1. Published

    Criterion of calibration for Transductive Confidence Machine with limited feedback

    Nouretdinov, I. & Vovk, V., Apr 2003, (On-line Compression Modelling project, http://vovk.net/kp).

    Research output: Working paper

  2. Published

    Cross-conformal predictive distributions

    Vovk, V., Nouretdinov, I., Manokhin, V. & Gammerman, A., Jun 2018, Proceedings of Machine Learning Research. Gammerman, A., Vovk, V., Luo, Z., Smirnov, E. & Peeters, R. (eds.). Vol. 91. p. 37-51 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Cross-conformal predictors

    Vovk, V., Jun 2015, In: Annals of Mathematics and Artificial Intelligence. 74, 1-2, p. 9-28 20 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Cross-conformal predictors

    Vovk, V., 3 Aug 2012.

    Research output: Working paper

  5. Published

    Cross-Domain Metric and Multiple Kernel Learning Based on Information Theory

    Wang, W., Wang, H., Zhang, C. & Gao, Y., Mar 2018, In: Neural Computation. 30, 3, p. 820-855 36 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Cross-entropy optimisation of importance sampling parameters for statistical model checking

    Jegourel, C., Legay, A. & Sedwards, S., 1 Jan 2012, Computer Aided Verification: Proceedings of the 24th International Conference, CAV 2012, Berkeley, CA, USA, July 7-13, 2012. Madhusudan, P. & Seshia, S. A. (eds.). Springer-Verlag, p. 327-342 16 p. (Lecture Notes in Computer Science; vol. 7358).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Crowdsourcing Lightweight Pyramids for Manual Summary Evaluation

    Shapira, O., Gabay, D., Gao, Y., Ronen, H., Pasunuru, R., Bansal, M., Amsterdamer, Y. & Dagan, I., Jun 2019, Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics, Vol. 1. p. 682-687 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Crucial Issues in the Design of a Real-Time Contaminant Detection System for Food Products

    Davies, E. R., Patel, D. & Johnstone, A., Dec 1995, In: Real-Time Imaging. 1, 6, p. 397-407 11 p.

    Research output: Contribution to journalArticlepeer-review

  9. E-pub ahead of print

    Cryptographic Enforcement of Information Flow Policies Without Public Information

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 9 Jan 2016, (E-pub ahead of print) 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . Malkin, T., Kolesnikov, V., Bishop Lewko, A. & Polychronakis, M. (eds.). p. 389-408 20 p. (Lecture Notes in Computer Science; vol. 9092).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Cryptographic enforcement of information flow policies without public information via tree partitions

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 24 Aug 2017, In: Journal of Computer Security. 25, 6, p. 511-535 25 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Cryptographic Protocol Synthesis and Verification for Multiparty Sessions

    Bhargavan, K., Corin, R., Denielou, P-M., Fournet, C. & Leifer, J. J., 2009, PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM. LOS ALAMITOS: IEEE COMPUTER SOC, p. 124-140 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Cryptographic Tools for Cloud Environments

    Alderman, J., Crampton, J. & Martin, K., 2016, Guide to Security Assurance for Cloud Computing. Zhu, S. Y., Hill, R. & Trovati, M. (eds.). Springer, Vol. Guide to Security Assurance for Cloud Computing. p. 15-30 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Published

    Crystal Structure Prediction via Oblivious Local Search

    Antypov, D., Deligkas, A., Gusev, V., Rosseinsky, M. J., Spirakis, P. G. & Theofilatos, M., 12 Jun 2020, 18th International Symposium on Experimental Algorithms, SEA 2020. Faro, S. & Cantone, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. 21. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 160).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    C-SHORe: A Collapsible Approach to Verifying Higher-Order Programs

    Broadbent, C., Carayol, A., Hague, M. & Serre, O., 25 Sep 2013, ICFP: International Conference on Functional Programming. p. 13-24 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    CSS Minification via Constraint Solving

    Hague, M., Lin, A. & Hong, C-D., 21 Jun 2019, In: ACM Transactions on Programming Languages and Systems. 41, 2, p. 1-76 76 p., 12.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Cyclisation of Cell-Penetrating PDZ-Binding Peptides Directed to PSD95

    Dabhi, S., Duberly, K., Alnasir, J., Wijesiriwardana, N. & Austen, B., 2019, In: American Research Journal of Chemistry. 3, 1, p. 1-11 11 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Dagsthul Seminar on Foundations of Global Computing

