Items where Subject is "QA76 Computer software"
- Library of Congress Subject Areas (23420)
- Q Science (4771)
- QA Mathematics (3630)
- QA76 Computer software (315)
- QA Mathematics (3630)
- Q Science (4771)
Article
Andrienko, G., Andrienko, N., Chen, W. , Maciejewski, R. & Zhao, Y. (2017). Visual Analytics of Mobility and Transportation: State of the Art and Further Research Directions. IEEE Transactions on Intelligent Transportation Systems, 18(8), pp. 2232-2249. doi: 10.1109/tits.2017.2683539
Andrienko, G. ORCID: 0000-0002-8574-6295, Andrienko, N., Cordero Garcia, J. M. , Hecker, D. & Vouros, G. (2022). Supporting Visual Exploration of Iterative Job Scheduling. IEEE Computer Graphics and Applications, 42(3), pp. 74-86. doi: 10.1109/mcg.2022.3163437
Armitage, S., Stevens, R. & Finkelstein, A. ORCID: 0000-0003-2167-9844 (1998). Implementing a compliance manager. Requirements Engineering, 3(2), pp. 98-106. doi: 10.1007/bf02919969
Arunkumar, S., Soyluoglu, B., Sensoy, M. , Srivatsa, M. & Rajarajan, M. (2017). Location attestation and access control for mobile devices using GeoXACML. Journal of Network and Computer Applications, 80, pp. 181-188. doi: 10.1016/j.jnca.2016.11.028
Aversa, P. ORCID: 0000-0003-3175-9477, Hervas-Drane, A. & Evenou, M. (2019). Business model responses to digital piracy. California Management Review, 61(2), pp. 30-58. doi: 10.1177/0008125618818841
Bayer, J., Flege, O. & Gacek, C. (2000). Creating product line architectures. Lecture Notes in Computer Science, 1951, pp. 210-216. doi: 10.1007/978-3-540-44542-5_23
Beghelli, A. & Jones, S. ORCID: 0000-0003-4789-4948 (2021). What an original app! : a study on the novelty of software products. International Journal of Design Creativity and Innovation, 10(2), pp. 101-122. doi: 10.1080/21650349.2021.1997649
Bertolino, A. & Strigini, L. (1998). Assessing the Risk due to Software Faults: Estimates of Failure Rate versus Evidence of Perfection.. Software Testing, Verification and Reliability, 8(3), pp. 155-166. doi: 10.1002/(SICI)1099-1689(1998090)8:3<155::AID-STVR163>3.0.CO;2-B
Bertolino, A. & Strigini, L. (1996). On the use of testability measures for dependability assessment. IEEE Transactions on Software Engineering, 22(2), pp. 97-108. doi: 10.1109/32.485220
Bishop, P. G. (2005). SILS and Software. Safety-Critical Systems Club Newsletter, 14(2),
Bishop, P. G., Bloomfield, R. E., Littlewood, B. , Povyakalo, A. A. & Wright, D. (2011). Toward a Formalism for Conservative Claims about the Dependability of Software-Based Systems. IEEE Transactions on Software Engineering, 37(5), pp. 708-717. doi: 10.1109/tse.2010.67
Blandford, A., Adams, A., Attfield, S. , Buchanan, G., Gow, J., Makri, S., Rimmer, J. & Warwick, C. (2008). The PRET A Rapporter framework: Evaluating digital libraries from the perspective of information work. Information Processing & Management, 44(1), pp. 4-21. doi: 10.1016/j.ipm.2007.01.021
Blandford, A., Green, T. R. G., Furniss, D. & Makri, S. (2008). Evaluating system utility and conceptual fit using CASSM. International Journal of Human-Computer Studies, 66(6), pp. 393-409. doi: 10.1016/j.ijhcs.2007.11.005
Booth, T. & Stumpf, S. (2013). End-user experiences of visual and textual programming environments for Arduino. Lecture Notes in Computer Science, 7897 L, pp. 25-39. doi: 10.1007/978-3-642-38706-7_4
Chen, T. & Abu-Nimeh, S. (2011). Lessons from Stuxnet. Computer, 44(4), pp. 91-93. doi: 10.1109/mc.2011.115
Das, S., Moore, T., Wong, W-K , Stumpf, S., Oberst, I., McIntosh, K. & Burnett, M. (2013). End-user feature labeling: Supervised and semi-supervised approaches based on locally-weighted logistic regression. Artificial Intelligence, 204, pp. 56-74. doi: 10.1016/j.artint.2013.08.003
Dyson, J., Marsh, C., Jackson, N. , Richardson, D., Faisal, M., Scally, A. J. & Mohammed, M. (2019). Understanding and applying practitioner and patient views on the implementation of a novel automated Computer-Aided Risk Score (CARS) predicting the risk of death following emergency medical admission to hospital: qualitative study. BMJ Open, 9(4), article number e026591. doi: 10.1136/bmjopen-2018-026591
Egyed, A., Medvidovic, N. & Gacek, C. (2000). Component-based perspective on software mismatch detection and resolution. IEE Proceedings: Software, 147(6), pp. 225-236. doi: 10.1049/ip-sen:20000915
Evans, L. & Saker, M. ORCID: 0000-0002-7414-2840 (2019). The Playeur and Pokémon Go: Examining the effects of locative play on spatiality and sociability. Mobile Media & Communication, 7(2), pp. 232-247. doi: 10.1177/2050157918798866
Faisal, M., Scally, A. J., Jackson, N. , Richardson, D., Beatson, K., Howes, R., Speed, K., Menon, M., Daws, J., Dyson, J., Marsh, C. & Mohammed, M. A. (2018). Development and validation of a novel computer-aided score to predict the risk of in-hospital mortality for acutely ill medical admissions in two acute hospitals using their first electronically recorded blood test results and vital signs: a cross-sectional study. BMJ Open, 8(12), doi: 10.1136/bmjopen-2018-022939
Finkelstein, A. ORCID: 0000-0003-2167-9844 (1996). Improving public understanding of software engineering. IEEE Software, 13, pp. 20-21.
Finkelstein, A. ORCID: 0000-0003-2167-9844 (1992). A scheme for review, annotation and correction of specifications. Instructional Science, 21(1-3), pp. 183-198. doi: 10.1007/bf00119664
Finkelstein, A. ORCID: 0000-0003-2167-9844 (1992). A software process immaturity model. SIGSOFT Software Engineering Notes, 17(4), pp. 22-23. doi: 10.1145/141874.141878
Finkelstein, L., Huang, J., Finkelstein, A. & Nuseibeh, B. (1992). Using software specification methods for measurement instruments: Part I - structured methods. Measurement, 10(2), pp. 79-86. doi: 10.1016/0263-2241(92)90016-w
Finkelstein, L., Huang, J., Finkelstein, A. ORCID: 0000-0003-2167-9844 & Nuseibeh, B. (1992). Using software specification methods for measurement instruments: Part II - formal methods. Measurement, 10(2), pp. 87-92. doi: 10.1016/0263-2241(92)90017-x
Garcia, M., Bessani, A. N., Gashi, I. , Neves, N. & Obelheiro, R. R. (2013). Analysis of operating system diversity for intrusion tolerance. Software: Practice and Experience, 44(6), pp. 735-770. doi: 10.1002/spe.2180
Gashi, I., Popov, P. T. & Stankovic, V. ORCID: 0000-0002-8740-6526 (2009). Uncertainty explicit assessment of off-the-shelf software: A Bayesian approach. Information and Software Technology, 51(2), pp. 497-511. doi: 10.1016/j.infsof.2008.06.003
Gashi, I., Popov, P. T., Stankovic, V. ORCID: 0000-0002-8740-6526 & Strigini, L. (2004). On designing dependable services with diverse off-the-shelf SQL servers. Lecture Notes in Computer Science, 3069, pp. 191-214. doi: 10.1007/978-3-540-25939-8_9
Gashi, I., Popov, P. T. & Strigini, L. (2007). Fault tolerance via diversity for off-the-shelf products: A study with SQL database servers. IEEE Transactions on Dependable and Secure Computing, 4(4), pp. 280-294. doi: 10.1109/tdsc.2007.70208
Hall, K. W., Perin, C., Kusalik, P. G. , Gutwin, C. & Carpendale, S. (2016). Formalizing Emphasis in Information Visualization. Computer Graphics Forum, 35(3), pp. 717-737. doi: 10.1111/cgf.12936
Huang, F. & Strigini, L. ORCID: 0000-0002-4246-2866 (2023). HEDF: A Method for Early Forecasting Software Defects Based on Human Error Mechanisms. IEEE Access, 11, pp. 3626-3652. doi: 10.1109/access.2023.3234490
Idrees, F., Rajarajan, M., Conti, M. , Chen, T. & Rahulamathavan, Y. (2017). PIndroid: A novel Android malware detection system using ensemble learning methods. Computers and Security, 68, pp. 36-46. doi: 10.1016/j.cose.2017.03.011
Jones, K., Kim, J. & Horowitz, M. (2010). Fast, non-monte-carlo estimation of transient performance variation due to device mismatch. IEEE Transactions on Circuits and Systems, 57(7), pp. 1746-1755. doi: 10.1109/tcsi.2009.2035418
Jones, P. R. ORCID: 0000-0001-7672-8397 (2018). Myex: A MATLAB interface for the Tobii Eyex eye-tracker. Journal of Open Research Software, 6(1), article number 0.16. doi: 10.5334/jors.196
Jones, P. R. ORCID: 0000-0001-7672-8397 (2018). QuestPlus: A MATLAB Implementation of the QUEST+ adaptive Psychometric Method. Journal of Open Research Software, 6(1), doi: 10.5334/jors.195
Kharchenko, V. S., Popov, P. T., Odarushchenko, O. & Zhadan, V. (2012). Empirical evaluation of accuracy of mathematical software used for availability assessment of fault-tolerant computer systems. Reliability: Theory & Applications, 7(3),
Kloukinas, C. & Ozkaya, M. (2012). Xcd - Modular, Realizable Software Architectures. Lecture Notes in Computer Science: Formal Aspects of Component Software, 7684, pp. 152-169. doi: 10.1007/978-3-642-35861-6_10
Komninos, N. & Dimitriou, T. (2007). Protecting biometric templates with image watermarking techniques. Advances in Biometrics: Lecture Notes in Computer Science, 4642, pp. 114-123. doi: 10.1007/978-3-540-74549-5_13
Komninos, N. & Douligeris, C. (2009). LIDF: Layered intrusion detection framework for ad-hoc networks. Ad Hoc Networks, 7(1), pp. 171-182. doi: 10.1016/j.adhoc.2008.01.001
Komninos, N. & Mantas, G. (2008). Efficient group key agreement & recovery in ad hoc networks. IET Conference Publications(545 CP), pp. 25-28. doi: 10.1049/cp:20080928
Komninos, N. & Mantas, G. (2011). PEA: Polymorphic Encryption Algorithm based on quantum computation. International Journal of Systems, Control and Communications, 3(1), pp. 1-18. doi: 10.1504/ijscc.2011.039222
Komninos, N., Vergados, D. & Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5(3), pp. 289-298. doi: 10.1016/j.adhoc.2005.11.005
Komninos, N., Vergados, D. & Douligeris, C. (2006). Layered security design for mobile ad hoc networks. Computers & Security, 25(2), pp. 121-130. doi: 10.1016/j.cose.2005.09.005
Komninos, N., Vergados, D. D. & Douligeris, C. (2007). Authentication in a layered security approach for mobile ad hoc networks. Computers & Security, 26(5), pp. 373-380. doi: 10.1016/j.cose.2006.12.011
Komninos, N., Vergados, D. D. & Douligeris, C. (2007). Multifold node authentication in mobile ad hoc networks. International Journal of Communication Systems, 20(12), pp. 1391-1406. doi: 10.1002/dac.882
Komninos, N., Vergados, D. D. & Douligeris, C. (2007). A two‐step authentication framework for Mobile ad hoc networks. China Communications Journal, 4(1), pp. 28-39.
