Home > Research > Computing and Communications > Publications & Outputs
View graph of relations

Computing and Communications

  1. Published

    Automatic design synthesis and optimization of component-based systems by evolutionary algorithms

    Angelov, P. P., Zhang, Y., Wright, J. A., Hanby, V. I. & Buswell, R. A., 07/2003, Genetic and Evolutionary Computation. Cantu-Paz, E., Foster, J. A., Deb, K., Davis, L. D., Roy, R., O'Reilly, U.-M., Beyer, H. G., Standish, R., Kendall, G., Willson, S., Harman, M., Dasgupta, D., Potter, M. A., Schultz, A. C., Jonoska, N. & Miller, J. (eds.). 2724 ed. Berlin/Heidelberg: Springer, Vol. 2. p. 1938-1950 13 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  2. Published

    Automatic design generation of component-based systems using GA and fuzzy optimisation

    Angelov, P., Zhang, Y. & Wright, J. A., 17/03/2005, p. 95-100. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  3. Published

    Automatic Content Analysis of Spoken Discourse

    Wilson, A. & Rayson, P., 01/1993, Corpus Based Computational Linguistics. Souter, C. & Atwell, E. (eds.). Amsterdam: Rodopi, p. 215-226 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    Automatic and portable mapping of data parallel programs to OpenCL for GPU-based heterogeneous systems

    Wang, Z., Grewe, D. & O'Boyle, M., 01/2015, In: ACM Transactions on Architecture and Code Optimization. 11, 4, 26 p., 42.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Automatic analysis of social media images to identify disaster type and infer appropriate emergency response

    Asif, A., Khatoon, S., Hasan, M. M., Alshamari, M. A., Abdou, S., Elsayed, K. M. & Rashwan, M., 31/12/2021, In: Journal of Big Data. 8, 1, 28 p., 83.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Automatic agent generation for IoT-based smart house simulator

    Lee, W., Cho, S., Chu, P., Vu, H., Helal, S., Song, W., Jeong, Y.-S. & Cho, K., 12/10/2016, In: Neurocomputing. 209, p. 14-24 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Automatic 3D face reconstruction from single images or video

    Breuer, P., Kim, K. I., Kienzle, W., Schölkopf, B. & Blanz, V., 2008, Automatic Face & Gesture Recognition, 2008. FG '08. 8th IEEE International Conference on. IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Automatic 3D face reconstruction from single images or video

    Breuer, P., Kim, K. I., Kienzle, W., Blanz, V. & Schölkopf, B., 1/02/2007, Max Planck Institute for Biological Cybernetics, 12 p.

    Research output: Working paper

  9. Published

    Automated verification of proper choreography implementation

    Jansen, E., Yang, H.-I. & Helal, S., 2006, 2006 International Symposium on Applications and the Internet, SAINT 2006. IEEE, p. 180-189 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Automated vehicle density estimation from raw surveillance videos

    Mehboob, F., Abbas, M., Jiang, R., Tahir, M. A., Al-Maadeed, S. & Bouridane, A., 13/07/2016, 2016 SAI Computing Conference (SAI).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Automated surgical OSATS prediction from videos

    Sharma, Y., Plötz, T., Hammerld, N., Mellor, S., McNaney, R., Olivier, P., Deshmukh, S., McCaskie, A. & Essa, I., 29/07/2014, 2014 IEEE 11th International Symposium on Biomedical Imaging, ISBI 2014. Institute of Electrical and Electronics Engineers Inc., p. 461-464 4 p. 6867908

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Automated segmentation of gravel particles from depth images of gravel-soil mixtures

    Rahmani, H., Scanlan, C. A., Nadeem, U., Bennamoun, M. & Bowles, R., 1/07/2019, In: Computers and Geosciences. 128, p. 1-10 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Automated Planning and BDI Agents: A Case Study

    Cardoso, R. C., Ferrando, A. & Papacchini, F., 25/09/2021, Advances in Practical Applications of Agents, Multi-Agent Systems, and Social Good. The PAAMS Collection: 19th International Conference, PAAMS 2021, Salamanca, Spain, October 6–8, 2021, Proceedings. Dignum, F., Corchado, J. M. & Prieta, F. D. L. (eds.). Cham: Springer, p. 52-63 12 p. (Lecture Notes in Computer Science ; vol. 12946).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Automated Person Identification Framework Based on Fingernails and Dorsal Knuckle Patterns

    Alghamdi, M., Angelov, P. & Williams, B., 24/01/2022, 2021 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Automated multi-level governance compliance checking

