Computer Science
Title | Computer Science |
---|---|
Alternative | S&T - CS |
Faculty | Faculty of Science and Technology |
Latest research outputs
Sort by Date Title
A qualitative assessment of machine learning support for detecting data completeness and accuracy issues to improve data analytics in big data for the healthcare industry
Juddoo, S. and George, C. 2020. A qualitative assessment of machine learning support for detecting data completeness and accuracy issues to improve data analytics in big data for the healthcare industry. 3rd International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering. Balaclava, Mauritius 25 - 27 Nov 2020 IEEE. pp. 58-66 https://doi.org/10.1109/ELECOM49001.2020.9297009Conference paper
Context-aware system for cardiac condition monitoring and management: a survey
Ogbuabor, G., Augusto, J., Moseley, R. and Van Wyk, A. 2020. Context-aware system for cardiac condition monitoring and management: a survey. Behaviour and Information Technology. 41 (4), pp. 759-776. https://doi.org/10.1080/0144929X.2020.1836255Article
Transfer learning for endoscopy disease detection and segmentation with mask-RCNN benchmark architecture
Rezvy, S., Zebin, T., Pang, W., Taylor, S. and Gao, X. 2020. Transfer learning for endoscopy disease detection and segmentation with mask-RCNN benchmark architecture. 2nd International Workshop and Challenge on Computer Vision in Endoscopy. Iowa City, United States 03 Apr 2020 pp. 68-72Conference paper
ADAPT: Approach to Develop context-Aware solutions for Personalised asthma managemenT
Quinde, M., Augusto, J., Khan, N. and Van Wyk, A. 2020. ADAPT: Approach to Develop context-Aware solutions for Personalised asthma managemenT. Journal of Biomedical Informatics. 111, pp. 1-20. https://doi.org/10.1016/j.jbi.2020.103586Article
An objective comparison of detection and segmentation algorithms for artefacts in clinical endoscopy
Ali, S., Zhou, F., Braden, B., Bailey, A., Yang, S., Cheng, G., Zhang, P., Li, X., Kayser, M., Soberanis-Mukul, R., Albarqouni, S., Wang, X., Wang, C., Watanabe, S., Oksuz, I., Ning, Q., Yang, S., Khan, M., Gao, X., Realdon, S., Loshchenov, M., Schnabel, J., East, J., Wagnieres, G., Loschenov, V., Grisan, E., Daul, C., Blondel, W. and Rittscher, J. 2020. An objective comparison of detection and segmentation algorithms for artefacts in clinical endoscopy. Scientific Reports. 10 (1), pp. 1-15. https://doi.org/10.1038/s41598-020-59413-5Article
Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework
Kammueller, F. and Lutz, B. 2020. Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework. Garcia-Alfaro, J., Navarro-Arribas, G. and Herrera-Joancomarti, J. (ed.) International Workshop of Data Privacy Management, DPM'20. University of Surrey, UK 17 - 18 Sep 2020 Springer. pp. 128-144 https://doi.org/10.1007/978-3-030-66172-4_8Conference paper
Inter-blockchain protocols with the Isabelle Infrastructure framework
Kammueller, F. and Nestmann, U. 2020. Inter-blockchain protocols with the Isabelle Infrastructure framework. Bernardo, B. and Marmsoler, D. (ed.) 2nd Workshop on Formal Methods for Blockchain, co-located with CAV'20. Los Angeles, CA, USA Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH. pp. 11:1-11:12 https://doi.org/10.4230/OASIcs.FMBC.2020.11Conference paper
A formal development cycle for security engineering in Isabelle
Kammueller, F. 2020. A formal development cycle for security engineering in Isabelle. arxiv.org. https://doi.org/10.48550/arXiv.2001.08983Working paper
Applying the Isabelle Insider framework to airplane security
Kammueller, F. and Kerber, M. 2020. Applying the Isabelle Insider framework to airplane security. arxiv.org. https://doi.org/10.48550/arXiv.2003.11838Working paper
Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems
Kammueller, F. 2020. Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems.Other
Hot coffee: associative memory with bump attractor cell assemblies of spiking neurons
Huyck, C. and Vergani, A. 2020. Hot coffee: associative memory with bump attractor cell assemblies of spiking neurons. Journal of Computational Neuroscience. 48 (3), pp. 299-316. https://doi.org/10.1007/s10827-020-00758-1Article
5G smart and innovative healthcare services: opportunities, challenges and prospective solutions
Bekaroo, G., Santokhee, A. and Augusto, J. 2020. 5G smart and innovative healthcare services: opportunities, challenges and prospective solutions. in: Bojkovic, Z., Milovanovic, D. and Fowdur, T. (ed.) 5G Multimedia Communication Technology, Multiservices, and Deployment Boca Raton CRC Press. pp. 279-297Book chapter
