Up a level
Export as [feed] RSS
Group by: Creators | Date | Item Type | Uncontrolled Keywords | No Grouping
A* Abstract argumentation Active Contours Activity Recognition ADL Associative Classification Associative Classification Text Categorisation Document Classification Automated automated planning Automatic configuration autonomic nervous system autonomic systems autonomic systems automated planning and scheduling control systems Autonomous Boundary effect Brake Causal Centre treatment Chebyshev series - Laurent series - Laurent–Padé approximant - Chebyshev–Padé approximant - Clenshaw–Lord approximant - end-point singularities Classification Cloud service Composition Computer Vision Data Mining domain model domestic communication Domestic communication technologies Drone Dynamic Web Services elasticity enterprise education enterprising staff Event Driven Architectures features extraction Formal specification Health informatics Indoor Localisation Information Management Information Security Intelligent Systems Interaction interface interface design interface designs Itemset Judder Knowledge acquisition Knowledge extraction Knowledge graph extraction Knowledge Representation Knowledge-based system Machine Learning Machine tool calibration automation management report web analytics undergraduate projects enterprise metrology uncertainty surface texture parameter Model predictive control Multi-Modal Sensing Natural Language Understanding Neural Network object-centred model Ontology OWL Partial observability Path planning Pathfinding pattern Phishing Phishing Dataset phishing websites Planning and Scheduling Portfolios methods for argumentation Process mining Protégé QoS Quality of Service Radial basis function Ramifications Real-Time Heuristic Search Real-Time Strategy Games Requirements capture • Formal specification • Knowledge representation Rule Scene Understanding Security Security auditing Service composition Service design Service discovery Service identification simulation consistence Smart Home Solvers for argumentation problems spectral methods - collocation - differentiation matrices - boundary value problems - solid mechanics Speed limit constraints Surface reconstruction Text Message Processing Thermo-elastic Theta* Training Phase Trajectory planning ubiquitous computing Urban traffic control Validation trend mining Longitudinal data Temporal databases Verification Web Threat Website features wizard of oz
Number of items at this level: 115.

A*

Chrpa, Lukáš and Osborne, Hugh (2014) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems, 75 (2). pp. 243-270. ISSN 0921-0296

Abstract argumentation

Cerutti, Federico, Vallati, Mauro and Giacomin, Massimiliano (2017) On the Impact of Configuration on Abstract Argumentation Automated Reasoning. International Journal of Approximate Reasoning, 92. pp. 120-138. ISSN 0888-613X

Active Contours

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

Activity Recognition

Baryannis, George, Woznowski, Przemyslaw and Antoniou, Grigoris (2016) Rule-Based Real-Time ADL Recognition in a Smart Home Environment. In: Rule Technologies. Research, Tools, and Applications. Lecture Notes in Computer Science, 9718 . Springer International Publishing, pp. 325-340. ISBN 978-3-319-42018-9

ADL

Baryannis, George, Woznowski, Przemyslaw and Antoniou, Grigoris (2016) Rule-Based Real-Time ADL Recognition in a Smart Home Environment. In: Rule Technologies. Research, Tools, and Applications. Lecture Notes in Computer Science, 9718 . Springer International Publishing, pp. 325-340. ISBN 978-3-319-42018-9

Associative Classification

Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Associative Classification Text Categorisation Document Classification

Barnes, Andrew, McCluskey, T.L. and Osborne, Hugh (2008) Benefits of associative classification within text categorisation. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 34-39. ISBN 978-1-86218-067-3

Automated

Khan, Saad and Parkinson, Simon (2017) Causal Connections Mining Within Security Event Logs. In: Proceedings of the 9th International Conference on Knowledge Capture. ACM. ISBN 9781450355537

automated planning

Jimoh, Falilat, Chrpa, Lukáš and Vallati, Mauro (2013) Autonomic System Architecture: An Automated Planning Perspective. In: Artificial Intelligence Applications and Innovations 2013. IFIP Advances in Information and Communication Technology, 412 (121). Springer, Pahpos, Cyprus, pp. 121-130. ISBN 9783642411410