    King, T. C., De Vos, M., Dignum, V., Jonker, C. M., Li, T., Padget, J. & van Riemsdijk, M. B., 11/2017, In: Autonomous Agents and Multi-Agent Systems. 31, 6, p. 1283-1343 60 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Automated model based assurance case management using constrained natural language

    Wei, R., Jiang, Z., Mei, H., Barmpis, K., Foster, S., Kelly, T. & Zhuang, Y., 31/01/2024, In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 43, 1, p. 291-304 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Automated identification of chicken eimeria species from microscopic images

    Abdalla, M. E., Seker, H. & Jiang, R., 12/2015, 2015 IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE), 1/12/15. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Automated handling of anaphoric ambiguity in requirements: a multi-solution study

    Ezzini, S., Abualhaija, S., Arora, C. & Sabetzadeh, M., 5/07/2022, ICSE. p. 187-199 13 p. (Proceedings - International Conference on Software Engineering; vol. 2022-May).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Automated Diagnosis of Childhood Pneumonia in Chest Radiographs Using Modified Densely Residual Bottleneck-Layer Features

    Alkassar, S., Abdullah, M. A., Jebur, B. A., Abdul-Majeed, G. H., Wei, B. & Woo, W. L., 3/12/2021, In: Applied Sciences. 11, 23, 16 p., 11461.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Automated detection of Pi2 pulsations to monitor substorm signatures: Its application to real-time data and archived data

    Nosé, M., Iyemori, T., Takeda, M., Kamei, T., Honary, F., Marple, S. R., Matzka, J., Ookawa, T., Takahashi, K. & Cifuentes-Nava, G., 03/2006, p. 209-214. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Other

  21. Published

    Automated detection of COVID-19 cases from chest X-ray images using deep neural network and XGBoost

    Nasiri, H. & Hasani, S., 31/08/2022, In: Radiography. 28, 3, p. 732-738 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Unpublished

    Automated Contract Negotiation for the Grid

    Lock, R., 04/2004, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  23. Published

    Automated buyer profiling control based on human privacy attitudes

    Such, J. M., Garcia-Fornes, A. & Botti, V., 11/2013, In: Electronic Commerce Research and Applications. 12, 6, p. 386-396 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Automated Blood Cell Detection and Counting via Deep Learning for Microfluidic Point-of-Care Medical Devices

    Xia, T., Jiang, R., Fu, Y. Q. & Jin, N., 17/10/2019, In: IOP Conference Series: Materials Science and Engineering. 646, 7 p., 012048.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Automated and Secure Onboarding for System of Systems

    Maksuti, S., Bicaku, A., Zsilak, M., Ivkic, I., Péceli, B., Singler, G., Kovács, K., Tauber, M. G. & Delsing, J., 31/08/2021, In: IEEE Access. 9, p. 111095-111113 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Automated 3-D Animation From Snooker Videos With Information-Theoretical Optimization

    Jiang, R., Parry, M. L., Legg, P. A., Chung, D. H. S. & Griffiths, I. W., 12/2013, In: IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES. 5, 4, p. 337-345 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Auto-diagnosis of COVID-19 using Lung CT Images with Semi-supervised Shallow Learning Network

    Konar, D., Panigrahi, B. K., Bhattacharyya, S. & Jiang, R., 11/02/2021, In: IEEE Access. 9, p. 28716 - 28728 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    AutoBAP: automatic coding of body action and posture units from wearable sensors

    Velloso, E., Bulling, A. & Gellersen, H., 2013, Proceedings of the 5th International Conference on Affective Computing and Intelligent Interaction (ACII’13). Piscataway, N.J.: IEEE, p. 135-140 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Auto-balanced filter pruning for efficient convolutional neural networks

    Ding, X., Ding, G., Han, J. & Tang, S., 27/04/2018, THE THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE THE THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE THE EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE.. AAAI, p. 6797-6804 8 p. (THE THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE THE THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE THE EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE.).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Authorship studies/textual statistics.

    McEnery, A. M. & Oakes, M. P., 2000, Handbook of natural language processing. Dale, R., Moisl, H. & Somers, H. (eds.). Dallas: Marcel Dekker Inc, p. 234-248 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  31. Published

    Authors' reply to 'comments on 'researcher bias: The use of machine learning in software defect prediction''

    Shepperd, M., Hall, T. & Bowes, D., 1/11/2018, In: IEEE Transactions on Software Engineering. 44, 11, p. 1129-1131 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Authoring Support for Mobile Interaction with the Real World.

