City Research Online

Items where Schools and Departments is "School of Mathematics, Computer Science & Engineering > Computer Science" and Year is 2012

Up a level
Export as [feed] RSS 2.0 [feed] RSS
Group by: Authors | Publication Type | No Grouping
Jump to: A | B | C | D | F | G | H | K | L | M | N | O | P | R | S | T | V | W | Z | Š
Number of items: 68.

A

Alonso, E., Fairbank, M. and Mondragon, E. (2012). Conditioning for Least Action. Paper presented at the 11th International Conference on Cognitive Modeling, 13-04-2012 - 15-04-2012, Berlin, Germany.

Alonso, E. and Mondragon, E. (2012). Uses, Abuses and Misuses of Computational Models in Classical Conditioning. Paper presented at the 11th International Conference on Cognitive Modeling, 13-15 Apr 2012, Berlin, Germany.

Alonso, E., Mondragon, E. and Fernandez, A. (2012). A Java simulator of Rescorla and Wagner's prediction error model and configural cue extensions. Computer Methods and Programs in Biomedicine, 108(1), pp. 346-355. doi: 10.1016/j.cmpb.2012.02.004

Alonso, E. and Schmajuk, N. (2012). Computational Models of Classical Conditioning guest editors’ introduction. Learning and Behavior, 40(3), pp. 231-240. doi: 10.3758/s13420-012-0081-7

B

Bawden, D. (2012). Norbert Wiener and voices from the past. Journal of Documentation, 68(5),

Bawden, D. (2012). Russell Shank and the nature of the information disciplines. Journal of Documentation, 68(6),

Bawden, D. (2012). The city, the world, and what cannot be measured. Journal of Documentation, 68(2),

Bawden, D. (2012). The declining impact of the impact factor. Journal of Documentation, 69(2),

Bawden, D. and Robinson, L. (2012). Introduction to information science. In: UNSPECIFIED . London: Facet Publishing. ISBN 9781856048101

Benetos, E. and Dixon, S. (2012). A Shift-Invariant Latent Variable Model for Automatic Music Transcription. Computer Music Journal, 36(4), pp. 81-94. doi: 10.1162/COMJ_a_00146

Benetos, E. and Dixon, S. (2012). Temporally-constrained convolutive probabilistic latent component analysis for multi-pitch detection. Lecture Notes in Computer Science: Latent Variable Analysis and Signal Separation, 7191, pp. 364-371. doi: 10.1007/978-3-642-28551-6_45

Benetos, E., Dixon, S., Giannoulis, D., Kirchhoff, H. and Klapuri, A. (2012). Automatic Music Transcription: Breaking the Glass Ceiling. Paper presented at the 13th International Society for Music Information Retrieval Conference (ISMIR 2012), 8 - 12 Oct 2012, Porto, Portugal.

Benetos, E., Klapuri, A. and Dixon, S. (2012). Score-informed transcription for automatic piano tutoring. European Signal Processing Conference, ISSN 2219-5491

Benetos, E., Lagrange, M. and Dixon, S. (2012). Characterisation of acoustic scenes using a temporally-constrained shift-invariant model. Paper presented at the 15th International Conference on Digital Audio Effects Conference (DAFx-12), 17 - 21 Sept 2012, University of York, York, UK.

Bernardy, J. P., Jannson, P. and Paterson, R. A. (2012). Proofs for free - parametricity for dependent types. Journal of Functional Programming, 22(2), pp. 107-152. doi: 10.1017/S0956796812000056

C

Child, C. H. T. (2012). Approximate Dynamic Programming with Parallel Stochastic Planning Operators (TR/2012/DOC/03). City University London.

Comuzzi, M., Angelov, S. and Vonk, J. (2012). Patterns to Enable Mass-Customized Business Process Monitoring. Paper presented at the CAiSE 2012, 24th International Conference, 25-06-2012 - 29-06-2012, Gdansk, Poland.

Comuzzi, M., Vonk, J. and Grefen, P. (2012). Measures and mechanisms for process monitoring in evolving business networks. Data & Knowledge Engineering, 71(1), pp. 1-28. doi: 10.1016/j.datak.2011.07.004

Curran, W., Moore, T., Kulesza, T., Wong, W-K, Todorovic, S., Stumpf, S., White, R. and Burnett, M. (2012). Towards recognizing "cool": can end users help computer vision recognize subjective attributes of objects in images? In: Duarte, C., Carriço, L., Jorge, J. A., Oviatt, S. L. and Gonçalves, D. (Eds.), Proceedings of the 2012 ACM international conference on Intelligent User Interfaces. (pp. 285-288). New York: ACM. ISBN 978-1-4503-1048-2

D

da Silva, I. and Zisman, A. (2012). A Framework for Trusted Services. Paper presented at the Service-Oriented Computing - 10th International Conference, ICSOC 2012, 12 - 15 Nov 2012, Shanghai, China.