Jimoh, Falilat, McCluskey, T.L. and Simon, Parkinson (2017) A Hybrid Approach to Process Planning: The Urban Traffic Controller Example. Journal of Computer Science, 13 (8). pp. 257-274. ISSN 1549-3636

Naveed, Munir, Kitchin, Diane E. and Crampton, Andrew (2009) Dynamic real-time hierarchical heuristic search for pathfinding. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 153-158. ISBN 9781862180857

Automatic configuration

Cerutti, Federico, Vallati, Mauro and Giacomin, Massimiliano (2017) On the Impact of Configuration on Abstract Argumentation Automated Reasoning. International Journal of Approximate Reasoning, 92. pp. 120-138. ISSN 0888-613X

autonomic nervous system

Jimoh, Falilat, Chrpa, Lukáš and Vallati, Mauro (2013) Autonomic System Architecture: An Automated Planning Perspective. In: Artificial Intelligence Applications and Innovations 2013. IFIP Advances in Information and Communication Technology, 412 (121). Springer, Pahpos, Cyprus, pp. 121-130. ISBN 9783642411410

autonomic systems

Jimoh, Falilat, Chrpa, Lukáš and Vallati, Mauro (2013) Autonomic System Architecture: An Automated Planning Perspective. In: Artificial Intelligence Applications and Innovations 2013. IFIP Advances in Information and Communication Technology, 412 (121). Springer, Pahpos, Cyprus, pp. 121-130. ISBN 9783642411410

autonomic systems automated planning and scheduling control systems

Jimoh, F. and McCluskey, T.L. (2012) Using automated planning to enable autonomic properties in computer systems. In: Proceedings of The Queen’s Diamond Jubilee Computing and Engineering Annual Researchers’ Conference 2012: CEARC’12. University of Huddersfield, Huddersfield, p. 150. ISBN 978-1-86218-106-9

Autonomous

Saad, Khan and Simon, Parkinson (2017) Towards A Multi-tiered Knowledge-based System for Autonomous Cloud Security Auditing. In: Proceedings of the AAAI-17 Workshop on Artificial Intelligence for Cyber Security (AICS). AAAI.

Boundary effect

Zhang, X., Jiang, Xiang and Crampton, Andrew (2007) Numerical Analysis of the Boundary Effect of Radial Basis Functions in 3D Surface Reconstruction. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-6.

Brake

Bryant, David, Crampton, Andrew, Fieldhouse, John D. and Talbot, Chris J. (2006) Discussion of characteristics of brake judder and the necessary data acquisition system for complete analysis. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.

Causal

Khan, Saad and Parkinson, Simon (2017) Causal Connections Mining Within Security Event Logs. In: Proceedings of the 9th International Conference on Knowledge Capture. ACM. ISBN 9781450355537

Centre treatment

Zhang, X., Jiang, Xiang and Crampton, Andrew (2007) Numerical Analysis of the Boundary Effect of Radial Basis Functions in 3D Surface Reconstruction. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-6.

Chebyshev series - Laurent series - Laurent–Padé approximant - Chebyshev–Padé approximant - Clenshaw–Lord approximant - end-point singularities

Mason, John C. and Crampton, Andrew (2005) Laurent-Pade approximants to four kinds of Chebyshev polynomial expansion. Part 2. Clenshaw-Lord type approximants. Journal of Numerical Algorithms, 38 (1). pp. 19-29. ISSN 1572-9265

Classification

Alfazi, Abdullah, Sheng, Quan Z., Babar, Ali, Ruan, Wenjie and Qin, Yongrui (2017) Toward Unified Cloud Service Discovery for Enhanced Service Identification. In: The 6th Australasian Symposium on Service Research and Innovation (ASSRI'17), 19-20 October 2017, School of Information Technologies, University of Sydney. (Unpublished)

Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Cloud service

Alfazi, Abdullah, Sheng, Quan Z., Babar, Ali, Ruan, Wenjie and Qin, Yongrui (2017) Toward Unified Cloud Service Discovery for Enhanced Service Identification. In: The 6th Australasian Symposium on Service Research and Innovation (ASSRI'17), 19-20 October 2017, School of Information Technologies, University of Sydney. (Unpublished)

