• Postal address

    United Kingdom

Filter
Conference contribution

Search results

  • 2008

    Benchmarking the influence of information-processing architectures on intelligent systems

    Hawes, N. & Wyatt, J., 2008, Proceedings of the Robotics: Science & Systems 2008 Workshop: Experimental Methodology and Benchmarking in Robotics Research.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bifurcations of Renormalization Dynamics in Self-organizing Neural Networks

    Tino, P., Ishikawa, M., Doya, K., Miyamoto, H. & Yamakawa, T., 1 Jan 2008, Neural Information Processing: Lecture Notes in Computer Science. Springer, Vol. 4984. p. 405-414 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Crossmodal content binding in information-processing architectures

    Jacobsson, H., Hawes, N., Kruijff, G-J. & Wyatt, J., 15 Mar 2008, Proceedings of the 3rd ACM/IEEE international conference on Human robot interaction. Association for Computing Machinery , p. 81-88 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
    4 Downloads (Pure)
  • Crossover Can Be Constructive When Computing Unique Input Output Sequences

    Lehre, P. & Yao, X., 19 Nov 2008, Simulated Evolution and Learning: 7th International Conference, SEAL 2008, Melbourne, Australia, December 7-10, 2008, Proceedings. Li, X., Kirley, M., Zhang, M., Green, D., Ciesielski, V., Abbass, H., Michalewicz, Z., Hendtlass, T., Deb, K., Tan, K. C., Branke, J. & Shi, Y. (eds.). 1 ed. Springer, p. 595-604 10 p. (Lecture Notes in Computer Science; vol. 5361).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Data lineage model for taverna workflows with lightweight annotation requirements

    Missier, P., Belhajjame, K., Zhao, J., Roos, M. & Goble, C., 2008, Provenance and Annotation of Data and Processes - 2nd International Provenance and Annotation Workshop, IPAW 2008, Revised Selected Papers. Freire, J., Koop, D., Freire, J., Freire, J. & Moreau, L. (eds.). Springer Verlag, p. 17-30 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Describing Data Format Exploits Using Bitstream Segment Graphs

    Hartle, M., Schumann, D., Botchak, A., Tews, E. & Mühlhäuser, M., 2008, The Third International Multi-Conference on Computing in the Global Information Technology, 2008. ICCGI '08.. p. 119-124 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Efficiency and pseudo-randomness of a variant of Zémor-Tillich hash function

    Petit, C., Veyrat-Charvillon, N. & Quisquater, J. J., 2008, Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008. p. 906-909 4 p. 4675001. (Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Evaluating large scale distributed simulation of P2P networks

    Dinh, T., Theodoropoulos, G. & Minson, R., 1 Oct 2008, 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008. DS-RT 2008. . Institute of Electrical and Electronics Engineers (IEEE), p. 51-58 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Evolutionary advantages of neuromodulated plasticity in dynamic, reward-based scenarios

    Soltoggio, A., Bullinaria, J., Mattiussi, C., Durr, P. & Floreano, D., 1 Jan 2008, Artificial Life XI: Proceedings of the Eleventh International Conference on the Simulation and Synthesis of Living Systems. Bullock, S., Noble, J., Richard, W. & Bedau, M. A. (eds.). MIT Press, p. 569-576 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    82 Citations (Scopus)
  • Exploiting provenance to make sense of automated decisions in scientific workflows

    Missier, P., Embury, S. & Stapenhurst, R., 2008, Provenance and Annotation of Data and Processes - 2nd International Provenance and Annotation Workshop, IPAW 2008, Revised Selected Papers. Freire, J., Koop, D., Freire, J., Freire, J. & Moreau, L. (eds.). Springer Verlag, p. 174-185 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Fault attacks on public key elements: Application to DLP-based schemes

    Kim, C. H., Bulens, P., Petit, C. & Quisquater, J. J., 2008, Public Key Infrastructure - 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Proceedings. p. 182-195 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5057 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Full cryptanalysis of LPS and Morgenstern hash functions

