Items where Subject is "Q Science > QA Mathematics > QA75 Electronic computers. Computer science"

Up a level
Export as [feed] RSS 2.0 [feed] RSS
Group by: Creators | Item Type
Jump to: A | B | C | D | E | F | G | H | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Number of items at this level: 920.

A

Abdallah, S., Benetos, E., Gold, N., Hargreaves, S., Weyde, T. & Wolff, D. (2017). The digital music lab: A big data infrastructure for digital musicology. Journal on Computing and Cultural Heritage, 10(1), 2.. doi: 10.1145/2983918

Abufadel, A., Slabaugh, G.G., Unal, G.B., Zhang, L. & Odry, B. (2006). Interacting Active Rectangles for Estimation of Intervertebral Disk Orientation. In: 18th International Conference on Pattern Recognition, 2006. ICPR 2006. (pp. 1013-1016). IEEE Computer Society. ISBN 0-7695-2521-0

Abufadel, A., Slabaugh, G.G., Unal, G.B., Zhang, L. & Odry, B. (2008). Interacting Active Rectangles for Estimation of Intervertebral Disk Orientation. Paper presented at the 8th International Conference on Pattern Recognition (ICPR), 2006., 20-08-2006 - 24-08-2008, Hong Kong.

Acarali, D., Rajarajan, M., Komninos, N. & Herwono, I. (2016). Survey of Approaches and Features for the Identification of HTTP-Based Botnet Traffic. Journal of Network and Computer Applications, doi: 10.1016/j.jnca.2016.10.007

Adamsky, F., Khayam, S. A., Jaeger, R. & Rajarajan, M. (2014). Stealing bandwidth from BitTorrent seeders. Computers & Security, 46, pp. 126-140. doi: 10.1016/j.cose.2014.07.009

Adamsky, F., Khayam, S. A., Jager, R. & Rajarajan, M. (2014). Who is going to be the next BitTorrent Peer Idol?. Paper presented at the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 26-08-2014 - 28-08-2014, Milan, Italy.

Adamsky, Florian (2016). Analysis of bandwidth attacks in a bittorrent swarm. (Unpublished Doctoral thesis, City, University of London)

Adnan, M., Rosi, L., Veluru, S., Mouseli, M., Longley, P. A. & Rajarajan, M. (2014). Using Digital Traces for User Profiling: the Uncertainty of Identity Toolset. Paper presented at the ACM Security in Information and Networks, (SIN 2014), 09-09-2014 - 11-09-2014, Glasgow, UK.

Agamah, Simon (2016). Evolutionary combinatorial optimisation for energy storage scheduling, and web-based power systems analysis using PHP. (Unpublished Doctoral thesis, City, University of London)

Aharon, A., Fournier, L., Gluska, A., Lichtenstein, Y. & Malka, J. (1998). Method for Measuring Architectural Test Coverage for Design Verification. Aharon, A., Fournier, L., Gluska, A., Lichtenstein, Y. & Malka, J.

Aharon, A., Malka, J. & Lichtenstein, Y. (1999). Test Program Generator. Aharon, A., Malka, Y., Lichtenstein, Y.

Al Arifi, S.M.M.R., Asad, M., Knapp, K., Gundry, M. & Slabaugh, G.G. (2015). Cervical Vertebral Corner Detection using Haar-like Features and Modified Hough Forest. In: 2015 International Conference on Image Processing Theory, Tools and Applications. (pp. 417-422). IEEE. ISBN 978-1-4799-8636-1

Al-Arif, S. M., Asad, M., Knapp, K., Gundry, M. & Slabaugh, G.G. (2015). Hough Forest-based Corner Detection for Cervical Spine Radiographs. Paper presented at the Medical Image Understanding and Analysis Conference, MIUA 2015, 15-07-2015 - 17-07-2015, University of Lincoln, UK.

Al-Malki, Dana Mohammed (2006). Development of virtual network computing (VNC) environment for networking and enhancing user experience. (Unpublished Doctoral thesis, City University London)

Alam, S. S. & Jianu, R. (2016). Analyzing Eye-Tracking Information in Visualization and Data Space: from Where on the Screen to What on the Screen.. IEEE Transactions on Visualization and Computer Graphics, PP(99), doi: 10.1109/TVCG.2016.2535340

Alavi, Y., Jofre-Bonet, M., Bunce, C. V., Wormald, R., Viswanathan, A., Foster, A. & Hitchings, R. (2011). Developing an algorithm to convert routine measures of vision into utility values for glaucoma. Ophthalmic Epidemiology, 18(5), pp. 233-243. doi: 10.3109/09286586.2011.602577

Alberdi, E., Becher, J.-C., Gilhooly, K. J., Hunter, J., Logie, R., Lyon, A., McIntosh, N. & Reiss, J. (2001). Expertise and the interpretation of computerized physiological data: implications for the design of computerized monitoring in neonatal intensive care. International Journal of Human-Computer Studies, 55(3), pp. 191-216. doi: 10.1006/ijhc.2001.0477

Alberdi, E., Gilhooly, K. J., Hunter, J., Logie, R., Lyon, A., McIntosh, N. & Reiss, J. (2000). Computerisation and decision making in neonatal intensive care: a cognitive engineering investigation. Journal of Clinical Monitoring and Computing, 16(2), pp. 85-94. doi: 10.1023/A:1009954623304

Alberdi, E., Povyakalo, A. A., Strigini, L. & Ayton, P. (2004). Effects of incorrect computer-aided detection (CAD) output on human decision-making in mammography. Academic Radiology, 11(8), pp. 909-918. doi: 10.1016/j.acra.2004.05.012

Alberdi, E., Strigini, L., Leach, K., Ryan, P., Palanque, P. & Winckler, M. (2009). Gaining assurance in a voter-verifiable voting system. Paper presented at the 2009 Second International Conference on Dependability, 18 - 23 Jun 2009, Athens, Greece.

Alberdi, E., Strigini, L., Povyakalo, A. A. & Ayton, P. (2009). Why Are People's Decisions Sometimes Worse with Computer Support?. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 5775, pp. 18-31. doi: 10.1007/978-3-642-04468-7_3

Albrecht, T., Slabaugh, G.G., Alonso, E. & Al-Arif, M. R. (2017). Deep Learning for Single-Molecule Science. Nanotechnology, doi: 10.1088/1361-6528/aa8334

Algaith, A., Gashi, I., Sobesto, B., Cukier, M., Haxhijaha, S. & Bajrami, G. (2016). Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors. In: 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop. (pp. 48-53). IEEE. ISBN 978-1-5090-3688-2

Ali, H., D'Avila Garcez, A.S., Tran, S.N., Zhou, X. & Iqbal, K. (2014). Unimodal late fusion for NIST i-vector challenge on speaker detection. Electronics Letters, 50(15), pp. 1098-1100. doi: 10.1049/el.2014.1207

Alonso, E. (2014). Actions and Agents. In: K. Frankish & W. Ramsey (Eds.), The Cambridge Handbook of Artificial Intelligence. (pp. 232-246). UK: Cambridge University Press. ISBN 9781139046855

Alonso, E. & Fairbank, M. (2013). Emergent and Adaptive Systems of Systems. Paper presented at the 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 13-10-2013 - 16-10-2013, Manchester, UK.

Alonso, E., Fairbank, M. & Mondragon, E. (2015). Back to optimality: a formal framework to express the dynamics of learning optimal behavior. Adaptive Behavior, 23(4), pp. 206-215. doi: 10.1177/1059712315589355

Alonso, E., Fairbank, M. & Mondragon, E. (2012). Conditioning for Least Action. Paper presented at the 11th International Conference on Cognitive Modeling, 13-04-2012 - 15-04-2012, Berlin, Germany.

Alonso, E., Karcanias, N. & Hessami, A. G. (2013). Multi-Agent Systems: A new paradigm for Systems of Systems. Paper presented at the ICONS 2013 : The Eighth International Conference on Systems, 27-01-2013 - 01-02-2013, Seville, Spain.

Alonso, E., Karcanias, N. & Hessami, A. G. (2013). Symmetries, groups and groupoids for Systems of Systems. Paper presented at the 2013 IEEE International Systems Conference (SysCon), 15-04-2013 - 18-04-2013, Orlando, USA.

Alonso, E. & Mondragon, E. (2010). Computational models of learning and beyond: Symmetries of associative learning. In: Computational Neuroscience for Advancing Artificial Intelligence: Models, Methods and Applications. (pp. 316-332). IGI Global. ISBN 9781609600211

Alonso, E. & Mondragon, E. (2014). Quantum Probability and Operant Conditioning: Behavioral Uncertainty in Reinforcement Learning. Paper presented at the 6th International Conference on Agents and Artificial Intelligence (ICAART 2014), 06-03-2014 - 08-03-2014, Angers, France.

Alonso, E. & Mondragon, E. (2012). Uses, Abuses and Misuses of Computational Models in Classical Conditioning. Paper presented at the 11th International Conference on Cognitive Modeling, 13-15 Apr 2012, Berlin, Germany.

Alonso, E., Mondragon, E. & Fernandez, A. (2012). A Java simulator of Rescorla and Wagner's prediction error model and configural cue extensions. Computer Methods and Programs in Biomedicine, 108(1), pp. 346-355. doi: 10.1016/j.cmpb.2012.02.004

Alonso, E., Sahota, P. & Mondragon, E. (2014). Computational Models of Classical Conditioning: A Qualitative Evaluation and Comparison. Paper presented at the 6th International Conference on Agents and Artificial Intelligence (ICAART 2014), 06-03-2014 - 08-03-2014, Angers, France.

Alonso, E. & Schmajuk, N. (2012). Computational Models of Classical Conditioning guest editors’ introduction. Learning and Behavior, 40(3), pp. 231-240. doi: 10.3758/s13420-012-0081-7

Alrajeh, D., Russo, A., Lockerbie, J., Maiden, N., Mavin, A. & Novak, M. J. (2013). Computational alignment of goals and scenarios for complex systems. 2013 35th International Conference on Software Engineering (ICSE), pp. 1249-1252. doi: 10.1109/ICSE.2013.6606690

Alvino, C. V., Unal, G.B., Slabaugh, G.G., Peny, B. & Fang, T. (2007). Efficient segmentation based on Eikonal and diffusion equations. International Journal of Computer Mathematics, 84(9), pp. 1309-1324. doi: 10.1080/00207160701324249

Amálio, N. & Spanoudakis, G. (2008). From Monitoring Templates to Security Monitoring and Threat Detection. 2008 Second International Conference on Emerging Security Information, Systems and Technologies, pp. 185-192. doi: 10.1109/SECURWARE.2008.58

Andongabo, A. & Gashi, I. (2017). vepRisk - A Web Based Analysis Tool for Public Security Data. Paper presented at the 13th European Dependable Computing Conference, 4-8 Sep 2017, Geneva, Switzerland.

Andrienko, G. & Andrienko, N. (2015). Visualization Support to Interactive Cluster Analysis. Lecture Notes in Computer Science, 9286, pp. 337-340. doi: 10.1007/978-3-319-23461-8_43

Andrienko, G., Andrienko, N., Budziak, G., Dykes, J., Fuchs, G., Von Landesberger, T. & Weber, H. (2017). Visual Analysis of Pressure in Football. Data Mining and Knowledge Discovery, 31(6), pp. 1793-1839. doi: 10.1007/s10618-017-0513-2

Andrienko, G., Andrienko, N., Budziak, G., Von Landesberger, T. & Weber, H. (2016). Coordinate transformations for characterization and cluster analysis of spatial configurations in football. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9853, pp. 27-31. doi: 10.1007/978-3-319-46131-1_6

Andrienko, G., Andrienko, N., Dykes, J., Kraak, M. J., Robinson, A. & Schumann, H. (2016). GeoVisual analytics: interactivity, dynamics, and scale. Cartography and Geographic Information Science, 43(1), pp. 1-2. doi: 10.1080/15230406.2016.1095006

Andrienko, G., Andrienko, N., Fuchs, G. & Cordero Garcia, J. M. (2017). Clustering Trajectories by Relevant Parts for Air Traffic Analysis. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2017.2744322

Andrienko, G., Andrienko, N., Fuchs, G. & Wood, J. (2016). Revealing Patterns and Trends of Mass Mobility through Spatial and Temporal Abstraction of Origin-Destination Movement Data. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2016.2616404

Andrienko, G., Andrienko, N., Mladenov, M., Mock, M. & Pölitz, C. (2011). Identifying Place Histories from Activity Traces with an Eye to Parameter Impact.. IEEE Transactions on Visualization and Computer Graphics, 18(5), pp. 675-688. doi: 10.1109/TVCG.2011.153

Andrienko, N. & Andrienko, G. (2010). Spatial generalization and aggregation of massive movement data.. IEEE Transactions on Visualization and Computer Graphics, 17(2), pp. 205-219. doi: 10.1109/TVCG.2010.44

Andrienko, N. & Andrienko, G. (2017). State Transition Graphs for Semantic Analysis of Movement Behaviours. Information Visualization, doi: 10.1177/1473871617692841

Andrienko, N., Andrienko, G., Camossi, E., Claramunt, C., Cordero Garcia, J. M., Fuchs, G., Hadzagic, M., Jousselme, A-L., Ray, C., Scarlatti, D. & Vouros, G. (2017). Visual exploration of movement and event data with interactive time masks. Visual Informatics, 1(1), pp. 25-39. doi: 10.1016/j.visinf.2017.01.004

Andrienko, N., Andrienko, G. & Fuchs, G. (2014). Analysis of mobility behaviors in geographic and semantic spaces. 2014 IEEE Conference on Visual Analytics Science and Technology (VAST), pp. 341-342. doi: 10.1109/VAST.2014.7042556

Andrienko, N., Andrienko, G., Fuchs, G. & Jankowski, P. (2016). Scalable and privacy-respectful interactive discovery of place semantics from human mobility traces. INFORMATION VISUALIZATION, 15(2), pp. 117-153. doi: 10.1177/1473871615581216

Andrienko, N., Andrienko, G., Fuchs, G. & Jankowski, P. (2015). Visual Analytics Methodology for Scalable and Privacy-Respectful Discovery of Place Semantics from Episodic Mobility Data. Lecture Notes in Computer Science, 9286, pp. 254-258. doi: 10.1007/978-3-319-23461-8_25

Andrienko, N., Andrienko, G., Fuchs, G., Rinzivillo, S. & Betz, H-D. (2015). Real Time Detection and Tracking of Spatial Event Clusters. Lecture Notes in Computer Science, 9286, pp. 316-319. doi: 10.1007/978-3-319-23461-8_38

Andrienko, N., Andrienko, G., Fuchs, G. & Stange, H. (2014). Detecting and tracking dynamic clusters of spatial events. 2014 IEEE Conference on Visual Analytics Science and Technology (VAST), pp. 219-220. doi: 10.1109/VAST.2014.7042499

Andrienko, N., Andrienko, G. & Rinzivillo, S. (2016). Leveraging spatial abstraction in traffic analysis and forecasting with visual analytics. Lecture Notes in Computer Science, 9853 L, pp. 32-35. doi: 10.1007/978-3-319-46131-1_7

Ang, C.S., Zaphiris, P. & Wilson, S. (2011). A case study analysis of a constructionist knowledge building community with activity theory. Behaviour and Information Technology, 30(5), pp. 537-554. doi: 10.1080/0144929X.2010.490921

Anglade, A., Benetos, E., Mauch, M. & Dixon, S. (2010). Improving music genre classification using automatically induced harmony rules. Journal of New Music Research, 39(4), pp. 349-361. doi: 10.1080/09298215.2010.525654

Anisetti, M., Ardagna, C. A., Guida, F., Gürgens, S., Lotz, V., Maña, A., Pandolfo, C., Pazzaglia, J., Pujol, G. & Spanoudakis, G. (2010). ASSERT4SOA: Toward Security Certification of Service-Oriented Applications. OTM Workshops, 6428, pp. 38-40. doi: 10.1007/978-3-642-16961-8_11

Apostolou, D., Zachos, K., Maiden, N., Agell, N., Sanchez-Hernandez, G., Taramigkou, M., Star, K. & Wippoo, M. (2016). Facilitating Creativity in Collaborative Work with Computational Intelligence Software. IEEE Computational Intelligence Magazine, 11(2), pp. 29-40. doi: 10.1109/MCI.2016.2532266

Ardagna, D., Baresi, L., Comai, S., Comuzzi, M. & Pernici, B. (2011). A Service-Based Framework for Flexible Business Processes. IEEE Software, 28(2), pp. 61-67. doi: 10.1109/MS.2011.28

Arsalan, M., Qureshi, A., Khan, A. U. & Rajarajan, M. (2017). Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique. Applied Soft Computing Journal, 51, pp. 1668-179. doi: 10.1016/j.asoc.2016.11.044

Arunkumar, S., Sensoy, M., Srivatsa, M. & Rajarajan, M. (2015). Reasoning with Streamed Uncertain Information from Unreliable Sources. Expert Systems with Applications, 42(22), pp. 8381-8392. doi: 10.1016/j.eswa.2015.04.031

Asad, H. & Jones, K. (2016). Verifying Inevitability of Oscillation in Ring Oscillators Using the Deductive SOS-QE Approach. IEEE Design and Test, 33(5), pp. 35-43. doi: 10.1109/MDAT.2016.2573588

Asad, H., Jones, K. & Surre, F. (2014). Verifying Robust Frequency Domain Properties of Non Linear Oscillators using SMT. In: W. Pleskacz, M. Renovell, D. Kasprowicz, L. Sekanina & S. Bernard (Eds.), 17th International Symposium on Design and Diagnostics of Electronic Circuits & Systems. (pp. 306-309). IEEE. ISBN 978-1-4799-4560-3

Asad, M. (2017). Efficient hand orientation and pose estimation for uncalibrated cameras. (Unpublished Doctoral thesis, City, University of London)

Asad, M. & Abhayaratne, C. (2013). Kinect depth stream pre-processing for hand gesture recognition. Paper presented at the 2013 IEEE International Conference on Image Processing, ICIP 2013, 15 September - 18 September 2013, Melbourne, Australia.

Asad, M. & Slabaugh, G.G. (2014). Hand Orientation Regression Using Random Forest for Augmented Reality. In: L.T. DePaolis & A. Mongelli (Eds.), Augmented and Virtual Reality. AVR 2014. Lecture Notes in Computer Science, 8853. (pp. 159-174). Berlin, Germany: Springer Verlag. ISBN 978-3-319-13968-5

Asad, M. & Slabaugh, G.G. (2017). Staged Probabilistic Regression for Hand Orientation Inference. Computer Vision and Image Understanding, 161, pp. 114-129. doi: 10.1016/j.cviu.2017.05.009

Ashford, D. (2017). The Mechanical Turk: Enduring Misapprehensions Concerning Artificial Intelligence. The Cambridge Quarterly, 46(2), pp. 119-139. doi: 10.1093/camqtly/bfx005

Ashford, M., Olander, E. K. & Ayers, S. (2016). Finding Web-Based Anxiety Interventions on the World Wide Web: A Scoping Review. JMIR Mental Health, 3(2), e14. doi: 10.2196/mental.5349

Asif, W. (2016). Critical Node Identifcation for accessing network vulnerability, a necessary consideration. (Unpublished Doctoral thesis, City, University of London)

Asif, W., Lestas, M., Khaliq Qureshi, H. & Rajarajan, M. (2016). Optimization based spectral partitioning for node criticality assessment. Journal of Network and Computer Applications, 75, pp. 279-292. doi: 10.1016/j.jnca.2016.09.003

Asif, W., Lestas, M., Qureshi, H. K. & Rajarajan, M. (2015). Spectral Partitioning for Node Criticality. 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 877-882. doi: 10.1109/ISCC.2015.7405624

Asif, W., Qureshi, H. K., Rajarajan, M. & Lestas, M. (2016). Combined Banzhaf & Diversity Index (CBDI) for critical node detection. Journal of Network and Computer Applications, 64, pp. 76-88. doi: 10.1016/j.jnca.2015.11.025

B

Badawood, Donia (2015). Narrative construction in information visualisation. (Unpublished Doctoral thesis, City, University of London)

Bailey, T. M. & Pothos, E. M. (2008). AGL StimSelect: Software for automated selection of stimuli for artificial grammar learning. Behavior Research Methods, 40(1), pp. 164-176. doi: 10.3758/BRM.40.1.164

Baloch, S., Melkisetoglu, R., Flöry, S., Azernikov, S., Slabaugh, G.G., Zouhar, A. & Fang, T. (2010). Automatic Detection of Anatomical Features on 3D Ear Impressions for Canonical Representation.. Lecture Notes in Computer Science, 6363, pp. 555-562. doi: 10.1007/978-3-642-15711-0_69

Baronchelli, A., Dall'Asta, L., Barrat, A. & Loreto, V. (2006). Strategies for fast convergence in semiotic dynamic. In: L. M. Rocha (Ed.), Artificial Life X: Proceedings of the Tenth International Conference on the Simulation and Synthesis of Living Systems. (pp. 480-485). Cambridge, MA, US: The MIT Press. ISBN 9780262681629

Baronchelli, A., Gong, T., Loreto, V. & Puglisi, A. (2010). On the origin of universal categorization patterns: an in-silica experiment. In: A. D. M. Smith, M. Schouwstra & B. de Boer (Eds.), The Evolution of Language. (pp. 365-366). USA: World Scientific. ISBN 9814295221

Barthet, M., Plumbley, M. D., Kachkaev, A., Dykes, J., Wolff, D. & Weyde, T. (2014). Big Chord Data Extraction and Mining. Paper presented at the 9th Conference on Interdisciplinary Musicology – CIM14, 03-12-2014 - 06-12-2014, Staatliches Institut für Musikforschung, Berlin, Germany.

Basaru, R. R., Child, C. H. T., Alonso, E. & Slabaugh, G.G. (2017). Conditional Regressive Random Forest Stereo-based Hand Depth Recovery. Paper presented at the International Conference on Computer Vision Workshop on Observing and Understanding Hands in Action, 23 Oct 2017, Venice, Italy.

Basaru, R. R., Child, C. H. T., Alonso, E. & Slabaugh, G.G. (2017). Hand Pose Estimation Using Deep Stereovision and Markov-chain Monte Carlo. Paper presented at the International Conference on Computer Vision Workshop on Observing and Understanding Hands in Action, 23 Oct 2017, Venice, Italy.

Basdekis, I., Alexandraki, C., Mourouzis, A. & Stephanidis, C. Incorporating Accessibility in Web-Based Work Environments: Two Alternative Approaches and Issues Involved. Paper presented at the 11th International Conference on Human-Computer Interaction, 22-27 Jul 2005, Las Vegas, USA.

Basdekis, I., Karampelas, P., Doulgeraki, V. & Stephanidis, C. (2009). Designing Universally Accessible Networking Services for a Mobile Personal Assistant. Lecture Notes in Computer Science, 5615, pp. 279-288. doi: 10.1007/978-3-642-02710-9_31

Basdekis, I., Klironomos, I., Metaxas, I. & Stephanidis, C. (2010). An overview of web accessibility in Greece: a comparative study 2004-2008. Universal Access in the Information Society, 9(2), pp. 185-190. doi: 10.1007/s10209-009-0166-z

Basdekis, I., Sakkalis, V. & Stephanidis, C. (2011). Towards an Accessible Personal Health Record. Paper presented at the Second International ICST Conference, MobiHealth 2011, 5 - 7 October 2011, Kos Island, Greece.

Bastos, M. T. & Mercea, D. (2017). The Brexit Botnet and User-Generated Hyperpartisan News. Social Science Computer Review,

Bastos, M. T., Recuero, R. & Zago, G. (2014). Taking tweets to the streets: A spatial analysis of the Vinegar Protests in Brazil. First Monday, 19(3), doi: 10.5210/fm.v19i3.5227

Bastos, M. T., Travitzki, R. & Puschmann, C. (2012). What Sticks with Whom? Twitter Follower-Followee Networks and News Classification. Paper presented at the The Sixth International AAAI Conference on Weblogs and Social Media (ICWSM 12), 4 Jun 2012, Dublin, Ireland.

Bastos, M. T. & Zago, G. (2013). Tweeting News Articles Readership and News Sections in Europe and the Americas. SAGE Open, 3(3), doi: 10.1177/2158244013502496

Bayer, N., Xu, B., Rakocevic, V. & Habermann, J. (2010). Application-aware scheduling for VoIP in Wireless Mesh Networks. Computer Networks, 54(2), pp. 257-277. doi: 10.1016/j.comnet.2009.05.014

Beecham, R. (2014). Understanding cycling behaviour through visual analysis of a large-scale observational dataset. (Unpublished Doctoral thesis, City University London)

Beecham, R., Dykes, J., Meulemans, W., Slingsby, A., Turkay, C. & Wood, J. (2016). Map LineUps: effects of spatial structure on graphical inference. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2016.2598862

Beecham, R., Dykes, J., Slingsby, A. & Turkay, C. (2015). Supporting crime analysis through visual design. Paper presented at the VIS 2015, 25-10-2015 - 30-10-2015, Chicago, USA.

Beecham, R., Rooney, C., Meier, S., Dykes, J., Slingsby, A., Turkay, C., Wood, J. & Wong, B.L.W. (2016). Faceted Views of Varying Emphasis (FaVVEs): a framework for visualising multi-perspective small multiples. Computer Graphics Forum: the international journal of the Eurographics Association, 35(3), pp. 241-249.

Beecham, R. & Wood, J. (2014). Towards confirmatory data analysis? Deriving and analysing routing information for an origin-destination bike share dataset. Paper presented at the The 46th Annual Universities’ Transport Study Group (UTSG) Conference, 06-01-2014 - 08-01-2014, Newcastle, UK.

Behbahani, Peyman (2010). Connection Robustness for Wireless Moving Networks Using Transport Layer Multi-homing. (Unpublished Doctoral thesis, City University London)

Belmonte Martin, A., Marinos, L., Rekleitis, E., Spanoudakis, G. & Petroulakis, N. E. (2015). European Union Agency for Network and Information Security (ENISA).

Benaroch, M., Lichtenstein, Y. & Finkelstein, L. (2016). Contract Design Choices and the Balance of Ex-Ante and Ex-Post Transaction Costs in Software Development Outsourcing. MIS Quarterly, 40(1), pp. 57-82.

Benetos, E., Badeau, R., Weyde, T. & Richard, G. (2014). Template Adaptation for Improving Automatic Music Transcription. Paper presented at the 15th International Society for Music Information Retrieval Conference (ISMIR), 27-10-2014 - 31-10-2014, Taipei, Taiwan.

Benetos, E., Cherla, S. & Weyde, T. (2013). An efficient shift-invariant model for polyphonic music transcription. Paper presented at the MML 2013: 6th International Workshop on Machine Learning and Music, 23 Sep 2013, Prague, Czech Republic.

Benetos, E. & Dixon, S. (2011). Joint Multi-Pitch Detection Using Harmonic Envelope Estimation for Polyphonic Music Transcription. IEEE Journal of Selected Topics in Signal Processing, 5(6), pp. 1111-1123. doi: 10.1109/JSTSP.2011.2162394

Benetos, E. & Dixon, S. (2010). Multiple-F0 estimation of piano sounds exploiting spectral structure and temporal evolution. Paper presented at the ISCA Tutorial and Research Workshop on Statistical and Perceptual Audition, 25 Sep 2010, Makuhari, Japan.

Benetos, E. & Dixon, S. (2011). Multiple-instrument polyphonic music transcription using a convolutive probabilistic model. Paper presented at the 8th Sound and Music Computing Conference, 6 - 9 Jul 2011, Padova, Italy.

Benetos, E. & Dixon, S. (2013). Multiple-instrument polyphonic music transcription using a temporally constrained shift-invariant model. The Journal of the Acoustical Society of America (JASA), 133(3), pp. 1727-1741. doi: 10.1121/1.4790351

Benetos, E. & Dixon, S. (2012). A Shift-Invariant Latent Variable Model for Automatic Music Transcription. Computer Music Journal, 36(4), pp. 81-94. doi: 10.1162/COMJ_a_00146

Benetos, E. & Dixon, S. (2012). Temporally-constrained convolutive probabilistic latent component analysis for multi-pitch detection. Lecture Notes in Computer Science: Latent Variable Analysis and Signal Separation, 7191, pp. 364-371. doi: 10.1007/978-3-642-28551-6_45

Benetos, E. & Dixon, S. (2011). A temporally-constrained convolutive probabilistic model for pitch detection. Paper presented at the Applications of Signal Processing to Audio and Acoustics (WASPAA), 2011 IEEE Workshop on, 16 - 19 Oct 2011, New Paltz, NY, US.

Benetos, E., Dixon, S., Giannoulis, D., Kirchhoff, H. & Klapuri, A. (2012). Automatic Music Transcription: Breaking the Glass Ceiling. Paper presented at the 13th International Society for Music Information Retrieval Conference (ISMIR 2012), 8 - 12 Oct 2012, Porto, Portugal.

Benetos, E., Dixon, S., Giannoulis, D., Kirchhoff, H. & Klapuri, A. (2013). Automatic music transcription: challenges and future directions. Journal of Intelligent Information Systems, pp. 1-28. doi: 10.1007/s10844-013-0258-3

Benetos, E., Ewert, S. & Weyde, T. (2014). Automatic transcription of pitched and unpitched sounds from polyphonic music. Paper presented at the IEEE International Conference on Acoustics, Speech, and Signal Processing, 4 - 9 May 2014, Florence, Italy.

Benetos, E. & Holzapfel, A. (2013). Automatic transcription of Turkish makam music. Paper presented at the 14th International Society for Music Information Retrieval Conference, 4 - 8 Nov 2013, Curitiba, PR, Brazil.

