UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL Departments and Centres

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author | Type
Number of items: 288.

Article

Abdallah, S; (2010) Comment on "Unified View of Prediction and Repetition Structure in Audio Signals With Application to Interest Point Detection". IEEE Trans. Audio, Speech & Language Processing , 18 (5) pp. 1063-1065. 10.1109/TASL.2009.2031286.

Abdallah, SA; Plumbley, MD; (2010) A measure of statistical complexity based on predictive information. CoRR , abs/1012.1890

Antley, A; Slater, M; (2010) The effect on lower spine muscle activation of walking on a narrow beam in virtual reality. IEEE Transactions on Visualization and Computer Graphics (In press).

Arzano, M; Hamma, A; Severini, S; (2010) HIDDEN ENTANGLEMENT AND UNITARITY AT THE PLANCK SCALE. MOD PHYS LETT A , 25 (6) 437 - 445. 10.1142/S0217732310032603.

Auer, P; Hussain, Z; Kaski, S; Klami, A; Kujala, J; Laaksonen, J; Leung, AP; (2010) Pinview: Implicit Feedback in Content-Based Image Retrieval. WAPA , 11 pp. 51-57.

Bahsoon, R; Capra, L; Emmerich, W; Fayad, ME; (2010) Special Issue on Software Architecture and Mobility. Journal of Systems and Software , 83 (6) pp. 883-884. 10.1016/j.jss.2010.02.035.

Barré, S; Bonaventure, O; Raiciu, C; Handley, M; (2010) Experimenting with multipath TCP. SIGCOMM Comput. Commun. Rev. , 40 443 - 444.

Blandford, A; Gulliksen, J; Hvannberg, ET; Larusdottir, MK; (2010) NordiCHI 2010: Extending Boundaries - Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Preface. NordiCHI 2010: Extending Boundaries - Proceedings of the 6th Nordic Conference on Human-Computer Interaction

Bradde, S; Caccioli, F; Dall'Asta, L; Bianconi, G; (2010) Critical fluctuations in spatial complex networks. Physical Review Letters , 104 (21) 10.1103/PhysRevLett.104.218701.

Campbell, NDF; Vogiatzis, G; Hernández, C; Cipolla, R; (2010) Automatic 3D Object Segmentation in Multiple Views using Volumetric Graph-Cuts. Image and Vision Computing , 28 (1) 14 -25. 10.1016/j.imavis.2008.09.005. Green open access
file

Charpentier, A; Fontaine, C; Furon, T; Cox, IJ; (2010) An Asymmetric Fingerprinting Scheme based on Tardos Codes. CoRR , abs/10

Clegg, RG; Di Cairano-Gilfedder, C; Zhou, S; (2010) A critical look at power law modelling of the Internet. COMPUT COMMUN , 33 (3) 259 - 268. 10.1016/j.comcom.2009.09.009.

Codish, M; Fekete, Y; Fuhs, C; Schneider-Kamp, P; (2010) Optimal Base Encodings for Pseudo-Boolean Constraints. CoRR , abs/10

Dalton, NS; Conroy Dalton, R; (2010) Solutions for visibility-accessibility and signage problems via layered-graphs. The Journal of Space Syntax. , 1 (1) 164 - 176.

De Cristofaro, E; Kim, J; (2010) Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization. IEEE Security & Privacy , 8 (4) pp. 18-24.

DeCoro, C; Weyrich, T; Rusinkiewicz, S; (2010) Density-based Outlier Rejection in Monte Carlo Rendering. Computer Graphics Forum (Proc. Pacific Graphics 2010) , 29 (7) pp. 2119-2125.

Del Bue, A; Xavier, J; Agapito, L; Paladini, M; (2010) Bilinear factorization via augmented lagrange multipliers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , 6314 L (PART 4) pp. 283-296. 10.1007/978-3-642-15561-1_21.

Dillig, I; Dillig, T; Aiken, A; (2010) Precise reasoning for programs using containers. Conference Record of the Annual ACM Symposium on Principles of Programming Languages pp. 187-200. 10.1145/1926385.1926407.

Dillig, I; Dillig, T; Aiken, A; (2010) Reasoning about the unknown in static analysis. Communications of the ACM , 53 (8) pp. 115-123. 10.1145/1787234.1787259.

Dillig, I; Dillig, T; Aiken, A; (2010) Symbolic heap abstraction with demand-driven axiomatization of memory invariants. ACM SIGPLAN Notices , 45 (10) pp. 397-410. 10.1145/1932682.1869493.

Dorard, L; Shawe-Taylor, J; (2010) Gaussian Process Bandits for Tree Search. CoRR , abs/10

Drobnjak, I; Siow, B; Alexander, DC; (2010) Optimizing gradient waveforms for microstructure sensitivity in diffusion-weighted MR. J MAGN RESON , 206 (1) 41 - 51. 10.1016/j.jmr.2010.05.017.

Durniak, C; Samsonov, D; Oxtoby, NP; Ralph, JF; (2010) Molecular Dynamics Simulations of Dynamic Phenomena in Complex Plasmas. (to appear) IEEE TRANSACTIONS ON PLASMA SCIENCE , 6 , Article 1.

Fa, R; Lamare, RCD; Wang, L; (2010) Reduced-rank STAP schemes for airborne radar based on switched joint interpolation, decimation and filtering algorithm. IEEE Trans. Signal Processing , 58 (8) pp. 4182-4194. 10.1109/TSP.2010.2048212.

Filipovic, I; O'Hearn, PW; Rinetzky, N; Yang, H; (2010) Abstraction for concurrent objects. Theor. Comput. Sci. , 411 (51-52) pp. 4379-4398. 10.1016/j.tcs.2010.09.021.

Filipovic, I; O'Hearn, PW; Torp-Smith, N; Yang, H; (2010) Blaming the client: on data refinement in the presence of pointers. Formal Asp. Comput. , 22 (5) pp. 547-583. 10.1007/s00165-009-0125-8.

Fletcher, T; Hussain, Z; Shawe-Taylor, J; (2010) Multiple Kernel Learning on the Limit Order Book. WAPA , 11 pp. 167-174.

Friedman, D; Leeb, R; Dikovsky, L; Reiner, M; Pfurtscheller, G; Slater, M; (2010) Human Computer Interface Issues in Controlling Virtual Reality by Thought. Human-Computer Interaction (In press).

Furmston, T; Barber, D; (2010) Variational methods for reinforcement learning. Journal of Machine Learning Research , 9 pp. 241-248. Gold open access

Ghosheh, E; Black, S; Kapetanios, E; Baldwin, M; (2010) Exploring the Relationship between UML Design Metrics for Web Applications and Maintainability. Journal of Object Technology , 9 (3) pp. 125-144. 10.5381/jot.2010.9.3.a5.

Gillies, M; Pan, XN; Slater, M; (2010) Piavca: a framework for heterogeneous interactions with virtual characters. VIRTUAL REAL-LONDON , 14 (4) 221 - 228. 10.1007/s10055-010-0167-5.

Glowacka, D; Shawe-Taylor, J; (2010) Content-based Image Retrieval with Multinomial Relevance Feedback. ACML , 13 pp. 111-125.

Godsil, C; Severini, S; (2010) Control by quantum dynamics on graphs. PHYS REV A , 81 (5) , Article 052316. 10.1103/PhysRevA.81.052316.

Gold, N; (2010) Motivating Students in Software Engineering Group Projects: An Experience Report. Innovation in Teaching And Learning in Information and Computer Sciences (ITALICS) , 9 (1) pp. 10-19.

Gold, NE; Rink, J; Spiro, N; (2010) The form of performance: Analyzing pattern distribution in select recordings of Chopin's Mazurka op. 24 no. 2. Musicae Scientiae: the journal of the European Society for the Cognitive Sciences of Music , 14 (2) pp. 23-55. 10.1177/102986491001400202.

