Search:
Computing and Library Services - delivering an inspiring information environment

Items where School is "School of Computing and Engineering > Informatics Research Group > Knowledge Engineering and Intelligent Interfaces"

Up a level
Export as [feed] RSS
[tool] Download Statistics
Group by: Creators | Date | Item Type | Uncontrolled Keywords | No Grouping
A* Active Contours Associative Classification Associative Classification Text Categorisation Document Classification automated planning autonomic nervous system autonomic systems autonomic systems automated planning and scheduling control systems Boundary effect Brake Centre treatment Chebyshev series - Laurent series - Laurent–Padé approximant - Chebyshev–Padé approximant - Clenshaw–Lord approximant - end-point singularities Classification Composition Computer Vision Data Mining domain model domestic communication Domestic communication technologies Drone Dynamic Web Services elasticity enterprise education enterprising staff features extraction Information Management Information Security Intelligent Systems Interaction interface interface design interface designs Itemset Judder Knowledge acquisition Knowledge Representation Machine Learning Machine tool calibration automation management report web analytics undergraduate projects enterprise metrology uncertainty surface texture parameter Natural Language Understanding Neural Network object-centred model Ontology OWL Path planning Pathfinding pattern Phishing Planning and Scheduling Protégé Quality of Service Radial basis function Real-Time Heuristic Search Real-Time Strategy Games Requirements capture • Formal specification • Knowledge representation Rule Scene Understanding Security simulation consistence spectral methods - collocation - differentiation matrices - boundary value problems - solid mechanics Speed limit constraints Surface reconstruction Text Message Processing Thermo-elastic Theta* Training Phase Trajectory planning ubiquitous computing Validation trend mining Longitudinal data Temporal databases Web Threat Website features wizard of oz
Number of items at this level: 252.

A*

Chrpa, Lukáš and Osborne, Hugh (2013) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems. ISSN 0921-0296 (In Press)

Active Contours

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

Associative Classification

Mahmood, Qazafi, Thabtah, Fadi Abdeljaber and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Associative Classification Text Categorisation Document Classification

Barnes, Andrew, McCluskey, T.L. and Osborne, Hugh (2008) Benefits of associative classification within text categorisation. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 34-39. ISBN 978-1-86218-067-3

automated planning

Jimoh, Falilat, Chrpa, Lukáš and Vallati, Mauro (2013) Autonomic System Architecture: An Automated Planning Perspective. In: Artificial Intelligence Applications and Innovations 2013. IFIP Advances in Information and Communication Technology , 412 (121). Springer, Pahpos, Cyprus, pp. 121-130. ISBN 9783642411410

Naveed, Munir, Kitchin, Diane E. and Crampton, Andrew (2009) Dynamic real-time hierarchical heuristic search for pathfinding. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 153-158. ISBN 9781862180857

autonomic nervous system

Jimoh, Falilat, Chrpa, Lukáš and Vallati, Mauro (2013) Autonomic System Architecture: An Automated Planning Perspective. In: Artificial Intelligence Applications and Innovations 2013. IFIP Advances in Information and Communication Technology , 412 (121). Springer, Pahpos, Cyprus, pp. 121-130. ISBN 9783642411410

autonomic systems

Jimoh, Falilat, Chrpa, Lukáš and Vallati, Mauro (2013) Autonomic System Architecture: An Automated Planning Perspective. In: Artificial Intelligence Applications and Innovations 2013. IFIP Advances in Information and Communication Technology , 412 (121). Springer, Pahpos, Cyprus, pp. 121-130. ISBN 9783642411410

autonomic systems automated planning and scheduling control systems

Jimoh, F. and McCluskey, T.L. (2012) Using automated planning to enable autonomic properties in computer systems. In: Proceedings of The Queen’s Diamond Jubilee Computing and Engineering Annual Researchers’ Conference 2012: CEARC’12. University of Huddersfield, Huddersfield, p. 150. ISBN 978-1-86218-106-9

Boundary effect

Zhang, X., Jiang, Xiang and Crampton, Andrew (2007) Numerical Analysis of the Boundary Effect of Radial Basis Functions in 3D Surface Reconstruction. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-6.

Brake

Bryant, David, Crampton, Andrew, Fieldhouse, John D. and Talbot, Chris J. (2006) Discussion of characteristics of brake judder and the necessary data acquisition system for complete analysis. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.

Centre treatment

Zhang, X., Jiang, Xiang and Crampton, Andrew (2007) Numerical Analysis of the Boundary Effect of Radial Basis Functions in 3D Surface Reconstruction. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-6.

