Chrpa, Lukáš and Osborne, Hugh (2014) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems, 75 (2). pp. 243-270. ISSN 0921-0296
Cerutti, Federico, Vallati, Mauro and Giacomin, Massimiliano (2017) On the Impact of Configuration on Abstract Argumentation Automated Reasoning. International Journal of Approximate Reasoning, 92. pp. 120-138. ISSN 0888-613X
Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1
Baryannis, George, Woznowski, Przemyslaw and Antoniou, Grigoris (2016) Rule-Based Real-Time ADL Recognition in a Smart Home Environment. In: Rule Technologies. Research, Tools, and Applications. Lecture Notes in Computer Science, 9718 . Springer International Publishing, pp. 325-340. ISBN 978-3-319-42018-9
Baryannis, George, Woznowski, Przemyslaw and Antoniou, Grigoris (2016) Rule-Based Real-Time ADL Recognition in a Smart Home Environment. In: Rule Technologies. Research, Tools, and Applications. Lecture Notes in Computer Science, 9718 . Springer International Publishing, pp. 325-340. ISBN 978-3-319-42018-9
Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.
Barnes, Andrew, McCluskey, T.L. and Osborne, Hugh (2008) Benefits of associative classification within text categorisation. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 34-39. ISBN 978-1-86218-067-3
Khan, Saad and Parkinson, Simon (2017) Causal Connections Mining Within Security Event Logs. In: Proceedings of the 9th International Conference on Knowledge Capture. ACM. ISBN 9781450355537
Jimoh, Falilat, Chrpa, Lukáš and Vallati, Mauro (2013) Autonomic System Architecture: An Automated Planning Perspective. In: Artificial Intelligence Applications and Innovations 2013. IFIP Advances in Information and Communication Technology, 412 (121). Springer, Pahpos, Cyprus, pp. 121-130. ISBN 9783642411410
Jimoh, Falilat, McCluskey, T.L. and Simon, Parkinson (2017) A Hybrid Approach to Process Planning: The Urban Traffic Controller Example. Journal of Computer Science, 13 (8). pp. 257-274. ISSN 1549-3636
Naveed, Munir, Kitchin, Diane E. and Crampton, Andrew (2009) Dynamic real-time hierarchical heuristic search for pathfinding. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 153-158. ISBN 9781862180857
Cerutti, Federico, Vallati, Mauro and Giacomin, Massimiliano (2017) On the Impact of Configuration on Abstract Argumentation Automated Reasoning. International Journal of Approximate Reasoning, 92. pp. 120-138. ISSN 0888-613X
Jimoh, Falilat, Chrpa, Lukáš and Vallati, Mauro (2013) Autonomic System Architecture: An Automated Planning Perspective. In: Artificial Intelligence Applications and Innovations 2013. IFIP Advances in Information and Communication Technology, 412 (121). Springer, Pahpos, Cyprus, pp. 121-130. ISBN 9783642411410
Jimoh, Falilat, Chrpa, Lukáš and Vallati, Mauro (2013) Autonomic System Architecture: An Automated Planning Perspective. In: Artificial Intelligence Applications and Innovations 2013. IFIP Advances in Information and Communication Technology, 412 (121). Springer, Pahpos, Cyprus, pp. 121-130. ISBN 9783642411410
Jimoh, F. and McCluskey, T.L. (2012) Using automated planning to enable autonomic properties in computer systems. In: Proceedings of The Queen’s Diamond Jubilee Computing and Engineering Annual Researchers’ Conference 2012: CEARC’12. University of Huddersfield, Huddersfield, p. 150. ISBN 978-1-86218-106-9
Saad, Khan and Simon, Parkinson (2017) Towards A Multi-tiered Knowledge-based System for Autonomous Cloud Security Auditing. In: Proceedings of the AAAI-17 Workshop on Artificial Intelligence for Cyber Security (AICS). AAAI.
Zhang, X., Jiang, Xiang and Crampton, Andrew (2007) Numerical Analysis of the Boundary Effect of Radial Basis Functions in 3D Surface Reconstruction. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-6.
Bryant, David, Crampton, Andrew, Fieldhouse, John D. and Talbot, Chris J. (2006) Discussion of characteristics of brake judder and the necessary data acquisition system for complete analysis. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.
Khan, Saad and Parkinson, Simon (2017) Causal Connections Mining Within Security Event Logs. In: Proceedings of the 9th International Conference on Knowledge Capture. ACM. ISBN 9781450355537
Zhang, X., Jiang, Xiang and Crampton, Andrew (2007) Numerical Analysis of the Boundary Effect of Radial Basis Functions in 3D Surface Reconstruction. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-6.
