Computer Science


TitleComputer Science
AlternativeS&T - CS
FacultyFaculty of Science and Technology

Latest research outputs

Sort by Date Title
Patients, trust and ethics in information privacy in eHealth
Duquenoy, P., Mekawie, N. and Springett, M. 2013. Patients, trust and ethics in information privacy in eHealth. in: George, C., Whitehouse, D. and Duquenoy, P. (ed.) eHealth: legal, ethical and governance challenges Germany Springer. pp. 275-295

Book chapter

Using aggregated RSVP in nested HMIPv6
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2012. Using aggregated RSVP in nested HMIPv6. Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International. IEEE. pp. 716 -721 https://doi.org/10.1109/IWCMC.2012.6314292

Conference paper

A security model for functional active objects
Kammueller, F. 2012. A security model for functional active objects. Francisco, C., Kim, V., Miguel, C. and Andreas, K. (ed.) First International Symposium Communicability, Computer Graphics and Innovative Design for Interactive Systems (CCGIDIS 2011). Berlin Springer. https://doi.org/10.1007/978-3-642-33760-4_4

Conference paper

On knowledge and obligation
Baskent, C., Olde Loohuis, L. and Parikh, R. 2012. On knowledge and obligation. Episteme. 9 (2), pp. 171-188. https://doi.org/10.1017/epi.2012.7

Article

Looking to score: the dissociation of goal influence on eye movement and meta-attentional allocation in a complex dynamic natural scene
Taya, S., Windridge, D. and Osman, M. 2012. Looking to score: the dissociation of goal influence on eye movement and meta-attentional allocation in a complex dynamic natural scene. PLoS ONE. 7 (6). https://doi.org/10.1371/journal.pone.0039060

Article

Conversational spaces for learning and designing
Fields, B., Bardill, A. and Jones, S. 2010. Conversational spaces for learning and designing. CHI2010 Workshop on New Generation of HCI and Education. Atlanta, GA, USA 10 - 15 Apr 2010

Conference paper

Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments
Mapp, G., Katsriku, F., Aiash, M., Chinnam, N., Lopes, R., Moreira, E., Vanni, R., Augusto, M., Middlesex University and University of Sao Paulo 2012. Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments. Journal of Computer Networks and Communications. https://doi.org/10.1155/2012/748163

Article

Retrieval of 3D medical images via their texture features
Gao, X., Qian, Y., Loomes, M., Barn, B., Comley, R., Chapman, A., Rix, J., Hui, R. and Tian, Z. 2012. Retrieval of 3D medical images via their texture features. International Journal on Advances in Software. 4 (3&4), pp. 499-509.

Article

Interactive visualization for low literacy users: from lessons learnt to design
Kodagoda, N., Wong, B., Rooney, C. and Khan, N. 2012. Interactive visualization for low literacy users: from lessons learnt to design. CHI '12 Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems. New York, NY, USA Association for Computing Machinery (ACM). pp. 1159-1168 https://doi.org/10.1145/2207676.2208565

Conference paper

A security model for functional active objects with an implementation in Erlang
Fleck, A. and Kammueller, F. 2011. A security model for functional active objects with an implementation in Erlang. in: Ficarra, F., Kratky, A., Veltman, K., Ficarra, M., Nicol, E. and Brie, M. (ed.) Computational informatics, social factors and new information technologies: hypermedia perspectives and avant-garde experiences in the era of communicability expansion Bergamo, Italy Blue Herons.

Book chapter

Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol.
Kammueller, F., Mapp, G., Patel, S. and Sani, A. 2012. Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol. International Conference on Internet Monitoring and Protection (ICIMP 2012). Stuttgart, Germany 27 May - 01 Jun 2012 Xpert Publishing Service.

Conference paper

A formally verified device authentication protocol using Casper/FDR
Aiash, M., Mapp, G., Phan, R., Lasebae, A. and Loo, J. 2012. A formally verified device authentication protocol using Casper/FDR. Min, G., Wu, Y., Liu, L., Jin, X., Jarvis, S. and Al-Dubai, A. (ed.) 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012). Liverpool, UK 25 - 27 Jun 2012 IEEE. pp. 1293-1298 https://doi.org/10.1109/TrustCom.2012.27

Conference paper

Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011
Kammueller, F. 2012. Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011. Mathematical Reviews.

