Faculty of Science and Technology
Title | Faculty of Science and Technology |
---|---|
Alternative | S&T |
University | Middlesex University London |
Campus | London |
Latest research outputs
Sort by Date Title
Modeling human behaviour with higher order logic: insider threats
Boender, J., Kammueller, F., Ivanova, M. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust. Vienna Technical University, Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 31-39Conference paper
A probabilistic analysis framework for malicious insider threats
Chen, T., Kammueller, F., Nemli, I. and Probst, C. 2015. A probabilistic analysis framework for malicious insider threats. 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015, held as part of HCI International 2015. Los Angeles, California, USA 02 - 07 Aug 2015 Springer. pp. 178-189Conference paper
Confinement for active objects
Kammueller, F. 2015. Confinement for active objects. International Journal of Advanced Computer Science and Applications. 6 (2), pp. 246-261. https://doi.org/10.14569/IJACSA.2015.060236Article
Making security type systems less ad hoc
Nipkow, T. and Popescu, A. 2014. Making security type systems less ad hoc. Information Technology. 56 (6), pp. 267-272. https://doi.org/10.1515/itit-2014-1060Article
Strong normalization for System F by HOAS on top of FOAS
Popescu, A., Gunter, E. and Osborn, C. 2010. Strong normalization for System F by HOAS on top of FOAS. 25th Annual IEEE Symposium on Logic in Computer Science (LICS). Edinburgh, United Kingdom 11 - 14 Jul 2010 Institute of Electrical and Electronics Engineers. pp. 31-40Conference paper
Recursion principles for syntax with bindings and substitution
Popescu, A. and Gunter, E. 2011. Recursion principles for syntax with bindings and substitution. The 16th ACM SIGPLAN International Conference on Functional Programming. Tokyo 19 - 21 Sep 2011 Association for Computing Machinery (ACM). pp. 346-358Conference paper
Foundational, compositional (co)datatypes for higher-order logic: category theory applied to theorem proving
Traytel, D., Popescu, A. and Blanchette, J. 2012. Foundational, compositional (co)datatypes for higher-order logic: category theory applied to theorem proving. 27th Annual IEEE Symposium on Logic in Computer Science (LICS). Dubrovnik, Croatia 25 - 28 Jun 2012 Institute of Electrical and Electronics Engineers (IEEE). pp. 596-605 https://doi.org/10.1109/LICS.2012.75Conference paper
Truly modular (co)datatypes for Isabelle/HOL
Blanchette, J., Hölzl, J., Lochbihler, A., Panny, L., Popescu, A. and Traytel, D. 2014. Truly modular (co)datatypes for Isabelle/HOL. 5th International Conference on Interactive Theorem Proving (ITP). Vienna, Austria 14 - 17 Jul 2014 Springer International Publishing. pp. 93-110Conference paper
Cardinals in Isabelle/HOL
Blanchette, J., Popescu, A. and Taytel, D. 2014. Cardinals in Isabelle/HOL. 5th International Conference on Interactive Theorem Proving. Vienna, Austria 14 - 17 Jul 2014 Springer. pp. 111-127Conference paper
Term-generic logic
Popescu, A. and Roşu, G. 2015. Term-generic logic. Theoretical Computer Science. 577, pp. 1-24. https://doi.org/10.1016/j.tcs.2015.01.047Article
On malfunctioning software
Floridi, L., Fresco, N. and Primiero, G. 2015. On malfunctioning software. Synthese. 192 (4), pp. 1199-1220. https://doi.org/10.1007/s11229-014-0610-3Article
On the ontology of the computing process and the epistemology of the computed
Primiero, G. 2014. On the ontology of the computing process and the epistemology of the computed. Philosophy & Technology. 27 (3), pp. 485-489. https://doi.org/10.1007/s13347-014-0174-7Article
Facing computing as technique: towards a history and philosophy of computing
De Mol, L. and Primiero, G. 2014. Facing computing as technique: towards a history and philosophy of computing. Philosophy & Technology. 27 (3), pp. 321-326. https://doi.org/10.1007/s13347-014-0169-4Article
Programming the MIRTO robot with neurons
Huyck, C., Primiero, G. and Raimondi, F. 2014. Programming the MIRTO robot with neurons. Procedia Computer Science. 41, pp. 75-82. https://doi.org/10.1016/j.procs.2014.11.087Article
Modeling human behaviour with higher order logic: insider threats
Boender, J., Ivanova, M., Kammueller, F. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST 2014). Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers. pp. 31-39 https://doi.org/10.1109/STAST.2014.13Conference paper
