City Research Online

Items where Subject is "QA75 Electronic computers. Computer science"

Up a level
Export as [feed] RSS 2.0 [feed] RSS
Group by: Authors | Publication Type
Number of items at this level: 1207.

Article

Abdallah, S., Benetos, E., Gold, N., Hargreaves, S., Weyde, T. and Wolff, D. (2017). The digital music lab: A big data infrastructure for digital musicology. Journal on Computing and Cultural Heritage, 10(1), 2.. doi: 10.1145/2983918

Abro, F. I., Rauf, F., Mobeen-ur-Rehman, , Chowdhry, B. S. and Rajarajan, M. (2019). Towards Security of GSM Voice Communication. Wireless Personal Communications, doi: 10.1007/s11277-019-06502-y

Acarali, D., Rajarajan, M., Komninos, N. and Herwono, I. (2016). Survey of Approaches and Features for the Identification of HTTP-Based Botnet Traffic. Journal of Network and Computer Applications, doi: 10.1016/j.jnca.2016.10.007

Acarali, D., Rajarajan, M., Komninos, N. ORCID: 0000-0003-2776-1283 and Zarpelao, B. (2019). Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Security and Communication Networks, 2019, 3745619.. doi: 10.1155/2019/3745619

Achichi, M., Cheatham, M., Dragisic, Z., Euzenat, J., Faria, D., Ferrara, A., Flouris, G., Fundulaki, I., Harrow, I., Ivanova, V., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Kolthoff, K., Kuss, E., Lambrix, P., Leopold, H., Li, H., Meilicke, C., Mohammadi, M., Montanelli, S., Pesquita, C., Saveta, T., Shvaiko, P., Splendiani, A., Stuckenschmidt, H., Thiéblin, E., Todorov, K., Trojahn, C. and Zamazal, O. (2017). Results of the ontology alignment evaluation initiative 2017. CEUR Workshop Proceedings, 2032, pp. 61-113.

Adamsky, F., Khayam, S. A., Jaeger, R. and Rajarajan, M. (2014). Stealing bandwidth from BitTorrent seeders. Computers & Security, 46, pp. 126-140. doi: 10.1016/j.cose.2014.07.009

Al Azwani, N. and Chen, T. ORCID: 0000-0001-8037-1685 (2018). Cyber Deterrence by Punishment: Role of Different Perceptions. Cyberpolitik Journal, 3(5), pp. 62-75.

Alam, S. S. and Jianu, R. (2016). Analyzing Eye-Tracking Information in Visualization and Data Space: from Where on the Screen to What on the Screen.. IEEE Transactions on Visualization and Computer Graphics, PP(99), doi: 10.1109/TVCG.2016.2535340

Alavi, Y., Jofre-Bonet, M., Bunce, C. V., Wormald, R., Viswanathan, A., Foster, A. and Hitchings, R. (2011). Developing an algorithm to convert routine measures of vision into utility values for glaucoma. Ophthalmic Epidemiology, 18(5), pp. 233-243. doi: 10.3109/09286586.2011.602577

Alberdi, E., Becher, J.-C., Gilhooly, K. J., Hunter, J., Logie, R., Lyon, A., McIntosh, N. and Reiss, J. (2001). Expertise and the interpretation of computerized physiological data: implications for the design of computerized monitoring in neonatal intensive care. International Journal of Human-Computer Studies, 55(3), pp. 191-216. doi: 10.1006/ijhc.2001.0477

Alberdi, E., Gilhooly, K. J., Hunter, J., Logie, R., Lyon, A., McIntosh, N. and Reiss, J. (2000). Computerisation and decision making in neonatal intensive care: a cognitive engineering investigation. Journal of Clinical Monitoring and Computing, 16(2), pp. 85-94. doi: 10.1023/A:1009954623304

Alberdi, E., Povyakalo, A. A., Strigini, L. and Ayton, P. (2004). Effects of incorrect computer-aided detection (CAD) output on human decision-making in mammography. Academic Radiology, 11(8), pp. 909-918. doi: 10.1016/j.acra.2004.05.012

Alberdi, E., Strigini, L., Povyakalo, A. A. and Ayton, P. (2009). Why Are People's Decisions Sometimes Worse with Computer Support?. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 5775, pp. 18-31. doi: 10.1007/978-3-642-04468-7_3

Albrecht, T., Slabaugh, G. G., Alonso, E. and Al-Arif, M. R. (2017). Deep Learning for Single-Molecule Science. Nanotechnology, doi: 10.1088/1361-6528/aa8334

Alessandretti, L., Lehmann, S. and Baronchelli, A. ORCID: 0000-0002-0255-0829 (2018). Understanding the interplay between social and spatial behaviour. EPJ Data Science, 7(1), 36.. doi: 10.1140/epjds/s13688-018-0164-6

Algergawy, A., Cheatham, M., Faria, D., Ferrara, A., Fundulaki, I., Harrow, I., Hertling, S., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Karam, N., Khiat, A., Lambrix, P., Li, H., Montanelli, S., Paulheim, H., Pesquita, C., Saveta, T., Schmidt, D., Shvaiko, P., Splendiani, A., Thiéblin, E., Trojahn, C., Vataščinová, J., Zamazal, O. and Zhou, L. (2018). Results of the ontology alignment evaluation initiative 2018. CEUR Workshop Proceedings, 2288, pp. 76-116.

Ali, H., D'Avila Garcez, A.S., Tran, S.N., Zhou, X. and Iqbal, K. (2014). Unimodal late fusion for NIST i-vector challenge on speaker detection. Electronics Letters, 50(15), pp. 1098-1100. doi: 10.1049/el.2014.1207

Alonso, E., Fairbank, M. and Mondragon, E. ORCID: 0000-0003-4180-1261 (2015). Back to optimality: a formal framework to express the dynamics of learning optimal behavior. Adaptive Behavior, 23(4), pp. 206-215. doi: 10.1177/1059712315589355

Alonso, E. ORCID: 0000-0002-3306-695X and Mondragon, E. ORCID: 0000-0003-4180-1261 (2014). What Have Computational Models Ever Done for Us?: A Case Study in Classical Conditioning. International Journal of Artificial Life Research, 4(1), pp. 1-12. doi: 10.4018/ijalr.2014010101

Alonso, E., Mondragon, E. ORCID: 0000-0003-4180-1261 and Fernandez, A. (2012). A Java simulator of Rescorla and Wagner's prediction error model and configural cue extensions. Computer Methods and Programs in Biomedicine, 108(1), pp. 346-355. doi: 10.1016/j.cmpb.2012.02.004

Alonso, E. and Schmajuk, N. (2012). Computational Models of Classical Conditioning guest editors’ introduction. Learning and Behavior, 40(3), pp. 231-240. doi: 10.3758/s13420-012-0081-7

Alrajeh, D., Russo, A., Lockerbie, J., Maiden, N., Mavin, A. and Novak, M. J. (2013). Computational alignment of goals and scenarios for complex systems. 2013 35th International Conference on Software Engineering (ICSE), pp. 1249-1252. doi: 10.1109/ICSE.2013.6606690

Alt, H., Cabello, S., Giannopoulos, P. ORCID: 0000-0002-6261-1961 and Knauer, C. (2018). Minimum Cell Connection in Line Segment Arrangements. International Journal of Computational Geometry & Applications, 27(03), pp. 159-176. doi: 10.1142/s0218195917500017

Alvino, C. V., Unal, G. B., Slabaugh, G. G., Peny, B. and Fang, T. (2007). Efficient segmentation based on Eikonal and diffusion equations. International Journal of Computer Mathematics, 84(9), pp. 1309-1324. doi: 10.1080/00207160701324249

Amálio, N. and Spanoudakis, G. (2008). From Monitoring Templates to Security Monitoring and Threat Detection. 2008 Second International Conference on Emerging Security Information, Systems and Technologies, pp. 185-192. doi: 10.1109/SECURWARE.2008.58

Andrienko, G. and Andrienko, N. (2015). Visualization Support to Interactive Cluster Analysis. Lecture Notes in Computer Science, 9286, pp. 337-340. doi: 10.1007/978-3-319-23461-8_43

Andrienko, G., Andrienko, N., Budziak, G., Dykes, J., Fuchs, G., Von Landesberger, T. and Weber, H. (2017). Visual Analysis of Pressure in Football. Data Mining and Knowledge Discovery, 31(6), pp. 1793-1839. doi: 10.1007/s10618-017-0513-2

Andrienko, G., Andrienko, N., Budziak, G., Von Landesberger, T. and Weber, H. (2016). Coordinate transformations for characterization and cluster analysis of spatial configurations in football. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9853, pp. 27-31. doi: 10.1007/978-3-319-46131-1_6

Andrienko, G., Andrienko, N., Dykes, J., Kraak, M. J., Robinson, A. and Schumann, H. (2016). GeoVisual analytics: interactivity, dynamics, and scale. Cartography and Geographic Information Science, 43(1), pp. 1-2. doi: 10.1080/15230406.2016.1095006

Andrienko, G., Andrienko, N., Fuchs, G. and Cordero Garcia, J. M. (2017). Clustering Trajectories by Relevant Parts for Air Traffic Analysis. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2017.2744322

Andrienko, G., Andrienko, N., Fuchs, G. and Wood, J. (2016). Revealing Patterns and Trends of Mass Mobility through Spatial and Temporal Abstraction of Origin-Destination Movement Data. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2016.2616404

Andrienko, G., Andrienko, N., Mladenov, M., Mock, M. and Pölitz, C. (2011). Identifying Place Histories from Activity Traces with an Eye to Parameter Impact.. IEEE Transactions on Visualization and Computer Graphics, 18(5), pp. 675-688. doi: 10.1109/TVCG.2011.153

Andrienko, N. and Andrienko, G. (2010). Spatial generalization and aggregation of massive movement data.. IEEE Transactions on Visualization and Computer Graphics, 17(2), pp. 205-219. doi: 10.1109/TVCG.2010.44

Andrienko, N. and Andrienko, G. (2017). State Transition Graphs for Semantic Analysis of Movement Behaviours. Information Visualization, doi: 10.1177/1473871617692841

Andrienko, N., Andrienko, G., Camossi, E., Claramunt, C., Cordero Garcia, J. M., Fuchs, G., Hadzagic, M., Jousselme, A-L., Ray, C., Scarlatti, D. and Vouros, G. (2017). Visual exploration of movement and event data with interactive time masks. Visual Informatics, 1(1), pp. 25-39. doi: 10.1016/j.visinf.2017.01.004

Andrienko, N., Andrienko, G. and Fuchs, G. (2014). Analysis of mobility behaviors in geographic and semantic spaces. 2014 IEEE Conference on Visual Analytics Science and Technology (VAST), pp. 341-342. doi: 10.1109/VAST.2014.7042556

Andrienko, N., Andrienko, G., Fuchs, G. and Jankowski, P. (2016). Scalable and privacy-respectful interactive discovery of place semantics from human mobility traces. INFORMATION VISUALIZATION, 15(2), pp. 117-153. doi: 10.1177/1473871615581216

Andrienko, N., Andrienko, G., Fuchs, G. and Jankowski, P. (2015). Visual Analytics Methodology for Scalable and Privacy-Respectful Discovery of Place Semantics from Episodic Mobility Data. Lecture Notes in Computer Science, 9286, pp. 254-258. doi: 10.1007/978-3-319-23461-8_25

Andrienko, N., Andrienko, G., Fuchs, G., Rinzivillo, S. and Betz, H-D. (2015). Real Time Detection and Tracking of Spatial Event Clusters. Lecture Notes in Computer Science, 9286, pp. 316-319. doi: 10.1007/978-3-319-23461-8_38

Andrienko, N., Andrienko, G., Fuchs, G. and Stange, H. (2014). Detecting and tracking dynamic clusters of spatial events. 2014 IEEE Conference on Visual Analytics Science and Technology (VAST), pp. 219-220. doi: 10.1109/VAST.2014.7042499

Andrienko, N. ORCID: 0000-0003-3313-1560, Andrienko, G. ORCID: 0000-0002-8574-6295, Garcia, J. M. C. and Scarlatti, D. (2019). Analysis of Flight Variability: a Systematic Approach. IEEE Transactions on Visualization and Computer Graphics, 25(1), pp. 54-64. doi: 10.1109/TVCG.2018.2864811

Andrienko, N. ORCID: 0000-0003-3313-1560, Andrienko, G. ORCID: 0000-0002-8574-6295, Patterson, F. and Stange, H. (2019). Visual Analysis of Place Connectedness by Public Transport. IEEE Transactions on Intelligent Transportation Systems, doi: 10.1109/tits.2019.2924796

Andrienko, N., Andrienko, G. and Rinzivillo, S. (2016). Leveraging spatial abstraction in traffic analysis and forecasting with visual analytics. Lecture Notes in Computer Science, 9853 L, pp. 32-35. doi: 10.1007/978-3-319-46131-1_7

Ang, C.S., Zaphiris, P. and Wilson, S. (2011). A case study analysis of a constructionist knowledge building community with activity theory. Behaviour and Information Technology, 30(5), pp. 537-554. doi: 10.1080/0144929X.2010.490921

Anglade, A., Benetos, E., Mauch, M. and Dixon, S. (2010). Improving music genre classification using automatically induced harmony rules. Journal of New Music Research, 39(4), pp. 349-361. doi: 10.1080/09298215.2010.525654

Anisetti, M., Ardagna, C. A., Guida, F., Gürgens, S., Lotz, V., Maña, A., Pandolfo, C., Pazzaglia, J., Pujol, G. and Spanoudakis, G. (2010). ASSERT4SOA: Toward Security Certification of Service-Oriented Applications. OTM Workshops, 6428, pp. 38-40. doi: 10.1007/978-3-642-16961-8_11

Apostolou, D., Zachos, K., Maiden, N., Agell, N., Sanchez-Hernandez, G., Taramigkou, M., Star, K. and Wippoo, M. (2016). Facilitating Creativity in Collaborative Work with Computational Intelligence Software. IEEE Computational Intelligence Magazine, 11(2), pp. 29-40. doi: 10.1109/MCI.2016.2532266

Ardagna, D., Baresi, L., Comai, S., Comuzzi, M. and Pernici, B. (2011). A Service-Based Framework for Flexible Business Processes. IEEE Software, 28(2), pp. 61-67. doi: 10.1109/MS.2011.28

Arsalan, M., Qureshi, A., Khan, A. U. and Rajarajan, M. (2017). Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique. Applied Soft Computing Journal, 51, pp. 1668-179. doi: 10.1016/j.asoc.2016.11.044

Arsovski, S., Wong, S. and Cheok, A. D. ORCID: 0000-0001-6316-2339 (2018). Open-domain neural conversational agents: The step towards artificial general intelligence. International Journal of Advanced Computer Science and Applications, 9(6), pp. 402-408. doi: 10.14569/IJACSA.2018.090654

Arunkumar, S., Sensoy, M., Srivatsa, M. and Rajarajan, M. (2015). Reasoning with Streamed Uncertain Information from Unreliable Sources. Expert Systems with Applications, 42(22), pp. 8381-8392. doi: 10.1016/j.eswa.2015.04.031

Asad, M. and Slabaugh, G. G. (2017). Staged Probabilistic Regression for Hand Orientation Inference. Computer Vision and Image Understanding, 161, pp. 114-129. doi: 10.1016/j.cviu.2017.05.009

Ashford, D. (2017). The Mechanical Turk: Enduring Misapprehensions Concerning Artificial Intelligence. The Cambridge Quarterly, 46(2), pp. 119-139. doi: 10.1093/camqtly/bfx005

Ashford, M., Olander, E. K. and Ayers, S. (2016). Finding Web-Based Anxiety Interventions on the World Wide Web: A Scoping Review. JMIR Mental Health, 3(2), e14. doi: 10.2196/mental.5349

Asif, W., Lestas, M., Khaliq Qureshi, H. and Rajarajan, M. (2016). Optimization based spectral partitioning for node criticality assessment. Journal of Network and Computer Applications, 75, pp. 279-292. doi: 10.1016/j.jnca.2016.09.003

Asif, W., Lestas, M., Qureshi, H. K. and Rajarajan, M. (2015). Spectral Partitioning for Node Criticality. 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 877-882. doi: 10.1109/ISCC.2015.7405624

Asif, W., Qureshi, H. K., Rajarajan, M. and Lestas, M. (2016). Combined Banzhaf & Diversity Index (CBDI) for critical node detection. Journal of Network and Computer Applications, 64, pp. 76-88. doi: 10.1016/j.jnca.2015.11.025

Attenborough, J. ORCID: 0000-0002-4018-8445 and Abbott, S. (2018). Leave them to their own devices: healthcare students’ experiences of using a range of mobile devices for learning. International Journal for the Scholarship of Teaching and Learning, 12(2), 16.. doi: 10.20429/ijsotl.2018.120216

Bailey, T. M. and Pothos, E. M. (2008). AGL StimSelect: Software for automated selection of stimuli for artificial grammar learning. Behavior Research Methods, 40(1), pp. 164-176. doi: 10.3758/BRM.40.1.164

Baloch, S., Melkisetoglu, R., Flöry, S., Azernikov, S., Slabaugh, G. G., Zouhar, A. and Fang, T. (2010). Automatic Detection of Anatomical Features on 3D Ear Impressions for Canonical Representation.. Lecture Notes in Computer Science, 6363, pp. 555-562. doi: 10.1007/978-3-642-15711-0_69

Basaru, R. R., Child, C. H. T., Alonso, E. and Slabaugh, G. G. (2018). Conditional Regressive Random Forest Stereo-based Hand Depth Recovery. 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), pp. 614-622. doi: 10.1109/ICCVW.2017.78

Basdekis, I., Karampelas, P., Doulgeraki, V. and Stephanidis, C. (2009). Designing Universally Accessible Networking Services for a Mobile Personal Assistant. Lecture Notes in Computer Science, 5615, pp. 279-288. doi: 10.1007/978-3-642-02710-9_31

Basdekis, I., Klironomos, I., Metaxas, I. and Stephanidis, C. (2010). An overview of web accessibility in Greece: a comparative study 2004-2008. Universal Access in the Information Society, 9(2), pp. 185-190. doi: 10.1007/s10209-009-0166-z

Bastos, M. T. and Mercea, D. (2017). The Brexit Botnet and User-Generated Hyperpartisan News. Social Science Computer Review, doi: 10.1177/0894439317734157

Bastos, M. T. ORCID: 0000-0003-0480-1078 and Mercea, D. (2018). The Public Accountability of Social Platforms: Lessons from a Study on Bots and Trolls in the Brexit Campaign. Philosophical Transactions A: Mathematical, Physical and Engineering Sciences, 376(2128), 20180003.. doi: 10.1098/rsta.2018.0003

Bastos, M. T., Recuero, R. and Zago, G. (2014). Taking tweets to the streets: A spatial analysis of the Vinegar Protests in Brazil. First Monday, 19(3), doi: 10.5210/fm.v19i3.5227

Bastos, M. T. and Zago, G. (2013). Tweeting News Articles Readership and News Sections in Europe and the Americas. SAGE Open, 3(3), doi: 10.1177/2158244013502496

Bawden, D. ORCID: 0000-0002-0478-6456 and Robinson, L. (2019). "Essentially made of information": concepts and implications of informational privacy. Information Research: an international electronic journal, 24(4),

Bayer, N., Xu, B., Rakocevic, V. and Habermann, J. (2010). Application-aware scheduling for VoIP in Wireless Mesh Networks. Computer Networks, 54(2), pp. 257-277. doi: 10.1016/j.comnet.2009.05.014

Beecham, R., Dykes, J., Meulemans, W., Slingsby, A., Turkay, C. and Wood, J. (2016). Map LineUps: effects of spatial structure on graphical inference. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2016.2598862

Beecham, R., Rooney, C., Meier, S., Dykes, J., Slingsby, A., Turkay, C., Wood, J. and Wong, B.L.W. (2016). Faceted Views of Varying Emphasis (FaVVEs): a framework for visualising multi-perspective small multiples. Computer Graphics Forum: the international journal of the Eurographics Association, 35(3), pp. 241-249. doi: 10.1111/cgf.12900

Beecham, R. and Slingsby, A. ORCID: 0000-0003-3941-553X (2019). Characterising labour market self-containment in London with geographically arranged small multiples. Environment and Planning A: Economy and Space, doi: 10.1177/0308518x19850580

Benaroch, M., Lichtenstein, Y. and Finkelstein, L. (2016). Contract Design Choices and the Balance of Ex-Ante and Ex-Post Transaction Costs in Software Development Outsourcing. MIS Quarterly, 40(1), pp. 57-82.

Benetos, E. and Dixon, S. (2011). Joint Multi-Pitch Detection Using Harmonic Envelope Estimation for Polyphonic Music Transcription. IEEE Journal of Selected Topics in Signal Processing, 5(6), pp. 1111-1123. doi: 10.1109/JSTSP.2011.2162394

Benetos, E. and Dixon, S. (2013). Multiple-instrument polyphonic music transcription using a temporally constrained shift-invariant model. The Journal of the Acoustical Society of America (JASA), 133(3), pp. 1727-1741. doi: 10.1121/1.4790351

Benetos, E. and Dixon, S. (2012). A Shift-Invariant Latent Variable Model for Automatic Music Transcription. Computer Music Journal, 36(4), pp. 81-94. doi: 10.1162/COMJ_a_00146

Benetos, E. and Dixon, S. (2012). Temporally-constrained convolutive probabilistic latent component analysis for multi-pitch detection. Lecture Notes in Computer Science: Latent Variable Analysis and Signal Separation, 7191, pp. 364-371. doi: 10.1007/978-3-642-28551-6_45

Benetos, E., Dixon, S., Giannoulis, D., Kirchhoff, H. and Klapuri, A. (2013). Automatic music transcription: challenges and future directions. Journal of Intelligent Information Systems, pp. 1-28. doi: 10.1007/s10844-013-0258-3

Benetos, E., Ewert, S. and Weyde, T. (2014). Automatic transcription of pitched and unpitched sounds from polyphonic music. 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3107-3111. doi: 10.1109/ICASSP.2014.6854172

Benetos, E. and Kotropoulos, C. (2010). Non-Negative Tensor Factorization Applied to Music Genre Classification. IEEE Transactions on Audio, Speech & Language Processing, 18(8), pp. 1955-1967. doi: 10.1109/TASL.2010.2040784

Benetos, E. and Stylianou, Y. (2010). Auditory Spectrum-Based Pitched Instrument Onset Detection. IEEE Transactions on Audio, Speech & Language Processing, 18(8), pp. 1968-1977. doi: 10.1109/TASL.2010.2040785

Berlanga, R., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599 and Nebot, V. (2011). Building conceptual spaces for exploring and linking biomedical resources. CEUR Workshop Proceedings, 698,

Bernardy, J. P., Jannson, P. and Paterson, R. A. (2012). Proofs for free - parametricity for dependent types. Journal of Functional Programming, 22(2), pp. 107-152. doi: 10.1017/S0956796812000056

Bezzi, M., Sabetta, A. and Spanoudakis, G. (2011). An architecture for certification-aware service discovery. Proceedings - 2011 1st International Workshop on Securing Services on the Cloud, IWSSC 2011, pp. 14-21. doi: 10.1109/IWSSCloud.2011.6049020

Bishop, P. G. (1993). The Variation of Software Survival Time for Different Operational Input Profiles. Fault-Tolerant Computing, 1993. FTCS-23. Digest of Papers., The Twenty-Third International Symposium on, pp. 98-107. doi: 10.1109/FTCS.1993.627312

Bishop, P. G., Bloomfield, R. E., Littlewood, B., Popov, P. T., Povyakalo, A. A. and Strigini, L. (2014). A conservative bound for the probability of failure of a 1-out-of-2 protection system with one hardware-only and one software-based protection train. Reliability Engineering & System Safety, 130, pp. 61-68. doi: 10.1016/j.ress.2014.04.002

Bishop, P. G. and Cyra, L. (2010). Overcoming Non-determinism in Testing Smart Devices: A Case Study. Lecture Notes in Computer Science, 6351, pp. 237-250. doi: 10.1007/978-3-642-15651-9_18

Bishop, P. G. and Povyakalo, A. A. (2017). Deriving a frequentist conservative confidence bound for probability of failure per demand for systems with different operational and test profiles. Reliability Engineering & System Safety, 158, pp. 246-253. doi: 10.1016/j.ress.2016.08.019

Bishop, P. G. and Strigini, L. (2014). Estimating worst case failure dependency with partial knowledge of the difficulty function. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8666, pp. 186-201. doi: 10.1007/978-3-319-10506-2_13

Blascheck, T., MacDonald, L., Vermeulen, J., Perin, C. ORCID: 0000-0002-7324-9363, Willett, W., Ertl, T. and Carpendale, S. (2018). Exploration Strategies for Discovery of Interactivity in Visualizations. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2018.2802520

Blasco, J., Hernandez-Castro, J. C., Tapiador, J. M. E., Ribagorda, A. and Orellana-Quiros, M. A. (2009). Steganalysis of Hydan. IFIP Advances in Information and Communication Technology, 297, pp. 132-142. doi: 10.1007/978-3-642-01244-0_12

Blazevic, V., Wiertz, C., Cotte, J., de Ruyter, K. and Keeling, D. I. (2014). GOSIP in Cyberspace: Conceptualization and Scale Development for General Online Social Interaction Propensity. Journal of Interactive Marketing, 28(2), pp. 87-100. doi: 10.1016/j.intmar.2013.09.003

Bleisch, S., Dykes, J. and Nebiker, S (2008). Evaluating the effectiveness of representing numeric information through abstract graphics in 3D desktop virtual environments. Cartographic Journal, The, 45(3), pp. 216-226.

Blom, A. G., Bosnjak, M., Cornilleau, A., Cousteaux, A. S., Das, M., Douhou, S. and Krieger, U. (2016). A Comparison of Four Probability-Based Online and Mixed-Mode Panels in Europe. Social Science Computer Review, 34(1), pp. 8-25. doi: 10.1177/0894439315574825

Bloomfield, R. E., Bishop, P. G. ORCID: 0000-0003-3307-5159, Butler, E. and Stroud, R. (2018). Security-Informed Safety: Supporting Stakeholders with Codes of Practice. Computer, 51(8), pp. 60-65. doi: 10.1109/MC.2018.3191260

Bloomfield, R. E., Popov, P. T., Salako, K., Stankovic, V. and Wright, D. (2017). Preliminary Interdependency Analysis: An Approach to Support Critical Infrastructure Risk Assessment. Reliability Engineering and System Safety, 167, pp. 198-217. doi: 10.1016/j.ress.2017.05.030

Bonadio, E., McDonagh, L. ORCID: 0000-0003-2085-5404 and Arvidsson, C. (2018). Intellectual Property Aspects of Robotics. European Journal of Risk Regulation(4),

Bonnet, E. and Giannopoulos, P. ORCID: 0000-0002-6261-1961 (2019). Orthogonal Terrain Guarding is NP-complete. Journal of Computational Geometry, 10(2), pp. 21-44. doi: 10.20382/jocg.v10i2a3

Boone, D. J., Halligan, S., Roth, H. R., Hampshire, T. E., Helbren, E., Slabaugh, G. G., McQuillan, J., McClelland, J. R., Hu, M., Punwani, S., Taylor, S. A. and Hawkes, D. J. (2013). CT colonography: external clinical validation of an algorithm for computer-assisted prone and supine registration. Radiology, 268(3), pp. 752-760. doi: 10.1148/radiol.13122083

Booth, T. (2015). Making progress: Barriers to success in end-user developers' physical prototyping. Proceedings of IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC, 2015-D, pp. 299-300. doi: 10.1109/VLHCC.2015.7357236

Borges, Rafael, Garcez, A. and Lamb, L. C. (2011). Learning and Representing Temporal Knowledge in Recurrent Networks. IEEE Transactions on Neural Networks, 22(12), pp. 2409-2421. doi: 10.1109/TNN.2011.2170180

Bourazeri, A. ORCID: 0000-0002-0258-7648 and Pitt, J. (2018). Collective attention and active consumer participation in community energy systems. International Journal of Human Computer Studies, 119, doi: 10.1016/j.ijhcs.2018.06.001

Bouts, Q. W., Dwyer, T., Dykes, J., Speckmann, B., Goodwin, S., Henry-Riche, N., Carpendale, S. and Liebman, A. (2016). Visual Encoding of Dissimilarity Data via Topology-Preserving Map Deformation. IEEE Transactions on Visualization and Computer Graphics, 22(9), pp. 2200-2213. doi: 10.1109/TVCG.2015.2500225

Brain, M. ORCID: 0000-0003-4216-7151, Schanda, F. and Sun, Y. (2019). Building Better Bit-Blasting for Floating-Point Problems. Tools and Algorithms for the Construction and Analysis of Systems, 11427, pp. 79-98. doi: 10.1007/978-3-030-17462-0_5

Broom, M. and Cannings, C. (2017). Game theoretical modelling of a dynamically evolving network I: general target sequences. Journal of Dynamics and Games, 4(4), pp. 285-318. doi: 10.3934/jdg.2017016

Buchin, K., Buchin, M., van Leusden, R., Meulemans, W. and Mulzer, W. (2016). Computing the Fréchet Distance with a Retractable Leash. Discrete and Computational Geometry, 56(2), pp. 315-336. doi: 10.1007/s00454-016-9800-8

Burnett, M., Stumpf, S., Macbeth, J., Makri, S., Beckwith, L., Kwan, I., Peters, A. and Jernigan, W. (2016). GenderMag: A Method for Evaluating Software's Gender Inclusiveness. Interacting with Computers, 28(6), pp. 760-787. doi: 10.1093/iwc/iwv046

Cabello, S. and Giannopoulos, P. ORCID: 0000-0002-6261-1961 (2016). The Complexity of Separating Points in the Plane. Algorithmica, 74(2), pp. 643-663. doi: 10.1007/s00453-014-9965-6

Cacciatori, E. ORCID: 0000-0001-6229-7266, Jarzabkowski, P. ORCID: 0000-0001-8674-6628, Bednarek, R. and Chalkias, K. (2019). What's in a model? Computer simulations and the management of ignorance. Proceedings of the Seventy-ninth Annual Meeting of the Academy of Management, 2019(1), doi: 10.5465/AMBPP.2019.250

Cai, B., Long-Fei, X. and Fu, F. ORCID: 0000-0002-9176-8159 (2019). Shear Resistance Prediction of post-fire reinforced concrete beams using artificial neural network. International Journal of Concrete Structures and Materials, 13, 46.. doi: 10.1186/s40069-019-0358-8

Carrera, A., Alonso, E. ORCID: 0000-0002-3306-695X and Iglesias, C. A. (2019). A Bayesian Argumentation Framework for Distributed Fault Diagnosis in Telecommunication Networks. Sensors, 19(15), 3408.. doi: 10.3390/s19153408

Casadesus-Masanell, R. and Hervas-Drane, A. (2010). Competing against online sharing. Management Decision, 48(8), pp. 1247-1260. doi: 10.1108/00251741011076771

Casadesus-Masanell, R. and Hervas-Drane, A. (2010). Peer-to-Peer File Sharing and the Market for Digital Information Goods. Journal of Economics and Management Strategy, 19(2), pp. 333-373. doi: 10.1111/j.1530-9134.2010.00254.x

Charalambous, T. and Kalyvianaki, E. (2010). A min-max framework for CPU resource provisioning in virtualized servers using ℋ∞ Filters. Decision and Control (CDC), 2010 49th IEEE Conference on, pp. 3778-3783. doi: 10.1109/CDC.2010.5717375

Charles, P. J., Howe, J. M. and King, A. (2009). Integer polyhedra for program analysis. Algorithmic Aspects in Information and Management, Lecture Notes in Computer Science, 5564, pp. 85-99. doi: 10.1007/978-3-642-02158-9_9

Che, X. (2011). Internet auctions with a temporary buyout option. Economics Letters, 110(3), pp. 268-271. doi: 10.1016/j.econlet.2010.11.022

Chen, J., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599 and Horrocks, I. (2019). Canonicalizing Knowledge Base Literals. Lecture Notes in Computer Science(11779),

Chen, J., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Horrocks, I. and Sutton, C. (2019). ColNet: Embedding the Semantics of Web Tables for Column Type Prediction. Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 33, pp. 29-36. doi: 10.1609/aaai.v33i01.330129

Chen, S., Andrienko, N. ORCID: 0000-0003-3313-1560, Andrienko, G. ORCID: 0000-0002-8574-6295, Adilova, L., Barlet, J, Kindermann, J., Nguyen, P. H., Thonnard, O. and Turkay, C. ORCID: 0000-0001-6788-251X (2019). LDA Ensembles for Interactive Exploration and Categorization of Behaviors. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2019.2904069

Chen, S., Li, J., Andrienko, G. ORCID: 0000-0002-8574-6295, Andrienko, N. ORCID: 0000-0003-3313-1560, Wang, Y., Nguyen, P. ORCID: 0000-0001-5643-0585 and Turkay, C. ORCID: 0000-0001-6788-251X (2018). Supporting Story Synthesis: Bridging the Gap between Visual Analytics and Storytelling. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/tvcg.2018.2889054

Chen, T., Sanchez-Aarnoutse, J. C. and Buford, J. (2011). Petri net modeling of cyber-physical attacks on smart grid. IEEE Transactions on Smart Grid, 2(4), pp. 741-749. doi: 10.1109/TSG.2011.2160000

Cherla, S., Tran, S.N., Weyde, T. and Garcez, A. (2016). Generalising the Discriminative Restricted Boltzmann Machine.

Child, C. H. T. and Dey, R. (2013). QL-BT: Enhancing Behaviour Tree Design and Implementation with Q-Learning. Computational Intelligence in Games (CIG), 2013 IEEE Conference on, pp. 275-282. doi: 10.1109/CIG.2013.6633623

Child, C. H. T. and Stathis, K. (2005). The Apriori Stochastic Dependency Detection (ASDD) algorithm for learning Stochastic logic rules. Lecture Notes in Computer Science: Computational Logic In Multi-Agent Systems, 3259, pp. 234-249. doi: 10.1007/978-3-540-30200-1_13

Child, C. H. T. and Stathis, K. (2005). SMART (Stochastic Model Acquisition with ReinforcemenT) learning agents: A preliminary report. Lecture Notes in Computer Science: Adaptive Agents and Multi-Agent Systems II, 3394, pp. 73-87. doi: 10.1007/978-3-540-32274-0_5

Christou, D., Karcanias, N. and Mitrouli, M. (2014). Matrix representation of the shifting operation and numerical properties of the ERES method for computing the greatest common divisor of sets of many polynomials. Journal of Computational and Applied Mathematics, 260, pp. 54-67. doi: 10.1016/j.cam.2013.09.021

Chronopoulos, M., Panaousis, E. and Grossklags, J. (2018). An Options Approach to Cybersecurity Investment. IEEE Access, 6, pp. 12175-12186. doi: 10.1109/ACCESS.2017.2773366

Claramunt, C., Ray, C., Salmon, L., Camossi, E., Hadzagic, M., Jousselme, A-L., Andrienko, G. ORCID: 0000-0002-8574-6295, Andrienko, N. ORCID: 0000-0003-3313-1560, Theodoridis, Y. and Vouros, G. (2017). Maritime data integration and analysis: Recent progress and research challenges. Advances in Database Technology - EDBT, 2017, pp. 192-197. doi: 10.5441/002/edbt.2017.18

Clark, D., Hunt, S. and Malacaria, P. (2005). Quantified Interference for a While Language. Electronic Notes in Theoretical Computer Science, 112(SPEC), pp. 149-166. doi: 10.1016/j.entcs.2004.01.018

Cohen, N. R., Brennan, P. J., Shay, T., Watts, G. F., Brigl, M., Kang, J., Brenner, M. B. and ImmGen Project Consortium, . (2013). Shared and distinct transcriptional programs underlie the hybrid nature of iNKT cells. Nature Immunology, 14(1), pp. 90-99. doi: 10.1038/ni.2490

Collins, C., Andrienko, N. ORCID: 0000-0003-3313-1560, Schreck, T., Yang, J., Choo, J., Engelke, U., Jena, A. and Dwyer, T. (2018). Guidance in the human–machine analytics process. Visual Informatics, 2(3), pp. 166-180. doi: 10.1016/j.visinf.2018.09.003

Comuzzi, M., Jacobs, G. and Grefen, P. (2013). Understanding SLA elements in cloud computing. IFIP Advances in Information and Communication Technology, 408, pp. 385-392.

Comuzzi, M. and Martinez, R. I. R. (2014). Customized Infrastructures for Monitoring Business Processes. 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE), pp. 122-127. doi: 10.1109/SOSE.2014.19

Comuzzi, M., Vanderfeesten, I. T. P. and Wang, T. (2013). Optimized cross-organizational business process monitoring: Design and enactment. Information Sciences, 244, pp. 107-118. doi: 10.1016/j.ins.2013.04.036

Comuzzi, M., Vonk, J. and Grefen, P. (2012). Measures and mechanisms for process monitoring in evolving business networks. Data & Knowledge Engineering, 71(1), pp. 1-28. doi: 10.1016/j.datak.2011.07.004

Cook, R., Johnston, A. and Heyes, C. (2012). Self-recognition of avatar motion: how do I know it's me?. Proceedings of the Royal Society B: Biological Sciences, 279(1729), pp. 669-674. doi: 10.1098/rspb.2011.1264

Creus-Mir, A., Casadesus-Masanell, R. and Hervas-Drane, A. (2008). Bandwidth allocation in peer-to-peer file sharing networks. Computer Communications, 31(2), pp. 257-265. doi: 10.1016/j.comcom.2007.08.001

Cumanan, K, Rahulamathavan, Y., Lambotharan, S and Ding, Z (2013). MMSE-based beamforming techniques for relay broadcast channels. IEEE Transactions on Vehicular Technology, 62(8), pp. 4045-4051. doi: 10.1109/TVT.2013.2257906

Curran, P. J. and Novo, E. (1988). The relationship between suspended sediment concentration and remotely sensed spectral radiance - a review. Journal of Coastal Research, 4(3), pp. 351-368.

