• Postal address

    United Kingdom

Filter
Conference contribution

Search results

  • 2011

    Real-Time Detection of Process Change using Process Mining

    Weber, P., Bordbar, B. & Tino, P., 29 Sept 2011, 2011 Imperial College Computing Student Workshop, ICCSW 2011, London, United Kingdom, September 29-30, 2011. Proceedings. Jones, A. V. (ed.). Department of Computing, Imperial College London, Vol. DTR11-9. p. 108-114

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Self-Organized flocking with a heterogeneous mobile robot swarm

    Stranieri, A., Ferrante, E., Turgut, A. E., Trianni, V., Pinciroli, C., Birattari, M. & Dorigo, M., 2011, ECAL 2011.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Shadow detection based on colour segmentation and estimated illumination

    Jiang, X., Schofield, A. J. & Wyatt, J. L., 2011, BMVC 2011 - Proceedings of the British Machine Vision Conference 2011. British Machine Vision Association, BMVA, p. 87.1-87.11

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Similarity Quotients as Final Coalgebras

    Levy, P. & Hoffman, M., 1 Jan 2011, Foundations of Software Science and Computational Structures: 14th International Conference, FOSSACS 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany. Proceedings. Hofmann, M. (ed.). Springer, p. 27-41 15 p. (Lecture Notes in Computer Science; vol. 6604).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • Smart Use of Computational Resources Based on Contribution for Cooperative Co-Evolutionary Algorithms

    Omidvar, MN., Li, X., Yao, X. & Krasnogor, N., 16 Jul 2011, GECCO '11 Proceedings of the 13th annual conference on Genetic and evolutionary computation. Association for Computing Machinery , p. 1115-1122 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    71 Citations (Scopus)
  • StatVerif: Verification of Stateful Processes

    Arapinis, M., Ritter, E. & Ryan, M., 29 Jun 2011, Proceedings 2011 IEEE 24th Computer Security Foundations Symposium (CSF). Institute of Electrical and Electronics Engineers (IEEE), p. 33-47 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    37 Citations (Scopus)
  • Text to Phoneme Alignment and Mapping for Speech Technology: a Neural Networks Approach

    Bullinaria, J., 5 Jul 2011, Neural Networks (IJCNN), The 2011 International Joint Conference on. Institute of Electrical and Electronics Engineers (IEEE), p. 625-632 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • The panel of experts cloud pattern

    Watson, P., Hiden, H. G., Woodman, S. J., Leahy, D. E., Cała, J. & Missier, P., 2011, CIKM 2011 Glasgow: CloudDB'11 - Proceedings of the 3rd International Workshop on Cloud Data Management. p. 23 1 p. (International Conference on Information and Knowledge Management, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Track Globally, Deliver Locally: Improving Content Delivery Networks by Tracking Geographic Social Cascades

    Scellato, S., Mascolo, C., Musolesi, M. & Crowcroft, J., 1 Apr 2011, Proceedings of the 20th international conference on World wide web. Association for Computing Machinery , p. 457-466 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    109 Citations (Scopus)
  • Unbiased Black Box Search Algorithms

    Rowe, J. & Vose, MD., 16 Jul 2011, GECCO '11 Proceedings of the 13th annual conference on Genetic and evolutionary computation. Association for Computing Machinery , p. 2035-2042 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • Workflows for information integration in the life sciences

    Missier, P., Paton, N. & Li, P., 2011, Search Computing - Trends and Developments. p. 215-225 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6585 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    A Bound on the Performance of LDA in Randomly Projected Data Spaces

    Durrant, R. & Kaban, A., 26 Aug 2010, 2010 20th International Conference on Pattern Recognition (ICPR). Institute of Electrical and Electronics Engineers (IEEE), p. 4044-4047 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A Calibration-Free Head Gesture Recognition System with Online Capability

    Wöhler, NC., Grossekathöfer, U., Dierker, A., Hanheide, M., Kopp, S. & Hermann, T., 26 Aug 2010, 2010 20th International Conference on Pattern Recognition (ICPR) . Institute of Electrical and Electronics Engineers (IEEE), p. 3814-3817 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • A grid-based fitness strategy for evolutionary many-objective optimization