Chebyshev series - Laurent series - Laurent–Padé approximant - Chebyshev–Padé approximant - Clenshaw–Lord approximant - end-point singularities

Mason, John C. and Crampton, Andrew (2005) Laurent-Pade approximants to four kinds of Chebyshev polynomial expansion. Part 2. Clenshaw-Lord type approximants. Journal of Numerical Algorithms, 38 (1). pp. 19-29. ISSN 1572-9265

Classification

Mahmood, Qazafi, Thabtah, Fadi Abdeljaber and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Composition

Mustafa, Faisal and McCluskey, T.L. (2008) Dynamic web services composition: current issues. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 48-54. ISBN 978-1-86218-067-3

Computer Vision

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

Data Mining

Mahmood, Qazafi, Thabtah, Fadi Abdeljaber and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi Abdeljaber (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing , Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

domain model

Shah, Mohammad Munshi Shahin, McCluskey, T.L. and West, Margaret M. (2009) A study of synthesizing artificial intelligence (AI) planning domain models by using object constraints. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 64-69. ISBN 9781862180857

domestic communication

Li, Andol X and Bonner, John V.H. (2009) Designing interfaces to visualise domestic communication patterns. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 88-92. ISBN 9781862180857

Li, Andol X and Bonner, John V.H. (2010) Improving prototype consistence for wizard-of-oz simulations and evaluations. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 136-141. ISBN 9781862180932

Domestic communication technologies

Bonner, John V.H. (2009) Adding critical sensibilities to domestic communication technologies. International Journal of Human-Computer Studies, 67 (2). pp. 215-221. ISSN 1071-5819

Drone

Bryant, David, Crampton, Andrew, Fieldhouse, John D. and Talbot, Chris J. (2006) Discussion of characteristics of brake judder and the necessary data acquisition system for complete analysis. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.

Dynamic Web Services

Mustafa, Faisal and McCluskey, T.L. (2008) Dynamic web services composition: current issues. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 48-54. ISBN 978-1-86218-067-3

elasticity

Talbot, Chris J. and Crampton, Andrew (2005) Application of the pseudo-spectral method to 2D eigenvalue problems in elasticity. Journal of Numerical Algorithms 38 Special Issue: Chebyshev Polynomials, 38. pp. 95-110. ISSN 1017-139

enterprise education

Newman, Christopher D and Sturdy, Paula (2012) Identifying Enterprise Opportunities in Student Projects. Project Report. Enterprise Educators UK.

enterprising staff

Newman, Christopher D and Sturdy, Paula (2012) Identifying Enterprise Opportunities in Student Projects. Project Report. Enterprise Educators UK.

features extraction

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi Abdeljaber (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

Information Management

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

Information Security

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi Abdeljaber (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing , Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

Intelligent Systems

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

Interaction interface

Li, Andol X and Bonner, John V.H. (2009) Designing interfaces to visualise domestic communication patterns. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 88-92. ISBN 9781862180857

interface design

Li, Andol X and Bonner, John V.H. (2009) Designing interfaces to visualise domestic communication patterns. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 88-92. ISBN 9781862180857

interface designs

Li, Andol X and Bonner, John V.H. (2010) Improving prototype consistence for wizard-of-oz simulations and evaluations. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 136-141. ISBN 9781862180932

Itemset

Mahmood, Qazafi, Thabtah, Fadi Abdeljaber and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Judder

Bryant, David, Crampton, Andrew, Fieldhouse, John D. and Talbot, Chris J. (2006) Discussion of characteristics of brake judder and the necessary data acquisition system for complete analysis. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.

Knowledge acquisition

Shah, Mohammad Munshi Shahin, McCluskey, T.L. and West, Margaret M. (2009) A study of synthesizing artificial intelligence (AI) planning domain models by using object constraints. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 64-69. ISBN 9781862180857

Knowledge Representation

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

Machine Learning

McCluskey, T.L., Cresswell, S.N., Richardson, N.E. and West, Margaret M. (2010) Action Knowledge Acquisition with Opmaker2. In: Agents and Artificial Intelligence. Communications in Computer and Information Science, 67 . Springer, pp. 137-150. ISBN 978-3-642-11818-0

Machine tool calibration automation

Parkinson, S., Longstaff, Andrew P., Crampton, Andrew, Fletcher, Simon, Allen, Gary and Myers, Alan (2012) Automation as a Solution for Machine Tool Calibration Planning. In: Proceedings of The Queen’s Diamond Jubilee Computing and Engineering Annual Researchers’ Conference 2012: CEARC’12. University of Huddersfield, Huddersfield, pp. 57-62. ISBN 978-1-86218-106-9

management report web analytics undergraduate projects enterprise

Newman, Christopher D, Sturdy, Paula and Wilson, David R (2010) FormWatch Project: Management Summary Report. Project Report. University of Huddersfield, Huddersfield, UK.

metrology uncertainty surface texture parameter

Brennan, James K., Jiang, Xiang, Crampton, Andrew and Leach, Richard K. (2006) Propagation of measurement uncertainty for surface texture parameters. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.

