Artificial Intelligence group


TitleArtificial Intelligence group

Latest research outputs

Sort by Date Title
Efficient computation of dominance in component systems (short paper)
Boender, J. 2011. Efficient computation of dominance in component systems (short paper). in: Software engineering and formal methods: 9th International Conference, SEFM 2011, Montevideo, Uruguay, November 14-18, 2011. Proceedings Berlin and Heidelberg, Germany Springer.

Book chapter

A semi-lattice model for multi-lateral security
Kammueller, F. 2013. A semi-lattice model for multi-lateral security. in: Data privacy management and autonomous spontaneous security Berlin, Germany Springer.

Book chapter

Patients, trust and ethics in information privacy in eHealth
Duquenoy, P., Mekawie, N. and Springett, M. 2013. Patients, trust and ethics in information privacy in eHealth. in: George, C., Whitehouse, D. and Duquenoy, P. (ed.) eHealth: legal, ethical and governance challenges Germany Springer. pp. 275-295

Book chapter

A security model for functional active objects
Kammueller, F. 2012. A security model for functional active objects. Francisco, C., Kim, V., Miguel, C. and Andreas, K. (ed.) First International Symposium Communicability, Computer Graphics and Innovative Design for Interactive Systems (CCGIDIS 2011). Berlin Springer. https://doi.org/10.1007/978-3-642-33760-4_4

Conference paper

Retrieval of 3D medical images via their texture features
Gao, X., Qian, Y., Loomes, M., Barn, B., Comley, R., Chapman, A., Rix, J., Hui, R. and Tian, Z. 2012. Retrieval of 3D medical images via their texture features. International Journal on Advances in Software. 4 (3&4), pp. 499-509.

Article

A security model for functional active objects with an implementation in Erlang
Fleck, A. and Kammueller, F. 2011. A security model for functional active objects with an implementation in Erlang. in: Ficarra, F., Kratky, A., Veltman, K., Ficarra, M., Nicol, E. and Brie, M. (ed.) Computational informatics, social factors and new information technologies: hypermedia perspectives and avant-garde experiences in the era of communicability expansion Bergamo, Italy Blue Herons.

Book chapter

Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol.
Kammueller, F., Mapp, G., Patel, S. and Sani, A. 2012. Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol. International Conference on Internet Monitoring and Protection (ICIMP 2012). Stuttgart, Germany 27 May - 01 Jun 2012 Xpert Publishing Service.

Conference paper

Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011
Kammueller, F. 2012. Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011. Mathematical Reviews.

Article

Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010.
Kammueller, F. 2012. Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010. Mathematical Reviews.

Article

A locally nameless theory of objects
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. A locally nameless theory of objects. SAFA Annual Workshop on Formal Techniques (SAFA’2010). 2229 Route des Crêtes, 06560, Valbonne, Provence-Alpes-Côte d'Azur, France

Conference paper

Locally nameless sigma calculus
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. Locally nameless sigma calculus. Archive of Formal Proof.

Article

Formalizing statecharts using hierarchical automata
Helke, S. and Kammueller, F. 2010. Formalizing statecharts using hierarchical automata. Archive of Formal Proof.

Article

Radius-SHA256 – verified remote authentication with secure hashing.
Kammueller, F. and Patel, S. 2011. Radius-SHA256 – verified remote authentication with secure hashing. First Global Conference on Communication, Science and Information Engineering, CCSIE’11. Middlesex University 25 - 27 Jul 2011

Conference paper

ASPfun: a typed functional active object calculus
Henrio, L., Kammueller, F. and Lutz, B. 2012. ASPfun: a typed functional active object calculus. Science of Computer Programming. 77 (7-8), pp. 823-847. https://doi.org/10.1016/j.scico.2010.12.008

Article

Application of verification techniques to security: model checking insider attacks
Kammueller, F., Probst, C. and Raimondi, F. 2012. Application of verification techniques to security: model checking insider attacks. 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability. Venice, Italy 28 - 29 Mar 2012 Blue Herons editions.

