Items where Subject is "Computing"

Up a level
Export as [feed] RSS
Group by: Creators | Item Type
Number of items at this level: 73.


Baglee, David, Jantunen, Erkki and Bravo-Imaz, Iňaki (2016) A Review of the Essential Elements Linked with the Adoption of Condition-Based Maintenance. International Journal of Process Management and Benchmarking (IJPMB), 6 (2). pp. 258-272. ISSN 1460-6739

Chris, C, Tindle, John and Burn, Kevin (2015) A comparison of software-based approaches to identifying FOPDT and SOPDT model parameters from process step response data. Applied Mathematical Modelling. ISSN 0307-904X (In Press)

Galar, Diego, Baglee, David, Knowles, Michael and Kinnunen, Sini-Kaisu (2016) A Proposed Maintenance Strategy for a Wind Turbine Gearbox Using Condition Monitoring Techniques. International Journal of Process Management and Benchmarking (IJPMB), 6 (3). pp. 386-403. ISSN 1460-6739

Gandy, Elizabeth, Bondi, Anne, Hogg, Robert and Pigott, Timothy M. C. (2014) A preliminary investigation of the use of inertial sensing technology for the measurement of hip rotation asymmetry in horse riders. Sports Technology, 7 (1-2). pp. 79-88. ISSN 1934-6182

Garfield, Sheila (2001) Review of: Speech and Language Processing. Cognitive Systems Research, 2 (2). pp. 167-172. ISSN 1389-0417

Hall, Lynne, Hume, Colette and Tazzyman, Sarah (2015) Engaging Children in Interactive Application Evaluation. Enfance, 2015 (1). pp. 35-66.

Horsman, Graeme (2016) Digital forensics: Understanding the development of criminal law in England and Wales on images depicting child sexual abuse. Computer Law & Security Review. ISSN 0267-3649 (In Press)

Humphries, Lynne Let's play together: The design and evaluation of a collaborative, pro-social game for preschool children. International Journal of Continuing Engineering Education and Life-Long Learning (IJCEELL). ISSN 1560-4624 (In Press)

Irons, Alastair, Savage, N., Maple, C. and Davies, A. (2016) Embedding Cybersecurity in the Computer Science Curriculum. IT Now, 2016 (1). pp. 56-57.

Irons, Alastair and Thomas, Paula (2016) Problem based learning in digital forensics. Higher Education Pedagogies, 1 (1). pp. 95-105. ISSN 2375-2696

Knowles, Michael and Dixon, Derek (2016) Guidance Techniques to Improve Student Engagement in Critical Reflection Regarding the Preparation of Technical Reports. Student Engagement and Experience Journal, 5 (1). ISSN 2047- 9476

Malone, James, McGarry, Kenneth, Wermter, Stefan and Bowerman, Chris (2006) Data mining using rule extraction from Kohonen self-organising maps. Neural Computing & Applications, 15 (1). pp. 9-17. ISSN 0941-0643

McDonald, Sharon, Zhao, Tingting and Edwards, Helen (2015) Look Who's Talking: Evaluating the Utility of Interventions During an Interactive Think-Aloud. Interacting with Computers. ISSN 0953-5438

McGarry, Kenneth, Garfield, Sheila and Morris, Nick (2006) Recent trends in knowledge and data integration for the life sciences. Expert Systems, 23 (5). pp. 330-341. ISSN 0266-4720

Watson, Derek, Hall, Lynne and Tazzyman, Sarah (2016) Trick or Treat: Academic Buy-in to Third Stream Activities. Industry and Higher Education, 30 (2). pp. 155-167. ISSN 0950-4222

Willis, Leanne and McDonald, Sharon (2016) Retrospective protocols in usability testing: a comparison of Post-session RTA versus Post-task RTA reports. Behaviour & Information Technology, 35 (8). pp. 628-643. ISSN 0144-929X