A typed natural deduction calculus to reason about secure trust
Primiero, G. and Raimondi, F. 2014. A typed natural deduction calculus to reason about secure trust. 2014 Twelfth Annual Conference on Privacy, Security and Trust (PST). Toronto, Canada 23 - 24 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 379-382 https://doi.org/10.1109/PST.2014.6890963Conference paper
A neuro-computational approach to PP attachment ambiguity resolution
Nadh, K. and Huyck, C. 2012. A neuro-computational approach to PP attachment ambiguity resolution. Neural Computation. 24 (7), pp. 1906-1925. https://doi.org/10.1162/NECO_a_00298Article
A review of cell assemblies
Huyck, C. and Passmore, P. 2013. A review of cell assemblies. Biological Cybernetics. 107 (3), pp. 263-288. https://doi.org/10.1007/s00422-013-0555-5Article
Compensatory Hebbian learning for categorisation in simulated biological neural nets
Huyck, C. and Mitchell, I. 2013. Compensatory Hebbian learning for categorisation in simulated biological neural nets. Biologically Inspired Cognitive Architectures. 6 (5), pp. 3-7. https://doi.org/10.1016/j.bica.2013.06.003Article
Decidable model-checking for a resource logic with production of resources
Alechina, N., Logan, B., Nguyen, H. and Raimondi, F. 2014. Decidable model-checking for a resource logic with production of resources. 21st European Conference on Artificial Intelligence (ECAI-2014). Prague, Czech Republic 18 - 22 Aug 2014 Prague, Czech Republic IOS Press. pp. 9-14 https://doi.org/10.3233/978-1-61499-419-0-9Conference paper
Aviation safety: modeling and analyzing complex interactions between humans and automated systems
Rungta, N., Brat, G., Clancey, W., Linde, C., Raimondi, F., Seah, C. and Shafto, M. 2013. Aviation safety: modeling and analyzing complex interactions between humans and automated systems. ATACCS 2013. Naples, Italy 28 - 30 May 2013 Association for computing machinery. pp. 27-37 https://doi.org/10.1145/2494493.2494498Conference paper
A synergistic and extensible framework for multi-agent system verification
Hunter, J., Raimondi, F., Rungta, N. and Stocker, R. 2013. A synergistic and extensible framework for multi-agent system verification. AAMAS 2013 :12th International Conference on Autonomous Agents and Multiagent Systems. Saint Paul, Minnesota, USA. 06 - 10 May 2013 Richland, SC International Foundation for Autonomous Agents and Multiagent Systems. pp. 869-876Conference paper
Domain types: abstract-domain selection based on variable usage
Apel, S., Beyer, D., Friedberger, K., Raimondi, F. and von Rhein, A. 2013. Domain types: abstract-domain selection based on variable usage. Hardware and Software: Verification and Testing. 8244 (1), pp. 262-278. https://doi.org/10.1007/978-3-319-03077-7_18Article
Implementing adaptation and reconfiguration strategies in heterogeneous WSN
Di Marco, A., Gallo, F., Gemikonakli, O., Mostarda, L. and Raimondi, F. 2013. Implementing adaptation and reconfiguration strategies in heterogeneous WSN. 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013). Barcelona, Spain 25 - 28 Mar 2013 IEEE. pp. 477-483 https://doi.org/10.1109/AINA.2013.102Conference paper
The anonymous subgraph problem
Bettinelli, A., Liberti, L., Raimondi, F. and Savourey, D. 2013. The anonymous subgraph problem. Computers and Operations Research. 40 (4), pp. 973-979. https://doi.org/10.1016/j.cor.2012.11.018Article
Introducing Binary Decision Diagrams in the explicit-state verification of Java code
von Rhein, A., Apel, S. and Raimondi, F. 2011. Introducing Binary Decision Diagrams in the explicit-state verification of Java code. The Java Pathfinder Workshop (co-located with ASE 2011). Oread, Lawrence, Kansas 12 Nov 2011Conference paper
Supporting communication in information centric networks using the location/ID split protocol and time released caching
Aiash, M., Mapp, G. and Kallash, M. 2015. Supporting communication in information centric networks using the location/ID split protocol and time released caching. 2015 International Conference on Cloud Computing (ICCC). Riyadh, Saudi Arabia 26 - 29 Apr 2015 Institute of Electrical and Electronics Engineers. pp. 233-238 https://doi.org/10.1109/CLOUDCOMP.2015.7149657Conference paper