Cvjetkovic, M. and Rakocevic, V. (2016). Alternative Topology Construction for Cooperative Data Distribution in Mobile Ad Hoc Networks. 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 171-176. doi: 10.1109/ICUMT.2016.7765352

D'Amato, V., Haberman, S., Piscopo, G. and Russolillo, M. (2014). Computational framework for longevity risk management. Computational Management Science, 11(1), pp. 111-137. doi: 10.1007/s10287-013-0178-2

Danilova, N. and Stupples, D. (2012). Application of Natural Language Processing and Evidential Analysis to Web-Based Intelligence Information Acquisition. Intelligence and Security Informatics Conference (EISIC), Proceedings, doi: 10.1109/EISIC.2012.41

Daviaud, L. and Paperman, C. (2018). Classes of languages generated by the Kleene star of a word. Information and Computation, 262, pp. 90-109. doi: 10.1016/j.ic.2018.07.002

Day, J. S., Buchanan, G. and Makri, S. (2015). Learning Lessons from Controlled Studies to Investigate Users' Resilience Strategies. Lecture Notes in Computer Science, 9299, pp. 578-581. doi: 10.1007/978-3-319-22723-8_65

De Domenico, M. and Baronchelli, A. ORCID: 0000-0002-0255-0829 (2019). The fragility of decentralised trustless socio-technical systems. EPJ Data Science, 8, 2.. doi: 10.1140/epjds/s13688-018-0180-6

Del Tedesco, F., Hunt, S. and Sands, D. (2011). A semantic hierarchy for erasure policies. Lecture Notes in Computer Science, 7093 L, pp. 352-369. doi: 10.1007/978-3-642-25560-1_24

Demsar, U., Slingsby, A. ORCID: 0000-0003-3941-553X and Weibel, R. (2019). Introduction to the special section on Visual Movement Analytics. Information Visualization, 18(1), pp. 133-137. doi: 10.1177/1473871618810849

Denisova, A. and Cairns, P. (2019). Player experience and deceptive expectations of difficulty adaptation in digital games. Entertainment Computing, 29, pp. 56-68. doi: 10.1016/j.entcom.2018.12.001

Dholakia, U. M., Blazevic, V., Wiertz, C. and Algesheimer, R. (2009). Communal Service Delivery: How Customers Benefit From Participation in Firm-Hosted Virtual P3 Communities. Journal of Service Research, 12, pp. 208-226. doi: 10.1177/1094670509338618

Dinh, H. Q., Turk, G. and Slabaugh, G. G. (2002). Reconstructing Surfaces by Volumetric Regularization Using Radial Basis Functions. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(10), pp. 1358-1371. doi: 10.1109/TPAMI.2002.1039207

Douiri, A., Siddique, M., Ye, X., Beddoe, G. and Slabaugh, G. G. (2009). Enhanced detection in CT colonography using adaptive diffusion filtering. Progress in Biomedical Optics and Imaging - Proceedings of SPIE, 7259, p. 725923. doi: 10.1117/12.811563

Duckham, M., van Kreveld, M., Purves, R., Speckmann, B., Tao, Y., Verbeek, K. and Wood, J. (2016). Modeling Checkpoint-Based Movement with the Earth Mover's Distance. Geographic Information Science. GIScience 2016. Lecture Notes in Computer Science, 9927, doi: 10.1007/978-3-319-45738-3_15

Dunkel, A., Andrienko, G. ORCID: 0000-0002-8574-6295, Andrienko, N. ORCID: 0000-0003-3313-1560, Burghardt, D., Hauthal, E. and Purves, R. (2018). A conceptual framework for studying collective reactions to events in location-based social media. International Journal of Geographical Information Science, doi: 10.1080/13658816.2018.1546390

Dunne, J. ORCID: 0000-0001-9831-4195 (2018). Good night, sleep tight (remix). International Journal of Performance Arts and Digital Media, 14(2), pp. 215-223. doi: 10.1080/14794713.2018.1505385

Dykes, J. ORCID: 0000-0002-8096-5763, Kerzner, E., Goodwin, S., Jones, S. ORCID: 0000-0003-4789-4948 and Meyer, M. (2018). A Framework for Creative Visualization-Opportunities Workshops. IEEE Transactions on Visualization and Computer Graphics, 25(1), doi: 10.1109/TVCG.2018.2865241

Eberwein, T. and Porlezza, C. ORCID: 0000-0002-1400-5879 (2016). Both Sides of the Story: Communication Ethics in Mediatized Worlds. Journal of Communication, 66(2), pp. 328-342. doi: 10.1111/jcom.12216

Egea, M., Spanoudakis, G., Mahbub, K. and Vieira, M. R. (2015). A Certification Framework for Cloud Security Properties: The Monitoring Path. Lecture Notes in Computer Science, 8937, pp. 63-77. doi: 10.1007/978-3-319-17199-9_3

Elmsley (né Lambert), A., Weyde, T. and Armstrong, N. (2017). Generating Time: Rhythmic Perception, Prediction and Production with Recurrent Neural Networks. Journal of Creative Music Systems, 1(2), doi: 10.5920/JCMS.2017.04

Endert, A., Ribarsky, W., Turkay, C., Wong, B.L.W., Nabney, I.T., Diaz-Blanco, I. and Rossi, F. (2017). The State of the Art in Integrating Machine Learning into Visual Analytics. Computer Graphics Forum, 36(8), pp. 458-486. doi: 10.1111/cgf.13092

Erkoyuncu,, J. A., Fernandez del Amo, I., Dalle Mura, M. and Roy, R. ORCID: 0000-0001-5491-7437 (2017). Improving efficiency of industrial maintenance with context aware adaptive authoring in augmented reality. CIRP Annals, 66, pp. 465-468. doi: 10.1016/j.cirp.2017.04.006

Exarchos, T. P., Rigas, G., Bibas, A., Kikidis, D., Nikitas, C., Wuyts, F. L., Ihtijarevic, B., Maes, L., Cenciarini, M., Maurer, C., Macdonald, N., Bamiou, D. E., Luxon, L., Prasinos, M., Spanoudakis, G., Koutsouris, D. and Fotiadis, D. I. (2016). Mining balance disorders' data for the development of diagnostic decision support systems. Computers in Biology and Medicine, 77, pp. 240-248. doi: 10.1016/j.compbiomed.2016.08.016

Fahad, L. G. and Rajarajan, M. (2015). Integration of discriminative and generative models for activity recognition in smart homes. Applied Soft Computing Journal, 37, pp. 992-1001. doi: 10.1016/j.asoc.2015.03.045

Fahey, E. (2014). EU’S Cybercrime and Cyber Security Rule-Making: Mapping the Internal and External Dimensions of EU Security. European Journal of Risk Regulation, 5(1), pp. 46-60.

Fairbank, M. and Alonso, E. (2012). A Comparison of Learning Speed and Ability to Cope Without Exploration between DHP and TD(0). The 2012 International Joint Conference on Neural Networks (IJCNN), pp. 1478-1485. doi: 10.1109/IJCNN.2012.6252569

Fairbank, M. and Alonso, E. (2012). Efficient Calculation of the Gauss-Newton Approximation of the Hessian Matrix in Neural Networks. Neural Computation, 24(3), pp. 607-610. doi: 10.1162/NECO_a_00248

Fairbank, M., Alonso, E. and Prokhorov, D. (2013). An Equivalence Between Adaptive Dynamic Programming With a Critic and Backpropagation Through Time. IEEE Transactions on Neural Networks and Learning Systems, 24(12), pp. 2088-2100. doi: 10.1109/TNNLS.2013.2271778

Fairbank, M., Alonso, E. and Prokhorov, D. (2012). Simple and Fast Calculation of the Second-Order Gradients for Globalized Dual Heuristic Dynamic Programming in Neural Networks. IEEE Transactions on Neural Networks and Learning Systems, 23(10), pp. 1671-1676. doi: 10.1109/TNNLS.2012.2205268

Fairbank, M., Li, S., Fu, X., Alonso, E. and Wunsch, D. C. (2014). An adaptive recurrent neural-network controller using a stabilization matrix and predictive inputs to solve a tracking problem under disturbances. Neural Networks, 49, pp. 74-86. doi: 10.1016/j.neunet.2013.09.010

Fairbank, M., Prokhorov, D. and Alonso, E. (2014). Clipping in Neurocontrol by Adaptive Dynamic Programming. IEEE Transactions on Neural Networks and Learning Systems, 25(10), pp. 1909-1920. doi: 10.1109/TNNLS.2014.2297991

Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M. S., Conti, M. and Rajarajan, M. (2015). Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Communications Surveys and Tutorials, 17(2), pp. 998-1022. doi: 10.1109/COMST.2014.2386139

Favaro, J., Mazzini, S., Popov, P. T. ORCID: 0000-0002-3434-5272 and Strigini, L. (2018). AQUAS: A project to bridge the gaps between safety and security processes. Ada User Journal, 39(4), pp. 261-263.

Favier, J., Revell, A. and Pinelli, A. (2014). A Lattice Boltzmann-Immersed Boundary method to simulate the fluid interaction with moving and slender flexible objects. Journal of Computational Physics, 261, pp. 145-161. doi: 10.1016/j.jcp.2013.12.052

Fernández Del Amo, I., Erkoyuncu, J. A., Roy, R. ORCID: 0000-0001-5491-7437 and Wilding, S. (2018). Augmented Reality in Maintenance: An information-centred design framework. Procedia Manufacturing, 19, pp. 148-155. doi: 10.1016/j.promfg.2018.01.021

Fiaz, M., Yousaf, R., Hanfi, M., Asif, W., Qureshi, H. K. and Rajarajan, M. (2014). Adding the reliability on tree based topology construction algorithms for wireless sensor networks. Wireless Personal Communications, 74(2), pp. 989-1004. doi: 10.1007/s11277-013-1334-2

Fink, L. and Lichtenstein, Y. (2014). Why project size matters for contract choice in software development outsourcing. ACM SIGMIS Database, 45(3), pp. 54-71. doi: 10.1145/2659254.2659258

Fink, L., Lichtenstein, Y. and Wyss, S. (2013). Ex post adaptations and hybrid contracts in software development services. Applied Economics, 45(32), pp. 4533-4544. doi: 10.1080/00036846.2013.791021

Forechi, A., De Souza, A.F., Neto, J.D.O., de Aguiar, E., Badue, C., Garcez, A. and Oliveira-Santos, T. (2016). Fat-Fast VG-RAM WNN: A high performance approach. NEUROCOMPUTING, 183, pp. 56-69. doi: 10.1016/j.neucom.2015.06.104

Foster, H. and Spanoudakis, G. (2011). Advanced service monitoring configurations with SLA decomposition and selection. Proceedings of the ACM Symposium on Applied Computing, pp. 1582-1589. doi: 10.1145/1982185.1982519

Frankl, P. G., Hamlet, R. G., Littlewood, B. and Strigini, L. (1998). Evaluating testing methods by delivered reliability. IEEE Transactions on Software Engineering, 24(8), pp. 586-601. doi: 10.1109/32.707695

França, M. V. M., Zaverucha, G. and Garcez, A. (2014). Fast relational learning using bottom clause propositionalization with artificial neural networks. Machine Learning, 94(1), pp. 81-104. doi: 10.1007/s10994-013-5392-1

Galliers, J. R., Wilson, S., Marshall, J., Talbot, R., Devane, N., Booth, T., Woolf, C. and Greenwood, H. (2017). Experiencing EVA Park, A Multi-User Virtual World For People With Aphasia. ACM Transactions on Accessible Computing, 10(4), 15.. doi: 10.1145/3134227

Ganz, M., Yang, X. and Slabaugh, G. G. (2012). Automatic Segmentation of Polyps in Colonoscopic Narrow-Band Imaging Data. IEEE Transactions on Biomedical Engineering, 59(8), pp. 2144-2151. doi: 10.1109/TBME.2012.2195314

Garcez, A. (2005). Fewer epistemological challenges for connectionism. Lecture Notes in Computer Science, 3526, pp. 289-325. doi: 10.1007/11494645_18

Garcez, A., Broda, K. and Gabbay, D. M. (2001). Symbolic knowledge extraction from trained neural networks: A sound approach. Artificial Intelligence, 125(1-2), pp. 153-205. doi: 10.1016/S0004-3702(00)00077-1

Garcez, A., Gabbay, D. M. and Lamb, L. C. (2005). Value-based argumentation frameworks as neural-symbolic learning systems. Journal of Logic and Computation, 15(6), pp. 1041-1058. doi: 10.1093/logcom/exi057

Garcez, A., Gabbay, D. M., Ray, O. and Woods, J. (2007). Abductive reasoning in neural-symbolic learning systems. Topoi: An International Review of Philosophy, 26(1), pp. 37-49. doi: 10.1007/s11245-006-9005-5

Garcez, A., Gori, M., Lamb, L. C., Serafini, L., Spranger, M. and Tran, S. N. (2019). Neural-symbolic computing: An effective methodology for principled integration of machine learning and reasoning. Journal of Applied Logics, 6(4), pp. 611-632.

Garcez, A., Lamb, L. C. and Gabbay, D. M. (2007). Connectionist modal logic: Representing modalities in neural networks. Theoretical Computer Science, 371(1-2), pp. 34-53. doi: 10.1016/j.tcs.2006.10.023

Garcez, A. and Zaverucha, G. (1999). The connectionist inductive learning and logic programming system. Applied Intelligence Journal, 11(1), pp. 59-77. doi: 10.1023/A:1008328630915

Garcia Ortiz, M. ORCID: 0000-0003-4729-7457 (2017). Sensorimotor Prediction with Neural Networks on Continuous Spaces. Lecture Notes in Computer Science, 10613, pp. 76-83. doi: 10.1007/978-3-319-68600-4_10

García-Magariño, I., Lacuesta, R., Rajarajan, M. and Lloret, J. (2019). Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain. Ad Hoc Networks, 86, pp. 72-82. doi: 10.1016/j.adhoc.2018.11.010

Gashi, I., Sobesto, B., Mason, S., Stankovic, V. and Cukier, M. (2014). A Study of the Relationship Between Antivirus Regressions and Label Changes. 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), pp. 441-450. doi: 10.1109/ISSRE.2013.6698897

Gensler, S., Völckner, F., Liu-Thompkins, Y. and Wiertz, C. (2013). Managing brands in the social media environment. Journal of Interactive Marketing, 27(4), pp. 242-256. doi: 10.1016/j.intmar.2013.09.004

Georgakakis, E., Komninos, N. and Douligeris, C. (2012). NAVI: Novel authentication with visual information. 2012 IEEE Symposium on Computers and Communications (ISCC), pp. 588-595. doi: 10.1109/ISCC.2012.6249360

Gepperth, Alexander R. T., Garcia Ortiz, M. ORCID: 0000-0003-4729-7457, Sattarov, E. and Heisele, B. (2016). Dynamic attention priors: a new and efficient concept for improving object detection. Neurocomputing, 197, pp. 14-28. doi: 10.1016/j.neucom.2016.01.036

Gerson, J., Plagnol, A. and Corr, P. J. (2017). Passive and Active Facebook Use Measure (PAUM): Validation and relationship to the Reinforcement Sensitivity Theory. Personality and Individual Differences, 117, pp. 81-90. doi: 10.1016/j.paid.2017.05.034

Geurs, K. T., Thomas, T., Bijlsma, M. and Douhou, S. (2015). Automatic trip and mode detection with move smarter: First results from the Dutch Mobile Mobility Panel. Transportation Research Procedia, 11, pp. 247-262. doi: 10.1016/j.trpro.2015.12.022

Giannopoulos, P. ORCID: 0000-0002-6261-1961, Bonnet, E. and Lampis, M. (2019). On the Parameterized Complexity of Red-Blue Points Separation. Journal of Computational Geometry, 10(1), pp. 181-206. doi: 10.20382/jocg.v10i1a7

Giaralis, A. and Spanos, P. D. (2010). Effective linear damping and stiffness coefficients of nonlinear systems for design spectrum based analysis. Soil Dynamics and Earthquake Engineering, 30(9), pp. 798-810. doi: 10.1016/j.soildyn.2010.01.012

Giaralis, A. and Spanos, P. D. (2009). Wavelet-based response spectrum compatible synthesis of accelerograms-Eurocode application (EC8). Soil Dynamics and Earthquake Engineering, 29(1), pp. 219-235. doi: 10.1016/j.soildyn.2007.12.002

Gkoktsi, K., Giaralis, A. ORCID: 0000-0002-2952-1171, Klis, R. P., Dertimanis, V. and Chatzi, E. N. (2019). Output-Only Vibration-Based Monitoring of Civil Infrastructure via Sub-Nyquist/Compressive Measurements Supporting Reduced Wireless Data Transmission. Frontiers in Built Environment, 5, 111.. doi: 10.3389/fbuil.2019.00111

Glover, I., Campbell, A., Latif, F., Norris, L., Toner, J. and Tse, C. (2012). A tale of one city: intra-institutional variations in migrating VLE platform. Research in Learning Technology, 20, doi: 10.3402/rlt.v20i0.19190

Gomez, S., Jianu, R., Cabeen, R., Guo, H. and Laidlaw, D. H. (2016). Fauxvea: Crowdsourcing Gaze Location Estimates for Visualization Analysis Tasks. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2016.2532331

Gong, P., Chen, T. and Xu, Q. (2015). ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks. Journal of Sensors, 2015, p. 469793. doi: 10.1155/2015/469793

Gong, P., Xu, Q. and Chen, T. (2014). Energy Harvesting Aware routing protocol for wireless sensor networks. 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 171-176. doi: 10.1109/CSNDSP.2014.6923819

Goodwin, S., Dykes, J., Slingsby, A. and Turkay, C. (2015). Visualizing Multiple Variables Across Scale and Geography. IEEE Transactions on Visualization and Computer Graphics (Proceedings of the Visual Analytics Science and Technology / Information Visualization / Scientific Visualization 2015), 22(1), pp. 599-608. doi: 10.1109/TVCG.2015.2467199

Groce, A., Kulesza, T., Zhang, C., Shamasunder, S., Burnett, M., Wong, W-K, Stumpf, S., Das, S., Shinsel, A., Bice, F. and McIntosh, K. (2014). You are the only possible oracle: Effective test selection for end users of interactive machine learning systems. IEEE Transactions on Software Engineering, 40(3), pp. 307-323. doi: 10.1109/TSE.2013.59

Guan, W., He, J., Tang, Z. and Chen, T. (2013). Design and Evaluation of a Framework for Cooperative and Adaptive QoS Control of DSRC Network for Road Safety Applications. International Journal of Distributed Sensor Networks, 2013(946931), pp. 1-10. doi: 10.1155/2013/946931

Gucunski, N., Slabaugh, G. G., Wang, Z., Fang, T. and Maher, A. (2008). Impact echo data from bridge deck testing: Visualization and interpretation. Transportation Research Record(2050), pp. 111-121. doi: 10.3141/2050-11

Guillame-Bert, M., Broda, K. and Garcez, A. (2010). First-order logic learning in artificial neural networks. International Joint Conference on Neural Networks (IJCNN 2010), doi: 10.1109/IJCNN.2010.5596491

Haefliger, S., Krogh, G. V. and Spaeth, S. (2008). Code Reuse in Open Source Software. Management Science, 54(1), pp. 180-193. doi: 10.1287/mnsc.1070.0748

Hakobyan, L., Lumsden, J. and O'Sullivan, D. (2014). Older Adults with AMD as Co-Designers of an Assistive Mobile Application. International Journal of Mobile Human Computer Interaction, 6(1), pp. 54-70. doi: 10.4018/ijmhci.2014010104

Hall, K., Bradley, A., Hinrichs, U., Huron, S., Wood, J. ORCID: 0000-0001-9270-247X, Collins, C. and Carpendale, S. (2019). Design by immersion: A transdisciplinary approach to problem-driven visualizations. IEEE Transactions on Visualization and Computer Graphics, 26(1),

Hall, K. W., Perin, C., Kusalik, P. G., Gutwin, C. and Carpendale, S. (2016). Formalizing Emphasis in Information Visualization. Computer Graphics Forum, 35(3), pp. 717-737. doi: 10.1111/cgf.12936

Hampshire, T. E., Roth, H. R., Helbren, E., Plumb, A., Boone, D. J., Slabaugh, G. G., Halligan, S. and Hawkes, D. J. (2013). Endoluminal surface registration for CT colonography using haustral fold matching. Medical Image Analysis, 17(8), pp. 946-958. doi: 10.1016/j.media.2013.04.006

Harder, F. and Besold, T. R. ORCID: 0000-0002-8002-0049 (2018). Learning Lukasiewicz logic. Cognitive Systems Research, 47, pp. 42-67. doi: 10.1016/j.cogsys.2017.07.004

Harrow, I., Balakrishnan, R., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Jupp, S., Lomax, J., Reed, J., Romacker, M., Senger, C., Splendiani, A., Wilson, J. and Woollard, P. (2019). Ontology mapping for semantically enabled applications. Drug Discovery Today, doi: 10.1016/j.drudis.2019.05.020

Hatzivasilis, G., Askoxylakis, I. G., Alexandris, G., Anicic, D., Broring, A., Kulkarni, V., Fysarakis, K. and Spanoudakis, G. ORCID: 0000-0002-0037-2600 (2018). The Interoperability of Things: Interoperable solutions as an enabler for IoT and Web 3.0. International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2018, pp. 140-147. doi: 10.1109/CAMAD.2018.8514952

Haynes, D., Bawden, D. and Robinson, L. (2016). A regulatory model for personal data on social networking services in the UK. International Journal of Information Management, 36(6), pp. 872-882. doi: 10.1016/j.ijinfomgt.2016.05.012

He, J., Tang, Z., O'Farrell, T. and Chen, T. (2011). Performance analysis of DSRC priority mechanism for road safety applications in vehicular networks. Wireless Communications and Mobile Computing, 11(7), pp. 980-990. doi: 10.1002/wcm.821

Heitlinger, S. ORCID: 0000-0001-6148-350X and Comber, R. (2018). Design for the Right to the Smart City in More-than-Human Worlds.

Hennig-Thurau, T., Wiertz, C. and Feldhaus, F. (2015). Does Twitter matter? The impact of microblogging word of mouth on consumers' adoption of new movies. Journal of the Academy of Marketing Science, 43(3), pp. 375-394. doi: 10.1007/s11747-014-0388-3

Hervas-Drane, A. and Noam, E. (2017). Peer-to-Peer File Sharing and Cultural Trade Protectionism. Information Economics and Policy, doi: 10.1016/j.infoecopol.2017.08.002

Hilken, T., de Ruyter, K., Chylinski, M., Mahr, D. and Keeling, D. I. (2017). Augmenting the Eye of the Beholder: Exploring the Strategic Potential of Augmented Reality to Enhance Online Service Experiences. Journal of the Academy of Marketing Science, doi: 10.1007/s11747-017-0541-x

Hodge, P., Davies, J., Maiden, N., Mann, B., Nidsjo, A., Simpson, A. and Reynolds, L. M. (2015). StreetWise: A valid ecology for a serious game in a secure forensic mental health setting. Procedia Computer Science, 63, pp. 252-259. doi: 10.1016/j.procs.2015.08.341

Hollis, B. and Maiden, N. (2013). Extending Agile Processes with Creativity Techniques. IEEE Software, 30(5), pp. 78-84. doi: 10.1109/MS.2012.171

Horkoff, J. and Maiden, N. (2015). Supporting creative RE with i∗. CEUR Workshop Proceedings, 1402, pp. 37-42.

Howe, J. M. (2001). Proof search in Lax Logic. Mathematical Structures in Computer Science, 11(4), pp. 573-588. doi: 10.1017/S0960129501003334

Howe, J. M. and King, A. (2000). Abstracting Numeric Constraints with Boolean Functions. Information Processing Letters, 75(1-2), pp. 17-23. doi: 10.1016/S0020-0190(00)00081-8

Howe, J. M. and King, A. (2003). Efficient groundness analysis in Prolog. Theory and Practice of Logic Programming, 3(1), pp. 95-124. doi: 10.1017/S1471068402001485

Howe, J. M. and King, A. (2000). Implementing Groundness Analysis with Definite Boolean Functions. Lecture Notes in Computer Science, 1782, pp. 200-214.

Howe, J. M. and King, A. (2009). Logahedra: A new weakly relational domain. Lecture Notes in Computer Science, 5799, pp. 306-320. doi: 10.1007/978-3-642-04761-9_23

Howe, J. M. and King, A. (2011). A Pearl on SAT Solving in Prolog (extended abstract). ALP Newsletter(3),

Howe, J. M. and King, A. (2012). Polyhedral Analysis using Parametric Objectives. Lecture Notes on Computer Science, 7460, pp. 41-57. doi: 10.1007/978-3-642-33125-1_6

Howe, J. M. and King, A. (2012). A pearl on SAT and SMT solving in Prolog. Theoretical Computer Science, 435, pp. 43-55. doi: 10.1016/j.tcs.2012.02.024

Howe, J. M., King, A. and Lawrence-Jones, C. (2010). Quadtrees as an Abstract Domain. Electronic Notes Theoretical Computer Science, 267(1), pp. 89-100. doi: 10.1016/j.entcs.2010.09.008

Howe, J. M. ORCID: 0000-0001-8013-6941, King, A. and Simon, A. (2018). Incremental closure for systems of two variables per inequality. Theoretical Computer Science, doi: 10.1016/j.tcs.2018.12.001

Howell, S., Tripoliti, E. and Pring, T. (2009). Delivering the Lee Silverman Voice Treatment (LSVT) by web camera: a feasibility study. International Journal of Language & Communication Disorders, 44(3), pp. 287-300. doi: 10.1080/13682820802033968

Hunt, S., Clark, D. and Malacaria, P. (2002). Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science, 59(3), pp. 1-14. doi: 10.1016/S1571-0661(04)00290-7

Hunt, S., Clark, D. and Malacaria, P. (2007). A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3), pp. 321-371.

Iosifidis, P. and Andrews, L. (2019). Regulating the Internet Intermediaries in a Post-Truth World: Beyond media policy?. International Communication Gazette, doi: 10.1177/1748048519828595

Jahromizadeh, S. and Rakocevic, V. (2014). Joint rate control and scheduling for providing bounded delay with high efficiency in multihop wireless networks. IEEE/ACM Transactions on Networking, 22(5), pp. 1686-1698. doi: 10.1109/TNET.2013.2282872

Japunya, T., Jitpakdee, P., Uyyanonvara, B., Aimmanee, P., Philippaki, E., Hull, C. and Barman, S. (2014). Software for the quantification of glistenings in intra-ocular lenses. Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering 2014, WCE 2014, 2-4 July, 2014, London, U.K., pp. 34-38.

Jawaid, M. M., Rajani, R., Liatsis, P., Reyes-Aldasoro, C. C. and Slabaugh, G. G. (2017). A Hybrid Energy Model for Region Based Curve Evolution - Application to CTA Coronary Segmentation. Computer Methods and Programs in Biomedicine, doi: 10.1016/j.cmpb.2017.03.020

Jianu, R. and Alam, S. S. (2017). A Data Model and Task Space for Data of Interest (DOI) Eye-Tracking Analyses. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2017.2665498

Jianu, R. and Laidlaw, D. H. (2013). What Google Maps can do for biomedical data dissemination: examples and a design study. BMC Research Notes, 6, 179.. doi: 10.1186/1756-0500-6-179

Jianu, R., Rusu, A., Hu, Y. and Taggart, D. (2014). How to Display Group Information on Node-Link Diagrams: An Evaluation. IEEE Transactions on Visualization and Computer Graphics, 20(11), pp. 1530-1541. doi: 10.1109/TVCG.2014.2315995

Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Agibetov, A., Samwald, M. and Cross, V. (2018). We divide, you conquer: From large-scale ontology alignment to manageable subtasks with a lexical index and neural embeddings. CEUR Workshop Proceedings, 2288, pp. 13-24.

Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Cuenca Grau, B. and Cross, V. (2018). LogMap family participation in the OAEI2018. CEUR Workshop Proceedings, 2288, pp. 187-191.

Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Grau, B. C., Berlanga, R. and Rebholz-Schuhmann, D. (2011). First steps in the logic-based assessment of post-composed phenotypic descriptions. CEUR Workshop Proceedings, 698,

Jimenez-Ruiz, E., Grau, B. C. and Cross, V. (2017). LogMap family participation in the OAEI 2017. CEUR Workshop Proceedings, 2032,

Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Grau, B. C., Horrocks, I. and Berlanga, R. (2011). Logic-based assessment of the compatibility of UMLS ontology sources.. Journal of Biomedical Semantics, 2(Supp 1), S2. doi: 10.1186/2041-1480-2-S1-S2

Jimenez-Ruiz, E., Hovland, D., Slaughter, L., Håndstad, T. and Waaler, A. (2018). On adopting Ontology Alignment techniques within the Phenotype Acquisition Process. CEUR Workshop Proceedings, 2042,

Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Saveta, T., Zamazal, O., Hertling, S., Röder, M., Fundulaki, I., Ngomo, A. C. N., Sherif, M. A., Annane, A., Bellahsene, Z., Ben Yahia, S., Diallo, G., Faria, D., Kachroudi, M., Khiat, A., Lambrix, P., Li, H., Mackeprang, M., Mohammadi, M., Rybinski, M., Balasubramani, B. S. and Trojahn, C. (2018). Introducing the HOBBIT platform into the Ontology Alignment Evaluation campaign. CEUR Workshop Proceedings, 2288, pp. 49-60.

John, D., Gatzidis, C., Liarokapis, F., Boucouvalas, A. and Brujic-Okretic, V. (2011). Prototyping Expressive 3D Social Worlds. The Open Virtual Reality Journal, 3(1), pp. 1-15.

Jones, K., Konrad, V. and Nickovic, D. (2010). Analog Property Checkers: A Ddr2 Case Study. Formal Methods in System Design, 36(2), pp. 114-130. doi: 10.1007/s10703-009-0085-x

Jones, M., Owen, T., Denisova, A. ORCID: 0000-0002-1497-5808 and Mitchell, S. (2019). Acceptability of a Plasticity Focused Serious Game Intervention for PTSD: A User Requirements Analysis. JMIR Serious Games, 7(2), e11909. doi: 10.2196/11909

Jones, P. R. ORCID: 0000-0001-7672-8397 (2018). QuestPlus: A MATLAB Implementation of the QUEST+ adaptive Psychometric Method. Journal of Open Research Software, 6(27), doi: 10.5334/jors.195

Jones, S., Maiden, N., Manning, S. and Greenwood, J. (2007). Informing the specification of a large-scale socio-technical system with models of human activity. Lecture Notes in Computer Science: Requirements Engineering: Foundation for Software Quality, 4542, pp. 175-189. doi: 10.1007/978-3-540-73031-6_13

Kainz, B., Steinberger, M., Wein, W., Kuklisova-Murgasova, M., Malamateniou, C., Keraudren, K., Torsney-Weir, T., Rutherford, M., Aljabar, P., Hajnal, J. V. and Rueckert, D. (2015). Fast Volume Reconstruction From Motion Corrupted Stacks of 2D Slices. IEEE Transactions on Medical Imaging, 34(9), pp. 1901-1913. doi: 10.1109/TMI.2015.2415453

Kalyvianaki, E., Charalambous, T. and Hand, S. (2014). Adaptive Resource Provisioning for Virtualized Servers Using Kalman Filters. ACM Transactions on Autonomous and Adaptive Systems, 9(2), p. 10. doi: 10.1145/2626290

Kalyvianaki, E., Charalambous, T. and Hand, S. (2010). Resource Provisioning for Multi-Tier Virtualized Server Applications. Computer Measurement Group (CMG) Journal, 126, pp. 6-17.

Kaparias, I., Bell, M. G. H., Bogenberger, K. and Chen, Y. (2007). An approach to time dependence and reliability in dynamic route guidance. Transportation Research Record, 2039, pp. 32-41. doi: 10.3141/2039-04

Kaparias, I., Bell, M. G. H., Chen, Y. and Bogenberger, K. (2007). ICNavS: A tool for reliable dynamic route guidance. IET Intelligent Transport Systems, 1(4), pp. 225-233. doi: 10.1049/iet-its:20060066

Karcanias, N. (2013). Systems of Systems: A Control Theoretic View. 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC),, pp. 1732-1737. doi: 10.1109/SMC.2013.298

Kassem, H. I., Liu, X. and Banerjee, J. R. (2016). Transonic flutter analysis using a fully coupled density based solver for inviscid flow. Advances in Engineering Software, 95, pp. 1-6. doi: 10.1016/j.advengsoft.2016.01.012

Kharlamov, E., Hovland, D., Skjaeveland, M. G., Bilidas, D., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Xiao, G., Soylu, A., Lanti, D., Rezk, M., Zheleznyakov, D., Giese, M., Lie, H., Ioannidis, Y., Kotidis, Y., Koubarakis, M. and Waaler, A. (2017). Ontology Based Data Access in Statoil. Journal of Web Semantics, 44, pp. 3-36. doi: 10.1016/j.websem.2017.05.005

Khiat, A., Yaman, B., Guerrini, G., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599 and Karam, N (2017). Boosting MultiFarm track with Turkish dataset. CEUR Workshop Proceedings, 2032, pp. 215-216.

King, C., Hall, J., Banda, M., Beard, J., Bird, J., Kazembe, P. and Fottrell, E. (2014). Electronic data capture in a rural African setting: evaluating experiences with different systems in Malawi. Global Health Action, 7(1), doi: 10.3402/gha.v7.25878

Klironomos, I., Antona, M., Basdekis, I. and Stephanidis, C. (2006). White Paper: promoting Design for All and e-Accessibility in Europe.. Universal Access in the Information Society, 5(1), pp. 105-119. doi: 10.1007/s10209-006-0021-4

Kloukinas, C., Nakhli, C. and Yovine, S. (2003). A Methodology and Tool Support for Generating Scheduled Native Code for Real-Time Java Applications. Lecture Notes in Computer Science: Embedded Software, 2855, pp. 274-289. doi: 10.1007/978-3-540-45212-6_18

Kloukinas, C. and Ozkaya, M. (2014). Realizable, Connector-Driven Software Architectures for Practising Engineers. Communications in Computer and Information Science, 457, pp. 273-289. doi: 10.1007/978-3-662-44920-2_17

Kloukinas, C. and Spanoudakis, G. (2007). A pattern-driven framework for monitoring security and dependability. Lecture Notes in Computer Science: Trust, Privacy and Security in Digital Business, 4657, pp. 210-218. doi: 10.1007/978-3-540-74409-2_23

Kloukinas, C. and Yovine, S. (2011). A model-based approach for multiple QoS in scheduling: from models to implementation. Automated Software Engineering, 18(1), pp. 5-38. doi: 10.1007/s10515-010-0074-8

Klungre, V. N., Soylu, A., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Kharlamov, E. and Giese, M. (2019). Query Extension Suggestions for Visual Query Systems Through Ontology Projection and Indexing. New Generation Computing, doi: 10.1007/s00354-019-00071-1

Kodagoda, N., Attfield, S., Choudhury, T., Rooney, C., Mapp, G., Nguyen, P., Slabbert, L., Wong, B.L.W., Aiash, M., Zheng, Y., Xu, K. and Lasebae, A. (2014). Concern level assessment: Building domain knowledge into a visual system to support network-security situation awareness. Information Visualization, 13(4), pp. 346-360. doi: 10.1177/1473871613490291

Kotti, M., Benetos, E. and Kotropoulos, C. (2008). Computationally Efficient and Robust BIC-Based Speaker Segmentation. IEEE Transactions on Audio, Speech & Language Processing, 16(5), pp. 920-933. doi: 10.1109/TASL.2008.925152

Kovacevic, A. ORCID: 0000-0002-8732-2242, Stosic, N., Mujic, E. and Smith, I. K. ORCID: 0000-0003-1524-9880 (2007). CFD Integrated Design of Screw Compressors. Engineering Applications of Computational Fluid Mechanics, 1(2), pp. 96-108. doi: 10.1080/19942060.2007.11015185

Krogh, G. V. and Haefliger, S. (2010). Opening up design science: The challenge of designing for reuse and joint development. The Journal of Strategic Information Systems, 19, pp. 232-241. doi: 10.1016/j.jsis.2010.09.008

Krogh, G. V., Haefliger, S., Spaeth, S. and Wallin, M. W. (2012). Carrots and Rainbows: Motivation and Social Practice in Open Source Software Development. MIS Quarterly, 36(2), pp. 649-676.

Krotsiani, M. and Spanoudakis, G. (2014). Continuous certification of non-repudiation in cloud storage services. Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 929-934. doi: 10.1109/TrustCom.2014.122

Krotsiani, M., Spanoudakis, G. and Kloukinas, C. (2015). Monitoring-Based Certification of Cloud Service Security. Lecture Notes in Computer Science, 9415, pp. 644-659. doi: 10.1007/978-3-319-26148-5_44

Kudama, S, Berlanga, R and Jiménez-Ruiz, E ORCID: 0000-0002-9083-4599 (2018). Enriching the Human Phenotype Ontology with inferred axioms from textual descriptions. CEUR Workshop Proceedings, 2042,

Kulesza, T., Stumpf, S., Burnett, M., Wong, W., Riche, Y., Moore, T., Oberst, I., Shinsel, A. and McIntosh, K. (2010). Explanatory debugging: Supporting end-user debugging of machine-learned programs. Proceedings - 2010 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2010, pp. 41-48. doi: 10.1109/VLHCC.2010.15

Kulesza, T., Stumpf, S., Burnett, M., Yang, S., Kwan, I. and Wong, W-K (2013). Too much, too little, or just right? Ways explanations impact end users' mental models. Proceedings of IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC, pp. 3-10. doi: 10.1109/VLHCC.2013.6645235

Kulesza, T., Stumpf, S., Wong, W-K., Burnett, M., Perona, S., Ko, A. and Oberst, I. (2011). Why-Oriented End-User Debugging of Naïve Bayes Text Classification. Transactions on Interactive Intelligent Systems, 1(1), .2. doi: 10.1145/2030365.2030367

Laird, A. R., Riedel, M. C., Okoe, M., Jianu, R., Ray, K. L., Eickhoff, S. B., Smith, S. M., Fox, P. T. and Sutherland, M. T. (2017). Heterogeneous fractionation profiles of meta-analytic coactivation networks. NeuroImage, 149, pp. 424-435. doi: 10.1016/j.neuroimage.2016.12.037

Laramee, R. S., Turkay, C. ORCID: 0000-0001-6788-251X and Joshi, A. (2018). Visualization for Smart City Applications. IEEE Computer Graphics and Applications, 38(5), pp. 36-37. doi: 10.1109/MCG.2018.053491729

Le Goc, M., Perin, C. ORCID: 0000-0002-7324-9363, Follmer, S., Fekete, J-D. and Dragicevic, P. (2019). Dynamic Composite Data Physicalization Using Wheeled Micro-Robots. IEEE Transactions on Visualization and Computer Graphics, 25(1), pp. 737-747. doi: 10.1109/TVCG.2018.2865159

Lee, B., Isaacs, K., Szafir, D. A., Marai, G. E., Turkay, C. ORCID: 0000-0001-6788-251X, Tory, M., Carpendale, S. and Endert, A. (2019). Broadening Intellectual Diversity in Visualization Research Papers. IEEE Computer Graphics and Applications, pp. 78-85. doi: 10.1109/MCG.2019.2914844

Lee, J. J. and Keramati, M. (2017). Flexibility to contingency changes distinguishes habitual and goal-directed strategies in humans. PLoS Computational Biology, 13(9), e1005753. doi: 10.1371/journal.pcbi.1005753

Lekeas, G., Kloukinas, C. and Stathis, K. (2011). Producing Enactable Protocols in Artificial Agent Societies. Lecture Notes in Computer Science: Agents in Principle, Agents in Practice, 7047, pp. 311-322. doi: 10.1007/978-3-642-25044-6_25

Li, F., Nucciarelli, A., Roden, S. and Graham, G. (2016). How Smart Cities Transform Operations Models: A New Research Agenda for Operations Management in the Digital Economy. Production Planning & Control, 27(6), pp. 514-528. doi: 10.1080/09537287.2016.1147096

Li, H., Dragisic, Z., Faria, D., Ivanova, V., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Lambrix, P. and Pesquita, C. (2019). User validation in ontology alignment: functional assessment and impact. Knowledge Engineering Review,

Li, J., Chen, S., Chen, W., Andrienko, G. ORCID: 0000-0002-8574-6295 and Andrienko, N. ORCID: 0000-0003-3313-1560 (2018). Semantics-Space-Time Cube. A Conceptual Framework for Systematic Analysis of Texts in Space and Time. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2018.2882449

Li, J., Chen, S., Zhang, K., Andrienko, G. ORCID: 0000-0002-8574-6295 and Andrienko, N. ORCID: 0000-0003-3313-1560 (2018). COPE: Interactive Exploration of Co-occurrence Patterns in Spatial Time Series.. IEEE Transactions on Visualization and Computer Graph, doi: 10.1109/TVCG.2018.2851227

Li, S., Fairbank, M., Johnson, C., Wunsch, D. C., Alonso, E. and Proano, J. L. (2013). Artificial Neural Networks for Control of a Grid-Connected Rectifier/Inverter Under Disturbance, Dynamic and Power Converter Switching Conditions. IEEE Transactions on Neural Networks and Learning Systems, 25(4), pp. 738-750. doi: 10.1109/TNNLS.2013.2280906

Li, S., Oikonomou, G., Tryfonas, T., Chen, T. and Xu, L. D. (2014). A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things. IEEE Transactions on Industrial Informatics, 10(2), pp. 1461-1468. doi: 10.1109/TII.2014.2306331

Li, S., Won, H., Fu, X., Fairbank, M., Wunsch, D. C. and Alonso, E. ORCID: 0000-0002-3306-695X (2019). Neural-Network Vector Controller for Permanent-Magnet Synchronous Motor Drives: Simulated and Hardware-Validated Results. IEEE Transactions on Cybernetics, doi: 10.1109/TCYB.2019.2897653

Lichtenstein, Y., Finkelstein, L. and Wyss, S. (2018). Aligning flexibility with uncertainty in software development arrangements through a contractual typology. Journal of Global Operations and Strategic Sourcing, 11(1), pp. 2-26. doi: 10.1108/JGOSS-11-2016-0033

Lim, B., Smith, A. and Stumpf, S. ORCID: 0000-0001-6482-1973 (2018). ExSS 2018: Workshop on explainable smart systems. CEUR Workshop Proceedings, 2068,

Littlewood, B., Popov, P. T. and Strigini, L. (2001). Modeling software design diversity. ACM Computer Surveys, 33(2), pp. 177-208. doi: 10.1145/384192.384195

Littlewood, B. and Strigini, L. (2011). “Validation of ultra-high dependability…” – 20 years on. Safety Systems - The Safety-Critical Systems Club Newsletter, 20(3),

