-0-9992411-7-2. (doi:10.24963/kr.2020/3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90813) |
Alcaide, Almudena, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Bayesian rational exchange. International Journal of Information Security, 7 (1). pp. 85-100. ISSN 1615-5262. (doi:10.1007/s10207-007-0039-5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31958) |
Alcaide, Almudena, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Cryptanalysis of Syverson's Rational Exchange Protocol. International Journal of Network Security, 7 (2). pp. 151-156. ISSN 2152-5064. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31956) |
Alglave, Jade, Batty, Mark, Donaldson, Alastair F., Gopalakrishnan, Ganesh, Ketema, Jeroen, Poetzl, Daniel, Sorensen, Tyler, Wickerson, John (2015) GPU Concurrency: Weak Behaviours and Programming Assumptions. In: ACM SIGPLAN Notices. Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '15, Istanbul, Turkey, March 14-18, 2015. . pp. 577-591. ACM Press ISBN 978-1-4503-2835-7. (doi:10.1145/2694344.2694391) (KAR id:50272) |
Alhanahnah, Mohannad and Chadwick, David (2016) Boosting usability for Protecting Online Banking Applications Against APTs. In: Amman, Jordan, ed. 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE, pp. 70-76. ISBN 978-1-5090-2658-6. (doi:10.1109/CCC.2016.13) (KAR id:59903) |
Ali, Azliza Mohd, Angelov, Plamen, Gu, Xiaowei (2016) Detecting Anomalous Behaviour Using Heterogeneous Data. Advances in Computational Intelligence Systems, 513 . pp. 253-273. ISSN 2194-5357. (doi:10.1007/978-3-319-46562-3_17) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90105) |
Ali, Mohammed Aamir, Arief, Budi, Emms, Martin, van Moorsel, Aad (2017) Does The Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Security & Privacy, 15 (2). pp. 78-86. ISSN 1540-7993. E-ISSN 1558-4046. (doi:10.1109/MSP.2017.27) (KAR id:58364) |
Alim, Abdul and Clegg, Richard and Mai, Luo and Rupprecht, Lukas and Seckler, Eric and Costa, Paolo and Pietzuch, Peter and Wolf, Alexander L. and Sultana, Nik and Crowcroft, Jon and Madhavapeddy, Anil and Moore, Andrew and Mortier, Richard and Kolehini, Masoud and Oviedo, Luis and McAuley, Derek and Migliavacca, Matteo (2016) FLICK: Developing and Running Application-Specific Network Services. In: 2nd Symposium on Networked Systems Design & Implementation 2005. USENIX Association. ISBN 978-1-931971-30-0. (KAR id:58287) |
Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science, 10292 . Springer International Publishing AG, pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_13) (KAR id:69560) |
Allington, Daniel, Jordanous, Anna, Dueck, Byron (2015) Music, value, and networks in the digital world. http://valuingelectronicmusic.org (KAR id:53850) |
Alqahtani, Saeed Ibrahim, Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. . Article No. 19. ACM, New York, NY, USA ISBN 978-1-4503-5257-4. (doi:10.1145/3098954.3098984) (KAR id:69561) |
Alqahtani, Saeed Ibrahim, Li, Shujun, Yuan, Haiyue, Rusconi, Patrice (2020) Human-Generated and Machine-Generated Ratings of Password Strength: What Do Users Trust More? EAI Endorsed Transactions on Security and Safety, 18 (e1). ISSN 2032-9393. (doi:10.4108/eai.13-7-2018.162797) (KAR id:79945) |
Alsalibi, Brian, Venkat, Ibrahim, Subramanian, K.G., Lutfi, Syaheerah Lebai, De Wilde, Philippe (2015) The impact of bio-inspired approaches toward the advancement of face recognition. ACM Computing Surveys, 48 (1). Article Number 5. ISSN 0360-0300. (doi:10.1145/2791121) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:58006) |
Altuncu, Enes, Nurse, Jason R. C., Bagriacik, Meryem, Kaleba, Sophie, Yuan, Haiyue, Bonheme, Lisa, Li, Shujun (2023) aedFaCT: Scientific Fact-Checking Made Easier via Semi-Automatic Discovery of Relevant Expert Opinions. In: Workshop Proceedings of the 17th International AAAI Conference on Web and Social Media. . 27:1-27:10. Association for the Advancement of Artificial Intelligence (doi:10.36190/2023.27) (KAR id:101790) |
Angelov, Plamen P., Gu, Xiaowei (2018) Deep rule-based classifier with human-level performance and characteristics. Information Sciences, 463-64 . pp. 196-213. ISSN 0020-0255. (doi:10.1016/j.ins.2018.06.048) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90113) |
Angelov, Plamen P., Gu, Xiaowei (2018) Toward Anthropomorphic Machine Learning. Computer, 51 (9). pp. 18-27. ISSN 0018-9162. (doi:10.1109/MC.2018.3620973) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90114) |
Angelov, Plamen P., Gu, Xiaowei, Gutierrez, German, Iglesias, Jose Antonio, Sanchis, Araceli (2016) Autonomous Data Density based clustering method. In: 2016 International Joint Conference on Neural Networks (IJCNN). . pp. 2405-2413. IEEE ISBN 978-1-5090-0621-2. E-ISBN 978-1-5090-0620-5. (doi:10.1109/IJCNN.2016.7727498) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90178) |
Angelov, Plamen P., Gu, Xiaowei, Principe, Jose C. (2018) Autonomous Learning Multimodel Systems From Data Streams. IEEE Transactions on Fuzzy Systems, 26 (4). pp. 2213-2224. ISSN 1063-6706. (doi:10.1109/TFUZZ.2017.2769039) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90115) |
Angelov, Plamen Parvanov, Gu, Xiaowei (2019) Empirical Approach to Machine Learning. 1st edition. Studies in Computational Intelligence . Springer, 423 pp. ISBN 978-3-030-02383-6. (doi:10.1007/978-3-030-02384-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90109) |
Angelov, Plamen, Gu, Xiaowei (2017) Autonomous learning multi-model classifier of 0-Order (ALMMo-0). In: 2017 Evolving and Adaptive Intelligent Systems (EAIS). . pp. 1-7. IEEE ISBN 978-1-5090-6445-8. (doi:10.1109/EAIS.2017.7954832) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90131) |
Angelov, Plamen, Gu, Xiaowei (2016) Local modes-based free-shape data partitioning. In: 2016 IEEE Symposium Series on Computational Intelligence (SSCI). . pp. 1-8. IEEE ISBN 978-1-5090-4241-8. (doi:10.1109/SSCI.2016.7850117) (KAR id:90135) |
Angelov, Plamen, Gu, Xiaowei (2017) MICE: Multi-Layer Multi-Model Images Classifier Ensemble. In: 2017 3rd IEEE International Conference on Cybernetics (CYBCONF). . pp. 1-8. IEEE ISBN 978-1-5386-2202-5. (doi:10.1109/CYBConf.2017.7985788) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90130) |
Angelov, Plamen, Gu, Xiaowei (2017) A cascade of deep learning fuzzy rule-based image classifier and SVM. In: 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC). . pp. 746-751. IEEE ISBN 978-1-5386-1646-8. (doi:10.1109/SMC.2017.8122697) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90129) |
Angelov, Plamen, Gu, Xiaowei, Iglesias, Jose A., Ledezma, Agapito, Sanchis, Araceli, Sipele, Oscar, Ramezani, Ramin (2017) Cybernetics of the Mind: Learning Individual's Perceptions Autonomously. IEEE Systems, Man, and Cybernetics Magazine, 3 (2). pp. 6-17. ISSN 2380-1298. E-ISSN 2333-942X. (doi:10.1109/MSMC.2017.2664478) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90134) |
Angelov, Plamen, Gu, Xiaowei, Kangin, Dmitry (2017) Empirical Data Analytics. International Journal of Intelligent Systems, 32 (12). pp. 1261-1284. ISSN 0884-8173. (doi:10.1002/int.21899) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90128) |
Angelov, Plamen, Gu, Xiaowei, Kangin, Dmitry, Principe, Jose (2016) Empirical data analysis: A new tool for data analytics. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC). . pp. 52-59. IEEE ISBN 978-1-5090-1898-7. (doi:10.1109/SMC.2016.7844219) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90177) |
Angelov, Plamen, Gu, Xiaowei, Principe, Jose (2017) Fast feedforward non-parametric deep learning network with automatic feature extraction. In: 2017 International Joint Conference on Neural Networks (IJCNN). . pp. 534-541. IEEE ISBN 978-1-5090-6183-9. (doi:10.1109/IJCNN.2017.7965899) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90133) |
Antoccia, A., Argazzi, E., Balata, M., Bedogni, R., Berardinelli, F., Bisogni, G., Bono, M., Bottigli, U., Brunetti, A., Buttafava, A., and others. (2011) Low-dose effects of ionizing radiations in in vitro and in vivo biological systems: A multi-scale approach study. Nuovo Cimento della Societa Italiana di Fisica C, 34 (1). pp. 49-63. ISSN 2037-4909. (doi:10.1393/ncc/i2011-10806-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91427) |
Anzellotti, G., Battiti, Roberto, Lazzizzera, I., Soncini, G., Zorat, Alessandro, Sartori, Alvise, Tecchiolli, Giampietro, Lee, Peter (1995) Totem:. a Highly Parallel Chip for Triggering Applications with Inductive Learning Based on the Reactive Tabu Search. International Journal of Modern Physics C, 6 (4). pp. 555-560. ISSN 0129-1831. (doi:10.1142/S0129183195000423) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19673) |
Arapinis, Myrto and Cheval, Vincent and Delaune, Stéphanie (2015) Composing security protocols: from confidentiality to privacy. In: Focardi, Ricardo and Myers, Andrew, eds. Principles of Security and Trust 4th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 324-343. ISBN 978-3-662-46665-0. E-ISBN 978-3-662-46666-7. (doi:10.1007/978-3-662-46666-7_17) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:46880) |
Arapinis, Myrto, Cheval, Vincent, Delaune, Stéphanie (2012) Verifying Privacy-Type Properties in a Modular Way. In: 25th IEEE Computer Security Foundations Symposium (CSF'12), June 2012, Cambridge Massachusetts, USA. (doi:10.1109/CSF.2012.16) (KAR id:46728) |
Arenas, Marcelo, Botoeva, Elena, Calvanese, Diego, Ryzhikov, Vladislav (2016) Knowledge base exchange: The case of OWL 2 QL. Artificial Intelligence, 238 . pp. 11-62. ISSN 0004-3702. (doi:10.1016/j.artint.2016.05.002) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90811) |
Arief, Budi, Periam, Andy, Cetin, Orcun, Hernandez-Castro, Julio C. (2020) Using Eyetracker to Find Ways to Mitigate Ransomware. In: Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. . pp. 448-456. Scitepress ISBN 978-989-758-399-5. (doi:10.5220/0008956004480456) (KAR id:80445) |
Asensio-Cubero, J, Gan, J Q, Palaniappan, Ramaswamy (2013) Multiresolution analysis over simple graphs for brain computer interfaces. Journal of Neural Engineering, 10 (4). 046014. ISSN 1741-2560. (doi:10.1088/1741-2560/10/4/046014) (KAR id:50389) |
Asghar, Hassan Jameel, Steinfeld, Ron, Li, Shujun, Kaafa, Mohamed Ali, Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:69555) |
Aslan, Çağrı B. and Sağlam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of the 9th International Conference on Social Media and Society. ACM-ICPS International Conference Proceeding Series . ACM, New York, USA. ISBN 978-1-4503-6334-1. (doi:10.1145/3217804.3217919) (KAR id:66861) |
Aslan, Çaǧri Burak, Li, Shujun, Çelebi, Fatih V., Tian, Hao (2020) The World of Defacers: Looking through the Lens of Their Activities on Twitter. IEEE Access, 8 . pp. 204132-204143. E-ISSN 2169-3536. (doi:10.1109/ACCESS.2020.3037015) (KAR id:84855) |
Ayad, Mohamed, Fleischmann, Peter (2008) On the decomposition of rational functions. Journal of Symbolic Computation, 43 (4). pp. 259-274. ISSN 0747-7171. (doi:10.1016/j.jsc.2007.10.009) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:8941) |
Aydın, Kübra, Sağlam, Rahime Belen, Li, Shujun, Bülbül, Abdullah (2020) When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of Twitter. In: Proceedings of the 13th International Conference on Security of Information and Networks. . 16:1-16:8. ACM ISBN 978-1-4503-8751-4. (doi:10.1145/3433174.3433586) (KAR id:89476) |
Baba, Samuel D, Yadav, Supriya, Howells, Gareth (2019) SortAlgo-Metrics: Identification of Cloud-Based Server Via a Simple Algorithmic Analysis. In: Proceddings of Eighth IEEE International Conference on Emerging Security Technologies. Proceddings of Eighth IEEE International Conference on Emerging Security Technologies. . IEEE, New York, NY, USA ISBN 978-1-7281-5546-3. (doi:10.1109/EST.2019.8806214) (KAR id:75459) |
Bada, Maria, Nurse, Jason R. C. (2019) Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs). Information and Computer Security, 27 (3). pp. 393-410. ISSN 2056-4961. (doi:10.1108/ICS-07-2018-0080) (KAR id:73481) |
Bai, Lu, Yeung, Chris, Efstratiou, Christos, Chikomo, Moyra (2019) Motion2Vector: Unsupervised Learning in Human Activity Recognition Using Wrist-Sensing Data. In: CPD 2019: THE 2nd Workshop on Combining Physical and Data-Driven Knowledge in Ubiquitous Computing, in conjunction with Ubicomp'19, 9 Sep 2019. (KAR id:76275) |
Bailey, Christopher and Chadwick, David W and de Lemos, Rogério and Siu, Kristy WS (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet. Springer Berlin Heidelberg, pp. 100-111. (KAR id:43208) |
Baker, Jon, Efstratiou, Christos (2017) Next2Me: Capturing Social Interactions through Smartphone Devices using WiFi and Audio signals. In: Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. . pp. 412-421. ACM ISBN 978-1-4503-5368-7. (doi:10.1145/3144457.3144500) (KAR id:63969) |
Barnes, David J., Hopkins, Tim (2000) The evolution and testing of a medium sized numerical package. In: Langtangen, Hans Petter and Bruaset, Are Magnus and Quak, Ewald, eds. Advances In Software Tools For Scientific Computing. 10. pp. 225-237. Springer-Verlag Berlin ISBN 3-540-66557-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16087) |
Barrero, David, Hernandez-Castro, Julio C., Peris-Lopez, Pedro, Camacho, David (2014) A genetic tango attack against the David–Prasad RFID ultra?lightweight authentication protocol. Expert Systems, 31 (1). pp. 9-19. ISSN 0266-4720. (doi:10.1111/j.1468-0394.2012.00652.x) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:45299) |
Bassett, Eryl E., Brooks, Stephen P., Morgan, Byron J. T. (1994) Minitab macros for multivariate analysis. Computational Statistics and Data Analysis, 17 (1). pp. 100-101. ISSN 0167-9473. (doi:10.1016/0167-9473(94)90031-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20375) |
Battiti, Roberto and Lee, Peter and Sartori, Alvise and Tecchiolli, Giampietro (1995) Special-purpose parallel architectures for high-performance machine learning. In: Hertzberger, Bob and Serazzi, Giuseppe, eds. High-Performance Computing and Networking International Conference and Exhibition. Lecture Notes in Computer Science . Springer, Berlin, Germany, p. 944. ISBN 978-3-540-59393-5. E-ISBN 978-3-540-49242-9. (doi:10.1007/BFb0046600) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19694) |
Batty, Mark, Dodds, Mike, Gotsman, Alexey (2013) Library abstraction for C/C++ concurrency. In: ACM SIGPLAN Notices. Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. . pp. 235-248. ACM Press ISBN 978-1-4503-1832-7. (doi:10.1145/2429069.2429099) (KAR id:50270) |
Batty, Mark, Memarian, Kayvan, Nienhuis, Kyndylan, Pichon-Pharabod, Jean, Sewell, Peter (2015) The Problem of Programming Language Concurrency Semantics. In: Lecture Notes in Computer Science. 24th European Symposium on Programming, ESOP 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings. 9032. pp. 283-307. Springer-Verlag Berlin, Heidleberg, Germany ISBN 978-3-662-46668-1. (doi:10.1007/978-3-662-46669-8_12) (KAR id:50271) |
Batty, Mark and Memarian, Kayvan and Owens, Scott and Sarkar, Susmit and Sewell, Peter (2012) Clarifying and compiling C/C++ concurrency: from C++11 to POWER. In: Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. POPL Principles of Programming Languages . ACM, New York, USA, pp. 509-520. ISBN 978-1-4503-1083-3. (doi:10.1145/2103656.2103717) (KAR id:50268) |
Batty, Mark and Owens, Scott and Sarkar, Susmit and Sewell, Peter and Weber, Tjark (2011) Mathematizing C++ concurrency. In: Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. ACM, New York, USA, pp. 55-66. ISBN 978-1-4503-0490-0. (doi:10.1145/1926385.1926394) (KAR id:50265) |
Becker, Ingolf, Posner, Rebecca, Islam, Tasmina, Ekblom, Paul, Borrion, Hervé, McGuire, Michael, Li, Shujun (2021) Privacy in Transport? Exploring Perceptions of Location Privacy Through User Segmentation. In: Proceedings of 54th Hawaii International Conference on System Sciences (HICSS 2021). . pp. 5347-5356. University of Hawaiʻi at Mānoa, Mānoa, Hawaiʻi, USA E-ISBN 978-0-9981331-3-3. (doi:10125/71270) (KAR id:84858) |
Beckett, David J. (1995) Combined Log System. Computer Networks and ISDN Systems, 27 . pp. 1089-1096. ISSN 0169-7552. (doi:10.1016/0169-7552(95)00013-W) (KAR id:19698) |
Beckett, David J. and Welch, Peter H. (1996) Emulating a secure multicasting bus using occam 2.1. In: Oneill, B.C. and Transputer User, Grp, eds. Proceedings of the 19th world occam and transputer user group technical meeting on Parallel processing developments. Concurrent Systems Engineering Series . IOS Press, Amsterdam, Netherlands, pp. 59-73. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18814) |
Bekhet, Saddam, Ahmed, Amr, Altadmri, Amjad, Hunter, Andrew (2015) Compressed video matching: Frame-to-frame revisited. Multimedia Tools and Applications, . pp. 1-16. ISSN 1380-7501. E-ISSN 1573-7721. (doi:10.1007/s11042-015-2887-8) (KAR id:50561) |
Belen-Saglam, Rahime, Altuncu, Enes, Lu, Yang, Li, Shujun (2023) A systematic literature review of the tension between the GDPR and public blockchain systems. Blockchain: Research and Applications, 4 (2). pp. 1-23. E-ISSN 2666-9536. (doi:10.1016/j.bcra.2023.100129) (KAR id:101787) |
Bello, Gema, Hernandez-Castro, Julio, Camacho, David (2016) Detecting discussion communities on vaccination in twitter. Future Generation Computer Systems, 66 . pp. 125-136. ISSN 0167-739X. (doi:10.1016/j.future.2016.06.032) (KAR id:58380) |
Bellotti, R., Cerello, P., Tangaro, S., Bevilacqua, V., Castellano, M., Mastronardi, G., De Carlo, F., Bagnasco, S., Bottigli, U., Cataldo, R., and others. (2007) Distributed medical images analysis on a Grid infrastructure. Future Generation Computer Systems, 23 (3). pp. 475-484. ISSN 0167-739X. (doi:10.1016/j.future.2006.07.006) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91928) |
Bellotti, R., De Carlo, F., Tangaro, S., Gargano, G., Maggipinto, G., Castellano, M., Massafra, R., Cascio, D., Fauci, F., Magro, R., and others. (2006) A completely automated CAD system for mass detection in a large mammographic database. Medical Physics, 33 (8). pp. 3066-3075. ISSN 0094-2405. (doi:10.1118/1.2214177) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:92336) |
Bereczky, Péter, Horpácsi, Dániel, K?szegi, Judit, Szeier, Soma, Thompson, Simon (2021) Validating Formal Semantics by Property-Based Cross-Testing. In: Proceedings of the 32nd Symposium on Implementation and Application of Functional Languages (IFL ’20),. . pp. 150-161. ACM, New York, NY, USA ISBN 978-1-4503-8963-1. (doi:10.1145/3462172.3462200) (KAR id:89480) |
Blanchette, Jasmin Christian and Weber, Tjark and Batty, Mark and Owens, Scott and Sarkar, Susmit (2011) Nitpicking C++ concurrency. In: Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming. ACM, New York, USA, pp. 113-124. ISBN 978-1-4503-0776-5. (doi:10.1145/2003476.2003493) (KAR id:50260) |
Blanco-Gonzalo, Ramon, Lunerti, Chiara, Sanchez- Reillo, Raul, Guest, Richard Michael (2018) Biometrics: Accessibility challenge or opportunity? PlosOne, 13 (3). E-ISSN 1932-6203. (doi:10.1371/journal.pone.0194111) (KAR id:66526) |
Blasco Alis, Jorge, Hernandez-Castro, Julio C., Tapiador, Juan E., Ribagorda, Arturo (2012) Bypassing information leakage protection with trusted applications. Computers and Security, 31 (4). pp. 557-568. ISSN 0167-4080. (doi:10.1016/j.cose.2012.01.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31937) |
Blasco Alis, Jorge, Hernandez-Castro, Julio C., de Fuentes, Jose Maria, Ramos, Benjamin (2012) A framework for avoiding steganography usage over HTTP. Journal of Network and Computer Applications, 35 (1). pp. 491-501. ISSN 1084-8045. (doi:10.1016/j.jnca.2011.10.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31941) |
Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only. (KAR id:52756) |
Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only. (KAR id:52759) |
Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only. (KAR id:52760) |
Boiten, Eerke Albert (2013) How to commit a bank robbery (or stop one) using the internet. . The Conversation Internet only. (KAR id:52761) |
Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only. (KAR id:52758) |
Boiten, Eerke Albert (2014) Russia and China prepare to fight US internet domination. . The Conversation UK Internet only. (KAR id:45253) |
Boiten, Eerke Albert (2013) The UK government is working in a Snowden-free bubble. . The Conversation Internet only. (KAR id:52757) |
Boiten, Eerke Albert (2013) iPhone hack shows security isn’t at our fingertips just yet. . Scientific American Internet only. (KAR id:52762) |
Boiten, Eerke Albert, Derrick, John (2007) Proceedings of the 11th Refinement Workshop (REFINE 2006)Macao, China 31 October 2006. Electronic Notes in Theoretical Computer Science, 187 . Elsevier, 188 pp. ISBN 15710661. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:3372) |
Boiten, Eerke Albert, Derrick, John, Bowman, Howard, Steen, Maarten (1999) Constructive consistency checking for partial specification in Z. Science of Computer Programming, 35 (1). pp. 29-75. ISSN 0167-6423. (doi:10.1016/S0167-6423(99)00006-4) (KAR id:17100) |
Botoeva, Elena, Calvanese, Diego, Cogrel, Benjamin, Corman, Julien, Xiao, Guohui, Ghidini, Chiara, Magnini, Bernardo, Passerini, Andrea (2019) Ontology-based data access – Beyond relational sources. Intelligenza Artificiale, 13 (1). pp. 21-36. ISSN 1724-8035. E-ISSN 2211-0097. (doi:10.3233/IA-190023) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90809) |
Botoeva, Elena, Calvanese, Diego, Santarelli, Valerio, Savo, Domenico Fabio, Solimando, Alessandro, Xiao, Guohui (2016) Beyond OWL 2 QL in OBDA: Rewritings and Approximations. In: AAAI'16: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence. . pp. 921-928. Association for the Advancement of Artificial Intelligence (doi:10.5555/3015812.3015950) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91270) |
Botoeva, Elena and Konev, Boris and Lutz, Carsten and Ryzhikov, Vladislav and Wolter, Frank and Zakharyaschev, Michael (2017) Inseparability and Conservative Extensions of Description Logic Ontologies: A Survey. In: Pan, Jeff Z. and Calvanese, Diego and Eiter, Thomas and Horrocks, Ian and Kifer, Michael and Lin, Fangzhen and Zhao, Yuting, eds. Reasoning Web: Logical Foundation of Knowledge Graph Construction and Query Answering. Lecture Notes in Computer Science, 9885 . Springer, Cham, Switzerland, pp. 27-89. ISBN 978-3-319-49492-0. E-ISBN 978-3-319-49493-7. (doi:10.1007/978-3-319-49493-7_2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90807) |
Botoeva, Elena, Kontchakov, Roman, Ryzhikov, Vladislav, Wolter, Frank, Zakharyaschev, Michael (2016) Games for query inseparability of description logic knowledge bases. Artificial Intelligence, 234 . pp. 78-119. ISSN 0004-3702. (doi:10.1016/j.artint.2016.01.010) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90810) |
Botoeva, Elena, Kouvaros, Panagiotis, Kronqvist, Jan, Lomuscio, Alessio, Misener, Ruth (2020) Efficient Verification of ReLU-Based Neural Networks via Dependency Analysis. In: Proceedings of the AAAI Conference on Artificial Intelligence. AAAI-20 Technical Tracks , 34 (04). pp. 3291-3299. Association for the Advancement of Artificial Intelligence ISBN 978-1-57735-835-0. (doi:10.1609/aaai.v34i04.5729) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90815) |
Bottigli, U., Brunetti, A., Carpinelli, M., Diaz, N, Fiori, P.L., Golosio, B., Masala, G.L., Oliva, P., Randaccio, P., Santona, S, and others. (2008) Effect of cryo-preservation on the response of different biological systems to γ-ray exposure: a feasibility study. Nuovo Cimento della Societa Italiana di Fisica. C, Geophysics and Space Physics, 31 (1). pp. 11-20. ISSN 1124-1896. (doi:10.1393/ncc/i2008-10276-6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91805) |
Bottigli, U., Chiarucci, R., Golosio, B., Masala, Giovanni Luca, Oliva, P., Stumbo, S., Cascio, D., Fauci, F., Glorioso, M., Iacomi, M., and others. (2006) Superior Performances of the Neural Network on the Masses Lesions Classification through Morphological Lesion Differences. International Journal of Biomedical Sciences, 1 (1). pp. 56-62. ISSN 1306-1216. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:92289) |
Bottigli, U., Golosio, B., Masala, Giovanni Luca, Oliva, P., Stumbo, S., Bravin, A., Bacci, A., Serafini, L., Maroli, C., Petrillo, V., and others. (2006) Effect of different spectral distributions to image a contrast detail phantom in the mammography energy range. Nuovo Cimento della Societa Italiana di Fisica. C, Geophysics and Space Physics, 29 (2). pp. 215-228. ISSN 1124-1896. (doi:10.1393/ncc/i2005-10196-y) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:92319) |
Bottigli, U., Golosio, B., Masala, Giovanni Luca, Oliva, P., Stumbo, S., Cascio, D., Fauci, F., Magro, R., Raso, G., Vasile, M, and others. (2006) Dissimilarity Application in Digitized Mammographic Images Classification. Journal of Systemics, Cybernetics and Informatics, 4 (3). pp. 18-22. ISSN 1690-4524. E-ISSN 1690-4524. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:92189) |