Yla-Kujala, Antti, Martonnen, Salla, Karri, Timo, Sinkkonen, Tiina and Baglee, David (2015) Inter-organisational asset management: linking an operational and a strategic view. International Journal of Process Management and Benchmarking (IJPMB), 6 (3). pp. 366-385. ISSN 1460-6739

Book Section

Clawson, Kathy, Jing, Min, Scotney, Bryan, Wang, Hui and Liu, Jun (2014) Human action recognition in video via fused optical flow and moment features--towards a hierarchical approach to complex scenario recognition. In: MultiMedia Modeling: 20th Anniversary International Conference, MMM 2014, Dublin, Ireland, January 6-10, 2014, Proceedings, Part II. Lecture Notes in Computer Science (8326). Springer International Publishing, pp. 104-115. ISBN 978-3-319-04116-2

Cooper, Bridget (2016) Empathy, Emotion, Technology and Learning. In: Emotions, technology and learning. Emotions and Technology:Communication of Feelings for,with and through Digital Media . Academic Press, Elsevier, USA & London, pp. 265-288. ISBN 978-0-12-800649-8

Dagg, Lynne (2007) Exploration. In: A Practical Guide to Teaching ICT in the Secondary School. Routledge, Abingdon. ISBN 9780203962602

Dagg, Lynne (2007) Teachers as IT Professionals: A clash of cultures? In: Education, Training and Lifelong Learning. IFIP, Laxenburg.

Dagg, Lynne and Grey, John (2007) Do Secondary School ICT Teachers in England Get the CPD they want and think they need? In: Education, Training and Lifelong Learning. IFIP, Laxenburg, Austria.

Hayes, Catherine, Graham, Yitka and Fulton, John (2017) 'Introducing Anecdote Circles as an alternative Method to Focus Groups in the Pedagogic Impact Evaluation of a new Digital Nurse Navigator System'. In: Sage Research Methods Cases. UNSPECIFIED. (Submitted)

Humphries, Lynne (2015) Evaluating the Use of a Prosocial Digital Game to Identify and Compare Preschool Children's Social and Emotional Skills. In: Emotions, Technology and Digital Games. Elsevier. ISBN 978-0-12-801738-8

Jing, Min, Wang, Hui, Clawson, Kathy, Coleman, Sonya, Chen, Shuwei, Liu, Jun and Scotney, Bryan (2014) Recognition by Enhanced Bag of Words Model via Topographic ICA. In: Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services: 8th International Conference, UCAmI 2014, Belfast, UK, December 2-5, 2014, Proceedings. Springer International Publishing, pp. 523-531. ISBN 978-3-319-13102-3

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings. Lecture Notes in Computer Science . Springer, pp. 204-208. ISBN 978-3-319-11850-5


Bugliesi, Michele, Calzavara, Stefano, Mödersheim, Sebastian and Modesti, Paolo (2015) Security Protocol Specification and Verification with AnBx. Technical Report. School of Computing Science, Newcastle University.

Bugliesi, Michele and Modesti, Paolo (2010) Design and Analysis of Distributed Protocols with AnBx. Technical Report. DSI, Università Ca' Foscari Venezia.

Modesti, Paolo, Groß, Thomas, Mödersheim, Sebastian, Almousa, Omar and Houdeau, Deflef (2015) Security Evaluation of FutureID. Project Report. FutureID Consortium.

Conference or Workshop Item

Almousa, Omar, Mödersheim, Sebastian, Modesti, Paolo and Viganò, Luca (2015) Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, 21-25 Sep 2015, Vienna, Austria.

Baglee, David, Jantunen, E., Campos, J. and Sharma, P. (2015) How does CBM function in the real world? In: MFPT 2016 and ISA’s 62nd International Instrumentation Symposium, 24-26 May 2016, Dayton, Ohio.

Bugliesi, Michele and Modesti, Paolo (2010) AnBx - Security Protocols Design and Verification. In: Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, March 27-28, 2010, Paphos, Cyprus,.

