Computer Science
Title | Computer Science |
---|---|
Alternative | S&T - CS |
Faculty | Faculty of Science and Technology |
Latest research outputs
Sort by Date Title
Explanation of two non-blocking shared-variable communication algorithms
Bornat, R. and Amjad, H. 2011. Explanation of two non-blocking shared-variable communication algorithms. Formal Aspects of Computing. https://doi.org/10.1007/s00165-011-0213-4Article
Hierarchies in fragments of monadic strict NP
Martin, B. and Madelaine, F. 2007. Hierarchies in fragments of monadic strict NP. in: Cooper, B., Löwe, B. and Sorbi, A. (ed.) Computation and logic in the real world: Third Conference on Computability in Europe, CiE 2007, Siena, Italy, June 18-23, 2007, Proceedings Springer Berlin. Heidelberg.Book chapter
Governance in technology development
Kurt, A. and Duquenoy, P. 2013. Governance in technology development. in: Doridot, F., Duquenoy, P., Goujon, P., Kurt, A., Lavelle, S., Patrignani, N., Rainey, S. and Santuccio, A. (ed.) Ethical governance of emerging technologies development Hershey IGI Global. pp. 149-165Book chapter
Evaluation of collaborative filtering algorithms using a small dataset
Roda, F., Liberti, L. and Raimondi, F. 2011. Evaluation of collaborative filtering algorithms using a small dataset. WEBIST 2011. http://www.webist.org/WEBIST2011/Conference paper
Trialling the SMART approach: identifying and assessing sense-making
Wong, B., Kodagoda, N., Rooney, C., Attfield, S. and Choudhury, S. 2013. Trialling the SMART approach: identifying and assessing sense-making. 2013 International Annual Meeting of the Human Factors and Ergonomics Society. San Diego, CA, USA 30 Sep - 04 Oct 2013Conference paper
A novel security protocol for resolving addresses in the location/ID split architecture
Aiash, M. 2013. A novel security protocol for resolving addresses in the location/ID split architecture. The 7th International Conference on Network and System Security (NSS 2013). Spain 03 - 04 Jun 2013Conference paper
Securing address registration in location/ID split protocol using ID-based cryptography
Aiash, M., Al-Nemrat, A. and Preston, D. 2013. Securing address registration in location/ID split protocol using ID-based cryptography. Tsaoussidis, V., Kassler, A., Koucheryavy, Y. and Mellouk, A. (ed.) In proceeding of: The 11th International Conference on Wired/Wireless Internet Communications WWIC 2013. Russia 05 - 07 Jun 2013 Springer. https://doi.org/10.1007/978-3-642-38401-1_10Conference paper
Ordering based decision making: a survey
Chen, S., Liu, J., Wang, H. and Augusto, J. 2013. Ordering based decision making: a survey. Information Fusion. 14 (4), pp. 521-531. https://doi.org/10.1016/j.inffus.2012.10.005Article
Procedural aspects of the new regime for the admissibility of expert evidence: what the digital forensic expert needs to know
Sallavaci, O. and George, C. 2013. Procedural aspects of the new regime for the admissibility of expert evidence: what the digital forensic expert needs to know. International Journal of Electronic Security and Digital Forensics. 5 (3/4), pp. 161-171. https://doi.org/10.1504/IJESDF.2013.058645Article
New admissibility regime for expert evidence: the likely impact on digital forensics
Sallavaci, O. and George, C. 2013. New admissibility regime for expert evidence: the likely impact on digital forensics. International Journal of Electronic Security and Digital Forensics. 5 (1), pp. 67-79. https://doi.org/10.1504/IJESDF.2013.054420Article
Software simulation and verification to increase the reliability of intelligent environments
Augusto, J. and Hornos, M. 2013. Software simulation and verification to increase the reliability of intelligent environments. Advances in Engineering Software. 58, pp. 18-34. https://doi.org/10.1016/j.advengsoft.2012.12.004Article
Using patterns position distribution for software failure detection
Li, C., Chen, Z., Du, H., Wang, H., Wilkie, G., Augusto, J. and Liu, J. 2013. Using patterns position distribution for software failure detection. International Journal of Computational Intelligence Systems. 6 (2), pp. 234-243. https://doi.org/10.1080/18756891.2013.768442Article
A sensor technology survey for a stress aware trading process
Fernandez, J., Augusto, J., Seepold, R. and Madrid, N. 2012. A sensor technology survey for a stress aware trading process. Transactions on Systems, Man and Cybernetics - Part C. 42 (6), pp. 809-824. https://doi.org/10.1109/TSMCC.2011.2179028Article