Kotti, M, Benetos, E., Kotropoulos, C. & Pitas, I (2007). A neural network approach to audio-assisted movie dialogue detection. Neurocomputing, 71(1-3), pp. 157-166. doi: 10.1016/j.neucom.2007.08.006
Lichtenstein, Y., Dujmovic, S. & Baden-Fuller, C. ORCID: 0000-0002-0230-1144 (2018). Strategies for Competing in the Automotive Industry’s Software Ecosystem: Standards and Bottlenecks. IEEE Software, doi: 10.1109/MS.2018.290105946
Littlewood, B. (2008). Comments on "Multi-objective genetic algorithm for solving N-version program design problem". Reliability Engineering & System Safety, 93(8), p. 1287. doi: 10.1016/j.ress.2007.06.005
Littlewood, B. (2006). Comments on 'Evolutionary neural network modelling for software cumulative failure time prediction' by Liang Tian and Afzel Noore [Reliability Engineering and System Safety 87 (2005) 45-51]. Reliability Engineering & System Safety, 91(4), pp. 485-486. doi: 10.1016/j.ress.2005.02.001
Littlewood, B. (1996). The impact of diversity upon common mode failures. Reliability Engineering & System Safety, 51(1), pp. 101-113. doi: 10.1016/0951-8320(95)00120-4
Littlewood, B. (2000). The use of proofs in diversity arguments. IEEE Transactions on Software Engineering, 26(10), pp. 1022-1023. doi: 10.1109/32.879822
Littlewood, B., Brocklehurst, S., Fenton, N. , Mellor, P., Page, S., Wright, D., Dobson, J., McDermid, J. & Gollmann, D. (1993). Towards operational measures of computer security. Journal of Computer Security, 2(2-3), pp. 211-229. doi: 10.3233/jcs-1993-22-308
Littlewood, B., Popov, P. T. & Strigini, L. (2002). Assessing the reliability of diverse fault-tolerant software-based systems. Safety Science, 40(9), pp. 781-796. doi: 10.1016/s0925-7535(01)00084-4
Littlewood, B., Popov, P. T. & Strigini, L. (1999). A note on reliability estimation of functionally diverse systems. Reliability Engineering & System Safety, 66(1), pp. 93-95. doi: 10.1016/s0951-8320(99)00014-9
Littlewood, B., Popov, P. T., Strigini, L. & Shryane, N. (2000). Modeling the effects of combining diverse software fault detection techniques. IEEE Transactions on Software Engineering, 26(12), pp. 1157-1167. doi: 10.1109/32.888629
Littlewood, B. & Povyakalo, A. A. (2013). Conservative bounds for the pfd of a 1-out-of-2 software-based system based on an assessor’s subjective probability of “not worse than independence”. IEEE Transactions on Software Engineering, 39(12), pp. 1641-1653. doi: 10.1109/TSE.2013.31
Littlewood, B. & Povyakalo, A. A. (2013). Conservative reasoning about epistemic uncertainty for the probability of failure on demand of a 1-out-of-2 software-based system in which one channel is “possibly perfect”. IEEE Transactions on Software Engineering, 39(11), pp. 1521-1530. doi: 10.1109/TSE.2013.35
Littlewood, B. & Rushby, J. (2011). Reasoning about the Reliability of Diverse Two-Channel Systems in which One Channel is "Possibly Perfect". IEEE Transactions on Software Engineering, 38(5), pp. 1178-1194. doi: 10.1109/TSE.2011.80
Littlewood, B. & Strigini, L. (1993). Validation of Ultrahigh Dependability for Software-Based Systems. Communications of the ACM (CACM), 36(11), pp. 69-80. doi: 10.1145/163359.163373
Littlewood, B. & Wright, D. (1997). Some conservative stopping rules for the operational testing of safety-critical software. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 23(11), pp. 673-683. doi: 10.1109/32.637384
Littlewood, B. & Wright, D. (2007). The use of multilegged arguments to increase confidence in safety claims for software-based systems: A study based on a BBN analysis of an idealized example. IEEE Transactions on Software Engineering, 33(5), pp. 347-365. doi: 10.1109/tse.2007.1002
Lobachova, K. I. & Kharchenko, V. S. (2007). Assessing Software Vulnerabilities and Recovery Time Using Open Resources: Elements Of Technique And Results. Radioelectronic and Computer Systems, 8(27), pp. 61-65.
Mantas, G., Lymberopoulos, D. & Komninos, N. (2010). A new framework for ubiquitous context-aware healthcare applications. Proceedings of the IEEE/EMBS Region 8 International Conference on Information Technology Applications in Biomedicine, ITAB, 3468, pp. 1-4. doi: 10.1109/itab.2010.5687758
Matentzoglu, N., Balhoff, J. P., Bello, S. M. , Bizon, C., Brush, M., Callahan, T. J., Chute, C. G., Duncan, W. D., Evelo, C. T., Gabriel, D., Graybeal, J., Gray, A., Gyori, B. M., Haendel, M., Harmse, H., Harris, N. L., Harrow, I., Hegde, H. B., Hoyt, A. L., Hoyt, C. T., Jiao, D., Jimenez-Ruiz, E. ORCID: 0000-0002-9083-4599, Jupp, S., Kim, H., Koehler, S., Liener, T., Long, Q., Malone, J., McLaughlin, J. A., McMurry, J. A., Moxon, S., Munoz-Torres, M. C., Osumi-Sutherland, D., Overton, J. A., Peters, B., Putman, T., Queralt-Rosinach, N., Shefchek, K., Solbrig, H., Thessen, A., Tudorache, T., Vasilevsky, N., Wagner, A. H. & Mungall, C. J. (2022). A Simple Standard for Sharing Ontological Mappings (SSSOM). Database-the journal of biological databases and curation, 2022, article number baac035. doi: 10.1093/database/baac035
Mendez, C., Letaw, L., Burnett, M. , Stumpf, S. ORCID: 0000-0001-6482-1973, Sarma, A. & Hilderbrand, C. (2019). From GenderMag to InclusiveMag: An Inclusive Design Meta-Method. 2019 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), pp. 97-106. doi: 10.1109/vlhcc.2019.8818889
Michalas, A., Dimitriou, T., Giannetsos, T. , Komninos, N. & Prasad, N. R. (2012). Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. Wireless Personal Communications, 66(3), pp. 559-575. doi: 10.1007/s11277-012-0734-z
Michalas, A., Komninos, N. & Prasad, N. R. (2011). Multiplayer game for DDoS attacks resilience in ad hoc networks. Proceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, pp. 1-5. doi: 10.1109/wirelessvitae.2011.5940931
Michalas, A., Komninos, N., Prasad, N. R. & Oleshchuk, V. A. (2010). New client puzzle approach for DoS resistance in ad hoc networks. Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, pp. 568-573. doi: 10.1109/icitis.2010.5689528
Mitrokotsa, A., Komninos, N. & Douligeris, C. (2010). Protection of an intrusion detection engine with watermarking in ad hoc networks. International Journal of Network Security, 10(2), pp. 93-106.
Mohavedi, Y., Cukier, M. & Gashi, I. ORCID: 0000-0002-8017-3184 (2019). Vulnerability Prediction Capability: A Comparison between Vulnerability Discovery Models and Neural Network Models. Computers and Security, 87, article number 101596. doi: 10.1016/j.cose.2019.101596
Movahedi, Y., Cukier, M., Andongabo, A. & Gashi, I. ORCID: 0000-0002-8017-3184 (2019). Cluster-based Vulnerability Assessment of Operating Systems and Web Browsers. Computing, 101(2), pp. 139-160. doi: 10.1007/s00607-018-0663-0
Movahedi, Y., Cukier, M. & Gashi, I. ORCID: 0000-0002-8017-3184 (2020). Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities. IEEE Transactions on Dependable and Secure Computing, 19(2), doi: 10.1109/tdsc.2020.3014872
Nandhakumar, J., Panourgias, N.S. & Scarbrough, H. (2013). From knowing it to "getting it": Envisioning practices in computer games development. Information Systems Research, 24(4), pp. 933-955. doi: 10.1287/isre.2013.0482
Pimperton, H., Kyle, F. E. ORCID: 0000-0003-2997-3167, Hulme, C. , Harris, M., Beedie, I., Ralph-Lewis, A., Worster, E., Rees, R., Donlan, C. & MacSweeney, M. (2019). Computerised speechreading training for deaf children: A randomised controlled trial. Journal of Speech, Language, and Hearing Research, 62(8), pp. 2882-2894. doi: 10.1044/2019_jslhr-h-19-0073
Popov, P. T., Strigini, L., Riddle, S. & Romanovsky, A. (2001). On Systematic Design of Protectors for Employing OTS Items. Euromicro Conference, 2001. Proceedings. 27th, 2001, pp. 22-29. doi: 10.1109/EURMIC.2001.952434
Power, C., Cairns, P., Denisova, A. ORCID: 0000-0002-1497-5808 , Papaioannou, T. & Gultroma, R. (2018). Lost at the Edge of Uncertainty: Measuring Player Uncertainty in Digital Games. International Journal of Human-Computer Interaction, 35(12), pp. 1033-1045. doi: 10.1080/10447318.2018.1507161
Reimers, S. & Stewart, N. (2014). Presentation and response timing accuracy in Adobe Flash and HTML5/JavaScript Web experiments. Behavior Research Methods, 47(2), pp. 309-327. doi: 10.3758/s13428-014-0471-1
Robinson, L. (1998). Using Word 97 to create documents for an intranet. Managing Information, 5(4), pp. 30-33.
