Edit distance Kernelization of NP theorem proving for polynomial-time machine learning of proof heuristics

Conference paper


Windridge, D. and Kammueller, F. 2020. Edit distance Kernelization of NP theorem proving for polynomial-time machine learning of proof heuristics. FICC 2019: Future of Information and Communications Conference. San Francisco, USA 14 - 15 Mar 2019 Springer. pp. 271-283 https://doi.org/10.1007/978-3-030-12385-7_22
TypeConference paper
TitleEdit distance Kernelization of NP theorem proving for polynomial-time machine learning of proof heuristics
AuthorsWindridge, D. and Kammueller, F.
Abstract

We outline a general strategy for the application of edit- distance based kernels to NP Theorem Proving in order to allow for polynomial-time machine learning of proof heuristics without the loss of sequential structural information associated with conventional feature- based machine learning. We provide a general short introduction to logic and proof considering a few important complexity results to set the scene and highlight the relevance of our findings.

LanguageEnglish
ConferenceFICC 2019: Future of Information and Communications Conference
Page range271-283
ISSN2367-3370
ISBN
Hardcover9783030123840
PublisherSpringer
Publication dates
Online02 Feb 2019
Print2020
Publication process dates
Deposited03 Oct 2018
Accepted28 Jul 2018
Output statusPublished
Accepted author manuscript
Copyright Statement

This is a post-peer-review, pre-copyedit version of an article published in Advances in Information and Communication Networks: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 2. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-3-030-12385-7_22

Additional information

Paper published as:
Windridge D., Kammüller F. (2020) Edit Distance Kernelization of NP Theorem Proving For Polynomial-Time Machine Learning of Proof Heuristics. In: Arai K., Bhatia R. (eds) Advances in Information and Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 70. Springer, Cham

Digital Object Identifier (DOI)https://doi.org/10.1007/978-3-030-12385-7_22
Book titleAdvances in Information and Communication Networks: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 2
Permalink -

https://repository.mdx.ac.uk/item/87z07

Download files


Accepted author manuscript
  • 59
    total views
  • 5
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

Faithful Counterfactual Visual Explanations (FCVE)
Khan, B., Tariq, S., Zia, T., Ahsan, M. and Windridge, D. 2024. Faithful Counterfactual Visual Explanations (FCVE). Knowledge-Based Systems. 294. https://doi.org/10.1016/j.knosys.2024.111668
Resource saving via ensemble techniques for quantum neural networks
Incudini, M., Grossi, M., Ceschini, A., Mandarino, A., Panella, M., Vallecorsa, S. and Windridge, D. 2023. Resource saving via ensemble techniques for quantum neural networks. Quantum Machine Intelligence. 5 (2). https://doi.org/10.1007/s42484-023-00126-z
A topological features based quantum kernel
Incudini, M., Martini, F., Di Pierro, A. and Windridge, D. 2023. A topological features based quantum kernel. 7th International Conference on Quantum Techniques in Machine Learning. CERN, Geneva 19 - 24 Nov 2023
Interpretable chronic kidney disease risk prediction from clinical data using machine learning
Chennareddy, V., Tirunagari, S., Mohan, S., Windridge, D. and Balla, Y. 2023. Interpretable chronic kidney disease risk prediction from clinical data using machine learning. 16th Multi-Disciplinary International Conference on Artificial Intelligence (MIWAI 2023). Hyderabad, India 21 2023 - 22 Jul 2024 Springer. https://doi.org/10.1007/978-3-031-36402-0_63
Addressing challenges in healthcare big data analytics
Tirunagari, S., Mohan, S., Windridge, D. and Balla, Y. 2023. Addressing challenges in healthcare big data analytics. 16th Multi-Disciplinary International Conference on Artificial Intelligence (MIWAI 2023). Hyderabad, India 21 2023 - 22 Jul 2024 Springer. https://doi.org/10.1007/978-3-031-36402-0_70
Visual attribution using Adversarial Latent Transformations
Zia, T., Wahab, A., Windridge, D., Tirunagari, S. and Bhatti, N. 2023. Visual attribution using Adversarial Latent Transformations. Computers in Biology and Medicine. 166. https://doi.org/10.1016/j.compbiomed.2023.107521
Deep combination of radar with optical data for gesture recognition: role of attention in fusion architectures
Towakel, P., Windridge, D. and Nguyen, H. 2023. Deep combination of radar with optical data for gesture recognition: role of attention in fusion architectures. IEEE Transactions on Instrumentation and Measurement. 72, pp. 1-15. https://doi.org/10.1109/TIM.2023.3307768
The quantum path kernel: A generalized neural tangent kernel for deep quantum machine learning
Incudini, M., Grossi, M., Mandarino, A., Vallecorsa, S., Di Pierro, A. and Windridge, D. 2023. The quantum path kernel: A generalized neural tangent kernel for deep quantum machine learning. IEEE Transactions on Quantum Engineering. 4. https://doi.org/10.1109/TQE.2023.3287736
Pediatrics in artificial intelligence era: A systematic review on challenges, opportunities, and explainability
Balla, Y., Tirunagari, S. and Windridge, D. 2023. Pediatrics in artificial intelligence era: A systematic review on challenges, opportunities, and explainability. Indian Pediatrics. 60 (7), pp. 561-569. https://doi.org/10.1007/s13312-023-2936-8
Resource saving via ensemble techniques for quantum neural networks
Incudini, M., Grossi, M., Ceschini, A., Mandarino, A., Panella, M., Vallecorsa, S. and Windridge, D. 2023. Resource saving via ensemble techniques for quantum neural networks. https://doi.org/10.48550/arXiv.2303.11283
