Home > Research > DSI - Foundations > Publications & Outputs
View graph of relations

DSI - Foundations

  1. 2018
  2. Published

    Algorithms or Actions? A Study in Large-Scale Reinforcement Learning

    Rocha Tavares, A., Anbalagan, S., Soriano Marcolino, L. & Chaimowicz, L., 1/07/2018, Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence (IJCAI-18). International Joint Conferences on Artificial Intelligence, p. 2717-2723 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach

    Xu, P., Wang, L., Guan, Z., Zheng, X., Chen, X., Tang, Z., Fang, D., Gong, X. & Wang, Z., 1/07/2018, p. 1050-1056. 7 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    Reproducibility and replicability of software defect prediction studies

    Mahmood, Z., Bowes, D., Hall, T., Lane, P. C. R. & Petrić, J., 1/07/2018, In: Information and Software Technology. 99, p. 148-163 16 p.

    Research output: Contribution to Journal/MagazineReview articlepeer-review

  5. Published

    Uncertain Data Envelopment Analysis

    Ehrgott, M., Holder, A. & Nohadani, O., 1/07/2018, In: European Journal of Operational Research. 268, 1, p. 231-242 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    A note on the 2-circulant inequalities for the max-cut problem

    Kaparis, K. & Letchford, A. N., 07/2018, In: Operations Research Letters. 46, 4, p. 443-447 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    A Video-based Attack for Android Pattern Lock

    Ye, G., Tang, Z., Fang, D., Chen, X., Wolff, W., Aviv, A. & Wang, Z., 07/2018, In: ACM Transactions on Privacy and Security. 21, 4, 31 p., 19.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Can you detect early dementia from an email? A proof of principle study of daily computer use to detect cognitive and functional decline

    Stringer, G., Couth, S., Brown, L. J. E., Montaldi, D., Gledson, A., Mellor, J., Sutcliffe, A., Sawyer, P., Keane, J., Bull, C., Zeng, X., Rayson, P. & Leroi, I., 07/2018, In: International Journal of Geriatric Psychiatry. 33, 7, p. 867-874 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    DISCO: Interference-Aware Distributed Cooperation with Incentive Mechanism for 5G Heterogeneous Ultra-Dense Networks

    Yang, C., Xiao, J., Li, J., Shao, X., Anpalagan, A., Ni, Q. & Guizani, M., 07/2018, In: IEEE Communications Magazine. 56, 7, p. 198-204 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    IoT Enabled Highways Maintenance: Towards an Understanding of Emerging Cyber Security Threats

    Trotter, L. K., Harding, M. P., Mikusz, M. A. & Davies, N. A. J., 07/2018, In: IEEE Pervasive Computing. 17, 3, p. 23-34 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Secure MISO-NOMA Transmission With Artificial Noise

    Lv, L., Ding, Z., Ni, Q. & Chen, J., 07/2018, In: IEEE Transactions on Vehicular Technology. 67, 7, p. 6700-6705 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top