    Fiadeiro, J. L., Montanari, U. & Wirsing, M., 2006, Foundations of Global Computing. Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, Vol. 05081. (Dagstuhl Seminar Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  18. Published

    Data caching as a cloud service

    Chockler, G., Laden, G. & Vigfusson, Y., 2010, Proceedings of the 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS '10). ACM, p. 18-21 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Data classication apparatus and method thereof

    Gammerman, A. & Vovk, V., Jul 2004, Patent No. 1129428

    Research output: Patent

  20. E-pub ahead of print

    Data-Driven Robust Control for a Closed-Loop Artificial Pancreas

    Paoletti, N., Liu, K. S., Chen, H., Smolka, S. A. & Lin, S., 23 Apr 2019, (E-pub ahead of print) In: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB). p. 1-13 13 p.

    Research output: Contribution to journalArticlepeer-review

  21. E-pub ahead of print

    Data-Driven Robust Control for Type 1 Diabetes Under Meal and Exercise Uncertainties

    Paoletti, N., Liu, K. S., Smolka, S. A. & Lin, S., 1 Sep 2017, (E-pub ahead of print) Computational Methods in Systems Biology. Feret, J. & Koeppl, H. (eds.). Springer, p. 214-232 19 p. (Lecture Notes in Computer Science; vol. 10545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published
  23. Published

    Decay constants of B and D mesons from improved relativistic lattice QCD with two flavors of sea quarks

    Khan, A. A., Aoki, S., Burkhalter, R., Ejiri, S., Fukugita, M., Hashimoto, S., Ishizuka, N., Iwasaki, Y., Kanaya, K., Kaneko, T., Kuramashi, Y., Manke, T., Nagai, K., Okawa, M., Shanahan, H. P., Ukawa, A., Yoshie, T. & CP-PACS Collaboration, 1 Aug 2001, In: Physical Review D . 6403, 3, p. - 17 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Decidable models of integer-manipulating programs with recursive parallelism

    Hague, M. & Lin, A., 30 Nov 2018, In: Theoretical Computer Science. 750, p. 24-37 14 p.

    Research output: Contribution to journalArticlepeer-review

  25. E-pub ahead of print

    Decidable Models of Integer-Manipulating Programs with Recursive Parallelism

    Hague, M. & Lin, A., 13 Sep 2016, (E-pub ahead of print) Reachability Problems: 10th International Workshop, RP 2016, Aalborg, Denmark, September 19-21, 2016, Proceedings. Springer International Publishing, Vol. 9899. p. 148-162 15 p. (Lecture Notes in Computer Science; vol. 9899).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Decision Boundaries Using Bayes Factors: The Case of Cloud Masks

    Murtagh, F., Barreto, D. & Marcello, J., Dec 2003, In: IEEE Transactions on Geoscience and Remote Sensing. 41, 12, p. 2952-2958 6 p.

    Research output: Contribution to journalArticle

  27. Published

    Decision Making with a KGP Agent System

    Forth, J., Stathis, K. & Toni, F., 2006, In: Journal of Decision Systems. 15, 2-3, p. 241-266 26 p.

    Research output: Contribution to journalArticlepeer-review

  28. E-pub ahead of print

    Decision procedures for path feasibility of string-manipulating programs with complex operations

    Chen, T., Hague, M., Lin, A., Rümmer, P. & Wu, Z., 2 Jan 2019, (E-pub ahead of print) p. 1-30. 30 p.

    Research output: Contribution to conferencePaperpeer-review

  29. Published

    Declarative agent control

    Kakas, A., Mancarella, P., Sadri, F., Stathis, K. & Toni, F., 2004, Computational Logic in Multi-agent Systems (CLIMA 2004). Springer-Verlag, Vol. 3487. p. 96-110 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Decomposing Constraint Satisfaction Problems Using Database Techniques

    Gyssens, M., Jeavons, P. G. & Cohen, D. A., 1994, In: Artificial Intelligence. 66, 1, p. 57-89 33 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Decomposing k-arc-strong tournaments into strong spanning subdigraphs

    Bang-Jensen, J. & Yeo, A., Jul 2004, In: Combinatorica. 24, 3, p. 331-349

    Research output: Contribution to journalArticlepeer-review

  32. E-pub ahead of print

    Decomposition Structures for Soft Constraint Evaluation Problems: An Algebraic Approach

    Montanari, U., Sammartino, M. & Tcheukam, A., 7 Feb 2018, (E-pub ahead of print) Graph Transformation, Specifications, and Nets. Heckel, R. & Taentzer, G. (eds.). Springer-Verlag, p. 179-200 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10800 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  33. Published

