Publications

2013

  • Adnane A, Bidan C, de Sousa R.T, “Trust-based security for the OLSR routing protocol”, Computer Communications, Volume 36, Issues 10–11, June 2013, pp. 1159-1171.
  • Al-Aqrabi H, Liu L, Hill R, Cui L, Li J. Faceted Search in Business Intelligence on the Cloud. Proceding of the IEEE International Conference on Cyber, Physical, Social Computing, August 20-23, 2013, Beijing, China. IEEE Computer Society Press.
  • Al-Aqrabi H, Liu L. Chapter 6: Governance Compliant Service Oriented Computing, Book Chapter for Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing, IGI Global, January 2013. Pp 143-163. DOI: 10.4018/978-1-4666-2854-0.ch006
  • Al-Aqrabi H, Liu L, Hill R, Ding Z, Antonopoulos N. (2013). Business Intelligence Security on the Clouds: Challenges, Solutions and Future Directions. The 8th Annual System of Systems Engineering Conference, Hawaii, USA, (SOSE 2013), IEEE Computer Society, pp137-144.
  • Angelopoulou O, Vidalis S. Towards ‘Crime Specific’ Digital Investigation Methodologies, Cyberforensics 2013, Cardiff, UK
  • Betts A, Liu L, Li Z, Antonopoulos N. A Critical Comparative Evaluation on DHT-based Peer-to-Peer Search Algorithms, International Journal of Embedded Systems, InderScience, article in press, 2013.
  • Betts A, Liu L, Li Z, Antonopoulos N. Structured DHT Peer-to-Peer Search Methods: A Critical Comparative Evaluation, 15th IEEE International Conference on High Performance Computing and Communications (HPCC), article in press, Zhangjiajie, China, Nov. 13-15, 2013.
  • Bessis, N., Varvarigou, D., Hill, R., Li, M. Internet of Things and Inter-Cooperative Computational Technologies for Collective Intelligence, in Studies in Computational Intelligence Series, Springer Verlag.
  • Dasilva Da, Sotiriadis S, Hill R, Antonopoulos N And Bessis N (2013) Evaluating the Use of Automation in the Virtual Datacentre for Improved Efficiency, 4th International Workshop on Computational Intelligence for Disaster Management (CIDM-2013) in conjunction with the 8th 3PGCIC-2013, Oct 28-30, Compiegne, pp: 457-460
  • Doerr B, Huber A, Levavi A. Strong robustness of randomized rumor spreading protocols[J]. Discrete Applied Mathematics. 161(6), pp.778 – 793, 2013.
  • Exarchakos, Georgios, and Nick Antonopoulos. “Cooperative stalking of transient nomadic resources on overlay networks.” Journal of Future Generation Computer Systems, Elsevier, Vol 29, Number 6, 2013.
  • Flores D A, Angelopoulou O, Self R.J. An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together, Journal of Internet Services and Information Security, Special Issue on Advances in Internet Security and Technology, Volume 3, Issue 1/2.
  • Flores D.A, Angelopoulou O, Self R. An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together, Journal of Internet Services and Information Security, February 2013.
  • Fragkos G, Angelopoulou O, Xynos K. Antivirus False Positives alerts, Evading Malware Detection and Cyber-Security issues,  Journal of Information Warfare, Volume 12, Issue 3
  • Fragkos G, Angelopoulou O, Xynos K. The Issues of Software Being Classified as Malicious by Antivirus False Positive Alerts,  Proceedings of the 12th ECIW: European Conference on Information Warfare and Security, Jyväskylä, Finland
  • Hardy J, Liu L, Cui L, Li J. Chapter 16: Internet-based Virtual Computing Infrastructure for Cloud Computing, Book Chapter for Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing, IGI Global, January 2013. pp 371-389.
  • Healey N.J, Angelopoulou O, Evans D. A Discussion On The Recovery Of Data From A Virtual Machine. Proceedings of EIDWT 2013, Xi’an, China.
  • Hill, R., Lake, P., Hirsch, L., Moshiri, S., (2013). Guide to Cloud Computing, Springer Verlag.
  • Hinds A, Atojoko A, and Zhu S (2013) Evaluation of OSPF and EIGRP Routing Protocols for IPv6, International Journal of Future Computer and Communication  2(4).
  • Hinds A, Ngulube M, Zhu  S and  Al-Aqrabi H (2013) A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET), International Journal of Information and Education Technology 3(1), pp: 1-5.
  • Howden C, Liu L, Ding Z, Zhan Y, Lam KP, Moments in Time: A Forensic View of Twitter, Proceding of the IEEE International Conference on Cyber, Physical, Social Computing, August 20-23, 2013, Beijing, China. IEEE Computer Society Press.
  • Huang Y, Bessis N, Norrington P, et al. Exploring decentralized dynamic scheduling for grids and clouds using the community-aware scheduling algorithm[J]. Future Generation Computer Systems, 2013, 29(1): 402-415.
  • Huber A, Krokhin A. And Powell R.  ‘Skew Bisubmodularity and Valued CSPs’. Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp.1296–1305, 2013
  • Ikram A, Anjum  A, Baker N, Hill R. Antonopoulos N, Liu L, Sotiriadis S, (2013). ‘Approaching the Internet of Things (IoT): A modelling, analysis and abstraction framework’. Concurrency and Computation: Practice and Experience, Wiley, Indiana, USA, in press.
  • Ikram, A., Anjum, A., Baker, N., Hill, R. (2013). ‘Formal context modelling and abstraction using HOCL and Petri-nets’. Concurrency and Computation: Practice and Experience, Wiley, Indiana, USA, in press.
  • Ikram A, Anjum A, Hill R, Antonopoulos N, Liu L, Sotiriadis S. Approaching the Internet of Things (IoT): A Modelling, Analysis and Abstraction Framework, Concurrency and Computation: Practice and Experience, Wiley, article in press, 2013.
  • Kaini Sl, Anjum A, Knappmeyer M, Bessis N And Antonopoulos N. Federated Broker System for Pervasive Context Provisioning, Journal of Systems and Software, Elsevier (SCI JSCR IF 2011: 0.836) 86(4) ISSN: 0164-1212 pp: 1107-1123.
  • Kiani Sl, Anjum A, Bessis N, Hill R And Knappmeyer M. Energy Conservation in Mobile Devices and Applications: A Case for Context Parsing, Processing and Distribution in Clouds, Mobile Information Systems, IOS Press (SCI JSCR IF 2010: 2.432) 9(1) ISSN: 1574-017X pp: 1-17.
  • Kiani S, Anjum A., Bessis N, Hill R, Knappmeyer M. ‘Energy conservation in mobile devices and applications: A case for context parsing, processing and distribution in clouds’, Journal of Mobile Information Systems, 9(1), pp1-17, IOS Press.
  • Lei Cui, Jianxin Li, Bo Li, Jinpeng Huai, Chunming Hu, Tiangyu Wo, Hussain Al-Aqrabi, Lu Liu, VMScatter: Migrate Virtual Machines to Many Hosts, Proceedings of ACM International Conference on Virtual Execution Environments, Houston, USA, March 2013. pp 63-72. IEEE Computer Society Press.
  • Li B, Li J, Liu L. CloudMon: A Resource-Efficient IaaS Cloud Monitoring System Based on NIDS Virtual Appliances, Concurrency and Computation: Practice and Experience, Wiley, article in press, 2013.
  • Li J, Jia Y, Liu L, Wo T. CyberLiveApp: A Secure Sharing and Migration Approach for Live Virtual Desktop Applications in a Cloud Environment, Future Generation Computer Systems, Elsevier Science, Vol 29(1), January 2013, pp. 330-340. ISSN: 0167-739X.
  • Li J, Liu X, Liu L, Sun D, Bo Li. HiTrust: Building Cross-organizational Trust Relationship based on a Hybrid Negotiation Tree, Telecommunication Systems, Springer, Vol 52(2), 2013, pp. 1353-1365.
  • Li J, Li X, Meng L, Huai J, Zhu Z, Liu L. Chapter 10: CloudRank: A Cloud Service Ranking Method Based on Both User Feedback and Service Testing, Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing, IGI Global, January 2013, pp 230-258.
  • Li Z.Y, Bi J.L, Liu L, Trust and Risk-based Access Control Model for Zero-Knowledge Oriented Mobile, Proceding of the IEEE International Conference on Cyber, Physical, Social Computing, August 20-23, 2013.
  • Lu Liu, Andrew Jones, Nick Antonopoulos, Zhijun Ding, Yongzhao Zhan, Performance Evaluation and Simulation of Peer-to-Peer Protocols for Massively Multiplayer Online Games, Multimedia Tools and Applications, Springer, article in press, 2013.
  • Lu Liu, Thomas Stimpson, Nick Antonopoulos, Zhijun Ding, Yongzhao Zhan, An Investigation of Security Trends in Personal Wireless Networks, Wireless Personal Communications, Springer, article in press, 2013.
  • Lu Liu, Don-Anthony DaSilva, Nick Antonopoulos, Zhijun Ding, Yongzhao Zhan, Achieving Green IT Using VDI in Cyber Physical Society, Journal of Internet Technology, Vol. 14 No. 3, pp.413-424, 2013.
  • Mao X, Dong M, Liu L and Wang H, An Integrated Approach to Developing Self-Adaptive Software in Open Environments, Journal of Information Science and Engineering, Academia Sinica, in press, 2013.
  • McCloskey D J, Trovati M, Zimmet  C S. Using a Dynamically-Generated Content-Level Newsworthiness Rating to Provide Content Recommendations. Patent US 8,386,457 B2, (2013).
  • Moorhouse J, Liu L, Li Z, Ding Z. Modelling and Simulation of Peer-to-Peer Overlay Network Protocols Using OverSim, Proceding of 15th International Conference on Modelling and Simulation (UKSim 2013), Cambrdge University, UK, April 2013. pp 144-149.
