Items where Subject is "Q Science > QA Mathematics (inc Computing science) > QA 75 Electronic computers. Computer science"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator's name | Item Type | Date | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | V | W | Y | Z | Č
Number of items at this level: 457.

A

Abdullah, Sophiana Chua and Cooley, Roger (2000) The use of constraint logic programming in the development of adaptive tests. In: Gauthier, Gilles and Frasson, Claude and VanLehn, Kurt, eds. Intelligent Tutoring Systems, Proceedings. Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence, 1839. Springer-Verlag Berlin p. 650. ISBN 3-540-67655-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ackerman, Margareta and Goel, Ashok and Johnson, Colin G. and Jordanous, Anna and Leon, Carlos and Perez y Perez, Rafael and Toivonen, Hannu and Ventura, Dan (2017) Teaching Computational Creativity. In: Goel, Ashok and Jordanous, Anna and Pease, Alison, eds. Proceedings of the Eighth International Conference on Computational Creativity. Georgia Institute of Technology, Atlanta, Georgia, US pp. 9-16. ISBN 978-0-692-89564-1. (Full text available)
[img]
Preview

Agrafiotis, Ioannis and Nurse, Jason R. C. and Goldsmith, Michael and Creese, Sadie and Upton, David (2018) A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, . ISSN 2057-2085. E-ISSN 2057-2093. (doi:https://doi.org/10.1093/cybsec/tyy006) (Full text available)
[img]
Preview
[img]
Preview

Akehurst, David H. (2000) An 00 visual language definition approach supporting multiple views. In: 2000 IEEE International Symposium on Visual Languages, Proceedings. IEEE Computer Society Workshop on Visual Langauages. I.E.E.E. Computer Society pp. 57-58. ISBN 0-7695-0840-5. (doi:https://doi.org/10.1109/VL.2000.874350) (Full text available)
[img]

Alcaide, Almudena and Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Bayesian rational exchange. International Journal of Information Security, 7 (1). pp. 85-100. ISSN 1615-5262. (doi:https://doi.org/10.1007/s10207-007-0039-5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Alcaide, Almudena and Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Cryptanalysis of Syverson's Rational Exchange Protocol. International Journal of Network Security, 7 (2). pp. 151-156. ISSN 2152-5064. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Alglave, Jade and Batty, Mark and Donaldson, Alastair F. and Gopalakrishnan, Ganesh and Ketema, Jeroen and Poetzl, Daniel and Sorensen, Tyler and Wickerson, John (2015) GPU Concurrency: Weak Behaviours and Programming Assumptions. In: ACM SIGPLAN Notices. Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '15, Istanbul, Turkey, March 14-18, 2015. ACM Press pp. 577-591. ISBN 978-1-4503-2835-7. (doi:https://doi.org/10.1145/2694344.2694391) (Full text available)
[img]
Preview

Alhanahnah, Mohannad and Chadwick, David (2016) Boosting usability for Protecting Online Banking Applications Against APTs. In: Amman, Jordan, ed. 2016 Cybersecurity and Cyberforensics Conference (CCC) (2016). pp. 70-76. ISBN 978-1-5090-2658-6. (doi:https://doi.org/10.1109/CCC.2016.13) (Full text available)
[img]
Preview

Ali, Mohammed Aamir and Arief, Budi and Emms, Martin and van Moorsel, Aad (2017) Does The Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Security & Privacy, 15 (2). pp. 78-86. ISSN 1540-7993. (Full text available)
[img]
Preview

Alim, Abdul and Clegg, Richard and Mai, Luo and Rupprecht, Lukas and Seckler, Eric and Costa, Paolo and Pietzuch, Peter and Wolf, Alexander L. and Sultana, Nik and Crowcroft, Jon and Madhavapeddy, Anil and Moore, Andrew and Mortier, Richard and Kolehini, Masoud and Oviedo, Luis and McAuley, Derek and Migliavacca, Matteo (2016) FLICK: Developing and Running Application-Specific Network Services. In: Proceedings of USENIX ATC ’16 2016 USENIX Annual Technical Conference. pp. 1-15. ISBN 978-1-931971-30-0. (Full text available)
[img]
Preview

Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Lecture Notes in Computer Science, 10292. Springer International Publishing AG pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:https://doi.org/10.1007/978-3-319-58460-7_13) (Full text available)
[img]
Preview

Allington, Daniel and Jordanous, Anna and Dueck, Byron (2015) Music, value, and networks in the digital world. http://valuingelectronicmusic.org (Full text available)
[img]
Preview

Alqahtani, Saeed Ibrahim and Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, New York, NY, USA Article No. 19. ISBN 978-1-4503-5257-4. (doi:https://doi.org/10.1145/3098954.3098984) (Full text available)
[img]
Preview

Alsalibi, B.a and Venkat, I.a and Subramanian, K.G.a and Lutfi, S.L.a and De Wilde, P.b (2015) The impact of bio-inspired approaches toward the advancement of face recognition. ACM Computing Surveys, 48 (1). ISSN 0360-0300. (doi:https://doi.org/10.1145/2791121) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anzellotti, G. and Battiti, Roberto and Lazzizzera, I. and Soncini, G. and Zorat, Alessandro and Sartori, Alvise and Tecchiolli, Giampietro and Lee, Peter (1995) Totem:. a Highly Parallel Chip for Triggering Applications with Inductive Learning Based on the Reactive Tabu Search. In: International Journal of Modern Physics C. World Scientific Publ Co Pte Ltd pp. 555-560. (doi:https://doi.org/10.1142/S0129183195000423) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Arapinis, Myrto and Cheval, Vincent and Delaune, Stéphanie (2015) Composing security protocols: from confidentiality to privacy. In: Focardi, Ricardo and Myers, Andrew, eds. Principles of Security and Trust. Lecture Notes in Computer Science. Springer Berlin Heidelberg, London, UK pp. 324-343. ISBN 978-3-662-46666-7. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img] [img]

Arapinis, Myrto and Cheval, Vincent and Delaune, Stéphanie (2012) Verifying Privacy-Type Properties in a Modular Way. In: 25th IEEE Computer Security Foundations Symposium (CSF'12), June 2012, Cambridge Massachusetts, USA. (doi:https://doi.org/10.1109/CSF.2012.16) (Full text available)
[img]
Preview
[img]
Preview

Asensio-Cubero, J and Gan, J Q and Palaniappan, Ramaswamy (2013) Multiresolution analysis over simple graphs for brain computer interfaces. Journal of Neural Engineering, 10 (4). 046014. ISSN 1741-2560. (doi:https://doi.org/10.1088/1741-2560/10/4/046014) (Full text available)
[img]
Preview

Asghar, Hassan Jameel and Steinfeld, Ron and Li, Shujun and Kaafa, Mohamed Ali and Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. (doi:https://doi.org/10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Aslan, Çağrı B. and Sağlam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of 9th International Conference on Social Media & Society. ACM ISBN 978-1-4503-6334-1. (doi:https://doi.org/10.1145/3217804.3217919) (Full text available)
[img]
Preview

Ayad, Mohamed and Fleischmann, Peter (2008) On the decomposition of rational functions. Journal of Symbolic Computation, 43 (4). pp. 259-274. ISSN 0747-7171. (doi:https://doi.org/10.1016/j.jsc.2007.10.009) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

B

Bailey, Christopher and Chadwick, David W and de Lemos, Rogério and Siu, Kristy WS (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet. Springer Berlin Heidelberg, pp. 100-111. (Full text available)
[img]
Preview

Baker, Jon and Efstratiou, Christos (2017) Next2Me: Capturing Social Interactions through Smartphone Devices using WiFi and Audio signals. In: Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM pp. 412-421. ISBN 978-1-4503-5368-7. (doi:https://doi.org/10.1145/3144457.3144500) (Full text available)
[img]
Preview

Barnes, David J. and Hopkins, Tim (2000) The evolution and testing of a medium sized numerical package. In: Langtangen, Hans Petter and Bruaset, Are Magnus and Quak, Ewald, eds. Advances In Software Tools For Scientific Computing. Springer-Verlag Berlin pp. 225-237. ISBN 3-540-66557-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barrero, David and Hernandez-Castro, Julio C. and Peris-Lopez, Pedro and Camacho, David (2014) A genetic tango attack against the David–Prasad RFID ultra‐lightweight authentication protocol. Expert Systems, 31 (1). pp. 9-19. ISSN 0266-4720. (doi:https://doi.org/10.1111/j.1468-0394.2012.00652.x) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Bassett, Eryl E. and Brooks, Stephen P. and Morgan, Byron J. T. (1994) Minitab macros for multivariate analysis. Computational Statistics and Data Analysis, 17 (1). pp. 100-101. ISSN 0167-9473. (doi:https://doi.org/10.1016/0167-9473(94)90031-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Battiti, Roberto and Lee, Peter and Sartori, Alvise and Tecchiolli, Giampietro (1995) Special-purpose parallel architectures for high-performance machine learning. In: Hertzberger, Bob and Serazzi, Giuseppe, eds. Hight-Performance Computing and Networking. Springer-Verlag Berlin p. 944. ISBN 3-540-59393-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Batty, Mark and Dodds, Mike and Gotsman, Alexey (2013) Library abstraction for C/C++ concurrency. In: ACM SIGPLAN Notices. Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. ACM Press pp. 235-248. ISBN 978-1-4503-1832-7. (doi:https://doi.org/10.1145/2429069.2429099) (Full text available)
[img]
Preview

Batty, Mark and Memarian, Kayvan and Nienhuis, Kyndylan and Pichon-Pharabod, Jean and Sewell, Peter (2015) The Problem of Programming Language Concurrency Semantics. In: Lecture Notes in Computer Science. 24th European Symposium on Programming, ESOP 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings. Springer-Verlag Berlin pp. 283-307. ISBN 978-3-662-46668-1. (doi:https://doi.org/10.1007/978-3-662-46669-8_12) (Full text available)
[img]
Preview

Batty, Mark and Memarian, Kayvan and Owens, Scott and Sarkar, Susmit and Sewell, Peter (2012) Clarifying and compiling C/C++ concurrency: from C++11 to POWER. In: ACM SIGPLAN Notices. ACM Press pp. 509-520. ISBN 978-1-4503-1083-3. (doi:https://doi.org/10.1145/2103656.2103717) (Full text available)
[img]
Preview

Batty, Mark and Owens, Scott and Sarkar, Susmit and Sewell, Peter and Weber, Tjark (2011) Mathematizing C++ concurrency. In: ACM SIGPLAN Notices. Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. ACM Press pp. 55-66. ISBN 978-1-4503-0490-0. (doi:https://doi.org/10.1145/1926385.1926394) (Full text available)
[img]
Preview

Beckett, David J. (1995) Combined Log System. In: Computer Networks and ISDN Systems. Elsevier Science BV, Amsterdam, Netherlands pp. 1089-1096. (doi:https://doi.org/10.1016/0169-7552(95)00013-W) (Full text available)
[img]
Preview

Beckett, David J. and Welch, Peter H. (1996) Emulating a secure multicasting bus using occam 2.1. In: Oneill, B.C. and Transputer User, Grp, eds. Proceedings of the 19th world occam and transputer user group technical meeting on Parallel processing developments. I O S Press pp. 59-73. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bekhet, Saddam and Ahmed, Amr and Altadmri, Amjad and Hunter, Andrew (2015) Compressed video matching: Frame-to-frame revisited. Multimedia Tools and Applications, . pp. 1-16. ISSN 1380-7501. E-ISSN 1573-7721. (doi:https://doi.org/10.1007/s11042-015-2887-8) (Full text available)
[img]
Preview

Bello, Gema and Hernandez-Castro, Julio and Camacho, David (2016) Detecting discussion communities on vaccination in twitter. Future Generation Computer Systems, 66 . pp. 125-136. ISSN 0167-739X. (doi:https://doi.org/10.1016/j.future.2016.06.032) (Full text available)
[img]
Preview

Blanchette, Jasmin Christian and Weber, Tjark and Batty, Mark and Owens, Scott and Sarkar, Susmit (2011) Nitpicking C++ concurrency. In: Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming. pp. 113-124. ISBN 978-1-4503-0776-5. (doi:https://doi.org/10.1145/2003476.2003493) (Full text available)
[img]
Preview

Blanco-Gonzalo, R. and Lunerti, C. and Sanchez- Reillo, R. and Guest, Richard (2018) Biometrics: Accessibility challenge or opportunity? PlosOne, 13 (3). e0194111. ISSN 1932-6203. (doi:https://doi.org/10.1371/journal.pone.0194111) (Full text available)
[img]
Preview

Blasco Alis, Jorge and Hernandez-Castro, Julio C. and Tapiador, Juan E. and Ribagorda, Arturo (2012) Bypassing information leakage protection with trusted applications. Computers and Security, 31 (4). pp. 557-568. ISSN 0167-4080. (doi:https://doi.org/10.1016/j.cose.2012.01.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Blasco Alis, Jorge and Hernandez-Castro, Julio C. and de Fuentes, Jose Maria and Ramos, Benjamin (2012) A framework for avoiding steganography usage over HTTP. Journal of Network and Computer Applications, 35 (1). pp. 491-501. ISSN 1084-8045. (doi:https://doi.org/10.1016/j.jnca.2011.10.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) How to commit a bank robbery (or stop one) using the internet. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2014) Russia and China prepare to fight US internet domination. . The Conversation UK Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) The UK government is working in a Snowden-free bubble. . The Conversation Internet only. (Full text available)
[img]

Boiten, Eerke Albert (2013) iPhone hack shows security isn’t at our fingertips just yet. . Scientific American Internet only. (Full text available)
[img]

Boiten, Eerke Albert and Derrick, John and Bowman, Howard and Steen, Maarten (1999) Constructive consistency checking for partial specification in Z. Science of Computer Programming, 35 (1). pp. 29-75. ISSN 0167-6423. (doi:https://doi.org/10.1016/S0167-6423(99)00006-4) (Full text available)
[img]
Preview
[img]
Preview

Bovey, John D. (1995) Building a Thesaurus for a Collection of Cartoon Drawings. Journal of Information Science, 21 (2). pp. 115-122. ISSN 1352-7460. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bovey, John D. (1996) Event-based personal retrieval. Journal of Information Science, 22 (5). pp. 357-366. ISSN 0165-5515. (doi:https://doi.org/10.1177/016555159602200504) (Full text available)
[img]
Preview
[img]
Preview

Bovey, John D. (1993) A graphical retrieval-system. Journal of Information Science, 19 (3). pp. 179-187. ISSN 0165-5515. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowles, Stephen and Hernandez-Castro, Julio C. (2015) The first 10 years of the Trojan Horse defence. Computer Fraud & Security, 2015 (1). pp. 5-13. ISSN 1361-3723. (doi:https://doi.org/10.1016/S1361-3723(15)70005-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Bowman, Howard and Blair, Gordon S. and Blair, Lynne and Chetwynd, Amanda G. (1995) Formal description of distributed multimedia systems: An assessment of potential techniques. Computer Communications, 18 (12). pp. 964-977. ISSN 0140-3664. (doi:https://doi.org/10.1016/0140-3664(96)81596-9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard and Blair, Gordon S. and Blair, Lynne and Chetwynd, Amanda G. (1993) Time Versus Abstraction In Formal Description. In: Tenney, Richard L. and Amer, Paul D. and Uyar, M.Umit, eds. Formal Description Techniques, Vi. Elsevier Science Publ B V pp. 467-482. ISBN 0-444-81773-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard and Derrick, John and Brinksma, E. (2000) Selected papers from the Second IFIP Int'l Conference on Formal Methods for Open Object Based Distributed Systems, 1997. IEEE Transactions on Software Engineering, 26 (7). pp. 577-578. ISSN 0098-5589. (doi:https://doi.org/10.1109/TSE.2000.859528) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard and Derrick, John and Linington, Peter F. and Steen, Maarten (1996) Cross-viewpoint consistency in open distributed processing. Software Engineering Journal, 11 (1). pp. 44-57. ISSN 0268-6961. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard and Filetti, Marco and Alsufyani, Abdulmajeed and Janssen, Dirk P. and Su, Li (2014) Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough. PLoS ONE, 9 (3). e90595. ISSN 1932-6203. (doi:https://doi.org/10.1371/journal.pone.0090595) (Full text available)
[img]
Preview

Bowman, Howard and Filetti, Marco and Wyble, Brad and Olivers, Christian (2013) Attention is more than prediction precision [Commentary on target article]. Behavioral and Brain Sciences, 36 (3). pp. 206-208. ISSN 0140-525X. (doi:https://doi.org/10.1017/S0140525X12002324) (Full text available)
[img]
Preview

Brooks, Stephen P. and Morgan, Byron J. T. (1994) Automatic Starting Point Selection For Function Optimization. Statistics and Computing, 4 (3). pp. 173-177. ISSN 0960-3174. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Chloë and Efstratiou, Christos and Leontiadis, Ilias and Quercia, Daniele and Mascolo, Cecilia and Scott, James and Key, Peter (2014) The Architecture of Innovation: Tracking Face-to-Face Interactions with UbiComp Technologies. In: ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), 13-17 Sep 2014, Seattle, WA, USA. (doi:https://doi.org/10.1145/2632048.2632056) (Full text available)
[img]
Preview

