S&T School Leadership


TitleS&T School Leadership
AlternativeS&T - Leadshp
FacultyFaculty of Science and Technology

Latest research outputs

Sort by Date Title
A method to assess bioavailability of antibiotics in anthropogenic polluted ecosystems by using a bacterial fitness test
Marvasi, M., Canali, A., Perito, B., Shah, A. and Serafim, V. 2019. A method to assess bioavailability of antibiotics in anthropogenic polluted ecosystems by using a bacterial fitness test. Journal of Microbiological Methods. 167, pp. 1-5. https://doi.org/10.1016/j.mimet.2019.105724

Article

A mobile social software application to support work based learning in social work
Barn, B., Oussena, S. and Barn, R. 2009. A mobile social software application to support work based learning in social work. Kinshuk, Sampson, D., Spector, J., Isaías, P. and Ifenthaler, D. (ed.) 2009 IADIS International Conference on Cognition and Exploratory Learning in Digital Age. Rome, Italy 20 - 22 Nov 2009 pp. 227-234

Conference paper

A modal type theory for formalizing trusted communications
Primiero, G. and Taddeo, M. 2012. A modal type theory for formalizing trusted communications. Journal of Applied Logic. 10 (1), pp. 92-114. https://doi.org/10.1016/j.jal.2011.12.002

Article

A model-based approach to aligning business goals with enterprise architecture
Clark, T. and Barn, B. 2013. A model-based approach to aligning business goals with enterprise architecture. in: Progressions and Innovations in Model-Driven Software Engineering IGI Global. pp. 252-274

Book chapter

A model-based approach to systematic reviews of research literature
Barat, S., Clark, T., Barn, B. and Kulkarni, V. 2017. A model-based approach to systematic reviews of research literature. ISEC 2017: Innovations in Software Engineering Conference. Jaipur, India 05 - 07 Feb 2017 Association for Computing Machinery (ACM). pp. 15-25 https://doi.org/10.1145/3021460.3021462

Conference paper

A model based approach to systems requirements for event driven enterprise architecture
Barn, B., Clark, T. and Oussena, S. 2012. A model based approach to systems requirements for event driven enterprise architecture. 5th India Software Engineering Conference. Kanpur, India 22 - 25 Feb 2012

Conference paper

A model based realisation of actor model to conceptualise an aid for complex dynamic decision-making
Barat, S., Kulkarni, V., Clark, T. and Barn, B. 2017. A model based realisation of actor model to conceptualise an aid for complex dynamic decision-making. MODELSWARD 2017: 5th International Conference on Model-Driven Engineering and Software Development. Porto, Portugal 19 - 21 Feb 2017 SCITEPRESS - Science and Technology Publications. pp. 605-616 https://doi.org/10.5220/0006216306050616

Conference paper

A model-driven engineering framework for architecting and analysing Wireless Sensor Networks
Doddapaneni, K., Ever, E., Gemikonakli, O., Malavolta, I., Mostarda, L. and Muccini, H. 2012. A model-driven engineering framework for architecting and analysing Wireless Sensor Networks. Third International Workshop on Software Engineering for Sensor Network Applications (SESENA'12). Zurich, Switzerland 02 Jun 2012 IEEE. pp. 1-7 https://doi.org/10.1109/SESENA.2012.6225729

Conference paper

A model for trustworthy orchestration in the internet of things
Bottone, M., Primiero, G., Raimondi, F. and De Florio, V. 2016. A model for trustworthy orchestration in the internet of things. 12th International Conference on Intelligent Environments (IE). London, United Kingdom 14 - 16 Sep 2016 IEEE. pp. 171-174 https://doi.org/10.1109/IE.2016.37

Conference paper

A modelling technique for enterprise agility
Nwokeji, J., Aqlan, F., Barn, B., Clark, T. and Kulkarni, V. 2018. A modelling technique for enterprise agility. HICSS-51 The 51st Hawaii International Conference on System Sciences. Hawaii, USA 03 - 06 Jan 2018 University of Hawaii. pp. 4631-4640

Conference paper

A multiple criteria, measurement-based admission control mechanism for self-aware networks
Sakellari, G. 2008. A multiple criteria, measurement-based admission control mechanism for self-aware networks. 3rd Int. Conf. on Communications and Networking in China.

Conference paper

An acceptability predictor for websites
Adams, R., White, A.S. and Ceylan, E. 2009. An acceptability predictor for websites. in: Universal access in human-computer interaction. Applications and services. Springer Berlin.