F

Fairbank, M. and Alonso, E. (2012). A Comparison of Learning Speed and Ability to Cope Without Exploration between DHP and TD(0). Paper presented at the IEEE International Joint Conference on Neural Networks (IEEE IJCNN 2012), 1783-1789, 10-15-2012, Brisbane, Australia.

Fairbank, M. and Alonso, E. (2012). A Comparison of Learning Speed and Ability to Cope Without Exploration between DHP and TD(0). The 2012 International Joint Conference on Neural Networks (IJCNN), pp. 1478-1485. doi: 10.1109/IJCNN.2012.6252569

Fairbank, M. and Alonso, E. (2012). Efficient Calculation of the Gauss-Newton Approximation of the Hessian Matrix in Neural Networks. Neural Computation, 24(3), pp. 607-610. doi: 10.1162/NECO_a_00248

Fairbank, M. and Alonso, E. (2012). Value-Gradient Learning. Paper presented at the WCCI 2012 IEEE World Congress on Computational Intelligence, 10-06-2012 - 15-06-2012, Brisbane, Australia.

Fairbank, M. and Alonso, E. (2012). The divergence of reinforcement learning algorithms with value-iteration and function approximation. Paper presented at the The 2012 International Joint Conference on Neural Networks (IJCNN), 10-06-2012 - 15-06-2012, Brisbane, Australia.

Fairbank, M., Alonso, E. and Prokhorov, D. (2012). Simple and Fast Calculation of the Second-Order Gradients for Globalized Dual Heuristic Dynamic Programming in Neural Networks. IEEE Transactions on Neural Networks and Learning Systems, 23(10), pp. 1671-1676. doi: 10.1109/TNNLS.2012.2205268

Foster, H. and Spanoudakis, G. (2012). Taming the cloud: Safety, certification and compliance for software services - Keynote at the Workshop on Engineering Service-Oriented Applications (WESOA) 2011. In: Lecture Notes in Computer Science. (pp. 3-8). Springer. ISBN 9783642318757

Foster, H., Spanoudakis, G. and Mahbub, K. (2012). Formal Certification and Compliance for Run-Time Service Environments. In: Moser, L. E., Parashar, M. and Hung, P. C. K. (Eds.), 2012 IEEE Ninth International Conference on Services Computing (SCC),. (pp. 17-24). IEEE. ISBN 978-0-7695-4753-4

Foster, H., Spanoudakis, G. and Mahbub, K. (2012). Formal certification and compliance for run-time service environments. Paper presented at the 2012 IEEE Ninth International Conference on Services Computing (SCC), 24 - 29 June 2012, Honolulu, USA.

G

Ganz, M., Yang, X. and Slabaugh, G. G. (2012). Automatic Segmentation of Polyps in Colonoscopic Narrow-Band Imaging Data. IEEE Transactions on Biomedical Engineering, 59(8), pp. 2144-2151. doi: 10.1109/TBME.2012.2195314

Gorp, P. V., Comuzzi, M., Fialho, A. S. and Kaymak, U. (2012). Addressing health information privacy with a novel cloud-based PHR system architecture. Paper presented at the 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 14-10-2012 - 17-10-2012, Seoul, Korea.

H

Hadjiminas, N. and Child, C. H. T. (2012). Be The Controller: A Kinect Tool Kit for Video Game Control - Recognition of Human Motion Using Skeletal Relational Angles. Paper presented at the 5th Annual International Conference On Computer Games, Multimedia And Allied Technology (CGAT 2012), 2012, Bali, Indonesia.

