Faculty of Science and Technology
Title | Faculty of Science and Technology |
---|---|
Alternative | S&T |
University | Middlesex University London |
Campus | London |
Latest research outputs
Sort by Date Title
Location-aware alert system for mobile devices
Sibley, P., Trestian, R. and Muntean, G. 2013. Location-aware alert system for mobile devices. IEEE International Conference on Communications (ICC 2013). Budapest, Hungary 09 - 13 Jun 2013Conference paper
Wireless multi-access environments and quality of service provisioning: solutions and application
Muntean, G. and Trestian, R. (ed.) 2012. Wireless multi-access environments and quality of service provisioning: solutions and application. IGI Global.Book
On the impact of wireless network traffic location and access technology on the mobile device energy consumption
Trestian, R., Ormond, O. and Muntean, G. 2012. On the impact of wireless network traffic location and access technology on the mobile device energy consumption. 2012 IEEE 37th Conference on Local Computer Networks (LCN). Clearwater, FL 22 - 25 Oct 2012 pp. 200-203Conference paper
Quality utility modelling for multimedia applications for Android mobile devices
Trestian, R., Moldovan, A., Muntean, C., Ormond, O. and Muntean, G. 2012. Quality utility modelling for multimedia applications for Android mobile devices. 7th IEEE International Symposium on Broadband Multimedia Systems and Broadcasting. Seoul, South Korea 27 - 29 Jun 2012 pp. 1-6Conference paper
Power-friendly access network selection strategy for heterogeneous wireless multimedia networks
Trestian, R., Ormond, O. and Muntean, G. 2010. Power-friendly access network selection strategy for heterogeneous wireless multimedia networks. 5th IEEE International Symposium on Broadband Multimedia Systems and Broadcasting. Shanghai, China 24 - 26 Mar 2010 pp. 1-5Conference paper
Performance of an adaptive multimedia mechanism in a wireless multi-user environment
Trestian, R., Ormond, O. and Muntean, G. 2010. Performance of an adaptive multimedia mechanism in a wireless multi-user environment. 5th IEEE International Symposium on Broadband Multimedia Systems and Broadcasting. Shanghai, China 24 - 26 Mar 2010 pp. 1-5Conference paper
MiceTrap: scalable traffic engineering of datacenter mice flows using OpenFlow
Trestian, R., Muntean, G. and Katrinis, K. 2013. MiceTrap: scalable traffic engineering of datacenter mice flows using OpenFlow. IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). Ghent, Belgium 27 - 31 May 2013 pp. 904-907Conference paper
Game theory-based network selection: solutions and challenges
Trestian, R., Ormond, O. and Muntean, G. 2012. Game theory-based network selection: solutions and challenges. IEEE Communications Surveys and Tutorials. 14 (4), pp. 1212-1231. https://doi.org/10.1109/SURV.2012.010912.00081Article
Flower pollination algorithm: a novel approach for multiobjective optimization
Yang, X., Karamanoglu, M. and He, X. 2014. Flower pollination algorithm: a novel approach for multiobjective optimization. Engineering Optimization. 46 (9), pp. 1222-1237. https://doi.org/10.1080/0305215X.2013.832237Article
Communicating on-line: culture and tools
Dafoulas, G. and Murphy, A. 2006. Communicating on-line: culture and tools. MUP Press.Book
Translating the complexities of flood risk science using KEEPER - a knowledge exchange exploratory tool for professionals in emergency response
Alexander, M., Viavattene, C., Faulkner, H. and Priest, S. 2014. Translating the complexities of flood risk science using KEEPER - a knowledge exchange exploratory tool for professionals in emergency response. Journal of Flood Risk Management. 7 (3), pp. 205-216. https://doi.org/10.1111/jfr3.12042Article
Heavy metal concentrations and toxicity in water and sediment from stormwater ponds and sedimentation tanks
Karlsson, K., Viklander, M., Lundy, L. and Revitt, D. 2010. Heavy metal concentrations and toxicity in water and sediment from stormwater ponds and sedimentation tanks. Journal of Hazardous Materials. 178 (1-3), pp. 612-618. https://doi.org/10.1016/j.jhazmat.2010.01.129Article
Uncomfortable interactions