Mason, John C. and Crampton, Andrew (2005) Laurent-Pade approximants to four kinds of Chebyshev polynomial expansion. Part 2. Clenshaw-Lord type approximants. Journal of Numerical Algorithms, 38 (1). pp. 19-29. ISSN 1572-9265
Alfazi, Abdullah, Sheng, Quan Z., Babar, Ali, Ruan, Wenjie and Qin, Yongrui (2017) Toward Unified Cloud Service Discovery for Enhanced Service Identification. In: The 6th Australasian Symposium on Service Research and Innovation (ASSRI'17), 19-20 October 2017, School of Information Technologies, University of Sydney. (Unpublished)
Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.
Alfazi, Abdullah, Sheng, Quan Z., Babar, Ali, Ruan, Wenjie and Qin, Yongrui (2017) Toward Unified Cloud Service Discovery for Enhanced Service Identification. In: The 6th Australasian Symposium on Service Research and Innovation (ASSRI'17), 19-20 October 2017, School of Information Technologies, University of Sydney. (Unpublished)
Mustafa, Faisal and McCluskey, T.L. (2008) Dynamic web services composition: current issues. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 48-54. ISBN 978-1-86218-067-3
Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1
Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.
Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461
Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2015) Tutorial and Critical Analysis of Phishing Websites Methods. Computer Science Review, 17. pp. 1-24. ISSN 1574-0137
Shah, Mohammad Munshi Shahin, McCluskey, T.L. and West, Margaret M. (2009) A study of synthesizing artificial intelligence (AI) planning domain models by using object constraints. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 64-69. ISBN 9781862180857
Li, Andol X and Bonner, John V.H. (2009) Designing interfaces to visualise domestic communication patterns. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 88-92. ISBN 9781862180857
Li, Andol X and Bonner, John V.H. (2010) Improving prototype consistence for wizard-of-oz simulations and evaluations. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 136-141. ISBN 9781862180932
Bonner, John V.H. (2009) Adding critical sensibilities to domestic communication technologies. International Journal of Human-Computer Studies, 67 (2). pp. 215-221. ISSN 1071-5819
Bryant, David, Crampton, Andrew, Fieldhouse, John D. and Talbot, Chris J. (2006) Discussion of characteristics of brake judder and the necessary data acquisition system for complete analysis. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.
Mustafa, Faisal and McCluskey, T.L. (2008) Dynamic web services composition: current issues. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 48-54. ISBN 978-1-86218-067-3
Talbot, Chris J. and Crampton, Andrew (2005) Application of the pseudo-spectral method to 2D eigenvalue problems in elasticity. Journal of Numerical Algorithms 38 Special Issue: Chebyshev Polynomials, 38. pp. 95-110. ISSN 1017-139
Newman, Christopher D and Sturdy, Paula (2012) Identifying Enterprise Opportunities in Student Projects. Project Report. Enterprise Educators UK.
Newman, Christopher D and Sturdy, Paula (2012) Identifying Enterprise Opportunities in Student Projects. Project Report. Enterprise Educators UK.
Baryannis, George, Woznowski, Przemyslaw and Antoniou, Grigoris (2016) Rule-Based Real-Time ADL Recognition in a Smart Home Environment. In: Rule Technologies. Research, Tools, and Applications. Lecture Notes in Computer Science, 9718 . Springer International Publishing, pp. 325-340. ISBN 978-3-319-42018-9
Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0
Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386
Gatta, Roberto, Vallati, Mauro, Lenkowicz, Jacopo, Rojas, Eric, Damiani, Andrea, Sacchi, Lucia, De Bari, Berardino, Dagliati, Arianna, Fernandez-Llatas, Carlos, Montesi, Matteo, Marchetti, Antonio, Castellano, Maurizio and Valentini, Vincenzo (2017) Generating and Comparing Knowledge Graphs of Medical Processes Using pMineR. In: Proceedings of the 2017 Conference on Knowledge Capture (K-CAP). ACM. ISBN 9781450355537
Baryannis, George, Woznowski, Przemyslaw and Antoniou, Grigoris (2016) Rule-Based Real-Time ADL Recognition in a Smart Home Environment. In: Rule Technologies. Research, Tools, and Applications. Lecture Notes in Computer Science, 9718 . Springer International Publishing, pp. 325-340. ISBN 978-3-319-42018-9
Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)
Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461
Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1
Li, Andol X and Bonner, John V.H. (2009) Designing interfaces to visualise domestic communication patterns. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 88-92. ISBN 9781862180857
Li, Andol X and Bonner, John V.H. (2009) Designing interfaces to visualise domestic communication patterns. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 88-92. ISBN 9781862180857
Li, Andol X and Bonner, John V.H. (2010) Improving prototype consistence for wizard-of-oz simulations and evaluations. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 136-141. ISBN 9781862180932
Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.