Liu, S., Andrienko, G. ORCID: 0000-0002-8574-6295, Wu, Y., Cao, N., Jiang, L., Shi, C., Wang, Y. S. and Hong, S. (2018). Steering data quality with visual analytics: The complexity challenge. Visual Informatics, 2(4), pp. 191-197. doi: 10.1016/j.visinf.2018.12.001

Liu, X. and Banerjee, J. R. (2016). Free vibration analysis for plates with arbitrary boundary conditions using a novel spectral-dynamic stiffness method. Computers and Structures, 164, pp. 108-126. doi: 10.1016/j.compstruc.2015.11.005

Llado, X., Imiya, A., Reyes-Aldasoro, C. C., Mason, D., Aoki, K., Kudo, M., Zhang, Y. and Argyriou, V. (2014). Homage to Professor Maria Petrou. Pattern Recognition Letters, 48, pp. 2-7. doi: 10.1016/j.patrec.2014.06.008

Loizides, F., Buchanan, G. and Mavri, K. (2016). Theory and practice in visual interfaces for semi-structured document discovery and selection. Information Services and Use, 35(4), pp. 259-271. doi: 10.3233/ISU-150783

Loorak, M. H., Perin, C., Kamal, N., Hill, M. A. and Carpendale, S. (2016). TimeSpan: Using Visualization to Explore Temporal Multi-dimensional Data of Stroke Patients.. IEEE Transactions on Visualization and Computer Graphics, 22(1), pp. 409-418. doi: 10.1109/TVCG.2015.2467325

Loorak, M.H., Perin, C., Collins, C. and Carpendale, S. (2017). Exploring the Possibilities of Embedding Heterogeneous Data Attributes in Familiar Visualizations. IEEE Transactions on Visualization and Computer Graphics, 23(1), pp. 581-590. doi: 10.1109/TVCG.2016.2598586

Lu, W., MacFarlane, A. and Venuti, F. (2009). Okapi-based XML indexing. Aslib Proceedings; New Information Perspectives, 61(5), pp. 483-499. doi: 10.1108/00012530910989634

Luzardo, A., Rivest, F., Alonso, E. and Ludvig, E. (2017). A Drift-Diffusion Model of Interval Timing in the Peak Procedure. Journal of Mathematical Psychology, 77, pp. 111-123. doi: 10.1016/j.jmp.2016.10.002

Mabrook, R. and Singer, J. ORCID: 0000-0002-5777-9065 (2019). Virtual Reality, 360⁰ Video, and Journalism Studies: Conceptual Approaches to Immersive Technologies. Journalism Studies, doi: 10.1080/1461670X.2019.1568203

MacFarlane, A. (2007). Evaluation of web search for the information practitioner. Aslib Proceedings; New Information Perspectives, 59(4-5), pp. 352-366. doi: 10.1108/00012530710817573

MacFarlane, A. (2003). On open source IR. Aslib Proceedings; New Information Perspectives, 55(4), pp. 217-222. doi: 10.1108/00012530310486575

MacFarlane, A., Robertson, S. E. and McCann, F. A. (2004). Parallel computing for passage retrieval. Aslib Proceedings; New Information Perspectives, 56(4), pp. 201-211. doi: 10.1108/00012530410549231

MacFarlane, A., Robertson, S. E. and McCann, J. A. (1997). Parallel computing in information retrieval - An updated review. Journal of Documentation, 53(3), pp. 274-315. doi: 10.1108/EUM0000000007201

Mahbub, K. and Spanoudakis, G. (2010). Proactive SLA Negotiation for Service Based Systems. 2010 6th World Congress on Services (SERVICES-1), pp. 519-526. doi: 10.1109/SERVICES.2010.15

Mahbub, K. and Spanoudakis, G. (2011). Proactive SLA negotiation for service based systems: Initial implementation and evaluation experience. Proceedings - 2011 IEEE International Conference on Services Computing, SCC 2011, pp. 16-23. doi: 10.1109/SCC.2011.34

Mahbub, K., Spanoudakis, G. and Zisman, A. (2011). A monitoring approach for runtime service discovery. Automated Software Engineering, 18(2), pp. 117-161. doi: 10.1007/s10515-010-0077-5

Mahmood, A. and Sismeiro, C. S. (2017). Will they come and will they stay? Online Social Networks and news consumption on external websites. Journal of Interactive Marketing, 37, pp. 117-132. doi: 10.1016/j.intmar.2016.10.003

Maiden, N., D'Souza, S., Jones, S., Muller, L., Panesse, L., Pitts, K., Prilla, M., Pudney, K., Rose, M., Turner, I. and Zachos, K. (2013). Computing Technologies for Reflective and Creative Care for People with Dementia. Communications of the ACM, 56(11), pp. 60-67. doi: 10.1145/2500495

Maiden, N., Gizikis, A. and Robertson, S. (2004). Provoking creativity: Imagine what your requirements could be like. IEEE Software, 21(5), pp. 68-75. doi: 10.1109/MS.2004.1331305

Maiden, N., Jones, S., Manning, S., Greenwood, J. and Renou, L. (2004). Model-driven requirements engineering: Synchronising models in an air traffic management case study. Lecture Notes in Computer Science: Advanced Information Systems Engineering, 3084, pp. 368-383. doi: 10.1007/978-3-540-25975-6_27

Maiden, N., Lockerbie, J., Zachos, K., Bertolino, A., Angelis, G. and Lonetti, F. (2014). A Requirements-Led Approach for Specifying QoS-Aware Service Choreographies: An Experience Report.. Lecture Notes in Computer Science, 8396, pp. 239-253. doi: 10.1007/978-3-319-05843-6_18

Maiden, N. ORCID: 0000-0001-6233-8320, Zachos, K., Pitts, K. and Pudney, K. (2018). Evaluating the Use of Daily Care Notes Software for Older People with Dementia. International Journal of Human-Computer Interaction, doi: 10.1080/10447318.2018.1482052

Makri, S ORCID: 0000-0002-5817-4893 and Turner, S (2019). “I can't express my thanks enough”: The “gratitude cycle” in online communities. Journal of the Association for Information Science and Technology, doi: 10.1002/asi.24257

Makri, S. and Blandford, A. (2011). What is Serendipity? - A Workshop Report. Information Research, 16(3), p. 491.

Makri, S., Blandford, A. and Cox, A. L. (2008). Using information behaviors to evaluate the functionality and usability of electronic resources: From Ellis's model to evaluation. Journal of the American Society for Information Science and Technology, 59(14), pp. 2244-2267. doi: 10.1002/asi.20927

Makri, S., Hsueh, T-L. and Jones, S. (2018). Ideation as an intellectual information acquisition and use context: Investigating game designers’ information-based ideation behavior. Journal of the Association for Information Science and Technology, doi: 10.1002/asi.24169

Mamdouhi, H., Khatun, S. and Zarrin, J. (2009). Bluetooth wireless monitoring, managing and control for inter vehicle in vehicular Ad-Hoc networks. Journal of Computer Science, 5(12), pp. 922-929. doi: 10.3844/jcssp.2009.922.929

Mantas, G., Lymberopoulos, D. and Komninos, N. (2012). PKI security in large-scale healthcare networks. Journal of Medical Systems, 36(3), pp. 1107-1116. doi: 10.1007/s10916-010-9573-1

Mantzoukas, K., Kloukinas, C. ORCID: 0000-0003-0424-7425 and Spanoudakis, G. ORCID: 0000-0002-0037-2600 (2018). Monitoring Data Integrity in Big Data Analytics Services. 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp. 904-907. doi: 10.1109/CLOUD.2018.00132

Markova, M.S., Wilson, S. and Stumpf, S. (2012). Tangible user interfaces for learning. International Journal of Technology Enhanced Learning, 4(3-4), pp. 139-155.

Markovic, M., Corsar, D., Asif, W., Edwards, P. and Rajarajan, M. (2018). Towards Transparency of IoT Message Brokers. Lecture Notes in Computer Science, 11017, pp. 200-203. doi: 10.1007/978-3-319-98379-0_19

Markovic, N., Sekula, P., Vander Laan, Z., Andrienko, G. ORCID: 0000-0002-8574-6295 and Andrienko, N. ORCID: 0000-0003-3313-1560 (2018). Applications of Trajectory Data From the Perspective of a Road Transportation Agency: Literature Review and Maryland Case Study. IEEE Transactions on Intelligent Transportation Systems, doi: 10.1109/TITS.2018.2843298

Marshall, J. ORCID: 0000-0002-6589-221X, Devane, N., Edmonds, L., Talbot, R., Wilson, S. ORCID: 0000-0001-6445-654X, Woolf, C. and Zwart, N. (2018). Delivering word retrieval therapies for people with aphasia in a virtual communication environment. Aphasiology, 32(9), pp. 1054-1074. doi: 10.1080/02687038.2018.1488237

Marshall, J., Roper, A., Galliers, J. R., Wilson, S., Cocks, N., Muscroft, S. and Pring, T. (2013). Computer delivery of gesture therapy for people with severe aphasia. Aphasiology, 27(9), pp. 1128-1146. doi: 10.1080/02687038.2013.786803

Mason, J. S., Klippel, A., Bleisch, S., Slingsby, A. and Deitrick, S. (2016). Special issue introduction: Approaching spatial uncertainty visualization to support reasoning and decision making. Spatial Cognition and Computation, 16(2), pp. 97-105. doi: 10.1080/13875868.2016.1138117

Mcbride, C. and Paterson, R. A. (2008). Applicative programming with effects. Journal of Functional Programming, 18(1), pp. 1-13. doi: 10.1017/S0956796807006326

Meng, X. and Spanoudakis, G. (2016). MBotCS: A mobile botnet detection system based on machine learning. Lecture Notes in Computer Science, 9572, pp. 274-291. doi: 10.1007/978-3-319-31811-0_17

Mercea, D. and Bastos, M. T. (2016). Being a Serial Transnational Activist. Journal of Computer-Mediated Communication, 21(2), pp. 140-155. doi: 10.1111/jcc4.12150

Mercea, D. ORCID: 0000-0003-3762-2404 and Levy, H. (2019). Cuing Collective Outcomes on Twitter: A Qualitative Reading of Movement Social Learning. International Journal of Communication,

Mereani, F. and Howe, J. M. ORCID: 0000-0001-8013-6941 (2019). Exact and Approximate Rule Extraction from Neural Networks with Boolean Features. Proceedings of the 11th International Joint Conference on Computational Intelligence,

Metoyer, R., Stumpf, S., Neumann, C., Dodge, J., Cao, J. and Schnabel, A. (2010). Explaining how to play real-time strategy games. Knowledge-Based Systems, 23(4), pp. 295-301. doi: 10.1016/j.knosys.2009.11.006

Meulemans, W., Dykes, J., Slingsby, A., Turkay, C. and Wood, J. (2017). Small Multiples with Gaps. IEEE Transactions on Visualization and Computer Graphics, 23(1), pp. 381-390. doi: 10.1109/TVCG.2016.2598542

Meulemans, W. and Haunert, J-H. (2016). Partitioning Polygons via Graph Augmentation. Lecture Notes in Computer Science, 9927, pp. 18-33. doi: 10.1007/978-3-319-45738-3

Meyer, M. and Dykes, J. ORCID: 0000-0002-8096-5763 (2019). Criteria for Rigor in Visualization Design Study. IEEE Transactions on Visualization and Computer Graphics,

Meyer, M. and Dykes, J. ORCID: 0000-0002-8096-5763 (2018). Reflection on Reflection in Applied Visualization Research Generating Knowledge From Practice. IEEE Computer Graphics and Applications, 38(6), pp. 9-16. doi: 10.1109/MCG.2018.2874523

Mills, C. and Hilberg, E. (2018). The construction of mental health as a technological problem in India. Critical Public Health, doi: 10.1080/09581596.2018.1508823

Milojevic, M. and Rakocevic, V. (2015). Location Aware Data Aggregation for Efficient Message Dissemination in Vehicular Ad Hoc Networks. IEEE Transactions on Vehicular Technology, 64(12), pp. 5575-5583. doi: 10.1109/TVT.2015.2487830

Milonidis, E., Kostarigka, A. and Karcanias, N. (2011). Finite settling time stabilisation: the robust SISO case. International Journal of Control, 84(9), pp. 1521-1532. doi: 10.1080/00207179.2011.611949

Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), pp. 561-592. doi: 10.1007/s11227-012-0831-5

Modi, C., Patel, D., Patel, H., Borisaniya, B., Patel, A. and Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), pp. 42-57. doi: 10.1016/j.jnca.2012.05.003

Mohanty, V., Moliya, D., Hota, C. and Rajarajan, M. (2010). Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection. Intelligence and Security Informatics, 6122, pp. 65-72. doi: 10.1007/978-3-642-13601-6_8

Mohavedi, Y., Cukier, M. and Gashi, I. ORCID: 0000-0002-8017-3184 (2019). Vulnerability Prediction Capability: A Comparison between Vulnerability Discovery Models and Neural Network Models. Computers and Security, doi: 10.1016/j.cose.2019.101596

Mondragon, E. ORCID: 0000-0003-4180-1261, Alonso, E., Fernandez, A. and Gray, J. (2013). An extension of the Rescorla and Wagner Simulator for context conditioning. Computer Methods and Programs in Biomedicine, 110(2), pp. 226-230. doi: 10.1016/j.cmpb.2013.01.016

Mondragon, E. ORCID: 0000-0003-4180-1261, Alonso, E. and Kokkola, N. (2017). Associative Learning Should Go Deep. Trends in Cognitive Science, 21(11), pp. 822-825. doi: 10.1016/j.tics.2017.06.001

Mondragon, E. ORCID: 0000-0003-4180-1261, Gray, J. and Alonso, E. (2013). A Complete Serial Compound Temporal Difference Simulator for Compound stimuli, Configural cues and Context representation. Neuroinformatics, 11(2), pp. 259-261. doi: 10.1007/s12021-012-9172-z

Mondragon, E. ORCID: 0000-0003-4180-1261, Gray, J., Alonso, E., Bonardi, C. and Jennings, D. J. (2014). SSCC TD: A Serial and Simultaneous Configural-Cue Compound Stimuli Representation for Temporal Difference Learning. PLoS One, 9(7), e102469. doi: 10.1371/journal.pone.0102469

Moore, R., Mills, M., Marsham, P. and Corr, P. J. (2017). Group and individual analyses of pre-, peri-, and post-movement related alpha and beta oscillations during a single continuous monitoring task. International Journal of Psychophysiology, 120, pp. 108-117.

Movahedi, Y., Cukier, M., Andongabo, A. and Gashi, I. ORCID: 0000-0002-8017-3184 (2018). Cluster-based Vulnerability Assessment of Operating Systems and Web Browsers. Computing, doi: 10.1007/s00607-018-0663-0

Muggleton, S., Schmid, U., Zeller, C., Tamaddoni-Nezhad, A. and Besold, T. R. ORCID: 0000-0002-8002-0049 (2018). Ultra-Strong Machine Learning: comprehensibility of programs learned with ILP. Machine Learning, doi: 10.1007/s10994-018-5707-3

Naval, S., Laxmi, V., Rajarajan, M., Gaur, M. S. and Conti, M. (2015). Employing Program Semantics for Malware Detection. IEEE Transactions on Information Forensics and Security, 10(12), pp. 2591-2604. doi: 10.1109/TIFS.2015.2469253

Netkachov, O., Popov, P. T. and Salako, K. (2014). Model-based Evaluation of the Resilience of Critical Infrastructures under Cyber Attacks. Lecture Notes in Computer Science, 8985, pp. 231-243. doi: 10.1007/978-3-319-31664-2_24

Netkachova, K. (2012). The model and implementation of Safety Case Cores. Information & Security, 28(2), pp. 286-295.

Netkachova, K. and Bloomfield, R. E. (2016). Security-Informed Safety. Computer, 49(6), pp. 98-102. doi: 10.1109/MC.2016.158

Netkachova, K. and Pokrova, S. V. (2011). Оценка и обеспечение безопасности систем электронного образования на основе веб-сервисов. Бизнес Информ, 6, pp. 183-186.

Ng, K.-C., Weyde, T., Larkin, O., Neubarth, K., Koerselman, T. and Ong, B. (2007). 3d augmented mirror: a multimodal interface for string instrument learning and teaching with gesture support. ICMI '07 Proceedings of the 9th international conference on Multimodal interfaces, pp. 339-345. doi: 10.1145/1322192.1322252

Nguyen, P. ORCID: 0000-0001-5643-0585, Henkin, R. ORCID: 0000-0002-5511-5230, Chen, S., Andrienko, N. ORCID: 0000-0003-3313-1560, Andrienko, G. ORCID: 0000-0002-8574-6295, Thonnard, O. and Turkay, C. ORCID: 0000-0001-6788-251X (2019). VASABI: Hierarchical User Profiles for Interactive Visual User Behaviour Analytics. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2019.2934609

Nguyen, P. ORCID: 0000-0001-5643-0585, Turkay, C. ORCID: 0000-0001-6788-251X, Andrienko, G. ORCID: 0000-0002-8574-6295, Andrienko, N. ORCID: 0000-0003-3313-1560, Thonnard, O. and Zouaoui, J. (2018). Understanding User Behaviour through Action Sequences: from the Usual to the Unusual. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2018.2859969

Nguyen, P., Xu, K., Walker, R. and Wong, B.L.W. (2014). SchemaLine: Timeline visualization for sensemaking. 2014 18th International Conference on Information Visualisation (IV), pp. 225-233. doi: 10.1109/IV.2014.14

Nguyen, P., Xu, K., Walker, R. and Wong, B.L.W. (2016). TimeSets: Timeline visualization with set relations. Information Visualization, 15(3), pp. 253-269. doi: 10.1177/1473871615605347

Nguyen, P., Xu, K., Wheat, A., Wong, B.L.W., Attfield, S. and Fields, B. (2016). SensePath: Understanding the Sensemaking Process Through Analytic Provenance. IEEE Transactions on Visualization and Computer Graphics, 22(1), pp. 41-50. doi: 10.1109/TVCG.2015.2467611

Niedermeyer, F., Steinmetzer, S., Kroll, M. and Schnell, R. (2014). Cryptanalysis of Basic Bloom Filters Used for Privacy Preserving Record Linkage. Journal of Privacy and Condentiality, 6(2), pp. 59-79.

Nokhandan, M. M., Piomelli, U. and Omidyeganeh, M. ORCID: 0000-0002-4140-2810 (2018). Large-eddy and wall-modelled simulations of turbulent flow over two-dimensional river dunes. Physics and Chemistry of the Earth, doi: 10.1016/j.pce.2018.11.004

Nooshin, L. ORCID: 0000-0001-8737-5224 (2018). “Our Angel of Salvation”- Towards an Understanding of Iranian Cyberspace as an Alternative Sphere of Musical Sociality. Ethnomusicology, 62(3), pp. 341-374. doi: 10.5406/ethnomusicology.62.3.0341

Okoe, M., Alam, S. S. and Jianu, R. (2014). A Gaze-enabled Graph Visualization to Improve Graph Reading Tasks. Computer Graphics Forum, 33(3), pp. 251-260. doi: 10.1111/cgf.12381

Okoe, M. and Jianu, R. (2015). GraphUnit: Evaluating Interactive Graph Visualizations Using Crowdsourcing. Computer Graphics Forum, 34(3), pp. 451-460. doi: 10.1111/cgf.12657

Okoe, M., Jianu, R. ORCID: 0000-0002-5834-2658 and Kobourov, S. (2018). Node-link or Adjacency Matrices: Old Question, New Insights. IEEE Transactions on Visualization and Computer Graphics, doi: 10.1109/TVCG.2018.2865940

Okoh, C., Roy, R. ORCID: 0000-0001-5491-7437 and Mehnen, J. (2017). Maintenance Informatics Dashboard Design for Through-life Engineering Services. Procedia CIRP, 59, pp. 166-171. doi: 10.1016/j.procir.2016.09.019

Olteanu Raimond, A. M., Xiao, Y., Liu, J., Chen, T. and Chen, C. L. P. (2013). Nonintrusive tracing in the Internet. Security and Communication Networks, 6(7), pp. 833-843. doi: 10.1002/sec.616

Orfanos, S., Akther, S. F., Abdul-Basit, M., McCabe, R. ORCID: 0000-0003-2041-7383 and Priebe, S. (2017). Using video-annotation software to identify interactions in group therapies for schizophrenia: assessing reliability and associations with outcomes. BMC Psychiatry, 17(1), 65.. doi: 10.1186/s12888-017-1217-2

Ozkaya, M. and Kloukinas, C. (2012). Highly analysable, reusable, and realisable architectural designs with XCD. Communications in Computer and Information Science, 340, pp. 72-79. doi: 10.1007/978-3-642-35267-6_10

Palacios, M., García-Fanjul, J., Tuya, J. and Spanoudakis, G. (2015). Automatic test case generation for WS-Agreements using combinatorial testing. Computer Standards and Interfaces, 38, pp. 84-100. doi: 10.1016/j.csi.2014.10.003

Palacios, M., García-Fanjul, J., Tuya, J. and Spanoudakis, G. (2015). Coverage Based Testing for Service Level Agreements. IEEE Transactions on Services Computing, 8(2), pp. 299-313. doi: 10.1109/TSC.2014.2300486

Palmarini, R., Erkoyuncu, J. A., Roy, R. ORCID: 0000-0001-5491-7437 and Torabmostaedi, H. (2018). A systematic review of augmented reality applications in maintenance. Robotics and Computer-Integrated Manufacturing, 49, pp. 215-228. doi: 10.1016/j.rcim.2017.06.002

Palmarini, R., Fernandez del Amo, I., Bertolino, G., Dini, G., Erkoyuncu, J. A., Roy, R. ORCID: 0000-0001-5491-7437 and Farnsworth, M. (2018). Designing an AR interface to improve trust in Human-Robots collaboration. Procedia CIRP, 70, pp. 350-355. doi: 10.1016/j.procir.2018.01.009

Palmirini, R., Erkoyuncu, J. A. and Roy, R. ORCID: 0000-0001-5491-7437 (2017). An Innovative Process to Select Augmented Reality (AR) Technology for Maintenance. Procedia CIRP, 59, pp. 23-28. doi: 10.1016/j.procir.2016.10.001

Panourgias, N.S., Nandhakumar, J. and Scarbrough, H. (2014). Entanglements of creative agency and digital technology: A sociomaterial study of computer game development. Technological Forecasting and Social Change, 83(1), pp. 111-126. doi: 10.1016/j.techfore.2013.03.010

Panteli, M., Benetos, E. ORCID: 0000-0002-6820-6764 and Dixon, S. (2017). A computational study on outliers in world music. PLOS ONE, 12(12), e0189399. doi: 10.1371/journal.pone.0189399

Papadopoulos, Konstantinos, Gavaises, M., Pantos, I., Katritsis, D. G. and Mitroglou, N. (2016). Derivation of flow related risk indices for stenosed left anterior descending coronary arteries with the use of computer simulations. Medical Engineering & Physics, 38(9), pp. 929-939. doi: 10.1016/j.medengphy.2016.05.016

Papakonstantinou, S. and Brujic-Okretic, V. (2009). Framework for context-aware smartphone applications. The Visual Computer, 25(12), pp. 1121-1132. doi: 10.1007/s00371-009-0391-8

Papoutsakis, A., Sazhin, S., Begg, S., Danaila, I. and Luddens, F. (2018). An efficient Adaptive Mesh Refinement (AMR) algorithm for the Discontinuous Galerkin method: Applications for the computation of compressible two-phase flows. Journal of Computational Physics, 363, pp. 399-427. doi: 10.1016/j.jcp.2018.02.048

Pathan, M. V., Ponnusami, S. A. ORCID: 0000-0002-2143-8971, Pathan, J., Pitisongsawat, R., Erice, B., Petrinic, N. and Tagarielli, V. L. (2019). Predictions of the mechanical properties of unidirectional fibre composites by supervised machine learning. Scientific Reports, 9(1), 13964.. doi: 10.1038/s41598-019-50144-w

Pattni, K., Broom, M. ORCID: 0000-0002-1698-5495 and Rychtar, J. (2018). Evolving multiplayer networks: Modelling the evolution of cooperation in a mobile population. Discrete & Continuous Dynamical Systems - B, 23(5), pp. 1975-2004. doi: 10.3934/dcdsb.2018191

Pawar, P. S., Rajarajan, M., Nair, S. K. and Zisman, A. (2012). Trust Model for Optimized Cloud Services. IFIP Advances in Information and Communication Technology, 374, pp. 97-112. doi: 10.1007/978-3-642-29852-3_7

Pearson, J. and Buchanan, G. (2011). CloudBooks: An infrastructure for reading on multiple devices. Lecture Notes in Computer Science, 6966, pp. 488-492. doi: 10.1007/978-3-642-24469-8_56

Pearson, J., Buchanan, G. and Thimbleby, H. W. (2012). Investigating collaborative annotation on slate PCs. MobileHCI' 12 Proceedings of the 14th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 413-416. doi: 10.1145/2371574.2371637

Pearson, J., Buchanan, G., Thimbleby, H. W. and Jones, M. (2012). The Digital Reading Desk: A lightweight approach to digital note-taking. Interacting with Computers, 24(5), pp. 326-338. doi: 10.1016/j.intcom.2012.03.001

Pearson, J., Robinson, S., Buchanan, G. and Jones, M. (2013). TicQR: Flexible, lightweight linking of paper and digital content using mobile phones. Lecture Notes in Computer Science, 8120, pp. 220-228. doi: 10.1007/978-3-642-40498-6_16

Pereira, S., Cross, V. and Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599 (2017). On partitioning for ontology alignment. CEUR Workshop Proceedings, 1963,

Perin, C., Boy, J. and Vernier, F. (2016). Using Gap Charts to Visualize the Temporal Evolution of Ranks and Scores. IEEE Computer Graphics and Applications, 36(5), pp. 38-49. doi: 10.1109/MCG.2016.100

Perin, C., Dragicevic, P. and Fekete, J. (2014). Revisiting Bertin Matrices: New Interactions for Crafting Tabular Visualizations. IEEE Transactions on Visualization and Computer Graphics, 20(12), pp. 2082-2091. doi: 10.1109/TVCG.2014.2346279

Perin, C., Vuillemot, R. and Fekete, J. (2013). SoccerStories: A Kick-off for Visual Soccer Analysis. IEEE Transactions on Visualization and Computer Graphics, 19(12), pp. 2506-2515. doi: 10.1109/TVCG.2013.192

Perin, C. ORCID: 0000-0002-7324-9363, Vuillemot, R., Stolper, C., Stasko, J., Wood, J. ORCID: 0000-0001-9270-247X and Carpendale, S. (2018). State of the Art of Sports Data Visualization. Computer Graphics Forum, 37(3), pp. 663-686. doi: 10.1111/cgf.13447

Perotti, A., Boella, G. and Garcez, A. (2014). Runtime Verification Through Forward Chaining. Electronic Proceedings in Theoretical Computer Science, 169, pp. 68-81. doi: 10.4204/EPTCS.169.8

Petroulakis, N. E., Askoxylakis, I. G., Traganitis, A. and Spanoudakis, G. (2013). A privacy-level model of user-centric cyber-physical systems. Lecture Notes in Computer Science, 8030, pp. 338-347. doi: 10.1007/978-3-642-39345-7-36

Petroulakis, N. E., Spanoudakis, G. and Askoxylakis, I. G. (2016). Patterns for the design of secure and dependable software defined networks. Computer Networks, 109(1), pp. 39-49. doi: 10.1016/j.comnet.2016.06.028

Petroulakis, N. E., Tragos, E. Z., Fragkiadakis, A. G. and Spanoudakis, G. (2013). A lightweight framework for secure life-logging in smart environments. Information Security Technical Report, 17(3), pp. 58-70. doi: 10.1016/j.istr.2012.10.005

Pinelli, A., Naqavi, I. Z., Piomelli, U. and Favier, J. (2010). Immersed Boundary Method for Generalised Finite Volume and Finite Difference Navier-Stokes Solvers. Journal of Computational Physics, 229(24), pp. 9073-9091. doi: 10.1016/j.jcp.2010.08.021

Pinkel, C., Binnig, C., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Kharlamov, E., May, W., Nikolov, A., Bastinos, A. S., Skjaeveland, M. G., Solimando, A., Taheriyan, M., Heupel, C. and Horrocks, I. (2018). RODI: Benchmarking Relational-to-Ontology Mapping Generation Quality. Semantic Web, 9(1), pp. 25-52.

Pino, L., Mahbub, K. and Spanoudakis, G. (2014). Designing Secure Service Workflows in BPEL. Lecture Notes in Computer Science, 8831, pp. 551-559. doi: 10.1007/978-3-662-45391-9_48

Pino, L. and Spanoudakis, G. (2012). Finding secure compositions of software services: Towards a pattern based approach. 2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops, pp. 1-5. doi: 10.1109/NTMS.2012.6208741

Pino, L., Spanoudakis, G., Fuchs, A. and Guergens, S. (2015). Generating Secure Service Compositions. Lecture Notes in Computer Science, 512, pp. 81-99. doi: 10.1007/978-3-319-25414-2_6

Pino, L., Spanoudakis, G., Krotsiani, M. and Mahbub, K. (2017). Pattern Based Design and Verification of Secure Service Compositions. IEEE Transactions on Services Computing, doi: 10.1109/TSC.2017.2690430

Plebani, P., Cappiello, C., Comuzzi, M., Pernici, B. and Yadav, S. (2012). MicroMAIS: executing and orchestrating Web services on constrained mobile devices. Software: Practice and Experience, 42(9), pp. 1075-1094. doi: 10.1002/spe.1106

Popov, P. T., Netkachov, A. and Salako, K. (2014). Quantification of the Impact of Cyber Attack in Critical Infrastructures. Lecture Notes in Computer Science, 8696, pp. 316-327. doi: 10.1007/978-3-319-10557-4_35

Povyakalo, A. A., Alberdi, E., Strigini, L. and Ayton, P. (2013). How to discriminate between computer-aided and computer-hindered decisions: a case study in mammography. Medical Decision Making, 33(1), pp. 98-107. doi: 10.1177/0272989X12465490

Power, C., Cairns, P., Denisova, A. ORCID: 0000-0002-1497-5808, Papaioannou, T. and Gultroma, R. (2018). Lost at the Edge of Uncertainty: Measuring Player Uncertainty in Digital Games. International Journal of Human-Computer Interaction, doi: 10.1080/10447318.2018.1507161

Procopiou, A., Komninos, N. ORCID: 0000-0003-2776-1283 and Douligeris, C. (2019). ForChaos: Real Time Application DDoS detection using Forecasting and Chaos Theory in Smart Home IoT Network. Wireless Communications and Mobile Computing, 2019, 8469410.. doi: 10.1155/2019/8469410

Puschmann, C. and Bastos, M. T. (2015). How Digital Are the Digital Humanities? An Analysis of Two Scholarly Blogging Platforms. PLoS One, 10(2), e0115035. doi: 10.1371/journal.pone.0115035

Puschmann, C., Bastos, M. T. and Schmidt, J-H. (2017). Birds of a feather petition together? Characterizing e-petitioning through the lens of platform data. Information, Communication & Society, 20(2), pp. 203-220. doi: 10.1080/1369118X.2016.1162828

Qureshi, H. K., Rizvi, S., Saleem, M., Khayam, S. A., Rakocevic, V. and Rajarajan, M. (2013). Evaluation and improvement of CDS-based topology control for wireless sensor networks. Wireless Networks, 19(1), pp. 31-46. doi: 10.1007/s11276-012-0449-9

Qureshi, H. K., Rizvi, S., Saleem, M., Khayam, S. A., Rakocevic, V. and Rajarajan, M. (2011). Poly: A Reliable and Energy Efficient Topology Control Protocol for Wireless Sensor Networks. Computer Communications, 34(10), pp. 1235-1242. doi: 10.1016/j.comcom.2010.12.016

Rahulamathavan, Y., Rajarajan, M. and Phan, R. C. W. (2016). Smart, secure and seamless access control scheme for mobile devices. 2016 IEEE International Conference on Communications, ICC 2016, pp. 1088-1093. doi: 10.1109/ICC.2016.7510837

Rahulamathavan, Y., Sutharsini, K. R., Ray, I. G., Lu, R. and Rajarajan, M. (2019). Privacy-Preserving iVector-Based Speaker Verification. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 27(3), pp. 496-506. doi: 10.1109/TASLP.2018.2882731

Rahulamathavan, Y., Veluru, S., Han, J., Li, F., Rajarajan, M. and Lu, R. (2016). User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. IEEE Transactions on Computers, 65(9), pp. 2939-2946. doi: 10.1109/TC.2015.2510646

Rahulamathavan, Y., Veluru, S., Phan, R. C., Chambers, J. A. and Rajarajan, M. (2014). Privacy-preserving clinical decision support system using gaussian kernel-based classification. IEEE Journal of Biomedical and Health Informatics, 18(1), pp. 56-66. doi: 10.1109/JBHI.2013.2274899

Rajarajan, M. and Yogachandran, R. (2017). Efficient Privacy-Preserving Facial Expression Classification. IEEE Transactions on Dependable and Secure Computing, 14(3), pp. 326-338. doi: 10.1109/TDSC.2015.2453963

Rakocevic, V. (2014). Clustering for networks of moving objects. Lecture Notes in Computer Science, 8611, pp. 70-87. doi: 10.1007/978-3-319-10834-6_5

Randell, R., Wilson, S. and Woodward, P. (2010). Variations and Commonalities in Processes of Collaboration: The Need for Multi-Site Workplace Studies. COMPUTER SUPPORTED COOPERATIVE WORK-THE JOURNAL OF COLLABORATIVE COMPUTING, 20(1-2), pp. 37-59. doi: 10.1007/s10606-010-9127-6

Randell, R., Wilson, S. and Woodward, P. (2011). The importance of the verbal shift handover report: A multi-site case study. International Journal of Medical Informatics, 80(11), pp. 803-812. doi: 10.1016/j.ijmedinf.2011.08.006

Randell, R., Wilson, S., Woodward, P. and Galliers, J. R. (2010). Beyond handover: supporting awareness for continuous coverage. COGNITION TECHNOLOGY & WORK, 12(4), pp. 271-283. doi: 10.1007/s10111-010-0138-3

Recuero, R., Zago, G. and Bastos, M. T. (2014). O discurso dos #ProtestosBR: análise de conteúdo do Twitter. Galáxia (São Paulo), 14(28), pp. 199-216. doi: 10.1590/1982-25542014217911

Recuero, R., Zago, G., Bastos, M. T. and Araujo, R. (2015). Hashtags Functions in the Protests Across Brazil. SAGE Open, 5(2), doi: 10.1177/2158244015586000

Reimers, S. and Stewart, N. (2016). Auditory presentation and synchronization in Adobe Flash and HTML5/JavaScript Web experiments. Behavior Research Methods, 48(3), pp. 897-908. doi: 10.3758/s13428-016-0758-5

Rendon, J. and de Menezes, L. M. (2017). Structural combination of neural network models. 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), pp. 406-413. doi: 10.1109/ICDMW.2016.0064

Reyes-Aldasoro, C. C., Griffiths, M. K., Savas, D. and Tozer, G. M. (2010). CAIMAN: an online algorithm repository for Cancer Image Analysis. Computer Methods and Programs in Biomedicine, 103(2), pp. 97-103. doi: 10.1016/j.cmpb.2010.07.007

Riaz, A., Asad, M., Al-Arif, S. M., Alonso, E. ORCID: 0000-0002-3306-695X, Dima, D. ORCID: 0000-0002-2598-0952, Corr, P. J. ORCID: 0000-0002-7618-0058 and Slabaugh, G. G. (2018). DeepFMRI: And End-to-End Deep Network for Classification of FRMI Data. 2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI 2018), pp. 1419-1422. doi: 10.1109/ISBI.2018.8363838

Rigoli, F. ORCID: 0000-0003-2233-934X, Pezzulo, G., Dolan, R.J. and Friston, K. J. (2017). A Goal-Directed Bayesian Framework for Categorization. Frontiers in Psychology, 8, 408.. doi: 10.3389/fpsyg.2017.00408

Robbins, E., Howe, J. M. and King, A. (2013). Theory propagation and rational-trees. Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming, PPDP 2013, pp. 193-204.

Robbins, E., Howe, J. M. and King, A. (2015). Theory propagation and reification. Science of Computer Programming, 111(1), pp. 3-22. doi: 10.1016/j.scico.2014.05.013

Roper, A. (2014). Accessibility of computer therapy and technology for people with aphasia. ACM SIGACCESS Accessibility and Computing(108), pp. 50-53. doi: 10.1145/2591357.2591366

Roper, A. ORCID: 0000-0001-6950-6294, Grellmann, B., Neate, T., Marshall, J. ORCID: 0000-0002-6589-221X and Wilson, S. ORCID: 0000-0001-6445-654X (2018). Social networking sites: barriers and facilitators to access for people with aphasia. Aphasiology, 32(sup1:), pp. 1176-177. doi: 10.1080/02687038.2018.1486387

Roth, H. R., Hampshire, T. E., McClelland, J. R., Hu, M., Boone, D. J., Slabaugh, G. G., Halligan, S. and Hawkes, D. J. (2012). Inverse Consistency Error in the Registration of Prone and Supine Images in CT Colonography. Lecture Notes in Computer Science, 7029, pp. 1-7. doi: 10.1007/978-3-642-28557-8_1

Roth, H. R., McClelland, J. R., Boone, D. J., Modat, M., Cardoso, M. J., Hampshire, T. E., Hu, M., Punwani, S., Ourselin, S., Slabaugh, G. G., Halligan, S. and Hawkes, D. J. (2011). Registration of the endoluminal surfaces of the colon derived from prone and supine CT colonography. Medical Physics, 38(6), pp. 3077-3089. doi: 10.1118/1.3577603

Russell-Rose, T., Lamantia, J. and Makri, S. (2014). Defining and applying a language for discovery. Lecture Notes in Computer Science, 8382, pp. 3-28. doi: 10.1007/978-3-319-12093-5_1

Saadat Beheshti, S. M. R., Liatsis, P. and Rajarajan, M. (2017). A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer bots. Computers and Security, 70, pp. 596-617. doi: 10.1016/j.cose.2017.08.006

Sacha, D., Al-Masoudi, F., Steinbrecher, M., Schreck, T., Keim, D., Andrienko, G. and Janetzko, H. (2017). Dynamic Visual Abstraction of Soccer Movement. Computer Graphics Forum, 36(3), pp. 305-315. doi: 10.1111/cgf.13189

Sajjad, A., Rajarajan, M., Zisman, A. and Dimitrakos, T. (2015). A scalable and dynamic application-level secure communication framework for inter-cloud services. Future generation computer systems: the international journal of grid computing and escience, 48(July), pp. 19-27. doi: 10.1016/j.future.2015.01.018

Saker, M. ORCID: 0000-0002-7414-2840 and Frith, J. (2018). From hybrid space to dislocated space: Mobile virtual reality and a third stage of mobile media theory. New Media and Society, doi: 10.1177/1461444818792407

Sandoval, R. M., Garcia-Sanchez, A-J., Garcia-Haro, J. and Chen, T. ORCID: 0000-0001-8037-1685 (2018). Optimal Policy Derivation for Transmission Duty-Cycle Constrained LPWAN. IEEE Internet of Things Journal, 5(4), pp. 3114-3125. doi: 10.1109/JIOT.2018.2833289

Sarkar, S., Weyde, T., Garcez, A., Slabaugh, G. G., Dragicevic, S. and Percy, C. (2016). Accuracy and interpretability trade-offs in machine learning applied to safer gambling. CEUR Workshop Proceedings, 1773,

Sathiyanarayanan, M. and Kim, K. S. (2012). Multi-Channel Deficit Round-Robin Scheduling for Hybrid TDM/WDM Optical Networks. 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems, pp. 552-557. doi: 10.1109/ICUMT.2012.6459727

Sathiyanarayanan, M., Turkay, C. ORCID: 0000-0001-6788-251X and Fadahunsi, O (2018). Design and Implementation of Small Multiples Matrix-based Visualisation to Monitor and Compare Email Socio-organisational Relationships. 2018 10th International Conference on Communication Systems & Networks (COMSNETS), pp. 643-648.