Sabouri, A., Komninos, N. & Douligeris, C. (2011). User dependent cryptography for security in future mobile telecommunication systems. 18th International Conference on Telecommunications, ICT 2011, 1, pp. 422-427. doi: 10.1109/cts.2011.5898962
Saker, M. ORCID: 0000-0002-7414-2840 & Frith, J. (2018). Locative Media and Sociability:Using Location-Based Social Networks to Coordinate Everyday Life. Architecture_MPS, 14(1), pp. 1-21. doi: 10.14324/111.444.amps.2018v14i1.001
Salako, K. ORCID: 0000-0003-0394-7833 & Strigini, L. (2013). When does "diversity" in development reduce common failures? Insights from probabilistic modelling. IEEE Transactions on Dependable and Secure Computing, 11(2), pp. 193-206. doi: 10.1109/tdsc.2013.32
Salako, K. ORCID: 0000-0003-0394-7833 & Zhao, X. (2023). The Unnecessity of Assuming Statistically Independent Tests in Bayesian Software Reliability Assessments. IEEE Transactions on Software Engineering, 49(4), pp. 2829-2838. doi: 10.1109/TSE.2022.3233802
Schmid, K. & Gacek, C. (2000). Implementation issues in product line scoping. Lecture notes in computer science, 1844, pp. 38-82. doi: 10.1007/978-3-540-44995-9_11
Slingsby, A., Beecham, R. & Wood, J. (2013). Visual analysis of social networks in space and time using smartphone logs. Pervasive and Mobile Computing, 9(6), pp. 848-864. doi: 10.1016/j.pmcj.2013.07.002
Ter-Sarkisov, A. ORCID: 0000-0002-1300-6132 (2022). One Shot Model For COVID-19 Classification and Lesions Segmentation In Chest CT Scans Using LSTM With Attention Mechanism. IEEE Intelligent Systems, 37(3), pp. 54-64. doi: 10.1109/MIS.2021.3135474
Thurman, N., Lewis, S. C. & Kunert, J. Algorithms, Automation, and News. Digital Journalism, 7(8), pp. 980-992. doi: 10.1080/21670811.2019.1685395
Ueberall, C., Koehnen, C., Rakocevic, V. , Jaeger, R., Hoy, E. & Rajarajan, M. (2013). Recommendations in a heterogeneous service environment. Multimedia Tools and Applications, 62(3), pp. 785-820. doi: 10.1007/s11042-011-0874-2
Zhao, X., Salako, K. ORCID: 0000-0003-0394-7833, Strigini, L. ORCID: 0000-0002-4246-2866 , Robu, V. & Flynn, D. (2020). Assessing Safety-Critical Systems from Operational Testing: A Study on Autonomous Vehicles. Information and Software Technology, 128, article number 106393. doi: 10.1016/j.infsof.2020.106393
de Lemos, R., Gacek, C. & Romanovsky, A. (2003). Architectural mismatch tolerance. Lecture Notes in Computer Science, 2677, pp. 175-194. doi: 10.1007/3-540-45177-3_8
van der Meulen, M., Riddle, S., Strigini, L. & Jefferson, N. (2005). Protective wrapping of off-the-shelf components. COTS-based Software Systems, 3412, pp. 168-177. doi: 10.1007/978-3-540-30587-3_27
van der Meulen, M., Strigini, L. & Revilla, M. A. (2005). On the effectiveness of run-time checks. Computer Safety, Reliability and Security, 3688, pp. 151-164. doi: 10.1007/11563228_12
Šoltészová, V., Turkay, C., Price, M. C. & Viola, I. (2012). A perceptual-statistics shading model. IEEE Transactions on Visualization and Computer Graphics, 18(12), pp. 2265-2274. doi: 10.1109/tvcg.2012.188
Book Section
Andrienko, G. ORCID: 0000-0002-8574-6295 & Andrienko, N. ORCID: 0000-0003-3313-1560 (2018). Creating maps of artificial spaces to explore trajectories. In: Proceedings of the Workshop on Advanced Visual Interfaces AVI. . NY, USA: ACM. doi: 10.1145/3206505.3206557
Bayer, J., Gacek, C., Muthig, D. & Widen, T. (2000). PuLSE-I: Deriving instances from a product line infrastructure. In: Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop. (pp. 237-245). London, UK: IEEE Computer Society. doi: 10.1109/ECBS.2000.839882
Bishop, P. G. & Bloomfield, R. E. (1998). A Methodology for Safety Case Development. In: Redmill, F. & Anderson, T. (Eds.), Industrial Perspectives of Safety-critical Systems: Proceedings of the Sixth Safety-critical Systems Symposium, Birmingham 1998. . London, UK: Springer.
Bishop, P. G. & Bloomfield, R. E. (1995). The SHIP Safety Case. In: Safecomp '95 : The 14th International Conference on Computer Safety, Reliability and Security. . London, UK: Springer.
Bishop, P. G. & Bloomfield, R. E. (2002). Worst Case Reliability Prediction Based on a Prior Estimate of Residual Defects. In: Software Reliability Engineering, 2002. ISSRE 2003. Proceedings. 13th International Symposium on. (pp. 295-303). IEEE.
Bishop, P. G., Penny, J., Eaton, A. & Bloomfield, R. E. (2001). The Practicalities of Goal-Based Safety Regulation. In: Redmill, F. & Anderson, T. (Eds.), Aspects of Safety Management: Proceedings of the Ninth Safety-critical Systems Symposium, Bristol, UK 2001. (pp. 35-48). London; New York: Springer.
Bishop, P. G., Tourlas, K. & Chozos, N. (2010). An Approach to Using Non Safety-Assured Programmable Components in Modest Integrity Systems. In: Schoitsch, E. (Ed.), Computer safety, reliability, and security. Lecture Notes in Computer Science, 6351. (pp. 375-388). London, UK: Springer. doi: 10.1007/978-3-642-15651-9_28
Botros, F., Perin, C., Aseniero, B.A. & Carpendale, S. (2016). Go and grow: Mapping personal data to a living plant. In: AVI '16 Proceedings of the International Working Conference on Advanced Visual Interfaces. (pp. 112-119). New York, NY, United States: ACM. doi: 10.1145/2909132.2909267
Cecchinato, M.E., Cox, A. L. & Bird, J. (2015). Working 9-5? Professional differences in email and boundary management practices. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. (pp. 3989-3998). New York, NY, United States: ACM. doi: 10.1145/2702123.2702537
Denisova, A. ORCID: 0000-0002-1497-5808 & Cook, E. (2019). Power-Ups in Digital Games: The Rewarding Effect of Phantom Game Elementson Player Experience. In: CHI PLAY '19 Proceedings of the Annual Symposium on Computer-Human Interaction in Play. (pp. 161-168). New York, NY: ACM Press. doi: 10.1145/3311350.3347173
Glover, I. (2012). SCOF: A Standardised, Customisable Online Feedback Tool. In: Amiel, T. & Wilson, B. (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2012. (pp. 1805-1812). EdITLib.
Howe, J. M. & King, A. (2010). A pearl on SAT solving in Prolog. In: International Symposium on Functional and Logic Programming, pages 165-174. Lecture Notes in Computer Science (6009). . Springer. doi: 10.1007/978-3-642-12251-4_13
Lambert, A., Weyde, T. & Armstrong, N. (2015). Perceiving and predicting expressive rhythm with recurrent neural networks. In: Proceedings of the 12th International Conference in Sound and Music Computing. . Maynooth, Ireland: SMC15.
Littlewood, B. (1996). Evaluation of software dependability. In: Wand, I. C. & Milner, R. (Eds.), Computing Tomorrow: Future Research Directions in Computer Science. (pp. 198-216). New York, USA: Cambridge University Press.
Littlewood, B. & Strigini, L. (2000). Software reliability and dependability: a roadmap. In: Finkelstein, A (Ed.), The Future of Software Engineering. State of the Art Reports given at the 22nd Int. Conf. on Software Engineering. (pp. 177-188). ACM Press. doi: 10.1145/336512.336551
Loumakis, F., Stumpf, S. & Grayson, D. (2011). This image smells good: Effects of image information scent in search engine results pages. In: Proceedings of the 20th ACM international conference on Information and knowledge management. (pp. 475-484). New York: ACM. doi: 10.1145/2063576.2063649
Maiden, N., Zachos, K., Lockerbie, J. , Hoddy, S. & Camargo, K. (2017). Establishing Digital Creativity Support in Non-Creative Work Environments. In: Proceedings of the 11th ACM Creativity and Cognition Conference. (pp. 222-231). New York, USA: ACM.
Maiden, N., Zachos, K., Lockerbie, J. , Levis, S., Camargo, K., Hoddy, S. & Allemandi, G. (2017). Evaluating Digital Creativity Support To Improve Health-and-Safety in a Manufacturing Plant. In: Proceedings of the ACM Conference on Human Factors in Computing Systems. (pp. 7005-7014). New York, NY, United States: ACM. doi: 10.1145/3025453.3025712
Perin, C. & Dragicevic, P. (2014). Manipulating multiple sliders by crossing. In: Proceedings of the 26th Conference on l'Interaction Homme-Machine. (pp. 48-54). ACM. doi: 10.1145/2670444.2670449
Perin, C., Vernier, F. & Fekete, J. (2013). Interactive horizon graphs: Improving the compact visualization of multiple time series. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). (pp. 3217-3226). New York, NY, United States: ACM. doi: 10.1145/2470654.2466441
Porlezza, C. ORCID: 0000-0002-1400-5879 (2019). Data journalism and the ethics of open source. In: Daly, A., Devitt, S. K. & Mann, M. (Eds.), Good Data. Theory on Demand, 29. (pp. 189-201). Amsterdam: Institute of Network Cultures.
Roper, A. ORCID: 0000-0001-6950-6294 Computer-aided rehabilitation. In: Damico, J. S. & Ball, M. J. (Eds.), The SAGE Encyclopedia of Human Communication Sciences and Disorders. (pp. 456-460). Thousand Oaks, California: SAGE.
Sadeghi, J., Perin, C., Flemisch, T. , Hancock, M. & Carpendale, S. (2016). Flexible trees: Sketching tree layouts. In: AVI '16 Proceedings of the International Working Conference on Advanced Visual Interfaces. (pp. 84-87). New York, USA: ACM. doi: 10.1145/2909132.2909274
Strigini, L. (2012). Fault tolerance and resilience: meanings, measures and assessment. In: Wolter, K., Avritzer, A., Vieira, M. & van Moorsel, A. (Eds.), Resilience Assessment and Evaluation of Computing Systems. . Berlin, Germany: Springer.
Strigini, L. & Bertolino, A. (1996). Acceptance Criteria for Critical Software Based on Testability Estimates and Test Results. In: Lecture notes in computer science. (pp. 83-94). Springer.
de Rooij, A., Corr, P. J. & Jones, S. (2017). Creativity and Emotion: Enhancing Creative Thinking by the Manipulation of Computational Feedback to Determine Emotional Intensity. In: Proceedings of the 2017 ACM SIGCHI Conference on Creativity and Cognition. (pp. 148-157). New York, NY, United States: ACM.