Bryant, David, Crampton, Andrew, Fieldhouse, John D. and Talbot, Chris J. (2006) Discussion of characteristics of brake judder and the necessary data acquisition system for complete analysis. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.
Shah, Mohammad Munshi Shahin, McCluskey, T.L. and West, Margaret M. (2009) A study of synthesizing artificial intelligence (AI) planning domain models by using object constraints. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 64-69. ISBN 9781862180857
Khan, Saad and Parkinson, Simon (2017) Causal Connections Mining Within Security Event Logs. In: Proceedings of the 9th International Conference on Knowledge Capture. ACM. ISBN 9781450355537
Gatta, Roberto, Vallati, Mauro, Lenkowicz, Jacopo, Rojas, Eric, Damiani, Andrea, Sacchi, Lucia, De Bari, Berardino, Dagliati, Arianna, Fernandez-Llatas, Carlos, Montesi, Matteo, Marchetti, Antonio, Castellano, Maurizio and Valentini, Vincenzo (2017) Generating and Comparing Knowledge Graphs of Medical Processes Using pMineR. In: Proceedings of the 2017 Conference on Knowledge Capture (K-CAP). ACM. ISBN 9781450355537
Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)
Saad, Khan and Simon, Parkinson (2017) Towards A Multi-tiered Knowledge-based System for Autonomous Cloud Security Auditing. In: Proceedings of the AAAI-17 Workshop on Artificial Intelligence for Cyber Security (AICS). AAAI.
McCluskey, T.L., Cresswell, S.N., Richardson, N.E. and West, Margaret M. (2010) Action Knowledge Acquisition with Opmaker2. In: Agents and Artificial Intelligence. Communications in Computer and Information Science, 67 . Springer, pp. 137-150. ISBN 978-3-642-11818-0
Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2015) Tutorial and Critical Analysis of Phishing Websites Methods. Computer Science Review, 17. pp. 1-24. ISSN 1574-0137
Parkinson, S., Longstaff, Andrew P., Crampton, Andrew, Fletcher, Simon, Allen, Gary and Myers, Alan (2012) Automation as a Solution for Machine Tool Calibration Planning. In: Proceedings of The Queen’s Diamond Jubilee Computing and Engineering Annual Researchers’ Conference 2012: CEARC’12. University of Huddersfield, Huddersfield, pp. 57-62. ISBN 978-1-86218-106-9
Newman, Christopher D, Sturdy, Paula and Wilson, David R (2010) FormWatch Project: Management Summary Report. Project Report. University of Huddersfield, Huddersfield, UK.
Brennan, James K., Jiang, Xiang, Crampton, Andrew and Leach, Richard K. (2006) Propagation of measurement uncertainty for surface texture parameters. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.