    Li, M., Zheng, J., Shen, R., Li, K. & Yuan, Q., 2010, Proceedings of the 12th Annual Genetic and Evolutionary Computation Conference, GECCO '10. p. 463-470 8 p. (Proceedings of the 12th Annual Genetic and Evolutionary Computation Conference, GECCO '10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    33 Citations (Scopus)
  • A KLT-inspired node centrality for identifying influential neighborhoods in graphs

    Ilyas, M. U. & Radha, H., 19 Mar 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS). IEEE, p. 1-7 7 p. 5464971

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A linked data approach to sharing workflows and workflow results

    Roos, M., Bechhofer, S., Zhao, J., Missier, P., Newman, D. R., De Roure, D. & Marshall, M. S., 2010, Leveraging Applications of Formal Methods, Verification, and Validation - 4th International Symposium on Leveraging Applications, ISoLA 2010, Proceedings. PART 1 ed. p. 340-354 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6415 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An Analysis of Rogue AV Campaigns

    Cova, M., Leita, C., Thonnard, O., Keromytis, A. & Dacier, M., 1 Jan 2010, Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings. Jha, S., Sommer, R. & Kreibich, C. (eds.). Springer, p. 442-463 22 p. (Lecture Notes in Computer Science; vol. 6307).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • An improved co-similarity measure for document clustering

    Hussain, S. F., Bisson, G. & Grimal, C., 2010, Proceedings - 9th International Conference on Machine Learning and Applications, ICMLA 2010. p. 190-197 8 p. 5708832. (Proceedings - 9th International Conference on Machine Learning and Applications, ICMLA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Citations (Scopus)
  • Ant Colony Optimization and the Minimum Cut Problem

    Kötzing, T., Lehre, P., Neumann, F. & Oliveto, P., 11 Jul 2010, Proceedings of the 12th annual conference on Genetic and evolutionary computation. p. 1393-1400 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Ant Colony Optimization for Stochastic Shortest Path Problems

    Horoba, C., Sudholt, D., Pelikan, M. & Branke, J., 11 Jul 2010, Proceedings of the 12th annual conference on Genetic and evolutionary computation. p. 1465-1472 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Assume-Guarantee Verification for Probabilistic Systems

    Kwiatkowska, M., Norman, G., Parker, D. & Qu, H., 2010, Tools and Algorithms for the Construction and Analysis of Systems : 6th International Conference, TACAS 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings. Esparza, J. & Majumdar, R. (eds.). Springer, p. 23-37 (Lecture Notes in Computer Science; vol. 6015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    85 Citations (Scopus)
  • A Traceability Attack against e-Passports

    Chothia, T., Smirnov, V. & Radu, S., 1 Jan 2010, Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers. Sion, R. (ed.). Springer, p. 20-34 15 p. (Lecture Notes in Computer Science; vol. 6052).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Citations (Scopus)
  • Attack, Solution and Verification for Shared Authorisation Data in TCG TPM

    Chen, L. & Ryan, M., 1 Jan 2010, Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers. Degano, P. & Guttman, JD. (eds.). Springer, p. 201-216 16 p. (Lecture Notes in Computer Science; vol. 5983).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Citations (Scopus)
  • Black-box search by unbiased variation

    Lehre, P. K. & Witt, C., 2010, Proceedings of the 12th Annual Genetic and Evolutionary Computation Conference, GECCO '10. p. 1441-1448 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Citations (Scopus)
  • BotGrep: Finding P2P Bots with Structured Graph Analysis

    Nagaraja, S., Mital, P., Hong, C-Y., Caesar, M. & N, B., 2010, Proceedings of the 19th USENIX Security Symposium 2010. USENIX , p. 95-110

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    158 Citations (Scopus)
  • Cognitive Burden Estimation for Visuomotor Learning with fNIRS

    James, D. R. C., Orihuela-Espina, F., Leff, D. R., Mylonas, G. P., Kwok, K-W., Darzi, A. W. & Yang, G-Z., 2010, Medical Image Computing and Computer Assisted Interventions (MICCAI), Lecture Notes in Computer Science. Springer, Vol. 6363. p. 319 326 p. (Medical Image Computing and Computer-Assisted Intervention - Miccai 2010, Pt Iii).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Computational Interpretations of Analysis via Products of Selection Functions