Conference or Workshop Item
Abd Rahman, M. H., Nordin, A. I. & Denisova, A. ORCID: 0000-0002-1497-5808 (2017). The effect of time manipulation on immersion in digital games. In: Badioze Zaman, H., Robinson, P., Smeaton, A. F. , Shih, T. K. & Velastin, S. (Eds.), Advances in Visual Informatics. IVIC 2017. International Visual Informatics Conference 2017, 28 - 30 November, Bangi, Malaysia. doi: 10.1007/978-3-319-70010-6_50
Adamsky, F., Khayam, S. A., Jager, R. & Rajarajan, M. (2012). Security analysis of the micro transport protocol with a misbehaving receiver. Paper presented at the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 10 - 12 October 2012, Sanya, China. doi: 10.1109/CyberC.2012.31
Aghazadeh Chakherlou, R., Salako, K. ORCID: 0000-0003-0394-7833 & Strigini, L. ORCID: 0000-0002-4246-2866 (2022). Arguing safety of an improved autonomous vehicle from safe operation before the change: new results. In: RAIS 2022 2nd International Workshop on Reliability of Autonomous Intelligent Systems. RAIS 2022 2nd International Workshop on Reliability of Autonomous Intelligent Systems, 31 Oct - 3 Nov 2022, Charlotte, NC, USA. doi: 10.1109/ISSREW55968.2022.00085
Algaith, A., Nunes, P., Fonseca, J. , Gashi, I. ORCID: 0000-0002-8017-3184 & Viera, M. (2018). Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools. In: 2018 14th European Dependable Computing Conference (EDCC). 14th European Dependable Computing Conference, 10-14 Sep 2018, Iasi, Romania. doi: 10.1109/EDCC.2018.00020
Beghelli, A. & Jones, S. (2020). On the novelty of software products. In: Proceedings of the Sixth International Conference on Design Creativity (ICDC 2020). Sixth International Conference on Design Creativity (ICDC 2020), 26-28 August 2020, Oulu, Finland. doi: 10.35199/ICDC.2020.02
Bencomo, N., Letier, E., Finkelstein, A. ORCID: 0000-0003-2167-9844 , Whittle, J. & Welsh, K. (2011). Foreword: 2nd workshop requirements@run.time. In: Proceedings of the 2011 2nd International Workshop on Requirements@Run.Time, RE@RunTime 2011. 2nd international workshop on Requirements@Run.Time, 30 Aug 2011, Trento, Italy. doi: 10.1109/ReRunTime.2011.6046240
Benetos, E. & Dixon, S. (2011). Polyphonic music transcription using note onset and offset detection. In: ICASSP. 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 22 - 27 May 2011, Prague, Czech Republic. doi: 10.1109/ICASSP.2011.5946322
Benetos, E., Kotti, M. & Kotropoulos, C. (2006). Applying supervised classifiers based on non-negative matrix factorization to musical instrument classification. In: ICME. IEEE International Conference on Multimedia and Expo (ICME 2006), 9 - 12 July 2006, Toronto, Canada. doi: 10.1109/ICME.2006.262650
Benetos, E., Kotti, M. & Kotropoulos, C. (2006). Musical instrument classification using non-negative matrix factorization algorithms and subset feature selection. In: ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. IEEE International Conference on Acoustics, Speech and Signal Processing, 14 - 19 May 2006, Toulouse, France.
Bessani, A. N., Reiser, H. P., Sousa, P. , Gashi, I., Stankovic, V. ORCID: 0000-0002-8740-6526, Distler, T., Kapitza, R., Daidone, A. & Obelheiro, R. R. (2008). FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery. In: Douglis, F (Ed.), Middleware (Companion). ACM/IFIP/USENIX Middleware '08 Conference doi: 10.1145/1462735.1462763
Bishop, P. ORCID: 0000-0003-3307-5159 & Povyakalo, A. A. ORCID: 0000-0002-4068-422X (2022). Optimising the Reliability that can be Claimed for a Software-based System based on Failure-free Tests of its components. In: Computer Safety, Reliability, and Security. 41st International Conference, SAFECOMP 2022, 6-9 Sep 2022, Munich, Germnay. doi: 10.1007/978-3-031-14835-4
Bishop, P. ORCID: 0000-0003-3307-5159, Povyakalo, A. ORCID: 0000-0002-4068-422X & Strigini, L. ORCID: 0000-0002-4246-2866 (2022). Bootstrapping confidence in future safety based on past safe operation. In: 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE). 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE 2022), 31 Oct - 3 Nov 2022, Charlotte, NC, USA. doi: 10.1109/ISSRE55969.2022.00020
Bishop, P. G. (2013). Does software have to be ultra reliable in safety critical systems?. Paper presented at the SAFECOMP 2013, 32nd International Conference on Computer Safety, Reliability and Security, 24 - 27 September 2013, Toulouse, France.
Bishop, P. G. (2002). Estimating Residual Faults from Code Coverage. Paper presented at the SAFECOMP 2002, 10 - 13 Sept 2002, Catania, Italy.
Bishop, P. G. (2003). MC/DC based estimation and detection of residual faults in PLC logic networks. In: Fast Abstracts, Supplementary Proceedings. 14th IEEE International Symposium on Software Reliability Engineering ISSRE 2003, 17 - 20 Nov 2003, Denver, Colorado.
Bishop, P. G. (1997). Using reversible computing to achieve fail-safety. In: EIGHTH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS. Eighth International Symposium On Software Reliability Engineering, 2 - 5 Nov 1997, Albuquerque, NM , USA.
Bishop, P. G. & Bloomfield, R. E. (2003). Using a Log-normal Failure Rate Distribution for Worst Case Bound Reliability Prediction. Paper presented at the 14th IEEE International Symposium on Software Reliability Engineering (ISSRE 2003), 17 - 20 Nov 2003, Denver, Colorado.
Bishop, P. G., Bloomfield, R. E. & Cyra, L. (2013). Combining Testing and Proof to Gain High Assurance in Software: a Case Study. In: Not known (Ed.), TBD. IEEE International Symposium on Software Reliability Engineering (ISSRE 2013), 4 - 7 Nov 2013, Pasadena, CA, USA.
Bishop, P. G., Burns, G. & Anderson, S. O. (1993). Stepwise Development and Verification of a Boiler System Specification. Paper presented at the International Workshop on the Design and Review of Software Controlled Safety-related Systems, 28 - 29 Jun 1993, National Research Council, Ottawa, Canada.
Bishop, P. G. & Cyra, L. (2012). Overcoming non-determinism in testing smart devices: how to build models of device behaviour. Paper presented at the 11th International Probabilistic Safety Assessment and Management Conference and the Annual European Safety and Reliability Conference 2012 (PSAM11 & ESREL 2012), 25 - 29 June 2012, Helsinki, Finland.
Bishop, P. G., Gashi, I., Littlewood, B. & Wright, D. (2007). Reliability modeling of a 1-out-of-2 system: Research with diverse Off-the-shelf SQL database servers. In: OConner, L (Ed.), ISSRE 2007: 18TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS. The 18th IEEE International Symposium on Software Reliability (ISSRE '07), 5 - 9 Nov 2007, Trollhättan, Sweden.
Bloomfield, R. E., Gashi, I., Povyakalo, A. A. & Stankovic, V. ORCID: 0000-0002-8740-6526 (2008). Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network. In: ISSRE. 19th International Symposium on Software Reliability Engineering, 2008, 10 - 14 Nov 2008, Seattle, USA. doi: 10.1109/ISSRE.2008.62
Bloomfield, R. E., Littlewood, B. & Wright, D. (2007). Confidence: Its role in dependability cases for risk assessment. In: 37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS. 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 25 - 28 June 2008, Edinburgh, UK. doi: 10.1109/DSN.2007.29
Bloomfield, R. E., Netkachova, K. & Stroud, R. (2013). Security-Informed Safety: If it's not secure, it's not safe. Paper presented at the 5th International Workshop on Software Engineering for Resilient Systems (SERENE 2013), 03rd - 04th October 2013, Kiev, Ukraine.
Bourazeri, A. ORCID: 0000-0002-0258-7648, Pitt, J. & Arnab, S. (2016). Social Mpower: An Educational Game for Energy Efficiency. In: Serious Games, Interaction and Simulation: SGAMES 2016. 6th International Conference, SGAMES 2016, 16 - 17 June 2016, Porto, Portugal. doi: 10.1007/978-3-319-51055-2_17
Collins, E. I. M., Cox, A. L., Bird, J. & Harrison, D. (2014). Social networking use and RescueTime: The issue of engagement. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. UbiComp '14: The 2014 ACM Conference on Ubiquitous Computing, 13-17 Sep 2014, Seattle, USA. doi: 10.1145/2638728.2641322
Courbis, C. & Finkelstein, A. ORCID: 0000-0003-2167-9844 (2004). Towards an aspect weaving BPEL engine. Paper presented at the Third AOSD Workshop on Aspects, omponents, and Patterns for Infrastucture Software (ACP4IS), 22-26 Mar 2004, Lancaster, UK.
Cox, A. L., Bird, J., Mauthner, N. , Dray, S., Peters, A. & Collins, E. (2014). Socio-Technical Practices and Work-Home Boundaries. In: Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services. MobileHCI '14: 16th International Conference on Human-Computer Interaction with Mobile Devices and Services, 23-26 Sep 2014, Toronto, Canada. doi: 10.1145/2628363.2634259
Cukier, M., Gashi, I., Sobesto, B. & Stankovic, V. ORCID: 0000-0002-8740-6526 (2013). Does Malware Detection Improve With Diverse AntiVirus Products? An Empirical Study. Paper presented at the 32nd International Conference on Computer Safety, Reliability and Security (SAFECOMP), 24- - 27 September 2013, Toulouse, France.
Denisova, A. & Cairns, P. (2015). Adaptation in Digital Games: The Effect of Challenge Adjustment on Player Performance and Experience. In: Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play. CHI PLAY '15 2015 Annual Symposium on Computer-Human Interaction in Play, 05 - 07 October 2015, London, UK. doi: 10.1145/2793107.2793141
Denisova, A. & Cairns, P. (2015). First Person vs. Third Person Perspective in Digital Games: Do Player Preferences Affect Immersion? In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. CHI '15 33rd Annual ACM Conference on Ham Factors in Computing Systems, 18 - 23 April 2015, Seoul, Republic of Korea. doi: 10.1145/2702123.2702256
Denisova, A. & Cairns, P. (2015). The Placebo Effect in Digital Games. In: Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play. 2105 Annual Symposium on Computer-Human Interaction in Play, 05 - 07 October, 2015, London, United Kingdom. doi: 10.1145/2793107.2793109
Denisova, A., Nordin, A. I. & Cairns, P. (2016). The Convergence of Player Experience Questionnaires. In: Proceedings of the 2016 Annual Symposium on Computer-Human Interaction in Play. CHI Play '16 2016 Annual Symposium on Computer-Human Interaction in Play, 16 - 19 October 2016, Austin, Texas, USA. doi: 10.1145/2967934.2968095
Einbond, A., Trapani, C., Agostini, A. , Ghisi, D. & Schwarz, D. (2014). Fine-tuned Control of Concatenative Synthesis with CATART Using the BACH Library for MAX. In: ICMC. International Computer Music Conference, ICMC 2014, 14-20 September, 2014, Athens, Greece.