Hampshire, T. E., Roth, H. R., Boone, D. J., Slabaugh, G. G., Halligan, S. and Hawkes, D. J. (2012). Prone to Supine CT Colonography Registration Using a Landmark and Intensity Composite Method. In: Yoshida, H, Hawkes, DJ and Vannier, MW (Eds.), Abdominal Imaging. Computational and Clinical Applications. (pp. 1-9). Springer. ISBN 978-3-642-33611-9

Houyou, A. M., Huth, H-P., Kloukinas, C., Trsek, H. and Rotondi, D. (2012). Agile manufacturing: General challenges and an IoT@Work perspective. In: UNSPECIFIED (pp. 1-7). IEEE. ISBN 978-1-4673-4735-8

Howe, J. M. and King, A. (2012). Polyhedral Analysis using Parametric Objectives. Lecture Notes on Computer Science, 7460, pp. 41-57. doi: 10.1007/978-3-642-33125-1_6

Howe, J. M. and King, A. (2012). A pearl on SAT and SMT solving in Prolog. Theoretical Computer Science, 435, pp. 43-55. doi: 10.1016/j.tcs.2012.02.024

K

Kloukinas, C. and Ozkaya, M. (2012). XCD – Simple, Modular, Formal Software Architectures (TR/2012/DOC/01). .

Kloukinas, C. and Ozkaya, M. (2012). Xcd - Modular, Realizable Software Architectures. Lecture Notes in Computer Science: Formal Aspects of Component Software, 7684, pp. 152-169. doi: 10.1007/978-3-642-35861-6_10

Kulesza, T., Stumpf, S., Burnett, M. and Kwan, I. (2012). Tell me more?: the effects of mental model soundness on personalizing an intelligent agent. In: Konstan, J. A., Chi, E. H. and Höök, K. (Eds.), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. (pp. 1-10). New York: ACM. ISBN 978-1-4503-1015-4

L

Li, S., Fairbank, M., Wunsch, D. C. and Alonso, E. (2012). Vector Control of a Grid-Connected Rectifier/Inverter Using an Artificial Neural Network. Paper presented at the IEEE International Joint Conference on Neural Networks (IEEE IJCNN 2012), 1783-1789, 10-15-2012, Brisbane, Australia.

M

Mantas, G., Lymberopoulos, D. and Komninos, N. (2012). PKI security in large-scale healthcare networks. Journal of Medical Systems, 36(3), pp. 1107-1116. doi: 10.1007/s10916-010-9573-1

Mukherjee, A. and Bawden, D. (2012). Health information seeking in the information society. Health Information & Libraries Journal, 29(3), pp. 242-246. doi: 10.1111/j.1471-1842.2012.00997.x

N

Netkachova, K. (2012). The model and implementation of Safety Case Cores. Information & Security, 28(2), pp. 286-295.

Netkachova, K. and Kharchenko, V. S. (2012). Analyzing the Dynamics of software vulnerability detection using a logistic curve. Systems of Control, Navigation and Communications, 2(22), pp. 173-177.

O

Ozkaya, M. and Kloukinas, C. (2012). Highly analysable, reusable, and realisable architectural designs with XCD. Communications in Computer and Information Science, 340, pp. 72-79. doi: 10.1007/978-3-642-35267-6_10

P

Palacios, M., García-Fanjul, J., Tuya, J. and Spanoudakis, G. (2012). Identifying Test Requirements by Analyzing SLA Guarantee Terms. In: Goble, C. A., Chen, P. P. and Zhang, J. (Eds.), 2012 IEEE 19th International Conference on Web Services (ICWS). (pp. 351-358). IEEE. ISBN 978-1-4673-2131-0

Parulek, J., Turkay, C., Reuter, N. and Viola, I. (2012). Implicit surfaces for interactive graph based cavity analysis of molecular simulations. Paper presented at the 2nd IEEE Symposium on Biological Data Visualization, 14 Dec - 15 Dec 2012, Seattle, USA.

Paterson, R. A. (2012). Constructing applicative functors. Paper presented at the 11th International Conference, Mathematics of Program Construction, 25 - 27 Jun 2012, Madrid, Spain.

Pawar, P. S., Nair, S. K., El-Mousaa, F., Dimitrakos, T., Rajarajan, M. and Zisman, A. (2012). Opinion Model Based Security Reputation Enabling Cloud Broker Architecture. Paper presented at the CloudComp 2012 - 3rd International Conference on Cloud Computing, 24 - 26 Sep 2012, Vienna, Austria.

Pawar, P. S., Rajarajan, M., Nair, S. K. and Zisman, A. (2012). Trust Model for Optimized Cloud Services. IFIP Advances in Information and Communication Technology, 374, pp. 97-112. doi: 10.1007/978-3-642-29852-3_7

Pearson, J., Buchanan, G., Thimbleby, H. W. and Jones, M. (2012). The Digital Reading Desk: A lightweight approach to digital note-taking. Interacting with Computers, 24(5), pp. 326-338. doi: 10.1016/j.intcom.2012.03.001

Pino, L. and Spanoudakis, G. (2012). Constructing secure service compositions with patterns. Paper presented at the 2012 IEEE 8th World Congress on Services, SERVICES 2012, 24 -29 June 2012, Honolulu, Hawaii.