Benetos, E. & Holzapfel, A. (2014). Incorporating pitch class profiles for improving automatic transcription of Turkish makam music. Paper presented at the 4th International Workshop on Folk Music Analysis, 12-06-2014 - 13-06-2014, Istanbul, Turkey.

Benetos, E., Holzapfel, A. & Stylianou, Y. (2009). Pitched Instrument Onset Detection based on Auditory Spectra. Paper presented at the 10th International Society for Music Information Retrieval Conference, ISMIR 2009, 26 - 30 Oct 2009, Kobe, Japan.

Benetos, E., Jansson, A. & Weyde, T. (2014). Improving automatic music transcription through key detection. Paper presented at the AES 53rd International Conference on Semantic Audio, 27 - 29 Jan 2014, London, UK.

Benetos, E., Klapuri, A. & Dixon, S. (2012). Score-informed transcription for automatic piano tutoring. European Signal Processing Conference, ISSN 2219-5491

Benetos, E. & Kotropoulos, C. (2010). Non-Negative Tensor Factorization Applied to Music Genre Classification. IEEE Transactions on Audio, Speech & Language Processing, 18(8), pp. 1955-1967. doi: 10.1109/TASL.2010.2040784

Benetos, E. & Kotropoulos, C. (2008). A tensor-based approach for automatic music genre classification. Paper presented at the EUSIPCO 2008: 16th European Signal Processing Conference, 25 - 29 Aug 2008, Lausanne, Switzerland.

Benetos, E., Kotropoulos, C., Lidy, T. & Rauber, A. (2006). Testing supervised classifiers based on non-negative matrix factorization to musical instrument classification. Paper presented at the EUSIPCO 2006: 14th European Signal Processing Conference, 4 - 8 Sep 2006, Florence, Italy.

Benetos, E., Kotti, M. & Kotropoulos, C. (2007). Large scale musical instrument identification. Paper presented at the 4th Sound and Music Computing Conference, 11 - 13 Jul 2007, Lefkada, Greece.

Benetos, E., Kotti, M., Kotropoulos, C., Burred, J. J., Eisenberg, G., Haller, M. & Sikora, T. (2005). Comparison of subspace analysis-based and statistical model-based algorithms for musical instrument classification. Paper presented at the 2nd Workshop On Immersive Communication And Broadcast Systems (ICOB 2005), 27 - 28 Oct 2005, Berlin, Germany.

Benetos, E., Lagrange, M. & Dixon, S. (2012). Characterisation of acoustic scenes using a temporally-constrained shift-invariant model. Paper presented at the 15th International Conference on Digital Audio Effects Conference (DAFx-12), 17 - 21 Sept 2012, University of York, York, UK.

Benetos, E. & Stylianou, Y. (2010). Auditory Spectrum-Based Pitched Instrument Onset Detection. IEEE Transactions on Audio, Speech & Language Processing, 18(8), pp. 1968-1977. doi: 10.1109/TASL.2010.2040785

Benetos, E. & Weyde, T. (2013). Explicit duration hidden Markov models for multiple-instrument polyphonic music transcription. Paper presented at the 14th International Society for Music Information Retrieval Conference, 4 - 8 Nov 2013, Curitiba, Brazil.

Bernardy, J-P., Jansson, P. & Paterson, R. A. (2010). Parametricity and Dependent Types. Paper presented at the International Conference on Functional Programming, 27-09-2010 - 29-09-2010, Baltimore, USA.

Bernardy, J. P., Jannson, P. & Paterson, R. A. (2012). Proofs for free - parametricity for dependent types. Journal of Functional Programming, 22(2), pp. 107-152. doi: 10.1017/S0956796812000056

Bezzi, M., Sabetta, A. & Spanoudakis, G. (2011). An architecture for certification-aware service discovery. Proceedings - 2011 1st International Workshop on Securing Services on the Cloud, IWSSC 2011, pp. 14-21. doi: 10.1109/IWSSCloud.2011.6049020

Bibas, A., Spanoudakis, G., Bellos, C., Fotiadis, D. I. & Koutsouris, D. (2013). Biologically Inspired Near Extinct System Reconstruction. In: 2013 IEEE 13th International Conference on Bioinformatics and Bioengineering (BIBE). (p. 14026394). IEEE.

Bishop, P. G. (2015). Modeling the Impact of Testing on Diverse Programs. Paper presented at the 34th International Conference, SAFECOMP 2015, 23-09-2015 - 25-09-2015, Delft, The Netherlands.

Bishop, P. G. (1993). The Variation of Software Survival Time for Different Operational Input Profiles. Fault-Tolerant Computing, 1993. FTCS-23. Digest of Papers., The Twenty-Third International Symposium on, pp. 98-107. doi: 10.1109/FTCS.1993.627312

Bishop, P. G., Bloomfield, R. E., Clement, T., Guerra, S. & Jones, C. (2003). Integrity static analysis of COTS/SOUP. In: S. O. Anderson, M. Felici & B. Littlewood (Eds.), Knowledge-Based Intelligent Information and Engineering Systems 7th INternational Conference, KES 2003, Oxford, UK, September 2003. Proceedings, Part I. Lecture Notes in Computer Science, 2788. (pp. 63-76). London, UK: Springer.

Bishop, P. G., Bloomfield, R. E., Guerra, S. & Thuy, N. (2012). Safety justification frameworks: Integrating rule-based, goal-based and risk-informed approaches. In: 8th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies 2012, NPIC and HMIT 2012: Enabling the Future of Nuclear Energy. (pp. 1283-1290). Illinois, USA: American Nuclear Society. ISBN 9781627480154

Bishop, P. G., Bloomfield, R. E., Littlewood, B., Popov, P. T., Povyakalo, A. A. & Strigini, L. (2014). A conservative bound for the probability of failure of a 1-out-of-2 protection system with one hardware-only and one software-based protection train. Reliability Engineering & System Safety, 130, pp. 61-68. doi: 10.1016/j.ress.2014.04.002

Bishop, P. G. & Cyra, L. (2010). Overcoming Non-determinism in Testing Smart Devices: A Case Study. Lecture Notes in Computer Science, 6351, pp. 237-250. doi: 10.1007/978-3-642-15651-9_18

Bishop, P. G. & Povyakalo, A. A. (2016). Deriving a frequentist conservative confidence bound for probability of failure per demand for systems with different operational and test profiles. Reliability Engineering & System Safety,

Bishop, P. G. & Strigini, L. (2014). Estimating Worst Case Failure Dependency with Partial Knowledge of the Difficulty Function. Paper presented at the 33rd International Conference, SAFECOMP 2014, 10-09-2014 - 12-09-2014, Florence, Italy.

Bishop, P. G. & Strigini, L. (2014). Estimating worst case failure dependency with partial knowledge of the difficulty function. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8666, pp. 186-201. doi: 10.1007/978-3-319-10506-2_13

Blandford, A., Furniss, D. & Makri, S. (2016). Introduction: Behind the scenes. In: A. Blandford, D. Furniss & S. Makri (Eds.), Qualitative HCI Research: Going Behind the Scenes. (pp. 1-6). USA: Morgan and Claypool Publishers. ISBN 9781627057592

Blasco, J., Hernandez-Castro, J. C., Tapiador, J. M. E., Ribagorda, A. & Orellana-Quiros, M. A. (2009). Steganalysis of Hydan. IFIP Advances in Information and Communication Technology, 297, pp. 132-142. doi: 10.1007/978-3-642-01244-0_12

Blazevic, V., Wiertz, C., Cotte, J., de Ruyter, K. & Keeling, D. I. (2014). GOSIP in Cyberspace: Conceptualization and Scale Development for General Online Social Interaction Propensity. Journal of Interactive Marketing, 28(2), pp. 87-100. doi: 10.1016/j.intmar.2013.09.003

Bleisch, S., Dykes, J. & Nebiker, S (2008). Evaluating the effectiveness of representing numeric information through abstract graphics in 3D desktop virtual environments. Cartographic Journal, The, 45(3), pp. 216-226.

Bleisch, S., Dykes, J. & Nebiker, S. (2009). Building bridges between methodological approaches: a meta-framework linking experiments and applied studies in 3D geovisualization research. Paper presented at the GIS Research UK 17th Annual Conference (GISRUK 2009), 1 - 3 Apr 2009, University of Durham, Durham, UK.

Blom, A. G., Bosnjak, M., Cornilleau, A., Cousteaux, A. S., Das, M., Douhou, S. & Krieger, U. (2016). A Comparison of Four Probability-Based Online and Mixed-Mode Panels in Europe. Social Science Computer Review, 34(1), pp. 8-25. doi: 10.1177/0894439315574825

Bloomfield, R. E., Buzna, L., Popov, P. T., Salako, K. & Wright, D. (2010). Stochastic modelling of the effects of interdependencies between critical infrastructure. Paper presented at the 4th International Workshop, CRITIS 2009, 30 September - 2 October 2009, Bonn, Germany.

Bloomfield, R. E., Chozos, N. & Salako, K. (2009). Current capabilities, requirements and a proposed strategy for interdependency analysis in the UK. Paper presented at the 4th International Workshop, CRITIS 2009, 30 September - 2 October 2009, Bonn, Germany.

Bloomfield, R. E., Guerra, A. S. L., Butler, E. & Netkachova, K. (2017). Security-informed safety: integrating security within the safety demonstration of a smart device. Paper presented at the 10th International Topical Meeting on Nuclear Plant Instrumentation, Control, 11-15 Jun 2017, San Francisco, USA.

Bloomfield, R. E. & Netkachova, K. Building Blocks for Assurance Cases. Paper presented at the International Symposium on Software Reliability Engineering (ISSRE), 03-11-2014 - 06-11-2014, Naples, Italy.

Bloomfield, R. E. & Parisaca-Vargas, A. (2015). Using Ontologies to Support Model-based Exploration of the Dependencies between Causes and Consequences of Hazards. Paper presented at the 7th International Conference on Knowledge Engineering and Ontology Development, 12-11-2015 - 14-11-2015, Lisbon, Portugal.

Bloomfield, R. E., Popov, P. T., Salako, K., Stankovic, V. & Wright, D. (2017). Preliminary Interdependency Analysis: An Approach to Support Critical Infrastructure Risk Assessment. Reliability Engineering and System Safety, doi: 10.1016/j.ress.2017.05.030

Bloomfield, R. E. & Wetherilt, A. (2012). Computer trading and systemic risk: a nuclear perspective (Report No. Driver Review DR26). London, UK: Government Office for Science.

Boone, D.J., Halligan, S., Roth, H.R., Hampshire, T.E., Helbren, E., Slabaugh, G.G., McQuillan, J., McClelland, J.R., Hu, M., Punwani, S., Taylor, S. A. & Hawkes, D.J. (2013). CT colonography: external clinical validation of an algorithm for computer-assisted prone and supine registration. Radiology, 268(3), pp. 752-760. doi: 10.1148/radiol.13122083

Booth, T. (2015). Making progress: Barriers to success in end-user developers' physical prototyping. Proceedings of IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC, 2015-D, pp. 299-300. doi: 10.1109/VLHCC.2015.7357236

Booth, T., Stumpf, S., Bird, J. & Jones, S. (2016). Crossed Wires: Investigating the Problems of End-User Developers in a Physical Computing Task. Paper presented at the Conference on Human Factors in Computing Systems (CHI), 7-12 May 2016, San Jose, USA.

Borges, Rafael (2012). A neural-symbolic system for temporal reasoning with application to model verification and learning. (Unpublished Doctoral thesis, City University London)

Borges, Rafael, Garcez, A. & Lamb, L. C. (2011). Learning and Representing Temporal Knowledge in Recurrent Networks. IEEE Transactions on Neural Networks, 22(12), pp. 2409-2421. doi: 10.1109/TNN.2011.2170180

Bouts, Q. W., Dwyer, T., Dykes, J., Speckmann, B., Goodwin, S., Henry-Riche, N., Carpendale, S. & Liebman, A. (2016). Visual Encoding of Dissimilarity Data via Topology-Preserving Map Deformation. IEEE Transactions on Visualization and Computer Graphics, 22(9), pp. 2200-2213. doi: 10.1109/TVCG.2015.2500225

Bouts, Q. W., Kostitsyna, I., van Kreveld, M., Meulemans, W., Sonke, W. & Verbeek, K. Mapping polygons to the grid with small Hausdorff and Fréchet distance. In: P. Sankowski & C. Zaroliagis (Eds.), 24rd Annual European Symposium on Algorithms (ESA 2016). (197:1-197:15). Germany: Dagstuhl Publishing.

Boyes, R., Slabaugh, G.G. & Beddoe, G. (2009). Fast pseudo-enhancement correction in CT colonography using linear shift-invariant filters. Paper presented at the 16th IEEE International Conference on Image Processing (ICIP), 2009., 07-11-2009 - 10-11-2009, Cairo, Eygpt.

Boyes, R., Slabaugh, G.G. & Beddoe, G. (2009). Fast pseudo-enhancement correction in CT colonography using linear shift-invariant filters. In: 16th IEEE International Conference on Image Processing (ICIP), 2009. (pp. 2509-2512). IEEE. ISBN 9781424456536

Brocklehurst, P. (1995). Software reliability prediction : a multi-modelling approach. (Unpublished Doctoral thesis, City University London)

Broda, K., Garcez, A. & Gabbay, D. M. (2005). Metalevel priorities and neural networks. Paper presented at the Workshop on the Foundations of Connectionist-Symbolic Integration ECAI2000, 20 - 25 August 2005, Berlin.

Broom, M. & Cannings, C. (2017). Game theoretical modelling of a dynamically evolving network I: general target sequences. Journal of Dynamics and Games,

Brujic-Okretic, V., Gatzidis, C., Liarokapis, F. & Baker, S. (2008). Towards Rapid Generation and Visualisation of Large 3D Urban Landscapes for Mobile Device Navigation. Paper presented at the IEEE Virtual Reality Workshop on Virtual Cityscapes: Key Research Issues in Modeling Large-Scale Immersive Urban Environments, 8 - 9 Aug 2008, Reno, Nevada.

Buchanan, G., McKay, D. & Levitt, J. (2015). Where My Books Go: Choice and Place in Digital Reading. In: JCDL '15 Proceedings of the 15th ACM/IEEE-CS Joint Conference on Digital Libraries. (pp. 17-26). NY, USA: ACM. ISBN 978-1-4503-3594-2

Buchin, K., Buchin, M., van Leusden, R., Meulemans, W. & Mulzer, W. (2016). Computing the Fréchet Distance with a Retractable Leash. Discrete and Computational Geometry, 56(2), pp. 315-336. doi: 10.1007/s00454-016-9800-8

Burnett, M., Stumpf, S., Macbeth, J., Makri, S., Beckwith, L., Kwan, I., Peters, A. & Jernigan, W. (2016). GenderMag: A Method for Evaluating Software's Gender Inclusiveness. Interacting with Computers, 28(6), pp. 760-787. doi: 10.1093/iwc/iwv046

Busquets, J. G., Alonso, E. & Evans, A. (2016). Application of Data Mining to forecast Air Traffic: A 3-Stage Model using Discrete Choice Modeling. Paper presented at the 16th AIAA Aviation Technology, Integration, and Operations Conference, 13-17 Jun 2016, Washington D.C., USA.

Bussone, A., Stumpf, S. & O'Sullivan, D. (2015). The Role of Explanations on Trust and Reliance in Clinical Decision Support Systems. Paper presented at the 2015 International Conference on Healthcare Informatics, 21-10-2015 - 23-10-2015, Dallas, USA.

C

Casadesus-Masanell, R. & Hervas-Drane, A. (2010). Competing against online sharing. Management Decision, 48(8), pp. 1247-1260. doi: 10.1108/00251741011076771

Casadesus-Masanell, R. & Hervas-Drane, A. (2010). Peer-to-Peer File Sharing and the Market for Digital Information Goods. Journal of Economics and Management Strategy, 19(2), pp. 333-373. doi: 10.1111/j.1530-9134.2010.00254.x

Cecchinato, M.E., Cox, A. L. & Bird, J. (2015). Smartwatches: The good, the bad and the Ugly? In: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. (pp. 2133-2138). New York, NY, United States: ACM. ISBN 9781450331463

Chan, Pee Yuaw (1986). Software reliability prediction. (Unpublished Doctoral thesis, The City University London)

Charalambous, T. & Kalyvianaki, E. (2010). A min-max framework for CPU resource provisioning in virtualized servers using ℋ∞ Filters. Decision and Control (CDC), 2010 49th IEEE Conference on, pp. 3778-3783. doi: 10.1109/CDC.2010.5717375

Charalambous, T., Kalyvianaki, E., Hadjicostis, C. N. & Johansson, M. (2013). Distributed Offline Load Balancing in MapReduce Networks. Paper presented at the 2013 IEEE 52nd Annual Conference on Decision and Control (CDC), 10-12-2013 - 13-12-2013, Florence, Italy.

Charles, P. J., Howe, J. M. & King, A. (2009). Integer polyhedra for program analysis. Algorithmic Aspects in Information and Management, Lecture Notes in Computer Science, 5564, pp. 85-99. doi: 10.1007/978-3-642-02158-9_9

Chen, T., Sanchez-Aarnoutse, J. C. & Buford, J. (2011). Petri net modeling of cyber-physical attacks on smart grid. IEEE Transactions on Smart Grid, 2(4), pp. 741-749. doi: 10.1109/TSG.2011.2160000

Cherla, S., Tran, S.N., Weyde, T. & Garcez, A. (2016). Generalising the Discriminative Restricted Boltzmann Machine.

Cherla, S., Weyde, T., Garcez, A. & Pearce, M. (2013). A Distributed Model For Multiple-Viewpoint Melodic Prediction. In: A. de Souza Britto Jr, F. Gouyon & S. Dixon (Eds.), Proceedings of the 14th International Society for Music Information Retrieval Conference. (pp. 15-20). International Society for Music Information Retrieval. ISBN 978-0-615-90065-0

Cherla, S., Weyde, T., Garcez, A. & Pearce, M. (2013). Learning Distributed Representations for Multiple-Viewpoint Melodic Prediction. Paper presented at the 14th International Society for Music Information Retrieval Conference, 4 - 8 Nov 2013, Curtiba, PR, Brazil.

Child, C. H. T. (2011). Approximate Dynamic Programming with Parallel Stochastic Planning Operators. (Unpublished Doctoral thesis, City University London)

Child, C. H. T. & Dey, R. (2013). QL-BT: Enhancing Behaviour Tree Design and Implementation with Q-Learning. Computational Intelligence in Games (CIG), 2013 IEEE Conference on, pp. 275-282. doi: 10.1109/CIG.2013.6633623

Child, C. H. T., Parkar, S., Mohamedally, D., Haddad, M. & Doroana, R. (2010). Development of a Virtual Laparoscopic Trainer using Accelerometer Augmented Tools to Assess Performance in Surgical training. Poster presented at the 19th International Pediatric Endosurgery Group (IPEG) Congress, 8 - 12 Jun 2010, Hawaii, US.

Child, C. H. T. & Stathis, K. (2005). The Apriori Stochastic Dependency Detection (ASDD) algorithm for learning Stochastic logic rules. Lecture Notes in Computer Science: Computational Logic In Multi-Agent Systems, 3259, pp. 234-249. doi: 10.1007/978-3-540-30200-1_13

Child, C. H. T. & Stathis, K. (2006). Rule Value Reinforcement Learning for Cognitive Agents. Paper presented at the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS`06), 8 - 12 May 2006, Hakodate, Hokkaido, Japan.

Child, C. H. T. & Stathis, K. (2005). SMART (Stochastic Model Acquisition with ReinforcemenT) learning agents: A preliminary report. Lecture Notes in Computer Science: Adaptive Agents and Multi-Agent Systems II, 3394, pp. 73-87. doi: 10.1007/978-3-540-32274-0_5

Child, C. H. T., Stathis, K. & Garcez, A. (2007). Learning to Act with RVRL Agents. Paper presented at the 14th RCRA Workshop, Experimental Evaluation of Algorithms for Solving Problems with Combinatorial Explosion, Jul 2007, Rome, Italy.

Child, C. H. T. & Trusler, B. P. (2014). Implementing Racing AI using Q-Learning and Steering Behaviours. Paper presented at the GAMEON 2014 (15th annual European Conference on Simulation and AI in Computer Games), 09-09-2014 - 11-09-2014, University of Lincoln, Lincoln, UK.

Christou, D. (2011). ERES Methodology and Approximate Algebraic Computations. (Unpublished Doctoral thesis, City University London)

Christou, D., Karcanias, N. & Mitrouli, M. (2014). Matrix representation of the shifting operation and numerical properties of the ERES method for computing the greatest common divisor of sets of many polynomials. Journal of Computational and Applied Mathematics, 260, pp. 54-67. doi: 10.1016/j.cam.2013.09.021

Chueke, J. (2016). Perceptible affordances and feedforward for gestural interfaces: Assessing effectiveness of gesture acquisition with unfamiliar interactions. (Unpublished Doctoral thesis, City, University of London)

Clark, D., Hunt, S. & Malacaria, P. (2005). Quantified Interference for a While Language. Electronic Notes in Theoretical Computer Science, 112(SPEC), pp. 149-166. doi: 10.1016/j.entcs.2004.01.018

Cohen, N. R., Brennan, P. J., Shay, T., Watts, G. F., Brigl, M., Kang, J., Brenner, M. B. & ImmGen Project Consortium, . (2013). Shared and distinct transcriptional programs underlie the hybrid nature of iNKT cells. Nature Immunology, 14(1), pp. 90-99. doi: 10.1038/ni.2490

Collins, E.I.M., Cox, A.L., Bird, J. & Harrison, D. (2014). Social networking use and RescueTime: The issue of engagement. In: UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. (pp. 687-690). New York, NY, United States: Association for Computing Machinery (ACM). ISBN 978-1-4503-3047-3

Comuzzi, M. Aligning Monitoring and Compliance Requirements in Evolving Business Networks. Paper presented at the OnTheMove Federated Conferences & Workshops, 27-10-2014 - 31-10-2014, Amantea, Italy.

Comuzzi, M., Angelov, S. & Vonk, J. (2012). Patterns to Enable Mass-Customized Business Process Monitoring. Paper presented at the CAiSE 2012, 24th International Conference, 25-06-2012 - 29-06-2012, Gdansk, Poland.

Comuzzi, M., Jacobs, G. & Grefen, P. (2013). Understanding SLA elements in cloud computing. IFIP Advances in Information and Communication Technology, 408, pp. 385-392.

Comuzzi, M., Kotsokalis, C., Spanoudakis, G. & Yahyapour, R. (2009). Establishing and Monitoring SLAs in complex Service Based Systems. In: E. Damiani, J. Zhang & R. Chang (Eds.), 2009 IEEE International Conference on Web Services. Los Alamitos, California, I & II. (pp. 783-790). IEEE. ISBN 9780769537092

Comuzzi, M. & Martinez, R.I.R. (2014). Customized Infrastructures for Monitoring Business Processes. 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE), pp. 122-127. doi: /10.1109/SOSE.2014.19

Comuzzi, M. & Spanoudakis, G. (2009). A Framework for Hierarchical and Recursive Monitoring of Service Based Systems. In: H. Sasaki, G. O. Bellot, M. Ehmann & O. Dini (Eds.), Fourth International Conference on Internet and Web Applications and Services, 2009. ICIW '09. (pp. 383-388). IEEE. ISBN 978-1-4244-3851-8

Comuzzi, M. & Vanderfeesten, I. T. P. (2011). Product-Based Workflow Design for Monitoring of Collaborative Business Processes. Paper presented at the CAiSE 2011, 23rd International Conference, 20-06-2011 - 24-06-2011, London, UK.

Comuzzi, M., Vanderfeesten, I. T. P. & Wang, T. (2013). Optimized cross-organizational business process monitoring: Design and enactment. Information Sciences, 244, pp. 107-118. doi: 10.1016/j.ins.2013.04.036

Comuzzi, M., Vonk, J. & Grefen, P. (2010). Continuous Monitoring in Evolving Business Networks. Paper presented at the Confederated International Conferences: CoopIS, IS, DOA and ODBASE,, 25-10-2010 - 29-10-2010, Crete, Greece.

Comuzzi, M., Vonk, J. & Grefen, P. (2012). Measures and mechanisms for process monitoring in evolving business networks. Data & Knowledge Engineering, 71(1), pp. 1-28. doi: 10.1016/j.datak.2011.07.004

Cook, R., Johnston, A. & Heyes, C. (2012). Self-recognition of avatar motion: how do I know it's me?. Proceedings of the Royal Society B: Biological Sciences, 279(1729), pp. 669-674. doi: 10.1098/rspb.2011.1264

Creus-Mir, A., Casadesus-Masanell, R. & Hervas-Drane, A. (2008). Bandwidth allocation in peer-to-peer file sharing networks. Computer Communications, 31(2), pp. 257-265. doi: 10.1016/j.comcom.2007.08.001

Culbertson, W.B., Malzbender, T. & Slabaugh, G.G. (2000). Generalized Voxel Coloring. In: B. Triggs, A. Zisserman & R. Szeliski (Eds.), Vision Algorithms: Theory and Practice. (pp. 100-115). Springer. ISBN 3-540-67973-1

Cumanan, K, Rahulamathavan, Y., Lambotharan, S & Ding, Z (2013). MMSE-based beamforming techniques for relay broadcast channels. IEEE Transactions on Vehicular Technology, 62(8), pp. 4045-4051. doi: 10.1109/TVT.2013.2257906

Curran, P. J. & Novo, E. (1988). The relationship between suspended sediment concentration and remotely sensed spectral radiance - a review. Journal of Coastal Research, 4(3), pp. 351-368.

Curran, W., Moore, T., Kulesza, T., Wong, W-K, Todorovic, S., Stumpf, S., White, R. & Burnett, M. (2012). Towards recognizing "cool": can end users help computer vision recognize subjective attributes of objects in images? In: C. Duarte, L. Carriço, J. A. Jorge, S. L. Oviatt & D. Gonçalves (Eds.), Proceedings of the 2012 ACM international conference on Intelligent User Interfaces. (pp. 285-288). New York: ACM. ISBN 978-1-4503-1048-2

Cvjetkovic, M. & Rakocevic, V. (2016). Alternative Topology Construction for Cooperative Data Distribution in Mobile Ad Hoc Networks. 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 171-176. doi: 10.1109/ICUMT.2016.7765352

D

D'Amato, V., Haberman, S., Piscopo, G. & Russolillo, M. (2014). Computational framework for longevity risk management. Computational Management Science, 11(1), pp. 111-137. doi: 10.1007/s10287-013-0178-2

Dafas, P. & d'Avila Garcez, A. S. (2005). Applied temporal Rule Mining to Time Series (Report No. TR/2006/DOC/01). .

Danilova, N. & Stupples, D. (2012). Application of Natural Language Processing and Evidential Analysis to Web-Based Intelligence Information Acquisition. Intelligence and Security Informatics Conference (EISIC), Proceedings, doi: 10.1109/EISIC.2012.41

Day, J. S., Buchanan, G. & Makri, S. (2015). Learning Lessons from Controlled Studies to Investigate Users' Resilience Strategies. Lecture Notes in Computer Science, 9299, pp. 578-581. doi: 10.1007/978-3-319-22723-8_65

Day, J. S., Buchanan, G. & Makri, S. (2015). Reflecting on Users’ Strategies for Resilient Interactions. Paper presented at the 15th IFIP TC.13 International Conference on Human-Computer Interaction, 14-18 Sep 2015, Bamberg, Germany.

Del Tedesco, F., Hunt, S. & Sands, D. (2011). A semantic hierarchy for erasure policies. Lecture Notes in Computer Science, 7093 L, pp. 352-369. doi: 10.1007/978-3-642-25560-1_24

Dholakia, U. M., Blazevic, V., Wiertz, C. & Algesheimer, R. (2009). Communal Service Delivery: How Customers Benefit From Participation in Firm-Hosted Virtual P3 Communities. Journal of Service Research, 12, pp. 208-226. doi: 10.1177/1094670509338618

Dillingham, Iain (2013). Exploring the geographic uncertainty associated with crowdsourced crisis information: a geovisualisation approach. (Unpublished Doctoral thesis, City University London)

Dinh, H. Q., Turk, G. & Slabaugh, G.G. (2001). Reconstructing Surfaces Using Anisotropic Basis Functions. Paper presented at the Eighth IEEE International Conference on Computer Vision, 2001. (ICCV 2001), 07-07-2001 - 14-07-2001, Vancouver, Canada.

Dinh, H. Q., Turk, G. & Slabaugh, G.G. (2001). Reconstructing Surfaces Using Anisotropic Basis Functions. In: Eighth IEEE International Conference on Computer Vision, 2001. ICCV 2001. Proceedings. (pp. 606-613). IEEE. ISBN 0769511430

Dinh, H. Q., Turk, G. & Slabaugh, G.G. (2002). Reconstructing Surfaces by Volumetric Regularization Using Radial Basis Functions. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(10), pp. 1358-1371. doi: 10.1109/TPAMI.2002.1039207

Diplaris, S., Papadopoulos, S., Kompatsiaris, I., Goker, A.S., MacFarlane, A., Spangenberg, J., Hacid, H., Maknavicius, L. & Klusch, M. (2012). SocialSensor: Sensing User Generated Input for Improved Media Discovery and Experience. In: Proceedings of the 21st international conference companion on World Wide Web. (pp. 243-246). New York, USA: ACM. ISBN 9781450312301

Diplaris, S., Papadopoulos, S., Kompatsiaris, I., Goker, A.S., MacFarlane, A., Spangenberg, J., Hacid, H., Maknavicius, L. & Klusch, M. (2012). SocialSensor: sensing user generated input for improved media discovery and experience. Paper presented at the The Twenty-first International WWW Conference, 16-04-2012 - 20-04-2012, Lyon, France.