  • Sotiriadis S, Bessis N, Antonopoulos N, Hill R. ‘Meta-scheduling algorithms for managing inter-cloud interoperability’, International Journal of High Performance Computing and Networking, Inderscience, in press.
  • Sotiriadis S, Bessis N, Antonopoulous A and Anjum A. SimIC: Designing a new Inter-Cloud Simulation Platform for Integrating Large-scale Resource Management, 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Mar 25-28, pp: 90-97
  • Sotiriadis S, Bessis N, Kuonen P and Antonopoulous A. The Inter-cloud Meta-scheduling (ICMS) Framework, 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Mar 25-28, Barcelona, pp: 64-73
  • Sotiriadis S, Bessis N and Antonopoulous A. Towards Inter-cloud Simulation Performance Analysis: Exploring Service-oriented Benchmarks of Clouds in SimIC, 2nd International Workshop on Inter-Clouds and Collective Intelligence (iCCI-2013), in conjunction with the 27th IEEE AINA-2013, Mar 25-28, Barcelona, pp: 765-771
  • Vidalis S, Angelopoulou O. Deception and Manoeuvre Warfare Utilising Cloud Resources, Information Security Journal: A Global Perspective, Volume 22, Issue 4, pp. 151-158.
  • Xiaoyu Yang, Lu Liu. Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing, IGI Global, January 2013.
  • Xhafa F And Bessis N. Inter‐Cooperative Collective Intelligence: Techniques and Applications, book series in Studies in Computational Intelligence.
  • Zargari S A, Smith A. Policing as a Service in the Cloud[C]//Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on. IEEE, 2013: 589-596.
  • Zhang K, Antonopoulos N. A Novel Bartering Exchange Ring based Incentive Mechanism for Peer-to-Peer Systems, Journal of Future Generation Computer Systems, Elsevier, Vol 29, Number 1, 2013.

2012

  • Ahmed E, Bessis N, Norrington P and Yue Y. Data Integration: The Method of Data Mapping, Matching and Loading Grid Staging Catalogue, International Journal of Computer Systems Science & Engineering, CRL (SCI JSCR IF 2010: 0.319) 27(1).
  • Akoumianakis D, Karadimitriou N, Vlachakis G, Milolidakis G and Bessis N (2012) Internet of Things as Virtual Settlements: Insights from Excavating Social Media Sites. INCoS 2012: 132-139
  • Akoumianakis D, Milolidakis G, Gnagnarella P, Misotti AM and Bessis N (2012) Networking Tactics for Online eHealth Campaigns and Intervention Studies: Preliminary Results from a Case Study on Nutritional Support for Cancer Patients. INCoS 2012: 140-147
  • Al-Aqrabi H, Liu L, Hill R, Antonopoulos N. Taking the Business Intelligence to the Clouds, Proceedings of 14th IEEE International Conference on High Performance Computing and Communications (HPCC), Liverpool, UK, June 2012. pp. 953-958. IEEE Computer Society Press.
  • Al-Aqrabi H, Liu L, Xu J, Hill R, Antonopoulos N, Zhan Y.Z. Investigation of IT Security and Compliance Challenges in Security-as-a Service for Cloud Computing, Proceedings of 15th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing Workshops (ISORC 2012), Shenzhen, China, April 11-13, 2012. pp. 124-129.
  • Angelopoulou O, Vidalis S, Robinson I. Who are you today? Profiling the ID theft fraudster, Proceedings of the 11th ECIW: European Conference on Information Warfare and Security, Laval, France, 2012.
  • Anjum A., Hill R, Mcclatchey R, Bessis N and Branson A (2012) Glueing Grids and Clouds together: A Service-oriented Approach, International Journal of Web and Grid Services, Inderscience (SCI JSCR IF 2010: 0,978) 8(3), pp: 248-265
  • Anjum A, Hill R, McClatchey R, Bessism N. Branson, A., (2012). Gluing grids and clouds together: a service oriented approach. International Journal of Web and Grid Services, Inderscience,8(3), pp248-265.
  • Anjum A, Bessis N, Mcclatchey R, Munir K, Habib A, Branson A And Shamdasani J (2012) A Service Oriented Analysis Environment for Neuroimaging Studies, 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2012), Jul 4-6, Palermo, pp: 29-36.
  • Antonopoulos N, Anjum A and Lee Gillam (2012) Editorial on Intelligent techniques and architectures for autonomic clouds: introduction to the itaac special issue, Journal of Cloud Computing: Advances, Systems and Applications, 1:18 doi:10.1186/2192-113X-1-18
  • Bagdasar O (2012) The Number of Pairs of Integers with the Same 1cm, 3rd International Symposium “Mathematical Education in the Current European Context”, November 23rd, Romania
  • Bagdasar O (2012) On the Use of Computer Based Assessment in the Mathematical Education, 3rd International Symposium “Mathematical Education in the Current European Context”, November 23rd, Romania
  • Baker C, Anjum A, Hill R, Bessis N, Kiani S. Improving Cloud Datacentre Scalability, Agility and Performance using OpenFlow. INCoS 2012, IEEE Computer Society, pp20-27.
  • Baker C, Anjum A, Hill R, Bessis N and Kiani Sl. Improving Cloud Data Centre Scalability, Agility and Performance using Openflow, 4th IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS-2012), Sep 19-21, Bucharest ISBN: 978-0-7695-4808-1 pp: 20-27.
  • Barolli L, Xhafa X, Dobre C, Bessis N and Trausan-Matu S. Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT-2012), IEEE CPS.
  • Bessis N (ed 2012) International Journal of Distributed Systems and Technologies, 3(4) ISSN: 1947-3532
  • Bessis N (ed 2012) International Journal of Distributed Systems and Technologies, 3(3) ISSN: 1947-3532
  • Bessis N (ed 2012) International Journal of Distributed Systems and Technologies, 3(2) ISSN: 1947-3532
  • Bessis N, Xhafa F, Varvarigou D, Hill R and Li M. Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence, book series in “Studies in Computational Intelligence”, Springer Vol 460.
  • Bessis N, Xhafa F, Varvarigou D, Hill R and Li M (eds) Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence, “Studies in Computational Intelligence”, Vol 460 Springer ISBN: 978-3-642-34951-5, pp: 89-113
  • Bessis N, Sotiriadis S, Xhafa F, Pop F And Cristea V (2012) Meta-scheduling Issues in Interoperable HPCs, Grids and Clouds, International Journal of Web and Grid Services, InderScience (SCI JSCR IF 2010: 0,978) 8(2) pp: 153-172
  • Bessis N, Sotiriadis S, Xhafa F, Pop F and Valentin Cristea (2012) An Architectural Strategy for Meta-scheduling in Inter-clouds. AINA Workshops 2012: 1184-1189
  • Bessis N, Sotiriadis S, Pop F and Valentin Cristea (2012) Optimizing the Energy Efficiency of Message Exchanging for Service Distribution in Interoperable Infrastructures. INCoS 2012: 105-112
  • Bramhall, M.D, Gray L, Hill R. (2012). “Analysis of critical thinking skills in an international, cross-institutional group of engineering Master’s students”. In Industry and Higher Education, 26(4), pp323-327.
  • Carter S, Smith M, Bali S, et al. The use of Crowdsourcing to aid Quest Design in Games[C]//Emerging Intelligent Data and Web Technologies (EIDWT), 2012 Third International Conference on. IEEE, 2012: 302-305.
  • Clapperton JA, Larcombe PJ and Fennessey EJ (2012) New Closed Forms for Householder Root Finding Functions and Associated Non-Linear Polynomial Identities, Utilitas Mathematica, 87, pp.131-150, 2012
  • Clapperton JA, Larcombe PJ and Fennessey EJ (2012) ‘he Delannoy Numbers: Three New Non-Linear Identities, Bulletin of the I.C.A., 64, pp.39-56, 2012
  • Crane L, Longbottom D, Self R. Discourse and Knowledge Matters: Can Knowledge Management Be Saved?[C]//7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing. Springer Berlin Heidelberg, 2013: 37-46.
  • Crowther P, Hill R. ‘Dissertation by Portfolio – An alternative approach to the traditional thesis’. Student Experience and Engagement Journal, 1(2).
  • Cui L, Li B, Li J, Hardy J and Liu L, Software Aging in Virtualized Environments: Detection and Prediction (ICPADS), Proceeding of 18th IEEE International Conference on Parallel and Distributed Systems, Singapore, Dec 2012. Pp. 718 – 719. IEEE Computer Society Press.
  • DaSilva D, Liu L, Bessis N, Zhan YZ. Enabling Green IT Through Building a Virtual Desktop Infrastructure, Proceedings of The 8th International Conference on Semantics, Knowledge & Grids, Beijing, China, October 2012. pp. 32-38. IEEE Computer Society Press.
  • Eftychiou A, Vrusias B, Antonopoulos N. A dynamically semantic platform for efficient information retrieval in P2P networks[J]. International Journal of Grid and Utility Computing, 2012, 3(4): 271-283.
  • Erl Thomas, Mahmood Z, Puttini R, Cloud Computing: Concepts and Technology Prentice Hall, Sept 2012
  • Evans D, Eyers D M. Efficient Data Tagging for Managing Privacy in the Internet of Things[C]. Green Computing and Communications (GreenCom), 2012 IEEE International Conference on. IEEE, 2012: 244-248.
  • Evans D, Eyers D M and BACON, J. (2012) A model of Information Flow Control to determine whether malfunctions cause the privacy invasion, MPM ’12 Proceedings of the First Workshop on Measurement, Privacy, and Mobility, 10 April, Bern.