Composition

Mustafa, Faisal and McCluskey, T.L. (2008) Dynamic web services composition: current issues. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 48-54. ISBN 978-1-86218-067-3

Computer Vision

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

Data Mining

Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2015) Tutorial and Critical Analysis of Phishing Websites Methods. Computer Science Review, 17. pp. 1-24. ISSN 1574-0137

domain model

Shah, Mohammad Munshi Shahin, McCluskey, T.L. and West, Margaret M. (2009) A study of synthesizing artificial intelligence (AI) planning domain models by using object constraints. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 64-69. ISBN 9781862180857

domestic communication

Li, Andol X and Bonner, John V.H. (2009) Designing interfaces to visualise domestic communication patterns. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 88-92. ISBN 9781862180857

Li, Andol X and Bonner, John V.H. (2010) Improving prototype consistence for wizard-of-oz simulations and evaluations. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 136-141. ISBN 9781862180932

Domestic communication technologies

Bonner, John V.H. (2009) Adding critical sensibilities to domestic communication technologies. International Journal of Human-Computer Studies, 67 (2). pp. 215-221. ISSN 1071-5819

Drone

Bryant, David, Crampton, Andrew, Fieldhouse, John D. and Talbot, Chris J. (2006) Discussion of characteristics of brake judder and the necessary data acquisition system for complete analysis. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.

Dynamic Web Services

Mustafa, Faisal and McCluskey, T.L. (2008) Dynamic web services composition: current issues. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 48-54. ISBN 978-1-86218-067-3

elasticity

Talbot, Chris J. and Crampton, Andrew (2005) Application of the pseudo-spectral method to 2D eigenvalue problems in elasticity. Journal of Numerical Algorithms 38 Special Issue: Chebyshev Polynomials, 38. pp. 95-110. ISSN 1017-139

enterprise education

Newman, Christopher D and Sturdy, Paula (2012) Identifying Enterprise Opportunities in Student Projects. Project Report. Enterprise Educators UK.

enterprising staff

Newman, Christopher D and Sturdy, Paula (2012) Identifying Enterprise Opportunities in Student Projects. Project Report. Enterprise Educators UK.

Event Driven Architectures

Baryannis, George, Woznowski, Przemyslaw and Antoniou, Grigoris (2016) Rule-Based Real-Time ADL Recognition in a Smart Home Environment. In: Rule Technologies. Research, Tools, and Applications. Lecture Notes in Computer Science, 9718 . Springer International Publishing, pp. 325-340. ISBN 978-3-319-42018-9

features extraction

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

Formal specification

Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386

Health informatics

Gatta, Roberto, Vallati, Mauro, Lenkowicz, Jacopo, Rojas, Eric, Damiani, Andrea, Sacchi, Lucia, De Bari, Berardino, Dagliati, Arianna, Fernandez-Llatas, Carlos, Montesi, Matteo, Marchetti, Antonio, Castellano, Maurizio and Valentini, Vincenzo (2017) Generating and Comparing Knowledge Graphs of Medical Processes Using pMineR. In: Proceedings of the 2017 Conference on Knowledge Capture (K-CAP). ACM. ISBN 9781450355537

Indoor Localisation

Baryannis, George, Woznowski, Przemyslaw and Antoniou, Grigoris (2016) Rule-Based Real-Time ADL Recognition in a Smart Home Environment. In: Rule Technologies. Research, Tools, and Applications. Lecture Notes in Computer Science, 9718 . Springer International Publishing, pp. 325-340. ISBN 978-3-319-42018-9

Information Management

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

Information Security

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

Intelligent Systems

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

Interaction interface

Li, Andol X and Bonner, John V.H. (2009) Designing interfaces to visualise domestic communication patterns. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 88-92. ISBN 9781862180857

interface design

Li, Andol X and Bonner, John V.H. (2009) Designing interfaces to visualise domestic communication patterns. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 88-92. ISBN 9781862180857

interface designs

Li, Andol X and Bonner, John V.H. (2010) Improving prototype consistence for wizard-of-oz simulations and evaluations. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 136-141. ISBN 9781862180932

Itemset

Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Judder

Bryant, David, Crampton, Andrew, Fieldhouse, John D. and Talbot, Chris J. (2006) Discussion of characteristics of brake judder and the necessary data acquisition system for complete analysis. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.