Dixon, S., Tidhar, D. & Benetos, E. (2011). The Temperament Police: The Truth, the Ground Truth, and Nothing but the Truth. Paper presented at the 12th International Society for Music Information Retrieval Conference, 24 - 28 Oct 2011, Miami, Florida, US.

Doan, H., Slabaugh, G.G., Unal, G.B. & Fang, T. (2006). Semi-Automatic 3-D Segmentation of Anatomical Structures of Brain MRI Volumes using Graph Cuts. Paper presented at the 2006 IEEE International Conference on Image Processing,, 08-10-2006 - 11-10-2006, Atlanta, USA.

Doan, H., Slabaugh, G.G., Unal, G.B. & Fang, T. (2006). Semi-Automatic 3-D Segmentation of Anatomical Structures of Brain MRI Volumes using Graph Cuts. In: 2006 IEEE International Conference on Image Processing. (pp. 1913-1916). IEEE. ISBN 1424404800

Douiri, A., Siddique, M., Ye, X., Beddoe, G. & Slabaugh, G.G. (2009). Enhanced detection in CT colonography using adaptive diffusion filtering. Progress in Biomedical Optics and Imaging - Proceedings of SPIE, 7259, p. 725923. doi: 10.1117/12.811563

Dove, G. (2013). Inspired by information: combining data visualization and generative techniques in early stage design research. Paper presented at the 9th ACM Conference on Creativity & Cognition, 17-06-2013 - 20-06-2013, Sydney, Australia.

Dove, G. & Jones, S. (2013). Evaluating creativity support in co-design workshops. Paper presented at the CHI 2013 Workshop: Evaluation Methods for Creativity Support Environments, 27th April - 2nd May 2013, Paris, France.

Dove, G., Jones, S., Dykes, J., Brown, A. E. & Duffy, A. (2013). Using data visualization in creativity workshops: a new tool in the designer's kit. Paper presented at the 9th ACM Conference on Creativity & Cognition, 17 - 20 Jun 2013, Sydney, Australia.

Duckham, M., van Kreveld, M., Purves, R., Speckmann, B., Tao, Y., Verbeek, K. & Wood, J. (2016). Modeling Checkpoint-Based Movement with the Earth Mover's Distance. Geographic Information Science. GIScience 2016. Lecture Notes in Computer Science, 9927, doi: 10.1007/978-3-319-45738-3_15

Dykes, J. & Bleisch, S. (2006). Planning Hikes Virtually: How Useful are Web-based 3D Visualizations?. Paper presented at the GIS Research UK 14th Annual Conference (GISRUK 2006), 5 - 7 Apr 2006, University of Nottingham, Nottingham, UK.

Dykes, J., Lloyd, D. & Radburn, R. (2009). Using the Analytic Hierarchy Process to prioritise candidate improvements to a geovisualization application. Paper presented at the GIS Research UK 17th Annual Conference (GISRUK 2009), 1 - 3 Apr 2009, University of Durham, Durham, UK.

Dykes, J. & Mountain, D. (2002). What I did on my vacation: spatio-temporal log analysis with interactive graphics and morphometric surface derivative. Paper presented at the GIS Research UK 10th Annual Conference (GISRUK 2002), 3 - 5 Apr 2002, Sheffield, UK.

Dykes, J., Rooney, C., Beecham, R., Turkay, C., Slingsby, A., Wood, J. & Wong, W. (2015). Multi-Perspective Synopsis with Faceted Views of Varying Emphasis. Paper presented at the VIS 2015, 25-10-2015 - 30-10-2015, Chicago, USA.

d'Avila Garcez, A. S., Gabbay, D. M. & Lamb, L. C. (2014). A neural cognitive model of argumentation with application to legal inference and decision making. Journal of Applied Logic, 12(2), pp. 109-127. doi: 10.1016/j.jal.2013.08.004

d'Avila Garcez, A. S., Hitzler, P. & Tamburrini, G. (2006). Proceedings of ECAI International Workshop on Neural-Symbolic Learning and reasoning NeSy 2006 (Report No. TR/2006/DOC/02). .

da Silva, I. & Zisman, A. (2012). A Framework for Trusted Services. Paper presented at the Service-Oriented Computing - 10th International Conference, ICSOC 2012, 12 - 15 Nov 2012, Shanghai, China.

de Penning, L., Garcez, A., Lamb, L. C. & Meyer, J. J. (2011). A Neural-Symbolic Cognitive Agent for Online Learning and Reasoning. In: Proceedings of the Twenty-Second international joint conference on Artificial Intelligence. (pp. 1653-1658). International Joint Conferences on Artificial Intelligence. ISBN 978-1-57735-514-4

de Rooij, A. (2016). Hacking into the emotion-creativity link Two new approaches to interactive systems that influence the relationship between emotion and creativity. (Unpublished Doctoral thesis, City University London)

de Rooij, A. (2014). Toward emotion regulation via physical interaction. Paper presented at the 19th International Conference on Intelligent User Interfaces, 24th - 27th February 2014, Haifa, Israel.

de Rooij, A., Broekens, J. & Lamers, M. F. (2013). Abstract expressions of affect. International Journal of Synthetic Emotions, 4(1), doi: 10.4018/jse.2013010101

de Rooij, A., Corr, P. J. & Jones, S. (2015). Emotion and Creativity: Hacking into Cognitive Appraisal Processes to Augment Creative Ideation. Paper presented at the 2015 ACM SIGCHI Conference on Creativity and Cognition, 22-06-2015 - 25-06-2015, Glasgow, Scotland.

de Rooij, A. & Jones, S. (2015). (E)motion and creativity: Hacking the function of motor expressions in emotion regulation to augment creativity. Paper presented at the Ninth International Conference on Tangible, Embedded, and Embodied Interaction (TEI 2015), 15-01-2015 - 19-01-2015, California, USA.

de Rooij, A. & Jones, S. (2013). Mood and creativity: an appraisal tendency perspective. Paper presented at the 9th ACM Conference on Creativity & Cognition, 17 - 20 Jun 2013, Sydney, Australia.

de Valk, R. (2015). Structuring lute tablature and MIDI data: Machine learning models for voice separation in symbolic music representations. (Unpublished Doctoral thesis, City, University of London)

de Valk, R. & Weyde, T. (2015). Bringing 'Musicque into the tableture': machine-learning models for polyphonic transcription of 16th-century lute tablature. Early Music, 43(4), pp. 563-576. doi: 10.1093/em/cau102

de Valk, R., Weyde, T. & Benetos, E. (2013). A machine learning approach to voice separation in lute tablature. Paper presented at the 14th International Society for Music Information Retrieval Conference, 4 - 8 Nov 2013, Curitiba, Brazil.

E

Egea, M., Spanoudakis, G., Mahbub, K. & Vieira, M. R. (2015). A Certification Framework for Cloud Security Properties: The Monitoring Path. Lecture Notes in Computer Science, 8937, pp. 63-77. doi: 10.1007/978-3-319-17199-9_3

Ehmke, C. & Wilson, S. (2007). Identifying Web Usability Problems from Eyetracking Data. Paper presented at the British HCI conference 2007, 03-09-2007 - 07-09-2007, University of Lancaster, UK.

Elmsley (né Lambert), A., Weyde, T. & Armstrong, N. (2017). Generating Time: Rhythmic Perception, Prediction and Production with Recurrent Neural Networks. Journal of Creative Music Systems, 1(2), doi: 10.5920/JCMS.2017.04

Endert, A., Ribarsky, W., Turkay, C., Wong, B.L.W., Nabney, I.T., Diaz-Blanco, I. & Rossi, F. (2017). The State of the Art in Integrating Machine Learning into Visual Analytics. Computer Graphics Forum, doi: 10.1111/cgf.13092

Exarchos, T. P., Rigas, G., Bibas, A., Kikidis, D., Nikitas, C., Wuyts, F. L., Ihtijarevic, B., Maes, L., Cenciarini, M., Maurer, C., Macdonald, N., Bamiou, D. E., Luxon, L., Prasinos, M., Spanoudakis, G., Koutsouris, D. & Fotiadis, D. I. (2016). Mining balance disorders' data for the development of diagnostic decision support systems. Computers in Biology and Medicine, 77, pp. 240-248. doi: 10.1016/j.compbiomed.2016.08.016

F

Fahad, L. G. & Rajarajan, M. (2015). Integration of discriminative and generative models for activity recognition in smart homes. Applied Soft Computing Journal, 37, pp. 992-1001. doi: 10.1016/j.asoc.2015.03.045

Fahad, L. G., Tahir, S. F. & Rajarajan, M. (2014). Activity Recognition in Smart Homes using Clustering based Classification. Paper presented at the 22nd International Conference on Pattern Recognition (ICPR), 24-08-2014 - 28-08-2014, Stockholm, Sweden.

Fahey, E. (2014). EU’S Cybercrime and Cyber Security Rule-Making: Mapping the Internal and External Dimensions of EU Security. European Journal of Risk Regulation, 5(1), pp. 46-60.

Fairbank, M. & Alonso, E. (2012). A Comparison of Learning Speed and Ability to Cope Without Exploration between DHP and TD(0). Paper presented at the IEEE International Joint Conference on Neural Networks (IEEE IJCNN 2012), 1783-1789, 10-15-2012, Brisbane, Australia.

Fairbank, M. & Alonso, E. (2012). A Comparison of Learning Speed and Ability to Cope Without Exploration between DHP and TD(0). The 2012 International Joint Conference on Neural Networks (IJCNN), pp. 1478-1485. doi: 10.1109/IJCNN.2012.6252569

Fairbank, M. & Alonso, E. (2012). Efficient Calculation of the Gauss-Newton Approximation of the Hessian Matrix in Neural Networks. Neural Computation, 24(3), pp. 607-610. doi: 10.1162/NECO_a_00248

Fairbank, M. & Alonso, E. (2012). Value-Gradient Learning. Paper presented at the WCCI 2012 IEEE World Congress on Computational Intelligence, 10-06-2012 - 15-06-2012, Brisbane, Australia.

Fairbank, M. & Alonso, E. (2012). The divergence of reinforcement learning algorithms with value-iteration and function approximation. Paper presented at the The 2012 International Joint Conference on Neural Networks (IJCNN), 10-06-2012 - 15-06-2012, Brisbane, Australia.

Fairbank, M., Alonso, E. & Prokhorov, D. (2013). An Equivalence Between Adaptive Dynamic Programming With a Critic and Backpropagation Through Time. IEEE Transactions on Neural Networks and Learning Systems, 24(12), pp. 2088-2100. doi: 10.1109/TNNLS.2013.2271778

Fairbank, M., Alonso, E. & Prokhorov, D. (2012). Simple and Fast Calculation of the Second-Order Gradients for Globalized Dual Heuristic Dynamic Programming in Neural Networks. IEEE Transactions on Neural Networks and Learning Systems, 23(10), pp. 1671-1676. doi: 10.1109/TNNLS.2012.2205268

Fairbank, M., Li, S., Fu, X., Alonso, E. & Wunsch, D. C. (2014). An adaptive recurrent neural-network controller using a stabilization matrix and predictive inputs to solve a tracking problem under disturbances. Neural Networks, 49, pp. 74-86. doi: 10.1016/j.neunet.2013.09.010

Fairbank, M., Prokhorov, D. & Alonso, E. (2013). Approximating Optimal Control with Value Gradient Learning. In: F. Lewis & D. Liu (Eds.), Reinforcement Learning and Approximate Dynamic Programming for Feedback Control. (pp. 142-161). Hoboken, NJ, USA: Wiley-IEEE Press. ISBN 111810420X

Fairbank, M., Prokhorov, D. & Alonso, E. (2014). Clipping in Neurocontrol by Adaptive Dynamic Programming. IEEE Transactions on Neural Networks and Learning Systems, 25(10), pp. 1909-1920. doi: 10.1109/TNNLS.2014.2297991

Fairbank, Michael (2014). Value-Gradient Learning. (Unpublished Doctoral thesis, City University London)

Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M. S., Conti, M. & Rajarajan, M. (2015). Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Communications Surveys and Tutorials, 17(2), pp. 998-1022. doi: 10.1109/COMST.2014.2386139

Favier, J., Revell, A. & Pinelli, A. (2014). A Lattice Boltzmann-Immersed Boundary method to simulate the fluid interaction with moving and slender flexible objects. Journal of Computational Physics, 261, pp. 145-161. doi: 10.1016/j.jcp.2013.12.052

Fenton, N., Littlewood, B., Neil, M., Strigini, L., Wright, D. R. & Courtois, P.-J. (1997). Bayesian belief network model for the safety assessment of nuclear computer-based systems (Report No. 52). Brussels: DeVa ESPRIT Long Term Research Project.

Fernandez, R. C., Migliavacca, M., Kalyvianaki, E. & Pietzuch, P. (2013). Integrating scale out and fault tolerance in stream processing using operator state management. Paper presented at the 2013 ACM SIGMOD International Conference on Management of Data, 22-06-2013 - 27-06-2013, New York, USA.

Fernandez, R. C., Migliavacca, M., Kalyvianaki, E. & Pietzuch, P. (2014). Making State Explicit for Imperative Big Data Processing. Paper presented at the USENIX ATC ’14: 2014 USENIX Annual Technical Conference, 19-06-2015 - 20-06-2015, Philadelphia, USA.

Fernandez, R. C., Migliavacca, M., Kalyvianaki, E. & Pietzuch, P. (2013). Scalable and Fault-tolerant Stateful Stream Processing.. Paper presented at the 2013 Imperial College Computing Student Workshop, 26-09-2013 - 27-09-2013, London, UK.

Fiaz, M., Yousaf, R., Hanfi, M., Asif, W., Qureshi, H. K. & Rajarajan, M. (2014). Adding the reliability on tree based topology construction algorithms for wireless sensor networks. Wireless Personal Communications, 74(2), pp. 989-1004. doi: 10.1007/s11277-013-1334-2

Fink, L. & Lichtenstein, Y. (2014). Why project size matters for contract choice in software development outsourcing. ACM SIGMIS Database, 45(3), pp. 54-71. doi: 10.1145/2659254.2659258

Fink, L., Lichtenstein, Y. & Wyss, S. (2013). Ex post adaptations and hybrid contracts in software development services. Applied Economics, 45(32), pp. 4533-4544. doi: 10.1080/00036846.2013.791021

Fisher, P., Tate, N. & Slingsby, A. (2014). Type-2 Fuzzy Sets Applied to Geodemographic Classification. Paper presented at the Eighth International Conference on Geographic Information Science (GIScience 2014), 23-09-2014 - 26-09-2014, Vienna, Austria.

Forechi, A., De Souza, A.F., Neto, J.D.O., de Aguiar, E., Badue, C., Garcez, A. & Oliveira-Santos, T. (2016). Fat-Fast VG-RAM WNN: A high performance approach. NEUROCOMPUTING, 183, pp. 56-69. doi: 10.1016/j.neucom.2015.06.104

Foster, H. & Spanoudakis, G. (2011). Advanced service monitoring configurations with SLA decomposition and selection. Proceedings of the ACM Symposium on Applied Computing, pp. 1582-1589. doi: 10.1145/1982185.1982519

Foster, H. & Spanoudakis, G. (2011). SMaRT: A Workbench for reporting the monitorability of services from SLAs. In: Proceedings of the 3rd International Workshop on Principles of Engineering Service-Oriented Systems. (pp. 36-42). New York; USA: ACM. ISBN 978-1-4503-0591-4

Foster, H. & Spanoudakis, G. (2012). Taming the cloud: Safety, certification and compliance for software services - Keynote at the Workshop on Engineering Service-Oriented Applications (WESOA) 2011. In: Lecture Notes in Computer Science. (pp. 3-8). Springer. ISBN 9783642318757

Foster, H., Spanoudakis, G. & Mahbub, K. (2012). Formal Certification and Compliance for Run-Time Service Environments. In: L. E. Moser, M. Parashar & P. C. K. Hung (Eds.), 2012 IEEE Ninth International Conference on Services Computing (SCC),. (pp. 17-24). IEEE. ISBN 978-0-7695-4753-4

Foster, H., Spanoudakis, G. & Mahbub, K. (2012). Formal certification and compliance for run-time service environments. Paper presented at the 2012 IEEE Ninth International Conference on Services Computing (SCC), 24 - 29 June 2012, Honolulu, USA.

Frankl, P. G., Hamlet, D., Littlewood, B. & Strigini, L. (1997). Choosing a testing method to deliver reliability. PROCEEDINGS OF THE 1997 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, pp. 68-78. ISSN 0270-5257

Frankl, P. G., Hamlet, R. G., Littlewood, B. & Strigini, L. (1998). Evaluating testing methods by delivered reliability. IEEE Transactions on Software Engineering, 24(8), pp. 586-601. doi: 10.1109/32.707695

França, M. V. M., Zaverucha, G. & Garcez, A. (2014). Fast relational learning using bottom clause propositionalization with artificial neural networks. Machine Learning, 94(1), pp. 81-104. doi: 10.1007/s10994-013-5392-1

França, M. V. M., Zaverucha, G. & Garcez, A. (2015). Neural Relational Learning Through Semi-Propositionalization of Bottom Clauses. Paper presented at the 2015 AAAI Spring Symposium Series, 23-03-2015 - 25-03-2015, Stanford University, USA.

G

Gadala, M. (2017). Automation bias: exploring causal mechanisms and potential mitigation strategies. (Unpublished Doctoral thesis, City, University of London)

Galliers, J. R. & Wilson, S. (2013). An Exploratory Study into the Accessibility of a Multi-User Virtual World for Young People with Aphasia. Paper presented at the BCS HCI 2013 - The Internet of Things XXVII, 9 - 13 Sep 2013, Brunel University, Uxbridge, UK.

Galliers, J. R., Wilson, S., Marshall, J., Talbot, R., Devane, N., Booth, T., Woolf, C. & Greenwood, H. (2017). Experiencing EVA Park, A Multi-User Virtual World For People With Aphasia. ACM Transactions on Accessible Computing,

Ganz, M., Yang, X. & Slabaugh, G.G. (2012). Automatic Segmentation of Polyps in Colonoscopic Narrow-Band Imaging Data. IEEE Transactions on Biomedical Engineering, 59(8), pp. 2144-2151. doi: 10.1109/TBME.2012.2195314

Garcez, A. (2005). Fewer epistemological challenges for connectionism. Lecture Notes in Computer Science, 3526, pp. 289-325. doi: 10.1007/11494645_18

Garcez, A. (2010). Neurons and symbols: a manifesto. Paper presented at the Dagstuhl Seminar Proceedings 10302. Learning paradigms in dynamic environments, 25 - 30 July 2010, Dagstuhl, Germany.

Garcez, A., Besold, T. R., Raedt, L., Foldiak, P., Hitzler, P., Icard, T., Kuhnberger, K-U., Lamb, L. C., Miikkulainen, R. & Silver, D. L. (2015). Neural-Symbolic Learning and Reasoning: Contributions and Challenges. Paper presented at the 2015 AAAI Spring Symposium Series, 23-03-2015 - 25-03-2015, Stanford University, USA.

Garcez, A., Broda, K. & Gabbay, D. M. (2001). Symbolic knowledge extraction from trained neural networks: A sound approach. Artificial Intelligence, 125(1-2), pp. 153-205. doi: 10.1016/S0004-3702(00)00077-1

Garcez, A., Gabbay, D. M. & Lamb, L. C. (2005). Value-based argumentation frameworks as neural-symbolic learning systems. Journal of Logic and Computation, 15(6), pp. 1041-1058. doi: 10.1093/logcom/exi057

Garcez, A., Gabbay, D. M., Ray, O. & Woods, J. (2007). Abductive reasoning in neural-symbolic learning systems. Topoi: An International Review of Philosophy, 26(1), pp. 37-49. doi: 10.1007/s11245-006-9005-5

Garcez, A., Lamb, L. C. & Gabbay, D. M. (2007). Connectionist modal logic: Representing modalities in neural networks. Theoretical Computer Science, 371(1-2), pp. 34-53. doi: 10.1016/j.tcs.2006.10.023

Garcez, A. & Zaverucha, G. (1999). The connectionist inductive learning and logic programming system. Applied Intelligence Journal, 11(1), pp. 59-77. doi: 10.1023/A:1008328630915

Gashi, I., Povyakalo, A. A. & Strigini, L. (2016). Diversity, Safety and Security in Embedded Systems: modelling adversary effort and supply chain risks. Paper presented at the Proceedings of the 12th European Dependable Computing Conference, 5th - 9th September 2016, Gothenburg, Sweden.

Gashi, I., Sobesto, B., Mason, S., Stankovic, V. & Cukier, M. (2013). A Study of the Relationship Between Antivirus Regressions and Label Changes. Paper presented at the IEEE International Symposium on Software Reliability Engineering, 4 - 7 Nov 2013, Pasadena, CA, US.

Gatzidis, C., Brujic-Okretic, V. & Mastroyanni, M. (2009). Evaluation of Non-photorealistic 3D Urban Models for Mobile Device Navigation.. Paper presented at the Virtual and Mixed Reality: Third International Conference, 19 - 24 July 2009, San Diego, CA, USA.

Gatzidis, C., Papakonstantinou, S., Brujic-Okretic, V. & Baker, S. (2008). Recent advances in the user evaluation methods and studies of non-photorealistic visualisation and rendering techniques. Paper presented at the Information Visualisation, 9 - 11 July 2008, London, England.

Gensler, S., Völckner, F., Liu-Thompkins, Y. & Wiertz, C. (2013). Managing brands in the social media environment. Journal of Interactive Marketing, 27(4), pp. 242-256. doi: 10.1016/j.intmar.2013.09.004

Georgakakis, E., Komninos, N. & Douligeris, C. (2012). NAVI: Novel authentication with visual information. 2012 IEEE Symposium on Computers and Communications (ISCC), pp. 588-595. doi: 10.1109/ISCC.2012.6249360

Georgiou, D., MacFarlane, A. & Russell-Rose, T. (2015). Extracting Sentiment from Healthcare Survey Data: An Evaluation of Sentiment Analysis Tools. In: 2015 Science and Information Conference (SAI). . IEEE. ISBN 978-1-4799-8547-0

Gerson, J., Plagnol, A. & Corr, P. J. (2017). Passive and Active Facebook Use Measure (PAUM): Validation and relationship to the Reinforcement Sensitivity Theory. Personality and Individual Differences, 117, pp. 81-90. doi: 10.1016/j.paid.2017.05.034

Geurs, K. T., Thomas, T., Bijlsma, M. & Douhou, S. (2015). Automatic trip and mode detection with move smarter: First results from the Dutch Mobile Mobility Panel. Transportation Research Procedia, 11, pp. 247-262. doi: 10.1016/j.trpro.2015.12.022

Giannoulis, D., Benetos, E., Klapuri, A. & Plumbley, M. D. (2014). Improving instrument recognition in polyphonic music through system integration. Paper presented at the 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 04-05-2014 - 09-05-2014, Florence, Italy.

Giannoulis, D., Benetos, E., Stowell, D., Rossignol, M., Lagrange, M. & Plumbley, M. D. (2013). Detection and classification of acoustic scenes and events: an IEEE AASP challenge. Paper presented at the IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 20 - 23 Oct 2013, New Paltz, NY, USA.

Giannoulis, D., Stowell, D., Benetos, E., Rossignol, M., Lagrange, M. & Plumbley, M. D. (2013). A database and challenge for acoustic scene classification and event detection. Paper presented at the The 21st European Signal Processing Conference, 9 - 13 Sep 2013, Marrakech, Morocco.

Giaralis, A., Kougioumtzoglou, I. & Spanos, P. D. (2011). A stochastic approach for deriving effective linear properties of bilinear hysteretic systems subject to design spectrum compatible strong ground motions. Paper presented at the 8th International Conference on Structural Dynamics (EURODYN 2011), 04-06 July 2011, Leuven, Belgium.

Giaralis, A. & Spanos, P. D. (2010). Effective linear damping and stiffness coefficients of nonlinear systems for design spectrum based analysis. Soil Dynamics and Earthquake Engineering, 30(9), pp. 798-810. doi: 10.1016/j.soildyn.2010.01.012

Giaralis, A. & Spanos, P. D. (2009). Wavelet-based response spectrum compatible synthesis of accelerograms-Eurocode application (EC8). Soil Dynamics and Earthquake Engineering, 29(1), pp. 219-235. doi: 10.1016/j.soildyn.2007.12.002

Giaralis, A. & Spanos, P. D. (2007). A stochastic approach to synthesizing response spectrum compatible seismic accelerograms. Paper presented at the 4th International Conference on Earthquake Geotechnical Engineering (4ICEGE), 25-28 June 2007, Thessaloniki, Greece.

Ginon, B., Stumpf, S. & Jean-Daubias, S. (2016). Towards the right assistance at the right time for using complex interfaces. In: Proceedings of the International Working Conference on Advanced Visual Interfaces. (pp. 240-243). New York, USA: ACM. ISBN 9781450341318

Glover, I. (2011). Integrating Flickr-based Images into Moodle to Increase Visual Appeal and Dynamism of Teaching Spaces. In: T. Bastiaens & M. Ebner (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2011. (pp. 768-772). EdITLib.

Glover, I., Campbell, A., Latif, F., Norris, L., Toner, J. & Tse, C. (2012). A tale of one city: intra-institutional variations in migrating VLE platform. Research in Learning Technology, 20, doi: 10.3402/rlt.v20i0.19190

Gomez, S., Jianu, R., Cabeen, R., Guo, H. & Laidlaw, D. H. (2016). Fauxvea: Crowdsourcing Gaze Location Estimates for Visualization Analysis Tasks. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2016.2532331

Gong, P. (2017). Energy efficient and secure wireless communications for wireless sensor networks. (Unpublished Doctoral thesis, City, University of London)

Gong, P., Chen, T. & Xu, Q. (2015). ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks. Journal of Sensors, 2015, p. 469793. doi: 10.1155/2015/469793

Gong, P., Xu, Q. & Chen, T. (2014). Energy Harvesting Aware routing protocol for wireless sensor networks. 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 171-176. doi: 10.1109/CSNDSP.2014.6923819

Gooch, P. (2012). BADREX: In situ expansion and coreference of biomedical abbreviations using dynamic regular expressions. London, UK: City University London.

Gooch, P. (2012). A lightweight, pattern-based approach to identification and formalisation of TimeML expressions in clinical narratives. Paper presented at the The Sixth Informatics for Integrating Biology and the Bedside (i2b2) Natural Language Processing Challenge for Clinical Records, Nov 2012, Chicago, IL.

Gooch, P. (2012). A modular, open-source information extraction framework for identifying clinical concepts and processes of care in clinical narratives. (Unpublished Doctoral thesis, City University London)

Goodwin, S. (2015). Visualisation for household energy analysis: techniques for exploring multiple variables across scale and geography. (Unpublished Doctoral thesis, City University London)

Goodwin, S., Dykes, J. & Slingsby, A. (2014). Visualizing the Effects of Scale and Geography in Multivariate Comparison. Poster presented at the IEEE Conference on Visual Analytics Science and Technology, 09-11-2014 - 14-11-2014, Paris, France.

Goodwin, S., Dykes, J., Slingsby, A. & Turkay, C. (2015). Visualizing Multiple Variables Across Scale and Geography. IEEE Transactions on Visualization and Computer Graphics (Proceedings of the Visual Analytics Science and Technology / Information Visualization / Scientific Visualization 2015), 22(1), pp. 599-608. doi: 10.1109/TVCG.2015.2467199

Gorp, P. V., Comuzzi, M., Fialho, A. S. & Kaymak, U. (2012). Addressing health information privacy with a novel cloud-based PHR system architecture. Paper presented at the 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 14-10-2012 - 17-10-2012, Seoul, Korea.

Griffiths, M. K., Reyes-Aldasoro, C. C., Savas, D. & Greenfield, T. (2009). IOME, A Toolkit for Distributed and Collaborative Computational Science and Engineering. Paper presented at the UK e-science All Hands Meeting, 07-12-2009 - 09-12-2009, Oxford, UK.

Groce, A., Kulesza, T., Zhang, C., Shamasunder, S., Burnett, M., Wong, W-K, Stumpf, S., Das, S., Shinsel, A., Bice, F. & McIntosh, K. (2014). You are the only possible oracle: Effective test selection for end users of interactive machine learning systems. IEEE Transactions on Software Engineering, 40(3), pp. 307-323. doi: 10.1109/TSE.2013.59

Guan, W., He, J., Tang, Z. & Chen, T. (2013). Design and Evaluation of a Framework for Cooperative and Adaptive QoS Control of DSRC Network for Road Safety Applications. International Journal of Distributed Sensor Networks, 2013(946931), pp. 1-10. doi: 10.1155/2013/946931

Gucunski, N., Slabaugh, G.G., Wang, Z., Fang, T. & Maher, A. (2008). Impact echo data from bridge deck testing: Visualization and interpretation. Transportation Research Record(2050), pp. 111-121. doi: 10.3141/2050-11

Guillame-Bert, M., Broda, K. & Garcez, A. (2010). First-order logic learning in artificial neural networks. International Joint Conference on Neural Networks (IJCNN 2010), doi: 10.1109/IJCNN.2010.5596491

Guo, Shijing (2016). Systemic analysis and modelling of diagnostic errors in medicine. (Unpublished Doctoral thesis, City University London)

H

Hadjiminas, N. & Child, C. H. T. (2012). Be The Controller: A Kinect Tool Kit for Video Game Control - Recognition of Human Motion Using Skeletal Relational Angles. Paper presented at the 5th Annual International Conference On Computer Games, Multimedia And Allied Technology (CGAT 2012), 2012, Bali, Indonesia.

