Skip to main content

Items where Subject is "Q Science > QA Mathematics (inc Computing science) > QA 75 Electronic computers. Computer science"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator's name | Item Type | Date | No Grouping
Jump to: ? | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | V | W | Y | Z
Number of items at this level: 476.

?

?agalj, Mario, Perkovi?, Toni, Bugari?, Marin, Li, Shujun (2015) Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks. Pervasive and Mobile Computing, 20 . pp. 64-81. ISSN 1574-1192. (doi:10.1016/j.pmcj.2014.09.002)
[img]
Preview

A

Abdullah, Sophiana Chua and Cooley, Roger (2000) The use of constraint logic programming in the development of adaptive tests. In: Gauthier, Gilles and Frasson, Claude and VanLehn, Kurt, eds. Intelligent Tutoring Systems 5th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, p. 650. ISBN 978-3-540-67655-3. E-ISBN 978-3-540-45108-2. (doi:10.1007/3-540-45108-0_73) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ackerman, Margareta and Goel, Ashok and Johnson, Colin G. and Jordanous, Anna and Leon, Carlos and Perez y Perez, Rafael and Toivonen, Hannu and Ventura, Dan (2017) Teaching Computational Creativity. In: Goel, Ashok and Jordanous, Anna and Pease, Alison, eds. ICCC'17 - Proceedings of the Eighth International Conference on Computational Creativity. Georgia Institute of Technology, Atlanta, Georgia, USA, pp. 9-16. ISBN 978-0-692-89564-1.
[img]
Preview

Agrafiotis, Ioannis, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie, Upton, David (2018) A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, . ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyy006)
[img]
Preview
[img]
Preview

Akehurst, David H. (2000) An 00 visual language definition approach supporting multiple views. In: Proceeding 2000 IEEE International Symposium on Visual Languages. IEEE Computer Society Workshop on Visual Langauages . IEEE, pp. 57-58. ISBN 0-7695-0840-5. (doi:10.1109/VL.2000.874350)
[img]
Preview

Alcaide, Almudena, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Bayesian rational exchange. International Journal of Information Security, 7 (1). pp. 85-100. ISSN 1615-5262. (doi:10.1007/s10207-007-0039-5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Alcaide, Almudena, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Cryptanalysis of Syverson's Rational Exchange Protocol. International Journal of Network Security, 7 (2). pp. 151-156. ISSN 2152-5064. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Alglave, Jade, Batty, Mark, Donaldson, Alastair F., Gopalakrishnan, Ganesh, Ketema, Jeroen, Poetzl, Daniel, Sorensen, Tyler, Wickerson, John (2015) GPU Concurrency: Weak Behaviours and Programming Assumptions. In: ACM SIGPLAN Notices. Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '15, Istanbul, Turkey, March 14-18, 2015. . pp. 577-591. ACM Press ISBN 978-1-4503-2835-7. (doi:10.1145/2694344.2694391)
[img]
Preview

Alhanahnah, Mohannad and Chadwick, David (2016) Boosting usability for Protecting Online Banking Applications Against APTs. In: Amman, Jordan, ed. 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE, pp. 70-76. ISBN 978-1-5090-2658-6. (doi:10.1109/CCC.2016.13)
[img]
Preview

Ali, Mohammed Aamir, Arief, Budi, Emms, Martin, van Moorsel, Aad (2017) Does The Online Card Payment Landscape Unwittingly Facilitate Fraud? IEEE Security & Privacy, 15 (2). pp. 78-86. ISSN 1540-7993.
[img]
Preview

Alim, Abdul and Clegg, Richard and Mai, Luo and Rupprecht, Lukas and Seckler, Eric and Costa, Paolo and Pietzuch, Peter and Wolf, Alexander L. and Sultana, Nik and Crowcroft, Jon and Madhavapeddy, Anil and Moore, Andrew and Mortier, Richard and Kolehini, Masoud and Oviedo, Luis and McAuley, Derek and Migliavacca, Matteo (2016) FLICK: Developing and Running Application-Specific Network Services. In: 2nd Symposium on Networked Systems Design & Implementation 2005. USENIX Association. ISBN 978-1-931971-30-0.
[img]
Preview

Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun (2017) PSV (Password Security Visualizer): From Password Checking to User Education. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science, 10292 . Springer International Publishing AG, pp. 191-211. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_13)
[img]
Preview

Allington, Daniel, Jordanous, Anna, Dueck, Byron (2015) Music, value, and networks in the digital world. http://valuingelectronicmusic.org
[img]
Preview

Alqahtani, Saeed Ibrahim, Li, Shujun (2017) PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices. In: Fischer, Mathias, ed. Proceedings of the 12th International Conference on Availability, Reliability and Security. . Article No. 19. ACM, New York, NY, USA ISBN 978-1-4503-5257-4. (doi:10.1145/3098954.3098984)
[img]
Preview

Alsalibi, B.a, Venkat, I.a, Subramanian, K.G.a, Lutfi, S.L.a, De Wilde, P.b (2015) The impact of bio-inspired approaches toward the advancement of face recognition. ACM Computing Surveys, 48 (1). ISSN 0360-0300. (doi:10.1145/2791121) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Anzellotti, G., Battiti, Roberto, Lazzizzera, I., Soncini, G., Zorat, Alessandro, Sartori, Alvise, Tecchiolli, Giampietro, Lee, Peter (1995) Totem:. a Highly Parallel Chip for Triggering Applications with Inductive Learning Based on the Reactive Tabu Search. International Journal of Modern Physics C, 6 (4). pp. 555-560. ISSN 0129-1831. (doi:10.1142/S0129183195000423) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Arapinis, Myrto and Cheval, Vincent and Delaune, Stéphanie (2015) Composing security protocols: from confidentiality to privacy. In: Focardi, Ricardo and Myers, Andrew, eds. Principles of Security and Trust 4th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 324-343. ISBN 978-3-662-46665-0. E-ISBN 978-3-662-46666-7. (doi:10.1007/978-3-662-46666-7_17) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img] [img]

Arapinis, Myrto, Cheval, Vincent, Delaune, Stéphanie (2012) Verifying Privacy-Type Properties in a Modular Way. In: 25th IEEE Computer Security Foundations Symposium (CSF'12), June 2012, Cambridge Massachusetts, USA. (doi:10.1109/CSF.2012.16)
[img]
Preview
[img]
Preview

Asensio-Cubero, J, Gan, J Q, Palaniappan, Ramaswamy (2013) Multiresolution analysis over simple graphs for brain computer interfaces. Journal of Neural Engineering, 10 (4). 046014. ISSN 1741-2560. (doi:10.1088/1741-2560/10/4/046014)
[img]
Preview

Asghar, Hassan Jameel, Steinfeld, Ron, Li, Shujun, Kaafa, Mohamed Ali, Pieprzyk, Josef (2015) On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1643-1655. ISSN 1556-6013. (doi:10.1109/TIFS.2015.2421875) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Aslan, Çağrı B. and Sağlam, Rahime Belen and Li, Shujun (2018) Automatic Detection of Cyber Security Related Accounts on Online Social Networks: Twitter as an example. In: Proceedings of the 9th International Conference on Social Media and Society. ACM-ICPS International Conference Proceeding Series . ACM, New York, USA. ISBN 978-1-4503-6334-1. (doi:10.1145/3217804.3217919)
[img]
Preview

Ayad, Mohamed, Fleischmann, Peter (2008) On the decomposition of rational functions. Journal of Symbolic Computation, 43 (4). pp. 259-274. ISSN 0747-7171. (doi:10.1016/j.jsc.2007.10.009) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

B

Baba, Samuel D, Yadav, Supriya, Howells, Gareth (2019) SortAlgo-Metrics: Identification of Cloud-Based Server Via a Simple Algorithmic Analysis. In: Proceddings of Eighth IEEE International Conference on Emerging Security Technologies. Proceddings of Eighth IEEE International Conference on Emerging Security Technologies. . IEEE, New York, NY, USA ISBN 978-1-72815-546-3. (doi:10.1109/EST.2019.8806214)
[img]
Preview

Bada, Maria, Nurse, Jason R. C. (2019) Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs). Information and Computer Security, . ISSN 2056-4961. (doi:10.1108/ICS-07-2018-0080)
[img]
Preview

Bai, Lu, Yeung, Chris, Efstratiou, Christos, Chikomo, Moyra (2019) Motion2Vector: Unsupervised Learning in Human Activity Recognition Using Wrist-Sensing Data. In: CPD 2019: THE 2nd Workshop on Combining Physical and Data-Driven Knowledge in Ubiquitous Computing, in conjunction with Ubicomp'19, 9 Sep 2019.
[img]
Preview

Bailey, Christopher and Chadwick, David W and de Lemos, Rogério and Siu, Kristy WS (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet. Springer Berlin Heidelberg, pp. 100-111.
[img]
Preview

Baker, Jon, Efstratiou, Christos (2017) Next2Me: Capturing Social Interactions through Smartphone Devices using WiFi and Audio signals. In: Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. . pp. 412-421. ACM ISBN 978-1-4503-5368-7. (doi:10.1145/3144457.3144500)
[img]
Preview

Barnes, David J., Hopkins, Tim (2000) The evolution and testing of a medium sized numerical package. In: Langtangen, Hans Petter and Bruaset, Are Magnus and Quak, Ewald, eds. Advances In Software Tools For Scientific Computing. 10. pp. 225-237. Springer-Verlag Berlin ISBN 3-540-66557-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Barrero, David, Hernandez-Castro, Julio C., Peris-Lopez, Pedro, Camacho, David (2014) A genetic tango attack against the David–Prasad RFID ultra?lightweight authentication protocol. Expert Systems, 31 (1). pp. 9-19. ISSN 0266-4720. (doi:10.1111/j.1468-0394.2012.00652.x) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Bassett, Eryl E., Brooks, Stephen P., Morgan, Byron J. T. (1994) Minitab macros for multivariate analysis. Computational Statistics and Data Analysis, 17 (1). pp. 100-101. ISSN 0167-9473. (doi:10.1016/0167-9473(94)90031-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Battiti, Roberto and Lee, Peter and Sartori, Alvise and Tecchiolli, Giampietro (1995) Special-purpose parallel architectures for high-performance machine learning. In: Hertzberger, Bob and Serazzi, Giuseppe, eds. High-Performance Computing and Networking International Conference and Exhibition. Lecture Notes in Computer Science . Springer, Berlin, Germany, p. 944. ISBN 978-3-540-59393-5. E-ISBN 978-3-540-49242-9. (doi:10.1007/BFb0046600) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Batty, Mark, Dodds, Mike, Gotsman, Alexey (2013) Library abstraction for C/C++ concurrency. In: ACM SIGPLAN Notices. Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. . pp. 235-248. ACM Press ISBN 978-1-4503-1832-7. (doi:10.1145/2429069.2429099)
[img]
Preview

Batty, Mark, Memarian, Kayvan, Nienhuis, Kyndylan, Pichon-Pharabod, Jean, Sewell, Peter (2015) The Problem of Programming Language Concurrency Semantics. In: Lecture Notes in Computer Science. 24th European Symposium on Programming, ESOP 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings. 9032. pp. 283-307. Springer-Verlag Berlin ISBN 978-3-662-46668-1. (doi:10.1007/978-3-662-46669-8_12)
[img]
Preview

Batty, Mark and Memarian, Kayvan and Owens, Scott and Sarkar, Susmit and Sewell, Peter (2012) Clarifying and compiling C/C++ concurrency: from C++11 to POWER. In: Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. POPL Principles of Programming Languages . ACM, New York, USA, pp. 509-520. ISBN 978-1-4503-1083-3. (doi:10.1145/2103656.2103717)
[img]
Preview

Batty, Mark and Owens, Scott and Sarkar, Susmit and Sewell, Peter and Weber, Tjark (2011) Mathematizing C++ concurrency. In: Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. ACM, New York, USA, pp. 55-66. ISBN 978-1-4503-0490-0. (doi:10.1145/1926385.1926394)
[img]
Preview

Beckett, David J. (1995) Combined Log System. Computer Networks and ISDN Systems, 27 . pp. 1089-1096. ISSN 0169-7552. (doi:10.1016/0169-7552(95)00013-W)
[img]
Preview

Beckett, David J. and Welch, Peter H. (1996) Emulating a secure multicasting bus using occam 2.1. In: Oneill, B.C. and Transputer User, Grp, eds. Proceedings of the 19th world occam and transputer user group technical meeting on Parallel processing developments. Concurrent Systems Engineering Series . IOS Press, Amsterdam, Netherlands, pp. 59-73. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bekhet, Saddam, Ahmed, Amr, Altadmri, Amjad, Hunter, Andrew (2015) Compressed video matching: Frame-to-frame revisited. Multimedia Tools and Applications, . pp. 1-16. ISSN 1380-7501. E-ISSN 1573-7721. (doi:10.1007/s11042-015-2887-8)
[img]
Preview

Bello, Gema, Hernandez-Castro, Julio, Camacho, David (2016) Detecting discussion communities on vaccination in twitter. Future Generation Computer Systems, 66 . pp. 125-136. ISSN 0167-739X. (doi:10.1016/j.future.2016.06.032)
[img]
Preview

Blanchette, Jasmin Christian and Weber, Tjark and Batty, Mark and Owens, Scott and Sarkar, Susmit (2011) Nitpicking C++ concurrency. In: Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming. ACM, New York, USA, pp. 113-124. ISBN 978-1-4503-0776-5. (doi:10.1145/2003476.2003493)
[img]
Preview

Blanco-Gonzalo, R., Lunerti, C., Sanchez- Reillo, R., Guest, Richard (2018) Biometrics: Accessibility challenge or opportunity? PlosOne, 13 (3). e0194111. ISSN 1932-6203. (doi:10.1371/journal.pone.0194111)
[img]
Preview

Blasco Alis, Jorge, Hernandez-Castro, Julio C., Tapiador, Juan E., Ribagorda, Arturo (2012) Bypassing information leakage protection with trusted applications. Computers and Security, 31 (4). pp. 557-568. ISSN 0167-4080. (doi:10.1016/j.cose.2012.01.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Blasco Alis, Jorge, Hernandez-Castro, Julio C., de Fuentes, Jose Maria, Ramos, Benjamin (2012) A framework for avoiding steganography usage over HTTP. Journal of Network and Computer Applications, 35 (1). pp. 491-501. ISSN 1084-8045. (doi:10.1016/j.jnca.2011.10.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Boiten, Eerke Albert (2013) Anonymity will be the next victim of internet censorship. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) Blocking extremist sites is not the same as fighting child porn. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) Blocks just move child porn under the counter. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) How to commit a bank robbery (or stop one) using the internet. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) It’s all about cryptography as Rusbridger faces parliament. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2014) Russia and China prepare to fight US internet domination. . The Conversation UK Internet only.
[img]

Boiten, Eerke Albert (2013) The UK government is working in a Snowden-free bubble. . The Conversation Internet only.
[img]

Boiten, Eerke Albert (2013) iPhone hack shows security isn’t at our fingertips just yet. . Scientific American Internet only.
[img]

Boiten, Eerke Albert, Derrick, John, Bowman, Howard, Steen, Maarten (1999) Constructive consistency checking for partial specification in Z. Science of Computer Programming, 35 (1). pp. 29-75. ISSN 0167-6423. (doi:10.1016/S0167-6423(99)00006-4)
[img]
Preview
[img]
Preview

Bovey, John D. (1995) Building a Thesaurus for a Collection of Cartoon Drawings. Journal of Information Science, 21 (2). pp. 115-122. ISSN 1352-7460. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bovey, John D. (1996) Event-based personal retrieval. Journal of Information Science, 22 (5). pp. 357-366. ISSN 0165-5515. (doi:10.1177/016555159602200504)
[img]
Preview
[img]
Preview

Bovey, John D. (1993) A graphical retrieval-system. Journal of Information Science, 19 (3). pp. 179-187. ISSN 0165-5515. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowles, Stephen, Hernandez-Castro, Julio C. (2015) The first 10 years of the Trojan Horse defence. Computer Fraud & Security, 2015 (1). pp. 5-13. ISSN 1361-3723. (doi:10.1016/S1361-3723(15)70005-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Bowman, Howard and Blair, Gordon S. and Blair, Lynne and Chetwynd, Amanda G. (1995) Formal description of distributed multimedia systems: An assessment of potential techniques. Computer Communications, 18 (12). pp. 964-977. ISSN 0140-3664. (doi:10.1016/0140-3664(96)81596-9) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard and Blair, Gordon S. and Blair, Lynne and Chetwynd, Amanda G. (1993) Time Versus Abstraction In Formal Description. In: Tenney, Richard L. and Amer, Paul D. and Uyar, M.Umit, eds. FORTE '93 Proceedings of the IFIP TC6/WG6.1 Sixth International Conference on Formal Description Techniques, VI. North-Holland Publishing Co., Netherlands, pp. 467-482. ISBN 0-444-81773-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard, Derrick, John, Brinksma, E. (2000) Selected papers from the Second IFIP Int'l Conference on Formal Methods for Open Object Based Distributed Systems, 1997. IEEE Transactions on Software Engineering, 26 (7). pp. 577-578. ISSN 0098-5589. (doi:10.1109/TSE.2000.859528) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard, Derrick, John, Linington, Peter F., Steen, Maarten (1996) Cross-viewpoint consistency in open distributed processing. Software Engineering Journal, 11 (1). pp. 44-57. ISSN 0268-6961. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Bowman, Howard, Filetti, Marco, Alsufyani, Abdulmajeed, Janssen, Dirk P., Su, Li (2014) Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough. PLoS ONE, 9 (3). e90595. ISSN 1932-6203. (doi:10.1371/journal.pone.0090595)
[img]
Preview

Bowman, Howard, Filetti, Marco, Wyble, Brad, Olivers, Christian (2013) Attention is more than prediction precision [Commentary on target article]. Behavioral and Brain Sciences, 36 (3). pp. 206-208. ISSN 0140-525X. (doi:10.1017/S0140525X12002324)
[img]
Preview