Article

Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010.
Kammueller, F. 2012. Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010. Mathematical Reviews.

Article

A locally nameless theory of objects
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. A locally nameless theory of objects. SAFA Annual Workshop on Formal Techniques (SAFA’2010). 2229 Route des Crêtes, 06560, Valbonne, Provence-Alpes-Côte d'Azur, France

Conference paper

Locally nameless sigma calculus
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. Locally nameless sigma calculus. Archive of Formal Proof.

Article

Formalizing statecharts using hierarchical automata
Helke, S. and Kammueller, F. 2010. Formalizing statecharts using hierarchical automata. Archive of Formal Proof.

Article

Radius-SHA256 – verified remote authentication with secure hashing.
Kammueller, F. and Patel, S. 2011. Radius-SHA256 – verified remote authentication with secure hashing. First Global Conference on Communication, Science and Information Engineering, CCSIE’11. Middlesex University 25 - 27 Jul 2011

Conference paper

ASPfun: a typed functional active object calculus
Henrio, L., Kammueller, F. and Lutz, B. 2012. ASPfun: a typed functional active object calculus. Science of Computer Programming. 77 (7-8), pp. 823-847. https://doi.org/10.1016/j.scico.2010.12.008

Article

Application of verification techniques to security: model checking insider attacks
Kammueller, F., Probst, C. and Raimondi, F. 2012. Application of verification techniques to security: model checking insider attacks. 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability. Venice, Italy 28 - 29 Mar 2012 Blue Herons editions.

Conference paper

A software based solution to facilitate end to end information supply chain visibility
Khan, N., Silva, S. and Kandl, T. 2012. A software based solution to facilitate end to end information supply chain visibility. Chen, J. and Su, Q. (ed.) 9th IEEE International Conference on Service System and Service Management (ICSSSM, 2012). Shanghai, China IEEE. pp. 850-855 https://doi.org/10.1109/ICSSSM.2012.6252359

Conference paper

A survey of potential architectures for communication in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A., Loo, J., Sardis, F., Phan, R., Augusto, M., Moreira, E. and Vanni, R. 2012. A survey of potential architectures for communication in heterogeneous networks. IEEE Wireless Telecommunications Symposium (WTS 2012). London 18 - 20 Apr 2012 IEEE. pp. 1-6 https://doi.org/10.1109/WTS.2012.6266121

Conference paper

Certification or conformance: making a successful commitment to WCAG 2.0
Keith, S., Floratos, N. and Whitney, G. 2012. Certification or conformance: making a successful commitment to WCAG 2.0. Vigo, M., Abascal, J., Lopes, R. and Salomoni, P. (ed.) 9th International Cross-Disciplinary Conference on Web Accessibility. Lyon, France 16 - 17 Apr 2012 New York Association for Computing Machinery (ACM). https://doi.org/10.1145/2207016.2207029

Conference paper

Mediation role of boundary objects in articulating common information spaces.
Selvaraj, N. and Fields, B. 2010. Mediation role of boundary objects in articulating common information spaces. Workshop held in conjunction with the 9th International Conference on the Designing Cooperative Systems (COOP 2010). Aix-en-Provence, France 18 - 21 May 2010

Conference paper

Le paradoxe de l’incertitude, quand moins signifie plus
Dalcher, D. 2009. Le paradoxe de l’incertitude, quand moins signifie plus. Génie Logiciel.

Article

La paradoja de la incertidumbre: ¿cuándo menos significa más?
Dalcher, D. 2011. La paradoja de la incertidumbre: ¿cuándo menos significa más? Novatica. XXXVII (209), pp. 49-55.

Article

Interacting with Information.
Blandford, A. and Attfield, S. 2010. Interacting with Information. Synthesis Lectures on Human-Centered Informatics. 3 (1), pp. 1-99. https://doi.org/10.2200/S00227ED1V01Y200911HCI006

Article

Towards a science of user engagement.
Attfield, S., Kazai, G., Lalmas, M. and Piwowarski, B. 2011. Towards a science of user engagement. UMWA 2011: Workshop on User Modelling for Web Applications. Hong Kong, China 09 - 12 Feb 2011

Conference paper

Evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network
Ghosh, A., Lasebae, A. and Ever, E. 2009. Evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network. Kaspersky IT Security Conference for the Next Generation.