Haefliger, S., Krogh, G. V. & Spaeth, S. (2008). Code Reuse in Open Source Software. Management Science, 54(1), pp. 180-193. doi: 10.1287/mnsc.1070.0748

Hafiz bin Haji Khozali, Muhammed (1981). Computer aided mathematical modelling of turbulent flow for orifice metering. (Unpublished Doctoral thesis, The City University)

Hakobyan, L., Lumsden, J. & O'Sullivan, D. (2013). Designing a Mobile Assistive Application with and for Older Adults with AMD: A Case Study. Paper presented at the 27th International BCS Human Computer Interaction Conference (HCI 2013), 09-09-2013 - 13-09-2013, London, UK.

Hakobyan, L., Lumsden, J. & O'Sullivan, D. (2014). Older Adults with AMD as Co-Designers of an Assistive Mobile Application. International Journal of Mobile Human Computer Interaction, 6(1), pp. 54-70. doi: 10.4018/ijmhci.2014010104

Hakobyan, L., Lumsden, J., O'Sullivan, D. & Shaw, R. (2016). A longitudinal evaluation of the acceptability and impact of a diet diary app for older adults with age-related macular degeneration. Paper presented at the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI '16), 6-9 Sep 2016, Florence, Italy.

Hall, K.W., Perin, C., Kusalik, P.G., Gutwin, C. & Carpendale, S. (2016). Formalizing Emphasis in Information Visualization. Computer Graphics Forum, 35(3), pp. 717-737. doi: 10.1111/cgf.12936

Hampshire, T.E., Roth, H.R., Boone, D.J., Slabaugh, G.G., Halligan, S. & Hawkes, D.J. (2012). Prone to Supine CT Colonography Registration Using a Landmark and Intensity Composite Method. In: H Yoshida, DJ Hawkes & MW Vannier (Eds.), Abdominal Imaging. Computational and Clinical Applications. (pp. 1-9). Springer. ISBN 978-3-642-33611-9

Hampshire, T.E., Roth, H.R., Helbren, E., Plumb, A., Boone, D.J., Slabaugh, G.G., Halligan, S. & Hawkes, D.J. (2013). Endoluminal surface registration for CT colonography using haustral fold matching. Medical Image Analysis, 17(8), pp. 946-958. doi: 10.1016/j.media.2013.04.006

Hannaby, Simon Anthony (1994). The use and analysis of infinite elements. (Unpublished Doctoral thesis, City University)

Harrison, D., Marshall, P., Berthouze, N. & Bird, J. (2014). Tracking physical activity: Problems related to running longitudinal studies with commercial devices. In: UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. (pp. 699-702). New York, NY, United States: Association for Computing Machinery (ACM). ISBN 9781450330473

Haynes, D., Bawden, D. & Robinson, L. (2016). A regulatory model for personal data on social networking services in the UK. International Journal of Information Management, 36(6), pp. 872-882. doi: 10.1016/j.ijinfomgt.2016.05.012

He, J., Tang, Z., O'Farrell, T. & Chen, T. (2011). Performance analysis of DSRC priority mechanism for road safety applications in vehicular networks. Wireless Communications and Mobile Computing, 11(7), pp. 980-990. doi: 10.1002/wcm.821

Henkin, R., Dykes, J. & Slingsby, A. (2016). Characterizing Representation of Temporal Data Visualization. Poster presented at the VIS 2016, 23-28 Oct 2016, Baltimore, USA.

Henkin, R., Slingsby, A. & Dykes, J. (2015). Exploring Temporal Granularities with Visualization. Poster presented at the VIS 2015, 25-10-2015 - 30-10-2015, Chicago, USA.

Henkin, R., Slingsby, A. & van Loon, E. (2014). Designing Interactive Graphics for Foraging Trips Exploration. Paper presented at the Workshop on Analysis of Movement Data at the Eighth International Conference on Geographic Information Science (GIScience 2014), 23-09-2014 - 26-09-2014, Vienna, Austria.

Hennig-Thurau, T., Wiertz, C. & Feldhaus, F. (2015). Does Twitter matter? The impact of microblogging word of mouth on consumers' adoption of new movies. Journal of the Academy of Marketing Science, 43(3), pp. 375-394. doi: 10.1007/s11747-014-0388-3

Hervas-Drane, A. & Noam, E. (2017). Peer-to-Peer File Sharing and Cultural Trade Protectionism. Information Economics and Policy, doi: 10.1016/j.infoecopol.2017.08.002

Hessami, A. G. & Karcanias, N. (2011). Integration of operations in process systems. In: 2011 IEEE International Systems Conference (SysCon). (pp. 466-471). New Jersey, USA: IEEE. ISBN 9781424494941

Hilken, T., de Ruyter, K., Chylinski, M., Mahr, D. & Keeling, D. (2017). Augmenting the Eye of the Beholder: Exploring the Strategic Potential of Augmented Reality to Enhance Online Service Experiences. Journal of the Academy of Marketing Science, doi: 10.1007/s11747-017-0541-x

Hitzler, P., Bader, S. & Garcez, A. (2005). Ontology learning as a use-case for neural-symbolic integration. Paper presented at the IJCAI Workshop on Neural-Symbolic Learning and Reasoning NeSy05, 1 August 2005, Edinburgh.

Hodge, P., Davies, J., Maiden, N., Mann, B., Nidsjo, A., Simpson, A. & Reynolds, L. M. (2015). StreetWise: A valid ecology for a serious game in a secure forensic mental health setting. Procedia Computer Science, 63, pp. 252-259. doi: 10.1016/j.procs.2015.08.341

Holliday, D., Wilson, S. & Stumpf, S. (2016). User trust in intelligent systems: A journey over time. In: Proceedings of the 21st International Conference on Intelligent User Interfaces. (pp. 164-168). New York, USA: ACM. ISBN 9781450341400

Hollis, B. & Maiden, N. (2013). Extending Agile Processes with Creativity Techniques. IEEE Software, 30(5), pp. 78-84. doi: 10.1109/MS.2012.171

Honingh, A. (2008). A geometrical approach to find the preferred intonation of chords (Report No. TR/2008/DOC/02). .

Honingh, A. & Weyde, T. (2008). Integrating Convexity and Compactness into the ISSM: Melodic Analysis of Music (Report No. TR/2008/DOC/03). .

Horkoff, J. & Maiden, N. (2015). Supporting creative RE with i∗. CEUR Workshop Proceedings, 1402, pp. 37-42.

Houyou, A. M., Huth, H-P., Kloukinas, C., Trsek, H. & Rotondi, D. (2012). Agile manufacturing: General challenges and an IoT@Work perspective. In: UNSPECIFIED (pp. 1-7). IEEE. ISBN 978-1-4673-4735-8

Howe, J. M. (2001). Proof search in Lax Logic. Mathematical Structures in Computer Science, 11(4), pp. 573-588. doi: 10.1017/S0960129501003334

Howe, J. M. (1997). Two loop detection mechanisms: a comparison. Paper presented at the International Conference on Analytic Tableaux and Related Methods (TABLEAUX'97), 13 - 16 May 1997, Pont-a-Mousson, France.

Howe, J. M. & King, A. (2000). Abstracting Numeric Constraints with Boolean Functions. Information Processing Letters, 75(1-2), pp. 17-23. doi: 10.1016/S0020-0190(00)00081-8

Howe, J. M. & King, A. (2009). Closure Algorithms for Domains with Two Variables Per Inequality (Report No. TR/2009/DOC/01). .

Howe, J. M. & King, A. (2003). Efficient groundness analysis in Prolog. Theory and Practice of Logic Programming, 3(1), pp. 95-124. doi: 10.1017/S1471068402001485

Howe, J. M. & King, A. (2000). Implementing Groundness Analysis with Definite Boolean Functions. Lecture Notes in Computer Science, 1782, pp. 200-214.

Howe, J. M. & King, A. (2009). Logahedra: A new weakly relational domain. Lecture Notes in Computer Science, 5799, pp. 306-320. doi: 10.1007/978-3-642-04761-9_23

Howe, J. M. & King, A. (2011). A Pearl on SAT Solving in Prolog (extended abstract). ALP Newsletter(3),

Howe, J. M. & King, A. (2012). Polyhedral Analysis using Parametric Objectives. Lecture Notes on Computer Science, 7460, pp. 41-57. doi: 10.1007/978-3-642-33125-1_6

Howe, J. M. & King, A. (2001). Positive Boolean Functions as Multiheaded Clauses. Paper presented at the International Conference on Logic Programming, 26 Nov - 01 Dec 2001, Cyprus.

Howe, J. M. & King, A. (2000). Specialising finite domain programs with polyhedra. Paper presented at the Logic Programming Synthesis and Transformation 1999, 22 - 24 September 1999, Venezia, Italy.

Howe, J. M. & King, A. (2012). A pearl on SAT and SMT solving in Prolog. Theoretical Computer Science, 435, pp. 43-55. doi: 10.1016/j.tcs.2012.02.024

Howe, J. M., King, A. & Lawrence-Jones, C. (2010). Quadtrees as an Abstract Domain. Electronic Notes Theoretical Computer Science, 267(1), pp. 89-100. doi: 10.1016/j.entcs.2010.09.008

Howe, J. M., King, A. & Lawrence-Jones, C. (2010). Quadtrees as an Abstract Domain (Report No. TR_2010_DOC_01). .

Howell, S., Tripoliti, E. & Pring, T. (2009). Delivering the Lee Silverman Voice Treatment (LSVT) by web camera: a feasibility study. International Journal of Language & Communication Disorders, 44(3), pp. 287-300. doi: 10.1080/13682820802033968

Hu, J., Kaparias, I. & Bell, M. G. H. (2012). Current state and future outlook of traffic data fusion in London. Paper presented at the 15th International IEEE Conference on Intelligent Transportation Systems (ITSC), 16-09-2012 - 19-09-2012, Anchorage, Alaska, USA.

Hudic, A., Tauber, M., Lorünser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A. & Weippl, E. (2014). A Multi-Layer and Multi-Tenant Cloud Assurance Evaluation Methodology. Paper presented at the 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom), 15-18 Dec 2014, Singapore.

Hunt, S., Askarov, A., Sabelfeld, A. & Sands, D. (2008). Termination-insensitive noninterference leaks more than just a bit. Paper presented at the 13th European Symposium on Research in Computer Security, Oct 2008, Malaga, Spain.

Hunt, S. & Clark, D. (2008). Non-interference for deterministic interactive programs. Paper presented at the 5th International Workshop on Formal Aspects in Security and Trust (FAST2008), Oct 2008, Malaga, Spain.

Hunt, S., Clark, D. & Malacaria, P. (2002). Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science, 59(3), pp. 1-14. doi: 10.1016/S1571-0661(04)00290-7

Hunt, S., Clark, D. & Malacaria, P. (2007). A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3), pp. 321-371.

Hunt, S. & Mastroeni, I. (2005). The PER model of abstract non-interference. Paper presented at the Proc. Static Analysis, 12th International Symposium.

Hunt, S. & Sands, D. (2011). From exponential to polynomial-time security typing via principal types. Lecture Notes in Computer Science, 6602 L, pp. 297-316. ISSN 0302-9743

Hunt, S. & Sands, D. (2008). Just forget it - The semantics and enforcement of information erasure. Lecture Notes in Computer Science, 4960, pp. 239-253. ISSN 0302-9743

Hunt, S. & Sands, D. (2006). On flow-sensitive security types. ACM SIGPLAN-SIGACT, 41, pp. 79-90. ISSN 0362-1340

J

Jahromizadeh, S. & Rakocevic, V. (2014). Joint rate control and scheduling for providing bounded delay with high efficiency in multihop wireless networks. IEEE/ACM Transactions on Networking, 22(5), pp. 1686-1698. doi: 10.1109/TNET.2013.2282872

Japunya, T., Jitpakdee, P., Uyyanonvara, B., Aimmanee, P., Philippaki, E., Hull, C. & Barman, S. (2014). Software for the quantification of glistenings in intra-ocular lenses. Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering 2014, WCE 2014, 2-4 July, 2014, London, U.K., pp. 34-38.

Jawaid, M.M., Rajani, R., Liatsis, P., Reyes-Aldasoro, C. C. & Slabaugh, G.G. (2017). A Hybrid Energy Model for Region Based Curve Evolution - Application to CTA Coronary Segmentation. Computer Methods and Programs in Biomedicine, doi: 10.1016/j.cmpb.2017.03.020

Jennings, D., Alonso, E., Mondragon, E. & Bonardi, C. (2010). Temporal uncertainty during overshadowing: A temporal difference account. In: Computational Neuroscience for Advancing Artificial Intelligence: Models, Methods and Applications. (pp. 46-55). IGI Global. ISBN 9781609600211

Jianu, R. & Alam, S. S. (2017). A Data Model and Task Space for Data of Interest (DOI) Eye-Tracking Analyses. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2017.2665498

Jianu, R. & Laidlaw, D. H. (2013). What Google Maps can do for biomedical data dissemination: examples and a design study. BMC Research Notes, 6, 179.. doi: 10.1186/1756-0500-6-179

Jianu, R., Rusu, A., Hu, Y. & Taggart, D. (2014). How to Display Group Information on Node-Link Diagrams: An Evaluation. IEEE Transactions on Visualization and Computer Graphics, 20(11), pp. 1530-1541. doi: 10.1109/TVCG.2014.2315995

John, D., Gatzidis, C., Liarokapis, F., Boucouvalas, A. & Brujic-Okretic, V. (2009). A Framework for the Development of Online, Location-Specific, Expressive 3D Social Worlds. Paper presented at the Games and Virtual Worlds for Serious Applications, 2009.

John, D., Gatzidis, C., Liarokapis, F., Boucouvalas, A. & Brujic-Okretic, V. (2011). Prototyping Expressive 3D Social Worlds. The Open Virtual Reality Journal, 3(1), pp. 1-15.

Jones, C. B., Jones, K., Lindsay, P. A. & Moore, R. (1990). Mural: A formal development support system. London: Springer-Verlag.

Jones, K. (2008). Analog and Mixed Signal Verification. Paper presented at the FMCAD 2008 Formal Methods in Computer Aided Design, 17 - 20 Nov 2008, Portland, OR, USA.

Jones, K., Konrad, V. & Nickovic, D. (2010). Analog Property Checkers: A Ddr2 Case Study. Formal Methods in System Design, 36(2), pp. 114-130. doi: 10.1007/s10703-009-0085-x

Jones, K. & Salako, K. (2013). Modeling Security Policy and the Effect for End-Users. Paper presented at the HCI International 2013: 15th International Conference on Human-Computer Interaction, 21 - 26 Jul 2013, Las Vegas, Nevada, US.

Jones, S., Lynch, P., Maiden, N. & Lindstaedt, S. (2008). Use and Influence of Creative Ideas and Requirements for a Work-Integrated Learning System. Proceedings of the 16th IEEE International Requirements Engineering Conference, pp. 289-294. doi: 10.1109/RE.2008.54 ISSN 1090-705X

Jones, S., Maiden, N. & Karlsen, K. (2007). Creativity in the Specification of Large-Scale Socio-Technical Systems. Paper presented at the Conference on Creative Inventions, Innovations and Everyday Designs in HCI, 13 - 14 Jun 2007, London.

Jones, S., Maiden, N., Manning, S. & Greenwood, J. (2004). Human Activity Modelling in the Specification of Operational Requirements: Work in Progress. Paper presented at the 26th International Conference on Software Engineering, 23 -28 May 2004, Edinburgh, UK.

Jones, S., Maiden, N., Manning, S. & Greenwood, J. (2007). Informing the specification of a large-scale socio-technical system with models of human activity. Lecture Notes in Computer Science: Requirements Engineering: Foundation for Software Quality, 4542, pp. 175-189. doi: 10.1007/978-3-540-73031-6_13

Jones, S., Maiden, N., Zachos, K. & Zhu, X. (2005). How Service-Centric Systems Change the Requirements Process. Paper presented at the 11th Workshop on Requirements Engineering: Foundation for Software Quality: REFSQ2005, 2005.

Jones, S., Poulsen, A., Maiden, N. & Zachos, K. (2011). User roles in asynchronous distributed collaborative idea generation. Paper presented at the 8th ACM conference on Creativity and cognition, 3 - 6 Nov 2011, Atlanta, Georgia, USA.

Jones, S. & Sapsford, J. (1998). The role of informal representations in early design. Paper presented at the Design, Specification and Verification of Interactive Systems ‘98, 3 - 5 Jun 1998, Abingdon, UK.

K

Kachkaev, A., Wolff, D., Barthet, M., Tidhar, D., Plumbley, M. D., Dykes, J. & Weyde, T. (2014). Visualising Chord Progressions in Music Collections: A Big Data Approach. Paper presented at the 9th Conference on Interdisciplinary Musicology – CIM14, 03-12-2014 - 06-12-2014, Staatliches Institut für Musikforschung, Berlin, Germany.

Kalyvianaki, E., Charalambous, T. & Hand, S. (2014). Adaptive Resource Provisioning for Virtualized Servers Using Kalman Filters. ACM Transactions on Autonomous and Adaptive Systems, 9(2), p. 10. doi: 10.1145/2626290

Kalyvianaki, E., Charalambous, T. & Hand, S. (2010). Resource Provisioning for Multi-Tier Virtualized Server Applications. Computer Measurement Group (CMG) Journal, 126, pp. 6-17.

Kalyvianaki, E., Fiscato, M., Salonidis, T. & Pietzuch, P. (2016). THEMIS: Fairness in Federated Stream Processing under Overload. Paper presented at the 2016 ACM International Conference on Management of Data (SIGMOD), 26 Jun - 01 Jul 2016, San Francisco, USA.

Kalyvianaki, E., Wiesemann, W., Vu, Q. H., Kuhn, D. & Pietzuch, P. (2011). SQPR: Stream query planning with reuse. Paper presented at the 2011 IEEE 27th International Conference on Data Engineering (ICDE), 11-04-2011 - 16-04-2011, Hannover, Germany.

Kaparias, I. & Bell, M. G. H. (2012). London Congestion Charging: Successes, Gaps and Future Opportunities Offered by Cooperative ITS. Paper presented at the 15th IEEE Conference on Intelligent Transportation Systems, 16-09-2012 - 19-09-2012, Anchorage, Alaska, USA.

Kaparias, I., Bell, M. G. H., Bogenberger, K. & Chen, Y. (2007). An approach to time dependence and reliability in dynamic route guidance. Transportation Research Record, 2039, pp. 32-41. doi: 10.3141/2039-04

Kaparias, I., Bell, M. G. H., Chen, Y. & Bogenberger, K. (2007). ICNavS: A tool for reliable dynamic route guidance. IET Intelligent Transport Systems, 1(4), pp. 225-233. doi: 10.1049/iet-its:20060066

Karampelas, P., Basdekis, I. & Stephanidis, C. (2009). Web user interface design strategy: Designing for device independence. Paper presented at the 5th International Conference, UAHCI 2009, 19-24 Jul 2009, San Diego, USA.

Karcanias, N. (2013). Systems of Systems: A Control Theoretic View. 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC),, pp. 1732-1737. doi: 10.1109/SMC.2013.298

Karlsen, I. K., Zachos, K., Maiden, N., Jones, S., Turner, I., Rose, M. & Pudney, K. (2011). Supporting reflection and creative thinking by carers of older people with dementia. Paper presented at the Pervasive Computing Technologies for Healthcare (PervasiveHealth), 2011 5th International Conference on, 23 - 26 May 2011, Dublin, Ireland.

Kassem, H. I., Liu, X. & Banerjee, J. R. (2016). Transonic flutter analysis using a fully coupled density based solver for inviscid flow. Advances in Engineering Software, 95, pp. 1-6. doi: 10.1016/j.advengsoft.2016.01.012

Katopodis, S., Spanoudakis, G. & Mahbub, K. (2014). Towards hybrid cloud service certification models. In: 2014 IEEE International Conference on Services Computing (SCC). (pp. 394-399). Institute of Electrical and Electronics Engineers Inc.. ISBN 9781479950669

Katopodis, Spyros (2015). Hybrid cloud security certification. (Submitted Masters thesis, City University London)

Kernan, M.A. (2017). Digital Shakespeare, 1996-2017: An exploration of the cultural and technological history of the four Arden Shakespeare digital formats with reference to analytical insights from digital humanities research. Paper presented at the Centre for English Research Seminar, 15 February 2017, London, UK.

Khalili, N., Wood, J. & Dykes, J. (2009). Mapping the geography of social networks. Paper presented at the GIS Research UK, 17th Annual Conference, 1 - 3 Apr 2009, University of Durham, Durham, UK.

King, C., Hall, J., Banda, M., Beard, J., Bird, J., Kazembe, P. & Fottrell, E. (2014). Electronic data capture in a rural African setting: evaluating experiences with different systems in Malawi. Global Health Action, 7(1), doi: 10.3402/gha.v7.25878

Klironomos, I., Antona, M., Basdekis, I. & Stephanidis, C. (2006). White Paper: promoting Design for All and e-Accessibility in Europe.. Universal Access in the Information Society, 5(1), pp. 105-119. doi: 10.1007/s10209-006-0021-4

Klironomos, Ι., Basdekis, I., Kartakis, G. & Stephanidis, C. (2005). Facilitating virtual networking for Design for All in Europe: The HERMES platform. Paper presented at the eChallenges e-2005, 19-21 Oct 2005, Ljubljana, Slovenia.

Kloukinas, C. (2009). Better abstractions for reusable components & architectures. Paper presented at the 31st International Conference on Software Engineering (ICSE-Companion 2009), 16 - 24 May 2009, Vancouver, BC, Canada.

Kloukinas, C. (2005). Thunderstriking constraints with JUPITER. Paper presented at the Third ACM and IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE '05), 11 - 14 Jul 2005.

Kloukinas, C., Lekeas, G. & Stathis, K. (2008). From Agent Game Protocols to Implementable Roles. Paper presented at the Sixth European Workshop on Multi-Agent Systems - EUMAS, 18 - 19 Dec 2008, Bath, UK.

Kloukinas, C., Nakhli, C. & Yovine, S. (2003). A Methodology and Tool Support for Generating Scheduled Native Code for Real-Time Java Applications. Lecture Notes in Computer Science: Embedded Software, 2855, pp. 274-289. doi: 10.1007/978-3-540-45212-6_18

Kloukinas, C. & Ozkaya, M. (2014). Realizable, Connector-Driven Software Architectures for Practising Engineers. Communications in Computer and Information Science, 457, pp. 273-289. doi: 10.1007/978-3-662-44920-2_17

Kloukinas, C. & Ozkaya, M. (2012). XCD – Simple, Modular, Formal Software Architectures (Report No. TR/2012/DOC/01). .

Kloukinas, C., Saridakis, T. & Issarny, V. (1999). Fault Tolerant Access to Dynamically Located Services for CORBA Applications. Paper presented at the Computer Applications in Industry and Engineering (CAINE-99), 12th Int'l. Conference, 4 - 6 Nov 1999, Atlanta, GE, US.

Kloukinas, C. & Spanoudakis, G. (2007). A pattern-driven framework for monitoring security and dependability. Lecture Notes in Computer Science: Trust, Privacy and Security in Digital Business, 4657, pp. 210-218. doi: 10.1007/978-3-540-74409-2_23

Kloukinas, C., Spanoudakis, G. & Mahbub, K (2008). Estimating Event Lifetimes for Distributed Runtime Verification. Paper presented at the 20th International Conference on Software Engineering and Knowledge Engineering, 1 - 3 Jul 2008, Redwood City, CA, US.

Kloukinas, C. & Verimag, G. (2004). Data-Mining Synthesised Schedulers for Hard Real-Time Systems. Paper presented at the 19th International Conference on Automated Software Engineering, 24 Sep 2004, Linz, Austria.

Kloukinas, C. & Yovine, S. (2003). Synthesis of Safe, QoS Extendible, Application Specific Schedulers for Heterogeneous Real-Time Systems. Paper presented at the 15th Euromicro Conference on Real-Time Systems, 2003, Porto, Portugal.

Kloukinas, C. & Yovine, S. (2011). A model-based approach for multiple QoS in scheduling: from models to implementation. Automated Software Engineering, 18(1), pp. 5-38. doi: 10.1007/s10515-010-0074-8

Kodagoda, N., Attfield, S., Choudhury, T., Rooney, C., Mapp, G., Nguyen, P., Slabbert, L., Wong, B.L.W., Aiash, M., Zheng, Y., Xu, K. & Lasebae, A. (2014). Concern level assessment: Building domain knowledge into a visual system to support network-security situation awareness. Information Visualization, 13(4), pp. 346-360. doi: 10.1177/1473871613490291

Komendantskaya, E., Broda, K. & Garcez, A. (2010). Using inductive types for ensuring correctness of neuro-symbolic computations. Paper presented at the 6th Conference on Computability in Europe, CiE 2010, 30 June - 4 July 2010, Ponta Delgada, Portugal.

Komninos, N. & Junejo, A. K. (2015). Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment. Paper presented at the 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15), 07-12-2015 - 09-12-2015, Limassol, Cyprus.

Komninos, N., Soroush, H. & Salajegheh, M. (2007). LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks. Paper presented at the IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07), 16 - 20 July 2007, Ambleside, UK.

Komninos, N., Vergados, D. D. & Douligeris, C. Two‐Step Authentication in Mobile Ad Hoc Networks. Paper presented at the Global Mobile Congress, 11-16 Oct 2006, Beijing, China.

Kotti, M., Benetos, E. & Kotropoulos, C. (2008). Computationally Efficient and Robust BIC-Based Speaker Segmentation. IEEE Transactions on Audio, Speech & Language Processing, 16(5), pp. 920-933. doi: 10.1109/TASL.2008.925152

Kotti, M., Benetos, E. & Kotropoulos, C. (2007). Neural network-based movie dialogue detection. Paper presented at the EANN 2007: 10th International Conference on Engineering Applications of Neural Networks, 29 - 31 Aug 2007, Thessaloniki, Greece.

Krogh, G. V. & Haefliger, S. (2010). Opening up design science: The challenge of designing for reuse and joint development. The Journal of Strategic Information Systems, 19, pp. 232-241. doi: 10.1016/j.jsis.2010.09.008

Krogh, G. V., Haefliger, S., Spaeth, S. & Wallin, M. W. (2012). Carrots and Rainbows: Motivation and Social Practice in Open Source Software Development. MIS Quarterly, 36(2), pp. 649-676.

Krotsiani, M. (2016). Model driven certification of Cloud service security based on continuous monitoring. (Unpublished Doctoral thesis, City University London)

Krotsiani, M., Kloukinas, C. & Spanoudakis, G. (2017). Cloud Certification Process Validation using Formal Methods. Paper presented at the 15th International Conference on Service Oriented Computing (ICSOC 2017), 13-16 Nov 2017, Malaga, Spain.

Krotsiani, M., Kloukinas, C. & Spanoudakis, G. (2017). Validation of Service Level Agreements using Probabilistic Model Checking. Paper presented at the 14th IEEE International Conference on Services Computing, 25-30 Jun 2017, Honolulu, USA.

Krotsiani, M. & Spanoudakis, G. (2014). Continuous certification of non-repudiation in cloud storage services. Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 929-934. doi: 10.1109/TrustCom.2014.122

Krotsiani, M., Spanoudakis, G. & Kloukinas, C. (2015). Monitoring-Based Certification of Cloud Service Security. Lecture Notes in Computer Science, 9415, pp. 644-659. doi: 10.1007/978-3-319-26148-5_44

Kulesza, T., Burnett, M., Stumpf, S., Wong, W., Das, S., Groce, A., Shinsel, A., Bice, F. & McIntosh, K. (2011). Where Are My Intelligent Assistant's Mistakes? A Systematic Testing Approach. Paper presented at the Third International Symposium on End-User Development (IS-EUD), 07 - 10 June 2011, Torre Canne, Italy.

Kulesza, T., Burnett, M., Wong, W-K. & Stumpf, S. (2015). Principles of Explanatory Debugging to personalize interactive machine learning. In: O. Brdiczka & P Chau (Eds.), Proceedings of the 20th International Conference on Intelligent User Interfaces. (pp. 126-137). New York, USA: ACM. ISBN 9781450333061

Kulesza, T., Stumpf, S., Burnett, M. & Kwan, I. (2012). Tell me more?: the effects of mental model soundness on personalizing an intelligent agent. In: J. A. Konstan, E. H. Chi & K. Höök (Eds.), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. (pp. 1-10). New York: ACM. ISBN 978-1-4503-1015-4

Kulesza, T., Stumpf, S., Burnett, M., Wong, W., Riche, Y., Moore, T., Oberst, I., Shinsel, A. & McIntosh, K. (2010). Explanatory debugging: Supporting end-user debugging of machine-learned programs. Proceedings - 2010 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2010, pp. 41-48. doi: 10.1109/VLHCC.2010.15

Kulesza, T., Stumpf, S., Burnett, M., Yang, S., Kwan, I. & Wong, W-K (2013). Too much, too little, or just right? Ways explanations impact end users' mental models. Proceedings of IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC, pp. 3-10. doi: 10.1109/VLHCC.2013.6645235

Kulesza, T., Stumpf, S., Wong, W-K., Burnett, M., Perona, S., Ko, A. & Oberst, I. (2011). Why-Oriented End-User Debugging of Naïve Bayes Text Classification. Transactions on Interactive Intelligent Systems, 1(1), .2. doi: 10.1145/2030365.2030367

Kulesza, T., Wong, W-K., Stumpf, S., Perona, S., White, R., Burnett, M., Oberst, I. & Ko, A. J. (2009). Fixing the program my computer learned: barriers for end users, challenges for the machine. In: C. Conati, M. Bauer, N. Oliver & D. S. Weld (Eds.), Proceedings of the 14th international conference on Intelligent user interfaces. (pp. 187-196). ACM. ISBN 978-1-60558-168-2

L

Lahtinen, K., Slingsby, A., Dykes, J., Butt, S. & Fitzgerald, R. (2015). Informing Non-Response Bias Model Creation in Social Surveys with Visualisation. Paper presented at the VIS 2015, 25-10-2015 - 30-10-2015, Chicago, USA.