Bottigli, U., Golosio, B., Masala, Giovanni Luca, Oliva, P., Stumbo, S., Delogu, P., Fantacci, M. E., Abbene, L., Fauci, F., Raso, G. and others. (2006) Comparison of two portable solid state detectors with an improved collimation and alignment device for mammographic x-ray spectroscopy. Medical Physics, 33 (9). pp. 3469-3477. ISSN 0094-2405. E-ISSN 2473-4209. (doi:10.1118/1.2229431) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:92292) |
Bovey, John D. (1995) Building a Thesaurus for a Collection of Cartoon Drawings. Journal of Information Science, 21 (2). pp. 115-122. ISSN 1352-7460. (doi:10.1177/016555159502100205) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19714) |
Bovey, John D. (1996) Event-based personal retrieval. Journal of Information Science, 22 (5). pp. 357-366. ISSN 0165-5515. (doi:10.1177/016555159602200504) (KAR id:18833) |
Bovey, John D. (1993) A graphical retrieval-system. Journal of Information Science, 19 (3). pp. 179-187. ISSN 0165-5515. (doi:10.1177/016555159301900302) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20810) |
Bowles, Stephen, Hernandez-Castro, Julio C. (2015) The first 10 years of the Trojan Horse defence. Computer Fraud & Security, 2015 (1). pp. 5-13. ISSN 1361-3723. (doi:10.1016/S1361-3723(15)70005-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58386) |
Bowman, Howard and Blair, Gordon S. and Blair, Lynne and Chetwynd, Amanda G. (1995) Formal description of distributed multimedia systems: An assessment of potential techniques. Computer Communications, 18 (12). pp. 964-977. ISSN 0140-3664. (doi:10.1016/0140-3664(96)81596-9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19715) |
Bowman, Howard and Blair, Gordon S. and Blair, Lynne and Chetwynd, Amanda G. (1993) Time Versus Abstraction In Formal Description. In: Tenney, Richard L. and Amer, Paul D. and Uyar, M.Umit, eds. FORTE '93 Proceedings of the IFIP TC6/WG6.1 Sixth International Conference on Formal Description Techniques, VI. North-Holland Publishing Co., Netherlands, pp. 467-482. ISBN 0-444-81773-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20396) |
Bowman, Howard, Derrick, John, Brinksma, E. (2000) Selected papers from the Second IFIP Int'l Conference on Formal Methods for Open Object Based Distributed Systems, 1997. IEEE Transactions on Software Engineering, 26 (7). pp. 577-578. ISSN 0098-5589. (doi:10.1109/TSE.2000.859528) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16156) |
Bowman, Howard, Derrick, John, Linington, Peter F., Steen, Maarten (1996) Cross-viewpoint consistency in open distributed processing. Software Engineering Journal, 11 (1). pp. 44-57. ISSN 0268-6961. (doi:10.1049/sej.1996.0005) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18834) |
Bowman, Howard, Filetti, Marco, Alsufyani, Abdulmajeed, Janssen, Dirk P., Su, Li (2014) Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough. PLoS ONE, 9 (3). Article Number 90595. ISSN 1932-6203. (doi:10.1371/journal.pone.0090595) (KAR id:38771) |
Bowman, Howard, Filetti, Marco, Wyble, Brad, Olivers, Christian (2013) Attention is more than prediction precision [Commentary on target article]. Behavioral and Brain Sciences, 36 (3). pp. 206-208. ISSN 0140-525X. (doi:10.1017/S0140525X12002324) (KAR id:33892) |
Brierley, Calvin (2022) The Viability and Potential Consequences of IoT-Based Ransomware. Doctor of Philosophy (PhD) thesis, University of Kent,. (doi:10.22024/UniKent/01.02.100745) (KAR id:100745) |
Briscoe, Gerard, De Wilde, Philippe (2012) Ecosystem-oriented distributed evolutionary computing. In: 2012 12th UK Workshop on Computational Intelligence, UKCI 2012. 2012 12th UK Workshop on Computational Intelligence, UKCI 2012. . IEEE ISBN 978-1-4673-4391-6. E-ISBN 978-1-4673-4392-3. (doi:10.1109/UKCI.2012.6335781) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:58010) |
Brooks, Stephen P., Morgan, Byron J. T. (1994) Automatic Starting Point Selection For Function Optimization. Statistics and Computing, 4 (3). pp. 173-177. ISSN 0960-3174. (doi:10.1007/bf00142569) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20405) |
Brown, Neil C.C. (2004) C++CSP Networked. In: Communicating Process Architectures 2004. Concurrent Systems Engineering Series . IOS Press, pp. 185-200. ISBN 978-1-58603-458-0. (KAR id:33863) |
Brown, Neil Christopher Charles (2011) Communicating Haskell processes. Doctor of Philosophy (PhD) thesis, University of Kent. (doi:10.22024/UniKent/01.02.86452) (KAR id:86452) |
Bruna, Maria, Grigore, Radu, Kiefer, Stefan, Ouaknine, Joël, Worrell, James (2016) Proving the Herman-Protocol Conjecture. In: Chatzigiannakis, Ioannis and Mitzenmacher, Michael and Rabani, Yuval and Sangiorgi, Davide, eds. 43rd International Colloquium on Automata, Languages, and Programming (ICALP 2016). Leibniz International Proceedings in Informatics . 104:1-104:12. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Saarbrücken/Wadern, Germany ISBN 978-3-95977-013-2. (doi:10.4230/LIPIcs.ICALP.2016.104) (KAR id:55083) |
Buchberger, Bruno, Craciun, Adrian, Jebelean, Tudor, Kovacs, Laura, Temur, Kutsia, Koji, Nakagawa, Piroi, Florina, Popov, Nikolaj, Robu, Judit, Rosenkranz, Markus, and others. (2006) Theorema: Towards computer-aided mathematical theory exploration. Journal of Applied Logic, 4 (4). pp. 470-504. ISSN 1570-8683. (doi:10.1016/j.jal.2005.10.006) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:29973) |
Cakic, Jovan (2000) Intelligent infrastructure that support system's changes. In: Loganantharaj, Rasiah and Palm, Gunther and Ali, Moonis, eds. Intelligent Problem Solving. Methodologies and Approaches 13th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 351-356. ISBN 978-3-540-67689-8. E-ISBN 978-3-540-45049-8. (doi:10.1007/3-540-45049-1_43) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16194) |
Canuto, Anne, Howells, Gareth, Fairhurst, Michael (2000) An investigation of the effects of variable vigilance within the RePART neuro-fuzzy network. Journal of Intelligent & Robotic Systems, 29 (4). pp. 317-334. ISSN 0921-0296. (doi:10.1023/A:1008159908688) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16214) |
Canuto, Anne, Howells, Gareth, Fairhurst, Michael (2000) The use of confidence measures to enhance combination strategies in multi-network neuro-fuzzy systems. Connection Science, 12 (3-4). pp. 315-331. ISSN 0954-0091. (doi:10.1080/09540090010014089) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16212) |
Carter, Janet (1999) Collaboration or Plagiarism: What happens when students work together. In: Manaris, B., ed. Proceedings of the 4th Annual Conference on Innovation and Technology in Computer Science Education. ACM, New York, USA, pp. 52-55. ISBN 1-58113-087-2. (doi:10.1145/384267.305848) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17193) |
Carter, Janet and Jenkins, Tony (1999) Gender and programming: What's going on? In: ITICSE '99: Proceedings of the 4th Annual SIGCSE/SIGCUE Conference on Innovation and Technology in Computer Science Education. ACM, New York, USA, pp. 1-4. ISBN 1-58113-087-2. (doi:10.1145/384267.305824) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17195) |
Cascio, D., Fauci, F., Magro, R., Raso, G., Bellotti, R., De Carlo, F., Tangaro, S., De Nunzio, G., Quarta, M., Forni, G., and others. (2006) Mammogram Segmentation by Contour Searching and Mass Lesions Classification With Neural Network. IEEE Transactions on Nuclear Science, 53 (5). pp. 2827-2833. ISSN 0018-9499. E-ISSN 1558-1578. (doi:10.1109/TNS.2006.878003) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:92315) |
Casey, Anthony, Azhar, Hannan, Grzes, Marek, Sakel, Mohamed (2019) BCI controlled robotic arm as assistance to the rehabilitation of neurologically disabled patients. Disability and Rehabilitation: Assistive Technology, . ISSN 1748-3107. (doi:10.1080/17483107.2019.1683239) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:78608) |
Cerello, P., Christian Cheran, S., Bagnasco, S., Bellotti, R., Bolanos, L., Catanzariti, E., De Nunzio, G., Evelina Fantacci, M., Fiorina, E., Gargano, G., and others. (2010) 3-D object segmentation using ant colonies. Pattern Recognition, 43 (4). pp. 1476-1490. ISSN 0031-3203. (doi:10.1016/j.patcog.2009.10.007) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91428) |
Chadwick, David W., Fan, Wenjun, Constantino, Gianpiero, De Lemos, Rogério, Di Cerbo, Francesco, Herwono, Ian, Mori, Paolo, Sajjad, Ali, Wang, Xiao-Si, Manera, Mirko and others. (2019) A cloud-edge based data security architecture for sharing and analyzing cyber threat information. Future Generation Computer Systems, 102 . pp. 710-722. ISSN 0167-739X. (doi:10.1016/j.future.2019.06.026) (KAR id:76431) |
Chadwick, David W., Su, L., Laborde, Romain (2008) Coordinating access control in grid services. Concurrency and Computation: Practice and Experience, 20 (9). pp. 1071-1094. ISSN 1532-0626. (doi:10.1002/cpe.1284) (KAR id:14878) |
Chadwick, David W., Zhao, Gansen, Otenko, Sassa, Laborde, Romain, Su, Linying, Nguyen, Tuan Anh (2008) PERMIS: a modular authorization infrastructure. Concurrency and Computation: Practice and Experience, 20 (11). pp. 1341-1357. ISSN 1532-0626. (doi:10.1002/cpe.1313) (KAR id:14877) |
Chadwick, David W, Inman, George (2013) The Trusted Attribute Aggregation Service (TAAS)-Providing an Attribute Aggregation Layer for Federated Identity Management. In: Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. (doi:10.1109/ares.2013.38) (KAR id:43210) |
Champion, Théophile, Grześ, Marek, Bowman, Howard (2021) Realising Active Inference in Variational Message Passing: the Outcome-blind Certainty Seeker. Neural Computation, 33 (10). ISSN 0899-7667. E-ISSN 1530-888X. (doi:10.1162/neco_a_01422) (KAR id:88015) |
Chen, Huankai, Wang, Frank Z., Helian, Na (2013) A Cost-Efficient and Reliable Resource Allocation Model Based on Cellular Automaton Entropy for Cloud Project Scheduling. International Journal of Advanced Computer Science and Applications, 4 (4). pp. 7-14. ISSN 2156-5570. (KAR id:34031) |
Chen, Kung, Weng, Shu-Chun, Lin, Jia-Yin, Wang, Meng, Khoo, Siau-Cheng (2011) Side-Effect Localization for Lazy, Purely Functional Languages via Aspects. Higher-Order and Symbolic Computation, . pp. 1-39. ISSN 1388-3690. (KAR id:47476) |
Chen, Kung and Weng, Shu-Chun and Wang, Meng and Khoo, Siau-Cheng and Chen, Chung-Hsin (2007) A Compilation Model for Aspect-Oriented Polymorphically Typed Functional Languages. In: Static Analysis 14th International Symposium. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 34-51. ISBN 978-3-540-74060-5. E-ISBN 978-3-540-74061-2. (doi:10.1007/978-3-540-74061-2_3) (KAR id:47469) |
Chen, Kung, Weng, Shu-Chun, Wang, Meng, Khoo, Siau-Cheng, Chen, Chung-Hsin (2010) Type-Directed Weaving of Aspects for Polymorphically Typed Functional Languages. Science of Computer Programming, 75 (11). pp. 1048-1076. ISSN 0167-6423. (doi:10.1016/j.scico.2010.04.001) (KAR id:47475) |
Chen, Wanlong and Yang, Xiao and Wang, Frank Z. (2013) Delayed Switching Applied to Memristor Content Addressable Memory Cell. In: Proceedings of the World Congress on Engineering 2013. International Association of Engineers, pp. 354-357. ISBN 978-988-19251-0-7. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:35043) |
Chen, Xian, Megson, G.M (1995) A General Methodology of Partition and Mapping for Given Regular Arrays. IEEE Transactions on Parallel and Distributed Systems, 6 (10). pp. 1100-1107. ISSN 1045-9219. (doi:10.1109/71.473518) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19757) |
Cheng, Russell C.H. (1995) Bootstrap methods in computer simulation experiments. In: Alexopoulos, C. and Kang, K. and Lilegdon, W.R and Goldsman, D., eds. Winter Simulation Conference Proceedings, 1995. IEEE, pp. 171-177. ISBN 0-7803-3018-8. (doi:10.1109/WSC.1995.478720) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19759) |
Cheng, Russell C.H. (1994) Selecting Input Models. In: Tew, J.D. and Manivannan, M.S. and Sadowski, D.A. and Seila, A.F., eds. 1994 Winter Simulation Conference Proceedings. . pp. 184-191. I E E E ISBN 0-7803-2109-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20440) |
Cheng, Russell C.H., Holland, Wayne S. (1998) Two-point methods for assessing variability in simulation output. Journal of Statistical Computation and Simulation, 60 (3). pp. 183-205. ISSN 0094-9655. (doi:10.1080/00949659808811887) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17638) |
Cheng, Russell C.H. and Holland, Wayne S. and Hughes, N.A. (1996) Selection of input models using bootstrap goodness-of-fit. In: Charnes, J.M. and Morrice, D.J. and Brunner, D.T. and Swain, J.J., eds. Proceedings Winter Simulation Conference. IEEE, pp. 199-206. ISBN 0-7803-3383-7. (doi:10.1109/WSC.1996.873279) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18875) |
Cheng, Russell C.H. and Traylor, L. (1995) Characterization of material strength properties using probabilistic mixture models. In: Carlomagno, G.M. and Brebbia, C.A., eds. Computational Methods and Experimental Measurements. Computational Mechanics Publications, pp. 553-560. ISBN 978-1-85312-313-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19760) |
Cheung-Yueng-San, C. Y. E. (1973) Some aspects of adaptive logic for pattern recognition. Doctor of Philosophy (PhD) thesis, University of Kent. (doi:10.22024/UniKent/01.02.94269) (KAR id:94269) |
Cheval, Vincent (2014) APTE: An Algorithm for Proving Trace Equivalence. In: 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'14), Avril 2014, Grenoble, France. (doi:10.1007/978-3-642-54862-8_50) (KAR id:46724) |
Cheval, Vincent (2012) Automatic verification of cryptographic protocols: privacy-type properties. Doctor of Philosophy (PhD) thesis, ENS-Cachan. (KAR id:46883) |
Cheval, Vincent, Comon-Lundh, Hubert, Delaune, Stéphanie (2010) Automating Security Analysis: Symbolic Equivalence of Constraint Systems. In: Giesl, Jürgen and Hähnle, Reiner, eds. Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR'10). Lecture Notes in Computer Science , 6173. pp. 412-426. Springer-Verlag Berlin, Edinburgh, Scotland, UK ISBN 978-3-642-14202-4. E-ISBN 978-3-642-14203-1. (doi:10.1007/978-3-642-14203-1_35) (KAR id:46730) |
Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie (2011) Trace Equivalence Decision: Negative Tests and Non-determinism. In: Chen, Yan and Danezis, George and Shmatikov, Vitaly, eds. Proceedings of the 18th ACM conference on Computer and communications security. ACM, New York, USA, pp. 321-330. ISBN 978-1-4503-0948-6. (doi:10.1145/2046707.2046744) (KAR id:46878) |
Cheval, Vincent, Comon-Lundh, Hubert, Delaune, Stéphanie (2017) A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation, 255 (part 1). pp. 94-125. ISSN 0890-5401. E-ISSN 1090-2651. (doi:10.1016/j.ic.2017.05.004) (KAR id:46882) |
Cheval, Vincent and Cortier, Véronique (2015) Timing attacks: symbolic framework and proof techniques. In: Focardi, Riccardo and Myers, Andrew, eds. Principles of Security and Trust 4th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 280-299. ISBN 978-3-662-46665-0. E-ISBN 978-3-662-46666-7. (doi:10.1007/978-3-662-46666-7_15) (KAR id:46881) |
Cheval, Vincent, Cortier, Véronique, Delaune, Stéphanie (2013) Deciding equivalence-based properties using constraint solving. Theoretical Computer Science, 492 . pp. 1-39. ISSN 0304-3975. (doi:10.1016/j.tcs.2013.04.016) (KAR id:46725) |
Cheval, Vincent, Cortier, Véronique, Plet, Antoine (2013) Lengths May Break Privacy – Or How to Check for Equivalences with Length. In: 25th International Conference on Computer Aided Verification (CAV'13), July 2013, St Petersburg, Russia. (doi:10.1007/978-3-642-39799-8_50) (KAR id:46726) |
Cheval, Vincent, Delaune, Stéphanie, Ryan, Mark (2014) Tests for Establishing Security Properties. In: 9th International Symposium on Trustworthy Global Computing (TGC'14), September 2014, Roma, Italy. (doi:10.1007/978-3-662-45917-1_6) (KAR id:46879) |
Chivers, Daniel, Rodgers, Peter (2013) Exploring Local Optima in Schematic Layout. In: Proceedings of the International Conference on Distributed Multimedia Systems 2013. . Knowledge Systems Institute (KAR id:34967) |
Chli, M., De Wilde, Philippe (2006) Internet search: Subdivision-based interactive query expansion and the soft semantic web. Applied Soft Computing, 6 (4). pp. 372-383. ISSN 1568-4946. (doi:10.1016/j.asoc.2005.11.003) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:58041) |
Chousein, Zeynep, Tetik, Hacı Yakup, Sağlam, Rahime Belen, Bülbül, Abdullah, Li, Shujun (2020) Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online Discussions. In: Proceedings of the 13th International Conference on Security of Information and Networks. . 17:1-17:8. ACM ISBN 978-1-4503-8751-4. (doi:10.1145/3433174.3433587) (KAR id:89479) |
Chu, Dominique, Barnes, David J., Perkins, Samuel (2014) Amorphous computing in the presence of stochastic disturbances. Biosystems, 125 . pp. 32-42. ISSN 0303-2647. (doi:10.1016/j.biosystems.2014.09.010) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:43262) |
Clear, David and Ibbetson, Alan L. and Collinson, Peter (1994) Exporting Home on Demand to PCS. In: USENIX Systems Administration (LISA VIII) Conference Proceedings. Usenix Assoc, pp. 139-147. ISBN 978-1-880446-64-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20455) |
Cobbah, W.G.K. and Fairhurst, Michael (2000) Computer analysis of handwriting dynamics during dopamimetic tests in Parkinson's disease. In: Vajda, F., ed. Proceedings of the 26th Euromicro Conference. IEEE, A414-A418. ISBN 0-7695-0780-8. (doi:10.1109/EURMIC.2000.874521) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16291) |
Colchester, Alan C. F., Ourselin, Sébastien, Zhu, Yonggen, Bardinet, Eric, He, Yang, Roche, Alexis, Al-Sarraj, Safa, Nailon, Bill, Ironside, James, Ayache, Nicholas and others. (2000) 3-D reconstruction of macroscopic optical brain slice images. In: 3rd International Conference on Medical Image Computing and Computer-Assisted Intervention, 11-14 Oct 2000, Pittsburgh, Pennsylvania. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16293) |
Contrastin, Mistral, Orchard, Dominic A., Rice, Andrew C. (2018) Automatic reordering for dataflow safety of Datalog. Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming, . (doi:10.1145/3236950.3236954) (KAR id:68499) |
Cooper, Helen and Jennings, Liz (2016) ORCID EPrints Implementation Survey Analysis. Working paper. University of Central Lancashire/University of Bath, UK 10.17030/clok.00015668. (doi:10.17030/clok.00015668) (KAR id:63568) |
Corneli, Joseph, Jordanous, Anna, Shepperd, Rosie, Llano, Maria Teresa, Misztal, Joanna, Colton, Simon, Guckelsberger, Christian (2015) Computational Poetry Workshop: Making Sense of Work in Progress. In: 6th International Conference on Computational Creativity, June 29 - July 2, 2015, Utah, US. (KAR id:48038) |
Cramer, Sam, Kampouridis, Michael, Freitas, Alex A., Alexandridis, Antonis (2019) Stochastic Model Genetic Programming: Deriving Pricing Equations for Rainfall Weather Derivatives. Swarm and Evolutionary Computation, 46 . pp. 184-200. ISSN 2210-6502. E-ISSN 2210-6510. (doi:10.1016/j.swevo.2019.01.008) (KAR id:72082) |
Cronk, Jonathan, Sharp, John A. (1995) A framework for deciding what to outsource in information technology. Journal of Information Technology, 10 (4). pp. 259-267. ISSN 0268-3962. (doi:10.1057/jit.1995.29) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19783) |
Cross, M. and Keech, M. and Liddell, Heather and Steel, John and Walshaw, C and Welch, Peter H. (1995) Implementing a strategy for the promotion of high performance computing in the UK. In: Hertzberger, Bob and Serazzi, Giuseppe, eds. High-Performance Computing and Networking International Conference and Exhibition. Lecture Notes in Computer Science . Springer, Berlin, Germany, p. 941. ISBN 978-3-540-59393-5. E-ISBN 978-3-540-49242-9. (doi:10.1007/BFb0046749) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19789) |
Dallas, I. (1993) UCSG UNIX applications workshop, university-of-kent, July 6 and 7 1993. University Computing, 15 (4). pp. 195-200. ISSN 0265-4385. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20863) |
Dalmeida, K.M., Masala, Giovanni Luca (2021) HRV features as viable physiological markers for stress detection using wearable devices. Sensors, 21 (8). ISSN 1424-8220. E-ISSN 1424-8220. (doi:10.3390/s21082873) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91358) |
Daniel, Joshua, El-Moussa, Fadi, Ducatel, Géry, Pawar, Pramod, Sajjad, Ali, Rowlingson, Robert, Dimitrakos, Theo (2015) Integrating Security Services in Cloud Service Stores. In: Trust Management IX. IFIP Advances in Information and Communication Technology. Trust Management IX. IFIP Advances in Information and Communication Technology , 454. pp. 226-239. Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3_19) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:48978) |
Davies, Nigel, Davy, M.J., Blair, Gordon S., Mariani, John A. (1993) Object invocation and management in the zenith distributed multimedia information-system. Information and Software Technology, 35 (5). pp. 259-266. ISSN 0950-5849. (doi:10.1016/0950-5849(93)90059-c) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20868) |
Dealmeida, F.A., Welch, Peter H. (1994) A Parallel Emulator for a Multi-Processor Dataflow Machine. In: DeGloria, A. and Jane, M.R. and Marini, D., eds. Transputer Applications and Systems ''94, Proceedings of the 1994 World Transputer Congress. 41. pp. 259-272. I O S Press ISBN 90-5199-177-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20160) |
Deng, Yuhui, Huang, Xinyu, Song, Liangshan, Zhou, Yongtao, Wang, Frank Z. (2017) Memory Deduplication: An Effective Approach to Improve the Memory System. Journal of Information Science and Engineering, 33 (5). pp. 1103-1120. ISSN 1016-2364. (doi:10.6688/JISE.2017.33.5.1) (KAR id:69677) |
Dent, Alan and Hanna, Keith (1993) Reasoning about array structures using a dependently typed logic. In: Agnew, David and Claesen, Luc J. M. and Camposano, Raul, eds. IFIP transactions a-computer science and technology. North Holland, pp. 207-224. ISBN 0-444-81641-0. (doi:10.1016/B978-0-444-81641-2.50022-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20872) |
Boiten, Eerke Albert and Derrick, John and Smith, G., eds. (2008) Proceedings of the BCS-FACS Refinement Workshop (REFINE 2007). Electronic Notes in Theoretical Computer Science, 201 . Elsevier, 264 pp. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:3501) |
Derrick, John and Boiten, Eerke Albert (1998) Testing refinements by refining tests. In: Bowen, Jonathan P. and Fett, A. and Hinchey, Michael G., eds. ZUM ’98: The Z Formal Specification Notation 11th International Conference of Z Users. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 265-283. ISBN 978-3-540-65070-6. E-ISBN 978-3-540-49676-2. (doi:10.1007/978-3-540-49676-2_19) (KAR id:17694) |
Dib, Fadi K., Rodgers, Peter (2018) Graph drawing using tabu search coupled with path relinking. PLOS ONE, 13 (5). Article Number 197103. ISSN 1932-6203. (doi:10.1371/journal.pone.0197103) (KAR id:67399) |
Dilley, Nicolas, Lange, Julien (2010) Bounded verification of message-passing concurrency in Go using Promela and Spin. In: EPTCS. Proceedings of the 12th International Workshop on Programming Language Approaches to Concurrency- and Communication-cEntric Software. 314. pp. 34-45. EPTCS (doi:10.4204/EPTCS.314.4) (KAR id:80588) |
Dodds, Mike, Batty, Mark, Gotsman, Alexey (2018) Compositional Verification of Compiler Optimisations on Relaxed Memory. In: Lecture Notes in Computer Science. Programming Languages and Systems: 27th European Symposium on Programming, ESOP 2018 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018 Proceedings. 10801. Springer ISBN 978-3-319-89883-4. (doi:10.1007/978-3-319-89884-1_36) (KAR id:66630) |
Dunn, Stuart, Hedges, Mark, Jordanous, Anna, Storz, Christoph (2012) Comparing the informatics of text and Cultural Heritage: the SAWS project. In: Computer Applications and Quantitative Methods in Archaeology, 2012, Southampton, UK. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42382) |
Duraisingam, Aruna, Soria, Daniele, Palaniappan, Ramaswamy (2024) Unraveling Neurophysiological Attentional Habituation Dynamics of Food and Non-Food Paradigms: ERP Correlates with BMI in Response to Repetitive Visual Stimuli. In: 5th International Conference on Data Intelligence and Cognitive Informatics. . ISBN 979-8-3503-8960-9. E-ISBN 979-8-3503-8959-3. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:107053) |
Duregard, Jonas and Jansson, Patrik and Wang, Meng (2012) Feat: Functional Enumeration of Algebraic Types. In: Proceedings of the 2012 Haskell Symposium. ICFP International Conference on Functional Programming . ACM, New York, USA, pp. 61-72. ISBN 978-1-4503-1574-6. (doi:10.1145/2364506.2364515) (KAR id:47486) |
Dziallas, Sebastian (2015) Characterizing Graduateness in Computing Education. In: International Computing Education Research, 9-13 August 2015, Omaha, NE. (doi:10.1145/2787622.2787739) (KAR id:48933) |
Dziallas, Sebastian (2016) Examining Graduateness through Narratives. In: ICER '16 Proceedings of the 2016 ACM Conference on International Computing Education Research. . pp. 291-292. ACM ISBN 978-1-4503-4449-4. (doi:10.1145/2960310.2960353) (KAR id:56842) |