The relationships between intelligence and consciousness in natural and artificial systems
Gamez, D. 2020. The relationships between intelligence and consciousness in natural and artificial systems. Journal of Artificial Intelligence and Consciousness. 7 (1), pp. 51-62. https://doi.org/10.1142/S2705078520300017Article
Correctly slicing extended finite state machines
Amtoft, T., Androutsopoulos, K. and Clark, D. 2020. Correctly slicing extended finite state machines. in: Di Pierro, A., Malacaria, P. and Nagarajan, R. (ed.) From lambda calculus to cybersecurity through program analysis: Essays dedicated to Chris Hankin on the occasion of his retirement Switzerland Springer. pp. 149-197Book chapter

Deep neural network augmentation: generating faces for affect analysis
Kollias, D., Cheng, S., Ververas, E., Kotsia, I. and Zafeiriou, S. 2020. Deep neural network augmentation: generating faces for affect analysis. International Journal of Computer Vision. 128 (5), pp. 1455-1484. https://doi.org/10.1007/s11263-020-01304-3Article
An enhanced deep learning architecture for classification of Tuberculosis types from CT lung images
Gao, X., Comley, R. and Khan, M. 2020. An enhanced deep learning architecture for classification of Tuberculosis types from CT lung images. ICIP 2020: 27th IEEE International Conference on Image Processing. Abu Dhabi, Unites Arab Emirates (Virtual Conference) 25 - 28 Oct 2020 IEEE. pp. 2486-2490 https://doi.org/10.1109/ICIP40778.2020.9190815Conference paper
Survey on the analysis of user interactions and visualization provenance
Xu, K., Ottley, A., Walchshofer, C., Streit, M., Chang, R. and Wenskovitch, J. 2020. Survey on the analysis of user interactions and visualization provenance. Computer Graphics Forum. 39 (3), pp. 757-783. https://doi.org/10.1111/cgf.14035Article
Fine-grained action recognition by motion saliency and mid-level patches
Liu, F., Zhao, L., Cheng, X., Dai, Q., Shi, X. and Qiao, J. 2020. Fine-grained action recognition by motion saliency and mid-level patches. Applied Sciences. 10 (8). https://doi.org/10.3390/app10082811Article
Deployment of drone-based small cells for public safety communication system
Ali, K., Nguyen, H., Vien, Q., Shah, P. and Raza, M. 2020. Deployment of drone-based small cells for public safety communication system. IEEE Systems Journal. 14 (2), pp. 2882-2891. https://doi.org/10.1109/JSYST.2019.2959668Article
Pan: conversational agent for criminal investigations
Hepenstal, S., Zhang, L., Kodagoda, N. and Wong, B. 2020. Pan: conversational agent for criminal investigations. IUI '20: 25th International Conference on Intelligent User Interfaces. Cagliari, Italy 17 - 20 Mar 2020 Association for Computing Machinery (ACM). pp. 134-135 https://doi.org/10.1145/3379336.3381463Conference paper
Case-based reasoning of a deep learning network for prediction of early stage of oesophageal cancer
Gao, X., Braden, B., Zhang, L., Taylor, S., Pang, W. and Petridis, M. 2020. Case-based reasoning of a deep learning network for prediction of early stage of oesophageal cancer. 24th UK Symposium on Case-Based Reasoning (UKCBR 2019). Cambridge, UK 17 Dec 2019 BCS SGAI: The Specialist Group on Artificial Intelligence. pp. 1-12Conference item
A game theoretic analysis of resource mining in blockchain
Singh, R., Dwivedi, A., Srivastava, G., Wisznieska-Mayszkiel, A. and Cheng, X. 2020. A game theoretic analysis of resource mining in blockchain. Cluster Computing. 23 (3), pp. 2035-2046. https://doi.org/10.1007/s10586-020-03046-wArticle
Design and validation of a meter band rate in OpenFlow and OpenDaylight for optimizing QoS
Breiki, M., Zhou, S. and Luo, Y. 2020. Design and validation of a meter band rate in OpenFlow and OpenDaylight for optimizing QoS. Advances in Science, Technology and Engineering Systems Journal. 5 (2), pp. 35-43. https://doi.org/10.25046/aj050205Article
Describing and simulating concurrent quantum systems
Bornat, R., Boender, J., Kammueller, F., Poly, G. and Nagarajan, R. 2020. Describing and simulating concurrent quantum systems. Biere, A. and Parker, D. (ed.) International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 20). Dublin 27 - 30 Apr 2020 Springer. pp. 271-277 https://doi.org/10.1007/978-3-030-45237-7_16Conference paper
A smart environments architecture (Search)
Augusto, J., Gimenez Manuel, J., Quinde, M., Oguego, C., Ali, M. and James-Reynolds, C. 2020. A smart environments architecture (Search). Applied Artificial Intelligence. 34 (2), pp. 155-186. https://doi.org/10.1080/08839514.2020.1712778Article
