Computer Science


TitleComputer Science
AlternativeS&T - CS
FacultyFaculty of Science and Technology

Latest research outputs

Sort by Date Title
Explanation of two non-blocking shared-variable communication algorithms
Bornat, R. and Amjad, H. 2011. Explanation of two non-blocking shared-variable communication algorithms. Formal Aspects of Computing. https://doi.org/10.1007/s00165-011-0213-4

Article

Hierarchies in fragments of monadic strict NP
Martin, B. and Madelaine, F. 2007. Hierarchies in fragments of monadic strict NP. in: Cooper, B., Löwe, B. and Sorbi, A. (ed.) Computation and logic in the real world: Third Conference on Computability in Europe, CiE 2007, Siena, Italy, June 18-23, 2007, Proceedings Springer Berlin. Heidelberg.

Book chapter

Governance in technology development
Kurt, A. and Duquenoy, P. 2013. Governance in technology development. in: Doridot, F., Duquenoy, P., Goujon, P., Kurt, A., Lavelle, S., Patrignani, N., Rainey, S. and Santuccio, A. (ed.) Ethical governance of emerging technologies development Hershey IGI Global. pp. 149-165

Book chapter

Evaluation of collaborative filtering algorithms using a small dataset
Roda, F., Liberti, L. and Raimondi, F. 2011. Evaluation of collaborative filtering algorithms using a small dataset. WEBIST 2011. http://www.webist.org/WEBIST2011/

Conference paper

Trialling the SMART approach: identifying and assessing sense-making
Wong, B., Kodagoda, N., Rooney, C., Attfield, S. and Choudhury, S. 2013. Trialling the SMART approach: identifying and assessing sense-making. 2013 International Annual Meeting of the Human Factors and Ergonomics Society. San Diego, CA, USA 30 Sep - 04 Oct 2013

Conference paper

A novel security protocol for resolving addresses in the location/ID split architecture
Aiash, M. 2013. A novel security protocol for resolving addresses in the location/ID split architecture. The 7th International Conference on Network and System Security (NSS 2013). Spain 03 - 04 Jun 2013

Conference paper

Securing address registration in location/ID split protocol using ID-based cryptography
Aiash, M., Al-Nemrat, A. and Preston, D. 2013. Securing address registration in location/ID split protocol using ID-based cryptography. Tsaoussidis, V., Kassler, A., Koucheryavy, Y. and Mellouk, A. (ed.) In proceeding of: The 11th International Conference on Wired/Wireless Internet Communications WWIC 2013. Russia 05 - 07 Jun 2013 Springer. https://doi.org/10.1007/978-3-642-38401-1_10

Conference paper

Ordering based decision making: a survey
Chen, S., Liu, J., Wang, H. and Augusto, J. 2013. Ordering based decision making: a survey. Information Fusion. 14 (4), pp. 521-531. https://doi.org/10.1016/j.inffus.2012.10.005

Article

Procedural aspects of the new regime for the admissibility of expert evidence: what the digital forensic expert needs to know
Sallavaci, O. and George, C. 2013. Procedural aspects of the new regime for the admissibility of expert evidence: what the digital forensic expert needs to know. International Journal of Electronic Security and Digital Forensics. 5 (3/4), pp. 161-171. https://doi.org/10.1504/IJESDF.2013.058645

Article

New admissibility regime for expert evidence: the likely impact on digital forensics
Sallavaci, O. and George, C. 2013. New admissibility regime for expert evidence: the likely impact on digital forensics. International Journal of Electronic Security and Digital Forensics. 5 (1), pp. 67-79. https://doi.org/10.1504/IJESDF.2013.054420

Article

Software simulation and verification to increase the reliability of intelligent environments
Augusto, J. and Hornos, M. 2013. Software simulation and verification to increase the reliability of intelligent environments. Advances in Engineering Software. 58, pp. 18-34. https://doi.org/10.1016/j.advengsoft.2012.12.004

Article

Using patterns position distribution for software failure detection
Li, C., Chen, Z., Du, H., Wang, H., Wilkie, G., Augusto, J. and Liu, J. 2013. Using patterns position distribution for software failure detection. International Journal of Computational Intelligence Systems. 6 (2), pp. 234-243. https://doi.org/10.1080/18756891.2013.768442

