• Postal address

    United Kingdom

Filter
Conference contribution

Search results

  • 2012

    The geometry of synthesis how to make hardware out of software

    Ghica, D. R., 1 Jan 2012, Mathematics of Program Construction - 11th International Conference, MPC 2012, Proceedings. Gibbons, J. & Nogueira, P. (eds.). Springer Verlag, p. 23-24 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7342 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • The PRISM benchmark suite

    Kwiatkowsa, M., Norman, G. & Parker, D., 2012, Proc. 9th International Conference on Quantitative Evaluation of SysTems (QEST'12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The role of artefacts in Police emergency response sensemaking

    McMaster, R., Baber, C. & Duffy, T., 1 Jan 2012, ISCRAM 2012 Conference Proceedings - 9th International Conference on Information Systems for Crisis Response and Management. Simon Fraser University, (ISCRAM 2012 Conference Proceedings - 9th International Conference on Information Systems for Crisis Response and Management).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • The Unbearable Lightness of Monitoring: Indirect and Direct Peer Monitoring in BitTorrent

    Chothia, T., Cova, M., Novakovic, C. & Toro, C., 2012, Security and Privacy in Communication Networks: 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Keromytis, AD. & Di Pietro, R. (eds.). Springer, p. 185-202 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 106).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    File
    2 Citations (Scopus)
    346 Downloads (Pure)
  • Time-bin optimization in time-resolved near infrared fluorescence tomography

    Dehghani, H., Zhu, Q., Leblond, F., Tichauer, K., Holt, R. & Pogue, B. W., 2012, Biomedical Optics, BIOMED 2012. Optical Society of America (OSA), p. BSu3A.59 (Biomedical Optics, BIOMED 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Time domain diffuse fluorescence tomography can increase small-animal imaging throughput

    Holt, R. W., Tichauer, K. M., Zhu, Q., Dehghani, H., Leblond, F. & Pogue, B. W., 2012, Biomedical Optics, BIOMED 2012. Optical Society of America (OSA), p. BTu4A.7 (Biomedical Optics, BIOMED 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards an ontology broker to improve cross-agency sharing in emergency response

    Duffy, T., McMaster, R., Baber, C. & Houghton, R., 1 Jan 2012, ISCRAM 2012 Conference Proceedings - 9th International Conference on Information Systems for Crisis Response and Management. Simon Fraser University, (ISCRAM 2012 Conference Proceedings - 9th International Conference on Information Systems for Crisis Response and Management).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Two-level RRT planning for robotic push manipulation

    Zito, C., Kopicki, M. & Wyatt, J. L., 2012, IEEE International Conference on Intelligent Robots and Systems. p. 678-685 8 p. 6385828

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Using Enriched Semantic Representations in Predictions of Human Brain Activity

    Levy, JP. & Bullinaria, J., 2012, Connectionist Models of Neurocognition and Emergent Behavior: From Theory to Applications. Davelaar, E. J. (ed.). World Scientific, p. 292-308 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Where do i look now? Gaze allocation during visually guided manipulation

    Nunez-Varela, J., Ravindran, B. & Wyatt, J. L., 2012, Proceedings - IEEE International Conference on Robotics and Automation. p. 4444-4449 6 p. 6225226

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2011

    2D Mass-spring-like model for prediction of a Sponge's behaviour upon robotic interaction

    Arriola-Rios, V. E. & Wyatt, J., 17 Nov 2011, Research and Development in Intelligent Systems XXVIII: Incorporating Applications and Innovations in Intelligent Systems XIX Proceedings of AI-2011, the Thirty-first SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Bramer, M., Petridis, M. & Nolle, L. (eds.). 1 ed. Springer, p. 195-208 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 3D fusion echocardiography improves transoeosphageal LV assessment

    Rajpoot, K., Augustine, D., Basagiannis, C., Noble, J. A., Becher, H. & Leeson, P., 2011, Functional Imaging and Modeling of the Heart - 6th International Conference, FIMH 2011, Proceedings. p. 161-162 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6666 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Achieving reproducibility by combining provenance with service and workflow versioning