Laird, A. R., Riedel, M. C., Okoe, M., Jianu, R., Ray, K. L., Eickhoff, S. B., Smith, S. M., Fox, P. T. & Sutherland, M. T. (2017). Heterogeneous fractionation profiles of meta-analytic coactivation networks. NeuroImage, 149, pp. 424-435. doi: 10.1016/j.neuroimage.2016.12.037

Lambert, A., Weyde, T. & Armstrong, N. (2014). Studying the Effect of Metre Perception on Rhythm and Melody Modelling with LSTMs. Paper presented at the 3rd International Workshop on Musical Metacreation, held at the 10th Artificial Intelligence and Interactive Digital Entertainment Conference, 03-10-2014 - 07-10-2014, Raleigh, USA.

Lay, S., Vermeulen, J., Perin, C., Donovan, E., Dachselt, R. & Carpendale, S. (2016). Slicing the aurora: An immersive proxemics-aware visualization. In: Proceedings of the 2016 ACM Companion on Interactive Surfaces and Spaces. (pp. 91-97). New York, NY, United States: ACM. ISBN 9781450345309

Lazareva, A., Asad, M. & Slabaugh, G.G. (2017). Learning to Deblur Adaptive Optics Retinal Images. Paper presented at the 14th International Conference, ICIAR 2017, 5-7 Jul 2017, Montreal, Canada.

Lekeas, G., Kloukinas, C. & Stathis, K. (2011). Producing Enactable Protocols in Artificial Agent Societies. Lecture Notes in Computer Science: Agents in Principle, Agents in Practice, 7047, pp. 311-322. doi: 10.1007/978-3-642-25044-6_25

Li, F. (2016). The Future of Video. Cambridge, UK: Imagen Ltd.

Li, F., Nucciarelli, A., Roden, S. & Graham, G. (2016). How Smart Cities Transform Operations Models: A New Research Agenda for Operations Management in the Digital Economy. Production Planning & Control, 27(6), pp. 514-528. doi: 10.1080/09537287.2016.1147096

Li, F., Rahulamathavan, Y. & Rajarajan, M. (2014). Lightweight Static and Dynamic Attributes Based Access Control Scheme for Secure Data Access in Mobile Environment. Paper presented at the 39th IEEE Conference on Local Computer Networks, 08-09-2014 - 11-09-2014, Edmonton, Canada.

Li, S., Alonso, E., Fairbank, M., Jaithwa, I. & Wunsch, D. C. (2015). Hardware Validation for Control of Three-Phase Grid-Connected Microgrids Using Artificial Neural Networks. Paper presented at the 12th International Conference on Applied Computing 2015, 24-10-2015 - 26-10-2015, Maynooth, Ireland.

Li, S., Fairbank, M., Johnson, C., Wunsch, D. C., Alonso, E. & Proano, J. L. (2013). Artificial Neural Networks for Control of a Grid-Connected Rectifier/Inverter Under Disturbance, Dynamic and Power Converter Switching Conditions. IEEE Transactions on Neural Networks and Learning Systems, 25(4), pp. 738-750. doi: 10.1109/TNNLS.2013.2280906

Li, S., Fairbank, M., Wunsch, D. C. & Alonso, E. (2012). Vector Control of a Grid-Connected Rectifier/Inverter Using an Artificial Neural Network. Paper presented at the IEEE International Joint Conference on Neural Networks (IEEE IJCNN 2012), 1783-1789, 10-15-2012, Brisbane, Australia.

Li, S., Fu, X., Alonso, E., Fairbank, M. & Wunsch, D. C. (2016). Neural-network based vector control of VSCHVDC transmission systems. Paper presented at the 4th International Conference on Renewable Energy Research and Applications (ICRERA), 22-25 Nov 2015, Palermo, Italy.

Li, S., Oikonomou, G., Tryfonas, T., Chen, T. & Xu, L. D. (2014). A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things. IEEE Transactions on Industrial Informatics, 10(2), pp. 1461-1468. doi: 10.1109/TII.2014.2306331

Lichtenstein, Y., Finkelstein, L. & Wyss, S. (2017). Aligning flexibility with uncertainty in software development arrangements through a contractual typology. Journal of Global Operations and Strategic Sourcing,

Littlewood, B., Bainbridge, I. & Bloomfield, R. E. (1998). The use of computers in safety-critical applications. London, UK: Health and Safety Commission.

Littlewood, B. & Bloomfield, R. E. (2004). On the use of diverse arguments to increase confidence in dependability claims. Paper presented at the International Conference on Control and Instrumentation in Nuclear Installations, 2004, Liverpool, UK.

Littlewood, B., Bloomfield, R. E., Popov, P. T., Povyakalo, A. A. & Strigini, L. (2004). The impact of "difficulty" variation on the probability of coincident failure of diverse systems. Paper presented at the International Conference on Control and Instrumentation in Nuclear Installations, 2004, Liverpool, UK.

Littlewood, B., Popov, P. T. & Strigini, L. (2001). Modeling software design diversity. ACM Computer Surveys, 33(2), pp. 177-208. doi: 10.1145/384192.384195

Littlewood, B. & Strigini, L. (2011). “Validation of ultra-high dependability…” – 20 years on. Safety Systems - The Safety-Critical Systems Club Newsletter, 20(3),

Littlewood, B., Strigini, L., Wright, D. & Courtois, P.-J. (1998). Examination of Bayesian belief network for safety assessment of nuclear computer-based systems (Report No. 70). Brussels: DeVa ESPRIT Long Term Research Project.

Liu, X. & Banerjee, J. R. (2016). Free vibration analysis for plates with arbitrary boundary conditions using a novel spectral-dynamic stiffness method. Computers and Structures, 164, pp. 108-126. doi: 10.1016/j.compstruc.2015.11.005

Llado, X., Imiya, A., Reyes-Aldasoro, C. C., Mason, D., Aoki, K., Kudo, M., Zhang, Y. & Argyriou, V. (2014). Homage to Professor Maria Petrou. Pattern Recognition Letters, 48, pp. 2-7. doi: 10.1016/j.patrec.2014.06.008

Lloyd, D., Dykes, J. & Radburn, R. (2008). Mediating geovisualization to potential users and prototyping a geovisualization application. Paper presented at the GIS Research UK 16th Annual Conference GISRUK 2008, 2 - 4 Aug 2008, Manchester Metropolitan University, Manchester, UK.

Loizides, F., Buchanan, G. & Mavri, K. (2016). Theory and practice in visual interfaces for semi-structured document discovery and selection. Information Services and Use, 35(4), pp. 259-271. doi: 10.3233/ISU-150783

Loorak, M.H., Perin, C., Collins, C. & Carpendale, S. (2017). Exploring the Possibilities of Embedding Heterogeneous Data Attributes in Familiar Visualizations. IEEE Transactions on Visualization and Computer Graphics, 23(1), pp. 581-590. doi: 10.1109/TVCG.2016.2598586

Loorak, M.H., Perin, C., Kamal, N., Hill, M. A. & Carpendale, S. (2016). TimeSpan: Using Visualization to Explore Temporal Multi-dimensional Data of Stroke Patients.. IEEE Transactions on Visualization and Computer Graphics, 22(1), pp. 409-418. doi: 10.1109/TVCG.2015.2467325

Lorenzoli, D. & Spanoudakis, G. (2009). Detection of Security and Dependability Threats: A Belief Based Reasoning Approach. In: R. Falk, W. Goudalo, E. Y. Chen, R. Savola & M. Popescu (Eds.), Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on. (pp. 312-320). IEEE.

Lorenzoli, D. & Spanoudakis, G. (2010). EVEREST+: Run-time SLA violations prediction. In: Proceedings of the 5th International Workshop on Middleware for Service Oriented Computing. (pp. 13-18). New York: ACM. ISBN 978-1-4503-0452-8

Lorenzoli, D. & Spanoudakis, G. (2011). Predicting software service availability: Towards a runtime monitoring approach. In: 2011 IEEE International Conference on Web Services (ICWS 2011). (pp. 736-737). IEEE. ISBN 978-1-4577-0842-8

Lu, W., MacFarlane, A. & Venuti, F. (2009). Okapi-based XML indexing. Aslib Proceedings; New Information Perspectives, 61(5), pp. 483-499. doi: 10.1108/00012530910989634

Lu, W., Robertson, S. & MacFarlane, A. (2006). CISR at INEX 2006. Paper presented at the 5th International Workshop of the Initiative for the Evaluation of XML Retrieval, 17-12-2006 - 20-12-2006, Dagstuhl Castle, Germany.

Lu, W., Robertson, S., MacFarlane, A. & Zhao, L. (2007). Window based Enterprise Expert Search. Paper presented at the Fifteenth Text REtrieval Conference (TREC 2006), 14-11-2006 - 17-11-2006, Gaithersburg, Maryland.

Luzardo, A., Rivest, F., Alonso, E. & Ludvig, E. (2017). A Drift-Diffusion Model of Interval Timing in the Peak Procedure. Journal of Mathematical Psychology, 77, pp. 111-123. doi: 10.1016/j.jmp.2016.10.002

M

MacFarlane, A. (2007). Evaluation of web search for the information practitioner. Aslib Proceedings; New Information Perspectives, 59(4-5), pp. 352-366. doi: 10.1108/00012530710817573

MacFarlane, A. (2009). Models Performance Issues in Parallel Computing for Information Retrieval. In: A.S. Goker & J. Davies (Eds.), Information Retrieval: Searching in the 21st Century. (pp. 255-271). John Wiley & Sons Inc. ISBN 0470027622

MacFarlane, A. (2003). On open source IR. Aslib Proceedings; New Information Perspectives, 55(4), pp. 217-222. doi: 10.1108/00012530310486575

MacFarlane, A., McCann, J. A. & Robertson, S. E. (2000). Parallel search using partitioned inverted files. In: Seventh International Symposium on String Processing and Information Retrieval, 2000. SPIRE 2000. Proceedings. (pp. 209-220). IEEE COMPUTER SOC. ISBN 0-7695-0746-8

MacFarlane, A., Robertson, S. E. & McCann, F. A. (2004). Parallel computing for passage retrieval. Aslib Proceedings; New Information Perspectives, 56(4), pp. 201-211. doi: 10.1108/00012530410549231

MacFarlane, A., Robertson, S. E. & McCann, J. A. (2003). Parallel computing for term selection in routing/filtering. Paper presented at the 25th European Conference on Information Retrieval Research (ECIR 2003), 14-04-2003 - 16-04-2003, Pisa, Italy.

MacFarlane, A., Robertson, S. E. & McCann, J. A. (1997). Parallel computing in information retrieval - An updated review. Journal of Documentation, 53(3), pp. 274-315. doi: 10.1108/EUM0000000007201

Mahbub, K. & Spanoudakis, G. (2010). Proactive SLA Negotiation for Service Based Systems. 2010 6th World Congress on Services (SERVICES-1), pp. 519-526. doi: 10.1109/SERVICES.2010.15

Mahbub, K. & Spanoudakis, G. (2011). Proactive SLA negotiation for service based systems: Initial implementation and evaluation experience. Proceedings - 2011 IEEE International Conference on Services Computing, SCC 2011, pp. 16-23. doi: 10.1109/SCC.2011.34

Mahbub, K., Spanoudakis, G. & Zisman, A. (2011). A monitoring approach for runtime service discovery. Automated Software Engineering, 18(2), pp. 117-161. doi: 10.1007/s10515-010-0077-5

Mahmood, A. & Sismeiro, C. S. (2017). Will they come and will they stay? Online Social Networks and news consumption on external websites. Journal of Interactive Marketing, 37, pp. 117-132. doi: 10.1016/j.intmar.2016.10.003

Mai, L., Kalyvianaki, E. & Costa, P. (2013). Exploiting Time-Malleability in Cloud-based Batch Processing Systems. Paper presented at the LADIS '13: 7th Workshop on Large-Scale Distributed Systems and Middleware, 02-11-2013 - 03-11-2013, Pennsylvania, USA.

Maiden, N., D'Souza, S., Jones, S., Muller, L., Panesse, L., Pitts, K., Prilla, M., Pudney, K., Rose, M., Turner, I. & Zachos, K. (2013). Computing Technologies for Reflective and Creative Care for People with Dementia. Communications of the ACM, 56(11), pp. 60-67. doi: 10.1145/2500495

Maiden, N., Gizikis, A. & Robertson, S. (2004). Provoking creativity: Imagine what your requirements could be like. IEEE Software, 21(5), pp. 68-75. doi: 10.1109/MS.2004.1331305

Maiden, N., Jones, S., Karlsen, I. K., Neill, R., Zachos, K. & Milne, A. (2010). Requirements Engineering as Creative Problem Solving: A Research Agenda for Idea Finding. Paper presented at the Requirements Engineering Conference (RE), 2010 18th IEEE International, 27 Sep - 1 Oct 2010, Sydney, Australia.

Maiden, N., Jones, S., Manning, S., Greenwood, J. & Renou, L. (2004). Model-driven requirements engineering: Synchronising models in an air traffic management case study. Lecture Notes in Computer Science: Advanced Information Systems Engineering, 3084, pp. 368-383. doi: 10.1007/978-3-540-25975-6_27

Maiden, N., Lockerbie, J., Zachos, K., Bertolino, A., Angelis, G. & Lonetti, F. (2014). A Requirements-Led Approach for Specifying QoS-Aware Service Choreographies: An Experience Report.. Lecture Notes in Computer Science, 8396, pp. 239-253. doi: 10.1007/978-3-319-05843-6_18

Maiden, N., Manning, S., Robertson, S. & Greenwood, J. (2004). Integrating Creativity Workshops into Structured Requirements Processes. Paper presented at the DIS’2004, 5th conference on Designing interactive systems: processes, practices, methods, and techniques, 01-08-2004 - 04-08-2004, Cambridge , USA.

Maiden, N. & Robertson, S. (2005). Integrating creativity into requirements processes: experiences with an air traffic management system. Paper presented at the 13th IEEE International Conference on Requirements Engineering, 29-08-2005 - 02-09-2005, La Sorbonne, France.

Maiden, N., Schubmann, M., McHugh, M., Lai, A.Y. & Sulley, R. (2016). Evaluating the Impact of a New Interactive Digital Solution for Collecting Care Quality In-formation for Residential Homes. Paper presented at the 30th British Human Computer Interaction Conference, 11-15 Jul 2016, Bournemouth, UK.

Maiden, N., Zachos, K., Lockerbie, J., Brock, G. & Traver, C. (2016). Developing and Evaluating Digital Creativity Support in Google Docs for Journalists. Paper presented at the British HCI Conference 2016, 11-15 July 2016, Bournemouth, UK.

Makri, S. (2013). From Grounded Theory to Design Practice. Paper presented at the BCS-HCI 2013 Workshop, 9 Sep 2013, Brunel University, UK.

Makri, S. (2014). Serendipity is not Bullshit. Paper presented at the EuroHCIR 2014, The 4th European Symposium on Human-Computer Interaction and Information Retrieval, 13 Sep 2014, London, UK.

Makri, S. (2003). An accessible and multi-sensory web-based approach to Dyslexia screening. (Unpublished Diploma thesis, University of Hertfordshire)

Makri, S. (2008). A study of lawyers' information behaviour leading to the development of two methods for evaluating electronic resources. (Unpublished Doctoral thesis, University College London)

Makri, S. & Blandford, A. (2011). What is Serendipity? - A Workshop Report. Information Research, 16(3), p. 491.

Makri, S., Blandford, A. & Cox, A. L. (2008). Using information behaviors to evaluate the functionality and usability of electronic resources: From Ellis's model to evaluation. Journal of the American Society for Information Science and Technology, 59(14), pp. 2244-2267. doi: 10.1002/asi.20927

Mamdouhi, H., Khatun, S. & Zarrin, J. (2009). Bluetooth wireless monitoring, managing and control for inter vehicle in vehicular Ad-Hoc networks. Journal of Computer Science, 5(12), pp. 922-929. doi: 10.3844/jcssp.2009.922.929

Mantas, G., Komninos, N., Rodriuez, J., Logota, E. & Marques, H. (2015). Security for 5G Communications. In: J. Rodriguez (Ed.), Fundamentals of 5G Mobile Networks. (pp. 207-220). John Wiley & Sons, Ltd.. ISBN 9781118867464

Mantas, G., Lymberopoulos, D. & Komninos, N. (2012). PKI security in large-scale healthcare networks. Journal of Medical Systems, 36(3), pp. 1107-1116. doi: 10.1007/s10916-010-9573-1

Markova, M.S., Wilson, S. & Stumpf, S. (2012). Tangible user interfaces for learning. International Journal of Technology Enhanced Learning, 4(3-4), pp. 139-155.

Marshall, J., Roper, A., Galliers, J. R., Wilson, S., Cocks, N., Muscroft, S. & Pring, T. (2013). Computer delivery of gesture therapy for people with severe aphasia. Aphasiology, 27(9), pp. 1128-1146. doi: 10.1080/02687038.2013.786803

Martin, C., Corney, D., Goker, A.S. & MacFarlane, A. (2013). Mining Newsorthy Topics from Social Media. Paper presented at the BCS SGAI Workshop on Social Media Analysis 2013, 10-12-2013, Cambridge, UK.

Mason, J. S., Klippel, A., Bleisch, S., Slingsby, A. & Deitrick, S. (2016). Special issue introduction: Approaching spatial uncertainty visualization to support reasoning and decision making. Spatial Cognition and Computation, 16(2), pp. 97-105. doi: 10.1080/13875868.2016.1138117

McCurdy, N., Dykes, J. & Meyer, M. (2016). Action Design Research and Visualization Design. In: Proceedings of the Sixth Workshop on Beyond Time and Errors on Novel Evaluation Methods for Visualization. (pp. 10-18). New York, USA: ACM. ISBN 978-1-4503-4818-8

McKay, D. & Buchanan, G. (2014). On the other side from you: How library design facilitates and hinders group work. In: Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures: the Future of Design. Proceedings. (pp. 97-106). New York: ACM. ISBN 978-1-4503-0653-9

McKay, D. & Buchanan, G. (2015). You Can Check It Out But It Will Never Leave: Characterising Ebook Borrowing Patterns. Paper presented at the ACM SIGIR Conference on Human Information Interaction and Retrieval (CHIIR), 13-03-2016 - 17-03-2016, North Carolina, USA.

Mcbride, C. & Paterson, R. A. (2008). Applicative programming with effects. Journal of Functional Programming, 18(1), pp. 1-13. doi: 10.1017/S0956796807006326

Meaker, Thomas Arthur (1994). The role of intervention in strategic change. (Unpublished Doctoral thesis, City University)

Mearns, L., Benetos, E. & Dixon, S. (2011). Automatically detecting key modulations in J.S. Bach chorale recordings. Paper presented at the 8th Sound and Music Computing Conference, 6 - 9 Jul 2011, Padova, Italy.

Meng, X. & Spanoudakis, G. (2016). MBotCS: A mobile botnet detection system based on machine learning. Lecture Notes in Computer Science, 9572, pp. 274-291. doi: 10.1007/978-3-319-31811-0_17

Mercea, D. & Bastos, M. T. (2016). Being a Serial Transnational Activist. Journal of Computer-Mediated Communication, 21(2), pp. 140-155. doi: 10.1111/jcc4.12150

Metoyer, R., Stumpf, S., Neumann, C., Dodge, J., Cao, J. & Schnabel, A. (2010). Explaining how to play real-time strategy games. Knowledge-Based Systems, 23(4), pp. 295-301. doi: 10.1016/j.knosys.2009.11.006

Meulemans, W., Dykes, J., Slingsby, A., Turkay, C. & Wood, J. (2017). Small Multiples with Gaps. IEEE Transactions on Visualization and Computer Graphics, 23(1), pp. 381-390. doi: 10.1109/TVCG.2016.2598542

Meulemans, W. & Haunert, J-H. (2016). Partitioning Polygons via Graph Augmentation. Lecture Notes in Computer Science, 9927, pp. 18-33. doi: 10.1007/978-3-319-45738-3

Millan Cifuentes, J. D. (2017). Curiosity driven search experiences. (Unpublished Doctoral thesis, City, University of London)

Milojevic, M. (2015). Location aware data aggregation for efficient message dissemination in Vehicular Ad Hoc Networks. (Unpublished Doctoral thesis, City University London)

Milojevic, M. & Rakocevic, V. (2015). Location Aware Data Aggregation for Efficient Message Dissemination in Vehicular Ad Hoc Networks. IEEE Transactions on Vehicular Technology, 64(12), pp. 5575-5583. doi: 10.1109/TVT.2015.2487830

Milonidis, E., Kostarigka, A. & Karcanias, N. (2011). Finite settling time stabilisation: the robust SISO case. International Journal of Control, 84(9), pp. 1521-1532. doi: 10.1080/00207179.2011.611949

Mimi, Y. (2015). The Routine Health Information System in Palestine: Determinants and Performance. (Unpublished Doctoral thesis, City University London)

Mitrokotsa, A., Komninos, N. & Douligeris, C. (2007). Towards an effective intrusion response engine combined with intrusion detection in ad hoc networks. Paper presented at the The Sixth Annual Mediterranean Ad Hoc Networking WorkShop, 12th - 15th June 2007, Corfu, Greece.

Modi, C., Patel, D., Borisaniya, B., Patel, A. & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), pp. 561-592. doi: 10.1007/s11227-012-0831-5

Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A. & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), pp. 42-57. doi: 10.1016/j.jnca.2012.05.003

Mohanty, V., Moliya, D., Hota, C. & Rajarajan, M. (2010). Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection. Intelligence and Security Informatics, 6122, pp. 65-72. doi: 10.1007/978-3-642-13601-6_8

Mondragon, E., Alonso, E., Fernandez, A. & Gray, J. (2013). An extension of the Rescorla and Wagner Simulator for context conditioning. Computer Methods and Programs in Biomedicine, 110(2), pp. 226-230. doi: 10.1016/j.cmpb.2013.01.016

Mondragon, E., Alonso, E. & Kokkola, N. (2017). Associative Learning Should Go Deep. Trends in Cognitive Science, doi: 10.1016/j.tics.2017.06.001

Mondragon, E., Gray, J. & Alonso, E. (2013). A Complete Serial Compound Temporal Difference Simulator for Compound stimuli, Configural cues and Context representation. Neuroinformatics, 11(2), pp. 259-261. doi: 10.1007/s12021-012-9172-z

Mondragon, E., Gray, J., Alonso, E., Bonardi, C. & Jennings, D. J. (2014). SSCC TD: A Serial and Simultaneous Configural-Cue Compound Stimuli Representation for Temporal Difference Learning. PLoS One, 9(7), e102469. doi: 10.1371/journal.pone.0102469

Moore, R., Mills, M., Marsham, P. & Corr, P. J. (2017). Group and individual analyses of pre-, peri-, and post-movement related alpha and beta oscillations during a single continuous monitoring task. International Journal of Psychophysiology, 120, pp. 108-117.

Mourouzis, T., Wojcik, M. & Komninos, N. (2016). On The Security Evaluation of Partial Password Implementations. .

Movahedi, Y., Cukier, M., Andongabo, A. & Gashi, I. (2017). Cluster-based Vulnerability Assessment Applied to Operating Systems. Paper presented at the 13th European Dependable Computing Conference, 4-8 Sep 2017, Geneva, Switzerland.

Mukherjee, A., Baronchelli, A., Loreto, V., Puglisi, A. & Tria, F. (2010). Aging in the Emergence of Linguistic Categories. In: H. Fellermann, M. Dörr, M. M. Hanczyc, L. L. Laursen, S. E. Maurer, D. Merkle, P-A. Monnard, K. Støy & S. Rasmussen (Eds.), Artificial Life XII: Proceedings of the Twelfth International Conference on the Synthesis and Simulation of Living Systems. (pp. 589-590). USA: MIT Press. ISBN 9780262290753

N

Nair, S. K., Porwal, S., Dimitrakos, T., Ferrer, A. J., Tordsson, J., Sharif, T., Sheridan, C., Rajarajan, M. & Khan, A. U. (2010). Towards secure cloud bursting, brokerage and aggregation. Paper presented at the IEEE European conference on Web Services, 1 Dec 2010 - 3 Dec 2010, Cyprus.

Naval, S., Laxmi, V., Rajarajan, M., Gaur, M. S. & Conti, M. (2015). Employing Program Semantics for Malware Detection. IEEE Transactions on Information Forensics and Security, 10(12), pp. 2591-2604. doi: 10.1109/TIFS.2015.2469253

Netkachov, A., Popov, P. T. & Salako, K. (2014). Model-based Evaluation of the Resilience of Critical Infrastructures under Cyber Attacks. Paper presented at the 9th International Conference on Critical Information Infrastructures Security (CRITIS 2014), 13-10-2014 - 15-10-2014, Limassol, Cyprus.

Netkachov, O., Popov, P. T. & Salako, K. (2014). Model-based Evaluation of the Resilience of Critical Infrastructures under Cyber Attacks. Lecture Notes in Computer Science, 8985, pp. 231-243. doi: 10.1007/978-3-319-31664-2_24

Netkachova, K. (2012). The model and implementation of Safety Case Cores. Information & Security, 28(2), pp. 286-295.

Netkachova, K. & Bloomfield, R. E. (2016). Security-Informed Safety. Computer, 49(6), pp. 98-102. doi: 10.1109/MC.2016.158

Netkachova, K., Müller, K., Paulitsch, M. & Bloomfield, R. E. (2015). Security-Informed Safety Case Approach to Analysing MILS Systems. Paper presented at the International Workshop on MILS: Architecture and Assurance for Secure Systems, 19-21 January 2015, Amsterdam, The Netherlands.

Netkachova, K. & Pokrova, S. V. (2011). Оценка и обеспечение безопасности систем электронного образования на основе веб-сервисов. Бизнес Информ, 6, pp. 183-186.

Ng, K.-C., Weyde, T., Larkin, O., Neubarth, K., Koerselman, T. & Ong, B. (2007). 3d augmented mirror: a multimodal interface for string instrument learning and teaching with gesture support. ICMI '07 Proceedings of the 9th international conference on Multimodal interfaces, pp. 339-345. doi: 10.1145/1322192.1322252

Nguyen, P., Turkay, C., Andrienko, G., Andrienko, N. & Thonnard, O. (2017). A Visual Analytics Approach for User Behaviour Understanding through Action Sequence Analysis. Paper presented at the EuroVis Workshop on Visual Analytics, 12-13 Jun 2017, Barcelona, Spain.

Nguyen, P., Xu, K., Bardill, A., Salman, B., Herd, K. & Wong, W. (2016). SenseMap: Supporting Browser-based Online Sensemaking through Analytic Provenance. Paper presented at the VIS 2016, 23-28 Oct 2016, Baltimore, USA.

Nguyen, P., Xu, K., Walker, R. & Wong, B.L.W. (2014). SchemaLine: Timeline visualization for sensemaking. 2014 18th International Conference on Information Visualisation (IV), pp. 225-233. doi: 10.1109/IV.2014.14

Nguyen, P., Xu, K., Walker, R. & Wong, B.L.W. (2016). TimeSets: Timeline visualization with set relations. Information Visualization, 15(3), pp. 253-269. doi: 10.1177/1473871615605347

Nguyen, P., Xu, K., Wheat, A., Wong, B.L.W., Attfield, S. & Fields, B. (2016). SensePath: Understanding the Sensemaking Process Through Analytic Provenance. IEEE Transactions on Visualization and Computer Graphics, 22(1), pp. 41-50. doi: 10.1109/TVCG.2015.2467611

Niedermeyer, F., Steinmetzer, S., Kroll, M. & Schnell, R. (2014). Cryptanalysis of Basic Bloom Filters Used for Privacy Preserving Record Linkage. Journal of Privacy and Condentiality, 6(2), pp. 59-79.

Nouri, M. (2016). Creativity-supporting environments: An emotion-based framework for influencing designers’ creativity through using design environments. (Unpublished Doctoral thesis, City, University of London)

O

Okoe, M., Alam, S. S. & Jianu, R. (2014). A Gaze-enabled Graph Visualization to Improve Graph Reading Tasks. Computer Graphics Forum, 33(3), pp. 251-260. doi: 10.1111/cgf.12381

Okoe, M. & Jianu, R. (2015). GraphUnit: Evaluating Interactive Graph Visualizations Using Crowdsourcing. Computer Graphics Forum, 34(3), pp. 451-460. doi: 10.1111/cgf.12657

Olteanu Raimond, A. M., Xiao, Y., Liu, J., Chen, T. & Chen, C. L. P. (2013). Nonintrusive tracing in the Internet. Security and Communication Networks, 6(7), pp. 833-843. doi: 10.1002/sec.616

Ostermann, F. O., Huang, H., Andrienko, G., Andrienko, N., Capineri, C., Farkas, K. & Purves, R. S. (2015). Extracting and comparing places using geo-social media. ISPRS GEOSPATIAL WEEK 2015, II-3(W5), doi: 10.5194/isprsannals-II-3-W5-311-2015 ISSN 2194-9034

Owen, T., Pearson, J., Thimbleby, H. W. & Buchanan, G. (2015). ConCap: Designing to Empower Individual Reflection on Chronic Conditions using Mobile Apps. Paper presented at the MobileHCI 2015, 24-08-2015 - 27-08-2015, Copenhagen, Denmark.