Benford, S., Greenhalgh, C., Giannachi, G., Walker, B., Marshall, J. and Rodden, T. 2012. Uncomfortable interactions. in: Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems - CHI '12 Association for Computing Machinery (ACM). pp. 2005-2014Book chapter
Signal strength-based adaptive multimedia delivery mechanism
Trestian, R., Muntean, G. and Ormond, O. 2009. Signal strength-based adaptive multimedia delivery mechanism. in: 2009 IEEE 34th Conference on Local Computer Networks IEEE. pp. 297-300Book chapter
Ready to preorder: the case of weak process semantics
Chen, T., Fokkink, W. and Van Glabbeek, R. 2008. Ready to preorder: the case of weak process semantics. Information Processing Letters. 109 (2), pp. 104-111. https://doi.org/10.1016/j.ipl.2008.09.003Article
Proceeding in abstraction. From concepts to types and the recent perspective on information
Primiero, G. 2009. Proceeding in abstraction. From concepts to types and the recent perspective on information. History and Philosophy of Logic. 30 (3), pp. 257-282. https://doi.org/10.1080/01445340902872630Article
Performance evaluation of the Cognitive Packet Network in the presence of network worms
Sakellari, G. 2011. Performance evaluation of the Cognitive Packet Network in the presence of network worms. Performance Evaluation. 68 (10), pp. 927-937. https://doi.org/10.1016/j.peva.2011.03.005Article
Perception of color in 3D Virtual World architectural computer aided design: impact of color design in student satisfaction
Saleeb, N. and Dafoulas, G. 2010. Perception of color in 3D Virtual World architectural computer aided design: impact of color design in student satisfaction. in: The 2010 International Conference on Computer Engineering & Systems IEEE. pp. 207-212Book chapter
On the axiomatizability of priority II
Aceto, L., Chen, T., Ingolfsdottir, A., Luttik, B. and Van de Pol, J. 2011. On the axiomatizability of priority II. Theoretical Computer Science. 412 (28), pp. 3035-3044. https://doi.org/10.1016/j.tcs.2011.02.033Article
On finite alphabets and infinite bases
Chen, T., Fokkink, W., Luttik, B. and Nain, S. 2008. On finite alphabets and infinite bases. Information and Computation. 206 (5), pp. 492-519. https://doi.org/10.1016/j.ic.2007.09.003Article
Modeling and simulation of pedestrian behaviors in crowded places
Koh, W. and Zhou, S. 2011. Modeling and simulation of pedestrian behaviors in crowded places. ACM Transactions on Modeling and Computer Simulation. 21 (3), pp. 1-23. https://doi.org/10.1145/1921598.1921604Article
Model checking of continuous-time Markov chains against timed automata specifications
Chen, T., Han, T., Katoen, J., Mereacre, A. and Jagadeesan, R. 2011. Model checking of continuous-time Markov chains against timed automata specifications. Logical Methods in Computer Science. 7 (1). https://doi.org/10.2168/LMCS-7(1:12)2011Article
Investigating the tradeoffs between power consumption and quality of service in a backbone network
Sakellari, G., Morfopoulou, C. and Gelenbe, E. 2013. Investigating the tradeoffs between power consumption and quality of service in a backbone network. Future Internet. 5 (2), pp. 268-281. https://doi.org/10.3390/fi5020268Article
Interactivity-constrained server provisioning in large-scale distributed virtual environments
Duong, N., Nguyen, T., Zhou, S., Tang, X., Cai, W. and Ayani, R. 2012. Interactivity-constrained server provisioning in large-scale distributed virtual environments. IEEE Transactions on Parallel and Distributed Systems. 23 (2), pp. 304-312. https://doi.org/10.1109/TPDS.2011.107Article
Energy-quality-cost tradeoff in a multimedia-based heterogeneous wireless network environment
Trestian, R., Ormond, O. and Muntean, G. 2013. Energy-quality-cost tradeoff in a multimedia-based heterogeneous wireless network environment. IEEE Transactions on Broadcasting. 59 (2), pp. 340-357. https://doi.org/10.1109/TBC.2013.2244790Article
Energy consumption analysis of video streaming to Android mobile devices
Trestian, R., Moldovan, A., Ormond, O. and Muntean, G. 2012. Energy consumption analysis of video streaming to Android mobile devices. in: 2012 IEEE Network Operations and Management Symposium IEEE. pp. 444-452Book chapter