    Petit, C., Lauter, K. & Quisquater, J. J., 2008, Security and Cryptography for Networks - 6th International Conference, SCN 2008, Proceedings. p. 263-277 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5229 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Functional Object Class Detection Based on Learned Affordance Cues

    Stark, M., Lies, P., Zillich, M., Wyatt, J. & Schiele, B., 1 May 2008, Computer Vision Systems: 6th International Conference, ICVS 2008 Santorini, Greece, May 12-15, 2008 Proceedings. Gasteratos, A., Vincze, M. & Tsotos, JK. (eds.). Springer, p. 435-444 10 p. (Lecture Notes in Computer Science; vol. 5008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    63 Citations (Scopus)
  • Improving NSGA-II algorithm based on minimum spanning tree

    Li, M., Zheng, J. & Wu, J., 2008, Simulated Evolution and Learning - 7th International Conference, SEAL 2008, Proceedings. p. 170-179 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5361 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Improving the Accuracy and Reliability of Wireless Location Systems: A Case Study

    Beale, R., 31 Oct 2008, Seventh Mexican International Conference on Artificial Intelligence, 2008. Institute of Electrical and Electronics Engineers (IEEE), p. 383-387 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Improving Word-Based Predictive Text Entry with Transformation-Based Learning

    Brooks, D. & Lee, M., 1 Feb 2008, Proceedings of CICLing 2008, Advances in Natural Language Processing and Applications: Research and Computing Science, Special Issue. Gelbukh, A. (ed.). Vol. 33. p. 237-248

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Intelligent mobile computing to assist in the treatment of depression

    Wan, J., 2008, 2008 3rd International Conference on Pervasive Computing and Applications, ICPCA08.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Large Scale Distributed Simulation of p2p Networks

    Dinh, T., Lees, M., Theodoropoulos, G. & Minson, R., 1 Jan 2008, 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing, 2008. PDP 2008. . Institute of Electrical and Electronics Engineers (IEEE), p. 499-507 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Load Skew in Cell-Based Interest Management Systems

    Minson, R., Theodoropoulos, G., Roberts, D., El Saddik, A. & Ferscha, A., 1 Oct 2008, 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008. DS-RT 2008. . Institute of Electrical and Electronics Engineers (IEEE), p. 43-50 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Long range dependence of IEEE 802.15.4 wireless channels

    Ilyas, M. U. & Radha, H., 2008, IEEE International Conference on Communications.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Measurement based analysis and modeling of the error process in IEEE 802.15.4 LR-WPANs

    Ilyas, M. U. & Radha, H., 2008, Proceedings - IEEE INFOCOM.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Measuring packet-level memory length of 802.15.4 wireless channels with relative mutual information

    Ilyas, M. U. & Radha, H., 2008, IEEE International Conference on Communications.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modelling Dynamic Fronto-Parietal Behaviour During Minimally Invasive Surgery - A Markovian Trip Distribution Approach

    Leff, D. R., Orihuela-Espina, F., Leong, J., Darzi, A. & Yang, G-Z., 2008, Lecture Notes in Computer Science. Springer, Vol. 5242. p. 595 602 p. (Medical Image Computing and Computer-Assisted Intervention - Miccai 2008, Pt Ii, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Neural Models of Head-Direction Cells

    Zeidman, P. & Bullinaria, J. A., 1 Jan 2008, Proceedings of the tenth neural computation and psychology workshop: From associations ro rules: connectionist models of behaviour and cognition. French, R. M. & Thomas, E. (eds.). Singapore, p. 165-177 13 p. (Progress in Neural Processing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On measuring memory length of the error rate process in wireless channels

    Ilyas, M. U. & Radha, H., 21 Mar 2008, 2008 42nd Annual Conference on Information Sciences and Systems. IEEE, p. 1262-1267 6 p. 4558712

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Presenting Dcpos and Dcpo Algebras

