Computer Science
Title | Computer Science |
---|---|
Alternative | S&T - CS |
Faculty | Faculty of Science and Technology |
Latest research outputs
Sort by Date Title
Distributed sensemaking: a case study of military analysis
Attfield, S., Fields, B., Wheat, A., Hutton, R., Nixon, J., Leggatt, A. and Blackford, H. 2015. Distributed sensemaking: a case study of military analysis. 12th International Conference on Naturalistic Decision Making. McLean, Virginia, USA 09 - 12 Jun 2015Conference paper
How analysts think: inference making strategies
Wong, B. and Kodagoda, N. 2015. How analysts think: inference making strategies. Human Factors and Ergonomics Society 59th International Annual Meeting, 2015. Los Angeles, California, USA 26 - 30 Oct 2015 pp. 269-273 https://doi.org/10.1177/1541931215591055Conference paper
Exploring the challenges of implementing guidelines for the design of visual analytics systems
Haider, J., Pohl, M., Hillemann, E., Nussbaumer, A., Attfield, S., Passmore, P. and Wong, B. 2015. Exploring the challenges of implementing guidelines for the design of visual analytics systems. Human Factors and Ergonomics Society 2015 59th International Annual Meeting. Los Angeles, California, USA 26 - 30 Oct 2015 Human Factors and Ergonomics Society. pp. 259-263 https://doi.org/10.1177/1541931215591053Conference paper
Scalability considerations for multivariate graph visualization
Jankun-Kelly, T., Dwyer, T., Holten, D., Hurter, C., Nollenburg, M., Weaver, C. and Xu, K. 2014. Scalability considerations for multivariate graph visualization. in: Kerren, A., Purchase, H. and Ward, M. (ed.) Multivariate Network Visualization: Dagstuhl Seminar # 13201, Dagstuhl Castle, Germany, May 12-17, 2013, Revised Discussions Springer International Publishing.Book chapter
SchemaLine: timeline visualization for sensemaking
Nguyen, P., Xu, K., Walker, R. and Wong, B. 2014. SchemaLine: timeline visualization for sensemaking. 18th International Conference on Information Visualisation (IV). pp. 225-233Conference paper
Performance evaluation of Levenberg-Marquardt technique in error reduction for diabetes condition classification
Khan, N., Dhara, G. and Kandl, T. 2013. Performance evaluation of Levenberg-Marquardt technique in error reduction for diabetes condition classification. Procedia Computer Science. 18, pp. 2629-2637.Article
Information integration of drug discovery and clinical studies to support complex queries using an information supply chain framework
Kandl, T. and Khan, N. 2014. Information integration of drug discovery and clinical studies to support complex queries using an information supply chain framework. Journal of Software. 9 (5), pp. 1348-1356. https://doi.org/10.4304/jsw.9.5.1348-1356Article
Developing navigational services for people with Down's Syndrome
Kramer, D., Covaci, A. and Augusto, J. 2015. Developing navigational services for people with Down's Syndrome. 2015 International Conference on Intelligent Environments. Prague, Czech Republic 15 - 17 Jul 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 128-131 https://doi.org/10.1109/IE.2015.26Conference paper
Personalised learning materials based on dyslexia types: ontological approach
Alsobhi, A., Khan, N. and Rahanu, H. 2015. Personalised learning materials based on dyslexia types: ontological approach. 19th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES 2015). Singapore Elsevier. pp. 113-121Conference paper
DAEL framework: a new adaptive e-learning framework for students with dyslexia
Alsobhi, A., Khan, N. and Rahanu, H. 2015. DAEL framework: a new adaptive e-learning framework for students with dyslexia. International Conference On Computational Science, ICCS 2015 — Computational Science at the Gates of Nature. Reykjavík, Iceland 01 - 03 Jun 2015 pp. 1947-1956Conference paper
Evaluation of colour appearances displaying on smartphones
Gao, X., Khodamoradi, E., Guo, L., Yang, X., Tang, S., Guo, W. and Wang, Y. 2015. Evaluation of colour appearances displaying on smartphones. Yaguchi, H., Okajima, K., Ishida, T., Araki, K., Doi, M. and Manabe, Y. (ed.) AIC 2015, Color and Image, Midterm meeting of the International Colour Association (AIC). Tokyo, Japan 19 - 22 May 2015 The Color Science Association of Japan. pp. 539-544Conference poster
A comparison of simple agents implemented in simulated neurons