Jimoh, Falilat, McCluskey, T.L. and Simon, Parkinson (2017) A Hybrid Approach to Process Planning: The Urban Traffic Controller Example. Journal of Computer Science, 13 (8). pp. 257-274. ISSN 1549-3636
Baryannis, George, Woznowski, Przemyslaw and Antoniou, Grigoris (2016) Rule-Based Real-Time ADL Recognition in a Smart Home Environment. In: Rule Technologies. Research, Tools, and Applications. Lecture Notes in Computer Science, 9718 . Springer International Publishing, pp. 325-340. ISBN 978-3-319-42018-9
Jilani, Aisha (2010) Mobile Phone Text Processing and Question-Answering. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 130-135. ISBN 9781862180932
Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461
Shah, Mohammad Munshi Shahin, McCluskey, T.L. and West, Margaret M. (2009) A study of synthesizing artificial intelligence (AI) planning domain models by using object constraints. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 64-69. ISBN 9781862180857
Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1
Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)
Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)
Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386
Chrpa, Lukáš and Osborne, Hugh (2014) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems, 75 (2). pp. 243-270. ISSN 0921-0296
Naveed, Munir, Kitchin, Diane E. and Crampton, Andrew (2009) Dynamic real-time hierarchical heuristic search for pathfinding. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 153-158. ISBN 9781862180857
Li, Andol X and Bonner, John V.H. (2009) Designing interfaces to visualise domestic communication patterns. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 88-92. ISBN 9781862180857
Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0
Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461
Mohammad, Rami, Thabtah, Fadi and McCluskey, T.L. (2015) Phishing Websites Dataset. [Dataset] (Unpublished)
Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2015) Tutorial and Critical Analysis of Phishing Websites Methods. Computer Science Review, 17. pp. 1-24. ISSN 1574-0137
McCluskey, T.L., Cresswell, S.N., Richardson, N.E. and West, Margaret M. (2010) Action Knowledge Acquisition with Opmaker2. In: Agents and Artificial Intelligence. Communications in Computer and Information Science, 67 . Springer, pp. 137-150. ISBN 978-3-642-11818-0
Cerutti, Federico, Vallati, Mauro and Giacomin, Massimiliano (2017) On the Impact of Configuration on Abstract Argumentation Automated Reasoning. International Journal of Approximate Reasoning, 92. pp. 120-138. ISSN 0888-613X
Gatta, Roberto, Vallati, Mauro, Lenkowicz, Jacopo, Rojas, Eric, Damiani, Andrea, Sacchi, Lucia, De Bari, Berardino, Dagliati, Arianna, Fernandez-Llatas, Carlos, Montesi, Matteo, Marchetti, Antonio, Castellano, Maurizio and Valentini, Vincenzo (2017) Generating and Comparing Knowledge Graphs of Medical Processes Using pMineR. In: Proceedings of the 2017 Conference on Knowledge Capture (K-CAP). ACM. ISBN 9781450355537
Olszewska, Joanna Isabelle, Simpson, Ron and McCluskey, T.L. (2011) Appendix A: ePrOnto: OWL-Based Ontology for Research Information Management. In: JISC final Report: BRIM project Version: 1.0. JISC, pp. 24-31. (Unpublished)
Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386
Mustafa, Faisal and McCluskey, T.L. (2008) Dynamic web services composition: current issues. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2008: CEARC’08. University of Huddersfield, Huddersfield, pp. 48-54. ISBN 978-1-86218-067-3
Zhang, X., Jiang, Xiang and Crampton, Andrew (2007) Numerical Analysis of the Boundary Effect of Radial Basis Functions in 3D Surface Reconstruction. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-6.
Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386
Naveed, Munir, Kitchin, Diane E. and Crampton, Andrew (2009) Dynamic real-time hierarchical heuristic search for pathfinding. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 153-158. ISBN 9781862180857
Naveed, Munir, Kitchin, Diane E. and Crampton, Andrew (2009) Dynamic real-time hierarchical heuristic search for pathfinding. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2009: CEARC’09. University of Huddersfield, Huddersfield, pp. 153-158. ISBN 9781862180857
McCluskey, T.L., Porteous, J.M., Naik, Y., Taylor, C. N. and Jones, S. (1995) A requirements capture method and its use in an air traffic control application. Software: Practice and Experience, 25 (1). pp. 47-71. ISSN 0038-0644
Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0
Olszewska, Joanna Isabelle and McCluskey, Thomas L. (2011) Ontology-Coupled Active Contours for Dynamic Video Scene Understanding. In: Proceedings of the 15th IEEE International Conference on Intelligent Engineering Systems (INES),. IEEE, Poprad, High Tatras, Slovakia, pp. 369-374. ISBN 978-1-4244-8954-1
Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0
Saad, Khan and Simon, Parkinson (2017) Towards A Multi-tiered Knowledge-based System for Autonomous Cloud Security Auditing. In: Proceedings of the AAAI-17 Workshop on Artificial Intelligence for Cyber Security (AICS). AAAI.
Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386
Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386
Alfazi, Abdullah, Sheng, Quan Z., Babar, Ali, Ruan, Wenjie and Qin, Yongrui (2017) Toward Unified Cloud Service Discovery for Enhanced Service Identification. In: The 6th Australasian Symposium on Service Research and Innovation (ASSRI'17), 19-20 October 2017, School of Information Technologies, University of Sydney. (Unpublished)
Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386
Alfazi, Abdullah, Sheng, Quan Z., Babar, Ali, Ruan, Wenjie and Qin, Yongrui (2017) Toward Unified Cloud Service Discovery for Enhanced Service Identification. In: The 6th Australasian Symposium on Service Research and Innovation (ASSRI'17), 19-20 October 2017, School of Information Technologies, University of Sydney. (Unpublished)
Li, Andol X and Bonner, John V.H. (2010) Improving prototype consistence for wizard-of-oz simulations and evaluations. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 136-141. ISBN 9781862180932
Baryannis, George, Woznowski, Przemyslaw and Antoniou, Grigoris (2016) Rule-Based Real-Time ADL Recognition in a Smart Home Environment. In: Rule Technologies. Research, Tools, and Applications. Lecture Notes in Computer Science, 9718 . Springer International Publishing, pp. 325-340. ISBN 978-3-319-42018-9
Cerutti, Federico, Vallati, Mauro and Giacomin, Massimiliano (2017) On the Impact of Configuration on Abstract Argumentation Automated Reasoning. International Journal of Approximate Reasoning, 92. pp. 120-138. ISSN 0888-613X
Talbot, Chris J. and Crampton, Andrew (2005) Application of the pseudo-spectral method to 2D eigenvalue problems in elasticity. Journal of Numerical Algorithms 38 Special Issue: Chebyshev Polynomials, 38. pp. 95-110. ISSN 1017-139
Chrpa, Lukáš and Osborne, Hugh (2014) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems, 75 (2). pp. 243-270. ISSN 0921-0296
Zhang, X., Jiang, Xiang and Crampton, Andrew (2007) Numerical Analysis of the Boundary Effect of Radial Basis Functions in 3D Surface Reconstruction. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-6.
Jilani, Aisha (2010) Mobile Phone Text Processing and Question-Answering. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 130-135. ISBN 9781862180932
Bryant, David, Crampton, Andrew, Fieldhouse, John D. and Talbot, Chris J. (2006) Discussion of characteristics of brake judder and the necessary data acquisition system for complete analysis. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2006: CEARC’06. University of Huddersfield, Huddersfield, pp. 1-6.
Chrpa, Lukáš and Osborne, Hugh (2014) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems, 75 (2). pp. 243-270. ISSN 0921-0296
Mahmood, Qazafi, Thabtah, Fadi and McCluskey, T.L. (2007) Looking at the class associative classification training algorithm. In: Proceedings of Computing and Engineering Annual Researchers' Conference 2007: CEARC’07. University of Huddersfield, Huddersfield, pp. 1-9.
Chrpa, Lukáš and Osborne, Hugh (2014) Towards a Trajectory Planning Concept: Augmenting Path Planning Methods by Considering Speed Limit Constraints. Journal of Intelligent and Robotic Systems, 75 (2). pp. 243-270. ISSN 0921-0296
Bonner, John V.H. (2009) Adding critical sensibilities to domestic communication technologies. International Journal of Human-Computer Studies, 67 (2). pp. 215-221. ISSN 1071-5819
Jimoh, Falilat, McCluskey, T.L. and Simon, Parkinson (2017) A Hybrid Approach to Process Planning: The Urban Traffic Controller Example. Journal of Computer Science, 13 (8). pp. 257-274. ISSN 1549-3636
Somaraki, V. and McCluskey, T.L. (2012) A robust validation framework for trend mining : a study in diabetic retinopathy. In: Proceedings of The Queen’s Diamond Jubilee Computing and Engineering Annual Researchers’ Conference 2012: CEARC’12. University of Huddersfield, Huddersfield, pp. 63-68. ISBN 978-1-86218-106-9
Baryannis, George, Kritikos, Kyriakos and Plexousakis, Dimitris (2017) A specification-based QoS-aware design framework for service-based applications. Service Oriented Computing and Applications. ISSN 1863-2386
Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2013) Predicting Phishing Websites using Neural Network trained with Back-Propagation. In: Proceedings of the 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP 2013 . World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, Nevada, USA, pp. 682-686. ISBN 1601322461
Mohammad, Rami, McCluskey, T.L. and Thabtah, Fadi (2012) An Assessment of Features Related to Phishing Websites using an Automated Technique. In: International Conferece For Internet Technology And Secured Transactions. ICITST 2012 . IEEE, London, UK, pp. 492-497. ISBN 978-1-4673-5325-0
Li, Andol X and Bonner, John V.H. (2010) Improving prototype consistence for wizard-of-oz simulations and evaluations. In: Future Technologies in Computing and Engineering: Proceedings of Computing and Engineering Annual Researchers' Conference 2010: CEARC’10. University of Huddersfield, Huddersfield, pp. 136-141. ISBN 9781862180932