Article

A sensor technology survey for a stress aware trading process
Fernandez, J., Augusto, J., Seepold, R. and Madrid, N. 2012. A sensor technology survey for a stress aware trading process. Transactions on Systems, Man and Cybernetics - Part C. 42 (6), pp. 809-824. https://doi.org/10.1109/TSMCC.2011.2179028

Article

Discovering frequent user-environment interactions in intelligent environments
Aztiria, A., Augusto, J., Basagoiti, R., Izaguirre, A. and Cook, D. 2012. Discovering frequent user-environment interactions in intelligent environments. Personal and Ubiquitous Computing. 16 (1), pp. 91-103. https://doi.org/10.1007/s00779-011-0471-4

Article

A linguistic truth-value temporal reasoning (LTR) system and its application to the design of an intelligent environment
Lu, Z., Augusto, J., Liu, J. and Wang, H. 2012. A linguistic truth-value temporal reasoning (LTR) system and its application to the design of an intelligent environment. International Journal of Computational Intelligence Systems. 5 (1), pp. 173-196. https://doi.org/10.1080/18756891.2012.670529

Article

The Internet and pharmaceutical drugs in the era of interoperable eHealth systems across the European Union
George, C. 2013. The Internet and pharmaceutical drugs in the era of interoperable eHealth systems across the European Union. in: George, C., Whitehouse, D. and Duquenoy, P. (ed.) eHealth: Legal, Ethical and Governance Challenges Berlin, Germany Springer. pp. 135-164

Book chapter

Assessing legal, ethical and governance challenges in eHealth
George, C., Whitehouse, D. and Duquenoy, P. 2013. Assessing legal, ethical and governance challenges in eHealth. in: George, C., Whitehouse, D. and Duquenoy, P. (ed.) eHealth: Legal, Ethical and Governance Challenges Berlin, Germany Springer. pp. 3-22

Book chapter

Static verification of wireless sensor networks with formal methods
Testa, A., Coronato, A., Cinque, M. and Augusto, J. 2012. Static verification of wireless sensor networks with formal methods. 8th International Conference on Signal Image Technology and Internet Based Systems (SITIS 2012). Naples, Italy 25 - 29 Nov 2012 pp. 587-594

Conference paper

Modeling eating disorders of cognitive impaired people
Coronato, A., De Pietro, G. and Augusto, J. 2012. Modeling eating disorders of cognitive impaired people. HumanCom'2012. Gwangju, South Korea pp. 165-172

Conference paper

Designing for child resilience
Flick, C., Duquenoy, P. and Jones, M. 2012. Designing for child resilience. CHI’12. Austin, Texas, USA. 05 - 10 May 2012 Association for Computing Machinery (ACM). pp. 761-764 https://doi.org/10.1145/2212776.2212848

Conference paper

KCMAC-BYY: Kernel CMAC using Bayesian Ying-Yang learning
Tian, K., Guo, B., Liu, G., Mitchell, I., Cheng, D. and Zhao, W. 2013. KCMAC-BYY: Kernel CMAC using Bayesian Ying-Yang learning. Neurocomputing. 101, pp. 24-31. https://doi.org/10.1016/j.neucom.2012.06.028

Article

The lattice structure of sets of surjective hyper-operations
Martin, B. 2010. The lattice structure of sets of surjective hyper-operations. The 16th International Conference on Principles and Practice of Constraint Programming (CP 2010). St Andrews, Scotland 06 - 10 Sep 2010 Springer Verlag. https://doi.org/10.1007/978-3-642-15396-9_31

Conference paper

Some topological properties of paraconsistent models
Baskent, C. 2013. Some topological properties of paraconsistent models. Synthese. 190 (18), pp. 4023-4040. https://doi.org/10.1007/s11229-013-0246-8

Article

Justice and design
Duquenoy, P. and Thimbleby, H. 1999. Justice and design. in: Sasse, M. and Johnson, C. (ed.) Human-Computer Interaction INTERACT '99 Netherlands IOS Press. pp. 281-286

Book chapter

Exploring service and buffer management issues to provide integrated voice and data services in single and multi channel wireless networks
Gemikonakli, E., Mapp, G., Gemikonakli, O. and Ever, E. 2013. Exploring service and buffer management issues to provide integrated voice and data services in single and multi channel wireless networks. The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013