Knowledge acquisition

Shah, Mohammad Munshi Shahin, McCluskey, T.L. and West, Margaret M. (2009) A study of synthesizing artificial intelligence (AI) planning domain models by using object constraints. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 64-69. ISBN 9781862180857

Knowledge extraction

Khan, Saad and Parkinson, Simon (2017) Causal Connections Mining Within Security Event Logs. In: Proceedings of the 9th International Conference on Knowledge Capture. ACM. ISBN 9781450355537

Knowledge graph extraction

Gatta, Roberto, Vallati, Mauro, Lenkowicz, Jacopo, Rojas, Eric, Damiani, Andrea, Sacchi, Lucia, De Bari, Berardino, Dagliati, Arianna, Fernandez-Llatas, Carlos, Montesi, Matteo, Marchetti, Antonio, Castellano, Maurizio and Valentini, Vincenzo (2017) Generating and Comparing Knowledge Graphs of Medical Processes Using pMineR. In: Proceedings of the 2017 Conference on Knowledge Capture (K-CAP). ACM. ISBN 9781450355537

Knowledge Representation

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

Knowledge-based system

Saad, Khan and Simon, Parkinson (2017) Towards A Multi-tiered Knowledge-based System for Autonomous Cloud Security Auditing. In: Proceedings of the AAAI-17 Workshop on Artificial Intelligence for Cyber Security (AICS). AAAI.

Machine Learning

McCluskey, T.L., Cresswell, S.N., Richardson, N.E. and West, Margaret M. (2010) Action Knowledge Acquisition with Opmaker2. In: Agents and Artificial Intelligence. Communications in Computer and Information Science, 67 . Springer, pp. 137-150. ISBN 978-3-642-11818-0

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2015) Tutorial and Critical Analysis of Phishing Websites Methods. Computer Science Review, 17. pp. 1-24. ISSN 1574-0137

Machine tool calibration automation

Parkinson, S., Longstaff, Andrew P., Crampton, Andrew, Fletcher, Simon, Allen, Gary and Myers, Alan (2012) Automation as a Solution for Machine Tool Calibration Planning. In: Proceedings of The Queen’s Diamond Jubilee Computing and Engineering Annual Researchers’ Conference 2012: CEARC’12. University of Huddersfield, Huddersfield, pp. 57-62. ISBN 978-1-86218-106-9

management report web analytics undergraduate projects enterprise

Newman, Christopher D, Sturdy, Paula and Wilson, David R (2010) FormWatch Project: Management Summary Report. Project Report. University of Huddersfield, Huddersfield, UK.

metrology uncertainty surface texture parameter

Brennan, James K., Jiang, Xiang, Crampton, Andrew and Leach, Richard K. (2006) Propagation of measurement uncertainty for surface texture parameters. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.

Model predictive control

Jimoh, Falilat, McCluskey, T.L. and Simon, Parkinson (2017) A Hybrid Approach to Process Planning: The Urban Traffic Controller Example. Journal of Computer Science, 13 (8). pp. 257-274. ISSN 1549-3636

Multi-Modal Sensing

Baryannis, George, Woznowski, Przemyslaw and Antoniou, Grigoris (2016) Rule-Based Real-Time ADL Recognition in a Smart Home Environment. In: Rule Technologies. Research, Tools, and Applications. Lecture Notes in Computer Science, 9718 . Springer International Publishing, pp. 325-340. ISBN 978-3-319-42018-9

Natural Language Understanding

Jilani, Aisha (2010) Mobile Phone Text Processing and Question-Answering. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 130-135. ISBN 9781862180932