A user-guided personalization methodology to facilitate new smart home occupancy
Ali, S.M.M., Augusto, J., Windridge, D. and Ward, E. 2023. A user-guided personalization methodology to facilitate new smart home occupancy. Universal Access in the Information Society. 22 (3), pp. 869-891. https://doi.org/10.1007/s10209-022-00883-x
Reducing the dependency of having prior domain knowledge for effective online information retrieval
Zammit, O., Smith, S., Windridge, D. and De Raffaele, C. 2023. Reducing the dependency of having prior domain knowledge for effective online information retrieval. Expert systems. 40 (4). https://doi.org/10.1111/exsy.13014
Explanation by automated reasoning using the Isabelle Infrastructure framework
Kammueller, F. 2022. Explanation by automated reasoning using the Isabelle Infrastructure framework. Human Computer Interaction International. Virtual 26 Jun - 01 Jul 2022
Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders
Kammueller, F. and Alvarado, C. 2022. Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders. Moallem, A. (ed.) HCI-CPT: 4th International Conference on HCI for Cybersecurity, Privacy and Trust. Virtual 26 Jun - 01 Jul 2022 Springer. pp. 340-357 https://doi.org/10.1007/978-3-031-05563-8_22
A novel kernel based approach to arbitrary length symbolic data with application to type 2 diabetes risk
Nwegbu, N., Tirunagari, S. and Windridge, D. 2022. A novel kernel based approach to arbitrary length symbolic data with application to type 2 diabetes risk. Scientific Reports. 12 (1), pp. 1-16. https://doi.org/10.1038/s41598-022-08757-1
VANT-GAN: adversarial learning for discrepancy-based visual attribution in medical imaging
Zia, T., Murtaza, S., Bhatti, N., Windridge, D. and Nisar, Z. 2022. VANT-GAN: adversarial learning for discrepancy-based visual attribution in medical imaging. Pattern Recognition Letters. 156, pp. 112-118. https://doi.org/10.1016/j.patrec.2022.02.005
Explanation by automated reasoning using the Isabelle Infrastructure framework
Kammueller, F. 2021. Explanation by automated reasoning using the Isabelle Infrastructure framework. arxiv.org. https://doi.org/10.48550/arXiv.2112.14809
The quantum path kernel: A generalized quantum neural tangent kernel for deep quantum machine learning
Incudini, M., Grossi, M., Mandarino, A., Vallecorsa, S., Di Pierro, A. and Windridge, D. 2022. The quantum path kernel: A generalized quantum neural tangent kernel for deep quantum machine learning. https://doi.org/10.48550/arXiv.2212.11826
Explanation of black box AI for GDPR related privacy using Isabelle
Kammueller, F. 2022. Explanation of black box AI for GDPR related privacy using Isabelle. Garcia-Alfaro, J., Navarro-Arribas, G. and Dragoni, N. (ed.) 17th DPM International Workshop on Data Privacy Management. Copenhagen, Denmark 29 - 30 Sep 2022 Cham Springer. https://doi.org/10.1007/978-3-031-25734-6_5
Discriminator-based adversarial networks for knowledge graph completion
Tubaishat, A., Zia, T., Faiz, R., Al Obediat, F., Shah, B. and Windridge, D. 2022. Discriminator-based adversarial networks for knowledge graph completion. Neural Computing and Applications. https://doi.org/10.1007/s00521-022-07680-w
Dependability engineering in Isabelle
Kammueller, F. 2021. Dependability engineering in Isabelle. arxiv.org.
Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders
Kammueller, F. and Alvarado, C. 2021. Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders. arxiv.org.
A generative adversarial network for single and multi-hop distributional knowledge base completion
Zia, T. and Windridge, D. 2021. A generative adversarial network for single and multi-hop distributional knowledge base completion. Neurocomputing. 461, pp. 543-551. https://doi.org/10.1016/j.neucom.2021.04.128
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2022. Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Computational Intelligence. 38 (3), pp. 811-828. https://doi.org/10.1111/coin.12421
Applying the Isabelle insider framework to airplane security
Kammueller, F. and Kerber, M. 2021. Applying the Isabelle insider framework to airplane security. Science of Computer Programming. 206. https://doi.org/10.1016/J.SCICO.2021.102623
Multi-view convolutional recurrent neural networks for lung cancer nodule identification
Naeem Abid, M., Zia, T., Ghafoor, M. and Windridge, D. 2021. Multi-view convolutional recurrent neural networks for lung cancer nodule identification. Neurocomputing. 453, pp. 299-311. https://doi.org/10.1016/j.neucom.2020.06.144
Generative Adversarial Networks (GANs) in networking: A comprehensive survey & evaluation
Navidan, H., Moshiri, P., Nabati, M., Shahbazian, R., Ghorashi, S., Shah-Mansouri, V. and Windridge, D. 2021. Generative Adversarial Networks (GANs) in networking: A comprehensive survey & evaluation. Computer Networks. 194, pp. 1-21. https://doi.org/10.1016/j.comnet.2021.108149
A genetic deep learning model for electrophysiological soft robotics
Pandey, H. and Windridge, D. 2021. A genetic deep learning model for electrophysiological soft robotics. Balas, V., Jain, L., Balas, M. and Shahbazova, S. (ed.) 8th International Workshop on Soft Computing Applications. Arad, Romania 13 - 15 Sep 2018 Cham Springer. https://doi.org/10.1007/978-3-030-51992-6_12
A formal development cycle for security engineering in Isabelle
Kammueller, F. 2020. A formal development cycle for security engineering in Isabelle. arxiv.org.
Applying the Isabelle Insider framework to airplane security
Kammueller, F. and Kerber, M. 2020. Applying the Isabelle Insider framework to airplane security. arxiv.org.