Brooks, Stephen P., Morgan, Byron J. T. (1994) Automatic Starting Point Selection For Function Optimization. Statistics and Computing, 4 (3). pp. 173-177. ISSN 0960-3174. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Brown, Chloë, Efstratiou, Christos, Leontiadis, Ilias, Quercia, Daniele, Mascolo, Cecilia, Scott, James, Key, Peter (2014) The Architecture of Innovation: Tracking Face-to-Face Interactions with UbiComp Technologies. In: ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), 13-17 Sep 2014, Seattle, WA, USA. (doi:10.1145/2632048.2632056)
[img]
Preview

Brown, Neil C.C. (2004) C++CSP Networked. In: Communicating Process Architectures 2004. Concurrent Systems Engineering Series . IOS Press, pp. 185-200. ISBN 978-1-58603-458-0.
[img]
Preview

Bruna, Maria, Grigore, Radu, Kiefer, Stefan, Ouaknine, Joel, Worrell, James (2016) Proving the Herman-Protocol Conjecture. In: Chatzigiannakis, Ioannis and Mitzenmacher, Michael and Rabani, Yuval and Sangiorgi, Davide, eds. 43rd International Colloquium on Automata, Languages, and Programming (ICALP 2016). 55. 104:1-104:12. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany ISBN 978-3-95977-013-2. (doi:10.4230/LIPIcs.ICALP.2016.104)
[img]
Preview

Buchberger, Bruno, Craciun, Adrian, Jebelean, Tudor, Kovacs, Laura, Temur, Kutsia, Koji, Nakagawa, Piroi, Florina, Popov, Nikolaj, Robu, Judit, Rosenkranz, Markus, and others. (2006) Theorema: Towards computer-aided mathematical theory exploration. Journal of Applied Logic, 4 (4). pp. 470-504. ISSN 1570-8683. (doi:10.1016/j.jal.2005.10.006) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

C

Cakic, Jovan (2000) Intelligent infrastructure that support system's changes. In: Loganantharaj, Rasiah and Palm, Gunther and Ali, Moonis, eds. Intelligent Problem Solving. Methodologies and Approaches 13th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 351-356. ISBN 978-3-540-67689-8. E-ISBN 978-3-540-45049-8. (doi:10.1007/3-540-45049-1_43) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Canuto, Anne, Howells, Gareth, Fairhurst, Michael (2000) An investigation of the effects of variable vigilance within the RePART neuro-fuzzy network. Journal of Intelligent & Robotic Systems, 29 (4). pp. 317-334. ISSN 0921-0296. (doi:10.1023/A:1008159908688) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Canuto, Anne, Howells, Gareth, Fairhurst, Michael (2000) The use of confidence measures to enhance combination strategies in multi-network neuro-fuzzy systems. Connection Science, 12 (3-4). pp. 315-331. ISSN 0954-0091. (doi:10.1080/09540090010014089) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Carter, Janet (1999) Collaboration or Plagiarism: What happens when students work together. In: Manaris, B., ed. Proceedings of the 4th Annual Conference on Innovation and Technology in Computer Science Education. ACM, New York, USA, pp. 52-55. ISBN 1-58113-087-2. (doi:10.1145/384267.305848) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Carter, Janet and Jenkins, Tony (1999) Gender and programming: What's going on? In: ITICSE '99: Proceedings of the 4th Annual SIGCSE/SIGCUE Conference on Innovation and Technology in Computer Science Education. ACM, New York, USA, pp. 1-4. ISBN 1-58113-087-2. (doi:10.1145/384267.305824) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Chadwick, David W., Fan, Wenjun, Constantino, Gianpiero, De Lemos, Rogério, Di Cerbo, Francesco, Herwono, Ian, Mori, Paolo, Sajjad, Ali, Wang, Xiao-Si, Manera, Mirko and others. (2019) A cloud-edge based data security architecture for sharing and analyzing cyber threat information. Future Generation Computer Systems, . ISSN 0167-739X. (doi:10.1016/j.future.2019.06.026)
[img]
Preview

Chadwick, David W., Su, L., Laborde, Romain (2008) Coordinating access control in grid services. Concurrency and Computation: Practice and Experience, 20 (9). pp. 1071-1094. ISSN 1532-0626. (doi:10.1002/cpe.1284)
[img]
Preview

Chadwick, David W., Zhao, Gansen, Otenko, Sassa, Laborde, Romain, Su, Linying, Nguyen, Tuan Anh (2008) PERMIS: a modular authorization infrastructure. Concurrency and Computation: Practice and Experience, 20 (11). pp. 1341-1357. ISSN 1532-0626. (doi:10.1002/cpe.1313)
[img]
Preview

Chadwick, David W, Inman, George (2013) The Trusted Attribute Aggregation Service (TAAS)-Providing an Attribute Aggregation Layer for Federated Identity Management. In: Availability, Reliability and Security (ARES), 2013 Eighth International Conference on.
[img]
Preview
[img]
Preview

Chen, Huankai, Wang, Frank Z., Helian, Na (2013) A Cost-Efficient and Reliable Resource Allocation Model Based on Cellular Automaton Entropy for Cloud Project Scheduling. International Journal of Advanced Computer Science and Applications, 4 (4). pp. 7-14. ISSN 2156-5570.
[img]
Preview

Chen, Kung, Weng, Shu-Chun, Lin, Jia-Yin, Wang, Meng, Khoo, Siau-Cheng (2011) Side-Effect Localization for Lazy, Purely Functional Languages via Aspects. Higher-Order and Symbolic Computation, . pp. 1-39. ISSN 1388-3690.
[img]
Preview

Chen, Kung and Weng, Shu-Chun and Wang, Meng and Khoo, Siau-Cheng and Chen, Chung-Hsin (2007) A Compilation Model for Aspect-Oriented Polymorphically Typed Functional Languages. In: Static Analysis 14th International Symposium. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 34-51. ISBN 978-3-540-74060-5. E-ISBN 978-3-540-74061-2. (doi:10.1007/978-3-540-74061-2_3)
[img]
Preview

Chen, Kung, Weng, Shu-Chun, Wang, Meng, Khoo, Siau-Cheng, Chen, Chung-Hsin (2010) Type-Directed Weaving of Aspects for Polymorphically Typed Functional Languages. Science of Computer Programming, 75 (11). pp. 1048-1076. ISSN 0167-6423. (doi:10.1016/j.scico.2010.04.001)
[img]
Preview

Chen, Wanlong and Yang, Xiao and Wang, Frank Z. (2013) Delayed Switching Applied to Memristor Content Addressable Memory Cell. In: Proceedings of the World Congress on Engineering 2013. International Association of Engineers, pp. 354-357. ISBN 978-988-19251-0-7. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Chen, Xian, Megson, G.M (1995) A General Methodology of Partition and Mapping for Given Regular Arrays. IEEE Transactions on Parallel and Distributed Systems, 6 (10). pp. 1100-1107. ISSN 1045-9219. (doi:10.1109/71.473518) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H. (1995) Bootstrap methods in computer simulation experiments. In: Alexopoulos, C. and Kang, K. and Lilegdon, W.R and Goldsman, D., eds. Winter Simulation Conference Proceedings, 1995. IEEE, pp. 171-177. ISBN 0-7803-3018-8. (doi:10.1109/WSC.1995.478720) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H. (1994) Selecting Input Models. In: Tew, J.D. and Manivannan, M.S. and Sadowski, D.A. and Seila, A.F., eds. 1994 Winter Simulation Conference Proceedings. . pp. 184-191. I E E E ISBN 0-7803-2109-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H., Holland, Wayne S. (1998) Two-point methods for assessing variability in simulation output. Journal of Statistical Computation and Simulation, 60 (3). pp. 183-205. ISSN 0094-9655. (doi:10.1080/00949659808811887) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H. and Holland, Wayne S. and Hughes, N.A. (1996) Selection of input models using bootstrap goodness-of-fit. In: Charnes, J.M. and Morrice, D.J. and Brunner, D.T. and Swain, J.J., eds. Proceedings Winter Simulation Conference. IEEE, pp. 199-206. ISBN 0-7803-3383-7. (doi:10.1109/WSC.1996.873279) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheng, Russell C.H. and Traylor, L. (1995) Characterization of material strength properties using probabilistic mixture models. In: Carlomagno, G.M. and Brebbia, C.A., eds. Computational Methods and Experimental Measurements. Computational Mechanics Publications, pp. 553-560. ISBN 978-1-85312-313-9. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cheval, Vincent (2014) APTE: An Algorithm for Proving Trace Equivalence. In: 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'14), Avril 2014, Grenoble, France. (doi:10.1007/978-3-642-54862-8_50)
[img]
Preview

Cheval, Vincent (2012) Automatic verification of cryptographic protocols: privacy-type properties. Doctor of Philosophy (PhD) thesis, ENS-Cachan.
[img]
Preview

Cheval, Vincent, Comon-Lundh, Hubert, Delaune, Stéphanie (2010) Automating Security Analysis: Symbolic Equivalence of Constraint Systems. In: Giesl, Jürgen and Hähnle, Reiner, eds. Proceedings of the 5th International Joint Conference on Automated Reasoning (IJCAR'10). Lecture Notes in Computer Science , 6173. pp. 412-426. Springer-Verlag Berlin, Edinburgh, Scotland, UK ISBN 978-3-642-14202-4. E-ISBN 978-3-642-14203-1. (doi:10.1007/978-3-642-14203-1_35)
[img]
Preview

Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie (2011) Trace Equivalence Decision: Negative Tests and Non-determinism. In: Chen, Yan and Danezis, George and Shmatikov, Vitaly, eds. Proceedings of the 18th ACM conference on Computer and communications security. ACM, New York, USA, pp. 321-330. ISBN 978-1-4503-0948-6. (doi:10.1145/2046707.2046744)
[img]
Preview

Cheval, Vincent, Comon-Lundh, Hubert, Delaune, Stéphanie (2017) A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation, 255 (part 1). pp. 94-125. ISSN 0890-5401. E-ISSN 1090-2651. (doi:10.1016/j.ic.2017.05.004)
[img]
Preview

Cheval, Vincent and Cortier, Véronique (2015) Timing attacks: symbolic framework and proof techniques. In: Focardi, Riccardo and Myers, Andrew, eds. Principles of Security and Trust 4th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 280-299. ISBN 978-3-662-46665-0. E-ISBN 978-3-662-46666-7. (doi:10.1007/978-3-662-46666-7_15)
[img]
Preview
[img]
Preview

Cheval, Vincent, Cortier, Véronique, Delaune, Stéphanie (2013) Deciding equivalence-based properties using constraint solving. Theoretical Computer Science, 492 . pp. 1-39. ISSN 0304-3975. (doi:10.1016/j.tcs.2013.04.016)
[img]
Preview

Cheval, Vincent, Cortier, Véronique, Plet, Antoine (2013) Lengths May Break Privacy – Or How to Check for Equivalences with Length. In: 25th International Conference on Computer Aided Verification (CAV'13), July 2013, St Petersburg, Russia. (doi:10.1007/978-3-642-39799-8_50)
[img]
Preview
[img]
Preview

Cheval, Vincent, Delaune, Stéphanie, Ryan, Mark (2014) Tests for Establishing Security Properties. In: 9th International Symposium on Trustworthy Global Computing (TGC'14), September 2014, Roma, Italy. (doi:10.1007/978-3-662-45917-1_6)
[img]
Preview

Chivers, Daniel, Rodgers, Peter (2013) Exploring Local Optima in Schematic Layout. In: Proceedings of the International Conference on Distributed Multimedia Systems 2013. . Knowledge Systems Institute
[img]
Preview

Chu, Dominique, Barnes, David J., Perkins, Samuel (2014) Amorphous computing in the presence of stochastic disturbances. Biosystems, 125 . pp. 32-42. ISSN 0303-2647. (doi:10.1016/j.biosystems.2014.09.010) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Clear, David and Ibbetson, Alan L. and Collinson, Peter (1994) Exporting Home on Demand to PCS. In: USENIX Systems Administration (LISA VIII) Conference Proceedings. Usenix Assoc, pp. 139-147. ISBN 978-1-880446-64-5. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cobbah, W.G.K. and Fairhurst, Michael (2000) Computer analysis of handwriting dynamics during dopamimetic tests in Parkinson's disease. In: Vajda, F., ed. Proceedings of the 26th Euromicro Conference. IEEE, A414-A418. ISBN 0-7695-0780-8. (doi:10.1109/EURMIC.2000.874521) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Colchester, Alan C. F., Ourselin, Sébastien, Zhu, Yonggen, Bardinet, Eric, He, Yang, Roche, Alexis, Al-Sarraj, Safa, Nailon, Bill, Ironside, James, Ayache, Nicholas and others. (2000) 3-D reconstruction of macroscopic optical brain slice images. In: 3rd International Conference on Medical Image Computing and Computer-Assisted Intervention, 11-14 Oct 2000, Pittsburgh, Pennsylvania. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Contrastin, Mistral, Orchard, Dominic A., Rice, Andrew C. (2018) Automatic reordering for dataflow safety of Datalog. In: Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming. Proceedings of the 20th International Symposium on Principles and Practice of Declarative Programming. . ACM ISBN 978-1-4503-6441-6. (doi:10.1145/3236950.3236954)
[img]

Cooper, Helen and Jennings, Liz (2016) ORCID EPrints Implementation Survey Analysis. Working paper. University of Central Lancashire/University of Bath, UK 10.17030/clok.00015668. (doi:10.17030/clok.00015668)
[img]
Preview

Corneli, Joseph, Jordanous, Anna, Shepperd, Rosie, Llano, Maria Teresa, Misztal, Joanna, Colton, Simon, Guckelsberger, Christian (2015) Computational Poetry Workshop: Making Sense of Work in Progress. In: 6th International Conference on Computational Creativity, June 29 - July 2, 2015, Utah, US.
[img]
Preview

Cronk, Jonathan, Sharp, John A. (1995) A framework for deciding what to outsource in information technology. Journal of Information Technology, 10 (4). pp. 259-267. ISSN 0268-3962. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Cross, M. and Keech, M. and Liddell, Heather and Steel, John and Walshaw, C and Welch, Peter H. (1995) Implementing a strategy for the promotion of high performance computing in the UK. In: Hertzberger, Bob and Serazzi, Giuseppe, eds. High-Performance Computing and Networking International Conference and Exhibition. Lecture Notes in Computer Science . Springer, Berlin, Germany, p. 941. ISBN 978-3-540-59393-5. E-ISBN 978-3-540-49242-9. (doi:10.1007/BFb0046749) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

D

Dallas, I. (1993) UCSG UNIX applications workshop, university-of-kent, July 6 and 7 1993. University Computing, 15 (4). pp. 195-200. ISSN 0265-4385. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Daniel, Joshua, El-Moussa, Fadi, Ducatel, Géry, Pawar, Pramod, Sajjad, Ali, Rowlingson, Robert, Dimitrakos, Theo (2015) Integrating Security Services in Cloud Service Stores. In: Trust Management IX. IFIP Advances in Information and Communication Technology. Trust Management IX. IFIP Advances in Information and Communication Technology , 454. pp. 226-239. Springer ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3_19) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Davies, Nigel, Davy, M.J., Blair, Gordon S., Mariani, John A. (1993) Object invocation and management in the zenith distributed multimedia information-system. Information and Software Technology, 35 (5). pp. 259-266. ISSN 0950-5849. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dealmeida, F.A., Welch, Peter H. (1994) A Parallel Emulator for a Multi-Processor Dataflow Machine. In: DeGloria, A. and Jane, M.R. and Marini, D., eds. Transputer Applications and Systems ''94, Proceedings of the 1994 World Transputer Congress. 41. pp. 259-272. I O S Press ISBN 90-5199-177-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Deng, Yuhui, Huang, Xinyu, Song, Liangshan, Zhou, Yongtao, Wang, Frank Z. (2017) Memory Deduplication: An Effective Approach to Improve the Memory System. Journal of Information Science and Engineering, 33 (5). pp. 1103-1120. ISSN 1016-2364. (doi:10.6688/JISE.2017.33.5.1)
[img]
Preview

Dent, Alan and Hanna, Keith (1993) Reasoning about array structures using a dependently typed logic. In: Agnew, David and Claesen, Luc J. M. and Camposano, Raul, eds. IFIP transactions a-computer science and technology. North Holland, pp. 207-224. ISBN 0-444-81641-0. (doi:10.1016/B978-0-444-81641-2.50022-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Boiten, Eerke Albert and Derrick, John and Smith, G., eds. (2008) Proceedings of the BCS-FACS Refinement Workshop (REFINE 2007). Electronic Notes in Theoretical Computer Science, 201 . Elsevier, 264 pp. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Derrick, John and Boiten, Eerke Albert (1998) Testing refinements by refining tests. In: Bowen, Jonathan P. and Fett, A. and Hinchey, Michael G., eds. ZUM ’98: The Z Formal Specification Notation 11th International Conference of Z Users. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 265-283. ISBN 978-3-540-65070-6. E-ISBN 978-3-540-49676-2. (doi:10.1007/978-3-540-49676-2_19)
[img]
Preview
[img]
Preview

Dib, Fadi K., Rodgers, Peter (2018) Graph drawing using tabu search coupled with path relinking. PLOS ONE, 13 (5). e0197103. ISSN 1932-6203. (doi:10.1371/journal.pone.0197103)
[img]
Preview

Dodds, Mike, Batty, Mark, Gotsman, Alexey (2018) Compositional Verification of Compiler Optimisations on Relaxed Memory. In: Lecture Notes in Computer Science. Programming Languages and Systems: 27th European Symposium on Programming, ESOP 2018 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018 Proceedings. 10801. Springer ISBN 978-3-319-89883-4. (doi:10.1007/978-3-319-89884-1_36)
[img]
Preview