Book chapter

An active tangible user interface framework for teaching and learning artificial intelligence
De Raffaele, C., Smith, S. and Gemikonakli, O. 2018. An active tangible user interface framework for teaching and learning artificial intelligence. ACM IUI 2018: 23rd ACM Conference on Intelligent User Interfaces. Tokyo, Japan 07 - 11 Mar 2018 Association for Computing Machinery (ACM). pp. 535-546 https://doi.org/10.1145/3172944.3172976

Conference paper

An actor based simulation driven digital twin for analyzing complex business systems
Barat, S., Kulkarni, V., Clark, T. and Barn, B. 2020. An actor based simulation driven digital twin for analyzing complex business systems. Winter Simulation Conference 2019 - Simulation for Risk Management. Gaylord National Resort & Conference Center, National Harbor, Maryland 08 - 11 Dec 2019 IEEE. pp. 157-168 https://doi.org/10.1109/WSC40007.2019.9004694

Conference paper

An agenda for ethics and justice in adaptation to climate change
Byskov, M., Hyams, K., Satyal, P., Anguelovski, I., Benjamin, L., Blackburn, S., Borie, M., Caney, S., Chu, E., Edwards, G., Fourie, K., Fraser, A., Heyward, C., Jeans, H., McQuistan, C., Paavola, J., Page, E., Pelling, M., Priest, S., Swiderska, K., Tarazona, M., Thornton, T., Twigg, J. and Venn, A. 2021. An agenda for ethics and justice in adaptation to climate change. Climate and Development. 13 (1), pp. 1-9. https://doi.org/10.1080/17565529.2019.1700774

Article

Analysing and evaluating flood risk governance in England – enhancing societal resilience through comprehensive and aligned flood risk governance arrangements
Alexander, M., Priest, S., Micou, P., Tapsell, S., Green, C., Parker, D. and Homewood, S. 2016. Analysing and evaluating flood risk governance in England – enhancing societal resilience through comprehensive and aligned flood risk governance arrangements. Middlesex University.

Project report

Analysis and verification of ECA rules in intelligent environments
Cacciagrano, D., Corradini, F., Culmone, R., Gorogiannis, N., Mostarda, L., Raimondi, F. and Vannucchi, C. 2018. Analysis and verification of ECA rules in intelligent environments. Journal of Ambient Intelligence and Smart Environments. 10 (3), pp. 261-273. https://doi.org/10.3233/AIS-180487

Article

Analysis of a phase-shift technique for inter-modulation cancellation proposed for 2-Carrier QPSK Systems.
Gemikonakli, O. 2006. Analysis of a phase-shift technique for inter-modulation cancellation proposed for 2-Carrier QPSK Systems. in: ICCTA '06: International conference on information and communication technologies; from theory to applications, 24-28 April 2006, Damascus, Syria. Institute of Electrical and Electronics Engineers.

Book chapter

Analysis of argyrin B binding at constitutive and immunoproteasome active sites using molecular modelling and kinetic assays
Allardyce, D., Bell, C. and Loizidou, E. 2017. Analysis of argyrin B binding at constitutive and immunoproteasome active sites using molecular modelling and kinetic assays. Computational Advances in Drug Discovery (Structure Based Drug Design). Lausanne, Switzerland 05 - 08 Sep 2017

Conference poster

Analysis of bacterial communities on an antique stained glass window
Marvasi, M., Mastromei, G., Vedovato, E., Balsamo, C. and Perito, B. 2009. Analysis of bacterial communities on an antique stained glass window. in: May, E., Jones, M. and Mitchell, J. (ed.) Heritage Microbiology and Science RCS Publishing.

Book chapter

Analysis of local search landscapes for k-SAT instances
Albrecht, A., Lane, P. and Steinhofel, K. 2010. Analysis of local search landscapes for k-SAT instances. Mathematics in Computer Science. 3 (4), pp. 465-488. https://doi.org/10.1007/s11786-010-0040-7

Article

Analysis of security protocols for authentication in distributed systems
Gemikonakli, O. and Eneh, A. 2006. Analysis of security protocols for authentication in distributed systems. in: Cardoso, J. (ed.) Special issue: applied reconfigurable computing: papers selected from the First International Workshop on Applied Reconfigurable Computing (ARC 2005), held in conjunction with the IADIS International Conference Applied Computing (AC2005) in Algarve. London Taylor and Francis. pp. 301-305

Book chapter

Analytical modelling and simulation of small scale, typical and highly available Beowulf clusters with breakdowns and repairs
Ever, E., Gemikonakli, O. and Chakka, R. 2009. Analytical modelling and simulation of small scale, typical and highly available Beowulf clusters with breakdowns and repairs. Simulation modelling practice and theory. 17 (2), pp. 327-347. https://doi.org/10.1016/j.simpat.2008.08.016

Article

Analytical modelling of large scale multi-server systems with deferred repairs: a reward rate approach.
Kocyigit, A., Ever, E., Gemikonakli, O. and Institute of Electrical and Electronics Engineers 2008. Analytical modelling of large scale multi-server systems with deferred repairs: a reward rate approach. in: Computer modeling and simulation , 2008 . EMS '08 . Second UKSIM European symposium. IEEE Computer Society. pp. 447-452

Book chapter

Analyzing APIs documentation and code to detect directive defects
Zhou, Y., Gu, R., Chen, T., Huang, Z., Panichella, S. and Gall, H. 2017. Analyzing APIs documentation and code to detect directive defects. 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE). Buenos Aires, Argentina 20 - 28 May 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 27-37 https://doi.org/10.1109/ICSE.2017.11

Conference paper

Analyzing eventual leader election protocols for dynamic systems by probabilistic model checking
Gu, J., Zhou, Y., Wu, W. and Chen, T. 2015. Analyzing eventual leader election protocols for dynamic systems by probabilistic model checking. First International Conference on Cloud Computing and Security (ICCCS 2015). Nanjing, China 13 - 15 Aug 2015 Springer. pp. 192-205 https://doi.org/10.1007/978-3-319-27051-7_17

Conference paper

An analysis of beer game trials
White, A.S., Brodie, L. and Censlive, M. 2020. An analysis of beer game trials. London, UK Middlesex University.