Dziallas, Sebastian, Fincher, Sally (2015) ACM Curriculum Reports: A Pedagogic Perspective. In: International Computing Education Research, 9-13 August 2015, Omaha, NE. (doi:10.1145/2787622.2787714) (KAR id:48932) |
Dziallas, Sebastian, Fincher, Sally (2016) Aspects of Graduateness in Computing Students’ Narratives. In: ICER 16 Proceedings of the 2016 ACM Conference on International Computing Education Research. . pp. 181-190. ISBN 978-1-4503-4449-4. (doi:10.1145/2960310.2960317) (KAR id:56841) |
Dziallas, Sebastian, Fincher, Sally (2015) Exploring Students’ Conception of Learning through Narratives. In: Engineering Education Research Network Annual Symposium, 5-6 November 2015, Cambridge, UK. (KAR id:51442) |
Dziallas, Sebastian and Fincher, Sally (2014) Learning to Learn: The Co-Evolution of an Institution and its Students. In: 2014 IEEE Frontiers in Education Conference (FIE) Proceedings. IEEE, pp. 852-858. E-ISBN 978-1-4799-3922-0. (doi:10.1109/FIE.2014.7044126) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:44119) |
Dziallas, Sebastian and Fincher, Sally and Johnson, Colin G. and Utting, Ian (2017) A First Look at the Year in Computing. In: Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education. ITiCSE Innovation and Technology in Computer Science Education . ACM, New York, USA, pp. 275-280. ISBN 978-1-4503-4704-4. (doi:10.1145/3059009.3059049) (KAR id:61056) |
Dziallas, Sebastian and Fincher, Sally and Johnson, Colin G. and Utting, Ian (2017) The Year in Computing Initiative. In: 5th Annual Symposium of the United Kingdom & Ireland Engineering Education Research Network. Aston University, Birmingham, UK. ISBN 978-1-85449-443-6. (KAR id:64121) |
Edwards, Marion, Cooley, Roger (1993) Expertise in Expert-Systems - Knowledge Acquisition for Biological Expert-Systems. Computer Applications in the Biosciences, 9 (6). pp. 657-665. ISSN 0266-7061. (doi:10.1093/bioinformatics/9.6.657) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22078) |
Edwards, Michael R. (1997) Developing a model of expertise for a taxonomic expert system. In: Bridge, Paul and Jeffries, Peter and Morse, David R. and Scott, Peter R., eds. Information Technology, Plant Pathology and Biodiversity. Cabi Publishing . pp. 183-196. Cabi Publishing-C a B Int, Wallingford ISBN 0-85199-217-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17704) |
Efstratiou, Christos, Leontiadis, Ilias, Picone, Marco, Rachuri, Kiran, Mascolo, Cecilia, Crowcroft, Jon (2012) Sense and Sensibility in a Pervasive World. In: Proceedings of 10th International Conference on Pervasive Computing (PERVASIVE 2012), June 2012, Newcastle, UK. (KAR id:35502) |
Efstratiou, Christos, Rachuri, Kiran, Das, Sajal (2015) IEEE PerCom 2015. IEEE Pervasive Computing, 14 (3). pp. 84-88. ISSN 1536-1268. E-ISSN 1558-2590. (doi:10.1109/mprv.2015.49) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:49203) |
Elsehely, Ehab, Sobhy, Mohammed (2000) Real time radar target detection under jamming conditions using wavelet transform on FPGA device. IEEE International Symposium On Circuits and Systems, 4 . pp. 545-548. (doi:10.1109/ISCAS.2000.858809) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16067) |
Elston, David A., Jayasinghe, G., Buckland, Stephen T., MacMillan, Douglas C., Aspinall, R.J. (1997) Adapting regression equations to minimize the mean squared error of predictions made using covariate data from a GIS. International Journal of Geographical Information Science, 11 (3). pp. 265-280. ISSN 1365-8816. (doi:10.1080/136588197242392) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:23078) |
Erola, Arnau, Agrafiotis, Ioannis, Nurse, Jason R. C., Axon, Louise, Goldsmith, Michael, Creese, Sadie (2022) A System to Calculate Cyber-Value-at-Risk. Computers & Security, 113 . Article Number 102545. ISSN 0167-4048. (doi:10.1016/j.cose.2021.102545) (KAR id:91647) |
Esposito, Massimo, Masala, Giovanni Luca, Golosio, Bruno, Cangelosi, Angelo (2020) Editorial: Language Representation and Learning in Cognitive and Artificial Intelligence Systems. Frontiers in Robotics and AI, 7 . ISSN 2296-9144. (doi:10.3389/frobt.2020.00069) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91356) |
Esposito, Massimo, Masala, Giovanni Luca, Minutolo, Aniello, Pota, Marco (2021) Special Issue on “Natural Language Processing: Emerging Neural Approaches and Applications”. Applied Sciences, 11 (15). Article Number 6717. ISSN 2076-3417. (doi:10.3390/app11156717) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91357) |
Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Alcaide, Almudena, Ribagorda, Arturo (2008) On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security, 3 (2). pp. 166-172. ISSN 1556-6013. (doi:10.1109/TIFS.2008.920724) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31957) |
Evans, David Hillary (1983) Amplifying single-gate mesfet phase shifters at x-band. Doctor of Philosophy (PhD) thesis, University of Kent. (doi:10.22024/UniKent/01.02.94330) (KAR id:94330) |
Fairhurst, Michael C. and Rahman, A. Fuad R. (1996) New multiexpert architecture for high-performance object recognition. In: Solomon, Susan S. and Batchelor, Bruce G. and Waltz, Frederick M., eds. Machine Vision Applications, Architectures, and Systems Integration V. Proceedings of SPIE . SPIE, pp. 140-151. ISBN 0-8194-2310-6. (doi:10.1117/12.257256) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19169) |
Falk, Michael, Kantosalo, Anna, Jordanous, Anna (2021) Embodiment in 18th Century Depictions of Human-Machine Co-Creativity. Frontiers in Robotics and AI, . ISSN 2296-9144. (doi:10.3389/frobt.2021.662036) (KAR id:88875) |
Faridani, A., Dimond, Keith R. (1994) A Transputer-Based Vision System for Mobile Robots. In: Arabnia, Hamid R., ed. Transputer Research and Applications 7. 42. pp. 68-78. I O S Press ISBN 90-5199-187-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19519) |
Fil, Jakub (2022) Towards modelling of autonomous neuromorphic learning systems. Doctor of Philosophy (PhD) thesis, University of Kent,. (doi:10.22024/UniKent/01.02.95778) (KAR id:95778) |
Filho, E.C.D.B.C., Fairhurst, Michael, Bisset, D.L. (1991) Adaptive pattern-recognition using goal seeking neurons. Pattern Recognition Letters, 12 (3). pp. 131-138. ISSN 0167-8655. (doi:10.1016/0167-8655(91)90040-s) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22931) |
Fincher, Sally (2015) What are we doing when we teach computing in schools? Communications of the ACM, 58 (5). pp. 24-26. ISSN 0001-0782. (doi:10.1145/2742693) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:48173) |
Fincher, Sally, Dziallas, Sebastian, Brandes, Ofra, Kolikant, Yifat, Shapiro, Ben (2016) Negotiating Academic Communities: Narratives of Life-long Learners. In: 12th International Conference of the Learning Sciences (ICLS), 20-24 June 2016, Singapore. (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:54806) |
Fincher, Sally, Knox, Daniel (2013) The Porous Classroom: Professional Practices in the Computing Curriculum. IEEE Computer, 46 (9). pp. 44-51. ISSN 0018-9162. (doi:10.1109/MC.2013.261) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:35169) |
Flur, Shaked and Sarkar, Susmit and Pulte, Christopher and Nienhuis, Kyndylan and Maranget, Luc and Gray, Kathryn E. and Sezgin, Ali and Batty, Mark and Sewell, Peter (2017) Mixed-Size Concurrency: ARM, POWER, C/C++11, and SC. In: Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. POPL Principles of Programming Languages . ACM, New York, USA, pp. 429-442. ISBN 978-1-4503-4660-3. (doi:10.1145/3009837.3009839) (KAR id:64723) |
Forrester, Michael A. (1994) Hypermedia and Indexing - Identifying Appropriate Models from User Studies. In: Raitt, David I. and Jeapes, Ben, eds. Proceedings of the 17th International Online Information Meeting. Information Today Inc, Medford, New Jersey, USA, pp. 313-324. ISBN 0-904933-85-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22091) |
Genaim, Samir, King, Andy (2008) Inferring non-suspension conditions for logic programs with dynamic scheduling. ACM Transactions on Computational Logic, 9 (3). pp. 182-196. ISSN 1529-3785. (doi:10.1145/1352582.1352585) (KAR id:15105) |
Gerig, Guido, Welti, Daniel, Guttmann, Charles, Colchester, Alan C. F., Szekely, Gabor (2000) Exploring the discrimination power of the time domain for segmentation and characterization of active lesions in serial MR data. Medical Image Analysis, 4 (1). pp. 31-42. ISSN 1361-8415. (doi:10.1016/S1361-8415(00)00005-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16134) |
Gerig, Guido and Welti, Daniel and Guttmann, Charles and Colchester, Alan C. F. and Szekely, Gabor (1998) Exploring the discrimination power of the time domain for segmentation and characterization of lesions in serial MR data. In: Wells, William M. and Colchester, Alan C. F. and Delp, Scott, eds. Medical Image Computing and Computer-Assisted Intervention — MICCAI’98 First International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 469-480. ISBN 978-3-540-65136-9. E-ISBN 978-3-540-49563-5. (doi:10.1007/BFb0056232) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17762) |
Ghita, Bogdan, Masala, Giovanni Luca, Grosso, Enrico, Lentini, Salvatore, Santos, Nelson (2019) Performance analysis of data fragmentation techniques on a cloud server. International Journal of Grid and Utility Computing, 10 (4). pp. 392-401. ISSN 1741-847X. E-ISSN 1741-8488. (doi:10.1504/IJGUC.2019.10022144) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91403) |
Gillham, Michael, Howells, Gareth, Pepper, Matthew G., Kelly, Stephen W. (2016) Developing Effective Intelligent Assistance for the Powered Wheelchair User. In: Proceedings of 2016 Technology for Independence Conference (T4i) RAatE. . (doi:10.15131/shef.data.4256522) (KAR id:58431) |
Giorgi, Ioanna, Cangelosi, Angelo, Masala, Giovanni Luca (2021) Learning Actions From Natural Language Instructions Using an ON-World Embodied Cognitive Architecture. Frontiers in Neurorobotics, 15 . E-ISSN 1662-5218. (doi:10.3389/fnbot.2021.626380) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91360) |
Giorgi, Ioanna, Golosio, Bruno, Esposito, Massimo, Cangelosi, Angelo, Masala, Giovanni Luca (2020) Modelling Multiple Language Learning in a Developmental Cognitive Architecture. IEEE Transactions on Cognitive and Developmental Systems, . ISSN 2379-8920. E-ISSN 2379-8939. (doi:10.1109/TCDS.2020.3033963) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91361) |
Glenat, Stephanie, Heutte, Laurent, Paquet, Thierry, Guest, Richard, Fairhurst, Michael, Linnell, Tristan A. (2008) The Development of a computer-assisted tool for the assessment of neuropsychological drawing tasks. International Journal of Information Technology & Decision Making, 7 (4). pp. 751-767. ISSN 0219-6220. (doi:10.1142/s0219622008003162) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:15114) |
Glover, R. J. (1985) An adaptive computing system. Doctor of Philosophy (PhD) thesis, University of Kent. (doi:10.22024/UniKent/01.02.94371) (KAR id:94371) |
Goel, Ashok and Jordanous, Anna and Pease, Alison (2017) Preface: Proceedings of the Eighth International Conference on Computational Creativity, ICCC 2017, Atlanta — 19 - 23 June. In: Goel, Ashok and Jordanous, Anna and Pease, Alison, eds. ICCC'17 - Proceedings of the Eighth International Conference on Computational Creativity. Georgia Institute of Technology, Atlanta, Georgia, USA. ISBN 978-0-692-89564-1. (KAR id:64893) |
Golosio, B., Cangelosi, A., Gamotina, O., Masala, Giovanni Luca (2015) A cognitive neural architecture able to learn and communicate through natural language. PLoS ONE, 10 (11). E-ISSN 1932-6203. (doi:10.1371/journal.pone.0140866) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91406) |
Golosio, B., Masala, Giovanni Luca, Piccioli, A., Oliva, P., Carpinelli, M., Cataldo, R., Cerello, P., De Carlo, F., Falaschi, F., Fantacci, M.E., and others. (2009) A novel multithreshold method for nodule detection in lung CT. Medical Physics, 36 (8). pp. 3607-3618. E-ISSN 2473-4209. (doi:10.1118/1.3160107) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91429) |
Golosio, B., Oliva, P., Brunetti, A., Luca Masala, G., Carpinelli, M., Meloni, F., Battista Meloni, G. (2013) Preliminary study of an angiographic and angio-tomographic technique based on K-edge filters. Journal of Applied Physics, 114 (6). ISSN 0021-8979. E-ISSN 1089-7550. (doi:10.1063/1.4818501) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91426) |
Golosio, B., Schoonjans, T., Brunetti, A., Oliva, P., Masala, Giovanni Luca (2014) Monte Carlo simulation of X-ray imaging and spectroscopy experiments using quadric geometry and variance reduction techniques. Computer Physics Communications, 185 (3). pp. 1044-1052. ISSN 0010-4655. (doi:10.1016/j.cpc.2013.10.034) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91415) |
Golosio, Bruno, Delogu, Pasquale, Zanette, Irene, Carpinelli, Massimo, Masala, Giovanni Luca, Oliva, Piernicola, Stefanini, Arnaldo, Stumbo, Simone (2008) Phase contrast imaging simulation and measurements using polychromatic sources with small source-object distances. Journal of Applied Physics, 104 (9). Article Number 093102. ISSN 0021-8979. (doi:10.1063/1.3006130) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91780) |
Gootjes-Dreesbach, Ellis Luise (2015) Awareness & Perception in Rapid Serial Visual Presentation. Doctor of Philosophy (PhD) thesis, University of Kent,. (doi:10.22024/UniKent/01.02.56667) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:56667) |
Grzes, Marek (2017) Reward Shaping in Episodic Reinforcement Learning. In: Proc. of the 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2017). . pp. 565-573. ACM (KAR id:60614) |
Gu, Xiaowei (2021) Multilayer Ensemble Evolving Fuzzy Inference System. IEEE Transactions on Fuzzy Systems, 29 (8). pp. 2425-2431. ISSN 1063-6706. E-ISSN 1941-0034. (doi:10.1109/TFUZZ.2020.2988846) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90184) |
Gu, Xiaowei (2020) A self-training hierarchical prototype-based approach for semi-supervised classification. Information Sciences, 535 . pp. 204-224. ISSN 0020-0255. (doi:10.1016/j.ins.2020.05.018) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90181) |
Gu, Xiaowei, Angelov, Muhammad Aurangzeb (2019) An Odometer-Free Approach for Unmanned Ground-Based Vehicle Simultaneous Localization and Mapping. In: 2019 IEEE Nuclear Science Symposium and Medical Imaging Conference. . (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90193) |
Gu, Xiaowei, Angelov, Plamen (2017) Autonomous anomaly detection. In: 2017 Evolving and Adaptive Intelligent Systems (EAIS). . pp. 1-8. IEEE ISBN 978-1-5090-6445-8. E-ISBN 978-1-5090-6444-1. (doi:10.1109/EAIS.2017.7954831) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90212) |
Gu, Xiaowei, Angelov, Plamen (2018) A Deep Rule-Based Approach for Satellite Scene Image Analysis. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). . pp. 2778-2783. IEEE ISBN 978-1-5386-6651-7. E-ISBN 978-1-5386-6650-0. (doi:10.1109/SMC.2018.00474) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90201) |
Gu, Xiaowei and Angelov, Plamen (2021) A Multi-Stream Deep Rule-Based Ensemble System for Aerial Image Scene Classification. In: Handbook on Computer Learning and Intelligence. 2nd. World Scientific, Singapore. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90393) |
Gu, Xiaowei, Angelov, Plamen (2019) Self-boosting first-order autonomous learning neuro-fuzzy systems. Applied Soft Computing, 77 . pp. 118-134. ISSN 1568-4946. (doi:10.1016/j.asoc.2019.01.005) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90200) |
Gu, Xiaowei, Angelov, Plamen P. (2016) Autonomous data-driven clustering for live data stream. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC). . 001128-001135. IEEE ISBN 978-1-5090-1898-7. E-ISBN 978-1-5090-1897-0. (doi:10.1109/SMC.2016.7844394) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90214) |
Gu, Xiaowei, Angelov, Plamen P. (2019) Deep Rule-Based Aerial Scene Classifier using High-Level Ensemble Feature Descriptor. In: Neural Networks (IJCNN), The 2013 International Joint Conference. 2019 International Joint Conference on Neural Networks (IJCNN). . pp. 1-7. IEEE ISBN 978-1-7281-1986-1. E-ISBN 978-1-7281-1985-4. (doi:10.1109/IJCNN.2019.8851838) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90195) |
Gu, Xiaowei, Angelov, Plamen P. (2020) Highly interpretable hierarchical deep rule-based classifier. Applied Soft Computing, 92 . Article Number 106310. ISSN 1568-4946. (doi:10.1016/j.asoc.2020.106310) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90183) |
Gu, Xiaowei, Angelov, Plamen P. (2018) Self-organising fuzzy logic classifier. Information Sciences, 447 . pp. 36-51. ISSN 0020-0255. (doi:10.1016/j.ins.2018.03.004) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90205) |
Gu, Xiaowei, Angelov, Plamen P. (2019) A Semi-supervised Deep Rule-Based Approach for Remote Sensing Scene Classification. In: INNS Big Data and Deep Learning conference 2019. 1. pp. 257-266. Springer, Cham ISBN 978-3-030-16840-7. E-ISBN 978-3-030-16841-4. (doi:10.1007/978-3-030-16841-4_27) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90197) |
Gu, Xiaowei, Angelov, Plamen P. (2018) Semi-supervised deep rule-based approach for image classification. Applied Soft Computing, 68 . pp. 53-68. ISSN 1568-4946. (doi:10.1016/j.asoc.2018.03.032) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90203) |
Gu, Xiaowei, Angelov, Plamen P., Ali, Azliza Mohd, Gruver, William A., Gaydadjiev, Georgi (2016) Online evolving fuzzy rule-based prediction model for high frequency trading financial data stream. In: 2016 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS). . pp. 169-175. IEEE E-ISBN 978-1-5090-2583-1. (doi:10.1109/EAIS.2016.7502509) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90215) |
Gu, Xiaowei, Angelov, Plamen P., Kangin, Dmitry, Principe, Jose C. (2017) A new type of distance metric and its use for clustering. Evolving Systems, 8 (3). pp. 167-177. ISSN 1868-6478. (doi:10.1007/s12530-017-9195-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90209) |
Gu, Xiaowei, Angelov, Plamen P., Príncipe, José C. (2018) A method for autonomous data partitioning. Information Sciences, 460-46 . pp. 65-82. ISSN 0020-0255. (doi:10.1016/j.ins.2018.05.030) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90202) |
Gu, Xiaowei, Angelov, Plamen P., Soares, Eduardo A. (2020) A self‐adaptive synthetic over‐sampling technique for imbalanced classification. International Journal of Intelligent Systems, 35 (6). pp. 923-943. ISSN 0884-8173. (doi:10.1002/int.22230) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90182) |
Gu, Xiaowei, Angelov, Plamen P., Zhang, Ce, Atkinson, Peter M. (2018) A Massively Parallel Deep Rule-Based Ensemble Classifier for Remote Sensing Scenes. IEEE Geoscience and Remote Sensing Letters, 15 (3). pp. 345-349. ISSN 1545-598X. E-ISSN 1558-0571. (doi:10.1109/LGRS.2017.2787421) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90206) |
Gu, Xiaowei, Angelov, Plamen, Kangin, Dmitry, Principe, Jose (2018) Self-Organised direction aware data partitioning algorithm. Information Sciences, 423 . pp. 80-95. ISSN 0020-0255. (doi:10.1016/j.ins.2017.09.025) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90207) |
Gu, Xiaowei, Angelov, Plamen, Rong, Hai-Jun (2019) Local optimality of self-organising neuro-fuzzy inference systems. Information Sciences, 503 . pp. 351-380. ISSN 0020-0255. (doi:10.1016/j.ins.2019.07.006) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90192) |
Gu, Xiaowei, Angelov, Plamen, Zhang, Ce, Atkinson, Peter (2021) A Semi-Supervised Deep Rule-Based Approach for Complex Satellite Sensor Image Analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence, . p. 1. ISSN 0162-8828. E-ISSN 1939-3539. (doi:10.1109/TPAMI.2020.3048268) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90290) |
Gu, Xiaowei, Angelov, Plamen, Zhao, Zhijin (2021) Self-organizing fuzzy inference ensemble system for big streaming data classification. Knowledge-Based Systems, 218 . Article Number 106870. ISSN 0950-7051. (doi:10.1016/j.knosys.2021.106870) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90374) |
Gu, Xiaowei, Angelov, Plamen, Zhao, Zhijin (2019) A distance-type-insensitive clustering approach. Applied Soft Computing, 77 . pp. 622-634. ISSN 1568-4946. (doi:10.1016/j.asoc.2019.01.028) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90198) |
Gu, Xiaowei, Ding, Weiping (2019) A hierarchical prototype-based approach for classification. Information Sciences, 505 . pp. 325-351. ISSN 0020-0255. (doi:10.1016/j.ins.2019.07.077) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90191) |
Gu, Xiaowei, Li, Miqing (2021) A multi-granularity locally optimal prototype-based approach for classification. Information Sciences, 569 . pp. 157-183. ISSN 0020-0255. (doi:10.1016/j.ins.2021.04.039) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90394) |
Gu, Xiaowei, Shen, Qiang, Angelov, Plamen P. (2020) Particle Swarm Optimized Autonomous Learning Fuzzy System. IEEE Transactions on Cybernetics, . pp. 1-12. ISSN 2168-2267. E-ISSN 2168-2275. (doi:10.1109/TCYB.2020.2967462) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90179) |
Gu, Xiaowei, Zhao, Zhijin, Shen, Lei (2016) Blind estimation of pseudo‐random codes in periodic long code direct sequence spread spectrum signals. IET Communications, 10 (11). pp. 1273-1281. ISSN 1751-8636. (doi:10.1049/iet-com.2015.0374) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90216) |
Guest, R.M. and Fairhurst, M.C. and Potter, J.M. and Donnelly, N. (2000) Analysing constructional aspects of figure completion for the diagnosis of visuo-spatial neglect. In: Proceedings 15th International Conference On Pattern Recognition. IEEE, pp. 316-319. ISBN 0-7695-0751-4. (doi:10.1109/ICPR.2000.902922) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16173) |
Guest, Richard and Fairhurst, Michael and Potter, Jonathan (2000) Automated extraction of image segments from clinically diagnostic hand-drawn geometric shapes. In: Vajda, F., ed. Proceedings of the 26th Euromicro Conference. IEEE, A440-A446. ISBN 0-7695-0780-8. (doi:10.1109/EURMIC.2000.874527) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16171) |
Haas, S., Thornley, D.A., Zhu, M., Dobinson, R.W., Heeley, R., Madsen, N.A.H., Martin, B. (1998) Results from the Macrame 1024 node switching network. In: Computer Physics Communications. 110. pp. 206-210. Elsevier (doi:10.1016/S0010-4655(97)00178-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17790) |
Haas, S., Thornley, D.A., Zhu, M., Dobinson, R.W., Martin, B. (1998) The Macrame 1024 node switching network. Microprocessors and Microsystems, 21 (7-8). pp. 511-518. ISSN 0141-9331. (doi:10.1016/S0141-9331(98)00044-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17791) |
Hajdusek, Michal and Pérez-Delgado, Carlos A and Fitzsimons, Joseph F (2015) Device-independent verifiable blind quantum computation. [Preprint] (doi:10.48550/arXiv.1502.02563) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:58189) |
Hanna, Keith (2000) Reasoning about analog-level implementations of digital systems. Formal Methods in System Design, 16 (2). pp. 127-158. ISSN 0925-9856. (doi:10.1023/A:1008791128550) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16185) |
Hanna, Keith (1998) Reasoning about imperfect digital systems. In: Moller, Bernhard Moller and Tucker, John V, eds. Prospects for Hardware Foundations ESPRIT Working Group 8533 NADA. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 333-355. ISBN 978-3-540-65461-2. E-ISBN 978-3-540-49254-2. (doi:10.1007/3-540-49254-2_10) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17797) |
Hanna, Keith, Daeche, Neil (1992) The Veritas Design Logic - a Users View. IFIP Transactions A-Computer Science And Technology, 10 . pp. 301-310. ISSN 0926-5473. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22503) |
Hanna, Keith, Daeche, Neil (1992) The Veritas Design Logic - a Users View. In: Stavridou, V. and Melham, Thomas F. and Boute, R.T., eds. IFIP Transactions A-Computer Science And Technology. 10. pp. 301-310. Elsevier Science Publ B V ISBN 0-444-89686-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22605) |
Hanna, Keith and Daeche, Neil and Howells, Gareth (1992) Implementation of the Veritas Design Logic. In: International Conference On Theorem Provers in Circuit Design : Theory, Practice And Experience. IFIP Transactions A-Computer Science and Technology, 10 . Elsevier Science, Nijmegen, Netherlands, pp. 77-94. ISBN 0-444-89686-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22608) |
Harrison, Joe, Roberts, David L., Hernandez-Castro, Julio (2016) Assessing the extent and nature of wildlife trade on the dark web. Conservation Biology, 30 (4). pp. 900-904. ISSN 0888-8892. (doi:10.1111/cobi.12707) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58382) |
He, Jing, Shen, Lei, Yao, YuDong, Wang, HuaXia, Zhao, GuoDong, Gu, Xiaowei, Ding, Weiping (2021) Finger Vein Image Deblurring Using Neighbors-based Binary-GAN (NB-GAN). IEEE Transactions on Emerging Topics in Computational Intelligence, . ISSN 2471-285X. (doi:10.1109/TETCI.2021.3097734) (KAR id:90399) |