Groenegress, C; Holzner, C; Guger, C; Slater, M; (2010) Effects of P300-based BCI use on reported presence in a virtual environment. Presence: Teleoperators and Virtual Environments , 19 (1) pp. 1-11. 10.1162/pres.19.1.1.

Groenegress, C; Spanlang, B; Slater, M; (2010) The physiological mirror-a system for unconscious control of a virtual environment through physiological activity. Visual Computer , 26 (6-8) pp. 649-657. 10.1007/s00371-010-0471-9.

Hamma, A; Markopoulou, F; Lloyd, S; Caravelli, F; Severini, S; Markstrom, K; (2010) Quantum Bose-Hubbard model with an evolving graph as a toy model for emergent spacetime. PHYS REV D , 81 (10) , Article 104032. 10.1103/PhysRevD.81.104032.

Hardoon, DR; Shawe-Taylor, J; (2010) Decomposing the tensor kernel support vector machine for neuroscience data with structured labels. Machine Learning , 79 (1-2) pp. 29-46. 10.1007/s10994-009-5159-x.

Heinzle, S; Wolf, J; Kanamori, Y; Weyrich, T; Nishita, T; Gross, M; (2010) Motion Blur for EWA Surface Splatting. Computer Graphics Forum (Proc. Eurographics 2010) , 29 (2) pp. 733-742.

Hirsch, R; Gorogiannis, N; (2010) The complexity of the warranted formula problem in propositional argumentation. Journal of Logic and Computation , 20 (2) pp. 482-499. 10.1093/logcom/exp074.

Ho, H; Milenkovic, T; Memisevic, V; Aruri, J; Przulj, N; Ganesan, AK; (2010) Protein interaction network topology uncovers melanogenesis regulatory network components within functional genomics datasets. BMC Systems Biology , 4 p. 84. 10.1186/1752-0509-4-84.

Hunter, A; (2010) Base logics in argumentation. Frontiers in Artificial Intelligence and Applications , 216 pp. 275-286. 10.3233/978-1-60750-619-5-275.

Hussain, Z; Pasupa, K; Shawe-Taylor, J; (2010) Learning relevant eye movement feature spaces across users. Eye Tracking Research and Applications Symposium (ETRA) pp. 181-186. 10.1145/1743666.1743711.

Jimenez, J; Scully, T; Barbosa, N; Donner, C; Alvarez, X; Viera, T; Matts, P; (2010) A Practical Appearance Model for Dynamic Facial Color. ACM Transactions on Graphics (Proc. SIGGRAPH Asia) , 29 (5) 141:1-141:9.

Johnson, R; van der Linden, J; Rogers, Y; (2010) To buzz or not to buzz: Improving awareness of posture through vibrotactile feedback. Whole Body Interaction Workshop at CHI 2010.

Johnson, RMG; Van Der Linden, J; Rogers, Y; (2010) MusicJacket: The efficacy of real-time vibrotactile feedback for learning to play the violin. Conference on Human Factors in Computing Systems - Proceedings pp. 3475-3480. 10.1145/1753846.1754004.

Ju, Z; Liu, H; (2010) Recognizing Hand Grasp and Manipulation Through Empirical Copula. I. J. Social Robotics , 2 (3) pp. 321-328. 10.1007/s12369-010-0055-x.

Lehtikangas, O; Tarvainen, T; Kolehmainen, V; Pulkkinen, A; Arridge, SR; Kaipio, JP; (2010) Finite element approximation of the Fokker-Planck equation for diffuse optical tomography. J QUANT SPECTROSC RA , 111 (10) 1406 - 1417. 10.1016/j.jqsrt.2010.03.003.

Lopes, NP; Pérez, JAN; Rybalchenko, A; Singh, A; (2010) Applying Prolog to develop distributed systems. Theory and Practice of Logic Programming , 10 (4-6) 691 - 707. 10.1017/S1471068410000360. Green open access
file

Ma, J; Liu, W; Hunter, A; (2010) Inducing probability distributions from knowledge bases with (In)dependence relations. Proceedings of the National Conference on Artificial Intelligence , 1 pp. 339-344.

Ma, J; Liu, W; Hunter, A; Zhang, W; (2010) An XML based framework for merging incomplete and inconsistent statistical information from clinical trials. Studies in Fuzziness and Soft Computing , 255 pp. 259-290. 10.1007/978-3-642-14010-5_10.

Marchetto, A; Tiella, R; Tonella, P; Alshahwan, N; Harman, M; (2010) Crawlability metrics for automated web testing. International Journal on Software Tools for Technology Transfer pp. 1-19.

Meiklejohn, S; (2010) Review of an introduction to mathematical cryptography by Jeffrey Hoffstein, Jill Pipher, and Joseph Silverman Springer-Verlag, 2008. SIGACT News , 41 (4) pp. 47-50. 10.1145/1907450.1907527.

Meiklejohn, S; Shacham, H; Freeman, DM; (2010) Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures. IACR Cryptology ePrint Archive , 2010 p. 474.

Memisevic, V; Milenkovic, T; Przulj, N; (2010) Complementarity of network and sequence information in homologous proteins. J. Integrative Bioinformatics , 7 (3) 10.2390/biecoll-jib-2010-135.

Memisevic, V; Milenkovic, T; Przulj, N; (2010) An integrative approach to modeling biological networks. J. Integrative Bioinformatics , 7 (3) 10.2390/biecoll-jib-2010-120.

Mitra, NS; Doloi, B; Bhattacharyya, B; (2010) Experimental analysis on travelling wire electrochemical discharge machining. Journal of the Institution of Engineers (India), Part PR: Production Engineering Division , 91 (SEPT) pp. 30-34.

Papangelis, A; Metsis, V; Shawe-Taylor, J; Makedon, F; (2010) Sensor placement and coordination via distributed multi-agent cooperative control. ACM International Conference Proceeding Series 10.1145/1839294.1839311.

Pentony, MM; Jones, DT; (2010) Modularity of intrinsic disorder in the human proteome. Proteins , 78 pp. 212-221.

Przulj, N; (2010) Biological network comparison using graphlet degree distribution. Bioinformatics , 26 (6) pp. 853-854. 10.1093/bioinformatics/btq091.

Rahaman, A; Sasse, MA; (2010) A framework for the lived experience of identity. Identity in the Information Society , 3 (3) pp. 605-638. 10.1007/s12394-010-0078-3. Green open access
file

Rogers, Y; Connelly, K; Hazlewood, W; Tedesco, W; (2010) Enhancing learning: a study of how mobile devices can facilitate sensemaking. Personal and Ubiquitous Computing. , 14 (2) 111 - 124.

Rogers, Y; Rick, J; (2010) Performance optimizations of virtual keyboards for stroke-based text entry on a touch-based tabletop. Proceedings of UIST 2010.

Schneider, T; Wheeler-Kingshott, CAM; Alexander, DC; (2010) In-vivo estimates of axonal characteristics using optimized diffusion MRI protocols for single fibre orientation. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , 6361 LNCS (PART 1) 623 - 630. 10.1007/978-3-642-15705-9_76.

Schröder-Turk, GE; Mickel, W; Schröter, M; Delaney, GW; Saadatfar, M; Senden, TJ; Mecke, K; (2010) Disordered spherical bead packs are anisotropic. EPL , 90 (3) 10.1209/0295-5075/90/34001.

Sellitto, M; De Martino, D; Caccioli, F; Arenzon, JJ; (2010) Dynamic facilitation picture of a higher-order glass singularity. Physical Review Letters , 105 (26) 10.1103/PhysRevLett.105.265704.

Severini, S; (2010) The 3-dimensional cube is the only periodic, connected cubic graph with perfect state transfer. QUANTUM GROUPS, QUANTUM FOUNDATIONS, AND QUANTUM INFORMATION: A FESTSCHRIFT FOR TONY SUDBERY , 254 , Article 012012. 10.1088/1742-6596/254/1/012012. Gold open access

Shawe-Taylor, J; Parrado-Hernández, E; Ambroladze, A; (2010) Data dependent priors in PAC-Bayes bounds. Proceedings of COMPSTAT 2010 - 19th International Conference on Computational Statistics, Keynote, Invited and Contributed Papers pp. 231-240. 10.1007/978-3-7908-2604-3-21.