Brown, Neil C.C. (2004) C++CSP Networked. In: Communicating Process Architectures 2004. Concurrent Systems Engineering Series (62). IOS Press pp. 185-200. ISBN 978-1-58603-458-0. (Full text available)
[img]
Preview

Bruna, Maria and Grigore, Radu and Kiefer, Stefan and Ouaknine, Joel and Worrell, James (2016) Proving the Herman-Protocol Conjecture. In: Chatzigiannakis, Ioannis and Mitzenmacher, Michael and Rabani, Yuval and Sangiorgi, Davide, eds. 43rd International Colloquium on Automata, Languages, and Programming (ICALP 2016). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany 104:1-104:12. ISBN 978-3-95977-013-2. (doi:https://doi.org/10.4230/LIPIcs.ICALP.2016.104) (Full text available)
[img]
Preview

Buchberger, Bruno and Craciun, Adrian and Jebelean, Tudor and Kovacs, Laura and Temur, Kutsia and Koji, Nakagawa and Piroi, Florina and Popov, Nikolaj and Robu, Judit and Rosenkranz, Markus and Windsteiger, Wolfgang (2006) Theorema: Towards computer-aided mathematical theory exploration. Journal of Applied Logic, 4 (4). pp. 470-504. ISSN 1570-8683. (doi:https://doi.org/10.1016/j.jal.2005.10.006) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

C

Cakic, Jovan (2000) Intelligent infrastructure that support system's changes. In: Loganantharaj, Rasiah and Palm, Gunther and Ali, Moonis, eds. Intelligent Problem Solving. Methodologies and Approaches. Springer-Verlag Berlin pp. 351-356. ISBN 3-540-67689-9. (doi:https://doi.org/10.1007/3-540-45049-1_43) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Canuto, Anne and Howells, Gareth and Fairhurst, Michael (2000) An investigation of the effects of variable vigilance within the RePART neuro-fuzzy network. Journal of Intelligent & Robotic Systems, 29 (4). pp. 317-334. ISSN 0921-0296. (doi:https://doi.org/10.1023/A:1008159908688) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Canuto, Anne and Howells, Gareth and Fairhurst, Michael (2000) The use of confidence measures to enhance combination strategies in multi-network neuro-fuzzy systems. Connection Science, 12 (3-4). pp. 315-331. ISSN 0954-0091. (doi:https://doi.org/10.1080/09540090010014089) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Carter, Janet (1999) Collaboration or Plagiarism: What happens when students work together. In: 4th Annual SIGCSE/SIGCUE Conference on Innovation and Technology in Computer Science Education (ITICSE 99), Jun 27-Jul 01, 1999, Krakow, Poland. (doi:https://doi.org/10.1145/384267.305848) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Carter, Janet and Jenkins, Tony (1999) Gender and programming: What's going on? In: 4th Annual SIGCSE/SIGCUE Conference on Innovation and Technology in Computer Science Education (ITICSE 99), Jun 27-Jul 01, 1999, Krakow, Poland. (doi:https://doi.org/10.1145/384267.305824) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W. and Su, L. and Laborde, Romain (2006) Coordinating access control in grid services. In: Concurrency and Computation: Practice and Experience. John Wiley and Sons pp. 1071-1094. (doi:https://doi.org/10.1002/cpe.1284) (Full text available)
[img]
Preview

Chadwick, David W. and Zhao, Gansen and Otenko, Sassa and Laborde, Romain and Su, Linying and Nguyen, Tuan Anh (2008) PERMIS: a modular authorization infrastructure. In: Concurrency and Computation: Practice and Experience. John Wiley and Sons pp. 1341-1357. (doi:https://doi.org/10.1002/cpe.1313) (Full text available)
[img]
Preview

Chadwick, David W and Inman, George (2013) The Trusted Attribute Aggregation Service (TAAS)-Providing an Attribute Aggregation Layer for Federated Identity Management. In: Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. (Full text available)
[img]
Preview
[img]
Preview

Chen, Huankai and Wang, Frank Z. and Helian, Na (2013) A Cost-Efficient and Reliable Resource Allocation Model Based on Cellular Automaton Entropy for Cloud Project Scheduling. International Journal of Advanced Computer Science and Applications, 4 (4). pp. 7-14. ISSN 2156-5570. (Full text available)
[img]
Preview

Chen, Kung and Weng, Shu-Chun and Lin, Jia-Yin and Wang, Meng and Khoo, Siau-Cheng (2011) Side-Effect Localization for Lazy, Purely Functional Languages via Aspects. Higher-Order and Symbolic Computation, . pp. 1-39. ISSN 1388-3690. (Full text available)
[img]
Preview

Chen, Kung and Weng, Shu-Chun and Wang, Meng and Khoo, Siau-Cheng and Chen, Chung-Hsin (2007) A Compilation Model for Aspect-Oriented Polymorphically Typed Functional Languages. In: Proceedings of the 14th International Symposium on Static Analysis. ISBN 978-3-540-74060-5. (Full text available)
[img]
Preview

Chen, Kung and Weng, Shu-Chun and Wang, Meng and Khoo, Siau-Cheng and Chen, Chung-Hsin (2010) Type-Directed Weaving of Aspects for Polymorphically Typed Functional Languages. Science of Computer Programming, 75 (11). pp. 1048-1076. ISSN 0167-6423. (doi:https://doi.org/10.1016/j.scico.2010.04.001) (Full text available)
[img]
Preview

Chen, Wanlong and Yang, Xiao and Wang, Frank Z. (2013) Delayed Switching Applied to Memristor Content Addressable Memory Cell. In: Proceedings of the World Congress on Engineering 2013. International Association of Engineers pp. 354-357. ISBN 978-988-19251-0-7. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Chen, Xian and Megson, G.M (1995) A General Methodology of Partition and Mapping for Given Regular Arrays. IEEE Transactions on Parallel and Distributed Systems, 6 (10). pp. 1100-1107. ISSN 1045-9219. (doi:https://doi.org/10.1109/71.473518) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H. (1995) Bootstrap methods in computer simulation experiments. In: Alexopoulos, C. and Kang, K. and Lilegdon, W.R and Goldsman, D., eds. 1995 Winter Simulation Conference Proceedings. I E E E pp. 171-177. ISBN 0-7803-3018-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H. (1994) Selecting Input Models. In: Tew, J.D. and Manivannan, M.S. and Sadowski, D.A. and Seila, A.F., eds. 1994 Winter Simulation Conference Proceedings. I E E E pp. 184-191. ISBN 0-7803-2109-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H. and Holland, Wayne S. (1998) Two-point methods for assessing variability in simulation output. Journal of Statistical Computation and Simulation, 60 (3). pp. 183-205. ISSN 0094-9655. (doi:https://doi.org/10.1080/00949659808811887) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H. and Holland, Wayne S. and Hughes, N.A. (1996) Selection of input models using bootstrap goodness-of-fit. In: 1996 Winter Simulation Conference (WSC 96), Dec 08-11, 1996, Coronado, Ca. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H. and Traylor, L. (1995) Characterization of material strength properties using probabilistic mixture models. In: Carlomagno, G.M. and Brebbia, C.A., eds. Computational Methods and Experimental Measurement VII. Computational Mechanics Publications Ltd pp. 553-560. ISBN 1-85312-313-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheval, Vincent (2014) APTE: An Algorithm for Proving Trace Equivalence. In: 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'14), Avril 2014, Grenoble, France. (doi:https://doi.org/10.1007/978-3-642-54862-8_50) (Full text available)
[img]
Preview

Cheval, Vincent (2012) Automatic verification of cryptographic protocols: privacy-type properties. Doctor of Philosophy (PhD) thesis, ENS-Cachan. (Full text available)
[img]
Preview

Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie (2010) Automating Security Analysis: Symbolic Equivalence of Constraint Systems. In: Giesl, Jürgen and Hähnle, Reiner, eds. Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR'10). Lecture Notes in Computer Science, 6173. Springer-Verlag Berlin, Edinburgh, Scotland, UK pp. 412-426. ISBN 978-3-642-14202-4. E-ISBN 978-3-642-14203-1. (doi:https://doi.org/10.1007/978-3-642-14203-1_35) (Full text available)
[img]
Preview

Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie (2011) Trace Equivalence Decision: Negative Tests and Non-determinism. In: 18th ACM Conference on Computer and Communications Security (CCS'11), October 2011, Chicago, Illinois, USA. (doi:https://doi.org/10.1145/2046707.2046744) (Full text available)
[img]
Preview

Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie (2017) A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation, 255 (part 1). pp. 94-125. ISSN 0890-5401. E-ISSN 1090-2651. (doi:https://doi.org/10.1016/j.ic.2017.05.004) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Cheval, Vincent and Cortier, Véronique (2015) Timing attacks: symbolic framework and proof techniques. In: Focardi, Riccardo and Myers, Andrew, eds. Lecture Notes in Computer Science. Principles of Security and Trust. Springer Berlin Heidelberg, London, UK pp. 280-299. ISBN 978-3-662-46665-0. E-ISBN 978-3-662-46666-7. (doi:https://doi.org/10.1007/978-3-662-46666-7_15) (Full text available)
[img]
Preview
[img]
Preview

Cheval, Vincent and Cortier, Véronique and Delaune, Stéphanie (2013) Deciding equivalence-based properties using constraint solving. Theoretical Computer Science, 492 . pp. 1-39. ISSN 0304-3975. (doi:https://doi.org/10.1016/j.tcs.2013.04.016) (Full text available)
[img]
Preview

Cheval, Vincent and Cortier, Véronique and Plet, Antoine (2013) Lengths May Break Privacy – Or How to Check for Equivalences with Length. In: 25th International Conference on Computer Aided Verification (CAV'13), July 2013, St Petersburg, Russia. (doi:https://doi.org/10.1007/978-3-642-39799-8_50) (Full text available)
[img]
Preview
[img]
Preview

Cheval, Vincent and Delaune, Stéphanie and Ryan, Mark (2014) Tests for Establishing Security Properties. In: 9th International Symposium on Trustworthy Global Computing (TGC'14), September 2014, Roma, Italy. (doi:https://doi.org/10.1007/978-3-662-45917-1_6) (Full text available)
[img]
Preview

Chivers, Daniel and Rodgers, Peter (2013) Exploring Local Optima in Schematic Layout. In: Proceedings of the International Conference on Distributed Multimedia Systems 2013. Knowledge Systems Institute (Full text available)
[img]
Preview

Chu, Dominique and Barnes, David J. and Perkins, Samuel (2014) Amorphous computing in the presence of stochastic disturbances. Biosystems, 125 . pp. 32-42. ISSN 0303-2647. (doi:https://doi.org/10.1016/j.biosystems.2014.09.010) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Clear, David and Ibbetson, Alan L. and Collinson, Peter (1994) Exporting Home on Demand to PCS. In: Proceedings of the Eight Systems Administration Conference (LISA VIII). Usenix Assoc pp. 139-147. ISBN 1-880446-64-2. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cobbah, W.G.K. and Fairhurst, Michael (2000) Computer analysis of handwriting dynamics during dopamimetic tests in Parkinson's disease. In: Vajda, F., ed. Proceedings: 26TH Euromicro Conference. Ieee Computer Soc A414-A418. ISBN 0-7695-0781-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Colchester, Alan C. F. and Ourselin, Sébastien and Zhu, Yonggen and Bardinet, Eric and He, Yang and Roche, Alexis and Al-Sarraj, Safa and Nailon, Bill and Ironside, James and Ayache, Nicholas (2000) 3-D reconstruction of macroscopic optical brain slice images. In: 3rd International Conference on Medical Image Computing and Computer-Assisted Intervention, Pittsburgh, Pennsylvania. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Contrastin, Mistral and Orchard, Dominic A. and Rice, Andrew C. (2018) Automatic reordering for dataflow safety of Datalog. Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming, . (Full text available)
[img]

Cooper, Helen and Jennings, Liz (2016) ORCID EPrints Implementation Survey Analysis. Working paper. University of Central Lancashire/University of Bath, UK https://doi.org/10.17030/clok.00015668. (doi:https://doi.org/10.17030/clok.00015668) (Full text available)
[img]
Preview

Corneli, Joseph and Jordanous, Anna and Shepperd, Rosie and Llano, Maria Teresa and Misztal, Joanna and Colton, Simon and Guckelsberger, Christian (2015) Computational Poetry Workshop: Making Sense of Work in Progress. In: 6th International Conference on Computational Creativity, June 29 - July 2, 2015, Utah, US. (Full text available)
[img]
Preview

Cronk, Jonathan and Sharp, John A. (1995) A framework for deciding what to outsource in information technology. Journal of Information Technology, 10 (4). pp. 259-267. ISSN 0268-3962. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cross, M. and Keech, M. and Liddell, Heather and Steel, John and Walshaw, C and Welch, Peter H. (1995) Implementing a strategy for the promotion of high performance computing in the UK. In: Hertzberger, Bob and Serazzi, Giuseppe, eds. Hight-Performance Computing and Networking. Springer-Verlag Berlin p. 941. ISBN 3-540-59393-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

D

Dallas, I. (1993) UCSG UNIX applications workshop, university-of-kent, July 6 and 7 1993. University Computing, 15 (4). pp. 195-200. ISSN 0265-4385. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Daniel, Joshua and El-Moussa, Fadi and Ducatel, Géry and Pawar, Pramod and Sajjad, Ali and Rowlingson, Robert and Dimitrakos, Theo (2015) Integrating Security Services in Cloud Service Stores. In: Trust Management IX. IFIP Advances in Information and Communication Technology. Trust Management IX. IFIP Advances in Information and Communication Technology, 454. Springer pp. 226-239. ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:https://doi.org/10.1007/978-3-319-18491-3_19) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Davies, Nigel and Davy, M.J. and Blair, Gordon S. and Mariani, John A. (1993) Object invocation and management in the zenith distributed multimedia information-system. Information and Software Technology, 35 (5). pp. 259-266. ISSN 0950-5849. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dealmeida, F.A. and Welch, Peter H. (1994) A Parallel Emulator for a Multi-Processor Dataflow Machine. In: DeGloria, A. and Jane, M.R. and Marini, D., eds. Transputer Applications and Systems ''94, Proceedings of the 1994 World Transputer Congress. I O S Press pp. 259-272. ISBN 90-5199-177-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Deng, Yuhui and Huang, Xinyu and Song, Liangshan and Zhou, Yongtao and Wang, Frank Z. (2017) Memory Deduplication: An Effective Approach to Improve the Memory System. Journal of Information Science and Engineering, 33 (5). pp. 1103-1120. ISSN 1016-2364. (Full text available)
[img]
Preview

Dent, Alan and Hanna, Keith (1993) Reasoning about array structures using a dependently typed logic. In: Agnew, David and Claesen, Luc J. M. and Camposano, Raul, eds. Computer hardware description languages and their application. Elsevier Science Publ B V pp. 207-224. ISBN 0-444-81641-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Derrick, John and Boiten, Eerke Albert (1998) Testing refinements by refining tests. In: Bowen, Jonathan P. and Fett, A. and Hinchey, Michael G., eds. ZUM '98: The Z Formal Specification Notation. Lecture Notes in Computer Science, 1493. Springer, Berlin pp. 265-283. ISBN 3-540-65070-9. (Full text available)
[img]
Preview
[img]
Preview

Dib, Fadi K. and Rodgers, Peter (2018) Graph drawing using tabu search coupled with path relinking. PLOS ONE, 13 (5). e0197103. ISSN 1932-6203. (doi:https://doi.org/10.1371/journal.pone.0197103) (Full text available)
[img]
Preview

Dodds, Mike and Batty, Mark and Gotsman, Alexey (2018) Compositional Verification of Compiler Optimisations on Relaxed Memory. In: Lecture Notes in Computer Science. Programming Languages and Systems: 27th European Symposium on Programming, ESOP 2018 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018 Proceedings. Springer ISBN 978-3-319-89883-4. (doi:https://doi.org/10.1007/978-3-319-89884-1_36) (Full text available)
[img]
Preview

Dunn, Stuart and Hedges, Mark and Jordanous, Anna and Storz, Christoph (2012) Comparing the informatics of text and Cultural Heritage: the SAWS project. In: Computer Applications and Quantitative Methods in Archaeology, 2012, Southampton, UK. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Duregard, Jonas and Jansson, Patrik and Wang, Meng (2012) Feat: Functional Enumeration of Algebraic Types. In: Proceedings of the 2012 Haskell Symposium. pp. 61-72. ISBN 978-1-4503-1574-6. (doi:https://doi.org/10.1145/2364506.2364515) (Full text available)
[img]
Preview

Dziallas, Sebastian (2015) Characterizing Graduateness in Computing Education. In: International Computing Education Research, 9-13 August 2015, Omaha, NE. (doi:https://doi.org/10.1145/2787622.2787739) (Full text available)
[img]
Preview

Dziallas, Sebastian (2016) Examining Graduateness through Narratives. In: ICER '16 Proceedings of the 2016 ACM Conference on International Computing Education Research. ACM pp. 291-292. ISBN 978-1-4503-4449-4. (doi:https://doi.org/10.1145/2960310.2960353) (Full text available)
[img]
Preview