Neural Network

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

object-centred model

Shah, Mohammad Munshi Shahin, McCluskey, T.L. and West, Margaret M. (2009) A study of synthesizing artificial intelligence (AI) planning domain models by using object constraints. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 64-69. ISBN 9781862180857

Ontology

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

OWL

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

Partial observability

Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386

Path planning

Chrpa, Lukáš and Osborne, Hugh (2014) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems, 75 (2). pp. 243-270. ISSN 0921-0296

Pathfinding

Naveed, Munir, Kitchin, Diane E. and Crampton, Andrew (2009) Dynamic real-time hierarchical heuristic search for pathfinding. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 153-158. ISBN 9781862180857

pattern

Li, Andol X and Bonner, John V.H. (2009) Designing interfaces to visualise domestic communication patterns. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 88-92. ISBN 9781862180857

Phishing

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

Phishing Dataset

Mohammad, Rami, Thabtah, Fadi and McCluskey, T.L. (2015) Phishing Websites Dataset. [Dataset] (Unpublished)

phishing websites

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2015) Tutorial and Critical Analysis of Phishing Websites Methods. Computer Science Review, 17. pp. 1-24. ISSN 1574-0137

Planning and Scheduling

McCluskey, T.L., Cresswell, S.N., Richardson, N.E. and West, Margaret M. (2010) Action Knowledge Acquisition with Opmaker2. In: Agents and Artificial Intelligence. Communications in Computer and Information Science, 67 . Springer, pp. 137-150. ISBN 978-3-642-11818-0

Portfolios methods for argumentation

Cerutti, Federico, Vallati, Mauro and Giacomin, Massimiliano (2017) On the Impact of Configuration on Abstract Argumentation Automated Reasoning. International Journal of Approximate Reasoning, 92. pp. 120-138. ISSN 0888-613X

Process mining

Gatta, Roberto, Vallati, Mauro, Lenkowicz, Jacopo, Rojas, Eric, Damiani, Andrea, Sacchi, Lucia, De Bari, Berardino, Dagliati, Arianna, Fernandez-Llatas, Carlos, Montesi, Matteo, Marchetti, Antonio, Castellano, Maurizio and Valentini, Vincenzo (2017) Generating and Comparing Knowledge Graphs of Medical Processes Using pMineR. In: Proceedings of the 2017 Conference on Knowledge Capture (K-CAP). ACM. ISBN 9781450355537

Protégé

Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)

QoS

Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386

Quality of Service

Mustafa, Faisal and McCluskey, T.L. (2008) Dynamic web services composition: current issues. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 48-54. ISBN 978-1-86218-067-3

Radial basis function

Zhang, X., Jiang, Xiang and Crampton, Andrew (2007) Numerical Analysis of the Boundary Effect of Radial Basis Functions in 3D Surface Reconstruction. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-6.

Ramifications

Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386

Real-Time Heuristic Search

Naveed, Munir, Kitchin, Diane E. and Crampton, Andrew (2009) Dynamic real-time hierarchical heuristic search for pathfinding. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 153-158. ISBN 9781862180857

Real-Time Strategy Games

Naveed, Munir, Kitchin, Diane E. and Crampton, Andrew (2009) Dynamic real-time hierarchical heuristic search for pathfinding. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 153-158. ISBN 9781862180857

Requirements capture • Formal specification • Knowledge representation

McCluskey, T.L., Porteous, J.M., Naik, Y., Taylor, C. N. and Jones, S. (1995) A requirements capture method and its use in an air traffic control application. Software: Practice and Experience, 25 (1). pp. 47-71. ISSN 0038-0644

Rule

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

Scene Understanding

Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1

Security

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

Security auditing

Saad, Khan and Simon, Parkinson (2017) Towards A Multi-tiered Knowledge-based System for Autonomous Cloud Security Auditing. In: Proceedings of the AAAI-17 Workshop on Artificial Intelligence for Cyber Security (AICS). AAAI.