Campos, Jaime, Sharma, Pankaj, Jantunen, Erkki, Baglee, David and Fumagalli, Luca (2016) Business performance measurements in asset management with the support of big data technologies. In: MPMM 2016 – Maintenance Conference, 28 Nov 2016, Lulea, Sweden. (Unpublished)

Chen, Shuwei, Clawson, Kathy, Jing, Min, Liu, Jun, Wang, Hui and Scotney, Bryan (2014) Uncertainty Reasoning Based Formal Framework for Big Video Data Understanding. In: Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)-Volume 02, 11-14 Aug 2014, Warsaw, Poland.

Clawson, Kathy, Delicato, Louise, Garfield, Sheila and Young, Shell (2017) Automated Representation of Non-Emotional Expressivity to Facilitate Understanding of Facial Mobility: Preliminary Findings. In: Intelligent Systems Conference 2017, 7-8 September 2017, London. (In Press)

Clawson, Kathy, Morrow, PJ, Scotney, BW, Dolan, O and McKenna, J (2006) Evaluation of Skin Lesion Asymmetry using Fourier Descriptors. In: Irish Machine Vision and Image Processing (IMVIP 2006), 30 Aug - 1 Sep 2006, Dublin City University.

Clawson, Kathy, Morrow, PJ, Scotney, BW, McKenna, DJ and Dolan, OM (2007) Computerised Skin Lesion Surface Analysis for Pigment Asymmetry Quantification. In: MVIP 2007 International Machine Vision and Image Processing Conference, 5-7 Sep 2007, National University of Ireland Maynooth, Maynooth, County Kildare, Ireland.

Clawson, Kathy, Morrow, Philip, Scotney, Bryan, McKenna, John and Dolan, Olivia (2009) Analysis of pigmented skin lesion border irregularity using the harmonic wavelet transform. In: 2009 International Machine Vision and Image Processing Conference, 2-4 Sep 2009, Dublin, Ireland.

Clawson, Kathy, Morrow, Philip J, Scotney, Bryan W, McKenna, D John and Dolan, Olivia M (2007) Determination of optimal axes for skin lesion asymmetry quantification. In: ICIP 2007: IEEE International Conference on Image Processing, 16-19 Sep 2007, San Antonio, Texas, USA.

Devlin, Siobhan and Unthank, Gary (2015) Will embedded eportfolio-based supervision lead to greater student engagement in a capstone project? In: Mahara Hui UK, 9-10 Nov 2015, Southampton Solent University, UK.

Drange, T., Irons, Alastair, Sutherland, I. and Nor, G. (2016) Blogs vs WIKI as a reflection tool in Moodle: A Case Study. In: WEI International Academic Conference on Education and Humanities, 30-31 May 2016, Prague. (In Press)

Gandy, Elizabeth, McDonald, Sharon, Hogg, Robert and Pigott, Timothy M.C. (2017) Observing the Observer: experiences with contextual inquiry to design a horse rider assessment interface. In: British HCI 2017 Conference Digital Make Believe, 3-6 Jul 2017, Sunderland, UK.

Garcia, Rémi and Modesti, Paolo (2017) An IDE for the Design, Verification and Implementation of Security Protocols. In: The 28th International Symposium on Software Reliability Engineering Workshops (ISSREW), 23-26 Oct 2017, Toulouse, France.

Haddad, Karam and Baglee, David (2015) Using Augmented Reality in Manufacturing Firms and its Impacts on Knowledge Transfer. In: 16th European Conference on Knowledge Management - ECKM 2015, 3 - 4 Sep 2015, University of Udine, Italy. (Submitted)

Hall, Lynne, Hume, C. and Tazzyman, S. (2016) Five Degrees of Happiness: Effective Smiley Face Likert Scales for Evaluating with Children. In: ACM Interaction Design with Children (IDC 2016), 21-24 June, Manchester, UK. (Submitted)

Hall, Lynne, Hume, Colette and Tazzyman, Sarah (2016) Five Degrees of Happiness: Effective Smiley Face Likert Scales for Evaluating with Children. In: IDC '16 15th International Conference on Interaction Design and Children, June 21-24 2016, Manchester.

