Computer Science


TitleComputer Science
AlternativeS&T - CS
FacultyFaculty of Science and Technology

Latest research outputs

Sort by Date Title
Exploiting contextual handover information for versatile services in NGN environments.
Moreira, E., Cottingham, D., Crowcroft, J., Hui, P., Mapp, G., Vanni, R. and Institute of Electrical and Electronics Engineers 2007. Exploiting contextual handover information for versatile services in NGN environments. in: Digital Information Management, 2007. ICDIM '07. 2nd International Conference. IEEE Computer Society. pp. 506-512

Book chapter

Multi-associative memory in fLIF cell assemblies.
Huyck, C. and Nadh, K. 2009. Multi-associative memory in fLIF cell assemblies. 9th International Conference on Cognitive Modeling. Manchester 24 - 26 Jul 2009

Conference paper

The challenge of mainstreaming ICT design for all.
Whitney, G., Keith, S. and Schmidt-Belz, B. 2010. The challenge of mainstreaming ICT design for all. Miesenberger, K., Klaus, J., Zagler, W. and Karshmer, A. (ed.) 12th International Conference on Computers Helping People with Special Needs (ICCHP 2010). Vienna University of Technology, Austria 12 - 16 Jul 2010 Springer. https://doi.org/10.1007/978-3-642-14097-6_94

Conference paper

Processing with cell assemblies
Byrne, E. and Huyck, C. 2010. Processing with cell assemblies. Neurocomputing. 74 (1-3), pp. 76-83. https://doi.org/10.1016/j.neucom.2009.09.024

Article

Electronic medical records: addressing privacy & security concerns in the UK and US
George, C. and Berčič, B. 2009. Electronic medical records: addressing privacy & security concerns in the UK and US. BILETA 2009 - To Infinity and Beyond: Law and Technology in Harmony?. University of Winchester, UK 21 - 23 Apr 2009

Conference paper

Illegal activities, preventative technologies & ISP immunity: where should the buck stop?
George, C. 2008. Illegal activities, preventative technologies & ISP immunity: where should the buck stop? BILETA 2008: the 23rd annual conference. Glasgow Caledonian University 27 - 28 Mar 2008

Conference paper

Regulatory challenges in the era of the convergence of telecommunications, broadcasting and information
George, C. 2007. Regulatory challenges in the era of the convergence of telecommunications, broadcasting and information. 15th Telecommunications Forum, TELFOR 2007. Belgrade, Serbia 20 - 22 Nov 2007

Conference paper

Legal challenges of cybercrime
George, C. 2007. Legal challenges of cybercrime. 15th Telecommunications Forum, TELFOR 2007. Sava Centre, Belgrade, Serbia 20 - 22 Nov 2007

Conference paper

Players’ image management in the UK football industry
Futre, D., George, C. and Coathup, R. 2007. Players’ image management in the UK football industry. 15th Congress of the European Sports Management Association (EASM 2007). Torino, Italy 12 - 15 Sep 2007

Conference paper

Data protection: peeking over the study cubicle online!
George, C. 2005. Data protection: peeking over the study cubicle online! JISClegal: Legal Issues of Online Learning Environments.. University of Warwick, UK 01 - 02 Jun 2005 pp. 4-5

Conference paper

Online healthcare: internet pharmacies may not be good for your health
George, C. 2005. Online healthcare: internet pharmacies may not be good for your health. in: Zielinski, C., Duquenoy, P. and Kimppa, K. (ed.) The information society: emerging landscapes: IFIP International Conference on Landscapes of ICT and Social Accountability, Turku, Finland, June 27-29, 2005. Netherlands Springer.

Book chapter

Copyright management systems: assessing the power balance.
George, C. 2005. Copyright management systems: assessing the power balance. in: Zielinski, C., Duquenoy, P. and Kimppa, K. (ed.) The information society: emerging landscapes: IFIP International Conference on Landscapes of ICT and Social Accountability, Turku, Finland, June 27-29, 2005. New York Springer.

Book chapter

Pursuing electronic health: a UK primary health care perspective
Ndeti, M. and George, C. 2005. Pursuing electronic health: a UK primary health care perspective. in: Funabashi, M. and Grzech, A. (ed.) Challenges of expanding Internet: e-commerce, e-business, and e-government: 5th IFIP Conference on e-Commerce, e-Business, and e-Government (13E'2005), October 28-30, 2005, Poznan, Poland. New York Springer.