Exposing students to new terminologies while collecting browsing search data (best technical paper)
Zammit, O., Smith, S., Windridge, D. and De Raffaele, C. 2020. Exposing students to new terminologies while collecting browsing search data (best technical paper). 40th SGAI International Conference on Artificial Intelligence, AI 2020. Cambridge, UK 15 - 17 Dec 2020 Cham Springer. https://doi.org/10.1007/978-3-030-63799-6_1
Masterminding change by combining secure system design with security risk assessment
Kammueller, F., Legay, A. and Schivo, S. 2021. Masterminding change by combining secure system design with security risk assessment. International Journal on Software Tools for Technology Transfer. 23 (1), pp. 69-70. https://doi.org/10.1007/s10009-020-00595-8
Combining secure system design with risk assessment for IoT healthcare systems
Kammueller, F. 2019. Combining secure system design with risk assessment for IoT healthcare systems. SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of Things, colocated with IEEE PerCom 2019. Kyoto, Japan 11 - 15 Mar 2019 Institute of Electrical and Electronics Engineers (IEEE). pp. 961-966 https://doi.org/10.1109/PERCOMW.2019.8730776
Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework
Kammueller, F. and Lutz, B. 2020. Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework. Garcia-Alfaro, J., Navarro-Arribas, G. and Herrera-Joancomarti, J. (ed.) International Workshop of Data Privacy Management, DPM'20. University of Surrey, UK 17 - 18 Sep 2020 Springer. pp. 128-144 https://doi.org/10.1007/978-3-030-66172-4_8
Inter-blockchain protocols with the Isabelle Infrastructure framework
Kammueller, F. and Nestmann, U. 2020. Inter-blockchain protocols with the Isabelle Infrastructure framework. Bernardo, B. and Marmsoler, D. (ed.) 2nd Workshop on Formal Methods for Blockchain, co-located with CAV'20. Los Angeles, CA, USA LIPICS --Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany. pp. 11:1-11:12 https://doi.org/10.4230/OASIcs.FMBC.2020.11
A family of globally optimal branch-and-bound algorithms for 2D–3D correspondence-free registration
Brown, M., Windridge, D. and Guillemaut, J. 2019. A family of globally optimal branch-and-bound algorithms for 2D–3D correspondence-free registration. Pattern Recognition. 93, pp. 36-54. https://doi.org/10.1016/j.patcog.2019.04.002
Describing and simulating concurrent quantum systems
Bornat, R., Boender, J., Kammueller, F., Poly, G. and Nagarajan, R. 2020. Describing and simulating concurrent quantum systems. Biere, A. and Parker, D. (ed.) International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 20). Dublin 27 - 30 Apr 2020 Springer. pp. 271-277 https://doi.org/10.1007/978-3-030-45237-7_16
On the utility of dreaming: a general model for how learning in artificial agents can benefit from data hallucination
Windridge, D., Svensson, H. and Thill, S. 2021. On the utility of dreaming: a general model for how learning in artificial agents can benefit from data hallucination. Adaptive Behavior. 29 (3), pp. 267-280. https://doi.org/10.1177/1059712319896489
An approach to human-machine teaming in legal investigations using anchored narrative visualisation and machine learning
Attfield, S., Fields, B., Windridge, D. and Xu, K. 2019. An approach to human-machine teaming in legal investigations using anchored narrative visualisation and machine learning. Conrad, J., Pickens, J., Jones, A., Baron, J. and Henseler, H. (ed.) First International Workshop on AI and Intelligent Assistance for Legal Professionals in the Digital Workplace (LegalAIIA 2019).. Montreal, Canada 17 Jun 2019 CEUR Workshop Proceedings. pp. 7-11
Epileptic seizure detection using constrained singular spectrum analysis and 1D-local binary patterns
Ramanna, S., Tirunagari, S. and Windridge, D. 2020. Epileptic seizure detection using constrained singular spectrum analysis and 1D-local binary patterns. Health and Technology. 10 (3), pp. 699-709. https://doi.org/10.1007/s12553-019-00395-4
Editorial to special issue on hybrid artificial intelligence and machine learning technologies in intelligent systems
Pandey, H., Bessis, N., Das, S., Windridge, D. and Chaudhary, A. 2020. Editorial to special issue on hybrid artificial intelligence and machine learning technologies in intelligent systems. Neural Computing and Applications. 32 (12), pp. 7743-7745. https://doi.org/10.1007/s00521-020-04903-w
A low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems
Sazdar, A.M., Ghorashi, S.A., Moghtadaiee, V., Khonsari, A. and Windridge, D. 2020. A low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems. Journal of Information Security and Applications. 53. https://doi.org/10.1016/j.jisa.2020.102515
Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems
Kammueller, F. 2020. Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems.
Revisiting direct neuralisation of first-order logic
Gunn, I. and Windridge, D. 2018. Revisiting direct neuralisation of first-order logic. NeSy 2018 : Thirteenth International Workshop on Neural-Symbolic Learning and Reasoning. Prague, Czech Republic 23 - 24 Aug 2018
A generative adversarial strategy for modeling relation paths in knowledge base representation learning
Zia, T., Zahid, U. and Windridge, D. 2019. A generative adversarial strategy for modeling relation paths in knowledge base representation learning. KR2ML - Knowledge Representation and Reasoning Meets Machine Learning Workshop, NeurIPS 2019, Thirty-third Conference on Neural Information Processing Systems. Vancouver, Canada 09 - 14 Dec 2019
Attack Trees in Isabelle extended with probabilities for Quantum Cryptography
Kammueller, F. 2019. Attack Trees in Isabelle extended with probabilities for Quantum Cryptography. Computers and Security. 87. https://doi.org/10.1016/j.cose.2019.101572
Fully-automated identification of imaging biomarkers for post-operative cerebellar mutism syndrome using longitudinal paediatric MRI
Spiteri, M., Guillemaut, J., Windridge, D., Avula, S., Kumar, R. and Lewis, E. 2020. Fully-automated identification of imaging biomarkers for post-operative cerebellar mutism syndrome using longitudinal paediatric MRI. Neuroinformatics. 18 (1), pp. 151-162. https://doi.org/10.1007/s12021-019-09427-w
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. ICC’17. Cambridge University, Cambridge 22 Mar 2019 ICC’17, Cambridge, United Kingdom © 2017 ACM.. pp. 1-6 https://doi.org/10.1145/3018896.3056795
Attack trees in Isabelle
Kammueller, F. 2018. Attack trees in Isabelle. 20th International Conference on Information and Communications Security, ICICS 2018. Lille, France 29 - 31 Oct 2018 Springer. pp. 611-628 https://doi.org/10.1007/978-3-030-01950-1_36
Improving the adaptation process for a new smart home user
Ali, S., Augusto, J. and Windridge, D. 2019. Improving the adaptation process for a new smart home user. Bramer, M. and Petridis, M. (ed.) 39th SGAI International Conference on Artificial Intelligence. Cambridge, UK 17 - 19 Dec 2019 Springer. https://doi.org/10.1007/978-3-030-34885-4_32
A survey of user-centred approaches for smart home transfer learning and new user home automation adaptation
Ali, M., Augusto, J. and Windridge, D. 2019. A survey of user-centred approaches for smart home transfer learning and new user home automation adaptation. Applied Artificial Intelligence. 33 (8), pp. 747-774. https://doi.org/10.1080/08839514.2019.1603784
A comprehensive classification of deep learning libraries
Pandey, H. and Windridge, D. 2019. A comprehensive classification of deep learning libraries. International Congress on Information and Communication Technology. London, UK 27 - 28 Feb 2018 Springer Nature. pp. 427-435 https://doi.org/10.1007/978-981-13-1165-9_40
Formal modeling and analysis of data protection for GDPR compliance of IoT healthcare systems
Kammueller, F. 2018. Formal modeling and analysis of data protection for GDPR compliance of IoT healthcare systems. IEEE SMC 2018: IEEE International Conference on Systems, Man and Cybernetics. Miyazaki, Japan 08 - 10 Oct 2018 Institute of Electrical and Electronics Engineers (IEEE).