Hayes, Catherine, Fulton, John, Irons, Alastair and Capper, Stephen (2017) 'Partnership in Professional Doctoral Reflexivity - Action Research as a Driver in the Co-Construction of Knowledge'. In: Change Agent Network Conference, 2018, 19 - 20 Apr 2018, University of Winchester, UK. (Submitted)

Irons, Alastair (2016) Impact of Edward Snowden on National Security Policy. In: University of Cape Town Research Seminar Series, May 2016, Cape Town, South Africa. (Unpublished)

Irons, Alastair (2016) Ways in which Universities can work with UTCs to ensure smooth student transition. In: Digital Leaders North East Salon, May 2016, Newcastle. (Unpublished)

Irons, Alastair and Peacock, Donna (2015) Impact of Gender in Computer Security. In: 11th Annual Teaching Computer Forensics Conference, 19 Nov 2015, University of Sunderland, UK..

Irons, Alastair and Peacock, Donna (2015) The Impact of Gender in Computer Security. In: The 8th International Conference on Cybercrime Forensics Education and Training, 3-4 September 2015, Canterbury Christ Church University, Canterbury. (Submitted)

Jiang, Ming, Kirkham, T. and Sheridan, C. (2016) An Evolutionary Cultural Algorithm based Risk-aware Virtual Machine Scheduling Optimisation in Infrastructure as a Service (IaaS) CLoud. In: 6th International Conference of Cloud Computing and Services Sciences, 23-25 Apr 2016, Rome, Italy. (Unpublished)

Little, Suzanne, Clawson, Kathy, Direkoglu, Cem, Gaines10, Se{\'a}n, Gaudino, Francesca, Gim{\'e}nez, Roberto, Jargalsaikhan, Iveel, Kafetzakis, Emmanouil, Kourtis, Tasos and Liu, Jun (2012) SAVASA-Standards-Based Approach to Video Archive Search and Analysis. In: TRECVid 2012, 26-28 Nov 2012, NIST, Gaithersburg, Maryland, Washington,DC.

Little, Suzanne, Clawson, Kathy, Mereu, Anna and Rodriguez, Aitor (2013) Identifying and addressing challenges for search and analysis of disparate surveillance video archives. In: 5th International Conference on Imaging for Crime Prevention and Detection, 16 - 17 Dec 2013, Kingston University London, UK.

Little, Suzanne, Jargalsaikhan, Iveel, Albatal, Rami, Direkoglu, Cem, O'Connor, Noel E, Smeaton, Alan F, Clawson, Kathy, Jing, Min, Scotney, Brian and Wang, Hui (2013) SAVASA project@ TRECVid 2013: semantic indexing and interactive surveillance event detection. In: TRECVid 2013, December 2013, National Institute of Standards and Technology, Washington DC.

Little, Suzanne, Jargalsaikhan, Iveel, Clawson, Kathy, Nieto, Marcos, Li, Hao, Direkoglu, Cem, O'Connor, Noel E, Smeaton, Alan F, Liu, Jun and Scotney, Bryan (2013) Interactive surveillance event detection at TRECVid2012. In: ICMR'13 International Conference on Multimedia Retrieval, 16 - 19 Apr 2013, Dallas, TX, USA.

Little, Suzanne, Jargalsaikhan, Iveel, Clawson, Kathy, Nieto, Marcos, Li, Hao, Direkoglu, Cem, O'Connor, Noel E, Smeaton, Alan F, Scotney, Bryan and Wang, Hui (2013) An information retrieval approach to identifying infrequent events in surveillance video. In: ICMR'13 International Conference on Multimedia Retrieval, 16 - 19 Apr 2013, Dallas, TX, USA.

