Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 82
Issue Date | Title | Author(s) |
2022 | Hierarchical visualization of high dimensional data : interactive exploration of 'omics type data | Macquisten, Alexander Michael |
2022 | Towards model-based system engineering for autonomous cyber-physical systems | Salim, Hansen |
2022 | Neural architecture search across expanded and infinite spaces | Geada, Robert Joao |
2022 | Run-time adaptation of a functional stream processing system | Cattermole, Adam Douglas Derwent |
2018 | Psychoacoustics modelling and the recognition of silence in recorded speech | Wilson, Derek |
2022 | Computational Approaches to Generating Diverse Enzyme Panels | Atallah, Christian J.I. |
2022 | Self-Flipped Classroom Reuse of Student-Produced Videos for Flipped Classrooms | Vasilchenko, Anna |
2022 | Machine Learning and Probabilistic Methods for Network Security Assessment | Matthews, Isaac |
2022 | Performance modelling and analysis of systems under attack and misbehaviour | Almutairi, Ohud Mohammed |
2022 | Designing sustainable community interfaces | Nicholson, Stuart |
2021 | Longitudinal changes following acute brain injuries | Moreira da Silva, Nádia |
2020 | Automating Computational Placement for the Internet of Things | Michalák, Peter |
2020 | Machine-Checked Formalisation and Verification of Cryptographic Protocols | Metere, Roberto |
2022 | Learning Logical Rules from Knowledge Graphs | Gu, Yulong |
2022 | Real-time performance diagnosis and evaluation of big data systems in cloud datacenters | Demirbaga, Umit |
2022 | Decentralised, trustless marketplace for brokered IoT data trading | Bajoudah, Shaimaa Mohammed A |
2021 | A methodology for the quantitative evaluation of attacks and mitigations in IoT systems | Arnaboldi, Luca |
2021 | Modelling energy efficiency and performance trade-offs | Alssaiari, Ali Abdullah |
2021 | Scaling the development of large ontologies : identitas and hypernormalization | Alshammry, Nizal Khalf |
2021 | Performance-efficient cryptographic primitives in constrained devices | Alrowaithy, Majed Humaid |
Collection's Items (Sorted by Submit Date in Descending order): 41 to 60 of 82