Representational fluidity in embodied (artificial) cognition
Windridge, D. and Thill, S. 2018. Representational fluidity in embodied (artificial) cognition. Biosystems. 172, pp. 9-17. https://doi.org/10.1016/j.biosystems.2018.07.007
Criminal pattern identification based on modified K-means clustering
Aljrees, T., Shi, D., Windridge, D. and Wong, B. 2016. Criminal pattern identification based on modified K-means clustering. 2016 International Conference on Machine Learning and Cybernetics (ICMLC). 2, pp. 799-806. https://doi.org/10.1109/ICMLC.2016.7872990
On the intrinsic limits to representationally-adaptive machine-learning
Windridge, D. 2015. On the intrinsic limits to representationally-adaptive machine-learning. ArXiv e-prints.
Proteomic identification and characterization of hepatic glyoxalase 1 dysregulation in non-alcoholic fatty liver disease
Spanos, C., Maldonado, E., Fisher, C., Leenutaphong, P., Oviedo-Orta, E., Windridge, D. and Salguero, F. 2018. Proteomic identification and characterization of hepatic glyoxalase 1 dysregulation in non-alcoholic fatty liver disease. Proteome Science. 16 (1). https://doi.org/10.1186/s12953-018-0131-y
Hamming distance kernelisation via topological quantum computation
Di Pierro, A., Mengoni, R., Nagarajan, R. and Windridge, D. 2017. Hamming distance kernelisation via topological quantum computation. 6th International Conference on the Theory and Practice of Natural Computing (TPNC 2017. Prague, Czech Republic 18 - 20 Dec 2017 Springer. https://doi.org/10.1007/978-3-319-71069-3_21
Formalization and analysis of a resource allocation security protocol for secure service migration
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2018. Formalization and analysis of a resource allocation security protocol for secure service migration. IEEE/ACM International Conference on Utility and Cloud Computing (UCC2018). Zurich, Switzerland 17 - 20 Dec 2018 IEEE. pp. 207-212 https://doi.org/10.1109/UCC-Companion.2018.00058
Data governance in the health industry: investigating data quality dimensions within a big data context
Juddoo, S., George, C., Duquenoy, P. and Windridge, D. 2018. Data governance in the health industry: investigating data quality dimensions within a big data context. Applied System Innovation. 1 (4), pp. 1-16. https://doi.org/10.3390/asi1040043
Quantum error-correcting output codes
Windridge, D., Mengoni, R. and Nagarajan, R. 2018. Quantum error-correcting output codes. International Journal of Quantum Information. 16 (8). https://doi.org/10.1142/S0219749918400038
An improved block matching algorithm for motion estimation in video sequences and application in robotics
Bhattacharjee, K., Kumar, S., Pandey, H., Pant, M., Windridge, D. and Chaudhary, A. 2018. An improved block matching algorithm for motion estimation in video sequences and application in robotics. Computers & Electrical Engineering. 68, pp. 92-106. https://doi.org/10.1016/j.compeleceng.2018.03.045
A proof calculus for attack trees in Isabelle
Kammueller, F. 2017. A proof calculus for attack trees in Isabelle. 12th International Workshop on Data Privacy Management (DPM 2017). Oslo, Norway 14 - 15 Sep 2017 Springer. pp. 3-18 https://doi.org/10.1007/978-3-319-67816-0_1
Addressing VAST 2016 mini challenge 2 with POLAR kermode, classifier, excel on a power wall and data timelines
Attfield, S., Hewitt, D., Xu, K., Passmore, P., Wagstaff, A., Phillips, G., Windridge, D., Dash, G., Chapman, R. and Mason, L. 2016. Addressing VAST 2016 mini challenge 2 with POLAR kermode, classifier, excel on a power wall and data timelines. IEEE VAST Challenge 2016. Baltimore, MD, USA 23 Oct 2016
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. 2nd International Conference on Internet of Things, Data and Cloud Computing (ICC 2017). Churchill College, University of Cambridge, United Kingdom 22 - 23 Mar 2017 Association for Computing Machinery (ACM). https://doi.org/10.1145/3018896.3056795
Model based analysis of insider threats
Chen, T., Han, T., Kammueller, F., Nemli, I. and Probst, C. 2016. Model based analysis of insider threats. 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). London, United Kingdom 13 - 14 Jun 2016 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/CyberSecPODS.2016.7502350
Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle
Kammueller, F., Augusto, J. and Jones, S. 2017. Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle. IEEE/ACIS 15th International Conference on Software Engineering Research, Management and Application, SERA2017. University of Greenwich, London, United Kingdom 07 - 09 Jun 2017 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/SERA.2017.7965758
Formal modeling and analysis with humans in infrastructures for IoT health care systems
Kammueller, F. 2017. Formal modeling and analysis with humans in infrastructures for IoT health care systems. 5th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2017. Vancouver, BC, Canada 09 - 14 Jul 2017 Springer. pp. 339-352 https://doi.org/10.1007/978-3-319-58460-7_24
Human centric security and privacy for the IoT using formal techniques
Kammueller, F. 2018. Human centric security and privacy for the IoT using formal techniques. 3rd International Conference on Human Factors in Cybersecurity. Los Angeles, CA, United States 17 - 21 Jul 2017 Springer. pp. 106-116 https://doi.org/10.1007/978-3-319-60585-2_12
Insider threats for auctions: formalization, mechanized proof, and code generation
Kammueller, F., Kerber, M. and Probst, C. 2017. Insider threats for auctions: formalization, mechanized proof, and code generation. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 8 (1), pp. 44-78. https://doi.org/10.22667/JOWUA.2017.03.31.044
Quantum Bootstrap Aggregation
Windridge, D. and Nagarajan, R. 2017. Quantum Bootstrap Aggregation. de Barros, J., Coecke, B. and Pothos, E. (ed.) Quantum Interaction. San Francisco, CA, USA 20 - 22 Jul 2016 Springer. pp. 115-121 https://doi.org/10.1007/978-3-319-52289-0_9
Emergent intentionality in perception-action subsumption hierarchies
Windridge, D. 2017. Emergent intentionality in perception-action subsumption hierarchies. Frontiers in Robotics and AI. 4. https://doi.org/10.3389/frobt.2017.00038
Movement correction in DCE-MRI through windowed and reconstruction dynamic mode decomposition
Tirunagari, S., Poh, N., Wells, K., Bober, M., Gorden, I. and Windridge, D. 2017. Movement correction in DCE-MRI through windowed and reconstruction dynamic mode decomposition. Machine Vision and Applications. 28 (3-4), pp. 393-407. https://doi.org/10.1007/s00138-017-0835-5
A generalised framework for saliency-based point feature detection