    Broll, G., Rukzio, E. & Wedi, B., 05/2007.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  33. Published

    Authentication in stealth distributed hash tables

    MacQuire, A., Brampton, A., Rai, I., Race, N. J. P. & Mathy, L., 28/08/2006, 32nd Euromicro Conference on Software Engineering and Advanced Applications, 2006. IEEE, p. 348-355 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Authentication in stealth distributed hash tables

    MacQuire, A., Brampton, A., Rai, I. A., Race, N. J. P. & Mathy, L., 06/2008, In: Journal of Systems Architecture. 54, 6, p. 607 - 618 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Authentication and Key Distribution for Wired and Wireless Systems

    Komninos, N., Samarakoon, M. I. & Honary, B., 06/2000, In 1st Annual PostGraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting. Liverpool, UK, p. 236-240

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    AURORA: autonomous real-time on-board video analytics

    Angelov, P., Sadeghi Tehran, P. & Clarke, C., 05/2017, In: Neural Computing and Applications. 28, 5, p. 855-865 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    AURA framework for designing effective accessible websites

    Paolini, P., Rubegni, E., Terragni, A. & Vaghi, S., 2010, 2010 IEEE International Professional Comunication Conference. IEEE, p. 199-202 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Augmenting refrigerator magnets: Why less is sometimes more: ACM International Conference Proceeding Series

    Taylor, A., Swan, L., Eardley, R., Sellen, A., Hodges, S. & Wood, K., 14/10/2006, NordiCHI '06: Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles. ACM, p. 115-124 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Augmenting reflective middleware with an aspect orientation support layer

    Surajbali, B., Coulson, G., Greenwood, P. & Grace, P., 11/2007, p. 1-6. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  40. Published

    Augmenting network interfaces to reduce PC energy usage

    Agarwal, Y., Hodges, S., Chandra, R., Scott, J., Bahl, P. & Gupta, R., 22/04/2009, NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementation. ACM, p. 365-380 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Unpublished

    Augmenting ICS cyber security risk assessments: assimilation of socio-technical characteristics and constructs

    Green, B., 2018, (Unpublished) Lancaster University. 314 p.

    Research output: ThesisDoctoral Thesis

  42. Unpublished

    Augmenting Expectation in Playful Arena Performances with Ubiquitous Intimate Technologies

    Lock, S., Sheridan, J. & Bayliss, A., 04/2004, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  43. Published

    Augmenting Collections of Everyday Objects: A Case Study of Clothes Hangers as an Information Display

    Matthews, T., Van Laerhoven, K., Gellersen, H. & Dey, A., 04/2004, Pervasive 2004. Springer-Verlag, p. 340-344 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Augmenting Cognition Through Edge Computing

    Satyanarayanan, M. & Davies, N. A. J., 1/07/2019, In: Computer. 52, 7, p. 37-46 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    Augmented reality applications to structural monitoring

    Stalker, R. & Smith, I. F. C., 01/1998, Artificial Intelligence in Structural Engineering: Information Technology for Design, Collaboration, Maintenance, and Monitoring. Smith, I. F. C. (ed.). Berlin: Springer, p. 479-483 5 p. (Lecture Notes in Computer Science; vol. 1454).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  46. Published

    Augmented Reality 3D Interactive Advertisements on Smartphones.

    Chehimi, F., Coulton, P. & Edwards, R., 07/2007, International Conference on the Management of Mobile Business, 2007. ICMB 2007.. Toronto, Ont.: IEEE Computer Society, p. 21-21 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Augmentation not Duplication: Considerations for the Design of Digitally-Augmented Comic Books

    Kljun, M., Čopič Pucihar, K., Alexander, J. M., Weerasinghe, M., Campos, C., Ducasse, J., Kopačin, B., Grubert, J., Coulton, P. & Čelar, M., 4/05/2019, Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, 12 p. 103. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Auditing for privacy in threshold PKE e-voting

    Kiayias, A., Zacharias, T. & Zhang, B., 1/03/2017, In: Information and Computer Security. 25, 1, p. 100-116 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    AudioGest: Enabling fine-grained hand gesture detection by decoding echo signal

    Ruan, W., Sheng, Q. Z., Yang, L., Gu, T., Xu, P. & Shangguan, L., 12/09/2016, UbiComp 2016 - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. New York: Association for Computing Machinery, Inc, p. 474-485 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Audio-enhanced touch sensors