Hedges, Mark, Jordanous, Anna, Dunn, Stuart, Roueché, Charlotte, Kuster, Marc W, Selig, Thomas, Bittorf, Michael, Artes, Waldemar (2012) New models for collaborative textual scholarship. In: 6th IEEE International Conference on Digital Ecosystems Technologies (DEST 2012), 2012, Campione d'Italia, Switzerland. (doi:10.1109/dest.2012.6227933) (KAR id:42378) |
Hedges, Mark, Jordanous, Anna, Lawrence, K. Faith, Roueché, Charlotte, Tupman, Charlotte (2017) Computer-Assisted Processing of Intertextuality in Ancient Languages. Journal of Data Mining and Digital Humanities, . ISSN 2416-5999. E-ISSN 2416-5999. (KAR id:63375) |
Heering, Maria Sophia, Yuan, Haiyue, Li, Shujun (2024) The Impact of Privacy and Security Attitudes and Concerns of Travellers on Their Willingness to Use Mobility-as-a-Service Systems. In: 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC). Proceedings of the 2023 IEEE 26th International Conference on Intelligent Transportation Systems. . pp. 5573-5578. IEEE ISBN 979-8-3503-9947-9. E-ISBN 979-8-3503-9946-2. (doi:10.1109/ITSC57777.2023.10422468) (KAR id:105030) |
Hernandez-Castro, Julio C., Boiten, Eerke Albert (2014) Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014 (2). pp. 5-8. ISSN 1361-3723. (doi:10.1016/S1361-3723(14)70461-0) (KAR id:38400) |
Hernandez-Castro, Julio C., Boiten, Eerke Albert (2013) First Kent Cyber Security Survey. . Internet only. (KAR id:52890) |
Hernandez-Castro, Julio C., Boiten, Eerke Albert, Barnoux, Magali F.L. (2014) Second Kent Cyber Security Survey. . Internet only. (KAR id:52891) |
Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Peris-Lopez, Pedro, Ribagorda, Arturo (2008) Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. Journal of Information Science and Engineering, 24 (5). pp. 1485-1504. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31959) |
Hernandez-Castro, Julio C., Estévez-Tapiador, Juan M., Peris-Lopez, Pedro, Clark, John A., Talbi, El-Ghazali (2012) Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. International Journal of Foundations of Computer Science, 23 (2). pp. 543-553. ISSN 0129-0541. (doi:10.1142/S0129054112400278) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31940) |
Hernandez-Castro, Julio C., Tapiador, Juan E., Palomar, Esther, Romero-Gonzalez, Angel (2010) Blind Steganalysis of Mp3stego. Journal of Information Science and Engineering, 26 (5). pp. 1787-1799. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31949) |
Hernández-Castro, Carlos Javier, Li, Shujun, R-Moreno, María D. (2020) All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks. Computers & Security, 92 . Article Number 101758. ISSN 0167-4048. (doi:10.1016/j.cose.2020.101758) (KAR id:80266) |
Hesketh, Richard (1991) Perly - unix with buttons. Software: Practice and Experience, 21 (11). pp. 1165-1187. ISSN 0038-0644. (doi:10.1002/spe.4380211103) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22980) |
Hill, Steve (1995) The Lazy Z-Buffer. Information Processing Letters, 55 (2). pp. 65-70. ISSN 0020-0190. (doi:10.1016/0020-0190(95)00081-m) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19597) |
Hill, Steve (1995) Parallel imperative functional programming. In: Nixon, Paddy, ed. Transputer and Occam Developments. 44. pp. 33-46. I O S Press ISBN 90-5199-222-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19598) |
Hirth, Matthias, Jacques, Jason, Rodgers, Peter, Scekic, Ognjen, Wybrow, Michael (2017) Crowdsourcing Technology to Support Academic Research. In: UNSPECIFIED. (doi:10.1007/978-3-319-66435-4) (KAR id:63501) |
Hobbs, M.H.W. (2000) Email groups for learning and assessment. In: Joyce, Donald, ed. SIGCSE Bulletin. 32 (3). p. 183. ACM ISBN 1-58113-207-7. (doi:10.1145/343048.343177) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16217) |
Holden, Nicholas and Freitas, Alex A. (2008) Improving the performance of hierarchical classification with swarm intelligence. In: Marchiori, Elena and Moore, Jason H., eds. Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics 6th European Conference. Lecture Notes in Computer Science, 4973 . Springer, Berlin, Germany, pp. 48-60. ISBN 978-3-540-78756-3. E-ISBN 978-3-540-78757-0. (doi:10.1007/978-3-540-78757-0_5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:15684) |
Hopkins, Tim (1992) Remark on Algorithm-540. Acm Transactions on Mathematical Software, 18 (3). pp. 343-344. ISSN 0098-3500. (doi:10.1145/131766.131773) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22518) |
Hopkins, Tim (1996) Restructuring software: A case study. Software: Practice and Experience, 26 (8). pp. 967-982. ISSN 0038-0644. (doi:10.1002/(SICI)1097-024X(199608)26:8<967::AID-SPE41>3.0.CO;2-G) (KAR id:19244) |
Hopkins, Tim, Welch, Peter H. (1996) Transputer data-flow solution for systems of linear equations. Concurrency-Practice and Experience, 8 (8). pp. 569-580. ISSN 1040-3108. (doi:10.1002/(sici)1096-9128(199610)8:8<569::aid-cpe229>3.0.co;2-z) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19243) |
Hou, Peixin, Hojjatoleslami, Ali, Petrou, Maria, Underwood, Craig Ian, Kittler, Josef (1998) Improved JPEG coding for remote sensing. In: International Conference on Pattern Recognition, 1998, Brisbane. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:27751) |
Howe, Jacob M., King, Andy (2000) Abstracting numeric constraints with Boolean functions. Information Processing Letters, 75 (1-2). pp. 17-23. ISSN 0020-0190. (doi:10.1016/S0020-0190(00)00081-8) (KAR id:16241) |
Howells, Gareth, Fairhurst, Michael, Bisset, D.L. (1995) BCN - A Novel Network Architecture for ram-Based Neurons. Pattern Recognition Letters, 16 (3). pp. 297-303. ISSN 0167-8655. (doi:10.1016/0167-8655(94)00098-N) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19608) |
Howells, Gareth, Fairhurst, Michael, Bisset, D.L. (1994) BCN - an Architecture for Weightless Ram-Base Neural Networks. In: 1994 IEEE International Conference on Neural Networks. 1-7. pp. 1386-1390. I E E E ISBN 0-7803-1901-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20260) |
Howells, Gareth, Fairhurst, Michael, Bisset, D.L. (1995) PCN: The Probabilistic Convergence Network. In: IEEE International Conference on Neural Networks Proceedings. 1-6. pp. 1211-1214. IEEE (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19607) |
Howells, Gareth, Fairhurst, Michael, Rahman, Fuad (2000) An exploration of a new paradigm for weightless RAM-based neural networks. Connection Science, 12 (1). pp. 65-90. ISSN 0954-0091. (doi:10.1080/095400900116203) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16243) |
University of Essex (2007) A Device to Generate a Machine Specific Identification Key. PCT/GB2007/002916. (doi:PCT/GB2007/002916) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:59367) |
Hurley-Smith, Darren, Hernandez-Castro, Julio (2020) Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators. ACM Transactions on Privacy and Security, 23 (3). pp. 1-25. ISSN 2471-2566. (doi:10.1145/3398726) (KAR id:81957) |
Ibbetson, A.L. and Linington, P.F. and Penny, I.A. and Smith, A.B. and Tripp, G.E.W. (1996) Reducing the cost of remote procedure call. In: Schill, Alexander and Mittasch, Christian and Spaniol, Otto and Popien, Claudia, eds. Distributed Platforms Proceedings of the IFIP/IEEE International Conference on Distributed Platforms: Client/Server and Beyond. IFIP — The International Federation for Information Processing . Springer, Boston, Massachusetts, USA, pp. 430-446. ISBN 978-1-4757-5010-2. E-ISBN 978-0-387-34947-3. (doi:10.1007/978-0-387-34947-3_32) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19254) |
Ibrahim, Azhar Mohd, Venkat, Ibrahim, Subramanian, K.G., Khader, Ahamad Tajudin, De Wilde, Philippe (2016) Intelligent evacuation management systems: A review. ACM Transactions on Intelligent Systems and Technology, 7 (3). Article Number 36. ISSN 2157-6904. (doi:10.1145/2842630) (KAR id:58005) |
Intarasirisawat, Jittrapol, Ang, Chee Siang, Efstratiou, Christos, Dickens, Luke, Page, Rupert (2019) Exploring the Touch and Motion Features in Game-Based Cognitive Assessments. Journal of Interactive, Mobile, Wearable and Ubiquitous Technologies, 3 (3). Article Number 87. ISSN 2474-9567. (doi:10.1145/3351245) (KAR id:75919) |
Ioannou, Athina, Tussyadiah, Iis, Lu, Yang (2020) Privacy concerns and disclosure of biometric and behavioral data for travel. International Journal of Information Management, 54 . p. 102122. ISSN 0268-4012. (doi:10.1016/j.ijinfomgt.2020.102122) (KAR id:81190) |
Ioannou, Athina, Tussyadiah, Iis, Miller, Graham, Li, Shujun, Weick, Mario (2021) Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis. PLoS ONE, 16 (8). e0256822:1-e0256822:29. ISSN 1932-6203. (doi:10.1371/journal.pone.0256822) (KAR id:89955) |
Iqbal, Musaddar and Freitas, Alex A. and Johnson, Colin G. (2008) Protein interaction inference using particle swarm optimization algorithm. In: Marchiori, Elena and Moore, Jason H., eds. Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics 6th European Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 61-70. ISBN 978-3-540-78756-3. E-ISBN 978-3-540-78757-0. (doi:10.1007/978-3-540-78757-0_6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:15710) |
Ireland, Tim (2017) Teaching architecture students to code: Thrills and spills. In: Proceedings of 35th Annual International Conference of eCAADe. . ISBN 978-94-91207-12-9. (KAR id:62185) |
Islam, Tasmina, Becker, Ingolf, Posner, Rebecca, Ekblom, Paul, McGuire, Michael, Borrion, Hervé, Li, Shujun (2019) A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 277-293. Springer, Singapore ISBN 978-981-15-1303-9. E-ISBN 978-981-15-1304-6. (doi:10.1007/978-981-15-1304-6_22) (KAR id:76678) |
Johnson, Colin G. (2021) Aesthetics, Artificial Intelligence, and Search-based Art. In: Machado, Penousal and Romero, Juan and Greenfield, Gary, eds. Artificial Intelligence and the Arts: Computational Creativity, Artistic Behavior, and Tools for Creatives. 1st edition. Computational Synthesis and Creative Systems . Springer, Cham, pp. 27-60. ISBN 978-3-030-59474-9. (doi:10.1007/978-3-030-59475-6_2) (KAR id:76668) |
Jones, William and Chawdhary, Aziem and King, Andy (2015) Revisiting Volgenant-Jonker for Approximating Graph Edit Distance. In: Liu, Cheng-Lin and Luo, B. and Kropatsch, W.G. and Cheng, J., eds. Graph-based Representations in Pattern Recognition. Lecture Notes in Computer Science, 9069 . Springer, pp. 98-107. ISBN 978-3-319-18223-0. E-ISBN 978-3-319-18224-7. (doi:10.1007/978-3-319-18224-7) (KAR id:47818) |
Jordan, Tobias, Oto, Costa, De Wilde, Philippe, Buarque de Lima Neto, Fernando (2017) Link-Prediction to Tackle the Boundary Specification Problem in Social Network Surveys. PLoS ONE, 12 (4). Article Number 176094. ISSN 1932-6203. (doi:10.1371/journal.pone.0176094) (KAR id:61392) |
Jordanous, Anna (2011) Computer Models of Musical Creativity? A review of Cope (2005). Review of: Computer Models of Musical Creativity. David Cope (2005). MIT Press by UNSPECIFIED. AISB Quarterly, 132 (-). p. 10. ISSN 1476-3036. (KAR id:42385) |
Jordanous, Anna (2009) Conference Report: The Fourth Conference on Interdisciplinary Musicology (CIM08). Review of: Fourth Conference on Interdisciplinary Musicology, 2008 (CIM08) by UNSPECIFIED. AISB Quarterly, 128 (-). pp. 8-9. ISSN 1476-3036. (KAR id:42384) |
Jordanous, Anna (2010) Conference Review: Empirical approaches to Performance: Empirical Musicology II conference (25-26 March 2010, School of Music, University of Leeds, UK). Review of: Empirical approaches to Performance: Empirical Musicology II conference 2010 by UNSPECIFIED. Excursions, 1 (1). p. 1. ISSN 2044-4095. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42375) |
Jordanous, Anna (2015) Enhancing information retrieval and resource discovery from data using the Semantic Web. In: 4th International Symposium on Emerging Trends and Technologies in Libraries and Information Services, 6-8 Jan 2015, Noida, UP, India. (doi:10.1109/ettlis.2015.7048181) (KAR id:46568) |
Jordanous, Anna (2012) Evaluating computational creativity: a standardised procedure for evaluating creative systems and its application. Doctor of Philosophy (PhD) thesis, University of Sussex. (KAR id:42388) |
Jordanous, Anna (2011) Evaluating evaluation: Assessing progress in computational creativity research. In: Proceedings of the Second International Conference on Computational Creativity (ICCC-11). . pp. 102-107. (KAR id:42374) |
Jordanous, Anna (2009) Evaluating machine creativity. In: Seventh ACM conference on Creativity and cognition, 2009, Berkeley, CA. (KAR id:42373) |
Jordanous, Anna (2016) Four PPPPerspectives on Computational Creativity in theory and in practice. Connection Science, 28 (2). pp. 194-216. ISSN 0954-0091. E-ISSN 1360-0494. (doi:10.1080/09540091.2016.1151860) (KAR id:53851) |
Jordanous, Anna (2016) Has computational creativity successfully made it "Beyond the Fence" in musical theatre? In: Proceedings of the 7th International Conference on Computational Creativity. 7th International Conference on Computational Creativity. . pp. 303-310. Sony CSL, Paris, France ISBN 978-2-7466-9155-1. (KAR id:56251) |
Jordanous, Anna (2020) Intelligence without Representation: A Historical Perspective. Systems, 8 (3). Article Number 31. E-ISSN 2079-8954. (doi:10.3390/systems8030031) (KAR id:82852) |
Jordanous, Anna (2013) Introducing Computational Creativity Research. . CreativityPost.com Internet. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42387) |
Jordanous, Anna (2017) Review. Review of: Computation and the humanities : towards an oral history of digital humanities by Nyhan, J. and Flinn A., A.. ACM Computing Reviews, (Sep'17). Review #: CR145551. E-ISSN 1530-6585. (KAR id:63489) |
Jordanous, Anna (2014) Review of Digital Da Vinci: Computers in the Arts and Sciences (2014, Springer). Review of: Digital Da Vinci: Computers in the Arts and Sciences (2014, Springer) by UNSPECIFIED. ACM Computing Reviews, . p. 1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:43990) |
Jordanous, Anna (2013) Review: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. Type: Proceedings. Review of: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. by UNSPECIFIED. ACM Computing Reviews, . CR141093. ISSN 1308-0745. E-ISSN 1308-0745. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42890) |
Jordanous, Anna (2015) Review: The POINT of creative collaborations between composers and computers. Review of: Patterns of intuition: Musical Creativity in the Light of Algorithmic Composition (Springer, 2015 ) by UNSPECIFIED. ACM Computing Reviews, (184827). p. 1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:51177) |
Jordanous, Anna (2007) Score following: An artificially intelligent musical accompanist. Master of Science (MSc) thesis, University of Edinburgh, UK.. (KAR id:42369) |
Jordanous, Anna (2012) A Standardised Procedure for Evaluating Creative Systems: Computational Creativity Evaluation Based on What it is to be Creative. Cognitive Computation, 4 (3). pp. 246-279. ISSN 1866-9956. E-ISSN 1866-9964. (doi:10.1007/s12559-012-9156-1) (KAR id:42379) |
Jordanous, Anna (2014) What is Computational Creativity? . CreativityPost.com Online web platform. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42390) |
Jordanous, Anna (2016) The longer term value of creativity judgements in computational creativity. In: Proceedings of AISB 2016’s Third International Symposium on Computational Creativity (CC2016). . (KAR id:54453) |
Jordanous, Anna, Allington, Daniel, Dueck, Byron (2015) Measuring cultural value using social network analysis: a case study on valuing electronic musicians. In: 6th International Conference on Computational Creativity, June 29 - July 2, 2015, Utah, US. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:48037) |
Jordanous, Anna, Allington, Daniel, Dueck, Byron (2014) Online Networks and the Production of Value in Electronic Music. In: Digital Music Research Network Network One-Day Workshop (DMRN+9), 16 Dec 2014, Queen Mary's, London. (Unpublished) (KAR id:46258) |
Jordanous, Anna, Allington, Daniel, Dueck, Byron (2014) Using online networks to analyse the value of electronic music. In: Proceedings of the 5th International Conference on Computational Creativity. . (KAR id:42391) |
Jordanous, Anna and Keller, Bill (2012) Creativity Ontology. http://purl.org/creativity/ontology. (KAR id:42860) |
Jordanous, Anna, Keller, Bill (2016) Modelling Creativity: Identifying Key Components through a Corpus-Based Approach. PLoS ONE, 11 (10). Article Number e0162959. E-ISSN 1932-6203. (doi:10.1371/journal.pone.0162959) (KAR id:57231) |
Jordanous, Anna, Keller, Bill (2012) Weaving creativity into the Semantic Web: a language-processing approach. In: International Conference on Computational Creativity. Proceedings of the 3rd International Conference on Computational Creativity. . pp. 216-220. (KAR id:42376) |
Jordanous, Anna, Lawrence, K Faith, Hedges, Mark, Tupman, Charlotte (2012) Exploring manuscripts: sharing ancient wisdoms across the semantic web. In: Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics. Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics (WIMS-12). . ACM, New York, New York, USA ISBN 978-1-4503-0915-8. (doi:10.1145/2254129.2254184) (KAR id:42377) |
Jordanous, Anna, Lawrence, K. Faith, Tupman, Charlotte (2013) Sharing Ancient Wisdoms: Dataset. RDF. Located at: http://www.ancientwisdoms.ac.uk/library/data/. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42858) |
Jordanous, Anna and Roueché, Charlotte and Tupman, Charlotte and Lawrence, K. Faith and Hedges, Mark and Wakelnig, Elvira and Searby, Denis (2013) Sharing Ancient Wisdoms (SAWS) ontology. http://www.ancientwisdoms.ac.uk/. (KAR id:42859) |
Jordanous, Anna, Smaill, Alan (2008) Artificially intelligent accompaniment using Hidden Markov Models to model musical structure. In: Conference on Interdisciplinary Musicology, 2008, Thessaloniki, Greece. (KAR id:42368) |
Jordanous, Anna, Smaill, Alan (2009) Investigating the role of score following in automatic musical accompaniment. Journal of New Music Research, 38 (2). pp. 197-209. ISSN 0929-8215. E-ISSN 1744-5027. (doi:10.1080/09298210903180245) (KAR id:42371) |
Jordanous, Anna, Stanley, Alan, Tupman, Charlotte (2012) Contemporary transformation of ancient documents for recording and retrieving maximum information: when one form of markup is not enough. In: Balisage: The Markup Conference 2012, 2012, Montreal, Canada. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42380) |
Jordanous, Anna, Stanley, Alan, Tupman, Charlotte (2013) Reusing modern tools and techniques to reproduce and research ancient texts. In: Open Repositories, Prince Edward Island, Canada. (KAR id:50696) |
Jordanous, Anna and Tupman, Charlotte (2013) Sharing Ancient Wisdoms - supporting code. ancientwisdoms.ac.uk XSLT stylesheets. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42887) |
Jordanous, Anna, Tupman, Charlotte, Stanley, Alan (2013) Contemporary solutions to retrieve and publish information in ancient documents using RDF and Islandora. In: Digital Humanities 2013, 2013, Lincoln, Nebraska. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42572) |
Justo, George R. R. and Welch, Peter H. (1992) Serialization as a paradigm for the engineering of parallel programs. In: PARLE '92 Parallel Architectures and Languages Europe. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 975-976. ISBN 978-3-540-55599-5. E-ISBN 978-3-540-47250-6. (doi:10.1007/3-540-55599-4_149) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22161) |
Kahrs, Stefan, Runciman, Colin (2022) Simplifying Regular Expressions Further. Journal of Symbolic Computation, 109 . pp. 124-143. ISSN 0747-7171. (doi:10.1016/j.jsc.2021.08.003) (KAR id:91292) |
Kahrs, Stefan and Sannella, Don (1998) Reflections on the design of a specification language. In: Astesiano, Egidio, ed. Fundamental Approaches to Software Engineering First International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 154-170. ISBN 978-3-540-64303-6. E-ISBN 978-3-540-69723-7. (doi:10.1007/BFb0053578) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17391) |
Kaijian, Shi, Jian, Sun (1991) A relational graphical editing method for PCB design. Computer-Aided Design, 23 (1). pp. 92-94. ISSN 0010-4485. (doi:10.1016/0010-4485(91)90102-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22997) |
Kalli, Kyriacos, Jackson, David A. (1995) Dynmic-Response of High-Resolution Ring-Resonator Optical Spectrometers to time-Varing Input Signals. In: Sensors and their Applications VII. (3). pp. 184-189. Iop Publishing ltd ISBN 0-7503-0331-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19634) |
Kalli, Kyriacos, Rao, Yun Jiang, Webb, David J., Jackson, David A. (1995) Potential of fibre optic point and distributed fibre optic sensors for structural monitoring. In: Augousti, A.T., ed. Sensors and their Aplications VII. . pp. 184-189. Iop Publishing Ltd ISBN 0-7503-0331-X. (doi:10.1049/ic:19950588) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19635) |
Kanjo, Eiman, Kuss, Daria, Ang, Chee Siang (2017) NotiMind: Utilizing Responses to Smart Phone Notifications as Affective sensors. IEEE Access, . ISSN 2169-3536. E-ISSN 2169-3536. (doi:10.1109/ACCESS.2017.2755661) (KAR id:63578) |
Kearney, Joseph, Pérez-Delgado, Carlos A (2021) Vulnerability of blockchain technologies to quantum attacks. Array, 10 . Article Number 100065. ISSN 2590-0056. (doi:10.1016/j.array.2021.100065) (KAR id:93781) |
Kemp, Zarine P. (1995) Multimedia and Spatial Information Systems. IEEE Multimedia, 2 (4). pp. 68-76. ISSN 1070-986X. (doi:10.1109/93.482297) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19646) |
Kemp, Zarine P., Kowalczyk, Arek (1994) Incorporating the Temporal Dimension in a GIS. In: Worboys, Michael F., ed. Innovations in GIS. . pp. 89-103. Taylor & Francis ISBN 0-7484-0140-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20285) |
Kemp, Zarine P., Oxborrow, Elizabeth, Davy, M.J., Linington, Peter F., Thearle, R., Blair, Gordon S., Dark, P., Davies, N.A., Mariani, John A., Snape, C. and others. (1992) Zenith System for Object Management In Distributed Multimedia Design Environments. Information and Software Technology, 34 (7). pp. 427-436. ISSN 0950-5849. (doi:10.1016/0950-5849(92)90034-M) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22327) |
Khalil, Omar, Hernandez-Castro, Julio C., Asis, Benjamon (2013) A study on the false positive rate of Stegdetect. Digital Investigation, 9 (3-4). pp. 235-245. ISSN 1742-2876. (doi:10.1016/j.diin.2013.01.004) (KAR id:45303) |
Khanna, Pooja, Howells, Gareth, Lazaridis, Pavlos (2021) Design and Implementation of Low‑Cost Real‑Time Energy Logger for Industrial and Home Applications. Wireless Personal Communications, . ISSN 0929-6212. (doi:10.1007/s11277-021-08350-1) (KAR id:88488) |
Knott, Jamie, Yuan, Haiyue, Boakes, Matthew, Li, Shujun (2023) Cyber Security and Online Safety Education for Schools in the UK: Looking through the Lens of Twitter Data. In: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. . 1603- 1606. ACM, New York, USA ISBN 978-1-4503-9517-5. (doi:10.1145/3555776.3577805) (KAR id:101794) |
Kononova, Anna V., Corne, David W., De Wilde, Philippe, Shneer, Vsevolod, Caraffini, Fabio (2015) Structural bias in population-based algorithms. Information Sciences, 298 . pp. 468-490. ISSN 0020-0255. E-ISSN 1872-6291. (doi:10.1016/j.ins.2014.11.035) (KAR id:58007) |
Laborde, Romain, Kamel, Michel, Barrere, Francois, Benzekri, Abdelmalek (2007) Implementation of a formal security policy refinement process in WBEM architecture. Journal of Network and Systems Management,, 15 (2). pp. 241-266. ISSN 1064-7570. (doi:10.1007/s10922-007-9063-z) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:2849) |
Laffey, Des (2007) Paid search: The innovation that changed the Web. Business Horizons, 50 (3). pp. 211-218. ISSN 0007-6813. (doi:10.1016/j.bushor.2006.09.003) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:3140) |
Laffey, Des (2007) The ultimate bluff: a case study of partygaming.com. Journal of Information Technology, 22 (4). pp. 479-488. ISSN 0268-3962. (doi:10.1057/palgrave.jit.2000096) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:3127) |
Lahasan, B. M., Venkat, I., Al-Betar, M. A., Lutfi, S. L., De Wilde, Philippe (2016) Recognizing faces prone to occlusions and common variations using optimal face subgraphs. Applied Mathematics and Computation, 283 . pp. 316-332. ISSN 0096-3003. (doi:10.1016/j.amc.2016.02.047) (KAR id:58070) |
Lakehal, Aymen, Lepreux, Sophie, Efstratiou, Christos, Christophe, Kolski, Nicolaou, Pavlos (2020) Investigating Smartphones and AR Glasses for Pedestrian Navigation and their Effects in Spatial Knowledge Acquisition. In: MobileHCI '20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services. . ACM, New York, USA ISBN 978-1-4503-8052-2. E-ISBN 978-1-4503-7516-0. (doi:10.1145/3406324.3410722) (KAR id:83761) |
Lam, K.P., Horne, E. (1993) Enhanced Kernel Estimation Technique For Pattern-Classification. Electronics Letters, 29 (24). pp. 2130-2131. ISSN 0013-5194. (doi:10.1049/el:19931424) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22173) |
Lam, K.P., Horne, E. (1993) Novel Technique To Combine Bws And Fws Classifiers. Electronics Letters, 29 (19). pp. 1702-1704. ISSN 0013-5194. (doi:10.1049/el:19931132) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22174) |