  • Evans D and Eyers DM (2012) Melding security metadata between software and hardware. In Proceedings of the Posters and Demo Track, Middleware ’12, pages 13:1–13:2, New York, NY, USA, 2012. ACM http://doi.acm.org/10.1145/2405153.2405166
  • Exarchakos G, Antonopoulos N. A peer-to-peer system for on-demand sharing of capacity across network applications[J]. Peer-to-Peer Networking and Applications, 2012, 5(1): 58-73.
  • Flores D A, Angelopoulou O, Self R J. Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial Institutions[C]. Emerging Intelligent Data and Web Technologies (EIDWT), 2012 Third International Conference on. IEEE, 2012: 218-224.
  • French T, Bessis N, Maple C and Asimakopoulou E (2012) Trust Issues on Crowd-Sourcing Methods for Urban Environmental Monitoring. IJDST 3(1): 35-47
  • French T and Bessis N (2012) Towards a Context-Aware and Adaptable Room System for Intelligent “Trusted” Office-Spaces in Smart Cities. IMIS 2012: 148-154
  • Habib I, Anjum A, McClatchey R and Rana O (2012) Adapting Scientific Workflow Structures Using Multi-Objective Optimisation Strategies, ACM Transactions on Autonomous and Adaptive Systems (TAAS), ISSN: 1556-4665, Volume 8, Number 1
  • Hardy J, Liu L, Bessis N, Cui L, Li J. Performance Measurements in iVIC Virtual Machine Clones, Proceedings of 26th International Conference on Advanced Information Networking and Applications Workshops, Fukuoka, Japan, March 26-29, 2012, pp. 1258 – 1263. IEEE Computer Society Press.
  • Hardy J, Liu L, Antonopoulos N, Liu W.N., Cui L, Li J. Assessment and Evaluation of Internet-based Virtual Computing Infrastructure, Proceedings of 15th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing (ISORC 2012), Shenzhen, China, April 11-13, 2012. pp. 39-46, ISSN 1555-0885/12. IEEE Computer Society Press.
  • Hardy J, Liu L, Antonopoulos N, et al. Assessment and Evaluation of Internet-based Virtual Computing Infrastructure[C]//Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC), 2012 IEEE 15th International Symposium on. IEEE, 2012: 39-46.
  • Hill R, Antonopoulos N, Berry S. Peer–to–peer networks and collective intelligence: the case for agency[J]. International Journal of Grid and Utility Computing, 2012, 3(4): 233-241.
  • Hill R. A Requirements Elicitation Framework for Agent-Oriented Software Engineering, Lambert Academic Publishing, Germany. ISBN 978-3-8484-8657-1.
  • Hinds A, Sotiriadis S, Bessis N and Antonopoulos N (2012) Evaluation of Security Algorithms for the AODV MANET Routing Protocol. EIDWT 2012: 311-315
  • Huber A, Kolmogorov V. Towards Minimizing K-Submodular Functions[M]//Combinatorial Optimization. Springer Berlin Heidelberg, 2012: 451-462.
  • Inglot B, Liu L, Antonopoulos N. A Framework for Enhanced Timeline Analysis in Digital Forensics, Proceedings of The IEEE International Conference on Internet of Things (iThings),Besançon, France November 20-23, 2012. pp 253-256. IEEE Computer Society Press.
  • Jones A, Liu L, Antonopoulos N, Liu W.N.  An Analysis of Peer to Peer Protocols for Massively Multiplayer Online Games, Proceedings of 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC), Liverpool, UK, June 2012. pp. 1994-1999. IEEE Computer Society Press.
  • Khan Z, Ludlow D, McClatchey R and Anjum A (2012) An Architecture for Integrated Intelligence in Urban Management using Cloud Computing, Journal of Cloud Computing: Advances, Systems and Applications, 1:1 doi:10.1186/2192-113X-1
  • Khasnabish B, Huang D, Bai X, Bellavista P, Martinez G and Antonopoulos N (2012) Cloud Computing, Networking, and Services. J. Network Syst. Manage. 20(4): 463-467
  • Kiani SL, Anjum A, Antonopoulos N and Michael Knappmeyer (2012) Context-Aware Service Utilisation in the Clouds and Energy Conservation, Journal of Ambient Intelligence & Humanized Computing, 2012, ISSN: 1868-5137, DOI: 10.1007/s12652-012-0131-1
  • Kiani SL, Anjum A, Antonopoulos N, Munir K and McClatchey R (2012) Context Caches in the Clouds, Journal of Cloud Computing: Advances, Systems and Applications, 1:7 doi:10.1186/2192-113X-1-7
  • Kommers P and Bessis N (eds, 2012) Third International Conference on Web Based Communities and Social Media 2012 and Collaborative Technologies 2012, IADIS ISBN: 978-972-8939-72-4
  • Kiani Sl, Anjum A, Bessis N and Hill R (2012) Large-scale Context Provisioning: A Use-case for Homogenous Cloud Federation, 6th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2012), Jul 4-6, Palermo ISBN 978-0-7695-4687-2 pp: 241-248
  • Lallie H, Mahmood Z(Eds). Guide to Geo-Positional Forensics
  • Larcombe P J and Fennessey E J. (2012) Applying Integer Programming to Enumerate Equilibrium States of a Multi-Link Inverted Pendulum: A Strange Binomial Coefficient Identity and its Proof, Bulletin of the I.C.A., 64, pp.83-108, 2012
  • Larcombe P J and Fennessey E J. (2012) Some Properties of the Sum $\sum_{i=0}^{n} i^{p} { n+i \choose i }$’, Congressus Numerantium, 214, pp.49-64, 2012
  • Li J, Li B, Wo T.Y, Hu C.M, Huai J.P, Liu L, Lam KP. CyberGuarder: A Virtualization Security Assurance Architecture for Green Cloud Computing, Future Generation Computer Systems, Elsevier Science, Vol 28(2), February 2012, pp 379–390.
  • Liaquat Kiani S, Anjum A, Antonopoulos N, et al. Towards context caching in the clouds[C]//International Workshop on Intelligent Techniques and Architectures for Autonomic Clouds (ITAAC 2011), co-located with 4th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2011). IEEE, 2011..
  • Liu Z X, Liu L, Hardy J, Anjum A, Hill R, Antonopoulos N. Dot-base62x: Building A Compact and User-friendly Text Representation Scheme of IPv6 Addresses for Cloud Computing, Journal of Cloud Computing, Springer, Vol 1(3), April 2012.
  • Liu L, Masfary O, Antonopoulos N. Energy Performance Assessment of Virtualization Technologies Using Small Environmental Monitoring Sensors, Sensors, MDPI, Vol. 12(5), pp 6610-6628, May 2012.
  • Liu L, Xu J, Antonopoulos N, Li J, Kaigui Wu, Adaptive Service Discovery on Service-Oriented and Spontaneous Sensor Systems, Journal of Adhoc & Sensor Wireless Networks, Old City Publishing, Vol. 14 (1-2), 2012, pp. 107-132. ISSN: 1551-9899.
  • Liu L, Xu J, Russell D, Webster D, Luo Z, Venters C, & Davies J, Dynamic Service Integration for Reliable and Sustainable Capability Provision, International Journal of Systems Science, Taylor & Francis, Vol. 43(1), January 2012, pp. 79–96. ISSN: 0020-7721.
  • Liu Z, Liu L., Hardy J, Anjum A, Hill R, Antonopoulos N., (2012). ‘Dot-base62x: A Compact Textual Representation of IPv6 Address for Clouds’. Journal of Cloud Computing, 1(3). Springer.
  • McFarlane N JB, Ma X, Clapworthy G, Bessis N and Debora Testi (2012) A Survey and Classification of Visualisation in Multiscale Biomedical Applications. IV 2012: 561-566
  • Okoro E, Sotiriadis S, Bessis N, et al. Customized Profile Accessibility and Privacy for Users of Social Networks[C]//Emerging Intelligent Data and Web Technologies (EIDWT), 2012 Third International Conference on. IEEE, 2012: 306-310.
  • Panneerselvam J, Liu L, Hill R, et al. An Investigation of the Effect of Cloud Computing on Network Management[C]//High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), 2012 IEEE 14th International Conference on. IEEE, 2012: 1794-1799.
  • Panneerselvam J, Sotiriadis S, Bessis N and Antonopoulos N (2012) Securing Authentication and Trusted Migration of Weblets in the Cloud with Reduced Traffic. EIDWT 2012: 316-319
  • Pop F, Lovin MA, Cristea V, Bessis N and Sotiriadis S (2012) Applications Monitoring for Self-Optimization in GridGain. CISIS 2012: 755-760
  • Pop F, Lovin MA, Negru C, Cristea V, Bessis N and Sotiriadis S (2012) Grid Configuration and Application Monitoring in GridGain. INCoS 2012: 155-161
  • Reetz ES, Knappmeyer M, Kiani SL, Anjum A, Bessis N and Tonjes R (2012) Performance Simulation of a Context Provisioning Middleware based on Empirical Measurements, Journal of Simulation Modeling Practice and Theory, ISSN: 1569-190X, 2012, http://dx.doi.org/10.1016/j.simpat.2012.03.002
  • Reina Dg, Toral Sl, Bessis N, Barrero F and Asimakopoulou E. An Evolutionary Computation Approach for Optimizing Connectivity in Disaster Response Scenarios, Applied Soft Computing, Elsevier (SCI JSCR IF 2012: 2,612) 13(2).
  • Reina Dg, Toral Sl, Barrero F, Bessis N and Asimakopoulou E. The Role of Ad Hoc Networks in the Internet of Things: A Case Scenario for Smart Environments[M]//Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence. Springer Berlin Heidelberg, 2013: 89-113.