Dunn, Stuart, Hedges, Mark, Jordanous, Anna, Storz, Christoph (2012) Comparing the informatics of text and Cultural Heritage: the SAWS project. In: Computer Applications and Quantitative Methods in Archaeology, 2012, Southampton, UK. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Duregard, Jonas and Jansson, Patrik and Wang, Meng (2012) Feat: Functional Enumeration of Algebraic Types. In: Proceedings of the 2012 Haskell Symposium. ICFP International Conference on Functional Programming . ACM, New York, USA, pp. 61-72. ISBN 978-1-4503-1574-6. (doi:10.1145/2364506.2364515)
[img]
Preview

Dziallas, Sebastian (2015) Characterizing Graduateness in Computing Education. In: International Computing Education Research, 9-13 August 2015, Omaha, NE. (doi:10.1145/2787622.2787739)
[img]
Preview

Dziallas, Sebastian (2016) Examining Graduateness through Narratives. In: ICER '16 Proceedings of the 2016 ACM Conference on International Computing Education Research. . pp. 291-292. ACM ISBN 978-1-4503-4449-4. (doi:10.1145/2960310.2960353)
[img]
Preview

Dziallas, Sebastian, Fincher, Sally (2015) ACM Curriculum Reports: A Pedagogic Perspective. In: International Computing Education Research, 9-13 August 2015, Omaha, NE. (doi:10.1145/2787622.2787714)
[img]
Preview

Dziallas, Sebastian, Fincher, Sally (2016) Aspects of Graduateness in Computing Students’ Narratives. In: ICER 16 Proceedings of the 2016 ACM Conference on International Computing Education Research. . pp. 181-190. ISBN 978-1-4503-4449-4. (doi:10.1145/2960310.2960317)
[img]
Preview

Dziallas, Sebastian, Fincher, Sally (2015) Exploring Students’ Conception of Learning through Narratives. In: Engineering Education Research Network Annual Symposium, 5-6 November 2015, Cambridge, UK.
[img]
Preview

Dziallas, Sebastian and Fincher, Sally (2014) Learning to Learn: The Co-Evolution of an Institution and its Students. In: 2014 IEEE Frontiers in Education Conference (FIE) Proceedings. IEEE, pp. 852-858. E-ISBN 978-1-4799-3922-0. (doi:10.1109/FIE.2014.7044126) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Dziallas, Sebastian and Fincher, Sally and Johnson, Colin G. and Utting, Ian (2017) A First Look at the Year in Computing. In: Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education. ITiCSE Innovation and Technology in Computer Science Education . ACM, New York, USA, pp. 275-280. ISBN 978-1-4503-4704-4. (doi:10.1145/3059009.3059049)
[img]
Preview

Dziallas, Sebastian and Fincher, Sally and Johnson, Colin G. and Utting, Ian (2017) The Year in Computing Initiative. In: 5th Annual Symposium of the United Kingdom & Ireland Engineering Education Research Network. Aston University, Birmingham, UK. ISBN 978-1-85449-443-6.
[img]
Preview

de Abreu Moreira, Dilvan and Walczowski, Les T. (1994) Automated placement for a leaf cell generator. In: International Symposium on Circuits and Systems. Institute of Electrical and Electronics Engineers, Piscataway NJ, A117-A120. ISBN 0-7803-1915-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Abreu Moreira, Dilvan, Walczowski, Les T. (1997) Using software agents to generate VLSI layouts. IEEE Expert, 12 (6). pp. 26-32. ISSN 0885-9000. (doi:10.1109/64.642958) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Carvalho, Andre C.P.L.F., Fairhurst, Michael (1998) Applying adaptive logic networks to character recognition. Pattern Recognition Letters, 19 (5-6). pp. 469-473. ISSN 0167-8655. (doi:10.1016/S0167-8655(98)00020-8) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Carvalho, Andre C.P.L.F., Fairhurst, Michael, Bisset, D.L. (1994) An Integrated Boolean Neural-Network for Pattern-Classification. Pattern Recognition Letters, 15 (8). pp. 807-813. ISSN 0167-8655. (doi:10.1016/0167-8655(94)90009-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Carvalho, Andre C.P.L.F., Fairhurst, Michael, Bisset, D.L. (1994) A Modular Boolean Architecture for Pattern Recognition. In: 1994 IEEE International Conference on Neural Networks. 1-7. pp. 4349-4352. I E E E ISBN 0-7803-1901-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

de Lemos, Rogério, Timmis, Jon, Ayara, Modupe, Forrest, Simon (2007) Immune-inspired adaptable error detection for automated teller machines. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 37 (5). pp. 873-886. ISSN 1094-6977. (doi:10.1109/TSMCC.2007.900662) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

E

Edwards, Marion, Cooley, Roger (1993) Expertise in Expert-Systems - Knowledge Acquisition for Biological Expert-Systems. Computer Applications in the Biosciences, 9 (6). pp. 657-665. ISSN 0266-7061. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Edwards, Michael R. (1997) Developing a model of expertise for a taxonomic expert system. In: Bridge, Paul and Jeffries, Peter and Morse, David R. and Scott, Peter R., eds. Information Technology, Plant Pathology and Biodiversity. Cabi Publishing . pp. 183-196. Cabi Publishing-C a B Int, Wallingford ISBN 0-85199-217-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Efstratiou, Christos, Leontiadis, Ilias, Picone, Marco, Rachuri, Kiran, Mascolo, Cecilia, Crowcroft, Jon (2012) Sense and Sensibility in a Pervasive World. In: Proceedings of 10th International Conference on Pervasive Computing (PERVASIVE 2012), June 2012, Newcastle, UK.
[img]
Preview

Efstratiou, Christos, Rachuri, Kiran, Das, Sajal (2015) IEEE PerCom 2015. IEEE Pervasive Computing, 14 (3). pp. 84-88. ISSN 1536-1268. E-ISSN 1558-2590. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Elsehely, Ehab, Sobhy, Mohammed (2000) Real time radar target detection under jamming conditions using wavelet transform on FPGA device. IEEE International Symposium On Circuits and Systems, 4 . pp. 545-548. (doi:10.1109/ISCAS.2000.858809) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Elston, David A., Jayasinghe, G., Buckland, Stephen T., MacMillan, Douglas C., Aspinall, R.J. (1997) Adapting regression equations to minimize the mean squared error of predictions made using covariate data from a GIS. International Journal of Geographical Information Science, 11 (3). pp. 265-280. ISSN 1365-8816. (doi:10.1080/136588197242392) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Alcaide, Almudena, Ribagorda, Arturo (2008) On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security, 3 (2). pp. 166-172. ISSN 1556-6013. (doi:10.1109/TIFS.2008.920724) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

F

Fairhurst, Michael C. and Rahman, A. Fuad R. (1996) New multiexpert architecture for high-performance object recognition. In: Solomon, Susan S. and Batchelor, Bruce G. and Waltz, Frederick M., eds. Machine Vision Applications, Architectures, and Systems Integration V. Proceedings of SPIE . SPIE, pp. 140-151. ISBN 0-8194-2310-6. (doi:10.1117/12.257256) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Faridani, A., Dimond, Keith R. (1994) A Transputer-Based Vision System for Mobile Robots. In: Arabnia, Hamid R., ed. Transputer Research and Applications 7. 42. pp. 68-78. I O S Press ISBN 90-5199-187-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Filho, E.C.D.B.C., Fairhurst, Michael, Bisset, D.L. (1991) Adaptive pattern-recognition using goal seeking neurons. Pattern Recognition Letters, 12 (3). pp. 131-138. ISSN 0167-8655. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fincher, Sally (2015) What are we doing when we teach computing in schools? Communications of the ACM, 58 (5). pp. 24-26. ISSN 0001-0782. (doi:10.1145/2742693) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fincher, Sally, Dziallas, Sebastian, Brandes, Ofra, Kolikant, Yifat, Shapiro, Ben (2016) Negotiating Academic Communities: Narratives of Life-long Learners. In: 12th International Conference of the Learning Sciences (ICLS), 20-24 June 2016, Singapore. (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fincher, Sally, Knox, Daniel (2013) The Porous Classroom: Professional Practices in the Computing Curriculum. IEEE Computer, 46 (9). pp. 44-51. ISSN 0018-9162. (doi:10.1109/MC.2013.261) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Flur, Shaked and Sarkar, Susmit and Pulte, Christopher and Nienhuis, Kyndylan and Maranget, Luc and Gray, Kathryn E. and Sezgin, Ali and Batty, Mark and Sewell, Peter (2017) Mixed-Size Concurrency: ARM, POWER, C/C++11, and SC. In: Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. POPL Principles of Programming Languages . ACM, New York, USA, pp. 429-442. ISBN 978-1-4503-4660-3. (doi:10.1145/3009837.3009839)
[img]
Preview

Forrester, Michael A. (1994) Hypermedia and Indexing - Identifying Appropriate Models from User Studies. In: Raitt, David I. and Jeapes, Ben, eds. Proceedings of the 17th International Online Information Meeting. Information Today Inc, Medford, New Jersey, USA, pp. 313-324. ISBN 0-904933-85-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

G

Genaim, Samir, King, Andy (2008) Inferring non-suspension conditions for logic programs with dynamic scheduling. ACM Transactions on Computational Logic, 9 (3). pp. 182-196. ISSN 1529-3785. (doi:10.1145/1352582.1352585)
[img]
Preview

Gerig, Guido, Welti, Daniel, Guttmann, Charles, Colchester, Alan C. F., Szekely, Gabor (2000) Exploring the discrimination power of the time domain for segmentation and characterization of active lesions in serial MR data. Medical Image Analysis, 4 (1). pp. 31-42. ISSN 1361-8415. (doi:10.1016/S1361-8415(00)00005-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gerig, Guido and Welti, Daniel and Guttmann, Charles and Colchester, Alan C. F. and Szekely, Gabor (1998) Exploring the discrimination power of the time domain for segmentation and characterization of lesions in serial MR data. In: Wells, William M. and Colchester, Alan C. F. and Delp, Scott, eds. Medical Image Computing and Computer-Assisted Intervention — MICCAI’98 First International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 469-480. ISBN 978-3-540-65136-9. E-ISBN 978-3-540-49563-5. (doi:10.1007/BFb0056232) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Gillham, Michael, Howells, Gareth, Pepper, Matthew G., Kelly, Stephen W. (2016) Developing Effective Intelligent Assistance for the Powered Wheelchair User. In: Proceedings of 2016 Technology for Independence Conference (T4i) RAatE. . (doi:10.15131/shef.data.4256522)
[img]
Preview

Glenat, Stephanie, Heutte, Laurent, Paquet, Thierry, Guest, Richard, Fairhurst, Michael, Linnell, Tristan A. (2008) The Development of a computer-assisted tool for the assessment of neuropsychological drawing tasks. International Journal of Information Technology & Decision Making, 7 (4). pp. 751-767. ISSN 0219-6220. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Goel, Ashok and Jordanous, Anna and Pease, Alison (2017) Preface: Proceedings of the Eighth International Conference on Computational Creativity, ICCC 2017, Atlanta — 19 - 23 June. In: Goel, Ashok and Jordanous, Anna and Pease, Alison, eds. ICCC'17 - Proceedings of the Eighth International Conference on Computational Creativity. Georgia Institute of Technology, Atlanta, Georgia, USA. ISBN 978-0-692-89564-1.
[img]
Preview

Gootjes-Dreesbach, Ellis Luise (2015) Awareness & Perception in Rapid Serial Visual Presentation. Doctor of Philosophy (PhD) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Grzes, Marek (2017) Reward Shaping in Episodic Reinforcement Learning. In: Proc. of the 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2017). . pp. 565-573. ACM
[img]
Preview

Guest, R.M. and Fairhurst, M.C. and Potter, J.M. and Donnelly, N. (2000) Analysing constructional aspects of figure completion for the diagnosis of visuo-spatial neglect. In: Proceedings 15th International Conference On Pattern Recognition. IEEE, pp. 316-319. ISBN 0-7695-0751-4. (doi:10.1109/ICPR.2000.902922) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Guest, Richard and Fairhurst, Michael and Potter, Jonathan (2000) Automated extraction of image segments from clinically diagnostic hand-drawn geometric shapes. In: Vajda, F., ed. Proceedings of the 26th Euromicro Conference. IEEE, A440-A446. ISBN 0-7695-0780-8. (doi:10.1109/EURMIC.2000.874527) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

H

Haas, S., Thornley, D.A., Zhu, M., Dobinson, R.W., Heeley, R., Madsen, N.A.H., Martin, B. (1998) Results from the Macrame 1024 node switching network. In: Computer Physics Communications. 110. pp. 206-210. Elsevier (doi:10.1016/S0010-4655(97)00178-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Haas, S., Thornley, D.A., Zhu, M., Dobinson, R.W., Martin, B. (1998) The Macrame 1024 node switching network. Microprocessors and Microsystems, 21 (7-8). pp. 511-518. ISSN 0141-9331. (doi:10.1016/S0141-9331(98)00044-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hajdusek, Michal, Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2015) Device-independent verifiable blind quantum computation. arXiv preprint arXiv:1502.02563, . (Unpublished)
[img]
Preview

Hanna, Keith (2000) Reasoning about analog-level implementations of digital systems. Formal Methods in System Design, 16 (2). pp. 127-158. ISSN 0925-9856. (doi:10.1023/A:1008791128550) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith (1998) Reasoning about imperfect digital systems. In: Moller, Bernhard Moller and Tucker, John V, eds. Prospects for Hardware Foundations ESPRIT Working Group 8533 NADA. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 333-355. ISBN 978-3-540-65461-2. E-ISBN 978-3-540-49254-2. (doi:10.1007/3-540-49254-2_10) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith, Daeche, Neil (1992) The Veritas Design Logic - a Users View. IFIP Transactions A-Computer Science And Technology, 10 . pp. 301-310. ISSN 0926-5473. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith, Daeche, Neil (1992) The Veritas Design Logic - a Users View. In: Stavridou, V. and Melham, Thomas F. and Boute, R.T., eds. IFIP Transactions A-Computer Science And Technology. 10. pp. 301-310. Elsevier Science Publ B V ISBN 0-444-89686-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hanna, Keith and Daeche, Neil and Howells, Gareth (1992) Implementation of the Veritas Design Logic. In: International Conference On Theorem Provers in Circuit Design : Theory, Practice And Experience. IFIP Transactions A-Computer Science and Technology, 10 . Elsevier Science, Nijmegen, Netherlands, pp. 77-94. ISBN 0-444-89686-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Harrison, Joe, Roberts, David L., Hernandez-Castro, Julio (2016) Assessing the extent and nature of wildlife trade on the dark web. Conservation Biology, 30 (4). pp. 900-904. ISSN 0888-8892. (doi:10.1111/cobi.12707) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hedges, Mark, Jordanous, Anna, Dunn, Stuart, Roueché, Charlotte, Kuster, Marc W, Selig, Thomas, Bittorf, Michael, Artes, Waldemar (2012) New models for collaborative textual scholarship. In: 6th IEEE International Conference on Digital Ecosystems Technologies (DEST 2012), 2012, Campione d'Italia, Switzerland.
[img]
Preview

Hedges, Mark, Jordanous, Anna, Lawrence, K. Faith, Roueché, Charlotte, Tupman, Charlotte (2017) Computer-Assisted Processing of Intertextuality in Ancient Languages. Journal of Data Mining and Digital Humanities, . ISSN 2416-5999. E-ISSN 2416-5999.
[img]
Preview

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2014) Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014 (2). pp. 5-8. ISSN 1361-3723. (doi:10.1016/S1361-3723(14)70461-0)
[img]
Preview

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2013) First Kent Cyber Security Survey. . Internet only.
[img]
Preview

Hernandez-Castro, Julio C., Boiten, Eerke Albert, Barnoux, Magali F.L. (2014) Second Kent Cyber Security Survey. . Internet only.
[img]
Preview

Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Peris-Lopez, Pedro, Ribagorda, Arturo (2008) Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. Journal of Information Science and Engineering, 24 (5). pp. 1485-1504. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hernandez-Castro, Julio C., Estévez-Tapiador, Juan M., Peris-Lopez, Pedro, Clark, John A., Talbi, El-Ghazali (2012) Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. International Journal of Foundations of Computer Science, 23 (2). pp. 543-553. ISSN 0129-0541. (doi:10.1142/S0129054112400278) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hernandez-Castro, Julio C., Tapiador, Juan E., Palomar, Esther, Romero-Gonzalez, Angel (2010) Blind Steganalysis of Mp3stego. Journal of Information Science and Engineering, 26 (5). pp. 1787-1799. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Hesketh, Richard (1991) Perly - unix with buttons. Software: Practice and Experience, 21 (11). pp. 1165-1187. ISSN 0038-0644. (doi:10.1002/spe.4380211103) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hill, Steve (1995) The Lazy Z-Buffer. Information Processing Letters, 55 (2). pp. 65-70. ISSN 0020-0190. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hill, Steve (1995) Parallel imperative functional programming. In: Nixon, Paddy, ed. Transputer and Occam Developments. 44. pp. 33-46. I O S Press ISBN 90-5199-222-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hirth, Matthias and Jacques, Jason and Rodgers, Peter and Scekic, Ognjen and Wybrow, Michael (2017) Crowdsourcing Technology to Support Academic Research. In: Archambault, Daniel and Purchase, Helen and Hossfeld, Tobias, eds. Evaluation in the Crowd. Crowdsourcing and Human-Centered Experiments. Lecture Notes In Computer Science . Springer, pp. 79-107. ISBN 978-3-319-66434-7. E-ISBN 978-3-319-66435-4. (doi:10.1007/978-3-319-66435-4)
[img]
Preview

