Browse by UCL Departments and Centres
![]() | Up a level |
Group by: Author | Type
Number of items: 53.
A
Attfield, S;
Blandford, AE;
(2010)
Discovery-led refinement in e-discovery investigations: sensemaking, cognitive ergonomics and system design.
Artificial Intelligence and Law
, 18
(4)
387 - 412.
10.1007/s10506-010-9091-y.
![]() |
![]() |
B
Baldassarre, L;
Barla, A;
Noceti, N;
Odone, F;
(2010)
Learning how to grasp objects.
In: Verleysen, M, (ed.)
ESANN 2010 proceedings: European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning: Bruges (Belgium), 28-30 April 2010.
(pp. 289 - 294).
d-side: Evere, Belgium.
![]() |
![]() |
Beautement, A;
Sasse, MA;
(2010)
Gathering realistic authentication performance data through field trials.
Presented at: 6th Symposium on Usable Privacy and Security (SOUPS) 2010, Redmond, Washington.
![]() |
![]() |
Bittau, A;
Hamburg, M;
Handley, M;
Mazières, D;
Boneh, D;
(2010)
The Case for Ubiquitous Transport-Level Encryption.
In:
USENIX Security'10: Proceedings of the 19th USENIX conference on Security.
(pp. 403 - 418).
USENIX Association: Berkeley, California, USA.
![]() |
C
Campbell, NDF;
Vogiatzis, G;
Hernández, C;
Cipolla, R;
(2010)
Automatic 3D Object Segmentation in Multiple Views using Volumetric Graph-Cuts.
Image and Vision Computing
, 28
(1)
14 -25.
10.1016/j.imavis.2008.09.005.
![]() |
![]() |
Carletti, T;
Righi, S;
(2010)
Weighted Fractal Networks.
Physica A - Statistical Mechanics and Its Applications
, 389
(10)
pp. 2134-2142.
10.1016/j.physa.2010.01.019.
![]() |
![]() |
Clegg, RG;
Di Cairano-Gilfedder, C;
Zhou, S;
(2010)
A critical look at power law modelling of the Internet.
[Review].
Computer Communications
, 33
(3)
259 - 268.
10.1016/j.comcom.2009.09.009.
![]() |
Courtois, NT;
Jackson, K;
Ware, D;
(2010)
Fault-Algebraic Attacks on Inner Rounds of DES.
In:
Strategies Telecom and Multimedia: Montreuil, France.
![]() |
![]() |
Crosier, M;
Griffin, LD;
(2010)
Using basic image features for texture classification.
International Journal of Computer Vision
, 88
(3)
447 - 460.
10.1007/s11263-009-0315-0.
![]() |
![]() |
D
De Nardi, R;
(2010)
Automatic Design of Controllers for Miniature Vehicles through Automatic Modelling.
Doctoral thesis , University Of Essex, UK.
|
F
Furniss, D;
Back, J;
Blandford, A;
(2010)
Resilience in Emergency Medical Dispatch: Big R and little r.
In: Hayes, GR and Tan, DS and Wilcox, L, (eds.)
Proceedings of the First International Workshop on Interactive Systems in Healthcare.
(pp. pp. 9-12).
Dealer Analysis Group: Atlanta, GA, United States.
![]() |
![]() |
Furniss, D;
Blandford, A;
(2010)
DiCoT Modeling: From Analysis to Design.
Presented at: CHI 2010 workshop: ‘Contextual Analysis and Design’, Atlanta, US.
![]() |
G
Graepel, T;
Candela, JQ;
Borchert, T;
Herbrich, R;
(2010)
Web-Scale Bayesian click-through rate prediction for sponsored search advertising in Microsoft's Bing search engine.
In: Fürnkranz, J and Joachims, T, (eds.)
Proceedings of the 27th International Conference on Machine Learning (ICML-10), June 21-24, 2010, Haifa, Israel.
(pp. 13 - 20).
Omnipress
![]() |
Griffin, LD;
Lillholm, M;
(2010)
Symmetry sensitivities of Derivative-of-Gaussian filters.
IEEE Transactions on Pattern Analysis and Machine Intelligence
, 32
(6)
1072 - 1083.
10.1109/TPAMI.2009.91.
![]() |
![]() |
H
Herbster, M;
(2010)
A Triangle Inequality for p-Resistance.
Presented at: Workshop on Networks Across Disciplines: Theory and Applications, Vancouver, B.C., Canada.
![]() |
![]() |
Hiltz, K;
Back, J;
Blandford, A;
(2010)
The roles of conceptual device models and user goals in avoiding device initialization errors.
Interacting with Computers
, 22
(5)
363 - 374.
10.1016/j.intcom.2010.01.001.
![]() |
![]() |
I
Inglesant, PG;
Sasse, MA;
(2010)
Studying Password Use in the Wild: Practical Problems and Possible Solutions.
In:
Proceedings of the Sixth Symposium on Usable Privacy and Security.