Sathiyanarayanan, M. ORCID: 0000-0002-8598-1949, Turkay, C. ORCID: 0000-0001-6788-251X and Fadahunsi, O. (2019). Design of Small Multiples Matrix-based Visualisation to Understand E-mail Socio-organisational Relationships. 2018 10th International Conference on Communication Systems & Networks (COMSNETS), pp. 643-648. doi: 10.1109/COMSNETS.2018.8328288

Schlosser, C., Jones, S. and Maiden, N. (2008). Using a Creativity Workshop to Generate Requirements for an Event Database Application. Lecture Notes in Computer Science: Requirements Engineering: Foundation for Software Quality, 5025, pp. 109-122. doi: 10.1007/978-3-540-69062-7_10

Schrammel, P., Kroening, D., Brain, M. ORCID: 0000-0003-4216-7151, Martins, R., Teige, T. and Bienmüller, T. (2017). Incremental bounded model checking for embedded software. Formal Aspects of Computing, 29(5), pp. 911-931. doi: 10.1007/s00165-017-0419-1

Secker, J. (2008). Social software and libraries: a literature review from the LASSIE project. Program, 42(3), pp. 215-231. doi: 10.1108/00330330810892640

Secker, J. and Lloyd, C. (2008). Libraries, social software and distance learners: the adventures of LASSIE. Health Information on the Internet, 62(1), pp. 6-8.

Secker, J. and Price, G. (2007). Libraries, social software and distance learners: Blog it, tag it, share it!. New Review of Information Networking, 13(1), pp. 39-52. doi: 10.1080/13614570701754536

Shittu, R., Healing, A., Ghanea-Hercock, R., Bloomfield, R. E. and Rajarajan, M. (2015). Intrusion alert prioritisation and attack detection using post-correlation analysis. Computers & Security, 50, pp. 1-15. doi: 10.1016/j.cose.2014.12.003

Shurkhovetskyy, G., Andrienko, N., Andrienko, G. and Fuchs, G. (2017). Data Abstraction for Visualizing Large Time Series. Computer Graphics Forum, doi: 10.1111/cgf.13237

Shvaiko, P., Euzenat, J., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Cheatham, M. and Hassanzadeh, O. (2018). Ontology matching OM-2018. CEUR Workshop Proceedings, 2288, pp. i-ii.

Sigtia, S., Benetos, E., Boulanger-Lewandowski, N., Weyde, T., Garcez, A. and Dixon, S. (2014). A Hybrid Recurrent Neural Network For Music Transcription. CoRR, 14(11), p. 1623.

Simon, A., King, A. and Howe, J. M. (2003). Two variables per linear inequality as an abstract domain. Logic based program synthesis and transformation, 2664, pp. 71-89. doi: 10.1007/3-540-45013-0_7

Singer, J. ORCID: 0000-0002-5777-9065 (2019). Habits of Practice, Habits of Thought. Journalism, 20(1), pp. 135-139. doi: 10.1177/1464884918809248

Siveroni, I., Zisman, A. and Spanoudakis, G. (2010). A UML-based static verification framework for security. Requirements Engineering, 15(1), pp. 95-118. doi: 10.1007/s00766-009-0091-y

Slabaugh, G. G., Asad, M. and Yang, G. (2016). Supervised Partial Volume Effect Unmixing for Brain Tumor Characterization using Multi-voxel MR Spectroscopic Imaging. 2016 IEEE 13th International Symposium on Biomedical Imaging (ISBI), pp. 436-439. doi: 10.1109/ISBI.2016.7493301

Slabaugh, G. G., Culbertson, W. B., Malzbender, T., Stevens, M. R. and Schafer, R. W. (2004). Methods for Volumetric Reconstruction of Visual Scenes. International Journal of Computer Vision, 57, pp. 179-199. doi: 10.1023/B:VISI.0000013093.45070.3b

Slabaugh, G. G., Fang, T., McBagonluri, F., Zouhar, A., Melkisetoglu, R., Xie, H. and Unal, G. B. (2008). 3-D shape modeling for hearing aid design. IEEE Signal Processing Magazine, 25(5), pp. 98-102. doi: 10.1109/MSP.2008.926653

Slabaugh, G. G., Gundry, M., Knapp, K., Asad, M. and Al Arif, S. M. M. R. (2017). Patch-based Corner Detection for Cervical Vertebrae in X-ray Images. Signal Processing: Image Communication, doi: 10.1016/j.image.2017.04.002

Slabaugh, G. G. and Unal, G. B. (2005). Active Polyhedron: Surface Evolution Theory Applied to Deformable Meshes. Computer Vision and Pattern Recognition, 2, pp. 84-91. doi: 10.1109/CVPR.2005.60

Slabaugh, G. G. and Unal, G. B. (2005). Graph cuts segmentation using an elliptical shape prior. Image Processing, 2005. ICIP 2005. IEEE International Conference on, 2, pp. 1222-1225. doi: 10.1109/ICIP.2005.1530282

Slabaugh, G. G., Unal, G. B., Fang, T., Rossignac, J. and Whited, B. Variational Skinning of an Ordered Set of Discrete 2D Balls. Lecture Notes in Computer Science, 4975(2008), pp. 450-461. doi: 10.1007/978-3-540-79246-8_34

Slabaugh, G. G., Unal, G. B., Wels, M., Fang, T. and Rao, B. (2009). Statistical Region-Based Segmentation of Ultrasound Images. Ultrasound in Medicine and Biology, 35(5), pp. 781-795. doi: 10.1016/j.ultrasmedbio.2008.10.014

Slabaugh, G. G., Whited, B., Rossignac, J., Fang, T. and Unal, G. B. (2010). 3D ball skinning using PDEs for generation of smooth tubular surfaces. Computer-Aided Design, 42(1), pp. 18-26. doi: 10.1016/j.cad.2009.03.004

Slabaugh, G. G., Yang, X., Ye, X., Boyes, R, and Beddoe, G. (2010). A Robust and Fast System for CTC Computer-Aided Detection of Colorectal Lesions. Algorithms, 3(1), pp. 21-43. doi: 10.3390/a3010021

Slabaugh, G. G., Ye, X. and Yang, X. (2014). Multilabel region classification and semantic linking for colon segmentation in CT colonography. IEEE Transactions on Biomedical Engineering, 62(3), pp. 948-959. doi: 10.1109/TBME.2014.2374355

Slingsby, A., Dykes, J., Wood, J. and Radburn, R. (2014). Designing an Exploratory Visual Interface to the Results of Citizen Surveys. International Journal of Geographical Information Science, doi: 10.1080/13658816.2014.920845

Slingsby, A. and van Loon, E. (2016). Exploratory Visual Analysis for Animal Movement Ecology. Computer Graphics Forum, 35(3), pp. 471-480. doi: 10.1111/cgf.12923

Smith-Creasey, M., Albalooshi, F. A. and Rajarajan, M. (2018). Continuous face authentication scheme for mobile devices with tracking and liveness detection. Microprocessors and Microsystems, 63, doi: 10.1016/j.micpro.2018.07.008

Soch, J., Haynes, J-D. and Allefeld, C. ORCID: 0000-0002-1037-2735 (2016). How to avoid mismodelling in GLM-based fMRI data analysis: cross-validated Bayesian model selection. NeuroImage, 141, pp. 469-489. doi: 10.1016/j.neuroimage.2016.07.047

Solimando, A., Jimenez-Ruiz, E. and Guerrini, G. (2017). Minimizing conservativity violations in ontology alignments: algorithms and evaluation. Knowledge and Information Systems, 51(3), pp. 775-819. doi: 10.1007/s10115-016-0983-3

Somani, G., Gaur, M. S., Sanghi, D., Conti, M. and Rajarajan, M. (2016). DDoS victim service containment to minimize the internal collateral damages in cloud computing. Computers and Electrical Engineering, doi: 10.1016/j.compeleceng.2016.12.004

Somani, G., Gaur, M. S., Sanghi, D., Conti, M. and Rajarajan, M. (2018). Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. IEEE Transactions on Dependable and Secure Computing, 15(6), doi: 10.1109/TDSC.2017.2763160

Somani, G., Gaur, M. S., Sanghi, D., Conti, M., Rajarajan, M. and Buyya, R. (2017). Combating DDoS attacks in the cloud: Requirements, trends, and future directions. IEEE Cloud Computing, 4(1), pp. 22-32. doi: 10.1109/MCC.2017.14

Soylu, A., Giese, M., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Kharlamov, E., Zheleznyakov, D. and Horrocks, I. (2017). Ontology-based end-user visual query formulation: Why, what, who, how, and which?. Universal Access in the Information Society, 16(2), pp. 435-467. doi: 10.1007/s10209-016-0465-0

Soylu, A., Giese, M., Schlatte, R., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Kharlamov, E., Ozcep, O., Neuenstadt, C. and Brandt, S. (2017). Querying industrial stream-temporal data: An ontology-based visual approach. Journal of Ambient Intelligence and Smart Environments, 9(1), pp. 77-95. doi: 10.3233/AIS-160415

Spaeth, S., Haefliger, S., Krogh, G. V. and Renzl, B. (2008). Communal resources in open source software development. Information Research, 13(1),

Spanos, P. D., Giaralis, A. and Li, J. (2009). Synthesis of accelerograms compatible with the Chinese GB 50011-2001 design spectrum via harmonic wavelets: artificial and historic records. Earthquake engineering and engineering vibration, 8(2), pp. 189-206. doi: 10.1007/s11803-009-9017-4

Spanos, P. D., Giaralis, A. and Politis, N. P. (2007). Time-frequency representation of earthquake accelerograms and inelastic structural response records using the adaptive chirplet decomposition and empirical mode decomposition. Soil Dynamics and Earthquake Engineering, 27(7), pp. 675-689. doi: 10.1016/j.soildyn.2006.11.007

Spanos, P. D., Giaralis, A., Politis, N. P. and Roesset, J. M. (2007). Numerical treatment of seismic accelerograms and of inelastic seismic structural responses using harmonic wavelets. Computer-aided civil and infrastructure design, 22(4), pp. 254-264. doi: 10.1111/j.1467-8667.2007.00483.x

Spanoudakis, G., Kikidis, D., Bibas, A., Katrakazas, P., Koutsouris, D. and Pontopidan, N. H. (2018). Public health policy for management of hearing impairments based on big data analytics: EVOTION at Genesis. 2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE), pp. 525-530. doi: 10.1109/BIBE.2017.00006

Spanoudakis, G. and Zisman, A. (2010). Discovering Services during Service-Based System Design Using UML. IEEE Transactions on Software Engineering, 36(3), pp. 371-389. doi: 10.1109/TSE.2009.88

Spurgin, A. J. and Stupples, D. (2012). Impact of accidents on organizational aspects of nuclear utilities. International Journal of Economics and Management Engineering, 2(4), pp. 132-144.

Starnini, M., Baronchelli, A. and Pastor-Satorras, R. (2017). Effects of temporal correlations in social multiplex networks. Scientific Reports, 7, 8597.. doi: 10.1038/s41598-017-07591-0

Starnini, M., Lepri, B., Baronchelli, A., Barrat, A., Cattuto, C. and Pastor-Satorras, R. (2017). Robust modeling of human contact networks across different scales and proximity-sensing techniques. .,

Stathis, K., Lekeas, G. and Kloukinas, C. (2006). Competence Checking for the Global E-Service Society Using Games. Lecture Notes in Computer Science: Engineering Societies in the Agents World VII, 4457, pp. 384-400. doi: 10.1007/978-3-540-75524-1_22

Stowell, D., Giannoulis, D., Benetos, E., Lagrange, M. and Plumbley, M. D. (2015). Detection and Classification of Acoustic Scenes and Events. IEEE Transactions on Multimedia, 17(10), pp. 1733-1746. doi: 10.1109/TMM.2015.2428998

Strigini, L. and Wright, D. (2014). Bounds on survival probability given mean probability of failure per demand; And the paradoxical advantages of uncertainty. Reliability Engineering and System Safety, 128, pp. 66-83. doi: 10.1016/j.ress.2014.02.004

Stumpf, S. ORCID: 0000-0001-6482-1973 (2019). Horses for courses: Making the case for persuasive engagement in smart systems. Joint Proceedings of the ACM IUI 2019 Workshops, 2327,

Stumpf, S. and McDonnell, J. (2004). An investigation into sharing metadata: "I'm not thinking what you are thinking". Journal of Universal Computer Science, 10(6), pp. 740-748. doi: 10.3217/jucs-010-06-0740

Stumpf, S., Rajaram, V., Li, L., Wong, W-K., Burnett, M., Dietterich, T. G., Sullivan, E. and Herlocker, J. (2009). Interacting meaningfully with machine learning systems: Three experiments. International Journal of Human Computer Studies, 67(8), pp. 639-662. doi: 10.1016/j.ijhcs.2009.03.004

Stumpf, S. ORCID: 0000-0001-6482-1973, Skrebe, S., Aymer, G. and Hobson, J. (2018). Explaining smart heating systems to discourage fiddling with optimized behavior. CEUR Workshop Proceedings, 2068,

Suarez-Tangil, G., Palomar, E., De Fuentes, J. M., Blasco, J. and Ribagorda, A. (2009). Automatic rule generation based on genetic programming for event correlation. Advances in Intelligent and Soft Computing, 63, pp. 127-134. doi: 10.1007/978-3-642-04091-7_16

Sustar, H., Jones, S. and Dearden, A. (2013). Older people as equal partners in creative design. Lecture Notes in Computer Science: Human Factors in Computing and Informatics, 7946 L, pp. 649-656. doi: 10.1007/978-3-642-39062-3_45

Suziedelyte, A. ORCID: 0000-0003-2420-9231 (2012). How does searching for health information on the Internet affect individuals' demand for health care services?. Social Science & Medicine, 75(10), pp. 1828-1835. doi: 10.1016/j.socscimed.2012.07.022

Tahir, S., Ruj, S., Sajjad, A. and Rajarajan, M. (2019). Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment. Computer Communications, 133, pp. 102-114. doi: 10.1016/j.comcom.2018.08.004

Tahir, S., Steponkus, L., Ruj, S., Rajarajan, M. and Sajjad, A. (2018). A parallelized disjunctive query based searchable encryption scheme for big data. Future Generation Computer Systems, doi: 10.1016/j.future.2018.05.048

Tahir, S. F., Ruj, S., Rahulamathavan, Y., Rajarajan, M. and Glackin, C. (2017). A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data. IEEE Transactions on Emerging Topics in Computing, doi: 10.1109/TETC.2017.2737789

Tedeschi, S., Mehnen, J., Tapoglou, N. and Roy, R. ORCID: 0000-0001-5491-7437 (2017). Secure IoT Devices for the Maintenance of Machine Tools. Procedia CIRP, 59, pp. 150-155. doi: 10.1016/j.procir.2016.10.002

Tedeschi, S., Rodrigues, D., Emmanouilidis, C., Erkoyuncu, J. and Roy, R. ORCID: 0000-0001-5491-7437 (2018). A cost estimation approach for IoT modular architectures implementation in legacy systems. Procedia Manufacturing, 19, pp. 103-110. doi: 10.1016/j.promfg.2018.01.015

Ter-Sarkisov, A. and Marsland, S. (2017). K-Bit-Swap: a new operator for real-coded evolutionary algorithms. Soft Computing, 21(20), pp. 6133-6142. doi: 10.1007/s00500-016-2170-6

Tewell, J., O’Sullivan, D., Maiden, N. ORCID: 0000-0001-6233-8320, Lockerbie, J. and Stumpf, S. ORCID: 0000-0001-6482-1973 (2019). Monitoring meaningful activities using small low-cost devices in a smart home. Personal and Ubiquitous Computing, doi: 10.1007/s00779-019-01223-2

Thudt, A. F., Perin, C., Willett, W.C. and Carpendale, S. (2017). Subjectivity in personal storytelling with visualization. Information Design Journal, 23(1), pp. 48-64. doi: 10.175/idj.23.1.07thu

Thurman, N. (2017). Social media, surveillance and news work: On the apps promising journalists a “crystal ball”. Digital Journalism, doi: 10.1080/21670811.2017.1345318

Thurman, N., Moeller, J., Helberger, N. and Trilling, D. (2018). My friends, editors, algorithms, and I: Examining audience attitudes to news selection. Digital Journalism, doi: 10.1080/21670811.2018.1493936

Tidhar, D., Dixon, S., Benetos, E. and Weyde, T. (2014). The temperament police. Early Music, 42(4), pp. 579-590. doi: 10.1093/em/cau101

Toja-Silva, F., Favier, J. and Pinelli, A. (2014). Radial basis function (RBF)-based interpolation and spreading for the immersed boundary method. Computers & Fluids, 105, pp. 66-75. doi: 10.1016/j.compfluid.2014.09.026

Townend, J. (2013). Closed Data: Defamation and Privacy Disputes in England and Wales. Journal of Media Law, 5(1), pp. 31-44. doi: 10.5235/17577632.5.1.31

Tran, S. and Garcez, A. (2014). Low-cost representation for restricted Boltzmann machines. Lecture Notes in Computer Science, 8834, pp. 69-77. doi: 10.1007/978-3-319-12637-1_9

Tranter, R. and Mcgraw, C. (2017). Integrating social media into routine midwifery services: Maternity Direct+. British Journal of Midwifery, 25(7), pp. 458-464. doi: 10.12968/bjom.2017.25.7.458

Tselikis, C., Douligeris, C., Mitropoulos, S., Komninos, N. and Tselikis, G. (2017). Adaptation of a Conference Key Distribution System for the Wireless Ad Hoc Network. 2017 IEEE International Conference on Communications (ICC), doi: 10.1109/ICC.2017.7996339

Tselikis, C., Mitropoulos, S., Komninos, N. and Douligeris, C. (2012). Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack. IEEE Communications Letters, 16(5), pp. 619-621. doi: 10.1109/LCOMM.2012.031912.112484

Tsigritis, T. and Spanoudakis, G. (2013). Assessing the genuineness of events in runtime monitoring of cyber systems. Computers and Security, 38, pp. 76-96. doi: 10.1016/j.cose.2013.03.011

Turkay, C., Filzmoser, P. and Hauser, H. (2011). Brushing dimensions--a dual visual analysis model for high-dimensional data. IEEE Transactions on Visualization and Computer Graphics, 17(12), pp. 2591-2599. doi: 10.1109/TVCG.2011.178

Turkay, C., Kaya, E., Balcisoy, S. and Hauser, H. (2017). Designing Progressive and Interactive Analytics Processes for High-Dimensional Data Analysis. IEEE Transactions on Visualization and Computer Graphics, 23(1), pp. 131-140. doi: 10.1109/TVCG.2016.2598470

Turkay, C., Lundervold, A., Lundervold, A.J. and Hauser, H. (2012). Representative factor generation for the interactive visual analysis of high-dimensional data. IEEE Transactions on Visualization and Computer Graphics, 18(12), pp. 2621-2630. doi: 10.1109/TVCG.2012.256

Turkay, C., Parulek, J., Reuter, N. and Hauser, H. (2011). Interactive visual analysis of temporal cluster structures. Computer Graphics Forum, 30(3), pp. 711-720. doi: 10.1111/j.1467-8659.2011.01920.x

Ul Asad, H. and Jones, K. (2016). Verifying Inevitability of Oscillation in Ring Oscillators Using the Deductive SOS-QE Approach. IEEE Design and Test, 33(5), pp. 35-43. doi: 10.1109/MDAT.2016.2573588

Unal, G. B., Bucher, S., Carlier, S. G., Slabaugh, G. G., Fang, T. and Tanaka, K. (2008). Shape-Driven Segmentation of the Arterial Wall in Intravascular Ultrasound Images. IEEE Transactions on Information Technology in Biomedicine, 12(3), pp. 335-347. doi: 10.1109/TITB.2008.920620

Unal, G. B., Nain, D., Slabaugh, G. G. and Fang, T. (2008). Customized Design of Hearing Aids Using Statistical Shape Learning. Lecture Notes in Computer Science, 5241(2008), pp. 518-526. doi: 10.1007/978-3-540-85988-8_62

Unal, G. B., Nain, D., Slabaugh, G. G. and Fang, T. (2011). Generating shapes by analogies: An application to hearing aid design. Computer-Aided Design, 43, pp. 47-56. doi: 10.1016/j.cad.2010.09.008

Unal, G. B. and Slabaugh, G. G. (2008). Guidewire tracking in x-ray videos of endovascular interventions. 2008 IEEE 16th Signal Processing, Communication and Applications Conference, pp. 1-4. doi: 10.1109/SIU.2008.4632624

Unal, G. B., Yezzi, A. J., Soatto, S. and Slabaugh, G. G. (2007). A Variational Approach to Problems in Calibration of Multiple Cameras.. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(8), pp. 1322-1338. doi: 10.1109/TPAMI.2007.1035

Uus, A., Liatsis, P., Slabaugh, G. G., Anagnostis, A., Roberts, S. and Twist, S. (2016). Trend Deviation Analysis for Automated Detection of Defects in GPR Data for Road Condition Surveys. Proceedings of the 23rd International Conference on Systems, Signals and Image Processing (IWSSIP 2016), doi: 10.1109/IWSSIP.2016.7502765

Valero-Lara, P., Pinelli, A. and Prieto-Matias, M. (2014). Accelerating solid-fluid interaction using Lattice-Boltzmann and Immersed Boundary coupled simulations on heterogeneous platforms. Procedia Computer Science, 29, pp. 50-61. doi: 10.1016/j.procs.2014.05.005

Valero-Lara, P., Pinelli, A. and Prieto-Matias, M. (2014). Fast finite difference Poisson solvers on heterogeneous architectures. Computer Physics Communications Package, 185(4), doi: 10.1016/j.cpc.2013.12.026

Van Delft, B., Hunt, S. and Sands, D. (2015). Very static enforcement of dynamic policies. Lecture Notes in Computer Science, 9036, pp. 32-52. doi: 10.1007/978-3-662-46666-7_3

Van Goethem, A., Meulemans, W., Speckmann, B. and Wood, J. (2014). Exploring curved schematization. IEEE Pacific Visualization Symposium, pp. 1-8. doi: 10.1109/PacificVis.2014.11

Van Goethem, A., Reimer, A., Speckmann, B. and Wood, J. (2014). Stenomaps: Shorthand for shapes. IEEE Transactions on Visualization and Computer Graphics, 20(12), pp. 2053-2062. doi: 10.1109/TVCG.2014.2346274

Van Goethem, A., Staals, F., Loffler, M., Dykes, J. and Speckmann, B. (2017). Multi-Granular Trend Detection for Time-Series Analysis. IEEE Transactions on Visualization and Computer Graphics, 23(1), pp. 661-670. doi: 10.1109/TVCG.2016.2598619

Van Gorp, P. and Comuzzi, M. (2014). Lifelong personal health data and application software via virtual machines in the cloud. IEEE Journal of Biomedical and Health Informatics, 18(1), pp. 36-45. doi: 10.1109/JBHI.2013.2257821

Van Gorp, P., Comuzzi, M., Jahnen, A., Kaymak, U. and Middleton, B. (2014). An open platform for personal health record apps with platform-level privacy protection. Computers in Biology and Medicine, 51, pp. 14-23. doi: 10.1016/j.compbiomed.2014.04.019

Varley, R. A., Cowell, P. E., Dyson, L., Inglis, L., Roper, A. and Whiteside, S. P. (2016). Self-Administered Computer Therapy for Apraxia of Speech. Stroke, 47(3), pp. 822-828. doi: 10.1161/STROKEAHA.115.011939

Velarde, G., Weyde, T. and Meredith, D. (2013). An approach to melodic segmentation and classification based on filtering with the Haar wavelet. Journal of New Music Research, 42(4), pp. 325-345. doi: 10.1080/09298215.2013.841713

Veluru, S., Rahulamathavan, Y., Viswanath, P., Longley, P. and Rajarajan, M. (2013). E-mail address categorization based on semantics of surnames. Proceedings of the 2013 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013, pp. 222-229. doi: 10.1109/CIDM.2013.6597240

Vermeulen, J., Luyten, K., Coninx, K., Marquardt, N. and Bird, J. (2015). Proxemic Flow: Dynamic Peripheral Floor Visualizations for Revealing and Mediating Large Surface Interactions. Human-Computer Interaction – INTERACT 2015. Lecture Notes in Computer Science, 9299, pp. 264-281. doi: 10.1007/978-3-319-22723-8_22

Villar, A., Callegaro, M. and Yang, Y. (2013). Where Am I? A Meta-Analysis of Experiments on the Effects of Progress Indicators for Web Surveys. Social Science Computer Review, 31(6), pp. 744-762. doi: 10.1177/0894439313497468

Von Landesberger, T., Brodkorb, F., Roskosch, P., Andrienko, N., Andrienko, G. and Kerren, A. (2016). MobilityGraphs: Visual Analysis of Mass Mobility Dynamics via Spatio-Temporal Graphs and Clustering. IEEE Transactions on Visualization and Computer Graphics, 22(1), pp. 11-20. doi: 10.1109/TVCG.2015.2468111

Vouros, G., Doulkeridis, C., Santipantakis, G., Vlachou, A., Pelekis, N., Georgiou, H., Theodoridis, Y., Patroumpas, K., Alevizos, E., Artikis, A., Fuchs, G., Mock, M., Andrienko, G. ORCID: 0000-0002-8574-6295, Andrienko, N. ORCID: 0000-0003-3313-1560, Ray, C., Claramunt, C., Camossi, E., Jousselme, A-L., Scarlatti, D. and Cordero, J. M. (2018). Big data analytics for time critical maritime and aerial mobility forecasting. Advances in Database Technology - EDBT, 2018, pp. 612-623. doi: 10.5441/002/edbt.2018.71

Vouros, G., Vlachou, A., Santipantakis, G., Doulkeridis, C., Pelekis, N., Georgiou, H., Theodoridis, Y., Patroumpas, K., Alevizos, E., Artikis, A., Fuchs, G., Mock, M., Andrienko, G. ORCID: 0000-0002-8574-6295, Andrienko, N. ORCID: 0000-0003-3313-1560, Claramunt, C., Ray, C., Camossi, E. and Jousselme, A-L. (2018). Increasing maritime situation awareness via trajectory detection, enrichment and recognition of events. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10819, pp. 130-140. doi: 10.1007/978-3-319-90053-7_13

Vrotsou, K., Janetzko, H., Navarra, C., Fuchs, G., Spretke, D., Mansmann, F., Andrienko, N. and Andrienko, G. (2015). SimpliFly: A Methodology for Simplification and Thematic Enhancement of Trajectories.. IEEE Transactions on Visualization and Computer Graphics, 21(1), pp. 107-121. doi: 10.1109/TVCG.2014.2337333

Vuillemot, R. and Perin, C. (2016). Sports Tournament Predictions Using Direct Manipulation. IEEE Computer Graphics and Applications, 36(5), pp. 62-71. doi: 10.1109/MCG.2016.90

Walker, S., Mercea, D. ORCID: 0000-0003-3762-2404 and Bastos, M. T. ORCID: 0000-0003-0480-1078 (2019). The Disinformation Landscape and the Lockdown of Social Platforms. Information, Communication and Society, 22(11), pp. 1531-1543. doi: 10.1080/1369118X.2019.1648536

Wan, S., Li, D., Gao, J., Roy, R. ORCID: 0000-0001-5491-7437 and Tong, Y. (2017). Process and knowledge management in a collaborative maintenance planning system for high value machine tools. Computers in Industry, 84, doi: 10.1016/j.compind.2016.11.002

Wang, J., Erkoyuncu, J. A. and Roy, R. ORCID: 0000-0001-5491-7437 (2018). A Conceptual Design for Smell Based Augmented Reality: Case Study in Maintenance Diagnosis. Procedia CIRP, 78, pp. 109-114. doi: 10.1016/j.procir.2018.09.067

Waqas, A., Farooq, F., Raza, M., Javed, S. T., Khan, S., Ghumman, M. E., Naveed, S. and Haddad, M. (2017). Validation of the Internet Addiction Test in Students at a Pakistani Medical and Dental School. Psychiatric Quarterly, doi: 10.1007/s11126-017-9528-5

Weerasinghe, D., Rajarajan, M., Elmufti, K. and Rakocevic, V. (2008). Patient privacy protection using anonymous access control techniques. Methods of Information in Medicine, 47(3), pp. 235-240. doi: 10.3414/ME9116

Weller, P., Rakhmetova, L., Ma, Q. and Mandersloot, G. (2010). Evaluation of a wearable computer system for telemonitoring in a critical environment. Personal and Ubiquitous Computing, 14(1), pp. 73-81. doi: 10.1007/s00779-009-0231-x

Weyde, T. ORCID: 0000-0001-8028-9905 and Kopparti, R. M. (2019). Modelling Identity Rules with Neural Networks. Journal of Applied Logics, 6(4), pp. 745-769.

Weyde, T., Slabaugh, G. G., Fontaine, G. and Bederna, C. (2013). Predicting aquaplaning performance from tyre profile images with machine learning. Lecture Notes in Computer Science, 7950 L, pp. 133-142. doi: 10.1007/978-3-642-39094-4_16

White, P. and Roudsari, A. (2015). Conceptual analysis of a diverse set of healthcare quality indicators. Studies in Health Technolology & Informatics, 208, pp. 347-351. doi: 10.3233/978-1-61499-488-6-347

Whited, B., Rossignac, J., Slabaugh, G. G., Fang, T. and Unal, G. B. (2009). Pearling: Stroke segmentation with crusted pearl strings. Pattern Recognition and Image Analysis, 19(2), pp. 277-283. doi: 10.1134/S1054661809020102

Wieszok, Z., Aouf, N., Kechagias-Stamatis, O. and Chermak, L. (2017). Stixel Based Scene Understanding for Autonomous Vehicles. 2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC), pp. 43-49. doi: 10.1109/ICNSC.2017.8000065

Wilk, S., O'Sullivan, D., Kezadri-Hamiaz, M., Kuziemsky, C., Rosu, D., Michalowski, W. and Fung-Kee-Fung, M. (2016). Aligning Interdisciplinary Healthcare Team Behavior with Workflow Execution: An Example of a Radical Prostatectomy Workflow. 2016 IEEE 29th International Symposium on Computer-Based Medical Systems (CBMS), doi: 10.1109/CBMS.2016.62

Williams, L. J., Mukherjee, D., Fisher, M., Reyes-Aldasoro, C. C., Akerman, S., Kanthou, C. and Tozer, G. M. (2014). An in vivo role for Rho kinase activation in the tumour vascular disrupting activity of combretastatin A-4 3-O-phosphate. British Journal of Pharmacology, 171(21), pp. 4902-4913. doi: 10.1111/bph.12817

Wilson, S., Galliers, J. R. and Fone, J. (2007). Cognitive artifacts in support of medical shift handover: An in use, in situ evaluation. International Journal of Human-Computer Interaction, 22(1-2), pp. 59-80. doi: 10.1080/10447310709336955

Wilson, S., Roper, A., Marshall, J., Galliers, J. R., Devane, N., Booth, T. and Woolf, C. (2015). Codesign for People with Aphasia Through Tangible Design Languages. CoDesign, 11(1), pp. 21-34. doi: 10.1080/15710882.2014.997744

Wood, J. ORCID: 0000-0001-9270-247X, Kachkaev, A. and Dykes, J. ORCID: 0000-0002-8096-5763 (2018). Design Exposition with Literate Visualization. IEEE Transactions on Visualization and Computer Graphics, 25(1), doi: 10.1109/TVCG.2018.2864836

Xu, K., Attfield, S., Jankun-Kelly, T. J., Wheat, A., Nguyen, P. and Selvaraj, N. (2015). Analytic provenance for sensemaking: A research agenda. IEEE Computer Graphics and Applications, 35(3), pp. 56-64. doi: 10.1109/MCG.2015.50

Xu, Q., Chen, T., Hu, Y. and Gong, P. (2014). Write Pattern Format Algorithm for Reliable NAND-Based SSDs. IEEE Transactions on Circuits and Systems II: Express Briefs, 61(7), pp. 516-520. doi: 10.1109/TCSII.2014.2327332

Xu, Q., Gong, P. and Chen, T. (2014). Concatenated LDPC-TCM coding for reliable storage in multi-level flash memories. 2014 9th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 166-170. doi: 10.1109/CSNDSP.2014.6923818

Xu, Q., Gong, P., Chen, T., Michael, J. and Li, S. (2015). Modelling and characterization of NAND flash memory channels. Measurement, 70, pp. 225-231. doi: 10.1016/j.measurement.2015.04.003

Yamaguchi, T., Brain, M. ORCID: 0000-0003-4216-7151, Ryder, C., Imai, Y. and Kawamura, Y. (2019). Application of Abstract Interpretation to the Automotive Electronic Control System. Lecture Notes in Computer Science (VMCAI 2019: Verification, Model Checking, and Abstract Interpretation), 11388, pp. 425-445. doi: 10.1007/978-3-030-11245-5_20

Yang, X., Beddoe, G. and Slabaugh, G. G. (2011). Learning to Detect 3D Rectal Tubes in CT Colonography Using a Global Shape Model. Lecture Notes in Computer Science, 6668, pp. 53-59. doi: 10.1007/978-3-642-25719-3_8

Yang, X. and Slabaugh, G. G. (2011). A robust and efficient approach to detect 3D rectal tubes from CT colonography. Medical Physics, 38(11), p. 6238. doi: 10.1118/1.3654842

Yang, X., Tek, B., Beddoe, G. and Slabaugh, G. G. (2010). Feature Selection for Computer-Aided Polyp Detection using MRMR. SPIE Proceedings, 7624, doi: 10.1117/12.844165

Ye, X., Beddoe, G. and Slabaugh, G. G. (2010). Automatic Graph Cut Segmentation of Lesions in CT Using Mean Shift Superpixels. International Journal of Biomedical Imaging (IJBI), 2010, p. 983963. doi: 10.1155/2010/983963

Ye, X., Beddoe, G. and Slabaugh, G. G. (2011). A Bayesian Approach for False Positive Reduction in CTC CAD. Lecture Notes in Computer Science, 6668, pp. 40-46. doi: 10.1007/978-3-642-25719-3_6

Ye, X., Lin, X., Dehmeshki, J., Slabaugh, G. G. and Beddoe, G. (2009). Shape-Based Computer-Aided Detection of Lung Nodules in Thoracic CT Images. IEEE Transactions on Biomedical Engineering, 56(7), pp. 1810-1820. doi: 10.1109/TBME.2009.2017027

Ye, X., Siddique, M., Douiri, A., Beddoe, G. and Slabaugh, G. G. (2009). Image segmentation using joint spatial-intensity-shape features: Application to CT lung nodule segmentation. Progress in Biomedical Optics and Imaging - Proceedings of SPIE, 7259, 72594V. doi: 10.1117/12.811151

Yu, S., Dong, H., Yang, G., Slabaugh, G. G., Dragotti, P. L., Ye, X., Liu, F., Arridge, S., Keegan, J., Firmin, D. and Guo, Y. (2017). Deep De-Aliasing for Fast Compressive Sensing MRI. IEEE Transactions on Medical Imaging,

Zachos, K. and Maiden, N. (2008). Inventing Requirements from Software: An Empirical Investigation with Web Services. Proceedings of the 16th IEEE International Requirements Engineering Conference, pp. 145-154. doi: 10.1109/RE.2008.39

Zachos, K., Maiden, N., Pitts, K., Jones, S., Turner, I., Rose, M., Pudney, K. and MacManus, J. (2013). Digital Creativity in Dementia Care Support. International Journal of Creative Computing, 1(1), pp. 35-56. doi: 10.1504/IJCRC.2013.056924

Zachos, K., Maiden, N., Zhu, X. and Jones, S. (2007). Discovering web services to specify more complete system requirements. Lecture Notes in Computer Science: Advanced Information Systems Engineering, 4495, pp. 142-157. doi: 10.1007/978-3-540-72988-4_11

Zaidi, K. and Rajarajan, M. (2015). Vehicular Internet: Security & Privacy Challenges and Opportunities. Future Internet, 7, pp. 257-275. doi: 10.3390/fi7030257

Zarras, A., Kloukinas, C. and Issarny, V. (2003). Quality Analysis of Dependable Systems: A Developer Oriented Approach. Lecture Notes in Computer Science: Architecting Dependable Systems, 2677, pp. 197-218. doi: 10.1007/3-540-45177-3_9

Zarrin, J., Aguiar, R. L. and Barraca, J. P. (2014). A Self-organizing and Self-configuration Algorithm for Resource Management in Service-oriented Systems. 2014 IEEE Symposium on Computers and Communications (ISCC), 6912524.. doi: 10.1109/ISCC.2014.6912524

Zhao, X., Littlewood, B., Povyakalo, A. A., Strigini, L. and Wright, D. (2017). Modeling the probability of failure on demand (pfd) of a 1-out-of-2 system in which one channel is “quasi-perfect”. Reliability Engineering & System Safety, 158, pp. 230-245. doi: 10.1016/j.ress.2016.09.002

Zhao, Y., Tinsley, L., Addepalli, S., Mehnen, J. and Roy, R. ORCID: 0000-0001-5491-7437 (2016). A coefficient clustering analysis for damage assessment of composites based on pulsed thermographic inspection. NDT & E International, 83, pp. 59-67. doi: 10.1016/j.ndteint.2016.06.003

Zhou, Q., Feng, Z. and Benetos, E. (2019). Adaptive Noise Reduction for Sound Event Detection Using Subband-Weighted NMF. Sensors (Basel), 19(14), 3206.. doi: 10.3390/s19143206

Zhu, R., Wang, Z., Sogi, N., Fukui, K. and Xue, J-H. (2019). A Novel Separating Hyperplane Classification Framework to Unify Nearest-class-model Methods for High-dimensional Data. IEEE Transactions on Neural Networks and Learning Systems,

Zisman, A., Spanoudakis, G., Dooley, J. and Siveroni, I. (2013). Proactive and reactive runtime service discovery: a framework and its evaluation. IEEE Transactions on Software Engineering, 39(7), doi: 10.1109/TSE.2012.84

d'Avila Garcez, A. S., Gabbay, D. M. and Lamb, L. C. (2014). A neural cognitive model of argumentation with application to legal inference and decision making. Journal of Applied Logic, 12(2), pp. 109-127. doi: 10.1016/j.jal.2013.08.004

de Rooij, A., Broekens, J. and Lamers, M. F. (2013). Abstract expressions of affect. International Journal of Synthetic Emotions, 4(1), doi: 10.4018/jse.2013010101

de Valk, R. and Weyde, T. (2015). Bringing 'Musicque into the tableture': machine-learning models for polyphonic transcription of 16th-century lute tablature. Early Music, 43(4), pp. 563-576. doi: 10.1093/em/cau102

del Amo, I. F., Erkoyuncu, J. A., Roy, R. ORCID: 0000-0001-5491-7437, Palmarini, R. and Onoufriou, D. (2018). A systematic review of Augmented Reality content-related techniques for knowledge transfer in maintenance applications. Computers in Industry, 103, pp. 47-71. doi: 10.1016/j.compind.2018.08.007

del Amo, I. F., Galeotti, E., Palmarini, R., Dini, G., Erkoyuncu, J. and Roy, R. ORCID: 0000-0001-5491-7437 (2018). An innovative user-centred support tool for Augmented Reality maintenance systems design: a preliminary study. Procedia CIRP, 70, pp. 362-367. doi: 10.1016/j.procir.2018.02.020

van Goethem, D.A., Haverkort, H., Meulemans, W., Reimer, A., Speckmann, B. and Wood, J. (2014). Automatic schematization with curved lines. Geo-Info, 2014(2), pp. 10-13.

van Laer, T., Feiereisen, S. and Visconti, L. M. (2019). Storytelling in the Digital Era: Relevant Moderators of the Narrative Transportation Effect. Journal of Business Research, 96, pp. 135-146. doi: 10.1016/j.jbusres.2018.10.053

Book Section

Abufadel, A., Slabaugh, G. G., Unal, G. B., Zhang, L. and Odry, B. (2006). Interacting Active Rectangles for Estimation of Intervertebral Disk Orientation. In: 18th International Conference on Pattern Recognition, 2006. ICPR 2006. (pp. 1013-1016). IEEE Computer Society. ISBN 0-7695-2521-0

Al Arifi, S. M. M. R., Asad, M., Knapp, K., Gundry, M. and Slabaugh, G. G. (2015). Cervical Vertebral Corner Detection using Haar-like Features and Modified Hough Forest. In: 2015 International Conference on Image Processing Theory, Tools and Applications. (pp. 417-422). IEEE. ISBN 978-1-4799-8636-1

Algaith, A., Gashi, I., Sobesto, B., Cukier, M., Haxhijaha, S. and Bajrami, G. (2016). Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors. In: 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop. (pp. 48-53). IEEE. ISBN 978-1-5090-3688-2

Alonso, E. (2014). Actions and Agents. In: Frankish, K. and Ramsey, W. (Eds.), The Cambridge Handbook of Artificial Intelligence. (pp. 232-246). UK: Cambridge University Press. ISBN 9781139046855

Alonso, E. and Mondragon, E. ORCID: 0000-0003-4180-1261 (2010). Computational models of learning and beyond: Symmetries of associative learning. In: Computational Neuroscience for Advancing Artificial Intelligence: Models, Methods and Applications. (pp. 316-332). IGI Global. ISBN 9781609600211

Asad, M. and Slabaugh, G. G. (2014). Hand Orientation Regression Using Random Forest for Augmented Reality. In: DePaolis, L.T. and Mongelli, A. (Eds.), Augmented and Virtual Reality. AVR 2014. Lecture Notes in Computer Science, 8853. (pp. 159-174). Berlin, Germany: Springer Verlag. ISBN 978-3-319-13968-5

Baronchelli, A., Dall'Asta, L., Barrat, A. and Loreto, V. (2006). Strategies for fast convergence in semiotic dynamic. In: Rocha, L. M. (Ed.), Artificial Life X: Proceedings of the Tenth International Conference on the Simulation and Synthesis of Living Systems. (pp. 480-485). Cambridge, MA, US: The MIT Press. ISBN 9780262681629

Baronchelli, A., Gong, T., Loreto, V. and Puglisi, A. (2010). On the origin of universal categorization patterns: an in-silica experiment. In: Smith, A. D. M., Schouwstra, M. and de Boer, B. (Eds.), The Evolution of Language. (pp. 365-366). USA: World Scientific. ISBN 9814295221

Bibas, A., Spanoudakis, G., Bellos, C., Fotiadis, D. I. and Koutsouris, D. (2013). Biologically Inspired Near Extinct System Reconstruction. In: 2013 IEEE 13th International Conference on Bioinformatics and Bioengineering (BIBE). (p. 14026394). IEEE.