    Woodman, S., Hiden, H., Watson, P. & Missier, P., 2011, WORKS'11 - Proceedings of the 6th Workshop on Workflows in Support of Large-Scale Science, Co-located with SC'11. p. 127-136 10 p. (WORKS'11 - Proceedings of the 6th Workshop on Workflows in Support of Large-Scale Science, Co-located with SC'11).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A distributed and privacy preserving algorithm for identifying information hubs in social networks

    Ilyas, M. U., Shafiq, M. Z., Liu, A. X. & Radha, H., 15 Apr 2011, 2011 Proceedings IEEE INFOCOM. IEEE, p. 561-565 5 p. 5935226

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An adaptive coupled-layer visual model for robust visual tracking

    Čehovin, L., Kristan, M. & Leonardis, A., Nov 2011, Computer Vision (ICCV), 2011 IEEE International Conference. IEEE Computer Society Press, p. 1363-1370 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    82 Citations (Scopus)
  • An Energy Efficient Link Layer Protocol for Power-Constrained Wireless Networks

    Soltani, S., Ilyas, M. U. & Radha, H., 4 Aug 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN). IEEE, p. 1-6 6 p. 6006034

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An experimental workflow development platform for historical document digitisation and analysis

    Neudecker, C., Schlarb, S., Dogan, Z. M., Missier, P., Sufi, S., Williams, A. & Wolstencroft, K., 2011, HIP'11 - Proceedings of the 2011 Workshop on Historical Document Imaging and Processing. p. 161-168 8 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A Switching Planner for Combined Task and Observation Planning

    Göbelbecker, M., Gretton, C. & Dearden, R., 4 Aug 2011, Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence. Association for the Advancement of Artificial Intelligence, p. 964-970 7 p. (Proceedings of the AAAI Conference on Artificial Intelligence; vol. 25, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • Automatic task resolution and adaptation in pervasive environments

    Ben Lahmar, I., Belaïd, D., Mukhtar, H. & Chaudhary, S., 2011, Adaptive and Intelligent Systems - Second International Conference, ICAIS 2011, Proceedings. p. 131-144 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6943 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Bi-clustering gene expression data using co-similarity

    Hussain, S. F., 2011, Advanced Data Mining and Applications - 7th International Conference, ADMA 2011, Proceedings. PART 1 ed. p. 190-200 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7120 LNAI, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Breaking DVB-CSA

    Tews, E., Wälde, J. & Weiner, M., 2011, Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers. Armknecht, F. & Lucks, S. (eds.). Springer, Vol. 7242. p. 45-61 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • End-User perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust

    Dhukaram, A. V., Baber, C., Elloumi, L., Van Beijnum, B. J. & De Stefanis, P., 31 Oct 2011, 2011 5th International Conference on Pervasive Computing Technologies for Healthcare and Workshops, PervasiveHealth 2011. p. 478-484 7 p. 6038852. (2011 5th International Conference on Pervasive Computing Technologies for Healthcare and Workshops, PervasiveHealth 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    20 Citations (Scopus)
  • Enumeration of AG-Groupoids

    Distler, A., Shah, M. & Sorge, V., 1 Jul 2011, Intelligent Computer Mathematics: 18th Symposium, Calculemus 2011, and 10th International Conference, MKM 2011, Bertinoro, Italy, July 18-23, 2011. Proceedings. Davenport, J., Farmer, WM., Urban, J. & Rabe, F. (eds.). Springer, p. 1-14 14 p. (Lecture Notes in Computer Science; vol. 6824).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Evolution of Neural Symmetry and Its Coupled Alignment to Body Plan Morphology

    Jones, BHD., Soltoggio, A., Sendhoff, B., Yao, X. & Krasnogor, N., 16 Jul 2011, GECCO '11 Proceedings of the 13th annual conference on Genetic and evolutionary computation. Association for Computing Machinery , p. 235-242 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Exploiting probabilistic knowledge under uncertain sensing for efficient robot behaviour