Service composition

Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386

Service design

Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386

Service discovery

Alfazi, Abdullah, Sheng, Quan Z., Babar, Ali, Ruan, Wenjie and Qin, Yongrui (2017) Toward Unified Cloud Service Discovery for Enhanced Service Identification. In: The 6th Australasian Symposium on Service Research and Innovation (ASSRI'17), 19-20 October 2017, School of Information Technologies, University of Sydney. (Unpublished)

Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386

Service identification

Alfazi, Abdullah, Sheng, Quan Z., Babar, Ali, Ruan, Wenjie and Qin, Yongrui (2017) Toward Unified Cloud Service Discovery for Enhanced Service Identification. In: The 6th Australasian Symposium on Service Research and Innovation (ASSRI'17), 19-20 October 2017, School of Information Technologies, University of Sydney. (Unpublished)

simulation consistence

Li, Andol X and Bonner, John V.H. (2010) Improving prototype consistence for wizard-of-oz simulations and evaluations. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 136-141. ISBN 9781862180932

Smart Home

Baryannis, George, Woznowski, Przemyslaw and Antoniou, Grigoris (2016) Rule-Based Real-Time ADL Recognition in a Smart Home Environment. In: Rule Technologies. Research, Tools, and Applications. Lecture Notes in Computer Science, 9718 . Springer International Publishing, pp. 325-340. ISBN 978-3-319-42018-9

Solvers for argumentation problems

Cerutti, Federico, Vallati, Mauro and Giacomin, Massimiliano (2017) On the Impact of Configuration on Abstract Argumentation Automated Reasoning. International Journal of Approximate Reasoning, 92. pp. 120-138. ISSN 0888-613X

spectral methods - collocation - differentiation matrices - boundary value problems - solid mechanics

Talbot, Chris J. and Crampton, Andrew (2005) Application of the pseudo-spectral method to 2D eigenvalue problems in elasticity. Journal of Numerical Algorithms 38 Special Issue: Chebyshev Polynomials, 38. pp. 95-110. ISSN 1017-139

Speed limit constraints

Chrpa, Lukáš and Osborne, Hugh (2014) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems, 75 (2). pp. 243-270. ISSN 0921-0296

Surface reconstruction

Zhang, X., Jiang, Xiang and Crampton, Andrew (2007) Numerical Analysis of the Boundary Effect of Radial Basis Functions in 3D Surface Reconstruction. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-6.

Text Message Processing

Jilani, Aisha (2010) Mobile Phone Text Processing and Question-Answering. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 130-135. ISBN 9781862180932

Thermo-elastic

Bryant, David, Crampton, Andrew, Fieldhouse, John D. and Talbot, Chris J. (2006) Discussion of characteristics of brake judder and the necessary data acquisition system for complete analysis. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.

Theta*

Chrpa, Lukáš and Osborne, Hugh (2014) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems, 75 (2). pp. 243-270. ISSN 0921-0296

Training Phase

Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.

Trajectory planning

Chrpa, Lukáš and Osborne, Hugh (2014) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems, 75 (2). pp. 243-270. ISSN 0921-0296

ubiquitous computing

Bonner, John V.H. (2009) Adding critical sensibilities to domestic communication technologies. International Journal of Human-Computer Studies, 67 (2). pp. 215-221. ISSN 1071-5819

Urban traffic control

Jimoh, Falilat, McCluskey, T.L. and Simon, Parkinson (2017) A Hybrid Approach to Process Planning: The Urban Traffic Controller Example. Journal of Computer Science, 13 (8). pp. 257-274. ISSN 1549-3636

Validation trend mining Longitudinal data Temporal databases

Somaraki, V. and McCluskey, T.L. (2012) A robust validation framework for trend mining : a study in diabetic retinopathy. In: Proceedings of The Queen’s Diamond Jubilee Computing and Engineering Annual Researchers’ Conference 2012: CEARC’12. University of Huddersfield, Huddersfield, pp. 63-68. ISBN 978-1-86218-106-9

Verification

Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386

Web Threat

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461

Website features

Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0

wizard of oz

Li, Andol X and Bonner, John V.H. (2010) Improving prototype consistence for wizard-of-oz simulations and evaluations. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 136-141. ISBN 9781862180932

This list was generated on Thu Apr 18 22:22:00 2024 UTC.