Discovering frequent user-environment interactions in intelligent environments
Aztiria, A., Augusto, J., Basagoiti, R., Izaguirre, A. and Cook, D. 2012. Discovering frequent user-environment interactions in intelligent environments. Personal and Ubiquitous Computing. 16 (1), pp. 91-103. https://doi.org/10.1007/s00779-011-0471-4Article
A linguistic truth-value temporal reasoning (LTR) system and its application to the design of an intelligent environment
Lu, Z., Augusto, J., Liu, J. and Wang, H. 2012. A linguistic truth-value temporal reasoning (LTR) system and its application to the design of an intelligent environment. International Journal of Computational Intelligence Systems. 5 (1), pp. 173-196. https://doi.org/10.1080/18756891.2012.670529Article
The Internet and pharmaceutical drugs in the era of interoperable eHealth systems across the European Union
George, C. 2013. The Internet and pharmaceutical drugs in the era of interoperable eHealth systems across the European Union. in: George, C., Whitehouse, D. and Duquenoy, P. (ed.) eHealth: Legal, Ethical and Governance Challenges Berlin, Germany Springer. pp. 135-164Book chapter
Assessing legal, ethical and governance challenges in eHealth
George, C., Whitehouse, D. and Duquenoy, P. 2013. Assessing legal, ethical and governance challenges in eHealth. in: George, C., Whitehouse, D. and Duquenoy, P. (ed.) eHealth: Legal, Ethical and Governance Challenges Berlin, Germany Springer. pp. 3-22Book chapter
Static verification of wireless sensor networks with formal methods
Testa, A., Coronato, A., Cinque, M. and Augusto, J. 2012. Static verification of wireless sensor networks with formal methods. 8th International Conference on Signal Image Technology and Internet Based Systems (SITIS 2012). Naples, Italy 25 - 29 Nov 2012 pp. 587-594Conference paper
Modeling eating disorders of cognitive impaired people
Coronato, A., De Pietro, G. and Augusto, J. 2012. Modeling eating disorders of cognitive impaired people. HumanCom'2012. Gwangju, South Korea pp. 165-172Conference paper
Designing for child resilience
Flick, C., Duquenoy, P. and Jones, M. 2012. Designing for child resilience. CHI’12. Austin, Texas, USA. 05 - 10 May 2012 Association for Computing Machinery (ACM). pp. 761-764 https://doi.org/10.1145/2212776.2212848Conference paper
KCMAC-BYY: Kernel CMAC using Bayesian Ying-Yang learning
Tian, K., Guo, B., Liu, G., Mitchell, I., Cheng, D. and Zhao, W. 2013. KCMAC-BYY: Kernel CMAC using Bayesian Ying-Yang learning. Neurocomputing. 101, pp. 24-31. https://doi.org/10.1016/j.neucom.2012.06.028Article
The lattice structure of sets of surjective hyper-operations
Martin, B. 2010. The lattice structure of sets of surjective hyper-operations. The 16th International Conference on Principles and Practice of Constraint Programming (CP 2010). St Andrews, Scotland 06 - 10 Sep 2010 Springer Verlag. https://doi.org/10.1007/978-3-642-15396-9_31Conference paper
Some topological properties of paraconsistent models
Baskent, C. 2013. Some topological properties of paraconsistent models. Synthese. 190 (18), pp. 4023-4040. https://doi.org/10.1007/s11229-013-0246-8Article
Justice and design
Duquenoy, P. and Thimbleby, H. 1999. Justice and design. in: Sasse, M. and Johnson, C. (ed.) Human-Computer Interaction INTERACT '99 Netherlands IOS Press. pp. 281-286Book chapter
Exploring service and buffer management issues to provide integrated voice and data services in single and multi channel wireless networks
Gemikonakli, E., Mapp, G., Gemikonakli, O. and Ever, E. 2013. Exploring service and buffer management issues to provide integrated voice and data services in single and multi channel wireless networks. The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013Conference paper
Enhancing the modelling of vertical handover in integrated cellular/WLAN environments
Kirsal, Y., Ever, E., Mapp, G. and Gemikonakli, O. 2013. Enhancing the modelling of vertical handover in integrated cellular/WLAN environments. The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013Conference paper
An efficient resource reservation for domain based mobile IP networks: analytical approach
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2013. An efficient resource reservation for domain based mobile IP networks: analytical approach. IEEE 77th Vehicular Technology Conference (VTC2013-Spring). Dresden, Germany 02 - 05 Jun 2013Conference paper