Owen, T., Pearson, J., Thimbleby, H. W. & Buchanan, G. (2015). ConCap: Designing to Empower Individual Reflection on Chronic Conditions using Mobile Apps. In: S. Boring & E. Rukzio (Eds.), Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. (pp. 105-114). New York, USA: ACM. ISBN 9781450336529

Ozkaya, M. (2014). A Design-by-Contract based Approach for Architectural Modelling and Analysis. (Unpublished Post-Doctoral thesis, City University London)

Ozkaya, M. & Kloukinas, C. (2014). Architectural specification and analysis with XCD: The aegis combat system case study. In: 2014 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD). (pp. 368-375). IEEE. ISBN 978-9-8975-8065-9

Ozkaya, M. & Kloukinas, C. (2013). Are we there yet? Analyzing architecture description languages for formal analysis, usability, and realizability. Paper presented at the 39th Euromicro Conference Series on Software Engineering and Advanced Applications, SEAA 2013, 4th - 6th September 2013, Santander, Spain.

Ozkaya, M. & Kloukinas, C. (2014). Design-by-contract for reusable components and realizable architectures. In: CBSE '14 Proceedings of the 17th international ACM Sigsoft symposium on Component-based software engineering. (pp. 129-138). New York, USA: ACM. ISBN 9781450325776

Ozkaya, M. & Kloukinas, C. (2012). Highly analysable, reusable, and realisable architectural designs with XCD. Communications in Computer and Information Science, 340, pp. 72-79. doi: 10.1007/978-3-642-35267-6_10

Ozkaya, M. & Kloukinas, C. (2013). Towards a design-by-contract based approach for realizable connector-centric software architectures. Paper presented at the ICSOFT 2013 - Proceedings of the 8th International Joint Conference on Software Technologies, 29 - 31 Jul 2013, Rejkyavik, Iceland.

P

Palacios, M., García-Fanjul, J., Tuya, J. & Spanoudakis, G. (2015). Automatic test case generation for WS-Agreements using combinatorial testing. Computer Standards and Interfaces, 38, pp. 84-100. doi: 10.1016/j.csi.2014.10.003

Palacios, M., García-Fanjul, J., Tuya, J. & Spanoudakis, G. (2015). Coverage Based Testing for Service Level Agreements. IEEE Transactions on Services Computing, 8(2), pp. 299-313. doi: 10.1109/TSC.2014.2300486

Palacios, M., García-Fanjul, J., Tuya, J. & Spanoudakis, G. (2012). Identifying Test Requirements by Analyzing SLA Guarantee Terms. In: C. A. Goble, P. P. Chen & J. Zhang (Eds.), 2012 IEEE 19th International Conference on Web Services (ICWS). (pp. 351-358). IEEE. ISBN 978-1-4673-2131-0

Panourgias, N.S., Nandhakumar, J. & Scarbrough, H. (2014). Entanglements of creative agency and digital technology: A sociomaterial study of computer game development. Technological Forecasting and Social Change, 83(1), pp. 111-126. doi: 10.1016/j.techfore.2013.03.010

Papadopoulos, Konstantinos (2015). Flow effect on thrombus formation in stenosed coronary arteries: a computational study. (Unpublished Doctoral thesis, City University London)

Papadopoulos, Konstantinos, Gavaises, M., Pantos, I., Katritsis, D. G. & Mitroglou, N. (2016). Derivation of flow related risk indices for stenosed left anterior descending coronary arteries with the use of computer simulations. Medical Engineering & Physics, 38(9), pp. 929-939. doi: 10.1016/j.medengphy.2016.05.016

Papakonstantinou, S. & Brujic-Okretic, V. (2009). Framework for context-aware smartphone applications. The Visual Computer, 25(12), pp. 1121-1132. doi: 10.1007/s00371-009-0391-8

Papakonstantinou, S. & Brujic-Okretic, V. (2009). Prototyping a Context-Aware Framework for Pervasive Entertainment Applications. Paper presented at the Games and Virtual Worlds for Serious Applications.

Parhizkar, M. (2016). Impact analysis of enterprise resource planning post-implementation modifications. (Unpublished Doctoral thesis, City, University of London)

Paterson, R. A. (2012). Constructing applicative functors. Paper presented at the 11th International Conference, Mathematics of Program Construction, 25 - 27 Jun 2012, Madrid, Spain.

Pawar, P. S., Nair, S. K., El-Mousaa, F., Dimitrakos, T., Rajarajan, M. & Zisman, A. (2012). Opinion Model Based Security Reputation Enabling Cloud Broker Architecture. Paper presented at the CloudComp 2012 - 3rd International Conference on Cloud Computing, 24 - 26 Sep 2012, Vienna, Austria.

Pawar, P. S., Rajarajan, M., Dimitrakos, T. & Zisman, A. (2014). Trust Assessment Using Cloud Broker. In: J. Zhou, N. Gal-Oz, J. Zhang & E, Gudes (Eds.), Trust Management VIII. IFIP Advances in Information and Communication Technology, 430. (pp. 237-244). Springer. ISBN 9783662438121

Pawar, P. S., Rajarajan, M., Nair, S. K. & Zisman, A. (2012). Trust Model for Optimized Cloud Services. IFIP Advances in Information and Communication Technology, 374, pp. 97-112. doi: 10.1007/978-3-642-29852-3_7

Pawar, Pramod S (2015). Cloud Broker Based Trust Assessment of Cloud Service Providers. (Unpublished Doctoral thesis, City University London)

Pearson, J. & Buchanan, G. (2011). CloudBooks: An Infrastructure for Reading on Multiple Devices. Paper presented at the International Conference on Theory and Practice of Digital Libraries, TPDL 2011, 26-09-2011 - 28-09-2011, Berlin, Germany.

Pearson, J. & Buchanan, G. (2011). CloudBooks: An infrastructure for reading on multiple devices. Lecture Notes in Computer Science, 6966, pp. 488-492. doi: 10.1007/978-3-642-24469-8_56

Pearson, J., Buchanan, G. & Thimbleby, H. W. (2012). Investigating collaborative annotation on slate PCs. MobileHCI' 12 Proceedings of the 14th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 413-416. doi: 10.1145/2371574.2371637

Pearson, J., Buchanan, G., Thimbleby, H. W. & Jones, M. (2012). The Digital Reading Desk: A lightweight approach to digital note-taking. Interacting with Computers, 24(5), pp. 326-338. doi: 10.1016/j.intcom.2012.03.001

Pearson, J., Robinson, S., Buchanan, G. & Jones, M. (2013). TicQR: Flexible, lightweight linking of paper and digital content using mobile phones. Lecture Notes in Computer Science, 8120, pp. 220-228. doi: 10.1007/978-3-642-40498-6_16

Peny, B., Unal, G.B., Slabaugh, G.G., Fang, T. & Alvino, C. V. (2006). Efficient and Robust Segmentations Based on Eikonal and Diffusion PDEs. In: N Zheng, X Jiang & X Lan (Eds.), Advances in Machine Vision, Image Processing, and Pattern Analysis. Lecture Notes in Computer Science, 4153. (pp. 339-348). Springer. ISBN 3-540-37597-X

Perin, C., Boy, J. & Vernier, F. (2016). Using Gap Charts to Visualize the Temporal Evolution of Ranks and Scores. IEEE Computer Graphics and Applications, 36(5), pp. 38-49. doi: 10.1109/MCG.2016.100

Perin, C. & Dragicevic, P. (2014). Manipulating multiple sliders by crossing. In: Proceedings of the 26th Conference on l'Interaction Homme-Machine. (pp. 48-54). ACM. ISBN 9781450329354

Perin, C., Dragicevic, P. & Fekete, J. (2014). Revisiting Bertin Matrices: New Interactions for Crafting Tabular Visualizations. IEEE Transactions on Visualization and Computer Graphics, 20(12), pp. 2082-2091. doi: 10.1109/TVCG.2014.2346279

Perin, C., Vernier, F. & Fekete, J. (2013). Interactive horizon graphs: Improving the compact visualization of multiple time series. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). (pp. 3217-3226). New York, NY, United States: ACM. ISBN 9781450318990

Perin, C., Vuillemot, R. & Fekete, J. (2013). SoccerStories: A Kick-off for Visual Soccer Analysis. IEEE Transactions on Visualization and Computer Graphics, 19(12), pp. 2506-2515. doi: 10.1109/TVCG.2013.192

Perin, C., Vuillemot, R. & Fekete, J. (2014). À table! Improving temporal navigation in soccer ranking tables. In: CHI '14 - Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. (pp. 887-896). ACM. ISBN 9781450324731

Perotti, A., Boella, G. & Garcez, A. (2014). Runtime Verification Through Forward Chaining. Electronic Proceedings in Theoretical Computer Science, 169, pp. 68-81. doi: 10.4204/EPTCS.169.8

Perotti, A., d'Avila Garcez, A. S. & Boella, G. Neural-Symbolic Monitoring and Adaptation. In: Proceedings of the IEEE International Joint Conference on Neural Networks (IJCNN 2015). . IEEE.

Petroulakis, N. E., Askoxylakis, I. G., Traganitis, A. & Spanoudakis, G. (2013). A privacy-level model of user-centric cyber-physical systems. Lecture Notes in Computer Science, 8030, pp. 338-347. doi: 10.1007/978-3-642-39345-7-36

Petroulakis, N. E., Spanoudakis, G. & Askoxylakis, I. G. (2016). Patterns for the design of secure and dependable software defined networks. Computer Networks, 109(1), pp. 39-49. doi: 10.1016/j.comnet.2016.06.028

Petroulakis, N. E., Spanoudakis, G., Askoxylakis, I. G., Miaoudakis, A. & Traganitis, A. (2016). A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems. In: 2015 IEEE Global Communications Conference (GLOBECOM). . IEEE. ISBN 978-1-4799-5952-5

Petroulakis, N. E., Spanoudakis, G. & Askoxylakis, Y. (2017). Fault Tolerance Using an SDN Pattern Framework. Paper presented at the IEEE Global Communications Conference 2017, 4-8 Dec 2017, Singapore.

Petroulakis, N. E., Tragos, E. Z., Fragkiadakis, A. G. & Spanoudakis, G. (2013). A lightweight framework for secure life-logging in smart environments. Information Security Technical Report, 17(3), pp. 58-70. doi: 10.1016/j.istr.2012.10.005

Pinelli, A., Naqavi, I. Z., Piomelli, U. & Favier, J. (2010). Immersed Boundary Method for Generalised Finite Volume and Finite Difference Navier-Stokes Solvers. Journal of Computational Physics, 229(24), pp. 9073-9091. doi: 10.1016/j.jcp.2010.08.021

Pino, L., Mahbub, K. & Spanoudakis, G. (2014). Designing Secure Service Workflows in BPEL. Lecture Notes in Computer Science, 8831, pp. 551-559. doi: 10.1007/978-3-662-45391-9_48

Pino, L. & Spanoudakis, G. (2012). Constructing secure service compositions with patterns. Paper presented at the 2012 IEEE 8th World Congress on Services, SERVICES 2012, 24 -29 June 2012, Honolulu, Hawaii.

Pino, L. & Spanoudakis, G. (2012). Finding secure compositions of software services: Towards a pattern based approach. 2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops, pp. 1-5. doi: 10.1109/NTMS.2012.6208741

Pino, L., Spanoudakis, G., Fuchs, A. & Guergens, S. (2015). Generating Secure Service Compositions. Lecture Notes in Computer Science, 512, pp. 81-99. doi: 10.1007/978-3-319-25414-2_6

Pino, L., Spanoudakis, G., Krotsiani, M. & Mahbub, K. (2017). Pattern Based Design and Verification of Secure Service Compositions. IEEE Transactions on Services Computing, doi: 10.1109/TSC.2017.2690430

Pino, Luca (2015). Security Aware Service Composition. (Unpublished Doctoral thesis, City University London)

Pitts, K., Zachos, K. & Maiden, N. (2013). Creativity Support for Learning in the Person-Centred Care of Older People with Dementia. Paper presented at the Computational tools fostering Creativity in Learning processes (CCL), 18-09-2013, Paphos, Cyprus.

Pizza, M., Strigini, L., Bondavalli, A. & Di Giandomenico, F. (1998). Optimal discrimination between transient and permanent faults. Paper presented at the High-Assurance Systems Engineering Symposium, 13 - 14 Nov 1998, Washington DC, USA.

Plebani, P., Cappiello, C., Comuzzi, M., Pernici, B. & Yadav, S. (2012). MicroMAIS: executing and orchestrating Web services on constrained mobile devices. Software: Practice and Experience, 42(9), pp. 1075-1094. doi: 10.1002/spe.1106

Popov, P. T. (2012). Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Fault-Tolerant Off-the-Shelf Software. Centre for Software Reliability, City University London.

Popov, P. T. (2015). A SAN model for safety and security analysis of the eMotor, an ASIL-D device

Popov, P. T. (2015). Stochastic Modeling of Safety and Security of the e-Motor, an ASIL-D Device. Paper presented at the 34th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2015, 23-09-2015 - 25-09-2015, Delft University of Technology, Netherlands.

Popov, P. T., Netkachov, A. & Salako, K. (2014). Quantification of the Impact of Cyber Attack in Critical Infrastructures. Lecture Notes in Computer Science, 8696, pp. 316-327. doi: 10.1007/978-3-319-10557-4_35

Popov, P. T., Povyakalo, A. A., Stankovic, V. & Strigini, L. (2014). Software diversity as a measure for reducing development risk. Paper presented at the Tenth European Dependable Computing Conference - EDCC 2014, 13 - 16 May 2014, Newcastle upon Tyne, UK.

Popov, P. T., Salako, K. & Stankovic, V. (2015). Stochastic modeling for performance evaluation of database replication protocols. Lecture Notes in Computer Science, 9259(9259), pp. 21-37. doi: 10.1007/978-3-319-22264-6_2 ISSN 0302-9743

Popov, P. T. & Stankovic, V. (2014). Database replication. P. Popov, V. Stankovic

Povyakalo, A. A., Alberdi, E., Strigini, L. & Ayton, P. (2013). How to discriminate between computer-aided and computer-hindered decisions: a case study in mammography. Medical Decision Making, 33(1), pp. 98-107. doi: 10.1177/0272989X12465490

Procopiou, A. & Komninos, N. (2015). Current and Future Threats Framework in Smart Grid Domain. Paper presented at the 5th Annual IEEE International Conference on CYBER Technology in Automation Control and Intelligence Systems, 8-06-2015 - 12-06-2015, Shenyang, China.

Puschmann, C. & Bastos, M. T. (2015). How Digital Are the Digital Humanities? An Analysis of Two Scholarly Blogging Platforms. PLoS One, 10(2), e0115035. doi: 10.1371/journal.pone.0115035

Puschmann, C., Bastos, M. T. & Schmidt, J-H. (2017). Birds of a feather petition together? Characterizing e-petitioning through the lens of platform data. Information, Communication & Society, 20(2), pp. 203-220. doi: 10.1080/1369118X.2016.1162828

Q

Qureshi, H. K., Rizvi, S., Saleem, M., Khayam, S. A., Rakocevic, V. & Rajarajan, M. (2013). Evaluation and improvement of CDS-based topology control for wireless sensor networks. Wireless Networks, 19(1), pp. 31-46. doi: 10.1007/s11276-012-0449-9

Qureshi, H. K., Rizvi, S., Saleem, M., Khayam, S. A., Rakocevic, V. & Rajarajan, M. (2011). Poly: A Reliable and Energy Efficient Topology Control Protocol for Wireless Sensor Networks. Computer Communications, 34(10), pp. 1235-1242. doi: 10.1016/j.comcom.2010.12.016

R

Rahulamathavan, Y., Moonsamy, V., Batten, L., Shunliang, S. & Rajarajan, M. (2014). An Analysis of Tracking Service Settings in Blackberry 10 and Windows Phone 8 Smartphones. In: Information Security and Privacy. Lecture Notes in Computer Science, 14 (8544). (pp. 430-437). Springer. ISBN 9783319083438

Rahulamathavan, Y., Rajarajan, M. & Phan, R. C. W. (2016). Smart, secure and seamless access control scheme for mobile devices. 2016 IEEE International Conference on Communications, ICC 2016, pp. 1088-1093. doi: 10.1109/ICC.2016.7510837

Rahulamathavan, Y., Veluru, S., Han, J., Li, F., Rajarajan, M. & Lu, R. (2016). User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. IEEE Transactions on Computers, 65(9), pp. 2939-2946. doi: 10.1109/TC.2015.2510646

Rahulamathavan, Y., Veluru, S., Phan, R. C., Chambers, J. A. & Rajarajan, M. (2014). Privacy-preserving clinical decision support system using gaussian kernel-based classification. IEEE Journal of Biomedical and Health Informatics, 18(1), pp. 56-66. doi: 10.1109/JBHI.2013.2274899

Rajarajan, M., Adamsky, F., Khan, H., Khayam, S. A. & Jager, R. (2011). Destabilizing BitTorrent's clusters to attack high bandwidth lechers. Poster presented at the 18th ACM Conference on Computer and Communications Security (CCS 2011), 17 Oct 2011 - 21 Oct 2011, SWISSÔTEL Chicago, Chicago, IL, USA.

Rajarajan, M., Sajjad, A., Zisman, A., Nair, S. K. & Dimitrakos, T. (2011). Dynamic virtual private network provisioning from multiple cloud infrastructure service providers. Paper presented at the 4th European Conference, ServiceWave 2011, 26 - 28 Oct 2011, Poznan, Poland.

Rajarajan, M., Sajjad, A., Zisman, A., Nair, S. K. & Dimitrakos, T. (2012). Secure communication using dynamic VPN provisioning in an Inter-Cloud environment. Paper presented at the ICON 2012: 18th IEEE International Conference on Networks, 12 - 14 Dec 2012, Singapore.

Rajarajan, M. & Yogachandran, R. (2017). Efficient Privacy-Preserving Facial Expression Classification. IEEE Transactions on Dependable and Secure Computing, 14(3), pp. 326-338. doi: 10.1109/TDSC.2015.2453963

Rakocevic, V. (2014). Clustering for networks of moving objects. Lecture Notes in Computer Science, 8611, pp. 70-87. doi: 10.1007/978-3-319-10834-6_5

Randell, R., Mamykina, L., Fitzpatrick, G., Tanggaard, C. & Wilson, S. (2009). Evaluating New Interactions in Healthcare: Challenges and Approaches. Paper presented at the CHI2009 Conference on Human Factors in Computing Systems, 03-04-2009 - 09-04-2009, Boston, MA, USA.

Randell, R., Wilson, S. & Woodward, P. (2010). Variations and Commonalities in Processes of Collaboration: The Need for Multi-Site Workplace Studies. COMPUTER SUPPORTED COOPERATIVE WORK-THE JOURNAL OF COLLABORATIVE COMPUTING, 20(1-2), pp. 37-59. doi: 10.1007/s10606-010-9127-6

Randell, R., Wilson, S. & Woodward, P. (2011). The importance of the verbal shift handover report: A multi-site case study. International Journal of Medical Informatics, 80(11), pp. 803-812. doi: 10.1016/j.ijmedinf.2011.08.006

Randell, R., Wilson, S., Woodward, P. & Galliers, J. R. (2010). Beyond handover: supporting awareness for continuous coverage. COGNITION TECHNOLOGY & WORK, 12(4), pp. 271-283. doi: 10.1007/s10111-010-0138-3

Recuero, R., Zago, G. & Bastos, M. T. (2014). O discurso dos #ProtestosBR: análise de conteúdo do Twitter. Galáxia (São Paulo), 14(28), pp. 199-216. doi: 10.1590/1982-25542014217911

Recuero, R., Zago, G., Bastos, M. T. & Araujo, R. (2015). Hashtags Functions in the Protests Across Brazil. SAGE Open, 5(2), doi: 10.1177/2158244015586000

Reimers, S. & Stewart, N. (2016). Auditory presentation and synchronization in Adobe Flash and HTML5/JavaScript Web experiments. Behavior Research Methods, 48(3), pp. 897-908. doi: 10.3758/s13428-016-0758-5

Rendon, J. & de Menezes, L. M. (2016). Structural combination of neural network models. 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), pp. 406-413. doi: 10.1109/ICDMW.2016.162

Renou, L. & d'Avila Garcez, A. S. (2008). Rule Extraction from Support Vector Machines: A Geometric Approach. Technical Report (Report No. TR/2008/DOC/01). Department of Computing, City University London: .

Reyes-Aldasoro, C. C., Griffiths, M. K., Savas, D. & Tozer, G. M. (2010). CAIMAN: an online algorithm repository for Cancer Image Analysis. Computer Methods and Programs in Biomedicine, 103(2), pp. 97-103. doi: 10.1016/j.cmpb.2010.07.007

Riaz, A., Alonso, E. & Slabaugh, G.G. (2016). Phenotypic Integrated Framework for Classification of ADHD using fMRI. Paper presented at the International Conference on Image Analysis and Recognition (ICIAR 2016), 13-15 Jul 2016, Póvoa de Varzim, Portugal.

Robbins, E., Howe, J. M. & King, A. (2013). Theory propagation and rational-trees. Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming, PPDP 2013, pp. 193-204.

Robbins, E., Howe, J. M. & King, A. (2015). Theory propagation and reification. Science of Computer Programming, 111(1), pp. 3-22. doi: 10.1016/j.scico.2014.05.013

Robertson, S. E., Lu, W. & MacFarlane, A. (2006). XML-structured documents: Retrievable units and inheritance. Paper presented at the 7th International Conference on Flexible Query Answering Systems, 07-06-2006 - 10-06-2006, Milan, ITALY.

Robertson, S. E., Lu, W. & MacFarlane, A. (2006). XML-structured documents: Retrievable units and inheritance. In: H. L. Larsen, G. Pasi, D. Ortiz-Arroyo, T. Andreasen & H. Christiansen (Eds.), Flexible Query Answering Systems. Lecture Notes in Computer Science, 4027. (pp. 121-132). Berlin: Springer-Verlag.

Robinson, Sionade Ann (1990). The utility of analogy in systems sciences. (Unpublished Doctoral thesis, City University)

Roper, A. (2014). Accessibility of computer therapy and technology for people with aphasia. ACM SIGACCESS Accessibility and Computing(108), pp. 50-53. doi: 10.1145/2591357.2591366

Roth, H.R., Hampshire, T.E., McClelland, J.R., Hu, M., Boone, D.J., Slabaugh, G.G., Halligan, S. & Hawkes, D.J. (2012). Inverse Consistency Error in the Registration of Prone and Supine Images in CT Colonography. Lecture Notes in Computer Science, 7029, pp. 1-7. doi: 10.1007/978-3-642-28557-8_1

Roth, H.R., McClelland, J.R., Boone, D.J., Modat, M., Cardoso, M.J., Hampshire, T.E., Hu, M., Punwani, S., Ourselin, S., Slabaugh, G.G., Halligan, S. & Hawkes, D.J. (2011). Registration of the endoluminal surfaces of the colon derived from prone and supine CT colonography. Medical Physics, 38(6), pp. 3077-3089. doi: 10.1118/1.3577603

Rubython, A. & Maiden, N. (2014). The effect of variability modeling on requirements satisfaction for the configuration and implementation of off-the-shelf software packages. In: Requirements Engineering Conference (RE), 2014 IEEE 22nd International. (pp. 394-401). Institute of Electrical and Electronics Engineers Inc.. ISBN 9781479930333

Rushby, J., Littlewood, B. & Strigini, L. (2014). Evaluating the Assessment of Software Fault-Freeness. Paper presented at the AESSCS 2014, 13-05-2015, Newcastle upon Tyne.

Russell-Rose, T., Lamantia, J. & Makri, S. (2014). Defining and applying a language for discovery. Lecture Notes in Computer Science, 8382, pp. 3-28. doi: 10.1007/978-3-319-12093-5_1

Rybynok, V., Kyriacou, P. A., Binnersley, J., Woodcock, A. & Wallace, L. M. (2009). My Care Card development: the patient held electronic health record device. Paper presented at the 2009 9th International Conference on Information Technology and Applications in Biomedicine, 4-7 Nov 2009, Larnaca, Cyprus.

S

Saadat Beheshti, S. M. R., Liatsis, P. & Rajarajan, M. (2017). A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer bots. Computers and Security, 70, pp. 596-617. doi: 10.1016/j.cose.2017.08.006

Sacha, D., Al-Masoudi, F., Steinbrecher, M., Schreck, T., Keim, D., Andrienko, G. & Janetzko, H. (2017). Dynamic Visual Abstraction of Soccer Movement. Computer Graphics Forum, 36(3), pp. 305-315. doi: 10.1111/cgf.13189

Sajjad, A., Rajarajan, M. & Dimitrakos, T. (2014). A low-overhead secure communication framework for an inter-cloud environment. Paper presented at the International Conference on Intelligent Cloud Computing 2014, 24-02-2014 - 26-02-2014, Muscat, Oman.

Sajjad, A., Rajarajan, M., Zisman, A. & Dimitrakos, T. (2015). A scalable and dynamic application-level secure communication framework for inter-cloud services. Future generation computer systems: the international journal of grid computing and escience, 48(July), pp. 19-27. doi: 10.1016/j.future.2015.01.018

Sajjad, Ali (2015). A secure and scalable communication framework for inter-cloud services. (Unpublished Post-Doctoral thesis, City University London)

Salako, K. (2012). Extension to models of coincident failure in multiversion software. (Unpublished Doctoral thesis, City University London)

Sarkar, S., Weyde, T., Garcez, A., Slabaugh, G.G., Dragicevic, S. & Percy, C. (2016). Accuracy and interpretability trade-offs in machine learning applied to safer gambling. CEUR Workshop Proceedings, 1773,

Sathiyanarayanan, M. & Turkay, C. (2016). Determining and Visualising E-mail Subsets to Support E-discovery *

Schlosser, C., Jones, S. & Maiden, N. (2008). Using a Creativity Workshop to Generate Requirements for an Event Database Application. Lecture Notes in Computer Science: Requirements Engineering: Foundation for Software Quality, 5025, pp. 109-122. doi: 10.1007/978-3-540-69062-7_10

Schnell, R. (2013). Efficient private record linkage of very large datasets. Paper presented at the 59th World Statistics Congress of the International Statistical Institute, 25-30 Aug 2013, Hong Kong.

Schnell, R. (2013). Privacy-Preserving Record Linkage and Privacy-Preserving Blocking for Large Files with Cryptographic Keys using Multibit Trees. Paper presented at the Joint Statistical Meeting, 3-8 Aug 2013, Montreal, Canada.

Schnell, R. (2015). Privacy-preserving Record Linkage. In: K. Harron, H. Goldstein & C. Dibben (Eds.), Methodological Developments in Data Linkage. (pp. 201-225). UK: John Wiley & Sons. ISBN 1118745876

Schnell, R. (2016). Randomized Response and Balanced Bloom Filters for Privacy Preserving Record Linkage. Paper presented at the 16th IEEE International Conference on Data Mining Workshop, ICDMW 2016, 12-15 Dec 2016, Barcelona, Spain.

Schnell, R. & Borgs, C. (2015). Building a national perinatal database without the use of unique personal identifiers. Paper presented at the IEEE International Conference on Data Mining, 14-11-2015 - 17-11-2015, Atlantic City, USA.

Secker, J. (2008). Case Study 5: Libraries and Facebook. London, UK: University of London.

Secker, J. (2008). Social software and libraries: a literature review from the LASSIE project. Program, 42(3), pp. 215-231. doi: 10.1108/00330330810892640

Secker, J. & Lloyd, C. (2008). Libraries, social software and distance learners: the adventures of LASSIE. Health Information on the Internet, 62(1), pp. 6-8.

Secker, J. & Price, G. (2007). Libraries as a social space: enhancing the experience of distance learners using social networking tools. Paper presented at the Libraries Without Walls 7: Exploring 'anytime, anywhere' delivery of library services, 14-18 Sep 2007, Lesbos, Greece.

Secker, J. & Price, G. (2007). Libraries, social software and distance learners: Blog it, tag it, share it!. New Review of Information Networking, 13(1), pp. 39-52. doi: 10.1080/13614570701754536

Serra, X., Magas, M., Benetos, E., Chudy, M., Dixon, S., Flexer, A., Gomez, E., Gouyon, F., Herrera, P., Jorda, S., Paytuvi, O., Peeters, G., Schlüter, J., Vinet, H. & Widmer, G. (2013). Roadmap for Music Information ReSearch. London, UK: MIRES Consortium.

Seyff, N., Graf, F. & Maiden, N. (2010). Using mobile RE tools to give end-users their own voice. Paper presented at the Requirements Engineering Conference (RE), 2010 18th IEEE International, 27 Sep - 1 Oct 2010, Sydney, Australia.

Shepherd, Robert (2011). The generation and classification of small leaks in a high pressure water system. (Unpublished Doctoral thesis, City University London)

Sherwani, D. & Stumpf, S. (2014). Toward helping users in assessing the trustworthiness of user-generated reviews. Paper presented at the 28th International BCS Human Computer Interaction Conference (HCI 2014), 9-12 Sep 2014, Southport, UK.

Sherwani, Dara (2016). What makes reviews trustworthy? An investigation of user trust in online reviews when making purchase decisions. (Unpublished Doctoral thesis, City, University of London)

Shittu, R., Healing, A., Ghanea-Hercock, R., Bloomfield, R. E. & Rajarajan, M. (2015). Intrusion alert prioritisation and attack detection using post-correlation analysis. Computers & Security, 50, pp. 1-15. doi: 10.1016/j.cose.2014.12.003

Shittu, R., Healing, A., Ghanea-Hercock, R., Bloomfield, R. E. & Rajarajan, M. (2014). A New Metric for Prioritising Intrusion Alerts Using Correlation and Outlier Analysis. Paper presented at the 39th IEEE Conference on Local Computer Networks, 08-09-2014 - 11-09-2014, Edmonton, Canada.