Bishop, P. G., Bloomfield, R. E., Clement, T., Guerra, S. and Jones, C. (2003). Integrity static analysis of COTS/SOUP. In: Anderson, S. O., Felici, M. and Littlewood, B. (Eds.), Knowledge-Based Intelligent Information and Engineering Systems 7th INternational Conference, KES 2003, Oxford, UK, September 2003. Proceedings, Part I. Lecture Notes in Computer Science, 2788. (pp. 63-76). London, UK: Springer.

Bishop, P. G., Bloomfield, R. E., Guerra, S. and Thuy, N. (2012). Safety justification frameworks: Integrating rule-based, goal-based and risk-informed approaches. In: 8th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies 2012, NPIC and HMIT 2012: Enabling the Future of Nuclear Energy. (pp. 1283-1290). Illinois, USA: American Nuclear Society. ISBN 9781627480154

Blandford, A., Furniss, D. and Makri, S. (2016). Introduction: Behind the scenes. In: Blandford, A., Furniss, D. and Makri, S. (Eds.), Qualitative HCI Research: Going Behind the Scenes. (pp. 1-6). USA: Morgan and Claypool Publishers. ISBN 9781627057592

Boyes, R., Slabaugh, G. G. and Beddoe, G. (2009). Fast pseudo-enhancement correction in CT colonography using linear shift-invariant filters. In: 16th IEEE International Conference on Image Processing (ICIP), 2009. (pp. 2509-2512). IEEE. ISBN 9781424456536

Buchanan, G., McKay, D. and Levitt, J. (2015). Where My Books Go: Choice and Place in Digital Reading. In: JCDL '15 Proceedings of the 15th ACM/IEEE-CS Joint Conference on Digital Libraries. (pp. 17-26). NY, USA: ACM. ISBN 978-1-4503-3594-2

Cecchinato, M.E., Cox, A. L. and Bird, J. (2015). Smartwatches: The good, the bad and the Ugly? In: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. (pp. 2133-2138). New York, NY, United States: ACM. ISBN 9781450331463

Cherla, S., Weyde, T., Garcez, A. and Pearce, M. (2013). A Distributed Model For Multiple-Viewpoint Melodic Prediction. In: de Souza Britto Jr, A., Gouyon, F. and Dixon, S. (Eds.), Proceedings of the 14th International Society for Music Information Retrieval Conference. (pp. 15-20). International Society for Music Information Retrieval. ISBN 978-0-615-90065-0

Collins, E. I. M., Cox, A. L., Bird, J. and Harrison, D. (2014). Social networking use and RescueTime: The issue of engagement. In: UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. (pp. 687-690). New York, NY, United States: Association for Computing Machinery (ACM). ISBN 978-1-4503-3047-3

Comuzzi, M., Kotsokalis, C., Spanoudakis, G. and Yahyapour, R. (2009). Establishing and Monitoring SLAs in complex Service Based Systems. In: Damiani, E., Zhang, J. and Chang, R. (Eds.), 2009 IEEE International Conference on Web Services. Los Alamitos, California, I & II. (pp. 783-790). IEEE. ISBN 9780769537092

Comuzzi, M. and Spanoudakis, G. (2009). A Framework for Hierarchical and Recursive Monitoring of Service Based Systems. In: Sasaki, H., Bellot, G. O., Ehmann, M. and Dini, O. (Eds.), Fourth International Conference on Internet and Web Applications and Services, 2009. ICIW '09. (pp. 383-388). IEEE. ISBN 978-1-4244-3851-8

Cooper, G. ORCID: 0000-0003-2367-8626 (2012). Facing up to the ethical issues surrounding Facebook use. In: Keeble, R. and Mair, J. (Eds.), The Phone Hacking Scandal: Journalism on Trial. (pp. 250-262). Bury St Edmunds: Abramis. ISBN 9781845495565

Culbertson, W. B., Malzbender, T. and Slabaugh, G. G. (2000). Generalized Voxel Coloring. In: Triggs, B., Zisserman, A. and Szeliski, R. (Eds.), Vision Algorithms: Theory and Practice. (pp. 100-115). Springer. ISBN 3-540-67973-1

Curran, W., Moore, T., Kulesza, T., Wong, W-K, Todorovic, S., Stumpf, S., White, R. and Burnett, M. (2012). Towards recognizing "cool": can end users help computer vision recognize subjective attributes of objects in images? In: Duarte, C., Carriço, L., Jorge, J. A., Oviatt, S. L. and Gonçalves, D. (Eds.), Proceedings of the 2012 ACM international conference on Intelligent User Interfaces. (pp. 285-288). New York: ACM. ISBN 978-1-4503-1048-2

Denisova, A., Guckelsberger, C. and Zendle, D. (2017). Challenge in Digital Games: Towards Developing a Measurement Tool. In: Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems. (pp. 2511-2519). New York, USA: ACM Press. ISBN 9781450346566

Dinh, H. Q., Turk, G. and Slabaugh, G. G. (2001). Reconstructing Surfaces Using Anisotropic Basis Functions. In: Eighth IEEE International Conference on Computer Vision, 2001. ICCV 2001. Proceedings. (pp. 606-613). IEEE. ISBN 0769511430

Diplaris, S., Papadopoulos, S., Kompatsiaris, I., Goker, A. S., MacFarlane, A., Spangenberg, J., Hacid, H., Maknavicius, L. and Klusch, M. (2012). SocialSensor: Sensing User Generated Input for Improved Media Discovery and Experience. In: Proceedings of the 21st international conference companion on World Wide Web. (pp. 243-246). New York, USA: ACM. ISBN 9781450312301

Doan, H., Slabaugh, G. G., Unal, G. B. and Fang, T. (2006). Semi-Automatic 3-D Segmentation of Anatomical Structures of Brain MRI Volumes using Graph Cuts. In: 2006 IEEE International Conference on Image Processing. (pp. 1913-1916). IEEE. ISBN 1424404800

Fairbank, M., Prokhorov, D. and Alonso, E. (2013). Approximating Optimal Control with Value Gradient Learning. In: Lewis, F. and Liu, D. (Eds.), Reinforcement Learning and Approximate Dynamic Programming for Feedback Control. (pp. 142-161). Hoboken, NJ, USA: Wiley-IEEE Press. ISBN 111810420X

Foster, H. and Spanoudakis, G. (2011). SMaRT: A Workbench for reporting the monitorability of services from SLAs. In: Proceedings of the 3rd International Workshop on Principles of Engineering Service-Oriented Systems. (pp. 36-42). New York; USA: ACM. ISBN 978-1-4503-0591-4

Foster, H. and Spanoudakis, G. (2012). Taming the cloud: Safety, certification and compliance for software services - Keynote at the Workshop on Engineering Service-Oriented Applications (WESOA) 2011. In: Lecture Notes in Computer Science. (pp. 3-8). Springer. ISBN 9783642318757

Foster, H., Spanoudakis, G. and Mahbub, K. (2012). Formal Certification and Compliance for Run-Time Service Environments. In: Moser, L. E., Parashar, M. and Hung, P. C. K. (Eds.), 2012 IEEE Ninth International Conference on Services Computing (SCC),. (pp. 17-24). IEEE. ISBN 978-0-7695-4753-4

Georgiou, D., MacFarlane, A. and Russell-Rose, T. (2015). Extracting Sentiment from Healthcare Survey Data: An Evaluation of Sentiment Analysis Tools. In: 2015 Science and Information Conference (SAI). . IEEE. ISBN 978-1-4799-8547-0

Ginon, B., Stumpf, S. and Jean-Daubias, S. (2016). Towards the right assistance at the right time for using complex interfaces. In: Proceedings of the International Working Conference on Advanced Visual Interfaces. (pp. 240-243). New York, USA: ACM. ISBN 9781450341318

Glover, I. (2011). Integrating Flickr-based Images into Moodle to Increase Visual Appeal and Dynamism of Teaching Spaces. In: Bastiaens, T. and Ebner, M. (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2011. (pp. 768-772). EdITLib.

Grellmann, B., Neate, T., Roper, A. ORCID: 0000-0001-6950-6294, Wilson, S. ORCID: 0000-0001-6445-654X and Marshall, J. ORCID: 0000-0002-6589-221X (2018). Investigating Mobile Accessibility Guidance for People with Aphasia. In: ASSETS '18 Proceedings of the 20th International ACM SIGACCESS Conference on Computers and Accessibility. (pp. 410-413). New York, USA: ACM. ISBN 978-1-4503-5650-3

Hampshire, T. E., Roth, H. R., Boone, D. J., Slabaugh, G. G., Halligan, S. and Hawkes, D. J. (2012). Prone to Supine CT Colonography Registration Using a Landmark and Intensity Composite Method. In: Yoshida, H, Hawkes, DJ and Vannier, MW (Eds.), Abdominal Imaging. Computational and Clinical Applications. (pp. 1-9). Springer. ISBN 978-3-642-33611-9

Harrison, D., Marshall, P., Berthouze, N. and Bird, J. (2014). Tracking physical activity: Problems related to running longitudinal studies with commercial devices. In: UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. (pp. 699-702). New York, NY, United States: Association for Computing Machinery (ACM). ISBN 9781450330473

Hessami, A. G. and Karcanias, N. (2011). Integration of operations in process systems. In: 2011 IEEE International Systems Conference (SysCon). (pp. 466-471). New Jersey, USA: IEEE. ISBN 9781424494941

Holliday, D., Wilson, S. and Stumpf, S. (2016). User trust in intelligent systems: A journey over time. In: Proceedings of the 21st International Conference on Intelligent User Interfaces. (pp. 164-168). New York, USA: ACM. ISBN 9781450341400

Jennings, D., Alonso, E., Mondragon, E. ORCID: 0000-0003-4180-1261 and Bonardi, C. (2010). Temporal uncertainty during overshadowing: A temporal difference account. In: Computational Neuroscience for Advancing Artificial Intelligence: Models, Methods and Applications. (pp. 46-55). IGI Global. ISBN 9781609600211

Katopodis, S., Spanoudakis, G. and Mahbub, K. (2014). Towards hybrid cloud service certification models. In: 2014 IEEE International Conference on Services Computing (SCC). (pp. 394-399). Institute of Electrical and Electronics Engineers Inc.. ISBN 9781479950669

Komninos, N. ORCID: 0000-0003-2776-1283 and Procopiou, A. (2019). Bio/Nature-inspired algorithms in A.I. for malicious activity detection. In: El-Alfy, E-S. M., Elroweissy, M., Fulp, E. W. and Mazurczyk, W. (Eds.), Nature-Inspired Cyber Security and Resiliency: Fundamentals, techniques and applications. . IET. ISBN 978-1-78561-638-9

Kovacevic, A. ORCID: 0000-0002-8732-2242, Vukasinovic, N., Pavkovic, N. and Horak, P. (2017). Evaluation of “Codeve” methodology for teaching npd to virtual design teams. In: Proceedings of the 19th International Conference on Engineering and Product Design Education (E&PDE17), Building Community: Design Education for a Sustainable Future. (pp. 555-560). Glasgow: The Design Society. ISBN 9781904670841

Kulesza, T., Burnett, M., Wong, W-K. and Stumpf, S. (2015). Principles of Explanatory Debugging to personalize interactive machine learning. In: Brdiczka, O. and Chau, P (Eds.), Proceedings of the 20th International Conference on Intelligent User Interfaces. (pp. 126-137). New York, USA: ACM. ISBN 9781450333061

Kulesza, T., Stumpf, S., Burnett, M. and Kwan, I. (2012). Tell me more?: the effects of mental model soundness on personalizing an intelligent agent. In: Konstan, J. A., Chi, E. H. and Höök, K. (Eds.), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. (pp. 1-10). New York: ACM. ISBN 978-1-4503-1015-4

Kulesza, T., Wong, W-K., Stumpf, S., Perona, S., White, R., Burnett, M., Oberst, I. and Ko, A. J. (2009). Fixing the program my computer learned: barriers for end users, challenges for the machine. In: Conati, C., Bauer, M., Oliver, N. and Weld, D. S. (Eds.), Proceedings of the 14th international conference on Intelligent user interfaces. (pp. 187-196). ACM. ISBN 978-1-60558-168-2

Lay, S., Vermeulen, J., Perin, C., Donovan, E., Dachselt, R. and Carpendale, S. (2016). Slicing the aurora: An immersive proxemics-aware visualization. In: Proceedings of the 2016 ACM Companion on Interactive Surfaces and Spaces. (pp. 91-97). New York, NY, United States: ACM. ISBN 9781450345309

Lorenzoli, D. and Spanoudakis, G. (2009). Detection of Security and Dependability Threats: A Belief Based Reasoning Approach. In: Falk, R., Goudalo, W., Chen, E. Y., Savola, R. and Popescu, M. (Eds.), Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on. (pp. 312-320). IEEE.

Lorenzoli, D. and Spanoudakis, G. (2010). EVEREST+: Run-time SLA violations prediction. In: Proceedings of the 5th International Workshop on Middleware for Service Oriented Computing. (pp. 13-18). New York: ACM. ISBN 978-1-4503-0452-8

Lorenzoli, D. and Spanoudakis, G. (2011). Predicting software service availability: Towards a runtime monitoring approach. In: 2011 IEEE International Conference on Web Services (ICWS 2011). (pp. 736-737). IEEE. ISBN 978-1-4577-0842-8

MacFarlane, A. (2009). Models Performance Issues in Parallel Computing for Information Retrieval. In: Goker, A. S. and Davies, J. (Eds.), Information Retrieval: Searching in the 21st Century. (pp. 255-271). John Wiley & Sons Inc. ISBN 0470027622

MacFarlane, A., McCann, J. A. and Robertson, S. E. (2000). Parallel search using partitioned inverted files. In: Seventh International Symposium on String Processing and Information Retrieval, 2000. SPIRE 2000. Proceedings. (pp. 209-220). IEEE COMPUTER SOC. ISBN 0-7695-0746-8

Mantas, G., Komninos, N., Rodriuez, J., Logota, E. and Marques, H. (2015). Security for 5G Communications. In: Rodriguez, J. (Ed.), Fundamentals of 5G Mobile Networks. (pp. 207-220). John Wiley & Sons, Ltd.. ISBN 9781118867464

McCurdy, N., Dykes, J. and Meyer, M. (2016). Action Design Research and Visualization Design. In: Proceedings of the Sixth Workshop on Beyond Time and Errors on Novel Evaluation Methods for Visualization. (pp. 10-18). New York, USA: ACM. ISBN 978-1-4503-4818-8

McKay, D. and Buchanan, G. (2014). On the other side from you: How library design facilitates and hinders group work. In: Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures: the Future of Design. Proceedings. (pp. 97-106). New York: ACM. ISBN 978-1-4503-0653-9

Movahedi, Y., Cukier, M., Andongabo, A. and Gashi, I. (2017). Cluster-based Vulnerability Assessment Applied to Operating Systems. In: 2017 13th European Dependable Computing Conference (EDCC). (pp. 18-25). IEEE. ISBN 978-1-5386-0602-5

Mukherjee, A., Baronchelli, A., Loreto, V., Puglisi, A. and Tria, F. (2010). Aging in the Emergence of Linguistic Categories. In: Fellermann, H., Dörr, M., Hanczyc, M. M., Laursen, L. L., Maurer, S. E., Merkle, D., Monnard, P-A., Støy, K. and Rasmussen, S. (Eds.), Artificial Life XII: Proceedings of the Twelfth International Conference on the Synthesis and Simulation of Living Systems. (pp. 589-590). USA: MIT Press. ISBN 9780262290753

Netkachov, O., Popov, P. T. ORCID: 0000-0002-3434-5272 and Salako, K. (2019). Quantitative Evaluation of the Efficacy of Defence-in-Depth in Critical Infrastructures. In: Resilience of Cyber-Physical Systems. (pp. 89-121). Berlin, Germany: Springer International Publishing. ISBN 978-3-319-95597-1

Nystrom, E. ORCID: 0000-0003-3628-540X (2018). Topographic Synthesis: Parameter distribution in spatial texture. In: Proceedings of the 2018 International Computer Music Conference. (pp. 117-122). ICMC. ISBN 0-9845274-7-8

Odermatt, J. ORCID: 0000-0002-6073-3033 (2018). The European Union as a Cybersecurity Actor. In: Blockmans, S. and Koutrakos, P. ORCID: 0000-0002-2346-4057 (Eds.), Research Handbook on EU Common Foreign and Security Policy. (pp. 354-373). Cheltenham, UK: Edward Elgar Publishing. ISBN 9781785364075

Owen, T., Pearson, J., Thimbleby, H. W. and Buchanan, G. (2015). ConCap: Designing to Empower Individual Reflection on Chronic Conditions using Mobile Apps. In: Boring, S. and Rukzio, E. (Eds.), Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. (pp. 105-114). New York, USA: ACM. ISBN 9781450336529

Ozkaya, M. and Kloukinas, C. (2014). Architectural specification and analysis with XCD: The aegis combat system case study. In: 2014 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD). (pp. 368-375). IEEE. ISBN 978-9-8975-8065-9

Palacios, M., García-Fanjul, J., Tuya, J. and Spanoudakis, G. (2012). Identifying Test Requirements by Analyzing SLA Guarantee Terms. In: Goble, C. A., Chen, P. P. and Zhang, J. (Eds.), 2012 IEEE 19th International Conference on Web Services (ICWS). (pp. 351-358). IEEE. ISBN 978-1-4673-2131-0

Pawar, P. S., Rajarajan, M., Dimitrakos, T. and Zisman, A. (2014). Trust Assessment Using Cloud Broker. In: Zhou, J., Gal-Oz, N., Zhang, J. and Gudes, E, (Eds.), Trust Management VIII. IFIP Advances in Information and Communication Technology, 430. (pp. 237-244). Springer. ISBN 9783662438121

Peny, B., Unal, G. B., Slabaugh, G. G., Fang, T. and Alvino, C. V. (2006). Efficient and Robust Segmentations Based on Eikonal and Diffusion PDEs. In: Zheng, N, Jiang, X and Lan, X (Eds.), Advances in Machine Vision, Image Processing, and Pattern Analysis. Lecture Notes in Computer Science, 4153. (pp. 339-348). Springer. ISBN 3-540-37597-X

Perin, C. and Dragicevic, P. (2014). Manipulating multiple sliders by crossing. In: Proceedings of the 26th Conference on l'Interaction Homme-Machine. (pp. 48-54). ACM. ISBN 9781450329354

Perin, C., Vernier, F. and Fekete, J. (2013). Interactive horizon graphs: Improving the compact visualization of multiple time series. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). (pp. 3217-3226). New York, NY, United States: ACM. ISBN 9781450318990

Perin, C., Vuillemot, R. and Fekete, J. (2014). À table! Improving temporal navigation in soccer ranking tables. In: CHI '14 - Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. (pp. 887-896). ACM. ISBN 9781450324731

Perotti, A., d'Avila Garcez, A. S. and Boella, G. (2015). Neural-Symbolic Monitoring and Adaptation. In: Proceedings of the IEEE International Joint Conference on Neural Networks (IJCNN 2015). (pp. 1-8). IEEE.

Petroulakis, N. E., Spanoudakis, G., Askoxylakis, I. G., Miaoudakis, A. and Traganitis, A. (2016). A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems. In: 2015 IEEE Global Communications Conference (GLOBECOM). . IEEE. ISBN 978-1-4799-5952-5

Power, C., Denisova, A., Papaioannou, T. and Cairns, P. (2017). Measuring Uncertainty in Games: Design and Preliminary Validation. In: Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems. (pp. 2839-2845). New York, USA: ACM Press. ISBN 9781450346566

Rahulamathavan, Y., Moonsamy, V., Batten, L., Shunliang, S. and Rajarajan, M. (2014). An Analysis of Tracking Service Settings in Blackberry 10 and Windows Phone 8 Smartphones. In: Information Security and Privacy. Lecture Notes in Computer Science, 14 (8544). (pp. 430-437). Springer. ISBN 9783319083438

Robertson, S. E., Lu, W. and MacFarlane, A. (2006). XML-structured documents: Retrievable units and inheritance. In: Larsen, H. L., Pasi, G., Ortiz-Arroyo, D., Andreasen, T. and Christiansen, H. (Eds.), Flexible Query Answering Systems. Lecture Notes in Computer Science, 4027. (pp. 121-132). Berlin: Springer-Verlag.

Roper, A. ORCID: 0000-0001-6950-6294, Wilson, S. ORCID: 0000-0001-6445-654X, Neate, T. ORCID: 0000-0002-1387-8168 and Marshall, J. ORCID: 0000-0002-6589-221X (2019). Speech and Language. In: Web Accessibility A Foundation for Research. (pp. 121-131). London, UK: Springer. ISBN 978-1-4471-7439-4

Rubython, A. and Maiden, N. (2014). The effect of variability modeling on requirements satisfaction for the configuration and implementation of off-the-shelf software packages. In: Requirements Engineering Conference (RE), 2014 IEEE 22nd International. (pp. 394-401). Institute of Electrical and Electronics Engineers Inc.. ISBN 9781479930333

Saker, M. ORCID: 0000-0002-7414-2840 (2018). Mobile Virtual Realities and Portable Magic Circles. In: Schleser, M. and Berry, M. (Eds.), Mobile Story Making in an Age of Smartphones. (pp. 97-105). Springer. ISBN 331976795X

Schnell, R. (2015). Privacy-preserving Record Linkage. In: Harron, K., Goldstein, H. and Dibben, C. (Eds.), Methodological Developments in Data Linkage. (pp. 201-225). UK: John Wiley & Sons. ISBN 1118745876

Secker, J. (2017). Students in the SADL: lessons from LSE’s digital literacy programme. In: Reedy, K. and Parker, J. (Eds.), Digital Literacy Unpacked. (pp. 83-96). London: Facet Publishing. ISBN 178330197X

Secker, J. (2017). The trouble with terminology: rehabilitating and rethinking ‘Digital Literacy'. In: Reedy, K. and Parker, J. (Eds.), Digital Literacy Unpacked. (pp. 3-16). London: Facet Publishing. ISBN 178330197X

Slabaugh, G. G., Culbertson, W. B., Malzbender, T. and Schafer, R. W. (2001). A Survey of Methods for Volumetric Scene Reconstruction from Photographs. In: Mueller, K. and Kaufman, A. E. (Eds.), Proceedings of the 2001 Eurographics conference on Volume Graphics. . Eurographics Association. ISBN 3-211-83737-X

Slabaugh, G. G., Dinh, Q. and Unal, G. B. (2007). A Variational Approach to the Evolution of Radial Basis Functions for Image Segmentation. In: IEEE Conference on Computer Vision and Pattern Recognition, 2007 (CVPR '07). (pp. 1-8). IEEE. ISBN 1424411793

Slabaugh, G. G., Knapp, K. and Al-Arif, S. M. (2017). Probabilistic Spatial Regression using a Deep Fully Convolutional Neural Network. In: Proceedings of the British Machine Vision Conference (BMVC). (154.1-154.12). BMVA Press. ISBN 1-901725-60-X

Slabaugh, G. G., Malzbender, T. and Culbertson, W. B. (2000). Volumetric Warping for Voxel Coloring on an Infinite Domain. In: Pollefeys, M., Gool, L. J. V., Zisserman, A. and Fitzgibbon, A. W. (Eds.), 3D Structure from Images — SMILE 2000. Lecture Notes in Computer Science, 2018. (pp. 109-123). Springer. ISBN 3-540-41845-8

Slabaugh, G. G., Mihalef, V. and Unal, G. B. (2005). A Contour-Based Approach to 3D Text Labeling on Triangulated Surfaces. In: Fifth International Conference on 3-D Digital Imaging and Modeling, 2005 (3DIM 2005). (pp. 416-423). IEEE Computer Society. ISBN 0-7695-2327-7

Slabaugh, G. G., Schafer, R. W. and Hans, M. C. (2002). Image-Based Photo Hulls. In: First International Symposium on 3D Data Processing Visualization and Transmission, 2002. Proceedings. (pp. 704-708). IEEE Computer Society. ISBN 0-7695-1521-5

Slabaugh, G. G., Schafer, R. W. and Hans, M. C. (2002). Multi-resolution space carving using level set methods. In: 2002 International Conference on Image Processing. (2002, Proceedings). (pp. 545-548). IEEE. ISBN 0780376226

Slabaugh, G. G., Unal, G. B. and Chang, T. C. (2006). Information-theoretic feature detection in ultrasound images. In: 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2006 (EMBS '06). (pp. 2638-2642). IEEE. ISBN 1424400325

Slabaugh, G. G., Unal, G. B., Fang, T. and Wels, M. (2006). Ultrasound-Specific Segmentation via Decorrelation and Statistical Region-Based Active Contours. In: 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. (pp. 45-53). IEEE Computer Society. ISBN 0-7695-2597-0

Slabaugh, G. G. and Ye, X. (2011). Concavity analysis for reduction of ileocecal valve false positives in CTC. In: 2011 IEEE International Symposium on Biomedical Imaging: From Nano to Macro. (pp. 173-176). IEEE. ISBN 9781424441273

Spanoudakis, G. and Zisman, A. (2011). Designing and Adapting Service-based Systems: A Service Discovery Framework. In: Service Engineering. (pp. 261-297). BERLIN: SPRINGER-VERLAG. ISBN 978-3-7091-0414-9

Strigini, L. (2005). Fault Tolerance Against Design Faults. In: Diab, H. and Zomaya, A. (Eds.), Dependable Computing Systems: Paradigms, Performance Issues, and Applications. (pp. 213-241). John Wiley & Sons.

Stumpf, S., Burnett, M., Pipek, V. and Wong, W-K (2012). End-user interactions with intelligent and autonomous systems. In: Konstan, J. A., Chi, E. H. and Höök, K. (Eds.), CHI '12 Extended Abstracts on Human Factors in Computing Systems. (pp. 2755-2758). New York: ACM. ISBN 978-1-4503-1016-1

Thurman, N. (2019). Computational Journalism. In: Wahl-Jorgensen, K. and Hanitzsch, T. (Eds.), The Handbook of Journalism Studies, Second Edition. . New York: Routledge. ISBN 9781315167497

Tsigkritis, T., Spanoudakis, G., Kloukinas, C. and Lorenzoli, D. (2009). Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework. In: Spanoudakis, G., Gomez, A. and Kokolakis, S. (Eds.), Security and Dependability for Ambient Intelligence. Advances in Information Security, 45. (pp. 239-271). USA: Springer. ISBN 978-0-387-88774-6

Ul Asad, H., Jones, K. and Surre, F. (2014). Verifying Robust Frequency Domain Properties of Non Linear Oscillators using SMT. In: Pleskacz, W., Renovell, M., Kasprowicz, D., Sekanina, L. and Bernard, S. (Eds.), 17th International Symposium on Design and Diagnostics of Electronic Circuits & Systems. (pp. 306-309). IEEE. ISBN 978-1-4799-4560-3

Unal, G. B. and Slabaugh, G. G. (2005). Coupled PDEs for Non-Rigid Registration and Segmentation. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. (pp. 168-175). IEEE Computer Society. ISBN 0-7695-2372-2

Vuillemot, R. and Perin, C. (2015). Investigating the direct manipulation of ranking tables for time navigation. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. (pp. 2703-2706). ACM. ISBN 9781450331456

Wang, Z., Slabaugh, G. G., Unal, G. B. and Fang, T. (2007). Registration of Ultrasound Images Using an Information-Theoretic Feature Detector. In: 4th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2007. ISBI 2007. (pp. 736-739). IEEE. ISBN 1-4244-0672-2

Wang, Z., Slabaugh, G. G., Unal, G. B. and Zhou, M. (2007). An information-theoretic detector based scheme for registration of speckled medical images. In: IEEE International Conference on Systems, Man and Cybernetics, 2007. ISIC. (pp. 1026-1030). IEEE.

Wang, Z., Slabaugh, G. G., Zhou, M. and Fang, T. (2008). Automatic tracing of blood flow velocity in pulsed Doppler images. In: IEEE International Conference on Automation Science and Engineering, 2008. CASE 2008. (pp. 218-222). IEEE. ISBN 9781424420223

Wei, L., Robertson, S. and MacFarlane, A. (2007). CISR at INEX 2006. In: Fuhr, N., Lalmas, M. and Trotman, A. (Eds.), Comparative Evaluation of XML Information Retrieval Systems. Lecture Notes in Computer Science, 4518. (pp. 57-63). Germany: Springer-Verlag. ISBN 9783540738879

Wong, W-K, Oberst, I., Das, S., Moore, T., Stumpf, S., McIntosh, K. and Burnett, M. (2011). End-user feature labeling: a locally-weighted regression approach. In: Pu, P., Pazzani, M. J., André, E. and Riecken, D. (Eds.), Proceedings of the 16th international conference on Intelligent user interfaces. (pp. 115-124). New York: ACM. ISBN 978-1-4503-0419-1

Wong, W-K., Oberst, I., Das, S., Moore, T., Stumpf, S., McIntosh, K. and Burnett, M. (2011). End-User Feature Labeling via Locally Weighted Logistic Regression. In: Burgard, W. and Roth, D. (Eds.), Proceedings of the Twenty-Fifth AAAI conference on Artificial Intelligence. (pp. 1575-1578). USA: AAAI Press. ISBN 9781577355076

Yezzi, A. J., Slabaugh, G. G., Broadhurst, A., Cipolla, R. and Schafer, R. W. (2002). A Surface Evolution Approach to Probabilistic Space Carving. In: First International Symposium on 3D Data Processing Visualization and Transmission, 2002. Proceedings. (pp. 618-621). IEEE Computer Society. ISBN 0-7695-1521-5

Zachos, K., Maiden, N. and Levis, S. (2015). Creativity Support to Improve Health-and-Safety in Manu-facturing Plants: Demonstrating Everyday Creativity. In: Maver, T. and Do, E. Y-L. (Eds.), C&C '15 Proceedings of the 2015 ACM SIGCHI Conference on Creativity and Cognition. (pp. 225-234). ACM. ISBN 978-1-4503-3598-0

de Penning, L., Garcez, A., Lamb, L. C. and Meyer, J-J. C. (2011). A Neural-Symbolic Cognitive Agent for Online Learning and Reasoning. In: Proceedings of the Twenty-Second international joint conference on Artificial Intelligence. (pp. 1653-1658). International Joint Conferences on Artificial Intelligence. ISBN 978-1-57735-514-4

Monograph

Bojańczyk, M., Daviaud, L., Guillon, B., Penelle, V. and Sreejith, A.V. Undecidability of a weak version of MSO+U. .

Child, C. H. T. ORCID: 0000-0001-5425-2308 and Georgeson, J. (2016). NPCs as People, Too: The Extreme AI Personality Engine. City, University of London.

Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Agibetov, A., Samwald, M. and Cross, V. (2018). Breaking-down the Ontology Alignment Task with a Lexical Index and Neural Embeddings. .

Maynou, L., McGuire, A. and Serra-Sastre, V. ORCID: 0000-0002-6329-4507 (2019). Exploring the Impact of New Medical Technology on Workforce Planning (19/07). London, UK: City, University of London.

Meilicke, C., Sváb-Zamazal, O., Trojahn, C., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Aguirre, J-L., Stuckenschmidt, H. and Grau, B. C. (2012). Evaluating Ontology Matching Systems on Large, Multilingual and Real-world Test Cases. .

Mourouzis, T., Wojcik, M. and Komninos, N. (2016). On The Security Evaluation of Partial Password Implementations. .

Myklebust, E. B., Jimenez-Ruiz, E., Chen, J., Wolf, R. and Tollefsen, K. E. (2019). Enabling Semantic Data Access for Toxicological Risk Assessment. .

Popov, P. T. (2012). Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Fault-Tolerant Off-the-Shelf Software. Centre for Software Reliability, City University London.

Ruppert, E., Harvey, P., Lury, C., Mackenzie, A., McNally, R., Baker, S.A. ORCID: 0000-0002-4921-2456, Kallianos, Y. and Lewis, C. (2015). Socialising Big Data: From concept to practice. Manchester: CRESC, The University of Manchester and the Open University.

Secker, J. (2008). Case Study 5: Libraries and Facebook. London, UK: University of London.

Strigini, L. and Littlewood, B. (1997). Guidelines for Statistical Testing (PASCON/WO6-CCN2/TN12). ESA/ESTEC project PASCON.

Strigini, L. and Littlewood, B. (2000). A discussion of practices for enhancing diversity in software designs. London, UK: Centre for Software Reliability, City University London.

Stumpf, S. (1997). Argumentation-based design rationale - the sharpest tools in the box (RN/98/103). London, UK: Computer Science Department, University College London.

Conference or Workshop Item

Abd Rahman, M. H., Nordin, A. I. and Denisova, A. ORCID: 0000-0002-1497-5808 (2017). The effect of time manipulation on immersion in digital games. In: Badioze Zaman, H., Robinson, P., Smeaton, A. F., Shih, T. K. and Velastin, S. (Eds.), Advances in Visual Informatics. IVIC 2017. Lecture Notes in Computer Science. (pp. 544-551). Cham: UNSPECIFIED. ISBN 978-3-319-70009-0

Abufadel, A., Slabaugh, G. G., Unal, G. B., Zhang, L. and Odry, B. (2008). Interacting Active Rectangles for Estimation of Intervertebral Disk Orientation. Paper presented at the 8th International Conference on Pattern Recognition (ICPR), 2006., 20-08-2006 - 24-08-2008, Hong Kong.

Acarali, D., Rajarajan, M. and Komninos, N. ORCID: 0000-0003-2776-1283 (2018). Evaluating the Provision of Botnet Defences using Translational Research Concepts. In: Samarati, P. and Obaidat, M. S. (Eds.), Proceedings of the 15th International Joint Conference on e-Business and Telecommunications (ICETE 2018) - Volume 2: SECRYPT. (pp. 514-519). SciTePress. ISBN 978-989-758-319-3

Adamsky, F., Khayam, S. A., Jager, R. and Rajarajan, M. (2014). Who is going to be the next BitTorrent Peer Idol?. Paper presented at the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 26-08-2014 - 28-08-2014, Milan, Italy.

Adnan, M., Nguyen, H. P., Ruddle, R. and Turkay, C. ORCID: 0000-0001-6788-251X (2019). Visual Analytics of Event Data using Multiple Mining Methods. In: Turkay, C. ORCID: 0000-0001-6788-251X and Von Landesberger, T. (Eds.), EuroVis Workshop on Visual Analytics (EuroVA). . The Eurographics Association. ISBN 978-3-03868-087-1

Adnan, M., Rosi, L., Veluru, S., Mouseli, M., Longley, P. A. and Rajarajan, M. (2014). Using Digital Traces for User Profiling: the Uncertainty of Identity Toolset. Paper presented at the ACM Security in Information and Networks, (SIN 2014), 09-09-2014 - 11-09-2014, Glasgow, UK.

Al-Arif, S. M., Asad, M., Knapp, K., Gundry, M. and Slabaugh, G. G. (2015). Hough Forest-based Corner Detection for Cervical Spine Radiographs. Paper presented at the Medical Image Understanding and Analysis Conference, MIUA 2015, 15-07-2015 - 17-07-2015, University of Lincoln, UK.

Alberdi, E., Strigini, L., Leach, K., Ryan, P., Palanque, P. and Winckler, M. (2009). Gaining assurance in a voter-verifiable voting system. Paper presented at the 2009 Second International Conference on Dependability, 18 - 23 Jun 2009, Athens, Greece.

Allain, K., Turkay, C. ORCID: 0000-0001-6788-251X and Dykes, J. ORCID: 0000-0002-8096-5763 (2019). Towards a WHAT-WHY-HOW Taxonomy of Trajectories in Visualization Research. Poster presented at the EuroVis 2019, 3-7 Jun 2019, Porto, Portugal.

Alonso, E. and Fairbank, M. (2013). Emergent and Adaptive Systems of Systems. Paper presented at the 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 13-10-2013 - 16-10-2013, Manchester, UK.

Alonso, E., Fairbank, M. and Mondragon, E. ORCID: 0000-0003-4180-1261 (2012). Conditioning for Least Action. Paper presented at the 11th International Conference on Cognitive Modeling, 13-04-2012 - 15-04-2012, Berlin, Germany.

Alonso, E., Karcanias, N. and Hessami, A. G. (2013). Multi-Agent Systems: A new paradigm for Systems of Systems. Paper presented at the ICONS 2013 : The Eighth International Conference on Systems, 27-01-2013 - 01-02-2013, Seville, Spain.

Alonso, E., Karcanias, N. and Hessami, A. G. (2013). Symmetries, groups and groupoids for Systems of Systems. Paper presented at the 2013 IEEE International Systems Conference (SysCon), 15-04-2013 - 18-04-2013, Orlando, USA.

Alonso, E. and Mondragon, E. ORCID: 0000-0003-4180-1261 (2014). Quantum Probability and Operant Conditioning: Behavioral Uncertainty in Reinforcement Learning. Paper presented at the 6th International Conference on Agents and Artificial Intelligence (ICAART 2014), 06-03-2014 - 08-03-2014, Angers, France.

Alonso, E. and Mondragon, E. ORCID: 0000-0003-4180-1261 (2012). Uses, Abuses and Misuses of Computational Models in Classical Conditioning. Paper presented at the 11th International Conference on Cognitive Modeling, 13-15 Apr 2012, Berlin, Germany.

Alonso, E. ORCID: 0000-0002-3306-695X, Mondragon, E. ORCID: 0000-0003-4180-1261 and Kjaell-Ohlsson, N. (2012). Internally Driven Q-learning - Convergence and Generalization Results. In: Filipe, J. and Fred, A. (Eds.), Proceedings of the 4th International Conference on Agents and Artificial Intelligence. (pp. 491-494). Setubal, Portugal: SCITEPRESS. ISBN 978-989-8425-95-9

Alonso, E., Sahota, P. and Mondragon, E. ORCID: 0000-0003-4180-1261 (2014). Computational Models of Classical Conditioning: A Qualitative Evaluation and Comparison. Paper presented at the 6th International Conference on Agents and Artificial Intelligence (ICAART 2014), 06-03-2014 - 08-03-2014, Angers, France.

Andongabo, A. and Gashi, I. (2017). vepRisk - A Web Based Analysis Tool for Public Security Data. Paper presented at the 13th European Dependable Computing Conference, 4-8 Sep 2017, Geneva, Switzerland.