Natural Language Understanding

Jilani, Aisha (2010) Mobile Phone Text Processing and Question-Answering. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 130-135. ISBN 9781862180932

Neural Network

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi Abdeljaber (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing , Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

object-centred model

Shah, Mohammad Munshi Shahin, McCluskey, T.L. and West, Margaret M. (2009) A study of synthesizing artificial intelligence (AI) planning domain models by using object constraints. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 64-69. ISBN 9781862180857

Ontology

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

OWL

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

Path planning

Chrpa, Lukáš and Osborne, Hugh (2013) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems. ISSN 0921-0296 (In Press)

Pathfinding

Naveed, Munir, Kitchin, Diane E. and Crampton, Andrew (2009) Dynamic real-time hierarchical heuristic search for pathfinding. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 153-158. ISBN 9781862180857

pattern

Li, Andol X and Bonner, John V.H. (2009) Designing interfaces to visualise domestic communication patterns. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 88-92. ISBN 9781862180857

Phishing

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi Abdeljaber (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi Abdeljaber (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing , Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

Planning and Scheduling

McCluskey, T.L., Cresswell, S.N., Richardson, N.E. and West, Margaret M. (2010) Action Knowledge Acquisition with Opmaker2. In: Agents and Artificial Intelligence. Communications in Computer and Information Science, 67 . Springer, pp. 137-150. ISBN 978-3-642-11818-0

Protégé

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

Quality of Service

Mustafa, Faisal and McCluskey, T.L. (2008) Dynamic web services composition: current issues. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 48-54. ISBN 978-1-86218-067-3

Radial basis function

Zhang, X., Jiang, Xiang and Crampton, Andrew (2007) Numerical Analysis of the Boundary Effect of Radial Basis Functions in 3D Surface Reconstruction. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-6.

Real-Time Heuristic Search

Naveed, Munir, Kitchin, Diane E. and Crampton, Andrew (2009) Dynamic real-time hierarchical heuristic search for pathfinding. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 153-158. ISBN 9781862180857

Real-Time Strategy Games

Naveed, Munir, Kitchin, Diane E. and Crampton, Andrew (2009) Dynamic real-time hierarchical heuristic search for pathfinding. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 153-158. ISBN 9781862180857

Requirements capture • Formal specification • Knowledge representation

McCluskey, T.L., Porteous, J.M., Naik, Y., Taylor, C. N. and Jones, S. (1995) A requirements capture method and its use in an air traffic control application. Software: Practice and Experience, 25 (1). pp. 47-71. ISSN 0038-0644

Rule

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi Abdeljaber (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

Scene Understanding

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

Security

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi Abdeljaber (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

simulation consistence

Li, Andol X and Bonner, John V.H. (2010) Improving prototype consistence for wizard-of-oz simulations and evaluations. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 136-141. ISBN 9781862180932

spectral methods - collocation - differentiation matrices - boundary value problems - solid mechanics

Talbot, Chris J. and Crampton, Andrew (2005) Application of the pseudo-spectral method to 2D eigenvalue problems in elasticity. Journal of Numerical Algorithms 38 Special Issue: Chebyshev Polynomials, 38. pp. 95-110. ISSN 1017-139

Speed limit constraints

Chrpa, Lukáš and Osborne, Hugh (2013) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems. ISSN 0921-0296 (In Press)

Surface reconstruction

Zhang, X., Jiang, Xiang and Crampton, Andrew (2007) Numerical Analysis of the Boundary Effect of Radial Basis Functions in 3D Surface Reconstruction. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-6.

Text Message Processing

Jilani, Aisha (2010) Mobile Phone Text Processing and Question-Answering. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 130-135. ISBN 9781862180932

Thermo-elastic

Bryant, David, Crampton, Andrew, Fieldhouse, John D. and Talbot, Chris J. (2006) Discussion of characteristics of brake judder and the necessary data acquisition system for complete analysis. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.

Theta*

Chrpa, Lukáš and Osborne, Hugh (2013) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems. ISSN 0921-0296 (In Press)

Training Phase

Mahmood, Qazafi, Thabtah, Fadi Abdeljaber and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Trajectory planning

Chrpa, Lukáš and Osborne, Hugh (2013) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems. ISSN 0921-0296 (In Press)

ubiquitous computing

Bonner, John V.H. (2009) Adding critical sensibilities to domestic communication technologies. International Journal of Human-Computer Studies, 67 (2). pp. 215-221. ISSN 1071-5819

Validation trend mining Longitudinal data Temporal databases

Somaraki, V. and McCluskey, T.L. (2012) A robust validation framework for trend mining : a study in diabetic retinopathy. In: Proceedings of The Queen’s Diamond Jubilee Computing and Engineering Annual Researchers’ Conference 2012: CEARC’12. University of Huddersfield, Huddersfield, pp. 63-68. ISBN 978-1-86218-106-9

Web Threat

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi Abdeljaber (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing , Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

Website features

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi Abdeljaber (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

wizard of oz

Li, Andol X and Bonner, John V.H. (2010) Improving prototype consistence for wizard-of-oz simulations and evaluations. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 136-141. ISBN 9781862180932

This list was generated on Mon Sep 1 05:44:11 2014 IST.

University of Huddersfield, Queensgate, Huddersfield, HD1 3DH Copyright and Disclaimer All rights reserved ©