Emmerich, W., Finkelstein, A. ORCID: 0000-0003-2167-9844 & Montangero, C. (1997). ’The World and the Machine’: a critical perspective on process technology. Paper presented at the International Workshop on Research Directions in Process Technology, Jul 1997, Nancy, France.
Emmerich, W., Finkelstein, A. ORCID: 0000-0003-2167-9844, Montangero, C. & Stevens, R. (1997). Standards compliant software development. Paper presented at the ICSE Workshop on Living with Inconsistency, May 1997, Boston, USA.
Farbey, B. & Finkelstein, A. ORCID: 0000-0003-2167-9844 (2001). Evaluation in software engineering: ROI, but more than ROI. Paper presented at the 3rd International Workshop on Economics-Driven Software Engineering Research (EDSER-3 2001), 12-19 May 2001, Toronto, Canada.
Farbey, B. & Finkelstein, A. ORCID: 0000-0003-2167-9844 (1999). Exploiting software supply chain business architecture: a research agenda. Paper presented at the 1st Workshop on Economics-Driven Software Engineering Research (EDSER-1), 21st International Conference on Software Engineering, 16-22 May 1999, Los Angeles, USA.
Fengou, M. A., Mantas, G., Lymberopoulos, D. & Komninos, N. (2011). Ubiquitous healthcare profile management applying smart card technology. In: Nikita, KS, Lin, JC, Fotiadis, DI & Waldmeyer, MTA (Eds.), MobiHealth. Second International ICST Conference, MobiHealth 2011, 5 - 7 October 2011, Kos Island, Greece. doi: 10.1007/978-3-642-29734-2_34
Finkelstein, A. ORCID: 0000-0003-2167-9844 (1994). Requirements engineering: a review and research agenda. In: Proceedings of 1st Asia-Pacific Software Engineering Conference. 1st Asia-Pacific Software Engineering Conference, 7-9 Dec 1994, Tokyo, Japan. doi: 10.1109/APSEC.1994.465278
Finkelstein, A. ORCID: 0000-0003-2167-9844 (2016). Software engineering and policy. In: Dillon, LK, Visser, W & Williams, L (Eds.), ICSE '16: Proceedings of the 38th International Conference on Software Engineering Companion. 38th International Conference on Software Engineering Companion, 14-22 May 2016, Austin, USA. doi: 10.1145/2889160.2889215
Finkelstein, A. ORCID: 0000-0003-2167-9844 (1992). An advanced course on software development environments. Paper presented at the 2nd National Conference on Software Engineering in Higher Education, Swansea, UK.
Gacek, C. (2004). An interdisciplinary perspective of dependability in Open Source Software. In: Jacquart, R (Ed.), BUILDING THE INFORMATION SOCIETY. Building the Information Society, 22 - 27 August 2004, Toulouse, France.
Gacek, C., Arief, B. & Lawrie, T. (2001). Software architectures and Open Source Software: Where can research leverage the most?. Paper presented at the 1st Workshop on Open Source Software Engineering: Making Sense of the Bazaar (part of the 23rd IEEE International Conference on Software Engineering (ICSE 2001)), 15 May 2001, Toronto, Canada.
Gacek, C., Lawrie, T. & Arief, B. (2002). Interdisciplinary insights on Open Source. Paper presented at the Open Source Software Development Workshop, 25 - 26 Feb 2002, Newcastle upon Tyne, UK.
Gadala, M., Strigini, L. ORCID: 0000-0002-4246-2866 & Fujdiak, R. (2022). Authentication for Operators of Critical Medical Devices: A Contribution to Analysis of Design Trade-offs. In: Proceedings of the 17th International Conference on Availability, Reliability and Security. ARES 20222: The 17th International Conference on Availability, Reliability and Security, 23-26 Aug 2022, Vienna, Austria. doi: 10.1145/3538969.3544474
Galliers, J. R., Wilson, S., Muscroft, S. , Marshall, J., Roper, A., Cocks, N. & Pring, T. (2011). Accessibility of 3D Game Environments for People with Aphasia: An Exploratory Study. Paper presented at the 13th International ACM SIGACCESS Conference on Computers and Accessibility, 24 - 26 Oct 2011, Dundee, Scotland.
Garcia, M., Bessani, A. N., Gashi, I. , Neves, N. & Obelheiro, R. R. (2011). OS diversity for intrusion tolerance: Myth or reality? In: Proceedings of the International Conference on Dependable Systems and Networks. 41st International Conference on Dependable Systems & Networks (DSN), 27 - 30 Jun 2011, Hong Kong.
Gashi, I., Bloomfield, R., Bloomfield, R. E. & Stroud, R. (2012). How secure is ERTMS?. Paper presented at the Workshop on Dependable and Secure Computing for Large-scale Complex Critical Infrastructures (DESEC4LCCI), 25 September 2012, Herrenkrug, Germany.
Gashi, I. & Popov, P. T. (2006). Rephrasing rules for off-the-shelf SQL database servers. In: Ceballos, S (Ed.), EDCC 2006: Sixth European Dependable Computing Conference, Proceedings. Sixth European Dependable Computing Conference, 2006 (EDCC '06), 18 - 20 Oct 2006, Coimbra, Portugal.
Gashi, I. & Popov, P. T. (2007). Uncertainty explicit assessment of off-the-shelf software: Selection of an optimal diverse pair. In: ICCBSS 2007: SIXTH INTERNATIONAL IEEE CONFERENCE ON COMMERCIAL-OFF-THE-SHELF (COTS)-BASED SOFTWARE SYSTEMS, PROCEEDINGS. Sixth International IEEE Conference on Commercial-off-the-Shelf (COTS)-Based Software Systems, 26 Feb - 2 Mar 2007, Banff, Canada.
Gashi, I., Popov, P. T. & Strigini, L. (2004). Fault diversity among off-the-shelf SQL database servers. In: 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS. International Conference on Dependable Systems and Networks, 28 Jun - 1 Jul 2004
Gashi, I., Stankovic, V. ORCID: 0000-0002-8740-6526, Cukier, M. & Sobesto, B. (2012). Diversity with AntiVirus products: Additional empirical studies. Paper presented at the 42nd IEEE International Conference on Dependable Systems and Networks (DSN) 2012, 25 - 28 June 2012, Boston, USA.
Gashi, I., Stankovic, V. ORCID: 0000-0002-8740-6526, Leita, C. & Thonnard, O. (2009). An Experimental Study of Diversity with Off-The-Shelf AntiVirus Engines. In: 2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS. Eighth IEEE International Symposium on Network Computing and Applications, 9 - 11 July 2009, Cambridge, MA, USA.
Georgakakis, E., Komninos, N. & Douligeris, C. (2012). NAVI: Novel authentication with visual information. In: ISCC. IEEE Symposium on Computers and Communications (ISCC), 1 - 4 July 2012, Cappadocia, Turkey. doi: 10.1109/ISCC.2012.6249360
Gotel, O. & Finkelstein, A. ORCID: 0000-0003-2167-9844 (1994). Modelling the contribution structure underlying requirements. Paper presented at the 1st International Workshop on Requirements Engineering: Foundations for Software Quality.
Hariri, A., Bandopadhyay, S., Rizos, A. , Dimitrakos, T., Crispo, B. & Rajarajan, M. ORCID: 0000-0001-5814-9922 (2021). SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials. In: ICT Systems Security and Privacy Protection. 36th IFIP TC 11 International Conference, SEC 2021, 22-24 Jun 2021, Oslo, Norway. doi: 10.1007/978-3-030-78120-0_3
Harrison, D., Marshall, P., Berthouze, N. & Bird, J. (2014). Tracking physical activity: Problems related to running longitudinal studies with commercial devices. In: UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. UbiComp '14: The 2014 ACM Conference on Ubiquitous Computing, 13-17 Sep 2014, Seattle, USA. doi: 10.1145/2638728.2641320
Hovorushchenko, T. & Popov, P. T. ORCID: 0000-0002-3434-5272 (2021). Method of developing the defect-free medical software by establishing the presence of residual defects. In: Proceedings of the 4th International Conference on Informatics & Data-Driven Medicine. 4th International Conference on Informatics & Data-Driven Medicine, 19 - 21 Nov 2021, Valencia, Spain.
Hovorushchenko, T., Popov, P. T. ORCID: 0000-0002-3434-5272, Medzatyi, D. & Voichur, Y. (2022). Method and Technology for Ensuring the Software Security by Identifying and Classifying the Failures and Vulnerabilities. In: Lytvynenko, I. & Lupenko, S. (Eds.), Information Technologies: Theoretical and Applied Problems 2022. 2nd International Workshop on Information Technologies: Theoretical and Applied Problems (ITTAP 2022), 22-24 Nov 2022, Ternopil, Ukraine.
Karakostas, B. & Katsoulakos, T. (2013). A DSL For Logistics Clouds. Paper presented at the The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization, 27 May - 01 June 2013, Valencia, Spain.
Karakostas, B. & Theodoulidis, B. (2013). A MapReduce architecture for web site user behaviour monitoring in real time. Paper presented at the 2nd International Conference on Data Management Technologies and Applications (DATA), 29 - 31 July 2013, Reykjavik, Iceland.
Kardaras, D., Mamakou, X. J. & Karakostas, B. (2013). Fuzzy equivalence relation based clustering and its use to restructuring websites' hyperlinks and web pages. In: Papadopoulos, H, Andreou, AS, Iliadis, LS & Maglogiannis, I (Eds.), AIAI. AIAI 2013 : 9th IFIP International Conference on Artificial Intelligence Applications and Innovations, 30th September - 2nd October 2013, Paphos, Cyprus. doi: 10.1007/978-3-642-41142-7_6
Kharchenko, V. S., Odarushchenko, O., Odarushchenko, V. & Popov, P. T. (2013). Selecting Mathematical Software for Dependability Assessment of Computer Systems Described by Stiff Markov Chains. In: Ermolayev, V, Mayr, HC, Nikitchenko, M , Spivakovsky, A, Zholtkevych, G, Zavileysky, M, Kravtsov, H, Kobets, V & Peschanenko, VS (Eds.), ICTERI. 9th International Conference on ICT in Education, Research and Industrial Applications: Integration, Harmonization and Knowledge Transfer, 19-06-2013 - 22-06-2013, Kherson, Ukraine.