    Oppenheim, M., 05/2012, In: Circuit Cellar - The Magazine For Computer Applications. 262, p. 20-29 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Unpublished

    Audio Mosaicing: Feature-Driven Audio Editing/Synthesis

    Lindsay, A., 09/2005, (Unpublished)

    Research output: Other contribution

  52. Published

    Audience monitor: an open source tool for tracking audience mobility in front of pervasive displays

    Elhart, I., Mikusz, M. A., Mora, C. G., Langheinrich, M. & Davies, N. A. J., 7/06/2017, PerDis '17 Proceedings of the 6th ACM International Symposium on Pervasive Displays. New York: ACM, 8 p. 10

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Auction Theory Toolbox

    Lange, C., Rowat, C., Kerber, M., Wenzel, M., Caminati, M., Mossakowski, T. & Windsteiger, W., 2013

    Research output: Exhibits, objects and web-based outputsSoftware

  54. Published

    Auction based models for ticket allocation problem in IT service delivery industry

    Deshpande, P. M., Garg, D. & Suri, N., 7/07/2008, 2008 IEEE International Conference on Services Computing. IEEE, p. 111-118 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    Atypical Facial Landmark Localisation with Stacked Hourglass Networks: A Study on 3D Facial Modelling for Medical Diagnosis

    Storey, G., Bouridane, A., Jiang, R. & Li, C.-T., 29/01/2020, Deep Biometrics. Jiang, R., Li, C.-T., Crookes, D., Meng, W. & Rosenberger, C. (eds.). Cham: Springer, p. 37-49 13 p. (Unsupervised and Semi-Supervised Learning ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  56. Forthcoming

    Attributes and Dimensions of Trust in Secure Systems

    Bradbury, M., Prince, D., Marcinkiewicz, V. & Watson, T., 7/10/2022, (Accepted/In press) STaR-IoT 1st International Workshop on Socio-technical Cybersecurity and Resilience in the Internet of Things. Delft, Netherlands, (ACM Transactions on Internet of Things).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    Attribute-Guided Network for Cross-Modal Zero-Shot Hashing

    Ji, Z., Sun, Y., Yu, Y., Pang, Y. & Han, J., 1/01/2020, In: IEEE Transactions on Neural Networks and Learning Systems. 31, 1, p. 321-330 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Attention module-based spatial-temporal graph convolutional networks for skeleton-based action recognition

    Kong, Y., Li, L., Zhang, K., Ni, Q. & Han, J., 30/08/2019, In: Journal of Electronic Imaging. 28, 4, 043032.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    Attaining Meta-self-awareness through Assessment of Quality-of-Knowledge

    Elhabbash, A., Bahsoon, R., Tino, P., Lewis, P. R. & Elkhatib, Y., 11/11/2021, Proceedings - 2021 IEEE International Conference on Web Services, ICWS 2021. Chang, C. K., Damiani, E., Fan, J., Ghodous, P., Maximilien, M., Wang, Z., Ward, R. & Zhang, J. (eds.). IEEE, p. 712-723 12 p. (Proceedings - 2021 IEEE International Conference on Web Services, ICWS 2021).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    Attacks and Vulnerabilities of Trust and Reputation Models

    Such, J. M., 2013, Agreement Technologies. Ossowski, S. (ed.). Dordrecht: Springer Verlag, p. 467-477 11 p. (Law, Governance and Technology Series; vol. 8).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  61. Published

    Attacks and Threats of Value Added Service Charging Mechanisms in Third Generation Networks

    Katsaros, I., Martin, I. & Honary, B., 12/2004, First International Symposium on Broadband Communications. Harrogate, p. 71

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Attacks and design of image recognition CAPTCHAs

    Zhu, B. B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M. & Cai, K., 2010, CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 187-200 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  63. Published

    AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces

    Manzoor, S., Luna, J., Suri, N., X., L. (Editor) & U., B. (Editor), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 499-502 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    Attack pattern recognition through correlating cyber situational awareness in computer networks

    Shirazi, S. N. U. H., Schaeffer-Filho, A. & Hutchison, D., 1/03/2014, Cyberpatterns: unifying design patterns with security and attack patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 125-134 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  65. Published

    Attack Models for Advanced Persistent Threats in Smart Grid Wide Area Monitoring.