Dziallas, Sebastian and Fincher, Sally (2015) ACM Curriculum Reports: A Pedagogic Perspective. In: International Computing Education Research, 9-13 August 2015, Omaha, NE. (doi:https://doi.org/10.1145/2787622.2787714) (Full text available)
[img]
Preview

Dziallas, Sebastian and Fincher, Sally (2016) Aspects of Graduateness in Computing Students’ Narratives. In: ICER 16 Proceedings of the 2016 ACM Conference on International Computing Education Research. pp. 181-190. ISBN 978-1-4503-4449-4. (doi:https://doi.org/10.1145/2960310.2960317) (Full text available)
[img]
Preview

Dziallas, Sebastian and Fincher, Sally (2015) Exploring Students’ Conception of Learning through Narratives. In: Engineering Education Research Network Annual Symposium, 5-6 November 2015, Cambridge, UK. (Full text available)
[img]
Preview

Dziallas, Sebastian and Fincher, Sally (2014) Learning to Learn: The Co-Evolution of an Institution and its Students. In: 2014 IEEE Frontiers in Education Conference Proceedings. IEEE pp. 852-858. ISBN 978-1-4799-3921-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dziallas, Sebastian and Fincher, Sally and Johnson, Colin G. and Utting, Ian (2017) A First Look at the Year in Computing. In: ITiCSE '17 Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education. Association for Computing Machinery pp. 275-280. ISBN 978-1-4503-4704-4. (doi:https://doi.org/10.1145/3059009.3059049) (Full text available)
[img]
Preview

Dziallas, Sebastian and Fincher, Sally and Johnson, Colin G. and Utting, Ian (2017) The Year in Computing Initiative. In: 5th Annual Symposium of the United Kingdom & Ireland Engineering Education Research Network. Aston University, Birmingham, UK ISBN 978-1-85449-443-6. (Full text available)
[img]
Preview

de Abreu Moreira, Dilvan and Walczowski, Les T. (1994) Automated placement for a leaf cell generator. In: International Symposium on Circuits and Systems. Institute of Electrical and Electronics Engineers, Piscataway NJ, A117-A120. ISBN 0-7803-1915-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Abreu Moreira, Dilvan and Walczowski, Les T. (1997) Using software agents to generate VLSI layouts. IEEE Expert, 12 (6). pp. 26-32. ISSN 0885-9000. (doi:https://doi.org/10.1109/64.642958) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Carvalho, Andre C.P.L.F. and Fairhurst, Michael (1998) Applying adaptive logic networks to character recognition. Pattern Recognition Letters, 19 (5-6). pp. 469-473. ISSN 0167-8655. (doi:https://doi.org/10.1016/S0167-8655(98)00020-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Carvalho, Andre C.P.L.F. and Fairhurst, Michael and Bisset, D.L. (1994) An Integrated Boolean Neural-Network for Pattern-Classification. Pattern Recognition Letters, 15 (8). pp. 807-813. ISSN 0167-8655. (doi:https://doi.org/10.1016/0167-8655(94)90009-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Carvalho, Andre C.P.L.F. and Fairhurst, Michael and Bisset, D.L. (1994) A Modular Boolean Architecture for Pattern Recognition. In: 1994 IEEE International Conference on Neural Networks. I E E E pp. 4349-4352. ISBN 0-7803-1901-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogério and Timmis, Jon and Ayara, Modupe and Forrest, Simon (2007) Immune-inspired adaptable error detection for automated teller machines. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 37 (5). pp. 873-886. ISSN 1094-6977. (doi:https://doi.org/10.1109/TSMCC.2007.900662) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

E

Edwards, Marion and Cooley, Roger (1993) Expertise in Expert-Systems - Knowledge Acquisition for Biological Expert-Systems. Computer Applications in the Biosciences, 9 (6). pp. 657-665. ISSN 0266-7061. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Edwards, Michael R. (1997) Developing a model of expertise for a taxonomic expert system. In: Bridge, Paul and Jeffries, Peter and Morse, David R. and Scott, Peter R., eds. Information Technology, Plant Pathology and Biodiversity. Cabi Publishing. Cabi Publishing-C a B Int, Wallingford pp. 183-196. ISBN 0-85199-217-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Efstratiou, Christos and Leontiadis, Ilias and Picone, Marco and Rachuri, Kiran and Mascolo, Cecilia and Crowcroft, Jon (2012) Sense and Sensibility in a Pervasive World. In: Proceedings of 10th International Conference on Pervasive Computing (PERVASIVE 2012), June 2012, Newcastle, UK. (Full text available)
[img]
Preview

Efstratiou, Christos and Rachuri, Kiran and Das, Sajal (2015) IEEE PerCom 2015. IEEE Pervasive Computing, 14 (3). pp. 84-88. ISSN 1536-1268. E-ISSN 1558-2590. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Elsehely, Ehab and Sobhy, Mohammed (2000) Real time radar target detection under jamming conditions using wavelet transform on FPGA device. IEEE International Symposium On Circuits and Systems, 4 . pp. 545-548. (doi:https://doi.org/10.1109/ISCAS.2000.858809) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Elston, David A. and Jayasinghe, G. and Buckland, Stephen T. and MacMillan, Douglas C. and Aspinall, R.J. (1997) Adapting regression equations to minimize the mean squared error of predictions made using covariate data from a GIS. International Journal of Geographical Information Science, 11 (3). pp. 265-280. ISSN 1365-8816. (doi:https://doi.org/10.1080/136588197242392) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Alcaide, Almudena and Ribagorda, Arturo (2008) On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security, 3 (2). pp. 166-172. ISSN 1556-6013. (doi:https://doi.org/10.1109/TIFS.2008.920724) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

F

Fairhurst, Michael and Rahman, Ahmad Fuad Rezaur (1996) A new multi-expert architecture for high performance object recognition. In: Solomon, Susan S. and Batchelor, Bruce G. and Waltz, Frederick M., eds. Machine vision applications, architectures, and systems integration V. Spie - Int Soc Optical Engineering pp. 140-151. ISBN 0-8194-2310-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Faridani, A. and Dimond, Keith R. (1994) A Transputer-Based Vision System for Mobile Robots. In: Arabnia, Hamid R., ed. Transputer Research and Applications 7. I O S Press pp. 68-78. ISBN 90-5199-187-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Filho, E.C.D.B.C. and Fairhurst, Michael and Bisset, D.L. (1991) Adaptive pattern-recognition using goal seeking neurons. Pattern Recognition Letters, 12 (3). pp. 131-138. ISSN 0167-8655. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fincher, Sally (2015) What are we doing when we teach computing in schools? Communications of the ACM, 58 (5). pp. 24-26. ISSN 0001-0782. (doi:https://doi.org/10.1145/2742693) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fincher, Sally and Dziallas, Sebastian and Brandes, Ofra and Kolikant, Yifat and Shapiro, Ben (2016) Negotiating Academic Communities: Narratives of Life-long Learners. In: 12th International Conference of the Learning Sciences (ICLS), 20-24 June 2016, Singapore. (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fincher, Sally and Knox, Daniel (2013) The Porous Classroom: Professional Practices in the Computing Curriculum. IEEE Computer, 46 (9). pp. 44-51. ISSN 0018-9162. (doi:https://doi.org/10.1109/MC.2013.261) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Flur, Shaked and Sarkar, Susmit and Pulte, Christopher and Nienhuis, Kyndylan and Maranget, Luc and Gray, Kathryn E. and Sezgin, Ali and Batty, Mark and Sewell, Peter (2017) Mixed-Size Concurrency: ARM, POWER, C/C++11, and SC. In: ACM SIGPLAN Notices - POPL '17. POPL 2017 Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. ACM ISBN 978-1-4503-4660-3. (doi:https://doi.org/10.1145/3009837.3009839) (Full text available)
[img]
Preview

Forrester, Michael A. (1994) Hyperemedia and Indexing - Identifying Approprate Models from User Studies. In: Raitt, David I. and Jeapes, Ben, eds. Online Information 93. International online information meeting. Information Today Inc, 143 Old Marlton Pike, Medford, NJ 08055, Medford, USA pp. 313-324. ISBN 0-904933-85-7. (doi:https://doi.org/10.1177/096100069502700117) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

G

Genaim, Samir and King, Andy (2008) Inferring non-suspension conditions for logic programs with dynamic scheduling. ACM Transactions on Computational Logic, 9 (3). pp. 182-196. ISSN 1529-3785. (doi:https://doi.org/10.1145/1352582.1352585) (Full text available)
[img]
Preview

Gerig, Guido and Welti, Daniel and Guttmann, Charles and Colchester, Alan C. F. and Szekely, Gabor (2000) Exploring the discrimination power of the time domain for segmentation and characterization of active lesions in serial MR data. Medical Image Analysis, 4 (1). pp. 31-42. ISSN 1361-8415. (doi:https://doi.org/10.1016/S1361-8415(00)00005-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gerig, Guido and Welti, Daniel and Guttmann, Charles and Colchester, Alan C. F. and Szekely, Gabor (1998) Exploring the discrimination power of the time domain for segmentation and characterization of lesions in serial MR data. In: Wells, William M. and Colchester, Alan C. F. and Delp, Scott, eds. Medical Image Computing and Computer-Assisted Interventation. Lecture Notes in Computer Science, 1496. Springer-Verlag Berlin, Berlin pp. 469-480. ISBN 3-540-65136-5. (doi:https://doi.org/10.1007/BFb0056232) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gillham, Michael and Howells, Gareth and Pepper, Matthew G. and Kelly, Stephen W. (2016) Developing Effective Intelligent Assistance for the Powered Wheelchair User. In: Proceedings of 2016 Technology for Independence Conference (T4i) RAatE. (doi:https://doi.org/10.15131/shef.data.4256522) (Full text available)
[img]
Preview

Glenat, Stephanie and Heutte, Laurent and Paquet, Thierry and Guest, Richard and Fairhurst, Michael and Linnell, Tristan A. (2008) The Development of a computer-assisted tool for the assessment of neuropsychological drawing tasks. International Journal of Information Technology & Decision Making, 7 (4). pp. 751-767. ISSN 0219-6220. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Goel, Ashok and Jordanous, Anna and Pease, Alison (2017) Preface: Proceedings of the Eighth International Conference on Computational Creativity, ICCC 2017, Atlanta — 19 - 23 June. In: Goel, Ashok and Jordanous, Anna and Pease, Alison, eds. 8th International Conference on Computational Creativity. ACC ISBN 978-0-692-89564-1. (Full text available)
[img]
Preview

Gootjes-Dreesbach, Ellis Luise (2015) Awareness & Perception in Rapid Serial Visual Presentation. Doctor of Philosophy (PhD) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Grzes, Marek (2017) Reward Shaping in Episodic Reinforcement Learning. In: Proc. of the 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2017). ACM pp. 565-573. (Full text available)
[img]
Preview

Guest, Richard and Fairhurst, Michael and Potter, Jonathan (2000) Automated extraction of image segments from clinically diagnostic hand-drawn geometric shapes. Proceedsings of the 26th Euromicro Conference, Vols I and II, . A440-A446. ISSN 1089-6503. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Guest, Richard and Fairhurst, Michael and Potter, Jonathan and Donnelly, Nick (2000) Analysing constructional aspects of figure completion for the diagnosis of visuospatial neglect. International Conference on Pattern Recognition, 4 . pp. 316-319. ISSN 1051-4651. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

H

Haas, S. and Thornley, D.A. and Zhu, M. and Dobinson, R.W. and Heeley, R. and Madsen, N.A.H. and Martin, B. (1998) Results from the Macrame 1024 node switching network. In: Computer Physics Communications. Elsevier pp. 206-210. (doi:https://doi.org/10.1016/S0010-4655(97)00178-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Haas, S. and Thornley, D.A. and Zhu, M. and Dobinson, R.W. and Martin, B. (1998) The Macrame 1024 node switching network. Microprocessors and Microsystems, 21 (7-8). pp. 511-518. ISSN 0141-9331. (doi:https://doi.org/10.1016/S0141-9331(98)00044-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hajdusek, Michal and Pérez-Delgado, Carlos A and Fitzsimons, Joseph F (2015) Device-independent verifiable blind quantum computation. arXiv preprint arXiv:1502.02563, . (Unpublished) (Full text available)
[img]
Preview

Hanna, Keith (2000) Reasoning about analog-level implementations of digital systems. Formal Methods in System Design, 16 (2). pp. 127-158. ISSN 0925-9856. (doi:https://doi.org/10.1023/A:1008791128550) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith (1998) Reasoning about imperfect digital systems. In: Moller, Bernhard Moller and Tucker, John V, eds. Prospects for Hardware Foundations. Lecture Notes in Computer Science, 1546 . Springer-Verlag Berlin, Berlin, pp. 333-355. ISBN 03029743. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith and Daeche, Neil (1992) The Veritas Design Logic - a Users View. IFIP Transactions A-Computer Science And Technology, 10 . pp. 301-310. ISSN 0926-5473. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith and Daeche, Neil (1992) The Veritas Design Logic - a Users View. In: Stavridou, V. and Melham, Thomas F. and Boute, R.T., eds. IFIP Transactions A-Computer Science And Technology. Elsevier Science Publ B V pp. 301-310. ISBN 0-444-89686-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith and Daeche, Neil and Howells, Gareth (1992) Implementation of the Veritas Design Logic. In: Proceedings of the International Conference on Theorem Provers in Circuit Design: Theory, Practice and Experience. IFIP Transactions A-Computer Science and Technology, 10. Elsevier Science BV, Nijmegen, Netherlands pp. 77-94. ISBN 0-444-89686-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Harrison, Joe and Roberts, David L. and Hernandez-Castro, Julio (2016) Assessing the extent and nature of wildlife trade on the dark web. Conservation Biology, 30 (4). pp. 900-904. ISSN 0888-8892. (doi:https://doi.org/10.1111/cobi.12707) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hedges, Mark and Jordanous, Anna and Dunn, Stuart and Roueché, Charlotte and Kuster, Marc W and Selig, Thomas and Bittorf, Michael and Artes, Waldemar (2012) New models for collaborative textual scholarship. In: 6th IEEE International Conference on Digital Ecosystems Technologies (DEST 2012), 2012, Campione d'Italia, Switzerland. (Full text available)
[img]
Preview

Hedges, Mark and Jordanous, Anna and Lawrence, K. Faith and Roueché, Charlotte and Tupman, Charlotte (2017) Computer-Assisted Processing of Intertextuality in Ancient Languages. Journal of Data Mining and Digital Humanities, . ISSN 2416-5999. E-ISSN 2416-5999. (Full text available)
[img]
Preview

Hernandez-Castro, Julio C. and Boiten, Eerke Albert (2014) Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014 (2). pp. 5-8. ISSN 1361-3723. (doi:https://doi.org/10.1016/S1361-3723(14)70461-0) (Full text available)
[img]
Preview

Hernandez-Castro, Julio C. and Boiten, Eerke Albert (2013) First Kent Cyber Security Survey. . Internet only. (Full text available)
[img]
Preview

Hernandez-Castro, Julio C. and Boiten, Eerke Albert and Barnoux, Magali F.L. (2014) Second Kent Cyber Security Survey. . Internet only. (Full text available)
[img]
Preview

Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Peris-Lopez, Pedro and Ribagorda, Arturo (2008) Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. Journal of Information Science and Engineering, 24 (5). pp. 1485-1504. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hernandez-Castro, Julio C. and Estévez-Tapiador, Juan M. and Peris-Lopez, Pedro and Clark, John A. and Talbi, El-Ghazali (2012) Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. International Journal of Foundations of Computer Science, 23 (2). pp. 543-553. ISSN 0129-0541. (doi:https://doi.org/10.1142/S0129054112400278) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hernandez-Castro, Julio C. and Tapiador, Juan E. and Palomar, Esther and Romero-Gonzalez, Angel (2010) Blind Steganalysis of Mp3stego. Journal of Information Science and Engineering, 26 (5). pp. 1787-1799. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hesketh, Richard (1991) Perly - unix with buttons. Software: Practice and Experience, 21 (11). pp. 1165-1187. ISSN 0038-0644. (doi:https://doi.org/10.1002/spe.4380211103) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hill, Steve (1995) The Lazy Z-Buffer. Information Processing Letters, 55 (2). pp. 65-70. ISSN 0020-0190. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hill, Steve (1995) Parallel imperative functional programming. In: Nixon, Paddy, ed. Transputer and Occam Developments. I O S Press pp. 33-46. ISBN 90-5199-222-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hirth, Matthias and Jacques, Jason and Rodgers, Peter and Scekic, Ognjen and Wybrow, Michael (2017) Crowdsourcing Technology to Support Academic Research. In: Archambault, Daniel and Purchase, Helen and Hossfeld, Tobias, eds. Evaluation in the Crowd. Crowdsourcing and Human-Centered Experiments. Lecture Notes In Computer Science . Springer, pp. 79-107. ISBN 978-3-319-66434-7. E-ISBN 978-3-319-66435-4. (doi:https://doi.org/10.1007/978-3-319-66435-4) (Full text available)
[img]
Preview