Hobbs, M.H.W. (2000) Email groups for learning and assessment. In: Joyce, Donald, ed. SIGCSE Bulletin. 32 (3). p. 183. ACM ISBN 1-58113-207-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Holden, Nicholas and Freitas, Alex A. (2008) Improving the performance of hierarchical classification with swarm intelligence. In: Marchiori, Elena and Moore, Jason H., eds. Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics 6th European Conference. Lecture Notes in Computer Science, 4973 . Springer, Berlin, Germany, pp. 48-60. ISBN 978-3-540-78756-3. E-ISBN 978-3-540-78757-0. (doi:10.1007/978-3-540-78757-0_5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hopkins, Tim (1992) Remark on Algorithm-540. Acm Transactions on Mathematical Software, 18 (3). pp. 343-344. ISSN 0098-3500. (doi:10.1145/131766.131773) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hopkins, Tim (1996) Restructuring software: A case study. Software: Practice and Experience, 26 (8). pp. 967-982. ISSN 0038-0644. (doi:10.1002/(SICI)1097-024X(199608)26:8<967::AID-SPE41>3.0.CO;2-G)
[img]
Preview
[img]
Preview

Hopkins, Tim, Welch, Peter H. (1996) Transputer data-flow solution for systems of linear equations. Concurrency-Practice and Experience, 8 (8). pp. 569-580. ISSN 1040-3108. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Hou, Peixin, Hojjatoleslami, Ali, Petrou, Maria, Underwood, Craig Ian, Kittler, Josef (1998) Improved JPEG coding for remote sensing. In: International Conference on Pattern Recognition, 1998, Brisbane. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Howe, Jacob M., King, Andy (2000) Abstracting numeric constraints with Boolean functions. Information Processing Letters, 75 (1-2). pp. 17-23. ISSN 0020-0190. (doi:10.1016/S0020-0190(00)00081-8)
[img]
Preview
[img]

Howells, Gareth, Fairhurst, Michael, Bisset, D.L. (1995) BCN - A Novel Network Architecture for ram-Based Neurons. Pattern Recognition Letters, 16 (3). pp. 297-303. ISSN 0167-8655. (doi:10.1016/0167-8655(94)00098-N) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Howells, Gareth, Fairhurst, Michael, Bisset, D.L. (1994) BCN - an Architecture for Weightless Ram-Base Neural Networks. In: 1994 IEEE International Conference on Neural Networks. 1-7. pp. 1386-1390. I E E E ISBN 0-7803-1901-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Howells, Gareth, Fairhurst, Michael, Bisset, D.L. (1995) PCN: The Probabilistic Convergence Network. In: IEEE International Conference on Neural Networks Proceedings. 1-6. pp. 1211-1214. IEEE (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Howells, Gareth, Fairhurst, Michael, Rahman, Fuad (2000) An exploration of a new paradigm for weightless RAM-based neural networks. Connection Science, 12 (1). pp. 65-90. ISSN 0954-0091. (doi:10.1080/095400900116203) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

University of Essex (2007) A Device to Generate a Machine Specific Identification Key. PCT/GB2007/002916. (doi:PCT/GB2007/002916) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

I

Ibbetson, A.L. and Linington, P.F. and Penny, I.A. and Smith, A.B. and Tripp, G.E.W. (1996) Reducing the cost of remote procedure call. In: Schill, Alexander and Mittasch, Christian and Spaniol, Otto and Popien, Claudia, eds. Distributed Platforms Proceedings of the IFIP/IEEE International Conference on Distributed Platforms: Client/Server and Beyond. IFIP — The International Federation for Information Processing . Springer, Boston, Massachusetts, USA, pp. 430-446. ISBN 978-1-4757-5010-2. E-ISBN 978-0-387-34947-3. (doi:10.1007/978-0-387-34947-3_32) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ibrahim, A.M.a, Venkat, I.a, Subramanian, K.G.b, Khader, A.T.a, De Wilde, P.c (2016) Intelligent evacuation management systems: A review. ACM Transactions on Intelligent Systems and Technology, 7 (3). ISSN 2157-6904. (doi:10.1145/2842630)
[img]
Preview
[img]

Intarasirisawat, Jittrapol, Ang, Chee Siang, Efstratiou, Christos, Dickens, Luke, Page, Rupert (2019) Exploring the Touch and Motion Features in Game-Based Cognitive Assessments. Journal of Interactive, Mobile, Wearable and Ubiquitous Technologies, 3 (3). ISSN 2474-9567. (In press) (doi:10.1145/3351245)
[img]
Preview

Iqbal, Musaddar and Freitas, Alex A. and Johnson, Colin G. (2008) Protein interaction inference using particle swarm optimization algorithm. In: Marchiori, Elena and Moore, Jason H., eds. Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics 6th European Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 61-70. ISBN 978-3-540-78756-3. E-ISBN 978-3-540-78757-0. (doi:10.1007/978-3-540-78757-0_6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Ireland, Tim (2017) Teaching architecture students to code: Thrills and spills. In: Proceedings of 35th Annual International Conference of eCAADe. . ISBN 978-94-91207-12-9.
[img]
Preview

Islam, Tasmina, Becker, Ingolf, Posner, Rebecca, Ekblom, Paul, McGuire, Michael, Borrion, Hervé, Li, Shujun (2019) A Socio-Technical and Co-Evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. In: Communications in Computer and Information Science. Proceedings of 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications. . Springer (In press)
[img]
Preview
[img]

J

Johnson, Colin G. (2019) Aesthetics, Artificial Intelligence, and Search-based Art. In: Romero, Juan and Machado, Penousal and Greenfield, Gary, eds. The Handbook of Artificial Intelligence and the Arts. Springer, Heidelberg. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Jones, William and Chawdhary, Aziem and King, Andy (2015) Revisiting Volgenant-Jonker for Approximating Graph Edit Distance. In: Liu, Cheng-Lin and Luo, B. and Kropatsch, W.G. and Cheng, J., eds. Graph-based Representations in Pattern Recognition. Lecture Notes in Computer Science, 9069 . Springer, pp. 98-107. ISBN 978-3-319-18223-0. E-ISBN 978-3-319-18224-7. (doi:10.1007/978-3-319-18224-7)
[img]
Preview

Jordan, Tobias, Oto, Costa, De Wilde, Philippe, Buarque de Lima Neto, Fernando (2017) Link-Prediction to Tackle the Boundary Specification Problem in Social Network Surveys. PLoS ONE, 12 (4). e0176094. ISSN 1932-6203. (doi:10.1371/journal.pone.0176094)
[img]
Preview
[img]

Jordanous, Anna (2011) Computer Models of Musical Creativity? A review of Cope (2005). Review of: Computer Models of Musical Creativity. David Cope (2005). MIT Press by UNSPECIFIED. AISB Quarterly, 132 (-). p. 10. ISSN 1476-3036.
[img]
Preview

Jordanous, Anna (2009) Conference Report: The Fourth Conference on Interdisciplinary Musicology (CIM08). Review of: Fourth Conference on Interdisciplinary Musicology, 2008 (CIM08) by UNSPECIFIED. AISB Quarterly, 128 (-). pp. 8-9. ISSN 1476-3036.
[img]
Preview

Jordanous, Anna (2010) Conference Review: Empirical approaches to Performance: Empirical Musicology II conference (25-26 March 2010, School of Music, University of Leeds, UK). Review of: Empirical approaches to Performance: Empirical Musicology II conference 2010 by UNSPECIFIED. Excursions, 1 (1). p. 1. ISSN 2044-4095. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2015) Enhancing information retrieval and resource discovery from data using the Semantic Web. In: 4th International Symposium on Emerging Trends and Technologies in Libraries and Information Services, 6-8 Jan 2015, Noida, UP, India.
[img]

Jordanous, Anna (2012) Evaluating computational creativity: a standardised procedure for evaluating creative systems and its application. Doctor of Philosophy (PhD) thesis, University of Sussex.
[img]
Preview

Jordanous, Anna (2011) Evaluating evaluation: Assessing progress in computational creativity research. In: Proceedings of the Second International Conference on Computational Creativity (ICCC-11). . pp. 102-107.
[img]
Preview

Jordanous, Anna (2009) Evaluating machine creativity. In: Seventh ACM conference on Creativity and cognition, 2009, Berkeley, CA.
[img]
Preview

Jordanous, Anna (2016) Four PPPPerspectives on Computational Creativity in theory and in practice. Connection Science, 28 (2). pp. 194-216. ISSN 0954-0091. E-ISSN 1360-0494. (doi:10.1080/09540091.2016.1151860)
[img]
Preview

Jordanous, Anna (2016) Has computational creativity successfully made it "Beyond the Fence" in musical theatre? In: Proceedings of ICCC 2016 7th International Conference on Computational Creativity. Sony CSL, Paris, France, pp. 303-310. ISBN 978-2-7466-9155-1.
[img]
Preview

Jordanous, Anna (2013) Introducing Computational Creativity Research. . CreativityPost.com Internet. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2017) Review. Review of: Computation and the humanities : towards an oral history of digital humanities by Nyhan, J. and Flinn A., A.. ACM Computing Reviews, (Sep'17). Review #: CR145551. E-ISSN 1530-6585.
[img]

Jordanous, Anna (2014) Review of Digital Da Vinci: Computers in the Arts and Sciences (2014, Springer). Review of: Digital Da Vinci: Computers in the Arts and Sciences (2014, Springer) by UNSPECIFIED. ACM Computing Reviews, . p. 1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2013) Review: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. Type: Proceedings. Review of: Emotional sentence identification in a story Zhang Z., Ge S., Tee K. WASA 2012 (Proceedings of the Workshop at SIGGRAPH Asia, Singapore, Nov 26-27, 2012) 125-130. 2012. by UNSPECIFIED. ACM Computing Reviews, . CR141093. ISSN 1308-0745. E-ISSN 1308-0745. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2015) Review: The POINT of creative collaborations between composers and computers. Review of: Patterns of intuition: Musical Creativity in the Light of Algorithmic Composition (Springer, 2015 ) by UNSPECIFIED. ACM Computing Reviews, (184827). p. 1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2007) Score following: An artificially intelligent musical accompanist. Master of Science (MSc) thesis, University of Edinburgh, UK..
[img]
Preview

Jordanous, Anna (2012) A Standardised Procedure for Evaluating Creative Systems: Computational Creativity Evaluation Based on What it is to be Creative. Cognitive Computation, 4 (3). pp. 246-279. ISSN 1866-9956. E-ISSN 1866-9964. (doi:10.1007/s12559-012-9156-1)
[img]
Preview

Jordanous, Anna (2014) What is Computational Creativity? . CreativityPost.com Online web platform. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna (2016) The longer term value of creativity judgements in computational creativity. In: Proceedings of AISB 2016’s Third International Symposium on Computational Creativity (CC2016). .
[img]
Preview

Jordanous, Anna, Allington, Daniel, Dueck, Byron (2015) Measuring cultural value using social network analysis: a case study on valuing electronic musicians. In: 6th International Conference on Computational Creativity, June 29 - July 2, 2015, Utah, US. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Jordanous, Anna, Allington, Daniel, Dueck, Byron (2014) Online Networks and the Production of Value in Electronic Music. In: Digital Music Research Network Network One-Day Workshop (DMRN+9), 16 Dec 2014, Queen Mary's, London. (Unpublished)
[img] [img]

Jordanous, Anna, Allington, Daniel, Dueck, Byron (2014) Using online networks to analyse the value of electronic music. In: Proceedings of the 5th International Conference on Computational Creativity. .
[img]
Preview

Jordanous, Anna and Keller, Bill (2012) Creativity Ontology. http://purl.org/creativity/ontology.
[img]

Jordanous, Anna, Keller, Bill (2016) Modelling Creativity: Identifying Key Components through a Corpus-Based Approach. PLoS ONE, 11 (10). pp. 1-27. ISSN 1932-6203. (doi:10.1371/journal.pone.0162959)
[img]
Preview

Jordanous, Anna, Keller, Bill (2012) Weaving creativity into the Semantic Web: a language-processing approach. In: International Conference on Computational Creativity. Proceedings of the 3rd International Conference on Computational Creativity. . pp. 216-220.
[img]
Preview

Jordanous, Anna, Lawrence, K Faith, Hedges, Mark, Tupman, Charlotte (2012) Exploring manuscripts: sharing ancient wisdoms across the semantic web. In: Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics. Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics (WIMS-12). . ACM, New York, New York, USA ISBN 978-1-4503-0915-8. (doi:10.1145/2254129.2254184)
[img]
Preview

Jordanous, Anna, Lawrence, K. Faith, Tupman, Charlotte (2013) Sharing Ancient Wisdoms: Dataset. RDF. Located at: http://www.ancientwisdoms.ac.uk/library/data/. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna and Roueché, Charlotte and Tupman, Charlotte and Lawrence, K. Faith and Hedges, Mark and Wakelnig, Elvira and Searby, Denis (2013) Sharing Ancient Wisdoms (SAWS) ontology. http://www.ancientwisdoms.ac.uk/.
[img]

Jordanous, Anna, Smaill, Alan (2008) Artificially intelligent accompaniment using Hidden Markov Models to model musical structure. In: Conference on Interdisciplinary Musicology, 2008, Thessaloniki, Greece.
[img]
Preview

Jordanous, Anna, Smaill, Alan (2009) Investigating the role of score following in automatic musical accompaniment. Journal of New Music Research, 38 (2). pp. 197-209. ISSN 0929-8215. E-ISSN 1744-5027. (doi:10.1080/09298210903180245)
[img]
Preview
[img]
Preview

Jordanous, Anna, Stanley, Alan, Tupman, Charlotte (2012) Contemporary transformation of ancient documents for recording and retrieving maximum information: when one form of markup is not enough. In: Balisage: The Markup Conference 2012, 2012, Montreal, Canada. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna, Stanley, Alan, Tupman, Charlotte (2013) Reusing modern tools and techniques to reproduce and research ancient texts. In: Open Repositories, Prince Edward Island, Canada.
[img]
Preview

Jordanous, Anna and Tupman, Charlotte (2013) Sharing Ancient Wisdoms - supporting code. ancientwisdoms.ac.uk XSLT stylesheets. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Jordanous, Anna, Tupman, Charlotte, Stanley, Alan (2013) Contemporary solutions to retrieve and publish information in ancient documents using RDF and Islandora. In: Digital Humanities 2013, 2013, Lincoln, Nebraska. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Justo, George R. R. and Welch, Peter H. (1992) Serialization as a Paradigm for the Engineering of Parallel Programs. In: Etiemble, D. and Syre, J.C., eds. PARLE '92 Parallel Architectures and Languages Europe 4th International PARLE Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 975-976. ISBN 978-3-540-55599-5. E-ISBN 978-3-540-47250-6. (doi:10.1007/3-540-55599-4_149) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Justo, George R. R., Welch, Peter H. (1993) Serialization as a paradigm for the engineering of parallel programs. Computers and Artificial Intelligence, 12 (3). pp. 229-249. ISSN 0232-0274. (doi:10.1007/3-540-55599-4_149) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

K

Kahrs, Stefan and Sannella, Don (1998) Reflections on the design of a specification language. In: Astesiano, Egidio, ed. Fundamental Approaches to Software Engineering First International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 154-170. ISBN 978-3-540-64303-6. E-ISBN 978-3-540-69723-7. (doi:10.1007/BFb0053578) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kaijian, Shi, Jian, Sun (1991) A relational graphical editing method for PCB design. Computer-Aided Design, 23 (1). pp. 92-94. ISSN 0010-4485. (doi:10.1016/0010-4485(91)90102-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kalli, Kyriacos, Jackson, David A. (1995) Dynmic-Response of High-Resolution Ring-Resonator Optical Spectrometers to time-Varing Input Signals. In: Sensors and their Applications VII. (3). pp. 184-189. Iop Publishing ltd ISBN 0-7503-0331-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kalli, Kyriacos, Rao, Yun Jiang, Webb, David J., Jackson, David A. (1995) Potential of fibre optic point and distributed fibre optic sensors for structural monitoring. In: Augousti, A.T., ed. Sensors and their Aplications VII. . pp. 184-189. Iop Publishing Ltd ISBN 0-7503-0331-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kanjo, Eiman, Kuss, Daria, Ang, Chee Siang (2017) NotiMind: Utilizing Responses to Smart Phone Notifications as Affective sensors. IEEE Access, . ISSN 2169-3536. E-ISSN 2169-3536. (doi:10.1109/ACCESS.2017.2755661)
[img]
Preview

Kemp, Zarine P. (1995) Multimedia and Spatial Information Systems. IEEE Multimedia, 2 (4). pp. 68-76. ISSN 1070-986X. (doi:10.1109/93.482297) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kemp, Zarine P., Kowalczyk, Arek (1994) Incorporating the Temporal Dimension in a GIS. In: Worboys, Michael F., ed. Innovations in GIS. . pp. 89-103. Taylor & Francis ISBN 0-7484-0140-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kemp, Zarine P., Oxborrow, Elizabeth, Davy, M.J., Linington, Peter F., Thearle, R., Blair, Gordon S., Dark, P., Davies, N.A., Mariani, John A., Snape, C. and others. (1992) Zenith System for Object Management In Distributed Multimedia Design Environments. Information and Software Technology, 34 (7). pp. 427-436. ISSN 0950-5849. (doi:10.1016/0950-5849(92)90034-M) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Khalil, Omar, Hernandez-Castro, Julio C., Asis, Benjamon (2013) A study on the false positive rate of Stegdetect. Digital Investigation, 9 (3-4). pp. 235-245. ISSN 1742-2876. (doi:10.1016/j.diin.2013.01.004)
[img]
Preview

Kononova, A.V.a, Corne, D.W.a, De Wilde, Philippe, Shneer, V.c, Caraffini, F.d e (2015) Structural bias in population-based algorithms. Information Sciences, 298 . pp. 468-490. ISSN 0020-0255. (doi:10.1016/j.ins.2014.11.035)
[img]
Preview