Brown, M., Windridge, D. and Guillemaut, J. 2017. A generalised framework for saliency-based point feature detection. Computer Vision and Image Understanding. 157, pp. 117-137. https://doi.org/10.1016/j.cviu.2016.09.008
Post-operative pediatric cerebellar mutism syndrome and its association with hypertrophic olivary degeneration
Avula, S., Spiteri, M., Kumar, R., Lewis, E., Harave, S., Windridge, D., Ong, C. and Pizer, B. 2016. Post-operative pediatric cerebellar mutism syndrome and its association with hypertrophic olivary degeneration. Quantitative Imaging in Medicine and Surgery. 6 (5), pp. 535-544. https://doi.org/10.21037/qims.2016.10.11
Towards formal analysis of insider threats for auctions
Kammueller, F., Kerber, M. and Probst, C. 2016. Towards formal analysis of insider threats for auctions. ACM-CCS Workshop on Management of Security of Insider Threats. Vienna, Austria 28 Oct 2016 Association for Computing Machinery (ACM). pp. 23-34 https://doi.org/10.1145/2995959.2995963
Isabelle Modelchecking for insider threats
Kammueller, F. 2016. Isabelle Modelchecking for insider threats. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 196-210 https://doi.org/10.1007/978-3-319-47072-6_13
Refactoring preserves security
Kammueller, F. 2016. Refactoring preserves security. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 238-245 https://doi.org/10.1007/978-3-319-47072-6_17
Verification of statecharts using data abstraction
Helke, S. and Kammueller, F. 2016. Verification of statecharts using data abstraction. International Journal of Advanced Computer Science and Applications. 7 (1), pp. 571-583. https://doi.org/10.14569/IJACSA.2016.070179
Formal modelling and analysis of socio-technical systems
Probst, C., Kammueller, F. and Hansen, R. 2016. Formal modelling and analysis of socio-technical systems. in: Semantics, Logics, and Calculi Springer International.
Attack tree analysis for insider threats on the IoT using Isabelle
Kammueller, F., Nurse, J. and Probst, C. 2016. Attack tree analysis for insider threats on the IoT using Isabelle. 4th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2016. Toronto, ON, Canada 17 - 24 Jul 2016 Springer International. pp. 234-246 https://doi.org/10.1007/978-3-319-39381-0_21
Investigating airplane safety and security against insider threats using logical modeling
Kammueller, F. and Kerber, M. 2016. Investigating airplane safety and security against insider threats using logical modeling. 2016 IEEE Security and Privacy Workshops SPW'16: Workshop on Research in Insider Threats WRIT'16. San Jose, CA, USA 22 - 26 May 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 304-313 https://doi.org/10.1109/SPW.2016.47
Supervised selective kernel fusion for membrane protein prediction
Tatarchuk, A., Sulimova, V., Torshin, I., Mottl, V. and Windridge, D. 2014. Supervised selective kernel fusion for membrane protein prediction. 9th IAPR International Conference Pattern Recognition in Bioinformatics (PRIB 2014). Stockholm, Sweden 21 - 23 Aug 2014 Springer. https://doi.org/10.1007/978-3-319-09192-1_9
A kernel-based framework for medical big-data analytics
Windridge, D. and Bober, M. 2014. A kernel-based framework for medical big-data analytics. in: Interactive Knowledge Discovery and Data Mining in Biomedical Informatics: State-of-the-Art and Future Challenges Springer.
Classification of fibroglandular tissue distribution in the breast based on radiotherapy planning CT
Juneja, P., Evans, P., Windridge, D. and Harris, E. 2016. Classification of fibroglandular tissue distribution in the breast based on radiotherapy planning CT. BMC Medical Imaging. 16 (1). https://doi.org/10.1186/s12880-016-0107-2
Criminal pattern identification based on modified K-means clustering
Aljrees, T., Shi, D., Windridge, D. and Wong, B. 2016. Criminal pattern identification based on modified K-means clustering. 2016 International Conference on Machine Learning and Cybernetics. Jeju, South Korea 10 - 13 Jul 2016 IEEE. pp. 799-806 https://doi.org/10.1109/ICMLC.2016.7872990
Can DMD obtain a scene background in color?
Tirunagari, S., Poh, N., Bober, M. and Windridge, D. 2016. Can DMD obtain a scene background in color? 2016 International Conference on Image, Vision and Computing (ICIVC). Portsmouth, UK 03 - 05 Aug 2016 pp. 46-50 https://doi.org/10.1109/ICIVC.2016.7571272
Kernel combination via debiased object correspondence analysis
Windridge, D. and Yan, F. 2016. Kernel combination via debiased object correspondence analysis. Information Fusion. 27, pp. 228-239. https://doi.org/10.1016/j.inffus.2015.02.002
Identifying quantitative imaging features of posterior fossa syndrome in longitudinal MRI
Spiteri, M., Windridge, D., Avula, S., Kumar, R. and Lewis, E. 2015. Identifying quantitative imaging features of posterior fossa syndrome in longitudinal MRI. Journal of Medical Imaging. 2 (4), p. 044502. https://doi.org/10.1117/1.JMI.2.4.044502
Secure refactoring with Java information flow
Helke, S., Kammueller, F. and Probst, C. 2016. Secure refactoring with Java information flow. 10th International Workshop on Data Privacy Management (DPM 2015). Vienna, Austria 21 - 22 Sep 2015 Springer. pp. 264-272 https://doi.org/10.1007/978-3-319-29883-2_19
Transforming graphical system models to graphical attack models
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2016. Transforming graphical system models to graphical attack models. 2nd International Workshop on Graphical Models for Security, GraMSec 2015, co-located with CSF2015. Verona, Italy 13 Jul 2015 Springer. pp. 82-96 https://doi.org/10.1007/978-3-319-29968-6_6
Attack tree generation by policy invalidation
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2015. Attack tree generation by policy invalidation. 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015). Heraklion, Crete, Greece 24 - 25 Aug 2015 Springer. pp. 249-259 https://doi.org/10.1007/978-3-319-24018-3_16
Formalization of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2015. Formalization of quantum protocols using Coq. The 12th International Workshop on Quantum Physics and Logic (QPL 2015). Oxford, United Kingdom 15 - 17 Jul 2015 pp. 71-83
Detection of face spoofing using visual dynamics
Tirunagari, S., Poh, N., Windridge, D., Iorliam, A., Suki, N. and Ho, A. 2015. Detection of face spoofing using visual dynamics. IEEE Transactions on Information Forensics and Security. 10 (4), pp. 762-777. https://doi.org/10.1109/TIFS.2015.2406533
Artificial co-drivers as a universal enabling technology for future intelligent vehicles and transportation systems
Da Lio, M., Biral, F., Bosetti, P. and Windridge, D. 2015. Artificial co-drivers as a universal enabling technology for future intelligent vehicles and transportation systems. IEEE Transactions on intelligent transportation systems. 16 (1), pp. 244-263.