    Deconvolution and blind deconvolution in astronomy

    Murtagh, F., Pantin, E. & Starck, J-L., 2007, Blind Image Deconvolution: Theory and Applications. Campisi, P. & Egiazarian, K. (eds.). Taylor and Francis, p. 277-316

    Research output: Chapter in Book/Report/Conference proceedingChapter

  34. Published

    Deconvolution in astronomy: a review

    Murtagh, F., Starck, J. L. & Pantin, E., 2002, In: Publications of the astronomical society of the pacific. 114, p. 1051-1069

    Research output: Contribution to journalArticle

  35. Forthcoming

    Deep Learnable Strategy Templates for Multi-Issue Bilateral Negotiation

    Bagga, P., Paoletti, N. & Stathis, K., 2022, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  36. Published

    Deep Learning Based Fault Prediction in Wireless Sensor Network Embedded Cyber-Physical Systems for Industrial Processes

    Ruan, H., Dorneanu, B., Mohamed, A., Arellano-Garcia, H., Xiao, P. & Zhang, L., 20 Jan 2022, In: IEEE Access.

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Deep learning based melanoma diagnosis using dermoscopic images

    Wall, C., Young, F., Zhang, L., Phillips, E-J., Jiang, R. & Yu, Y., 15 Aug 2020, World Scientific Proceedings Series on Computer Engineering and Information Science. In: Developments of Artificial Intelligence Technologies in Computation and Robotics. World Scientific Proceedings Series on Computer Engineering and Information Science, 12. : World Scientific, Singapore, p. 907-914 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Deep learning-based fall detection

    Chiang, J. W. H. & Zhang, L., 15 Aug 2020, Deep learning-based fall detection . In: Developments of Artificial Intelligence Technologies in Computation and Robotics. World Scientific Proceedings Series on Computer Engineering and Information Science, 12.: World Scientific, Singapore, p. 891-898 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Deep Recurrent Neural Networks with Attention Mechanisms for Respiratory Anomaly Classification

    Wall, C., Zhang, L., Yu, Y. & Mistry, K., 20 Sep 2021, 2021 International Joint Conference on Neural Networks (IJCNN). International Joint Conference on Neural Networks (IJCNN): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Defending financial infrastructures through early warning systems: The intelligent cloud approach

    Lodi, G., Querzoni, L., Baldoni, R., Marchetti, M., Colajanni, M., Bortnikov, V., Chockler, G., Dekel, E., Laventman, G. & Roytman, A., 2009, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies (CSIIRW '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Defensive Forecast for Conformal Bounded Regression

    Nouretdinov, I. & Lebedev, A., Oct 2013, The 9th Artificial Intelligence Applications and Innovations Conference (AIAI): 2nd Workshop on Conformal Prediction and its Applications. p. 384-393 10 p. (IFIP Advances in Information and Communication Technology; vol. 412).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Defensive forecasting

    Vovk, V., Takemura, A. & Shafer, G., Sep 2004.

    Research output: Working paper

  43. Published

    Defensive forecasting

    Vovk, V., Takemura, A. & Shafer, G., 30 May 2005.

    Research output: Working paper

  44. Published

    Defensive forecasting

    Vovk, V., Takemura, A. & Shafer, G., 2005, Proceedings of the Tenth International Workshop on Articial Intelligence and Statistics. Cowell, R. & Ghahramani, Z. (eds.). p. 365-372 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Defensive forecasting for linear protocols

    Vovk, V., Nouretdinov, I., Takemura, A. & Shafer, G., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, Vol. 3734. p. 459-473 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Defensive forecasting for linear protocols

    Vovk, V., Nouretdinov, I., Takemura, A. & Shafer, G., 2 Jun 2005.

    Research output: Working paper

  47. Published
  48. Published

    Defensive prediction with expert advice

    Vovk, V., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, p. 444-458 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Dependent coercions

    Luo, Z. & Soloviev, S., 1999, Proc of the 8th Inter. Conf. on Category Theory in Computer Science (CTCS'99), Edinburgh, Scotland. Electronic Notes in Theoretical Computer Science, Vol 29.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Dependent Event Types

    Luo, Z. & Soloviev, S., 2017, Logic, Language, Information, and Computation: 24th International Workshop, WoLLIC 2017, London, UK, July 18-21, 2017, Proceedings. Springer, p. 216-228 13 p. (Lecture Notes in Computer Science; vol. 10388).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  51. Published