    Paudel, S., Smith, P. & Zseby, T., 2017, SPSR-SG@CPSWeek. p. 61-66 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    Attack Detection of Nonlinear Distributed Control Systems

    Lu, Y., 2020, American Control Conference.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    Atomic-scale authentication with Resonant Tunnelling Diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R., 27/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  68. Published

    Atomic-scale authentication with resonant tunneling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 2016, In: MRS Advances. 1, 22, p. 1625-1629 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    Atomic-scale authentication using resonant tunnelling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y. J., Young, M. P., Woodhead, C. S., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 23/02/2015, In: arxiv.org.

    Research output: Contribution to Journal/MagazineJournal article

  70. Published

    Atomic-scale authentication using imperfect semiconductor structures

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M. A., Missous, M., Roedig, U. & Young, R., 1/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  71. Published

    ATM QoS support via output port controllers

    Tit, Y. M., Fong, S. & Hutchison, D., 3/12/2000, 2000 IEEE International Conference on Communications. : ICC 2000 Global Convergence Through Communications. IEEE, p. 708-712 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Atlas: A service-oriented sensor platform hardware and middleware to enable programmable pervasive spaces

    King, J., Bose, R., Yang, H.-I., Pickles, S. & Helal, S., 2006, 31st Annual IEEE Conference on Local Computer Networks, LCN 2006. IEEE, p. 630-638 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    ATHENE: Assistive technologies for healthy living in elders: needs assessment by ethnography.

    Greenhalgh, T., Procter, R., Wherton, J. & Rouncefield, M., 2011. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  74. Published

    ATDT: Autonomous Template-based Detection and Tracking of objects from airborne camera

    Sadeghi Tehran, P. & Angelov, P., 2015, Intelligent Systems 2014: Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, September 24‐26, 2014, Warsaw, Poland, Volume 2: Tools, Architectures, Systems, Applications. Filev, D., Jabłkowski, J., Kacprzyk, J., Krawczak, M., Popchev, I., Rutkowski, L., Sgurev, V., Sotirova, E., Szynkarczyk, P. & Zadrozny, S. (eds.). Springer, p. 555-565 11 p. (Advances in Intelligent Systems and Computing; vol. 323).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Unpublished

    At the right time: when to sort web history and bookmarks

    Dix, A. & Marshall, J., 06/2003, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  76. Published

    At home with users: a comparative view of Living Labs

    Ley, B., Ogonowski, C., Mu, M., Hess, J., Race, N., Randall, D., Rouncefield, M. & Wulf, V., 2015, In: Interacting with Computers. 27, 1, p. 21-35 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    At home with the technology: an ethnographic study of a set-top-box trial.

    O'Brien, J., Rodden, T., Rouncefield, M. & Hughes, J., 09/1999, In: ACM Transactions on Computer-Human Interaction (TOCHI). 6, 3, p. 282-308 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  78. Published

    Asynchronous Federated Learning for Vehicular Edge Caching of Consumer Content

    Xu, X., Bao, G. & Bilal, M., 1/07/2024, In: IEEE Consumer Electronics Magazine. 13, 4, p. 17-23 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  79. Published

    Asymptotic studies for the impact of antenna selection on secure two-way relaying communications with artificial noise

    Ding, Z., Ma, Z. & Fan, P., 04/2014, In: IEEE Transactions on Wireless Communications. 13, 4, p. 2189-2203 15 p., 6754119.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  80. Published

    Asymptotic Performance Analysis of NOMA Uplink Networks Under Statistical QoS Delay Constraints

    Bello, M., Chorti, A., Fijalkow, I., Yu, W. & Musavian, L., 31/12/2020, In: IEEE Open Journal of the Communications Society. 1, p. 1691-1706 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    Astronomy at sea: Jim Wild's Cunard diary

    Wild, J. A., 02/2009, In: Astronomy and Geophysics. 50, 1, p. 1.38

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  82. Published

    Assured deletion in the cloud: requirements, challenges and future directions

    Ramokapane, M., Rashid, A. & Such, J. M., 28/10/2016, CCSW '16 Proceedings of the 2016 ACM on Cloud Computing Security Workshop. New York: ACM, p. 97-108 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    Assurance-oriented activity recognition

    Kim, E., Helal, S., Nugent, C. & Lee, J. W., 2011, SAGAware '11 Proceedings of the 2011 international workshop on Situation activity & goal awareness. New York: ACM, p. 15-24 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Assurance Techniques for Industrial Control Systems (ICS)

    Knowles, W., Such Aparicio, J. M., Gouglidis, A., Misra, G. & Rashid, A., 10/2015, CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. New York: ACM, p. 101-112 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Associating network flows with user and application information