    Hanheide, M., Gretton, C., Dearden, R., Hawes, N., Wyatt, J., Pronobis, A., Aydemir, A., Göbelbecker, M. & Zender, H., 2011, Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence. p. 2442-2449 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    38 Citations (Scopus)
  • Faster black-box algorithms through higher arity operators

    Doerr, B., Johannsen, D., Kötzing, T., Lehre, P. K., Wagner, M. & Winzen, C., 2011, FOGA'11 - Proceedings of the 2011 ACM/SIGEVO Foundations of Genetic Algorithms XI. p. 163-171 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    48 Citations (Scopus)
  • Fitness-levels for non-elitist populations

    Lehre, P. K., 2011, Genetic and Evolutionary Computation Conference, GECCO'11. p. 2075-2082 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    50 Citations (Scopus)
  • Fresh re-keying II: Securing multiple parties against side-channel and fault attacks

    Medwed, M., Petit, C., Regazzoni, F., Renauld, M. & Standaert, F. X., 2011, Smart Card Research and Advanced Applications - 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Revised Selected Papers. p. 115-132 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7079 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Geometric Nelder-Mead Algorithm on the Space of Genetic Programs

    Moraglio, A., Silva, S., Krasnogor, N. & Lanzi, PL., 16 Jul 2011, GECCO '11 Proceedings of the 13th annual conference on Genetic and evolutionary computation. Association for Computing Machinery , p. 1307-1314 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Geometric Surrogate-Based Optimisation for Permutation-Based Problems

    Moraglio, A., Kim, YH. & Yoon, Y., 16 Jul 2011, GECCO '11 Proceedings of the 13th annual conference companion on Genetic and evolutionary computation. Association for Computing Machinery , p. 133-134 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Home alone: Autonomous extension and correction of spatial representations

    Hawes, N., Hanheide, M., Hargreaves, J., Page, B., Zender, H. & Jensfelt, P., 13 May 2011, 2011 IEEE International Conference on Robotics and Automation (ICRA). p. 3907-3914 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • How Crossover Helps in Pseudo-Boolean Optimization

    Kötzing, T., Sudholt, D. & Theile, M., 16 Jul 2011, GECCO '11 Proceedings of the 13th annual conference on Genetic and evolutionary computation. Association for Computing Machinery , p. 989-996 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    57 Citations (Scopus)
  • Identifying Influential Nodes in Online Social Networks Using Principal Component Centrality

    Ilyas, M. U. & Radha, H., 9 Jun 2011, 2011 IEEE International Conference on Communications (ICC). IEEE, p. 1-5 5 p. 5963147

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Interactive decryption of DECT phone calls

    McHardy, P., Schuler, A. & Tews, E., 2011, Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. Gollmann, D., Westhoff, D., Tsudik, G. & Asokan, N. (eds.). Association for Computing Machinery , p. 71-78 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Learning to predict how rigid objects behave under simple manipulation

    Kopicki, M., Zurek, S., Stolkin, R., Morwald, T. & Wyatt, J., 13 May 2011, 2011 IEEE International Conference on Robotics and Automation (ICRA). Institute of Electrical and Electronics Engineers (IEEE), p. 5722-5729 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Citations (Scopus)
  • Mapping the Underworld: A Step-Change in the Approach to Utility Location and Designation

    Royal, A., Rogers, C., Atkins, P., Chapman, D., Chen, H., Cohn, AG., Foo, K., Goddard, K., Hayes, R., Hao, T., Lewin, PL., Metje, N., Muggleton, JM., Naji, A., Orlando, G., Pennock, SR., Redfern, MA., Saul, AJ., Swingler, SG. & Wang, P., 1 Jan 2011, ICPTT 2011: Sustainable Solutions For Water, Sewer, Gas, And Oil Pipelines. American Society of Civil Engineers (ASCE), p. 1589-1597 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • One-time trapdoor one-way functions

