Computer Science


TitleComputer Science
AlternativeS&T - CS
FacultyFaculty of Science and Technology

Latest research outputs

Sort by Date Title
Distributed sensemaking: a case study of military analysis
Attfield, S., Fields, B., Wheat, A., Hutton, R., Nixon, J., Leggatt, A. and Blackford, H. 2015. Distributed sensemaking: a case study of military analysis. 12th International Conference on Naturalistic Decision Making. McLean, Virginia, USA 09 - 12 Jun 2015

Conference paper

How analysts think: inference making strategies
Wong, B. and Kodagoda, N. 2015. How analysts think: inference making strategies. Human Factors and Ergonomics Society 59th International Annual Meeting, 2015. Los Angeles, California, USA 26 - 30 Oct 2015 pp. 269-273 https://doi.org/10.1177/1541931215591055

Conference paper

Exploring the challenges of implementing guidelines for the design of visual analytics systems
Haider, J., Pohl, M., Hillemann, E., Nussbaumer, A., Attfield, S., Passmore, P. and Wong, B. 2015. Exploring the challenges of implementing guidelines for the design of visual analytics systems. Human Factors and Ergonomics Society 2015 ​59th International Annual Meeting. Los Angeles, California, USA 26 - 30 Oct 2015 Human Factors and Ergonomics Society. pp. 259-263 https://doi.org/10.1177/1541931215591053

Conference paper

Scalability considerations for multivariate graph visualization
Jankun-Kelly, T., Dwyer, T., Holten, D., Hurter, C., Nollenburg, M., Weaver, C. and Xu, K. 2014. Scalability considerations for multivariate graph visualization. in: Kerren, A., Purchase, H. and Ward, M. (ed.) Multivariate Network Visualization: Dagstuhl Seminar # 13201, Dagstuhl Castle, Germany, May 12-17, 2013, Revised Discussions Springer International Publishing.

Book chapter

SchemaLine: timeline visualization for sensemaking
Nguyen, P., Xu, K., Walker, R. and Wong, B. 2014. SchemaLine: timeline visualization for sensemaking. 18th International Conference on Information Visualisation (IV). pp. 225-233

Conference paper

Performance evaluation of Levenberg-Marquardt technique in error reduction for diabetes condition classification
Khan, N., Dhara, G. and Kandl, T. 2013. Performance evaluation of Levenberg-Marquardt technique in error reduction for diabetes condition classification. Procedia Computer Science. 18, pp. 2629-2637.

Article

Information integration of drug discovery and clinical studies to support complex queries using an information supply chain framework
Kandl, T. and Khan, N. 2014. Information integration of drug discovery and clinical studies to support complex queries using an information supply chain framework. Journal of Software. 9 (5), pp. 1348-1356. https://doi.org/10.4304/jsw.9.5.1348-1356

Article

Developing navigational services for people with Down's Syndrome
Kramer, D., Covaci, A. and Augusto, J. 2015. Developing navigational services for people with Down's Syndrome. 2015 International Conference on Intelligent Environments. Prague, Czech Republic 15 - 17 Jul 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 128-131 https://doi.org/10.1109/IE.2015.26

Conference paper

Personalised learning materials based on dyslexia types: ontological approach
Alsobhi, A., Khan, N. and Rahanu, H. 2015. Personalised learning materials based on dyslexia types: ontological approach. 19th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES 2015). Singapore Elsevier. pp. 113-121

Conference paper

DAEL framework: a new adaptive e-learning framework for students with dyslexia
Alsobhi, A., Khan, N. and Rahanu, H. 2015. DAEL framework: a new adaptive e-learning framework for students with dyslexia. International Conference On Computational Science, ICCS 2015 — Computational Science at the Gates of Nature. Reykjavík, Iceland 01 - 03 Jun 2015 pp. 1947-1956

Conference paper

Evaluation of colour appearances displaying on smartphones
Gao, X., Khodamoradi, E., Guo, L., Yang, X., Tang, S., Guo, W. and Wang, Y. 2015. Evaluation of colour appearances displaying on smartphones. Yaguchi, H., Okajima, K., Ishida, T., Araki, K., Doi, M. and Manabe, Y. (ed.) AIC 2015, Color and Image, Midterm meeting of the International Colour Association (AIC). Tokyo, Japan 19 - 22 May 2015 The Color Science Association of Japan. pp. 539-544

Conference poster

A comparison of simple agents implemented in simulated neurons
Huyck, C., Evans, C. and Mitchell, I. 2015. A comparison of simple agents implemented in simulated neurons. Biologically Inspired Cognitive Architectures. 12, pp. 9-19. https://doi.org/10.1016/j.bica.2015.03.001

Article

Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing
Carnielli, A. and Aiash, M. 2015. Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015). Gwangju, Korea 24 - 27 Mar 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 135-140

Conference paper

Integrating the strengths of cognitive emotion models with traditional HCI analysis tools
Springett, M., Law, E. and Coulson, M. 2015. Integrating the strengths of cognitive emotion models with traditional HCI analysis tools. Universal Access in the Information Society. 14 (2), pp. 203-214. https://doi.org/10.1007/s10209-013-0335-y

Article

Invalidating policies using structural information
Kammueller, F. and Probst, C. 2013. Invalidating policies using structural information. IEEE CS Security and Privacy Workshops, SPW, WRIT'13.

Conference paper

Network information flow control: proof of concept
Alghothami, A. and Kammueller, F. 2013. Network information flow control: proof of concept. IEEE Int. Conf. on Systems, Man, and Cybernetics, SMC. Manchester, UK 13 - 16 Oct 2013 IEEE. pp. 2957-2962 https://doi.org/10.1109/SMC.2013.504

Conference paper

Privacy analysis of a hidden friendship protocol
Kammueller, F. and Preibusch, S. 2013. Privacy analysis of a hidden friendship protocol. The 8th International Workshop on Data Privacy Management, DPM 2013. Egam, UK 12 - 13 Sep 2013 Springer. pp. 83-99

Conference paper

Externalizing behaviour for analysing system models
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2013. Externalizing behaviour for analysing system models. 5th International Workshop on Managing Insider Security Threats, MIST, 2013..

Conference paper

Verification of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2014. Verification of quantum protocols using Coq. 17th Conference on Quantum Information Processing (QIP). Barcelona, Spain 03 - 07 Feb 2014

Conference poster

Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013.
Kammueller, F. 2014. Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013. MathSciNet: Mathematical Reviews.

Article

Combining generated data models with formal invalidation for insider threat analysis
Kammueller, F. and Probst, C. 2014. Combining generated data models with formal invalidation for insider threat analysis. 2014 IEEE Security and Privacy Workshops (SPW): Workshop on Research for Insider Threat (WRIT 2014). San Jose, California, USA 17 - 18 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 229-235 https://doi.org/10.1109/SPW.2014.45

Conference paper

Verification of DNSsec delegation signatures
Kammueller, F. 2014. Verification of DNSsec delegation signatures. 21st International IEEE Conference on Telecommunication. Lisbon 04 - 07 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 298-392 https://doi.org/10.1109/ICT.2014.6845127

Conference paper

Invalidating policies using structural information
Kammueller, F. and Probst, C. 2014. Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 5 (2), pp. 59-79. https://doi.org/10.22667/JOWUA.2014.06.31.059

Article

Modeling human behaviour with higher order logic: insider threats
Boender, J., Kammueller, F., Ivanova, M. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust. Vienna Technical University, Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 31-39

Conference paper

A probabilistic analysis framework for malicious insider threats
Chen, T., Kammueller, F., Nemli, I. and Probst, C. 2015. A probabilistic analysis framework for malicious insider threats. 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015, held as part of HCI International 2015. Los Angeles, California, USA 02 - 07 Aug 2015 Springer. pp. 178-189

Conference paper

Confinement for active objects
Kammueller, F. 2015. Confinement for active objects. International Journal of Advanced Computer Science and Applications. 6 (2), pp. 246-261. https://doi.org/10.14569/IJACSA.2015.060236

Article

Programming the MIRTO robot with neurons
Huyck, C., Primiero, G. and Raimondi, F. 2014. Programming the MIRTO robot with neurons. Procedia Computer Science. 41, pp. 75-82. https://doi.org/10.1016/j.procs.2014.11.087

Article

Modeling human behaviour with higher order logic: insider threats
Boender, J., Ivanova, M., Kammueller, F. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST 2014). Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers. pp. 31-39 https://doi.org/10.1109/STAST.2014.13