Invalidating policies using structural information
Kammueller, F. and Probst, C. 2013. Invalidating policies using structural information. IEEE CS Security and Privacy Workshops, SPW, WRIT'13.
Network information flow control: proof of concept
Alghothami, A. and Kammueller, F. 2013. Network information flow control: proof of concept. IEEE Int. Conf. on Systems, Man, and Cybernetics, SMC. Manchester, UK 13 - 16 Oct 2013 IEEE. pp. 2957-2962 https://doi.org/10.1109/SMC.2013.504
Privacy analysis of a hidden friendship protocol
Kammueller, F. and Preibusch, S. 2013. Privacy analysis of a hidden friendship protocol. The 8th International Workshop on Data Privacy Management, DPM 2013. Egam, UK 12 - 13 Sep 2013 Springer. pp. 83-99
Externalizing behaviour for analysing system models
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2013. Externalizing behaviour for analysing system models. 5th International Workshop on Managing Insider Security Threats, MIST, 2013..
Verification of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2014. Verification of quantum protocols using Coq. 17th Conference on Quantum Information Processing (QIP). Barcelona, Spain 03 - 07 Feb 2014
Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013.
Kammueller, F. 2014. Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013. MathSciNet: Mathematical Reviews.
Combining generated data models with formal invalidation for insider threat analysis
Kammueller, F. and Probst, C. 2014. Combining generated data models with formal invalidation for insider threat analysis. 2014 IEEE Security and Privacy Workshops (SPW): Workshop on Research for Insider Threat (WRIT 2014). San Jose, California, USA 17 - 18 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 229-235 https://doi.org/10.1109/SPW.2014.45
Verification of DNSsec delegation signatures
Kammueller, F. 2014. Verification of DNSsec delegation signatures. 21st International IEEE Conference on Telecommunication. Lisbon 04 - 07 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 298-392 https://doi.org/10.1109/ICT.2014.6845127
Invalidating policies using structural information
Kammueller, F. and Probst, C. 2014. Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 5 (2), pp. 59-79. https://doi.org/10.22667/JOWUA.2014.06.31.059
Modeling human behaviour with higher order logic: insider threats
Boender, J., Kammueller, F., Ivanova, M. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust. Vienna Technical University, Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 31-39
A probabilistic analysis framework for malicious insider threats
Chen, T., Kammueller, F., Nemli, I. and Probst, C. 2015. A probabilistic analysis framework for malicious insider threats. 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015, held as part of HCI International 2015. Los Angeles, California, USA 02 - 07 Aug 2015 Springer. pp. 178-189
Modeling and verification of insider threats using logical analysis
Kammueller, F. and Probst, C. 2017. Modeling and verification of insider threats using logical analysis. IEEE Systems Journal. 11 (2), pp. 534-545. https://doi.org/10.1109/JSYST.2015.2453215
Confinement for active objects
Kammueller, F. 2015. Confinement for active objects. International Journal of Advanced Computer Science and Applications. 6 (2), pp. 246-261. https://doi.org/10.14569/IJACSA.2015.060236
Modeling human behaviour with higher order logic: insider threats
Boender, J., Ivanova, M., Kammueller, F. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST 2014). Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers. pp. 31-39 https://doi.org/10.1109/STAST.2014.13
Identifying similar patients using self-organising maps: a case study on type-1 diabetes self-care survey responses
Tirunagari, S., Poh, N., Hu, G. and Windridge, D. 2015. Identifying similar patients using self-organising maps: a case study on type-1 diabetes self-care survey responses. https://doi.org/10.48550/arXiv.1503.06316
Longitudinal MRI assessment: the identification of relevant features in the development of posterior fossa syndrome in children
Spiteri, M., Lewis, E., Windridge, D. and Avula, S. 2015. Longitudinal MRI assessment: the identification of relevant features in the development of posterior fossa syndrome in children. Medical imaging 2015: Computer-Aided Diagnosis. Orlando, Florida, United States 21 Feb 2015 Society of Photo-optical Instrumentation Engineers. https://doi.org/10.1117/12.2081591
Windowed DMD as a microtexture descriptor for finger vein counter-spoofing in biometrics
Tirunagari, S., Poh, N., Bober, M. and Windridge, D. 2015. Windowed DMD as a microtexture descriptor for finger vein counter-spoofing in biometrics. 2015 IEEE International Workshop on Information Forensics and Security (WIFS). Rome, Italy 16 - 19 Nov 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 1-6 https://doi.org/10.1109/WIFS.2015.7368599
Globally optimal 2D-3D registration from points or lines without correspondences
Brown, M., Windridge, D. and Guillemaut, J. 2015. Globally optimal 2D-3D registration from points or lines without correspondences. 2015 IEEE International Conference on Computer Vision (ICCV). Santiago, Chile 07 - 13 Dec 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 2111-2119 https://doi.org/10.1109/ICCV.2015.244
A generalisable framework for saliency-based line segment detection
Brown, M., Windridge, D. and Guillemaut, J. 2015. A generalisable framework for saliency-based line segment detection. Pattern Recognition. 48 (12), pp. 3993-4011. https://doi.org/10.1016/j.patcog.2015.06.015
A novel Markov logic rule induction strategy for characterizing sports video footage
Windridge, D., Kittler, J., De Campos, T., Yan, F., Christmas, W. and Khan, A. 2015. A novel Markov logic rule induction strategy for characterizing sports video footage. IEEE MultiMedia. 22 (2), pp. 24-35. https://doi.org/10.1109/MMUL.2014.36
Artificial co-drivers as a universal enabling technology for future intelligent vehicles and transportation systems