  • Rosen CCH (2012) A Problem Based Approach to Teaching Employability and Independent Learning Skills. 1st Annual Higher Education Association STEM Conference, Imperial College, HEA/STEM
  • Saeed S, Ahmad R, Mahmood Z, Khan M A, ‘Technology Support forKnowledge Management in Industrial Settings: Issues and Implications’ in‘Handbook of Research on Industrial Informatics and ManufacturingIntelligence: Innovations and Solutions’, edited by M A Khan and A Q Ansari,IGI Global, 2012, pp 211-226, ISBN: 1466602945
  • Self R, Self K, Chang H-J. (2012) A consideration of the next generation of PRI and ESG measures and indices for the sustainable corporation derived from the optimisation of shared stakeholder value, PRI-CBERN Academic Network Conference, York University, Toronto, October 3, 2012.
  • Self R, Aquilina C. (2012) TechnoStress in the 21st Century; Does it Still Exist and How Does it Affect Knowledge Management and Other Information Systems Initiatives, 7th International Conference on Knowledge Management in Organisations: Service and Cloud Computing; Salamanca, Spain, July 12, 2012,   ISBN 978-3-642-30867-3, pp 117-127.
  • Shi Q, Xiao Y, Bessis N, Lu Y, Chen Y And Hill R (2012) Optimizing K2 Trees: A Case for Validating the Maturity of Network of Practices, Computers and Mathematics with Applications, Elsevier (SCI JSCR IF 2011: 1.747), 63(2) ISSN: 08981221 pp: 427-436
  • Shi Q, Xiao Y, Bessis N, Lu Y, Chen Y, Hill R. ‘Optimizing K2 trees: A case for validating the maturity of networks of practice’. In Computers and Mathematics with Applications, 63(2) pp427-436.
  • Shukla M, Conrad M And Bessis N (2012) Towards a Bespoke Framework for Eliciting Consumer Satisfaction in Second Life, in Safar, M. and Mahdi, K. (eds) Social Networking and Community Behavior Modeling: Qualitative and Quantitative Measures, IGI, pp: 283-303
  • Smith A, Berry S, “Evaluation of a Framework for Measuring Efficiency in Opportunistic Ad-hoc Networks,” Emerging Intelligent Data and Web Technologies (EIDWT), 2012 Third International Conference on , vol., no., pp.61,65, 19-21 Sept. 2012.
  • Sotiriadis S, Bessis N, Antonopoulos N. Exploring Inter-Cloud Load Balancing by Utilizing Historical Service Submission Records[J]. International Journal of Distributed Systems and Technologies (IJDST), 2012, 3(3): 72-81.
  • Sotiriadis S, Bessis N and Antonopoulos N. From Meta-Computing to Interoperable Infrastructures: A Literature Review of Schedulers and Simulators for InterClouds, in Proceedings of Conference on Advanced Information Networking and Applications (AINA 2012). Fukuoka, Japan, 2012. IEEE Computer Society Press.
  • Sotiriadis S, Bessis N and Antonopoulos N (2012) Decentralized meta-brokers for inter-cloud: Modeling brokering coordinators for interoperable resource management. FSKD 2012: 2462-2468
  • Sotiriadis S, Bessis N, Xhafa F and Antonopoulos N. Cloud Virtual Machine Scheduling: Identifying Issues in Modeling the Cloud Virtual Machine Dynamic Instantiation, 6th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2012), Jul 4-6, Palermo ISBN 978-0-7695-4687-2 pp: 233-240
  • Sotiriadis S, Bessis N and Kuonen P (2012) Advancing Inter-cloud Resource Discovery Based on Past Service Experiences of Transient Resource Clustering. EIDWT 2012: 38-45
  • Stimpson T, Liu L, Zhan Y.Z. An Investigation into the Evolution of Security Usage in Home Wireless Networks, Proceedings of 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK, June 2012. pp. 920-925. IEEE Computer Society Press.
  • Stimpson T, Liu T, Zhang J, Hill R, Liu W.N, Zhan Y.Z, Assessment of Security and Vulnerability of Home Wireless Networks, Proceedings of 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD’12), Chongqing, China, May, 2012. pp. 2133-2137. IEEE Computer Society Press.
  • Xu J, Zhang D.C, Liu L, Li X.X. Dynamic Authentication for Cross-Realm SOA-Based Business Processes, IEEE Transactions on Service Computing, Vol 5(1), March 2012, pp. 20-32.
  • Thompson T (2012) Artificial and Computational Intelligence in Games – Report of Dagstuhl Seminar 12191, Dagstuhl Publishing, (Editors: Lucas, S.M., Mateas, M., Preuss, M., Spronck, P., Togelius, J.)
  • Thompson T (2012) Building a Plan-Driven Architecture for Games: Expanding the REAPER Concept, Proceedings of the UK Planning and Scheduling Special Interest Group (PlanSIG 2012)
  • Zelenkauskaite A, Bessis N, Sotiriadis S and Asimakopoulou E (2012) Interconnectedness of Complex Systems of Internet of Things through Social Network Analysis for Disaster Management. INCoS 2012: 503-508
  • Zelenkauskaite A, Bessis N, Sotiriadis S and Asimakopoulou E (2012) Disaster Management and Profile Modelling of IoT Objects: Conceptual Parameters for Interlinked Objects in Relation to Social Network Analysis. INCoS 2012: 509-514
  • Zhan Y.Z, Li C.X, Liu L, Al-Aqrabi H. A Secure Node Localization Method Based on the Congruity of Time in Wireless Sensor Networks, Proceedings of 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK, June 2012. pp. 884-889. IEEE Computer Society Press.
  • Zhu S Y. A Case Study Of E-Submission And E-Grading To Support Teaching And Learning For Computer Networks Students[J]. EDULEARN12 Proceedings, 2012: 3394-3398.
  • Zhu S and Schaefer G (2012) Network Simulation Tools for Supporting Teaching in Computer Networks, in Al-Bahadili H (eds) Simulation in Computer Network Design and Modelling: Use and Analysis, IGI Global ISBN: 978-1-4666-0191-8 pp: 479-489.

2011

  • Ahmed E, Bessis N, Yong Yue; Norrington, P, Sarfraz M. “A Prototyping Development of ArabGrid Toolkit Using MML-GSCATS Methodology,” Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference on , vol., no., pp.769,776, 22-25 March 2011
  • Andrews S, Polovina S, Hill R, Akhgar B. Conceptual Structures for Discovering Knowledge (The 19th International Conference on Conceptual Structures, ICCS 2011, Derby, UK) Lecture Notes in Computer Science, Vol. 6828 (Subseries: Lecture Notes in Artificial Intelligence), Springer (ISBN: 978-3-642-22687-8).
  • Anjum A, Hill R, McClatchey R, et al. Glueing Grids And Clouds Together: A Service–Oriented Approach[J]. International Journal of Web and Grid Services, 2012, 8(3): 248-265..
  • Anjum A, Bessis N, Hill R, et al. Provenance management for neuroimaging workflows in neugrid[C]//P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2011 International Conference on. IEEE, 2011: 67-74.
  • Anjum, A., Hill, R., (2011). ‘Gluing grids and clouds together: A service oriented approach’. In proceedings of the Second International Conference on Emerging Intelligent Data and Web Technologies, September 7-9, Polytechnic University of Tirana, Tirana, Albania. IEEE Computer Society.
  • Antonopoulos N and Rana O. (2010). Editorial for Special Issue on Management and Optimisation of P2P and Grid Systems with Network Economics, Future Generation Computer Systems, the International Journal of Grid Computing, Elsevier.
  • Antonopoulos N and Gillam L. (eds, 2010). Cloud Computing: Principles, Systems & Applications, Springer Verlag.
  • Asimakopoulou E, Bessis N, Sotiriadis S, Xhafa F And Barolli L (2011) A Collective Intelligence Resource Management Dynamic Approach for Disaster Management: A Density Survey of Disasters Occurrence, 2nd International Workshop on Computational Intelligence for Disaster Management (CIDM-2011), in conjunction with IEEE INCoS-2011, Nov 30-Dec 2, Fukuoka, pp: 735-740.
  • Asimakopoulou E, Bessis N. “Buildings and Crowds: Forming Smart Cities for More Effective Disaster Management,” Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2011 Fifth International Conference on , vol., no., pp.229,234, June 30 2011-July 2 2011
  • Aydin M E, Bessis N, Asimakopoulou E Xhafa F, Wu J. “Scanning Environments with Swarms of Learning Birds: A Computational Intelligence Approach for Managing Disasters,” Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on , vol., no., pp.332,339, 22-25 March 2011
  • Barolli L, Xhafa F, You I and Bessis N (eds 2011) Fifth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2011), IEEE CPS ISBN: 978-0-7695-4373-4/11
  • Bessis N, Asimakopoulou E, Aydin M, and Xhafa F. (2011). Utilizing Next Generation Emerging Technologies for enabling Collective Computational Intelligence in Disaster Management in Bessis, N. and Xhafa, F. (eds). Next Generation Data Technologies for Collective Computational Intelligence, a book series in “Studies in Computational Intelligence”, Springer, Volume 352, ISBN: 978-3-642-20343-5.
  • Bessis N And Xhafa F. Next Generation Data Technologies for Collective Computational Intelligence, book series in “Studies in Computational Intelligence”, Springer Vol 352 ISBN: 978-3-642-20343-5
  • Bessis N, Huang Y, Norrington P, Brown A, Kuonen P And Hirsbrunner B (2011) Modeling of a Self-led Critical Friend Topology in Inter-cooperative Grid Communities, Simulation Modeling Practice and Theory, Elsevier (SCI JSCR IF 2011: 0.969) 9(1) ISSN: 1569-190X pp: 5-16.