Conference paper

Certification or conformance: making a successful commitment to WCAG 2.0
Keith, S., Floratos, N. and Whitney, G. 2012. Certification or conformance: making a successful commitment to WCAG 2.0. Vigo, M., Abascal, J., Lopes, R. and Salomoni, P. (ed.) 9th International Cross-Disciplinary Conference on Web Accessibility. Lyon, France 16 - 17 Apr 2012 New York ACM. https://doi.org/10.1145/2207016.2207029

Conference paper

Bridging the abridged – the diffusion of Telemedicine in Europe and China
Gao, X., Loomes, M. and Comley, R. 2012. Bridging the abridged – the diffusion of Telemedicine in Europe and China. in: Rodrigues, J., Díez, I. and Abajo, B. (ed.) Telemedicine and e-health services, policies, and applications: avancements and developments USA IGI Global. pp. 451-495

Book chapter

The state of the art of medical imaging technology: from creation to archive and back.
Gao, X., Qian, Y. and Hui, R. 2011. The state of the art of medical imaging technology: from creation to archive and back. The Open Medical Informatics Journal. 5 (1-M8), pp. 73-85. https://doi.org/10.2174/1874431101105010073

Article

Critical mutation rate has an exponential dependence on population size
Channon, A., Aston, E., Day, C., Belavkin, R. and Knight, C. 2011. Critical mutation rate has an exponential dependence on population size. Lenaerts, T., Giacobini, M., Bersini, H., Bourgine, P., Dorigo, M. and Doursat, R. (ed.) ECAL 2011: The 11th European Conference on Artificial Life. Paris, France 08 - 12 Aug 2011 The MIT Press. pp. 117-124 https://doi.org/10.7551/978-0-262-29714-1-ch021

Conference paper

Local-global optical flow for image registration agents
Zayouna, A., Comley, R. and Shi, D. 2011. Local-global optical flow for image registration agents. iUBICOM ’11: The 6th International Workshop on Ubiquitous and Collaborative Computing. Northumbria University, Newcastle 04 Jul 2011

Conference paper

Suppressing the cross terms of the Wigner Distribution with an adaptive frequency smoothing window
Zheng, L. and Shi, D. 2011. Suppressing the cross terms of the Wigner Distribution with an adaptive frequency smoothing window. Arabnia, H., Deligiannidis, L. and Schaefer, G. (ed.) International Conference on Image Processing, Computer Vision, & Pattern Recognition (IPCV). Las Vegas 18 - 21 Jul 2011 CSREA Press.

Conference paper

Advanced Radon transform using generalized interpolated Fourier method for straight line detection
Zheng, L. and Shi, D. 2011. Advanced Radon transform using generalized interpolated Fourier method for straight line detection. Computer Vision and Image Understanding. 115 (2), pp. 152-160. https://doi.org/10.1016/j.cviu.2010.11.009

Article

Dynamics of information and optimal control of mutation in evolutionary systems
Belavkin, R. 2012. Dynamics of information and optimal control of mutation in evolutionary systems. in: Sorokin, A., Murphey, R., Thai, M. and Pardalos, P. (ed.) Dynamics of Information Systems: Mathematical Foundations New York Springer.

Book chapter

Embedding information literacy skills as employability attributes
Smith, S. and Edwards, J. 2012. Embedding information literacy skills as employability attributes. LILAC 2012. Glasgow, Scotland 11 - 13 Apr 2012

Conference item

A cooperative particle swarm optimizer with statistical variable interdependence learning
Sun, L., Yoshida, S., Cheng, X. and Liang, Y. 2012. A cooperative particle swarm optimizer with statistical variable interdependence learning. Information Sciences. 186 (1), pp. 20-39. https://doi.org/10.1016/j.ins.2011.09.033