![]() |
Inglesant, PG;
Sasse, MA;
(2010)
The true cost of unusable password policies: password use in the wild.
In:
Proceedings of the 28th international conference on Human factors in computing systems.
(pp. 383 - 392).
ACM: New York, NY, USA.
![]() |
![]() |
Islam, SS;
Krinke, J;
Binkley, D;
Harman, M;
(2010)
Coherent dependence clusters.
In:
Proceedings of the 9th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering: PASTE '10.
(pp. pp. 53-60).
ACM: New York, US.
![]() |
![]() |
J
Jones, G;
Bielski, R;
Julier, S;
Berthouze, N;
(2010)
Towards a situated, multimodal interface for multiple UAV control.
In:
IEEE International Conference on Robotics and Automation.
(pp. 1739 - 1744).
IEEE
![]() |
![]() |
K
Keval, H;
Sasse, MA;
(2010)
"Not the Usual Suspects": A Study of Factors Reducing the Effectiveness of CCTV.
Security Journal
, 23
(2)
134 - 154.
10.1057/palgrave.sj.8350092.
![]() |
![]() |
Krinke, J;
Gold, N;
Jia, Y;
Binkley, D;
(2010)
Cloning and Copying between GNOME Projects.
In:
Proceedings of the 2010 7th IEEE Working Conference on Mining Software Repositories: co-located with ICSE 2010, May 2-3, 2010, Cape Town, South Africa: MSR 2010, mining software repositories.
(pp. 98 - 101).
IEEE Computer Society: Piscataway, US.
![]() |
![]() |
Krinke, J;
Gold, N;
Jia, Y;
Binkley, D;
(2010)
Distinguishing copies from originals in software clones.
In:
(pp. pp. 41-48).
![]() |
![]() |
L
Lathia, N.K.;
(2010)
Evaluating collaborative filtering over time.
Doctoral thesis , UCL (University College London).
![]() |
![]() |
Lopes, NP;
Pérez, JAN;
Rybalchenko, A;
Singh, A;
(2010)
Applying Prolog to develop distributed systems.
Theory and Practice of Logic Programming
, 10
(4-6)
691 - 707.
10.1017/S1471068410000360.
![]() |
![]() |
M
Makri, S;
Blandford, A;
Cox, AL;
(2010)
This is what I’m doing and why: Reflections on a think-aloud study of digital library users’ information behaviour.
In:
JCDL '10: Digital Libraries - 10 years past, 10 years forward, a 2020 vision: June 21-15, 2010, Gold Coast, Australia.
(pp. 349 - 352).
ACM Press: New York, US.
![]() |
![]() |
Marchenko, P;
Karp, B;
(2010)
Structuring protocol implementations to protect sensitive data.
In:
Proceedings of the 19th USENIX Security Symposium: August 11–13, 2010, Washington, DC.
(pp. 47 - 62).
USENIX Association: Berkeley, US.
![]() |
Morgan, GL;
Zhang, H;
Whitcher, B;
Alexander, DC;
(2010)
A spatial variation model of white matter microstructure.
In: Zhang, H, (ed.)
Proceedings of the Workshop on Computational Diffusion MRI (CDMRI'10), Medical Image Computing and Computer-Assisted Intervention (MICCAI 2010).
(pp. 165 - 174).
![]() |
![]() |
N
Nugent, T;
Jones, DT;
(2010)
Predicting Transmembrane Helix Packing Arrangements using Residue Contacts and a Force-Directed Algorithm.
PLoS Computational Biology
, 6
(3)
, Article e1000714. 10.1371/journal.pcbi.1000714.
![]() |
![]() |
P
Parkin, S;
Van Moorsel, A;
Inglesant, P;
Sasse, MA;
(2010)
A stealth approach to usable security: Helping IT security managers to identify workable security solutions.
In:
Proceedings New Security Paradigms Workshop.
(pp. 33 - 49).
ACM
![]() |
![]() |
Politi, M;
Scalas, E;
Fulger, D;
Germano, G;
(2010)
Spectral densities of Wishart-Lévy free stable random matrices.
European Physical Journal B
, 73
(1)
pp. 13-22.
10.1140/epjb/e2009-00360-7.
![]() |
Prevost, R;
Buckley, DL;
Alexander, DC;
(2010)
OPTIMIZATION OF THE DCE-CT PROTOCOL USING ACTIVE IMAGING.
In:
(Proceedings) 7th IEEE International Symposium on Biomedical Imaging: From Nano to Macro.
(pp. pp. 776-779).
IEEE
![]() |
![]() |
Q
Quercia, D.;
Lathia, N.;
Calabrese, F.;
Di Lorenzo, G.;
Crowcroft, J.;
(2010)
Recommending Social Events from Mobile Phone Location Data.
In:
ICDM 2010 The 10th IEEE International Conference on Data Mining 14-17 December 2010 Sydney, Australia.
(pp. pp. 971-976).
IEEE: Los Alamitos, CA US.