  • Bessis N, Norrigton P, Xhafa F And Venturi G (2011) User-Centred Evaluation and Organisational Acceptability of a Distributed Repository to support Communities of Learners, in Daradoumis T, Caballé S, Juan AA and Xhafa F (eds) Technology-Enhanced Systems and Tools for Collaborative Learning Scaffolding, “Studies in Computational Intelligence”, Springer Vol 350 ISBN: 978-3-642-19813-7 pp: 1-25
  • Bessis N. (ed, 2011). International Journal of Distributed Systems and Technologies (IJDST), Special Issue on Collaborative Technologies, Volume 2, Issue 4, IGI (in print), ISSN: 1947-3532.
  • Bessis N. (ed, 2011). International Journal of Distributed Systems and Technologies (IJDST), Volume 2, Issue 2, IGI, ISSN: 1947-3532.
  • Bessis N. (ed, 2010). First International Conference on Collaborative Technologies, IADIS, ISBN: 978-972-8939-15-1.
  • Bessis N, Asimakopoulou E and Xhafa F. (2011). A Next Generation Emerging Technologies Roadmap for enabling Collective Computational Intelligence in Disaster Management, International Journal of Space-Based and Situated Computing  (IJSSC), Volume 1, Issue 1, InderScience, ISSN: 2044-4893, p.p.: 76-85.
  • Bessis N, Asimakopoulou E., Norrington P, Thomas S and Varaganti R. (2011). A Next Generation Technology Victim Location and Low Level Assessment Framework for Occupational Disasters caused by Natural Hazards, in International Journal of Distributed Systems and Technologies (IJDST), Special Issue on Distributed Systems and Technologies for Effective and Efficient Disaster Management, Volume 2, Issue 1, IGI, ISSN: 1947-3532, p.p.: 54-65.
  • Bessis N, Gaitan A, Shukla M, and Lai Z. 2011. Sharing experiences with using next generation knowledge portals for advancing web communities. Int. J. Web Based Communities 7, 3 (July 2011), 256-275. DOI=10.1504/IJWBC.2011.041198
  • Crowther P, Hill R. Dissertation by Portfolio-A Break from Traditional Approaches[J]. World Academy of Science, Engineering and Technology, 2011, 59: 1904-1908.
  • Dube T, Minhua Ma and Zhao Z. (2011) Tasks, Processes, and Tools: A Design Methodology Management Approach to Design and Development of E-Assessment. Proceedings of the 9th IEEE Conference on Emerging eLearning Technologies and Applications (ICETA 2011), Stara Lesna, The High Tatras, Slovakia, 27-28 October 2011.
  • Dube T and Minhua Ma (2011) Design of a Flexible e-Assessment System to Accommodate Diverse Learning Styles: a Mathematics Case Study. In the Proceedings of the Third International Conference on Education and New Learning Technologies (EDULEARN11), Chova, L.G. et al. (Eds.), 52-60, Barcelona, Spain, 4-6 July 2011. International Association of Technology, Education and Development (IATED) (ISBN: 978-84-615-0441-1)
  • French T, Bessis N, Xhafa F, and Carsten Maple. 2011. Towards a corporate governance trust agent scoring model for collaborative virtual organisations. Int. J. Grid Util. Comput. 2, 2 (June 2011), 98-108. DOI=10.1504/IJGUC.2011.040597
  • Hasham K, Delgado Peris A, Anjum A, Evans D, Gowdy S, Hernandez J M, Huedo E, Hufnagel D, van Lingen F. and McClatchey R. (2011) CMS workflow execution using intelligent job scheduling and data access strategies. IEEE Transactions on Nuclear Science, 58 (3). pp. 1221-1232. ISSN 0018-9499
  • Hill, R., Shadija, D., (2011). ‘Internationalising the Computing Curricula: A Peircian Approach’. In: Conceptual Structures for Discovering Knowledge (The 19th International Conference on Conceptual Structures, ICCS 2011, Derby, UK), Andrews, S., Polovina, S., Hill, R., Akhgar, B., (Eds.), Lecture Notes in Computer Science, Vol. 6828 (Subseries: Lecture Notes in Artificial Intelligence), Springer (ISBN: 978-3-642-22687-8), pp406-413.
  • Hill, R., Antonopoulos, N., Bessis, N., (2011). ‘Towards an understanding of peer rationality and Collective Intelligence’. In proceedings of CISIS2011, Seoul. IEEE Computer Society, pp385-390.
  • Hill R, Antonopoulos N, Bessis N. Towards an Understanding of Peer Rationality and Collective Intelligence, in Proceedings of Fifth International Conference on Complex, Intelligent and Software Intensive Systems, Seoul, South Korea, 2011. IEEE Press.
  • Hosek P, Miglivacca M, Papagiannis I, Eyers, d.m., evans, d., shand, b., bacon, j., and PIETZUCH, P. (2011) SafeWeb: A Middleware for Securing Ruby-based Web Applications, Proceedings of the ACM/IFIP/USENIX 12th International Middleware Conference, 12-16 December, Lisbon ISBN 978-3-642-25820-6 pp: 480-499.
  • Huang Y, Bessis N, Kuonen P and Hirsbrunner B (2011) CASP: A Community-Aware Scheduling Protocol, International Journal of Grid and Utility Computing, Inderscience (SJC: Q3) 2(1) ISSN: 1741-847X pp: 11-24.
  • Kiani, S., Anjum, A., Bessis, N., Hill, R., (2011). ‘Context parsing, processing and distribution in clouds’. In proceedings of the Third IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS2011), Nov 30th – Dec 2nd, Fukuoka, Japan. IEEE Computer Society.
  • Kiani S, Anjum A, Antonopoulos N, Munir K, McClatchey R. Towards context caching in the clouds, in Proceedings of 4th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2011), Melbourne, Australia, 2011. IEEE Press.
  • Lai Z, Bessis N, De La Roche G, Kuonen P, Zhang J And Clapworthy G (2011) The Development of a Parallel Ray Launching Algorithm for Wireless Network Planning, International Journal of Distributed Systems and Technologies, IGI 2(2) ISSN: 1947-3532 pp: 1-19.
  • Li M, Wu K, Liu L. QoS-aware Service Composition in Multi-Network Environment based on Genetic Algorithm, Proceedings of CHINACOM, Harbin, China, August 2011. pp. 1231 – 1235, ISBN: 978-1-4577-0100-9. IEEE Computer Society Press.
  • Liu L, Antonopoulos N, Xu J, Webster D, Wu K. Distributed Service Integration for Disaster Monitoring Sensor Systems, IET Communications, IET Publishing, 2011.
  • Liu L, Antonopoulos N, Xu J, Webster D, Wu K. Distributed Service Integration for Disaster Monitoring Sensor Systems, IET Communications, Vol 5(12), August 2011, pp. 1777 – 1784. ISSN 1751-8628.
  • Liu Z, Liu L, Hill R, Zhan Y. (2011). ‘Base62x: An alternative approach to Base64 for non-alphanumeric characters’. In proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), July 28-29, pp2667-2670, Shanghai, China. IEEE Computer Society.
  • Liu L, Masfary O, Li J.X, Evaluation of Server Virtualization Technologies for Green IT, Proceedings of 6th IEEE International Symposium on Service Oriented System Engineering, Irvine, CA, USA, December 2011, pp.79-84, ISBN: 978-1-4673-0411-5. IEEE Computer Society Press.
  • Liu Z, Liu L, HardyJ, Anjum A, Hill R, Antonopoulos N.  Dot-base62x: A Compact Textual Representation of IPv6 Address for Clouds, Proceedings of 4th IEEE International Conference on Utility and Cloud Computing (UCC 2011), December, Melbourne, Australia 2011. pp. 427 – 432, ISBN: 978-1-4577-2116-8. IEEE Computer Society Press.
  • Liu Z, Lallie H, Liu L. A Hash-based Secure Interface on Plain Connection, Proceedings of CHINACOM, Harbin, China, August 2011. pp. 1236 – 1239, ISBN: 978-1-4577-0100-9.  IEEE Computer Society Press.
  • Mahmood Z, Hill R. (Eds.). (2011). Cloud Computing for Enterprise Architectures, in Computer Communication Networks Series, Springer Verlag, ISBN 978-1-4471-2235-7.
  • Mahmood Z. ‘Cloud Computing for Enterprise Architectures’, in ‘CloudComputing for Enterprise Architectures’, edited by Z Mahmood and R Hill,Springer, Nov 2011
  • Mahmood Z, SOA: A Pre-requisite for cloud Enterprise Computing, KeynoteAddress, 3rd Cloud Computing Summit, Hyderabad, India, 2 Dec 2011
  • Maple N, Bessis N, Hithcock J, Yue Y and Li D. (2011). Sixth International Symposium on Parallel Computing in Electrical Engineering (PARELEC-2011), Luton, UK, April 4-5, 2011, ISBN TBA.