Shen, Y; Archambeau, C; Cornford, D; Opper, M; Shawe-Taylor, J; Barillec, R; (2010) A Comparison of Variational and Markov Chain Monte Carlo Methods for Inference in Partially Observed Stochastic Dynamic Systems. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY , 61 (1) pp. 51-59. 10.1007/s11265-008-0299-y.

Sherbondy, AJ; Rowe, MC; Alexander, DC; (2010) MicroTrack: an algorithm for concurrent projectome and microstructure estimation. Med Image Comput Comput Assist Interv , 13 (Pt 1) pp. 183-190.

Skene, J; Raimondi, F; Emmerich, W; (2010) Service-Level Agreements for Electronic Services. IEEE Transactions on Software Engineering , 36 (2) 288-304-288-304. 10.1109/TSE.2009.55.

Slater, M; (2010) RAVE 2010: Real actions in virtual environments guest editor's introduction. Presence: Teleoperators and Virtual Environments , 19 (4) 10.1162/PRES_e_00014.

Slater, M; (2010) Special Issue: Collaborative Research Center (SFB453) on High-Fidelity Telepresence and Teleaction Guest Editor's Introduction. Presence , 19 (5) iii-iv. 10.1162/pres_e_00015.

Steed, A; Reiners, D; Latoschik, ME; (2010) Guest Editors' Introduction. Presence , 19 (2) iii-iv. 10.1162/pres.19.2.iii.

Sutcliffe, A; Blandford, A; (2010) Guest Editors' Introduction. Interacting with Computers , 22 (1) pp. 1-2. 10.1016/j.intcom.2009.11.005.

Szita, N; Polizzi, K; Jaccard, N; Baganz, F; (2010) Microfluidic approaches for systems and synthetic biology. CURR OPIN BIOTECH , 21 (4) 517 - 523. 10.1016/j.copbio.2010.08.002.

Toler-Franklin, C; Brown, B; Weyrich, T; Funkhouser, T; Rusinkiewicz, S; (2010) Multi-Feature Matching of Fresco Fragments. ACM Transactions on Graphics (Proc. SIGGRAPH Asia) , 29 (5) 185:1-185:11.

Varakliotis, S; Hailes, S; De Nardi, R; Ahmed, M; (2010) UAV and cognitive radio technologies in the Emergency Services arena. British Association of Public Safety Communications Officials 28 - 29.

Varakliotis, S; Hailes, S; Denardi, R; Ahmed, M; (2010) UAV and cognitive radio technologies in the Emergency Services arena. BRITISH ASSOCIATION OF PUBLIC SAFETY COMMUNICATIONS OFFICIALS 28 - 29.

Wang, Z; Shawe-Taylor, J; (2010) A kernel regression framework for SMT. Machine Translation , 24 (2) pp. 87-102. 10.1007/s10590-010-9079-0.

Wang, Z; Shawe-Taylor, J; Shah, A; (2010) Semi-supervised feature learning from clinical text. Proceedings - 2010 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2010 pp. 462-466. 10.1109/BIBM.2010.5706610.

Wei, TC; Severini, S; (2010) Matrix permanent and quantum entanglement of permutation invariant states. J MATH PHYS , 51 (9) , Article 092203. 10.1063/1.3464263.

Xiang, HD; Fonteijn, HM; Norris, DG; Hagoort, P; (2010) Topographical Functional Connectivity Pattern in the Perisylvian Language Networks. CEREB CORTEX , 20 (3) pp. 549-560. 10.1093/cercor/bhp119.

Özögür-Akyüz, S; Hussain, Z; Shawe-Taylor, J; (2010) Prediction with the SVM Using Test Point Margins. pp. 147-158. 10.1007/978-1-4419-1280-0_7.

Book

UNSPECIFIED (Ed). (2010) Strength and Conditioning: Biological Principles and Practical Applications. [Book]. (1st ed.). John Wiley & Sons

Bentley, PJ; (2010) 不運の方程式. [Book]. 新潮社: Japan.

Blandford, A; Attfield, S; (2010) Interacting with Information. Synthesis Lectures on Human-Centered Informatics. Morgan & Claypool Publishers

Cristianini, N; Shawe-Taylor, J; (2010) An Introduction to Support Vector Machines and Other Kernel-based Learning Methods. Cambridge University Press

Book chapter

Alexander, DC; Seunarine, KK; (2010) Mathematics of Crossing Fibres. In: Jones, DK, (ed.) Diffusion MRI. Oxford University Press, USA

Bhalla, N; Bentley, PJ; (2010) Evolving Physical Self-assembling Systems in Two-dimensions. In: Doursat, and Sayama, and Michel, , (eds.) Morphogenetic Engineering. Springer

Cardinale, M; Romer, L; (2010) Strength Training. In: The Paralympic Athlete: Handbook of Sports Medicine and Science. (pp. 156-171).

Chakraborti, A; Germano, G; (2010) Agent-based models of economic interactions. In: Naldi, G and Pareschi, L and Toscani, G, (eds.) Mathematical Modeling of Collective Behavior in Socio-Economic and Life Sciences. (pp. 3-29). Birkhäuser: Boston, MA, USA.

Jambor, T; Wang, J; (2010) Goal-Driven Collaborative Filtering - A Directional Error Based Approach. In: Gurrin, C and He, Y and Kazai, G and Kruschwitz, U and Little, S and Roelleke, T and S, RG and van, RK, (eds.) Advances in Information Retrieval. (407-419-407-419). Springer Berlin / Heidelberg

Li, P; SJD, P; (2010) Advance in Face Image Analysis: Techniques and Technologies. In: Zhang, Y, (ed.) UNSPECIFIED Idea Group Publishing

Martelot, EL; Bentley, PJ; (2010) Modelling Biological Processes Naturally using Systemic Computation. In: Chiong, R, (ed.) Nature-Inspired Informatics for Intelligent Applications and Knowledge Discovery. (204 - 241). IGI Global

NOVAKOVIC, G; (2010) Art Practice in a Digital Culture. In: Gardiner, H and Gere, C, (eds.) Art Practice in a Digital Culture. (? - ?). Ashgate Pub Co

Novakovic, G; (2010) The garden of hybrid delights: Looking at the intersection of art, science and technology. In: Art Practice in a Digital Culture. (pp. 117-137).

Panagiotaki, E; Hall, MG; Zhang, H; Siow, B; Lythgoe, MF; Alexander, DC; (2010) High-Fidelity Meshes from Tissue Samples for Diffusion MRI Simulations. In: Jiang, T and Navab, N and Pluim, JPW and Viergever, MA, (eds.) UNSPECIFIED (pp. 404-411). SPRINGER-VERLAG BERLIN

Sabetzadeh, M; Finkelstein, A; Goedicke, M; (2010) Viewpoints. In: Laplante, PA, (ed.) Encyclopedia of Software Engineering. (pp. 1318-1329). Taylor & Francis

Tscholl, M; Dowell, J; (2010) Collaborative knowledge construction: examples of distributed cognitive processing. In: Ertl, B, (ed.) E-Collaborative Knowledge Construction: Learning from Computer-Supported and Virtual Environments. (pp. 74-90). IGI Global: Hershey: PA.

Zhang, H; Yushkevich, PA; Rueckert, D; Gee, JC; (2010) A computational white matter atlas for aging with surface-based representation of fasciculi. In: UNSPECIFIED (pp. 83-90).

