Filter
Conference contribution book

Search results

  • When is a type refinement an inductive type

    Atkey, R., Johann, P. & Ghani, N., 2011, Foundations of Software Science and Computational Structures: 14th International Conference, FOSSACS 2011. Hofmann, M. (ed.). Springer, p. 72-87 16 p. (Lecture Notes in Computer Science ; vol. 6604).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    8 Citations (Scopus)
  • What's in a bug report?

    Davies, S. & Roper, M., 18 Sep 2014, ESEM '14 : Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement. New York, NY., p. 1-10 10 p. 26

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    29 Citations (Scopus)
    319 Downloads (Pure)
  • What's around the corner? Enhancing driver awareness in autonomous vehicles via in-vehicle spatial auditory displays

    Beattie, D., Baillie, L., Halvey, M. & McCall, R., 26 Oct 2014, NordiCHI '14 Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational . New York, NY., p. 189-198 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    26 Citations (Scopus)
    182 Downloads (Pure)
  • What makes re-finding information difficult? A study of email re-finding

    D. Elsweiler, M. B. & Ruthven, I., 2011, 33rd European Conference on Information Retrieval (ECIR 2011). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    32 Citations (Scopus)
    58 Downloads (Pure)
  • What do lab-based user studies tell us about in-the-wild behavior? insights from a study of museum interactives

    Hornecker, E. & Nicol, E., 2012, Proceedings of Designing Interactive Systems (DIS'12). New York, p. 358-367 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    19 Citations (Scopus)
  • Well-Founded Semantics for Extended Datalog and Ontological Reasoning

    Kupke, C., Gottlob, G., Lukasiewicz, T. & Hernich, A., Jun 2013, Proceedings of the 32nd Symposium on Principles of Database Systems. New York, p. 225-236 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    23 Citations (Scopus)
    69 Downloads (Pure)
  • Weak completeness of coalgebraic dynamic logics

    Hansen, H. H. & Kupke, C., 9 Sep 2015, Proceedings Tenth International Workshop on Fixed Points in Computer Science . Matthes, R. & Mio, M. (eds.). Berlin, Vol. 191. p. 90-104 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    3 Citations (Scopus)
    19 Downloads (Pure)
  • Vulnerability to social engineering in social networks: a proposed user-centric framework

    Albladi, S. & Weir, G. R. S., 17 Nov 2016, 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). Cartwright, B., Weir, G. & Lau, L. Y-C. (eds.). Piscataway, NJ: IEEE, p. 95-100 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    8 Citations (Scopus)
    750 Downloads (Pure)
  • VR/Urban: spread.gun - design process and challenges in developing a shared encounter for media façades

    Fischer, P. T., Zöllner, C. & Hornecker, E., 2010, Proceedings of British HCI 2010.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    38 Downloads (Pure)
  • Video test collection with graded relevance assessments

    Qiying, W., Halvey, M. & Villa, R., 13 Mar 2016, CHIIR'16: Proceedings of the 2016 ACM on Conference on Human Information Interaction and Retrieval. New York, p. 309-312 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    38 Downloads (Pure)
  • Variations on inductive-recursive definitions

    Ghani, N., McBride, C., Nordvall Forsberg, F. & Spahn, S., 30 Nov 2017, Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science. Germany, 13 p. 63. (Leibniz International Proceedings in Informatics ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    1 Citation (Scopus)
    28 Downloads (Pure)
  • Using smartphones in cities to crowdsource dangerous road sections and give effective in-car warnings

    Dunlop, M. D., Roper, M., Elliott, M., McCartan, R. & McGregor, B., 13 May 2016, Proceedings of the SEACHI 2016 on Smart Cities for Better Living with HCI and UX. New York, p. 14-18 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    7 Citations (Scopus)
    89 Downloads (Pure)
  • Using microenvironments to identify allosteric binding sites

    Foley, C. E., Al Azwari, S. M. M., Dufton, M. & Wilson, J., 4 Oct 2012, 2012 IEEE International Conference on Bioinformatics and Biomedicine (BIBM 2012). Piscataway, NJ: IEEE, p. 411-415 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    1 Citation (Scopus)
  • Using machine learning to classify test outcomes