  • Mahmood Z, ‘Knowledge Management in E-Commerce’, in ‘KnowledgeEngineering for Software Development Life Cycles’, edited by MRamachandran, IGI Global, May, 2011, 978-1-60960-5094
  • Mahmood Z, Data Location and Security Issues in Cloud Computing, Proc.2nd Int. Conf Emerging Intelligent Data and Web Technologies, Tirana,Albania, 7-9 Sep 2011
  • Mahmood Z. Cloud Computing: Characteristics and Deployment Approaches,2nd Int Workshop Dependable Service-Oriented and Cloud Computing, as partof IEEE CIT’2011, Paphos, Cyprus, 31 Aug – 2 Sep 2011
  • Mahmood Z. Barriers to Developing E-Government Projects in DevelopingCountries, Proc 11th European Conference on E-Government, Ljubljana,Slovenia, June 16-17, 2011
  • Mahmood Z and Lallie H, Cloud Computing: Issues in Data Mobility and Security, Workshop on Enterprise Cloud Computing: Strategies and Solutions, as part of IARIA Conf on Internet and Web Applications and Services, St Maarten, The Netherlands, March 20-25, 2011
  • Mahmood Z. Teaching Software Engineering to Undergraduate Computing Students, International Journal of Teaching and Case Studies, Vol 3, No 2/3/4, pp 112-122, 2011
  • McLauchlan, N.; Bessis, N., “A Case for Real-World Smart Environments: The Development of a Remote Autonomous Energy Aware Monitoring System Using Next Generation Technologies,” Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2011 Fifth International Conference on , vol., no., pp.128,135, June 30 2011-July 2 2011
  • McLauchlan N, Bessis N. “Towards Remote Monitoring of Power Use: A Case for Smart Meters,” Parallel Computing in Electrical Engineering (PARELEC), 2011 6th International Symposium on , vol., no., pp.133,138, 3-7 April 2011
  •             Minhua Ma (2011) Editorial: Introduction to serious games development and applications. Entertainment Computing 2 (2011) 59-60, Elsevier. DOI: 10.1016/j. entcom.2011.03.001.
  • Moatshe R, Mahmood Z. Strategies for e-government implementation indeveloping countries: The case study of Botswana Government, Proc 11thEuropean Conference on E-Government, Ljubljana, Slovenia, June 16-17,2011
  • Moshiri S, Hill R. (2011). Enterprise Architecture Fundamentals. In Mahmood, Z., Hill, R., editors, ‘Cloud Computing for Enterprise Architectures’, Communication Networks Series, Springer Verlag, ISBN 978-1-4471-2235-7.
  • Moatshe R M, Mahmood Z. A new Population Targeted Survey Based Sampling Method (NPTSBS-Model)[C]//Proceedings of the 12th European Conference on e-Government. Academic Conferences Limited, 2012: 473.
  • Ramachandran M and Mahmood Z, ‘A Framework for Internet SecurityAssessment and Improvement Process’, in ‘Knowledge Engineering forSoftware Development Life Cycles’ edited by M Ramachandran, IGI Global,May, 2011, 978-1-60960-5094
  • Rathfelder C, Kounev S, and Evans D. (2011) Capacity planning for event-based systems using automated performance predictions, Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 6-12 November, Oread, Lawrence ISBN 978-1-4577-1638-6 pp: 352-361.
  • Saeed S, Khawaja F M and Mahmood Z. ‘A Review of Software QualityMethodologies’, in ‘Advanced Automated Software Testing: Frameworks forRefined Practice’ edited by I Alsmadi, IGI Global, Dec 2011, ISBN:1466600896
  • Saeed S, Aamir R and Mahmood Z. Reflections on Teaching Database Management Systems to Undergraduate Students, Int J Education Economics and Development
  • Saeed S, Mahmood Z and Ramzan M. Plagiarism and its Implications on Higher Education in Developing Countries, International Journal of Teaching and Case Studies
  • Self R. (2011) Policy Development and Implementation in the Bretton Woods Institutions: A Consideration of the Legality, Human Rights Impact and Effectiveness of their Programmes, 4th International Journal of Arts and Sciences Conference, May 2011, Toronto, Canada, IJAS journal Vol 4, No 23, ISSN:1944-6934, pp 171-210.
  • Shi Q, Xiao Y, Bessis N, Lu Y, Chen Y and Hill R (2011) Towards a Maturity Model for Networks of Practice: A Case of K2 Tree Optimization, 2nd International Conference on Emerging Intelligent Data and Web Technologies (EIDWT-2011), Sep 7-9, Tirana ISBN: 978-0-7695-4456-4/11 pp: 1-5
  • Smith A, Hill R. ‘Measuring Efficiency in Opportunistic Ad Hoc Networks’. International Journal of Interconnected Networks, World Scientific Publishing, 2011, vol. 12, iss. 3, pp. 32-36.
  • Smith A, Hill R (2011). ‘Measuring Efficiency in Opportunistic Ad-hoc Networks’. Journal of Interconnection Networks, 12(3), pp189-203, World Scientific Publishing.
  • Smith A, Hill R (2011). ‘Towards a Framework for the Evaluation of Efficient Provisioning in Opportunistic Ad Hoc Networks’. In Proceedings of the 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC ’11). IEEE Computer Society, Washington, DC, USA, 32-36.
  • Smith A, Hill R (2011). ‘Towards an evaluation framework for efficient provisioning in opportunistic ad-hoc networks’. In proceedings of the Sixth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2011), Technical University of Catalunya, Barcelona, Spain. IEEE Computer Society.
  • Sotiriadis S, Bessis N and Antonopoulos N (2011) Towards inter-Cloud Schedulers: A Survey of meta-Scheduling Approaches, 6th IEEE International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2011), Oct 26-30, Barcelona ISBN: 978-0-7695-4531-8 pp: 59-66
  • Sotiriadis S, Bessis N, Antonopoulos N. Towards Inter-Cloud Schedulers: A Survey of Meta-Scheduling Approaches, in Proceedings of Sixth International Conference on P2P, Parallel, Grid, Cloud and Internet  Computing, Barcelona, Spain, 2011. IEEE Press.
  • Sotiriadis S, Bessis N and Antonopoulos N (2011) Using Self-led Critical Friend Topology P2P Chord Algorithm for Nodes Localization within Cloud Communities, 1st International Workshop on Intelligent Computing in Large-Scale Systems in conjunction with 5th CISIS-2011, Jun 30-Jul 2, Seoul ISBN: 978-0-7695-4373-4/11 pp: 490-495
  • Sotiriadis S, Bessis N, Huang Y, Kuonen P and Antonopoulos N (2011) A JADE Middleware for Grid inter-cooperated Infrastructures, 7th International Symposium on Frontiers in Networking with Applications (FINA-2011) in conjunction with the 25th AINA 2011, Mar 22-25, Biopolis ISBN: 978-0-7695-4338-3/11 pp: 135-140
  • Sotiriadis S, Bessis N, Huang Y, Kuonen P, Antonopoulos N. A JADE Middleware for Grid Inter-cooperated Infrastructures, in Proceedings of Conference on Advanced Information Networking and Applications (AINA 2011). Biopolis, Singapore, 2011. IEEE Computer Society Press.
  • Sotiriadis  S, Bessis N, Antonopoulos N. Using Self-led Critical Friends Topology Based on P2P Chord Algorithm for Node Localisation within Cloud Communities, in Proceedings of Fifth International Conference on Complex, Intelligent and Software Intensive Systems, Seoul, South Korea, 2011. IEEE Press.
  • Sotiriadis S, Bessis N, Sant P and Maple C. (2011). Encoding Minimum Requirements of Ad Hoc Inter-connected Grids to a Genetic Algorithm Infrastructure, International Journal of Distributed Systems and Technologies (IJDST), Volume 2, Issue 3, IGI, ISSN: 1947-3532, p.p.: 19-36.
  • Thorpe A, Minhua Ma and Oikonomou A. (2011) Alternative Input Methods for Video Games. Proceedings of the 16th IEEE Conference on Computer Games: AI, Animation, Mobile, Interactive Multimedia, Educational and Serious Games (CGames 2011), Mehdi, Q. et al. (Eds.), Galt House Hotel, Louisville, Kentucky, USA. 27-30 July 2011.
  • Trovati M, Automatically Constructing Bayesian Belief Networks using Text mining Techniques. DIMACS Workshop on Algorithmic Medical Decision Conference, The Cancer Institute of New Jersey, May 2011
  • Vidalis S., Angelopoulou O., Emanuel L., 2011, Digital continuity: record classification and retention on shared drives and email vault, Welsh Government, Crown copyright
  • Webster D, Liu L, Russell D, Venters C, Luo Z & Xu J, Legacy M. Assets through SOA to Realize Network Enabled Capability, Book Chapter for New Directions in Web Data Management, 1st Edition, Springer, 2011, pp. 311-346. ISBN 978-3-642-17550-3.
  • Xhafa F, Barolli L and Bessis N. (eds 2011) Second International Conference on Emerging Intelligent Data and Web Technologies (EIDWT-2011), IEEE CPS ISBN: 978-0-7695-4456-4/11
  • Xhafa F, Asimakopoulou E, Bessis N, Barolli L and Takizawa M (2011) An Event-based Approach to Supporting Team Coordination and Decision Making in Disaster Management Scenarios, 2nd International Workshop on Computational Intelligence for Disaster Management (CIDM-2011), in conjunction with IEEE INCoS-2011, Nov 30-Dec 2, Fukuoka ISBN: 978-0-7695-4579-0 pp: 741-745.
  • Xhafa F, Caballe S, Juan A, Bessis N, Barolli L and Mitrushi Mr (2011) Using Massive Processing and Mining for Modelling and Decision Making in Online Learning Systems, 2nd International Conference on Emerging Intelligent Data and Web Technologies (EIDWT-2011), Sep 7-9, Tirana ISBN: 978-0-7695-4456-4/11 pp: 91-98.
  • Yi J, Adnane A, David S, Parrein B. “Multipath optimized link state routing for mobile ad hoc networks”. Ad Hoc Networks. Volume 9, Issue 1 (January 2011), pages 28-47.
  • Zhu S, Cui G,  Li C and Luo M (2011) Comparing Large colour-Difference Data Sets, Colour Research and Application, 36(2) ISSN: 1520-6378 pp:111-117.