    Escardo, M. & Oliva, P., 1 Jan 2010, Programs, Proofs, Processes: 6th Conference on Computability in Europe, CiE 2010, Ponta Delgada, Azores, Portugal, June 30 – July 4, 2010. Proceedings. Ferreira, F., Lowe, B., Mayordomo, E. & Gomes, LM. (eds.). Springer, p. 141-150 (Lecture Notes in Computer Science; vol. 6158).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Construct to understand: learning through exploration

    Demery, Z., Arriola-Rios, V. E., Sloman, A., Wyatt, J. & Chappell, J., 2010, Proceedings of the International Symposium on AI-Inspired Biology. p. 59-61 3 p. (Proceedings of the International Symposium on AI-Inspired Biology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Correlation-Based Intrinsic Image Extraction from a Single Image

    Jiang, X., Schofield, A. & Wyatt, J., 1 Jan 2010, Computer Vision – ECCV 2010 Subtitle of host publication: 11th European Conference on Computer Vision, Heraklion, Crete, Greece, September 5-11, 2010, Proceedings, Part IV. Daniilidis, K., Maragos, P. & Paragios, N. (eds.). Springer, p. 58-71 14 p. (Lecture Notes in Computer Science Series ; vol. 6314).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Citations (Scopus)
  • Cryptanalysis of the DECT Standard Cipher

    Nohl, K., Tews, E. & Weinmann, R-P., 2010, Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Hong, S. & Iwata, T. (eds.). Springer, Vol. 6147. p. 1-18 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • EEG: A way to explore learner's affect in pervasive learning systems

    Wan, J., 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Enhancing diversity for average ranking method in evolutionary many-objective optimization

    Li, M., Zheng, J., Li, K., Yuan, Q. & Shen, R., 2010, Parallel Problem Solving from Nature, PPSN XI - 11th International Conference, Proceedings. PART 1 ed. p. 647-656 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6238 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Citations (Scopus)
  • ERGOT: A semantic-based system for service discovery in distributed infrastructures

    Pirŕo, G., Trunfio, P., Talia, D., Missier, P. & Goble, C., 2010, CCGrid 2010 - 10th IEEE/ACM International Conference on Cluster, Cloud, and Grid Computing. p. 263-272 10 p. 5493471. (CCGrid 2010 - 10th IEEE/ACM International Conference on Cluster, Cloud, and Grid Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Fine-grained and efficient lineage querying of collection-based workflow provenance

    Missier, P., Paton, N. W. & Belhajjame, K., 2010, Advances in Database Technology - EDBT 2010 - 13th International Conference on Extending Database Technology, Proceedings. p. 299-310 12 p. (Advances in Database Technology - EDBT 2010 - 13th International Conference on Extending Database Technology, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • FPGA Implementation of an Improved Attack against the DECT Standard Cipher

    Weiner, M., Tews, E., Heinz, B. & Heyszl, J., 2010, Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers. Rhee, K. H. & Nyang, D. (eds.). Springer, Vol. 6829. p. 177-188 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Functional units: Abstractions for Web service annotations

    Missier, P., Wolstencroft, K., Tanoh, F., Li, P., Bechhofer, S., Belhajjame, K., Pettifer, S. & Goble, C., 2010, Proceedings - 2010 6th World Congress on Services, Services-1 2010. p. 306-313 8 p. 5575854. (Proceedings - 2010 6th World Congress on Services, Services-1 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Hide and seek: Location sharing practices with social media

    Wagner, D., Lopez, M., Doria, A., Pavlyshak, I., Kostakos, V., Oakley, I. & Spiliotopoulos, T., 2010, MobileHCI '10: Proceedings of the 12th international conference on Human computer interaction with mobile devices and services. Association for Computing Machinery (ACM)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How virtual machinery can bridge the “explanatory gap”, in natural and artificial systems

