Home > Research > Computing and Communications > Publications & Outputs
View graph of relations

Computing and Communications

  1. 2014
  2. Published

    PANFIS: a novel incremental learning machine

    Pratama, M., G. Avanatti, S., Angelov, P. & Lughofer, E., 01/2014, In: IEEE Transactions on Neural Networks. 25, 1, p. 55-68 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Strategies for avoiding preference profiling in agent-based e-commerce environments

    Serrano, E., Such, J. M., Garcia-Fornes, A. & Botia, J., 01/2014, In: Applied Intelligence. 40, 1, p. 127-142 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Touchless interaction in surgery

    O'Hara, K., Gonzalez, G., Sellen, A., Penney, G., Varnavas, A., Mentis, H., Criminisi, A., Corish, R., Rouncefield, M., Dastur, N. & Carrell, T., 01/2014, In: Communications of the ACM. 57, 1, p. 70-77 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Unpublished

    "Convince us'': an argument for the morality of persuasion

    Knowles, B., Coulton, P., Lochrie, M. & Wohl, B., 2014, (Unpublished) p. 1-5. 5 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  6. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2014, SMS communication: a linguistic approach. Cougnon, L.-A. & Fairon, C. (eds.). John Benjamins Publishing Company, p. 217-237 21 p. (Benjamins Current Topics; vol. 61).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    "Real, but glossy" - Technology and the practical pursuit of magic in modern weddings: 17th ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW 2014

    Massimi, M., Harper, R. & Sellen, A., 2014, CSCW '14 Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. New York: ACM, p. 854-865 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A consistency framework for dynamic reconfiguration in AO-middleware architectures

    Surajbali, B., Grace, P. & Coulson, G., 2014, Software Architecture : 8th European Conference, ECSA 2014, Vienna, Austria, August 25-29, 2014. Proceedings. Avgeriou, P. & Zdun, U. (eds.). Vienna: Springer, p. 398-405 8 p. (Lecture Notes in Computer Science; vol. 8627).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A formal modeling for exceptions in context-aware systems

    Yoon, T.-S., Choi, J.-H., Cho, E.-S., Helal, S., C., S. (Editor), B., M. (Editor), C.K., C. (Editor), Y., G. (Editor), K., Y. (Editor), A., H. (Editor), Y., O. (Editor), M., M. (Editor) & [Unknown], 2014, 38th Annual IEEE Computer Software and Applications Conference Workshops, COMPSACW 2014. IEEE, p. 734-739 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A machine learning: an example of HCI prototyping with design fiction

    Lindley, J. & Potts, R., 2014, NordiCHI '14 Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational. New York: Association for Computing Machinery (ACM), p. 1081-1084 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    A method for analysing traceability between privacy policies and privacy controls of online social networks

    Anthonysamy, P., Greenwood, P. & Rashid, A., 2014, Privacy technologies and policy: First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers. Preneel, B. & Ikonomou, D. (eds.). Berlin: Springer, p. 187-202 16 p. (Lecture Notes in Computer Science; vol. 8319).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    A service-independent model for linking online user profile information

    Edwards, M., Rashid, A. & Rayson, P., 2014, IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, The Hague, The Netherlands, 24-26 September, 2014. IEEE, p. 280-283 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    A survey of user interaction for spontaneous device association

    Chong, M. K., Mayrhofer, R. & Gellersen, H., 2014, In: ACM Computing Surveys. 47, 1, 40 p., 8.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    A utility model for volunteered service composition

    Elhabbash, A., Bahsoon, R., Tino, P. & Lewis, P. R., 2014, Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing. IEEE, p. 337-344 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Action Classification with Locality-constrained Linear Coding

    Rahmani, H., Mahmood, A., Huynh, D. Q. & Mian, A., 2014, 2014 22nd International Conference on Pattern Recognition. IEEE, p. 3511-3516 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Active learning accelerated automatic heuristic construction for parallel program mapping

    Ogilvie, W., Petoumenos, P., Wang, Z. & Leather, H., 2014, PACT '14 Proceedings of the 23rd international conference on Parallel architectures and compilation. New York: ACM, p. 481-482 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Adaptive conflict resolution mechanism for multi-party privacy management in social media

    Such, J. M. & Criado, N., 2014, WPES '14 Proceedings of the 13th Workshop on Privacy in the Electronic Society. New York: ACM, p. 69-72 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Aggregating opinions to design energy-efficient buildings

    Soriano Marcolino, L., Kolev, B., Price, S., Palangat Veetil, S., Gerber, D. J., Musil, J. & Tambe, M., 2014, 8th Multidisciplinary Workshop on Advances in Preference Handling (M-PREF 2014).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    AO-OpenCom: an AO-middleware architecture supporting flexible dynamic reconfiguration

    Surajbali, B., Grace, P. & Coulson, G., 2014, CBSE '14 Proceedings of the 17th international ACM Sigsoft symposium on Component-based software engineering. New York: ACM, p. 75-84 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Application caching for cloud-sensor systems

    Xu, Y. & Helal, S., 2014, MSWiM '14 Proceedings of the 17th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems. New York: ACM, p. 303-306 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    BARTER: promoting local spending behavior

    Knowles, B., Lochrie, M., Coulton, P. & Whittle, J., 2014, CHI EA '14 CHI '14 Extended Abstracts on Human Factors in Computing Systems. New York: ACM, p. 1933-1938 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Beyond box-ticking: a study of stakeholder involvement in social enterprise governance

    Larner, J. & Mason, C., 2014, In: Corporate Governance: The International Journal of Business in Society. 14, 2, p. 181-196 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Published

    Botyacc: unified P2P botnet detection using behavioural analysis and graph analysis

    Nagaraja, S., 2014, Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II. Kutyłowski, M. & Vaidya, J. (eds.). Springer, p. 439-456 18 p. (Lecture Notes in Computer Science; vol. 8713).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Budget-aware task scheduling in the cloud

    Thanasias, V., Lee, C. & Helal, S., 2014, 6th International Conference on Ubiquitous and Future Networks, ICUFN 2014. IEEE, p. 309-310 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Cache as a service: leveraging SDN to efficiently and transparently support Video-on-Demand on the last mile

    Georgopoulos, P., Broadbent, M., Plattner, B. & Race, N., 2014, 23rd International Conference on Computer Communications and Networks (ICCCN 2014). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Captcha as graphical passwords: a new security primitive based on hard AI problems

    Zhu, B. B., Yan, J., Bao, G., Yang, M. & Xu, N., 2014, In: IEEE Transactions on Information Forensics and Security. 9, 6, p. 891-904 14 p., 6775249.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top