Use of a big data analysis technique for extracting HRA data from event investigation reports based on the Safety-II concept
Ham, D. and Park, J. 2020. Use of a big data analysis technique for extracting HRA data from event investigation reports based on the Safety-II concept. Reliability Engineering and System Safety. 194, pp. 1-15. https://doi.org/10.1016/j.ress.2018.07.033Article
Am I missing something? Experiences of using social media by blind and partially sighted users
Whitney, G. and Kolar, I. 2020. Am I missing something? Experiences of using social media by blind and partially sighted users. Universal Access in the Information Society. 19 (2), pp. 461-469. https://doi.org/10.1007/s10209-019-00648-zArticle
Analysis of tuberculosis severity levels from CT pulmonary images based on enhanced residual deep learning architecture
Gao, X., James-Reynolds, C. and Currie, E. 2020. Analysis of tuberculosis severity levels from CT pulmonary images based on enhanced residual deep learning architecture. Neurocomputing. 392, pp. 233-244. https://doi.org/10.1016/j.neucom.2018.12.086Article
Context-aware solutions for asthma condition management: a survey
Quinde, M., Khan, N., Augusto, J., Van Wyk, A. and Stewart, J. 2020. Context-aware solutions for asthma condition management: a survey. Universal Access in the Information Society. 19 (3), pp. 571-593. https://doi.org/10.1007/s10209-018-0641-5Article
New lace and arsenic: adventures in weak memory with a program logic (v2)
Bornat, R., Alglave, J. and Parkinson, M. 2016. New lace and arsenic: adventures in weak memory with a program logic (v2). arXiv.org arXiv. https://doi.org/10.48550/arXiv.1512.01416Other
Micro-distortion detection of lidar scanning signals based on geometric analysis
Liu, S., Chen, X., Li, Y. and Cheng, X. 2019. Micro-distortion detection of lidar scanning signals based on geometric analysis. Symmetry. 11 (12), pp. 2-13. https://doi.org/10.3390/sym11121471Article
Assessing vulnerabilities in IoT-based ambient assisted living systems
Cristescu, I., Gimenez Manuel, J. and Augusto, J. 2020. Assessing vulnerabilities in IoT-based ambient assisted living systems. in: Hernaandez Ramos, J. and Skarmeta, A. (ed.) Security and privacy in Internet of Things: challenges and solutions IOS Press.Book chapter
Architecture design for disaster resilient management network using D2D technology
Ali, K. 2019. Architecture design for disaster resilient management network using D2D technology. PhD thesis Middlesex UniversityPhD thesis
A history based logic for dynamic preference updates
Baskent, C. and McCusker, G. 2019. A history based logic for dynamic preference updates. Journal of Logic, Language and Information. https://doi.org/10.1007/s10849-019-09307-1Article
Revisiting direct neuralisation of first-order logic
Gunn, I. and Windridge, D. 2018. Revisiting direct neuralisation of first-order logic. NeSy 2018 : Thirteenth International Workshop on Neural-Symbolic Learning and Reasoning. Prague, Czech Republic 23 - 24 Aug 2018Conference paper
A generative adversarial strategy for modeling relation paths in knowledge base representation learning
Zia, T., Zahid, U. and Windridge, D. 2019. A generative adversarial strategy for modeling relation paths in knowledge base representation learning. KR2ML - Knowledge Representation and Reasoning Meets Machine Learning Workshop, NeurIPS 2019, Thirty-third Conference on Neural Information Processing Systems. Vancouver, Canada 09 - 14 Dec 2019Conference poster
Verifying cryptographic protocols
Ma, X. and Cheng, X. 2005. Verifying cryptographic protocols. IEEE Journal of Intelligent Cybernetic Systems.Article
Verifying security protocols by knowledge analysis
Ma, X. and Cheng, X. 2008. Verifying security protocols by knowledge analysis. International Journal of Security and Networks. 3 (3), pp. 183-192. https://doi.org/10.1504/IJSN.2008.020092Article
A security design for cloud computing: an implementation of an on premises authentication with Kerberos and IPSec within a network
Umar, M. and Cheng, X. 2012. A security design for cloud computing: an implementation of an on premises authentication with Kerberos and IPSec within a network. International Journal of Advanced Research in Computer Science. 3 (1), pp. 10-16. https://doi.org/10.26483/ijarcs.v3i1.6040Article
Comparative experiments on resource discovery in P2P networks
Gautam, S. and Cheng, X. 2014. Comparative experiments on resource discovery in P2P networks. Journal of Next Generation Information Technology. 5 (1), pp. 89-98.Article
152992
total views30330
total downloads10299
views this month1124
downloads this month