    Sloman, A., Doncieux, S., Girard, B., Guillot, A., Hallam, J., Meyer, J-A. & Mouret, J-B., Aug 2010, From Animals to Animats 11: 11th International Conference on Simulation of Adaptive Behavior, SAB 2010, Paris - Clos Lucé, France, August 25-28, 2010. Proceedings. Doncieux, S., Girard, B., Guillot, A., Hallam, J., Meyer, J-A. & Mouret, J-B. (eds.). Springer, p. 13-24 12 p. (Lecture Notes in Computer Science; vol. 6226).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Janus: From workflows to semantic provenance and linked open data

    Missier, P., Sahoo, S. S., Zhao, J., Goble, C. & Sheth, A., 2010, Provenance and Annotation of Data and Processes - Third International Provenance and Annotation Workshop, IPAW 2010, Revised Selected Papers. p. 129-141 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6378 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Linking multiple workflow provenance traces for interoperable collaborative science

    Missier, P., Ludäscher, B., Bowers, S., Dey, S., Sarkar, A., Shrestha, B., Altintas, I., Anand, M. K. & Goble, C., 2010, 2010 5th Workshop on Workflows in Support of Large-Scale Science, WORKS 2010. 5671861. (2010 5th Workshop on Workflows in Support of Large-Scale Science, WORKS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Memes in Artificial Life Simulations of Life History Evolution

    Bullinaria, J., 19 Aug 2010, Proceedings of the Alife XII Conference. MIT Press, p. 823-830 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Modeling the contact between a rolling sphere and a compliant ground plane

    Azad, M., 2010, Austrelasian Conference on Robotics and Automation Association.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Monitoring of non-functional requirements using dynamic transformation of components

    Lahmar, I. B., Mukhtar, H. & Belaïd, D., 2010, 6th International Conference on Networking and Services, ICNS 2010, Includes LMPCNA 2010; INTENSIVE 2010. p. 61-66 6 p. 5460669. (6th International Conference on Networking and Services, ICNS 2010, Includes LMPCNA 2010; INTENSIVE 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Negative drift in populations

    Lehre, P. K., 2010, Parallel Problem Solving from Nature, PPSN XI - 11th International Conference, Proceedings. PART 1 ed. Vol. 6238 LNCS. p. 244-253 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6238 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Citations (Scopus)
  • On the Compositionality of Round Abstraction

    Ghica, D. & Menaa, M., 1 Jan 2010, CONCUR 2010 - Concurrency Theory: 21th International Conference, CONCUR 2010, Paris, France, August 31-September 3, 2010. Proceedings. Gastin, P. & Laroussinie, F. (eds.). Springer, p. 417-431 15 p. (Lecture Notes in Computer Science; vol. 6269).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Open workflow infrastructure: A research agenda

    Stankovski, V., Missier, P., Goble, C. & Taylor, I., 2010, Proceedings of the 1st International Workshop on Workflow Approaches to New Data-centric Science, Wands '10. 6. (Proceedings of the ACM SIGMOD International Conference on Management of Data).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Optimizing Delivery Time in Multi-Objective Vehicle Routing Problems with Time Windows

    Garcia Najera, A. & Bullinaria, J., 1 Jan 2010, Parallel Problem Solving from Nature, PPSN XI: 11th International Conference, Kraków, Poland, September 11-15, 2010, Proceedings, Part II. Springer, Vol. 6239. p. 51-60 10 p. (Lecture Notes in Computer Science; vol. 6239).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security analysis of the mode of JH hash function

    Bhattacharyya, R., Mandal, A. & Nandi, M., 2010, Fast Software Encryption - 17th International Workshop, FSE 2010, Revised Selected Papers. p. 168-191 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6147 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    29 Citations (Scopus)
  • Self-adapting Applications Based on QA Requirements in the Cloud Using Market-Based Heuristics

    Nallur, V. & Bahsoon, R., 1 Dec 2010, Towards a service-based internet. Di Nitto, E. & Yahyapour, R. (eds.). Berlin: Springer, p. 51-62 12 p. (Lecture Notes in Computer Science; vol. 6481).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    3 Citations (Scopus)
    324 Downloads (Pure)
  • Spread assessment for evolutionary multi-objective optimization

    Li, M. & Zheng, J., 2010, Evolutionary Multi-Criterion Optimization - 5th International Conference, EMO 2009, Proceedings. p. 216-230 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5467 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    42 Citations (Scopus)