    Roper, R., 20 May 2019, 2019 IEEE International Conference On Artificial Intelligence Testing (AITest). Piscataway, N.J.: IEEE, p. 99-100 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    2 Citations (Scopus)
    66 Downloads (Pure)
  • Using artefacts to investigate children's information seeking experiences

    Nicol, E., 26 Aug 2014, IIiX '14 Proceedings of the 5th Information Interaction in Context Symposium. New York, NY., p. 291-294 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    2 Citations (Scopus)
  • Uses of peer assessment in database teaching and learning

    Paterson, J., Wilson, J. N. & Leimich, P., 11 Mar 2012, Data security and security data: 27th British National Conference on Databases, BNCOD 27 Dundee, UK, June 29 – July 1, 2010. Revised Selected Papers. MacKinnon, L. M. (ed.). Berlin, p. 135-146 12 p. (Lecture Notes in Computer Science; vol. 6121).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    2 Citations (Scopus)
    116 Downloads (Pure)
  • Urban HCI: spatial aspects in the design of shared encounters for media facades

    Fischer, P. T. & Hornecker, E., 2012, Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems. New York, p. 307-316 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    96 Citations (Scopus)
  • Untangling the concept of task in information seeking and retrieval

    Soufan, A., Ruthven, I. & Azzopardi, L., 11 Jul 2021, ICTIR '21 : Proceedings of the 2021 ACM SIGIR International Conference on Theory of Information Retrieval. New York, NY., p. 73–81 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    79 Downloads (Pure)
  • Untangling cost, effort, and load in information seeking and retrieval

    McGregor, M., Azzopardi, L. & Halvey, M., 14 Mar 2021, CHIIR 2021 - Proceedings of the 2021 Conference on Human Information Interaction and Retrieval. New York, NY., p. 151–161 11 p. (CHIIR 2021 - Proceedings of the 2021 Conference on Human Information Interaction and Retrieval).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    1 Citation (Scopus)
    57 Downloads (Pure)
  • Understanding Android security

    Robinson, G. & Weir, G., 2015, Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: Proceedings of ICGS3 2015, 10th International Conference on Global Security, Safety & Sustainability.. Jahankhani, H., Carlile, A., Akhgar, B., Hessami, A. G. & Hosseinian-Far, A. (eds.). 1 ed. Switzerland: Springer International Publishing AG, Vol. 534. p. 189-199 11 p. (Communications in Computer and Information Science; vol. 534).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    6 Citations (Scopus)
    413 Downloads (Pure)
  • Type inference in context

    Gundry, A., Mcbride, C. & McKinna, J., 2010, MSFP '10 Proceedings of the third ACM SIGPLAN workshop on Mathematically structured functional programming . p. 43-54 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    6 Citations (Scopus)
  • Tutorial: Graphical calculus for quantum circuits

    Coecke, B. & Duncan, R., 2013, Reversible Computation: 4th International Workshop, RC 2012, Copenhagen, Denmark, July 2-3, 2012. Revised Papers. Glück, R. & Yokoyama, T. (eds.). Berlin: Springer, Vol. 7581. p. 1-13 13 p. (Lecture Notes in Computer Science; vol. 7581).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • Turing-completeness totally free

    McBride, C., 9 Jun 2015, Mathematics of Program Construction: 12th International Conference, MPC 2015, Königswinter, Germany, June 29--July 1, 2015. Proceedings. Hinze, R. & Voigtländer, J. (eds.). Cham, Switzerland: Springer, Vol. 9129. p. 257-275 19 p. (Lecture Notes in Computer Science; vol. 9129).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    14 Citations (Scopus)
    40 Downloads (Pure)
  • Triage in forensic accounting using Zipf's law

    Odueke, A. & Weir, G., 2012, Issues in Cybercrime, Security and Digital Forensics. Weir, G. & Al-Nemrat, A. (eds.). Glasgow, p. 33-43 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    442 Downloads (Pure)
  • Trends in smartcard fraud

    Burns, S. & Weir, G., 2008, Proceedings of the 4th International Conference on Global E-Security. Jahankhani, H., Revett, K. & Palmer-Brown, D. (eds.). Springer-Verlag, (Communications in Computer and Information Science; vol. 12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    File
    22 Downloads (Pure)
  • Transporting functions across ornaments