Report

An analytical approach for optimising the number of repairmen for large scale, homogeneous, multi-server systems
Ever, E., Gemikonakli, O., Sanei, H. and Kocyigit, A. 2008. An analytical approach for optimising the number of repairmen for large scale, homogeneous, multi-server systems. EMSS 2008: 20th European modeling and simulation symposium. Briatico, Italy

Conference paper

An analytical approach for performance analysis of handoffs in the next generation integrated cellular networks and WLANs
Kirsal, Y., Gemikonakli, E., Ever, E., Mapp, G., Gemikonakli, O. and Middlesex University 2010. An analytical approach for performance analysis of handoffs in the next generation integrated cellular networks and WLANs. IEEE. https://doi.org/10.1109/ICCCN.2010.5560093

Conference paper

An approach to early evaluation of informational privacy requirements
Barn, B., Primiero, G. and Barn, R. 2015. An approach to early evaluation of informational privacy requirements. 30th Annual ACM Symposium on Applied Computing. Salamanca, Spain 13 - 17 Apr 2015 Association for Computing Machinery (ACM). pp. 1370-1375 https://doi.org/10.1145/2695664.2695788

Conference paper

An approach to modelling open networks with unreliable servers and finite buffers.
Chakka, R., Ever, E. and Gemikonakli, O. 2006. An approach to modelling open networks with unreliable servers and finite buffers. WSEAS Transactions on Computers. 5 (11), pp. 2536-2543.

Article

An approximate theory for value sensitivity
Barn, B. and Barn, R. 2015. An approximate theory for value sensitivity. 015 IEEE/ACM 4th SEMAT Workshop on a General Theory of Software Engineering. Florence 18 May 2015 IEEE. pp. 25-28 https://doi.org/10.1109/GTSE.2015.10

Conference paper

An architectural framework for analyzing tradeoffs between software security and performance.
Cortellessa, V., Trubiani, C., Mostarda, L. and Dulay, N. 2010. An architectural framework for analyzing tradeoffs between software security and performance. ISARCS 2010: 1st International Symposium on Architecting Critical Systems Federated with CompArch 2010. Prague 23 - 25 Jun 2010 pp. 1-18

Conference paper

An assessment of the impact of motorway runoff on a pond, wetland and stream
Shutes, B. and Sriyaraj, K. 2001. An assessment of the impact of motorway runoff on a pond, wetland and stream. Environment International. 26 (5-6), pp. 433-439. https://doi.org/10.1016/S0160-4120(01)00024-1

Article

An authentication protocol to address the problem of the trusted 3rd Party authentication protocols
Gemikonakli, O. and Kirsal, Y. 2007. An authentication protocol to address the problem of the trusted 3rd Party authentication protocols. in: Elleithy, K. (ed.) Advances and innovations in systems, computing sciences and software engineering. Springer.

Book chapter

“And it was all my choice but it didn’t feel like a choice”: a re-examination of interpretation of data using a ‘rhetoric of choice’ lens
Frost, N. and Bailey-Rodriguez, D. 2015. “And it was all my choice but it didn’t feel like a choice”: a re-examination of interpretation of data using a ‘rhetoric of choice’ lens. Women's Studies International Forum. 53, pp. 192-199. https://doi.org/10.1016/j.wsif.2014.12.003

Article

An efficient cooperative spectrum sensing under bandwidth constraint with user selection
Vien, Q., Nguyen, H., Gemikonakli, O. and Barn, B. 2014. An efficient cooperative spectrum sensing under bandwidth constraint with user selection. 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall). Vancouver, BC, Canada 14 - 17 Sep 2014 IEEE. pp. 1-5 https://doi.org/10.1109/VTCFall.2014.6965868

Conference paper

An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks
Rezvy, S., Luo, Y., Petridis, M., Lasebae, A. and Zebin, T. 2019. An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. 2019 53rd Annual Conference on Information Sciences and Systems (CISS). Baltimore, MD, USA, USA 20 - 22 Mar 2019 IEEE. pp. 1-6 https://doi.org/10.1109/CISS.2019.8693059

Conference keynote

An efficient resource reservation for domain based mobile IP networks: analytical approach
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2013. An efficient resource reservation for domain based mobile IP networks: analytical approach. IEEE 77th Vehicular Technology Conference (VTC2013-Spring). Dresden, Germany 02 - 05 Jun 2013

Conference paper

An efficient traffic engineering based on multi-topology routing for future internet
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2014. An efficient traffic engineering based on multi-topology routing for future internet. Computer Networks. https://doi.org/10.1016/j.comnet.2014.05.008

Article