Lamb, John D. (1998) A note on the weighted matching with penalty problem. Pattern Recognition Letters, 19 (3-4). pp. 261-263. ISSN 0167-8655. (doi:10.1016/S0167-8655(98)00008-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17408) |
Lange, Julien and Tuosto, Emilio (2012) Synthesising choreographies from local session types. In: Koutny, M. and Ulidowski, I., eds. CONCUR 2012 – Concurrency Theory 23rd International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 225-239. ISBN 978-3-642-32939-5. E-ISBN 978-3-642-32940-1. (doi:10.1007/978-3-642-32940-1_17) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:62258) |
Lange, Julien, Yoshida, N. (2017) On the undecidability of asynchronous session subtyping. In: Esparza, J. and Murawski, A., eds. Lecture Notes in Computer Science. Foundations of Software Science and Computation Structures. FoSSaCS 2017. Lecture Notes in Computer Science , 10203 (10203). pp. 441-457. Springer, Berlin, Germany ISBN 978-3-662-54457-0. E-ISBN 978-3-662-54458-7. (doi:10.1007/978-3-662-54458-7_26) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:62265) |
Langford, Duncan, Brown, Peter J. (1993) Creating hypertext documents - Is it worth the effort. Aslib Proceedings, 45 (4). pp. 91-95. ISSN 0001-253X. (doi:10.1108/eb051311) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22175) |
Lauder, Anthony and Dumas, Marlon and Frohner, Akos and Oliver, Ian (2000) PhDOOS 2000: The 10th Ph.D. workshop on object-oriented systems. In: Malaenfant, Jacques and Moisan, Sabine and Moreira, Ana, eds. Object-Oriented Technology: Ecoop 2000 Workshop Reader: Ecoop 2000 Workshops, Panels, and Posters Sophia Antipolis and Cannes, France, June 12-16, 2000 Proceedings. Lecture Notes in Computer Science, 1964 . Springer Verlag Berlin, pp. 78-92. ISBN 3-540-41513-0. (doi:10.1007/3-540-44555-2_7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16296) |
Lee, Howard, Kemp, Zarine P. (1997) Towards a multiple placement land suitability evaluation framework. In: Kraak, Menno-Jan and Molenaar, Martin and Fendel, E.M., eds. Advances in GIS Research II. . pp. 643-654. Taylor & Francis Ltd ISBN 0-7484-0591-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18153) |
Lee, L.C., Nwana, H.S., Ndumu, D.T., De Wilde, Philippe (1998) The stability, scalability and performance of multi-agent systems. BT Technology Journal, 16 (3). pp. 94-103. ISSN 1358-3948. (doi:10.1023/a:1009686016775) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:58061) |
Leech, Helen K., Kemp, Zarine P. (1998) Supporting complex spatiotemporal analysis in GIS. In: Carver, S., ed. Investigation in GIS5. . pp. 151-161. Taylor & Francis Ltd ISBN 0-7484-0810-X. (doi:10.1201/b16831-19) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17417) |
Li, Chengqing, Feng, Bingbing, Li, Shujun, Kurths, Jurgen, Chen, Guanrong (2019) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers, 66 (6). pp. 2322-2335. ISSN 1549-8328. (doi:10.1109/TCSI.2018.2888688) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:71415) |
Li, Ling, Looney, David, Park, Cheolsoo, Rehman, Naveed U., Mandic, Danilo P. (2011) Power Independent EMG Based Gesture Recognition for Robotics. In: Engineering in Medicine and Biology Society, EMBC, 2011 Annual International Conference of the IEEE. . pp. 182-196. IEEE ISBN 978-1-4244-4121-1. E-ISBN 978-1-4577-1589-1. (doi:10.1109/IEMBS.2011.6090036) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:30734) |
Li, Shujun, Ho, Anthony T.S., Wang, Zichi, Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. MPS'18: 2nd International Workshop on Multimedia Privacy and Security Proceedings. CCS Computer and Communications Security . pp. 27-37. ACM, New York, USA ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267365) (KAR id:69008) |
Liang, Zhanbo, Guo, Jie, Qiu, Weidong, Huang, Zheng, Li, Shujun (2024) When graph convolution meets double attention: online privacy disclosure detection with multi-label text classification. Data Mining and Knowledge Discovery, 38 (3). pp. 1171-1192. ISSN 1384-5810. (doi:10.1007/s10618-023-00992-y) (KAR id:104513) |
Lin, Ruiyuan, Liu, Sheng, Jiang, Jun, Li, Shujun, Li, Chengqing, Kuo, C.-C. Jay (2024) Recovering sign bits of DCT coefficients in digital images as an optimization problem. Journal of Visual Communication and Image Representation, 98 . Article Number 104045. ISSN 1047-3203. (doi:10.1016/j.jvcir.2023.104045) (KAR id:106082) |
Lins, Rafael D. (1991) A Shared Memory Architecture for Parallel Cyclic Reference Counting. Microprocessing and Microprogramming, 35 (1-5). pp. 563-568. ISSN 0165-6074. (doi:10.1016/0165-6074(91)90322-K) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22348) |
Lins, Rafael D., Neto, Mario Guimaraes, Neto, Leopoldo Franca, Rosa, Luciano Galdino (1994) An environment for processing images of historical documents. Microprocessing and Microprogramming, 40 (10-12). pp. 939-942. ISSN 0165-6074. (doi:10.1016/0165-6074(94)90074-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19859) |
Liu, Jingxin, Xu, Bolei, Zheng, Chi, Gong, Yuanhao, Garibaldi, Jonathan M., Soria, Daniele, Green, Andrew R., Ellis, Ian O., Zou, Wenbin, Qiu, Guoping and others. (2019) An end-to-end deep learning histochemical scoring system for breast cancer TMA. IEEE Transactions on Medical Imaging, 38 (2). pp. 617-628. ISSN 0278-0062. (doi:10.1109/TMI.2018.2868333) (KAR id:77395) |
Liu, Junjie and Aljaffan, Nouf and Li, Shujun (2018) PassInfinity: A software prototype system. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80287) |
Liu, Ximing, Li, Yingjiu, Deng, Robert H., Chang, Bing, Li, Shujun (2019) When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers and Security, 80 . pp. 90-107. ISSN 0167-4048. (doi:10.1016/j.cose.2018.09.003) (KAR id:69553) |
Liu, Yang, Kwok, Yu-Kwong, Wang, Jiangzhou (2008) Downlink TCP performance under cross layer rate and power allocation in infrastructure TH-PPM UWB networks. Journal of Supercomputing, 44 (3). pp. 199-216. ISSN 0920-8542. (doi:10.1007/s11227-007-0155-z) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:15498) |
Liu, Yang, Kwok, Yu-Kwong, Wang, Jiangzhou (2007) An adaptive packet scheduling algorithm for efficient downlink bandwidth allocation in UWB based wireless infrastructure networks. Computer Communications, 30 (9). pp. 2087-2095. ISSN 0140-3664. (doi:10.1016/j.comcom.2007.04.004) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:2071) |
Lopes da Silva, Erick (2012) A fault tolerant, peer-to-peer based scheduler for home grids. Doctor of Philosophy (PhD) thesis, University of Kent. (doi:10.22024/UniKent/01.02.94492) (KAR id:94492) |
Lu, Yang, Ioannou, Athina, Tussyadiah, Iis, Li, Shujun (2019) Segmenting travelers based on responses to nudging for information disclosure. e-Review of Tourism Research, 17 (3). pp. 394-406. ISSN 1941-5842. (KAR id:79517) |
Lu, Yang, Li, Shujun (2020) From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues. In: Scholar Space. Proceedings of the 53rd Hawaii International Conference on System Sciences. . University of Hawaii at Manoa, Haiwaii, USA ISBN 978-0-9981331-3-3. (doi:10.24251/HICSS.2020.799) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:76648) |
Lu, Yang, Li, Shujun, Freitas, Alex A., Ioannou, Athina (2022) How data-sharing nudges influence people's privacy preferences: A machine learning-based analysis. EAI Endorsed Transactions on Security and Safety, 8 (30). pp. 1-20. ISSN 2032-9393. (doi:10.4108/eai.21-12-2021.172440) (KAR id:93892) |
Lu, Yang, Li, Shujun, Ioannou, Athina, Tussyadiah, Iis (2019) From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework. In: Communications in Computer and Information Science. Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings. 1123. pp. 262-276. Springer, Singapore ISBN 978-981-15-1303-9. E-ISBN 978-981-15-1304-6. (doi:10.1007/978-981-15-1304-6_21) (KAR id:76677) |
Lu, Yang, Sinnott, Richard O. (2016) Semantic Security for E-Health: A Case Study in Enhanced Access Control. In: 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). . pp. 407-414. IEEE ISBN 978-1-4673-7212-1. E-ISBN 978-1-4673-7211-4. (doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.90) (KAR id:80963) |
Lu, Yang, Sinnott, Richard O. (2016) Semantic-Based Privacy Protection of Electronic Health Records for Collaborative Research. In: 2016 IEEE Trustcom/BigDataSE/ISPA. . pp. 519-526. IEEE ISBN 978-1-5090-3206-8. E-ISBN 978-1-5090-3205-1. (doi:10.1109/TrustCom.2016.0105) (KAR id:80962) |
Lu, Yang, Sinnott, Richard O., Verspoor, Karin (2017) A Semantic-Based K-Anonymity Scheme for Health Record Linkage. Studies in Health Technology and Informatics, 239 . pp. 84-90. ISSN 0926-9630. (doi:10.3233/978-1-61499-783-2-84) (KAR id:80964) |
Lu, Yang, Sinnott, Richard O., Verspoor, Karin (2018) Semantic-Based Policy Composition for Privacy-Demanding Data Linkage. In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 348-359. IEEE ISBN 978-1-5386-4389-1. E-ISBN 978-1-5386-4388-4. (doi:10.1109/TrustCom/BigDataSE.2018.00060) (KAR id:80961) |
Lu, Yang, Sinnott, Richard O., Verspoor, Karin, Parampalli, Udaya (2018) Privacy-Preserving Access Control in Electronic Health Record Linkage. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). . pp. 1079-1090. IEEE ISBN 978-1-5386-4389-1. E-ISBN 978-1-5386-4388-4. (doi:10.1109/TrustCom/BigDataSE.2018.00151) (KAR id:80959) |
Lustig, Daniel, Cooksey, Simon, Giroux, Olivier (2022) Mixed-proxy extensions for the NVIDIA PTX memory consistency model. In: ISCA '22: Proceedings of the 49th Annual International Symposium on Computer Architecture. . pp. 1058-1070. Association for Computing Machinery ISBN 978-1-4503-8610-4. (doi:10.1145/3470496.3533045) (KAR id:96841) |
Mahaini, Mohamad Imad, Li, Shujun (2023) Cyber Security Researchers on Online Social Networks: From the Lens of the UK’s ACEs-CSR on Twitter. In: Lecture Notes in Computer Science. Security and Privacy in Social Networks and Big Data: 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14–16, 2023, Proceedings. Lecture Notes in Computer Science , 14097. pp. 129-148. Springer, Singapore E-ISBN 978-981-99-5177-2. (doi:10.1007/978-981-99-5177-2_8) (KAR id:102392) |
Mahaini, Mohamad Imad, Li, Shujun, Sağlam, Rahime Belen (2019) Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example. In: ICPS: ACM International Conference Proceeding Series. Proceedings of the 14th International Conference on Availability, Reliability and Security. . ACM ISBN 978-1-4503-7164-3. (doi:10.1145/3339252.3339282) (KAR id:75253) |
Mansfield, Elizabeth L. (1996) The differential algebra package diffgrob2. Mapletech, 3 (2). pp. 33-37. ISSN 1061-5733. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18662) |
Mansfield, Elizabeth L., Clarkson, Peter (1997) Applications of the differential algebra package diffgrob2 to classical symmetries of differential equations. Journal of Symbolic Computation, 23 (5-6). pp. 517-533. ISSN 0747-7171. (doi:10.1006/jsco.1996.0105) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18172) |
Mansfield, Elizabeth L., Clarkson, Peter (1997) Symmetries and exact solutions for a 2+1-dimensional shallow water wave equation. Mathematics and Computers in Simulation, 43 (1). pp. 39-55. ISSN 0378-4754. (doi:10.1016/S0378-4754(96)00054-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18173) |
Mansfield, Elizabeth L., Reid, G.J., Clarkson, Peter (1998) Nonclassical reductions of a 3+1-cubic nonlinear Schrodinger system. Computer Physics Communications, 115 (2-3). pp. 460-488. ISSN 0010-4655. (doi:10.1016/S0010-4655(98)00136-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17435) |
Marr, Stefan (2019) Generating an Artifact From a Benchmarking Setup as Part of CI. . Blog Post. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:83684) |
Marr, Stefan (2020) Is This Noise, or Does This Mean Something? #benchmarking. . Blog Post. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:83683) |
Masala, G.L., Bottigli, U., Brunetti, A., Carpinelli, M., Diaz, N, Fiori, P.L., Golosio, B., Oliva, P., Stegel, G. (2007) Automatic cell colony counting by region-growing approach. Il Nuovo Cimento della Societa Italiana di Fisica C, 30 (6). pp. 633-644. ISSN 2037-4909. E-ISSN 1826-9885. (doi:10.1393/ncc/i2007-10273-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91927) |
Masala, G.L. and Golosio, B. (2014) Computer Aided Diagnosis of Thalassaemias: An Overview. In: Greene, Makenzie, ed. Thalassemia: Causes, Treatment Options and Long-Term Health Outcomes. Nova Biomedical, pp. 57-70. ISBN 978-1-63117-954-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91354) |
Masala, G.L. and Ruiu, P. and Grosso, E. (2018) Biometric authentication and data security in cloud computing. In: Computer and Network Security Essentials. Springer, pp. 337-353. ISBN 978-3-319-58423-2. E-ISBN 978-3-319-58424-9. (doi:10.1007/978-3-319-58424-9_19) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91355) |
Masala, Giovanni Luca, Casu, Filippo, Golosio, Bruno, Grosso, Enrico (2019) 2D recurrent neural networks: a high-performance tool for robust visual tracking in dynamic scenes. Neural Computing and Applications, 29 (7). pp. 329-341. ISSN 0941-0643. (doi:10.1007/s00521-017-3235-x) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91405) |
Masala, Giovanni Luca, Golosio, B., Cutzu, R., Pola, R. (2013) A two-layered classifier based on the radial basis function for the screening of thalassaemia. Computers in Biology and Medicine, 43 (11). pp. 1724-1731. ISSN 0010-4825. (doi:10.1016/j.compbiomed.2013.08.020) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91423) |
Masala, Giovanni Luca, Golosio, B., Oliva, P. (2013) An improved Marching Cube algorithm for 3D data segmentation. Computer Physics Communications, 184 (3). pp. 777-782. ISSN 0010-4655. (doi:10.1016/j.cpc.2012.09.030) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91425) |
Masala, Giovanni Luca, Golosio, B., Oliva, P., Cascio, D., Fauci, F., Tangaro, S., Quarta, M., Cheran, S. C., Lopez Torres, E. (2005) Classifiers trained on dissimilarity representation of medical pattern: A comparative study. Nuovo Cimento della Societa Italiana di Fisica. C, Geophysics and Space Physics, 28 (6). pp. 905-912. ISSN 1124-1896. (doi:10.1393/ncc/i2005-10162-9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:92335) |
Masala, Giovanni Luca, Grosso, E. (2014) Real time detection of driver attention: Emerging solutions based on robust iconic classifiers and dictionary of poses. Transportation Research Part C, 49 . pp. 32-42. ISSN 0968-090X. (doi:10.1016/j.trc.2014.10.005) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91410) |
Masala, Giovanni Luca, Lipsitch, M., Bottomley, C., Flasche, S. (2017) Exploring the role of competition induced by non-vaccine serotypes for herd protection following pneumococcal vaccination. Journal of the Royal Society Interface, 14 (136). E-ISSN 1742-5662. (doi:10.1098/rsif.2017.0620) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91404) |
Masala, Giovanni Luca, Tangaro, S., Golosio, B., Oliva, P., Stumbo, S., Bellotti, R., De Carlo, F, Gargano, G., Cascio, D., Fauci, F., and others. (2007) Comparative study of feature classification methods for mass lesion recognition in digitized mammograms. Nuovo Cimento - Societa Italiana di Fisica Sezione C, 30 (3). pp. 305-316. ISSN 0390-5551. E-ISSN 1826-9885. (doi:10.1393/ncc/i2007-10241-y) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:92187) |
Matsuda, Kazutaka and Wang, Meng (2013) Bidirectionalization for Free with Runtime Recording: Or, a Light-Weight Approach to the View-Update Problem. In: Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming. PPDP Principles and Practice of Declarative Programming . ACM, New York, USA, pp. 297-308. ISBN 978-1-4503-2154-9. (doi:10.1145/2505879.2505888) (KAR id:47480) |
Matsuda, Kazutaka, Wang, Meng (2014) “Bidirectionalization for Free” for Monomorphic Transformations. Science of Computer Programming, 111 (Part 1). pp. 79-109. ISSN 0167-6423. (doi:10.1016/j.scico.2014.07.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:47485) |
Matsuda, Kazutaka, Wang, Meng (2013) FliPpr: A Prettier Invertible Printing System. In: 22nd European Symposium on Programming. . pp. 101-120. ISBN 978-3-642-37035-9. E-ISBN 978-3-642-37036-6. (doi:10.1007/978-3-642-37036-6_6) (KAR id:47479) |
Mavity, Nick (2005) Intelligent interface agents for biometric applications. Doctor of Philosophy (PhD) thesis, University of Kent. (doi:10.22024/UniKent/01.02.94516) (KAR id:94516) |
Medina, Jose Cadenas (2015) Pipelined median architecture. Electronics Letters, 51 (24). pp. 1999-2001. ISSN 0013-5194. (doi:10.1049/el.2015.1898) (KAR id:57351) |
Medina, Jose Cadenas, Megson, G. M., Sherratt, Simon (2015) Median architecture by accumulative parallel counters. IEEE Transactions on Circuits and Systems II, Express Briefs, 62 (7). pp. 661-665. ISSN 1549-7747. E-ISSN 1558-3791. (doi:10.1109/TCSII.2015.2415655) (KAR id:57353) |
Miao, Yufan, König, Reinhard, Knecht, Katja, Konieva, Kateryna, Buš, Peter, Chang, Mei-Chih (2018) Computational urban design prototyping: Interactive planning synthesis methods—a case study in Cape Town. International Journal of Architectural Computing, 16 (3). pp. 212-226. ISSN 1478-0771. (doi:10.1177/1478077118798395) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:74061) |
Micallef, Luana (2013) Visualizing Set Relations and Cardinalities Using Venn and Euler Diagrams. Doctor of Philosophy (PhD) thesis, University of Kent. (KAR id:47958) |
Michelmann, Sebastian, Treder, Matthias S., Griffiths, Benjamin, Kerrén, Casper, Roux, Frédéric, Wimber, Maria, Rollings, David, Sawlani, Vijay, Chelvarajah, Ramesh, Gollwitzer, Stephanie, and others. (2018) Data-driven re-referencing of intracranial EEG based on independent component analysis (ICA). Journal of Neuroscience Methods, 307 . pp. 125-137. ISSN 0165-0270. (doi:10.1016/j.jneumeth.2018.06.021) (KAR id:67587) |
Minelly, S. and Kelly, Stephen W. and Bahra, R. (1996) Clinical trial of the non-invasive recording of His-Purkinje system signals. In: Computers in Cardiology 1996. Computers in Cardiology . IEEE, pp. 449-452. ISBN 0-7803-3710-7. (doi:10.1109/CIC.1996.542570) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18696) |
Mingers, John (2014) Problems with SNIP. Journal of Informetrics, 8 (4). pp. 890-894. ISSN 1751-1577. (doi:10.1016/j.joi.2014.09.004) (KAR id:43052) |
Mingers, John (2002) Real-izing Information Systems: Critical Realism as an Underpinning Philosophy for Information Systems. In: DeGross, J., ed. Information and Organization. 14 (2). pp. 87-103. , Barcelona (doi:10.1016/j.infoandorg.2003.06.001) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:4688) |
Mirlohi, H.R., Kelly, Stephen W., Manley, Maxwell C. G. (1994) New technique for assessment of velopharyngeal function. Medical and Biological Engineering and Computing, 32 (5). pp. 562-566. ISSN 0140-0118. (doi:10.1007/BF02515315) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19914) |
Mitrokotsa, Aikaterini, Dimitrakakis, Christos, Peris-Lopez, Pedro, Hernandez-Castro, Julio C. (2010) Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters, 14 (2). pp. 121-123. ISSN 1089-7798. (doi:10.1109/LCOMM.2010.02.091946) (KAR id:31946) |
Modi, Bala (2015) FPGA-based High Throughput Regular Expression Pattern Matching for Network Intrusion Detection Systems. Doctor of Philosophy (PhD) thesis, University of Kent,. (KAR id:56664) |
Mohammed, Anne-Marie and Benson, Vladlena and Saridakis, George (2020) Understanding the Relationship Between Cybercrime and Human Behavior Through Criminological Theories and Social Networking Sites. In: Khosrow-Pour, Mehdi, ed. Encyclopedia of Criminal Activities and the Deep Web. IGI Global, pp. 979-989. ISBN 978-1-5225-9715-5. E-ISBN 978-1-5225-9716-2. (doi:10.4018/978-1-5225-9715-5.ch066) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:80215) |
Mohd Kassim, Sharifah Roziah Binti, Li, Shujun, Arief, Budi (2022) How National CSIRTs Leverage Public Data, OSINT and Free Tools in Operational Practices: An Empirical Study. Cyber Security: A Peer-Reviewed Journal, 5 (3). pp. 251-276. ISSN 2398-5100. (KAR id:93768) |
Mohd Kassim, Sharifah Roziah Binti, Li, Shujun, Arief, Budi (2023) Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions. Digital Threats: Research and Practice, 4 (3). pp. 1-24. ISSN 2576-5337. (doi:10.1145/3609230) (KAR id:103162) |
Molefi, Emmanuel, McLoughlin, Ian Vince, Palaniappan, Ramaswamy (2023) Heart Rate Variability Responses to Visually Induced Motion Sickness. In: 2023 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC). . IEEE (doi:10.1109/EMBC40787.2023.10340636) (KAR id:100885) |
Molefi, Emmanuel, McLoughlin, Ian Vince, Palaniappan, Ramaswamy (2023) Transcutaneous Auricular Vagus Nerve Stimulation towards Visually Induced Motion Sickness Reduction: A Pilot Study. In: 2023 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC). . IEEE (doi:10.1109/EMBC40787.2023.10340374) (KAR id:100887) |
Molefi, Emmanuel, McLoughlin, Ian Vince, Ramaswamy, Palaniappan (2023) On the potential of transauricular electrical stimulation to reduce visually induced motion sickness. Scientific Reports, 13 (1). Article Number 3272. ISSN 2045-2322. (doi:10.1038/s41598-023-29765-9) (KAR id:99987) |
Molefi, Emmanuel, Palaniappan, Ramaswamy (2024) Deep Transfer Learning for Visually Induced Motion Sickness Detection Using Symmetric Projection Attractor Reconstruction of the Electrocardiogram. In: 2024 Computing in Cardiology (CinC), 8-11 Sep 2024, Karlsruhe, Germany. (In press) (KAR id:106410) |
Montanari, Carlos A., Tute, M.S., Beezer, Anthony E., Mitchell, John C. (1996) Determination of receptor-bound drug conformations by QSAR using flexible fitting to derive a molecular similarity index. Journal of Computer-Aided Molecular Design, 10 (1). pp. 67-73. ISSN 0920-654X. (doi:10.1007/BF00124466) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18698) |
Moores, James (1999) CCSP - A portable CSP-based run-time system supporting C and occam. In: Cook, Barry M., ed. Proceedings of WoTUG-22: Architectures, Languages and Techniques for Concurrent Systems. Concurrent Systems Engineering . IOS Press, Amsterdam, Netherlands, pp. 147-168. ISBN 90-5199-480-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16938) |
Mott, Gareth, Turner, Sarah, Nurse, Jason R. C., Pattnaik, Nandita, MacColl, Jamie, Huesch, Pia, Sullivan, James (2024) “There was a bit of PTSD every time I walked through the office door”: Ransomware harms and the factors that influence the victim organisation’s experience. Journal of Cybersecurity, 10 (1). Article Number tyae013. ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyae013) (KAR id:106485) |
Mouli, Surej, Palaniappan, Ramaswamy (2020) DIY Hybrid SSVEP-P300 LED Stimuli for BCI Platform Using EMOTIV EEG Headset. HardwareX, 8 . ISSN 2468-0672. E-ISSN 2468-0672. (doi:10.1016/j.ohx.2020.e00113) (KAR id:81314) |
Mouli, Surej, Palaniappan, Ramaswamy (2017) Towards a reliable PWM based LED visual stimulus for improved SSVEP response with minimal visual fatigue. Journal of Engineering, . ISSN 2051-3305. E-ISSN 2051-3305. (doi:10.1049/joe.2016.0314) (KAR id:59671) |
Mouli, Surej, Palaniappan, Ramaswamy, Molefi, Emmanuel, McLoughlin, Ian Vince (2020) In-ear electrode EEG for practical SSVEP BCI. Technologies, 8 (4). Article Number 63. E-ISSN 2227-7080. (doi:10.3390/technologies8040063) (KAR id:85289) |
Moura, Ralf Luis de, Franqueira, Virginia N. L., Pessin, Gustavo (2024) Cybersecurity in industrial networks: artificial intelligence techniques applied to intrusion detection systems. In: 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'23). Conference Publishing Services (CPS) . IEEE (In press) (doi:10.1109/csce60160.2023.00365) (KAR id:101558) |
Moura, Ralf Luis de, Gonzalez, Alexandre, Franqueira, Virginia N. L., Neto, Antonio Lemos Maia (2021) A Cyber-Security Strategy for Internationally-dispersed Industrial Networks. In: 2020 International Conference on Computational Science and Computational Intelligence (CSCI). . pp. 62-68. IEEE, Piscataway, USA ISBN 978-1-7281-7624-6. (doi:10.1109/CSCI51800.2020.00018) (KAR id:84285) |
Moura, Ralf Luis de and Gonzalez, Alexandre and Franqueira, Virginia N. L. and Neto, Antonio Lemos Maia and Pessin, Gustavo (2021) Geographically Dispersed Supply Chains: A Strategy to Manage Cybersecurity in Industrial Networks Integration. In: Advances in Cybersecurity Management. Springer, Cham, Switzerland, pp. 97-116. ISBN 978-3-030-71380-5. E-ISBN 978-3-030-71381-2. (doi:10.1007/978-3-030-71381-2_6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:89067) |
Mudelsee, Manfred (2000) Ramp function regression: a tool for quantifying climate transitions. Computers and Geosciences, 26 (3). pp. 293-307. ISSN 0098-3004. (doi:10.1016/S0098-3004(99)00141-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16438) |
Murphy, Julian, Howells, Gareth, McDonald-Maier, Klaus D. (2019) A Machine Learning Method For Sensor Authentication Using Hidden Markov Models. In: Proceddings of Eighth IEEE International Conference on Emerging Security Technologies. . IEEE E-ISBN 978-1-7281-5546-3. (doi:10.1109/EST.2019.8806200) (KAR id:75458) |