Conference paper

Critical review of analytical modelling approaches for performability evaluation of the handover phenomena in mobile communication systems
Kirsal, Y., Ever, E., Gemikonakli, O. and Mapp, G. 2011. Critical review of analytical modelling approaches for performability evaluation of the handover phenomena in mobile communication systems. IEEE International Conference on Computer and Information Technology (CIT 2011). pp. 132-137 https://doi.org/10.1109/CIT.2011.45

Conference paper

Biological network visualisation.
Xu, K. 2012. Biological network visualisation. 3rd Annual Visualizing Biological Data Conference (VizBi2012). Heidelberg, Germany 06 - 08 Mar 2012

Conference poster

Information seeking behaviour model as a theoretical lens: high and low literate users behaviour process analysed.
Kodagoda, N., Wong, B. and Khan, N. 2010. Information seeking behaviour model as a theoretical lens: high and low literate users behaviour process analysed. in: ECCE '10: Proceedings of the 28th Annual European Conference on Cognitive Ergonomics. Association for Computing Machinery (ACM). pp. 117-124

Book chapter

Open-­card sort to explain why low-literate users abandon their web searches early.
Kodagoda, N., Wong, B. and Khan, N. 2010. Open-­card sort to explain why low-literate users abandon their web searches early. in: BCS'10: Proceedings of the 24th BCS Interaction Specialist Group Conference. British Computer Society. pp. 433-442

Book chapter

Modelling and performability analysis of WLANs as a queuing model with channel/access point failures and reconfiguration
Kirsal, Y., Ever, E., Gemikonakli, O. and Mapp, G. 2011. Modelling and performability analysis of WLANs as a queuing model with channel/access point failures and reconfiguration. EMS. Los Alamitos, CA IEEE Computer Society. pp. 440-445 https://doi.org/10.1109/EMS.2011.33

Conference paper

Security and QoS integration for protecting service providers in hterogeneous environments
Aiash, M., Mapp, G. and Lasebae, A. 2011. Security and QoS integration for protecting service providers in hterogeneous environments. International Journal of Computer Science. 38 (4), pp. 384-393.

Article

When enough is enough: time-restricted sensemaking in underground railway control
Attfield, S., Pagnacco, F. and Benedyk, R. 2011. When enough is enough: time-restricted sensemaking in underground railway control. 10th International Conference on Naturalistic Decision Making. Orlando, FL, USA 31 May - 03 Jun 2011

Conference poster

Evaluating the information behaviour methods: formative evaluations of two methods for assessing the functionality and usability of electronic information resources
Makri, S., Blandford, A., Cox, A., Attfield, S. and Warwick, C. 2011. Evaluating the information behaviour methods: formative evaluations of two methods for assessing the functionality and usability of electronic information resources. International Journal of Human-Computer Studies. 69 (7-8), pp. 455-482. https://doi.org/10.1016/j.ijhcs.2011.04.004

Article

Provenance for intelligence analysis using visual analytics.
Wong, B., Xu, K. and Attfield, S. 2011. Provenance for intelligence analysis using visual analytics. CHI 2011: Workshop on Analytic Provenance. Vancouver, BC, Canada 07 - 08 May 2011

Conference paper

Interactive visualization for information analysis in medical diagnosis
Wong, B., Xu, K. and Holzinger, A. 2011. Interactive visualization for information analysis in medical diagnosis. Workshop on Human-Computer Interaction & Knowledge Discovery and Data Mining (HCI-KDD). Graz, Austria 24 Nov 2011

Conference paper

INVISQUE: Intuitive information exploration through interactive visualization
Wong, B., Chen, R., Kodagoda, N., Rooney, C. and Xu, K. 2011. INVISQUE: Intuitive information exploration through interactive visualization. The ACM CHI Conference on Human Factors in Computing Systems. Vancouver, BC, Canada 07 - 12 May 2011

Conference paper