Distance constraint satisfaction problems
Bodirsky, M., Dalmau, V., Martin, B. and Pinsker, M. 2010. Distance constraint satisfaction problems. 35th International Symposium on Mathematical Foundations of Computer Science (MFCS 2010). Brno, Czech Republic 23 - 27 Aug 2010 Springer. pp. 162-173 https://doi.org/10.1007/978-3-642-15155-2_16Conference paper
The complexity of positive first-order logic without equality II: the four-element case
Martin, B. and Martin, J. 2010. The complexity of positive first-order logic without equality II: the four-element case. 24th International Workshop (CSL 2010), 19th Annual Conference of the EACSL. Brno, Czech Republic 23 - 27 Aug 2010 Springer. pp. 426-438 https://doi.org/10.1007/978-3-642-15205-4_33Conference paper
On the scope of the universal-algebraic approach to constraint satisfaction
Bodirsky, M., Hils, M. and Martin, B. 2010. On the scope of the universal-algebraic approach to constraint satisfaction. 25th Annual IEEE Symposium on Logic in Computer Science (LICS 2010). Edinburgh 11 - 14 Jul 2010 Institute of Electrical and Electronics Engineers. pp. 90-99 https://doi.org/10.1109/LICS.2010.13Conference paper
The limits of tractability in resolution-based propositional proof systems
Dantchev, S. and Martin, B. 2010. The limits of tractability in resolution-based propositional proof systems. 6th International Conference on Computability in Europe: Programs, Proofs, Processes (CIE 2010). Portugal 30 Jun - 04 Jul 2010Conference paper
A tetrachotomy for positive first-order logic without equality
Madelaine, F. and Martin, B. 2011. A tetrachotomy for positive first-order logic without equality. 26th Annual IEEE Symposium on Logic in Computer Science (LICS 2011). Ontario, Canada 21 - 24 Jun 2011 IEEE. pp. 311-320 https://doi.org/10.1109/LICS.2011.27Conference paper
QCSP on partially reflexive forests
Martin, B. 2011. QCSP on partially reflexive forests. The 17th International Conference on Principles and Practice of Constraint Programming (CP 2011). Perugia, Italy 12 - 16 Sep 2011 Springer. pp. 546-560 https://doi.org/10.1007/978-3-642-23786-7_42Conference paper
The computational complexity of disconnected cut and 2K2-partition
Martin, B. and Paulusma, D. 2011. The computational complexity of disconnected cut and 2K2-partition. The 17th International Conference on Principles and Practice of Constraint Programming (CP 2011). Perugia, Italy 12 - 16 Sep 2011 Springer. pp. 561-575 https://doi.org/10.1007/978-3-642-23786-7_43Conference paper
Support tensor action spotting
Kotsia, I. and Patras, I. 2012. Support tensor action spotting. IEEE International Conference on Image Processing (ICIP 2012). Orlando, FL, USA 30 Sep - 03 Oct 2012Conference paper
Exploring the similarities of neighboring spatiotemporal points for action pair matching
Kotsia, I. and Patras, I. 2012. Exploring the similarities of neighboring spatiotemporal points for action pair matching. 11th Asian Conference on Computer Vision (ACCV 2012). Daejeon, Korea 05 - 09 Nov 2012Conference paper
An integrated approach to QoS and security in future mobile networks using the Y-Comm framework
Aiash, M. 2012. An integrated approach to QoS and security in future mobile networks using the Y-Comm framework. PhD thesis Middlesex UniversityPhD thesis
Quantified constraints and containment problems
Chen, H., Madelaine, F. and Martin, B. 2008. Quantified constraints and containment problems. 23rd Annual IEEE Symposium on Logic in Computer Science (LICS 2008). Pittsburgh, PA, USA 24 - 27 Jun 2008 IEEE. pp. 317-328 https://doi.org/10.1109/LICS.2008.15Conference paper
First-order model checking problems parameterized by the model
Martin, B. 2008. First-order model checking problems parameterized by the model. The 4th Conference on Computability in Europe: Logic and Theory of Algorithms (CiE 2008). University of Athens, Greece 15 - 20 Jun 2008 Springer. pp. 417-427 https://doi.org/10.1007/978-3-540-69407-6_45Conference paper
Recognition of facial expressions in presence of partial occlusion
Buciu, I., Kotsia, I. and Pitas, I. 2003. Recognition of facial expressions in presence of partial occlusion. 9th Panhellenic Conference in Informatics (PCI 2003). Thessaloniki 21 - 23 Nov 2003Conference paper
155364
total views30565
total downloads12671
views this month1359
downloads this month