Nawaz, Sarfraz, Efstratiou, Christos, Mascolo, Cecilia (2013) ParkSense: A Smartphone Based Sensing System For On-Street Parking. In: Proceedings of the 19th ACM International Conference on Mobile Computing and Networking (MOBICOM 2013), September 2013, Miami, FL, USA. (KAR id:35494) |
Nayeb Ghanbar Hosseini, Mahan (2022) My mind's playing tricks on me: Understanding event integration in rapid stimulus streams. Doctor of Philosophy (PhD) thesis, University of Kent,. (doi:10.22024/UniKent/01.02.97369) (KAR id:97369) |
Nicholls, Benjamin, Ang, Chee Siang, Efstratiou, Christos, Lee, Yongkuk, Yeo, Woon-Hong (2017) Swallowing detection for game control: using skin-like electronics to support people with dysphagia. In: Pervasive Computing and Communications Workshops (PerCom Workshops). 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). . IEEE (doi:10.1109/PERCOMW.2017.7917598) (KAR id:63952) |
Nicolas Marion, Sebastien (2009) Using Class-Level Static Properties to Predict Object Lifetimes. Doctor of Philosophy (PhD) thesis, University of Kent. (doi:10.22024/UniKent/01.02.94507) (KAR id:94507) |
Nieto-Barajas, Luis E., Walker, Stephen G. (2007) A Bayesian semi-parametric bivariate failure time model. Computational Statistics and Data Analysis, 51 (12). pp. 6102-6113. ISSN 0167-9473. (doi:10.1016/j.csda.2006.12.020) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:2662) |
Nitsos, Kallikratidas, Dagiuklas, Tasos, Al-Raweshidy, Hamed S. (2000) High Speed Wireless Internet Access: Combination of MPLS and BRAN HIPERLAN/2 technologies. In: IFIP-TC6/European Commission International Conference, May 14-19, 2000, Paris, France. (doi:10.1007/3-540-45551-5_42) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16456) |
Nouh, Mariam, Nurse, Jason R. C., Webb, Helena, Goldsmith, Michael (2019) Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement. In: Proceedings of the 2019 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). . Internet Society (KAR id:71674) |
Nurse, Jason R. C. (2019) Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:10.1093/oxfordhb/9780198812746.013.35) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:69500) |
Nurse, Jason R. C. and Bada, Maria (2019) The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:10.1093/oxfordhb/9780198812746.013.36) (KAR id:69501) |
Oderanti, F.O., De Wilde, Philippe (2011) Automatic fuzzy decision making system with learning for competing and connected businesses. Expert Systems with Applications, 38 (12). pp. 14574-14584. ISSN 0957-4174. (doi:10.1016/j.eswa.2011.05.025) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:58013) |
Ojha, Varun, Kumar, Griego, Danielle, Kuliga, Saskia, Bielik, Martin, Buš, Peter, Schaeben, Charlotte, Treyer, Lukas, Standfest, Matthias, Schneider, Sven, König, Reinhard, and others. (2019) Machine learning approaches to understand the influence of urban environments on human’s physiological response. Information Sciences, 474 . pp. 154-169. ISSN 0020-0255. (doi:10.1016/j.ins.2018.09.061) (KAR id:74058) |
Oliveira, Bruno, Wang, Meng, Gibbons, Jeremy (2008) The VISITOR Pattern as a Reusable, Generic, Type-Safe Component. In: Proceedings of the 23rd ACM SIGPLAN conference on Object-oriented programming systems languages and applications. . (KAR id:47470) |
Ong, SimYing, Li, Shujun, Wong, KokSheik, Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images. Signal Processing: Image Communication, 58 . pp. 1-13. ISSN 0923-5965. (doi:10.1016/j.image.2017.06.002) (KAR id:69562) |
Osbakk, Patrik (2007) A privacy enhancing infrastructure for context-awareness. Doctor of Philosophy (PhD) thesis, University of Kent. (doi:10.22024/UniKent/01.02.86356) (KAR id:86356) |
Oshea, P.J. and Wilson, E. (1997) European law databases: an experiment in retrieval. In: Wagner, R., ed. Proceedings of the 8th International Conference on Database and Expert Systems Applications, DEXA '97. IEEE, pp. 227-232. ISBN 0-8186-8147-0. (doi:10.1109/DEXA.1997.617275) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18226) |
Osman, Ibrahim H. (1999) A unified-metaheuristic framework. In: Imam, Ibrahim and Kodratoff, Yves and El-Dessouki, Ayman and Ali, Moonis, eds. Multiple Approaches to Intelligent Systems 12th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems. Lecture Notes in Artificial Intelligence . Springer, Berlin, Germany, pp. 11-12. ISBN 978-3-540-66076-7. E-ISBN 978-3-540-48765-4. (doi:10.1007/978-3-540-48765-4_3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16420) |
Otero, Fernando E.B., Masegosa, Antonio D., Terrazas, Germán (2014) Thematic issue on advances in nature inspired cooperative strategies for optimization. Memetic Computing, 6 (3). pp. 147-148. ISSN 1865-9284. E-ISSN 1865-9292. (doi:10.1007/s12293-014-0140-z) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42349) |
Paar, C., Fleischmann, Peter, Soria-Rodriguez, P. (1999) Fast arithmetic for public-key algorithms in Galois fields with composite exponents. IEEE Transactions on Computers, 48 (10). pp. 1025-1034. ISSN 0018-9340. (doi:10.1109/12.805153) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16426) |
Palaniappan, Ramaswamy, Revett, Kenneth (2014) PIN generation using EEG : a stability study. International Journal of Biometrics, 6 (2). pp. 95-106. ISSN 1755-8301. (doi:10.1504/IJBM.2014.060960) (KAR id:49535) |
Palomar, Esther, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Secure content access and replication in pure P2P networks. Computer Communications, 31 (2). pp. 266-279. ISSN 0140-3664. (doi:10.1016/j.comcom.2007.08.015) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31955) |
Pang, P.C.W, Pepper, Matthew G., Ducker, D.A (1995) Monitoring respiratory activity in neonates using diaphragmatic electromyograph. Medical and Biological Engineering and Computing, 33 (3). pp. 385-390. ISSN 0140-0118. (doi:10.1007/BF02510520) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19434) |
Pappa, Gisele L. and Freitas, Alex A. (2007) Discovering new rule induction algorithms with grammar-based genetic programming. In: Maimon, Oded and Rokach, Lior, eds. Soft Computing for Knowledge Discovery and Data Mining. Springer, New York, pp. 133-152. ISBN 978-0-387-69934-9. (doi:10.1007/978-0-387-69935-6_6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:12968) |
Parker, Sam, Yuan, Haiyue, Li, Shujun (2024) PassViz: A Visualisation System for Analysing Leaked Passwords. In: Proceedings of the 2023 20th IEEE Symposium on Visualization for Cyber Security. . pp. 33-42. IEEE ISBN 979-8-3503-1794-7. E-ISBN 979-8-3503-1793-0. (doi:10.1109/VizSec60606.2023.00011) (KAR id:102913) |
Paschalakis, Stavros and Fairhurst, Michael and Allgrove, C. (1999) Wordlength estimation for the enhancement of hand-written word recognition. In: Seventh International Conference on Image Processing And Its Applications, 1999. Conference Publications . IEEE, pp. 750-754. ISBN 0-85296-717-9. (doi:10.1049/cp:19990424) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16439) |
Paschalakis, Stavros and Lee, Peter (2000) Combined geometric transformation and illumination invariant object recognition in RGB color images. In: Sanfeliu, A. and Villanueva, J.J. and Vanrell, M. and Alquezar, R. and Huang, T. and Serra, J., eds. Proceedings 15th International Conference on Pattern Recognition. IEEE, pp. 584-587. ISBN 0-7695-0750-6. (doi:10.1109/ICPR.2000.903613) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16475) |
Paschalakis, Stavros and Lee, Peter (1999) Pattern recognition in grey level images using moment based invariant features. In: Seventh International Conference on Image Processing And Its Applications, 1999. Conference Publications . IEEE, pp. 245-249. ISBN 0-85296-717-9. (doi:10.1049/cp:19990320) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16441) |
Paschalakis, Stavros and Lee, Peter (2000) Statistical pattern recognition using the Normalized Complex Moment Components vector. In: Ferri, F.J. and Inesta, J.M. and Amin, A. and Pudil, P., eds. Advances in Pattern Recognition Joint IAPR International Workshops SSPR 2000 and SPR 2000. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 532-539. ISBN 978-3-540-67946-2. E-ISBN 978-3-540-44522-7. (doi:10.1007/3-540-44522-6_55) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16478) |
Pascoe, Jason (1998) Adding generic contextual capabilities to wearable computers. In: Digest of Papers. Second International Symposium on Wearable Computers. IEEE, pp. 92-99. ISBN 0-8186-9074-7. (doi:10.1109/ISWC.1998.729534) (KAR id:17486) |
Pascoe, Jason and Ryan, Nick S. and Morse, David R. (1999) Issues in developing context-aware computing. In: Gellersen, Hans, ed. Handheld and Ubiquitous Computing First International Symposium. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 208-221. ISBN 978-3-540-66550-2. E-ISBN 978-3-540-48157-7. (doi:10.1007/3-540-48157-5_20) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16443) |
Patterson, Clare M., Nurse, Jason R.C., Franqueira, Virginia N.L. (2024) “I don't think we're there yet”: The practices and challenges of organisational learning from cyber security incidents. Computers & Security, 139 . Article Number 103699. ISSN 0167-4048. (doi:10.1016/j.cose.2023.103699) (KAR id:104873) |
Pattnaik, Nandita, Li, Shujun, Nurse, Jason R. C. (2022) Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter. Computers and Security, 125 . Article Number 103008. ISSN 0167-4048. (doi:10.1016/j.cose.2022.103008) (KAR id:96259) |
Pattnaik, Nandita, Li, Shujun, Nurse, Jason R. C. (2024) Security and privacy perspectives of people living in shared home environments. In: CSCW'24: Computer-Supported Cooperative Work and Social Computing. 8. (In press) (doi:10.1145/3686907) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:106798) |
Pattnaik, Nandita, Li, Shujun, Nurse, Jason R. C. (2023) A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. ACM Computing Surveys, 55 (9). 180:1-180:38. ISSN 0360-0300. E-ISSN 1557-7341. (doi:10.1145/3558095) (KAR id:98166) |
Paul, S., Muller, H., Preiser, R., de Lima Neto, F.B., Marwala, T., De Wilde, Philippe (2014) Developing a management decision-making model based upon a complexity perspective with reference to the Bee Algorithm. Emergence: Complexity and Organization, 16 (4). ISSN 15213250 (ISSN). (doi:10.emerg/10.17357.6f80b2f5523b2b070ed9d809a15c56e0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:93331) |
Paviotti, Marco, Cooksey, Simon, Paradis, Anouk, Wright, Daniel, Owens, Scott, Batty, Mark (2020) Modular Relaxed Dependencies in Weak Memory Concurrency. In: Lecture Notes in Computer Science. Programming Languages and System: 29th European Symposium on Programming, ESOP 2020 Held as Part of the European Joint Conferences on Theory and Practice of Software. 12075. pp. 599-625. Springer ISBN 978-3-030-44913-1. (doi:10.1007/978-3-030-44914-8_22) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:81430) |
Pawar, Pramod, Sajjad, Ali, Chadwick, David W., Dimitrakos, Theo (2015) Security-as-a-Service in Multi-cloud and Federated Cloud Environments. In: UNSPECIFIED. (doi:10.1007/978-3-319-18491-3_21) (KAR id:56874) |
Peake, Joshua, Amos, Martyn, Costen, Nicholas, Masala, Giovanni, Lloyd, Huw (2022) PACO-VMP: Parallel Ant Colony Optimization for Virtual Machine Placement. Future Generation Computer Systems, 129 . pp. 174-186. ISSN 0167-739X. (doi:10.1016/j.future.2021.11.019) (KAR id:93038) |
Pearson, J.K, Bisset, D.L. (1994) Neural Networks in the Clifford Domain. 1994 IEEE International Conference on Neural Networks, 1-7 . pp. 1465-1469. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19936) |
Pease, Alison and Jordanous, Anna (2018) Report on the Eighth International Conference on Computational Creativity. Review of: Eighth International Conference on Computational Creativity by UNSPECIFIED. AI Magazine, 39 (1). pp. 62-64. ISSN 0738-4602. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:64189) |
Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards and Interfaces, 31 (2). pp. 372-380. ISSN 0920-5489. (doi:10.1016/j.csi.2008.05.012) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31952) |
Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards and Interfaces, 31 (1). pp. 88-97. ISSN 0920-5489. (doi:10.1016/j.csi.2007.11.013) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31951) |
Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. Journal of Information Science and Engineering, 25 (1). pp. 33-57. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31953) |
Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Tapiador, Juan E., Li, Tieyan, Li, Yingjiu (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54 (9). pp. 1502-1508. ISSN 1389-1286. (doi:10.1016/j.comnet.2009.11.007) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31945) |
Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Tapiador, Juan E., van der Lubbe, Jan C. A. (2011) Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence, 24 (6). pp. 1061-1069. ISSN 0952-1976. (doi:10.1016/j.engappai.2011.04.001) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31943) |
Peris-Lopez, Pedro, Li, Tieyan, Hernandez-Castro, Julio C. (2010) Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Transactions on information and systems, E93-D (3). pp. 518-527. ISSN 1745-1353. (doi:10.1587/transinf.E93.D.518) (KAR id:31947) |
Peris-Lopez, Pedro, Li, Tieyan, Hernandez-Castro, Julio C., Tapiador, Juan E. (2009) Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Computer Communications, 32 (7-10). pp. 1185-1193. ISSN 0140-3664. (doi:10.1016/j.comcom.2009.03.010) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31950) |
Peris-Lopez, Pedro, Orfila, Agustin, Hernandez-Castro, Julio C., van der Lubbe, Jan C. A. (2011) Flaws on RFID grouping-proofs. Guidelines for future sound protocols. Journal of Network and Computer Applications, 34 (3). pp. 833-845. ISSN 1084-8045. (doi:10.1016/j.jnca.2010.04.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31944) |
Peris-Lopez, Pedro, Orfila, Agustin, Palomar, Esther, Hernandez-Castro, Julio C. (2012) A secure distance-based RFID identification protocol with an off-line back-end database. Personal and Ubiquitous Computing, 16 (3). pp. 351-365. ISSN 1617-4909. (doi:10.1007/s00779-011-0396-y) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31942) |
Petricek, Tomas (2022) The Gamma: Programmatic Data Exploration for Non-programmers. In: 2022 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). 2022 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). . pp. 1-7. IEEE ISBN 978-1-6654-4215-2. E-ISBN 978-1-6654-4214-5. (doi:10.1109/vl/hcc53370.2022.9833134) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:96635) |
Petricek, Tomas (2017) Miscomputation in software: Learning to live with errors. The Art, Science, and Engineering of Programming, 1 (2). Article Number 14. ISSN 2473-7321. E-ISSN 2473-7321. (doi:10.22152/programming-journal.org/2017/1/14) (KAR id:67145) |
Petricek, Tomas, Guerra, Gustavo, Syme, Don (2016) Types from Data: Making Structured Data First-class Citizens in F#. In: PLDI 2016. Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation. PLDI Programming Language Design and Implementation . pp. 477-490. ACM, New York, USA ISBN 978-1-4503-4261-2. (doi:10.1145/2908080.2908115) (KAR id:67140) |
Pham, Lam Dang, McLoughlin, Ian Vince, Palaniappan, Ramaswamy, Mertins, Alfred (2020) Deep feature embedding and hierarchical classification for audio scene classification. In: 2020 International Joint Conference on Neural Networks (IJCNN), 19-24 July 2020, Glasgow, UK. (doi:10.1109/IJCNN48605.2020.9206866) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91413) |
Picazo Sanchez, Pablo, Martin, Lara, Peris-Lopez, Pedro, Hernandez-Castro, Julio C. (2013) Cryptanalysis of the RNTS system. The Journal of Supercomputing, 65 (2). pp. 949-960. ISSN 0920-8542. (doi:10.1007/s11227-013-0873-3) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:45300) |
Pinto, Paulo F. and Linington, Peter F. (1994) A language for the specification of interactive and distributed multimedia applications. In: DeMeer, J. and Mahr, B. and Storp, S., eds. Open Distributed Processing II. IFIP Transactions C-Communication Systems, 20 . Elsevier Science Ltd, Oxford, pp. 247-264. ISBN 0-444-81861-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19948) |
Polimon, Javier, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2008) Automated design of a lightweight block cipher with Genetic Programming. International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Too, 12 (1). pp. 3-14. ISSN 1327-2314. (doi:10.3233/kes-2008-12102) (KAR id:31960) |
Poll, Erik and Thompson, Simon (2000) Integrating Computer Algebra and Reasoning through the Type System of Aldor. In: Kirchner, Hélène and Ringeissen, Christophe, eds. Frontiers of Combining Systems Third International Workshop. Lecture Notes in Computer Science, 1794 . Springer, Berlin, Germany, pp. 136-150. ISBN 978-3-540-67281-4. E-ISBN 978-3-540-46421-1. (doi:10.1007/10720084_10) (KAR id:22041) |
Poll, Erik and Zwanenburg, Jan (1999) A logic for abstract data types as existential types. In: Girard, J.Y., ed. Typed Lambda Calculi and Applications 4th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 310-324. ISBN 978-3-540-65763-7. E-ISBN 978-3-540-48959-7. (doi:10.1007/3-540-48959-2_22) (KAR id:16484) |
Poole, Michael D. (1996) Occam for all - Two approaches to retargeting the INMOS compiler. In: Oneill, B.C., ed. Proceedings of the 19th world occam and transputer user group technical meeting on Parallel processing developments. Concurrent Systems Engineering . IOS Press, Amsterdam, Netherlands, pp. 167-178. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18726) |
Poole, Michael D. (1995) Using records and pointers with occam 2.1. In: Nixon, Paddy and Transputer User, Grp, eds. Transputer and Occam Developments. Transputer & Occam Engineering Series, 44 . IOS Press, Amsterdam, pp. 151-162. ISBN 90-5199-222-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19457) |
Pérez-Delgado, Carlos A (2022) A Quantum Software Modeling Language. In: Quantum Software Engineering. First Edition. Springer International Publishing Cham, Switzerland, pp. 103-119. ISBN 978-3-031-05323-8. E-ISBN 978-3-031-05324-5. (doi:10.1007/978-3-031-05324-5_6) (KAR id:97519) |
Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2015) Iterated gate teleportation and blind quantum computation. Physical Review Letters: Moving Physics Forward, 114 (22). p. 220502. ISSN 0031-9007. E-ISSN 1079-7114. (doi:10.1103/PhysRevLett.114.220502) (KAR id:58146) |
Qiang, Fangfang, Zhao, Z., Gu, Xiaowei, Jiang, Xianyang (2019) Blind estimation of long and short Pseudo-random codes in multi-rate LSC-DS-CDMA signals. International Journal of Circuits, Systems and Signal Processing, 13 . pp. 259-265. ISSN 1998-4464. E-ISSN 1998-4464. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90400) |
Rachuri, Kiran, Efstratiou, Christos, Leontiadis, Ilias, Mascolo, Cecilia, Rentfrow, Peter J. (2013) METIS: Exploring mobile phone sensing offloading for efficiently supporting social sensing applications. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PERCOM 2013). (KAR id:35501) |
Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1999) Automatic self-configuration of a novel multiple-expert classifier using a genetic algorithm. In: Seventh International Conference on Image Processing And Its Applications, 1999. IEEE, pp. 57-61. ISBN 0-85296-717-9. (doi:10.1049/cp:19990281) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16510) |
Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) Building multiple prototype classifiers for handwritten character recognition using automatic statistical clustering techniques. In: 1997 Sixth International Conference on Image Processing and Its Applications. IEEE, pp. 414-418. ISBN 978-0-85296-692-1. (doi:10.1049/cp:19970927) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17897) |
Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (2000) Comparison of some multiple expert strategies: An investigation of resource prerequisites and achievable performance. In: Sanfeliu, A. and Villanueva, J.J. and Vanrell, M. and Alquezar, R. and Crowley, J. and Shirai, Y., eds. Proceedings 15th International Conference On Pattern Recognition. IEEE, pp. 841-844. ISBN 0-7695-0750-6. (doi:10.1109/ICPR.2000.903048) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16536) |
Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1999) Enhancing multiple expert decision combination strategies through exploitation of a priori information sources. IEE Proceedings: Vision Image and Signal Processing, 146 (1). pp. 40-49. ISSN 1350-245X. (doi:10.1049/ip-vis:19990015) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16507) |
Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1997) Introducing new multiple expert decision combination topologies: A case study using recognition of handwritten characters. I E E E, Computer Soc Press, Los Alamitos, CA, 1200 pp. ISBN 0-8186-7899-2. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17895) |
Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1997) Selective partition algorithm for finding regions of maximum pairwise dissimilarity among statistical class models. Pattern Recognition Letters, 18 (7). pp. 605-611. ISSN 0167-8655. (doi:10.1016/S0167-8655(97)00047-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17891) |
Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1999) Serial combination of multiple experts: A unified evaluation. Pattern Analysis & Applications, 2 (4). pp. 292-311. ISSN 1433-7541. (doi:10.1007/s100440050038) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16505) |
Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) A comparative study of decision combination strategies for a novel multiple-expert classifier. In: 1997 Sixth International Conference on Image Processing and Its Applications. IEEE, pp. 131-135. ISBN 978-0-85296-692-1. (doi:10.1049/cp:19970869) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17896) |
Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1997) A comparative study of two different multiple expert architectures for robust object recognition. Machine Vision Applications, Architectures & Systems Integra . Spie - Int Soc Optical Engineering, USA, 296 pp. ISBN 0-8194-2637-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17893) |
Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1998) An evaluation of multi-expert configurations for the recognition of handwritten numerals. Pattern Recognition, 31 (9). pp. 1255-1273. ISSN 0031-3203. (doi:10.1016/S0031-3203(97)00161-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17002) |
Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1997) A new hybrid approach in combining multiple experts to recognise handwritten numerals. Pattern Recognition Letters, 18 (8). pp. 781-790. ISSN 0167-8655. (doi:10.1016/S0167-8655(97)00078-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17890) |
Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael and Hoque, Sanaul and Paschalakis, Stavros (1999) A novel multiple-expert approach to the recognition of handwritten words extracted from British cheques. In: Seventh International Conference on Image Processing And Its Applications, 1999. IEEE, pp. 731-735. ISBN 0-85296-717-9. (doi:10.1049/cp:19990420) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16508) |
Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael, Lee, Peter (1998) Design considerations in the real-time implementation of multiple expert image classifiers within a modular and flexible multiple-platform design environment. Real-Time Imaging, 4 (5). pp. 361-376. ISSN 1077-2014. (doi:10.1016/S1077-2014(98)90005-5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17003) |
Rajani, Vineet (2020) A type-theory for higher-order amortized analysis. Doctor of Engineering (EngDoc) thesis, Saarland University, Saarbr\"cken, Germany. (doi:10.22028/D291-30877) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90652) |
Raza, Ali, Tran, Kim Phuc, Koehl, Ludovic, Li, Shujun (2023) AnoFed: Adaptive anomaly detection for digital health usingtransformer-based federated learning and support vector data description. Engineering Applications of Artificial Intelligence, 121 . Article Number 106051. ISSN 0952-1976. (doi:10.1016/j.engappai.2023.106051) (KAR id:100363) |
Raza, Ali, Tran, Kim Phuc, Koehl, Ludovic, Li, Shujun (2023) Proof of Swarm Based Ensemble Learning for Federated Learning Applications. In: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. . 152- 155. ACM, New York, USA ISBN 978-1-4503-9517-5. (doi:10.1145/3555776.3578601) (KAR id:101795) |
Read, Dwight, Fischer, Michael D., Lehman, F. K. (Chit Hlaing) (2014) The Cultural Grounding of Kinship: A Paradigm Shift. L'Homme, 2 (210). pp. 63-89. ISSN 9782713224430. E-ISSN 1953-8103. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:41547) |
Rio, Miguel and Linington, Peter F. (2000) Distributed Quality of Service Multicast Routing with Multiple Metrics for Receiver initiated Joins. In: Proceedings IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium. IEEE, pp. 180-187. ISBN 0-7695-0777-8. (doi:10.1109/ICON.2000.875787) (KAR id:21980) |