Hobbs, M.H.W. (2000) Email groups for learning and assessment. In: Joyce, Donald, ed. SIGCSE Bulletin. ACM p. 183. ISBN 1-58113-207-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Holden, Nicholas and Freitas, Alex A. (2008) Improving the performance of hierarchical classification with swarm intelligence. In: Marchiori, Elena and Moore, Jason H., eds. Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, Proceedings. Lecture Notes in Computer Science, 4973. Springer pp. 48-60. ISBN 978-3-540-78756-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hopkins, Tim (1992) Remark on Algorithm-540. Acm Transactions on Mathematical Software, 18 (3). pp. 343-344. ISSN 0098-3500. (doi:https://doi.org/10.1145/131766.131773) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hopkins, Tim (1996) Restructuring software: A case study. Software: Practice and Experience, 26 (8). pp. 967-982. ISSN 0038-0644. (doi:https://doi.org/10.1002/(SICI)1097-024X(199608)26:8<967::AID-SPE41>3.0.CO;2-G) (Full text available)
[img]
Preview
[img]
Preview

Hopkins, Tim and Welch, Peter H. (1996) Transputer data-flow solution for systems of linear equations. Concurrency-Practice and Experience, 8 (8). pp. 569-580. ISSN 1040-3108. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hou, Peixin and Hojjatoleslami, Ali and Petrou, Maria and Underwood, Craig Ian and Kittler, Josef (1998) Improved JPEG coding for remote sensing. In: International Conference on Pattern Recognition, 1998, Brisbane. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Howe, Jacob M. and King, Andy (2000) Abstracting numeric constraints with Boolean functions. Information Processing Letters, 75 (1-2). pp. 17-23. ISSN 0020-0190. (doi:https://doi.org/10.1016/S0020-0190(00)00081-8) (Full text available)
[img]
Preview
[img]

Howells, Gareth and Fairhurst, Michael and Bisset, D.L. (1995) BCN - A Novel Network Architecture for ram-Based Neurons. Pattern Recognition Letters, 16 (3). pp. 297-303. ISSN 0167-8655. (doi:https://doi.org/10.1016/0167-8655(94)00098-N) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Howells, Gareth and Fairhurst, Michael and Bisset, D.L. (1994) BCN - an Architecture for Weightless Ram-Base Neural Networks. In: 1994 IEEE International Conference on Neural Networks. I E E E pp. 1386-1390. ISBN 0-7803-1901-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Howells, Gareth and Fairhurst, Michael and Bisset, D.L. (1995) PCN: The Probabilistic Convergence Network. In: IEEE International Conference on Neural Networks Proceedings. IEEE pp. 1211-1214. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Howells, Gareth and Fairhurst, Michael and Rahman, Fuad (2000) An exploration of a new paradigm for weightless RAM-based neural networks. Connection Science, 12 (1). pp. 65-90. ISSN 0954-0091. (doi:https://doi.org/10.1080/095400900116203) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

University of Essex (2007) A Device to Generate a Machine Specific Identification Key. PCT/GB2007/002916. (doi:PCT/GB2007/002916) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

I

Ibbetson, Alan L. and Linington, Peter F. and Penny, Ian and Smith, Abraham B. and Tripp, Gerald (1996) Reducing the cost of remote procedure call. In: Schill, Alexander and Mittasch, Christian and Spaniol, Otto and Popien, Claudia, eds. Distributed Platforms. Chapman & Hall pp. 430-446. ISBN 0-412-73280-7. (doi:https://doi.org/10.1007/978-0-387-34947-3_32) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ibrahim, A.M.a and Venkat, I.a and Subramanian, K.G.b and Khader, A.T.a and De Wilde, P.c (2016) Intelligent evacuation management systems: A review. ACM Transactions on Intelligent Systems and Technology, 7 (3). ISSN 2157-6904. (doi:https://doi.org/10.1145/2842630) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

Iqbal, Musaddar and Freitas, Alex A. and Johnson, Colin G. (2008) Protein interaction inference using particle swarm optimization algorithm. In: Marchiori, Elena and Moore, Jason H., eds. Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, Proceedings. Lecture Notes in Computer Science, 4973. Springer pp. 61-70. ISBN 978-3-540-78756-3. (doi:https://doi.org/10.1007/978-3-540-78757-0_6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ireland, Tim (2017) Teaching architecture students to code: Thrills and spills. In: Proceedings of 35th Annual International Conference of eCAADe. ISBN 978-94-91207-12-9. (Full text available)
[img]
Preview

J

Jones, William and Chawdhary, Aziem and King, Andy (2015) Revisiting Volgenant-Jonker for Approximating Graph Edit Distance. In: Liu, Cheng-Lin and Luo, B. and Kropatsch, W.G. and Cheng, J., eds. Graph-based Representations in Pattern Recognition. Lecture Notes in Computer Science, 9069 . Springer, pp. 98-107. ISBN 978-3-319-18223-0. E-ISBN 978-3-319-18224-7. (doi:https://doi.org/10.1007/978-3-319-18224-7) (Full text available)
[img]
Preview

Jordan, Tobias and Oto, Costa and De Wilde, Philippe and Buarque de Lima Neto, Fernando (2017) Link-Prediction to Tackle the Boundary Specification Problem in Social Network Surveys. PLoS ONE, 12 (4). e0176094. ISSN 1932-6203. (doi:https://doi.org/10.1371/journal.pone.0176094) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

Jordanous, Anna (2011) Computer Models of Musical Creativity? A review of Cope (2005). Review of: Computer Models of Musical Creativity. David Cope (2005). MIT Press by UNSPECIFIED. AISB Quarterly, 132 (-). p. 10. ISSN 1476-3036. (Full text available)
[img]
Preview

Jordanous, Anna (2009) Conference Report: The Fourth Conference on Interdisciplinary Musicology (CIM08). Review of: Fourth Conference on Interdisciplinary Musicology, 2008 (CIM08) by UNSPECIFIED. AISB Quarterly, 128 (-). pp. 8-9. ISSN 1476-3036. (Full text available)
[img]
Preview

Jordanous, Anna (2010) Conference Review: Empirical approaches to Performance: Empirical Musicology II conference (25-26 March 2010, School of Music, University of Leeds, UK). Review of: Empirical approaches to Performance: Empirical Musicology II conference 2010 by UNSPECIFIED. Excursions, 1 (1). p. 1. ISSN 2044-4095. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2015) Enhancing information retrieval and resource discovery from data using the Semantic Web. In: 4th International Symposium on Emerging Trends and Technologies in Libraries and Information Services, 6-8 Jan 2015, Noida, UP, India. (Full text available)
[img]

Jordanous, Anna (2012) Evaluating computational creativity: a standardised procedure for evaluating creative systems and its application. Doctor of Philosophy (PhD) thesis, University of Sussex. (Full text available)
[img]
Preview

Jordanous, Anna (2011) Evaluating evaluation: Assessing progress in computational creativity research. In: Proceedings of the Second International Conference on Computational Creativity (ICCC-11). pp. 102-107. (Full text available)
[img]
Preview

Jordanous, Anna (2009) Evaluating machine creativity. In: Seventh ACM conference on Creativity and cognition, 2009, Berkeley, CA. (Full text available)
[img]
Preview

Jordanous, Anna (2016) Four PPPPerspectives on Computational Creativity in theory and in practice. Connection Science, 28 (2). pp. 194-216. ISSN 0954-0091. E-ISSN 1360-0494. (doi:https://doi.org/10.1080/09540091.2016.1151860) (Full text available)
[img]
Preview

Jordanous, Anna (2016) Has computational creativity successfully made it "Beyond the Fence" in musical theatre? In: Proceedings of the 7th International Conference on Computational Creativity. 7th International Conference on Computational Creativity. Sony CSL pp. 303-310. ISBN 978-2-7466-9155-1. (Full text available)
[img]
Preview

Jordanous, Anna (2013) Introducing Computational Creativity Research. . CreativityPost.com Internet. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2017) Review. Review of: Computation and the humanities : towards an oral history of digital humanities by Nyhan, J. and Flinn A., A.. ACM Computing Reviews, (Sep'17). Review #: CR145551. E-ISSN 1530-6585. (Full text available)
[img]

Jordanous, Anna (2014) Review of Digital Da Vinci: Computers in the Arts and Sciences (2014, Springer). Review of: Digital Da Vinci: Computers in the Arts and Sciences (2014, Springer) by UNSPECIFIED. ACM Computing Reviews, . p. 1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2013) Review: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. Type: Proceedings. Review of: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. by UNSPECIFIED. ACM Computing Reviews, . CR141093. ISSN 1308-0745. E-ISSN 1308-0745. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2015) Review: The POINT of creative collaborations between composers and computers. Review of: Patterns of intuition: Musical Creativity in the Light of Algorithmic Composition (Springer, 2015 ) by UNSPECIFIED. ACM Computing Reviews, (184827). p. 1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2007) Score following: An artificially intelligent musical accompanist. Master of Science (MSc) thesis, University of Edinburgh, UK.. (Full text available)
[img]
Preview

Jordanous, Anna (2012) A Standardised Procedure for Evaluating Creative Systems: Computational Creativity Evaluation Based on What it is to be Creative. Cognitive Computation, 4 (3). pp. 246-279. ISSN 1866-9956. E-ISSN 1866-9964. (doi:https://doi.org/10.1007/s12559-012-9156-1) (Full text available)
[img]
Preview

Jordanous, Anna (2014) What is Computational Creativity? . CreativityPost.com Online web platform. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2016) The longer term value of creativity judgements in computational creativity. In: Proceedings of AISB 2016’s Third International Symposium on Computational Creativity (CC2016). (Full text available)
[img]
Preview

Jordanous, Anna and Allington, Daniel and Dueck, Byron (2015) Measuring cultural value using social network analysis: a case study on valuing electronic musicians. In: 6th International Conference on Computational Creativity, June 29 - July 2, 2015, Utah, US. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Jordanous, Anna and Allington, Daniel and Dueck, Byron (2014) Online Networks and the Production of Value in Electronic Music. In: Digital Music Research Network Network One-Day Workshop (DMRN+9), 16 Dec 2014, Queen Mary's, London. (Unpublished) (Full text available)
[img] [img]

Jordanous, Anna and Allington, Daniel and Dueck, Byron (2014) Using online networks to analyse the value of electronic music. In: Proceedings of the 5th International Conference on Computational Creativity. (Full text available)
[img]
Preview

Jordanous, Anna and Keller, Bill (2012) Creativity Ontology. http://purl.org/creativity/ontology. (Full text available)
[img]

Jordanous, Anna and Keller, Bill (2016) Modelling Creativity: Identifying Key Components through a Corpus-Based Approach. PLoS ONE, 11 (10). pp. 1-27. ISSN 1932-6203. (doi:https://doi.org/10.1371/journal.pone.0162959) (Full text available)
[img]
Preview

Jordanous, Anna and Keller, Bill (2012) Weaving creativity into the Semantic Web: a language-processing approach. In: International Conference on Computational Creativity. Proceedings of the 3rd International Conference on Computational Creativity. pp. 216-220. (Full text available)
[img]
Preview

Jordanous, Anna and Lawrence, K Faith and Hedges, Mark and Tupman, Charlotte (2012) Exploring manuscripts: sharing ancient wisdoms across the semantic web. In: Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics (WIMS-12). p. 44. (Full text available)
[img]
Preview

Jordanous, Anna and Lawrence, K. Faith and Tupman, Charlotte (2013) Sharing Ancient Wisdoms: Dataset. RDF. Located at: http://www.ancientwisdoms.ac.uk/library/data/. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna and Roueché, Charlotte and Tupman, Charlotte and Lawrence, K. Faith and Hedges, Mark and Wakelnig, Elvira and Searby, Denis (2013) Sharing Ancient Wisdoms (SAWS) ontology. http://www.ancientwisdoms.ac.uk/. (Full text available)
[img]

Jordanous, Anna and Smaill, Alan (2008) Artificially intelligent accompaniment using Hidden Markov Models to model musical structure. In: Conference on Interdisciplinary Musicology, 2008, Thessaloniki, Greece. (Full text available)
[img]
Preview

Jordanous, Anna and Smaill, Alan (2009) Investigating the role of score following in automatic musical accompaniment. Journal of New Music Research, 38 (2). pp. 197-209. ISSN 0929-8215. E-ISSN 1744-5027. (doi:https://doi.org/10.1080/09298210903180245) (Full text available)
[img]
Preview
[img]
Preview

Jordanous, Anna and Stanley, Alan and Tupman, Charlotte (2012) Contemporary transformation of ancient documents for recording and retrieving maximum information: when one form of markup is not enough. In: Balisage: The Markup Conference 2012, 2012, Montreal, Canada. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna and Stanley, Alan and Tupman, Charlotte (2013) Reusing modern tools and techniques to reproduce and research ancient texts. In: Open Repositories, Prince Edward Island, Canada. (Full text available)
[img]
Preview

Jordanous, Anna and Tupman, Charlotte (2013) Sharing Ancient Wisdoms - supporting code. ancientwisdoms.ac.uk XSLT stylesheets. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna and Tupman, Charlotte and Stanley, Alan (2013) Contemporary solutions to retrieve and publish information in ancient documents using RDF and Islandora. In: Digital Humanities 2013, 2013, Lincoln, Nebraska. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Justo, George R. R. and Welch, Peter H. (1992) Serialization as a Paradigm for the Engineering of Parallel Programs. In: Etiemble, D. and Syre, J.C., eds. Lecture Notes in Computer Science. Lecture Notes in Computer Science, 605. Springer-Verlag Berlin, Berlin, Berlin pp. 975-976. ISBN 3-540-55599-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Justo, George R. R. and Welch, Peter H. (1993) Serialization as a paradigm for the engineering of parallel programs. Computers and Artificial Intelligence, 12 (3). pp. 229-249. ISSN 0232-0274. (doi:https://doi.org/10.1007/3-540-55599-4_149) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

K

Kahrs, Stefan and Sannella, Don (1998) Reflections on the design of a specification language. In: Astesiano, Egidio, ed. Fundamental Approaches to Software Engineering. Springer-Verlag Berlin pp. 154-170. ISBN 3-540-64303-6. (doi:https://doi.org/10.1007/BFb0053578) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kaijian, Shi and Jian, Sun (1991) A relational graphical editing method for PCB design. Computer-Aided Design, 23 (1). pp. 92-94. ISSN 0010-4485. (doi:https://doi.org/10.1016/0010-4485(91)90102-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kalli, Kyriacos and Jackson, David A. (1995) Dynmic-Response of High-Resolution Ring-Resonator Optical Spectrometers to time-Varing Input Signals. In: Sensors and their Applications VII. Iop Publishing ltd pp. 184-189. ISBN 0-7503-0331-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kalli, Kyriacos and Rao, Yun Jiang and Webb, David J. and Jackson, David A. (1995) Potential of fibre optic point and distributed fibre optic sensors for structural monitoring. In: Augousti, A.T., ed. Sensors and their Aplications VII. Iop Publishing Ltd pp. 184-189. ISBN 0-7503-0331-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kanjo, Eiman and Kuss, Daria and Ang, Chee Siang (2017) NotiMind: Utilizing Responses to Smart Phone Notifications as Affective sensors. IEEE Access, . ISSN 2169-3536. E-ISSN 2169-3536. (doi:https://doi.org/10.1109/ACCESS.2017.2755661) (Full text available)
[img]
Preview

Kemp, Zarine P. (1995) Multimedia and Spatial Information Systems. IEEE Multimedia, 2 (4). pp. 68-76. ISSN 1070-986X. (doi:https://doi.org/10.1109/93.482297) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kemp, Zarine P. and Kowalczyk, Arek (1994) Incorporating the Temporal Dimension in a GIS. In: Worboys, Michael F., ed. Innovations in GIS - Selected Papers from the First National Conferece on Gis Research UK. Taylor & Francis Ltd pp. 89-103. ISBN 0-7484-0140-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kemp, Zarine P. and Oxborrow, Elizabeth and Davy, M.J. and Linington, Peter F. and Thearle, R. and Blair, Gordon S. and Dark, P. and Davies, N.A. and Mariani, John A. and Snape, C. (1992) Zenith System for Object Management In Distributed Multimedia Design Environments. Information and Software Technology, 34 (7). pp. 427-436. ISSN 0950-5849. (doi:https://doi.org/10.1016/0950-5849(92)90034-M) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Khalil, Omar and Hernandez-Castro, Julio C. and Asis, Benjamon (2013) A study on the false positive rate of Stegdetect. Digital Investigation, 9 (3-4). pp. 235-245. ISSN 1742-2876. (doi:https://doi.org/10.1016/j.diin.2013.01.004) (Full text available)
[img]
Preview

Kononova, A.V.a and Corne, D.W.a and De Wilde, Philippe and Shneer, V.c and Caraffini, F.d e (2015) Structural bias in population-based algorithms. Information Sciences, 298 . pp. 468-490. ISSN 0020-0255. (doi:https://doi.org/10.1016/j.ins.2014.11.035) (Full text available)
[img]
Preview