Context-aware adaptive applications: fault patterns and their automated identification
Sama, M., Elbaum, S., Raimondi, F., Rosenblum, D. and Wang, Z. 2010. Context-aware adaptive applications: fault patterns and their automated identification. IEEE Transactions on Software Engineering. 36 (5), pp. 644-661. https://doi.org/10.1109/TSE.2010.35Article
Analysis of an efficient rule-based motion planning system for simulating human crowds
Xiong, M., Lees, M., Cai, W., Zhou, S. and Low, M. 2010. Analysis of an efficient rule-based motion planning system for simulating human crowds. The Visual Computer. 26 (5), pp. 367-383. https://doi.org/10.1007/s00371-010-0421-6Article
An epistemic logic for becoming informed
Primiero, G. 2009. An epistemic logic for becoming informed. Synthese. 167 (2), pp. 363-389. https://doi.org/10.1007/s11229-008-9413-8Article
Admission of QoS aware users in a smart network
Gelenbe, E., Sakellari, G. and D'Arienzo, M. 2008. Admission of QoS aware users in a smart network. ACM Transactions on Autonomous and Adaptive Systems. 3 (1), pp. 1-28. https://doi.org/10.1145/1342171.1342175Article
A modal type theory for formalizing trusted communications
Primiero, G. and Taddeo, M. 2012. A modal type theory for formalizing trusted communications. Journal of Applied Logic. 10 (1), pp. 92-114. https://doi.org/10.1016/j.jal.2011.12.002Article
Bowel cancer screening in England: a qualitative study of GPs’ attitudes and information needs
Woodrow, C., Rozmovits, L., Hewitson, P., Rose, P., Austoker, J. and Watson, E. 2006. Bowel cancer screening in England: a qualitative study of GPs’ attitudes and information needs. BMC Family Practice. 7 (53). https://doi.org/10.1186/1471-2296-7-53Article
Public violence, staff harassment and the wellbeing of nursing staff: an analysis of national survey data
Woodrow, C. and Guest, D. 2012. Public violence, staff harassment and the wellbeing of nursing staff: an analysis of national survey data. Health Services Management Research. 25 (1), pp. 24-30. https://doi.org/10.1258/hsmr.2011.011019Article
Exploring the boundaries of human resource managers’ responsibilities
Guest, D. and Woodrow, C. 2012. Exploring the boundaries of human resource managers’ responsibilities. Journal of Business Ethics. 111 (1), pp. 109-119. https://doi.org/10.1007/s10551-012-1438-8Article
Neural correlates of automatic attention in touch: event related potentials and behavioural measures
Jones, A. and Forster, B. 2010. Neural correlates of automatic attention in touch: event related potentials and behavioural measures. Psychophysiology. 47 (S1), p. S53. https://doi.org/10.1111/j.1469-8986.2010.01111.xArticle
Stable knockdown of hCGβ mRNA expression in bladder cancer cells results in significant inhibition of growth
Burczynska, B., Booth, M., Iles, R., Shah, A., Shiled, A. and Butler, S. 2013. Stable knockdown of hCGβ mRNA expression in bladder cancer cells results in significant inhibition of growth. Anticancer Research. 33 (9), pp. 3611-3614.Article
Trusted information supply chain framework in clinical studies
Kandl, T. and Khan, N. 2014. Trusted information supply chain framework in clinical studies. Advanced Science Letters. 20 (1), pp. 103-110. https://doi.org/10.1166/asl.2014.5310Article
Social class
Das Nair, R. and Hansen, S. 2012. Social class. in: Das Nair, R. and Butler, C. (ed.) Intersectionality, sexuality and psychological therapies: working with lesbian, gay and bisexual diversity WileyBlackwell. pp. 137-163Book chapter
Age and ageing
Gibson, S. and Hansen, S. 2012. Age and ageing. in: Das Nair, R. and Butler, C. (ed.) Intersectionality, sexuality and psychological therapies: working with lesbian, gay and bisexual diversity WileyBlackwell. pp. 239-263Book chapter
Venus and Mars, the miscommunication model and other rape myths
Rapley, M., Hansen, S. and O'Byrne, R. 2008. Venus and Mars, the miscommunication model and other rape myths. Clinical Psychology Forum. 192, pp. 37-42.Article
514500
total views139126
total downloads23298
views this month2721
downloads this month