    Dependent Randomized Rounding: The Bipartite Case

    Doerr, B., Künnemann, M. & Wahlström, M., 2011, 2011 Proceedings of the Thirteenth Workshop on Algorithm Engineering and Experiments (ALENEX). Müller-Hannemann, M. & Werneck, R. (eds.). San Francisco, California, USA: SIAM, p. 96-106 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Dependent record types revisited

    Luo, Z., 2009, Modules and Libraries for Proof Assistants (MLPA'09), ACM Inter. Conf. Proceeding Series. Vol. 429.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Derandomizing stochastic prediction strategies

    Vovk, V., 1997, Proceedings of the Tenth Annual Conference on Computational Learning Theory. Freund, Y. & Schapire, R. (eds.). New York: ACM Press, p. 32-44 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Derandomizing stochastic prediction strategies

    Vovk, V., Jun 1999, In: Machine Learning. 35, 3, p. 247-282 36 p.

    Research output: Contribution to journalArticlepeer-review

  55. Published

    Derivation of Constraints and Database Relations

    Cohen, D. A., Gyssens, M. & Jeavons, P. G., 1996, p. 134-148.

    Research output: Contribution to conferencePaper

  56. Published

    Derivation representation using binary subtree sets

    Scott, E., Johnstone, A. & van Binsbergen, L. T., 15 Apr 2019, In: Science of Computer Programming. 175, p. 63-84 22 p.

    Research output: Contribution to journalArticlepeer-review

  57. Published

    Describing, structuring and implementing objects

    FIADEIRO, J. & MAIBAUM, T., 1991, In: Lecture Notes in Computer Science. 489, p. 274-310 37 p.

    Research output: Contribution to journalArticlepeer-review

  58. Published

    Design and implementation of caching services in the cloud

    Chockler, G., Laden, G. & Vigfusson, Y., Nov 2011, In: IBM Journal of Research and Development. 55, 6, p. 9:1-9:11 11 p., 9.

    Research output: Contribution to journalArticlepeer-review

  59. Published

    Design and implementation of caching services in the cloud

    Chockler, G., Laden, G. & Vigfusson, Y., 2011, In: IBM Journal of Research and Development. 55, 6, 11 p., 9.

    Research output: Contribution to journalArticlepeer-review

  60. Published

    Designing a Mathematical Vernacular (Invited talk at ESSLLI'97)

    Luo, Z. & Callaghan, P., 1997.

    Research output: Contribution to conferencePaperpeer-review

  61. Published

    Designing deterministic polynomial-space algorithms by color-coding multivariate polynomials

    Gutin, G., Reidl, F., Wahlstrom, M. & Zehavi, M., Aug 2018, In: Journal of Computer and System Sciences. 95, p. 69-85 17 p.

    Research output: Contribution to journalArticlepeer-review

  62. Published

    Designing for software's social complexity

    Fiadeiro, J. L., 1 Jan 2007, In: IEEE Computer. 40, 1, p. 34-39 6 p.

    Research output: Contribution to journalArticlepeer-review

  63. E-pub ahead of print

    Designing Robust Software Systems through Parametric Markov Chain Synthesis

    Calinescu, R., Ceska, M., Gerasimou, S., Kwiatkowska, M. & Paoletti, N., 18 May 2017, (E-pub ahead of print) Software Architecture (ICSA), 2017 IEEE International Conference on. p. 131-140 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Detecting and predicting privacy violations in online social networks

    Kafali, O., Gunay, A. & Yolum, P., 2013, In: Distributed and Parallel Databases. p. 1-30 30 p.

    Research output: Contribution to journalArticlepeer-review

  65. Published

    Detecting Depression from Speech through an Attentive LSTM Network

    Zhao, Y., Xie, Y., LIANG, R., Zhang, L., Zhao, L. & Liu, C., 1 Nov 2021, In: IEICE Transactions on Information and Systems. E104.D, 11, p. 2019-2023 5 p.