Ritson, Carl G. and Ugawa, Tomoharu and Jones, Richard E. (2014) Exploring Garbage Collection with Haswell Hardware Transactional Memory. In: ISMM '14: Proceedings of the 2014 international symposium on Memory management. ACM, New York, USA, pp. 105-115. ISBN 978-1-4503-2921-7. (doi:10.1145/2602988.2602992) (KAR id:40819) |
Rizzo, Mike (1994) Using Producer and Consumer Manipulators to Extend Stream I/O Formatting in C++. Sigplan Notices, 29 (3). pp. 33-35. ISSN 0362-1340. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19999) |
Roberts, J.C. (1998) On encouraging multiple views for visualization. In: Banissi, Ebad and Khosrowshahi, F. and Sarfraz, Muhammad, eds. 1999 IEEE International Conference on Information Visualization. IEEE International Conference on Information Visualisation . IEEE, pp. 8-14. ISBN 0-8186-8509-3. (doi:10.1109/IV.1998.694193) (KAR id:17047) |
Roberts, Jonathan C. (1998) Waltz - An exploratory visualization tool for volume data, using multiform abstract displays. In: Erbacher, Robert F. and Pang, Alex, eds. Visual Data Exploration and Analysis V. Proceedings of SPIE . SPIE, Bellingham, Washington, pp. 112-122. ISBN 0-8194-2738-1. (doi:10.1117/12.309533) (KAR id:17049) |
Roberts, Jonathan C. and Hill, Steve (1999) Piecewise linear hypersurfaces using the Marching Cubes Algorithm. In: Erbacher, Robert F. and Chen, Philip C. and Wittenbrink, Craig M., eds. Visual Data Exploration and Analysis VI. Proceedings of SPIE . SPIE, pp. 170-181. ISBN 0-8194-3114-1. (doi:10.1117/12.342833) (KAR id:16559) |
Rodgers, Peter (2014) A Survey of Euler Diagrams. Journal of Visual Languages and Computing, 25 (3). pp. 134-155. ISSN 1045-926X. (doi:10.1016/j.jvlc.2013.08.006) (KAR id:35163) |
Rodgers, Peter (1998) A graph rewriting programming language for graph drawing. In: Visual Languages, 1998. Proceedings. 1998 IEEE Symposium on. . pp. 32-39. IEEE ISBN 0-8186-8712-6. (doi:10.1109/VL.1998.706131) (KAR id:17063) |
Rodgers, Peter, Baker, Robert, Thompson, Simon, Li, Huiqing (2013) Multi-level Visualization of Concurrent and Distributed Computation in Erlang. In: Proceedings of 19th International Conference on Distributed Multimedia Systems 2013. . Knowledge Systems Institute (KAR id:34968) |
Rodgers, Peter, Stapleton, Gem, Flower, Jean, Howse, John (2014) Drawing Area-Proportional Euler Diagrams Representing Up To Three Sets. IEEE Transactions on Visualization and Computer Graphics, 20 (1). pp. 56-69. ISSN 1077-2626. (doi:10.1109/TVCG.2013.104) (KAR id:34969) |
Rong, Hai-Jun, Angelov, Plamen P., Gu, Xiaowei, Bai, Jian-Ming (2018) Stability of Evolving Fuzzy Systems Based on Data Clouds. IEEE Transactions on Fuzzy Systems, 26 (5). pp. 2774-2784. ISSN 1063-6706. (doi:10.1109/TFUZZ.2018.2793258) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90401) |
Russell, M., Hopkins, Tim (1998) CFTP: a caching FTP server. Computer Networks and ISDN Systems, 30 (22-23). pp. 2211-2222. ISSN 0169-7552. (doi:10.1016/S0169-7552(98)00240-2) (KAR id:17076) |
Ryan, Nick S., Smith, Dan, Ma, Ling (2006) Acoustic environment as an indicator of social and physical context. Personal and Ubiquitous Computing, 10 (4). pp. 241-254. ISSN 1617-4909. (doi:10.1007/s00779-005-0045-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:1438) |
Sahami, Mehran and Roach, Steve and Cuadros-Vargas, Ernesto and Danyluk, Andrea and Dodge, Ronald and Fisher, Kathleen and Fincher, Sally and France, Robert and Grossman, Dan and Hawthorne, Beth and Katz, Randy and Kumar, Amruth and LeBlanc, Rich and Reed, Dave and Robinson, Brian H. and Seker, Remzi and Thompson, Alfred (2013) Computer Science Curricula 2013(CS2013). Technical report. ACM Press and IEEE Computer Society Press, New York 10.1145/2534860. (doi:10.1145/2534860) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:38433) |
Salama, Khalid M. and Freitas, Alex A. (2012) ABC-Miner: an ant-based Bayesian classification algorithm. In: Swarm Intelligence 8th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 13-24. ISBN 978-3-642-32649-3. E-ISBN 978-3-642-32650-9. (doi:10.1007/978-3-642-32650-9_2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:32165) |
Salhi, Said and Farber, Gerrit and Coves, Anna M. (2008) Semi-Dynamic Demand in a Non-Permutation Flowshop with Constrained Resequencing Buffers. In: Lirkov, I. and Margenov, S. and Wasniewski, Jerzy, eds. Large-Scale Scientific Computing 6th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 536-544. ISBN 978-3-540-78825-6. E-ISBN 978-3-540-78827-0. (doi:10.1007/978-3-540-78827-0_61) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:5231) |
Salvy, Bruno, Shackell, John (1999) Symbolic asymptotics: Multiseries of inverse functions. Journal of Symbolic Computation, 27 (6). pp. 543-563. ISSN 0747-7171. (doi:10.1006/jsco.1999.0281) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16588) |
Sandoval Orozco, A.L., Arenas Gonzalez, David Manuel, Garcia Villalba, L.J., Hernandez-Castro, Julio C. (2014) Analysis of errors in exif metadata on mobile devices. Multimedia Tools and Applications, 74 (13). pp. 4735-4763. ISSN 1380-7501. (doi:10.1007/s11042-013-1837-6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58385) |
Sandoval Orozco, A.L., Arenas, Gonzalez, Rosales, Corripio, Garcia Villalba, L.J., Hernandez-Castro, Julio C. (2013) Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing, 96 (9). pp. 829-841. ISSN 1436-5057. (doi:10.1007/s00607-013-0313-5) (KAR id:45306) |
Sarkar, Susmit and Memarian, Kayvan and Owens, Scott and Batty, Mark and Sewell, Peter and Maranget, Luc and Alglave, Jade and Williams, Derek (2012) Synchronising C/C++ and POWER. In: Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, New York, USA, pp. 311-322. ISBN 978-1-4503-1205-9. (doi:10.1145/2254064.2254102) (KAR id:50269) |
Scahill, Mark (1997) Distributed individual-based environmental simulation. In: Denzer, Ralf and Swayne, David A. and Schimak, Gerald, eds. Environmental Software Systems. IFIP Advances in Information and Communication Technology, 2 . Springer, Dordrecht, pp. 269-276. ISBN 978-1-4757-5162-8. E-ISBN 978-1-5041-2869-8. (doi:10.1007/978-1-5041-2869-8_35) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17941) |
Scaparra, Maria Paola, Church, Richard L. (2008) A bilevel mixed-integer program for critical infrastructure protection planning. Computers and Operations Research, 35 (6). pp. 1905-1923. ISSN 0305-0548. (doi:10.1016/j.cor.2006.09.019) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:3064) |
Schmitz, Roland and Li, Shujun and Grecos, Christos and Zhang, Xinpeng (2018) Commutative Watermarking-Encryption of Multimedia Data Based on Histograms. In: Bhattacharyya, Siddhartha, ed. Intelligent Innovations in Multimedia Data Engineering and Management. First edition. IGI Global, USA, pp. 141-163. ISBN 978-1-5225-8783-5. E-ISBN 978-1-5225-7108-7. (doi:10.4018/978-1-5225-7107-0.ch006) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:74214) |
Secker, Andrew D. and Davies, Matthew N. and Freitas, Alex A. and Timmis, Jon and Clark, Edward and Flower, Darren R. (2008) An artificial immune system for evolving amino acid clusters tailored to protein function prediction. In: Bentley, Peter J. and Lee, Doheon and Jung, Sungwon, eds. Artificial Immune Systems. Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence . Springer, pp. 242-253. ISBN 978-3-540-85071-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:15659) |
Secker, Andrew D., Freitas, Alex A., Timmis, Jon (2008) AISIID: An artificial immune system for interesting information discovery on the web. Applied Soft Computing, 8 (2). pp. 885-905. ISSN 1568-4946. (doi:10.1016/j.asoc.2007.07.007) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:15660) |
Shaddick, G., Choo, Louise L., Walker, Stephen G. (2007) Modelling correlated count data with covariates. Journal of Statistical Computational and Simulation, 77 (11). pp. 945-954. ISSN 0094-9655. (doi:10.1080/10629360600851974) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:2789) |
Sharaiha, Y.M., Gendreau, M., Laporte, Gilbert, Osman, Ibrahim H. (1997) A tabu search algorithm for the capacitated shortest spanning tree problem. Networks, 29 (3). pp. 161-171. ISSN 0028-3045. (doi:10.1002/(SICI)1097-0037(199705)29:3<161::AID-NET4>3.0.CO;2-F) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17945) |
Sharp, John A., Price, D.H.R. (1996) Systematic case study selection based on sample surveys: The case segmentation method. Systems Research and Information Science, 7 (2). pp. 71-81. ISSN 0882-3014. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18492) |
Sharrad, Joanna (2022) Debugging Type Errors with a Blackbox Compiler. Doctor of Philosophy (PhD) thesis, University of Kent,. (doi:10.22024/UniKent/01.02.93540) (KAR id:93540) |
Shen, LinLin, Bai, Li, Fairhurst, Michael (2007) Gabor wavelets and General Discriminant Analysis for face identification and verification. Image and Vision Computing, 25 (5). pp. 553-563. ISSN 0262-8856. (doi:10.1016/j.imavis.2006.05.002) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:2307) |
Sheng, Weiguo, Howells, Gareth, Fairhurst, Michael, Deravi, Farzin (2007) A memetic fingerprint matching algorithm. IEEE Transactions on Information Forensics and Security, 2 (3). pp. 402-412. ISSN 1556-6013. (doi:10.1109/TIFS.2007.902681) (KAR id:2068) |
Shi, K. and Walczowski, Les T. and Nalbantis, D. and Waller, Winston A.J. (1996) O-2 ADL: An object-oriented analog VLSI design language. In: Zhang, Qingling and Tang, Ting-Ao and Yu, Huihua, eds. 2nd International Conference on ASIC. IEEE, pp. 27-30. ISBN 7-5439-0940-5. (doi:10.1109/ICASIC.1996.562742) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18499) |
Shi, K. and Walczowski, Les T. and Waller, Winston A.J. and Nalbantis, D. (1996) A new bipolar op-amp IC synthesis approach. In: Zhang, Qingling and Tang, Ting-Ao and Yu, Huihua, eds. 2nd International Conference on ASIC. IEEE, pp. 57-60. ISBN 7-5439-0940-5. (doi:10.1109/ICASIC.1996.562750) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18500) |
Shirazibeheshti, Amirali (2015) The effect of sedation on conscious processing: Computational analysis of the EEG response to auditory irregularity. Doctor of Science (DSc) thesis, University of Kent,. (doi:10.22024/UniKent/01.02.54467) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:54467) |
Sim, Kwang Mong (2012) Agent-Based Cloud Computing. IEEE Transactions On Services Computing, 5 (4). pp. 564-577. ISSN 1939-1374. (doi:10.1109/TSC.2011.52) (KAR id:32039) |
Sim, Kwang Mong (2009) BLGAN: Bayesian Learning and Genetic Algorithm for Supporting Negotiation With Incomplete Information. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 39 (1). pp. 198-211. ISSN 1083-4419. (doi:10.1109/TSMCB.2008.2004501) (KAR id:31929) |
Sim, Kwang Mong (2013) Complex and Concurrent Negotiations for Multiple Interrelated e-Markets. IEEE Transactions on Cybernetics, 43 (1). pp. 230-245. ISSN 2168-2267. (doi:10.1109/TSMCB.2012.2204742) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:35904) |
Sim, Kwang Mong (2010) Concurrent Negotiation and Coordination for Grid Resource Coallocation. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 40 (3). pp. 753-766. ISSN 1083-4419. (doi:10.1109/TSMCB.2009.2028870) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31927) |
Sim, Kwang Mong (2008) Evolving Fuzzy Rules for Relaxed-Criteria Negotiation. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 38 (6). 1486 -1500. ISSN 1083-4419. (doi:10.1109/TSMCB.2008.928210) (KAR id:31928) |
Sim, Kwang Mong (2006) Grid Commerce, Market-Driven G-Negotiation, and Grid Resource Management. IEEE Transactions On Systems, Man, and Cybernetics—Part B: Cybernetics, 36 (6). pp. 1381-1394. ISSN 1083-4419. (doi:10.1109/TSMCB.2006.877791) (KAR id:32018) |
Sim, Kwang Mong (2010) Grid Resource Negotiation: Survey and New Directions. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 40 (3). pp. 245-257. ISSN 1094-6977. (doi:10.1109/TSMCC.2009.2037134) (KAR id:31930) |
Sim, Kwang Mong (2012) A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 42 (3). pp. 713-728. ISSN 1083-4419. (doi:10.1109/TSMCB.2011.2174355) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31925) |
Sim, Kwang Mong, Gutierrez-Garcia, J. Octavio (2013) Agent-based Cloud service composition. Applied Intelligence, 38 (3). pp. 436-464. ISSN 0924-669X. E-ISSN 1573-7497. (doi:10.1007/s10489-012-0380-x) (KAR id:32021) |
Sim, Kwang Mong, Gutierrez-Garcia, J. Octavio (2013) A family of heuristics for agent-based elastic Cloud bag-of-tasks concurrent scheduling. Future Generation Computer Systems, 29 (7). pp. 1682-1699. ISSN 0167-739X. (doi:10.1016/j.future.2012.01.005) (KAR id:32019) |
Simon, .., Clear, Alison, Carter, Janet, Cross, Gerry, Radenski, Atanas, Tudor, Liviana, Tonnisson, Eno (2015) What's in a Name?: International Interpretations of Computing Education Terminology. ITICSE-WGR '15 Proceedings of the 2015 ITiCSE on Working Group Reports, . pp. 173-186. ISSN 9781450341462. (doi:10.1145/2858796.2858803) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:63973) |
Singh, Om Prakash, Palaniappan, Ramaswamy, Malarvilli, M.B. (2018) Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine. IEEE Access, . ISSN 2169-3536. (doi:10.1109/ACCESS.2018.2871091) (KAR id:69211) |
Sirlantzis, Konstantinos and Howells, Gareth and Paschalakis, Stavros (1999) A functional neural network prototype for multidimensional data analysis. In: Seventh International Conference on Image Processing And Its Applications, 1999. IEEE, pp. 98-102. ISBN 0-85296-717-9. (doi:10.1049/cp:19990289) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16623) |
Sirur, Sean, Nurse, Jason R. C., Webb, Helena (2018) Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR). In: International Workshop on Multimedia Privacy and Security (MPS) at the 25th ACM Conference on Computer and Communications Security (CCS). CCS Computer and Communications Security . pp. 88-95. ACM, New York, USA ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267368) (KAR id:68765) |
Slater, J.B., Swinnerton-Dyer, P. (1998) Counting points on cubic surfaces, I. Asterisque, (251). pp. 1-12. ISSN 0303-1179. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17146) |
Smart, Nigel P. (1996) How difficult is it to solve a Thue equation? In: Cohen, H., ed. Algorithmic Number Theory Second International Symposium. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 363-373. ISBN 978-3-540-61581-1. E-ISBN 978-3-540-70632-8. (doi:10.1007/3-540-61581-4_67) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18504) |
Smart, Nigel P. (1996) Solving discriminant form equations via unit equations. Journal of Symbolic Computation, 21 (3). pp. 367-374. ISSN 0747-7171. (doi:10.1006/jsco.1996.0018) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18503) |
Smart, Nigel P., Siksek, S. (1999) A fast Diffie-Hellman protocol in genus 2. Journal of Cryptology, 12 (1). pp. 67-73. ISSN 0933-2790. (doi:10.1007/PL00003818) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16627) |
Smith, Neil (1996) The UK national Web cache - The state of the art. Computer Networks and ISDN Systems, 28 . pp. 1407-1414. ISSN 0169-7552. (doi:10.1016/0169-7552(96)00029-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18512) |
Smith, R. J. G. (1978) Easily decoded error correcting codes. Doctor of Philosophy (PhD) thesis, University of Kent. (doi:10.22024/UniKent/01.02.94665) (KAR id:94665) |
Soares, Eduardo, Angelov, Plamen, Gu, Xiaowei (2020) Autonomous Learning Multiple-Model zero-order classifier for heart sound classification. Applied Soft Computing, 94 . p. 106449. ISSN 1568-4946. (doi:10.1016/j.asoc.2020.106449) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90404) |
Sobhy, Mohammed and Makkey, M.Y. (1998) A new look at analogue computing using switched capacitor circuits. In: ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems. International Symposium on Circuits and Systems . IEEE, pp. 484-487. ISBN 0-7803-4455-3. (doi:10.1109/ISCAS.1998.704508) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17155) |
Sorensen, Tyler and Donaldson, Alastair F. and Batty, Mark and Gopalakrishnan, Ganesh and Rakamarić, Zvonimir (2016) Portable Inter-workgroup Barrier Synchronisation for GPUs. In: Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications. SPLASH Systems, Programming, and Applications . ACM, New York, USA, pp. 39-58. ISBN 978-1-4503-4444-9. (doi:10.1145/2983990.2984032) (KAR id:57941) |
Stephenson, Julie E., Brown, Clifford, Griffin, Darren K. (2008) Electronic delivery of lectures in the university environment: An empirical comparison of three delivery styles. Computers and Education, 50 (3). pp. 640-651. ISSN 0360-1315. (doi:10.1016/j.compedu.2006.08.007) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:15226) |
Stone, R.D and Morse, David R. (1996) A software development tool for parallel and distributed systems. In: Oneill, B.C. and Transputer User, Grp, eds. Parallel processing developments : WoTUG-19 ; proceedings of the 19th World Occam and Transputer User Group Technical Meeting. Concurrent Systems Engineering . IOS Press, Amsterdam, Netherlands, pp. 207-219. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18529) |
Strang, W., Khan, H., Simpson, V., Slater, C., Hill, Steve (1993) From hypertext to hypermedia. Second annual conference on multimedia in education and industry, . pp. 35-39. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20702) |
Sulzmann, Martin and Wang, Meng (2007) Aspect-Oriented Programming with Type Classes. In: FOAL '07 Proceedings of the 6th workshop on Foundations of aspect-oriented languages. ICPS: ACM International Conference Proceeding Series . ACM, pp. 65-74. ISBN 978-1-59593-671-4. (doi:10.1145/1233833.1233842) (KAR id:47468) |
Sulzmann, Martin and Wang, Meng (2006) Modular Generic Programming with Extensible Superclasses. In: Proceedings of the 2006 ACM SIGPLAN workshop on Generic programming. ACM, New York, USA, pp. 55-65. ISBN 1-59593-492-8. (doi:10.1145/1159861.1159869) (KAR id:47466) |
Sulzmann, Martin and Wang, Meng (2004) A Systematic Translation of Guarded Recursive Data Types to Existential Types. Technical report. National University of Singapore (Unpublished) (KAR id:47487) |
Sulzmann, Martin and Wang, Meng (2005) Translating Generalized Algebraic Data Types to System F. Technical report. National University of Singapore (Unpublished) (KAR id:47488) |
Summoogum, K., Das, Debayan, Efstratiou, Christos, Palaniappan, Ramaswamy, Jayakumar, Parvati, Wall, John (2023) Passive Tracking of Gait Biomarkers in Older Adults: Feasibility of an Acoustic Based Approach for Non-Intrusive Gait Analysis. In: 16th International Conference on Wearable and Implantable Body Sensor Networks (BSN). 2023 IEEE 19th International Conference on Body Sensor Networks (BSN). . pp. 1-4. IEEE (doi:10.1109/BSN58485.2023.10331114) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:107527) |
Sun, Bo, Lu, Yang, Hu, Xiaoyan (2013) An interactive tool for teaching right management in 3D e-learning platform. In: Proceedings of the 12th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and Its Applications in Industry. . pp. 313-316. Association for Computing Machinery, New York, NY, United States ISBN 978-1-4503-2590-5. (doi:10.1145/2534329.2534368) (KAR id:80975) |
Sunde, Nina, Franqueira, Virginia N. L. (2023) Adding transparency to uncertainty: An argument-based method for evaluative opinions. Forensic Science International: Digital Investigation, 47 . Article Number 301657. ISSN 1742-2876. (doi:10.1016/j.fsidi.2023.301657) (KAR id:103353) |
Swenson, R.L., Dimond, Keith R. (1998) A universal colour transformation architecture. Pattern Recognition Letters, 19 (9). pp. 805-813. ISSN 0167-8655. (doi:10.1016/S0167-8655(98)00061-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17184) |
Tang, Guolin, Long, Jianpeng, Gu, Xiaowei, Chiclana, Francisco, Liu, Peide, Wang, Fubin (2022) Interval Type-2 Fuzzy Programming Method for Risky Multicriteria Decision-Making with Heterogeneous Relationship. Information Sciences, 584 . pp. 184-211. ISSN 0020-0255. (doi:10.1016/j.ins.2021.10.044) (KAR id:90984) |
Tangaro, S., Bellotti, R., De Carlo, F., Gargano, G., Lattanzio, E., Monno, P., Massafra, R., Delogu, P., Fantacci, M. E., Retico, A., and others. (2008) MAGIC-5: an Italian mammographic database of digitised images for research. La Radiologia Medica, 113 (4). pp. 477-485. ISSN 0033-8362. (doi:10.1007/s11547-008-0282-5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91795) |
Tapiador, Juan E., Hernandez-Castro, Julio C., Peris-Lopez, Pedro (2012) Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management,, 20 (4). pp. 561-578. ISSN 1064-7570. (doi:10.1007/s10922-012-9246-0) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31939) |
Tardivel, Gillian M., Morse, David R. (1998) The role of the user in computer-based species identification. In: Conference on Unlocking the Future - Information Technology in Plant Pathology and Biodiversity, December 16-19, 1996, University of Kent, Canterbury, England. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17192) |
Taylor, C. and Derrick, J. and Boiten, E. (2000) A Case Study in Partial Specification: Consistency and Refinement for Object-Z. In: Third IEEE International Conference on Formal Engineering Methods. IEEE, pp. 177-185. ISBN 0-7695-0822-7. (doi:10.1109/ICFEM.2000.873818) (KAR id:21968) |
Thomas-Hercules, Daniel, Palaniappan, Ramaswamy (2024) Neurocognitive Impact of Icon Styles and Semantics on Memory and Recall Speed: An N-Back Study Using EEG. In: 5th International Conference on Data Intelligence and Cognitive Informatics. . ISBN 979-8-3503-8960-9. E-ISBN 979-8-3503-8959-3. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:107054) |
Thompson, Simon, Lins, Rafael D. (1992) The categorical multi-combinator machine - cmcm. Computer Journal, 35 (2). pp. 170-176. ISSN 0010-4620. (doi:10.1093/comjnl/35.2.170) (KAR id:22255) |
Tighe, David, Tekeli, Kemal, Gouk, Tara, Smith, Jennifer, Ho, Michael, Moody, Andrew, Walsh, Stephen, Provost, Simon, Freitas, Alex A. (2023) Machine learning methods applied to audit of surgical margins after curative surgery for facial (non-melanoma) skin cancer. The British Journal of Oral & Maxillofacial Surgery, 61 (1). pp. 94-100. ISSN 1532-1940. (doi:10.1016/j.bjoms.2022.11.280) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:99689) |
Timmis, Jon, Hone, Andrew N.W., Stibor, Thomas, Clark, Edward (2008) Theoretical advances in artificial immune systems. Theoretical Computer Science, 403 (1). pp. 11-32. ISSN 0304-3975. (doi:10.1016/j.tcs.2008.02.011) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:15264) |
Tupman, Charlotte, Hedges, Mark, Jordanous, Anna, Roueché, Charlotte, Lawrence, K. Faith, Wakelnig, Elvira, Dunn, Stuart (2012) Sharing Ancient Wisdoms: developing structures for tracking cultural dynamics by linking moral and philosophical anthologies with their source and recipient texts. In: Digital Humanities, 2012, Hamburg, Germany. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42381) |
Tupman, Charlotte and Jordanous, Anna (2014) Sharing Ancient Wisdoms across the Semantic Web using TEI and ontologies. In: Andrews, T.L. and Mace, C., eds. Analysis of Ancient and Medieval Texts and Manuscripts: Digital Approaches. Lectio (LECTIO 1) . Brepols, Belgium. ISBN 978-2-503-55268-2. (doi:10.1484/m.lectio-eb.5.102572) (KAR id:42892) |
Tupman, Charlotte, Jordanous, Anna (2012) Sharing Ancient Wisdoms across the Semantic Web using TEI and ontologies. In: Methods and means for digital analysis of ancient and medieval texts and manuscripts, 2012, Leuven, Belgium. (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42893) |
Turner, David A. (2021) Constructive mathematics, Church's Thesis, and free choice sequences. Lecture Notes in Computer Science, . ISSN 0302-9743. (doi:10.1007/978-3-030-80049-9_44) (KAR id:88974) |
Turner, David A. (1995) Elementary strong functional programming. Functional Programming Languages in Education, 1022 . pp. 1-13. (doi:10.1007/3-540-60675-0_35) (KAR id:19100) |
Tussyadiah, Iis, Li, Shujun, Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, Juho and Neidhardt, Julia, eds. Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019. . pp. 278-290. Springer Nature Switzerland AG, Cham, Switzerland ISBN 978-3-030-05939-2. E-ISBN 978-3-030-05940-8. (doi:10.1007/978-3-030-05940-8_22) (KAR id:71418) |
Vasconcelos, G.C., Fairhurst, Michael, Bisset, D.L. (1995) EFFICIENT DETECTION OF SPURIOUS INPUTS FOR IMPROVING THE ROBUSTNESS OF MLP NETWORKS IN PRACTICAL APPLICATIONS. Neural Computing & Applications, 3 (4). pp. 202-212. ISSN 0941-0643. (doi:10.1007/bf01414645) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19103) |
Vasconcelos, G.C., Fairhurst, Michael, Bisset, D.L. (1995) INVESTIGATING FEEDFORWARD NEURAL NETWORKS WITH RESPECT TO THE REJECTION OF SPURIOUS PATTERNS. Pattern Recognition Letters, 16 (2). pp. 207-212. ISSN 0167-8655. (doi:10.1016/0167-8655(94)00092-h) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19104) |