Shittu, Riyanat O. (2016). Mining intrusion detection alert logs to minimise false positives & gain attack insight. (Unpublished Doctoral thesis, City University London)

Shuhui, L., Fu, X., Jaithwa, I., Alonso, E., Fairbank, M. & Wunsch, D. C. (2015). Control of Three-Phase Grid-Connected Microgrids Using Artificial Neural Networks. Paper presented at the 7th International Joint Conference on Computational Intelligence (IJCCI 2015), 12-11-2015 - 14-11-2015, Lisbon, Portugal.

Shurkhovetskyy, G., Andrienko, N., Andrienko, G. & Fuchs, G. (2017). Data Abstraction for Visualizing Large Time Series. Computer Graphics Forum, doi: 10.1111/cgf.13237

Sigtia, S., Benetos, E., Boulanger-Lewandowski, N., Weyde, T., Garcez, A. & Dixon, S. (2014). A Hybrid Recurrent Neural Network For Music Transcription. CoRR, 14(11), p. 1623.

Sigtia, S., Benetos, E., Cherla, S., Weyde, T., Garcez, A. & Dixon, S. (2014). An RNN-based Music Language Model for Improving Automatic Music Transcription. Paper presented at the 15th International Society for Music Information Retrieval Conference (ISMIR), 27-10-2014 - 31-10-2014, Taipei, Taiwan.

Simon, A., King, A. & Howe, J. M. (2003). Two variables per linear inequality as an abstract domain. Logic based program synthesis and transformation, 2664, pp. 71-89. doi: 10.1007/3-540-45013-0_7

Sisarica, A. & Maiden, N. (2013). An Emerging Model of Creative Game-based Learning. Paper presented at the 4th International Conference, SGDA 2013, 25-09-13 - 27-09-13, Trondheim, Norway.

Sisarica, A., Maiden, N., Morosini, D., Panesse, L., Pudney, K. & Rose, M. (2013). Creativity Support in a Serious Game for Dementia Care. Paper presented at the 9th ACM Conference on Creativity & Cognition, 17-06-2013 - 20-06-2013, Sydney, Australia.

Sisarica, Anja (2015). Creativity support in games for motivated learning. (Unpublished Doctoral thesis, City University London)

Siveroni, I., Zisman, A. & Spanoudakis, G. (2008). Property specification and static verification of UML models. Paper presented at the Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, 4 - 7 Mar 2008, Barcelona, Spain.

Siveroni, I., Zisman, A. & Spanoudakis, G. (2010). A UML-based static verification framework for security. Requirements Engineering, 15(1), pp. 95-118. doi: 10.1007/s00766-009-0091-y

Slabaugh, G.G., Asad, M. & Yang, G. (2016). Supervised Partial Volume Effect Unmixing for Brain Tumor Characterization using Multi-voxel MR Spectroscopic Imaging. Paper presented at the 2016 IEEE International Symposium on Biomedical Imaging, 13-16 Apr 2016, Prague, Czech Republic.

Slabaugh, G.G., Child, C. H. T., Alonso, E. & Basaru, R. R. (2016). HandyDepth: Example-based Stereoscopic Hand Depth Estimation using Eigen Leaf Node Features. Paper presented at the International Conference on Systems, Signals and Image Processing, 23-25 May 2016, Bratislava, Slovakia.

Slabaugh, G.G., Culbertson, B., Malzbender, T. & Schafer, R.W. (2001). A survey of methods for volumetric scene reconstruction from photographs. Paper presented at the 2001 Eurographics conference on Volume Graphics, 21-06-2001 - 22-06-2001, New York, USA.

Slabaugh, G.G., Culbertson, W.B., Malzbender, T. & Schafer, R.W. (2001). A Survey of Methods for Volumetric Scene Reconstruction from Photographs. In: K. Mueller & A. E. Kaufman (Eds.), Proceedings of the 2001 Eurographics conference on Volume Graphics. . Eurographics Association. ISBN 3-211-83737-X

Slabaugh, G.G., Culbertson, W.B., Malzbender, T., Stevens, M.R. & Schafer, R.W. (2004). Methods for Volumetric Reconstruction of Visual Scenes. International Journal of Computer Vision, 57, pp. 179-199. doi: 10.1023/B:VISI.0000013093.45070.3b

Slabaugh, G.G., Dinh, H. Q. & Unal, G.B. (2007). A Variational Approach to the Evolution of Radial Basis Functions for Image Segmentation. Paper presented at the IEEE Conference on Computer Vision and Pattern Recognition, 2007, 17-06-2007 - 22-07-2007, Minneapolis, USA.

Slabaugh, G.G., Dinh, Q. & Unal, G.B. (2007). A Variational Approach to the Evolution of Radial Basis Functions for Image Segmentation. In: IEEE Conference on Computer Vision and Pattern Recognition, 2007 (CVPR '07). (pp. 1-8). IEEE. ISBN 1424411793

Slabaugh, G.G., Fang, T., McBagonluri, F., Zouhar, A., Melkisetoglu, R., Xie, H. & Unal, G.B. (2008). 3-D shape modeling for hearing aid design. IEEE Signal Processing Magazine, 25(5), pp. 98-102. doi: 10.1109/MSP.2008.926653

Slabaugh, G.G., Gundry, M., Knapp, K., Asad, M. & Al Arif, S.M.M.R. (2017). Patch-based Corner Detection for Cervical Vertebrae in X-ray Images. Signal Processing: Image Communication, doi: 10.1016/j.image.2017.04.002

Slabaugh, G.G., Knapp, K. & Al-Arif, S. M. (2017). Probabilistic Spatial Regression using a Deep Fully Convolutional Neural Network. Paper presented at the British Machine Vision Conference 2017, 4-7 Sep 2017, London, UK.

Slabaugh, G.G., Malzbender, T. & Culbertson, W.B. (2000). Volumetric Warping for Voxel Coloring on an Infinite Domain. In: M. Pollefeys, L. J. V. Gool, A. Zisserman & A. W. Fitzgibbon (Eds.), 3D Structure from Images — SMILE 2000. Lecture Notes in Computer Science, 2018. (pp. 109-123). Springer. ISBN 3-540-41845-8

Slabaugh, G.G., Mihalef, V. & Unal, G.B. (2005). A Contour-Based Approach to 3D Text Labeling on Triangulated Surfaces. In: Fifth International Conference on 3-D Digital Imaging and Modeling, 2005 (3DIM 2005). (pp. 416-423). IEEE Computer Society. ISBN 0-7695-2327-7

Slabaugh, G.G., Schafer, R.W. & Hans, M. C. (2002). Image-Based Photo Hulls. In: First International Symposium on 3D Data Processing Visualization and Transmission, 2002. Proceedings. (pp. 704-708). IEEE Computer Society. ISBN 0-7695-1521-5

Slabaugh, G.G., Schafer, R.W. & Hans, M. C. (2002). Image-Based Photo Hulls. Paper presented at the First International Symposium on 3D Data Processing Visualization and Transmission, 19-06-2002 - 21-06-2002, Padova, Italy.

Slabaugh, G.G., Schafer, R.W. & Hans, M. C. (2002). Multi-resolution space carving using level set methods. Paper presented at the 2002 International Conference on Image Processing., 22-09-2002 - 25-09-2002, New York, USA.

Slabaugh, G.G., Schafer, R.W. & Hans, M. C. (2002). Multi-resolution space carving using level set methods. In: 2002 International Conference on Image Processing. (2002, Proceedings). (pp. 545-548). IEEE. ISBN 0780376226

Slabaugh, G.G. & Unal, G.B. (2005). Active Polyhedron: Surface Evolution Theory Applied to Deformable Meshes. Computer Vision and Pattern Recognition, 2, pp. 84-91. doi: 10.1109/CVPR.2005.60

Slabaugh, G.G. & Unal, G.B. (2005). Graph cuts segmentation using an elliptical shape prior. Image Processing, 2005. ICIP 2005. IEEE International Conference on, 2, pp. 1222-1225. doi: 10.1109/ICIP.2005.1530282

Slabaugh, G.G., Unal, G.B. & Chang, T. C. (2006). Information-theoretic feature detection in ultrasound images. In: 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2006 (EMBS '06). (pp. 2638-2642). IEEE. ISBN 1424400325

Slabaugh, G.G., Unal, G.B. & Chang, T. C. (2006). Information-theoretic feature detection in ultrasound images. Paper presented at the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2006 (EMBS '06), 30-08-2006 - 03-09-2006, New York, USA.

Slabaugh, G.G., Unal, G.B., Fang, T., Rossignac, J. & Whited, B. (2008). Variational Skinning of an Ordered Set of Discrete 2D Balls. Paper presented at the 5th International Conference, GMP 2008., 23-04-2008 - 25-04-2008, Hangzhou, China.

Slabaugh, G.G., Unal, G.B., Fang, T., Rossignac, J. & Whited, B. Variational Skinning of an Ordered Set of Discrete 2D Balls. Lecture Notes in Computer Science, 4975(2008), pp. 450-461. doi: 10.1007/978-3-540-79246-8_34

Slabaugh, G.G., Unal, G.B., Fang, T. & Wels, M. (2006). Ultrasound-Specific Segmentation via Decorrelation and Statistical Region-Based Active Contours. In: 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. (pp. 45-53). IEEE Computer Society. ISBN 0-7695-2597-0

Slabaugh, G.G., Unal, G.B., Tong Fang, . & Wels, M. (2006). Ultrasound-Specific Segmentation via Decorrelation and Statistical Region-Based Active Contours. Paper presented at the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 17-06-2006 - 22-06-2006, New York, USA.

Slabaugh, G.G., Unal, G.B., Wels, M., Fang, T. & Rao, B. (2009). Statistical Region-Based Segmentation of Ultrasound Images. Ultrasound in Medicine and Biology, 35(5), pp. 781-795. doi: 10.1016/j.ultrasmedbio.2008.10.014

Slabaugh, G.G., Whited, B., Rossignac, J., Fang, T. & Unal, G.B. (2010). 3D ball skinning using PDEs for generation of smooth tubular surfaces. Computer-Aided Design, 42(1), pp. 18-26. doi: 10.1016/j.cad.2009.03.004

Slabaugh, G.G., Yang, X., Ye, X., Boyes, R, & Beddoe, G. (2010). A Robust and Fast System for CTC Computer-Aided Detection of Colorectal Lesions. Algorithms, 3(1), pp. 21-43. doi: 10.3390/a3010021

Slabaugh, G.G. & Ye, X. (2011). Concavity analysis for reduction of ileocecal valve false positives in CTC. In: 2011 IEEE International Symposium on Biomedical Imaging: From Nano to Macro. (pp. 173-176). IEEE. ISBN 9781424441273

Slabaugh, G.G., Ye, X. & Yang, X. (2014). Multilabel region classification and semantic linking for colon segmentation in CT colonography. IEEE Transactions on Biomedical Engineering, 62(3), pp. 948-959. doi: 10.1109/TBME.2014.2374355

Sleat, Philip M. (1991). A static, transaction based design methodology for hard real-time systems. (Unpublished Doctoral thesis, City University)

Slingsby, A., Dykes, J., Wood, J. & Clarke, K. (2007). Interactive tag maps and tag clouds for the multiscale exploration of large spatio-temporal datasets. Information Visualization, 2007. IV '07. 11th International Conference, pp. 497-504. ISSN 1550-6037

Slingsby, A., Dykes, J., Wood, J. & Clarke, K. (2007). Mashup cartography: cartographic issues of using Google Earth for tag maps. Paper presented at the ICA Commission on Maps and the Internet, 31 Jul - 2 Aug 2007, Warsaw, Poland.

Slingsby, A., Dykes, J., Wood, J. & Radburn, R. (2014). Designing an Exploratory Visual Interface to the Results of Citizen Surveys. International Journal of Geographical Information Science, doi: 10.1080/13658816.2014.920845

Slingsby, A., Lowe, R., Dykes, J., Stephenson, D., Wood, J. & Jupp, T. (2009). A pilot study for the collaborative development of new ways of visualising seasonal climate forecasts. Paper presented at the GIS Research UK, 17th Annual Conference, 1 - 3 Apr 2009, University of Durham, Durham, UK.

Slingsby, A. & van Loon, E. (2016). Exploratory Visual Analysis for Animal Movement Ecology. Computer Graphics Forum, 35(3), pp. 471-480. doi: 10.1111/cgf.12923

Slingsby, A. & van Loon, E. (2017). Temporal tile-maps for characterising the temporal occupancy of places: A seabird case study. presented at the 25th Geographical Information Science (GIS) Research UK Conference, 18 Apr 2017 - 21 Apr 2017, Manchester, UK.

Slingsby, A. & van Loon, E. (2017). Visual Characterisation of Temporal Occupancy for Movement Ecology. Paper presented at the Workshop on Visualisation in Environmental Sciences (EnvirVis), 12-13 Jun 2017, Barcelona, Spain.

Somani, G., Gaur, M. S., Sanghi, D., Conti, M. & Rajarajan, M. (2016). DDoS victim service containment to minimize the internal collateral damages in cloud computing. Computers and Electrical Engineering, doi: 10.1016/j.compeleceng.2016.12.004

Somani, G., Gaur, M. S., Sanghi, D., Conti, M., Rajarajan, M. & Buyya, R. (2017). Combating DDoS attacks in the cloud: Requirements, trends, and future directions. IEEE Cloud Computing, 4(1), pp. 22-32. doi: 10.1109/MCC.2017.14

Spachos, D., Zlantintsi, A., Moschou, V., Antonopoulos, P., Benetos, E., Kotti, M., Tzimouli, K., Kotropoulos, C., Nikolaidis, N., Maragos, P. & Pitas, I. (2008). MUSCLE movie-database: a multimodal corpus with rich annotation for dialogue and saliency detection. Paper presented at the Multimodal Corpora: From Models of Natural Interaction to Systems and Applications, 27 May 2008, Marrakech, Morocco.

Spaeth, S., Haefliger, S., Krogh, G. V. & Renzl, B. (2008). Communal resources in open source software development. Information Research, 13(1),

Spanos, P. D. & Giaralis, A. (2008). Statistical linearization based estimation of the peak response of nonlinear systems subject to the EC8 design spectrum. 2008 SEISMIC ENGINEERING CONFERENCE COMMEMORATING THE 1908 MESSINA AND REGGIO CALABRIA EARTHQUAKE, PARTS 1 AND 2, 1020, pp. 1236-1244. ISSN 0094-243X

Spanos, P. D., Giaralis, A. & Li, J. (2009). Synthesis of accelerograms compatible with the Chinese GB 50011-2001 design spectrum via harmonic wavelets: artificial and historic records. Earthquake engineering and engineering vibration, 8(2), pp. 189-206. doi: 10.1007/s11803-009-9017-4

Spanos, P. D., Giaralis, A. & Politis, N. P. (2007). Time-frequency representation of earthquake accelerograms and inelastic structural response records using the adaptive chirplet decomposition and empirical mode decomposition. Soil Dynamics and Earthquake Engineering, 27(7), pp. 675-689. doi: 10.1016/j.soildyn.2006.11.007

Spanos, P. D., Giaralis, A., Politis, N. P. & Roesset, J. M. (2007). Numerical treatment of seismic accelerograms and of inelastic seismic structural responses using harmonic wavelets. Computer-aided civil and infrastructure design, 22(4), pp. 254-264. doi: 10.1111/j.1467-8667.2007.00483.x

Spanoudakis, G. & Comuzzi, M. (2009). Describing and Verifying Monitoring Capabilities for Service Based Systems. Paper presented at the CAiSE 2009 Forum, 8-12 Jun 2009, Amsterdam, The Netherlands.

Spanoudakis, G., Damiani, E. & Maña, A. (2012). Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach. Paper presented at the High-Assurance Systems Engineering (HASE), 2012 IEEE 14th International Symposium on, 25 - 27 Oct 2012, Omaha, US.

Spanoudakis, G., Kikidis, D., Bibas, A., Katrakazas, P., Koutsouris, D. & Pontopidan, N. H. (2017). Public health policy for management of hearing impairments based on big data analytics: EVOTION at Genesis. Paper presented at the 17th IEEE International Bio-Informatics and Bio-Engineering Conference, 23-25 Oct 2017, Washington D.C., USA.

Spanoudakis, G., Kloukinas, C. & Androutsopoulos, K. (2008). Dynamic verification and control of mobile peer-to-peer systems. Paper presented at the 3rd International Conference on Internet Monitoring and Protection, 29 Jun - 5 Jul 2008, Bucharest, Romania.

Spanoudakis, G. & LoPresti, S. (2009). Web Service Trust: Towards A Dynamic Assessment Framework. Paper presented at the International Conference on Availability, Reliability and Security, 2009. ARES '09, 16 - 19 Mar 2009, Fukuoka Institute of Technology, Fukuoka, Japan.

Spanoudakis, G. & Zisman, A. (2011). Designing and Adapting Service-based Systems: A Service Discovery Framework. In: Service Engineering. (pp. 261-297). BERLIN: SPRINGER-VERLAG. ISBN 978-3-7091-0414-9

Spanoudakis, G. & Zisman, A. (2010). Discovering Services during Service-Based System Design Using UML. IEEE Transactions on Software Engineering, 36(3), pp. 371-389. doi: 10.1109/TSE.2009.88

Spurgin, A. J. & Stupples, D. (2012). Impact of accidents on organizational aspects of nuclear utilities. International Journal of Economics and Management Engineering, 2(4), pp. 132-144.

Stankovic, V. & Popov, P. T. (2013). Improvements Relating to Database Replication Protocols. EU: Popov, P., Stankovic, V.

Stankovic, V. & Strigini, L. (2009). A survey on online monitoring approaches of computer-based systems. London, UK: Centre for Software Reliability, City University London.

Starnini, M., Baronchelli, A. & Pastor-Satorras, R. (2017). Effects of temporal correlations in social multiplex networks. Scientific Reports, 7, 8597.. doi: 10.1038/s41598-017-07591-0

Starnini, M., Lepri, B., Baronchelli, A., Barrat, A., Cattuto, C. & Pastor-Satorras, R. (2017). Robust modeling of human contact networks across different scales and proximity-sensing techniques. .,

Stathis, K., Lekeas, G. & Kloukinas, C. (2006). Competence Checking for the Global E-Service Society Using Games. Lecture Notes in Computer Science: Engineering Societies in the Agents World VII, 4457, pp. 384-400. doi: 10.1007/978-3-540-75524-1_22

Stowell, D., Giannoulis, D., Benetos, E., Lagrange, M. & Plumbley, M. D. (2015). Detection and Classification of Acoustic Scenes and Events. IEEE Transactions on Multimedia, 17(10), pp. 1733-1746. doi: 10.1109/TMM.2015.2428998

Strigini, L. (1996). Engineering judgement in reliability and safety and its limits: what can we learn from research in psychology?. .

Strigini, L. (2005). Fault Tolerance Against Design Faults. In: H. Diab & A. Zomaya (Eds.), Dependable Computing Systems: Paradigms, Performance Issues, and Applications. (pp. 213-241). John Wiley & Sons.

Strigini, L. (2004). Formalism and judgement in assurance cases. Paper presented at the Workshop on Assurance Cases: Best Practices, Possible Obstacles, and Future Opportunities, held at International Conference on Dependable Systems and Networks (DSN 2004), Jun 2004, Florence, Italy.

Strigini, L., Bloomfield, R. E., Paulitsch, M. & Reiger, R. (2012). Evidence-Based Security in Aerospace. From Safety to Security and Back Again. Paper presented at the 23rd International Symposium on Software Reliability Engineering (ISSRE 2012), Fast Abstracts Track, 26 - 29 Nov 2012, Dallas, Texas, USA.

Strigini, L. & Littlewood, B. (1997). Guidelines for Statistical Testing (Report No. PASCON/WO6-CCN2/TN12). ESA/ESTEC project PASCON.

Strigini, L. & Littlewood, B. (2000). A discussion of practices for enhancing diversity in software designs. London, UK: Centre for Software Reliability, City University London.

Strigini, L., Popov, P. T. & Littlewood, B. (2000). Assessing the Reliability of Diverse Fault-Tolerant Systems. Paper presented at the INucE International Conference on Control and Instrumentation in Nuclear Installations, Bristol, UK.

Strigini, L., Popov, P. T. & Romanovsky, A. (2000). Diversity for off-the-shelf components. Paper presented at the International Conference on Dependable Systems & Networks (FTCS-30, DCCA-8), New York, NY, USA.

Strigini, L., Povyakalo, A. A. & Alberdi, E. (2003). Human-machine diversity in the use of computerised advisory systems: a case study. Paper presented at the International Conference on Dependable Systems and Networks (DSN'03), 22 - 25 Jun 2003, San Francisco, California.

Strigini, L. & Wright, D. (2014). Bounds on survival probability given mean probability of failure per demand; And the paradoxical advantages of uncertainty. Reliability Engineering and System Safety, 128, pp. 66-83. doi: 10.1016/j.ress.2014.02.004

Stumpf, S. (2001). Analysis and representation of rhetorical construction of understanding in design teams' experiential learning. (Unpublished Doctoral thesis, University College London)

Stumpf, S. (1997). Argumentation-based design rationale - the sharpest tools in the box (Report No. RN/98/103). London, UK: Computer Science Department, University College London.

Stumpf, S., Burnett, M., Pipek, V. & Wong, W-K (2012). End-user interactions with intelligent and autonomous systems. In: J. A. Konstan, E. H. Chi & K. Höök (Eds.), CHI '12 Extended Abstracts on Human Factors in Computing Systems. (pp. 2755-2758). New York: ACM. ISBN 978-1-4503-1016-1

Stumpf, S., Fitzhenry, E. & Dietterich, T. G. (2007). The use of provenance in information retrieval. Paper presented at the Workshop on Principles of Provenance (PROPR), 19 - 20 November 2007, Edinburgh, Scotland.

Stumpf, S. & McDonnell, J. (2004). An investigation into sharing metadata: "I'm not thinking what you are thinking". Journal of Universal Computer Science, 10(6), pp. 740-748. doi: 10.3217/jucs-010-06-0740

Stumpf, S. & Muscroft, S. (2011). When users generate music playlists: When words leave off, music begins?. Paper presented at the Third International Workshop on Advances in Music Information Research (AdMIRe) in conjunction with the IEEE International Conference on Multimedia and Expo (ICME), 11 - 15 July 2011, Barcelona, Spain.

Stumpf, S., Rajaram, V., Li, L., Wong, W-K., Burnett, M., Dietterich, T. G., Sullivan, E. & Herlocker, J. (2009). Interacting meaningfully with machine learning systems: Three experiments. International Journal of Human Computer Studies, 67(8), pp. 639-662. doi: 10.1016/j.ijhcs.2009.03.004

Stumpf, S., Sullivan, E., Fitzhenry, E., Oberst, I., Wong, W-K. & Burnett, M. (2008). Integrating rich user feedback into intelligent user interfaces. Paper presented at the International Conference on Intelligent User Interfaces, 24-27 Feb 2014, Haifa, Israel.

Suarez-Tangil, G., Palomar, E., De Fuentes, J. M., Blasco, J. & Ribagorda, A. (2009). Automatic rule generation based on genetic programming for event correlation. Advances in Intelligent and Soft Computing, 63, pp. 127-134. doi: 10.1007/978-3-642-04091-7_16

Sustar, H., Jones, S. & Dearden, A. (2013). Older people as equal partners in creative design. Lecture Notes in Computer Science: Human Factors in Computing and Informatics, 7946 L, pp. 649-656. doi: 10.1007/978-3-642-39062-3_45

Sustar, H., Jones, S. & Maiden, N. (2011). Creativity in Older People Designing Digital Devices. Paper presented at the CREATE’11 Symposium, 23 Jun 2011, London, UK.

T

Tahir, S. F., Ruj, S., Rahulamathavan, Y., Rajarajan, M. & Glackin, C. (2017). A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data. IEEE Transactions on Emerging Topics in Computing, doi: 10.1109/TETC.2017.2737789

Teichmann, J., Alonso, E. & Broom, M. (2015). A reward-driven model of Darwinian fitness. Paper presented at the 7th International Joint Conference on Computational Intelligence (IJCCI 2015), 12-14 Nov 2015, Lisbon, Portugal.

Thudt, A. F., Perin, C., Willett, W.C. & Carpendale, S. (2017). Subjectivity in personal storytelling with visualization. Information Design Journal, 23(1), pp. 48-64. doi: 10.175/idj.23.1.07thu

Thurman, N. (2017). Social media, surveillance and news work: On the apps promising journalists a “crystal ball”. Digital Journalism, doi: 10.1080/21670811.2017.1345318

Tidhar, D., Dixon, S., Benetos, E. & Weyde, T. (2014). The temperament police. Early Music, 42(4), pp. 579-590. doi: 10.1093/em/cau101

Toja-Silva, F., Favier, J. & Pinelli, A. (2014). Radial basis function (RBF)-based interpolation and spreading for the immersed boundary method. Computers & Fluids, 105, pp. 66-75. doi: 10.1016/j.compfluid.2014.09.026

Townend, J. (2013). Closed Data: Defamation and Privacy Disputes in England and Wales. Journal of Media Law, 5(1), pp. 31-44. doi: 10.5235/17577632.5.1.31

Tran, S., Benetos, E. & Garcez, A. (2014). Learning motion-difference features using Gaussian restricted Boltzmann machines for efficient human action recognition. Paper presented at the 2014 International Joint Conference on Neural Networks (IJCNN), 06-07-2014 - 11-07-2014, Beijing, China.

Tran, S. & Garcez, A. (2014). Low-cost representation for restricted Boltzmann machines. Lecture Notes in Computer Science, 8834, pp. 69-77. doi: 10.1007/978-3-319-12637-1_9

Tran, Son (2016). Representation decomposition for knowledge extraction and sharing using restricted Boltzmann machines. (Unpublished Doctoral thesis, City University London)

Tranter, R. & Mcgraw, C. (2017). Integrating social media into routine midwifery services: Maternity Direct+. British Journal of Midwifery, 25(7), pp. 458-464. doi: 10.12968/bjom.2017.25.7.458

Tselikis, C., Douligeris, C., Mitropoulos, S., Komninos, N. & Tselikis, G. (2017). Adaptation of a Conference Key Distribution System for the Wireless Ad Hoc Network. 2017 IEEE International Conference on Communications (ICC), doi: 10.1109/ICC.2017.7996339

Tselikis, C., Mitropoulos, S., Komninos, N. & Douligeris, C. (2012). Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack. IEEE Communications Letters, 16(5), pp. 619-621. doi: 10.1109/LCOMM.2012.031912.112484

Tsigkritis, T., Spanoudakis, G., Kloukinas, C. & Lorenzoli, D. (2009). Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework. In: G. Spanoudakis, A. Gomez & S. Kokolakis (Eds.), Security and Dependability for Ambient Intelligence. Advances in Information Security, 45. (pp. 239-271). USA: Springer. ISBN 978-0-387-88774-6

Tsigkritis, Theocharis (2010). Diagnosing runtime violations of security and dependability properties. (Unpublished Doctoral thesis, City University London)

Tsigritis, T. & Spanoudakis, G. (2013). Assessing the genuineness of events in runtime monitoring of cyber systems. Computers and Security, 38, pp. 76-96. doi: 10.1016/j.cose.2013.03.011

Turkay, C. (2014). Visualizing Time Series Predictability. Paper presented at the IEEE VIS 2014 Workshop on Visualization for Predictive Analytics, 08-11-2014 - 14-11-2014, Paris, France.

Turkay, C., Filzmoser, P. & Hauser, H. (2011). Brushing dimensions--a dual visual analysis model for high-dimensional data. IEEE Transactions on Visualization and Computer Graphics, 17(12), pp. 2591-2599. doi: 10.1109/TVCG.2011.178

Turkay, C. & Hauser, H. Optimizing Processes in Visual Data Analysis through Progressive Computations. Paper presented at the UCL Workshop on the Theory of Big Data, 07-01-2015 - 09-01-2015.

Turkay, C., Jeanquartier, F., Holzinger, A. & Hauser, H. (2014). On computationally-enhanced visual analysis of heterogeneous data and its application in biomedical informatics. Lecture Notes in Computer Science, 8401, pp. 117-140. doi: 10.1007/978-3-662-43968-5_7

Turkay, C., Kaya, E., Balcisoy, S. & Hauser, H. (2017). Designing Progressive and Interactive Analytics Processes for High-Dimensional Data Analysis. IEEE Transactions on Visualization and Computer Graphics, 23(1), pp. 131-140. doi: 10.1109/TVCG.2016.2598470

Turkay, C., Lundervold, A., Lundervold, A. J. & Hauser, H. (2013). Hypothesis generation by interactive visual exploration of heterogeneous medical data. Paper presented at the Third International Workshop, HCI-KDD 2013, 1 July 2013 - 3 July 2013, Maribor, Slovenia.

Turkay, C., Lundervold, A., Lundervold, A.J. & Hauser, H. (2012). Representative factor generation for the interactive visual analysis of high-dimensional data. IEEE Transactions on Visualization and Computer Graphics, 18(12), pp. 2621-2630. doi: 10.1109/TVCG.2012.256

Turkay, C., Mason, S., Gashi, I. & Cukic, B. (2014). Supporting Decision-making for Biometric System Deployment through Visual Analysis. Paper presented at the Reliability and Security Data Analysis (RSDA) Workshop, International Symposium on Software Reliability Engineering, 03-11-2014-06-11-2014, Naples, Italy.