    Research output: Contribution to journalArticlepeer-review

  66. Published

    Detecting Exceptions in Commitment Protocols: Discovering Hidden States

    Kafali, O. & Yolum, P., 2010, Languages, Methodologies and Development Tools for Multi-Agent Systems. Vol. 6039. p. 112-127 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Detecting Malicious Code by Model Checking

    Kinder, J., Katzenbeisser, S., Schallhart, C. & Veith, H., 2005, Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, p. 174-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Detecting overlapping protein complexes in protein-protein interaction networks

    Nepusz, T., Yu, H. & Paccanaro, A., 2012, In: Nature Methods. 9, 5, p. 471–472 2 p.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach

    Hague, M., Lin, A. & Ong, C-H. L., 23 Oct 2015, OOPSLA 2015: Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications. New York, NY: ACM, p. 1-19 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Detecting Spam Email With Machine Learning Optimized With Bio-Inspired Metaheuristic Algorithms

    Gibson, S., Issac, B., Zhang, L. & Jacob, S. M., 13 Oct 2020, In: IEEE Access. 8, p. 187914-187932 19 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 310-316 7 p. (Lecture Notes in Computer Science; vol. 10898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Forthcoming

    Determining Confidence of Predicted Interactions Between HIV-1 and Human Proteins Using Conformal Method

    Nouretdinov, I., Gammerman, A., Qi, Y. & Klein-Seetharaman, J., 2012, (Accepted/In press) Pacific Symposium on Biocomputing. Vol. 17. p. 311-322 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Deterministic versus Probabilistic Methods for Searching for an Evasive Target

    Bernardini, S., Fox, M., Long, D. & Piacentini, C., 12 Feb 2017, Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17). p. 3709-3715 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Developing reuse technology in proof engineering

    Luo, Z., 1 Apr 1995, Proceedings of AISB95, Workshop on Automated Reasoning: bridging the gap between theory and practice, Sheffield, U.K..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    DEX: self-healing expanders

    Pandurangan, G., Robinson, P. & Trehan, A., Jun 2016, In: Distributed Computing. 29, 3, p. 163-185 23 p.

    Research output: Contribution to journalArticlepeer-review

  76. Published

    DEX: Self-Healing Expanders

    Pandurangan, G., Robinson, P. & Trehan, A., 2014, 2014 IEEE 28th International Parallel and Distributed Processing Symposium, Phoenix, AZ, USA, May 19-23, 2014. p. 702-711 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Diagnosing Commitments: Delegation Revisited (Extended Abstract)

    Kafali, O. & Torroni, P., 2011, AAMAS 2011: 10th International Conference on Autonomous Agents and Multiagent Systems. p. 1175-1176 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    DIESECT: A DIstributed Environment for Simulating E-commerce ContracTs

    Wood, D., Kafali, O. & Stathis, K., 2013, E-Commerce and Web Technologies. Huemer, C. & Lops, P. (eds.). Springer Berlin / Heidelberg, Vol. 152. p. 39-50 12 p. (Lecture Notes in Business Information Processing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    DiffusionRank: A possible penicillin for web spamming

    Yang, H., King, I. & Lyu, M. R., 1 Jan 2007, Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR'07. p. 431-438 8 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  80. Published

    Digraphs: Theory, Algorithms and Applications

    Bang-Jensen, J. & Gutin, G., 2000, London: Springer-Verlag.

    Research output: Book/ReportBook

  81. Published

    Digraphs: Theory, Algorithms and Applications

    Bang-Jensen, J. & Gutin, G., 2010, 2nd ed. London: Springer-Verlag.

    Research output: Book/ReportBook

  82. Published

    Directed Acyclic Subgraph Problem Parameterized above Poljak-Turzik Bound

    Crowston, R., Gutin, G. & Jones, M., 2012, FSTTCS 2012: LIPICS . Vol. 18. p. 400-411

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. E-pub ahead of print

    Directed Flow-Augmentation

    Kim, E. J., Kratsch, S., Pilipczuk, M. & Wahlström, M., 11 Apr 2022, (E-pub ahead of print) Proceedings of STOC 2022. Association for Computing Machinery (ACM)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Directed multicut is W[1]-hard, even for four terminal pairs

    Pilipczuk, M. & Wahlstrom, M., 2016, Proceedings of SODA 2016. Krauthgamer, R. (ed.). SIAM, p. 1167-1178 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Directed Multicut is W[1]-hard, Even for Four Terminal Pairs

    Pilipczuk, M. & Wahlstrom, M., 28 Jun 2018, In: ACM Transactions on Computation Theory (TOCT). 10, 3, p. 1-18 18 p., 13.

    Research output: Contribution to journalArticlepeer-review

  86. Published

    Diregular c-partite tournaments are vertex-pancyclic when c>=5

    Yeo, A., 1999, In: Journal of Graph Theory. 32, p. 137-152 16 p.

    Research output: Contribution to journalArticlepeer-review

  87. Published

    DIROM: an experimental design interactive system for directed mutagenesis and nucleic acids engineering

    Makarova, K. S., Mazin, A. V., Wolf, Y. I. & Solovyev, V., 1 Oct 1992, In: Bioinformatics. 8, 5, p. 425-431 7 p.