  • Zafar F, Mahmood Z, Comparative Analysis of Clustering AlgorithmsComprising GESC, UDCA, and k-Mean Methods for Wireless SensorNetwork, Radio Science Bulletin, Int Union of Radio Science (URSI), No 339,pp 12-18, Dec 2011, ISSN: 10244530
  • Zafar F, Mahmood Z, Zhao Z, A Simulation Based Analysis on theThroughput Fairness of TCP SACK, Reno, New Reno and Tahoe againstConstant Rate Assignment (CRA) within Wireless Heterogeneous Networks,Int J of Scientific and Engineering Research, Vol 2, Issue 8, Aug 2011, ISSN:2229-5518

2010

  • Ahmed E, Bessis N, Norrigton P and Yue Y. (2010). Managing Inconsistencies in Data Grid Environments: A Practical Approach, International Journal of Grid and High Performance Computing, Volume 2, Issue 4, IGI, ISSN: 1938-0259, p.p.: 51-65.
  • Anjum A, Bloodsworth P, Branson A, Habib I and Mcclatchey R. (2010). Research Traceability using Provenance Services for Biomedical Analysis, Studies in Health Technology & Informatics, Vol 159, ISBN 978-1-60750-027-8 IOS Press p.p. 88-99.
  • Antonopoulos N and Stafrace S. (2010). Intrusion Detection and Recovery in Wireless Sensor Networks through the Deployment of Tactical Mobile Agents, Journal of Computer Communications, Elsevier.
  • Antonopoulos N, Rana O. Editorial for Special Issue on Management and Optimisation of P2P and Grid Systems with Network Economics, Future Generation Computer Systems, the International Journal of Grid Computing, Elsevier, 2010.
  • Bacon J, Evans D, Eyers D.M, Miglivacca M, Pietzuch P, and Shand B. (2010) Enforcing end-to-end application security in the cloud, Proceedings of the ACM/IFIP/USENIX 11th International Middleware Conference, 29 November-3 December, Bangalore, India, 978-3-642-16954-0 pp: 293–312
  • Bejan A I, Gibbens R J, Evans D, et al. Statistical modelling and analysis of sparse bus probe data in urban areas[C]//Intelligent Transportation Systems (ITSC), 2010 13th International IEEE Conference on. IEEE, 2010: 1256-1263.
  • Bessis N, Brown A and Asimakopoulou E. (2010). A Mathematical Analysis of a Disaster Management Data-Grid Push Service, International Journal of Distributed Systems and Technologies, Volume 1, Issue 3, IGI, ISSN: 1947-3532, pp.: 56-70.
  • Bessis N, Asimakopoulou E, French T, Norrington P. and Xhafa F. (2010). The Big Picture, from Grids and Clouds to Crowds: A Data Collective Computational Intelligence Case Proposal for Managing Disasters, “1st International Workshop on Emerging Data Technologies for Collective Intelligence (EDTCI-2010)”, in conjunction with the 5th IEEE International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2010), November 4-6, 2010, Fukuoka, Japan, ISBN: 978-0-7695-4237-9, p.p.: 351-356.
  • Brown A, Sant P, Bessis N, French T and MAPLE C. (2010). Modelling Self-led Trust Value Management in Grid and Service Oriented Infrastructures: A Graph Theoretic Social Network Mediated Approach, International Journal of Systems and Service Oriented Engineering, Volume 1, Issue 4, IGI, ISSN: 1947-3052, p.p.: 1-19.
  • Day D, Z Zhao and Minhua Ma (2010) Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems. In the Proceedings of the IEEE Fourth International Conference on Digital Society (ICDS 2010), 178-187, St. Maarten, Netherlands Antilles, 10-16 February 2010.
  • Dube T and Minhua Ma (2010) A Flexible E-Assessment System Inspired by Design Methodology Management to Accommodate Diverse Learning Styles. International Journal for Digital Society, 1(1): 73-82, Infonomics Society, ISSN 2040 2570.
  • Dube T and Minhua Ma (2010) Marking short free text responses in e-assessment. In the e-Teaching and Learning Workshop Proceedings, in collaboration with the Higher Education Academy subject network for Information and Computer Sciences (HEA-ICS), Graham, D. (Ed.), 16-20, University of Greenwich, London, 1 June 2010. (ISBN: 978-0-9559676-9-6)
  • EFTYCHIOU A, VRUSIAS B and ANTONOPOULOS N. (2010). A Semantic-driven Adaptive Architecture for Large Scale P2P Networks, International Journal of Grid and High Performance Computing, Volume 2, Issue 4, IGI, ISSN: 1938-0259, p.p.: 51-65.
  • Evans D, Eyers D M. Efficient policy checking across administrative domains[C]//Policies for Distributed Systems and Networks (POLICY), 2010 IEEE International Symposium on. IEEE, 2010: 146-153.
  • Evans D, Eyers D M, and Bacon J. (2010) Linking policies to the spatial environment, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, 21-23 July, Fairfax, ISBN 978-0-7695-4238-6 pp: 73–76.
  • Fountoulakis N, Huber A, and Panagiotou K.  ‘Reliable Broadcasting in Random Networks and the Effect of Density’. Proceedings of the 29th Conference on Computer Communications (IEEE INFOCOM), pp.1-9, 2010.
  • Hanser E, Mc Kevitt P, Lunney T, Condell J and Minhua Ma (2010) SceneMaker: Multimodal Visualisation of Natural Language Film Scripts. In Rossitza Setchi, Ivan Jordanov, Robert J. Howlett, and Lakhmi C. Jain (Eds.): Knowledge-Based and Intelligent Information and Engineering Systems (KES 2010), Part IV, Lecture Notes in Computer Science, LNAI 6279, 430-439, Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-15383-9
  • Hill R (2010). ‘The Marriage of IT Vendor Training with Postgraduate Attributes: An Unholy Union?’, ITALICS Journal, Higher Education Academy Information and Computer Science Subject Centre, June 2010, Best Paper Award.
  • Hill R (2010). ‘Agency and the virtual campus: The TrAM Approach’. In: Xhafa, F., Demetriadis, S., Caballé, S., Abraham, A., (eds.), Proceedings of the 2010 International Conference on Intelligent Networking and Collaborative Systems, Thessaloniki, Greece. IEEE Computer Society.
  • Hill R (2010). ‘Conceptual Structures for Reasoning Enterprise Agents’, Proceedings of 18th International Conference on Conceptual Structures (ICCS 2010): Conceptual Structures: From Information to Intelligence, July 26-30, 2006, Kuching, Sarawak, Malaysia, Lecture Notes in Artificial Intelligence (LNAI), Springer.
  • Hill R (2010). ‘Computational Intelligence and Emerging Data Technologies’. In: Xhafa, F., Demetriadis, S., Caballé, S., Abraham, A., (eds.), Proceedings of the 2010 International Conference on Intelligent Networking and Collaborative Systems, Thessaloniki, Greece. IEEE Computer Society.
  • Hill R, Shadija D (2010). ‘Producing Professional Programmers’, Proceedings of the 11th Annual Conference of the HEA, Information and Computer Sciences Subject Centre, University of Durham, UK.
  • Hill R, Antonopoulos N, (2010). ‘Peer-to-Peer Networks and Collective Intelligence: The Case for Agency’, Proceedings of the First International Workshop on Emerging Data Technologies for Collective Intelligence (EDTCI-2010), held at the Fifth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2010), Fukuoka Institute of Technology, Fukuoka, Japan, Nov 4-6, 2010, IEEE Computer Society, pp357-362.
  • Lam KP, Collins D, Soobhany A R, Liu L. An Investigation of the Use of Overlay Networks in Developing Scalable and Reliable Information Sharing Web/Services, Proceedings of International Conference on Internet and Web Applications and Services (ICIW), Barcelona, Spain, May 2010. Pp. 280 – 284, ISBN: 978-1-4244-6728-0.  IEEE Computer Society Press.
  • Launders I, Polovina S, Hill R (2010). ‘Semantics and Pragmatics in Enterprise Architecture through Transaction Agent Modelling’, Proceedings of the 12th International Conference on Informatics and Semiotics in Organisations, 19-21 July, Reading, UK, Jorna, R., Liu, K., Jiang, G., Nakata, K., Sun, L, (Eds.), SciTePress (ISBN: 978-989-8425-26-3), pp285-291.
  • LI M and ANTONOPOULOS N. (eds, 2010). Special Issue of the International Journal of Grid and High Performance Computing on Distributed Computing Paradigms for High Performance Data Mining, IGI.
  • Li J, Liu L, Xu J. A P2P e-commerce reputation model based on fuzzy logic[C]//Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, 2010: 1275-1279.
  • Liarokapis F, Anderson E F, Oikonomou A. (2010) Serious Games for Use In A Higher Education Environment. In 15th Annual International Computer Games Conference (CGAMES 2010)
  • Liu L, Xu J, Wu K. Adaptive Distributed Service Discovery for Dependable Service Integration, Proceedings of 13th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing Workshops (ISORC 2010), Carmona, Spain, May 2010. pp. 166 – 175, ISBN: 978-1-4244-7218-5. IEEE Computer Society Press.
  • Liu L, Webster D, Xu J, Wu K. Enabling Dynamic Workflow for Disaster Monitoring and Relief Through Service-Oriented Sensor Networks, Proceedings of CHINACOM, Beijing, China, August 2010. pp. 1 – 7, ISBN: 973-963-9799-97-4. IEEE Computer Society Press.
  • Liu L, Xu J, Russell D. Self-adaptation and Self-organization for Search in Social Peer-to-Peer Networks, Section 17: Social Networking using P2P Networks, Handbook of Peer-to-Peer Networking, Springer, March 2010, pp. 495-530. ISBN: 978-0-387-09750-3.
  • Liu L, Antonopoulos N. From Client-Server to P2P Networking, Section 19: Advanced P2P Computing and Networking, Handbook of Peer-to-Peer Networking, Springer, March 2010, 71-89. ISBN: 978-0-387-09750-3.
  • Liu L, Russell D, Xu J. Investigation of Research on P2P Resource Discovery for Service-Oriented Computing, Handbook of Research on P2P and Grid Systems for Service-Oriented Computing, IGI Global, USA, February 2010, pp. 44-63. ISBN: 978-1615206865.