Kim, J., Jones, K. & Horowitz, M. (2007). Variable domain transformation for linear PAC analysis of mixed-signal systems. Paper presented at the International Conference on Computer-Aided Design, 2007. ICCAD 2007, 05 - 08 Nov 2007, San Jose, California, USA. doi: 10.1109/ICCAD.2007.4397376
Kloukinas, C. & Issarny, V. (2000). Automating the Composition of Middleware Configurations. In: ASE. he Fifteenth IEEE International Conference on Automated Software Engineering, 11 - 15 Sep 2000, Grenoble, France.
Kloukinas, C. & Issarny, V. (2001). SPIN-ning Software Architectures: A Method for Exploring Complex Systems. In: WICSA. Working IEEE/IFIP Conference on Software Architecture, 28 - 31 Aug 2001, Amsterdam, Holland. doi: 10.1109/WICSA.2001.948409
Komninos, N. (2007). Morpheus: stream cipher for software & hardware applications. Paper presented at the IEEE 9th International Symposium on Communication Theory & Applications (ISCTA’07), 16 - 20 July 2007, Ambleside, UK.
Komninos, N. & Dimitriou, T. (2006). Adaptive authentication and key agreement mechanism for future cellular systems. Paper presented at the 15th IST Mobile & Wireless Communications Summit, 04 - 08 June 2006, Mykonos, Greece.
Komninos, N. & Honary, B. (2001). Modified WAP for secure voice and video communication. In: IEE Conference Publication. 2nd IEE International Conference on 3G Mobile Communication Technologies, 26 - 28 March 2001, London.
Komninos, N. & Honary, B. (2002). Novel methods for enabling public key schemes in future mobile systems. Paper presented at the 3rd IEE International Conference on 3G Mobile Communication Technologies, 8 - 10 May 2002, London.
Komninos, N. & Honary, B. (2002). Security enhancement for A5/1 without losing hardware efficiency in future mobile systems. In: IEE Conference Publication. 3rd IEE International Conference on 3G Mobile Communication Technologies, 8 - 10 May 2002, London.
Komninos, N., Honary, B. & Darnell, M. (2000). Secure communication protocol for mobile multimedia applications. Paper presented at the 3rd International Symposium on Wireless Personal Multimedia Communications (WPMC’2000), 12 - 15 November 2000, Bangkok, Thailand.
Komninos, N., Samarakoon, M. I. & Honary, B. (2000). Authentication and key distribution for wired and wireless systems. Paper presented at the 1st Annual Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 19 - 20 June 2000, Liverpool John Moores University, Liverpool, UK.
Komninos, N., Tselikis, C. & Douligeris, C. (2013). SAnoVs: Secure Anonymous Voting Scheme for clustered ad hoc networks. Paper presented at the 18th IEEE Symposium on Computers and Communication (ISCC’13), 07 - 10 July 2013, Croatia.
Kotti, M., Benetos, E. & Kotropoulos, C. (2006). Automatic speaker change detection with the Bayesian information criterion using MPEG-7 features and a fusion scheme. In: ISCAS. International Symposium on Circuits and Systems (ISCAS 2006), 21 - 24 May 2006, Island of Kos, Greece. doi: 10.1109/ISCAS.2006.1692970
Kotti, M., Martins, L. P. M., Benetos, E. , Cardoso, J. S. & Kotropoulos, C. (2006). Automatic speaker segmentation using multiple features and distance measures: a comparison of three approaches. In: ICME. IEEE International Conference on Multimedia and Expo (ICME 2006), 9 - 12 July 2006, Toronto, Canada. doi: 10.1109/ICME.2006.262727
Kramer, J. & Finkelstein, A. ORCID: 0000-0003-2167-9844 (1991). A configurable framework for method and tool integration. Paper presented at the European Symposium on Software Development Environments and CASE Technology., Jun 1991, Königswinter, Germany.
Krotsiani, M., Spanoudakis, G. & Mahbub, K. (2013). Incremental certification of cloud services. In: SECURWARE 2013 - 7th International Conference on Emerging Security Information, Systems and Technologies. SECURWARE 2013 - 7th International Conference on Emerging Security Information, Systems and Technologies, 25th - 31st August 2013, Barcelona, Spain.
Laibacher, T., Weyde, T. ORCID: 0000-0001-8028-9905 & Jalali, S. (2020). M2U-net: Effective and efficient retinal vessel segmentation for real-world applications. In: 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). doi: 10.1109/CVPRW.2019.00020
Le, B. T., Nadimi, S., Goodey, R.J. ORCID: 0000-0002-9166-8393 & Taylor, R.N. ORCID: 0000-0002-8103-0433 (2018). A study on performance of three-dimensional imaging system for physical models. In: McNamara, A. M. ORCID: 0000-0002-3452-0800, Divall, S. ORCID: 0000-0001-9212-5115, Goodey, R.J. ORCID: 0000-0002-9166-8393 , Taylor, N., Stallebrass, S. E. ORCID: 0000-0002-3747-9524 & Panchal, J. P. (Eds.), Physical Modelling in Geotechnics: Proceedings of the 9th International Conference on Physical Modelling in Geotechnics (ICPMG 2018), July 17-20, 2018, London, United Kingdom.
Littlewood, B. (2000). The problems of assessing software reliability ...When you really need to depend on it. Paper presented at the Conference on Lessons in System Safety.
Littlewood, B. & Burns, A. (2010). Reasoning About the Reliability of Multi-version, Diverse Real-Time Systems. Paper presented at the 31st IEEE Real-Time Systems Symposium, 30 November - 03 December 2010, San Diego, USA. doi: 10.1109/RTSS.2010.43
Littlewood, B., Popov, P. T. & Strigini, L. (2001). Design diversity: an update from research on reliability modelling. In: Redmill, F & Anderson, T (Eds.), ASPECTS OF SAFETY MANAGEMENT. 9th Safety-critical Systems Symposium, 2001, Bristol, UK.
Littlewood, B. & Strigini, L. (2004). Redundancy and diversity in security. In: Samarati, P, Ryan, P, Gollmann, D & Molva, R (Eds.), COMPUTER SECURITY ESORICS 2004, PROCEEDINGS. 9th European Symposium on Research in Computer Security, Sept 2004, Sophia Antipolis, France.
Littlewood, B. & Wright, D. (1995). A Bayesian model that combines disparate evidence for the quantitative assessment of system dependability. Paper presented at the 14th International Conference on Computer Safety (SafeComp’95), 11 - 13 October 1995, Belgirate, Italy.
Lugini, L., Marasco, E., Cukic, B. & Gashi, I. (2013). Interoperability in Fingerprint Recognition: A Large-Scale Empirical Study. In: Proceedings of the RSDA Workshop, the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013). 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2013), 24 - 27 June 2013, Budapest, Hungary.
Mascolo, C., Emmerich, W. & Finkelstein, A. ORCID: 0000-0003-2167-9844 (2000). XMILE: an incremental code mobility system based on XML technologies. Paper presented at the 2nd Int. Symposium on Agent Systems and Applications and Mobile Agents (ASA/MA2000) September, 13-15 Sep 2000, Zurich, Switzerland.
Michalas, A., Bakopoulos, M., Komninos, N. & Prasad, N. R. (2012). Secure & trusted communication in emergency situations. In: 35th IEEE Sarnoff Symposium, SARNOFF 2012 - Conference Proceedings. 35th IEEE Sarnoff Symposium (SARNOFF), 21 - 22 May 2012, Newark, USA. doi: 10.1109/SARNOF.2012.6222751
Michalas, A. & Komninos, N. (2014). The Lord of the Sense: A Privacy Preserving Reputation System for Participatory Sensing Applications. Paper presented at the 19th IEEE Symposium on Computers and Communication (ISCC’2014), 23rd - 26th June 2014, Madeira, Portugal.
Michalas, A., Oleshchuk, V. A., Komninos, N. & Prasad, N. R. (2011). Privacy-preserving scheme for mobile ad hoc networks. In: ISCC. 2011 IEEE Symposium on Computers and Communications (ISCC), 28 June - 1 July 2011, Kerkyra, Greece. doi: 10.1109/ISCC.2011.5983930
Moschou, V., Kotti, M., Benetos, E. & Kotropoulos, C. (2007). Systematic comparison of BIC-based speaker segmentation systems. In: 2007 IEEE 9Th International Workshop on Multimedia Signal Processing, MMSP 2007 - Proceedings. IEEE 9Th International Workshop on Multimedia Signal Processing, 1 - 3 October 2007, Crete, Greece.
Mota, E., Howe, J. M. ORCID: 0000-0001-8013-6941, Schramm, A. & d'Avila Garcez, A. S. (2019). Efficient Predicate Invention using Shared NeMuS. In: 14th International Workshop on Neural-Symbolic Learning and Reasoning. 14th International Workshop on Neural-Symbolic Learning and Reasoning, 10 - 16 August 2019, Macau, China.
Mourouzis, T., Courtois, N. & Komninos, N. (2014). Advanced truncated differential cryptanalysis of GOST block cipher. Paper presented at the 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces, 1st - 2nd April 2014, Hellenic Military Academy, Athens, Greece.
Mourouzis, T., Komninos, N. & Christofi, M. (2014). Towards a combined Rotational-Differential Cryptanalytic Framework. Paper presented at the 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces, 1st - 2nd April 2014, Hellenic Military Academy, Athens, Greece.
Neate, T. ORCID: 0000-0002-1387-8168, Roper, A. & Wilson, S. (2020). Painting a Picture of Accessible Digital Art. In: ASSETS '20: The 22nd International ACM SIGACCESS Conference on Computers and Accessibility. ASSETS 2020The 22nd International ACM SIGACCESS Conference on Computers and Accessibility, 26 - 28 October 2020, Athens, Greece. doi: 10.1145/3373625.3418019
Nentwich, C., Emmerich, W. & Finkelstein, A. ORCID: 0000-0003-2167-9844 (2002). Edit, compile, debug: from hacking to distributed engineering. Paper presented at the Workshop on Aspect Oriented Design at the 1st International Conference on Aspect Oriented Software Development (AOSD), 22-26 Apr 2002, Enschede, The Netherlands.
O'Sullivan, D., Wilk, S., Michalowski, W. & Farion, K. (2013). Using PICO to Align Medical Evidence with MDs Decision Making Models. In: Lehmann, CU, Ammenwerth, E & Nohr, C (Eds.), MEDINFO 2013: PROCEEDINGS OF THE 14TH WORLD CONGRESS ON MEDICAL AND HEALTH INFORMATICS, PTS 1 AND 2. 14th World Congress on Medical and Health Informatics, 20-08-2013 - 23-08-2013, Copenhagen, Denmark. doi: 10.3233/978-1-61499-289-9-1057
Ozkaya, M. & Kloukinas, C. (2013). Towards Design-by-Contract based software architecture design. In: SoMeT 2013 - 12th IEEE International Conference on Intelligent Software Methodologies, Tools and Techniques, Proceedings. 2013 IEEE 12th International Conference on Intelligent Software Methodologies, Tools and Techniques (SoMeT), 22nd September - 24 September 2013, Budapest, Hungary.