L

Laborde, Romain, Kamel, Michel, Barrere, Francois, Benzekri, Abdelmalek (2007) Implementation of a formal security policy refinement process in WBEM architecture. Journal of Network and Systems Management,, 15 (2). pp. 241-266. ISSN 1064-7570. (doi:10.1007/s10922-007-9063-z) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Laffey, Des (2007) Paid search: The innovation that changed the Web. Business Horizons, 50 (3). pp. 211-218. ISSN 0007-6813. (doi:10.1016/j.bushor.2006.09.003) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Laffey, Des (2007) The ultimate bluff: a case study of partygaming.com. Journal of Information Technology, 22 (4). pp. 479-488. ISSN 0268-3962. (doi:10.1057/palgrave.jit.2000096) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lahasan, B. M., Venkat, I., Al-Betar, M. A., Lutfi, S. L., De Wilde, Philippe (2016) Recognizing faces prone to occlusions and common variations using optimal face subgraphs. Applied Mathematics and Computation, 283 . pp. 316-332. ISSN 0096-3003. (doi:10.1016/j.amc.2016.02.047)
[img]
Preview

Lam, K.P., Horne, E. (1993) Enhanced Kernel Estimation Technique For Pattern-Classification. Electronics Letters, 29 (24). pp. 2130-2131. ISSN 0013-5194. (doi:10.1049/el:19931424) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lam, K.P., Horne, E. (1993) Novel Technique To Combine Bws And Fws Classifiers. Electronics Letters, 29 (19). pp. 1702-1704. ISSN 0013-5194. (doi:10.1049/el:19931132) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lamb, John D. (1998) A note on the weighted matching with penalty problem. Pattern Recognition Letters, 19 (3-4). pp. 261-263. ISSN 0167-8655. (doi:10.1016/S0167-8655(98)00008-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lange, Julien and Tuosto, Emilio (2012) Synthesising choreographies from local session types. In: Koutny, M. and Ulidowski, I., eds. CONCUR 2012 – Concurrency Theory 23rd International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 225-239. ISBN 978-3-642-32939-5. E-ISBN 978-3-642-32940-1. (doi:10.1007/978-3-642-32940-1_17) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Langford, Duncan, Brown, Peter J. (1993) Creating hypertext documents - Is it worth the effort. Aslib Proceedings, 45 (4). pp. 91-95. ISSN 0001-253X. (doi:10.1108/eb051311) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lauder, Anthony and Dumas, Marlon and Frohner, Akos and Oliver, Ian (2000) PhDOOS 2000: The 10th Ph.D. workshop on object-oriented systems. In: Malaenfant, Jacques and Moisan, Sabine and Moreira, Ana, eds. Object-Oriented Technology: Ecoop 2000 Workshop Reader: Ecoop 2000 Workshops, Panels, and Posters Sophia Antipolis and Cannes, France, June 12-16, 2000 Proceedings. Lecture Notes in Computer Science, 1964 . Springer Verlag Berlin, pp. 78-92. ISBN 3-540-41513-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lee, Howard, Kemp, Zarine P. (1997) Towards a multiple placement land suitability evaluation framework. In: Kraak, Menno-Jan and Molenaar, Martin and Fendel, E.M., eds. Advances in GIS Research II. . pp. 643-654. Taylor & Francis Ltd ISBN 0-7484-0591-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Leech, Helen K., Kemp, Zarine P. (1998) Supporting complex spatiotemporal analysis in GIS. In: Carver, S., ed. Investigation in GIS5. . pp. 151-161. Taylor & Francis Ltd ISBN 0-7484-0810-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Li, Chengqing, Feng, Bingbing, Li, Shujun, Kurths, Jurgen, Chen, Guanrong (2019) Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I: Regular Papers, 66 (6). pp. 2322-2335. ISSN 1549-8328. (doi:10.1109/TCSI.2018.2888688) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Li, Ling and Looney, David and Park, Cheolsoo and Rehman, Naveed U. and Mandic, Danilo P. (2011) Power Independent EMG Based Gesture Recognition for Robotics. In: 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE, pp. 182-196. ISBN 978-1-4244-4121-1. E-ISBN 978-1-4577-1589-1. (doi:10.1109/IEMBS.2011.6090036) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Li, Shujun and Ho, Anthony T.S. and Wang, Zichi and Zhang, Xinpeng (2018) Lost in the Digital Wild: Hiding Information in Digital Activities. In: Hallman, Roger and Li, Shujun and Chang, Victor, eds. Proceedings of the 2nd International Workshop on Multimedia Privacy and Security. CCS Computer and Communications Security . ACM, New York, USA, pp. 27-37. ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267365)
[img]
Preview

Lins, Rafael D. (1991) A Shared Memory Architecture for Parallel Cyclic Reference Counting. Microprocessing and Microprogramming, 35 (1-5). pp. 563-568. ISSN 0165-6074. (doi:10.1016/0165-6074(91)90322-K) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lins, Rafael D., Neto, Mario Guimaraes, Neto, Leopoldo Franca, Rosa, Luciano Galdino (1994) An environment for processing images of historical documents. Microprocessing and Microprogramming, 40 (10-12). pp. 939-942. ISSN 0165-6074. (doi:10.1016/0165-6074(94)90074-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Liu, Ximing, Li, Yingjiu, Deng, Robert H., Chang, Bing, Li, Shujun (2019) When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. Computers and Security, 80 . pp. 90-107. ISSN 0167-4048. (doi:10.1016/j.cose.2018.09.003)
[img]
Preview

Liu, Yang, Kwok, Yu-Kwong, Wang, Jiangzhou (2008) Downlink TCP performance under cross layer rate and power allocation in infrastructure TH-PPM UWB networks. Journal of Supercomputing, 44 (3). pp. 199-216. ISSN 0920-8542. (doi:10.1007/s11227-007-0155-z) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Liu, Yang, Kwok, Yu-Kwong, Wang, Jiangzhou (2007) An adaptive packet scheduling algorithm for efficient downlink bandwidth allocation in UWB based wireless infrastructure networks. Computer Communications, 30 (9). pp. 2087-2095. ISSN 0140-3664. (doi:10.1016/j.comcom.2007.04.004) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Lu, Yang, Li, Shujun (2019) From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues. In: Proceedings of the 53rd Hawaii International Conference on System Sciences. . University of Hawaii at Manoa, Haiwaii, USA (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img] [img]

Lu, Yang, Li, Shujun, Ioannou, Athina, Tussyadiah, Iis (2019) From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework. In: Communications in Computer and Information Science. Proceedings of 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications. . Springer (In press)
[img]
Preview
[img]

M

Mahaini, Mohamad Imad, Li, Shujun, Sağlam, Rahime Belen (2019) Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example. In: ICPS: ACM International Conference Proceeding Series. Proceedings of the 14th International Conference on Availability, Reliability and Security. . ACM ISBN 978-1-4503-7164-3. (doi:10.1145/3339252.3339282)
[img]
Preview

Mansfield, Elizabeth L. (1996) The differential algebra package diffgrob2. Mapletech, 3 (2). pp. 33-37. ISSN 1061-5733. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mansfield, Elizabeth L., Clarkson, Peter (1997) Applications of the differential algebra package diffgrob2 to classical symmetries of differential equations. Journal of Symbolic Computation, 23 (5-6). pp. 517-533. ISSN 0747-7171. (doi:10.1006/jsco.1996.0105) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mansfield, Elizabeth L., Clarkson, Peter (1997) Symmetries and exact solutions for a 2+1-dimensional shallow water wave equation. Mathematics and Computers in Simulation, 43 (1). pp. 39-55. ISSN 0378-4754. (doi:10.1016/S0378-4754(96)00054-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mansfield, Elizabeth L., Reid, G.J., Clarkson, Peter (1998) Nonclassical reductions of a 3+1-cubic nonlinear Schrodinger system. Computer Physics Communications, 115 (2-3). pp. 460-488. ISSN 0010-4655. (doi:10.1016/S0010-4655(98)00136-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Matsuda, Kazutaka and Wang, Meng (2013) Bidirectionalization for Free with Runtime Recording: Or, a Light-Weight Approach to the View-Update Problem. In: Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming. PPDP Principles and Practice of Declarative Programming . ACM, New York, USA, pp. 297-308. ISBN 978-1-4503-2154-9. (doi:10.1145/2505879.2505888)
[img]
Preview

Matsuda, Kazutaka, Wang, Meng (2014) “Bidirectionalization for Free” for Monomorphic Transformations. Science of Computer Programming, 111 (Part 1). pp. 79-109. ISSN 0167-6423. (doi:10.1016/j.scico.2014.07.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Matsuda, Kazutaka, Wang, Meng (2013) FliPpr: A Prettier Invertible Printing System. In: 22nd European Symposium on Programming. . pp. 101-120. ISBN 978-3-642-37035-9. E-ISBN 978-3-642-37036-6. (doi:10.1007/978-3-642-37036-6_6)
[img]
Preview

Medina, Jose Cadenas (2015) Pipelined median architecture. Electronics Letters, 51 (24). pp. 1999-2001. ISSN 0013-5194. (doi:10.1049/el.2015.1898)
[img]
Preview

Medina, Jose Cadenas, Megson, G. M., Sherratt, Simon (2015) Median architecture by accumulative parallel counters. IEEE Transactions on Circuits and Systems II, Express Briefs, 62 (7). pp. 661-665. ISSN 1549-7747. E-ISSN 1558-3791. (doi:10.1109/TCSII.2015.2415655)
[img]
Preview

Miao, Yufan, König, Reinhard, Knecht, Katja, Konieva, Kateryna, Buš, Peter, Chang, Mei-Chih (2018) Computational urban design prototyping: Interactive planning synthesis methods—a case study in Cape Town. International Journal of Architectural Computing, 16 (3). pp. 212-226. ISSN 1478-0771. (doi:10.1177/1478077118798395) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Micallef, Luana (2013) Visualizing Set Relations and Cardinalities Using Venn and Euler Diagrams. Doctor of Philosophy (PhD) thesis, University of Kent.
[img]
Preview

Michelmann, Sebastian, Treder, Matthias S., Griffiths, Benjamin, Kerrén, Casper, Roux, Frédéric, Wimber, Maria, Rollings, David, Sawlani, Vijay, Chelvarajah, Ramesh, Gollwitzer, Stephanie, and others. (2018) Data-driven re-referencing of intracranial EEG based on independent component analysis (ICA). Journal of Neuroscience Methods, 307 . pp. 125-137. ISSN 0165-0270. (doi:10.1016/j.jneumeth.2018.06.021)
[img]
Preview

Minelly, S. and Kelly, Stephen W. and Bahra, R. (1996) Clinical trial of the non-invasive recording of His-Purkinje system signals. In: Computers in Cardiology 1996. Computers in Cardiology . IEEE, pp. 449-452. ISBN 0-7803-3710-7. (doi:10.1109/CIC.1996.542570) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mingers, John (2014) Problems with SNIP. Journal of Informetrics, 8 (4). pp. 890-894. ISSN 1751-1577. (doi:10.1016/j.joi.2014.09.004)
[img]
Preview

Mingers, John (2002) Real-izing Information Systems: Critical Realism as an Underpinning Philosophy for Information Systems. In: DeGross, J., ed. Information and Organization. 14 (2). pp. 87-103. , Barcelona (doi:10.1016/j.infoandorg.2003.06.001) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mirlohi, H.R., Kelly, Stephen W., Manley, Maxwell C. G. (1994) New technique for assessment of velopharyngeal function. Medical and Biological Engineering and Computing, 32 (5). pp. 562-566. ISSN 0140-0118. (doi:10.1007/BF02515315) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mitrokotsa, Aikaterini, Dimitrakakis, Christos, Peris-Lopez, Pedro, Hernandez-Castro, Julio C. (2010) Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters, 14 (2). pp. 121-123. ISSN 1089-7798. (doi:10.1109/LCOMM.2010.02.091946)
[img]
Preview

Modi, Bala (2015) FPGA-based High Throughput Regular Expression Pattern Matching for Network Intrusion Detection Systems. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Montanari, Carlos A., Tute, M.S., Beezer, Anthony E., Mitchell, John C. (1996) Determination of receptor-bound drug conformations by QSAR using flexible fitting to derive a molecular similarity index. Journal of Computer-Aided Molecular Design, 10 (1). pp. 67-73. ISSN 0920-654X. (doi:10.1007/BF00124466) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Moores, James (1999) CCSP - A portable CSP-based run-time system supporting C and occam. In: Cook, Barry M., ed. Proceedings of WoTUG-22: Architectures, Languages and Techniques for Concurrent Systems. Concurrent Systems Engineering . IOS Press, Amsterdam, Netherlands, pp. 147-168. ISBN 90-5199-480-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Mouli, Surej, Palaniappan, Ramaswamy (2017) Towards a reliable PWM based LED visual stimulus for improved SSVEP response with minimal visual fatigue. Journal of Engineering, . ISSN 2051-3305. E-ISSN 2051-3305. (doi:10.1049/joe.2016.0314)
[img]
Preview
[img]
Preview

Mudelsee, Manfred (2000) Ramp function regression: a tool for quantifying climate transitions. Computers and Geosciences, 26 (3). pp. 293-307. ISSN 0098-3004. (doi:10.1016/S0098-3004(99)00141-7) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Murphy, Julian, Howells, Gareth, McDonald-Maier, Klaus D. (2019) A Machine Learning Method For Sensor Authentication Using Hidden Markov Models. In: Proceddings of Eighth IEEE International Conference on Emerging Security Technologies. . IEEE E-ISBN 978-1-72815-546-3. (In press) (doi:10.1109/EST.2019.8806200)
[img]
Preview

N

Nawaz, Sarfraz, Efstratiou, Christos, Mascolo, Cecilia (2013) ParkSense: A Smartphone Based Sensing System For On-Street Parking. In: Proceedings of the 19th ACM International Conference on Mobile Computing and Networking (MOBICOM 2013), September 2013, Miami, FL, USA.
[img]
Preview

Nawaz, Sarfraz, Efstratiou, Christos, Mascolo, Cecilia (2016) Smart Sensing Systems for the Daily Drive. IEEE Pervasive Computing, . pp. 39-43. ISSN 1536-1268. (doi:10.1109/MPRV.2016.22)
[img]
Preview

Nicholls, Benjamin, Ang, Chee Siang, Efstratiou, Christos, Lee, Yongkuk, Yeo, Woon-Hong (2017) Swallowing detection for game control: using skin-like electronics to support people with dysphagia. In: Pervasive Computing and Communications Workshops (PerCom Workshops). 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). . IEEE (doi:10.1109/PERCOMW.2017.7917598)
[img]
Preview

Nieto-Barajas, Luis E., Walker, Stephen G. (2007) A Bayesian semi-parametric bivariate failure time model. Computational Statistics and Data Analysis, 51 (12). pp. 6102-6113. ISSN 0167-9473. (doi:10.1016/j.csda.2006.12.020) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nitsos, Kallikratidas, Dagiuklas, Tasos, Al-Raweshidy, Hamed S. (2000) High Speed Wireless Internet Access: Combination of MPLS and BRAN HIPERLAN/2 technologies. In: IFIP-TC6/European Commission International Conference, May 14-19, 2000, Paris, France. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Nouh, Mariam, Nurse, Jason R. C., Webb, Helena, Goldsmith, Michael (2019) Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement. In: Proceedings of the 2019 Workshop on Usable Security (USEC) at Network and Distributed System Security Symposium (NDSS). . Internet Society (In press)
[img]
Preview

Nurse, Jason R. C. (2019) Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:10.1093/oxfordhb/9780198812746.013.35) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Nurse, Jason R. C. and Bada, Maria (2019) The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations. In: Attrill-Smith, Alison and Fullwood, Chris and Keep, Melanie and Kuss, Daria J., eds. The Oxford Handbook of Cyberpsychology. Oxford University Press. E-ISBN 978-0-19-881274-6. (doi:10.1093/oxfordhb/9780198812746.013.36) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

O

Ojha, Varun, Kumar, Griego, Danielle, Kuliga, Saskia, Bielik, Martin, Buš, Peter, Schaeben, Charlotte, Treyer, Lukas, Standfest, Matthias, Schneider, Sven, König, Reinhard, and others. (2019) Machine learning approaches to understand the influence of urban environments on human’s physiological response. Information Sciences, 474 . pp. 154-169. ISSN 0020-0255. (doi:10.1016/j.ins.2018.09.061)
[img]
Preview

Oliveira, Bruno, Wang, Meng, Gibbons, Jeremy (2008) The VISITOR Pattern as a Reusable, Generic, Type-Safe Component. In: Proceedings of the 23rd ACM SIGPLAN conference on Object-oriented programming systems languages and applications. .
[img]
Preview

Ong, SimYing, Li, Shujun, Wong, KokSheik, Tan, KuanYew (2017) Fast recovery of unknown coefficients in DCT-transformed images. Signal Processing: Image Communication, 58 . pp. 1-13. ISSN 0923-5965. (doi:10.1016/j.image.2017.06.002)
[img]
Preview

Oshea, P.J. and Wilson, E. (1997) European law databases: an experiment in retrieval. In: Wagner, R., ed. Proceedings of the 8th International Conference on Database and Expert Systems Applications, DEXA '97. IEEE, pp. 227-232. ISBN 0-8186-8147-0. (doi:10.1109/DEXA.1997.617275) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Osman, Ibrahim H. (1999) A unified-metaheuristic framework. In: Imam, Ibrahim and Kodratoff, Yves and El-Dessouki, Ayman and Ali, Moonis, eds. Multiple Approaches to Intelligent Systems 12th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems. Lecture Notes in Artificial Intelligence . Springer, Berlin, Germany, pp. 11-12. ISBN 978-3-540-66076-7. E-ISBN 978-3-540-48765-4. (doi:10.1007/978-3-540-48765-4_3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Otero, Fernando E.B., Masegosa, Antonio D., Terrazas, Germán (2014) Thematic issue on advances in nature inspired cooperative strategies for optimization. Memetic Computing, 6 (3). pp. 147-148. ISSN 1865-9284. E-ISSN 1865-9292. (doi:10.1007/s12293-014-0140-z) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