    Dagand, P-E. & McBride, C., 2012, ICFP '12 Proceedings of the 17th ACM SIGPLAN international conference on Functional programming . New York, p. 104-113 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    14 Citations (Scopus)
  • Translating extensive form games to open games with agency

    Capucci, M., Ghani, N., Ledent, J. & Nordvall Forsberg, F., 12 Jul 2021, Applied Category Theory 2021. Cambridge, 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    4 Downloads (Pure)
  • Towards semantic category verification with arbitrary precision

    Roussinov, D., 2011, Advances in Information Retrieval Theory : Third International Conference, ICTIR 2011, Bertinoro, Italy, September 12-14, 2011. Proceedings. Vol. 6931. p. 274-284 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • Towards measuring content coordination in microblogs

    Roussinov, D., 1 Mar 2018, (E-pub ahead of print) Advances in Information Retrieval: 40th European Conference on IR Research, ECIR 2018, Proceedings. Pasi, G., Piwowarski, B., Azzopardi, L. & Hanbury, A. (eds.). Cham: Springer-Verlag, p. 651-656 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10772).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    38 Downloads (Pure)
  • Towards authentication via selected extraction from electronic personal histories

    Nosseir, A. & Terzis, S., 2011, Enterprise Information Systems: Revised Selected Papers of the 12th International Conference on Enterprise Information Systems. Filipe, J. & Cordeiro, J. (eds.). Springer, p. 571-586 16 p. (Lecture Notes in Business Information Processing; vol. 73).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

  • Towards a universal information distance for structured data

    Connor, R., Simeoni, F., Iakovos, M. & Moss, R. G., 30 Jun 2011, SISAP '11 Proceedings of the Fourth International Conference on SImilarity Search and APplications. Ferro, A. (ed.). p. 69-77 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    2 Citations (Scopus)
    21 Downloads (Pure)
  • Through the Loupe: Visitor engagement with a primarily text-based handheld AR application

    Van Der Vaart, M. & Damala, A., 24 Feb 2016, 2015 Digital Heritage International Congress, Digital Heritage 2015. p. 565-572 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    22 Citations (Scopus)
    80 Downloads (Pure)
  • Three equivalent ordinal notation systems in cubical Agda

    Nordvall Forsberg, F., Xu, C. & Ghani, N., 24 Jan 2020, CPP 2020 : Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs. Blanchette, J. & Hritcu, C. (eds.). New York, p. 172–185 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    3 Citations (Scopus)
    29 Downloads (Pure)
  • The gentle art of levitation

    Chapman, J., Dagand, P-E., Mcbride, C. & Morris, P., 2010, ICFP 2010 Proceedings of the 15th ACM SIGPLAN international conference on functional programming. Hudak, P. (ed.). New York, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    20 Citations (Scopus)
  • The future of digitally enabled health coaching: a proposed model

    Kyfonidis, C. & McGee-Lennon, M., 9 Sep 2015, INTERACT 2015 Adjunct Proceedings: 15th IFIP TC. 13 International Conference on Human-Computer Interaction 14-18 September 2015, Bamberg, Germany. Beckmann, C. & Gross, T. (eds.). Vol. 22. p. 387-398 12 p. (Contributions of the Faculty Information Systems and Applied Computer Sciences of the Otto-Friedrich-University Bamberg; vol. 22).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    24 Downloads (Pure)
  • The emotional impact of search tasks

    Poddar, A. & Ruthven, I., 18 Aug 2010, Proceedings of the 3rd Information Interaction in Context Symposium (IIiX 2010). New York, p. 35-44 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    18 Citations (Scopus)
  • The design of t-vote: a tangible tabletop application supporting children's decision making

    McCrindle, C., Hornecker, E., Lingnau, A. & Rick, J., 2011, Proceedings of the 10th International Conference on Interaction Design and Children: IDC'11. NY, p. 181-184 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    15 Citations (Scopus)
  • The cost of reasoning with RDF updates

