Artificial Intelligence group
Title | Artificial Intelligence group |
---|
Latest research outputs
Sort by Date Title
Using functional active objects to enforce privacy
Kammueller, F. 2010. Using functional active objects to enforce privacy. 5th Conference on Network Architectures and Information Systems Security. Menton, France 18 - 21 May 2010Conference paper
Enhancing privacy implementations of database enquiries
Kammueller, F. and Kammueller, R. 2009. Enhancing privacy implementations of database enquiries. IEEE. pp. 45-50 https://doi.org/10.1109/ICIMP.2009.15Conference paper
Implementing privacy with Erlang active objects
Fleck, A. and Kammueller, F. 2010. Implementing privacy with Erlang active objects. International Conference on Internet Monitoring and Protection. Barcelona 09 - 15 May 2010 IEEE. pp. 141-146 https://doi.org/10.1109/ICIMP.2010.27Conference paper
Privacy by flexible parameterization with Erlang active objects.
Fleck, A. and Kammueller, F. 2010. Privacy by flexible parameterization with Erlang active objects. International Journal on Advances in Software. 3 (3-4), pp. 461-473.Article
Mainstreaming accessibility? Multidisciplinary problems or technical solutions.
Keith, S. and Whitney, G. 2011. Mainstreaming accessibility? Multidisciplinary problems or technical solutions. International Journal of Knowledge and Web Intelligence. 2 (1), pp. 53-63. https://doi.org/10.1504/IJKWI.2011.038628Article
Design for all in ICT training and education.
Keith, S. and Whitney, G. 2009. Design for all in ICT training and education. in: Lanyi, C. (ed.) Principles and practice in Europe for e-accessibility. Veszprém, Hungary Pannonian University Press. pp. 63-72Book chapter
Genetic sequences: tracing the mutations of a disease.
Mitchell, I., Passmore, P. and Xu, K. 2010. Genetic sequences: tracing the mutations of a disease. IEEE VAST Symposium 2010 Challenge. Salt Lake City, Utah, USA 24 - 29 Oct 2010Conference poster
Hospitalization records: characterization of pandemic spread.
Passmore, P., Zheng, Y., Rooney, C., Al-Sheikh, T. and Xu, K. 2010. Hospitalization records: characterization of pandemic spread. IEEE VAST Symposium 2010 Challenge. Salt Lake City, Utah, USA 24 - 29 Oct 2010Conference poster
Functional active objects: typing and formalisation
Henrio, L. and Kammueller, F. 2009. Functional active objects: typing and formalisation. Elsevier. https://doi.org/10.1016/j.entcs.2009.10.026Conference paper
Feature link propagation across variability representations with Isabelle/HOL
Kammueller, F., Rein, A. and Reiser, M. 2010. Feature link propagation across variability representations with Isabelle/HOL. Rubin, J., Botterweck, G., Mezini, M., Maman, I. and Lero, A. (ed.) New York Association for Computing Machinery (ACM). pp. 48-53Conference paper
Sparse kernel learning with LASSO and Bayesian inference algorithm
Gao, J., Kwan, P. and Shi, D. 2010. Sparse kernel learning with LASSO and Bayesian inference algorithm. Neural Networks. 23 (2), pp. 257-264. https://doi.org/10.1016/j.neunet.2009.07.001Article
Towards healthcare based on ubiquitous computing
Shi, D. and Comley, R. 2010. Towards healthcare based on ubiquitous computing. IEEE Transactions on Systems, Man, and Cybernetics eNewsletter. 33.Article
Evolutionary FCMAC-BYY applied to stream data analysis
Shi, D., Loomes, M. and Nguyen, M. 2010. Evolutionary FCMAC-BYY applied to stream data analysis. Lecture Notes in Computer Science. 6457, pp. 187-194. https://doi.org/10.1007/978-3-642-17298-4_19Article
Checking the TWIN elevator system by translating object-Z to SMV
Preibusch, S. and Kammueller, F. 2008. Checking the TWIN elevator system by translating object-Z to SMV. Lecture Notes in Computer Science. 4916, pp. 38-55. https://doi.org/10.1007/978-3-540-79707-4Article
Composing safely: a type system for aspects
Kammueller, F. and Sudhof, H. 2008. Composing safely: a type system for aspects. Lecture Notes in Computer Science. 4954, pp. 231-247. https://doi.org/10.1007/978-3-540-78789-1_18Article
Security analysis of private data enquiries in Erlang
Kammueller, F. and Kammueller, R. 2009. Security analysis of private data enquiries in Erlang. International Journal on Advances in Security. 2 (2&3), pp. 242-255.Article
Fuzzy CMAC with incremental Bayesian Ying–Yang learning and dynamic rule construction