Annabi, L. and Garcia Ortiz, M. ORCID: 0000-0003-4729-7457 (2018). State representation learning with recurrent capsule networks. Paper presented at the Workshop on Modeling the Physical World: Perception, Learning, and Control, NeurIPS 2018 - 32nd Conference on Neural Information Processing Systems, 07 Dec 2018, Montreal, Canada.

Ardagna, C. A., Damiani, E., Krotsiani, M., Kloukinas, C. ORCID: 0000-0003-0424-7425 and Spanoudakis, G. ORCID: 0000-0002-0037-2600 (2018). Big Data Assurance Evaluation: An SLA-Based Approach. In: 2018 IEEE International Conference on Services Computing (SCC). (pp. 299-303). IEEE. ISBN 978-1-5386-7250-1

Asad, M. and Abhayaratne, C. (2013). Kinect depth stream pre-processing for hand gesture recognition. Paper presented at the 2013 IEEE International Conference on Image Processing, ICIP 2013, 15 September - 18 September 2013, Melbourne, Australia.

Barthet, M., Plumbley, M. D., Kachkaev, A., Dykes, J., Wolff, D. and Weyde, T. (2014). Big Chord Data Extraction and Mining. Paper presented at the 9th Conference on Interdisciplinary Musicology – CIM14, 03-12-2014 - 06-12-2014, Staatliches Institut für Musikforschung, Berlin, Germany.

Basaru, R. R., Child, C. H. T., Alonso, E. and Slabaugh, G. G. (2017). Hand Pose Estimation Using Deep Stereovision and Markov-chain Monte Carlo. Paper presented at the International Conference on Computer Vision Workshop on Observing and Understanding Hands in Action, 23 Oct 2017, Venice, Italy.

Basdekis, I., Alexandraki, C., Mourouzis, A. and Stephanidis, C. Incorporating Accessibility in Web-Based Work Environments: Two Alternative Approaches and Issues Involved. Paper presented at the 11th International Conference on Human-Computer Interaction, 22-27 Jul 2005, Las Vegas, USA.

Basdekis, I., Sakkalis, V. and Stephanidis, C. (2011). Towards an Accessible Personal Health Record. Paper presented at the Second International ICST Conference, MobiHealth 2011, 5 - 7 October 2011, Kos Island, Greece.

Bastos, M. T., Travitzki, R. and Puschmann, C. (2012). What Sticks with Whom? Twitter Follower-Followee Networks and News Classification. Paper presented at the The Sixth International AAAI Conference on Weblogs and Social Media (ICWSM 12), 4 Jun 2012, Dublin, Ireland.

Beecham, R., Dykes, J., Slingsby, A. and Turkay, C. (2015). Supporting crime analysis through visual design. Paper presented at the VIS 2015, 25-10-2015 - 30-10-2015, Chicago, USA.

Beecham, R. and Wood, J. (2014). Towards confirmatory data analysis? Deriving and analysing routing information for an origin-destination bike share dataset. Paper presented at the The 46th Annual Universities’ Transport Study Group (UTSG) Conference, 06-01-2014 - 08-01-2014, Newcastle, UK.

Benetos, E., Badeau, R., Weyde, T. and Richard, G. (2014). Template Adaptation for Improving Automatic Music Transcription. Paper presented at the 15th International Society for Music Information Retrieval Conference (ISMIR), 27-10-2014 - 31-10-2014, Taipei, Taiwan.

Benetos, E., Cherla, S. and Weyde, T. (2013). An efficient shift-invariant model for polyphonic music transcription. Paper presented at the MML 2013: 6th International Workshop on Machine Learning and Music, 23 Sep 2013, Prague, Czech Republic.

Benetos, E. and Dixon, S. (2010). Multiple-F0 estimation of piano sounds exploiting spectral structure and temporal evolution. Paper presented at the ISCA Tutorial and Research Workshop on Statistical and Perceptual Audition, 25 Sep 2010, Makuhari, Japan.

Benetos, E. and Dixon, S. (2011). Multiple-instrument polyphonic music transcription using a convolutive probabilistic model. Paper presented at the 8th Sound and Music Computing Conference, 6 - 9 Jul 2011, Padova, Italy.

Benetos, E. and Dixon, S. (2011). A temporally-constrained convolutive probabilistic model for pitch detection. Paper presented at the Applications of Signal Processing to Audio and Acoustics (WASPAA), 2011 IEEE Workshop on, 16 - 19 Oct 2011, New Paltz, NY, US.

Benetos, E., Dixon, S., Giannoulis, D., Kirchhoff, H. and Klapuri, A. (2012). Automatic Music Transcription: Breaking the Glass Ceiling. Paper presented at the 13th International Society for Music Information Retrieval Conference (ISMIR 2012), 8 - 12 Oct 2012, Porto, Portugal.

Benetos, E. and Holzapfel, A. (2013). Automatic transcription of Turkish makam music. Paper presented at the 14th International Society for Music Information Retrieval Conference, 4 - 8 Nov 2013, Curitiba, PR, Brazil.

Benetos, E. and Holzapfel, A. (2014). Incorporating pitch class profiles for improving automatic transcription of Turkish makam music. Paper presented at the 4th International Workshop on Folk Music Analysis, 12-06-2014 - 13-06-2014, Istanbul, Turkey.

Benetos, E., Holzapfel, A. and Stylianou, Y. (2009). Pitched Instrument Onset Detection based on Auditory Spectra. Paper presented at the 10th International Society for Music Information Retrieval Conference, ISMIR 2009, 26 - 30 Oct 2009, Kobe, Japan.

Benetos, E., Jansson, A. and Weyde, T. (2014). Improving automatic music transcription through key detection. Paper presented at the AES 53rd International Conference on Semantic Audio, 27 - 29 Jan 2014, London, UK.

Benetos, E., Klapuri, A. and Dixon, S. (2012). Score-informed transcription for automatic piano tutoring. European Signal Processing Conference, ISSN 2219-5491

Benetos, E. and Kotropoulos, C. (2008). A tensor-based approach for automatic music genre classification. Paper presented at the EUSIPCO 2008: 16th European Signal Processing Conference, 25 - 29 Aug 2008, Lausanne, Switzerland.

Benetos, E., Kotropoulos, C., Lidy, T. and Rauber, A. (2006). Testing supervised classifiers based on non-negative matrix factorization to musical instrument classification. Paper presented at the EUSIPCO 2006: 14th European Signal Processing Conference, 4 - 8 Sep 2006, Florence, Italy.

Benetos, E., Kotti, M. and Kotropoulos, C. (2007). Large scale musical instrument identification. Paper presented at the 4th Sound and Music Computing Conference, 11 - 13 Jul 2007, Lefkada, Greece.

Benetos, E., Kotti, M., Kotropoulos, C., Burred, J. J., Eisenberg, G., Haller, M. and Sikora, T. (2005). Comparison of subspace analysis-based and statistical model-based algorithms for musical instrument classification. Paper presented at the 2nd Workshop On Immersive Communication And Broadcast Systems (ICOB 2005), 27 - 28 Oct 2005, Berlin, Germany.

Benetos, E., Lagrange, M. and Dixon, S. (2012). Characterisation of acoustic scenes using a temporally-constrained shift-invariant model. Paper presented at the 15th International Conference on Digital Audio Effects Conference (DAFx-12), 17 - 21 Sept 2012, University of York, York, UK.

Benetos, E. and Weyde, T. (2013). Explicit duration hidden Markov models for multiple-instrument polyphonic music transcription. Paper presented at the 14th International Society for Music Information Retrieval Conference, 4 - 8 Nov 2013, Curitiba, Brazil.

Bernardy, J-P., Jansson, P. and Paterson, R. A. (2010). Parametricity and Dependent Types. Paper presented at the International Conference on Functional Programming, 27-09-2010 - 29-09-2010, Baltimore, USA.

Bishop, P. G. (2015). Modeling the Impact of Testing on Diverse Programs. Paper presented at the 34th International Conference, SAFECOMP 2015, 23-09-2015 - 25-09-2015, Delft, The Netherlands.

Bishop, P. G. and Strigini, L. (2014). Estimating Worst Case Failure Dependency with Partial Knowledge of the Difficulty Function. Paper presented at the 33rd International Conference, SAFECOMP 2014, 10-09-2014 - 12-09-2014, Florence, Italy.

Bleisch, S., Dykes, J. and Nebiker, S. (2009). Building bridges between methodological approaches: a meta-framework linking experiments and applied studies in 3D geovisualization research. Paper presented at the GIS Research UK 17th Annual Conference (GISRUK 2009), 1 - 3 Apr 2009, University of Durham, Durham, UK.

Bloomfield, R. E., Buzna, L., Popov, P. T., Salako, K. and Wright, D. (2010). Stochastic modelling of the effects of interdependencies between critical infrastructure. Paper presented at the 4th International Workshop, CRITIS 2009, 30 September - 2 October 2009, Bonn, Germany.

Bloomfield, R. E., Chozos, N. and Salako, K. (2009). Current capabilities, requirements and a proposed strategy for interdependency analysis in the UK. Paper presented at the 4th International Workshop, CRITIS 2009, 30 September - 2 October 2009, Bonn, Germany.

Bloomfield, R. E., Guerra, A. S. L., Butler, E. and Netkachova, K. (2017). Security-informed safety: integrating security within the safety demonstration of a smart device. Paper presented at the 10th International Topical Meeting on Nuclear Plant Instrumentation, Control, 11-15 Jun 2017, San Francisco, USA.

Bloomfield, R. E. and Netkachova, K. Building Blocks for Assurance Cases. Paper presented at the International Symposium on Software Reliability Engineering (ISSRE), 03-11-2014 - 06-11-2014, Naples, Italy.

Bloomfield, R. E. and Parisaca-Vargas, A. (2015). Using Ontologies to Support Model-based Exploration of the Dependencies between Causes and Consequences of Hazards. Paper presented at the 7th International Conference on Knowledge Engineering and Ontology Development, 12-11-2015 - 14-11-2015, Lisbon, Portugal.

Bojanczyk, M., Daviaud, L., Guillon, B. and Penelle, V. (2017). Which Classes of Origin Graphs Are Generated by Transducers. In: Chatzigiannakis, I., Indyk, P., Kuhn, F. and Muscholl, A. (Eds.), 44th International Colloquium on Automata, Languages, and Programming (ICALP 2017). Leibniz International Proceedings in Informatics (LIPIcs), 80. (114:1-114:13). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik. ISBN 978-3-95977-041-5

Bojanczyk, M., Daviaud, L. and Narayanan, K. S. (2018). Regular and First Order List Functions. In: LICS '18 Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science. LICS, 2018. (pp. 125-134). New York, NY: ACM. ISBN 978-1-4503-5583-4

Booth, T., Bird, J., Stumpf, S. ORCID: 0000-0001-6482-1973 and Jones, S (2019). Designing Troubleshooting Support Cards for Novice End-User Developers of Physical Computing Prototypes. In: Malizia, A., Valtolina, S., Morch, A., Serrano, A. and Stratton, A. (Eds.), End-User Development. IS-EUD 2019. Lecture Notes in Computer Science, 11553. (pp. 191-199). Cham: Springer. ISBN 978-3-030-24780-5

Booth, T., Stumpf, S., Bird, J. and Jones, S. (2016). Crossed Wires: Investigating the Problems of End-User Developers in a Physical Computing Task. Paper presented at the Conference on Human Factors in Computing Systems (CHI), 7-12 May 2016, San Jose, USA.

Bourazeri, A. and Stumpf, S. ORCID: 0000-0001-6482-1973 (2018). Co-designing smart home technology with people with dementia or Parkinson's disease. In: NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction. (pp. 609-621). New York, NY: ACM. ISBN 9781450364379

Bouts, Q. W., Kostitsyna, I., van Kreveld, M., Meulemans, W., Sonke, W. and Verbeek, K. (2016). Mapping polygons to the grid with small Hausdorff and Fréchet distance. In: Sankowski, P. and Zaroliagis, C. (Eds.), 24rd Annual European Symposium on Algorithms (ESA 2016). (197:1-197:15). Germany: Dagstuhl Publishing. ISBN 978-3-95977-015-6

Boyes, R., Slabaugh, G. G. and Beddoe, G. (2009). Fast pseudo-enhancement correction in CT colonography using linear shift-invariant filters. Paper presented at the 16th IEEE International Conference on Image Processing (ICIP), 2009., 07-11-2009 - 10-11-2009, Cairo, Eygpt.

Brain, M. ORCID: 0000-0003-4216-7151, Niemetz, A., Preiner, M., Reynolds, A., Barrett, C. and Tinelli, C. (2019). Invertibility Conditions for Floating-Point Formulae. In: Computer Aided Verification. CAV 2019. Lecture Notes in Computer Science, 11562. (pp. 116-136). Cham: Springer. ISBN 978-3-030-25542-8

Broda, K., Garcez, A. and Gabbay, D. M. (2005). Metalevel priorities and neural networks. Paper presented at the Workshop on the Foundations of Connectionist-Symbolic Integration ECAI2000, 20 - 25 August 2005, Berlin.

Brujic-Okretic, V., Gatzidis, C., Liarokapis, F. and Baker, S. (2008). Towards Rapid Generation and Visualisation of Large 3D Urban Landscapes for Mobile Device Navigation. Paper presented at the IEEE Virtual Reality Workshop on Virtual Cityscapes: Key Research Issues in Modeling Large-Scale Immersive Urban Environments, 8 - 9 Aug 2008, Reno, Nevada.

Busquets, J. G., Alonso, E. and Evans, A. (2015). Application of Data Mining to forecast Air Traffic: A 3-Stage Model using Discrete Choice Modeling. Paper presented at the 16th AIAA Aviation Technology, Integration, and Operations Conference, 13-17 Jun 2016, Washington D.C., USA.

Bussone, A., Stumpf, S. and O'Sullivan, D. (2015). The Role of Explanations on Trust and Reliance in Clinical Decision Support Systems. Paper presented at the 2015 International Conference on Healthcare Informatics, 21-10-2015 - 23-10-2015, Dallas, USA.

Butler, C., Makri, S. ORCID: 0000-0002-5817-4893, MacFarlane, A. ORCID: 0000-0002-8057-0737, Wisdom, S. and Cooke, I. (2018). Sheltering the Dream and Protecting the Dreamer : The Role of Place and Space in the Online Interactions of Fiction Authors and Readers. In: OzCHI '18 Proceedings of the 30th Australian Conference on Computer-Human Interaction. (pp. 1-11). New York, USA: ACM. ISBN 978-1-4503-6188-0

Caselles-Dupré, H., Annabi, L., Hagen, O., Garcia Ortiz, M. ORCID: 0000-0003-4729-7457 and Filliat, D. (2018). Flatland: a Lightweight First-Person 2-D Environment for Reinforcement Learning. Paper presented at the Workshop on Continual Unsupervised Sensorimotor Learning - ICDL-Epirob 2018, 17 September 2018, Tokyo, Japan.

Caselles-Dupré, H., Garcia Ortiz, M. ORCID: 0000-0003-4729-7457 and Filliat, D. (2018). Continual State Representation Learning for Reinforcement Learning using Generative Replay. Paper presented at the Workshop on Continual Learning, NeurIPS 2018- 32nd Conference on Neural Information Processing Systems, 07 December 2018, Montreal, Canada.

Caselles-Dupré, H., Garcia Ortiz, M. ORCID: 0000-0003-4729-7457 and Filliat, D. (2019). Symmetry-Based Disentangled Representation Learning requires Interaction with Environments. Paper presented at the Workshop on Structure & Priors in Reinforcement Learning - ICLR 2019, 6 May 2019, New Orleans, USA.

Charalambous, T., Kalyvianaki, E., Hadjicostis, C. N. and Johansson, M. (2013). Distributed Offline Load Balancing in MapReduce Networks. Paper presented at the 2013 IEEE 52nd Annual Conference on Decision and Control (CDC), 10-12-2013 - 13-12-2013, Florence, Italy.

Chen, J., Horrocks, I., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599 and Sutton, C. (2019). Learning Semantic Annotations for Tabular Data. In: Kraus, S. (Ed.), Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence. (pp. 2088-2094). International Joint Conferences on Artifical Intelligence (IJCAI). ISBN 978-0-9992411-4-1

Cherla, S., Weyde, T., Garcez, A. and Pearce, M. (2013). Learning Distributed Representations for Multiple-Viewpoint Melodic Prediction. Paper presented at the 14th International Society for Music Information Retrieval Conference, 4 - 8 Nov 2013, Curtiba, PR, Brazil.

Child, C. H. T., Parkar, S., Mohamedally, D., Haddad, M. and Doroana, R. (2010). Development of a Virtual Laparoscopic Trainer using Accelerometer Augmented Tools to Assess Performance in Surgical training. Poster presented at the 19th International Pediatric Endosurgery Group (IPEG) Congress, 8 - 12 Jun 2010, Hawaii, US.

Child, C. H. T. and Stathis, K. (2006). Rule Value Reinforcement Learning for Cognitive Agents. Paper presented at the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS`06), 8 - 12 May 2006, Hakodate, Hokkaido, Japan.

Child, C. H. T., Stathis, K. and Garcez, A. (2007). Learning to Act with RVRL Agents. Paper presented at the 14th RCRA Workshop, Experimental Evaluation of Algorithms for Solving Problems with Combinatorial Explosion, Jul 2007, Rome, Italy.

Child, C. H. T. and Trusler, B. P. (2014). Implementing Racing AI using Q-Learning and Steering Behaviours. Paper presented at the GAMEON 2014 (15th annual European Conference on Simulation and AI in Computer Games), 09-09-2014 - 11-09-2014, University of Lincoln, Lincoln, UK.

Chitsanga, N., Giaralis, A. ORCID: 0000-0002-2952-1171 and Kaitwanidvilai, S. (2018). Robust cascade H infinity control of BLDC motor systems using fixed-structure two degrees of freedom controllers designed via genetic algorithm. Paper presented at the International MultiConference of Engineers and Computer Scientists 2018, 14-16 Mar 2018, Kowloon, Hong Kong.

Comuzzi, M. Aligning Monitoring and Compliance Requirements in Evolving Business Networks. Paper presented at the OnTheMove Federated Conferences & Workshops, 27-10-2014 - 31-10-2014, Amantea, Italy.

Comuzzi, M., Angelov, S. and Vonk, J. (2012). Patterns to Enable Mass-Customized Business Process Monitoring. Paper presented at the CAiSE 2012, 24th International Conference, 25-06-2012 - 29-06-2012, Gdansk, Poland.

Comuzzi, M. and Vanderfeesten, I. T. P. (2011). Product-Based Workflow Design for Monitoring of Collaborative Business Processes. Paper presented at the CAiSE 2011, 23rd International Conference, 20-06-2011 - 24-06-2011, London, UK.

Comuzzi, M., Vonk, J. and Grefen, P. (2010). Continuous Monitoring in Evolving Business Networks. Paper presented at the Confederated International Conferences: CoopIS, IS, DOA and ODBASE,, 25-10-2010 - 29-10-2010, Crete, Greece.

Czerwiński, W., Daviaud, L., Fijalkow, N., Jurdziński, M., Lazić, R. and Parys, P. (2018). Universal trees grow inside separating automata: Quasi-polynomial lower bounds for parity games. In: Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms. (pp. 2333-2349). Society for Industrial and Applied Mathematics. ISBN 978-1-61197-548-2

Daviaud, L. and Johnson, M. (2017). The Shortest Identities for Max-Plus Automata with Two States. In: Larsen, Kim G, Bodlaender, Hans L and Raskin, Jean-François (Eds.), 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2017). Leibniz International Proceedings in Informatics (LIPIcs), 83. (48:1-48:13). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik. ISBN 978-3-95977-046-0

Daviaud, L., Jurdziński, M. and Lazić, R. (2018). A pseudo-quasi-polynomial algorithm for solving mean-payoff parity games. In: LICS '18 Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science. LICS, 2018. (pp. 325-334). New York, NY: ACM. ISBN 978-1-4503-5583-4

Daviaud, L., Jurdziński, M., Lazić, R., Mazowiecki, F., Pérez, G. A. and Worrell, J. (2018). When is Containment Decidable for Probabilistic Automata? In: 45th International Colloquium on Automata, Languages, and Programming. Leibniz International Proceedings in Informatics (LIPIcs), 107. (121:1-121:4). Dagstuhl: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik. ISBN 978-3-95977-076-7

Daviaud, L. ORCID: 0000-0002-9220-7118, Jurdziński, M. and Lehtinen, K. (2019). Alternating Weak Automata from Universal Trees. Paper presented at the 30th International Conference on Concurrency Theory, 26-31 Aug 2019, Amsterdam, the Netherlands.

Daviaud, L., Kuperberg, D. and Pin, J-E. (2016). Varieties of Cost Functions. In: Ollinger, Nicolas and Vollmer, Heribert (Eds.), 33rd Symposium on Theoretical Aspects of Computer Science (STACS 2016). Leibniz International Proceedings in Informatics (LIPIcs), 47. (30:1-30:14). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik. ISBN 978-3-95977-001-9

Day, J. S., Buchanan, G. and Makri, S. (2015). Reflecting on Users’ Strategies for Resilient Interactions. Paper presented at the 15th IFIP TC.13 International Conference on Human-Computer Interaction, 14-18 Sep 2015, Bamberg, Germany.

Denisova, A. and Cairns, P. (2015). Adaptation in Digital Games: The Effect of Challenge Adjustment on Player Performance and Experience. In: Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play. (pp. 97-101). New York: ACM Press. ISBN 9781450334662

Denisova, A. and Cairns, P. (2015). First Person vs. Third Person Perspective in Digital Games: Do Player Preferences Affect Immersion? In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. (pp. 145-148). New York: ACM. ISBN 978-1-4503-3145-6

Denisova, A. and Cairns, P. (2015). The Placebo Effect in Digital Games. In: Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play. (pp. 23-33). New York: ACM. ISBN 9781450334662

Denisova, A., Nordin, A. I. and Cairns, P. (2016). The Convergence of Player Experience Questionnaires. In: Proceedings of the 2016 Annual Symposium on Computer-Human Interaction in Play. (pp. 33-37). New York: ACM. ISBN 978-1-4503-4456-2

Dinh, H. Q., Turk, G. and Slabaugh, G. G. (2001). Reconstructing Surfaces Using Anisotropic Basis Functions. Paper presented at the Eighth IEEE International Conference on Computer Vision, 2001. (ICCV 2001), 07-07-2001 - 14-07-2001, Vancouver, Canada.

Diplaris, S., Papadopoulos, S., Kompatsiaris, I., Goker, A. S., MacFarlane, A., Spangenberg, J., Hacid, H., Maknavicius, L. and Klusch, M. (2012). SocialSensor: sensing user generated input for improved media discovery and experience. Paper presented at the The Twenty-first International WWW Conference, 16-04-2012 - 20-04-2012, Lyon, France.

Dixon, S., Tidhar, D. and Benetos, E. (2011). The Temperament Police: The Truth, the Ground Truth, and Nothing but the Truth. Paper presented at the 12th International Society for Music Information Retrieval Conference, 24 - 28 Oct 2011, Miami, Florida, US.

Doan, H., Slabaugh, G. G., Unal, G. B. and Fang, T. (2006). Semi-Automatic 3-D Segmentation of Anatomical Structures of Brain MRI Volumes using Graph Cuts. Paper presented at the 2006 IEEE International Conference on Image Processing,, 08-10-2006 - 11-10-2006, Atlanta, USA.

Dove, G. (2013). Inspired by information: combining data visualization and generative techniques in early stage design research. Paper presented at the 9th ACM Conference on Creativity & Cognition, 17-06-2013 - 20-06-2013, Sydney, Australia.

Dove, G. and Jones, S. (2013). Evaluating creativity support in co-design workshops. Paper presented at the CHI 2013 Workshop: Evaluation Methods for Creativity Support Environments, 27th April - 2nd May 2013, Paris, France.

Dove, G., Jones, S., Dykes, J., Brown, A. E. and Duffy, A. (2013). Using data visualization in creativity workshops: a new tool in the designer's kit. Paper presented at the 9th ACM Conference on Creativity & Cognition, 17 - 20 Jun 2013, Sydney, Australia.

Dykes, J. and Bleisch, S. (2006). Planning Hikes Virtually: How Useful are Web-based 3D Visualizations?. Paper presented at the GIS Research UK 14th Annual Conference (GISRUK 2006), 5 - 7 Apr 2006, University of Nottingham, Nottingham, UK.

Dykes, J., Lloyd, D. and Radburn, R. (2009). Using the Analytic Hierarchy Process to prioritise candidate improvements to a geovisualization application. Paper presented at the GIS Research UK 17th Annual Conference (GISRUK 2009), 1 - 3 Apr 2009, University of Durham, Durham, UK.

Dykes, J. and Mountain, D. (2002). What I did on my vacation: spatio-temporal log analysis with interactive graphics and morphometric surface derivative. Paper presented at the GIS Research UK 10th Annual Conference (GISRUK 2002), 3 - 5 Apr 2002, Sheffield, UK.

Dykes, J., Rooney, C., Beecham, R., Turkay, C., Slingsby, A., Wood, J. and Wong, W. (2015). Multi-Perspective Synopsis with Faceted Views of Varying Emphasis. Paper presented at the VIS 2015, 25-10-2015 - 30-10-2015, Chicago, USA.

Ehmke, C. and Wilson, S. (2007). Identifying Web Usability Problems from Eyetracking Data. Paper presented at the British HCI conference 2007, 03-09-2007 - 07-09-2007, University of Lancaster, UK.

Fahad, L. G., Tahir, S. F. and Rajarajan, M. (2014). Activity Recognition in Smart Homes using Clustering based Classification. Paper presented at the 22nd International Conference on Pattern Recognition (ICPR), 24-08-2014 - 28-08-2014, Stockholm, Sweden.

Fairbank, M. and Alonso, E. (2012). A Comparison of Learning Speed and Ability to Cope Without Exploration between DHP and TD(0). Paper presented at the IEEE International Joint Conference on Neural Networks (IEEE IJCNN 2012), 1783-1789, 10-15-2012, Brisbane, Australia.

Fairbank, M. and Alonso, E. (2012). Value-Gradient Learning. Paper presented at the WCCI 2012 IEEE World Congress on Computational Intelligence, 10-06-2012 - 15-06-2012, Brisbane, Australia.

Fairbank, M. and Alonso, E. (2012). The divergence of reinforcement learning algorithms with value-iteration and function approximation. Paper presented at the The 2012 International Joint Conference on Neural Networks (IJCNN), 10-06-2012 - 15-06-2012, Brisbane, Australia.

Fernandez, R. C., Migliavacca, M., Kalyvianaki, E. and Pietzuch, P. (2013). Integrating scale out and fault tolerance in stream processing using operator state management. Paper presented at the 2013 ACM SIGMOD International Conference on Management of Data, 22-06-2013 - 27-06-2013, New York, USA.

Fernandez, R. C., Migliavacca, M., Kalyvianaki, E. and Pietzuch, P. (2014). Making State Explicit for Imperative Big Data Processing. Paper presented at the USENIX ATC ’14: 2014 USENIX Annual Technical Conference, 19-06-2015 - 20-06-2015, Philadelphia, USA.

Fernandez, R. C., Migliavacca, M., Kalyvianaki, E. and Pietzuch, P. (2013). Scalable and Fault-tolerant Stateful Stream Processing.. Paper presented at the 2013 Imperial College Computing Student Workshop, 26-09-2013 - 27-09-2013, London, UK.

Fisher, P., Tate, N. and Slingsby, A. (2014). Type-2 Fuzzy Sets Applied to Geodemographic Classification. Paper presented at the Eighth International Conference on Geographic Information Science (GIScience 2014), 23-09-2014 - 26-09-2014, Vienna, Austria.

Foster, H., Spanoudakis, G. and Mahbub, K. (2012). Formal certification and compliance for run-time service environments. Paper presented at the 2012 IEEE Ninth International Conference on Services Computing (SCC), 24 - 29 June 2012, Honolulu, USA.

Frankl, P. G., Hamlet, D., Littlewood, B. and Strigini, L. (1997). Choosing a testing method to deliver reliability. PROCEEDINGS OF THE 1997 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, pp. 68-78. ISSN 0270-5257

França, M. V. M., Zaverucha, G. and Garcez, A. (2015). Neural Relational Learning Through Semi-Propositionalization of Bottom Clauses. Paper presented at the 2015 AAAI Spring Symposium Series, 23-03-2015 - 25-03-2015, Stanford University, USA.

Fujdiak, R., Pokorny, J., Zobal, L., Popov, P. T., Stankovic, V. ORCID: 0000-0002-8740-6526, Mlynek, P., Mrnustik, P., Blazek, P., Musil, P. and Misurec, J. (2019). Security and Performance Trade-offs for Data Distribution Service in Flying Ad-Hoc Networks. Paper presented at the The 11th Intenrational COngress on Ultr Modern Telecommunications and Control Systems, Dublin, Ireland, 28 - 30 October 2019.

Galliers, J. R. and Wilson, S. (2013). An Exploratory Study into the Accessibility of a Multi-User Virtual World for Young People with Aphasia. Paper presented at the BCS HCI 2013 - The Internet of Things XXVII, 9 - 13 Sep 2013, Brunel University, Uxbridge, UK.

Garcez, A. (2010). Neurons and symbols: a manifesto. Paper presented at the Dagstuhl Seminar Proceedings 10302. Learning paradigms in dynamic environments, 25 - 30 July 2010, Dagstuhl, Germany.

Garcez, A., Besold, T. R., Raedt, L., Foldiak, P., Hitzler, P., Icard, T., Kuhnberger, K-U., Lamb, L. C., Miikkulainen, R. and Silver, D. L. (2015). Neural-Symbolic Learning and Reasoning: Contributions and Challenges. Paper presented at the 2015 AAAI Spring Symposium Series, 23-03-2015 - 25-03-2015, Stanford University, USA.

Garcia Ortiz, M. ORCID: 0000-0003-4729-7457, Lesort, T., Caselles-Dupré, H., Goudou, J-F. and Filliat, D. (2018). Generative Models from the perspective of Continual Learning. Paper presented at the Workshop on Continual Learning, NeurIPS 2018 - 32nd Conference on Neural Information Processing Systems, 07 December 2018, Montreal, Canada.

Gashi, I., Povyakalo, A. A. and Strigini, L. (2016). Diversity, Safety and Security in Embedded Systems: modelling adversary effort and supply chain risks. In: 2016 12th European Dependable Computing Conference (EDCC). . IEEE. ISBN 978-1-5090-1582-5

Gashi, I. ORCID: 0000-0002-8017-3184 and Ul Asad, H. (2018). Diversity in Open Source Intrusion Detection Systems. In: Computer Safety, Reliability, and Security. SAFECOMP 2018. . Cham, Switzerland: Springer. ISBN 978-3-319-99129-0

Gatzidis, C., Brujic-Okretic, V. and Mastroyanni, M. (2009). Evaluation of Non-photorealistic 3D Urban Models for Mobile Device Navigation.. Paper presented at the Virtual and Mixed Reality: Third International Conference, 19 - 24 July 2009, San Diego, CA, USA.

Gatzidis, C., Papakonstantinou, S., Brujic-Okretic, V. and Baker, S. (2008). Recent advances in the user evaluation methods and studies of non-photorealistic visualisation and rendering techniques. Paper presented at the Information Visualisation, 9 - 11 July 2008, London, England.

Geng, Y., Chen, J., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599 and Chen, H. Human-centric Transfer Learning Explanation via Knowledge Graph [Extended Abstract]. Paper presented at the AAAI-19 Workshop on Network Interpretability for Deep Learning, 27 - 28 January 2019, Honolulu, Hawaii, USA.

Giannopoulos, P. ORCID: 0000-0002-6261-1961, Abrahamsen, M., Löffler, M. and Rote, G. (2019). Geometric Multicut. Paper presented at the 46th International Colloquium on Automata, Languages, and Programming (ICALP 2019), 8 - 12 July 2019, Patras, Greece.

Giannopoulos, P. ORCID: 0000-0002-6261-1961 and Bonnet, E. (2018). Orthogonal Terrain Guarding is NP-complete. Paper presented at the 34th International Symposium on Computational Geometry (SoCG 2018), 11 - 14 June 2018, Budapest, Hungary.

Giannopoulos, P., Bonnet, E., Kim, E. J., Rzazewski, P. and Sikora, F. (2018). QPTAS and Subexponential Algorithm for Maximum Clique on Disk Graphs. Paper presented at the 34th International Symposium on Computational Geometry (SoCG 2018), 11 - 14 July 2018, Budapest, Hungary.

Giannoulis, D., Benetos, E., Klapuri, A. and Plumbley, M. D. (2014). Improving instrument recognition in polyphonic music through system integration. Paper presented at the 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 04-05-2014 - 09-05-2014, Florence, Italy.

Giannoulis, D., Benetos, E., Stowell, D., Rossignol, M., Lagrange, M. and Plumbley, M. D. (2013). Detection and classification of acoustic scenes and events: an IEEE AASP challenge. Paper presented at the IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 20 - 23 Oct 2013, New Paltz, NY, USA.

Giannoulis, D., Stowell, D., Benetos, E., Rossignol, M., Lagrange, M. and Plumbley, M. D. (2013). A database and challenge for acoustic scene classification and event detection. Paper presented at the The 21st European Signal Processing Conference, 9 - 13 Sep 2013, Marrakech, Morocco.

Giaralis, A., Kougioumtzoglou, I. and Spanos, P. D. (2011). A stochastic approach for deriving effective linear properties of bilinear hysteretic systems subject to design spectrum compatible strong ground motions. Paper presented at the 8th International Conference on Structural Dynamics (EURODYN 2011), 04-06 July 2011, Leuven, Belgium.

Giaralis, A. and Spanos, P. D. (2007). A stochastic approach to synthesizing response spectrum compatible seismic accelerograms. Paper presented at the 4th International Conference on Earthquake Geotechnical Engineering (4ICEGE), 25-28 June 2007, Thessaloniki, Greece.

Goebel, R., Chander, A., Holzinger, K., Lecue, F., Akata, Z., Stumpf, S. ORCID: 0000-0001-6482-1973, Kieseberg, P. and Holzinger, A. (2018). Explainable AI: The new 42?. Paper presented at the CD-MAKE 2018, 27-30 Aug 2018, Hamburg, Germany.

Goguey, A., Steer, C., Lucero, A., Nigay, L., Ranjan Sahoo, D., Coutrix, C., Roudaut, A., Subramanian, S., Tokuda, Y., Neate, T., Pearson, J., Robinson, S. and Jones, M. (2019). PickCells: A Physically Reconfigurable Cell-composed Touchscreen. In: Brewster, S. and Fitzpatrick, G. (Eds.), CHI '19 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. (273.). New York, USA: ACM. ISBN 978-1-4503-5970-2

Gooch, P. (2012). A lightweight, pattern-based approach to identification and formalisation of TimeML expressions in clinical narratives. Paper presented at the The Sixth Informatics for Integrating Biology and the Bedside (i2b2) Natural Language Processing Challenge for Clinical Records, Nov 2012, Chicago, IL.

Goodwin, S., Dykes, J. and Slingsby, A. (2014). Visualizing the Effects of Scale and Geography in Multivariate Comparison. Poster presented at the IEEE Conference on Visual Analytics Science and Technology, 09-11-2014 - 14-11-2014, Paris, France.

Gorp, P. V., Comuzzi, M., Fialho, A. S. and Kaymak, U. (2012). Addressing health information privacy with a novel cloud-based PHR system architecture. Paper presented at the 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 14-10-2012 - 17-10-2012, Seoul, Korea.

Griffiths, M. K., Reyes-Aldasoro, C. C., Savas, D. and Greenfield, T. (2009). IOME, A Toolkit for Distributed and Collaborative Computational Science and Engineering. Paper presented at the UK e-science All Hands Meeting, 07-12-2009 - 09-12-2009, Oxford, UK.

Gutierrez-Lopez, M., Missaoui, S., Makri, S. ORCID: 0000-0002-5817-4893, Porlezza, C. ORCID: 0000-0002-1400-5879, Cooper, G. ORCID: 0000-0003-2367-8626 and MacFarlane, A. ORCID: 0000-0002-8057-0737 (2019). Journalists as Design Partners for AI. Paper presented at the CHI 2019 ACM Conference on Human Factors in Computing Systems, 04 - 09 May 2019, Glasgow, UK.

Hadjiminas, N. and Child, C. H. T. (2012). Be The Controller: A Kinect Tool Kit for Video Game Control - Recognition of Human Motion Using Skeletal Relational Angles. Paper presented at the 5th Annual International Conference On Computer Games, Multimedia And Allied Technology (CGAT 2012), 2012, Bali, Indonesia.

Hakobyan, L., Lumsden, J. and O'Sullivan, D. (2013). Designing a Mobile Assistive Application with and for Older Adults with AMD: A Case Study. Paper presented at the 27th International BCS Human Computer Interaction Conference (HCI 2013), 09-09-2013 - 13-09-2013, London, UK.

Hakobyan, L., Lumsden, J., O'Sullivan, D. and Shaw, R. (2016). A longitudinal evaluation of the acceptability and impact of a diet diary app for older adults with age-related macular degeneration. Paper presented at the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI '16), 6-9 Sep 2016, Florence, Italy.

Heitlinger, S ORCID: 0000-0001-6148-350X, Bryan-Kinns, N. and Comber, R. (2019). The Right to the Sustainable Smart City. In: Brewster, S. and Fitzpatrick, G. (Eds.), CHI '19 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. (273.). New York, USA: ACM. ISBN 978-1-4503-5970-2

Heitlinger, S. ORCID: 0000-0001-6148-350X, Bryan-Kinns, N. and Comber, R. (2018). Connected seeds and sensors: co-designing internet of things for sustainable smart cities with urban food-growing communities. In: Huybrechts, L. and Teli, M. (Eds.), PDC '18 Proceedings of the 15th Participatory Design Conference: Short Papers, Situated Actions, Workshops and Tutorial - Volume 2. (18.). New York: ACM. ISBN 978-1-4503-5574-2

Henkin, R., Dykes, J. and Slingsby, A. (2016). Characterizing Representation of Temporal Data Visualization. Poster presented at the VIS 2016, 23-28 Oct 2016, Baltimore, USA.

Henkin, R., Slingsby, A. and Dykes, J. (2015). Exploring Temporal Granularities with Visualization. Poster presented at the VIS 2015, 25-10-2015 - 30-10-2015, Chicago, USA.

Henkin, R., Slingsby, A. and van Loon, E. (2014). Designing Interactive Graphics for Foraging Trips Exploration. Paper presented at the Workshop on Analysis of Movement Data at the Eighth International Conference on Geographic Information Science (GIScience 2014), 23-09-2014 - 26-09-2014, Vienna, Austria.

Hitzler, P., Bader, S. and Garcez, A. (2005). Ontology learning as a use-case for neural-symbolic integration. Paper presented at the IJCAI Workshop on Neural-Symbolic Learning and Reasoning NeSy05, 1 August 2005, Edinburgh.

Houyou, A. M., Huth, H-P., Kloukinas, C., Trsek, H. and Rotondi, D. (2012). Agile manufacturing: General challenges and an IoT@Work perspective. In: UNSPECIFIED (pp. 1-7). IEEE. ISBN 978-1-4673-4735-8

Howe, J. M. (1997). Two loop detection mechanisms: a comparison. Paper presented at the International Conference on Analytic Tableaux and Related Methods (TABLEAUX'97), 13 - 16 May 1997, Pont-a-Mousson, France.

Howe, J. M. and King, A. (2001). Positive Boolean Functions as Multiheaded Clauses. Paper presented at the International Conference on Logic Programming, 26 Nov - 01 Dec 2001, Cyprus.

Howe, J. M. and King, A. (2000). Specialising finite domain programs with polyhedra. Paper presented at the Logic Programming Synthesis and Transformation 1999, 22 - 24 September 1999, Venezia, Italy.

Hu, J., Kaparias, I. and Bell, M. G. H. (2012). Current state and future outlook of traffic data fusion in London. Paper presented at the 15th International IEEE Conference on Intelligent Transportation Systems (ITSC), 16-09-2012 - 19-09-2012, Anchorage, Alaska, USA.

Huang, F. and Strigini, L. (2018). Predicting Software Defects Based on Cognitive Error Theories. Paper presented at the 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 15-18 Oct 2018, Memphis, USA.

Hudic, A., Tauber, M., Lorünser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A. and Weippl, E. (2014). A Multi-Layer and Multi-Tenant Cloud Assurance Evaluation Methodology. Paper presented at the 2014 IEEE 6th International Conference on Cloud Computing Technology and Science (CloudCom), 15-18 Dec 2014, Singapore.