Panagakis, I., Benetos, E. & Kotropoulos, C. (2008). Music genre classification: a multilinear approach. In: Bello, JP, Chew, E & Turnbull, D (Eds.), ISMIR. International Symposium Music Information Retrieval, 14 - 18 September 2008, Philadelphia, USA.
Pizza, M. & Strigini, L. (1998). Comparing the effectiveness of testing methods in improving programs: the effect of variations in program quality. In: NINTH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS. The Ninth International Symposium on Software Reliability Engineering, 4 - 7 Nov 1998, Paderborn, Germany.
Popov, P. T. & Littlewood, B. (2004). The effect of testing on reliability of fault-tolerant software. In: International Conference on Dependable Systems and Networks, 2004. 2004 International Conference on dependable systems and networks, 28 Jun - 1 Jul 2004, Florence, Italy. doi: 10.1109/DSN.2004.1311896
Popov, P. T., Salako, K. ORCID: 0000-0003-0394-7833 & Stankovic, V. ORCID: 0000-0002-8740-6526 (2015). Stochastic modeling for performance evaluation of database replication protocols. In: Lecture Notes in Computer Science. doi: 10.1007/978-3-319-22264-6_2
Popov, P. T., Stankovic, V. ORCID: 0000-0002-8740-6526 & Strigini, L. (2012). An Empirical Study of the Effectiveness of 'Forcing Diversity' Based on a Large Population of Diverse Programs. Paper presented at the ISSRE 2012, International Symposium on Software Reliability Engineering, 27 - 30 November 2012, Dallas, Texas, USA.
Popov, P. T. & Strigini, L. (2010). Assessing Asymmetric Fault-Tolerant Software. In: ISSRE. Software Reliability Engineering (ISSRE), 2010 IEEE 21st International Symposium on, 1 - 4 Nov 2010, San Jose, California. doi: 10.1109/ISSRE.2010.10
Popov, P. T. & Strigini, L. (2001). The reliability of diverse systems: a contribution using modelling of the fault creation process. In: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS. International Conference on Dependable Systems and Networks, 1 - 4 Jul 2001, Goteborg, Sweden.
Popov, P. T., Strigini, L. & Romanovsky, A. (1999). Choosing effective methods for design diversity - How to progress from intuition to science. In: Felici, M, Kanoun, K & Pasquini, A (Eds.), COMPUTER SAFETY, RELIABILITY AND SECURITY. SAFECOMP '99 Proceedings of the 18th International Conference on Computer Computer Safety, Reliability and Security, 1999
Somarakis, I., Smyrlis, M., Fysarakis, K. & Spanoudakis, G. ORCID: 0000-0002-0037-2600 (2020). Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective. In: Computer Security. IOSEC 2019, MSTEC 2019, FINSEC 2019. doi: 10.1007/978-3-030-42051-2_12
Soultatos, O., Spanoudakis, G., Fysarakis, K. , Askoxylakis, I., Alexandris, G., Miaoudakis, A. & Petroulakis, N. E. (2018). Towards a Security, Privacy, Dependability, Interoperability Framework for the Internet of Things. In: 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). doi: 10.1109/CAMAD.2018.8514937
Spanoudakis, G. ORCID: 0000-0002-0037-2600, Finkelstein, A. ORCID: 0000-0003-2167-9844 & Ryan, M. (1996). Software Package Requirements and Procurement. Paper presented at the 8th International Workshop on Software Specification and Design, 22-23 Mar 1996, Schloss Velen, Germany. doi: 10.1109/IWSSD.1996.501156
Spanoudakis, G., Kloukinas, C. & Androutsopoulos, K. (2007). Towards security monitoring patterns. Paper presented at the 22nd Annual ACM Symposium on Applied Computing, 11 - 15 March 2007, Seoul, Korea.
Stankovic, V. ORCID: 0000-0002-8740-6526, Alata, E., Leita, C. , Serafini, M., Thonnard, O., Viniikka, J. & Zurutuza, U. (2008). Malicious Fault Characterization Exploiting Honeypot Data. In: Proc. of the 7th European Dependable Computing Conference (EDCC 2008). 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.
Stankovic, V. ORCID: 0000-0002-8740-6526, Bessani, A. N., Daidone, A. , Gashi, I., Obelheiro, R. R. & Sousa, P. (2009). Enhancing Fault / Intrusion Tolerance through Design and Configuration Diversity. In: Proc. of the 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2009). 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2009), Jun 2009, Estoril, Lisbon, Portugal.
Stankovic, V. ORCID: 0000-0002-8740-6526, Bloomfield, R. E., Bishop, P. G. & Gashi, I. (2011). Diversity for Security: a Study with Off-The-Shelf AntiVirus Engines. Paper presented at the 21st International Symposium on Software Reliability Engineering (ISSRE 2011), Hiroshima, Japan.
Stankovic, V. ORCID: 0000-0002-8740-6526, Lin, S., Pareaud, T. , Robert, T. & Zutautaite-Seputiene, I. (2008). Toward Adaptable Software Architecture for Dependability: ASAP. In: Proc. of the 7th European Dependable Computing Conference (EDCC 2008). 7th European Dependable Computing Conference (EDCC 2008), 7 - 9 May 2008, Kaunas, Lithuania.
Stankovic, V. ORCID: 0000-0002-8740-6526 & Popov, P. T. (2006). Improving DBMS performance through diverse redundancy. In: Kawada, S (Ed.), SRDS 2006: 25th IEEE Symposium on Reliable Distributed Systems, Proceedings. 25th IEEE Symposium on Reliable Distributed Systems, 2 - 4 Oct 2006, Leeds, UK.
Strigini, L. ORCID: 0000-0002-4246-2866 (2007). Achieving effective diversity between redundant software-based components. In: 6th International Conference on Control and Instrumentation in Nuclear Installations. 6th International Conference on Control and Instrumentation in Nuclear Installations, 11-13 Sep 2007, Manchester, UK.
Strigini, L., Bosio, D., Littlewood, B. & Newby, M. J. (2002). Advantages of open source processes for reliability: clarifying the issues. Paper presented at the Workshop on Open Source Software Development, Feb 2002, Newcastle upon Tyne, UK.
Strigini, L., Delic, K. A. & Mazzanti, F. (1998). Formalising Engineering Judgement on Software Dependability via Belief Networks. In: Dependable Computing for Critical Applications (DCCA-6). Sixth IFIP International Working Conference "Can We Rely on Computers?", Mar 1997, Garmisch-Partenkirchen, Germany.
Strigini, L. & Fenton, N. (1996). Rigorously assessing software reliability and safety. In: European Space Agency, (Special Publication) ESA SP. Product Assurance Symposium and Software Product Assurance Workshop, 19-21 Mar 1996, ESTEC, Noordwijk, the Netherlands.
Strigini, L. & Povyakalo, A. A. (2013). Software fault-freeness and reliability predictions. In: Bitsch, F., Guiochet, J. & Kaaniche, M. (Eds.), Computer Safety, Reliability, and Security. SAFECOMP 2013. SAFECOMP 2013, 32nd International Conference on Computer Safety, Reliability and Security, 24 - 27 September 2013, Toulouse, France.
Stroud, R. & Gashi, I. (2012). Methodology for a security audit of ERTMS. Paper presented at the 42nd IEEE International Conference on Dependable Systems and Networks (DSN) 2012, 25 - 28 June 2012, Boston, USA.
Tamburro, C., Neate, T. ORCID: 0000-0002-1387-8168, Roper, A. ORCID: 0000-0001-6950-6294 & Wilson, S. ORCID: 0000-0001-6445-654X (2020). Accessible Creativity with a Comic Spin. In: ASSETS '20: The 22nd International ACM SIGACCESS Conference on Computers and Accessibility. ASSETS 2020: The 22nd International ACM SIGACCESS Conference on Computers and Accessibility, 26 - 28 October 2020, Athens, Greece. doi: 10.1145/3373625.3417012
Ter-Sarkisov, A. & Marsland, S. (2011). Convergence of a Recombination-Based Elitist Evolutionary Algorithm on the Royal Roads Test Function. In: AI 2011: Advances in Artificial Intelligence.
Ter-Sarkisov, A., Schwenk, H., Barrault, L. & Bougares, F. (2015). Incremental Adaptation Strategies for Neural Network Language Models. In: Proceedings of the 3rd Workshop on Continuous Vector Space Models and their Compositionality. doi: 10.18653/v1/W15-4006
Tselikis, C., Douligeris, C., Mitropoulos, S. & Komninos, N. (2008). Consistent re-clustering in mobile ad hoc networks. In: IWCMC 2008 - International Wireless Communications and Mobile Computing Conference. IWCMC 2008 - International Wireless Communications and Mobile Computing Conference, 6 - 8 August 2008, Crete, Greece.
Tselikis, C., Mitropoulos, S., Douligeris, C. , Ladis, E., Georgouleas, K., Vangelatos, C. & Komninos, N. (2009). Empirical study of clustering algorithms for wireless ad hoc networks. In: 2009 16th International Conference on Systems, Signals and Image Processing, IWSSIP 2009. 16th International Conference on Systems, Signals and Image Processing (IWSSIP 2009), 18 - 20 June 2009, Chalkida, Greece.
Tsigkritis, T. & Spanoudakis, G. (2008). A Temporal Abductive Diagnostic Process for Runtime Properties Violations. In: Roth-Berghofer, T, Schulz, S, Leake, DB & Bahls, D (Eds.), ExaCt. Third International Workshop on Explanation-aware Computing (ExaCt 2008), July 21-22, 2008, University of Patras, Patras, Greece.
Ul Asad, H., Jones, K. & Surre, F. (2014). Verifying robust frequency domain properties of non linear oscillators using SMT. In: Pleskacz, W., Renovell, M. & Kasprowicz, D. (Eds.), 17th International Symposium on Design and Diagnostics of Electronic Circuits & Systems. 17th Symposium on Design & Diagnostics of Electronic Circuits & Systems, 23rd - 25th April 2014, Warsaw, Poland. doi: 10.1109/DDECS.2014.6868816
Wissmann, Jens, Weyde, T. & Conklin, D. (2010). Representing chord sequences in OWL. Paper presented at the Sound and Music Computing Conference 2010, 21 - 24 June 2010, Barcelona, Spain.