L

Laborde, Romain and Kamel, Michel and Barrere, Francois and Benzekri, Abdelmalek (2007) Implementation of a formal security policy refinement process in WBEM architecture. Journal of Network and Systems Management,, 15 (2). pp. 241-266. ISSN 1064-7570. (doi:https://doi.org/10.1007/s10922-007-9063-z) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Laffey, Des (2007) Paid search: The innovation that changed the Web. Business Horizons, 50 (3). pp. 211-218. ISSN 0007-6813. (doi:https://doi.org/10.1016/j.bushor.2006.09.003) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Laffey, Des (2007) The ultimate bluff: a case study of partygaming.com. Journal of Information Technology, 22 (4). pp. 479-488. ISSN 0268-3962. (doi:https://doi.org/10.1057/palgrave.jit.2000096) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lahasan, B. M. and Venkat, I. and Al-Betar, M. A. and Lutfi, S. L. and De Wilde, Philippe (2016) Recognizing faces prone to occlusions and common variations using optimal face subgraphs. Applied Mathematics and Computation, 283 . pp. 316-332. ISSN 0096-3003. (doi:https://doi.org/10.1016/j.amc.2016.02.047) (Full text available)
[img]
Preview

Lam, K.P. and Horne, E. (1993) Enhanced Kernel Estimation Technique For Pattern-Classification. Electronics Letters, 29 (24). pp. 2130-2131. ISSN 0013-5194. (doi:https://doi.org/10.1049/el:19931424) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lam, K.P. and Horne, E. (1993) Novel Technique To Combine Bws And Fws Classifiers. Electronics Letters, 29 (19). pp. 1702-1704. ISSN 0013-5194. (doi:https://doi.org/10.1049/el:19931132) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lamb, John D. (1998) A note on the weighted matching with penalty problem. Pattern Recognition Letters, 19 (3-4). pp. 261-263. ISSN 0167-8655. (doi:https://doi.org/10.1016/S0167-8655(98)00008-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Langford, Duncan and Brown, Peter J. (1993) Creating hypertext documents - Is it worth the effort. Aslib Proceedings, 45 (4). pp. 91-95. ISSN 0001-253X. (doi:https://doi.org/10.1108/eb051311) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lauder, Anthony and Dumas, Marlon and Frohner, Akos and Oliver, Ian (2000) PhDOOS 2000: The 10th Ph.D. workshop on object-oriented systems. In: Malaenfant, Jacques and Moisan, Sabine and Moreira, Ana, eds. Object-Oriented Technology: Ecoop 2000 Workshop Reader: Ecoop 2000 Workshops, Panels, and Posters Sophia Antipolis and Cannes, France, June 12-16, 2000 Proceedings. Lecture Notes in Computer Science, 1964 . Springer Verlag Berlin, pp. 78-92. ISBN 3-540-41513-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lee, Howard and Kemp, Zarine P. (1997) Towards a multiple placement land suitability evaluation framework. In: Kraak, Menno-Jan and Molenaar, Martin and Fendel, E.M., eds. Advances in GIS Research II. Taylor & Francis Ltd pp. 643-654. ISBN 0-7484-0591-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Leech, Helen K. and Kemp, Zarine P. (1998) Supporting complex spatiotemporal analysis in GIS. In: Carver, S., ed. Investigation in GIS5. Taylor & Francis Ltd pp. 151-161. ISBN 0-7484-0810-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Li, Chengqing and Feng, Bingbing and Li, Shujun and Kurths, Jurgen and Chen, Guanrong (2019) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers, . pp. 1-14. ISSN 1549-8328. (doi:https://doi.org/10.1109/TCSI.2018.2888688) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Li, Ling and Looney, D. and Park, C. and Rehman, N.U. and Mandic, Danilo P. (2011) Power Independent EMG Based Gesture Recognition for Robotics. In: Engineering in Medicine and Biology Society, EMBC, 2011 Annual International Conference of the IEEE. IEEE EMBS pp. 182-196. ISBN 978-1-4244-4122-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Li, Shujun and Ho, Anthony TS and Wang, Zichi and Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. MPS'18: 2nd International Workshop on Multimedia Privacy and Security Proceedings. ACM ISBN 978-1-4503-5988-7. (doi:https://doi.org/10.1145/3267357.3267365) (Full text available)
[img]
Preview

Lins, Rafael D. (1992) A Multiprocessor Shared Memory Architecture for Parallel Cyclic Reference Counting. In: Microprocessing and Microprogramming. Microprocessing And Microprogramming ( Euromicro-92 ) : Software And Hardware : Specification And Design, 35. Elsevier Science Bv, Paris, France pp. 563-568. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lins, Rafael D. and Neto, Mario Guimaraes and Neto, Leopoldo Franca and Rosa, Luciano Galdino (1994) An environment for processing images of historical documents. Microprocessing and Microprogramming, 40 (10-12). pp. 939-942. ISSN 0165-6074. (doi:https://doi.org/10.1016/0165-6074(94)90074-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Liu, Ximing and Li, Yingjiu and Deng, Robert H. and Chang, Bing and Li, Shujun (2019) When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers and Security, 80 . pp. 90-107. ISSN 0167-4048. (doi:https://doi.org/10.1016/j.cose.2018.09.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Liu, Yang and Kwok, Yu-Kwong and Wang, Jiangzhou (2008) Downlink TCP performance under cross layer rate and power allocation in infrastructure TH-PPM UWB networks. Journal of Supercomputing, 44 (3). pp. 199-216. ISSN 0920-8542. (doi:https://doi.org/10.1007/s11227-007-0155-z) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Liu, Yang and Kwok, Yu-Kwong and Wang, Jiangzhou (2007) An adaptive packet scheduling algorithm for efficient downlink bandwidth allocation in UWB based wireless infrastructure networks. Computer Communications, 30 (9). pp. 2087-2095. ISSN 0140-3664. (doi:https://doi.org/10.1016/j.comcom.2007.04.004) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

M

Mansfield, Elizabeth L. (1996) The differential algebra package diffgrob2. Mapletech, 3 (2). pp. 33-37. ISSN 1061-5733. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mansfield, Elizabeth L. and Clarkson, Peter (1997) Applications of the differential algebra package diffgrob2 to classical symmetries of differential equations. Journal of Symbolic Computation, 23 (5-6). pp. 517-533. ISSN 0747-7171. (doi:https://doi.org/10.1006/jsco.1996.0105) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mansfield, Elizabeth L. and Clarkson, Peter (1997) Symmetries and exact solutions for a 2+1-dimensional shallow water wave equation. Mathematics and Computers in Simulation, 43 (1). pp. 39-55. ISSN 0378-4754. (doi:https://doi.org/10.1016/S0378-4754(96)00054-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mansfield, Elizabeth L. and Reid, G.J. and Clarkson, Peter (1998) Nonclassical reductions of a 3+1-cubic nonlinear Schrodinger system. Computer Physics Communications, 115 (2-3). pp. 460-488. ISSN 0010-4655. (doi:https://doi.org/10.1016/S0010-4655(98)00136-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Matsuda, Kazutaka and Wang, Meng (2013) Bidirectionalization for Free with Runtime Recording: Or, a Light-Weight Approach to the View-Update Problem. In: Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming. pp. 297-308. ISBN 978-1-4503-2154-9. (doi:https://doi.org/10.1145/2505879.2505888) (Full text available)
[img]
Preview

Matsuda, Kazutaka and Wang, Meng (2014) “Bidirectionalization for Free” for Monomorphic Transformations. Science of Computer Programming, 111 (Part 1). pp. 79-109. ISSN 0167-6423. (doi:https://doi.org/10.1016/j.scico.2014.07.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Matsuda, Kazutaka and Wang, Meng (2013) FliPpr: A Prettier Invertible Printing System. In: 22nd European Symposium on Programming. pp. 101-120. ISBN 978-3-642-37035-9. E-ISBN 978-3-642-37036-6. (doi:https://doi.org/10.1007/978-3-642-37036-6_6) (Full text available)
[img]
Preview

Medina, Jose Cadenas (2015) Pipelined median architecture. Electronics Letters, 51 (24). pp. 1999-2001. ISSN 0013-5194. (doi:https://doi.org/10.1049/el.2015.1898) (Full text available)
[img]
Preview

Medina, Jose Cadenas and Megson, G. M. and Sherratt, Simon (2015) Median architecture by accumulative parallel counters. IEEE Transactions on Circuits and Systems II, Express Briefs, 62 (7). pp. 661-665. ISSN 1549-7747. E-ISSN 1558-3791. (doi:https://doi.org/10.1109/TCSII.2015.2415655) (Full text available)
[img]
Preview

Micallef, Luana (2013) Visualizing Set Relations and Cardinalities Using Venn and Euler Diagrams. Doctor of Philosophy (PhD) thesis, University of Kent. (Full text available)
[img]

Michelmann, Sebastian and Treder, Matthias S. and Griffiths, Benjamin and Kerrén, Casper and Roux, Frédéric and Wimber, Maria and Rollings, David and Sawlani, Vijay and Chelvarajah, Ramesh and Gollwitzer, Stephanie and Kreiselmeyer, Gernot and Hamer, Hajo and Bowman, Howard and Staresina, Bernhard and Hanslmayr, Simon (2018) Data-driven re-referencing of intracranial EEG based on independent component analysis (ICA). Journal of Neuroscience Methods, 307 . pp. 125-137. ISSN 0165-0270. (doi:https://doi.org/10.1016/j.jneumeth.2018.06.021) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Minelly, S. and Kelly, Stephen W. and Bahra, R. (1996) Clinical trial of the non-invasive recording of His-Purkinje system signals. In: Computers in Cardiology 1996. Computers in Cardiology. I E E E pp. 449-452. ISBN 0-7803-3710-7. (doi:https://doi.org/10.1109/CIC.1996.542570) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mingers, John (2014) Problems with SNIP. Journal of Informetrics, 8 (4). pp. 890-894. ISSN 1751-1577. (doi:https://doi.org/10.1016/j.joi.2014.09.004) (Full text available)
[img]
Preview

Mingers, John (2002) Real-izing Information Systems: Critical Realism as an Underpinning Philosophy for Information Systems. In: DeGross, J., ed. Information and Organization. , Barcelona pp. 87-103. (doi:https://doi.org/10.1016/j.infoandorg.2003.06.001) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mirlohi, H.R. and Kelly, Stephen W. and Manley, Maxwell C. G. (1994) New technique for assessment of velopharyngeal function. Medical and Biological Engineering and Computing, 32 (5). pp. 562-566. ISSN 0140-0118. (doi:https://doi.org/10.1007/BF02515315) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mitrokotsa, Aikaterini and Dimitrakakis, Christos and Peris-Lopez, Pedro and Hernandez-Castro, Julio C. (2010) Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters, 14 (2). pp. 121-123. ISSN 1089-7798. (doi:https://doi.org/10.1109/LCOMM.2010.02.091946) (Full text available)
[img]
Preview

Modi, Bala (2015) FPGA-based High Throughput Regular Expression Pattern Matching for Network Intrusion Detection Systems. Doctor of Philosophy (PhD) thesis, University of Kent,. (Full text available)
[img]
Preview

Montanari, Carlos A. and Tute, M.S. and Beezer, Anthony E. and Mitchell, John C. (1996) Determination of receptor-bound drug conformations by QSAR using flexible fitting to derive a molecular similarity index. Journal of Computer-Aided Molecular Design, 10 (1). pp. 67-73. ISSN 0920-654X. (doi:https://doi.org/10.1007/BF00124466) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Moores, James (1999) CCSP - A portable CSP-based run-time system supporting C and occam. In: Cook, Barry M., ed. Architectures, Languages and Techniques for Concurrent Systems. Concurrent Systems Engineering Series, 57. I O S Press, Netherland pp. 147-168. ISBN 90-5199-480-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mouli, Surej and Palaniappan, Ramaswamy (2017) Towards a reliable PWM based LED visual stimulus for improved SSVEP response with minimal visual fatigue. Journal of Engineering, . ISSN 2051-3305. E-ISSN 2051-3305. (doi:https://doi.org/10.1049/joe.2016.0314) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]
Preview

Mudelsee, Manfred (2000) Ramp function regression: a tool for quantifying climate transitions. Computers and Geosciences, 26 (3). pp. 293-307. ISSN 0098-3004. (doi:https://doi.org/10.1016/S0098-3004(99)00141-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

N

Nalbantis, D. and Walczowski, Les T. and Waller, Winston A.J. (1996) O-2 ADL: An object-oriented analog VLSI design language. In: Zhang, Qingling and Tang, Ting-Ao and Yu, Huihua, eds. 1996 2nd International Conference on Asic, Proceedings. Shanghai Scientific & Technical Literature Publ pp. 27-30. ISBN 7-5439-0940-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nawaz, Sarfraz and Efstratiou, Christos and Mascolo, Cecilia (2013) ParkSense: A Smartphone Based Sensing System For On-Street Parking. In: Proceedings of the 19th ACM International Conference on Mobile Computing and Networking (MOBICOM 2013), September 2013, Miami, FL, USA. (Full text available)
[img]
Preview

Nawaz, Sarfraz and Efstratiou, Christos and Mascolo, Cecilia (2016) Smart Sensing Systems for the Daily Drive. IEEE Pervasive Computing, . pp. 39-43. ISSN 1536-1268. (doi:https://doi.org/10.1109/MPRV.2016.22) (Full text available)
[img]
Preview

Nicholls, Benjamin and Ang, Chee Siang and Efstratiou, Christos and Lee, Yongkuk and Yeo, Woon-Hong (2017) Swallowing detection for game control: using skin-like electronics to support people with dysphagia. In: Pervasive Computing and Communications Workshops (PerCom Workshops). 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE (doi:https://doi.org/10.1109/PERCOMW.2017.7917598) (Full text available)
[img]
Preview

Nieto-Barajas, Luis E. and Walker, Stephen G. (2007) A Bayesian semi-parametric bivariate failure time model. Computational Statistics and Data Analysis, 51 (12). pp. 6102-6113. ISSN 0167-9473. (doi:https://doi.org/10.1016/j.csda.2006.12.020) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nitsos, Kallikratidas and Dagiuklas, Tasos and Al-Raweshidy, Hamed S. (2000) High Speed Wireless Internet Access: Combination of MPLS and BRAN HIPERLAN/2 technologies. In: IFIP-TC6/European Commission International Conference, May 14-19, 2000, Paris, France. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nouh, Mariam and Nurse, Jason R. C. and Webb, Helena and Goldsmith, Michael (2019) Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement. In: Proceedings of the 2019 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). Internet Society (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. (2019) Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:https://doi.org/10.1093/oxfordhb/9780198812746.013.35) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Bada, Maria (2019) The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:https://doi.org/10.1093/oxfordhb/9780198812746.013.36) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

O

Oliveira, Bruno and Wang, Meng and Gibbons, Jeremy (2008) The VISITOR Pattern as a Reusable, Generic, Type-Safe Component. In: Proceedings of the 23rd ACM SIGPLAN conference on Object-oriented programming systems languages and applications. (Full text available)
[img]
Preview

Ong, SimYing and Li, Shujun and Wong, KokSheik and Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images. Signal Processing: Image Communication, 58 . pp. 1-13. ISSN 0923-5965. (doi:https://doi.org/10.1016/j.image.2017.06.002) (Full text available)
[img]
Preview

Oshea, P.J. and Wilson, E. (1997) European law databases: an experiment in retrieval. In: Wagner, R., ed. Database and Expert Systems Applications, 1997. Proceedings., Eighth International Workshop on. I.E.E.E, Computer Soc Press pp. 227-232. ISBN 0-8186-8148-9. (doi:https://doi.org/10.1109/DEXA.1997.617275) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Osman, Ibrahim H. (1999) A unified-metaheuristic framework. In: Imam, Ibrahim and Kodratoff, Yves and El-Dessouki, Ayman and Ali, Moonis, eds. Multiple Approaches to Intelligent Systems, Proceedings. Lecture Notes in Artificial Intelligence, 1611. Springer-Verlag Berlin pp. 11-12. ISBN 3-540-66076-3. (doi:https://doi.org/10.1007/b72302) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Otero, Fernando E.B. and Masegosa, Antonio D. and Terrazas, Germán (2014) Thematic issue on advances in nature inspired cooperative strategies for optimization. Memetic Computing, 6 (3). pp. 147-148. ISSN 1865-9284. E-ISSN 1865-9292. (doi:https://doi.org/10.1007/s12293-014-0140-z) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

P

Paar, C. and Fleischmann, Peter and Soria-Rodriguez, P. (1999) Fast arithmetic for public-key algorithms in Galois fields with composite exponents. IEEE Transactions on Computers, 48 (10). pp. 1025-1034. ISSN 0018-9340. (doi:https://doi.org/10.1109/12.805153) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Palaniappan, Ramaswamy and Revett, Kenneth (2014) PIN generation using EEG : a stability study. International Journal of Biometrics, 6 (2). pp. 95-106. ISSN 1755-8301. (doi:https://doi.org/10.1504/IJBM.2014.060960) (Full text available)
[img]
Preview

Palomar, Esther and Estevez Tapiador, Juan and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Secure content access and replication in pure P2P networks. Computer Communications, 31 (2). pp. 266-279. ISSN 0140-3664. (doi:https://doi.org/10.1016/j.comcom.2007.08.015) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Pang, P.C.W and Pepper, Matthew G. and Ducker, D.A (1995) Monitoring respiratory activity in neonates using diaphragmatic electromyograph. Medical and Biological Engineering and Computing, 33 (3). pp. 385-390. ISSN 0140-0118. (doi:https://doi.org/10.1007/BF02510520) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Pappa, Gisele L. and Freitas, Alex A. (2007) Discovering new rule induction algorithms with grammar-based genetic programming. In: Maimon, Oded and Rokach, Lior, eds. Soft Computing for Knowledge Discovery and Data Mining. Springer, New York, pp. 133-152. ISBN 978-0-387-69934-9. (doi:https://doi.org/10.1007/978-0-387-69935-6_6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Paschalakis, Stavros and Fairhurst, Michael and Allgrove, C. (1999) Wordlength estimation for the enhancement of hand-written word recognition. In: Seventh International Conference on Image Processing and its Applications. IEE Conference Publications, 2. Inst Electrical Engineers Inspec Inc pp. 750-754. ISBN 0-85296-717-9. (doi:https://doi.org/10.1049/cp:19990424) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Paschalakis, Stavros and Lee, Peter (2000) Combined geometric transformation and illumination invariant object recognition in RGB color images. In: 15th International Conference on Pattern Recognition (ICPR-2000), Sep 03-07 2000, Barcelona, Spain. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Paschalakis, Stavros and Lee, Peter (1999) Pattern recognition in grey level images using moment based invariant features. In: Seventh International Conference on Image Processing and its Applications. IEE Conference Publications, 1. Inst Electrical Engineers Inspec Inc pp. 245-249. ISBN 0-85296-717-9. (doi:https://doi.org/10.1049/cp:19990320) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Paschalakis, Stavros and Lee, Peter (2000) Statistical pattern recognition using the Normalized Complex Moment Components vector. Advances in Pattern Recognition, 1876 . pp. 532-539. ISSN 0302-9743. (doi:https://doi.org/10.1007/3-540-44522-6_55) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Pascoe, Jason (1998) Adding generic contextual capabilities to wearable computers. In: 2nd International Symposium on Wearable Computers. Ieee Computer Soc pp. 92-99. ISBN 0-8186-9074-7. (doi:https://doi.org/10.1109/ISWC.1998.729534) (Full text available)
[img] [img]
Preview

Pascoe, Jason and Ryan, Nick S. and Morse, David R. (1999) Issues in developing context-aware computing. In: Gellersen, Hans, ed. Handheld and Ubiquitous Computing, Proceedings. Lecture Notes in Computer Science, 1707. Springer-Verlag Berlin pp. 208-221. ISBN 3-540-66550-1. (doi:https://doi.org/10.1007/3-540-48157-5_20) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Pawar, Pramod and Sajjad, Ali and Chadwick, David W. and Dimitrakos, Theo (2015) Security-as-a-Service in Multi-cloud and Federated Cloud Environments. In: Trust Management IX. IFIP Advances in Information and Communication Technology . Springer International Publishing, Hamburg, Germany, pp. 251-261. ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:https://doi.org/10.1007/978-3-319-18491-3_21) (Full text available)
[img]
Preview

Pearson, J.K and Bisset, D.L. (1994) Neural Networks in the Clifford Domain. 1994 IEEE International Conference on Neural Networks, 1-7 . pp. 1465-1469. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Pease, Alison and Jordanous, Anna (2018) Report on the Eighth International Conference on Computational Creativity. Review of: Eighth International Conference on Computational Creativity by UNSPECIFIED. AI Magazine, 39 (1). pp. 62-64. ISSN 0738-4602. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2009) Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards and Interfaces, 31 (2). pp. 372-380. ISSN 0920-5489. (doi:https://doi.org/10.1016/j.csi.2008.05.012) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2009) LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards and Interfaces, 31 (1). pp. 88-97. ISSN 0920-5489. (doi:https://doi.org/10.1016/j.csi.2007.11.013) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2009) An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. Journal of Information Science and Engineering, 25 (1). pp. 33-57. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Tapiador, Juan E. and Li, Tieyan and Li, Yingjiu (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54 (9). pp. 1502-1508. ISSN 1389-1286. (doi:https://doi.org/10.1016/j.comnet.2009.11.007) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Tapiador, Juan E. and van der Lubbe, Jan C. A. (2011) Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence, 24 (6). pp. 1061-1069. ISSN 0952-1976. (doi:https://doi.org/10.1016/j.engappai.2011.04.001) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Li, Tieyan and Hernandez-Castro, Julio C. (2010) Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Transactions on information and systems, E93-D (3). pp. 518-527. ISSN 1745-1353. (doi:https://doi.org/10.1587/transinf.E93.D.518) (Full text available)
[img]
Preview

Peris-Lopez, Pedro and Li, Tieyan and Hernandez-Castro, Julio C. and Tapiador, Juan E. (2009) Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Computer Communications, 32 (7-10). pp. 1185-1193. ISSN 0140-3664. (doi:https://doi.org/10.1016/j.comcom.2009.03.010) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Orfila, Agustin and Hernandez-Castro, Julio C. and van der Lubbe, Jan C. A. (2011) Flaws on RFID grouping-proofs. Guidelines for future sound protocols. Journal of Network and Computer Applications, 34 (3). pp. 833-845. ISSN 1084-8045. (doi:https://doi.org/10.1016/j.jnca.2010.04.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro and Orfila, Agustin and Palomar, Esther and Hernandez-Castro, Julio C. (2012) A secure distance-based RFID identification protocol with an off-line back-end database. Personal and Ubiquitous Computing, 16 (3). pp. 351-365. ISSN 1617-4909. (doi:https://doi.org/10.1007/s00779-011-0396-y) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Petricek, Tomas (2017) Miscomputation in software: Learning to live with errors. The Art, Science, and Engineering of Programming, 1 (2). Article 14. ISSN 2473-7321. E-ISSN 2473-7321. (doi:https://doi.org/10.22152/programming-journal.org/2017/1/14) (Full text available)
[img]
Preview

Petricek, Tomas and Guerra, Gustavo and Syme, Don (2016) Types from Data: Making Structured Data First-class Citizens in F#. In: PLDI 2016. Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation. PLDI '16. ACM, New York, NY, USA pp. 477-490. ISBN 978-1-4503-4261-2. (doi:https://doi.org/10.1145/2908080.2908115) (Full text available)
[img]
Preview

Picazo Sanchez, Pablo and Martin, Lara and Peris-Lopez, Pedro and Hernandez-Castro, Julio C. (2013) Cryptanalysis of the RNTS system. The Journal of Supercomputing, 65 (2). pp. 949-960. ISSN 0920-8542. (doi:https://doi.org/10.1007/s11227-013-0873-3) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Pinto, Paulo F. and Linington, Peter F. (1994) A language for the specification of interactive and distributed multimedia applications. In: DeMeer, J. and Mahr, B. and Storp, S., eds. Open Distributed Processing II. IFIP Transactions C-Communication Systems, 20 . Elsevier Science Ltd, Oxford, pp. 247-264. ISBN 0-444-81861-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Polimon, Javier and Hernandez-Castro, Julio C. and Estevez Tapiador, Juan and Ribagorda, Arturo (2008) Automated design of a lightweight block cipher with Genetic Programming. International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Too, 12 (1). pp. 3-14. ISSN 1327-2314. (Full text available)
[img]
Preview

Poll, Erik and Thompson, Simon (2000) Integrating Computer Algebra and Reasoning through the Type System of Aldor. In: Kirchner, Hélène and Ringeissen, Christophe, eds. Frontiers of Combining Systems. Lecture Notes in Computer Science, 1794. Springer-Verlag Berlin pp. 136-150. ISBN 3-540-67281-8. (Full text available)
[img]
Preview

Poll, Erik and Zwanenburg, J. (1999) A logic for abstract data types as existential types. In: 4th International Conference on Typed Lambda Calculi and Applications (TLCA 99), Apr 07-09, 1999, Laquila, Italy. (doi:https://doi.org/10.1007/3-540-48959-2_22) (Full text available)
[img]
Preview
[img]
Preview

Poole, Michael D. (1996) Occam for all - Two approaches to retargeting the INMOS compiler. In: Oneill, B.C., ed. Parallel Processing Developments. Concurrent Systems Engineering Series, 47. I O S Press pp. 167-178. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Poole, Michael D. (1995) Using records and pointers with occam 2.1. In: Nixon, Paddy and Transputer User, Grp, eds. Transputer and Occam Developments. Transputer & Occam Engineering Series, 44 . IOS Press, Amsterdam, pp. 151-162. ISBN 90-5199-222-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Pérez-Delgado, Carlos A and Fitzsimons, Joseph F (2015) Iterated gate teleportation and blind quantum computation. Physical Review Letters: Moving Physics Forward, 114 (22). p. 220502. ISSN 0031-9007. E-ISSN 1079-7114. (doi:https://doi.org/10.1103/PhysRevLett.114.220502) (Full text available)
[img]
Preview

R

Rachuri, Kiran and Efstratiou, Christos and Leontiadis, Ilias and Mascolo, Cecilia and Rentfrow, Peter J. (2013) METIS: Exploring mobile phone sensing offloading for efficiently supporting social sensing applications. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PERCOM 2013). (Full text available)
[img]
Preview

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1999) Automatic self-configuration of a novel multiple-expert classifier using a genetic algorithm. In: Seventh International Conference on Image Processing and its Applications. IEE Conference Publications. Inst Electrical Engineers Inspec Inc pp. 57-61. ISBN 0-85296-717-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) Building multiple prototype classifiers for handwritten character recognition using automatic statistical clustering techniques. In: Sixth International Conference on Image Processing and Its Applications. Institution of Engineering and Technology, Stevenage pp. 414-418. ISBN 978-0-85296-692-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (2000) Comparison of some multiple expert strategies: An investigation of resource prerequisites and achievable performance. In: Sanfeliu, A. and Villanueva, J.J. and Vanrell, M. and Alquezar, R. and Crowley, J. and Shirai, Y., eds. 15th International Conference On Pattern Recognition, Vol 4, Proceedings - Applications, Robotics Systems And Architectectures. Iinternational Confreence On Pattern Recognition. Ieee Computer Soc pp. 841-844. ISBN 0-7695-0751-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1999) Enhancing multiple expert decision combination strategies through exploitation of a priori information sources. IEE Proceedings: Vision Image and Signal Processing, 146 (1). pp. 40-49. ISSN 1350-245X. (doi:https://doi.org/10.1049/ip-vis:19990015) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) Introducing new multiple expert decision combination topologies: A case study using recognition of handwritten characters. I E E E, Computer Soc Press, Los Alamitos, CA, 1200 pp. ISBN 0-8186-7899-2. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) Selective partition algorithm for finding regions of maximum pairwise dissimilarity among statistical class models. Pattern Recognition Letters, 18 (7). pp. 605-611. ISSN 0167-8655. (doi:https://doi.org/10.1016/S0167-8655(97)00047-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1999) Serial combination of multiple experts: A unified evaluation. Pattern Analysis & Applications, 2 (4). pp. 292-311. ISSN 1433-7541. (doi:https://doi.org/10.1007/s100440050038) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) A comparative study of decision combination strategies for a novel multiple-expert classifier. In: Proceedings of the Sixth International Conference on Image Processing and Its Applications. Institution of Engineering and Technology, Stevenage pp. 131-135. ISBN 978-0-85296-692-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) A comparative study of two different multiple expert architectures for robust object recognition. Machine Vision Applications, Architectures & Systems Integra . Spie - Int Soc Optical Engineering, USA, 296 pp. ISBN 0-8194-2637-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1998) An evaluation of multi-expert configurations for the recognition of handwritten numerals. Pattern Recognition, 31 (9). pp. 1255-1273. ISSN 0031-3203. (doi:https://doi.org/10.1016/S0031-3203(97)00161-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) A new hybrid approach in combining multiple experts to recognise handwritten numerals. Pattern Recognition Letters, 18 (8). pp. 781-790. ISSN 0167-8655. (doi:https://doi.org/10.1016/S0167-8655(97)00078-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael and Hoque, Sanaul and Paschalakis, Stavros (1999) A novel multiple-expert approach to the recognition of handwritten words extracted from British cheques. In: Seventh International Conference on Image Processing and its Applications. IEE Conference Publications. Inst Electrical Engineers Inspec Inc pp. 731-735. ISBN 0-85296-717-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael and Lee, Peter (1998) Design considerations in the real-time implementation of multiple expert image classifiers within a modular and flexible multiple-platform design environment. Real-Time Imaging, 4 (5). pp. 361-376. ISSN 1077-2014. (doi:https://doi.org/10.1016/S1077-2014(98)90005-5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Read, Dwight and Fischer, Michael D. and Lehman, F. K. (Chit Hlaing) (2014) The Cultural Grounding of Kinship: A Paradigm Shift. L'Homme, 2 (210). pp. 63-89. ISSN 9782713224430. E-ISSN 1953-8103. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rio, Miguel and Linington, Peter F. (2000) Distributed Quality of Service Multicast Routing with Multiple Metrics for Receiver initiated Joins. In: Proceedings of the 8th IEEE International Conference on Networks. IEEE Computer Society pp. 180-187. ISBN 0-7695-0777-8. (doi:https://doi.org/10.1109/ICON.2000.875787) (Full text available)
[img]
Preview

Ritson, Carl G. and Ugawa, Tomoharu and Jones, Richard E. (2014) Exploring Garbage Collection with Haswell Hardware Transactional Memory. In: ISMM '14. Proceedings of the 2014 international symposium on Memory management. ACM, New York pp. 105-115. ISBN 978-1-4503-2921-7. (doi:https://doi.org/10.1145/2602988.2602992) (Full text available)
[img]
Preview

Rizzo, Mike (1994) Using Producer and Consumer Manipulators to Extend Stream I/O Formatting in C++. Sigplan Notices, 29 (3). pp. 33-35. ISSN 0362-1340. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Roberts, Jonathan C. (1998) On encouraging multiple views for visualization. In: IEEE Conference on Information Visualization, 29-31 Jul 1998, London, England. (doi:https://doi.org/10.1109/IV.1998.694193) (Full text available)
[img] [img]
Preview

Roberts, Jonathan C. (1998) Waltz - An exploratory visualization tool for volume data, using multiform abstract displays. In: Conference on Visual Data Exploration and Analysis V, January 26-27, 1998, San Jose, Ca. (Full text available)
[img]
Preview

Roberts, Jonathan C. and Hill, Steve (1999) Piecewise linear hypersurfaces using the Marching Cubes Algorithm. In: Erbacher, Robert F. and Chen, Philip C. and Wittenbrink, Craig M., eds. Visual Data Exploration and Analysis VI. Proceedings of the Society of Photo-Optical Instrumentation Engineers (SPIE), 3643. International Society for Optical Engineering pp. 170-181. ISBN 0-8194-3114-1. (doi:https://doi.org/10.1117/12.342833) (Full text available)
[img]
Preview
[img]
Preview

Rodgers, Peter (2014) A Survey of Euler Diagrams. Journal of Visual Languages and Computing, 25 (3). pp. 134-155. ISSN 1045-926X. (doi:https://doi.org/10.1016/j.jvlc.2013.08.006) (Full text available)
[img]
Preview

Rodgers, Peter (1998) A graph rewriting programming language for graph drawing. In: Visual Languages, 1998. Proceedings. 1998 IEEE Symposium on. IEEE Computer Soc, Los Alamitos, CA, USA, Los Alamitos, CA, USA pp. 32-39. ISBN 0-8186-8712-6. (doi:https://doi.org/10.1109/VL.1998.706131) (Full text available)
[img]
Preview

Rodgers, Peter and Baker, Robert and Thompson, Simon and Li, Huiqing (2013) Multi-level Visualization of Concurrent and Distributed Computation in Erlang. In: Proceedings of 19th International Conference on Distributed Multimedia Systems 2013. Knowledge Systems Institute (Full text available)
[img]
Preview

Rodgers, Peter and Stapleton, Gem and Flower, Jean and Howse, John (2014) Drawing Area-Proportional Euler Diagrams Representing Up To Three Sets. IEEE Transactions on Visualization and Computer Graphics, 20 (1). pp. 56-69. ISSN 1077-2626. (doi:https://doi.org/10.1109/TVCG.2013.104) (Full text available)
[img]
Preview

Russell, M. and Hopkins, Tim (1998) CFTP: a caching FTP server. Computer Networks and ISDN Systems, 30 (22-23). pp. 2211-2222. ISSN 0169-7552. (doi:https://doi.org/10.1016/S0169-7552(98)00240-2) (Full text available)
[img]
Preview
[img]
Preview

Ryan, Nick S. and Smith, Dan and Ma, Ling (2006) Acoustic environment as an indicator of social and physical context. Personal and Ubiquitous Computing, 10 (4). pp. 241-254. ISSN 1617-4909. (doi:https://doi.org/10.1007/s00779-005-0045-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