Conference paper

Enhancing the modelling of vertical handover in integrated cellular/WLAN environments
Kirsal, Y., Ever, E., Mapp, G. and Gemikonakli, O. 2013. Enhancing the modelling of vertical handover in integrated cellular/WLAN environments. The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013

Conference paper

An efficient resource reservation for domain based mobile IP networks: analytical approach
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2013. An efficient resource reservation for domain based mobile IP networks: analytical approach. IEEE 77th Vehicular Technology Conference (VTC2013-Spring). Dresden, Germany 02 - 05 Jun 2013

Conference paper

Distance constraint satisfaction problems
Bodirsky, M., Dalmau, V., Martin, B. and Pinsker, M. 2010. Distance constraint satisfaction problems. 35th International Symposium on Mathematical Foundations of Computer Science (MFCS 2010). Brno, Czech Republic 23 - 27 Aug 2010 Springer. pp. 162-173 https://doi.org/10.1007/978-3-642-15155-2_16

Conference paper

The complexity of positive first-order logic without equality II: the four-element case
Martin, B. and Martin, J. 2010. The complexity of positive first-order logic without equality II: the four-element case. 24th International Workshop (CSL 2010), 19th Annual Conference of the EACSL. Brno, Czech Republic 23 - 27 Aug 2010 Springer. pp. 426-438 https://doi.org/10.1007/978-3-642-15205-4_33

Conference paper

On the scope of the universal-algebraic approach to constraint satisfaction
Bodirsky, M., Hils, M. and Martin, B. 2010. On the scope of the universal-algebraic approach to constraint satisfaction. 25th Annual IEEE Symposium on Logic in Computer Science (LICS 2010). Edinburgh 11 - 14 Jul 2010 Institute of Electrical and Electronics Engineers. pp. 90-99 https://doi.org/10.1109/LICS.2010.13

Conference paper

The limits of tractability in resolution-based propositional proof systems
Dantchev, S. and Martin, B. 2010. The limits of tractability in resolution-based propositional proof systems. 6th International Conference on Computability in Europe: Programs, Proofs, Processes (CIE 2010). Portugal 30 Jun - 04 Jul 2010

Conference paper

A tetrachotomy for positive first-order logic without equality
Madelaine, F. and Martin, B. 2011. A tetrachotomy for positive first-order logic without equality. 26th Annual IEEE Symposium on Logic in Computer Science (LICS 2011). Ontario, Canada 21 - 24 Jun 2011 IEEE. pp. 311-320 https://doi.org/10.1109/LICS.2011.27

Conference paper

QCSP on partially reflexive forests
Martin, B. 2011. QCSP on partially reflexive forests. The 17th International Conference on Principles and Practice of Constraint Programming (CP 2011). Perugia, Italy 12 - 16 Sep 2011 Springer. pp. 546-560 https://doi.org/10.1007/978-3-642-23786-7_42

Conference paper

The computational complexity of disconnected cut and 2K2-partition
Martin, B. and Paulusma, D. 2011. The computational complexity of disconnected cut and 2K2-partition. The 17th International Conference on Principles and Practice of Constraint Programming (CP 2011). Perugia, Italy 12 - 16 Sep 2011 Springer. pp. 561-575 https://doi.org/10.1007/978-3-642-23786-7_43

Conference paper

Support tensor action spotting
Kotsia, I. and Patras, I. 2012. Support tensor action spotting. IEEE International Conference on Image Processing (ICIP 2012). Orlando, FL, USA 30 Sep - 03 Oct 2012

Conference paper

Exploring the similarities of neighboring spatiotemporal points for action pair matching
Kotsia, I. and Patras, I. 2012. Exploring the similarities of neighboring spatiotemporal points for action pair matching. 11th Asian Conference on Computer Vision (ACCV 2012). Daejeon, Korea 05 - 09 Nov 2012

Conference paper

An integrated approach to QoS and security in future mobile networks using the Y-Comm framework
Aiash, M. 2012. An integrated approach to QoS and security in future mobile networks using the Y-Comm framework. PhD thesis Middlesex University

