Computer Science
Title | Computer Science |
---|---|
Alternative | S&T - CS |
Faculty | Faculty of Science and Technology |
Latest research outputs
Sort by Date Title
A generalisable framework for saliency-based line segment detection
Brown, M., Windridge, D. and Guillemaut, J. 2015. A generalisable framework for saliency-based line segment detection. Pattern Recognition. 48 (12), pp. 3993-4011. https://doi.org/10.1016/j.patcog.2015.06.015Article
A novel Markov logic rule induction strategy for characterizing sports video footage
Windridge, D., Kittler, J., De Campos, T., Yan, F., Christmas, W. and Khan, A. 2015. A novel Markov logic rule induction strategy for characterizing sports video footage. IEEE MultiMedia. 22 (2), pp. 24-35. https://doi.org/10.1109/MMUL.2014.36Article
Artificial co-drivers as a universal enabling technology for future intelligent vehicles and transportation systems
Da Lio, M., Biral, F., Bertolazzi, E., Galvani, M., Bosetti, P., Windridge, D., Saroldi, A. and Tango, F. 2015. Artificial co-drivers as a universal enabling technology for future intelligent vehicles and transportation systems. IEEE Transactions on Intelligent Transportation Systems. 16 (1), pp. 244-263. https://doi.org/10.1109/TITS.2014.2330199Article
Asymmetric topologies on statistical manifolds
Belavkin, R. 2015. Asymmetric topologies on statistical manifolds. 2nd International Conference on Geometric Science of Information. Palaiseau, France 28 - 30 Oct 2015 Springer. https://doi.org/10.1007/978-3-319-25040-3_23Conference paper
Modelling work domain knowledge with the combined use of abstraction hierarchy and living systems theory
Ham, D. 2015. Modelling work domain knowledge with the combined use of abstraction hierarchy and living systems theory. Cognition, Technology and Work. 17 (4), pp. 575-591. https://doi.org/10.1007/s10111-015-0338-yArticle
Towards cyber-physical systems as services: the ASIP protocol
Bordoni, M., Bottone, M., Fields, B., Gorogiannis, N., Margolis, M., Primiero, G. and Raimondi, F. 2015. Towards cyber-physical systems as services: the ASIP protocol. 2015 IEEE/ACM 1st International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS). Florence, Italy 17 - 17 May 2015 IEEE. pp. 52-55 https://doi.org/10.1109/SEsCPS.2015.18Conference paper
Teaching smart phone ethics: an interdisciplinary approach
Jones, S. 2015. Teaching smart phone ethics: an interdisciplinary approach. Ethicomp 2015. De Monfort University, Leicester, UK 07 - 09 Sep 2015 Association for Computing Machinery (ACM). pp. 445-452 https://doi.org/10.1145/2874239.2874305Conference paper
Symbolic model checking for one-resource RB±ATL
Alechina, N., Logan, B., Nguyen, H. and Raimondi, F. 2015. Symbolic model checking for one-resource RB±ATL. Yang, Q. and Wooldridge, M. (ed.) 24th International Joint Conference on Artificial Intelligence (IJCAI 2015). Buenos Aires, Argentina 25 - 31 Jul 2015 Buenos Aires, Argentina AAAI Press / International Joint Conferences on Artificial Intelligence. pp. 1069-1075Conference paper
A group decision making model for partially ordered preference under uncertainty
Chen, S., Liu, J., Wang, H. and Augusto, J. 2015. A group decision making model for partially ordered preference under uncertainty. Information Fusion. 25, pp. 32-41. https://doi.org/10.1016/j.inffus.2014.11.001Article
Exploring energy consumption issues for multimedia streaming in LTE HetNet small cells
Trestian, R., Vien, Q., Shah, P. and Mapp, G. 2015. Exploring energy consumption issues for multimedia streaming in LTE HetNet small cells. 2015 IEEE 40th Conference on Local Computer Networks (LCN 2015). Clearwater Beach, Florida, USA 26 - 29 Oct 2015 IEEE. pp. 498-501 https://doi.org/10.1109/LCN.2015.7366362Conference paper
Breast cancer data analytics with missing values: a study on ethnic, age and income groups
Tirunagari, S., Poh, N., Abdulrahman, H., Nemmour, N. and Windridge, D. 2015. Breast cancer data analytics with missing values: a study on ethnic, age and income groups. ArXiv e-prints: Quantitative Biology > Quantitative Methods. https://doi.org/10.48550/arXiv.1503.03680Pre-print
Using data mining for assessing the impact of social media in higher education: the case of integrating social media in the curriculum
Dafoulas, G., Loveday, J. and Neilson, D. 2015. Using data mining for assessing the impact of social media in higher education: the case of integrating social media in the curriculum. 8th annual International Conference of Education, Research and Innovation (ICERI2015). Seville, Spain 18 - 20 Nov 2015 IATED. pp. 4684-4693Conference paper
Investigating the impact of social customer relationship management in higher education
Tahmasebi Aria, F., Dafoulas, G. and Shokri, A. 2015. Investigating the impact of social customer relationship management in higher education. 8th annual International Conference of Education, Research and Innovation (ICERI2015). Seville, Spain 18 - 20 Nov 2015 IATED. pp. 4664-4673Conference paper
Challenges associated with the adoption of social media: towards training needs analysis in the web-marketing sector
Alotaibi, B., Dafoulas, G. and Loveday, J. 2015. Challenges associated with the adoption of social media: towards training needs analysis in the web-marketing sector. 8th annual International Conference of Education, Research and Innovation (ICERI2015). Seville, Spain 18 - 20 Nov 2015 IATED. pp. 4674-4683Conference paper
Guidelines for determining an effective role for social media in e-learning enhancement
Shokri, A. and Dafoulas, G. 2015. Guidelines for determining an effective role for social media in e-learning enhancement. 8th annual International Conference of Education, Research and Innovation (ICERI2015). Seville, Spain 18 - 20 Nov 2015 IATED. pp. 4654-4663Conference paper
Inducing targeted brain states utilizing merged reality systems
Moseley, R. 2015. Inducing targeted brain states utilizing merged reality systems. 2015 Science and Information Conference (SAI). London, United Kingdom 28 - 30 Jul 2015 IEEE. pp. 657-663Conference paper
Business process models for visually navigating process execution data
Gulden, J. and Attfield, S. 2015. Business process models for visually navigating process execution data. 4th International Workshop on Theory and Application of Visualizations and Human-centric Aspects in Processes (TAProViz2015). Innsbruck, Austria 31 Aug 2015Conference paper
U-sphere: strengthening scalable flat-name routing for decentralized networks
Kos, J., Aiash, M., Loo, J. and Trček, D. 2015. U-sphere: strengthening scalable flat-name routing for decentralized networks. Computer Networks. 89, pp. 14-31. https://doi.org/10.1016/j.comnet.2015.07.006Article
Disaster management communication networks: challenges and architecture design
Ali, K., Nguyen, H., Vien, Q. and Shah, P. 2015. Disaster management communication networks: challenges and architecture design. 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops 2015). St. Louis, Missouri, USA 23 - 27 Mar 2015 IEEE. pp. 537-542 https://doi.org/10.1109/PERCOMW.2015.7134094Conference paper
An expert review of REVERIE and its potential for game-based learning
Doumanis, I., Porter, S., Economou, D. and Smith, S. 2015. An expert review of REVERIE and its potential for game-based learning. Preuveneers, D. (ed.) The 11th International Conference on Intelligent Environments - IE'15. Prague 13 - 14 Jul 2015 IOS Press. pp. 306-313 https://doi.org/10.3233/978-1-61499-530-2-306Conference paper
Evaluating an intelligent Q&A system for mobile cultural learning
Doumanis, I. and Smith, S. 2015. Evaluating an intelligent Q&A system for mobile cultural learning. EAI Endorsed Transactions on Future Intelligent Educational Environments. 15 (2). https://doi.org/10.4108/fiee.1.2.e3Article
Smart feedback and the challenges of virtualisation
James-Reynolds, C. and Currie, E. 2015. Smart feedback and the challenges of virtualisation. EAI Endorsed Transactions on Future Intelligent Educational Environments. 1 (2). https://doi.org/10.4108/fiee.1.2.e6Article
Exploring older women's confidence during route planning
Wilson, J., Curzon, P. and Duncker-Gassen, E. 2015. Exploring older women's confidence during route planning. Behaviour and Information Technology. 34 (7), pp. 725-740. https://doi.org/10.1080/0144929X.2014.960001Article
Constraint satisfaction problems over the integers with successor
Bodirsky, M., Martin, B. and Mottet, A. 2015. Constraint satisfaction problems over the integers with successor. 42nd ICALP 2015. Kyoto, Japan 06 - 10 Jul 2015 Heidelberg, Germany Springer Berlin. Heidelberg. pp. 256-267 https://doi.org/10.1007/978-3-662-47672-7_21Conference paper
The application of mHealth to mental health: opportunities and challenges
Marzano, L., Bardill, A., Fields, B., Herd, K., Veale, D., Grey, N. and Moran, P. 2015. The application of mHealth to mental health: opportunities and challenges. The Lancet Psychiatry. 2 (10), pp. 942-948. https://doi.org/10.1016/S2215-0366(15)00268-0Article
Hard-to-get-at data from difficult-to-access users
Fields, B., Bardill, A., Marzano, L. and Herd, K. 2015. Hard-to-get-at data from difficult-to-access users. Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P. and Winckler, M. (ed.) 15th IFIP TC 13 International Conference on Human-Computer Interaction. Bamberg, Germany 14 - 18 Sep 2015 Springer. pp. 409-416 https://doi.org/10.1007/978-3-319-22723-8_32Conference paper
Towards relating delivery methods and examination success: lessons learned from the VALO LLP project case study
Rahanu, H., Georgiadou, E., Siakas, K., Ekert, D., Messanarz, R. and Abeysinghe, G. 2015. Towards relating delivery methods and examination success: lessons learned from the VALO LLP project case study. Journal of Software: Evolution and Process. 27 (8), pp. 555-564. https://doi.org/10.1002/smr.1726Article
Analytic provenance for sensemaking: a research agenda
Xu, K., Attfield, S., Jankun-Kelly, T., Wheat, A., Nguyen, P. and Selvaraj, N. 2015. Analytic provenance for sensemaking: a research agenda. IEEE Computer Graphics and Applications. 35 (3), pp. 56-64. https://doi.org/10.1109/MCG.2015.50Article
eFRIEND: an ethical framework for intelligent environments development
Jones, S., Hara, S. and Augusto, J. 2015. eFRIEND: an ethical framework for intelligent environments development. Ethics and Information Technology. 17 (1), pp. 11-25. https://doi.org/10.1007/s10676-014-9358-1Article
The use of social networking sites in eLearning
De Raffaele, C., Bugeja, L. and Smith, S. 2015. The use of social networking sites in eLearning. International Journal of Social, Behavioral, Educational, Economic and Management Engineering. 9 (4), pp. 1223-1228.Article
The application of KAZE features to the classification echocardiogram videos
Li, W., Qian, Y., Loomes, M. and Gao, X. 2015. The application of KAZE features to the classification echocardiogram videos. First International Workshop Multimodal Retrieval in the Medical Domain (MRMD 2015). Vienna, Austria 29 Mar 2015 Springer. pp. 61-72 https://doi.org/10.1007/978-3-319-24471-6_6Conference paper
Detection of face spoofing using visual dynamics
Tirunagari, S., Poh, N., Windridge, D., Iorliam, A., Suki, N. and Ho, A. 2015. Detection of face spoofing using visual dynamics. IEEE Transactions on Information Forensics and Security. 10 (4), pp. 762-777. https://doi.org/10.1109/TIFS.2015.2406533Article
Human-computer interaction and international public policymaking: a framework for understanding and taking future actions. SIGCHI report: April 2015
Abascal, J., Barbosa, S., Barksdale, J., Friedman, B., Grossklags, J., Gulliksen, J., Johnson, J., Lazar, J., McEwan, T., Martínez-Normand, L., Michalk, W., Tsai, J., Van der Veer, G., Von Axelson, H., Walldius, A., Whitney, G., Winckler, M. and Wulf, V. 2015. Human-computer interaction and international public policymaking: a framework for understanding and taking future actions. SIGCHI report: April 2015. SIGCHI.Project report
Low complexity sub-block perceptual distortion assessment for mode decision and rate-control
Joshi, Y., Loo, J., Shah, P., Rahman, S. and Tasiran, A. 2015. Low complexity sub-block perceptual distortion assessment for mode decision and rate-control. 10th IEEE International Symposium on Broadband Multimedia Systems and Broadcasting. Ghent, Belgium 17 - 19 Jun 2015 IEEE. pp. 1-9 https://doi.org/10.1109/BMSB.2015.7177262Conference item
Introducing a hybrid infrastructure and information-centric approach for secure cloud computing
Aiash, M., Colson, R. and Kallash, M. 2015. Introducing a hybrid infrastructure and information-centric approach for secure cloud computing. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015). Gwangju, Korea 24 - 27 Mar 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 154-159 https://doi.org/10.1109/WAINA.2015.80Conference paper
On the role of value sensitive concerns in software engineering practice
Barn, B., Barn, R. and Raimondi, F. 2015. On the role of value sensitive concerns in software engineering practice. 37th International Conference on Software Engineering, ICSE 2015. Florence, Italy 16 - 24 May 2015 IEEE. pp. 497-500 https://doi.org/10.1109/ICSE.2015.182Conference paper
Intuitive learnability of touch gestures for technology-naïve older adults
Mihajlov, M., Lai-Chong Law, E. and Springett, M. 2015. Intuitive learnability of touch gestures for technology-naïve older adults. Interacting with Computers. 27 (3), pp. 344-356. https://doi.org/10.1093/iwc/iwu044Article
A formal analysis of authentication protocols for mobile devices in next generation networks
Aiash, M. 2015. A formal analysis of authentication protocols for mobile devices in next generation networks. Concurrency and Computation: Practice and Experience. 27 (12), pp. 2938-2953. https://doi.org/10.1002/cpe.3260Article
An integrated authentication and authorization approach for the network of information architecture
Aiash, M. and Loo, J. 2015. An integrated authentication and authorization approach for the network of information architecture. Journal of Network and Computer Applications. 50, pp. 73-79. https://doi.org/10.1016/j.jnca.2014.06.004Article
Challenges and solutions for secure information centric networks: a case study of the NetInf architecture
Loo, J. and Aiash, M. 2015. Challenges and solutions for secure information centric networks: a case study of the NetInf architecture. Journal of Network and Computer Applications. 50, pp. 64-72. https://doi.org/10.1016/j.jnca.2014.06.003Article
150996
total views29763
total downloads8303
views this month557
downloads this month