Hunt, S., Askarov, A., Sabelfeld, A. and Sands, D. (2008). Termination-insensitive noninterference leaks more than just a bit. Paper presented at the 13th European Symposium on Research in Computer Security, Oct 2008, Malaga, Spain.

Hunt, S. and Clark, D. (2008). Non-interference for deterministic interactive programs. Paper presented at the 5th International Workshop on Formal Aspects in Security and Trust (FAST2008), Oct 2008, Malaga, Spain.

Hunt, S. and Mastroeni, I. (2005). The PER model of abstract non-interference. Paper presented at the Proc. Static Analysis, 12th International Symposium.

Hunt, S. and Sands, D. (2011). From exponential to polynomial-time security typing via principal types. Lecture Notes in Computer Science, 6602 L, pp. 297-316. ISSN 0302-9743

Hunt, S. and Sands, D. (2008). Just forget it - The semantics and enforcement of information erasure. Lecture Notes in Computer Science, 4960, pp. 239-253. ISSN 0302-9743

Hunt, S. and Sands, D. (2006). On flow-sensitive security types. ACM SIGPLAN-SIGACT, 41, pp. 79-90. ISSN 0362-1340

Jawaid, M. M., Rajani, R., Liatsis, P., Reyes Aldasoro, C. and Slabaugh, G. G. (2017). Improved CTA Coronary Segmentation with a Volume-Specific Intensity Threshold. Paper presented at the Medical Image Understanding and Analysis (MIUA) 2017, 11 Jul 2017, Edinburgh, UK.

John, D., Gatzidis, C., Liarokapis, F., Boucouvalas, A. and Brujic-Okretic, V. (2009). A Framework for the Development of Online, Location-Specific, Expressive 3D Social Worlds. Paper presented at the Games and Virtual Worlds for Serious Applications, 2009.

Jones, K. (2008). Analog and Mixed Signal Verification. Paper presented at the FMCAD 2008 Formal Methods in Computer Aided Design, 17 - 20 Nov 2008, Portland, OR, USA.

Jones, K. and Salako, K. (2013). Modeling Security Policy and the Effect for End-Users. In: Marinos, L. and Askoxylakis, I. (Eds.), Human Aspects of Information Security, Privacy, and Trust. HAS 2013. Lecture Notes in Computer Science. (pp. 256-265). Cham: Springer. ISBN 978-3-642-39345-7

Jones, P. R. ORCID: 0000-0001-7672-8397 and Ometto, G. (2018). Degraded reality: Using VR/AR to simulate visual impairments. In: 2018 IEEE Workshop on Augmented and Virtual Realities for Good (VAR4Good). . IEEE. ISBN 978-1-5386-5978-6

Jones, S., Lynch, P., Maiden, N. and Lindstaedt, S. (2008). Use and Influence of Creative Ideas and Requirements for a Work-Integrated Learning System. Proceedings of the 16th IEEE International Requirements Engineering Conference, pp. 289-294. doi: 10.1109/RE.2008.54 ISSN 1090-705X

Jones, S., Maiden, N. and Karlsen, K. (2007). Creativity in the Specification of Large-Scale Socio-Technical Systems. Paper presented at the Conference on Creative Inventions, Innovations and Everyday Designs in HCI, 13 - 14 Jun 2007, London.

Jones, S., Maiden, N., Manning, S. and Greenwood, J. (2004). Human Activity Modelling in the Specification of Operational Requirements: Work in Progress. Paper presented at the 26th International Conference on Software Engineering, 23 -28 May 2004, Edinburgh, UK.

Jones, S., Maiden, N., Zachos, K. and Zhu, X. (2005). How Service-Centric Systems Change the Requirements Process. Paper presented at the 11th Workshop on Requirements Engineering: Foundation for Software Quality: REFSQ2005, 2005.

Jones, S., Poulsen, A., Maiden, N. and Zachos, K. (2011). User roles in asynchronous distributed collaborative idea generation. Paper presented at the 8th ACM conference on Creativity and cognition, 3 - 6 Nov 2011, Atlanta, Georgia, USA.

Jones, S. and Sapsford, J. (1998). The role of informal representations in early design. Paper presented at the Design, Specification and Verification of Interactive Systems ‘98, 3 - 5 Jun 1998, Abingdon, UK.

Junoh, S. and Aouf, N. ORCID: 0000-0001-9291-4077 (2017). Person Classification Leveraging Convolutional Neural Network for Obstacle Avoidance via Unmanned Aerial Vehicles. Paper presented at the 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS), 3-5 Oct 2017, Linkoping, Sweden.

Kachkaev, A., Wolff, D., Barthet, M., Tidhar, D., Plumbley, M. D., Dykes, J. and Weyde, T. (2014). Visualising Chord Progressions in Music Collections: A Big Data Approach. Paper presented at the 9th Conference on Interdisciplinary Musicology – CIM14, 03-12-2014 - 06-12-2014, Staatliches Institut für Musikforschung, Berlin, Germany.

Kalyvianaki, E., Fiscato, M., Salonidis, T. and Pietzuch, P. (2016). THEMIS: Fairness in Federated Stream Processing under Overload. Paper presented at the 2016 ACM International Conference on Management of Data (SIGMOD), 26 Jun - 01 Jul 2016, San Francisco, USA.

Kalyvianaki, E., Wiesemann, W., Vu, Q. H., Kuhn, D. and Pietzuch, P. (2011). SQPR: Stream query planning with reuse. Paper presented at the 2011 IEEE 27th International Conference on Data Engineering (ICDE), 11-04-2011 - 16-04-2011, Hannover, Germany.

Kaparias, I. and Bell, M. G. H. (2012). London Congestion Charging: Successes, Gaps and Future Opportunities Offered by Cooperative ITS. Paper presented at the 15th IEEE Conference on Intelligent Transportation Systems, 16-09-2012 - 19-09-2012, Anchorage, Alaska, USA.

Karampelas, P., Basdekis, I. and Stephanidis, C. (2009). Web user interface design strategy: Designing for device independence. Paper presented at the 5th International Conference, UAHCI 2009, 19-24 Jul 2009, San Diego, USA.

Karlsen, I. K., Zachos, K., Maiden, N., Jones, S., Turner, I., Rose, M. and Pudney, K. (2011). Supporting reflection and creative thinking by carers of older people with dementia. Paper presented at the Pervasive Computing Technologies for Healthcare (PervasiveHealth), 2011 5th International Conference on, 23 - 26 May 2011, Dublin, Ireland.

Katner, K. and Jianu, R. ORCID: 0000-0002-5834-2658 (2019). The Effectiveness of Nudging in Commercial Settings and Impact on User Trust. In: CHI EA '19 Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. (LBW2716.). New York, USA: ACM. ISBN 978-1-4503-5971-9

Kechagias-Stamatis, O., Aouf, N. ORCID: 0000-0001-9291-4077 and Chermak, L. (2017). B-HoD: A Lightweight and Fast Binary Descriptor for 3D Object Recognition and Registration. 2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC), doi: 10.1109/ICNSC.2017.8000064 ISSN 1810-7869

Kernan, M.A. (2017). Digital Shakespeare, 1996-2017: An exploration of the cultural and technological history of the four Arden Shakespeare digital formats with reference to analytical insights from digital humanities research. Paper presented at the Centre for English Research Seminar, 15 February 2017, London, UK.

Khalili, N., Wood, J. and Dykes, J. (2009). Mapping the geography of social networks. Paper presented at the GIS Research UK, 17th Annual Conference, 1 - 3 Apr 2009, University of Durham, Durham, UK.

Kharlamov, E., Brandt, S., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Kotidis, Y., Lamparter, S., Mailis, T., Neuenstadt, C., Oezcep, O., Pinkel, C., Svingos, C., Zheleznyakov, D., Horrocks, I., Ioannidis, Y. and Moeller, R. (2016). Ontology-Based Integration of Streaming and Static Relational Data with Optique. In: SIGMOD '16 Proceedings of the 2016 International Conference on Management of Data. (pp. 2109-2112). New York: ACM. ISBN 978-1-4503-3531-7

Kharlamov, E., Skjaeveland, M., Hovland, D., Mailis, T., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Xiao, G., Soylu, A., Horrocks, I. and Waaler, A. (2018). Finding Data Should be Easier than Finding Oil. In: 2018 IEEE International Conference on Big Data (Big Data). . UNSPECIFIED. ISBN 978-1-5386-5035-6

Klironomos, Ι., Basdekis, I., Kartakis, G. and Stephanidis, C. (2005). Facilitating virtual networking for Design for All in Europe: The HERMES platform. Paper presented at the eChallenges e-2005, 19-21 Oct 2005, Ljubljana, Slovenia.

Kloukinas, C. (2009). Better abstractions for reusable components & architectures. Paper presented at the 31st International Conference on Software Engineering (ICSE-Companion 2009), 16 - 24 May 2009, Vancouver, BC, Canada.

Kloukinas, C. (2005). Thunderstriking constraints with JUPITER. Paper presented at the Third ACM and IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE '05), 11 - 14 Jul 2005.

Kloukinas, C., Lekeas, G. and Stathis, K. (2008). From Agent Game Protocols to Implementable Roles. Paper presented at the Sixth European Workshop on Multi-Agent Systems - EUMAS, 18 - 19 Dec 2008, Bath, UK.

Kloukinas, C., Saridakis, T. and Issarny, V. (1999). Fault Tolerant Access to Dynamically Located Services for CORBA Applications. Paper presented at the Computer Applications in Industry and Engineering (CAINE-99), 12th Int'l. Conference, 4 - 6 Nov 1999, Atlanta, GE, US.

Kloukinas, C., Spanoudakis, G. and Mahbub, K (2008). Estimating Event Lifetimes for Distributed Runtime Verification. Paper presented at the 20th International Conference on Software Engineering and Knowledge Engineering, 1 - 3 Jul 2008, Redwood City, CA, US.

Kloukinas, C. and Verimag, G. (2004). Data-Mining Synthesised Schedulers for Hard Real-Time Systems. Paper presented at the 19th International Conference on Automated Software Engineering, 24 Sep 2004, Linz, Austria.

Kloukinas, C. and Yovine, S. (2003). Synthesis of Safe, QoS Extendible, Application Specific Schedulers for Heterogeneous Real-Time Systems. Paper presented at the 15th Euromicro Conference on Real-Time Systems, 2003, Porto, Portugal.

Komendantskaya, E., Broda, K. and Garcez, A. (2010). Using inductive types for ensuring correctness of neuro-symbolic computations. Paper presented at the 6th Conference on Computability in Europe, CiE 2010, 30 June - 4 July 2010, Ponta Delgada, Portugal.

Komninos, N. and Junejo, A. K. (2015). Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment. Paper presented at the 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15), 07-12-2015 - 09-12-2015, Limassol, Cyprus.

Komninos, N., Soroush, H. and Salajegheh, M. (2007). LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks. Paper presented at the IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07), 16 - 20 July 2007, Ambleside, UK.

Komninos, N., Vergados, D. D. and Douligeris, C. Two‐Step Authentication in Mobile Ad Hoc Networks. Paper presented at the Global Mobile Congress, 11-16 Oct 2006, Beijing, China.

Kotti, M., Benetos, E. and Kotropoulos, C. (2007). Neural network-based movie dialogue detection. Paper presented at the EANN 2007: 10th International Conference on Engineering Applications of Neural Networks, 29 - 31 Aug 2007, Thessaloniki, Greece.

Krotsiani, M., Kloukinas, C. and Spanoudakis, G. (2017). Cloud Certification Process Validation using Formal Methods. Paper presented at the 15th International Conference on Service Oriented Computing (ICSOC 2017), 13-16 Nov 2017, Malaga, Spain.

Krotsiani, M., Kloukinas, C. and Spanoudakis, G. (2017). Validation of Service Level Agreements using Probabilistic Model Checking. Paper presented at the 14th IEEE International Conference on Services Computing, 25-30 Jun 2017, Honolulu, USA.

Kulak, T. and Garcia Ortiz, M. ORCID: 0000-0003-4729-7457 (2018). Emergence of Sensory Representations Using Prediction in Partially Observable Environments. In: Artificial Neural Networks and Machine Learning – ICANN 2018. Lecture Notes in Computer Science, 11140. (pp. 489-498). Springer. ISBN 978-3-030-01420-9

Kulesza, T., Burnett, M., Stumpf, S., Wong, W., Das, S., Groce, A., Shinsel, A., Bice, F. and McIntosh, K. (2011). Where Are My Intelligent Assistant's Mistakes? A Systematic Testing Approach. Paper presented at the Third International Symposium on End-User Development (IS-EUD), 07 - 10 June 2011, Torre Canne, Italy.

Lahtinen, K., Slingsby, A., Dykes, J., Butt, S. and Fitzgerald, R. (2015). Informing Non-Response Bias Model Creation in Social Surveys with Visualisation. Paper presented at the VIS 2015, 25-10-2015 - 30-10-2015, Chicago, USA.

Lambert, A., Weyde, T. and Armstrong, N. (2014). Studying the Effect of Metre Perception on Rhythm and Melody Modelling with LSTMs. Paper presented at the 3rd International Workshop on Musical Metacreation, held at the 10th Artificial Intelligence and Interactive Digital Entertainment Conference, 03-10-2014 - 07-10-2014, Raleigh, USA.

Lambert, A. J., Weyde, T. ORCID: 0000-0001-8028-9905 and Armstrong, N. ORCID: 0000-0002-1927-7371 (2016). Adaptive Frequency Neural Networks for Dynamic Pulse and Metre Perception. In: Mandel, M. I., Devaney, J., Turnbull, D. and Tzanetakis, G. (Eds.), Proceedings of the 17th International Society for Music Information Retrieval Conference, ISMIR 2016, New York City, United States, August 7-11, 2016. (pp. 60-66). Dagstuhl: Schloss Dagstuhl LZI,. ISBN 978-0-692-75506-8

Lazareva, A., Asad, M. and Slabaugh, G. G. (2017). Learning to Deblur Adaptive Optics Retinal Images. Paper presented at the 14th International Conference, ICIAR 2017, 5-7 Jul 2017, Montreal, Canada.

Li, F., Rahulamathavan, Y. and Rajarajan, M. (2014). Lightweight Static and Dynamic Attributes Based Access Control Scheme for Secure Data Access in Mobile Environment. Paper presented at the 39th IEEE Conference on Local Computer Networks, 08-09-2014 - 11-09-2014, Edmonton, Canada.

Li, S., Alonso, E., Fairbank, M., Jaithwa, I. and Wunsch, D. C. (2015). Hardware Validation for Control of Three-Phase Grid-Connected Microgrids Using Artificial Neural Networks. Paper presented at the 12th International Conference on Applied Computing 2015, 24-10-2015 - 26-10-2015, Maynooth, Ireland.

Li, S., Fairbank, M., Wunsch, D. C. and Alonso, E. (2012). Vector Control of a Grid-Connected Rectifier/Inverter Using an Artificial Neural Network. Paper presented at the IEEE International Joint Conference on Neural Networks (IEEE IJCNN 2012), 1783-1789, 10-15-2012, Brisbane, Australia.

Li, S., Fu, X., Alonso, E., Fairbank, M. and Wunsch, D. C. (2016). Neural-network based vector control of VSCHVDC transmission systems. Paper presented at the 4th International Conference on Renewable Energy Research and Applications (ICRERA), 22-25 Nov 2015, Palermo, Italy.

Littlewood, B. and Bloomfield, R. E. (2004). On the use of diverse arguments to increase confidence in dependability claims. Paper presented at the International Conference on Control and Instrumentation in Nuclear Installations, 2004, Liverpool, UK.

Littlewood, B., Bloomfield, R. E., Popov, P. T., Povyakalo, A. A. and Strigini, L. (2004). The impact of "difficulty" variation on the probability of coincident failure of diverse systems. Paper presented at the International Conference on Control and Instrumentation in Nuclear Installations, 2004, Liverpool, UK.

Lloyd, D., Dykes, J. and Radburn, R. (2008). Mediating geovisualization to potential users and prototyping a geovisualization application. Paper presented at the GIS Research UK 16th Annual Conference GISRUK 2008, 2 - 4 Aug 2008, Manchester Metropolitan University, Manchester, UK.

Lu, W., Robertson, S. and MacFarlane, A. (2006). CISR at INEX 2006. Paper presented at the 5th International Workshop of the Initiative for the Evaluation of XML Retrieval, 17-12-2006 - 20-12-2006, Dagstuhl Castle, Germany.

Lu, W., Robertson, S., MacFarlane, A. and Zhao, L. (2007). Window based Enterprise Expert Search. Paper presented at the Fifteenth Text REtrieval Conference (TREC 2006), 14-11-2006 - 17-11-2006, Gaithersburg, Maryland.

MacFarlane, A., Missaoui, S. and Frankowska-Takhari, S. (2019). On machine learning and knowledge organisation in Multimedia Information Retrieval. Paper presented at the ISKO UK Sixth Biennial Conference: The Human Position in an Artificial World: Creativity, Ethics and AI in Knowledge Organization, 15-16 Jul 2019, London, UK.

MacFarlane, A., Robertson, S. E. and McCann, J. A. (2003). Parallel computing for term selection in routing/filtering. Paper presented at the 25th European Conference on Information Retrieval Research (ECIR 2003), 14-04-2003 - 16-04-2003, Pisa, Italy.

Mai, L., Kalyvianaki, E. and Costa, P. (2013). Exploiting Time-Malleability in Cloud-based Batch Processing Systems. Paper presented at the LADIS '13: 7th Workshop on Large-Scale Distributed Systems and Middleware, 02-11-2013 - 03-11-2013, Pennsylvania, USA.

Maiden, N., Jones, S., Karlsen, I. K., Neill, R., Zachos, K. and Milne, A. (2010). Requirements Engineering as Creative Problem Solving: A Research Agenda for Idea Finding. Paper presented at the Requirements Engineering Conference (RE), 2010 18th IEEE International, 27 Sep - 1 Oct 2010, Sydney, Australia.

Maiden, N., Manning, S., Robertson, S. and Greenwood, J. (2004). Integrating Creativity Workshops into Structured Requirements Processes. Paper presented at the DIS’2004, 5th conference on Designing interactive systems: processes, practices, methods, and techniques, 01-08-2004 - 04-08-2004, Cambridge , USA.

Maiden, N. and Robertson, S. (2005). Integrating creativity into requirements processes: experiences with an air traffic management system. Paper presented at the 13th IEEE International Conference on Requirements Engineering, 29-08-2005 - 02-09-2005, La Sorbonne, France.

Maiden, N., Schubmann, M., McHugh, M., Lai, A.Y. and Sulley, R. (2016). Evaluating the Impact of a New Interactive Digital Solution for Collecting Care Quality In-formation for Residential Homes. Paper presented at the 30th British Human Computer Interaction Conference, 11-15 Jul 2016, Bournemouth, UK.

Maiden, N. ORCID: 0000-0001-6233-8320, Zachos, K. ORCID: 0000-0003-1977-7090, Brown, A., Nyre, L., Holm, N., Tonheim, A., Hesseling, C., Wagemans, A. and Apstolou, D. (2019). Evaluating the Use of Digital Creativity Support by Journalists in Newsrooms. In: C&C '19 Proceedings of the 2019 on Creativity and Cognition. (pp. 222-232). New York, USA: ACM. ISBN 978-1-4503-5917-7

Maiden, N., Zachos, K., Lockerbie, J., Brock, G. and Traver, C. (2016). Developing and Evaluating Digital Creativity Support in Google Docs for Journalists. Paper presented at the British HCI Conference 2016, 11-15 July 2016, Bournemouth, UK.

Makri, S. (2013). From Grounded Theory to Design Practice. Paper presented at the BCS-HCI 2013 Workshop, 9 Sep 2013, Brunel University, UK.

Makri, S. (2014). Serendipity is not Bullshit. Paper presented at the EuroHCIR 2014, The 4th European Symposium on Human-Computer Interaction and Information Retrieval, 13 Sep 2014, London, UK.

Marques, P., Dabbabi, Z., Mironescu, M-M., Thonnard, O., Bessani, A., Buontempo, F. and Gashi, I. ORCID: 0000-0002-8017-3184 (2018). Detecting Malicious Web Scraping Activity: a Study with Diverse Detectors. Paper presented at the The 23rd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2018), 4-7 Dec 2018, Taipei, Taiwan.

Martin, C., Corney, D., Goker, A. S. and MacFarlane, A. (2013). Mining Newsorthy Topics from Social Media. Paper presented at the BCS SGAI Workshop on Social Media Analysis 2013, 10-12-2013, Cambridge, UK.

McKay, D. and Buchanan, G. (2016). You Can Check It Out But It Will Never Leave: Characterising Ebook Borrowing Patterns. In: CHIIR '16 Proceedings of the 2016 ACM on Conference on Human Information Interaction and Retrieval. (pp. 203-212). New York, NY: ACM Press. ISBN 978-1-4503-3751-9

Mearns, L., Benetos, E. and Dixon, S. (2011). Automatically detecting key modulations in J.S. Bach chorale recordings. Paper presented at the 8th Sound and Music Computing Conference, 6 - 9 Jul 2011, Padova, Italy.

Mereani, F. and Howe, J. M. ORCID: 0000-0001-8013-6941 (2018). Preventing Cross-Site Scripting Attacks by Combining Classifiers. In: Proceedings of the 10th International Joint Conference on Computational Intelligence. (pp. 135-143). San Francisco, USA: SCITEPRESS. ISBN 978-989758327-8

Miah, S., Milonidis, E., Kaparias, I. and Karcanias, N. ORCID: 0000-0002-1889-6314 (2018). A Novel Fusion Algorithm to Improve Localisation Accuracy of an Instrumented Bicycle. Paper presented at the 97th Annual Meeting of the Transportation Research Board, 7 - 11 January 2018, Washington, USA.

Missaoui, S., Gutierrez-Lopez, M., MacFarlane, A. ORCID: 0000-0002-8057-0737, Makri, S. ORCID: 0000-0002-5817-4893, Porlezza, C. ORCID: 0000-0002-1400-5879 and Cooper, G. ORCID: 0000-0003-2367-8626 (2019). How to Blend Journalistic Expertise with Artificial Intelligence for Research and Verifying News Stories. Paper presented at the CHI 2019 ACM Conference on Human Factors in Computing Systems, 04 - 09 May 2019, Glasgow, UK.

Mitrokotsa, A., Komninos, N. and Douligeris, C. (2007). Towards an effective intrusion response engine combined with intrusion detection in ad hoc networks. Paper presented at the The Sixth Annual Mediterranean Ad Hoc Networking WorkShop, 12th - 15th June 2007, Corfu, Greece.

Mota, E., Howe, J. M. ORCID: 0000-0001-8013-6941, Schramm, A. and d'Avila Garcez, A. S. (2019). Efficient Predicate Invention using Shared NeMuS. Paper presented at the 14th International Workshop on Neural-Symbolic Learning and Reasoning, 10 - 16 August 2019, Macau, China.

Myklebust, E., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Chen, J., Wolf, R. and Tollefsen, K. E. (2019). Knowledge Graph Embedding for Ecotoxicological Effect Prediction. presented at the UNSPECIFIED.

Nair, S. K., Porwal, S., Dimitrakos, T., Ferrer, A. J., Tordsson, J., Sharif, T., Sheridan, C., Rajarajan, M. and Khan, A. U. (2010). Towards secure cloud bursting, brokerage and aggregation. Paper presented at the IEEE European conference on Web Services, 1 Dec 2010 - 3 Dec 2010, Cyprus.

Neate, T., Bourazeri, K., Roper, A. ORCID: 0000-0001-6950-6294, Stumpf, S. ORCID: 0000-0001-6482-1973 and Wilson, S. ORCID: 0000-0001-6445-654X (2019). Co-Created Personas: Engaging and Empowering Users with Diverse Needs Within the Design Process. In: CHI '19 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. (650.). New York, USA: ACM. ISBN 978-1-4503-5970-2

Neate, T., Roper, A. ORCID: 0000-0001-6950-6294, Wilson, S. ORCID: 0000-0001-6445-654X and Marshall, J. ORCID: 0000-0002-6589-221X (2019). Empowering Expression for Users with Aphasia through Constrained Creativity. In: Brewster, S. and Fitzpatrick, G. (Eds.), CHI '19 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. (650.). New York, USA: ACM. ISBN 978-1-4503-5970-2

Netkachova, K., Müller, K., Paulitsch, M. and Bloomfield, R. E. (2015). Security-Informed Safety Case Approach to Analysing MILS Systems. Paper presented at the International Workshop on MILS: Architecture and Assurance for Secure Systems, 19-21 January 2015, Amsterdam, The Netherlands.

Nguyen, P., Turkay, C., Andrienko, G., Andrienko, N. and Thonnard, O. (2017). A Visual Analytics Approach for User Behaviour Understanding through Action Sequence Analysis. Paper presented at the EuroVis Workshop on Visual Analytics, 12-13 Jun 2017, Barcelona, Spain.

Nguyen, P., Xu, K., Bardill, A., Salman, B., Herd, K. and Wong, W. (2016). SenseMap: Supporting Browser-based Online Sensemaking through Analytic Provenance. Paper presented at the VIS 2016, 23-28 Oct 2016, Baltimore, USA.

Nordin, A. I., Denisova, A. and Cairns, P. (2014). Too Many Questionnaires: Measuring Player Experience Whilst Playing Digital Games. Paper presented at the The Seventh York Doctoral Symposium on Computer Science and Electronics, 30 Oct 2014, York, UK.

Olliverre, N. J., Yang, G., Slabaugh, G. G., Reyes-Aldasoro, C. C. ORCID: 0000-0002-9466-2018 and Alonso, E. (2018). Generating Magnetic Resonance Spectroscopy Imaging Data of Brain Tumours from Linear, Non-Linear and Deep Learning Models. In: Simulation and Synthesis in Medical Imaging. Lecture Notes in Computer Science (11037). (pp. 130-138). Cham, Switzerland: Spirnger. ISBN 978-3-030-00535-1

Ostermann, F. O., Huang, H., Andrienko, G., Andrienko, N., Capineri, C., Farkas, K. and Purves, R. S. (2015). Extracting and comparing places using geo-social media. ISPRS GEOSPATIAL WEEK 2015, II-3(W5), doi: 10.5194/isprsannals-II-3-W5-311-2015 ISSN 2194-9034

Owen, T., Pearson, J., Thimbleby, H. W. and Buchanan, G. (2015). ConCap: Designing to Empower Individual Reflection on Chronic Conditions using Mobile Apps. In: MobileHCI '15 Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. (pp. 105-114). New York, NY: ACM. ISBN 978-1-4503-3652-9

Ozkaya, M. and Kloukinas, C. (2013). Are we there yet? Analyzing architecture description languages for formal analysis, usability, and realizability. Paper presented at the 39th Euromicro Conference Series on Software Engineering and Advanced Applications, SEAA 2013, 4th - 6th September 2013, Santander, Spain.

Ozkaya, M. and Kloukinas, C. (2014). Design-by-contract for reusable components and realizable architectures. In: CBSE '14 Proceedings of the 17th international ACM Sigsoft symposium on Component-based software engineering. (pp. 129-138). New York, USA: ACM. ISBN 9781450325776

Ozkaya, M. and Kloukinas, C. (2013). Towards a design-by-contract based approach for realizable connector-centric software architectures. Paper presented at the ICSOFT 2013 - Proceedings of the 8th International Joint Conference on Software Technologies, 29 - 31 Jul 2013, Rejkyavik, Iceland.

Papakonstantinou, S. and Brujic-Okretic, V. (2009). Prototyping a Context-Aware Framework for Pervasive Entertainment Applications. Paper presented at the Games and Virtual Worlds for Serious Applications.

Paterson, R. A. (2012). Constructing applicative functors. Paper presented at the 11th International Conference, Mathematics of Program Construction, 25 - 27 Jun 2012, Madrid, Spain.

Pawar, P. S., Nair, S. K., El-Mousaa, F., Dimitrakos, T., Rajarajan, M. and Zisman, A. (2012). Opinion Model Based Security Reputation Enabling Cloud Broker Architecture. Paper presented at the CloudComp 2012 - 3rd International Conference on Cloud Computing, 24 - 26 Sep 2012, Vienna, Austria.

Pearson, J. and Buchanan, G. (2011). CloudBooks: An Infrastructure for Reading on Multiple Devices. Paper presented at the International Conference on Theory and Practice of Digital Libraries, TPDL 2011, 26-09-2011 - 28-09-2011, Berlin, Germany.

Petroulakis, N. E., Spanoudakis, G. and Askoxylakis, Y. (2018). Fault Tolerance Using an SDN Pattern Framework. In: GLOBECOM 2017 - 2017 IEEE Global Communications Conference. . Institute of Electrical and Electronics Engineers. ISBN 978-1-5090-5019-2

Pino, L. and Spanoudakis, G. (2012). Constructing secure service compositions with patterns. Paper presented at the 2012 IEEE 8th World Congress on Services, SERVICES 2012, 24 -29 June 2012, Honolulu, Hawaii.

Pitts, K., Zachos, K. and Maiden, N. (2013). Creativity Support for Learning in the Person-Centred Care of Older People with Dementia. Paper presented at the Computational tools fostering Creativity in Learning processes (CCL), 18-09-2013, Paphos, Cyprus.

Pizza, M., Strigini, L., Bondavalli, A. and Di Giandomenico, F. (1998). Optimal discrimination between transient and permanent faults. Paper presented at the High-Assurance Systems Engineering Symposium, 13 - 14 Nov 1998, Washington DC, USA.

Popov, P. T. (2015). Stochastic Modeling of Safety and Security of the e-Motor, an ASIL-D Device. Paper presented at the 34th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2015, 23-09-2015 - 25-09-2015, Delft University of Technology, Netherlands.

Popov, P. T., Povyakalo, A. A., Stankovic, V. and Strigini, L. (2014). Software diversity as a measure for reducing development risk. Paper presented at the Tenth European Dependable Computing Conference - EDCC 2014, 13 - 16 May 2014, Newcastle upon Tyne, UK.

Popov, P. T., Salako, K. and Stankovic, V. (2015). Stochastic modeling for performance evaluation of database replication protocols. Lecture Notes in Computer Science, 9259(9259), pp. 21-37. doi: 10.1007/978-3-319-22264-6_2 ISSN 0302-9743

Procopiou, A. and Komninos, N. (2015). Current and Future Threats Framework in Smart Grid Domain. Paper presented at the 5th Annual IEEE International Conference on CYBER Technology in Automation Control and Intelligence Systems, 8-06-2015 - 12-06-2015, Shenyang, China.

Rahman, N. E. A., Azhar, A., Karunanayaka, K., Cheok, A. D. ORCID: 0000-0001-6316-2339, Johar, M. A. M. and Gross, J. (2016). Magnetic Table Interface and Magnetic Foods. In: HAI '16 Proceedings of the Fourth International Conference on Human Agent Interaction. (pp. 79-81). New York, NY: ACM. ISBN 978-1-4503-4508-8

Rajarajan, M., Adamsky, F., Khan, H., Khayam, S. A. and Jager, R. (2011). Destabilizing BitTorrent's clusters to attack high bandwidth lechers. Poster presented at the 18th ACM Conference on Computer and Communications Security (CCS 2011), 17 Oct 2011 - 21 Oct 2011, SWISSÔTEL Chicago, Chicago, IL, USA.

Rajarajan, M., Sajjad, A., Zisman, A., Nair, S. K. and Dimitrakos, T. (2011). Dynamic virtual private network provisioning from multiple cloud infrastructure service providers. Paper presented at the 4th European Conference, ServiceWave 2011, 26 - 28 Oct 2011, Poznan, Poland.

Rajarajan, M., Sajjad, A., Zisman, A., Nair, S. K. and Dimitrakos, T. (2012). Secure communication using dynamic VPN provisioning in an Inter-Cloud environment. Paper presented at the ICON 2012: 18th IEEE International Conference on Networks, 12 - 14 Dec 2012, Singapore.

Randell, R., Mamykina, L., Fitzpatrick, G., Tanggaard, C. and Wilson, S. (2009). Evaluating New Interactions in Healthcare: Challenges and Approaches. Paper presented at the CHI2009 Conference on Human Factors in Computing Systems, 03-04-2009 - 09-04-2009, Boston, MA, USA.

Riaz, A., Alonso, E. and Slabaugh, G. G. (2016). Phenotypic Integrated Framework for Classification of ADHD using fMRI. In: Image Analysis and Recognition. ICIAR 2016. Lecture Notes in Computer Science, 9730. (pp. 217-225). Cham: Springer. ISBN 978-3-319-41500-0

Robertson, S. E., Lu, W. and MacFarlane, A. (2006). XML-structured documents: Retrievable units and inheritance. Paper presented at the 7th International Conference on Flexible Query Answering Systems, 07-06-2006 - 10-06-2006, Milan, ITALY.

Robinson, T., Babic-Rosario, A. and Wiertz, C. (2019). Pre-Consumption of Service Robots: The Role of Narrated Assemblages in Experiential Control. Paper presented at the 10th EIASM Interpretive Consumer Research Workshop, 9-10 May 2019, Lyon, France.

Ruiz, J. A. D. and Aouf, N. ORCID: 0000-0001-9291-4077 (2017). Real-Time Setup with PD and Backstepping Control for a Pelican Quadrotor. In: Gusikhin, O. and Madani, K. (Eds.), Proceedings of the 14th International Conference on Informatics in Control, Automation and Robotics. (pp. 676-681). SciTePress. ISBN 978-989-758-263-9

Ruiz, J. A. D. and Aouf, N. (2017). Unscented Kalman Filter for Vision based Target Localisation with a Quadrotor. In: Gusikhin, O. and Madani, K. (Eds.), Proceedings of the 14th International Conference on Informatics in Control, Automation and Robotics. . SciTePress. ISBN 978-989-758-264-6

Rushby, J., Littlewood, B. and Strigini, L. (2014). Evaluating the Assessment of Software Fault-Freeness. Paper presented at the AESSCS 2014, 13-05-2015, Newcastle upon Tyne.

Rybynok, V., Kyriacou, P. A., Binnersley, J., Woodcock, A. and Wallace, L. M. (2009). My Care Card development: the patient held electronic health record device. Paper presented at the 2009 9th International Conference on Information Technology and Applications in Biomedicine, 4-7 Nov 2009, Larnaca, Cyprus.

Sajjad, A., Rajarajan, M. and Dimitrakos, T. (2015). A low-overhead secure communication framework for an inter-cloud environment. In: Al-Saidi, A., Fleischer, R., Maamar, Z. and Rana, O. (Eds.), Intelligent Cloud Computing. ICC 2014. Lecture Notes in Computer Science. (pp. 121-136). Cham: Springer. ISBN 978-3-319-19847-7

Samshir, N. A., Johari, N., Karunanayaka, K. and Cheok, A. D. ORCID: 0000-0001-6316-2339 (2016). Thermal Sweet Taste Machine for Multisensory Internet. In: HAI 2016 - Proceedings of the 4th International Conference on Human Agent Interaction. (pp. 325-328). ACM. ISBN 978-1-4503-4508-8

Sathiyanarayanan, M. ORCID: 0000-0002-8598-1949 (2017). Improving Visual Investigation Analysis of Digital Communication Data within E-discovery. Paper presented at the VIS 2017, 1-6 Oct 2017, Phoenix, USA.

Sathiyanarayanan, M. ORCID: 0000-0002-8598-1949 and Abubhaka, B. (2014). Dual MCDRR Scheduler for Hybrid TDM/WDM Optical Networks. In: Negi, A., Kishore, K., Kumar, K. and Venkatramaphanikumar, S. (Eds.), 2014 First International Conference on Networks & Soft Computing (ICNSC2014). (pp. 418-422). IEEE. ISBN 978-1-4799-3485-0

Sathiyanarayanan, M. ORCID: 0000-0002-8598-1949 and Turkay, C. ORCID: 0000-0001-6788-251X (2017). Challenges and Opportunities in using Analytics Combined with Visualisation Techniques for Finding Anomalies in Digital Communications. Paper presented at the The 16th International Conference on Artificial Intelligence and Law, 12- 16 Jun, 2017, London, United kingdom.

Schnell, R. (2013). Efficient private record linkage of very large datasets. Paper presented at the 59th World Statistics Congress of the International Statistical Institute, 25-30 Aug 2013, Hong Kong.

Schnell, R. (2013). Privacy-Preserving Record Linkage and Privacy-Preserving Blocking for Large Files with Cryptographic Keys using Multibit Trees. Paper presented at the Joint Statistical Meeting, 3-8 Aug 2013, Montreal, Canada.

Schnell, R. (2017). Randomized Response and Balanced Bloom Filters for Privacy Preserving Record Linkage. Paper presented at the 16th IEEE International Conference on Data Mining Workshop, ICDMW 2016, 12-15 Dec 2016, Barcelona, Spain.

Schnell, R. and Borgs, C. (2015). Building a national perinatal database without the use of unique personal identifiers. Paper presented at the IEEE International Conference on Data Mining, 14-11-2015 - 17-11-2015, Atlantic City, USA.

Secker, J. and Price, G. (2007). Libraries as a social space: enhancing the experience of distance learners using social networking tools. Paper presented at the Libraries Without Walls 7: Exploring 'anytime, anywhere' delivery of library services, 14-18 Sep 2007, Lesbos, Greece.

Sevastjanova, R., Becker, F., Ell, B., Turkay, C. ORCID: 0000-0001-6788-251X, Henkin, R. ORCID: 0000-0002-5511-5230, Butt, M., Keim, D. and Mennatallah, E-A. (2018). Going beyond Visualization. Verbalization as Complementary Medium to Explain Machine Learning Models. Paper presented at the VIS Workshop on Visualization for AI Explainability (VISxAI), 22 October 2018, Berlin, Germany.

Seyff, N., Graf, F. and Maiden, N. (2010). Using mobile RE tools to give end-users their own voice. Paper presented at the Requirements Engineering Conference (RE), 2010 18th IEEE International, 27 Sep - 1 Oct 2010, Sydney, Australia.

Sherwani, D. and Stumpf, S. (2014). Toward helping users in assessing the trustworthiness of user-generated reviews. Paper presented at the 28th International BCS Human Computer Interaction Conference (HCI 2014), 9-12 Sep 2014, Southport, UK.

Shittu, R., Healing, A., Ghanea-Hercock, R., Bloomfield, R. E. and Rajarajan, M. (2014). A New Metric for Prioritising Intrusion Alerts Using Correlation and Outlier Analysis. Paper presented at the 39th IEEE Conference on Local Computer Networks, 08-09-2014 - 11-09-2014, Edmonton, Canada.

Shuhui, L., Fu, X., Jaithwa, I., Alonso, E., Fairbank, M. and Wunsch, D. C. (2015). Control of Three-Phase Grid-Connected Microgrids Using Artificial Neural Networks. Paper presented at the 7th International Joint Conference on Computational Intelligence (IJCCI 2015), 12-11-2015 - 14-11-2015, Lisbon, Portugal.

Sigtia, S., Benetos, E., Cherla, S., Weyde, T., Garcez, A. and Dixon, S. (2014). An RNN-based Music Language Model for Improving Automatic Music Transcription. Paper presented at the 15th International Society for Music Information Retrieval Conference (ISMIR), 27-10-2014 - 31-10-2014, Taipei, Taiwan.

Silva, N., Blascheck, T., Jianu, R., Rodriguez, N., Raubal, M., Schreck, T. and Weiskopf, D. (2019). Eye Tracking Support for Visual Analytics Systems. In: Krejtz, K. and Sharif, B. (Eds.), ETRA '19 Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications. (11.). New York, USA: ACM. ISBN 978-1-4503-6709-7

Sisarica, A. and Maiden, N. (2013). An Emerging Model of Creative Game-based Learning. Paper presented at the 4th International Conference, SGDA 2013, 25-09-13 - 27-09-13, Trondheim, Norway.

Sisarica, A., Maiden, N., Morosini, D., Panesse, L., Pudney, K. and Rose, M. (2013). Creativity Support in a Serious Game for Dementia Care. Paper presented at the 9th ACM Conference on Creativity & Cognition, 17-06-2013 - 20-06-2013, Sydney, Australia.

Siveroni, I., Zisman, A. and Spanoudakis, G. (2008). Property specification and static verification of UML models. Paper presented at the Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, 4 - 7 Mar 2008, Barcelona, Spain.

