Home > Research Search

Search for research

  1. Published

    A Multi-Level Meta-Object Protocol for Fault-Tolerance in Complex Architectures.

    Taiani, F., Fabre, J. & Killijian, M., 28/06/2005, DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks. IEEE Computer Society, p. 270-279 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Generating Hierarchical State Machines from Use Case Charts.

    Whittle, J. & Jayaraman, P., 11/09/2006, RE '06 Proceedings of the 14th IEEE International Requirements Engineering Conference. IEEE Computer Society, p. 16-25 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Rhetoric for Synchronous video communication

    Themelis, C. & Bonzo, J., 11/07/2011, Proceedings of The 2011 World Congress in Computer Science, Computer Engineering, and Applied Computing. p. 234-241 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Service-based, Multi-Provider, Fog Ecosystem with Joint Optimization of Request Mapping and Response Routing

    AL-Naday, M., Thomos, N., Hu, J., Volckaert, B., de Turck, F. & Reed, M. J., 1/05/2023, In: IEEE Transactions on Services Computing. 16, 3, p. 2203-2214 12 p., 3.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    OSA: one-class recursive SVM algorithm with negative samples for fault detection

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 2013, Artificial neural networks and machine learning – ICANN 2013: 23rd International Conference on Artificial Neural Networks Sofia, Bulgaria, September 10-13, 2013. Proceedings. Mladenov, V., Koprinkova-Hristova, P., Palm, G., Villa, A. E. P., Appollini, B. & Kasabov, N. (eds.). Berlin: Springer Verlag, p. 194-207 14 p. (Lecture Notes in Computer Science; vol. 8131).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    SemTrack: Large-Scale Dataset for Semantic Tracking in the Wild

    Wang, P., Hui, X., Wu, J., Yang, Z., Ong, K. E., Zhao, X., Lu, B., Huang, D., Ling, E., Chen, W., Ma, K. T., Hur, M. & Liu, J., 7/12/2024, Computer Vision -- ECCV 2024: 18th European Conference, Milan, Italy, September 29–October 4, 2024, Proceedings, Part XXIV. Leonardis, A., Ricci, E., Roth, S., Russakovsky, O., Sattler, T. & Varol, G. (eds.). Cham: Springer, p. 486-504 19 p. (Lecture Notes in Computer Science; vol. 15082).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    FABI: A formal analyser of binary image objects identification tools

    Iqbal, S., Altamimi, A. B., Khan, W., Alsaffar, M., Ahmad, A. & Alfaisal, F. F., 31/12/2024, In: IEEE Access. 12, p. 186313-186325 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Variable- and Fixed-Structure Augmented Interacting Multiple Model Algorithms for Manoeuvring Ship Tracking Based on New Ship Models

    Semerdjiev, E. & Mihaylova, L., 1/03/2000, In: International Journal of Applied Mathematics and Computer Science. 10, 3, p. 591-604 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Threat Modeling the Cloud: An Ontology Based Approach

    Manzoor, S., Vateva-Gurova, T., Trapero, R. & Suri, N., 30/01/2019, IOSec 2018: Information and Operational Technology Security Systems . Fournaris, A., Lampropoulos, K. & Marin Tordera, E. (eds.). Cham: Springer-Verlag, p. 61-72 12 p. (Lecture Notes in Computer Science; vol. 11398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Role-based secure inter-operation and resource usage management in mobile grid systems

    Gouglidis, A. & Mavridis, I., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication : 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. Ardagna, C. A. & Zhou, J. (eds.). Berlin: Springer Verlag, p. 38-53 16 p. (Lecture Notes in Computer Science; vol. 6633).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review