P

Paar, C., Fleischmann, Peter, Soria-Rodriguez, P. (1999) Fast arithmetic for public-key algorithms in Galois fields with composite exponents. IEEE Transactions on Computers, 48 (10). pp. 1025-1034. ISSN 0018-9340. (doi:10.1109/12.805153) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Palaniappan, Ramaswamy, Revett, Kenneth (2014) PIN generation using EEG : a stability study. International Journal of Biometrics, 6 (2). pp. 95-106. ISSN 1755-8301. (doi:10.1504/IJBM.2014.060960)
[img]
Preview

Palomar, Esther, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Secure content access and replication in pure P2P networks. Computer Communications, 31 (2). pp. 266-279. ISSN 0140-3664. (doi:10.1016/j.comcom.2007.08.015) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Pang, P.C.W, Pepper, Matthew G., Ducker, D.A (1995) Monitoring respiratory activity in neonates using diaphragmatic electromyograph. Medical and Biological Engineering and Computing, 33 (3). pp. 385-390. ISSN 0140-0118. (doi:10.1007/BF02510520) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Pappa, Gisele L. and Freitas, Alex A. (2007) Discovering new rule induction algorithms with grammar-based genetic programming. In: Maimon, Oded and Rokach, Lior, eds. Soft Computing for Knowledge Discovery and Data Mining. Springer, New York, pp. 133-152. ISBN 978-0-387-69934-9. (doi:10.1007/978-0-387-69935-6_6) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Paschalakis, Stavros and Fairhurst, Michael and Allgrove, C. (1999) Wordlength estimation for the enhancement of hand-written word recognition. In: Seventh International Conference on Image Processing And Its Applications, 1999. Conference Publications . IEEE, pp. 750-754. ISBN 0-85296-717-9. (doi:10.1049/cp:19990424) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Paschalakis, Stavros and Lee, Peter (2000) Combined geometric transformation and illumination invariant object recognition in RGB color images. In: Sanfeliu, A. and Villanueva, J.J. and Vanrell, M. and Alquezar, R. and Huang, T. and Serra, J., eds. Proceedings 15th International Conference on Pattern Recognition. IEEE, pp. 584-587. ISBN 0-7695-0750-6. (doi:10.1109/ICPR.2000.903613) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Paschalakis, Stavros and Lee, Peter (1999) Pattern recognition in grey level images using moment based invariant features. In: Seventh International Conference on Image Processing And Its Applications, 1999. Conference Publications . IEEE, pp. 245-249. ISBN 0-85296-717-9. (doi:10.1049/cp:19990320) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Paschalakis, Stavros and Lee, Peter (2000) Statistical pattern recognition using the Normalized Complex Moment Components vector. In: Ferri, F.J. and Inesta, J.M. and Amin, A. and Pudil, P., eds. Advances in Pattern Recognition Joint IAPR International Workshops SSPR 2000 and SPR 2000. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 532-539. ISBN 978-3-540-67946-2. E-ISBN 978-3-540-44522-7. (doi:10.1007/3-540-44522-6_55) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Pascoe, Jason (1998) Adding generic contextual capabilities to wearable computers. In: Digest of Papers. Second International Symposium on Wearable Computers. IEEE, pp. 92-99. ISBN 0-8186-9074-7. (doi:10.1109/ISWC.1998.729534)
[img] [img]
Preview

Pascoe, Jason and Ryan, Nick S. and Morse, David R. (1999) Issues in developing context-aware computing. In: Gellersen, Hans, ed. Handheld and Ubiquitous Computing First International Symposium. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 208-221. ISBN 978-3-540-66550-2. E-ISBN 978-3-540-48157-7. (doi:10.1007/3-540-48157-5_20) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Pawar, Pramod and Sajjad, Ali and Chadwick, David W. and Dimitrakos, Theo (2015) Security-as-a-Service in Multi-cloud and Federated Cloud Environments. In: Trust Management IX. IFIP Advances in Information and Communication Technology . Springer International Publishing, Hamburg, Germany, pp. 251-261. ISBN 978-3-319-18490-6. E-ISBN 978-3-319-18491-3. (doi:10.1007/978-3-319-18491-3_21)
[img]
Preview

Pearson, J.K, Bisset, D.L. (1994) Neural Networks in the Clifford Domain. 1994 IEEE International Conference on Neural Networks, 1-7 . pp. 1465-1469. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Pease, Alison and Jordanous, Anna (2018) Report on the Eighth International Conference on Computational Creativity. Review of: Eighth International Conference on Computational Creativity by UNSPECIFIED. AI Magazine, 39 (1). pp. 62-64. ISSN 0738-4602. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards and Interfaces, 31 (2). pp. 372-380. ISSN 0920-5489. (doi:10.1016/j.csi.2008.05.012) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards and Interfaces, 31 (1). pp. 88-97. ISSN 0920-5489. (doi:10.1016/j.csi.2007.11.013) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. Journal of Information Science and Engineering, 25 (1). pp. 33-57. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Tapiador, Juan E., Li, Tieyan, Li, Yingjiu (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54 (9). pp. 1502-1508. ISSN 1389-1286. (doi:10.1016/j.comnet.2009.11.007) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Tapiador, Juan E., van der Lubbe, Jan C. A. (2011) Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence, 24 (6). pp. 1061-1069. ISSN 0952-1976. (doi:10.1016/j.engappai.2011.04.001) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro, Li, Tieyan, Hernandez-Castro, Julio C. (2010) Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Transactions on information and systems, E93-D (3). pp. 518-527. ISSN 1745-1353. (doi:10.1587/transinf.E93.D.518)
[img]
Preview

Peris-Lopez, Pedro, Li, Tieyan, Hernandez-Castro, Julio C., Tapiador, Juan E. (2009) Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Computer Communications, 32 (7-10). pp. 1185-1193. ISSN 0140-3664. (doi:10.1016/j.comcom.2009.03.010) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro, Orfila, Agustin, Hernandez-Castro, Julio C., van der Lubbe, Jan C. A. (2011) Flaws on RFID grouping-proofs. Guidelines for future sound protocols. Journal of Network and Computer Applications, 34 (3). pp. 833-845. ISSN 1084-8045. (doi:10.1016/j.jnca.2010.04.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Peris-Lopez, Pedro, Orfila, Agustin, Palomar, Esther, Hernandez-Castro, Julio C. (2012) A secure distance-based RFID identification protocol with an off-line back-end database. Personal and Ubiquitous Computing, 16 (3). pp. 351-365. ISSN 1617-4909. (doi:10.1007/s00779-011-0396-y) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Petricek, Tomas (2017) Miscomputation in software: Learning to live with errors. The Art, Science, and Engineering of Programming, 1 (2). Article 14. ISSN 2473-7321. E-ISSN 2473-7321. (doi:10.22152/programming-journal.org/2017/1/14)
[img]
Preview

Petricek, Tomas and Guerra, Gustavo and Syme, Don (2016) Types from Data: Making Structured Data First-class Citizens in F#. In: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation. PLDI Programming Language Design and Implementation . ACM, New York, USA, pp. 477-490. ISBN 978-1-4503-4261-2. (doi:10.1145/2908080.2908115)
[img]
Preview

Picazo Sanchez, Pablo, Martin, Lara, Peris-Lopez, Pedro, Hernandez-Castro, Julio C. (2013) Cryptanalysis of the RNTS system. The Journal of Supercomputing, 65 (2). pp. 949-960. ISSN 0920-8542. (doi:10.1007/s11227-013-0873-3) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Pinto, Paulo F. and Linington, Peter F. (1994) A language for the specification of interactive and distributed multimedia applications. In: DeMeer, J. and Mahr, B. and Storp, S., eds. Open Distributed Processing II. IFIP Transactions C-Communication Systems, 20 . Elsevier Science Ltd, Oxford, pp. 247-264. ISBN 0-444-81861-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Polimon, Javier, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2008) Automated design of a lightweight block cipher with Genetic Programming. International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Too, 12 (1). pp. 3-14. ISSN 1327-2314.
[img]
Preview

Poll, Erik and Thompson, Simon (2000) Integrating Computer Algebra and Reasoning through the Type System of Aldor. In: Kirchner, Hélène and Ringeissen, Christophe, eds. Frontiers of Combining Systems Third International Workshop. Lecture Notes in Computer Science, 1794 . Springer, Berlin, Germany, pp. 136-150. ISBN 978-3-540-67281-4. E-ISBN 978-3-540-46421-1. (doi:10.1007/10720084_10)
[img]
Preview

Poll, Erik and Zwanenburg, Jan (1999) A logic for abstract data types as existential types. In: Girard, J.Y., ed. Typed Lambda Calculi and Applications 4th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 310-324. ISBN 978-3-540-65763-7. E-ISBN 978-3-540-48959-7. (doi:10.1007/3-540-48959-2_22)
[img]
Preview
[img]
Preview

Poole, Michael D. (1996) Occam for all - Two approaches to retargeting the INMOS compiler. In: Oneill, B.C., ed. Proceedings of the 19th world occam and transputer user group technical meeting on Parallel processing developments. Concurrent Systems Engineering . IOS Press, Amsterdam, Netherlands, pp. 167-178. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Poole, Michael D. (1995) Using records and pointers with occam 2.1. In: Nixon, Paddy and Transputer User, Grp, eds. Transputer and Occam Developments. Transputer & Occam Engineering Series, 44 . IOS Press, Amsterdam, pp. 151-162. ISBN 90-5199-222-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2015) Iterated gate teleportation and blind quantum computation. Physical Review Letters: Moving Physics Forward, 114 (22). p. 220502. ISSN 0031-9007. E-ISSN 1079-7114. (doi:10.1103/PhysRevLett.114.220502)
[img]
Preview

R

Rachuri, Kiran, Efstratiou, Christos, Leontiadis, Ilias, Mascolo, Cecilia, Rentfrow, Peter J. (2013) METIS: Exploring mobile phone sensing offloading for efficiently supporting social sensing applications. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PERCOM 2013).
[img]
Preview

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1999) Automatic self-configuration of a novel multiple-expert classifier using a genetic algorithm. In: Seventh International Conference on Image Processing And Its Applications, 1999. IEEE, pp. 57-61. ISBN 0-85296-717-9. (doi:10.1049/cp:19990281) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) Building multiple prototype classifiers for handwritten character recognition using automatic statistical clustering techniques. In: 1997 Sixth International Conference on Image Processing and Its Applications. IEEE, pp. 414-418. ISBN 978-0-85296-692-1. (doi:10.1049/cp:19970927) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (2000) Comparison of some multiple expert strategies: An investigation of resource prerequisites and achievable performance. In: Sanfeliu, A. and Villanueva, J.J. and Vanrell, M. and Alquezar, R. and Crowley, J. and Shirai, Y., eds. Proceedings 15th International Conference On Pattern Recognition. IEEE, pp. 841-844. ISBN 0-7695-0750-6. (doi:10.1109/ICPR.2000.903048) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1999) Enhancing multiple expert decision combination strategies through exploitation of a priori information sources. IEE Proceedings: Vision Image and Signal Processing, 146 (1). pp. 40-49. ISSN 1350-245X. (doi:10.1049/ip-vis:19990015) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1997) Introducing new multiple expert decision combination topologies: A case study using recognition of handwritten characters. I E E E, Computer Soc Press, Los Alamitos, CA, 1200 pp. ISBN 0-8186-7899-2. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1997) Selective partition algorithm for finding regions of maximum pairwise dissimilarity among statistical class models. Pattern Recognition Letters, 18 (7). pp. 605-611. ISSN 0167-8655. (doi:10.1016/S0167-8655(97)00047-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1999) Serial combination of multiple experts: A unified evaluation. Pattern Analysis & Applications, 2 (4). pp. 292-311. ISSN 1433-7541. (doi:10.1007/s100440050038) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael (1997) A comparative study of decision combination strategies for a novel multiple-expert classifier. In: 1997 Sixth International Conference on Image Processing and Its Applications. IEEE, pp. 131-135. ISBN 978-0-85296-692-1. (doi:10.1049/cp:19970869) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1997) A comparative study of two different multiple expert architectures for robust object recognition. Machine Vision Applications, Architectures & Systems Integra . Spie - Int Soc Optical Engineering, USA, 296 pp. ISBN 0-8194-2637-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1998) An evaluation of multi-expert configurations for the recognition of handwritten numerals. Pattern Recognition, 31 (9). pp. 1255-1273. ISSN 0031-3203. (doi:10.1016/S0031-3203(97)00161-1) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael (1997) A new hybrid approach in combining multiple experts to recognise handwritten numerals. Pattern Recognition Letters, 18 (8). pp. 781-790. ISSN 0167-8655. (doi:10.1016/S0167-8655(97)00078-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur and Fairhurst, Michael and Hoque, Sanaul and Paschalakis, Stavros (1999) A novel multiple-expert approach to the recognition of handwritten words extracted from British cheques. In: Seventh International Conference on Image Processing And Its Applications, 1999. IEEE, pp. 731-735. ISBN 0-85296-717-9. (doi:10.1049/cp:19990420) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rahman, Ahmad Fuad Rezaur, Fairhurst, Michael, Lee, Peter (1998) Design considerations in the real-time implementation of multiple expert image classifiers within a modular and flexible multiple-platform design environment. Real-Time Imaging, 4 (5). pp. 361-376. ISSN 1077-2014. (doi:10.1016/S1077-2014(98)90005-5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Read, Dwight, Fischer, Michael D., Lehman, F. K. (Chit Hlaing) (2014) The Cultural Grounding of Kinship: A Paradigm Shift. L'Homme, 2 (210). pp. 63-89. ISSN 9782713224430. E-ISSN 1953-8103. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Rio, Miguel and Linington, Peter F. (2000) Distributed Quality of Service Multicast Routing with Multiple Metrics for Receiver initiated Joins. In: Proceedings IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium. IEEE, pp. 180-187. ISBN 0-7695-0777-8. (doi:10.1109/ICON.2000.875787)
[img]
Preview

Ritson, Carl G. and Ugawa, Tomoharu and Jones, Richard E. (2014) Exploring Garbage Collection with Haswell Hardware Transactional Memory. In: Proceedings of the 2014 international symposium on Memory management. ISMM International Symposium on Memory Management . ACM, New York, USA, pp. 105-115. ISBN 978-1-4503-2921-7. (doi:10.1145/2602988.2602992)
[img]
Preview

Rizzo, Mike (1994) Using Producer and Consumer Manipulators to Extend Stream I/O Formatting in C++. Sigplan Notices, 29 (3). pp. 33-35. ISSN 0362-1340. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Roberts, J.C. (1998) On encouraging multiple views for visualization. In: Banissi, Ebad and Khosrowshahi, F. and Sarfraz, Muhammad, eds. 1999 IEEE International Conference on Information Visualization. IEEE International Conference on Information Visualisation . IEEE, pp. 8-14. ISBN 0-8186-8509-3. (doi:10.1109/IV.1998.694193)
[img] [img]
Preview

Roberts, Jonathan C. (1998) Waltz - An exploratory visualization tool for volume data, using multiform abstract displays. In: Erbacher, Robert F. and Pang, Alex, eds. Visual Data Exploration and Analysis V. Proceedings of SPIE . SPIE, Bellingham, Washington, pp. 112-122. ISBN 0-8194-2738-1. (doi:10.1117/12.309533)
[img]
Preview

Roberts, Jonathan C. and Hill, Steve (1999) Piecewise linear hypersurfaces using the Marching Cubes Algorithm. In: Erbacher, Robert F. and Chen, Philip C. and Wittenbrink, Craig M., eds. Visual Data Exploration and Analysis VI. Proceedings of SPIE . SPIE, pp. 170-181. ISBN 0-8194-3114-1. (doi:10.1117/12.342833)
[img]
Preview
[img]
Preview

Rodgers, Peter (2014) A Survey of Euler Diagrams. Journal of Visual Languages and Computing, 25 (3). pp. 134-155. ISSN 1045-926X. (doi:10.1016/j.jvlc.2013.08.006)
[img]
Preview

Rodgers, Peter (1998) A graph rewriting programming language for graph drawing. In: 1998 IEEE Symposium on Visual Languages, Proceedings. IEEE, pp. 32-39. ISBN 0-8186-8712-6. (doi:10.1109/VL.1998.706131)
[img]
Preview

Rodgers, Peter, Baker, Robert, Thompson, Simon, Li, Huiqing (2013) Multi-level Visualization of Concurrent and Distributed Computation in Erlang. In: Proceedings of 19th International Conference on Distributed Multimedia Systems 2013. . Knowledge Systems Institute
[img]
Preview

Rodgers, Peter, Stapleton, Gem, Flower, Jean, Howse, John (2014) Drawing Area-Proportional Euler Diagrams Representing Up To Three Sets. IEEE Transactions on Visualization and Computer Graphics, 20 (1). pp. 56-69. ISSN 1077-2626. (doi:10.1109/TVCG.2013.104)
[img]
Preview

Russell, M., Hopkins, Tim (1998) CFTP: a caching FTP server. Computer Networks and ISDN Systems, 30 (22-23). pp. 2211-2222. ISSN 0169-7552. (doi:10.1016/S0169-7552(98)00240-2)
[img]
Preview
[img]
Preview

Ryan, Nick S., Smith, Dan, Ma, Ling (2006) Acoustic environment as an indicator of social and physical context. Personal and Ubiquitous Computing, 10 (4). pp. 241-254. ISSN 1617-4909. (doi:10.1007/s00779-005-0045-4) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

