University of Hertfordshire

Publications

  1. 2013
  2. 3D CFD modeling of air flow through a porous fence

    Xu, Y., Mustafa, M. Y., Knight, J., Virk, M. & Haritos, G., 2013, 4th IEEE Int Conf on Cognitive Infocommunications, CogInfoCom 2013 - Proceedings. IEEE Computer Society, p. 179-182 4 p. 6719237

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. A data-flow based coordination approach to concurrent software engineering

    Penczek, F., Cheng, W., Grelck, C., Kirner, R., Scheuermann, B. & Shafarenko, A., 2013, Proceedings - 2012 2nd Workshop on Data-Flow Execution Models for Extreme Scale Computing, DFM 2012. IEEE Computer Society, p. 36-43 8 p. 6612858

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Entry in progress

    A discussion on the recovery of data from a virtual machine

    Healey, N. J., Angelopoulou, O. & Evans, D., 2013, Proceedings - 4th International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2013. p. 603-606 4 p. 6631686

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. A heuristic strategy for performance optimisation of stream programs

    Nguyen, V. T. N. & Kirner, R., 2013, Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS. IEEE Computer Society, p. 430-431 2 p. 6808207

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. A method for reducing simulation performance gap using fourier filtering

    Jankovic, L., 2013, Proceedings of BS 2013: 13th Conference of the International Building Performance Simulation Association. p. 3729-3736 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. A qualitative metrics vector for the awareness of smartphone security users

    Mylonas, A., Gritzalis, D., Tsoumas, B. & Apostolopoulos, T., 2013, Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Proceedings. p. 173-184 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8058 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. A user friendly robot architecture for re-ablement and co-learning in a sensorised home

    Saunders, J., Burke, N., Koay, K. L. & Dautenhahn, K., 2013, Assistive Technology: From Research to Practice. Encarnacao, P., Azevedo, L., Gelderblom, G. J., Newell, A. & Mathiassen, N-E. (eds.). Amsterdam: IOS Press, Vol. 33. p. 49-58 (Assistive Technology Research Series; vol. 33).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Activities to Prevent Judo Injuries in the UK and France

    Callan, M. & Brousse, M., 2013, The Record of 14th Lecture.. Kanagawa, Japan: Solidarity of International Judo Education, p. 1-10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Adaptive human-robot interaction based on lag-lead modelling for home-based stroke rehabilitation: Novel mechanisms for assessment and performance based adaptation of task difficulty

    Basteris, A. & Amirabdollahian, F., 2013, Procs 2013 IEEE Int Conf on Systems, Man, and Cybernetics : SMC 2013. IEEE, p. 3414-3419 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. An Empirical Evaluation of Different Initializations on the Number of K-Means Iterations

    Cordeiro De Amorim, R., 2013, Advances in Artificial Intelligence: 11th Mexican International Conference on Artificial Intelligence - revised selected papers. Springer, p. 15-26 (Lecture Notes in Computer Science; vol. 7629).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...12 Next