Huyck, C., Evans, C. and Mitchell, I. 2015. A comparison of simple agents implemented in simulated neurons. Biologically Inspired Cognitive Architectures. 12, pp. 9-19. https://doi.org/10.1016/j.bica.2015.03.001Article
Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing
Carnielli, A. and Aiash, M. 2015. Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015). Gwangju, Korea 24 - 27 Mar 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 135-140Conference paper
Integrating the strengths of cognitive emotion models with traditional HCI analysis tools
Springett, M., Law, E. and Coulson, M. 2015. Integrating the strengths of cognitive emotion models with traditional HCI analysis tools. Universal Access in the Information Society. 14 (2), pp. 203-214. https://doi.org/10.1007/s10209-013-0335-yArticle
Invalidating policies using structural information
Kammueller, F. and Probst, C. 2013. Invalidating policies using structural information. IEEE CS Security and Privacy Workshops, SPW, WRIT'13.Conference paper
Network information flow control: proof of concept
Alghothami, A. and Kammueller, F. 2013. Network information flow control: proof of concept. IEEE Int. Conf. on Systems, Man, and Cybernetics, SMC. Manchester, UK 13 - 16 Oct 2013 IEEE. pp. 2957-2962 https://doi.org/10.1109/SMC.2013.504Conference paper
Privacy analysis of a hidden friendship protocol
Kammueller, F. and Preibusch, S. 2013. Privacy analysis of a hidden friendship protocol. The 8th International Workshop on Data Privacy Management, DPM 2013. Egam, UK 12 - 13 Sep 2013 Springer. pp. 83-99Conference paper
Externalizing behaviour for analysing system models
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2013. Externalizing behaviour for analysing system models. 5th International Workshop on Managing Insider Security Threats, MIST, 2013..Conference paper
Verification of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2014. Verification of quantum protocols using Coq. 17th Conference on Quantum Information Processing (QIP). Barcelona, Spain 03 - 07 Feb 2014Conference poster
Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013.
Kammueller, F. 2014. Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013. MathSciNet: Mathematical Reviews.Article
Combining generated data models with formal invalidation for insider threat analysis
Kammueller, F. and Probst, C. 2014. Combining generated data models with formal invalidation for insider threat analysis. 2014 IEEE Security and Privacy Workshops (SPW): Workshop on Research for Insider Threat (WRIT 2014). San Jose, California, USA 17 - 18 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 229-235 https://doi.org/10.1109/SPW.2014.45Conference paper
Verification of DNSsec delegation signatures
Kammueller, F. 2014. Verification of DNSsec delegation signatures. 21st International IEEE Conference on Telecommunication. Lisbon 04 - 07 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 298-392 https://doi.org/10.1109/ICT.2014.6845127Conference paper
Invalidating policies using structural information
Kammueller, F. and Probst, C. 2014. Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 5 (2), pp. 59-79. https://doi.org/10.22667/JOWUA.2014.06.31.059Article
Modeling human behaviour with higher order logic: insider threats
Boender, J., Kammueller, F., Ivanova, M. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust. Vienna Technical University, Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 31-39Conference paper
A probabilistic analysis framework for malicious insider threats
Chen, T., Kammueller, F., Nemli, I. and Probst, C. 2015. A probabilistic analysis framework for malicious insider threats. 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015, held as part of HCI International 2015. Los Angeles, California, USA 02 - 07 Aug 2015 Springer. pp. 178-189Conference paper
Confinement for active objects
Kammueller, F. 2015. Confinement for active objects. International Journal of Advanced Computer Science and Applications. 6 (2), pp. 246-261. https://doi.org/10.14569/IJACSA.2015.060236Article
Programming the MIRTO robot with neurons
Huyck, C., Primiero, G. and Raimondi, F. 2014. Programming the MIRTO robot with neurons. Procedia Computer Science. 41, pp. 75-82. https://doi.org/10.1016/j.procs.2014.11.087Article
Modeling human behaviour with higher order logic: insider threats
Boender, J., Ivanova, M., Kammueller, F. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST 2014). Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers. pp. 31-39 https://doi.org/10.1109/STAST.2014.13Conference paper
A typed natural deduction calculus to reason about secure trust
Primiero, G. and Raimondi, F. 2014. A typed natural deduction calculus to reason about secure trust. 2014 Twelfth Annual Conference on Privacy, Security and Trust (PST). Toronto, Canada 23 - 24 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 379-382 https://doi.org/10.1109/PST.2014.6890963Conference paper
A neuro-computational approach to PP attachment ambiguity resolution
Nadh, K. and Huyck, C. 2012. A neuro-computational approach to PP attachment ambiguity resolution. Neural Computation. 24 (7), pp. 1906-1925. https://doi.org/10.1162/NECO_a_00298Article
A review of cell assemblies
Huyck, C. and Passmore, P. 2013. A review of cell assemblies. Biological Cybernetics. 107 (3), pp. 263-288. https://doi.org/10.1007/s00422-013-0555-5Article
Compensatory Hebbian learning for categorisation in simulated biological neural nets
Huyck, C. and Mitchell, I. 2013. Compensatory Hebbian learning for categorisation in simulated biological neural nets. Biologically Inspired Cognitive Architectures. 6 (5), pp. 3-7. https://doi.org/10.1016/j.bica.2013.06.003Article
Decidable model-checking for a resource logic with production of resources
Alechina, N., Logan, B., Nguyen, H. and Raimondi, F. 2014. Decidable model-checking for a resource logic with production of resources. 21st European Conference on Artificial Intelligence (ECAI-2014). Prague, Czech Republic 18 - 22 Aug 2014 Prague, Czech Republic IOS Press. pp. 9-14 https://doi.org/10.3233/978-1-61499-419-0-9Conference paper
Aviation safety: modeling and analyzing complex interactions between humans and automated systems
Rungta, N., Brat, G., Clancey, W., Linde, C., Raimondi, F., Seah, C. and Shafto, M. 2013. Aviation safety: modeling and analyzing complex interactions between humans and automated systems. ATACCS 2013. Naples, Italy 28 - 30 May 2013 Association for computing machinery. pp. 27-37 https://doi.org/10.1145/2494493.2494498Conference paper
A synergistic and extensible framework for multi-agent system verification
Hunter, J., Raimondi, F., Rungta, N. and Stocker, R. 2013. A synergistic and extensible framework for multi-agent system verification. AAMAS 2013 :12th International Conference on Autonomous Agents and Multiagent Systems. Saint Paul, Minnesota, USA. 06 - 10 May 2013 Richland, SC International Foundation for Autonomous Agents and Multiagent Systems. pp. 869-876Conference paper
Domain types: abstract-domain selection based on variable usage
Apel, S., Beyer, D., Friedberger, K., Raimondi, F. and von Rhein, A. 2013. Domain types: abstract-domain selection based on variable usage. Hardware and Software: Verification and Testing. 8244 (1), pp. 262-278. https://doi.org/10.1007/978-3-319-03077-7_18Article
Implementing adaptation and reconfiguration strategies in heterogeneous WSN
Di Marco, A., Gallo, F., Gemikonakli, O., Mostarda, L. and Raimondi, F. 2013. Implementing adaptation and reconfiguration strategies in heterogeneous WSN. 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013 IEEE. pp. 477-483 https://doi.org/10.1109/AINA.2013.102Conference paper
The anonymous subgraph problem
Bettinelli, A., Liberti, L., Raimondi, F. and Savourey, D. 2013. The anonymous subgraph problem. Computers and Operations Research. 40 (4), pp. 973-979. https://doi.org/10.1016/j.cor.2012.11.018Article
Introducing Binary Decision Diagrams in the explicit-state verification of Java code
von Rhein, A., Apel, S. and Raimondi, F. 2011. Introducing Binary Decision Diagrams in the explicit-state verification of Java code. The Java Pathfinder Workshop (co-located with ASE 2011). Oread, Lawrence, Kansas 12 Nov 2011Conference paper
Supporting communication in information centric networks using the location/ID split protocol and time released caching
Aiash, M., Mapp, G. and Kallash, M. 2015. Supporting communication in information centric networks using the location/ID split protocol and time released caching. 2015 International Conference on Cloud Computing (ICCC). Riyadh, Saudi Arabia 26 - 29 Apr 2015 Institute of Electrical and Electronics Engineers. pp. 233-238 https://doi.org/10.1109/CLOUDCOMP.2015.7149657Conference paper
150884
total views29727
total downloads8191
views this month521
downloads this month