Liu, Xueqin, Clawson, Kathy, Wang, Hui, Scotney, Bryan and Liu, Jun (2013) Complex event recognition with uncertainty reasoning. In: Machine Learning and Cybernetics (ICMLC), 2013 International Conference on, 14 - 17 Jul 2013, Tianjin, China.

McGarry, Kenneth (2001) Architectures for knowledge transfer between neural networks. In: The UK Workshop on Computational Intelligence, 10-12 Sep 2001, Edinburgh, UK.

McGarry, Kenneth, Garfield, Sheila, Morris, Nick and Wermter, Stefan (2007) Integration of Hybrid Bio-Ontologies using Bayesian Networks for Knowledge Discovery. In: Third International Workshop on Neural-Symbolic Learning and Reasoning, 6-12 January 2007, Hyderabad, India.

McGarry, Kenneth, Garfield, Sheila and Wermter, Stefan (2007) Auto-Extraction, Representation and Integration of a Diabetes Ontology Using Bayesian Networks. In: Twentieth IEEE International Symposium on Computer-Based Medical Systems, 20-22 June 2007, Maribor, Slovenia.

McGarry, Kenneth and MacIntyre, John (2001) Data mining in a vibration analysis domain by extracting symbolic rules from RBF neural networks. In: 14th International Congress on Condition Monitoring and Engineering Management, 4-6 Sep 2001, Manchester, UK.

McGarry, Kenneth, MacIntyre, John and Addison, D. (2001) Integrating RBF networks with domain knowledge. In: International Joint Conference on Neural Networks, 14 -19 Jul 2001, Washington DC, USA.

McGarry, Kenneth and McDonald, Sharon (2017) Computational methods for text mining user posts on a popular gaming forum for identifying user experience issues. In: British HCI 2017 Conference Digital Make Believe, 3-6 Jul 2017, Sunderland, UK. (In Press)

McMahon, Fiona, Dawson, Peter, Anderson, Rosaleen, Sattelle, Ben, Warrender, Robert and Gray, Mark (2015) Development of Functional Computational Workflow Methods for Quality Automated Molecular Modelling-based Drug Design. In: MGMS Young Modellers Forum 2015, 27 Nov 2015, Greenwich, London. (Submitted)

Modesti, Paolo (2016) AnBx: Automatic Generation and Verification of Security Protocols Implementations. In: 8th International Symposium, FPS 2015, 26-28 Oct 2015, Clermont-Ferrand, France.

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management - 10th International Workshop, STM 2014, 10-11 Sep 2014, Wroclaw, Poland.

Mödersheim, Sebastian and Modesti, Paolo (2011) Verifying SeVeCom using set-based abstraction. In: 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, 4-8 Jul 2011, Bahcesehir University, Istanbul, Turkey.

Solomon, Norman, Oatley, Giles and McGarry, Kenneth (2007) A Dynamic Method for the Evaluation and Comparison of Imputation Techniques. In: International Conference of Computational Statistics and Data Engineering, 2-4 July, 2007, London, U.K.

Yasser, A, M, Clawson, Kathy, Bowerman, Chris and Lévêque, M (2017) Saving Cultural Heritage with Digital Make-Believe: Machine Learning and Digital Techniques to the Rescue. In: British Human Computer Interaction Conference, 3 - 6 Jul 2017, Sunderland University, St Peter's Campus. (In Press)


Kendal, Simon (2011) Object Oriented Programming Using C#. Ventus. ISBN 978-87-7681-814-2


Clawson, Kathy (2009) EMED: enhancement of melanoma early diagnosis. Doctoral thesis, University of Ulster.

Modesti, Paolo (2012) Verified Security Protocol Modeling and Implementation with AnBx. Doctoral thesis, Università Ca' Foscari Venezia.

This list was generated on Fri Jan 19 23:10:37 2018 GMT.