A taxonomy of errors for information systems
Primiero, G. 2014. A taxonomy of errors for information systems. Minds and Machines. 24 (3), pp. 249-273. https://doi.org/10.1007/s11023-013-9307-5Article
'What works' in reducing sexual harassment and sexual offences on public transport nationally and internationally: a rapid evidence assessment
Gekoski, A., Gray, J., Horvath, M., Edwards, S., Emirali, A. and Adler, J. 2015. 'What works' in reducing sexual harassment and sexual offences on public transport nationally and internationally: a rapid evidence assessment. London Middlesex University; British Transport Police; Department for Transport.Project report
Context-awareness to increase inclusion of people with DS in society
Kramer, D., Augusto, J. and Clark, T. 2014. Context-awareness to increase inclusion of people with DS in society. AAAI 14: Workshop on Artificial Intelligence Applied to Assistive Technologies and Smart Environments (ATSE 2014). Quebec City, Quebec, Canada 27 - 31 Jul 2014 Association for the Advancement of Artificial Intelligence (AAAI). pp. 27-31Conference paper
Quantitative verification of implantable cardiac pacemakers over hybrid heart models
Chen, T., Diciolla, M., Kwiatkowska, M. and Mereacre, A. 2014. Quantitative verification of implantable cardiac pacemakers over hybrid heart models. Information and Computation. 236, pp. 87-101. https://doi.org/10.1016/j.ic.2014.01.014Article
A needs analysis and testing battery for field hockey
Bishop, C., Brazier, J., Cree, J. and Turner, A. 2015. A needs analysis and testing battery for field hockey. Professional Strength and Conditioning. 36, pp. 15-26.Article
The rationales of resilience in English and Dutch flood risk policies
Wiering, M., Green, C., Van Rijswick, H., Priest, S. and Keessen, A. 2015. The rationales of resilience in English and Dutch flood risk policies. Journal of Water and Climate Change. 6 (1), pp. 38-54. https://doi.org/10.2166/wcc.2014.017Article
Night optimised care technology for users needing assisted lifestyles
Augusto, J., Mulvenna, M., Zheng, H., Wang, H., Martin, S., McCullagh, P. and Wallace, J. 2014. Night optimised care technology for users needing assisted lifestyles. Behaviour and Information Technology. 33 (12), pp. 1261-1277. https://doi.org/10.1080/0144929X.2013.816773Article
Personalized smart environments to increase inclusion of people with Down's Syndrome
Augusto, J., Grimstad, T., Wichert, R., Schulze, E., Braun, A., Rødevand, G. and Ridley, V. 2013. Personalized smart environments to increase inclusion of people with Down's Syndrome. Augusto, J., Wichert, R., Collier, R., Keyson, D., Salah, A. and Tan, A. (ed.) International Joint Conference on Ambient Intelligence. Dublin, Ireland Springer International. https://doi.org/10.1007/978-3-319-03647-2_16Conference paper
Reflections on ambient intelligence systems handling of user preferences and needs
Augusto, J. 2014. Reflections on ambient intelligence systems handling of user preferences and needs. The 10th International Conference on Intelligent Environments (IE'14). Shanghai, P.R. China 29 Jun - 04 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 369-371Conference paper
MicroRNA target prediction based upon metastable RNA secondary structures
Souki, O., Day, L., Albrecht, A. and Steinhofel, K. 2015. MicroRNA target prediction based upon metastable RNA secondary structures. 3rd International Work-Conference on Bioinformatics and Biomedical Engineering (IWBBIO 2015). Granada, Spain 15 - 17 Apr 2015 Springer. pp. 456-467 https://doi.org/10.1007/978-3-319-16480-9_45Conference paper
Goal driven architecture development using LEAP
Clark, T. and Barn, B. 2013. Goal driven architecture development using LEAP. Enterprise Modelling and Information Systems Architectures. 8 (1), pp. 40-61. https://doi.org/10.1007/BF03345928Article
Strength and conditioning for swimming: a practical approach
Bishop, C., Cree, J., Read, P., Barter, P. and Turner, A. 2014. Strength and conditioning for swimming: a practical approach. Professional Strength and Conditioning.Article
A field based test battery for tennis
Roberts, T., Turner, A. and Mayers, R. 2011. A field based test battery for tennis. Professional Strength and Conditioning. 20, pp. 13-22.Article
507358
total views137819
total downloads16156
views this month1414
downloads this month