    Research output: Contribution to journalArticlepeer-review

  88. Published

    Discrimination of Different Species of Dendrobium with an Electronic Nose Using Aggregated Conformal Predictor

    Wang, Y., Wang, Z., Diao, J., Sun, X., Luo, Z. & Li, G., 25 Feb 2019, In: Sensors. 19, 4, p. 1-15 15 p., 964.

    Research output: Contribution to journalArticlepeer-review

  89. Published

    Discussion of: Treelets - An adaptive multi-Scale basis for sparse unordered data

    Murtagh, F., 2008, In: Annals of Applied Statistics. 2, p. 472-473

    Research output: Contribution to journalComment/debatepeer-review

  90. Published

    Discussion on Hedging Predictions in Machine Learning by A. Gammerman and V. Vovk

    Luo, Z. & Bellotti, T., 2007, In: The Computer Journal. 50, 2

    Research output: Contribution to journalArticlepeer-review

  91. Published

    Disease gene prediction for molecularly uncharacterized diseases

    Caceres, J. & Paccanaro, A., 5 Jul 2019, In: PLoS Computational Biology. 15, 7, p. 1-14 14 p., e1007078.

    Research output: Contribution to journalArticlepeer-review

  92. Published

    Disposable blood potassium sensors based on screen-printed thick film electrodes

    Xu, H., Yang, X., Wang, Y., Zheng, J., Luo, Z. & Li, G., 2010, In: Measurement Science and Technology. 21, 5

    Research output: Contribution to journalArticlepeer-review

  93. E-pub ahead of print

    Dissecting the chromatin interactome of microRNA genes

    Chen, D., Fu, L-Y., Zhang, Z., Yu, G., Zhang, H., Jiang, L., Harrison, A., Shanahan, H., Klukas, C., Zhang, H-Y., Ruan, Y., Chen, LI-LI. & Chen, M., 20 Dec 2013, (E-pub ahead of print) In: Nucleic Acids Research.

    Research output: Contribution to journalArticlepeer-review

  94. Published

    Distant Pedestrian Detection in the Wild using Single Shot Detector with Deep Convolutional Generative Adversarial Networks

    Dinakaran, R., Easom, P., Zhang, L., Bouridane, A., Jiang, R. & Edirisinghe, E., 30 Sep 2019, 2019 International Joint Conference on Neural Networks (IJCNN). International Joint Conference on Neural Networks (IJCNN): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Distinct light-initiated gene expression and cell cycle programs in the shoot apex and cotyledons of Arabidopsis

    López-Juez, E., Dillon, E., Magyar, Z., Khan, S., Hazeldine, S., de Jager, S. M., Murray, J. A., Beemster, G. T., Bögre, L. & Shanahan, H., Apr 2008, In: Plant Cell. 20, 4, p. 947-968 22 p.

    Research output: Contribution to journalArticlepeer-review

  96. Published

    Distributed agent environments in the Ambient Event Calculus

    Bromuri, S., Stathis, K., Gokhale, A. S. (ed.) & Schmidt, D. C. (ed.), 2009.

    Research output: Contribution to conferencePaperpeer-review

  97. Published

    Distributed agreement in dynamic peer-to-peer networks

    Augustine, J., Pandurangan, G., Robinson, P. & Upfal, E., Nov 2015, In: Journal of Computer and System Sciences. 81, 7, p. 1088-1109 22 p.

    Research output: Contribution to journalArticlepeer-review

  98. Published

    Distributed Algorithmic Foundations of Dynamic Networks

    Augustine, J., Pandurangan, G. & Robinson, P., 10 Mar 2016, In: SIGACT News. 47, 1, p. 69-98 30 p.

    Research output: Contribution to journalArticle

  99. Published

    Distributed Attack Detection Using Agilis: Collaborative Financial Infrastructure Protection

    Aniello, L., Baldoni, R., Chockler, G., Laventman, G., Lodi, G. & Vigfusson, Y., 2012, Collaborative Financial Infrastructure Protection. Baldoni, R. & Chockler, G. (eds.). Springer Berlin / Heidelberg, p. 157-174 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  100. Published

    Distributed Computation of Large-scale Graph Problems

    Klauck, H., Nanongkai, D., Pandurangan, G. & Robinson, P., 2015, Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015, San Diego, CA, USA, January 4-6, 2015. p. 391-410 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...4 5 6 7 8 9 10 11 ...24 Next