Book chapter

Challenges of identity theft in the information society.
Jahankhani, H. and George, C. 2008. Challenges of identity theft in the information society. in: Kiekegaard, S. (ed.) Synergies and conflicts in cyberlaw. International Association of IT Lawyers. pp. 42-51

Book chapter

Ethical, legal and social issues in medical informatics.
Duquenoy, P., George, C. and Kimppa, K. 2008. Ethical, legal and social issues in medical informatics. Hershey, PA. Medical Information Science Reference.

Book

Compiling medical data into national medical databases: legitimate practice or data protection concern?
Berčič, B. and George, C. 2008. Compiling medical data into national medical databases: legitimate practice or data protection concern? in: Duquenoy, P., George, C. and Kimppa, K. (ed.) Ethical, legal and social issues in medical informatics Hershey, PA. Medical Information Science Reference. pp. 228-247

Book chapter

The secret santa problem.
Liberti, L. and Raimondi, F. 2008. The secret santa problem. Lecture Notes in Computer Science. 5034, pp. 271-279. https://doi.org/10.1007/978-3-540-68880-8_26

Article

Algorithms for efficient symbolic detection of faults in context-aware applications.
Sama, M., Raimondi, F., Rosenblum, D. and Emmerich, W. 2008. Algorithms for efficient symbolic detection of faults in context-aware applications. in: Automated Software Engineering - Workshops, 2008. ASE Workshops 2008. 23rd IEEE/ACM International Conference. Institute of Electrical and Electronics Engineers. pp. 1-8

Book chapter

Service-level agreements for electronic services
Skene, J., Raimondi, F. and Emmerich, W. 2010. Service-level agreements for electronic services. IEEE Transactions on Software Engineering. 36 (2), pp. 288-304. https://doi.org/10.1109/TSE.2009.55

Article

PDVer, a tool to verify PDDL planning domains.
Raimondi, F., Pecheur, C. and Brat, G. 2009. PDVer, a tool to verify PDDL planning domains. ICAPS'09 Workshop on Verification and Validation of Planning and Scheduling Systems. Thessaloniki, Greece 20 Sep 2009

Conference paper

The Anonymous subgraph problem.
Bettinelli, A., Liberti, L., Raimondi, F. and Savourey, D. 2009. The Anonymous subgraph problem. Cologne Twente Workshop 2009: 8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization. Paris 02 - 04 Jun 2009 pp. 269-274

Conference paper

Combinatorial optimization based recommender systems.
Roda, F., Liberti, L. and Raimondi, F. 2009. Combinatorial optimization based recommender systems. Cologne Twente Workshop 2009: 8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization. Paris 02 - 04 Jun 2009 pp. 175-179

Conference paper

A model to design and verify context-aware adaptive service composition.
Cubo, J., Sama, M., Raimondi, F. and Rosenblum, D. 2009. A model to design and verify context-aware adaptive service composition. 6th IEEE International Conference on Services Computing (SCC 2009). Bangalore 21 - 25 Sep 2009

Conference paper

Managing social irresponsibility in cyberspace: the walled garden approach
George, C. 2008. Managing social irresponsibility in cyberspace: the walled garden approach. The 11th International Symposium - Management and Social Responsibility, (SymOrg2008). Belgrade, Serbia 10 - 13 Sep 2008

Conference paper

Issues and challenges in securing interoperability of DRM systems in the digital music market
George, C. and Chandak, N. 2006. Issues and challenges in securing interoperability of DRM systems in the digital music market. International Review of Law Computers and Technology. 20 (3), pp. 271-285. https://doi.org/10.1080/13600860600852143

Article

Web 2.0 and user-generated content: legal challenges in the new frontier.
George, C. and Skerri, J. 2007. Web 2.0 and user-generated content: legal challenges in the new frontier. Journal of Information, Law and Technology.

Article

Internet pharmacies: global threat requires a global approach to regulation.
George, C. 2006. Internet pharmacies: global threat requires a global approach to regulation. Hertfordshire law journal. 4 (1), pp. 12-25.

Article

Identifying personal data using relational database design principles
Berčič, B. and George, C. 2009. Identifying personal data using relational database design principles. International Journal of Law and Information Technology. 17 (3), pp. 233-251. https://doi.org/10.1093/ijlit/ean007

Article

Investigating the legal protection of data, information and knowledge under the EU data protection regime
Berčič, B. and George, C. 2009. Investigating the legal protection of data, information and knowledge under the EU data protection regime. International Review of Law Computers and Technology. 23 (3), pp. 189-201. https://doi.org/10.1080/13600860903262255

Article

Change blindness and situation awareness in a police C2 environment.
Mancero, G., Wong, B. and Loomes, M. 2009. Change blindness and situation awareness in a police C2 environment. in: Norros, L. (ed.) ECCE 2009 - European Conference on Cognitive Ergonomics: designing beyond the product: understanding activity and user experience in ubiquitous environments. Vuorimiehentie VTT Technical Research Centre of Finland.

Book chapter

Combining technical and user knowledge in the curriculum.
Whitney, G. and Keith, S. 2009. Combining technical and user knowledge in the curriculum. Middlesex University Annual Learning and Teaching Conference 2009: The Dynamics of Difference: Making it Work. London, UK 01 Jul 2009

Conference paper

Using cohesive devices to recognize rhetorical relations in text.
Le, H., Abeysinghe, G. and Huyck, C. 2003. Using cohesive devices to recognize rhetorical relations in text. 4th Computational Linguistics UK Research Colloquium (CLUK-4). Edinburgh University Jan 2003 pp. 123-128

Conference paper

From local laboratory data to public domain database in search of indirect association of diseases: AJAX based gene data search engine.
Khan, N., Long, H., Rahman, S. and Stockman, A. 2007. From local laboratory data to public domain database in search of indirect association of diseases: AJAX based gene data search engine. in: Twentieth IEEE International Symposium on Computer-Based Medical Systems (CBMS'07). IEEE Computer Society Press. pp. 213-218

Book chapter

Knowledge extraction from microarray datasets using combined multiple models to predict leukemia types.
Stiglic, G., Khan, N. and Kokol, P. 2008. Knowledge extraction from microarray datasets using combined multiple models to predict leukemia types. in: Data mining: foundations and practice. Springer. pp. 339-352

Book chapter

Behaviour characteristics: low and high literacy users information seeking on social service websites.
Kodagoda, N., Wong, B. and Khan, N. 2009. Behaviour characteristics: low and high literacy users information seeking on social service websites. in: Proceedings of the 10th International Conference NZ Chapter of the ACM's Special Interest Group on Human-Computer Interaction. New York Association for Computing Machinery (ACM). pp. 13-16

Book chapter

Overview of behaviour characteristics of high and low literacy users: information seeking of an online social service system
Kodagoda, N., Wong, B. and Khan, N. 2009. Overview of behaviour characteristics of high and low literacy users: information seeking of an online social service system. in: Gross, T., Gulliksen, J., Kotzé, P., Oestreicher, L., Palanque, P., Prates, R. and Winckler, M. (ed.) Human-Computer Interaction – INTERACT 2009: 12th IFIP TC 13 International Conference, Uppsala, Sweden, August 24-28, 2009, Proceedigns Part I Springer.

Book chapter

A cooperative environment for genetic variance analysis using component database for database integration.
Khan, N., Stockman, A. and Rahman, S. 2002. A cooperative environment for genetic variance analysis using component database for database integration. in: Proceedings of the 15th IEEE international conference on computer based medical systems (CBMS). Computer Society Press.

Book chapter

D6.3b Evaluation of syllabi with members of EDeAN and other interested parties. IST CA 0033838 Design for All for eInclusion.
Keith, S. and Whitney, G. 2009. D6.3b Evaluation of syllabi with members of EDeAN and other interested parties. IST CA 0033838 Design for All for eInclusion. Online DfA @eInclusion.

Project report

D6.4a Report on the possibility of accreditation of DfA Inclusion and dissemination of information from WP6: IST CA 0033838 Design for All for eInclusion.
Keith, S., Whitney, G. and Kolar, I. 2009. D6.4a Report on the possibility of accreditation of DfA Inclusion and dissemination of information from WP6: IST CA 0033838 Design for All for eInclusion. Online DfA @eInclusion.

Project report

D6.4b: Review of WP6 training activities: IST CA 0033838 design for all for eInclusion.
Keith, S., Whitney, G. and Kolar, I. 2009. D6.4b: Review of WP6 training activities: IST CA 0033838 design for all for eInclusion. Online DfA @eInclusion.

Project report