Shi, D., Nguyen, M., Zhou, S. and Yin, G. 2010. Fuzzy CMAC with incremental Bayesian Ying–Yang learning and dynamic rule construction. IEEE Transactions on Systems, Man and Cybernetics, Part B. 40 (2), pp. 548-552. https://doi.org/10.1109/TSMCB.2009.2030333Article
Advanced Hough transform using a multilayer fractional Fourier method
Shi, D., Zheng, L. and Liu, J. 2010. Advanced Hough transform using a multilayer fractional Fourier method. IEEE Transactions on Image Processing. 19 (6), pp. 1558-1566. https://doi.org/10.1109/TIP.2010.2042102Article
An asynchronous distributed component model and its semantics
Henrio, L., Kammueller, F. and Rivera, M. 2009. An asynchronous distributed component model and its semantics. Lecture Notes in Computer Science. 5751, pp. 159-179. https://doi.org/10.1007/978-3-642-04167-9_9Article
A framework for reasoning on component composition
Henrio, L., Kammueller, F. and Khan, M. 2010. A framework for reasoning on component composition. Lecture Notes in Computer Science. 6286, pp. 1-20. https://doi.org/10.1007/978-3-642-17071-3_1Article
Formalizing non-interference for a simple bytecode language in Coq
Kammueller, F. 2008. Formalizing non-interference for a simple bytecode language in Coq. Formal Aspects of Computing. 20 (3), pp. 259-275.Article
Mechanical analysis of finite idempotent relations
Kammueller, F. 2011. Mechanical analysis of finite idempotent relations. Fundamenta Informaticae. 107 (1), pp. 43-65. https://doi.org/10.3233/FI-2011-392Article
Privacy enforcement and analysis for functional active objects
Kammueller, F. 2011. Privacy enforcement and analysis for functional active objects. Lecture Notes in Computer Science. 6514, pp. 93-107. https://doi.org/10.1007/978-3-642-19348-4_8Article
Cell assemblies for query expansion in information retrieval
Volpe, I., Moreira, V. and Huyck, C. 2011. Cell assemblies for query expansion in information retrieval. 2011 International Joint Conference on Neural Networks (IJCNN). San Jose, CA, USA 31 Jul - 05 Aug 2011 IEEE. pp. 551-558 https://doi.org/10.1109/IJCNN.2011.6033269Conference paper
The anatomy of teleneurosurgery in China
Gao, X. 2011. The anatomy of teleneurosurgery in China. International Journal of Telemedicine and Applications. 2011. https://doi.org/10.1155/2011/353405Article
Theory and practice of optimal mutation rate control in Hamming spaces of DNA sequences
Belavkin, R., Channon, A., Aston, E., Aston, J. and Knight, C. 2011. Theory and practice of optimal mutation rate control in Hamming spaces of DNA sequences. Lenaerts, T., Giacobini, M., Bersini, H., Bourgine, P., Dorigo, M. and Doursat, R. (ed.) ECAL 2011: The 11th European Conference on Artificial Life. Paris, France 08 - 12 Aug 2011 The MIT Press. pp. 85-92 https://doi.org/10.7551/978-0-262-29714-1-ch017Conference paper
Mutation and optimal search of sequences in nested Hamming spaces
Belavkin, R. 2011. Mutation and optimal search of sequences in nested Hamming spaces. IEEE Information Theory Workshop (ITW). Paraty, Brazil 16 - 20 Oct 2011 IEEE. pp. 90-94 https://doi.org/10.1109/ITW.2011.6089592Conference paper
Conflict resolution and learning probability matching in a neural cell-assembly architecture
Belavkin, R. and Huyck, C. 2011. Conflict resolution and learning probability matching in a neural cell-assembly architecture. Cognitive Systems Research. 12 (2), pp. 93-101. https://doi.org/10.1016/j.cogsys.2010.08.003Article
Integration of geographic information system and RADARSAT synthetic aperture radar data using a self-organizing map network as compensation for realtime ground data in automatic image classification
Shepherd, I., Passmore, P. and Kamal, M. 2010. Integration of geographic information system and RADARSAT synthetic aperture radar data using a self-organizing map network as compensation for realtime ground data in automatic image classification. Journal of Applied Remote Sensing. 4 (1), pp. 1-13. https://doi.org/10.1117/1.3457166Article
A Pong playing agent modelled with massively overlapping cell assemblies
Nadh, K. and Huyck, C. 2010. A Pong playing agent modelled with massively overlapping cell assemblies. Neurocomputing. 73 (16-18), pp. 2928-2934. https://doi.org/10.1016/j.neucom.2010.07.013Article
Multi-associative memory in fLIF cell assemblies.
Huyck, C. and Nadh, K. 2009. Multi-associative memory in fLIF cell assemblies. 9th International Conference on Cognitive Modeling. Manchester 24 - 26 Jul 2009Conference paper
The challenge of mainstreaming ICT design for all.
Whitney, G., Keith, S. and Schmidt-Belz, B. 2010. The challenge of mainstreaming ICT design for all. Miesenberger, K., Klaus, J., Zagler, W. and Karshmer, A. (ed.) 12th International Conference on Computers Helping People with Special Needs (ICCHP 2010). Vienna University of Technology, Austria 12 - 16 Jul 2010 Springer. https://doi.org/10.1007/978-3-642-14097-6_94Conference paper
Processing with cell assemblies
Byrne, E. and Huyck, C. 2010. Processing with cell assemblies. Neurocomputing. 74 (1-3), pp. 76-83. https://doi.org/10.1016/j.neucom.2009.09.024Article
Electronic medical records: addressing privacy & security concerns in the UK and US
George, C. and Berčič, B. 2009. Electronic medical records: addressing privacy & security concerns in the UK and US. BILETA 2009 - To Infinity and Beyond: Law and Technology in Harmony?. University of Winchester, UK 21 - 23 Apr 2009Conference paper
Illegal activities, preventative technologies & ISP immunity: where should the buck stop?
George, C. 2008. Illegal activities, preventative technologies & ISP immunity: where should the buck stop? BILETA 2008: the 23rd annual conference. Glasgow Caledonian University 27 - 28 Mar 2008Conference paper
Regulatory challenges in the era of the convergence of telecommunications, broadcasting and information
George, C. 2007. Regulatory challenges in the era of the convergence of telecommunications, broadcasting and information. 15th Telecommunications Forum, TELFOR 2007. Belgrade, Serbia 20 - 22 Nov 2007Conference paper
Legal challenges of cybercrime
George, C. 2007. Legal challenges of cybercrime. 15th Telecommunications Forum, TELFOR 2007. Sava Centre, Belgrade, Serbia 20 - 22 Nov 2007Conference paper
Players’ image management in the UK football industry
Futre, D., George, C. and Coathup, R. 2007. Players’ image management in the UK football industry. 15th Congress of the European Sports Management Association (EASM 2007). Torino, Italy 12 - 15 Sep 2007Conference paper
Data protection: peeking over the study cubicle online!
George, C. 2005. Data protection: peeking over the study cubicle online! JISClegal: Legal Issues of Online Learning Environments.. University of Warwick, UK 01 - 02 Jun 2005 pp. 4-5Conference paper
Online healthcare: internet pharmacies may not be good for your health
George, C. 2005. Online healthcare: internet pharmacies may not be good for your health. in: Zielinski, C., Duquenoy, P. and Kimppa, K. (ed.) The information society: emerging landscapes: IFIP International Conference on Landscapes of ICT and Social Accountability, Turku, Finland, June 27-29, 2005. Netherlands Springer.Book chapter
0
total views0
total downloads0
views this month0
downloads this month