S

Sahami, Mehran and Roach, Steve and Cuadros-Vargas, Ernesto and Danyluk, Andrea and Dodge, Ronald and Fisher, Kathleen and Fincher, Sally and France, Robert and Grossman, Dan and Hawthorne, Beth and Katz, Randy and Kumar, Amruth and LeBlanc, Rich and Reed, Dave and Robinson, Brian H. and Seker, Remzi and Thompson, Alfred (2013) Computer Science Curricula 2013(CS2013). Technical report. ACM Press and IEEE Computer Society Press, New York https://doi.org/10.1145/2534860. (doi:https://doi.org/10.1145/2534860) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Salama, Khalid M. and Freitas, Alex A. (2012) ABC-Miner: an ant-based Bayesian classification algorithm. In: Swarm Intelligence: Proceedings of 8th International Conference, ANTS 2012. Lecture Notes in Computer Science, 7461. Springer-Verlag Berlin, Berlin pp. 13-24. ISBN 978-3-642-32649-3. (doi:https://doi.org/10.1007/978-3-642-32650-9_2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Salhi, Said and Farber, Gerrit and Coves, Anna M. (2008) Semi Dynamic Demand in a Non-Permutation Flowshop with Constrained Resequencing Buffers. In: Lirkov, I. and Margenov, S. and Wasniewski, Jerzy, eds. Large-scale Scientific Computing. Lecture Notes in Computer Science. Lecture Notes in Computer Science, 4818 (8). Springer-Verlag, Berlin, pp. 536-544. ISBN 978-3-540-78825-6. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Salvy, Bruno and Shackell, John (1999) Symbolic asymptotics: Multiseries of inverse functions. Journal of Symbolic Computation, 27 (6). pp. 543-563. ISSN 0747-7171. (doi:https://doi.org/10.1006/jsco.1999.0281) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sandoval Orozco, A.L. and Arenas Gonzalez, David Manuel and Garcia Villalba, L.J. and Hernandez-Castro, Julio C. (2014) Analysis of errors in exif metadata on mobile devices. Multimedia Tools and Applications, 74 (13). pp. 4735-4763. ISSN 1380-7501. (doi:https://doi.org/10.1007/s11042-013-1837-6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sandoval Orozco, A.L. and Arenas, Gonzalez and Rosales, Corripio and Garcia Villalba, L.J. and Hernandez-Castro, Julio C. (2013) Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing, 96 (9). pp. 829-841. ISSN 1436-5057. (doi:https://doi.org/10.1007/s00607-013-0313-5) (Full text available)
[img]
Preview

Sarkar, Susmit and Memarian, Kayvan and Owens, Scott and Batty, Mark and Sewell, Peter and Maranget, Luc and Alglave, Jade and Williams, Derek (2012) Synchronising C/C++ and POWER. In: ACM SIGPLAN Notices. ACM Press pp. 311-322. ISBN 978-1-4503-1205-9. (doi:https://doi.org/10.1145/2254064.2254102) (Full text available)
[img]
Preview

Scahill, Mark (1997) Distributed individual-based environmental simulation. In: Denzer, Ralf and Swayne, David A. and Schimak, Gerald, eds. Environmental Software Systems (v. 2). IFIP International Federation for Information Processing S., 2 . Chapman & Hall, Dordrecht, pp. 269-276. ISBN 0-412-81740-3. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Scaparra, Maria Paola and Church, Richard L. (2008) A bilevel mixed-integer program for critical infrastructure protection planning. Computers and Operations Research, 35 (6). pp. 1905-1923. ISSN 0305-0548. (doi:https://doi.org/10.1016/j.cor.2006.09.019) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Secker, Andrew D. and Davies, Matthew N. and Freitas, Alex A. and Timmis, Jon and Clark, Edward and Flower, Darren R. (2008) An artificial immune system for evolving amino acid clusters tailored to protein function prediction. In: Bentley, Peter J. and Lee, Doheon and Jung, Sungwon, eds. Artificial Immune Systems. Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence . Springer, pp. 242-253. ISBN 978-3-540-85071-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Secker, Andrew D. and Freitas, Alex A. and Timmis, Jon (2008) AISIID: An artificial immune system for interesting information discovery on the web. Applied Soft Computing, 8 (2). pp. 885-905. ISSN 1568-4946. (doi:https://doi.org/10.1016/j.asoc.2007.07.007) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Shaddick, G. and Choo, Louise L. and Walker, Stephen G. (2007) Modelling correlated count data with covariates. Journal of Statistical Computational and Simulation, 77 (11-12). pp. 945-954. ISSN 0094-9655. (doi:https://doi.org/10.1080/10629360600851974) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sharaiha, Y.M. and Gendreau, M. and Laporte, Gilbert and Osman, Ibrahim H. (1997) A tabu search algorithm for the capacitated shortest spanning tree problem. Networks, 29 (3). pp. 161-171. ISSN 0028-3045. (doi:https://doi.org/10.1002/(SICI)1097-0037(199705)29:3<161::AID-NET4>3.0.CO;2-F) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sharp, John A. and Price, D.H.R. (1996) Systematic case study selection based on sample surveys: The case segmentation method. Systems Research and Information Science, 7 (2). pp. 71-81. ISSN 0882-3014. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Shen, LinLin and Bai, Li and Fairhurst, Michael (2007) Gabor wavelets and General Discriminant Analysis for face identification and verification. Image and Vision Computing, 25 (5). pp. 553-563. ISSN 0262-8856. (doi:https://doi.org/10.1016/j.imavis.2006.05.002) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sheng, Weiguo and Howells, Gareth and Fairhurst, Michael and Deravi, Farzin (2007) A memetic fingerprint matching algorithm. IEEE Transactions on Information Forensics and Security, 2 (3). pp. 402-412. ISSN 1556-6013. (doi:https://doi.org/10.1109/TIFS.2007.902681) (Full text available)
[img]
Preview

Shirazibeheshti, Amirali (2015) The effect of sedation on conscious processing: Computational analysis of the EEG response to auditory irregularity. Doctor of Science (DSc) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sim, Kwang Mong (2012) Agent-Based Cloud Computing. IEEE Transactions On Services Computing, 5 (4). pp. 564-577. ISSN 1939-1374. (doi:https://doi.org/10.1109/TSC.2011.52) (Full text available)
[img]
Preview

Sim, Kwang Mong (2009) BLGAN: Bayesian Learning and Genetic Algorithm for Supporting Negotiation With Incomplete Information. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 39 (1). pp. 198-211. ISSN 1083-4419. (doi:https://doi.org/10.1109/TSMCB.2008.2004501) (Full text available)
[img]
Preview

Sim, Kwang Mong (2013) Complex and Concurrent Negotiations for Multiple Interrelated e-Markets. IEEE Transactions on Cybernetics, 43 (1). pp. 230-245. ISSN 2168-2267. (doi:https://doi.org/10.1109/TSMCB.2012.2204742) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sim, Kwang Mong (2010) Concurrent Negotiation and Coordination for Grid Resource Coallocation. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 40 (3). pp. 753-766. ISSN 1083-4419. (doi:https://doi.org/10.1109/TSMCB.2009.2028870) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sim, Kwang Mong (2008) Evolving Fuzzy Rules for Relaxed-Criteria Negotiation. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 38 (6). 1486 -1500. ISSN 1083-4419. (doi:https://doi.org/10.1109/TSMCB.2008.928210) (Full text available)
[img]
Preview

Sim, Kwang Mong (2006) Grid Commerce, Market-Driven G-Negotiation, and Grid Resource Management. IEEE Transactions On Systems, Man, and Cybernetics—Part B: Cybernetics, 36 (6). pp. 1381-1394. ISSN 1083-4419. (doi:https://doi.org/10.1109/TSMCB.2006.877791) (Full text available)
[img]
Preview
[img]
Preview

Sim, Kwang Mong (2010) Grid Resource Negotiation: Survey and New Directions. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 40 (3). pp. 245-257. ISSN 1094-6977. (doi:https://doi.org/10.1109/TSMCC.2009.2037134) (Full text available)
[img]
Preview

Sim, Kwang Mong (2012) A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 42 (3). pp. 713-728. ISSN 1083-4419. (doi:https://doi.org/10.1109/TSMCB.2011.2174355) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sim, Kwang Mong and Gutierrez-Garcia, J. Octavio (2013) Agent-based Cloud service composition. Applied Intelligence, 38 (3). pp. 436-464. ISSN 0924-669X. E-ISSN 1573-7497. (doi:https://doi.org/10.1007/s10489-012-0380-x) (Full text available)
[img]
Preview
[img]
Preview

Sim, Kwang Mong and Gutierrez-Garcia, J. Octavio (2013) A family of heuristics for agent-based elastic Cloud bag-of-tasks concurrent scheduling. Future Generation Computer Systems, 29 (7). pp. 1682-1699. ISSN 0167-739X. (doi:https://doi.org/10.1016/j.future.2012.01.005) (Full text available)
[img]
Preview

Simon, .. and Clear, Alison and Carter, Janet and Cross, Gerry and Radenski, Atanas and Tudor, Liviana and Tonnisson, Eno (2015) What's in a Name?: International Interpretations of Computing Education Terminology. ITICSE-WGR '15 Proceedings of the 2015 ITiCSE on Working Group Reports, . pp. 173-186. ISSN 9781450341462. (doi:https://doi.org/10.1145/2858796.2858803) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Singh, Om Prakash and Palaniappan, Ramaswamy and Malarvilli, M.B. (2018) Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine. IEEE Access, . ISSN 2169-3536. (doi:https://doi.org/10.1109/ACCESS.2018.2871091) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]
Preview
[img]

Sirlantzis, Konstantinos and Howells, Gareth and Paschalakis, Stavros (1999) A functional neural network prototype for multidimensional data analysis. In: Seventh International Conference on Image Processing and its Applications. IEE Conference Publications. Inst Electrical Engineers Inspec Inc pp. 98-102. ISBN 0-85296-717-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sirur, Sean and Nurse, Jason R. C. and Webb, Helena (2018) Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR). In: MPS '18 Proceedings. MPS. ACM pp. 88-95. ISBN 978-1-4503-5988-7. (doi:https://doi.org/10.1145/3267357.3267368) (Full text available)
[img]
Preview

Slater, J.B. and Swinnerton-Dyer, P. (1998) Counting points on cubic surfaces, I. Asterisque, (251). pp. 1-12. ISSN 0303-1179. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Smart, Nigel P. (1996) How difficult is it to solve a Thue equation? In: Cohen, H., ed. Algorithmic Number Theory. Springer-Verlag Berlin pp. 363-373. ISBN 3-540-61581-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Smart, Nigel P. (1996) Solving discriminant form equations via unit equations. Journal of Symbolic Computation, 21 (3). pp. 367-374. ISSN 0747-7171. (doi:https://doi.org/10.1006/jsco.1996.0018) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Smart, Nigel P. and Siksek, S. (1999) A fast Diffie-Hellman protocol in genus 2. Journal of Cryptology, 12 (1). pp. 67-73. ISSN 0933-2790. (doi:https://doi.org/10.1007/PL00003818) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Smith, Neil (1996) The UK national Web cache - The state of the art. In: Computer Networks and ISDN Systems. Elsevier Science BV, Amsterdam, Netherlands pp. 1407-1414. (doi:https://doi.org/10.1016/0169-7552(96)00029-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sobhy, Mohammed and Makkey, M.Y. (1998) A new look at analogue computing using switched capacitor circuits. In: IEEE International Symposium on Circuits and Systems (ISCAS 98), May 31-June 03, 1998, Monterey, CA. (doi:https://doi.org/10.1109/ISCAS.1998.704508) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sorensen, Tyler and Donaldson, Alastair F. and Batty, Mark and Gopalakrishnan, Ganesh and Rakamarić, Zvonimir (2016) Portable Inter-workgroup Barrier Synchronisation for GPUs. In: Object-oriented Programming, Systems, Languages, and Applications. Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications. pp. 39-58. ISBN 978-1-4503-4444-9. (doi:https://doi.org/10.1145/2983990.2984032) (Full text available)
[img]
Preview

Stephenson, Julie E. and Brown, Clifford and Griffin, Darren K. (2008) Electronic delivery of lectures in the university environment: An empirical comparison of three delivery styles. Computers and Education, 50 (3). pp. 640-651. ISSN 0360-1315. (doi:https://doi.org/10.1016/j.compedu.2006.08.007) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Stone, R.D and Morse, David R. (1996) A software development tool for parallel and distributed systems. In: Oneill, B.C. and Transputer User, Grp, eds. Parallel Processing Developments. I O S Press pp. 207-219. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Strang, W. and Khan, H. and Simpson, V. and Slater, C. and Hill, Steve (1993) From hypertext to hypermedia. Second annual conference on multimedia in education and industry, . pp. 35-39. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sulzmann, Martin and Wang, Meng (2007) Aspect-Oriented Programming with Type Classes. In: Proceedings of the 6th workshop on Foundations of aspect-oriented languages. pp. 65-74. ISBN 978-1-59593-671-4. (Full text available)
[img]
Preview

Sulzmann, Martin and Wang, Meng (2006) Modular Generic Programming with Extensible Superclasses. In: Proceedings of the 2006 ACM SIGPLAN workshop on Generic programming. ACM pp. 55-65. ISBN 1-59593-492-8. (doi:https://doi.org/10.1145/1159861.1159869) (Full text available)
[img]
Preview

Sulzmann, Martin and Wang, Meng (2004) A Systematic Translation of Guarded Recursive Data Types to Existential Types. Technical report. National University of Singapore (Unpublished) (Full text available)
[img]
Preview

Sulzmann, Martin and Wang, Meng (2005) Translating Generalized Algebraic Data Types to System F. Technical report. National University of Singapore (Unpublished) (Full text available)
[img]
Preview

Swenson, R.L. and Dimond, Keith R. (1998) A universal colour transformation architecture. Pattern Recognition Letters, 19 (9). pp. 805-813. ISSN 0167-8655. (doi:https://doi.org/10.1016/S0167-8655(98)00061-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

T

Tapiador, Juan E. and Hernandez-Castro, Julio C. and Peris-Lopez, Pedro (2012) Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management,, 20 (4). pp. 561-578. ISSN 1064-7570. (doi:https://doi.org/10.1007/s10922-012-9246-0) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Tardivel, Gillian M. and Morse, David R. (1998) The role of the user in computer-based species identification. In: Conference on Unlocking the Future - Information Technology in Plant Pathology and Biodiversity, December 16-19, 1996, University of Kent, Canterbury, England. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Taylor, Chris and Derrick, John and Boiten, Eerke Albert (2000) A Case Study in Partial Specification: Consistency and Refinement for Object-Z. In: Formal Engineering Methods, 2000. ICFEM 2000. Third IEEE International Conference on. IEEE pp. 177-185. ISBN 0-7695-0822-7. (doi:https://doi.org/10.1109/ICFEM.2000.873818) (Full text available)
[img]
Preview

Thompson, Simon and Lins, Rafael D. (1992) The categorical multi-combinator machine - cmcm. Computer Journal, 35 (2). pp. 170-176. ISSN 0010-4620. (doi:https://doi.org/10.1093/comjnl/35.2.170) (Full text available)
[img]
Preview
[img]
Preview

Timmis, Jon and Hone, Andrew N.W. and Stibor, Thomas and Clark, Edward (2008) Theoretical advances in artificial immune systems. Theoretical Computer Science, 403 (1). pp. 11-32. ISSN 0304-3975. (doi:https://doi.org/10.1016/j.tcs.2008.02.011) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Tupman, Charlotte and Hedges, Mark and Jordanous, Anna and Roueché, Charlotte and Lawrence, K. Faith and Wakelnig, Elvira and Dunn, Stuart (2012) Sharing Ancient Wisdoms: developing structures for tracking cultural dynamics by linking moral and philosophical anthologies with their source and recipient texts. In: Digital Humanities, 2012, Hamburg, Germany. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Tupman, Charlotte and Jordanous, Anna (2014) Sharing Ancient Wisdoms across the Semantic Web using TEI and ontologies. In: Andrews, T.L. and Mace, C., eds. Analysis of Ancient and Medieval Texts and Manuscripts: Digital Approaches. Lectio (LECTIO 1) . Brepols, Belgium. ISBN 978-2-503-55268-2. (Full text available)
[img]
Preview

Tupman, Charlotte and Jordanous, Anna (2012) Sharing Ancient Wisdoms across the Semantic Web using TEI and ontologies. In: Methods and means for digital analysis of ancient and medieval texts and manuscripts, 2012, Leuven, Belgium. (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Turner, David A. (1995) Elementary strong functional programming. In: Hartel, Pieter H. and Plasmeijer, Rinus, eds. Funtional Programming Languages in Education. Lecture Notes in Computer Science, 1022. Springer-Verlag Berlin pp. 1-13. ISBN 3-540-60675-0. (doi:https://doi.org/10.1007/3-540-60675-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Tussyadiah, Iis and Li, Shujun and Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, Juho and Neidhardt, Julia, eds. Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019. Springer Nature Switzerland AG, Cham, Switzerland pp. 278-290. ISBN 978-3-030-05939-2. E-ISBN 978-3-030-05940-8. (doi:https://doi.org/10.1007/978-3-030-05940-8_22) (Full text available)
[img]
Preview