Article

A user study on curved edges in graph visualization
Xu, K., Rooney, C., Passmore, P., Ham, D. and Nguyen, P. 2012. A user study on curved edges in graph visualization. IEEE Transactions on Visualization and Computer Graphics. 18 (12), pp. 2449 -2456. https://doi.org/10.1109/TVCG.2012.189

Article

Embedded writing instruction in the first year curriculum
Bernaschina, P. and Smith, S. 2012. Embedded writing instruction in the first year curriculum. Journal of Learning Development in Higher Education. https://doi.org/10.47408/jldhe.v0i0.186

Article

Embedding information literacy skills as employability attributes
Smith, S. and Edwards, J. 2012. Embedding information literacy skills as employability attributes. ALISS Quarterly. 7 (4), pp. 22-27.

Article

Maximal connectivity and constraints in the human brain
Belavkin, R. 2012. Maximal connectivity and constraints in the human brain. in: Pardalos, P., Coleman, T. and Xanthopoulos, P. (ed.) Optimization and data analysis in biomedical informatics New York Springer.

Book chapter

On evolution of an information dynamic system and its generating operator
Belavkin, R. 2012. On evolution of an information dynamic system and its generating operator. Optimization Letters. 6 (5), pp. 827-840. https://doi.org/10.1007/s11590-011-0325-z

Article

Twenty five years of training and education in ICT Design for All and Assistive Technology.
Whitney, G., Keith, S., Bühler, C., Hewer, S., Lhotska, L., Miesenberger, K., Sandnes, F., Stephanidis, C. and Velasco, C. 2011. Twenty five years of training and education in ICT Design for All and Assistive Technology. Technology and Disability. 23 (3), pp. 163-170. https://doi.org/10.3233/TAD-2011-0324

Article

Survey of grid resource monitoring and prediction strategies.
Hu, L., Cheng, X. and Che, X. 2010. Survey of grid resource monitoring and prediction strategies. International Journal of Intelligent Information Processing. 1 (2).

Article

Efficient identity-based broadcast encryption without random oracles.
Hu, L., Liu, Z. and Cheng, X. 2010. Efficient identity-based broadcast encryption without random oracles. Journal of Computers. 5 (3), pp. 331-336.

Article

Solving job shop scheduling problem using genetic algorithm with penalty function
Sun, L., Cheng, X. and Liang, Y. 2010. Solving job shop scheduling problem using genetic algorithm with penalty function. International Journal of Intelligent Information Processing. 1 (2), pp. 65-77.

Article

eHealth: legal, ethical and governance challenges: an overview.
Whitehouse, D., George, C. and Duquenoy, P. 2011. eHealth: legal, ethical and governance challenges: an overview. Med-e-Tel 2011. Luxembourg 06 - 08 Apr 2011

Conference paper

Modelchecking non-functional requirements for interface specifications.
Kammueller, F. and Preibusch, S. 2008. Modelchecking non-functional requirements for interface specifications. European Joint Conference on Theory and Practice of Software, 2008, (Foundations of Interface technologies). Budapest 29 Mar - 06 Apr 2008

Conference paper

Compositionality of aspect weaving.
Kammueller, F. and Sudhof, H. 2008. Compositionality of aspect weaving. in: Mahr, B. and Sheng, H. (ed.) Autonomous systems: self-organisation, management, and control. Springer Verlag. pp. 87-96

Book chapter

Interactive theorem proving in software engineering.
Kammueller, F. 2008. Interactive theorem proving in software engineering. Saarbrücken, Germany VDM Verlag Dr. Mueller.

Book

Using functional active objects to enforce privacy
Kammueller, F. 2010. Using functional active objects to enforce privacy. 5th Conference on Network Architectures and Information Systems Security. Menton, France 18 - 21 May 2010

Conference paper

Enhancing privacy implementations of database enquiries
Kammueller, F. and Kammueller, R. 2009. Enhancing privacy implementations of database enquiries. IEEE. pp. 45-50 https://doi.org/10.1109/ICIMP.2009.15

Conference paper

  • 0
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month