Proceedings paper

(2010) Scalable Uncertainty Management - 4th International Conference, SUM 2010, Toulouse, France, September 27-29, 2010. Proceedings. In: Deshpande, A and Hunter, A, (eds.) SUM. Springer

(2010) Proceedings of the 6th Nordic Conference on Human-Computer Interaction 2010, Reykjavik, Iceland, October 16-20, 2010. In: Hvannberg, EÞ and Lárusdóttir, MK and Blandford, A and Gulliksen, J, (eds.) NordiCHI. ACM

(2010) Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems 2010. Proceedings of a meeting held 6-9 December 2010, Vancouver, British Columbia, Canada. In: Lafferty, JD and Williams, CKI and Shawe-Taylor, J and Zemel, RS and Culotta, A, (eds.) NIPS. Curran Associates, Inc.

(2010) Verified Software: Theories, Tools, Experiments, Third International Conference, VSTTE 2010, Edinburgh, UK, August 16-19, 2010. Proceedings. In: Leavens, GT and O'Hearn, PW and Rajamani, SK, (eds.) VSTTE. Springer

(2010) Computer Aided Verification, 22nd International Conference, CAV 2010, Edinburgh, UK, July 15-19, 2010. Proceedings. In: Touili, T and Cook, B and Jackson, P, (eds.) Springer

Araujo, A; Bentley, PJ; Baum, B; (2010) Modelling the Role of Chromosome Missegregation in Cancer Therapies. In: (Proceedings) 3rd Complex Systems Modelling and Simulation Workshop. MIT Press

Baldassarre, L; Barla, A; Noceti, N; Odone, F; (2010) Learning how to grasp objects. In: Verleysen, M, (ed.) ESANN 2010 proceedings: European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning: Bruges (Belgium), 28-30 April 2010. (pp. 289 - 294). d-side: Evere, Belgium. Green open access
file

Barre, S; Bonaventure, O; Raiciu, C; Handley, M; (2010) Experimenting with Multipath TCP. In: COMPUTER COMMUNICATION REVIEW. (pp. 443 - 444). ASSOC COMPUTING MACHINERY

Barré, S; Bonaventure, O; Raiciu, C; Handley, M; (2010) Experimenting with Multipath TCP. In: Nitto, ED and Yahyapour, R, (eds.) ServiceWave. (pp. 193 - 194). Springer

Beautement, A; Sasse, MA; (2010) Gathering realistic authentication performance data through field trials. In: (Proceedings) In Proceedings of the 6th Symposium on Usable Privacy and Security (SOUPS) 2010.

Beltrán, AG; Tagger, B; Finkelstein, A; (2010) Ontology-based Queries over Cancer Data. In:

Beltrán, AG; Tagger, B; Finkelstein, A; (2010) Ontology-based Queries over Cancer Data. In: Burger, A and Marshall, MS and Romano, P and Paschke, A and Splendiani, A, (eds.) CEUR-WS.org

Beresnevichiene, Y; Pym, D; Shiu, S; (2010) Decision support for systems security investment. In: (pp. pp. 118-125).

Bittau, A; Hamburg, M; Handley, M; Mazières, D; Boneh, D; (2010) The Case for Ubiquitous Transport-Level Encryption. In: USENIX Security'10: Proceedings of the 19th USENIX conference on Security. (pp. 403 - 418). USENIX Association: Berkeley, California, USA. Green open access
file

Blandford, A; (2010) Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries. In: Hvannberg, E and Larusdottir, M and Blandford, A and Gulliksen, J, (eds.) Nordic Conference on Human-Computer Interaction. ACM

Brostoff, S; Inglesant, P; Sasse, MA; (2010) Evaluating the usability and security of a graphical one-time PIN system. In: McEwan, T and McKinnon, L, (eds.) BCS HCI. (pp. 88 - 97). ACM

Brotherston, J; Kanovich, M; (2010) Undecidability of propositional separation logic and its neighbours. In: (pp. pp. 130-139).

Cameron, S; Hailes, S; Julier, S; McClean, S; Parr, G; Trigoni, N; Ahmed, M; (2010) SUAAVE: Combining Aerial Robots and Wireless Networking. In: Proceedings of the 25th Bristol International UAV Systems Conference.

Carusi, A; Novakovic, G; Webmoor, T; (2010) Are digital picturings representations? In: Seal, A and Bowen, JP and Ng, K, (eds.) BCS

Chapman, C; Emmerich, W; Galán Márquez, F; Clayman, S; Galis, A; (2010) Software architecture definition for on-demand cloud provisioning. In: (pp. pp. 61-72).

Chapman, C; Emmerich, W; Marquez, FG; Clayman, S; Galis, A; (2010) Software Architecture Definition for On-demand Cloud Provisioning. In: Proc. of the $19^th$ ACM Int. Symp. on high Performance Distributed Computing (HDPC 2010), Chicago, Il. (pp. 61-72 - 61-72). ACM Press

Cheng, J; Ghosh, A; Deriche, R; Jiang, T; (2010) Model-Free, Regularized, Fast, and Robust Analytical Orientation Distribution Function Estimation. In: Jiang, T and Navab, N and Pluim, JPW and Viergever, MA, (eds.) (pp. pp. 648-656). Springer

Cheng, J; Ghosh, A; Jiang, T; Deriche, R; (2010) Model-Free and Analytical EAP Reconstruction via Spherical Polar Fourier Diffusion MRI. In: Jiang, T and Navab, N and Pluim, JPW and Viergever, MA, (eds.) (pp. pp. 590-597). Springer

Clark, JA; Dan, H; Hierons, RM; (2010) Semantic Mutation Testing. In: Proceedings of the 3rd IEEE International Conference on Software Testing, Verification, and Validation Workshops. (pp. 100 -109 - 100 -109).

Collinson, M; Monahan, B; Pym, D; (2010) Semantics for structured systems modelling and simulation. In:

Cook, B; Kroening, D; Rümmer, P; Wintersteiger, CM; (2010) Ranking Function Synthesis for Bit-Vector Relations. In: Esparza, J and Majumdar, R, (eds.) (pp. pp. 236-250). Springer

Coughlan, T; Adams, A; Rogers, Y; (2010) Designing for balance: Out There and In Here. In: McEwan, T and McKinnon, L, (eds.) BCS HCI. (pp. 468 - 473). ACM

Cox, IJ; Zhu, J; Fu, R; Hansen, LK; (2010) Improving Query Correctness Using Centralized Probably Approximately Correct (PAC) Search. In: Gurrin, C and He, Y and Kazai, G and Kruschwitz, U and Little, S and Roelleke, T and Rüger, SM and Rijsbergen, KV, (eds.) ECIR. (pp. 265 - 280). Springer

Dan, H; Hierons, RM; Counsell, S; (2010) Non-local choices and implied scenarios. In: Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods. (pp. 53-62 - 53-62).

Dillig, I; Dillig, T; Aiken, A; (2010) Small formulas for large programs: On-line constraint simplification in scalable static analysis. In: (pp. pp. 236-252).

Diriye, A; Blandford, A; Tombros, A; (2010) When is system support effective? In: (pp. pp. 55-64).

Diriye, A; Wilson, M; Blandford, AE; Tombros, A; (2010) Revisiting exploratory search from the HCI perspective. In: (Proceedings) HCIR Workshop.

Dubinsky, Y; Kruchten, P; Finkelstein, A; Bass, L; Chulani, S; Prikladnicki, R; (2010) Software Development Governance (SDG) Workshop. In: Kramer, J and Bishop, J and Devanbu, PT and Uchitel, S, (eds.) (pp. pp. 463-464). ACM

Eigensatz, M; Deuss, M; Schiftner, A; Kilian, M; Mitra, N; Pottmann, H; Pauly, M; (2010) Case Studies in Cost-Optimized Paneling of Architectural Freeform Surfaces. In: (Proceedings) Advances in Architectural Geometry.

Estehghari, S; Desmedt, Y; (2010) Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example. In: Jones, DW and Quisquater, J-J and Rescorla, E, (eds.) USENIX Association

Fleck, R; Fitzpatrick, G; (2010) Reflecting on reflection: Framing a design landscape. In: (pp. pp. 216-223).