Slabaugh, G. G., Child, C. H. T., Alonso, E. and Basaru, R. R. (2016). HandyDepth: Example-based Stereoscopic Hand Depth Estimation using Eigen Leaf Node Features. Paper presented at the International Conference on Systems, Signals and Image Processing, 23-25 May 2016, Bratislava, Slovakia.

Slabaugh, G. G., Culbertson, B., Malzbender, T. and Schafer, R. W. (2001). A survey of methods for volumetric scene reconstruction from photographs. Paper presented at the 2001 Eurographics conference on Volume Graphics, 21-06-2001 - 22-06-2001, New York, USA.

Slabaugh, G. G., Dinh, H. Q. and Unal, G. B. (2007). A Variational Approach to the Evolution of Radial Basis Functions for Image Segmentation. Paper presented at the IEEE Conference on Computer Vision and Pattern Recognition, 2007, 17-06-2007 - 22-07-2007, Minneapolis, USA.

Slabaugh, G. G., Schafer, R. W. and Hans, M. C. (2002). Image-Based Photo Hulls. Paper presented at the First International Symposium on 3D Data Processing Visualization and Transmission, 19-06-2002 - 21-06-2002, Padova, Italy.

Slabaugh, G. G., Schafer, R. W. and Hans, M. C. (2002). Multi-resolution space carving using level set methods. Paper presented at the 2002 International Conference on Image Processing., 22-09-2002 - 25-09-2002, New York, USA.

Slabaugh, G. G., Unal, G. B. and Chang, T. C. (2006). Information-theoretic feature detection in ultrasound images. Paper presented at the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2006 (EMBS '06), 30-08-2006 - 03-09-2006, New York, USA.

Slabaugh, G. G., Unal, G. B., Fang, T., Rossignac, J. and Whited, B. (2008). Variational Skinning of an Ordered Set of Discrete 2D Balls. Paper presented at the 5th International Conference, GMP 2008., 23-04-2008 - 25-04-2008, Hangzhou, China.

Slabaugh, G. G., Unal, G. B., Tong Fang, . and Wels, M. (2006). Ultrasound-Specific Segmentation via Decorrelation and Statistical Region-Based Active Contours. Paper presented at the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 17-06-2006 - 22-06-2006, New York, USA.

Slingsby, A. ORCID: 0000-0003-3941-553X (2018). Tilemaps for Summarising Multivariate Geographical Variation. Paper presented at the VIS 2018, 21-26 Oct 2018, Berlin, Germany.

Slingsby, A., Dykes, J., Wood, J. and Clarke, K. (2007). Interactive tag maps and tag clouds for the multiscale exploration of large spatio-temporal datasets. Information Visualization, 2007. IV '07. 11th International Conference, pp. 497-504. ISSN 1550-6037

Slingsby, A., Dykes, J., Wood, J. and Clarke, K. (2007). Mashup cartography: cartographic issues of using Google Earth for tag maps. Paper presented at the ICA Commission on Maps and the Internet, 31 Jul - 2 Aug 2007, Warsaw, Poland.

Slingsby, A. ORCID: 0000-0003-3941-553X, Hyde, J. and Turkay, C. ORCID: 0000-0001-6788-251X (2019). Visual Analysis of Reactionary Train Delay from an Agent Based Model. Poster presented at the EuroVis 2019, 3-7 Jun 2019, Porto, Portugal.

Slingsby, A., Lowe, R., Dykes, J., Stephenson, D., Wood, J. and Jupp, T. (2009). A pilot study for the collaborative development of new ways of visualising seasonal climate forecasts. Paper presented at the GIS Research UK, 17th Annual Conference, 1 - 3 Apr 2009, University of Durham, Durham, UK.

Slingsby, A. ORCID: 0000-0003-3941-553X, Paterson, A., Rigby, M., Grace, K., Nguyen, P. ORCID: 0000-0001-5643-0585, Perin, C. ORCID: 0000-0002-7324-9363, Turkay, C. ORCID: 0000-0001-6788-251X and Aljasem, D. (2018). Characterising Farms by the Movement of Animals through Them. Paper presented at the VIS 2018, 21-26 Oct 2018, Berlin, Germany.

Slingsby, A. and van Loon, E. (2017). Temporal tile-maps for characterising the temporal occupancy of places: A seabird case study. presented at the 25th Geographical Information Science (GIS) Research UK Conference, 18 Apr 2017 - 21 Apr 2017, Manchester, UK.

Slingsby, A. and van Loon, E. (2017). Visual Characterisation of Temporal Occupancy for Movement Ecology. Paper presented at the Workshop on Visualisation in Environmental Sciences (EnvirVis), 12-13 Jun 2017, Barcelona, Spain.

Spachos, D., Zlantintsi, A., Moschou, V., Antonopoulos, P., Benetos, E., Kotti, M., Tzimouli, K., Kotropoulos, C., Nikolaidis, N., Maragos, P. and Pitas, I. (2008). MUSCLE movie-database: a multimodal corpus with rich annotation for dialogue and saliency detection. Paper presented at the Multimodal Corpora: From Models of Natural Interaction to Systems and Applications, 27 May 2008, Marrakech, Morocco.

Spanos, P. D. and Giaralis, A. (2008). Statistical linearization based estimation of the peak response of nonlinear systems subject to the EC8 design spectrum. 2008 SEISMIC ENGINEERING CONFERENCE COMMEMORATING THE 1908 MESSINA AND REGGIO CALABRIA EARTHQUAKE, PARTS 1 AND 2, 1020, pp. 1236-1244. ISSN 0094-243X

Spanoudakis, G. and Comuzzi, M. (2009). Describing and Verifying Monitoring Capabilities for Service Based Systems. Paper presented at the CAiSE 2009 Forum, 8-12 Jun 2009, Amsterdam, The Netherlands.

Spanoudakis, G., Damiani, E. and Maña, A. (2012). Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach. Paper presented at the High-Assurance Systems Engineering (HASE), 2012 IEEE 14th International Symposium on, 25 - 27 Oct 2012, Omaha, US.

Spanoudakis, G., Kloukinas, C. and Androutsopoulos, K. (2008). Dynamic verification and control of mobile peer-to-peer systems. Paper presented at the 3rd International Conference on Internet Monitoring and Protection, 29 Jun - 5 Jul 2008, Bucharest, Romania.

Spanoudakis, G. and LoPresti, S. (2009). Web Service Trust: Towards A Dynamic Assessment Framework. Paper presented at the International Conference on Availability, Reliability and Security, 2009. ARES '09, 16 - 19 Mar 2009, Fukuoka Institute of Technology, Fukuoka, Japan.

Strigini, L. (2004). Formalism and judgement in assurance cases. Paper presented at the Workshop on Assurance Cases: Best Practices, Possible Obstacles, and Future Opportunities, held at International Conference on Dependable Systems and Networks (DSN 2004), Jun 2004, Florence, Italy.

Strigini, L., Bloomfield, R. E., Paulitsch, M. and Reiger, R. (2012). Evidence-Based Security in Aerospace. From Safety to Security and Back Again. Paper presented at the 23rd International Symposium on Software Reliability Engineering (ISSRE 2012), Fast Abstracts Track, 26 - 29 Nov 2012, Dallas, Texas, USA.

Strigini, L., Popov, P. T. and Littlewood, B. (2000). Assessing the Reliability of Diverse Fault-Tolerant Systems. Paper presented at the INucE International Conference on Control and Instrumentation in Nuclear Installations, Bristol, UK.

Strigini, L., Popov, P. T. and Romanovsky, A. (2000). Diversity for off-the-shelf components. Paper presented at the International Conference on Dependable Systems & Networks (FTCS-30, DCCA-8), New York, NY, USA.

Strigini, L., Povyakalo, A. A. and Alberdi, E. (2003). Human-machine diversity in the use of computerised advisory systems: a case study. Paper presented at the International Conference on Dependable Systems and Networks (DSN'03), 22 - 25 Jun 2003, San Francisco, California.

Stumpf, S., Fitzhenry, E. and Dietterich, T. G. (2007). The use of provenance in information retrieval. Paper presented at the Workshop on Principles of Provenance (PROPR), 19 - 20 November 2007, Edinburgh, Scotland.

Stumpf, S. and Muscroft, S. (2011). When users generate music playlists: When words leave off, music begins?. Paper presented at the Third International Workshop on Advances in Music Information Research (AdMIRe) in conjunction with the IEEE International Conference on Multimedia and Expo (ICME), 11 - 15 July 2011, Barcelona, Spain.

Stumpf, S., Sullivan, E., Fitzhenry, E., Oberst, I., Wong, W-K. and Burnett, M. (2008). Integrating rich user feedback into intelligent user interfaces. Paper presented at the International Conference on Intelligent User Interfaces, 24-27 Feb 2014, Haifa, Israel.

Sustar, H., Jones, S. and Maiden, N. (2011). Creativity in Older People Designing Digital Devices. Paper presented at the CREATE’11 Symposium, 23 Jun 2011, London, UK.

Tedeschi, S., Emmanouilidis, C., Farnsworth, M., Mehnen, J. and Roy, R. ORCID: 0000-0001-5491-7437 (2017). New Threats for Old Manufacturing Problems: Secure IoT-Enabled Monitoring of Legacy Production Machinery. In: Lodding, H., Riedel, R., Thoben, K. D., von Cieminski, G. and Kitritis, D. (Eds.), Advances in Production Management Systems. The Path to Intelligent, Collaborative and Sustainable Manufacturing. APMS 2017. IFIP Advances in Information and Communication Technology (513). (pp. 391-398). Cham: Springer. ISBN 9783319669229

Teichmann, J., Alonso, E. and Broom, M. (2015). A reward-driven model of Darwinian fitness. Paper presented at the 7th International Joint Conference on Computational Intelligence (IJCCI 2015), 12-14 Nov 2015, Lisbon, Portugal.

Ter-Sarkisov, A. (2012). Elitism Levels Traverse Mechanism For The Derivation of Upper Bounds on Unimodal Functions. Paper presented at the 2012 IEEE Congress on Evolutionary Computation, 10-15 Jun 2012, Brisbane, Australia.

Ter-Sarkisov, A., Kelleher, J. D., Earley, B., Keane, M. and Ross, R. J. (2018). Beef Cattle Instance Segmentation Using Fully Convolutional Neural Network. Paper presented at the 29th British Machine Vision Conference (BMVC), 3 - 6 September 2018, Northumbria University, Newcastle.

Tran, S., Benetos, E. and Garcez, A. (2014). Learning motion-difference features using Gaussian restricted Boltzmann machines for efficient human action recognition. Paper presented at the 2014 International Joint Conference on Neural Networks (IJCNN), 06-07-2014 - 11-07-2014, Beijing, China.

Turkay, C. (2014). Visualizing Time Series Predictability. Paper presented at the IEEE VIS 2014 Workshop on Visualization for Predictive Analytics, 08-11-2014 - 14-11-2014, Paris, France.

Turkay, C. and Hauser, H. Optimizing Processes in Visual Data Analysis through Progressive Computations. Paper presented at the UCL Workshop on the Theory of Big Data, 07-01-2015 - 09-01-2015.

Turkay, C. ORCID: 0000-0001-6788-251X and Henkin, R. (2018). Towards Natural Language Empowered Interactive Data Analysis. Poster presented at the EuroVis 2018 20th EG/VGTC Conference on Visualization, 04 - 08 June 2018, Brno, Czech Republic.

Turkay, C., Lundervold, A., Lundervold, A. J. and Hauser, H. (2013). Hypothesis generation by interactive visual exploration of heterogeneous medical data. Paper presented at the Third International Workshop, HCI-KDD 2013, 1 July 2013 - 3 July 2013, Maribor, Slovenia.

Turkay, C., Mason, S., Gashi, I. and Cukic, B. (2014). Supporting Decision-making for Biometric System Deployment through Visual Analysis. Paper presented at the Reliability and Security Data Analysis (RSDA) Workshop, International Symposium on Software Reliability Engineering, 03-11-2014-06-11-2014, Naples, Italy.

Turkay, C., Parulek, J. and Hauser, H. (2012). Dual analysis of DNA microarrays. Paper presented at the i-Know '12, 12th International Conference on Knowledge Management and Knowledge Technologies, 5 September 2012 - 7 September 2012, Graz, Austria.

Turkay, C., Parulek, J., Reuter, N. and Hauser, H. (2011). Integrating cluster formation and cluster evaluation in interactive visual analysis. Paper presented at the 27th Spring Conference on Computer Graphics, 28 Apr - 30 Apr 2011, Vinicne, Slovakia.

Turkay, C. and Sathiyanarayanan, M. (2016). Is Multi-perspective Visualisation recommended for E-discovery Email Investigations?. Paper presented at the IEEE VIS 2016 Workshop - Creation, Curation, Critique and Conditioning of Principles and Guidelines in Visualization, 23 Oct 2016, Baltimore, USA.

Turkay, C., Slingsby, A., Lahtinen, K., Butt, S. and Dykes, J. (2016). Enhancing a Social Science Model-building Workflow with Interactive Visualisation. Paper presented at the The European Symposium on Artificial Neural Networks (ESANN 2016), 27-29 Apr 2016, Bruges, Belgium.

Unal, G. B., Nain, D., Slabaugh, G. G. and Fang, T. (2008). Customized Design of Hearing Aids Using Statistical Shape Learning. Paper presented at the 11th International Conference on Medical Imaging and Computer Assisted Intervention (MICCAI 2008), 06-09-2008 - 10-09-2008, New York, USA.

Unal, G. B. and Slabaugh, G. G. (2005). Coupled PDEs for Non-Rigid Registration and Segmentation. Paper presented at the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 21-09-2005 - 23-09-2005, San Diego, USA.

Unal, G. B., Slabaugh, G. G., Ess, A., Yezzi, A. J., Fang, T., Tyan, J., Requardt, M., Krieg, R., Seethamraju, R., Harisinghani, M. and Weissleder, R. (2006). Semi-Automatic Lymph Node Segmentation in LN-MRI. Paper presented at the 2006 IEEE International Conference on Image Processing,, 08-10-2006 - 11-10-2006, Atlanta, USA.

Van Gorp, P. and Comuzzi, M. (2012). MyPHRMachines: Lifelong Personal Health Records in the Cloud. Paper presented at the 2012 25th International Symposium on Computer-Based Medical Systems (CBMS),, 20-06-2012 - 22-06-2012, Rome, Italy.

Veluru, S., Rahulamathavan, Y., Manandhar, S. and Rajarajan, M. (2014). Correlated Community Estimation Models Over a Set of Names. Paper presented at the IEEE Technically Co-Sponsored Science and Information Conference, 27-08-2014 - 29-08-2014, London, UK.

Vidovics, B., Vukasinovic, N., Pavkovic, N. and Kovacevic, A. ORCID: 0000-0002-8732-2242 (2016). Development of methodology for distributed collaborative design environment. In: Proceedings of the 18th International Conference on Engineering and Product Design Education (E&PDE16), Design Education: Collaboration and Cross-Disciplinarity. (pp. 58-63). Glasgow: The Design Society. ISBN 9781904670780

Vives, S., Dykes, J. and Merryweather, A. (2015). Visualization for Equity Analysts: Using the DSM in Stock Picking. Paper presented at the VIS 2015, 25-10-2015 - 30-10-2015, Chicago, USA.

Wang, Z., Slabaugh, G. G., Unal, G. B. and Fang, T. (2007). Registration of Ultrasound Images Using an Information-Theoretic Feature Detector. Paper presented at the The Fourth IEEE International Symposium on Biomedical Imaging (ISBI ’07), 12-04-2007 - 15-04-2007, Washingon D.C., USA.

Wang, Z., Slabaugh, G. G., Unal, G. B., Zhou, M. and Fang, T. (2007). An information-theoretic detector based scheme for registration of speckled medical images. Paper presented at the IEEE International Conference on Systems, Man and Cybernetics, 2007, 07-10-2007 - 10-10-2007, Montreal, Canada.

Wang, Z., Slabaugh, G. G., Zhou, M. and Fang, T. (2008). Automatic tracing of blood flow velocity in pulsed Doppler images. Paper presented at the IEEE International Conference on Automation Science and Engineering, 2008 (CASE 2008), 23-08-2008 - 26-08-2008, Washington D.C., USA.

Weyde, T. (2007). Automatic Semantic Annotation of Music with Harmonic Structure. Paper presented at the 4th Sound and Music Computing Conference, 11 - 13 Jul 2007, Lefkada, Greece.

Weyde, T. (2002). Integrating Segmentation and Similarity in Melodic Analysis. Paper presented at the 7th International Conference on Music Perception & Cognition - ICMPC7, 17 - 21 Jul 2002, Sydney, Australia.

Weyde, T., Cottrell, S.J., Dykes, J., Benetos, E., Wolff, D., Tidhar, D., Gold, N., Abdallah, S., Plumbley, M. D., Dixon, S., Barthet, M., Mahey, M., Tovell, A. and Alancar-Brayner, A. (2014). Big Data for Musicology. Paper presented at the 1st International Digital Libraries for Musicology workshop, 12-09-2014 - 12-09-2014, London, UK.

Weyde, T., Ng, K., Neubarth, K., Larkin, O., Koerselman, T. and Ong, B. (2007). A Systemic Approach to Music Performance Learning with Multimodal Technology. Paper presented at the Support E-Learning Conference, 2007, Quebec City, Canada.

Weyde, T. and Wolff, D. (2011). Adapting Metrics for Music Similarity Using Comparative Ratings. Paper presented at the 12th International Society for Music Information, 24 - 28 Oct 2011, Miami, FL, US.

Wolff, D., Stober, S., Nürnberger, A. and Weyde, T. (2012). A Systematic Comparison of Music Similarity Adaptation Approaches. Paper presented at the 13th International Society for Music Information Retrieval Conference (ISMIR 2012), 8 - 12 Oct 2012, Porto, Portugal.

Wolff, D., Tidhar, D., Benetos, E., Dumon, E., Cherla, S. and Weyde, T. (2014). Incremental dataset definition for large scale musicological research. In: Page, K. and Fields, B. (Eds.), DLfM '14 Proceedings of the 1st International Workshop on Digital Libraries for Musicology. (pp. 1-8). New York: ACM. ISBN 978-1-4503-3002-2

Wong, Y. and Crouch, R.S. (2018). A Compact Geometrically Nonlinear FE Shell Code for Cardiac Analysis: Shell Formulation. Paper presented at the 6th European Conference on Computational Mechanics (ECCM 6), 11-15 Jun 2018, Glasgow, UK.

Wood, J. (2016). Visual Analytic Design for Contextualising Sensor Data. Paper presented at the VIS 2016, 23-28 Oct 2016, Baltimore, USA.

Wood, J. (2014). Visual analytics of GPS tracks: From location to place to behaviour. Paper presented at the 2014 IEEE Conference on Visual Analytics Science and Technology, 9-14 October 2014, Paris, France.

Yang, G., Ye, X., Slabaugh, G. G., Keegan, J., Mohiaddin, R. and Firman, D. (2016). Super-Resolved Enhancement of a Single Image and Its Application in Cardiac MRI. Paper presented at the 7th International Conference, ICISP 2016, 30 May - 01 Jun 2016, Quebec, Canada.

Yang, G., Zhuang, X., Khan, H., Haldar, S., Nyktari, E., Ye, X., Slabaugh, G. G., Wong, T., Mohiaddin, R., Keegan, J. and Firman, D. (2017). Segmenting Atrial Fibrosis from late Gadolinium-Enhanced Cardiac MRI by Deep-Learned Features with Stacked Sparse Auto-Encoders. Paper presented at the Medical Image Understanding and Analysis (MIUA) 2017, 11 Jul 2017, Edinburgh, UK.

Yang, X., Beddoe, G. and Slabaugh, G. G. (2010). Learning to Detect 3D Rectal Tubes in CT Colonography Using a Global Shape Model. Paper presented at the Second International Workshop on Computational Challenges and Clinical Opportunities in Virtual Colonoscopy and Abdominal Imaging, 20-09-2010, Beijing, China.

Ye, X., Beddoe, G. and Slabaugh, G. G. (2011). A Bayesian Approach for False Positive Reduction in CTC CAD. Paper presented at the Second International Workshop on Computational Challenges and Clinical Opportunities in Virtual Colonoscopy and Abdominal Imaging, 20-09-2010, Beijing, China.

Ye, X. and Slabaugh, G. G. (2011). Concavity analysis for reduction of ileocecal valve false positives in CTC. Paper presented at the 8th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 30-03-2011 - 02-04-2011, Chicago, USA.

Yezzi, A. J., Slabaugh, G. G., Broadhurst, A., Cipolla, R. and Schafer, R. W. (2002). A Surface Evolution Approach to Probabilistic Space Carving. Paper presented at the First International Symposium on 3D Data Processing Visualization and Transmission, 19-06-2002 - 21-06-2002, Padova, Italy.

Zachos, K. and Maiden, N. (2013). A Computational Model of Analogical Reasoning in Dementia Care. Paper presented at the The Fourth International Conference on Computational Creativity, 12-06-2013 - 14-06-2013, Sydney, Australia.

Zachos, K., Maiden, N., Karlsen, K., Jones, S., Turner, I., Rose, M., Pudney, K. and MacManus, J. (2011). Introducing creativity techniques and software apps to the care of people with dementia. Paper presented at the 8th ACM conference on Creativity and cognition, 3 - 6 Nov 2011, Atlanta, Georgia, US.

Zachos, K., Maiden, N., Pitts, K., Jones, S., Turner, I., Rose, M., Pudney, K. and MacManus, J. (2013). A software app to support creativity in dementia care. Paper presented at the 9th ACM Conference on Creativity & Cognition, 17-06-2013 - 20-06-2013, Sydney, Australia.

Zaidi, K., Milojevic, M., Rakocevic, V. and Rajarajan, M. (2014). Data Centric Rogue Node Detection in VANETs. Paper presented at the IEEE Trustcom, 24-09-2014 - 26-09-2014, Beijing, China.

Zarras, A., Issarny, V., Kloukinas, C. and Nguyen, V. (2001). Towards a Base UML Profile for Architecture Description. Paper presented at the 1st ICSE Workshop on Describing Software Architecture with UML, held in conjunction with the 23rd International Conference on Software Engineering (ICSE-2001), 15 May 2001, Toronto, Canada.

Zarrin, J., Aguiar, R. L. and Barraca, J. P. (2015). A Specification-based Anycast Scheme for Scalable Resource Discovery in Distributed Systems. Paper presented at the 10th ConfTele 2015 - Conference on Telecommunications, 17-18 Sep 2015, Aveiro, Portugal.

Zhao, X., Littlewood, B., Povyakalo, A. A. and Wright, D. (2015). Conservative Claims about the Probability of Perfection of Software-based Systems. Paper presented at the The 26th IEEE International Symposium on Software Reliability Engineering, 02-11-2015 - 05-11-2015, Washington DC, USA.

Zisman, A. (2007). A Static Verification Framework for Secure Peer-to-Peer Applications. Paper presented at the Internet and Web Applications and Services, 2007. ICIW '07. Second International Conference on, 13 - 19 May 2007, Mauritius.

da Silva, I. and Zisman, A. (2012). A Framework for Trusted Services. Paper presented at the Service-Oriented Computing - 10th International Conference, ICSOC 2012, 12 - 15 Nov 2012, Shanghai, China.

de Rooij, A. (2014). Toward emotion regulation via physical interaction. Paper presented at the 19th International Conference on Intelligent User Interfaces, 24th - 27th February 2014, Haifa, Israel.

de Rooij, A., Corr, P. J. and Jones, S. (2015). Emotion and Creativity: Hacking into Cognitive Appraisal Processes to Augment Creative Ideation. Paper presented at the 2015 ACM SIGCHI Conference on Creativity and Cognition, 22-06-2015 - 25-06-2015, Glasgow, Scotland.

de Rooij, A. and Jones, S. (2015). (E)motion and creativity: Hacking the function of motor expressions in emotion regulation to augment creativity. Paper presented at the Ninth International Conference on Tangible, Embedded, and Embodied Interaction (TEI 2015), 15-01-2015 - 19-01-2015, California, USA.

de Rooij, A. and Jones, S. (2013). Mood and creativity: an appraisal tendency perspective. Paper presented at the 9th ACM Conference on Creativity & Cognition, 17 - 20 Jun 2013, Sydney, Australia.

de Valk, R., Weyde, T. and Benetos, E. (2013). A machine learning approach to voice separation in lute tablature. Paper presented at the 14th International Society for Music Information Retrieval Conference, 4 - 8 Nov 2013, Curitiba, Brazil.

Book

Jones, C. B., Jones, K., Lindsay, P. A. and Moore, R. (1990). Mural: A formal development support system. London: Springer-Verlag.

Serra, X., Magas, M., Benetos, E., Chudy, M., Dixon, S., Flexer, A., Gomez, E., Gouyon, F., Herrera, P., Jorda, S., Paytuvi, O., Peeters, G., Schlüter, J., Vinet, H. and Widmer, G. (2013). Roadmap for Music Information ReSearch. London, UK: MIRES Consortium.

Thesis

Adamsky, Florian (2016). Analysis of bandwidth attacks in a bittorrent swarm. (Unpublished Doctoral thesis, City, University of London)

Agamah, Simon (2016). Evolutionary combinatorial optimisation for energy storage scheduling, and web-based power systems analysis using PHP. (Unpublished Doctoral thesis, City, University of London)

Al Arif, S.M.M.R. (2018). Fully automatic image analysis framework for cervical vertebra in X-ray images. (Unpublished Doctoral thesis, City, University of London)

Al-Malki, Dana Mohammed (2006). Development of virtual network computing (VNC) environment for networking and enhancing user experience. (Unpublished Doctoral thesis, City University London)

Alabdali, Ohoud (2019). Measuring the development of Saudi Arabia as an information society. (Unpublished Doctoral thesis, City, University of London)

Algaith, A. (2019). Assessing the security benefits of defence in depth. (Unpublished Doctoral thesis, City, University of London)

Asad, M. (2017). Efficient hand orientation and pose estimation for uncalibrated cameras. (Unpublished Doctoral thesis, City, University of London)

Asif, W. (2016). Critical Node Identifcation for accessing network vulnerability, a necessary consideration. (Unpublished Doctoral thesis, City, University of London)

Badawood, Donia (2015). Narrative construction in information visualisation. (Unpublished Doctoral thesis, City, University of London)

Basaru, R. R. (2018). Robust hand pose recognition from stereoscopic capture. (Unpublished Doctoral thesis, City, University of London)

Beecham, R. (2014). Understanding cycling behaviour through visual analysis of a large-scale observational dataset. (Unpublished Doctoral thesis, City University London)

Behbahani, Peyman (2010). Connection Robustness for Wireless Moving Networks Using Transport Layer Multi-homing. (Unpublished Doctoral thesis, City University London)

Borges, Rafael (2012). A neural-symbolic system for temporal reasoning with application to model verification and learning. (Unpublished Doctoral thesis, City University London)

Braun, M. H. (2019). Enhancing User Experience with Olfaction in Virtual Reality. (Unpublished Doctoral thesis, City, University of London)

Brocklehurst, P. (1995). Software reliability prediction : a multi-modelling approach. (Unpublished Doctoral thesis, City University London)

Bussone, A. (2018). Reflection and personal health informatics for people living with HIV. (Unpublished Doctoral thesis, City, University of London)

Chan, Pee Yuaw (1986). Software reliability prediction. (Unpublished Doctoral thesis, The City University London)

Chandrasekharan, G.M. (2018). Ontology driven clinical decision support for early diagnostic recommendations. (Unpublished Doctoral thesis, City, University of London)

Child, C. H. T. (2011). Approximate Dynamic Programming with Parallel Stochastic Planning Operators. (Unpublished Doctoral thesis, City University London)

Christou, D. (2011). ERES Methodology and Approximate Algebraic Computations. (Unpublished Doctoral thesis, City University London)

Chueke, J. (2016). Perceptible affordances and feedforward for gestural interfaces: Assessing effectiveness of gesture acquisition with unfamiliar interactions. (Unpublished Doctoral thesis, City, University of London)

Comley, R.A. (1978). Portable computers for real-time signal processing: EEG analysis as a case study. (Submitted Doctoral thesis, City University, London)

Darzentas, J. S. (2008). The design of accessible, usable and meaningful content. Volume 1: Explanatory Essay. (Unpublished Doctoral thesis, City University London)

Day, J.D. (2018). Exploring the nature of cognitive resilience strategies. (Unpublished Doctoral thesis, City, University of London)

Dillingham, I. (2013). Exploring the geographic uncertainty associated with crowdsourced crisis information: a geovisualisation approach. (Unpublished Doctoral thesis, City University London)

Fairbank, M. (2014). Value-Gradient Learning. (Unpublished Doctoral thesis, City University London)

Frankowska-Takhari, S. (2018). Selecting and tailoring of images for online news content: a mixed-methods investigation of the needs and behaviour of image users in online journalism. (Unpublished Doctoral thesis, City, University of London)

Gadala, M. (2017). Automation bias: exploring causal mechanisms and potential mitigation strategies. (Unpublished Doctoral thesis, City, University of London)

Gong, P. (2017). Energy efficient and secure wireless communications for wireless sensor networks. (Unpublished Doctoral thesis, City, University of London)

Gooch, P. (2012). A modular, open-source information extraction framework for identifying clinical concepts and processes of care in clinical narratives. (Unpublished Doctoral thesis, City University London)

Goodwin, S. (2015). Visualisation for household energy analysis: techniques for exploring multiple variables across scale and geography. (Unpublished Doctoral thesis, City University London)

Guo, Shijing (2016). Systemic analysis and modelling of diagnostic errors in medicine. (Unpublished Doctoral thesis, City University London)

Hafiz bin Haji Khozali, Muhammed (1981). Computer aided mathematical modelling of turbulent flow for orifice metering. (Unpublished Doctoral thesis, The City University)

Hannaby, Simon Anthony (1994). The use and analysis of infinite elements. (Unpublished Doctoral thesis, City University)

Henkin, R. (2018). A framework for hierarchical time-oriented data visualisation. (Unpublished Doctoral thesis, City, University of London)

Henni, S. (2009). Drug safety decision support model to reduce medication errors. (Unpublished Doctoral thesis, City University London)

Jones, Sara (1993). Three-Dimensional Interactive Connection Diagrams for Knowledge Engineering. (Unpublished Doctoral thesis, City, University of London)

Katopodis, Spyros (2015). Hybrid cloud security certification. (Submitted Masters thesis, City University London)

Khani, S. (2018). Self-reconfigurable, intrusion-tolerant, web-service composition framework. (Unpublished Doctoral thesis, City, Universtiy of London)

Kokkola, N. (2017). A Double-Error Correction Computational Model of Learning. (Unpublished Doctoral thesis, City, University of London)

Krotsiani, M. (2016). Model driven certification of Cloud service security based on continuous monitoring. (Unpublished Doctoral thesis, City University London)

Makri, S. (2003). An accessible and multi-sensory web-based approach to Dyslexia screening. (Unpublished Diploma thesis, University of Hertfordshire)

Makri, S. (2008). A study of lawyers' information behaviour leading to the development of two methods for evaluating electronic resources. (Unpublished Doctoral thesis, University College London)

Meaker, Thomas Arthur (1994). The role of intervention in strategic change. (Unpublished Doctoral thesis, City University)

Meng, X. (2018). An integrated networkbased mobile botnet detection system. (Unpublished Doctoral thesis, City, Universtiy of London)

Messer, Alan (1999). A Market Model for Controlled Resource Allocation in Distributed Operating Systems. (Unpublished Doctoral thesis, City, University of London)

Millan Cifuentes, J. D. (2017). Curiosity driven search experiences. (Unpublished Doctoral thesis, City, University of London)

Milojevic, M. (2015). Location aware data aggregation for efficient message dissemination in Vehicular Ad Hoc Networks. (Unpublished Doctoral thesis, City University London)

Mimi, Y. (2015). The Routine Health Information System in Palestine: Determinants and Performance. (Unpublished Doctoral thesis, City University London)

Nandakumar, R. (2008). Robust control design using quantitative feedback theory. (Unpublished Doctoral thesis, City University London)

Nouri, M. (2016). Creativity-supporting environments: An emotion-based framework for influencing designers’ creativity through using design environments. (Unpublished Doctoral thesis, City, University of London)

Ozkaya, M. (2014). A Design-by-Contract based Approach for Architectural Modelling and Analysis. (Unpublished Post-Doctoral thesis, City University London)

Papadopoulos, Konstantinos (2015). Flow effect on thrombus formation in stenosed coronary arteries: a computational study. (Unpublished Doctoral thesis, City University London)

Parhizkar, M. (2016). Impact analysis of enterprise resource planning post-implementation modifications. (Unpublished Doctoral thesis, City, University of London)

Paterson, AM (1996). An investigation of a remote visual navigation system for a building inspection robot. (Unpublished Doctoral thesis, City University)

Pawar, Pramod S (2015). Cloud Broker Based Trust Assessment of Cloud Service Providers. (Unpublished Doctoral thesis, City University London)

Pino, Luca (2015). Security Aware Service Composition. (Unpublished Doctoral thesis, City University London)

Pozdniakov, K. (2017). A machine learning approach for smart computer security audit. (Unpublished Doctoral thesis, City, University of London)

Robinson, Sionade Ann (1990). The utility of analogy in systems sciences. (Unpublished Doctoral thesis, City University)

Sajjad, Ali (2015). A secure and scalable communication framework for inter-cloud services. (Unpublished Post-Doctoral thesis, City University London)

Salako, K. (2012). Extension to models of coincident failure in multiversion software. (Unpublished Doctoral thesis, City University London)

Shepherd, Robert (2011). The generation and classification of small leaks in a high pressure water system. (Unpublished Doctoral thesis, City University London)

Sherwani, Dara (2016). What makes reviews trustworthy? An investigation of user trust in online reviews when making purchase decisions. (Unpublished Doctoral thesis, City, University of London)

Shittu, Riyanat O. (2016). Mining intrusion detection alert logs to minimise false positives & gain attack insight. (Unpublished Doctoral thesis, City University London)

Sisarica, Anja (2015). Creativity support in games for motivated learning. (Unpublished Doctoral thesis, City University London)

Sleat, Philip M. (1991). A static, transaction based design methodology for hard real-time systems. (Unpublished Doctoral thesis, City University)

Stumpf, S. (2001). Analysis and representation of rhetorical construction of understanding in design teams' experiential learning. (Unpublished Doctoral thesis, University College London)

Tahir, S. (2018). Privacy preserving search in large encrypted databases. (Unpublished Doctoral thesis, City, University of London)

Ter-Sarkisov, A. (2012). Computational complexity of elitist population-based evolutionary algorithms: a thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science at Massey University, Palmerston North, New Zealand. (Unpublished Doctoral thesis, Massey University, Palmerston North, New Zealand.)

Tewell, J.R. (2018). Augmenting communication technologies with non-primary sensory modalities. (Unpublished Doctoral thesis, City, University of London)

Tran, Son (2016). Representation decomposition for knowledge extraction and sharing using restricted Boltzmann machines. (Unpublished Doctoral thesis, City University London)

Tsigkritis, Theocharis (2010). Diagnosing runtime violations of security and dependability properties. (Unpublished Doctoral thesis, City University London)

Wissmann, Jens (2012). Chord Sequence patterns in OWL. (Unpublished Doctoral thesis, City University London)

Wolff, D. (2014). Spot the Odd Song Out: Similarity Model Adaptation and Analysis using Relative Human Ratings. (Unpublished Doctoral thesis, City University London)

Zhang, Yun (2012). Pattern recognition techniques applied to rust classification in steel structures. (Unpublished Masters thesis, City University London)

Zhao, X. (2016). On the probability of perfection of Software-Based systems. (Unpublished Doctoral thesis, School of Mathematics, Computer Science & Engineering)

de Rooij, A. (2016). Hacking into the emotion-creativity link Two new approaches to interactive systems that influence the relationship between emotion and creativity. (Unpublished Doctoral thesis, City University London)

de Valk, R. (2015). Structuring lute tablature and MIDI data: Machine learning models for voice separation in symbolic music representations. (Unpublished Doctoral thesis, City, University of London)

van der Meulen, M. (2008). The Effectiveness of Software Diversity. (Unpublished Doctoral thesis, City University London)

Patent

Aharon, A., Fournier, L., Gluska, A., Lichtenstein, Y. and Malka, J. (1998). Method for Measuring Architectural Test Coverage for Design Verification. Aharon, A., Fournier, L., Gluska, A., Lichtenstein, Y. & Malka, J.

Aharon, A., Malka, J. and Lichtenstein, Y. (1999). Test Program Generator. Aharon, A., Malka, Y., Lichtenstein, Y.

Popov, P. T. and Stankovic, V. (2014). Database replication. P. Popov, V. Stankovic

Stankovic, V. and Popov, P. T. (2013). Improvements Relating to Database Replication Protocols. EU: Popov, P., Stankovic, V.

Report

Bloomfield, R. E. and Wetherilt, A. (2012). Computer trading and systemic risk: a nuclear perspective (Driver Review DR26). London, UK: Government Office for Science.

Dafas, P. and d'Avila Garcez, A. S. (2005). Applied temporal Rule Mining to Time Series (TR/2006/DOC/01). .

Fenton, N., Littlewood, B., Neil, M., Strigini, L., Wright, D. R. and Courtois, P.-J. (1997). Bayesian belief network model for the safety assessment of nuclear computer-based systems (52). Brussels: DeVa ESPRIT Long Term Research Project.

Gooch, P. (2012). BADREX: In situ expansion and coreference of biomedical abbreviations using dynamic regular expressions. London, UK: City University London.

Honingh, A. (2008). A geometrical approach to find the preferred intonation of chords (TR/2008/DOC/02). .

Honingh, A. and Weyde, T. (2008). Integrating Convexity and Compactness into the ISSM: Melodic Analysis of Music (TR/2008/DOC/03). .

Howe, J. M. and King, A. (2009). Closure Algorithms for Domains with Two Variables Per Inequality (TR/2009/DOC/01). .

Howe, J. M., King, A. and Lawrence-Jones, C. (2010). Quadtrees as an Abstract Domain (TR_2010_DOC_01). .

Kloukinas, C. and Ozkaya, M. (2012). XCD – Simple, Modular, Formal Software Architectures (TR/2012/DOC/01). .

Li, F. (2016). The Future of Video. Cambridge, UK: Imagen Ltd.

Littlewood, B., Bainbridge, I. and Bloomfield, R. E. (1998). The use of computers in safety-critical applications. London, UK: Health and Safety Commission.

Littlewood, B., Strigini, L., Wright, D. and Courtois, P.-J. (1998). Examination of Bayesian belief network for safety assessment of nuclear computer-based systems (70). Brussels: DeVa ESPRIT Long Term Research Project.

McDonagh, L. ORCID: 0000-0003-2085-5404 and Bonadio, E. (2019). Standard Essential Patents and the Internet of Things. Brussels, Belgium: European Parliament.

Mondragon, E. ORCID: 0000-0003-4180-1261 and Alonso, E. (2016). Hall and Rodríguez model as a particular case of the Pearce and Hall model: A formal analysis. St Albans, UK: Centre for Computational and Animal Learning Research.

Renou, L. and d'Avila Garcez, A. S. (2008). Rule Extraction from Support Vector Machines: A Geometric Approach. Technical Report (TR/2008/DOC/01). Department of Computing, City University London: .

Stankovic, V. and Strigini, L. (2009). A survey on online monitoring approaches of computer-based systems. London, UK: Centre for Software Reliability, City University London.

Strigini, L. (1996). Engineering judgement in reliability and safety and its limits: what can we learn from research in psychology?. .

Wright, D. and Strigini, L. (2013). Bounds on survival probability given mean probability of failure per demand; and the paradoxical advantages of uncertainty. London: City University London.

d'Avila Garcez, A. S., Hitzler, P. and Tamburrini, G. (2006). Proceedings of ECAI International Workshop on Neural-Symbolic Learning and reasoning NeSy 2006 (TR/2006/DOC/02). .

Software

Popov, P. T. (2015). A SAN model for safety and security analysis of the eMotor, an ASIL-D device

Poster

Sathiyanarayanan, M. and Turkay, C. (2016). Determining and Visualising E-mail Subsets to Support E-discovery *

Other

Belmonte Martin, A., Marinos, L., Rekleitis, E., Spanoudakis, G. and Petroulakis, N. E. (2015). European Union Agency for Network and Information Security (ENISA).

This list was generated on Fri Oct 25 04:21:15 2019 UTC.