Turkay, C., Parulek, J. & Hauser, H. (2012). Dual analysis of DNA microarrays. Paper presented at the i-Know '12, 12th International Conference on Knowledge Management and Knowledge Technologies, 5 September 2012 - 7 September 2012, Graz, Austria.

Turkay, C., Parulek, J., Reuter, N. & Hauser, H. (2011). Integrating cluster formation and cluster evaluation in interactive visual analysis. Paper presented at the 27th Spring Conference on Computer Graphics, 28 Apr - 30 Apr 2011, Vinicne, Slovakia.

Turkay, C., Parulek, J., Reuter, N. & Hauser, H. (2011). Interactive visual analysis of temporal cluster structures. Computer Graphics Forum, 30(3), pp. 711-720. doi: 10.1111/j.1467-8659.2011.01920.x

Turkay, C. & Sathiyanarayanan, M. (2016). Is Multi-perspective Visualisation recommended for E-discovery Email Investigations?. Paper presented at the IEEE VIS 2016 Workshop - Creation, Curation, Critique and Conditioning of Principles and Guidelines in Visualization, 23 Oct 2016, Baltimore, USA.

Turkay, C., Slingsby, A., Lahtinen, K., Butt, S. & Dykes, J. (2016). Enhancing a Social Science Model-building Workflow with Interactive Visualisation. Paper presented at the The European Symposium on Artificial Neural Networks (ESANN 2016), 27-29 Apr 2016, Bruges, Belgium.

U

Unal, G.B., Bucher, S., Carlier, S. G., Slabaugh, G.G., Fang, T. & Tanaka, K. (2008). Shape-Driven Segmentation of the Arterial Wall in Intravascular Ultrasound Images. IEEE Transactions on Information Technology in Biomedicine, 12(3), pp. 335-347. doi: 10.1109/TITB.2008.920620

Unal, G.B., Nain, D., Slabaugh, G.G. & Fang, T. (2008). Customized Design of Hearing Aids Using Statistical Shape Learning. Paper presented at the 11th International Conference on Medical Imaging and Computer Assisted Intervention (MICCAI 2008), 06-09-2008 - 10-09-2008, New York, USA.

Unal, G.B., Nain, D., Slabaugh, G.G. & Fang, T. (2008). Customized Design of Hearing Aids Using Statistical Shape Learning. Lecture Notes in Computer Science, 5241(2008), pp. 518-526. doi: 10.1007/978-3-540-85988-8_62

Unal, G.B., Nain, D., Slabaugh, G.G. & Fang, T. (2011). Generating shapes by analogies: An application to hearing aid design. Computer-Aided Design, 43, pp. 47-56. doi: 10.1016/j.cad.2010.09.008

Unal, G.B. & Slabaugh, G.G. (2005). Coupled PDEs for Non-Rigid Registration and Segmentation. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. (pp. 168-175). IEEE Computer Society. ISBN 0-7695-2372-2

Unal, G.B. & Slabaugh, G.G. (2005). Coupled PDEs for Non-Rigid Registration and Segmentation. Paper presented at the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 21-09-2005 - 23-09-2005, San Diego, USA.

Unal, G.B. & Slabaugh, G.G. (2008). Guidewire tracking in x-ray videos of endovascular interventions. 2008 IEEE 16th Signal Processing, Communication and Applications Conference, pp. 1-4. doi: 10.1109/SIU.2008.4632624

Unal, G.B., Slabaugh, G.G., Ess, A., Yezzi, A. J., Fang, T., Tyan, J., Requardt, M., Krieg, R., Seethamraju, R., Harisinghani, M. & Weissleder, R. (2006). Semi-Automatic Lymph Node Segmentation in LN-MRI. Paper presented at the 2006 IEEE International Conference on Image Processing,, 08-10-2006 - 11-10-2006, Atlanta, USA.

Unal, G.B., Yezzi, A.J., Soatto, S. & Slabaugh, G.G. (2007). A Variational Approach to Problems in Calibration of Multiple Cameras.. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(8), pp. 1322-1338. doi: 10.1109/TPAMI.2007.1035

Uus, A., Liatsis, P., Slabaugh, G.G., Anagnostis, A., Roberts, S. & Twist, S. (2016). Trend Deviation Analysis for Automated Detection of Defects in GPR Data for Road Condition Surveys. Proceedings of the 23rd International Conference on Systems, Signals and Image Processing (IWSSIP 2016), doi: 10.1109/IWSSIP.2016.7502765

V

Valero-Lara, P., Pinelli, A. & Prieto-Matias, M. (2014). Accelerating solid-fluid interaction using Lattice-Boltzmann and Immersed Boundary coupled simulations on heterogeneous platforms. Procedia Computer Science, 29, pp. 50-61. doi: 10.1016/j.procs.2014.05.005

Valero-Lara, P., Pinelli, A. & Prieto-Matias, M. (2014). Fast finite difference Poisson solvers on heterogeneous architectures. Computer Physics Communications Package, 185(4), doi: 10.1016/j.cpc.2013.12.026

Van Delft, B., Hunt, S. & Sands, D. (2015). Very static enforcement of dynamic policies. Lecture Notes in Computer Science, 9036, pp. 32-52. doi: 10.1007/978-3-662-46666-7_3

Van Goethem, A., Meulemans, W., Speckmann, B. & Wood, J. (2014). Exploring curved schematization. IEEE Pacific Visualization Symposium, pp. 1-8. doi: 10.1109/PacificVis.2014.11

Van Goethem, A., Reimer, A., Speckmann, B. & Wood, J. (2014). Stenomaps: Shorthand for shapes. IEEE Transactions on Visualization and Computer Graphics, 20(12), pp. 2053-2062. doi: 10.1109/TVCG.2014.2346274

Van Goethem, A., Staals, F., Loffler, M., Dykes, J. & Speckmann, B. (2017). Multi-Granular Trend Detection for Time-Series Analysis. IEEE Transactions on Visualization and Computer Graphics, 23(1), pp. 661-670. doi: 10.1109/TVCG.2016.2598619

Van Gorp, P. & Comuzzi, M. (2014). Lifelong personal health data and application software via virtual machines in the cloud. IEEE Journal of Biomedical and Health Informatics, 18(1), pp. 36-45. doi: 10.1109/JBHI.2013.2257821

Van Gorp, P. & Comuzzi, M. (2012). MyPHRMachines: Lifelong Personal Health Records in the Cloud. Paper presented at the 2012 25th International Symposium on Computer-Based Medical Systems (CBMS),, 20-06-2012 - 22-06-2012, Rome, Italy.

Van Gorp, P., Comuzzi, M., Jahnen, A., Kaymak, U. & Middleton, B. (2014). An open platform for personal health record apps with platform-level privacy protection. Computers in Biology and Medicine, 51, pp. 14-23. doi: 10.1016/j.compbiomed.2014.04.019

Varley, R. A., Cowell, P. E., Dyson, L., Inglis, L., Roper, A. & Whiteside, S. P. (2016). Self-Administered Computer Therapy for Apraxia of Speech. Stroke, 47(3), pp. 822-828. doi: 10.1161/STROKEAHA.115.011939

Velarde, G., Weyde, T. & Meredith, D. (2013). An approach to melodic segmentation and classification based on filtering with the Haar wavelet. Journal of New Music Research, 42(4), pp. 325-345. doi: 10.1080/09298215.2013.841713

Veluru, S., Rahulamathavan, Y., Manandhar, S. & Rajarajan, M. (2014). Correlated Community Estimation Models Over a Set of Names. Paper presented at the IEEE Technically Co-Sponsored Science and Information Conference, 27-08-2014 - 29-08-2014, London, UK.

Veluru, S., Rahulamathavan, Y., Viswanath, P., Longley, P. & Rajarajan, M. (2013). E-mail address categorization based on semantics of surnames. Proceedings of the 2013 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013, pp. 222-229. doi: 10.1109/CIDM.2013.6597240

Vermeulen, J., Luyten, K., Coninx, K., Marquardt, N. & Bird, J. (2015). Proxemic Flow: Dynamic Peripheral Floor Visualizations for Revealing and Mediating Large Surface Interactions. Human-Computer Interaction – INTERACT 2015. Lecture Notes in Computer Science, 9299, pp. 264-281. doi: 10.1007/978-3-319-22723-8_22

Villar, A., Callegaro, M. & Yang, Y. (2013). Where Am I? A Meta-Analysis of Experiments on the Effects of Progress Indicators for Web Surveys. Social Science Computer Review, 31(6), pp. 744-762. doi: 10.1177/0894439313497468

Vives, S., Dykes, J. & Merryweather, A. (2015). Visualization for Equity Analysts: Using the DSM in Stock Picking. Paper presented at the VIS 2015, 25-10-2015 - 30-10-2015, Chicago, USA.

Von Landesberger, T., Brodkorb, F., Roskosch, P., Andrienko, N., Andrienko, G. & Kerren, A. (2016). MobilityGraphs: Visual Analysis of Mass Mobility Dynamics via Spatio-Temporal Graphs and Clustering. IEEE Transactions on Visualization and Computer Graphics, 22(1), pp. 11-20. doi: 10.1109/TVCG.2015.2468111

Vrotsou, K., Janetzko, H., Navarra, C., Fuchs, G., Spretke, D., Mansmann, F., Andrienko, N. & Andrienko, G. (2015). SimpliFly: A Methodology for Simplification and Thematic Enhancement of Trajectories.. IEEE Transactions on Visualization and Computer Graphics, 21(1), pp. 107-121. doi: 10.1109/TVCG.2014.2337333

Vuillemot, R. & Perin, C. (2015). Investigating the direct manipulation of ranking tables for time navigation. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. (pp. 2703-2706). ACM. ISBN 9781450331456

Vuillemot, R. & Perin, C. (2016). Sports Tournament Predictions Using Direct Manipulation. IEEE Computer Graphics and Applications, 36(5), pp. 62-71. doi: 10.1109/MCG.2016.90

van Goethem, D.A., Haverkort, H., Meulemans, W., Reimer, A., Speckmann, B. & Wood, J. (2014). Automatic schematization with curved lines. Geo-Info, 2014(2), pp. 10-13.

W

Wang, Z., Slabaugh, G.G., Unal, G.B. & Fang, T. (2007). Registration of Ultrasound Images Using an Information-Theoretic Feature Detector. Paper presented at the The Fourth IEEE International Symposium on Biomedical Imaging (ISBI ’07), 12-04-2007 - 15-04-2007, Washingon D.C., USA.

Wang, Z., Slabaugh, G.G., Unal, G.B. & Fang, T. (2007). Registration of Ultrasound Images Using an Information-Theoretic Feature Detector. In: 4th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2007. ISBI 2007. (pp. 736-739). IEEE. ISBN 1-4244-0672-2

Wang, Z., Slabaugh, G.G., Unal, G.B. & Zhou, M. (2007). An information-theoretic detector based scheme for registration of speckled medical images. In: IEEE International Conference on Systems, Man and Cybernetics, 2007. ISIC. (pp. 1026-1030). IEEE.

Wang, Z., Slabaugh, G.G., Unal, G.B., Zhou, M. & Fang, T. (2007). An information-theoretic detector based scheme for registration of speckled medical images. Paper presented at the IEEE International Conference on Systems, Man and Cybernetics, 2007, 07-10-2007 - 10-10-2007, Montreal, Canada.

Wang, Z., Slabaugh, G.G., Zhou, M. & Fang, T. (2008). Automatic tracing of blood flow velocity in pulsed Doppler images. Paper presented at the IEEE International Conference on Automation Science and Engineering, 2008 (CASE 2008), 23-08-2008 - 26-08-2008, Washington D.C., USA.

Wang, Z., Slabaugh, G.G., Zhou, M. & Fang, T. (2008). Automatic tracing of blood flow velocity in pulsed Doppler images. In: IEEE International Conference on Automation Science and Engineering, 2008. CASE 2008. (pp. 218-222). IEEE. ISBN 9781424420223

Waqas, A., Farooq, F., Raza, M., Javed, S. T., Khan, S., Ghumman, M. E., Naveed, S. & Haddad, M. (2017). Validation of the Internet Addiction Test in Students at a Pakistani Medical and Dental School. Psychiatric Quarterly, doi: 10.1007/s11126-017-9528-5

Weerasinghe, D., Rajarajan, M., Elmufti, K. & Rakocevic, V. (2008). Patient privacy protection using anonymous access control techniques. Methods of Information in Medicine, 47(3), pp. 235-240. doi: 10.3414/ME9116

Wei, L., Robertson, S. & MacFarlane, A. (2007). CISR at INEX 2006. In: N. Fuhr, M. Lalmas & A. Trotman (Eds.), Comparative Evaluation of XML Information Retrieval Systems. Lecture Notes in Computer Science, 4518. (pp. 57-63). Germany: Springer-Verlag. ISBN 9783540738879

Weller, P., Rakhmetova, L., Ma, Q. & Mandersloot, G. (2010). Evaluation of a wearable computer system for telemonitoring in a critical environment. Personal and Ubiquitous Computing, 14(1), pp. 73-81. doi: 10.1007/s00779-009-0231-x

Weyde, T. (2007). Automatic Semantic Annotation of Music with Harmonic Structure. Paper presented at the 4th Sound and Music Computing Conference, 11 - 13 Jul 2007, Lefkada, Greece.

Weyde, T. (2002). Integrating Segmentation and Similarity in Melodic Analysis. Paper presented at the 7th International Conference on Music Perception & Cognition - ICMPC7, 17 - 21 Jul 2002, Sydney, Australia.

Weyde, T., Cottrell, S.J., Dykes, J., Benetos, E., Wolff, D., Tidhar, D., Gold, N., Abdallah, S., Plumbley, M. D., Dixon, S., Barthet, M., Mahey, M., Tovell, A. & Alancar-Brayner, A. (2014). Big Data for Musicology. Paper presented at the 1st International Digital Libraries for Musicology workshop, 12-09-2014 - 12-09-2014, London, UK.

Weyde, T., Ng, K., Neubarth, K., Larkin, O., Koerselman, T. & Ong, B. (2007). A Systemic Approach to Music Performance Learning with Multimodal Technology. Paper presented at the Support E-Learning Conference, 2007, Quebec City, Canada.

Weyde, T., Slabaugh, G.G., Fontaine, G. & Bederna, C. (2013). Predicting aquaplaning performance from tyre profile images with machine learning. Lecture Notes in Computer Science, 7950 L, pp. 133-142. doi: 10.1007/978-3-642-39094-4_16

Weyde, T. & Wolff, D. (2011). Adapting Metrics for Music Similarity Using Comparative Ratings. Paper presented at the 12th International Society for Music Information, 24 - 28 Oct 2011, Miami, FL, US.

White, P. & Roudsari, A. (2015). Conceptual analysis of a diverse set of healthcare quality indicators. Studies in Health Technolology & Informatics, 208, pp. 347-351. doi: 10.3233/978-1-61499-488-6-347

Whited, B., Rossignac, J., Slabaugh, G.G., Fang, T. & Unal, G.B. (2009). Pearling: Stroke segmentation with crusted pearl strings. Pattern Recognition and Image Analysis, 19(2), pp. 277-283. doi: 10.1134/S1054661809020102

Wilk, S., O'Sullivan, D., Kezadri-Hamiaz, M., Kuziemsky, C., Rosu, D., Michalowski, W. & Fung-Kee-Fung, M. (2016). Aligning Interdisciplinary Healthcare Team Behavior with Workflow Execution: An Example of a Radical Prostatectomy Workflow. 2016 IEEE 29th International Symposium on Computer-Based Medical Systems (CBMS), doi: 10.1109/CBMS.2016.62

Williams, L. J., Mukherjee, D., Fisher, M., Reyes-Aldasoro, C. C., Akerman, S., Kanthou, C. & Tozer, G. M. (2014). An in vivo role for Rho kinase activation in the tumour vascular disrupting activity of combretastatin A-4 3-O-phosphate. British Journal of Pharmacology, 171(21), pp. 4902-4913. doi: 10.1111/bph.12817

Wilson, S., Galliers, J. R. & Fone, J. (2007). Cognitive artifacts in support of medical shift handover: An in use, in situ evaluation. International Journal of Human-Computer Interaction, 22(1-2), pp. 59-80. doi: 10.1080/10447310709336955

Wilson, S., Roper, A., Marshall, J., Galliers, J. R., Devane, N., Booth, T. & Woolf, C. (2015). Codesign for People with Aphasia Through Tangible Design Languages. CoDesign, 11(1), pp. 21-34. doi: 10.1080/15710882.2014.997744

Wissmann, Jens (2012). Chord Sequence patterns in OWL. (Unpublished Doctoral thesis, City University London)

Wolff, D. (2014). Spot the Odd Song Out: Similarity Model Adaptation and Analysis using Relative Human Ratings. (Unpublished Doctoral thesis, City University London)

Wolff, D., Stober, S., Nürnberger, A. & Weyde, T. (2012). A Systematic Comparison of Music Similarity Adaptation Approaches. Paper presented at the 13th International Society for Music Information Retrieval Conference (ISMIR 2012), 8 - 12 Oct 2012, Porto, Portugal.

Wolff, D., Tidhar, D., Benetos, E., Dumon, E., Cherla, S. & Weyde, T. (2014). Incremental dataset definition for large scale musicological research. Paper presented at the 1st International Digital Libraries for Musicology workshop, 12-09-2014 - 12-09-2014, London, UK.

Wolff, D. & Weyde, T. (2014). Learning music similarity from relative user ratings. Information Retrieval, 17(2), pp. 109-136. doi: 10.1007/s10791-013-9229-0

Wong, W-K, Oberst, I., Das, S., Moore, T., Stumpf, S., McIntosh, K. & Burnett, M. (2011). End-user feature labeling: a locally-weighted regression approach. In: P. Pu, M. J. Pazzani, E. André & D. Riecken (Eds.), Proceedings of the 16th international conference on Intelligent user interfaces. (pp. 115-124). New York: ACM. ISBN 978-1-4503-0419-1

Wong, W-K., Oberst, I., Das, S., Moore, T., Stumpf, S., McIntosh, K. & Burnett, M. (2011). End-User Feature Labeling via Locally Weighted Logistic Regression. In: W. Burgard & D. Roth (Eds.), Proceedings of the Twenty-Fifth AAAI conference on Artificial Intelligence. (pp. 1575-1578). USA: AAAI Press. ISBN 9781577355076

Wood, J. (2016). Visual Analytic Design for Contextualising Sensor Data. Paper presented at the VIS 2016, 23-28 Oct 2016, Baltimore, USA.

Wood, J. (2014). Visual analytics of GPS tracks: From location to place to behaviour. Paper presented at the 2014 IEEE Conference on Visual Analytics Science and Technology, 9-14 October 2014, Paris, France.

Wright, D. & Strigini, L. (2013). Bounds on survival probability given mean probability of failure per demand; and the paradoxical advantages of uncertainty. London: City University London.

X

Xu, K., Attfield, S., Jankun-Kelly, T. J., Wheat, A., Nguyen, P. & Selvaraj, N. (2015). Analytic provenance for sensemaking: A research agenda. IEEE Computer Graphics and Applications, 35(3), pp. 56-64. doi: 10.1109/MCG.2015.50

Xu, Q., Chen, T., Hu, Y. & Gong, P. (2014). Write Pattern Format Algorithm for Reliable NAND-Based SSDs. IEEE Transactions on Circuits and Systems II: Express Briefs, 61(7), pp. 516-520. doi: 10.1109/TCSII.2014.2327332

Xu, Q., Gong, P. & Chen, T. (2014). Concatenated LDPC-TCM coding for reliable storage in multi-level flash memories. 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 166-170. doi: 10.1109/CSNDSP.2014.6923818

Xu, Q., Gong, P., Chen, T., Michael, J. & Li, S. (2015). Modelling and characterization of NAND flash memory channels. Measurement, 70, pp. 225-231. doi: 10.1016/j.measurement.2015.04.003

Y

Yang, G., Ye, X., Slabaugh, G.G., Keegan, J., Mohiaddin, R. & Firman, D. (2016). Super-Resolved Enhancement of a Single Image and Its Application in Cardiac MRI. Paper presented at the 7th International Conference, ICISP 2016, 30 May - 01 Jun 2016, Quebec, Canada.

Yang, G., Zhuang, X., Khan, H., Haldar, S., Nyktari, E., Ye, X., Slabaugh, G.G., Wong, T., Mohiaddin, R., Keegan, J. & Firman, D. (2017). Segmenting Atrial Fibrosis from late Gadolinium-Enhanced Cardiac MRI by Deep-Learned Features with Stacked Sparse Auto-Encoders. Paper presented at the Medical Image Understanding and Analysis (MIUA) 2017, 11 Jul 2017, Edinburgh, UK.

Yang, X., Beddoe, G. & Slabaugh, G.G. (2010). Learning to Detect 3D Rectal Tubes in CT Colonography Using a Global Shape Model. Paper presented at the Second International Workshop on Computational Challenges and Clinical Opportunities in Virtual Colonoscopy and Abdominal Imaging, 20-09-2010, Beijing, China.

Yang, X., Beddoe, G. & Slabaugh, G.G. (2011). Learning to Detect 3D Rectal Tubes in CT Colonography Using a Global Shape Model. Lecture Notes in Computer Science, 6668, pp. 53-59. doi: 10.1007/978-3-642-25719-3_8

Yang, X. & Slabaugh, G.G. (2011). A robust and efficient approach to detect 3D rectal tubes from CT colonography. Medical Physics, 38(11), p. 6238. doi: 10.1118/1.3654842

Yang, X., Tek, B., Beddoe, G. & Slabaugh, G.G. (2010). Feature Selection for Computer-Aided Polyp Detection using MRMR. SPIE Proceedings, 7624, doi: 10.1117/12.844165

Ye, X., Beddoe, G. & Slabaugh, G.G. (2010). Automatic Graph Cut Segmentation of Lesions in CT Using Mean Shift Superpixels. International Journal of Biomedical Imaging (IJBI), 2010, p. 983963. doi: 10.1155/2010/983963

Ye, X., Beddoe, G. & Slabaugh, G.G. (2011). A Bayesian Approach for False Positive Reduction in CTC CAD. Paper presented at the Second International Workshop on Computational Challenges and Clinical Opportunities in Virtual Colonoscopy and Abdominal Imaging, 20-09-2010, Beijing, China.

Ye, X., Beddoe, G. & Slabaugh, G.G. (2011). A Bayesian Approach for False Positive Reduction in CTC CAD. Lecture Notes in Computer Science, 6668, pp. 40-46. doi: 10.1007/978-3-642-25719-3_6

Ye, X., Lin, X., Dehmeshki, J., Slabaugh, G.G. & Beddoe, G. (2009). Shape-Based Computer-Aided Detection of Lung Nodules in Thoracic CT Images. IEEE Transactions on Biomedical Engineering, 56(7), pp. 1810-1820. doi: 10.1109/TBME.2009.2017027

Ye, X., Siddique, M., Douiri, A., Beddoe, G. & Slabaugh, G.G. (2009). Image segmentation using joint spatial-intensity-shape features: Application to CT lung nodule segmentation. Progress in Biomedical Optics and Imaging - Proceedings of SPIE, 7259, 72594V. doi: 10.1117/12.811151

Ye, X. & Slabaugh, G.G. (2011). Concavity analysis for reduction of ileocecal valve false positives in CTC. Paper presented at the 8th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 30-03-2011 - 02-04-2011, Chicago, USA.

Yezzi, A. J., Slabaugh, G.G., Broadhurst, A., Cipolla, R. & Schafer, R. W. (2002). A Surface Evolution Approach to Probabilistic Space Carving. In: First International Symposium on 3D Data Processing Visualization and Transmission, 2002. Proceedings. (pp. 618-621). IEEE Computer Society. ISBN 0-7695-1521-5

Yezzi, A. J., Slabaugh, G.G., Broadhurst, A., Cipolla, R. & Schafer, R.W. (2002). A Surface Evolution Approach to Probabilistic Space Carving. Paper presented at the First International Symposium on 3D Data Processing Visualization and Transmission, 19-06-2002 - 21-06-2002, Padova, Italy.

Yu, S., Dong, H., Yang, G., Slabaugh, G.G., Dragotti, P. L., Ye, X., Liu, F., Arridge, S., Keegan, J., Firmin, D. & Guo, Y. (2017). Deep De-Aliasing for Fast Compressive Sensing MRI. IEEE Transactions on Medical Imaging,

Z

Zachos, K. & Maiden, N. (2013). A Computational Model of Analogical Reasoning in Dementia Care. Paper presented at the The Fourth International Conference on Computational Creativity, 12-06-2013 - 14-06-2013, Sydney, Australia.

Zachos, K. & Maiden, N. (2008). Inventing Requirements from Software: An Empirical Investigation with Web Services. Proceedings of the 16th IEEE International Requirements Engineering Conference, pp. 145-154. doi: 10.1109/RE.2008.39

Zachos, K., Maiden, N., Karlsen, K., Jones, S., Turner, I., Rose, M., Pudney, K. & MacManus, J. (2011). Introducing creativity techniques and software apps to the care of people with dementia. Paper presented at the 8th ACM conference on Creativity and cognition, 3 - 6 Nov 2011, Atlanta, Georgia, US.

Zachos, K., Maiden, N. & Levis, S. (2015). Creativity Support to Improve Health-and-Safety in Manu-facturing Plants: Demonstrating Everyday Creativity. In: T. Maver & E. Y-L. Do (Eds.), C&C '15 Proceedings of the 2015 ACM SIGCHI Conference on Creativity and Cognition. (pp. 225-234). ACM. ISBN 978-1-4503-3598-0

Zachos, K., Maiden, N., Pitts, K., Jones, S., Turner, I., Rose, M., Pudney, K. & MacManus, J. (2013). Digital Creativity in Dementia Care Support. International Journal of Creative Computing, 1(1), pp. 35-56. doi: 10.1504/IJCRC.2013.056924

Zachos, K., Maiden, N., Pitts, K., Jones, S., Turner, I., Rose, M., Pudney, K. & MacManus, J. (2013). A software app to support creativity in dementia care. Paper presented at the 9th ACM Conference on Creativity & Cognition, 17-06-2013 - 20-06-2013, Sydney, Australia.

Zachos, K., Maiden, N., Zhu, X. & Jones, S. (2007). Discovering web services to specify more complete system requirements. Lecture Notes in Computer Science: Advanced Information Systems Engineering, 4495, pp. 142-157. doi: 10.1007/978-3-540-72988-4_11

Zaidi, K., Milojevic, M., Rakocevic, V. & Rajarajan, M. (2014). Data Centric Rogue Node Detection in VANETs. Paper presented at the IEEE Trustcom, 24-09-2014 - 26-09-2014, Beijing, China.

Zaidi, K. & Rajarajan, M. (2015). Vehicular Internet: Security & Privacy Challenges and Opportunities. Future Internet, 7, pp. 257-275. doi: 10.3390/fi7030257

Zarras, A., Issarny, V., Kloukinas, C. & Nguyen, V. (2001). Towards a Base UML Profile for Architecture Description. Paper presented at the 1st ICSE Workshop on Describing Software Architecture with UML, held in conjunction with the 23rd International Conference on Software Engineering (ICSE-2001), 15 May 2001, Toronto, Canada.

Zarras, A., Kloukinas, C. & Issarny, V. (2003). Quality Analysis of Dependable Systems: A Developer Oriented Approach. Lecture Notes in Computer Science: Architecting Dependable Systems, 2677, pp. 197-218. doi: 10.1007/3-540-45177-3_9

Zarrin, J., Aguiar, R. L. & Barraca, J. P. (2014). A Self-organizing and Self-configuration Algorithm for Resource Management in Service-oriented Systems. 2014 IEEE Symposium on Computers and Communications (ISCC), 6912524.. doi: 10.1109/ISCC.2014.6912524

Zarrin, J., Aguiar, R. L. & Barraca, J. P. (2015). A Specification-based Anycast Scheme for Scalable Resource Discovery in Distributed Systems. Paper presented at the 10th ConfTele 2015 - Conference on Telecommunications, 17-18 Sep 2015, Aveiro, Portugal.

Zhang, Yun (2012). Pattern recognition techniques applied to rust classification in steel structures. (Unpublished Masters thesis, City University London)

Zhao, X. On the probability of perfection of Software-Based systems. (Unpublished Doctoral thesis, School of Mathematics, Computer Science & Engineering)

Zhao, X., Littlewood, B., Povyakalo, A. A., Strigini, L. & Wright, D. (2017). Modeling the probability of failure on demand (pfd) of a 1-out-of-2 system in which one channel is “quasi-perfect”. Reliability Engineering & System Safety, 158, pp. 230-245. doi: 10.1016/j.ress.2016.09.002

Zhao, X., Littlewood, B., Povyakalo, A. A. & Wright, D. (2015). Conservative Claims about the Probability of Perfection of Software-based Systems. Paper presented at the The 26th IEEE International Symposium on Software Reliability Engineering, 02-11-2015 - 05-11-2015, Washington DC, USA.

Zisman, A. (2007). A Static Verification Framework for Secure Peer-to-Peer Applications. Paper presented at the Internet and Web Applications and Services, 2007. ICIW '07. Second International Conference on, 13 - 19 May 2007, Mauritius.

Zisman, A., Spanoudakis, G., Dooley, J. & Siveroni, I. (2013). Proactive and reactive runtime service discovery: a framework and its evaluation. IEEE Transactions on Software Engineering, 39(7), doi: 10.1109/TSE.2012.84

This list was generated on Tue Nov 21 06:04:38 2017 UTC.