    Ackermann, R., Roedig, U., Zink, M., Griwodz, C. & Steinmetz, R., 1/10/2000, Proceedings of the Multimedia and Security Workshop at 8th ACM Multimedia 2000, Los Angeles, USA. New York: ACM Press, p. 149-152 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    Assistive Technology and Secure Communication for AI-Based E-Learning

    Benachour, P., Emran, M. & Alshaflut, A., 1/10/2023, AI-Based Digital Health Communication for Securing Assistive Systems. Thayananthan, V. (ed.). IGI Global, p. 1-21 21 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  87. Published

    Assistive environments for successful aging

    Helal, S., King, J., Bose, R., El-Zabadani, H. & Kaddourah, Y., 2009, Advanced Intelligent Environments. Kameas, A. D., Callagan, V., Hagras, H., Weber, M. & Minker, W. (eds.). Boston: Springer, p. 1-26 26 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  88. Published

    Assistive Environments for Individuals with Special Needs

    Helal, S., Lee, C. & Mann, W. C., 2005, Smart Environments: Technology, Protocols and Applications. Cook, D. & Das, S. K. (eds.). Wiley, p. 361-383 23 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  89. Published

    Assisting Requirements Recovery from Legacy Documents

    Rayson, P., Garside, R. & Sawyer, P., 01/2000, Systems Engineering for Business Process Change: collected papers from the EPSRC research programme. Henderson, P. (ed.). London: Springer-Verlag, p. 251-263 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  90. Published

    Assisting Requirements Engineering with Semantic Document Analysis

    Rayson, P., Garside, R. & Sawyer, P., 04/2000, p. 1363-1371. 9 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  91. Published

    ASSIST: Automated Semantic Assistance for Translators

    Sharoff, S., Babych, B., Rayson, P., Mudraya, O. & Piao, S., 04/2006, EACL '06 Proceedings of the Eleventh Conference of the European Chapter of the Association for Computational Linguistics: Posters & Demonstrations. p. 139-142 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    Assessment of the Robustness of Deep Neural Networks (DNNs)

    Mu, R., 23/10/2023, Lancaster University. 147 p.

    Research output: ThesisDoctoral Thesis

  93. Published

    Assessment of non-directed computer-use behaviours in the home can indicate early cognitive impairment: A proof of principle longitudinal study

    Stringer, G., Couth, S., Heuvelman, H., Bull, C., Gledson, A., Keane, J., Rayson, P., Sutcliffe, A., Sawyer, P. H., Zeng, X.-J., Montaldi, D., Brown, L. J. E. & Leroi, I., 28/01/2023, In: Aging and Mental Health. 27, 1, p. 193-202 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    Assessing trust: contextual accountability

    Rowe, M. & Butters, J., 2009, Proceedings of the ESWC2009 Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009) Heraklion, Greece, June 1, 2009.. Hausenblas, M., Kärger , P., Olmedilla, D., Passant, A. & Polleres, A. (eds.). The Editors, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Assessing the state and improving the art of parallel testing for C

    Schwahn, O., Coppik, N., Winter, S. & Suri, N., 15/07/2019, ISSTA 2019 Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM, p. 123-133 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    Assessing the security of internet-connected critical infrastructures

    Ghani, H., Khelil, A., Suri, N., Csertán, G., Gönczy, L., Urbanics, G. & Clarke, J., 1/12/2014, In: Security and Communication Networks. 7, 12, p. 2713-2725 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  97. Published

    Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks

    Gu, C., Bradbury, M., Jhumka, A. & Leeke, M., 7/01/2016, 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 99-108 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    Assessing the Impact of Malware Attacks in Utility Networks

    König, S., Gouglidis, A., Green, B. & Solar, A., 7/07/2018, Game Theory for Security and Risk Management: From Theory to Practice. Rass, S. & Schauer, S. (eds.). Springer Birkhäuser, p. 335-351 17 p. (Static & Dynamic Game Theory: Foundations and Applications).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  99. Published

    Assessing the impact of intra-cloud live migration on anomaly detection

    Shirazi, S. N. U. H., Simpson, S., Marnerides, A., Watson, M., Mauthe, A. & Hutchison, D., 10/2014, Proceedings of 3rd IEEE International Conference on Cloud Networking, IEEE CloudNet 2014. IEEE, p. 52-57 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  100. Published

    Assessing the impact of aspects on model composition effort

    Farias, K., Garcia, A. & Whittle, J., 2010, Proceedings of the 9th International Conference on Aspect-Oriented Software Development. New York, NY, USA: ACM, p. 73-84 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top