S

Sahami, Mehran and Roach, Steve and Cuadros-Vargas, Ernesto and Danyluk, Andrea and Dodge, Ronald and Fisher, Kathleen and Fincher, Sally and France, Robert and Grossman, Dan and Hawthorne, Beth and Katz, Randy and Kumar, Amruth and LeBlanc, Rich and Reed, Dave and Robinson, Brian H. and Seker, Remzi and Thompson, Alfred (2013) Computer Science Curricula 2013(CS2013). Technical report. ACM Press and IEEE Computer Society Press, New York 10.1145/2534860. (doi:10.1145/2534860) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Salama, Khalid M. and Freitas, Alex A. (2012) ABC-Miner: an ant-based Bayesian classification algorithm. In: Swarm Intelligence 8th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 13-24. ISBN 978-3-642-32649-3. E-ISBN 978-3-642-32650-9. (doi:10.1007/978-3-642-32650-9_2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Salhi, Said and Farber, Gerrit and Coves, Anna M. (2008) Semi-Dynamic Demand in a Non-Permutation Flowshop with Constrained Resequencing Buffers. In: Lirkov, I. and Margenov, S. and Wasniewski, Jerzy, eds. Large-Scale Scientific Computing 6th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 536-544. ISBN 978-3-540-78825-6. E-ISBN 978-3-540-78827-0. (doi:10.1007/978-3-540-78827-0_61) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Salvy, Bruno, Shackell, John (1999) Symbolic asymptotics: Multiseries of inverse functions. Journal of Symbolic Computation, 27 (6). pp. 543-563. ISSN 0747-7171. (doi:10.1006/jsco.1999.0281) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sandoval Orozco, A.L., Arenas Gonzalez, David Manuel, Garcia Villalba, L.J., Hernandez-Castro, Julio C. (2014) Analysis of errors in exif metadata on mobile devices. Multimedia Tools and Applications, 74 (13). pp. 4735-4763. ISSN 1380-7501. (doi:10.1007/s11042-013-1837-6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sandoval Orozco, A.L., Arenas, Gonzalez, Rosales, Corripio, Garcia Villalba, L.J., Hernandez-Castro, Julio C. (2013) Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing, 96 (9). pp. 829-841. ISSN 1436-5057. (doi:10.1007/s00607-013-0313-5)
[img]
Preview

Sarkar, Susmit and Memarian, Kayvan and Owens, Scott and Batty, Mark and Sewell, Peter and Maranget, Luc and Alglave, Jade and Williams, Derek (2012) Synchronising C/C++ and POWER. In: Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, New York, USA, pp. 311-322. ISBN 978-1-4503-1205-9. (doi:10.1145/2254064.2254102)
[img]
Preview

Scahill, Mark (1997) Distributed individual-based environmental simulation. In: Denzer, Ralf and Swayne, David A. and Schimak, Gerald, eds. Environmental Software Systems. IFIP Advances in Information and Communication Technology, 2 . Springer, Dordrecht, pp. 269-276. ISBN 978-1-4757-5162-8. E-ISBN 978-1-5041-2869-8. (doi:10.1007/978-1-5041-2869-8_35) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Scaparra, Maria Paola, Church, Richard L. (2008) A bilevel mixed-integer program for critical infrastructure protection planning. Computers and Operations Research, 35 (6). pp. 1905-1923. ISSN 0305-0548. (doi:10.1016/j.cor.2006.09.019) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Schmitz, Roland and Li, Shujun and Grecos, Christos and Zhang, Xinpeng (2018) Commutative Watermarking-Encryption of Multimedia Data Based on Histograms. In: Bhattacharyya, Siddhartha, ed. Intelligent Innovations in Multimedia Data Engineering and Management. IGI Global, USA, pp. 141-163. ISBN 978-1-5225-8783-5. E-ISBN 978-1-5225-7108-7. (doi:10.4018/978-1-5225-7107-0.ch006) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Secker, Andrew D. and Davies, Matthew N. and Freitas, Alex A. and Timmis, Jon and Clark, Edward and Flower, Darren R. (2008) An artificial immune system for evolving amino acid clusters tailored to protein function prediction. In: Bentley, Peter J. and Lee, Doheon and Jung, Sungwon, eds. Artificial Immune Systems. Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence . Springer, pp. 242-253. ISBN 978-3-540-85071-7. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Secker, Andrew D., Freitas, Alex A., Timmis, Jon (2008) AISIID: An artificial immune system for interesting information discovery on the web. Applied Soft Computing, 8 (2). pp. 885-905. ISSN 1568-4946. (doi:10.1016/j.asoc.2007.07.007) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Shaddick, G., Choo, Louise L., Walker, Stephen G. (2007) Modelling correlated count data with covariates. Journal of Statistical Computational and Simulation, 77 (11). pp. 945-954. ISSN 0094-9655. (doi:10.1080/10629360600851974) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sharaiha, Y.M., Gendreau, M., Laporte, Gilbert, Osman, Ibrahim H. (1997) A tabu search algorithm for the capacitated shortest spanning tree problem. Networks, 29 (3). pp. 161-171. ISSN 0028-3045. (doi:10.1002/(SICI)1097-0037(199705)29:3<161::AID-NET4>3.0.CO;2-F) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sharp, John A., Price, D.H.R. (1996) Systematic case study selection based on sample surveys: The case segmentation method. Systems Research and Information Science, 7 (2). pp. 71-81. ISSN 0882-3014. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Shen, LinLin, Bai, Li, Fairhurst, Michael (2007) Gabor wavelets and General Discriminant Analysis for face identification and verification. Image and Vision Computing, 25 (5). pp. 553-563. ISSN 0262-8856. (doi:10.1016/j.imavis.2006.05.002) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sheng, Weiguo, Howells, Gareth, Fairhurst, Michael, Deravi, Farzin (2007) A memetic fingerprint matching algorithm. IEEE Transactions on Information Forensics and Security, 2 (3). pp. 402-412. ISSN 1556-6013. (doi:10.1109/TIFS.2007.902681)
[img]
Preview

Shi, K. and Walczowski, Les T. and Nalbantis, D. and Waller, Winston A.J. (1996) O-2 ADL: An object-oriented analog VLSI design language. In: Zhang, Qingling and Tang, Ting-Ao and Yu, Huihua, eds. 2nd International Conference on ASIC. IEEE, pp. 27-30. ISBN 7-5439-0940-5. (doi:10.1109/ICASIC.1996.562742) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Shi, K. and Walczowski, Les T. and Waller, Winston A.J. and Nalbantis, D. (1996) A new bipolar op-amp IC synthesis approach. In: Zhang, Qingling and Tang, Ting-Ao and Yu, Huihua, eds. 2nd International Conference on ASIC. IEEE, pp. 57-60. ISBN 7-5439-0940-5. (doi:10.1109/ICASIC.1996.562750) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Shirazibeheshti, Amirali (2015) The effect of sedation on conscious processing: Computational analysis of the EEG response to auditory irregularity. Doctor of Science (DSc) thesis, University of Kent,. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sim, Kwang Mong (2012) Agent-Based Cloud Computing. IEEE Transactions On Services Computing, 5 (4). pp. 564-577. ISSN 1939-1374. (doi:10.1109/TSC.2011.52)
[img]
Preview

Sim, Kwang Mong (2009) BLGAN: Bayesian Learning and Genetic Algorithm for Supporting Negotiation With Incomplete Information. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 39 (1). pp. 198-211. ISSN 1083-4419. (doi:10.1109/TSMCB.2008.2004501)
[img]
Preview

Sim, Kwang Mong (2013) Complex and Concurrent Negotiations for Multiple Interrelated e-Markets. IEEE Transactions on Cybernetics, 43 (1). pp. 230-245. ISSN 2168-2267. (doi:10.1109/TSMCB.2012.2204742) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sim, Kwang Mong (2010) Concurrent Negotiation and Coordination for Grid Resource Coallocation. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 40 (3). pp. 753-766. ISSN 1083-4419. (doi:10.1109/TSMCB.2009.2028870) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sim, Kwang Mong (2008) Evolving Fuzzy Rules for Relaxed-Criteria Negotiation. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 38 (6). 1486 -1500. ISSN 1083-4419. (doi:10.1109/TSMCB.2008.928210)
[img]
Preview

Sim, Kwang Mong (2006) Grid Commerce, Market-Driven G-Negotiation, and Grid Resource Management. IEEE Transactions On Systems, Man, and Cybernetics—Part B: Cybernetics, 36 (6). pp. 1381-1394. ISSN 1083-4419. (doi:10.1109/TSMCB.2006.877791)
[img]
Preview
[img]
Preview

Sim, Kwang Mong (2010) Grid Resource Negotiation: Survey and New Directions. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 40 (3). pp. 245-257. ISSN 1094-6977. (doi:10.1109/TSMCC.2009.2037134)
[img]
Preview

Sim, Kwang Mong (2012) A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics, 42 (3). pp. 713-728. ISSN 1083-4419. (doi:10.1109/TSMCB.2011.2174355) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Sim, Kwang Mong, Gutierrez-Garcia, J. Octavio (2013) Agent-based Cloud service composition. Applied Intelligence, 38 (3). pp. 436-464. ISSN 0924-669X. E-ISSN 1573-7497. (doi:10.1007/s10489-012-0380-x)
[img]
Preview
[img]
Preview

Sim, Kwang Mong, Gutierrez-Garcia, J. Octavio (2013) A family of heuristics for agent-based elastic Cloud bag-of-tasks concurrent scheduling. Future Generation Computer Systems, 29 (7). pp. 1682-1699. ISSN 0167-739X. (doi:10.1016/j.future.2012.01.005)
[img]
Preview

Simon, .., Clear, Alison, Carter, Janet, Cross, Gerry, Radenski, Atanas, Tudor, Liviana, Tonnisson, Eno (2015) What's in a Name?: International Interpretations of Computing Education Terminology. ITICSE-WGR '15 Proceedings of the 2015 ITiCSE on Working Group Reports, . pp. 173-186. ISSN 9781450341462. (doi:10.1145/2858796.2858803) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Singh, Om Prakash, Palaniappan, Ramaswamy, Malarvilli, M.B. (2018) Automatic Quantitative Analysis of Human Respired Carbon Dioxide Waveform for Asthma and Non-Asthma Classification Using Support Vector Machine. IEEE Access, . ISSN 2169-3536. (doi:10.1109/ACCESS.2018.2871091)
[img]
Preview
[img]

Sirlantzis, Konstantinos and Howells, Gareth and Paschalakis, Stavros (1999) A functional neural network prototype for multidimensional data analysis. In: Seventh International Conference on Image Processing And Its Applications, 1999. IEEE, pp. 98-102. ISBN 0-85296-717-9. (doi:10.1049/cp:19990289) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sirur, Sean, Nurse, Jason R. C., Webb, Helena (2018) Are we there yet? Understanding the challenges faced in complying with the General Data Protection Regulation (GDPR). In: International Workshop on Multimedia Privacy and Security (MPS) at the 25th ACM Conference on Computer and Communications Security (CCS). CCS Computer and Communications Security . pp. 88-95. ACM, New York, USA ISBN 978-1-4503-5988-7. (doi:10.1145/3267357.3267368)
[img]
Preview

Slater, J.B., Swinnerton-Dyer, P. (1998) Counting points on cubic surfaces, I. Asterisque, (251). pp. 1-12. ISSN 0303-1179. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Smart, Nigel P. (1996) How difficult is it to solve a Thue equation? In: Cohen, H., ed. Algorithmic Number Theory Second International Symposium. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 363-373. ISBN 978-3-540-61581-1. E-ISBN 978-3-540-70632-8. (doi:10.1007/3-540-61581-4_67) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Smart, Nigel P. (1996) Solving discriminant form equations via unit equations. Journal of Symbolic Computation, 21 (3). pp. 367-374. ISSN 0747-7171. (doi:10.1006/jsco.1996.0018) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Smart, Nigel P., Siksek, S. (1999) A fast Diffie-Hellman protocol in genus 2. Journal of Cryptology, 12 (1). pp. 67-73. ISSN 0933-2790. (doi:10.1007/PL00003818) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Smith, Neil (1996) The UK national Web cache - The state of the art. Computer Networks and ISDN Systems, 28 . pp. 1407-1414. ISSN 0169-7552. (doi:10.1016/0169-7552(96)00029-3) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sobhy, Mohammed and Makkey, M.Y. (1998) A new look at analogue computing using switched capacitor circuits. In: ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems. International Symposium on Circuits and Systems . IEEE, pp. 484-487. ISBN 0-7803-4455-3. (doi:10.1109/ISCAS.1998.704508) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sorensen, Tyler and Donaldson, Alastair F. and Batty, Mark and Gopalakrishnan, Ganesh and Rakamarić, Zvonimir (2016) Portable Inter-workgroup Barrier Synchronisation for GPUs. In: Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications. SPLASH Systems, Programming, and Applications . ACM, New York, USA, pp. 39-58. ISBN 978-1-4503-4444-9. (doi:10.1145/2983990.2984032)
[img]
Preview

Stephenson, Julie E., Brown, Clifford, Griffin, Darren K. (2008) Electronic delivery of lectures in the university environment: An empirical comparison of three delivery styles. Computers and Education, 50 (3). pp. 640-651. ISSN 0360-1315. (doi:10.1016/j.compedu.2006.08.007) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Stone, R.D and Morse, David R. (1996) A software development tool for parallel and distributed systems. In: Oneill, B.C. and Transputer User, Grp, eds. Parallel processing developments : WoTUG-19 ; proceedings of the 19th World Occam and Transputer User Group Technical Meeting. Concurrent Systems Engineering . IOS Press, Amsterdam, Netherlands, pp. 207-219. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Strang, W., Khan, H., Simpson, V., Slater, C., Hill, Steve (1993) From hypertext to hypermedia. Second annual conference on multimedia in education and industry, . pp. 35-39. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Sulzmann, Martin and Wang, Meng (2007) Aspect-Oriented Programming with Type Classes. In: FOAL '07 Proceedings of the 6th workshop on Foundations of aspect-oriented languages. ICPS: ACM International Conference Proceeding Series . ACM, pp. 65-74. ISBN 978-1-59593-671-4. (doi:10.1145/1233833.1233842)
[img]
Preview

Sulzmann, Martin and Wang, Meng (2006) Modular Generic Programming with Extensible Superclasses. In: Proceedings of the 2006 ACM SIGPLAN workshop on Generic programming. ACM, New York, USA, pp. 55-65. ISBN 1-59593-492-8. (doi:10.1145/1159861.1159869)
[img]
Preview

Sulzmann, Martin and Wang, Meng (2004) A Systematic Translation of Guarded Recursive Data Types to Existential Types. Technical report. National University of Singapore (Unpublished)
[img]
Preview

Sulzmann, Martin and Wang, Meng (2005) Translating Generalized Algebraic Data Types to System F. Technical report. National University of Singapore (Unpublished)
[img]
Preview

Swenson, R.L., Dimond, Keith R. (1998) A universal colour transformation architecture. Pattern Recognition Letters, 19 (9). pp. 805-813. ISSN 0167-8655. (doi:10.1016/S0167-8655(98)00061-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

T

Tapiador, Juan E., Hernandez-Castro, Julio C., Peris-Lopez, Pedro (2012) Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management,, 20 (4). pp. 561-578. ISSN 1064-7570. (doi:10.1007/s10922-012-9246-0) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Tardivel, Gillian M., Morse, David R. (1998) The role of the user in computer-based species identification. In: Conference on Unlocking the Future - Information Technology in Plant Pathology and Biodiversity, December 16-19, 1996, University of Kent, Canterbury, England. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Taylor, C. and Derrick, J. and Boiten, E. (2000) A Case Study in Partial Specification: Consistency and Refinement for Object-Z. In: Third IEEE International Conference on Formal Engineering Methods. IEEE, pp. 177-185. ISBN 0-7695-0822-7. (doi:10.1109/ICFEM.2000.873818)
[img]
Preview

Thompson, Simon, Lins, Rafael D. (1992) The categorical multi-combinator machine - cmcm. Computer Journal, 35 (2). pp. 170-176. ISSN 0010-4620. (doi:10.1093/comjnl/35.2.170)
[img]
Preview
[img]
Preview

Timmis, Jon, Hone, Andrew N.W., Stibor, Thomas, Clark, Edward (2008) Theoretical advances in artificial immune systems. Theoretical Computer Science, 403 (1). pp. 11-32. ISSN 0304-3975. (doi:10.1016/j.tcs.2008.02.011) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Tupman, Charlotte, Hedges, Mark, Jordanous, Anna, Roueché, Charlotte, Lawrence, K. Faith, Wakelnig, Elvira, Dunn, Stuart (2012) Sharing Ancient Wisdoms: developing structures for tracking cultural dynamics by linking moral and philosophical anthologies with their source and recipient texts. In: Digital Humanities, 2012, Hamburg, Germany. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Tupman, Charlotte and Jordanous, Anna (2014) Sharing Ancient Wisdoms across the Semantic Web using TEI and ontologies. In: Andrews, T.L. and Mace, C., eds. Analysis of Ancient and Medieval Texts and Manuscripts: Digital Approaches. Lectio (LECTIO 1) . Brepols, Belgium. ISBN 978-2-503-55268-2.
[img]
Preview

Tupman, Charlotte, Jordanous, Anna (2012) Sharing Ancient Wisdoms across the Semantic Web using TEI and ontologies. In: Methods and means for digital analysis of ancient and medieval texts and manuscripts, 2012, Leuven, Belgium. (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Turner, David A. (1995) Elementary strong functional programming. In: Hartel, Pieter H. and Plasmeijer, Rinus, eds. Funtional Programming Languages in Education First International Symposium. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 1-13. ISBN 978-3-540-60675-8. E-ISBN 978-3-540-49252-8. (doi:10.1007/3-540-60675-0_35) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Tussyadiah, Iis, Li, Shujun, Miller, Graham (2018) Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For. In: Pesonen, Juho and Neidhardt, Julia, eds. Information and Communication Technologies in Tourism 2019: Proceedings of the International Conference in Nicosia, Cyprus, January 30–February 1, 2019. . pp. 278-290. Springer Nature Switzerland AG, Cham, Switzerland ISBN 978-3-030-05939-2. E-ISBN 978-3-030-05940-8. (doi:10.1007/978-3-030-05940-8_22)
[img]
Preview