Pino, L. and Spanoudakis, G. (2012). Finding secure compositions of software services: Towards a pattern based approach. 2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops, pp. 1-5. doi: 10.1109/NTMS.2012.6208741

Plebani, P., Cappiello, C., Comuzzi, M., Pernici, B. and Yadav, S. (2012). MicroMAIS: executing and orchestrating Web services on constrained mobile devices. Software: Practice and Experience, 42(9), pp. 1075-1094. doi: 10.1002/spe.1106

R

Rajarajan, M., Sajjad, A., Zisman, A., Nair, S. K. and Dimitrakos, T. (2012). Secure communication using dynamic VPN provisioning in an Inter-Cloud environment. Paper presented at the ICON 2012: 18th IEEE International Conference on Networks, 12 - 14 Dec 2012, Singapore.

Robinson, L. and Ship, M. (2012). "Permeating all community activities"? Comparing events and programming in Westminster and Tower Hamlets public libraries. Library and Information Research, 36(13), pp. 114-126.

Roth, H. R., Hampshire, T. E., McClelland, J. R., Hu, M., Boone, D. J., Slabaugh, G. G., Halligan, S. and Hawkes, D. J. (2012). Inverse Consistency Error in the Registration of Prone and Supine Images in CT Colonography. Lecture Notes in Computer Science, 7029, pp. 1-7. doi: 10.1007/978-3-642-28557-8_1

S

Spanoudakis, G., Damiani, E. and Maña, A. (2012). Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach. Paper presented at the High-Assurance Systems Engineering (HASE), 2012 IEEE 14th International Symposium on, 25 - 27 Oct 2012, Omaha, US.

Stumpf, S., Burnett, M., Pipek, V. and Wong, W-K (2012). End-user interactions with intelligent and autonomous systems. In: Konstan, J. A., Chi, E. H. and Höök, K. (Eds.), CHI '12 Extended Abstracts on Human Factors in Computing Systems. (pp. 2755-2758). New York: ACM. ISBN 978-1-4503-1016-1

Stupples, D. and Spurgin, A. (2012). Nuclear Industry Organizations: Shaped by Accidents. Paper presented at the 11th International Probabilistic Safety Assessment and Management Conference and the Annual European Safety and Reliability Conference 2012 (PSAM11 ESREL 2012), 25-29 Jun 2012, Helsinki, Finland.

T

Ter-Sarkisov, A. (2012). Computational complexity of elitist population-based evolutionary algorithms: a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science at Massey University, Palmerston North, New Zealand. (Unpublished Doctoral thesis, Massey University, Palmerston North, New Zealand.)

Turkay, C., Lundervold, A., Lundervold, A.J. and Hauser, H. (2012). Representative factor generation for the interactive visual analysis of high-dimensional data. IEEE Transactions on Visualization and Computer Graphics, 18(12), pp. 2621-2630. doi: 10.1109/TVCG.2012.256

Turkay, C., Parulek, J. and Hauser, H. (2012). Dual analysis of DNA microarrays. Paper presented at the i-Know '12, 12th International Conference on Knowledge Management and Knowledge Technologies, 5 September 2012 - 7 September 2012, Graz, Austria.

V

Van Gorp, P. and Comuzzi, M. (2012). MyPHRMachines: Lifelong Personal Health Records in the Cloud. Paper presented at the 2012 25th International Symposium on Computer-Based Medical Systems (CBMS),, 20-06-2012 - 22-06-2012, Rome, Italy.

W

Wissmann, Jens (2012). Chord Sequence patterns in OWL. (Unpublished Doctoral thesis, City University London)

Wolff, D., Stober, S., Nürnberger, A. and Weyde, T. (2012). A Systematic Comparison of Music Similarity Adaptation Approaches. Paper presented at the 13th International Society for Music Information Retrieval Conference (ISMIR 2012), 8 - 12 Oct 2012, Porto, Portugal.

Z

Zhang, Yun (2012). Pattern recognition techniques applied to rust classification in steel structures. (Unpublished Masters thesis, City University London)

Š

Šoltészová, V., Turkay, C., Price, M. C. and Viola, I. (2012). A perceptual-statistics shading model. IEEE Transactions on Visualization and Computer Graphics, 18(12), pp. 2265-2274. doi: 10.1109/TVCG.2012.188

This list was generated on Tue Apr 23 04:24:08 2019 UTC.