    Jung, A., Moshier, M. & Vickers, S., 22 Oct 2008, Proceedings of the 24th Conference on the Mathematical Foundations of Programming Semantics (MFPS XXIV). Bauer, A. & Mislove, M. (eds.). Elsevier, Vol. 218. p. 209-229 21 p. (Electronic Notes in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    14 Citations (Scopus)
    125 Downloads (Pure)
  • Push-Pull Interest Management for Virtual Worlds

    Minson, R. & Theodoropoulos, G., 7 May 2008, Proceedings of the 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), 2008. Institute of Electrical and Electronics Engineers (IEEE), p. 189-194 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Semantic Categorization Using Simple Word Co-occurrence Statistics

    Bullinaria, J., 9 Aug 2008, Proceedings of the ESSLLI Workshop on Distributional Lexical Semantics: Bridging the gap between semantic theory and computational simulations. Baroni, M., Evert, S. & Lenci, A. (eds.). University of Hamburg, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Side Channels in the McEliece PKC

    Strenzke, F., Tews, E., Molter, H. G., Overbeck, R. & Shoufan, A., 2008, Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings. Buchmann, J. A. & Ding, J. (eds.). Springer, Vol. 5299. p. 216-229 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    49 Citations (Scopus)
  • Similarity-based cross-layered hierarchical representation for object categorization

    Fidler, S., Boben, M. & Leonardis, A., Jun 2008, Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference. IEEE Computer Society Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    45 Citations (Scopus)
  • Tutorial on diffuse optical tomography

    Dehghani, H. & Pogue, B. W., 2008, Frontiers in Optics, FiO 2008. Optical Society of America (OSA), (Optics InfoBase Conference Papers).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Uniformity assessment for evolutionary multi-objective optimization

    Li, M., Zheng, J. & Xiao, G., 2008, 2008 IEEE Congress on Evolutionary Computation, CEC 2008. p. 625-632 8 p. 4630861. (2008 IEEE Congress on Evolutionary Computation, CEC 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • χ-Sim: A new similarity measure for the co-clustering task

    Bisson, G. & Hussain, F., 2008, Proceedings - 7th International Conference on Machine Learning and Applications, ICMLA 2008. IEEE Computer Society Press, p. 211-217 7 p. 4724977. (Proceedings - 7th International Conference on Machine Learning and Applications, ICMLA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    48 Citations (Scopus)
  • 2009

    A CCG-based System for Valence Shifting for Sentiment Analysis

    Simančík, F. & Lee, M., 2009, Advances in Computational Linguistics, Proceedings of CICLing 2009, Research in Computing Science. Vol. 41.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Activity time collection and analysis through temporal reasoning

    Ibrahim, A. & Choi, H-J., 2009, 2009 11th International Conference on Advanced Communication Technology. IEEE Xplore, Vol. 1. p. 579-584 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A Linear Grammar Approach to Mathematical Formula Recognition from PDF

    Baker, J., Sexton, A. & Sorge, V., 6 Jul 2009, Intelligent Computer Mathematics: 16th Symposium, Calculemus 2009, 8th International Conference, MKM 2009, Held as Part of CICM 2009, Grand Bend, Canada, July 6-12, 2009. Proceedings. Carette, J., Dixon, L., Sacerdoti Coen, C. & Watt, SM. (eds.). Springer, p. 201-216 16 p. (Lecture Notes in Computer Science; vol. 5625).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)
  • Analyzing and Detecting Malicious Flash Advertisements

    Ford, S., Cova, M., Kruegel, C. & Vigna, G., 2009, Proceeding ACSAC '09: Proceedings of the 2009 Annual Computer Security Applications Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    51 Citations (Scopus)
  • An Analysis Framework for Near Infrared Spectroscopy Based Brain-Computer Interface and Prospective Application to Robotic Surgery

    Caproni, M., Orihuela-Espina, F., James, D. R. C., Menciassi, A., Dario, P., Darzi, A. W. & Yang, G-Z., Oct 2009, IEEE/RSJ International Conference on Intelligent RObots and Systems (IROS). IEEE, p. 2143 2148 p. (2009 Ieee-Rsj International Conference on Intelligent Robots and Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A novel algorithm for non-dominated hypervolume-based multiobjective optimization