    Al Azwari, S. & Wilson, J. N., 6 Feb 2015, Proceedings of the 9th IEEE International Conference on Semantic Computing (IEEE ICSC 2015). Piscataway, New Jersey, United States: IEEE, p. 328-331 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    2 Citations (Scopus)
    120 Downloads (Pure)
  • Text entry tap accuracy and exploration of tilt controlled layered interaction on smartwatches

    Dunlop, M. D., Roper, M. & Imperatore, G., 7 Sep 2017, MobileHCI '17 : Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services. New York, 11 p. 23

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    4 Citations (Scopus)
    154 Downloads (Pure)
  • Text entry on the edge

    Clawson, J., Arif, A. S., Brewster, S., Dunlop, M., Kristensson, P. O. & Oulasvirta, A., 18 Apr 2015, CHI EA '15 Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems . p. 2381-2384 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    4 Citations (Scopus)
  • Tailoring the adaptive augmented reality (A2R) museum visit: ientifying cultural heritage professionals’ motivations and needs

    Damala, A. & Stojanovic, N., 2012, 2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-AMH). IEEE, p. 71-80 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    21 Citations (Scopus)
  • Supermetric search with the four-point property

    Connor, R., Vadicamo, L., Cardillo, F. A. & Rabitti, F., 24 Oct 2016, 9th International Conference on Similiarty Search and Applications. Springer-Verlag, Vol. 9939. p. 51-64 14 p. 2. (Lecture Notes in Computing Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    10 Citations (Scopus)
    94 Downloads (Pure)
  • Strong completeness for iteration-free coalgebraic dynamic logics

    Kupke, C., Hansen, H. H. & Leal, R. A., Sep 2014, Theoretical Computer Science: 8th IFIP TC 1/WG 2.2 International Conference, TCS 2014. Diaz, J., Lanese, I. & Sangiorgi, D. (eds.). Springer, Vol. 8705. p. 281-295 15 p. (Lecture Notes in Computer Science; vol. 8705).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    6 Citations (Scopus)
    89 Downloads (Pure)
  • Strategies for covert Web search

    Weir, G. R. S. & Igbako, D., 2013, Fourth Cybercrime and Trustworthy Computing Workshop (CTC), 2013. Piscataway, NJ, United States: IEEE, p. 50-57 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    1 Citation (Scopus)
  • Stable model semantics for guarded existential rules and description logics

    Gottlob, G., Hernich, A., Kupke, C. & Lukasiewicz, T., Jul 2014, Principles of Knowledge Representation and Reasoning: Proceedings of the Fourteenth International Conference, KR 2014. Baral, C., De Giacomo, G. & Eiter, T. (eds.). p. 258−267 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    11 Citations (Scopus)
  • Small induction recursion

    Hancock, P., McBride, C., Ghani, N., Malatesta, L. & Altenkirch, T., 6 Jun 2013, Typed Lambda Calculus and Applications: 11th International Conference, TLCA 2013, Eindhoven, The Netherlands, June 26-28, 2013. Proceedings. Hasegawa, M. (ed.). Berlin: Springer, p. 156-172 17 p. (Lecture Notes in Computer Science; vol. 7941).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    9 Citations (Scopus)
  • Shinren: Non-monotonic trust management for distributed systems

    Dong, C. & Dulay, N., 18 Jun 2010, Trust Management IV: 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings. Nishigaki, M., Jøsang, A., Murayama, Y. & Marsh, S. (eds.). Cham, Switzerland: Springer, p. 125-140 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    8 Citations (Scopus)
    36 Downloads (Pure)
  • Sharing happy information: responses and self-portrayal

    Tinto, F. & Ruthven, I., 3 Sep 2014, ISIC : The Information Behaviour Conference . 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    67 Downloads (Pure)
  • Secure set-based policy checking and its application to password registration

    Dong, C. & Kiefer, F., 21 Sep 2015, (Accepted/In press) Cryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings. Reiter, M. & Naccache, D. (eds.). 16 p. (Security and Cryptology; vol. 9476).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    11 Downloads (Pure)
  • Search procedures revisited

    Kelly, D., Ruthven, I., F. Astrom, B. L. (ed.) & Schneider, J. W. (ed.), 2010, The Janus Faced Scholar - a Festschrift in Honour of Peter Ingwersen. p. 59-67 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution book

    Open Access
    File
    47 Downloads (Pure)