Da Lio, M., Biral, F., Bertolazzi, E., Galvani, M., Bosetti, P., Windridge, D., Saroldi, A. and Tango, F. 2015. Artificial co-drivers as a universal enabling technology for future intelligent vehicles and transportation systems. IEEE Transactions on intelligent transportation systems. 16 (1), pp. 244-263. https://doi.org/10.1109/TITS.2014.2330199
Breast cancer data analytics with missing values: a study on ethnic, age and income groups
Tirunagari, S., Poh, N., Abdulrahman, H., Nemmour, N. and Windridge, D. 2015. Breast cancer data analytics with missing values: a study on ethnic, age and income groups. ArXiv e-prints: Quantitative Biology > Quantitative Methods. https://doi.org/10.48550/arXiv.1503.03680
Multilevel Chinese takeaway process and label-based processes for rule induction in the context of automated sports video annotation
Khan, A., Windridge, D. and Kittler, J. 2014. Multilevel Chinese takeaway process and label-based processes for rule induction in the context of automated sports video annotation. IEEE Transactions on Cybernetics. 44 (10), pp. 1910-1923. https://doi.org/10.1109/TCYB.2014.2299955
Domain anomaly detection in machine perception: a system architecture and taxonomy
Kittler, J., Christmas, W., De Campos, T., Windridge, D., Yan, F., Illingworth, J. and Osman, M. 2014. Domain anomaly detection in machine perception: a system architecture and taxonomy. IEEE Transactions on Pattern Analysis and Machine Intelligence. 36 (5), pp. 845-859. https://doi.org/10.1109/TPAMI.2013.209
A saliency-based framework for 2D-3D registration
Brown, M., Guillemaut, J. and Windridge, D. 2014. A saliency-based framework for 2D-3D registration. 9th International Conference on Computer Vision Theory and Applications (VISAPP 2014). Lisbon, Portugal 05 - 08 Jan 2014 SciTePress. pp. 265-273 https://doi.org/10.5220/0004675402650273
Challenges in designing an online healthcare platform for personalised patient analytics
Poh, N., Tirunagari, S. and Windridge, D. 2014. Challenges in designing an online healthcare platform for personalised patient analytics. 2014 IEEE Symposium on Computational Intelligence in Big Data (CIBD). Orlando, FL., USA 09 - 12 Dec 2014 IEEE. pp. 1-6 https://doi.org/10.1109/CIBD.2014.7011526
Patient level analytics using self-organising maps: a case study on type-1 diabetes self-care survey responses
Tirunagari, S., Poh, N., Aliabadi, K., Windridge, D. and Cooke, D. 2014. Patient level analytics using self-organising maps: a case study on type-1 diabetes self-care survey responses. 2014 IEEE Symposium on Computational Intelligence and Data Mining (CIDM). Orlando, FL., USA 09 - 12 Dec 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 304-309 https://doi.org/10.1109/CIDM.2014.7008682
Non-enumerative cross validation for the determination of structural parameters in feature-selective SVMs
Chernousova, E., Levdik, P., Tatarchuk, A., Mottl, V. and Windridge, D. 2014. Non-enumerative cross validation for the determination of structural parameters in feature-selective SVMs. 22nd International Conference on Pattern Recognition ICPR 2014. Stockholm, Sweden 24 - 28 Aug 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 3654-3659 https://doi.org/10.1109/ICPR.2014.628
Linear regression via elastic net: non-enumerative leave-one-out verification of feature selection
Chernousova, E., Razin, N., Krasotkina, O., Mottl, V. and Windridge, D. 2014. Linear regression via elastic net: non-enumerative leave-one-out verification of feature selection. in: Aleskerov, F., Goldengorin, B. and Pardalos, P. (ed.) Clusters, Orders, and Trees: Methods and Applications: In Honor of Boris Mirkin's 70th Birthday New York Springer.
Automatic annotation of tennis games: an integration of audio, vision, and learning
Yan, F., Kittler, J., Windridge, D., Christmas, W., Mikolajczyk, K., Cox, S. and Huang, Q. 2014. Automatic annotation of tennis games: an integration of audio, vision, and learning. Image and Vision Computing. 32 (11), pp. 896-903. https://doi.org/10.1016/j.imavis.2014.08.004
High throughput screening for mammography using a human-computer interface with rapid serial visual presentation (RSVP)
Abbey, C., Hope, C., Sterr, A., Elangovan, P., Geades, N., Windridge, D., Young, K., Wells, K. and Mello-Thoms, C. 2013. High throughput screening for mammography using a human-computer interface with rapid serial visual presentation (RSVP). SPIE Proceedings Vol. 8673. https://doi.org/10.1117/12.2007557
DNSsec in Isabelle – replay attack and origin authentication
Kammueller, F., Kirsal-Ever, Y. and Cheng, X. 2013. DNSsec in Isabelle – replay attack and origin authentication. SMC 2013: IEEE International Conference on Systems, Man, and Cybernetics. Manchester, UK 13 - 16 Oct 2013 IEEE. pp. 4772-4777 https://doi.org/10.1109/SMC.2013.812
A semi-lattice model for multi-lateral security
Kammueller, F. 2013. A semi-lattice model for multi-lateral security. in: Data privacy management and autonomous spontaneous security Berlin, Germany Springer.
A security model for functional active objects
Kammueller, F. 2012. A security model for functional active objects. Francisco, C., Kim, V., Miguel, C. and Andreas, K. (ed.) First International Symposium Communicability, Computer Graphics and Innovative Design for Interactive Systems (CCGIDIS 2011). Berlin Springer. https://doi.org/10.1007/978-3-642-33760-4_4
Looking to score: the dissociation of goal influence on eye movement and meta-attentional allocation in a complex dynamic natural scene
Taya, S., Windridge, D. and Osman, M. 2012. Looking to score: the dissociation of goal influence on eye movement and meta-attentional allocation in a complex dynamic natural scene. PLoS ONE. 7 (6). https://doi.org/10.1371/journal.pone.0039060
A security model for functional active objects with an implementation in Erlang
Fleck, A. and Kammueller, F. 2011. A security model for functional active objects with an implementation in Erlang. in: Ficarra, F., Kratky, A., Veltman, K., Ficarra, M., Nicol, E. and Brie, M. (ed.) Computational informatics, social factors and new information technologies: hypermedia perspectives and avant-garde experiences in the era of communicability expansion Bergamo, Italy Blue Herons.
Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol.
Kammueller, F., Mapp, G., Patel, S. and Sani, A. 2012. Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol. International Conference on Internet Monitoring and Protection (ICIMP 2012). Stuttgart, Germany 27 May - 01 Jun 2012 Xpert Publishing Service.
Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011
Kammueller, F. 2012. Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011. Mathematical Reviews.
Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010.
Kammueller, F. 2012. Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010. Mathematical Reviews.
A locally nameless theory of objects
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. A locally nameless theory of objects. SAFA Annual Workshop on Formal Techniques (SAFA’2010). 2229 Route des Crêtes, 06560, Valbonne, Provence-Alpes-Côte d'Azur, France
Locally nameless sigma calculus
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. Locally nameless sigma calculus. Archive of Formal Proof.
Formalizing statecharts using hierarchical automata
Helke, S. and Kammueller, F. 2010. Formalizing statecharts using hierarchical automata. Archive of Formal Proof.
Radius-SHA256 – verified remote authentication with secure hashing.
Kammueller, F. and Patel, S. 2011. Radius-SHA256 – verified remote authentication with secure hashing. First Global Conference on Communication, Science and Information Engineering, CCSIE’11. Middlesex University 25 - 27 Jul 2011
ASPfun: a typed functional active object calculus
Henrio, L., Kammueller, F. and Lutz, B. 2012. ASPfun: a typed functional active object calculus. Science of Computer Programming. 77 (7-8), pp. 823-847. https://doi.org/10.1016/j.scico.2010.12.008
Application of verification techniques to security: model checking insider attacks
Kammueller, F., Probst, C. and Raimondi, F. 2012. Application of verification techniques to security: model checking insider attacks. 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability. Venice, Italy 28 - 29 Mar 2012 Blue Herons editions.
Modelchecking non-functional requirements for interface specifications.
Kammueller, F. and Preibusch, S. 2008. Modelchecking non-functional requirements for interface specifications. European Joint Conference on Theory and Practice of Software, 2008, (Foundations of Interface technologies). Budapest 29 Mar - 06 Apr 2008
Compositionality of aspect weaving.
Kammueller, F. and Sudhof, H. 2008. Compositionality of aspect weaving. in: Mahr, B. and Sheng, H. (ed.) Autonomous systems: self-organisation, management, and control. Springer Verlag. pp. 87-96
Interactive theorem proving in software engineering.
Kammueller, F. 2008. Interactive theorem proving in software engineering. Saarbrücken, Germany VDM Verlag Dr. Mueller.
Using functional active objects to enforce privacy
Kammueller, F. 2010. Using functional active objects to enforce privacy. 5th Conference on Network Architectures and Information Systems Security. Menton, France 18 - 21 May 2010
Enhancing privacy implementations of database enquiries
Kammueller, F. and Kammueller, R. 2009. Enhancing privacy implementations of database enquiries. IEEE. pp. 45-50 https://doi.org/10.1109/ICIMP.2009.15
Implementing privacy with Erlang active objects
Fleck, A. and Kammueller, F. 2010. Implementing privacy with Erlang active objects. International Conference on Internet Monitoring and Protection. Barcelona 09 - 15 May 2010 IEEE. pp. 141-146 https://doi.org/10.1109/ICIMP.2010.27
Privacy by flexible parameterization with Erlang active objects.
Fleck, A. and Kammueller, F. 2010. Privacy by flexible parameterization with Erlang active objects. International Journal on Advances in Software. 3 (3-4), pp. 461-473.
Functional active objects: typing and formalisation
Henrio, L. and Kammueller, F. 2009. Functional active objects: typing and formalisation. Elsevier. https://doi.org/10.1016/j.entcs.2009.10.026
Feature link propagation across variability representations with Isabelle/HOL
Kammueller, F., Rein, A. and Reiser, M. 2010. Feature link propagation across variability representations with Isabelle/HOL. Rubin, J., Botterweck, G., Mezini, M., Maman, I. and Lero, A. (ed.) New York ACM. pp. 48-53
Checking the TWIN elevator system by translating object-Z to SMV
Preibusch, S. and Kammueller, F. 2008. Checking the TWIN elevator system by translating object-Z to SMV. Lecture Notes in Computer Science. 4916, pp. 38-55. https://doi.org/10.1007/978-3-540-79707-4
Composing safely: a type system for aspects
Kammueller, F. and Sudhof, H. 2008. Composing safely: a type system for aspects. Lecture Notes in Computer Science. 4954, pp. 231-247. https://doi.org/10.1007/978-3-540-78789-1_18
Security analysis of private data enquiries in Erlang
Kammueller, F. and Kammueller, R. 2009. Security analysis of private data enquiries in Erlang. International Journal on Advances in Security. 2 (2&3), pp. 242-255.
An asynchronous distributed component model and its semantics
Henrio, L., Kammueller, F. and Rivera, M. 2009. An asynchronous distributed component model and its semantics. Lecture Notes in Computer Science. 5751, pp. 159-179. https://doi.org/10.1007/978-3-642-04167-9_9
A framework for reasoning on component composition
Henrio, L., Kammueller, F. and Khan, M. 2010. A framework for reasoning on component composition. Lecture Notes in Computer Science. 6286, pp. 1-20. https://doi.org/10.1007/978-3-642-17071-3_1
Formalizing non-interference for a simple bytecode language in Coq
Kammueller, F. 2008. Formalizing non-interference for a simple bytecode language in Coq. Formal Aspects of Computing. 20 (3), pp. 259-275.
Mechanical analysis of finite idempotent relations
Kammueller, F. 2011. Mechanical analysis of finite idempotent relations. Fundamenta Informaticae. 107 (1), pp. 43-65. https://doi.org/10.3233/FI-2011-392
Privacy enforcement and analysis for functional active objects
Kammueller, F. 2011. Privacy enforcement and analysis for functional active objects. Lecture Notes in Computer Science. 6514, pp. 93-107. https://doi.org/10.1007/978-3-642-19348-4_8
Addressing missing values in kernel-based multimodal biometric fusion using neutral point substitution
Poh, N., Windridge, D., Mottl, V., Tatarchuk, A. and Eliseyev, A. 2010. Addressing missing values in kernel-based multimodal biometric fusion using neutral point substitution. IEEE Transactions on Information Forensics and Security. 5 (3), pp. 461-469. https://doi.org/10.1109/TIFS.2010.2053535