    Li, K., Zheng, J., Li, M., Zhou, C. & Lv, H., 2009, Proceedings 2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009. p. 5220-5226 7 p. 5345983. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • An spanning tree based method for pruning non-dominated solutions in multi-objective optimization problems

    Li, M., Zheng, J., Li, K., Wu, J. & Xiao, G., 2009, Proceedings 2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009. p. 4882-4887 6 p. 5346322. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A quantitative model for user preferences based on qualitative specifications

    Mukhtar, H., Belaïd, D. & Bernard, G., 2009, ICPS'09 - Proceedings of the 2009 International Conference on Pervasive Services and Co-located Workshops. p. 179-188 10 p. (ICPS'09 - Proceedings of the 2009 International Conference on Pervasive Services and Co-located Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Attacks on the DECT Authentication Mechanisms

    Lucks, S., Schuler, A., Tews, E., Weinmann, R-P. & Wenzel, M., 2009, Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings. Fischlin, M. (ed.). Springer, Vol. 5473. p. 48-65 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Bi-objective Optimization for the Vehicle Routing Problem with Time Windows: Using Route Similarity to Enhance Performance

    Garcia-Najera, A. & Bullinaria, J., 1 Jan 2009, Evolutionary Multi-Criterion Optimization: 5th International Conference, EMO 2009, Nantes, France, April 7-10, 2009. Proceedings. Springer, Vol. 5467. p. 275-289 15 p. (Lecture Notes in Computer Science; vol. 5467).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Building scientific workflow with taverna and BPEL: A comparative study in cagrid

    Tan, W., Missier, P., Madduri, R. & Foster, I., 2009, Service-Oriented Computing - ICSOC 2008 Workshops - ICSOC 2008 International Workshops, Revised Selected Papers. p. 118-129 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5472 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Combining DHTs and SONs for semantic-based service discovery

    Pirró, G., Missier, P., Trunfio, P., Talia, D., Falace, G. & Goble, C., 2009, ISDA 2009 - 9th International Conference on Intelligent Systems Design and Applications. p. 902-907 6 p. 5364095. (ISDA 2009 - 9th International Conference on Intelligent Systems Design and Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Dynamic Component Selection for SCA Applications

    Belaïd, D., Mukhtar, H., Ozanne, A. & Tata, S., 2009, Software Services for e-Business and e-Society - 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Proceedings. p. 272-286 15 p. (IFIP Advances in Information and Communication Technology; vol. 305).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • Dynamic evolutionary optimisation: an analysis of frequency and magnitude of change

    Rohlfshagen, P., Lehre, P. & Yao, X., 12 Jul 2009, Proceedings of the 11th Annual conference on Genetic and evolutionary computation. p. 1713-1720 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    50 Citations (Scopus)
  • Hard and easy components of collision search in the Źemor-tillich hash function: New attacks and reduced variants with equivalent security

    Petit, C., Quisquater, J. J., Tillich, J. P. & Źemor, G., 2009, Topics in Cryptology - CT-RSA 2009 - The Cryptographers' Track at the RSA Conference 2009, Proceedings. Springer Verlag, p. 182-194 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5473).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Human factors models of mini Unmanned Aerial Systems in Network-Enabled capability

    Baber, C., Grandt, M. & Houghton, R. J., 1 Dec 2009, Contemporary Ergonomics 2009. p. 282-290 9 p. (Contemporary Ergonomics 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Image-driven cardiac left ventricle segmentation for the evaluation of multiview fused real-time 3-dimensional echocardiography images

    Rajpoot, K., Noble, J. A., Grau, V., Szmigielski, C. & Becher, H., 2009, Medical Image Computing and Computer-Assisted Intervention - MICCAI2009 - 12th International Conference, Proceedings. PART 2 ed. p. 893-900 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5762 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access