V

Vasconcelos, G.C. and Fairhurst, Michael and Bisset, D.L. (1995) EFFICIENT DETECTION OF SPURIOUS INPUTS FOR IMPROVING THE ROBUSTNESS OF MLP NETWORKS IN PRACTICAL APPLICATIONS. Neural Computing & Applications, 3 (4). pp. 202-212. ISSN 0941-0643. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Vasconcelos, G.C. and Fairhurst, Michael and Bisset, D.L. (1995) INVESTIGATING FEEDFORWARD NEURAL NETWORKS WITH RESPECT TO THE REJECTION OF SPURIOUS PATTERNS. Pattern Recognition Letters, 16 (2). pp. 207-212. ISSN 0167-8655. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Voigtlander, Janis and Hu, Zhenjiang and Matsuda, Kazutaka and Wang, Meng (2010) Combining Syntactic and Semantic Bidirectionalization. In: Proceedings of the 15th ACM SIGPLAN international conference on Functional programming. pp. 181-192. ISBN 978-1-60558-794-3. (Full text available)
[img]
Preview

Voigtlander, Janis and Hu, Zhenjiang and Matsuda, Kazutaka and Wang, Meng (2013) Enhancing Semantic Bidirectionalization via Shape Bidirectionalizer Plug-ins. Journal of Functional Programming, 23 (05). pp. 515-551. ISSN 0956-7968. (doi:https://doi.org/10.1017/S0956796813000130) (Full text available)
[img]
Preview

Vu, Quang and Colombo, Maurizio and Asal, Rasool and Sajjad, Ali and El-Moussa, Fadi Ali and Dimitrakos, Theo (2015) Secure Cloud Storage: A Framework for Data Protection as a Service in the Multi-cloud Environment. In: Communications and Network Security (CNS), 2015 IEEE Conference on. pp. 638-642. (doi:https://doi.org/10.1109/CNS.2015.7346879) (Full text available)
[img]
Preview

van Leemput, Koen and Maes, Frederik and Bello, Fernando and Vandermeulen, Dirk and Colchester, Alan C. F. and Suetens, Paul (1999) Automated segmentation of MS lesions from multi-channel MR images. In: Taylor, Chris and Colchester, Alan C. F., eds. Medical Image Computing and Computer-Assisted Intervention, MICCAI'99, Proceedings. Lecture Notes in Computer Science, 1679. Springer-Verlag Berlin pp. 11-21. ISBN 3-540-66503-X. (doi:https://doi.org/10.1007/10704282_2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

W

Walczowski, Les T. and Jastrzebski, Adam K. and Barnaby, J.E. (1994) A Multi- Mode System for Gaas Circuis. In: 1994 IEEE International Symposium on Circus and Systems, VOL 1 - Computer Aided Design (CAD). I E E E A427-A430. ISBN 0-7803-1915-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Walczowski, Les T. and Nalbantis, D. and Waller, Winston A.J. and Shi, K. (1997) Analogue layout generation by World Wide Web server-based agents. European Conference on Design Automation . I E E E, Computer Soc Press, USA, 634 pp. ISBN 0-8186-7786-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Waller, Winston A.J. and Aziz, S.M. (1994) A C-Testable Parallel Multipler Using Differencial Casecode Voltage Swish (DCVS) Logic. In: Yanagawa, T. and Ivey, P.A., eds. VLSI 93. Elsevier Science Publ B V pp. 133-142. ISBN 0-444-89911-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Waller, Winston A.J. and Walczowski, Les T. and Nalbantis, D. (1996) A new bipolar op-amp IC synthesis approach. In: Zhang, Qingling and Tang, Ting-Ao and Yu, Huihua, eds. 1996 2nd International Conference on Asic, Proceedings. Shanghai Scientific & Technical Literature Publ pp. 57-60. ISBN 7-5439-0940-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wang, Frank Z. (2018) Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management. IEEE Transactions on Emerging Topics in Computational Intelligence, 2 (1). pp. 13-24. ISSN 2471-285X. E-ISSN 2471-285X. (doi:https://doi.org/10.1109/TETCI.2017.2755691) (Full text available)
[img]
Preview
[img]
Preview

Wang, Frank Z. and Chua, Leon O. and Yang, Xiao and Helian, Na and Tetzlaff, Ronald and Schmidt, Schmidt and Li, Ling and Carrasco, Jose Manuel Garcia and Chen, Wanlong and Chu, Dominique (2013) Adaptive Neuromorphic Architecture (ANA). Neural Networks, 45 (1). pp. 111-116. ISSN 0893-6080. (doi:https://doi.org/10.1016/j.neunet.2013.02.009) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Wang, Frank Z. and Li, Ling and Shi, Luping and Wu, Huaqiang and Chua, Leon (2019) Φ memristor: Real memristor found. Journal of Applied Physics, 125 (5). 054504. ISSN 0021-8979. (doi:https://doi.org/10.1063/1.5042281) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Wang, Meng and Chen, Kung and Khoo, Siau-Cheng (2006) On the Pursuit of Static and Coherent Weaving. In: Foundations of Aspect-Oriented Languages Workshop. (Full text available)
[img]
Preview

Wang, Meng and Chen, Kung and Khoo, Siau-Cheng (2006) Type-Directed Weaving of Aspects for Higher-order Functional Languages. In: 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation. pp. 78-87. ISBN 1-59593-196-1. (doi:https://doi.org/10.1145/1111542.1111555) (Full text available)
[img]
Preview

Wang, Meng and Gibbons, Jeremy and Matsuda, Kazutaka and Hu, Zhenjiang (2010) Gradual Refinement: Blending Pattern Matching with Data Abstraction. In: Proceedings of the 10th International Conference on Mathematics of Program Construction. ISBN 978-3-642-13320-6. (Full text available)
[img]
Preview

Wang, Meng and Gibbons, Jeremy and Matsuda, Kazutaka and Hu, Zhenjiang (2013) Refactoring pattern matching. Science of Computer Programming, 78 (11). pp. 2216-2242. ISSN 0167-6423. (doi:https://doi.org/10.1016/j.scico.2012.07.014) (Full text available)
[img]
Preview

Wang, Meng and Gibbons, Jeremy and Wu, Nicolas (2011) Incremental Updates for Efficient Bidirectional Transformations. In: Proceedings of the 16th ACM SIGPLAN international conference on Functional programming. pp. 392-403. ISBN 978-1-4503-0865-6. (doi:https://doi.org/10.1145/2034773.2034825) (Full text available)
[img]
Preview

Wang, Meng and Najd, Shayan (2014) Semantic Bidirectionalization Revisited. In: Proceedings of the ACM SIGPLAN 2014 Workshop on Partial Evaluation and Program Manipulation. ISBN 978-1-4503-2619-3. (doi:https://doi.org/10.1145/2543728.2543729) (Full text available)
[img]
Preview

Wang, Meng and Oliveira, Bruno (2009) What Does Aspect-Oriented Programming Mean for Functional Programmers? In: Proceedings of the 2009 ACM SIGPLAN workshop on Generic programming. ISBN 978-1-60558-510-9. (doi:https://doi.org/10.1145/1596614.1596621) (Full text available)
[img]
Preview

Wang, Yi and Kerridge, Simon and Smith, Peter and Foster, Simon and Coppin, Steve and Trowell, Setphen (2011) Integration of CERIF, ESB and Cloud in the Development of a National Global Research and Administrative Management System. In: Metadata and Semantic Research. Springer, pp. 245-255. ISBN 978-3-642-24730-9. (doi:https://doi.org/10.1007/978-3-642-24731-6_26) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Wazan, Ahmad Samer and Laborde, Romain and Chadwick, David W. and Barrere, Francois and Benzekri, Abdelmalek and Habbal, Abid M.M. and Kaiiali, Mustafa (2017) Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. Security and Communication Networks, 2017 (690714). pp. 1-23. ISSN 1939-0114. E-ISSN 1939-0122. (doi:https://doi.org/10.1155/2017/6907146) (Full text available)
[img]
Preview

Webber, J. Beau W. (1989) A Pipe has two ends. Using APL in a multiprocess/multiprocessor environment. A proposal for a flexible but easy to use syntax. Apl Quad Quote, 20 (1). pp. 1-2. (doi:https://doi.org/10.1145/379199.379200) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img] [img]
Preview

Welch, Peter H. and Brown, Neil C.C. and Moores, James and Chalmers, Kevin and Sputh, Bernhard H. C. (2007) Integrating and extending JCSP. In: McEwan, Alistair A. and Schneider, S. and Ifill, W. and Welch, Peter H., eds. Communicating Process Architectures 2007: WoTUG-30. Concurrent Systems Engineering (Volume). IOS Press, US, Amsterdam, pp. 349-370. ISBN 978-1-58603-767-3. (Full text available)
[img]
Preview

Welch, Peter H. and Justo, George R. R. and Willcock, Colin J. (1993) High-level paradigms for deadlock-free high-performance systems. In: Grebe, R. and Hektor, J. and Hilton, S.C. and Jane, M.R. and Welch, Peter H., eds. Transputer Applications and Systems 93 Transputer Applications and Systems 93. Transputer & Occam Engineering., 36 . IOS press, Amsterdam, pp. 981-1004. ISBN 90-5199-140-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Welch, Peter H. and Wood, David C. (1993) Image tracking in real-time: a transputer emulation of some early mammalian vision processes. Image and Vision Computing, 11 (4). pp. 221-228. ISSN 0262-8856. (doi:https://doi.org/10.1016/0262-8856(93)90039-J) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wickerson, John and Batty, Mark and Sorensen, Tyler and Constantinides, George A. (2017) Automatically Comparing Memory Consistency Models. In: ACM SIGPLAN Notices - POPL '17. POPL 2017 Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. ACM, New York pp. 190-204. ISBN 978-1-4503-4660-3. (doi:https://doi.org/10.1145/3093333.3009838) (Full text available)
[img]
Preview

Williamson, Jon (2004) Bayesian Nets and Causality: Philosophical and Computational Foundations. Oxford University Press, Oxford, 250 pp. ISBN 978-0-19-853079-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Williamson, Jon (2001) Bayesian Networks for Logical Reasoning. In: Proceedings of the AAAI Fall Symposium on using Uncertainty within Computation. AAAI Press, pp. 136-143. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Williamson, Jon (2001) Foundations for Bayesian Networks. In: Corfield, David and Williamson, Jon, eds. Foundations of Bayesianism. Applied Logic Series (24). Kluwer Academic Publishers Group, Dordrecht, pp. 75-115. ISBN 1-4020-0223-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Williamson, Jon (2005) Objective Bayesian Nets. In: Artemov, Sergei and Barringer, Howard and Garcez, Artur d'Avila, eds. We Will Show Them: Essays in Honour of Dov Gabbay. College Publications, London, pp. 713-730. ISBN 978-1-904987-26-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wilson, E. (1992) Guiding lawyers - mapping law into hypertext. Artificial Intelligence Review, 6 (2). pp. 161-189. ISSN 0269-2821. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wilson, E. and Lindley, I. and Pullen, S. (1992) Callguide - using programmable hypertext as a shell for call programs. Lecture Notes in Computer Science, 602 . pp. 592-615. ISSN 0302-9743. (doi:https://doi.org/10.1007/3-540-55578-1_102) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wilson, Eve (1994) Using Corpora as a Resource in Language Teaching. In: Computers and Education. Elsevier pp. 41-51. (doi:https://doi.org/10.1016/0360-1315(94)90031-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wilson, John J. and Palaniappan, Ramaswamy (2011) Analogue mouse pointer control via an online steady state visual evoked potential (SSVEP) brain-computer interface. Journal of Neural Engineering, 8 (2). pp. 1-6. ISSN 1741-2560. (doi:https://doi.org/10.1088/1741-2560/8/2/025026) (Full text available)
[img]
Preview

Wilson, John J. and Palaniappan, Ramaswamy (2009) Augmenting a SSVEP BCI through single cycle analysis and phase weighting. In: Proceedings of 4th International IEEE EMBS Conference on Neural Engineering. IEEE pp. 371-374. ISBN 978-1-4244-2072-8. E-ISBN 978-1-4244-2073-5. (doi:https://doi.org/10.1109/NER.2009.5109310) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wood, David C. and Welch, Peter H. (1996) The Kent retargetable occam compiler. In: Oneill, B.C. and Transputer User, Grp, eds. Parallel Processing Developments. I O S Press pp. 143-166. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wusteman, Judith (1996) Electronic journal formats. Program: Electronic Library and Information Systems, 30 (4). pp. 319-343. ISSN 0033-0337. (doi:https://doi.org/10.1108/eb047235) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wusteman, Judith (1992) Explanation-based learning - a survey. Artificial Intelligence Review, 6 (3). pp. 243-262. ISSN 0269-2821. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Y

YANG, XIAO (2014) Memristor based neural networks: Feasibility, theories and approaches. Doctor of Philosophy (PhD) thesis, University of Kent,. (Full text available)
[img]
Preview

Yang, Xiao and Chen, Wanlong and Wang, Frank Z. (2013) A Memristor-CAM (Content Addressable Memory) Cell: New Design and Evaluation. In: International Conference on Computer Science and Information Technology. pp. 1045-1048. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Yu, Li and Pérez-Delgado, Carlos A and Fitzsimons, Joseph F (2014) Limitations on information-theoretically-secure quantum homomorphic encryption. Physical Review A, 90 (5). 050303. (doi:https://doi.org/10.1103/PhysRevA.90.050303) (Full text available)
[img]
Preview

Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Lecture Notes in Computer Science, 10292. Springer International Publishing AG pp. 251-264. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:https://doi.org/10.1007/978-3-319-58460-7_17) (Full text available)
[img]
Preview

Yuvaraj, R. and Murugappan, M. and Ibrahim, Norlinah Mohamed and Sundaraj, Kenneth and Omar, Mohd Iqbal and Mohamad, Khairiyah and Palaniappan, Ramaswamy (2014) Detection of emotions in Parkinson's disease using higher order spectral features from brain's electrical activity. Biomedical Signal Processing and Control, 14 . pp. 108-116. ISSN 1746-8094. (doi:https://doi.org/10.1016/j.bspc.2014.07.005) (Full text available)
[img]
Preview

Yuvaraj, Rajamanickam and Murugappan, Murugappan and Ibrahim, Norlinah Mohamed and Omar, Mohd Iqbal and Sundaraj, Kenneth and Mohamad, Khairiyah and Palaniappan, Ramaswamy and Satiyan, Marimuthu (2014) Emotion classification in Parkinson's disease by higher-order spectra and power spectrum features using EEG signals: A comparative study. Journal of Integrative Neuroscience, 13 (1). pp. 89-120. ISSN 0219-6352. E-ISSN 1757-448X. (doi:https://doi.org/10.1142/S021963521450006X) (Full text available)
[img]
Preview

Yuvaraj, Rajamanickam and Murugappan, Murugappan and Ibrahim, Norlinah Mohamed and Sundaraj, Kenneth and Omar, Mohd Iqbal and Mohamad, Khairiyah and Palaniappan, Ramaswamy (2014) Optimal set of EEG features for emotional state classification and trajectory visualization in Parkinson's disease. International Journal of Psychophysiology, 94 (3). pp. 482-495. ISSN 0167-8760. (doi:https://doi.org/10.1016/j.ijpsycho.2014.07.014) (Full text available)
[img]
Preview

Yuvaraj, Rajamanickam and Murugappan, Murugappan and Ibrahim, Norlinah Mohamed and Sundaraj, Kenneth and Omar, Mohd Iqbal and Mohamad, Khairiyah and Palaniappan, Ramaswamy and Satiyan, Marimuthu (2014) Inter-hemispheric EEG coherence analysis in Parkinson's disease : Assessing brain activity during emotion processing. Journal of Neural Transmission, 122 (2). pp. 237-252. ISSN 0300-9564. E-ISSN 1435-1463. (doi:https://doi.org/10.1007/s00702-014-1249-4) (Full text available)
[img]
Preview

Z

Zhang, Leishi and Kujis, J.N. and Liu, Xiaohui (2008) Information visualization for DNA microarray data analysis: A critical review. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 38 (1). pp. 42-54. ISSN 1094-6977. (doi:https://doi.org/10.1109/tsmcc.2007.906065) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Zhang, Lingwei and Deng, Yuhui and Zhu, Weiheng and Zhou, Jipeng and Wang, Frank Z. (2015) Skewly replicating hot data to construct a power-efficient storage cluster. Journal of Network and Computer Applications (IF=2.762, ranked A at ERA), 50 . pp. 168-179. (doi:https://doi.org/10.1016/j.jnca.2014.06.005) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Zhao, Liming and Pérez-Delgado, Carlos A and Fitzsimons, Joseph F (2016) Fast graph operations in quantum computation. Physical Review A, 93 (3). 032314. (doi:https://doi.org/10.1103/PhysRevA.93.032314) (Full text available)
[img]
Preview

Zheng, Yi and Hague, Jim (1991) Dmt - a Demonstration Tool. Software: Practice and Experience, 21 (9). pp. 949-961. ISSN 0038-0644. (doi:https://doi.org/10.1002/spe.4380210905) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Č

Čagalj, Mario and Perković, Toni and Bugarić, Marin and Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:https://doi.org/10.1016/j.pmcj.2014.09.002) (Full text available)
[img]
Preview

This list was generated on Sun Feb 17 04:12:07 2019 GMT.