Furniss, D; Back, J; Blandford, A; (2010) Resilience in Emergency Medical Dispatch: Big R and little r. In: Hayes, GR and Tan, DS and Wilcox, L, (eds.) Proceedings of the First International Workshop on Interactive Systems in Healthcare. (pp. pp. 9-12). Dealer Analysis Group: Atlanta, GA, United States. Green open access
file

Ghosh, A; Deriche, R; (2010) Fast and closed-form ensemble-average-propagator approximation from the 4th-order diffusion tensor. In: (pp. pp. 1105-1108). IEEE

Grünewälder, S; Audibert, JY; Opper, M; Shawe-Taylor, J; (2010) Regret bounds for Gaussian process bandit problems. In: (pp. pp. 273-280). Gold open access

Hirsch, RD; (2010) Modal Logic and Relativity. In: Mate, A and mekis, P, (eds.) Hungarian Philosophical Review. (pp. 223 - 230).

Holloway, C; Hills, L; Vines, S; Tyler, N; (2010) Attendant propulsion of wheelchairs: is there a difference between the 8L and 9L? In:

Holloway, C; Suzuki, T; Uchiyama, H; Tyler, N; (2010) Application of the capability model to assess crossfall gradient requirements for attendants pushing wheelchairs. In: : Hong Kong.

Holloway, C; Tyler, N; (2010) Propelling a wheelchiar in the pedestrian environment-how do people cope with slopes and obstacles? In: : Hong Kong.

Inglesant, PG; Sasse, MA; (2010) Studying Password Use in the Wild: Practical Problems and Possible Solutions. In: Proceedings of the Sixth Symposium on Usable Privacy and Security. Green open access
file

Inglesant, PG; Sasse, MA; (2010) The true cost of unusable password policies: password use in the wild. In: Proceedings of the 28th international conference on Human factors in computing systems. (pp. 383 - 392). ACM: New York, NY, USA. Green open access
file

Janssen, CP; Young, RM; Ament, MGA; Back, J; Brumby, DP; Cox, AL; Grace, J; (2010) Cognitive modelling at the UCL Interaction Centre. In: : Proceedings of the European ACT-R Workshop 2010.

Ju, Z; Liu, H; (2010) Empirical Copula Driven Hand Motion Recognition via Surface Electromyography Based Templates. In: Liu, H and Ding, H and Xiong, Z and Zhu, X, (eds.) ICIRA (1). (pp. 71 - 80). Springer

Krinke, J; Gold, N; Jia, Y; Binkley, D; (2010) Cloning and Copying between GNOME Projects. In: Proceedings of the 2010 7th IEEE Working Conference on Mining Software Repositories: co-located with ICSE 2010, May 2-3, 2010, Cape Town, South Africa: MSR 2010, mining software repositories. (pp. 98 - 101). IEEE Computer Society: Piscataway, US. Green open access
file

Krinke, J; Gold, N; Jia, Y; Binkley, D; (2010) Distinguishing copies from originals in software clones. In: (pp. pp. 41-48). Green open access
file

Kwon, J; Hailes, S; (2010) A Lightweight Component-Based Reconfigurable Middleware Architecture and State Ontology for Fault Tolerant Embedded Systems. In: Parr, G and Morrow, PJ, (eds.) S-CUBE. (pp. 107 - 120). Springer

Lever, G; (2010) Relating Function Class Complexity and Cluster Structure in the Function Domain with Applications to Transduction. In: Teh, YW and Titterington, DM, (eds.) (pp. pp. 437-444). JMLR.org

Lim, SL; Quercia, D; Finkelstein, A; (2010) StakeNet: using social networks to analyse the stakeholders of large-scale software projects. In: Kramer, J and Bishop, J and Devanbu, PT and Uchitel, S, (eds.) (pp. pp. 295-304). ACM

Lim, SL; Quercia, D; Finkelstein, A; (2010) StakeSource: harnessing the power of crowdsourcing and social networks in stakeholder analysis. In: Kramer, J and Bishop, J and Devanbu, PT and Uchitel, S, (eds.) (pp. pp. 239-242). ACM

Mace, JC; Parkin, SE; Moorsel, APAV; (2010) Ontology Editing Tool for Information Security and Human Factors Experts. In: Liu, K and Filipe, J, (eds.) KMIS. (pp. 207 - 212). SciTePress

Mace, JC; Parkin, SE; Moorsel, APAV; (2010) A collaborative ontology development tool for information security managers. In: Moskowitz, A and Forsgren, N and Babaian, T and Beznosov, K, (eds.) CHIMIT. (pp. 5 - 5). ACM

Makri, S; Blandford, A; Cox, AL; (2010) This is what I’m doing and why: Reflections on a think-aloud study of digital library users’ information behaviour. In: JCDL '10: Digital Libraries - 10 years past, 10 years forward, a 2020 vision: June 21-15, 2010, Gold Coast, Australia. (pp. 349 - 352). ACM Press: New York, US. Green open access
file

Malod-Dognin, N; Andonov, R; Yanev, N; (2010) Maximum Cliques in Protein Structure Comparison. In: Festa, P, (ed.) (pp. pp. 106-117). Springer

Mancini, C; Rogers, Y; Bandara, AK; Coe, T; Jedrzejczyk, L; Joinson, AN; Price, BA; (2010) ContraVision: Exploring Users' Reactions to Futuristic Technology. In: Proceedings of CHI 2010. (pp. 153 - 162).

Marchenko, P; Karp, B; (2010) Structuring protocol implementations to protect sensitive data. In: Proceedings of the 19th USENIX Security Symposium: August 11–13, 2010, Washington, DC. (pp. 47 - 62). USENIX Association: Berkeley, US. Green open access
file

Mavridis, L; Venkatraman, V; Ritchie, DW; Morikawa, N; Andonov, R; Cornu, A; Malod-Dognin, N; (2010) SHREC'10 Track: Protein Model Classification. In: Daoudi, M and Schreck, T and Spagnuolo, M and Pratikakis, I and Veltkamp, RC and Theoharis, T, (eds.) (pp. pp. 117-124). Eurographics Association

McCarthy, B; Varakliotis, S; Edwards, C; Roedig, U; (2010) Deploying Wireless Sensor Networking Technology in a Rescue Team Context. In: Marron, PJ and Voight, T and Corke, P and Mottola, L, (eds.) REAL-WORLD WIRELESS SENSOR NETWORKS. (pp. 37 - 48). SPRINGER-VERLAG BERLIN

Meiklejohn, S; Erway, CC; Küpçü, A; Hinkle, T; Lysyanskaya, A; (2010) ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. In: (pp. pp. 193-206). USENIX Association

Mitra, NJ; Bronstein, A; Bronstein, M; (2010) Intrinsic Regularity Detection in 3D Geometry. In: Daniilidis, K and Maragos, P and Paragios, N, (eds.) COMPUTER VISION-ECCV 2010, PT III. (pp. 398 - 410). SPRINGER-VERLAG BERLIN

Morgan, GL; Zhang, H; Whitcher, B; Alexander, DC; (2010) A spatial variation model of white matter microstructure. In: Zhang, H, (ed.) Proceedings of the Workshop on Computational Diffusion MRI (CDMRI'10), Medical Image Computing and Computer-Assisted Intervention (MICCAI 2010). (pp. 165 - 174). Green open access
file

Novakovic, G; (2010) Fugue and Variations on some Themes in Art and Science. In: Seal, A and Bowen, JP and Ng, K, (eds.) BCS

Novakovic, G; (2010) The Interface behind the Face. In: Seal, A and Bowen, JP and Ng, K, (eds.) BCS

O'Hearn, PW; (2010) Abductive, Inductive and Deductive Reasoning about Resources. In: Dawar, A and Veith, H, (eds.) CSL. (pp. 49 - 50). Springer

O'Hearn, PW; Rinetzky, N; Vechev, MT; Yahav, E; Yorsh, G; (2010) Verifying linearizability with hindsight. In: Richa, AW and Guerraoui, R, (eds.) PODC. (pp. 85 - 94). ACM

Panagiotaki, E; Hall, MG; Zhang, H; Siow, B; Lythgoe, MF; Alexander, DC; (2010) High-Fidelity Meshes from Tissue Samples for Diffusion MRI Simulations. In: Jiang, T and Navab, N and Pluim, JPW and Viergever, MA, (eds.) MEDICAL IMAGE COMPUTING AND COMPUTER-ASSISTED INTERVENTION - MICCAI 2010, PT II,. (pp. 404 - 411). SPRINGER-VERLAG BERLIN

Paskins, J; Bell, SJ; Croxford, B; Haklay, M; Julier, S; (2010) Crossing Disciplines to Address Urban Sustainability. In: (Proceedings) European Association for the Study of Science and Technology (EASST).

Peel, L; (2010) Estimating Network Parameters for Selecting Community Detection Algorithms. In: CoRR.

Price, BA; Mancini, C; Rogers, Y; Bandara, AK; Coe, T; Joinson, AN; Lay, JA; (2010) ContraVision: Presenting contrasting visions of future technology. In: (pp. pp. 4759-4764).

Przulj, N; Kuchaiev, O; Stevanovic, A; Hayes, W; (2010) Geometric Evolutionary Dynamics of Protein Interaction Networks. In: Altman, RB and Dunker, AK and Hunter, L and Murray, T and Klein, TE, (eds.) (pp. pp. 178-189). World Scientific Publishing

Quercia, D; Hailes, S; (2010) Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue. In: (Proceedings) Conference on IEEE INFOCOM. IEEE

Quercia, D.; Lathia, N.; Calabrese, F.; Di Lorenzo, G.; Crowcroft, J.; (2010) Recommending Social Events from Mobile Phone Location Data. In: ICDM 2010 The 10th IEEE International Conference on Data Mining 14-17 December 2010 Sydney, Australia. (pp. pp. 971-976). IEEE: Los Alamitos, CA US. Green open access
file

Raiciu, C; Pluntke, C; Barre, S; Greenhalgh, A; Wischik, D; Handley, M; (2010) Data center networking with multipath TCP. In: Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks. (pp. 10:1 - 10:6). ACM: New York, NY, USA.

Riedel, S; (2010) Declarative probabilistic programming for undirected graphical models: Open up to scale up. In: (pp. pp. 88-89).

Riedel, S; Smith, DA; (2010) Relaxed marginal inference and its application to dependency parsing. In: (pp. pp. 760-768).

Riedel, S; Smith, DA; McCallum, A; (2010) Inference by minimizing size, divergence, or their sum. In: (pp. pp. 492-499).

Ruskov, M; Seager, W; Sasse, MA; (2010) Persuading giants to be wise: an exploratory study of advice sharing in online games. In: Personal Learning Environments Conference Proceedings. Green open access
file

SIOW, B; Carmichael, DW; Riegler, J; Alexander, DA; Lythgoe, MF; Ordidge, R; (2010) Detection of Human Mononuclear Cells Labelled with Micron-Sized Iron Oxide Particles Using the Sub-Pixel Enhancement of Nonuniform Tissue (SPENT) Sequence. In: (Proceedings) 18th meeting of the International Society for Magnetic Resonance in Medicine.

Sawyer, P; Bencomo, N; Whittle, J; Letier, E; Finkelstein, A; (2010) Requirements-Aware Systems: A Research Agenda for RE for Self-adaptive Systems. In: (pp. pp. 95-103). IEEE Computer Society

Seager, W; Fradinho, M; Ruskov, M; Sasse, MA; (2010) Eliciting and modelling expertise for serious game design. In: (Proceedings) 14th SIG Workshop on Experimental Learning on Sustainable Management, Economics and Industrial Engineering.

Singh, S; Yao, L; Riedel, S; McCallum, A; (2010) Constraint-driven rank-based learning for information extraction. In: (pp. pp. 729-732).

Smith, GE; Diethe, T; Hussain, Z; Shawe-Taylor, J; Hardoon, DR; (2010) Compressed sampling for pulse doppler radar. In: (pp. pp. 887-892).

Soloviev, VY; McGinty, J; Tahir, KB; Laine, R; Stuckey, DW; Mohan, PS; Hajnal, JV; (2010) Tomographic imaging of Fluorescence Resonance Energy Transfer in highly light scattering media. In: Wax, AP and Backman, V, (eds.) BIOMEDICAL APPLICATIONS OF LIGHT SCATTERING IV. (pp. ? - ?). SPIE-INT SOC OPTICAL ENGINEERING

Spanlang, B; Normand, JM; Giannopoulos, E; Slater, M; (2010) A first person avatar system with haptic feedback. In: (pp. pp. 47-50).

Swapp, D; Williams, J; Steed, A; (2010) The implementation of a novel walking interface within an immersive display. In: Hachet, M and Kiyokawa, K and LaViola Jr, J, (eds.) (Proceedings) 2010 IEEE Symposium on 3D User Interfaces (3DUI). (pp. pp. 71-74). IEEE Computer Society Press

Tse, E; Schöning, J; Rogers, Y; Shen, C; Morrison, G; (2010) Next generation of HCI and education: Workshop on UI technologies and educational pedagogy. In: (pp. pp. 4509-4512).

VARAKLIOTIS, S; McCarthy, B; Edwards, C; Kirstein, P; (2010) Incorporating mobile sensor networks into the internet: an all IP approach. In: (Proceedings) 5th ACM international workshop on Mobility in the evolving internet architecture. (pp. 15 - 20).

Weyrich, T; (2010) Towards a Spatio-temporal Appearance Model for Human Skin. In: (Proceedings) ACM Workshop on Surreal Media and Virtual Cloning. (pp. pp. 37-38). ACM

Xiong, J; Jamieson, K; (2010) SecureAngle: Improving Wireless Security Using Angle-of-Arrival Information (Poster Abstract). In: COMPUTER COMMUNICATION REVIEW. (pp. 415 - 416). ASSOC COMPUTING MACHINERY

Xiong, J; Jamieson, K; (2010) SecureAngle: improving wireless security using angle-of-arrival information. In: Xie, GG and Beverly, R and Morris, R and Davie, B, (eds.) (pp. p. 11). ACM

Yang, QS; Desmedt, Y; (2010) General Perfectly Secure Message Transmission Using Linear Codes. In: Abe, M, (ed.) ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010. (pp. 448 - 465). SPRINGER-VERLAG BERLIN

Yang, QS; Desmedt, Y; (2010) Cryptanalysis of Secure Message Transmission Protocols with Feedback. In: Kurosawa, K, (ed.) INFORMATION THEORETIC SECURITY. (pp. 159 - 176). SPRINGER-VERLAG BERLIN

Zhang, D; Wang, J; Cai, D; Lu, J; (2010) Laplacian co-hashing of terms and documents. In: (pp. pp. 577-580).

Zhang, H; Alexander, DC; (2010) Axon Diameter Mapping in the Presence of Orientation Dispersion with Diffusion MRI. In: Jiang, T and Navab, N and Pluim, JPW and Viegever, MA, (eds.) MEDICAL IMAGE COMPUTING AND COMPUTER-ASSISTED INTERVENTION - MICCAI 2010, PT I. (pp. 640 - 647). SPRINGER-VERLAG BERLIN

Zhu, Z; Levene, M; Cox, IJ; (2010) Ranking Classes of Search Engine Results. In: Fred, ALN and Filipe, J, (eds.) KDIR. (pp. 294 - 301). SciTePress

Report

UNSPECIFIED (Ed). (2010) Assume-Guarantee Verification for Distributed Systems with Local Specifications. : Department of Computer Science, University College London.

Khalid Alzarouni, DC; Tratt, L; (2010) Semantic Malware Detection.

Mylonas, D; (2010) Online Colour Naming Experiment Using Munsell Samples.

Nikolaidis, G; Zhushi, A; JAMIESON, K; Karp, BN; (2010) Cone of Silence: Adaptively Nulling Interferers in Wireless Networks. (UCL Computer Science Research Notes RN/10/02 , pp. pp. 1-14 ). UCL CS: London.

Conference item

Amati, C; Brostow, GJ; (2010) Modeling 2.5D Plants from Ink Paintings. Presented at: UNSPECIFIED.

Ament, MGA; Cox, AL; Blandford, A; Brumby, D; (2010) Working Memory Load Affects Device-Specific but Not Task-Specific Error Rates. Presented at: Portland, OR.

Araujo, A; Bentley, PJ; Baum, B; (2010) Modelling the Role of Aneuploidy in Tumour Evolution. Presented at: UNSPECIFIED.

Auletta, V; Blundo, C; De Caro, A; De Cristofaro, E; Persiano, G; Visconti, I; (2010) Increasing privacy threats in the cyberspace: the case of Italian e-passports. Presented at: UNSPECIFIED.

Baldassarre, L; Rosasco, L; Barla, A; Verri, A; (2010) Vector Field Learning via Spectral Filtering. Presented at: UNSPECIFIED.

Bard, GV; Courtois, N; Jr, JN; Sepehrdad, P; Zhang, B; (2010) Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers. Presented at: UNSPECIFIED.

Barr, ET; Bird, C; Hyatt, E; Menzies, T; Robles, G; (2010) On the shoulders of giants. Presented at: UNSPECIFIED.

Beautement, A; Pym, DJ; (2010) Structured Systems Economics for Security Management. Presented at: UNSPECIFIED.

Beautement, A; Sasse, MA; (2010) Gathering realistic authentication performance data through field trials. Presented at: 6th Symposium on Usable Privacy and Security (SOUPS) 2010, Redmond, Washington. Green open access
file

Ben Mokhtar, S; Mashhadi, AJ; Capra, L; McNamara, L; (2010) A self-organising directory and matching service for opportunistic social networking. Presented at: UNSPECIFIED.

Bhalla, N; Bentley, PJ; Jacob, C; (2010) Evolving Physical Self-assembling Systems in Two-dimensions. Presented at: UNSPECIFIED.

Blandford, A; Buchanan, G; Curzon, P; Furniss, D; Thimbleby, H; (2010) Who’s looking? Invisible problems with interactive medical devices. Presented at: UNSPECIFIED.

Brown, B; Laken, L; Dutré, P; Gool, LV; Rusinkiewicz, S; Weyrich, T; (2010) Tools for Virtual Reassembly of Fresco Fragments. Presented at: UNSPECIFIED.

CLACK, C; (2010) Financial Evolutionary Computing. Presented at: Genetic and Evolutionary Computing Conference 2010.

CLACK, C; (2010) Using Computer Simulations to Study and Predict the Global Financial Markets. Presented at: Trade Tech Architecture 2010.

Castelluccia, C; De Cristofaro, E; Perito, D; (2010) Private information disclosure from web searches. Presented at: UNSPECIFIED.

Codish, M; Fuhs, C; Giesl, J; Schneider-Kamp, P; (2010) Lazy Abstraction for Size-Change Termination. Presented at: UNSPECIFIED.

Courtois, NT; Jackson, K; Ware, D; (2010) Fault-Algebraic Attacks on Inner Rounds of DES. Presented at: UNSPECIFIED. Green open access
file

Dalton, NS; Marshall, P; Conroy Dalton, R; (2010) Measuring environments for public displays: a Space Syntax approach. Presented at: UNSPECIFIED.

De Cristofaro, E; Kim, J; Tsudik, G; (2010) Linear-complexity private set intersection protocols secure in malicious model. Presented at: UNSPECIFIED.

De Cristofaro, E; Tsudik, G; (2010) Practical private set intersection protocols with linear complexity. Presented at: UNSPECIFIED, http://eprint.iacr.org/2009/491.pdf.

Desmedt, Y; Elkind, E; (2010) Equilibria of Plurality Voting with Abstentions. Presented at: UNSPECIFIED.

Desmedt, Y; Elkind, E; (2010) Equilibria of plurality voting with abstentions. Presented at: UNSPECIFIED.

Dillig, I; Dillig, T; Aiken, A; (2010) Symbolic heap abstraction with demand-driven axiomatization of memory invariants. Presented at: UNSPECIFIED.

Drobnjak, I; Siow, B; Alexander, DC; (2010) Improving axon-diameter measurements by direct diffusion-gradient waveform optimization. Presented at: UNSPECIFIED.

Drobnjak, I; Siow, B; Alexander, DC; (2010) Optimal diffusion-gradient waveforms for measuring axon diameter. Presented at: UNSPECIFIED.

Dyrby, TB; Hubbard, PL; Ptito, M; Hall, MG; Alexander, DC; (2010) Dependence of Axon Diameter Index on Maximum Gradient Strength. Presented at: International Society for Magnetic Resonance in Medicine, Stockholm.

Fuhs, C; Schneider-Kamp, P; (2010) Synthesizing Shortest Linear Straight-Line Programs over GF(2) Using SAT. Presented at: UNSPECIFIED.

Furniss, D; Blandford, A; (2010) DiCoT Modeling: From Analysis to Design. Presented at: CHI 2010 workshop: ‘Contextual Analysis and Design’, Atlanta, US. Green open access
file

Gold, N; Krinke, J; Harman, M; Binkley, D; (2010) Issues in clone classification for dataflow languages. Presented at: UNSPECIFIED.

Groth, J; (2010) Short Non-interactive Zero-Knowledge Proofs. Presented at: UNSPECIFIED.

Groth, J; (2010) Short Pairing-Based Non-interactive Zero-Knowledge Arguments. Presented at: UNSPECIFIED.

Gu, Z; Barr, ET; Hamilton, DJ; Su, Z; (2010) Has the bug really been fixed? Presented at: UNSPECIFIED.

Guy, G; Dunn, S; Gold, N; (2010) Capturing Visitor Experiences for Study and Preservation. Presented at: UNSPECIFIED.

Harman, M; (2010) The relationship between search based software engineering and predictive modeling. Presented at: UNSPECIFIED.

Hawkins, M; Julier, S; Iliffe, R; Weyrich, T; Terras, M; Warwick, C; (2010) Digital Historical Research: An Ideal Case Study for Networked Visualisation Research. Presented at: UNSPECIFIED, Rome, NY, USA.

Hazlewood, W; Dalton, NS; Marshall, P; Rogers, Y; Hertrich, S; (2010) Bricolage and consultation: a case study to inform the development of large-scale prototypes for HCI research. Presented at: Designing Interactive Systems (DIS ’10), Aarhus, Denmark.

Hazlewood, WR; Dalton, N; Marshall, P; Rogers, Y; Hertrich, S; (2010) Bricolage and consultation: Addressing new design challenges when building large-scale installations. Presented at: UNSPECIFIED.

Heiskala, J; Metsäranta, M; Grant, PE; Pollari, M; Nissilä, IT; (2010) Two Approaches for Using Anatomical Atlas Information for Image Reconstruction in Optical Tomography of Neonates. Presented at: UNSPECIFIED.

Hesford, C; Cooper, CE; Cardinale, M; (2010) Near Infrared Spectroscopy Measurements Of Muscle Metabolism In Elite Short-track Speed Skaters During On-ice Race Simulation. Presented at: UNSPECIFIED.

Hussain, Z; Pasupa, K; Shawe-Taylor, J; (2010) Learning relevant eye movement feature spaces across users. Presented at: UNSPECIFIED.

Jambor, T; Wang, J; (2010) Optimizing multiple objectives in collaborative filtering. Presented at: UNSPECIFIED.