![]() |
![]() |
R
Rahaman, A;
Sasse, MA;
(2010)
Human-centred identity - from rhetoric to reality.
Presented at: Identity in the Information Society Workshop (IDIS10), Rome, Italy.
![]() |
![]() |
Rahaman, A;
Sasse, MA;
(2010)
A framework for the lived experience of identity.
Identity in the Information Society
, 3
(3)
pp. 605-638.
10.1007/s12394-010-0078-3.
![]() |
![]() |
Riegelsberger, J;
Sasse, MA;
(2010)
Ignore These At Your Peril: Ten principles for trust design.
Presented at: TRUST2010: 3rd International Conference on Trust and Trustworthy Computing, Berlin, Germany.
![]() |
![]() |
Rondini, E.;
(2010)
Bandwidth-aware distributed ad-hoc grids in deployed wireless sensor networks.
Doctoral thesis , UCL (University College London).
![]() |
![]() |
Ruskov, M;
Seager, W;
Sasse, MA;
(2010)
Persuading giants to be wise: an exploratory study of advice sharing in online games.
In:
Personal Learning Environments Conference Proceedings.
![]() |
![]() |
S
Saeedi, P.;
(2010)
Self–organised multi agent system for search and rescue operations.
Doctoral thesis , UCL (University College London).
![]() |
![]() |
Sanchez-Vives, MV;
Spanlang, B;
Frisoli, A;
Bergamasco, M;
Slater, M;
(2010)
Virtual Hand Illusion Induced by Visuomotor Correlations.
PLOS ONE
, 5
(4)
, Article e10381. 10.1371/journal.pone.0010381.
![]() |
![]() |
Sasse, MA;
(2010)
Not Seeing the Crime for the Cameras?
Communications of the ACM
, 53
(2)
22 - 25.
10.1145/1646353.1646363.
![]() |
![]() |
Slater, M;
Spanlang, B;
Sanchez-Vives, MV;
Blanke, O;
(2010)
First Person Experience of Body Transfer in Virtual Reality.
PLOS ONE
, 5
(5)
, Article e10564. 10.1371/journal.pone.0010564.
![]() |
![]() |
Steptoe, W.A.H.;
(2010)
Eye tracking and avatar-mediated communication in immersive collaborative virtual environments.
Doctoral thesis , UCL (University College London).
![]() |
![]() |
Sulaiman, S;
Blandford, A;
Cairns, P;
(2010)
Haptic Experience and the Design of Drawing Interfaces.
Interacting with Computers
, 22
(3)
193 - 205.
10.1016/j.intcom.2009.11.009.
![]() |
![]() |
Sun, S;
Shawe-Taylor, J;
(2010)
Sparse Semi-supervised Learning Using Conjugate Functions.
Journal of Machine Learning Research
, 11
2423 - 2455.
![]() |
T
Tagger, B.;
(2010)
A framework for the management of changing biological experimentation.
Doctoral thesis , UCL (University College London).
![]() |
![]() |
Teschendorff, AE;
Severini, S;
(2010)
Increased entropy of signal transduction in the cancer metastasis phenotype.
BMC Systems Biology
, 4
, Article 104. 10.1186/1752-0509-4-104.
![]() |
![]() |
Y
Yang, G;
Hipwell, JH;
Clarkson, MJ;
Tanner, C;
Mertzanidou, T;
Gunn, S;
Ourselin, S;
... Arridge, SR; + view all
(2010)
Combined Reconstruction and Registration of Digital Breast Tomosynthesis.
In: Marti, J and Oliver, A and Freixenet, J and Marti, R, (eds.)
Proceedings of the International Workshop on Digital Mammography: 10th International Workshop, IWDM 2010, Girona, Catalonia, Spain, June 16-18, 2010.
(pp. 760 - 768).
Springer: Germany: Berlin.
![]() |
![]() |
Yogarajah, M;
Focke, NK;
Bonelli, SB;
Thompson, P;
Vollmar, C;
McEvoy, AW;
Alexander, DC;
... Duncan, JS; + view all
(2010)
The structural plasticity of white matter networks following anterior temporal lobe resection.
Brain
, 133
(8)
2348 - 2364.
10.1093/brain/awq175.
![]() |
![]() |
Z
Zanasi, F;
(2010)
La definizione nei sistemi logici di S. Lesniewski.
Annali Della Facoltà di Lettere E Filosofia:Università di Siena
, 31
pp. 111-140.
![]() |
Zanasi, Fabio;
(2010)
La definizione nell'Ontologia di S. Lesniewski - uno studio sulle definizioni creative.
UNSPECIFIED thesis (B.A.), University of Siena.
![]() |
Zanolin, L;
Mascolo, C;
Emmerich, W;
(2010)
Model checking programmable router configurations.
![]() |
![]() |
Zhang, Y;
(2010)
Multi-Objective Search-based Requirements Selection and Optimisation.
Doctoral thesis , UNSPECIFIED.
|