Conference paper

A typed natural deduction calculus to reason about secure trust
Primiero, G. and Raimondi, F. 2014. A typed natural deduction calculus to reason about secure trust. 2014 Twelfth Annual Conference on Privacy, Security and Trust (PST). Toronto, Canada 23 - 24 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 379-382 https://doi.org/10.1109/PST.2014.6890963

Conference paper

A neuro-computational approach to PP attachment ambiguity resolution
Nadh, K. and Huyck, C. 2012. A neuro-computational approach to PP attachment ambiguity resolution. Neural Computation. 24 (7), pp. 1906-1925. https://doi.org/10.1162/NECO_a_00298

Article

A review of cell assemblies
Huyck, C. and Passmore, P. 2013. A review of cell assemblies. Biological Cybernetics. 107 (3), pp. 263-288. https://doi.org/10.1007/s00422-013-0555-5

Article

Compensatory Hebbian learning for categorisation in simulated biological neural nets
Huyck, C. and Mitchell, I. 2013. Compensatory Hebbian learning for categorisation in simulated biological neural nets. Biologically Inspired Cognitive Architectures. 6 (5), pp. 3-7. https://doi.org/10.1016/j.bica.2013.06.003

Article

Decidable model-checking for a resource logic with production of resources
Alechina, N., Logan, B., Nguyen, H. and Raimondi, F. 2014. Decidable model-checking for a resource logic with production of resources. 21st European Conference on Artificial Intelligence (ECAI-2014). Prague, Czech Republic 18 - 22 Aug 2014 Prague, Czech Republic IOS Press. pp. 9-14 https://doi.org/10.3233/978-1-61499-419-0-9

Conference paper

Aviation safety: modeling and analyzing complex interactions between humans and automated systems
Rungta, N., Brat, G., Clancey, W., Linde, C., Raimondi, F., Seah, C. and Shafto, M. 2013. Aviation safety: modeling and analyzing complex interactions between humans and automated systems. ATACCS 2013. Naples, Italy 28 - 30 May 2013 Association for computing machinery. pp. 27-37 https://doi.org/10.1145/2494493.2494498

Conference paper

A synergistic and extensible framework for multi-agent system verification
Hunter, J., Raimondi, F., Rungta, N. and Stocker, R. 2013. A synergistic and extensible framework for multi-agent system verification. AAMAS 2013 :12th International Conference on Autonomous Agents and Multiagent Systems. Saint Paul, Minnesota, USA. 06 - 10 May 2013 Richland, SC International Foundation for Autonomous Agents and Multiagent Systems. pp. 869-876

Conference paper

Domain types: abstract-domain selection based on variable usage
Apel, S., Beyer, D., Friedberger, K., Raimondi, F. and von Rhein, A. 2013. Domain types: abstract-domain selection based on variable usage. Hardware and Software: Verification and Testing. 8244 (1), pp. 262-278. https://doi.org/10.1007/978-3-319-03077-7_18

Article

Implementing adaptation and reconfiguration strategies in heterogeneous WSN
Di Marco, A., Gallo, F., Gemikonakli, O., Mostarda, L. and Raimondi, F. 2013. Implementing adaptation and reconfiguration strategies in heterogeneous WSN. 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013 IEEE. pp. 477-483 https://doi.org/10.1109/AINA.2013.102

Conference paper

The anonymous subgraph problem
Bettinelli, A., Liberti, L., Raimondi, F. and Savourey, D. 2013. The anonymous subgraph problem. Computers and Operations Research. 40 (4), pp. 973-979. https://doi.org/10.1016/j.cor.2012.11.018

Article

Introducing Binary Decision Diagrams in the explicit-state verification of Java code
von Rhein, A., Apel, S. and Raimondi, F. 2011. Introducing Binary Decision Diagrams in the explicit-state verification of Java code. The Java Pathfinder Workshop (co-located with ASE 2011). Oread, Lawrence, Kansas 12 Nov 2011

Conference paper

Supporting communication in information centric networks using the location/ID split protocol and time released caching
Aiash, M., Mapp, G. and Kallash, M. 2015. Supporting communication in information centric networks using the location/ID split protocol and time released caching. 2015 International Conference on Cloud Computing (ICCC). Riyadh, Saudi Arabia 26 - 29 Apr 2015 Institute of Electrical and Electronics Engineers. pp. 233-238 https://doi.org/10.1109/CLOUDCOMP.2015.7149657

Conference paper