    Cathalo, J. & Petit, C., 2011, Information Security - 13th International Conference, ISC 2010, Revised Selected Papers. Springer Verlag, p. 283-298 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6531 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On the Effectiveness of Crossover for Migration in Parallel Evolutionary Algorithms

    Neumann, F., Oliveto, P., Rudolph, GT. & Sudholt, D., 16 Jul 2011, GECCO '11 Proceedings of the 13th annual conference on Genetic and evolutionary computation. Association for Computing Machinery , p. 1587-1594 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • On the impossibility of instantiating PSS in the standard model

    Bhattacharyya, R. & Mandal, A., 2011, Public Key Cryptography, PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. p. 351-368 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6571 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • On the indifferentiability of Fugue and Luffa

    Bhattacharyya, R. & Mandal, A., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Proceedings. p. 479-497 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6715 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • On the proof complexity of cut-free bounded deep inference

    Das, A., 2011, Automated Reasoning with Analytic Tableaux and Related Methods - 20th International Conference, TABLEAUX 2011, Proceedings. p. 134-148 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6793 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Operational Space Control of Constrained and Underactuated Systems

    Mistry, M. & Righetti, L., 2011, Proceedings of Robotics: Science and Systems, 2011 . Durrant-Whyte, H., Roy, N. & Abbeel, P. (eds.). MIT Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    File
    817 Downloads (Pure)
  • P3CA: Private Anomaly Detection Across ISP Networks

    Nagaraja, S., 2011, Privacy Enhancing Technologies : 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings. Fischer-Hubner, S. & Hopper, N. (eds.). Springer, p. 38-56 (Lecture Notes in Computer Science; vol. 6794).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Physical simulation for monocular 3D model based tracking

    Duff, DJ., Morwald, T., Stolkin, R. & Wyatt, J., 13 May 2011, 2011 IEEE International Conference on Robotics and Automation (ICRA). Institute of Electrical and Electronics Engineers (IEEE), p. 5218-5225 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    File
    19 Citations (Scopus)
    182 Downloads (Pure)
  • Predicting the unobservable Visual 3D tracking with a probabilistic motion model

    Morwald, T., Kopicki, M., Stolkin, R., Wyatt, J., Zurek, S., Zillich, M. & Vincze, M., 13 May 2011, 2011 IEEE International Conference on Robotics and Automation (ICRA). Institute of Electrical and Electronics Engineers (IEEE), p. 1849-1855 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Preimages for the tillich-zémor hash function

    Petit, C. & Quisquater, J. J., 2011, Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Revised Selected Papers. p. 282-301 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6544 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Prophiler: a Fast Filter for the Large-Scale Detection of Malicious Web Pages

    Canali, D., Cova, M., Vigna, G. & Kruegel, C., 28 Mar 2011, Proceedings of the 20th international conference on World wide web. Association for Computing Machinery , p. 197-206 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    227 Citations (Scopus)
  • QoS-aware device selection using user preferences for tasks in ubiquitous environments

    Ahmed, M. E., Mukhtar, H., Belaïd, D. & Song, J. B., 2011, 2011 7th International Conference on Emerging Technologies, ICET 2011. 6048484. (2011 7th International Conference on Emerging Technologies, ICET 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Real-Time Detection of Process Change using Process Mining

    Weber, P., Bordbar, B. & Tino, P., 29 Sept 2011, 2011 Imperial College Computing Student Workshop, ICCSW 2011, London, United Kingdom, September 29-30, 2011. Proceedings. Jones, A. V. (ed.). Department of Computing, Imperial College London, Vol. DTR11-9. p. 108-114

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Self-Organized flocking with a heterogeneous mobile robot swarm

    Stranieri, A., Ferrante, E., Turgut, A. E., Trianni, V., Pinciroli, C., Birattari, M. & Dorigo, M., 2011, ECAL 2011.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution