Computer Science
Title | Computer Science |
---|---|
Alternative | S&T - CS |
Faculty | Faculty of Science and Technology |
Latest research outputs
Sort by Date Title
Exploiting contextual handover information for versatile services in NGN environments.
Moreira, E., Cottingham, D., Crowcroft, J., Hui, P., Mapp, G., Vanni, R. and Institute of Electrical and Electronics Engineers 2007. Exploiting contextual handover information for versatile services in NGN environments. in: Digital Information Management, 2007. ICDIM '07. 2nd International Conference. IEEE Computer Society. pp. 506-512Book chapter
Multi-associative memory in fLIF cell assemblies.
Huyck, C. and Nadh, K. 2009. Multi-associative memory in fLIF cell assemblies. 9th International Conference on Cognitive Modeling. Manchester 24 - 26 Jul 2009Conference paper
The challenge of mainstreaming ICT design for all.
Whitney, G., Keith, S. and Schmidt-Belz, B. 2010. The challenge of mainstreaming ICT design for all. Miesenberger, K., Klaus, J., Zagler, W. and Karshmer, A. (ed.) 12th International Conference on Computers Helping People with Special Needs (ICCHP 2010). Vienna University of Technology, Austria 12 - 16 Jul 2010 Springer. https://doi.org/10.1007/978-3-642-14097-6_94Conference paper
Processing with cell assemblies
Byrne, E. and Huyck, C. 2010. Processing with cell assemblies. Neurocomputing. 74 (1-3), pp. 76-83. https://doi.org/10.1016/j.neucom.2009.09.024Article
Electronic medical records: addressing privacy & security concerns in the UK and US
George, C. and Berčič, B. 2009. Electronic medical records: addressing privacy & security concerns in the UK and US. BILETA 2009 - To Infinity and Beyond: Law and Technology in Harmony?. University of Winchester, UK 21 - 23 Apr 2009Conference paper
Illegal activities, preventative technologies & ISP immunity: where should the buck stop?
George, C. 2008. Illegal activities, preventative technologies & ISP immunity: where should the buck stop? BILETA 2008: the 23rd annual conference. Glasgow Caledonian University 27 - 28 Mar 2008Conference paper
Regulatory challenges in the era of the convergence of telecommunications, broadcasting and information
George, C. 2007. Regulatory challenges in the era of the convergence of telecommunications, broadcasting and information. 15th Telecommunications Forum, TELFOR 2007. Belgrade, Serbia 20 - 22 Nov 2007Conference paper
Legal challenges of cybercrime
George, C. 2007. Legal challenges of cybercrime. 15th Telecommunications Forum, TELFOR 2007. Sava Centre, Belgrade, Serbia 20 - 22 Nov 2007Conference paper
Players’ image management in the UK football industry
Futre, D., George, C. and Coathup, R. 2007. Players’ image management in the UK football industry. 15th Congress of the European Sports Management Association (EASM 2007). Torino, Italy 12 - 15 Sep 2007Conference paper
Data protection: peeking over the study cubicle online!
George, C. 2005. Data protection: peeking over the study cubicle online! JISClegal: Legal Issues of Online Learning Environments.. University of Warwick, UK 01 - 02 Jun 2005 pp. 4-5Conference paper
Online healthcare: internet pharmacies may not be good for your health
George, C. 2005. Online healthcare: internet pharmacies may not be good for your health. in: Zielinski, C., Duquenoy, P. and Kimppa, K. (ed.) The information society: emerging landscapes: IFIP International Conference on Landscapes of ICT and Social Accountability, Turku, Finland, June 27-29, 2005. Netherlands Springer.Book chapter
Copyright management systems: assessing the power balance.
George, C. 2005. Copyright management systems: assessing the power balance. in: Zielinski, C., Duquenoy, P. and Kimppa, K. (ed.) The information society: emerging landscapes: IFIP International Conference on Landscapes of ICT and Social Accountability, Turku, Finland, June 27-29, 2005. New York Springer.Book chapter
Pursuing electronic health: a UK primary health care perspective
Ndeti, M. and George, C. 2005. Pursuing electronic health: a UK primary health care perspective. in: Funabashi, M. and Grzech, A. (ed.) Challenges of expanding Internet: e-commerce, e-business, and e-government: 5th IFIP Conference on e-Commerce, e-Business, and e-Government (13E'2005), October 28-30, 2005, Poznan, Poland. New York Springer.Book chapter
Challenges of identity theft in the information society.
Jahankhani, H. and George, C. 2008. Challenges of identity theft in the information society. in: Kiekegaard, S. (ed.) Synergies and conflicts in cyberlaw. International Association of IT Lawyers. pp. 42-51Book chapter
Ethical, legal and social issues in medical informatics.
Duquenoy, P., George, C. and Kimppa, K. 2008. Ethical, legal and social issues in medical informatics. Hershey, PA. Medical Information Science Reference.Book
Compiling medical data into national medical databases: legitimate practice or data protection concern?
Berčič, B. and George, C. 2008. Compiling medical data into national medical databases: legitimate practice or data protection concern? in: Duquenoy, P., George, C. and Kimppa, K. (ed.) Ethical, legal and social issues in medical informatics Hershey, PA. Medical Information Science Reference. pp. 228-247Book chapter
The secret santa problem.
Liberti, L. and Raimondi, F. 2008. The secret santa problem. Lecture Notes in Computer Science. 5034, pp. 271-279. https://doi.org/10.1007/978-3-540-68880-8_26Article
Algorithms for efficient symbolic detection of faults in context-aware applications.
Sama, M., Raimondi, F., Rosenblum, D. and Emmerich, W. 2008. Algorithms for efficient symbolic detection of faults in context-aware applications. in: Automated Software Engineering - Workshops, 2008. ASE Workshops 2008. 23rd IEEE/ACM International Conference. Institute of Electrical and Electronics Engineers. pp. 1-8Book chapter
Service-level agreements for electronic services
Skene, J., Raimondi, F. and Emmerich, W. 2010. Service-level agreements for electronic services. IEEE Transactions on Software Engineering. 36 (2), pp. 288-304. https://doi.org/10.1109/TSE.2009.55Article
PDVer, a tool to verify PDDL planning domains.
Raimondi, F., Pecheur, C. and Brat, G. 2009. PDVer, a tool to verify PDDL planning domains. ICAPS'09 Workshop on Verification and Validation of Planning and Scheduling Systems. Thessaloniki, Greece 20 Sep 2009Conference paper
The Anonymous subgraph problem.
Bettinelli, A., Liberti, L., Raimondi, F. and Savourey, D. 2009. The Anonymous subgraph problem. Cologne Twente Workshop 2009: 8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization. Paris 02 - 04 Jun 2009 pp. 269-274Conference paper
Combinatorial optimization based recommender systems.
Roda, F., Liberti, L. and Raimondi, F. 2009. Combinatorial optimization based recommender systems. Cologne Twente Workshop 2009: 8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization. Paris 02 - 04 Jun 2009 pp. 175-179Conference paper
A model to design and verify context-aware adaptive service composition.
Cubo, J., Sama, M., Raimondi, F. and Rosenblum, D. 2009. A model to design and verify context-aware adaptive service composition. 6th IEEE International Conference on Services Computing (SCC 2009). Bangalore 21 - 25 Sep 2009Conference paper
Managing social irresponsibility in cyberspace: the walled garden approach
George, C. 2008. Managing social irresponsibility in cyberspace: the walled garden approach. The 11th International Symposium - Management and Social Responsibility, (SymOrg2008). Belgrade, Serbia 10 - 13 Sep 2008Conference paper
Issues and challenges in securing interoperability of DRM systems in the digital music market
George, C. and Chandak, N. 2006. Issues and challenges in securing interoperability of DRM systems in the digital music market. International Review of Law Computers and Technology. 20 (3), pp. 271-285. https://doi.org/10.1080/13600860600852143Article
Web 2.0 and user-generated content: legal challenges in the new frontier.
George, C. and Skerri, J. 2007. Web 2.0 and user-generated content: legal challenges in the new frontier. Journal of Information, Law and Technology.Article
Internet pharmacies: global threat requires a global approach to regulation.
George, C. 2006. Internet pharmacies: global threat requires a global approach to regulation. Hertfordshire law journal. 4 (1), pp. 12-25.Article
Identifying personal data using relational database design principles
Berčič, B. and George, C. 2009. Identifying personal data using relational database design principles. International Journal of Law and Information Technology. 17 (3), pp. 233-251. https://doi.org/10.1093/ijlit/ean007Article
Investigating the legal protection of data, information and knowledge under the EU data protection regime
Berčič, B. and George, C. 2009. Investigating the legal protection of data, information and knowledge under the EU data protection regime. International Review of Law Computers and Technology. 23 (3), pp. 189-201. https://doi.org/10.1080/13600860903262255Article
Change blindness and situation awareness in a police C2 environment.