V

Vasconcelos, G.C., Fairhurst, Michael, Bisset, D.L. (1995) EFFICIENT DETECTION OF SPURIOUS INPUTS FOR IMPROVING THE ROBUSTNESS OF MLP NETWORKS IN PRACTICAL APPLICATIONS. Neural Computing & Applications, 3 (4). pp. 202-212. ISSN 0941-0643. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Vasconcelos, G.C., Fairhurst, Michael, Bisset, D.L. (1995) INVESTIGATING FEEDFORWARD NEURAL NETWORKS WITH RESPECT TO THE REJECTION OF SPURIOUS PATTERNS. Pattern Recognition Letters, 16 (2). pp. 207-212. ISSN 0167-8655. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Voigtlander, Janis, Hu, Zhenjiang, Matsuda, Kazutaka, Wang, Meng (2013) Enhancing Semantic Bidirectionalization via Shape Bidirectionalizer Plug-ins. Journal of Functional Programming, 23 (05). pp. 515-551. ISSN 0956-7968. (doi:10.1017/S0956796813000130)
[img]
Preview

Voigtländer, Janis and Hu, Zhenjiang and Matsuda, Kazutaka and Wang, Meng (2010) Combining Syntactic and Semantic Bidirectionalization. In: ICFP '10 Proceedings of the 15th ACM SIGPLAN international conference on Functional programming. ICFP International Conference on Functional Programming . ACM, New York, USA, pp. 181-192. ISBN 978-1-60558-794-3. (doi:10.1145/1863543.1863571)
[img]
Preview

Vu, Quang, Colombo, Maurizio, Asal, Rasool, Sajjad, Ali, El-Moussa, Fadi Ali, Dimitrakos, Theo (2015) Secure Cloud Storage: A Framework for Data Protection as a Service in the Multi-cloud Environment. In: Communications and Network Security (CNS), 2015 IEEE Conference on. . pp. 638-642. (doi:10.1109/CNS.2015.7346879)
[img]
Preview

van Leemput, Koen, Maes, Frederik, Bello, Fernando, Vandermeulen, Dirk, Colchester, Alan C. F., Suetens, Paul (1999) Automated segmentation of MS lesions from multi-channel MR images. In: Taylor, Chris and Colchester, Alan C. F., eds. Medical Image Computing and Computer-Assisted Intervention, MICCAI'99, Proceedings. Lecture Notes in Computer Science , 1679. pp. 11-21. Springer-Verlag Berlin ISBN 3-540-66503-X. (doi:10.1007/10704282_2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

W

Walczowski, Les T., Jastrzebski, Adam K., Barnaby, J.E. (1994) A Multi- Mode System for Gaas Circuis. In: 1994 IEEE International Symposium on Circus and Systems, VOL 1 - Computer Aided Design (CAD). 1. A427-A430. I E E E ISBN 0-7803-1915-X. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Walczowski, Les T., Nalbantis, D., Waller, Winston A.J., Shi, K. (1997) Analogue layout generation by World Wide Web server-based agents. European Conference on Design Automation . I E E E, Computer Soc Press, USA, 634 pp. ISBN 0-8186-7786-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Waller, Winston A.J. and Aziz, S.M. (1994) A C-Testable Parallel Multipler Using Differencial Casecode Voltage Swish (DCVS) Logic. In: Yanagawa, T. and Ivey, P.A., eds. VLSI 93 - IFIP Transactions A. Computer Science and Technology. North Holland, pp. 133-142. ISBN 0-444-89911-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wang, Frank Z. (2018) Entropy4Cloud: Using Entropy-Based Complexity To Optimize Cloud Service Resource Management. IEEE Transactions on Emerging Topics in Computational Intelligence, 2 (1). pp. 13-24. ISSN 2471-285X. E-ISSN 2471-285X. (doi:10.1109/TETCI.2017.2755691)
[img]
Preview
[img]
Preview

Wang, Frank Z., Chua, Leon O., Yang, Xiao, Helian, Na, Tetzlaff, Ronald, Schmidt, Schmidt, Li, Ling, Carrasco, Jose Manuel Garcia, Chen, Wanlong, Chu, Dominique and others. (2013) Adaptive Neuromorphic Architecture (ANA). Neural Networks, 45 (1). pp. 111-116. ISSN 0893-6080. (doi:10.1016/j.neunet.2013.02.009) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Wang, Frank Z., Li, Ling, Shi, Luping, Wu, Huaqiang, Chua, Leon (2019) ? memristor: Real memristor found. Journal of Applied Physics, 125 (5). 054504. ISSN 0021-8979. (doi:10.1063/1.5042281) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Wang, Meng, Chen, Kung, Khoo, Siau-Cheng (2006) On the Pursuit of Static and Coherent Weaving. In: Foundations of Aspect-Oriented Languages Workshop. .
[img]
Preview

Wang, Meng and Chen, Kung and Khoo, Siau-Cheng (2006) Type-Directed Weaving of Aspects for Higher-order Functional Languages. In: Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation. ACM, pp. 78-87. ISBN 1-59593-196-1. (doi:10.1145/1111542.1111555)
[img]
Preview

Wang, Meng and Gibbons, Jeremy and Matsuda, Kazutaka and Hu, Zhenjiang (2010) Gradual Refinement: Blending Pattern Matching with Data Abstraction. In: Mathematics of Program Construction 10th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 397-425. ISBN 978-3-642-13320-6. E-ISBN 978-3-642-13321-3. (doi:10.1007/978-3-642-13321-3_22)
[img]
Preview

Wang, Meng, Gibbons, Jeremy, Matsuda, Kazutaka, Hu, Zhenjiang (2013) Refactoring pattern matching. Science of Computer Programming, 78 (11). pp. 2216-2242. ISSN 0167-6423. (doi:10.1016/j.scico.2012.07.014)
[img]
Preview

Wang, Meng and Gibbons, Jeremy and Wu, Nicolas (2011) Incremental Updates for Efficient Bidirectional Transformations. In: Proceedings of the 16th ACM SIGPLAN international conference on Functional programming. ACM, New York, USA, pp. 392-403. ISBN 978-1-4503-0865-6. (doi:10.1145/2034773.2034825)
[img]
Preview

Wang, Meng and Najd, Shayan (2014) Semantic Bidirectionalization Revisited. In: Proceedings of the ACM SIGPLAN 2014 Workshop on Partial Evaluation and Program Manipulation. PEPM Partial Evaluation and Program Manipulation . ACM, New York, USA. ISBN 978-1-4503-2619-3. (doi:10.1145/2543728.2543729)
[img]
Preview

Wang, Meng and Oliveira, Bruno (2009) What Does Aspect-Oriented Programming Mean for Functional Programmers? In: WGP '09 Proceedings of the 2009 ACM SIGPLAN workshop on Generic programming. ICFP International Conference on Functional Programming . ACM, New York, USA, pp. 37-48. ISBN 978-1-60558-510-9. (doi:10.1145/1596614.1596621)
[img]
Preview

Wang, Yi and Kerridge, Simon and Smith, Peter and Foster, Simon and Coppin, Steve and Trowell, Setphen (2011) Integration of CERIF, ESB and Cloud in the Development of a National Global Research and Administrative Management System. In: Metadata and Semantic Research. Springer, pp. 245-255. ISBN 978-3-642-24730-9. (doi:10.1007/978-3-642-24731-6_26) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Wazan, Ahmad Samer, Laborde, Romain, Chadwick, David W., Barrere, Francois, Benzekri, Abdelmalek, Habbal, Abid M.M., Kaiiali, Mustafa (2017) Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. Security and Communication Networks, 2017 (690714). pp. 1-23. ISSN 1939-0114. E-ISSN 1939-0122. (doi:10.1155/2017/6907146)
[img]
Preview

Webber, J. Beau W. (1989) A Pipe has two ends. Using APL in a multiprocess/multiprocessor environment. A proposal for a flexible but easy to use syntax. Apl Quad Quote, 20 (1). pp. 1-2. (doi:10.1145/379199.379200)
[img] [img]
Preview

Welch, Peter H. and Brown, Neil C.C. and Moores, James and Chalmers, Kevin and Sputh, Bernhard H. C. (2007) Integrating and extending JCSP. In: McEwan, Alistair A. and Schneider, S. and Ifill, W. and Welch, Peter H., eds. Communicating Process Architectures 2007: WoTUG-30. Concurrent Systems Engineering (Volume). IOS Press, US, Amsterdam, pp. 349-370. ISBN 978-1-58603-767-3.
[img]
Preview

Welch, Peter H. and Justo, George R. R. and Willcock, Colin J. (1993) High-level paradigms for deadlock-free high-performance systems. In: Grebe, R. and Hektor, J. and Hilton, S.C. and Jane, M.R. and Welch, Peter H., eds. Transputer Applications and Systems 93 Transputer Applications and Systems 93. Transputer & Occam Engineering., 36 . IOS press, Amsterdam, pp. 981-1004. ISBN 90-5199-140-1. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Welch, Peter H., Wood, David C. (1993) Image tracking in real-time: a transputer emulation of some early mammalian vision processes. Image and Vision Computing, 11 (4). pp. 221-228. ISSN 0262-8856. (doi:10.1016/0262-8856(93)90039-J) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wickerson, John and Batty, Mark and Sorensen, Tyler and Constantinides, George A. (2017) Automatically Comparing Memory Consistency Models. In: Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. POPL Principles of Programming Languages . ACM, New York, USA, pp. 190-204. ISBN 978-1-4503-4660-3. (doi:10.1145/3093333.3009838)
[img]
Preview

Wiiliams, Nick, Li, Shujun (2017) Simulating human detection of phishing websites: An investigation into the applicability of ACT-R cognitive behaviour architecture model. In: Proceedings of 2017 3rd IEEE International Conference on Cybernetics. . pp. 471-478. IEEE, USA ISBN 978-1-5386-2201-8. E-ISBN 978-1-5386-2200-1. (doi:10.1109/CYBConf.2017.7985810)
[img]
Preview

Williamson, Jon (2004) Bayesian Nets and Causality: Philosophical and Computational Foundations. Oxford University Press, Oxford, 250 pp. ISBN 978-0-19-853079-4. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Williamson, Jon (2001) Bayesian Networks for Logical Reasoning. In: Proceedings of the AAAI Fall Symposium on using Uncertainty within Computation. AAAI Press, pp. 136-143. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Williamson, Jon (2001) Foundations for Bayesian Networks. In: Corfield, David and Williamson, Jon, eds. Foundations of Bayesianism. Applied Logic Series (24). Kluwer Academic Publishers Group, Dordrecht, pp. 75-115. ISBN 1-4020-0223-8. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Williamson, Jon (2005) Objective Bayesian Nets. In: Artemov, Sergei and Barringer, Howard and Garcez, Artur d'Avila, eds. We Will Show Them: Essays in Honour of Dov Gabbay. College Publications, London, pp. 713-730. ISBN 978-1-904987-26-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wilson, E. (1992) Guiding lawyers - mapping law into hypertext. Artificial Intelligence Review, 6 (2). pp. 161-189. ISSN 0269-2821. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wilson, E. and Lindley, I. and Pullen, S. (1992) Callguide: using programmable hypertext as a shell for call programs. In: Computer Assisted Learning 4th International Conference. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 592-615. ISBN 978-3-540-55578-0. E-ISBN 978-3-540-47221-6. (doi:10.1007/3-540-55578-1_102) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wilson, Eve (1994) Using Corpora as a Resource in Language Teaching. Computers and Education, 23 . pp. 41-51. ISSN 0360-1315. (doi:10.1016/0360-1315(94)90031-0) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wilson, John J., Palaniappan, Ramaswamy (2011) Analogue mouse pointer control via an online steady state visual evoked potential (SSVEP) brain-computer interface. Journal of Neural Engineering, 8 (2). pp. 1-6. ISSN 1741-2560. (doi:10.1088/1741-2560/8/2/025026)
[img]
Preview

Wilson, John J., Palaniappan, Ramaswamy (2009) Augmenting a SSVEP BCI through single cycle analysis and phase weighting. In: Proceedings of 4th International IEEE EMBS Conference on Neural Engineering. . pp. 371-374. IEEE ISBN 978-1-4244-2072-8. E-ISBN 978-1-4244-2073-5. (doi:10.1109/NER.2009.5109310) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wood, David C. and Welch, Peter H. (1996) The Kent retargetable occam compiler. In: Oneill, B.C. and Transputer User, Grp, eds. Parallel processing developments : WoTUG-19 ; proceedings of the 19th World Occam and Transputer User Group Technical Meeting. Concurrent Systems Engineering . IOS Press, pp. 143-166. ISBN 90-5199-261-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wusteman, Judith (1996) Electronic journal formats. Program: Electronic Library and Information Systems, 30 (4). pp. 319-343. ISSN 0033-0337. (doi:10.1108/eb047235) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Wusteman, Judith (1992) Explanation-based learning - a survey. Artificial Intelligence Review, 6 (3). pp. 243-262. ISSN 0269-2821. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Y

YANG, XIAO (2014) Memristor based neural networks: Feasibility, theories and approaches. Doctor of Philosophy (PhD) thesis, University of Kent,.
[img]
Preview

Yadav, Supriya, Howells, Gareth (2019) Secure device identification using multidimensional mapping. In: Proceddings of Eighth IEEE International Conference on Emerging Security Technologies. Proceddings of Eighth IEEE International Conference on Emerging Security Technologies. . IEEE, New York, NY, USA E-ISBN 978-1-72815-546-3. (doi:10.1109/EST.2019.8806218)
[img]
Preview

Yang, Xiao, Chen, Wanlong, Wang, Frank Z. (2013) A Memristor-CAM (Content Addressable Memory) Cell: New Design and Evaluation. In: International Conference on Computer Science and Information Technology. . pp. 1045-1048. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Yu, Li, Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2014) Limitations on information-theoretically-secure quantum homomorphic encryption. Physical Review A, 90 (5). 050303. (doi:10.1103/PhysRevA.90.050303)
[img]
Preview

Yuan, Haiyue and Li, Shujun and Rusconi, Patrice and Aljaffan, Nouf (2017) When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. In: Tryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust 5th International Conference. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 251-264. ISBN 978-3-319-58459-1. E-ISBN 978-3-319-58460-7. (doi:10.1007/978-3-319-58460-7_17)
[img]
Preview

Yuvaraj, R., Murugappan, M., Ibrahim, Norlinah Mohamed, Sundaraj, Kenneth, Omar, Mohd Iqbal, Mohamad, Khairiyah, Palaniappan, Ramaswamy (2014) Detection of emotions in Parkinson's disease using higher order spectral features from brain's electrical activity. Biomedical Signal Processing and Control, 14 . pp. 108-116. ISSN 1746-8094. (doi:10.1016/j.bspc.2014.07.005)
[img]
Preview

Yuvaraj, Rajamanickam, Murugappan, Murugappan, Ibrahim, Norlinah Mohamed, Omar, Mohd Iqbal, Sundaraj, Kenneth, Mohamad, Khairiyah, Palaniappan, Ramaswamy, Satiyan, Marimuthu (2014) Emotion classification in Parkinson's disease by higher-order spectra and power spectrum features using EEG signals: A comparative study. Journal of Integrative Neuroscience, 13 (1). pp. 89-120. ISSN 0219-6352. E-ISSN 1757-448X. (doi:10.1142/S021963521450006X)
[img]
Preview

Yuvaraj, Rajamanickam, Murugappan, Murugappan, Ibrahim, Norlinah Mohamed, Sundaraj, Kenneth, Omar, Mohd Iqbal, Mohamad, Khairiyah, Palaniappan, Ramaswamy, Satiyan, Marimuthu (2014) Inter-hemispheric EEG coherence analysis in Parkinson's disease : Assessing brain activity during emotion processing. Journal of Neural Transmission, 122 (2). pp. 237-252. ISSN 0300-9564. E-ISSN 1435-1463. (doi:10.1007/s00702-014-1249-4)
[img]
Preview

Yuvaraj, Rajamanickam, Murugappan, Murugappan, Ibrahim, Norlinah Mohamed, Sundaraj, Kenneth, Omar, Mohd Iqbal, Mohamad, Khairiyah, Palaniappan, Ramaswamy (2014) Optimal set of EEG features for emotional state classification and trajectory visualization in Parkinson's disease. International Journal of Psychophysiology, 94 (3). pp. 482-495. ISSN 0167-8760. (doi:10.1016/j.ijpsycho.2014.07.014)
[img]
Preview

Z

Zhang, Leishi, Kujis, J.N., Liu, Xiaohui (2008) Information visualization for DNA microarray data analysis: A critical review. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, 38 (1). pp. 42-54. ISSN 1094-6977. (doi:10.1109/tsmcc.2007.906065) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Zhang, Lingwei, Deng, Yuhui, Zhu, Weiheng, Zhou, Jipeng, Wang, Frank Z. (2015) Skewly replicating hot data to construct a power-efficient storage cluster. Journal of Network and Computer Applications (IF=2.762, ranked A at ERA), 50 . pp. 168-179. (doi:10.1016/j.jnca.2014.06.005) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Zhao, Liming, Pérez-Delgado, Carlos A, Fitzsimons, Joseph F (2016) Fast graph operations in quantum computation. Physical Review A, 93 (3). 032314. ISSN 2469-9926. E-ISSN 2469-9934. (doi:10.1103/PhysRevA.93.032314)
[img]
Preview

Zheng, Yi, Hague, Jim (1991) Dmt - a Demonstration Tool. Software: Practice and Experience, 21 (9). pp. 949-961. ISSN 0038-0644. (doi:10.1002/spe.4380210905) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Zou, Longhao, Tal, Irina, Covaci, Alexandra, Ibarrola, Eva, Ghinea, Gheorghita, Muntean, Gabriel-Miro (2017) Can Multisensorial Media Improve Learner Experience? In: Proceedings of the 8th ACM on Multimedia Systems Conference. . pp. 315-320. ACM, New York ISBN 978-1-4503-5002-0. (doi:10.1145/3083187.3084014)
[img]
Preview

This list was generated on Thu Oct 17 22:17:43 2019 BST.