Venkat, Ibrahim, Robinson, Thamburaj, Subramanian, K.G., De Wilde, Philippe (2018) Generation of kolam-designs based on contextual array P systems. In: 10th International Conference on the Theory and Application of Diagrams, Diagrams 2018, 18-22 Jun 2018, Edinburgh, Scotland. (doi:10.1007/978-3-319-91376-6_11) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:93321) |
Voigtlander, Janis, Hu, Zhenjiang, Matsuda, Kazutaka, Wang, Meng (2013) Enhancing Semantic Bidirectionalization via Shape Bidirectionalizer Plug-ins. Journal of Functional Programming, 23 (05). pp. 515-551. ISSN 0956-7968. (doi:10.1017/S0956796813000130) (KAR id:47481) |
Voigtländer, Janis and Hu, Zhenjiang and Matsuda, Kazutaka and Wang, Meng (2010) Combining Syntactic and Semantic Bidirectionalization. In: ICFP '10 Proceedings of the 15th ACM SIGPLAN international conference on Functional programming. ICFP International Conference on Functional Programming . ACM, New York, USA, pp. 181-192. ISBN 978-1-60558-794-3. (doi:10.1145/1863543.1863571) (KAR id:47473) |
Vollmer, Michael, Svensson, B.J., Holk, Eric, Newton, Ryan R. (2015) Meta-programming and auto-tuning in the search for high performance GPU code. In: FHPC 2015: Proceedings of the 4th ACM SIGPLAN Workshop on Functional High-Performance Computing. . pp. 1-11. ACM ISBN 978-1-4503-3807-3. (doi:10.1145/2808091.2808092) (KAR id:95046) |
Vu, Quang, Colombo, Maurizio, Asal, Rasool, Sajjad, Ali, El-Moussa, Fadi Ali, Dimitrakos, Theo (2015) Secure Cloud Storage: A Framework for Data Protection as a Service in the Multi-cloud Environment. In: Communications and Network Security (CNS), 2015 IEEE Conference on. . pp. 638-642. (doi:10.1109/CNS.2015.7346879) (KAR id:50845) |
Walczowski, Les T., Jastrzebski, Adam K., Barnaby, J.E. (1994) A Multi- Mode System for Gaas Circuis. In: 1994 IEEE International Symposium on Circus and Systems, VOL 1 - Computer Aided Design (CAD). 1. A427-A430. I E E E ISBN 0-7803-1915-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20042) |
Walczowski, Les T., Nalbantis, D., Waller, Winston A.J., Shi, K. (1997) Analogue layout generation by World Wide Web server-based agents. European Conference on Design Automation . I E E E, Computer Soc Press, USA, 634 pp. ISBN 0-8186-7786-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18015) |
Waldock, Krysia Emily, Miller, Vincent, Li, Shujun, Franqueira, Virginia N. L. (2022) Pre-University Cyber Security Education: A report on developing cyber skills amongst children and young people. Global Forum on Cyber Expertise, 159 pp. (KAR id:96040) |
Waller, Winston A.J. and Aziz, S.M. (1994) A C-Testable Parallel Multipler Using Differencial Casecode Voltage Swish (DCVS) Logic. In: Yanagawa, T. and Ivey, P.A., eds. VLSI 93 - IFIP Transactions A. Computer Science and Technology. North Holland, pp. 133-142. ISBN 0-444-89911-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20093) |
Wang, Chisheng, Wang, Shuying, Cui, Hongxing, Sebela, Monja B., Zhang, Ce, Gu, Xiaowei, Fang, Xu, Hu, Zhongwen, Tang, Qiandi, Wang, Yongquan and others. (2021) Framework to Create Cloud-Free Remote Sensing Data Using Passenger Aircraft as the Platform. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 14 . pp. 6923-6936. ISSN 1939-1404. (doi:10.1109/JSTARS.2021.3094586) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90405) |
Wang, Frank Z. (2024) Are There an Infinite Number of Passive Circuit Elements in the World? Electronics, 13 (13). Article Number 2669. ISSN 2079-9292. (doi:10.3390/electronics13132669) (KAR id:106521) |
Wang, Frank Z. (2022) Breaking Landauer’s bound in a spin-encoded quantum computer. Quantum Information Processing, 21 . Article Number 378. ISSN 1573-1332. E-ISSN 1573-1332. (doi:10.1007/s11128-022-03707-2) (KAR id:97943) |
Wang, Frank Z. (2021) Can We Break the Landauer Bound in Spin-Based Electronics? IEEE Access, 9 . pp. 67109-67116. ISSN 2169-3536. E-ISSN 2169-3536. (doi:10.1109/ACCESS.2021.3076479) (KAR id:88045) |
Wang, Frank Z. (2024) Can We Still Find an Ideal Memristor? Magnetism, 4 (3). pp. 200-208. ISSN 2673-8724. (doi:10.3390/magnetism4030014) (KAR id:106569) |
Wang, Frank Z. (2018) Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management. IEEE Transactions on Emerging Topics in Computational Intelligence, 2 (1). pp. 13-24. ISSN 2471-285X. E-ISSN 2471-285X. (doi:10.1109/TETCI.2017.2755691) (KAR id:63355) |
Wang, Frank Z. (2023) Near-Landauer-Bound quantum computing using single spins. IEEE Transactions on Quantum Engineering, . Article Number TQE.2023.3. ISSN 2689-1808. E-ISSN 2689-1808. (doi:10.1109/TQE.2023.3269039) (KAR id:101162) |
Wang, Frank Z. (2024) Spin-encoded quantum computer near ultimate physical limits. Quantum Information Processing, 23 (4). Article Number 152. ISSN 1573-1332. (doi:10.1007/s11128-024-04358-1) (KAR id:105676) |
Wang, Frank Z., Chua, Leon O., Yang, Xiao, Helian, Na, Tetzlaff, Ronald, Schmidt, Schmidt, Li, Ling, Carrasco, Jose Manuel Garcia, Chen, Wanlong, Chu, Dominique and others. (2013) Adaptive Neuromorphic Architecture (ANA). Neural Networks, 45 (1). pp. 111-116. ISSN 0893-6080. (doi:10.1016/j.neunet.2013.02.009) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:33638) |
Wang, Frank Zhigang (2023) Beyond Memristors: Neuromorphic Computing Using Meminductors. Micromachines, 14 (2). Article Number 486. ISSN 2072-666X. (doi:10.3390/mi14020486) (KAR id:105780) |
Wang, Hui and Ho, Anthony T.S. and Li, Shujun (2021) OR-Benchmark: An Open and Reconfigurable Digital Watermarking Benchmarking Framework. In: Computer Security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 243-260. ISBN 978-3-030-66503-6. E-ISBN 978-3-030-66504-3. (doi:10.1007/978-3-030-66504-3_15) (KAR id:84857) |
Wang, Meng, Chen, Kung, Khoo, Siau-Cheng (2006) On the Pursuit of Static and Coherent Weaving. In: Foundations of Aspect-Oriented Languages Workshop. . (KAR id:47461) |
Wang, Meng and Chen, Kung and Khoo, Siau-Cheng (2006) Type-Directed Weaving of Aspects for Higher-order Functional Languages. In: Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation. ACM, pp. 78-87. ISBN 1-59593-196-1. (doi:10.1145/1111542.1111555) (KAR id:47467) |
Wang, Meng and Gibbons, Jeremy and Matsuda, Kazutaka and Hu, Zhenjiang (2010) Gradual Refinement: Blending Pattern Matching with Data Abstraction. In: Mathematics of Program Construction 10th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 397-425. ISBN 978-3-642-13320-6. E-ISBN 978-3-642-13321-3. (doi:10.1007/978-3-642-13321-3_22) (KAR id:47472) |
Wang, Meng, Gibbons, Jeremy, Matsuda, Kazutaka, Hu, Zhenjiang (2013) Refactoring pattern matching. Science of Computer Programming, 78 (11). pp. 2216-2242. ISSN 0167-6423. (doi:10.1016/j.scico.2012.07.014) (KAR id:47478) |
Wang, Meng and Gibbons, Jeremy and Wu, Nicolas (2011) Incremental Updates for Efficient Bidirectional Transformations. In: Proceedings of the 16th ACM SIGPLAN international conference on Functional programming. ACM, New York, USA, pp. 392-403. ISBN 978-1-4503-0865-6. (doi:10.1145/2034773.2034825) (KAR id:47477) |
Wang, Meng and Najd, Shayan (2014) Semantic Bidirectionalization Revisited. In: Proceedings of the ACM SIGPLAN 2014 Workshop on Partial Evaluation and Program Manipulation. PEPM Partial Evaluation and Program Manipulation . ACM, New York, USA. ISBN 978-1-4503-2619-3. (doi:10.1145/2543728.2543729) (KAR id:47482) |
Wang, Meng and Oliveira, Bruno (2009) What Does Aspect-Oriented Programming Mean for Functional Programmers? In: WGP '09 Proceedings of the 2009 ACM SIGPLAN workshop on Generic programming. ICFP International Conference on Functional Programming . ACM, New York, USA, pp. 37-48. ISBN 978-1-60558-510-9. (doi:10.1145/1596614.1596621) (KAR id:47471) |
Wang, Yafei, Pan, Bo, Tu, Wei, Liu, Peng, Jiang, Bei, Gao, Chao, Lu, Wei, Jui, Shangling, Kong, Linglong (2022) Sample Average Approximation for Stochastic Optimization with Dependent Data: Performance Guarantees and Tractability. In: 36th AAAI Conference on Artificial Intelligence. . (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:91884) |
Wang, Yi and Kerridge, Simon and Smith, Peter and Foster, Simon and Coppin, Steve and Trowell, Setphen (2011) Integration of CERIF, ESB and Cloud in the Development of a National Global Research and Administrative Management System. In: Metadata and Semantic Research. Springer, pp. 245-255. ISBN 978-3-642-24730-9. (doi:10.1007/978-3-642-24731-6_26) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:29308) |
Wang, Zichi, Li, Shujun, Zhang, Xinpeng (2019) Towards Improved Steganalysis: When Cover Selection is Used in Steganography. IEEE Access, 7 . pp. 168914-168921. ISSN 2169-3536. (doi:10.1109/ACCESS.2019.2955113) (KAR id:79178) |
Wazan, Ahmad Samer, Laborde, Romain, Chadwick, David W., Barrere, Francois, Benzekri, Abdelmalek, Habbal, Abid M.M., Kaiiali, Mustafa (2017) Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. Security and Communication Networks, 2017 (690714). pp. 1-23. ISSN 1939-0114. E-ISSN 1939-0122. (doi:10.1155/2017/6907146) (KAR id:60311) |
Webber, J. Beau W. (1989) A Pipe has two ends. Using APL in a multiprocess/multiprocessor environment. A proposal for a flexible but easy to use syntax. Apl Quad Quote, 20 (1). pp. 1-2. (doi:10.1145/379199.379200) (KAR id:13447) |
Wei, Yun-gang, Lu, Yang, Hu, Xiaoyan, Sun, Bo (2013) Research and Application of Access Control Technique in 3D Virtual Reality System OpenSim. In: 2013 Sixth International Symposium on Computational Intelligence and Design. . pp. 65-68. IEEE E-ISBN 978-0-7695-5079-4. (doi:10.1109/ISCID.2013.130) (KAR id:80976) |
McEwan, Alistair A. and Schneider, S. and Ifill, W. and Welch, Peter H., eds. (2007) Communicating Process Architectures 2007: WoTUG-30. Concurrent Systems Engineering, 65 . IOS Press, US, Amsterdam, 528 pp. ISBN 978-1-58603-767-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:12962) |
Welch, Peter H. and Brown, Neil C.C. and Moores, James and Chalmers, Kevin and Sputh, Bernhard H. C. (2007) Integrating and extending JCSP. In: McEwan, Alistair A. and Schneider, S. and Ifill, W. and Welch, Peter H., eds. Communicating Process Architectures 2007: WoTUG-30. Concurrent Systems Engineering (Volume). IOS Press, US, Amsterdam, pp. 349-370. ISBN 978-1-58603-767-3. (KAR id:12959) |
Welch, Peter H. and Justo, George R. R. and Willcock, Colin J. (1993) High-level paradigms for deadlock-free high-performance systems. In: Grebe, R. and Hektor, J. and Hilton, S.C. and Jane, M.R. and Welch, Peter H., eds. Transputer Applications and Systems 93 Transputer Applications and Systems 93. Transputer & Occam Engineering., 36 . IOS press, Amsterdam, pp. 981-1004. ISBN 90-5199-140-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20738) |
Welch, Peter H., Wood, David C. (1993) Image tracking in real-time: a transputer emulation of some early mammalian vision processes. Image and Vision Computing, 11 (4). pp. 221-228. ISSN 0262-8856. (doi:10.1016/0262-8856(93)90039-J) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20739) |
Wickerson, John, Batty, Mark, Sorensen, Tyler, Constantinides, George A. (2017) Automatically Comparing Memory Consistency Models. In: ACM SIGPLAN Notices - POPL '17. POPL 2017 Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. POPL Principles of Programming Languages . pp. 190-204. ACM, New York, USA ISBN 978-1-4503-4660-3. (doi:10.1145/3093333.3009838) (KAR id:63503) |
Wiiliams, Nick, Li, Shujun (2017) Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model. In: Proceedings of 2017 3rd IEEE International Conference on Cybernetics. . pp. 471-478. IEEE, USA ISBN 978-1-5386-2201-8. E-ISBN 978-1-5386-2200-1. (doi:10.1109/CYBConf.2017.7985810) (KAR id:74278) |
Williamson, Jon (2004) Bayesian Nets and Causality: Philosophical and Computational Foundations. Oxford University Press, Oxford, 250 pp. ISBN 978-0-19-853079-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:7454) |
Williamson, Jon (2001) Bayesian Networks for Logical Reasoning. In: Proceedings of the AAAI Fall Symposium on using Uncertainty within Computation. Association for the Advancement of Artificial Intelligence, pp. 136-143. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:7396) |
Williamson, Jon (2001) Foundations for Bayesian Networks. In: Corfield, David and Williamson, Jon, eds. Foundations of Bayesianism. Applied Logic Series (24). Kluwer Academic Publishers Group, Dordrecht, pp. 75-115. ISBN 1-4020-0223-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:7387) |
Williamson, Jon (2005) Objective Bayesian Nets. In: Artemov, Sergei and Barringer, Howard and Garcez, Artur d'Avila, eds. We Will Show Them: Essays in Honour of Dov Gabbay. College Publications, London, pp. 713-730. ISBN 978-1-904987-26-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:7369) |
Wilson, E. (1992) Guiding lawyers - mapping law into hypertext. Artificial Intelligence Review, 6 (2). pp. 161-189. ISSN 0269-2821. (doi:10.1007/bf00150232) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22282) |
Wilson, E. and Lindley, I. and Pullen, S. (1992) Callguide: using programmable hypertext as a shell for call programs. In: Computer Assisted Learning 4th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 592-615. ISBN 978-3-540-55578-0. E-ISBN 978-3-540-47221-6. (doi:10.1007/3-540-55578-1_102) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22284) |
Wilson, Eve (1994) Using Corpora as a Resource in Language Teaching. Computers and Education, 23 . pp. 41-51. ISSN 0360-1315. (doi:10.1016/0360-1315(94)90031-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20109) |
Wilson, John J., Palaniappan, Ramaswamy (2011) Analogue mouse pointer control via an online steady state visual evoked potential (SSVEP) brain-computer interface. Journal of Neural Engineering, 8 (2). pp. 1-6. ISSN 1741-2560. (doi:10.1088/1741-2560/8/2/025026) (KAR id:48271) |
Wilson, John J., Palaniappan, Ramaswamy (2009) Augmenting a SSVEP BCI through single cycle analysis and phase weighting. In: Proceedings of 4th International IEEE EMBS Conference on Neural Engineering. . pp. 371-374. IEEE ISBN 978-1-4244-2072-8. E-ISBN 978-1-4244-2073-5. (doi:10.1109/NER.2009.5109310) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:48272) |
Wood, David C. and Welch, Peter H. (1996) The Kent retargetable occam compiler. In: Oneill, B.C. and Transputer User, Grp, eds. Parallel processing developments : WoTUG-19 ; proceedings of the 19th World Occam and Transputer User Group Technical Meeting. Concurrent Systems Engineering . IOS Press, pp. 143-166. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18589) |
Wusteman, Judith (1996) Electronic journal formats. Program: Electronic Library and Information Systems, 30 (4). pp. 319-343. ISSN 0033-0337. (doi:10.1108/eb047235) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18595) |
Wusteman, Judith (1992) Explanation-based learning - a survey. Artificial Intelligence Review, 6 (3). pp. 243-262. ISSN 0269-2821. (doi:10.1007/bf00155763) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22288) |
Xiao, Guohui, Lanti, Davide, Kontchakov, Roman, Komla-Ebri, Sarah, Kalayci, Elem G\"zel, Ding, Linfang, Corman, Julien, Cogrel, Benjamin, Calvanese, Diego, Botoeva, Elena and others. (2020) The Virtual Knowledge Graph System Ontop. In: The Semantic Web – ISWC 2020 - 19th International Semantic Web Conference. The Semantic Web - ISWC 2020 - 19th International Semantic Web Conference Part II. Lecture Notes in Computer Science , 12507. pp. 259-277. Springer ISBN 978-3-030-62418-7. E-ISBN 978-3-030-62419-4. (doi:10.1007/978-3-030-62466-8_17) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90817) |
Xu, Yang, Guo, Jie, Qiu, Weidong, Huang, Zheng, Altuncu, Enes, Li, Shujun (2023) “Comments Matter and The More The Better!”: Improving Rumor Detection with User Comments. In: Proceedings of the 2022 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022). . pp. 383-390. IEEE ISBN 978-1-6654-9425-0. (doi:10.1109/TrustCom56396.2022.00060) (KAR id:97593) |
YANG, XIAO (2014) Memristor based neural networks: Feasibility, theories and approaches. Doctor of Philosophy (PhD) thesis, University of Kent,. (KAR id:49041) |
Yadav, Supriya, Howells, Gareth (2019) Secure device identification using multidimensional mapping. In: Proceddings of Eighth IEEE International Conference on Emerging Security Technologies. Proceddings of Eighth IEEE International Conference on Emerging Security Technologies. . IEEE, New York, NY, USA E-ISBN 978-1-7281-5546-3. (doi:10.1109/EST.2019.8806218) (KAR id:75460) |
Yan, Li, Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2014) Limitations on information-theoretically-secure quantum homomorphic encryption. Physical Review A, 90 (5). Article Number 050303. ISSN 2469-9926. E-ISSN 2469-9934. (doi:10.1103/PhysRevA.90.050303) (KAR id:58149) |
Yang, Xiao, Chen, Wanlong, Wang, Frank Z. (2013) A Memristor-CAM (Content Addressable Memory) Cell: New Design and Evaluation. In: International Conference on Computer Science and Information Technology. . pp. 1045-1048. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:33630) |
Yilmaz, Yagiz, Cetin, Orcun, Ozturk, Omer Said, Ekmekcioglu, Emre, Arief, Budi, Hernandez-Castro, Julio C. (2024) Assessing the Silent Frontlines: Exploring the Impact of DDoS Hacktivism in the Russo-Ukrainian War. In: 40th Annual Computer Security Applications Conference (ACSAC'24), 9-13 December 2024, Hawaii, USA. (In press) (KAR id:107797) |
Yong, Yoke Leng, Lee, Yunli, Gu, Xiaowei, Angelov, Plamen P, Ngo, David Chek Ling, Shafipour, Elnaz (2018) Foreign currency exchange rate prediction using neuro-fuzzy systems. Procedia Computer Science, 144 . pp. 232-238. ISSN 1877-0509. (doi:10.1016/j.procs.2018.10.523) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90406) |
Yuan, Haiyue, Boakes, Matthew, Ma, Xiao, Cao, Dongmei, Li, Shujun (2023) Visualising Personal Data Flows: Insights from a Case Study of Booking.com. In: Lecture Notes in Business Information Processing. Intelligent Information Systems: CAiSE Forum 2023, Zaragoza, Spain, June 12–16, 2023, Proceedings. 477. pp. 52-60. Springer Cham, Cham, Germany E-ISBN 978-3-031-34674-3. (doi:10.1007/978-3-031-34674-3_7) (KAR id:101789) |
Yuan, Haiyue and Li, Shujun (2020) MATLAB software prototype for detecting vehicle convoys based on ANPR (Automated Number Plate Recognition) data. NA Electronic files. (Unpublished) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:80296) |
Yuan, Haiyue, Li, Shujun, Rusconi, Patrice (2021) CogTool+: Modeling human performance at large scale. ACM Transactions on Computer-Human Interaction, 28 (2). Article Number 7. ISSN 1073-0516. E-ISSN 1557-7325. (doi:10.1145/3447534) (KAR id:87545) |
Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 251-264. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_17) (KAR id:69559) |
Yuan, Xin, Guo, Jie, Qiu, Weidong, Huang, Zheng, Li, Shujun (2023) Support or Refute: Analyzing the Stance of Evidence to Detect Out-of-Context Mis- and Disinformation. In: Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing. . pp. 4268-4280. Association for Computational Linguistics (doi:2023.emnlp-main.259) (KAR id:104246) |
Yuvaraj, R., Murugappan, M., Ibrahim, Norlinah Mohamed, Sundaraj, Kenneth, Omar, Mohd Iqbal, Mohamad, Khairiyah, Palaniappan, Ramaswamy (2014) Detection of emotions in Parkinson's disease using higher order spectral features from brain's electrical activity. Biomedical Signal Processing and Control, 14 . pp. 108-116. ISSN 1746-8094. (doi:10.1016/j.bspc.2014.07.005) (KAR id:48275) |
Yuvaraj, Rajamanickam, Murugappan, Murugappan, Ibrahim, Norlinah Mohamed, Omar, Mohd Iqbal, Sundaraj, Kenneth, Mohamad, Khairiyah, Palaniappan, Ramaswamy, Satiyan, Marimuthu (2014) Emotion classification in Parkinson's disease by higher-order spectra and power spectrum features using EEG signals: A comparative study. Journal of Integrative Neuroscience, 13 (1). pp. 89-120. ISSN 0219-6352. E-ISSN 1757-448X. (doi:10.1142/S021963521450006X) (KAR id:48273) |
Yuvaraj, Rajamanickam, Murugappan, Murugappan, Ibrahim, Norlinah Mohamed, Sundaraj, Kenneth, Omar, Mohd Iqbal, Mohamad, Khairiyah, Palaniappan, Ramaswamy, Satiyan, Marimuthu (2014) Inter-hemispheric EEG coherence analysis in Parkinson's disease : Assessing brain activity during emotion processing. Journal of Neural Transmission, 122 (2). pp. 237-252. ISSN 0300-9564. E-ISSN 1435-1463. (doi:10.1007/s00702-014-1249-4) (KAR id:48279) |
Yuvaraj, Rajamanickam, Murugappan, Murugappan, Ibrahim, Norlinah Mohamed, Sundaraj, Kenneth, Omar, Mohd Iqbal, Mohamad, Khairiyah, Palaniappan, Ramaswamy (2014) Optimal set of EEG features for emotional state classification and trajectory visualization in Parkinson's disease. International Journal of Psychophysiology, 94 (3). pp. 482-495. ISSN 0167-8760. (doi:10.1016/j.ijpsycho.2014.07.014) (KAR id:48277) |
Zhang, Leishi, Kujis, J.N., Liu, Xiaohui (2008) Information visualization for DNA microarray data analysis: A critical review. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 38 (1). pp. 42-54. ISSN 1094-6977. (doi:10.1109/tsmcc.2007.906065) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:15353) |
Zhang, Lingwei, Deng, Yuhui, Zhu, Weiheng, Zhou, Jipeng, Wang, Frank Z. (2015) Skewly replicating hot data to construct a power-efficient storage cluster. Journal of Network and Computer Applications (IF=2.762, ranked A at ERA), 50 . pp. 168-179. (doi:10.1016/j.jnca.2014.06.005) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:44007) |
Zhang, Xinzheng, Su, Hang, Zhang, Ce, Gu, Xiaowei, Tan, Xiaoheng, Atkinson, Peter M. (2021) Robust unsupervised small area change detection from SAR imagery using deep learning. ISPRS Journal of Photogrammetry and Remote Sensing, 173 . pp. 79-94. ISSN 0924-2716. (doi:10.1016/j.isprsjprs.2021.01.004) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:90408) |
Zhao, Liming, Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2016) Fast graph operations in quantum computation. Physical Review A, 93 (3). Article Number 032314. ISSN 2469-9926. E-ISSN 2469-9934. (doi:10.1103/PhysRevA.93.032314) (KAR id:58072) |
Zheng, Yi, Hague, Jim (1991) Dmt - a Demonstration Tool. Software: Practice and Experience, 21 (9). pp. 949-961. ISSN 0038-0644. (doi:10.1002/spe.4380210905) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:22803) |
Zoghlami, Firas, Kurrek, Philip, Jocas, Mark, Masala, Giovanni Luca, Salehi, Vahid (2021) Design of a Deep Post Gripping Perception Framework for Industrial Robots. Journal of Computing and Information Science in Engineering, 21 (2). ISSN 1530-9827. (doi:10.1115/1.4048204) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:91402) |
Zou, Longhao, Tal, Irina, Covaci, Alexandra, Ibarrola, Eva, Ghinea, Gheorghita, Muntean, Gabriel-Miro (2017) Can Multisensorial Media Improve Learner Experience? In: Proceedings of the 8th ACM on Multimedia Systems Conference. . pp. 315-320. ACM, New York ISBN 978-1-4503-5002-0. (doi:10.1145/3083187.3084014) (KAR id:73205) |
de Abreu Moreira, Dilvan and Walczowski, Les T. (1994) Automated placement for a leaf cell generator. In: International Symposium on Circuits and Systems. Institute of Electrical and Electronics Engineers, Piscataway NJ, A117-A120. ISBN 0-7803-1915-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:19919) |
de Abreu Moreira, Dilvan, Walczowski, Les T. (1997) Using software agents to generate VLSI layouts. IEEE Expert, 12 (6). pp. 26-32. ISSN 0885-9000. (doi:10.1109/64.642958) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:18198) |
de Carvalho, Andre C.P.L.F., Fairhurst, Michael (1998) Applying adaptive logic networks to character recognition. Pattern Recognition Letters, 19 (5-6). pp. 469-473. ISSN 0167-8655. (doi:10.1016/S0167-8655(98)00020-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:17689) |
de Carvalho, Andre C.P.L.F., Fairhurst, Michael, Bisset, D.L. (1994) An Integrated Boolean Neural-Network for Pattern-Classification. Pattern Recognition Letters, 15 (8). pp. 807-813. ISSN 0167-8655. (doi:10.1016/0167-8655(94)90009-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20162) |
de Carvalho, Andre C.P.L.F., Fairhurst, Michael, Bisset, D.L. (1994) A Modular Boolean Architecture for Pattern Recognition. In: 1994 IEEE International Conference on Neural Networks. 1-7. pp. 4349-4352. I E E E ISBN 0-7803-1901-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:20163) |
de Lemos, Rogério, Timmis, Jon, Ayara, Modupe, Forrest, Simon (2007) Immune-inspired adaptable error detection for automated teller machines. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 37 (5). pp. 873-886. ISSN 1094-6977. (doi:10.1109/TSMCC.2007.900662) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:2028) |
van Leemput, Koen, Maes, Frederik, Bello, Fernando, Vandermeulen, Dirk, Colchester, Alan C. F., Suetens, Paul (1999) Automated segmentation of MS lesions from multi-channel MR images. In: Taylor, Chris and Colchester, Alan C. F., eds. Medical Image Computing and Computer-Assisted Intervention, MICCAI'99, Proceedings. Lecture Notes in Computer Science , 1679. pp. 11-21. Springer-Verlag Berlin ISBN 3-540-66503-X. (doi:10.1007/10704282_2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:16705) |
Čagalja, Mario, Perković, Toni, Bugarić, Marin, Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:10.1016/j.pmcj.2014.09.002) (KAR id:69556) |