Zachos, K. ORCID: 0000-0003-1977-7090, Paraskevopoulos, F., Ientsek, S. , Maiden, N. ORCID: 0000-0001-6233-8320, Apostolou, D. & Mentzas, G. (2019). Creative Information Exploration in Journalism. In: 2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA). IISA2018, The 9th International Conference on Information, Intelligence, Systems and Applications, 23 - 25 July 2018, Zakynthos, Greece. doi: 10.1109/IISA.2018.8633593
Zhao, X., Robu, V., Flynn, D. , Salako, K. ORCID: 0000-0003-0394-7833 & Strigini, L. (2020). Assessing the Safety and Reliability of Autonomous Vehicles from Road Testing. In: 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE). ISSRE 2019 - the 20th International Symposium on Software Reliability Engineering, 28 - 31 October 2019, Berlin, Germany. doi: 10.1109/ISSRE.2019.00012
dos Santos, R. P., Werner, C. & Finkelstein, A. ORCID: 0000-0003-2167-9844 (2018). Ecosystems Effects on Software-Consuming Organizations: an experience report on two observational studies. In: ECSA 2018: PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE: COMPANION PROCEEDINGS. 12th European Conference on Software Architecture, 24-28 Sep 2018, Madrid, Spain. doi: 10.1145/3241403.3241428
Report
Bishop, P. G., Bloomfield, R. E., Gashi, I. & Stankovic, V. (2012). Diverse protection systems for improving security: a study with AntiVirus engines. London, UK: City University London.
Bloomfield, R. E., Chozos, N., Popov, P. T. , Stankovic, V. ORCID: 0000-0002-8740-6526, Wright, D. & Howell-Morris, R. (2010). Preliminary Interdependency Analysis (PIA): Method and tool support (D/501/12102/2 v2.0). London: Adelard LLP and City University London.
Gashi, I. & Bloomfield, R. E. (2008). Evaluating the resilience and security of boundaryless, evolving socio-technical Systems of Systems. Centre for Software Reliability, City University London.
Littlewood, B. & Povyakalo, A. A. (2012). Conservative bounds for the pfd of a 1-out-of-2 software-based system based on an assessor’s subjective probability of "not worse than independence" (CSR Technical Report, 20 May 2012). London: Centre for Software Reliability, City University London.
Littlewood, B. & Povyakalo, A. A. (2012). Conservative reasoning about epistemic uncertainty for the probability of failure on demand of a 1-out-of-2 software-based system in which one channel is "possibly perfect" (CSR Technical Report 20 March 2012). London: Centre for Software Reliability, City University London.
Littlewood, B. & Wright, D. (1996). Reliability prediction of a software product using testing data from other products or execution environment (10). Brussels: DeVa Project.
Littlewood, B. & Wright, D. (1996). Some conservative stopping rules for the operational testing of saftey-critical software (33). Brussels: DeVa ESPRIT Long Term Research Project.
Software
Armstrong, N. ORCID: 0000-0002-1927-7371 (2023). Fosc v0.9.0 GitHub.
Gandrud, C. DataCombine: Tools for Easily Combining and Cleaning Data Sets
Gandrud, C., Williams, L. & Whitten, G. (2015). dynsim: Dynamic Simulations of Autoregressive Relationships
Popov, P. T. A SAN Model of effect of cyber-attacks on reliability of a 2-channel software system
Stankovic, V. ORCID: 0000-0002-8740-6526 & Popov, P. T. (2016). TPC-C Client - Java-based implementation of the industry standard benchmark for database performance evaluation
Thesis
Abdel-Ghaly, A. A. (1986). Analysis of predictive quality of software reliability models. (Unpublished Doctoral thesis, The City University)
Abdulsalam, M. (2023). Artificial Intelligence based Robotic Platforms for Autonomous Precision Agriculture. (Unpublished Doctoral thesis, City, University of London)
Abro, F. I. (2018). Investigating Android permissions and intents for malware detection. (Unpublished Doctoral thesis, City, Universtiy of London)
Al-Malki, Dana Mohammed (2006). Development of virtual network computing (VNC) environment for networking and enhancing user experience. (Unpublished Doctoral thesis, City University London)
Alberts, H. C. (1995). Redesigning the United States defense acquisition system. (Unpublished Doctoral thesis, City, University of London)
Algaith, A. (2019). Assessing the security benefits of defence in depth. (Unpublished Doctoral thesis, City, University of London)
Alghamdi, S. (2022). Data-driven modelling of unhealthy snacking behaviour. (Unpublished Doctoral thesis, City, University of London)
Armitage, U. M. (2004). Navigation and learning in electronic text - Volume 1. (Unpublished Doctoral thesis, City, University of London)
Armitage, U. M. (2004). Navigation and learning in electronic texts - Volume 2. (Unpublished Doctoral thesis, City, University of London)
Booth, T. (2022). Tactical troubleshooting: investigating support for end-user developers in physical computing. (Unpublished Doctoral thesis, City, University of London)
Borges, Rafael (2012). A neural-symbolic system for temporal reasoning with application to model verification and learning. (Unpublished Doctoral thesis, City University London)
Brooke, C. (1991). Journeys through the quality gap: Information technology in two organisations (Volume 1). (Unpublished Doctoral thesis, City, University of London)
Brooke, C. (1991). Journeys through the quality gap: Information technology in two organisations (Volume 2). (Unpublished Doctoral thesis, City, University of London)
Cabrera Molina, J.J. (1985). English into Braille translation using augmented transition networks. (Unpublished Doctoral thesis, The City University)
Che, F. N. (1996). Object-oriented analysis and design of computational intelligence systems. (Unpublished Doctoral thesis, City, University of London)
Chueke, J. (2016). Perceptible affordances and feedforward for gestural interfaces: Assessing effectiveness of gesture acquisition with unfamiliar interactions. (Unpublished Doctoral thesis, City, University of London)
Collins, A. L. (1998). The Tomographic Reconstruction of Holographic Interferograms. (Unpublished Doctoral thesis, City, University of London)
Contreras, Ricardo (2013). Context Aware Web-Service Monitoring. (Unpublished Doctoral thesis, City University London)
El-Naggar, N. (2024). What Really Counts: Theoretical and Practical Aspects of Counting Behaviour in Simple RNNs. (Unpublished Doctoral thesis, City, University of London)
Elmsley (né Lambert), A. (2017). Modelling metrical flux: an adaptive frequency neural network for expressive rhythmic perception and prediction. (Unpublished Doctoral thesis, City, University of London)
Filho, Gilberto Amado de Azevedo Cysneiros (2011). Software Traceability for Multi-Agent Systems Implemented Using BDI Architecture. (Unpublished Doctoral thesis, City University London)
Finney, K. M. (1998). The application of Software Metrics to the area of Formal Specification. (Unpublished Doctoral thesis, City, University of London)
Gashi, I. (2007). Software dependability with off-the-shelf components. (Unpublished Doctoral thesis, City, University of London)
Ghosh, P. (2023). Artificial Intelligence (AI) Aided Decision-Making: Understanding Consumer Adoption of AI-Based Financial Products. (Unpublished Doctoral thesis, City, University of London)
Goddard, Kate (2012). Automation bias and prescribing decision support – rates, mediators and mitigators. (Unpublished Doctoral thesis, City University London)
Goker, A. S. (1994). An investigation into the application of machine learning in information retrieval. (Unpublished Doctoral thesis, City, University of London)
Hafiz bin Haji Khozali, Muhammed (1981). Computer aided mathematical modelling of turbulent flow for orifice metering. (Unpublished Doctoral thesis, The City University)
Hall, T. (1998). The Critical Success Factors of Quality Assurance and Measurement Practice in the Software Industry. (Unpublished Doctoral thesis, City University)
Heyes, E. (2024). Machine Learning Explorations in the String Landscape. (Unpublished Doctoral thesis, City, University of London)
Janes, F.R. (1992). Applications of interpretive structural modelling and related methods within the context of interactive management. (Unpublished Doctoral thesis, City, University of London)
Jirapanthong, W. (2006). A rule-based approach to software traceability to product family systems. (Unpublished Doctoral thesis, City, University of London)
Jones, Richard (2016). Measuring the business success of enterprise systems projects. (Unpublished Doctoral thesis, City, University of London)
Kaparias, I. (2008). Reliable dynamic in-vehicle navigation. (Unpublished Doctoral thesis, Imperial College)
Ketikidis, P.H. (1990). ARRES: Computer-assisted decision support system for the post-anaesthesia care unit. (Unpublished Doctoral thesis, City, University of London)
Khani, S. (2018). Self-reconfigurable, intrusion-tolerant, web-service composition framework. (Unpublished Doctoral thesis, City, Universtiy of London)
Kloos, Reinhold (2013). ACTAS: Adaptive Composition and Trading with Agents for Services. (Unpublished Doctoral thesis, City University London)
Magalhaes Marques, P. D. (2022). Using design diversity and optimal adjudication for detecting malicious web scraping and malware samples. (Unpublished Doctoral thesis, City, University of London)
McCormack, M. (1996). The Design and Evaluation of Computer Music Interfaces. (Unpublished Doctoral thesis, City, University of London)
Meng, X. (2018). An integrated networkbased mobile botnet detection system. (Unpublished Doctoral thesis, City, Universtiy of London)
Moura Junior, V. (2023). Leveraging Clinical Big Data and Analytics to Support Healthcare Delivery and Research. (Unpublished Doctoral thesis, City, University of London)
Osudin, D. (2022). Real-Time Physics and Graphics Engine for non-Euclidean Geometry using Spherical and Hyperbolic Trigonometry. (Unpublished Doctoral thesis, City, University of London)
Papakonstantinou, Stylianos (2012). Technological framework for ubiquitous interactions using context–aware mobile devices. (Unpublished Doctoral thesis, City University London)
Rangiha, M. E. (2016). A framework for social BPM based on social tagging. (Unpublished Doctoral thesis, City University London)
Richardson, S. A. (2006). Is the game worth the candle?: Knowledge access requirements in environments dominated by lead users. (Unpublished Doctoral thesis, City, University of London)
Salako, K. ORCID: 0000-0003-0394-7833 (2012). Extension to models of coincident failure in multiversion software. (Unpublished Doctoral thesis, City University London)
Sleat, Philip M. (1991). A static, transaction based design methodology for hard real-time systems. (Unpublished Doctoral thesis, City University)
Smyrlis, M. (2023). A hybrid approach to cyber risk evaluation. (Unpublished Doctoral thesis, City, University of London)
Stankovic, V. ORCID: 0000-0002-8740-6526 (2008). Performance Implications of Using Diverse Redundancy for Database Replication. (Unpublished Doctoral thesis, City, University of London)
Toor, A. (2020). Enabling Young Individuals to make an Informed Decision about Higher Education: Using Persuasive Technology. (Unpublished Doctoral thesis, City, University of London)
Tsigkritis, Theocharis (2010). Diagnosing runtime violations of security and dependability properties. (Unpublished Doctoral thesis, City University London)
Working Paper
Bishop, P. G. ORCID: 0000-0003-3307-5159 & Povyakalo, A. A. (2022). Optimising the reliability that can be claimed for a software-based system based on failure-free tests of its components. .