Janssen, CP; (2010) Understanding Strategic Adaptation in Multitask Settings. Presented at: 10th international conference on cognitive modeling, Philadelphia, PA.

Kezele, I; Alexander, DC; Batchelor, PG; Mangin, J-F; Le Bihan, D; Poupon, C; (2010) Measuring Microstructural Features Related to Neuronal Activation Using Diffusion MRI and Three-Compartment Diffusion Models: A Feasibility Study. Presented at: UNSPECIFIED.

Kezele, I; Batchelor, PG; Poupon, C; Mangin, J-F; Le Bihan, D; Alexander, DC; (2010) Feasibility of Measuring Microstructural Features of Systems with Intermediate Exchange and Sub-Cellular Compartmentalization Using Diffusion MRI. Presented at: International Society for Magnetic Resonance in Medicine, Stockholm.

Kleinnijenhuis, M; Barth, M; Alexander, DC; Van Cappellen Van Walsum, A-M; Norris, DG; (2010) SWI-Informed Diffusion Tensor Tractography. Presented at: International Society for Magnetic Resonance in Medicine, Stockholm.

Kolmogorov, V; (2010) Generalized roof duality and bisubmodular functions. Presented at: UNSPECIFIED.

Kolmogorov, V; (2010) Minimizing a sum of submodular functions. Presented at: UNSPECIFIED.

Kolmogorov, V; (2010) A dichotomy theorem for conservative general-valued CSPs. Presented at: UNSPECIFIED.

Kolmogorov, V; Zivny, S; (2010) Generalising tractable VCSPs defined by symmetric tournament pair multimorphisms. Presented at: UNSPECIFIED.

Kolmogorov, V; Zivny, S; (2010) The complexity of conservative finite-valued CSPs. Presented at: UNSPECIFIED.

Lehtikangas, O; Tarvainen, T; Kolehmainen, V; Pulkkinen, A; Arridge, SR; Kaipio, JP; (2010) Finite element solution of the Fokker-Planck equation for optical tomography. Presented at: UNSPECIFIED.

Lo Giusto, G; Mashhadi, AJ; Capra, L; (2010) Folksonomy-based reasoning for content dissemination in mobile settings. Presented at: UNSPECIFIED.

Micchelli, CA; Morales, JM; Pontil, M; (2010) A family of penalty functions for structured sparsity. Presented at: UNSPECIFIED.

Migliardi, M; Stringhini, G; (2010) Travelling Information For Intrusion Prevention Systems. Presented at: UNSPECIFIED.

Mohibullah, W; Julier, SJ; (2010) Bearings-only localisation of targets from low-speed UAVs. Presented at: UNSPECIFIED.

Morgan, GL; Newbould, RD; Whitcher, B; Alexander, DC; (2010) Polynomial models of the spatial variation of axon radius in white matter. Presented at: International Society for Magnetic Resonance in Medicine, Stockholm, Sweden.

Oxtoby, NP; Ralph, JF; Samsonov, D; Durniak, C; (2010) Tracking interacting dust: comparison of tracking and state estimation techniques for dusty plasmas. Presented at: UNSPECIFIED.

Prevost, R; Buckley, DL; Alexander, DC; (2010) Optimization of the DCE-CT protocol using active imaging. Presented at: UNSPECIFIED. Green open access
file

Rahaman, A; Sasse, MA; (2010) Human-centred identity - from rhetoric to reality. Presented at: Identity in the Information Society Workshop (IDIS10), Rome, Italy. Green open access
file

Riegelsberger, J; Sasse, MA; (2010) Ignore These At Your Peril: Ten principles for trust design. Presented at: TRUST2010: 3rd International Conference on Trust and Trustworthy Computing, Berlin, Germany. Green open access
file

Rogers, Y; Hazlewood, W; Marshall, P; Dalton, NS; Hertrich, S; (2010) Ambient influence: can twinkly lights lure and abstract representations trigger behavioral change? Presented at: UNSPECIFIED, Copenhagen, Denmark.

Shin, H; Doumas, C; Funkhouser, T; Rusinkiewicz, S; Steglitz, K; Vlachopoulos, A; Weyrich, T; (2010) Analyzing Fracture Patterns in Theran Wall Paintings. Presented at: UNSPECIFIED.

Silver, D; Veness, J; (2010) Monte-Carlo Planning in Large POMDPs. Presented at: UNSPECIFIED.

Sweet, A; Alexander, DC; (2010) Reduced Encoding Persistent Angular Structure. Presented at: International Society for Magnetic Resonance in Medicine, Stockholm.

Tang, E; Barr, ET; Li, X; Su, Z; (2010) Perturbing numerical calculations for statistical analysis of floating-point program (in)stability. Presented at: UNSPECIFIED.

Tarvainen, T; Vauhkonen, M; Arridge, SR; (2010) Image reconstruction in optical tomography using the finite element solution of the radiative transfer equation. Presented at: UNSPECIFIED.

Veness, J; Ng, KS; Hutter, M; Silver, D; (2010) Reinforcement Learning via AIXI Approximation. Presented at: UNSPECIFIED.

Veness, J; Siong Ng, K; Hutter, M; Silver, D; (2010) Reinforcement learning via AIXI approximation. Presented at: UNSPECIFIED.

Xiong, J; Jamieson, K; (2010) SecureAngle: improving wireless security using angle-of-arrival information (poster abstract). Presented at: UNSPECIFIED.

Yoo, S; (2010) Metamorphic Testing of Stochastic Optimisation. Presented at: UNSPECIFIED.

Yoo, S; (2010) A Novel Mask-Coding Representation for Set Cover Problems with Applications in Test Suite Minimisation. Presented at: UNSPECIFIED.

Zainal-Abidin, A; Wang, J; (2010) Maximizing Clicks of Sponsored Search by Integer Programming. Presented at: UNSPECIFIED.

Zangeneh, L; Bentley, PJ; (2010) Analyzing the Credit Default Swap Market Using Cartesian Genetic Programming. Presented at: UNSPECIFIED.

Zhang, D; Wang, J; Cai, D; Lu, J; (2010) Self-taught hashing for fast similarity search. Presented at: UNSPECIFIED.

Poster

Yang, G; (2010) Collaboration of Reconstruction and Registration for Digital Tomosynthesis Application. Presented at: 2010 Annual CIMST Meeting, Eidgenössische Technische Hochschule Zürich (ETH Zürich), SwitzerlandEidgenössische Technische Hochschule Zürich (ETH Zürich), SwitzerlandEidgenössische Technische Hochschule Zürich (ETH Zürich), Switzerland.

Thesis

De Nardi, R; (2010) Automatic Design of Controllers for Miniature Vehicles through Automatic Modelling. Doctoral thesis, University Of Essex, UK.

Lathia, N.K.; (2010) Evaluating collaborative filtering over time. Doctoral thesis, UCL (University College London). Green open access
file

Rondini, E.; (2010) Bandwidth-aware distributed ad-hoc grids in deployed wireless sensor networks. Doctoral thesis, UCL (University College London). Green open access
file

Saeedi, P.; (2010) Self–organised multi agent system for search and rescue operations. Doctoral thesis, UCL (University College London). Green open access
file

Steptoe, W.A.H.; (2010) Eye tracking and avatar-mediated communication in immersive collaborative virtual environments. Doctoral thesis, UCL (University College London). Green open access
file

Tagger, B.; (2010) A framework for the management of changing biological experimentation. Doctoral thesis, UCL (University College London). Green open access
file

Patent

Mitra, N; Pauly, M; (2010) Shadow Art.

Journal (full / special issue)

Bahsoon, R and Capra, L and Emmerich, W and Fayad, M (Eds). (2010) Software Architecture and Mobility. [Whole issue]. Journal of Systems and Software , 83 (6).

This list was generated on Sun Dec 4 05:38:52 2016 GMT.