PhD thesis

Quantified constraints and containment problems
Chen, H., Madelaine, F. and Martin, B. 2008. Quantified constraints and containment problems. 23rd Annual IEEE Symposium on Logic in Computer Science (LICS 2008). Pittsburgh, PA, USA 24 - 27 Jun 2008 IEEE. pp. 317-328 https://doi.org/10.1109/LICS.2008.15

Conference paper

First-order model checking problems parameterized by the model
Martin, B. 2008. First-order model checking problems parameterized by the model. The 4th Conference on Computability in Europe: Logic and Theory of Algorithms (CiE 2008). University of Athens, Greece 15 - 20 Jun 2008 Springer. pp. 417-427 https://doi.org/10.1007/978-3-540-69407-6_45

Conference paper

Recognition of facial expressions in presence of partial occlusion
Buciu, I., Kotsia, I. and Pitas, I. 2003. Recognition of facial expressions in presence of partial occlusion. 9th Panhellenic Conference in Informatics (PCI 2003). Thessaloniki 21 - 23 Nov 2003

Conference paper

  • 155364
    total views
  • 30565
    total downloads
  • 12671
    views this month
  • 1359
    downloads this month

People

Ademola, Adetunji

Agada, Stephen

Aiash, Mahdi

Alam, Amjad

Ali, Almaas Abdullahi

Ali, Almaas

Ali, Kamran

Alpan, Kezban

Alzazah, Faten

Androutsopoulos, Kelly

Aristodemou, Leonidas

Arusi, Ihab

Arusi, Usama

Attfield, Simon

Augusto, Juan Carlos

Baskent, Can

Batool, Faryal

Belavkin, Roman

Bornat, Richard

Bottone, Michele

Chadebecq, Francois

Cheng, Xiaochun

Chennareddy, Vijay Simha Reddy

Colson, Robert

Cui, Di

Currie, Edward

Dack, John

Dafoulas, George

Dalcher, Darren

Daryanani, Padma

De Raffaele, Clifford

Duncker-Gassen, Elke

Duquenoy, Penny

Eissa, Ahmed

Evans, Carl

Fields, Bob

Gamez, David

Gao, Xiaohong

George, Carlisle

Georgiadou, Elli

Gkorogiannis, Kyriakos Nikolaos

Hall, Stephen

Ham, Dong-Han

Hara, Sukhvinder

Hashimyar, Mohammad

Heeney, Michael

Huyck, Chris

James-Reynolds, Carl

Ji, Yuehu

Jones, Simon

Joy, Geethu

Jusob, Farad

Kammueller, Florian

Kapetanakis, Stylianos

Kasekende, Usama

Khan, Nawaz

Khoshkholghi, Ali

Kiyani, Anum

Kotsia, Irene

Kruger, Antony

Langari, Bahareh

Lasebae, Aboubaker

Lewis-Smith, Andrew

Loveday, Joanna

Luo, Yuan Roger

Maia, Cristiano

Mapp, Glenford

Marc, Silviu

Martin, Barnaby

Mathusan, Mithila

Menendez Benito, Hector

Minocha, Shailey

Mistry, Kajal

Mistry, Kajal

Mitchell, Ian

Moedeen, Waseemah

Mohajer Ashjaei, Babak

Moseley, Ralph

Mpungu, Cephas

Nagarajan, Raja

Nalli, Giacomo

Neilson, David

Niazi, Noman

Nnawuchi, Uchenna

Oluwagbemi, Olugbenga

Opoku-Brobbey, Michael

Panagakis, Ioannis

Passmore, Peter

Philpot, Adam

Piras, Luca

Quattrone, Giovanni

Rahanu, Harjinder

Raheem, Rand

Rahman, Shahedur

Raimondi, Franco

Ramanna, Sailendra

Sharma, Mrinal

Smith, Serengul

Springett, Mark

Sule, Clifford

Tahmasebi Aria, Farzad

Tirunagari, Santosh

Tsiakara, Ariadni

Tsiakara, Ariadni

Whitney, Gill

Wieclaw, Anna

Windridge, David

Wong, Beng

Xu, Kai

Yetgin, Halil

Zammit, Omar

Zhang, Leishi

Zhang, Xiaojuan

Zhou, Suiping