Mancero, G., Wong, B. and Loomes, M. 2009. Change blindness and situation awareness in a police C2 environment. in: Norros, L. (ed.) ECCE 2009 - European Conference on Cognitive Ergonomics: designing beyond the product: understanding activity and user experience in ubiquitous environments. Vuorimiehentie VTT Technical Research Centre of Finland.Book chapter
Combining technical and user knowledge in the curriculum.
Whitney, G. and Keith, S. 2009. Combining technical and user knowledge in the curriculum. Middlesex University Annual Learning and Teaching Conference 2009: The Dynamics of Difference: Making it Work. London, UK 01 Jul 2009Conference paper
Using cohesive devices to recognize rhetorical relations in text.
Le, H., Abeysinghe, G. and Huyck, C. 2003. Using cohesive devices to recognize rhetorical relations in text. 4th Computational Linguistics UK Research Colloquium (CLUK-4). Edinburgh University Jan 2003 pp. 123-128Conference paper
From local laboratory data to public domain database in search of indirect association of diseases: AJAX based gene data search engine.
Khan, N., Long, H., Rahman, S. and Stockman, A. 2007. From local laboratory data to public domain database in search of indirect association of diseases: AJAX based gene data search engine. in: Twentieth IEEE International Symposium on Computer-Based Medical Systems (CBMS'07). IEEE Computer Society Press. pp. 213-218Book chapter
Knowledge extraction from microarray datasets using combined multiple models to predict leukemia types.
Stiglic, G., Khan, N. and Kokol, P. 2008. Knowledge extraction from microarray datasets using combined multiple models to predict leukemia types. in: Data mining: foundations and practice. Springer. pp. 339-352Book chapter
Behaviour characteristics: low and high literacy users information seeking on social service websites.
Kodagoda, N., Wong, B. and Khan, N. 2009. Behaviour characteristics: low and high literacy users information seeking on social service websites. in: Proceedings of the 10th International Conference NZ Chapter of the ACM's Special Interest Group on Human-Computer Interaction. New York Association for Computing Machinery (ACM). pp. 13-16Book chapter
Overview of behaviour characteristics of high and low literacy users: information seeking of an online social service system
Kodagoda, N., Wong, B. and Khan, N. 2009. Overview of behaviour characteristics of high and low literacy users: information seeking of an online social service system. in: Gross, T., Gulliksen, J., Kotzé, P., Oestreicher, L., Palanque, P., Prates, R. and Winckler, M. (ed.) Human-Computer Interaction – INTERACT 2009: 12th IFIP TC 13 International Conference, Uppsala, Sweden, August 24-28, 2009, Proceedigns Part I Springer.Book chapter
A cooperative environment for genetic variance analysis using component database for database integration.
Khan, N., Stockman, A. and Rahman, S. 2002. A cooperative environment for genetic variance analysis using component database for database integration. in: Proceedings of the 15th IEEE international conference on computer based medical systems (CBMS). Computer Society Press.Book chapter
D6.3b Evaluation of syllabi with members of EDeAN and other interested parties. IST CA 0033838 Design for All for eInclusion.
Keith, S. and Whitney, G. 2009. D6.3b Evaluation of syllabi with members of EDeAN and other interested parties. IST CA 0033838 Design for All for eInclusion. Online DfA @eInclusion.Project report
D6.4a Report on the possibility of accreditation of DfA Inclusion and dissemination of information from WP6: IST CA 0033838 Design for All for eInclusion.
Keith, S., Whitney, G. and Kolar, I. 2009. D6.4a Report on the possibility of accreditation of DfA Inclusion and dissemination of information from WP6: IST CA 0033838 Design for All for eInclusion. Online DfA @eInclusion.Project report
D6.4b: Review of WP6 training activities: IST CA 0033838 design for all for eInclusion.
Keith, S., Whitney, G. and Kolar, I. 2009. D6.4b: Review of WP6 training activities: IST CA 0033838 design for all for eInclusion. Online DfA @eInclusion.Project report
148895
total views29557
total downloads6202
views this month351
downloads this month