  • Ma M, Zhang J, and Antonopoulos N. Middleware for Next-generation Network Games, International Journal of Intelligent Information Technology Application, 2(4):158-163, Engineering Technology Press, 2010.
  • Ma Minhua and Oikonomou A. (2010) Network Architectures and Data Management for Massively Multiplayer Online Games. In the International Journal of Grid and High Performance Computing, 2(4): 40-50, IGI Global: Hershey, USA, ISSN 1938-0259.
  • MA M and ANTONOPOULOS N. (eds, 2010). First International Workshop on Natural Language Visualisation, part of the 14th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, Cardiff University, UK, Springer LNCS.
  • Ma M, Zheng H, and Lallie H. (2010) Virtual Reality and 3D Animation in Forensic Visualisation. Journal of Forensic Sciences, 55(5): 1227-1231, September 2010, Wiley: Malden, USA, ISSN 1556-4029.
  • Ma M and Bassi B. (2010) Narrative Time in Video Games. International Journal on Intelligent Games and Simulation, 6(1), ISSN 1477-2043. http://scitua.scit.wlv.ac.uk/ OJS_IJIGS/index.php/IJIGS/article/view/17
  • Ma M and Bassi B. (2010) Tenses, Aspects, and Pace in Game Narratives. Proceedings of the 15th International Conference on Computer Games: AI, Animation, Mobile, Interactive Multimedia, Educational and Serious Games (CGames 2010), Mehdi, Q. et al. (Eds.), 55-62, Galt House Hotel, Louisville, Kentucky, USA. 28-31 July 2010. (ISBN: 978-0-9549016-8-4)
  • Mahmood Z. (2010). Knowledge Management in E-Commerce, in M Ramachandran (ed, 2010), Knowledge Engineering for Software Development Life Cycles, IGI.
  • Mahmood Z. and Ramachandran M. (2010). A Framework for Internet Security Assessment and Improvement Process, in in M Ramachandran (ed, 2010), Knowledge Engineering for Software Development Life Cycles, IGI.
  •             McGrath H and Ma M. (2010) The Influence of Art Concepts on Visual Communication in Games. In the Proceedings of the 3rd Annual International Conference on Computer Games, Multimedia and Allied Technology (CGAT 2010), Prakash, E. (Ed.), 238-245, Singapore Management University, Singapore, 6-7 April 2010. APTF: Singapore.
  • Moatshe R M and Mahmood Z. Application of Theory of Diffusion of Innovation to E-Government Development and Implementation, Proc 15th IBIMA Int Conf, Cairo, Egypt, 5-7 Nov 2010, ISBN: 9780982148945 31
  • Moatshe R M, Mahmood Z and Antonopoulos N.SDEAT: A Six Dimensional E-Readiness Assessment Tool for E-Government Projects, Proc 15th IBIMA Int Conf, Cairo, Egypt, 5-7 Nov 2010: , ISBN: 9780982148945
  • Mahmood Z. Adoption of Service Oriented Architecture: Road map and Implementation, Proc 25th Int Tech Conf ITC-CSCC, Pattaya, Thailand, 4-7 July 2010
  • Osman A, Anjum A and Mcclatchey R. (2010). A Fault Tolerant, dynamic and Low Latency BDII Architecture, International Journal of Grid and Distributed Computing (IJGDC), SERSC Publishers, ISSN: 2005-4262.
  • Phillimore D, Oikonomou A(2010) The Social Benefits Of Eradicating Gender Prejudice In Games; A Study In Motivational Factors In Genders. In 15th Annual International Computer Games Conference (CGAMES 2010).
  • Polovina S, Hill R, Moshiri S (2010). ‘Using Vendor-specific Training for Explorative Education in Enterprise Systems’, Proceedings of the First Centre for the Promotion of Learner Autonomy Conference, Sheffield Hallam University, Sheffield, UK.
  • Polovina S, ANDREWS S., HILL R., SCHARFE H, and ØHRSTRØM P, (eds. 2010), Published by Mimos Berhad, Technology Thrust Areas, Knowledge Technology, ISBN: 978-983-41371-5-1.
  • Rathfelder C, Evans D, and Kounev S. (2010) Predictive modelling of peer-to-peer event-driven communication in component-based systems, Proceedings of the 7th European Performance Engineering Workshop (EPEW’10), 23-24 September, Bertinoro, ISBN 978-3-642-15783-7 pp: 219–235.
  • Russell D J, Liu L, Luo Z, et al. Realizing Network Enabled Capability Through Dependable Dynamic Systems Integration[C]//Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, 2010: 1269-1274.
  • Schaefer G, Tait R, Merla A and Zhu S (2010) “Automated overlay of visual and thermal medical images using skin detection and image registration”, International Journal for Computational Vision and Biomechanics 3(1) ISSN: 0973-6778 pp: 81-87.
  • Self R. (2010) An evaluation of the ICT skills deficit of Generation Y students and the required remedial approaches in relation to effective learning and communication, International Journal of Arts and Sciences, May 2010, Toronto, Canada
  • Self R. (2010) A Case Study into ICT Skills Transfer in Generation Y Students in Higher Education, HEA-ICS Workshop for e-Learning, June 2010, Greenwich, UK
  • Shadija D, Hill R (2010). ‘Developing Sustainable International Partnerships’, Proceedings of the 11th Annual Conference of the HEA, Information and Computer Sciences Subject Centre, University of Durham, UK.
  • Shardlow L, Oikonomou A (2010) Level Design Principles For First Person Shooters And Their Effects On Multiplayer Map Popularity. In 15th Annual International Computer Games Conference (CGAMES 2010).
  • Sotiriadis S, Bessis N, Asimakopoulou E and Xhafa F. (2010). Crowd-sourcing and Data Mashups Challenges: A Mini Case Study for Assisting and Solving a Disaster Management Scenario, The First International Workshop on Computational Intelligence for Disaster Management (CIDM 2010), in conjunction with INCoS 2010, 24 -26 November 2010, Thessaloniki, Greece, ISBN: 978-0-7695-4278-2, p.p.: 496-501.
  • Sotiriadis S, Bessis N, Sant P and Maple C. (2010). A Resource Discovery Architecture of Loosely Coupled Grid Inter-cooperated Virtual Organisations using Mobile Agents and Neural Networks, “1st International Workshop on Emerging Data Technologies for Collective Intelligence (EDTCI-2010)”, in conjunction with the 5th IEEE International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2010), November 4-6, 2010, Fukuoka, Japan, ISBN: 978-0-7695-4237-9, p.p.: 320-324.
  • Sotiriadis S, Bessis N, Sant P and maple C. (2010). From Grids to Clouds: A collective intelligence study for inter-cooperated infrastructures, The Fourth International Conference on Advanced Engineering Computing and Applications in Sciences (ADVCOMP 2010), IARIA, 25 – 30 October 2010, Florence, Italy, ISBN: 978-1-61208-000-0, p.p.: 142-147.
  • Stafrace S, Antonopoulos N. Intrusion Detection and Recovery in Wireless Sensor Networks through the Deployment of Tactical Mobile Agents, Journal of Computer Communications, Elsevier Science, 2010.
  • Urwin E N, Venters C, Russell D, Liu L, Luo Z, Webster D, Henshaw M, and Xu J. Scenario-Based Design and Evaluation for Capability. Proceedings of The 5th IEEE International Conference on System of Systems Engineering (SoSE 2010), Loughborough University, UK, 22-¬24 June, 2010. pp. 1 – 6, ISBN: 978-1-4244-8197-2. IEEE Computer Society Press.
  • Vidalis S, Llewellyn E, Angelopoulou O 2010, Educating Digital Forensic Investigators at Newport, Proceedings of the 4th CFET 2010: Cybercrime Forensics Education & Training, Canterbury Christ Church University 2010
  • Watmough M, Polovina S, Khazaei B, Hill R (2010). ‘Future Supply Chain Processes and Data for Collective Intelligence’. In: Xhafa, F., Barolli, L., Nishino, H., Aleksy, M. (eds.), Proceedings of the Fifth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3GPCIC), Fukuoka Institute of Technology, Fukuoka, Japan (ISBN: 978-0-7695-4237-9/10), IEEE Computer Society, pp179-185.
  • Wu K, Wu C, Liu L, Xu J. State-Based Search Strategy in Unstructured P2P, Proceedings of 13th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing (ISORC 2010), Carmona, May 5-6 2010. pp. 180 – 184, ISBN: 978-1-4244-7083-9. IEEE Computer Society Press.
  • Xu J, Zhang D, Liu L and Li X. (2010). Dynamic Cross-Realm Authentication for Secure SOA-based Business Processes, IEEE Transactions on Service Computing, Special Issue on Security and Dependability in SOA and Business Processes, ISSN: 1939-1374.
  • Zhang K, Antonopoulos N. A Lightweight Reputation System for Bartering Exchange based Incentive Mechanisms in Peer-to-Peer Systems, in Proceedings of 2nd International Conference on Intelligent Networking and Collaborative Systems (INCOS 2010), Thessaloniki, Greece, 2010. IEEE Press.
  • Zhang K, Antonopoulos N. A Taxonomy of Incentive Mechanisms in P2P Systems: Design Requirements and Classification, International Journal on Advances in Networks and Services, IARIA Publishers, 2010.
  • Zhang K, Antonopoulos N. Efficient, Real-time Service Exchange in Heterogeneous P2P Environments, Journal of Grid and Utility Computing, Inderscience Publishers, 2010.
  • Zhu S, and Schaefer G (2010) E-assessments to support Teaching Computer Networks- a Case Study, e-CASE: International Conference on e-Commerce, e-Administration, e-Society, and e-Education (e-CASE & e-Tech 2010), January 25-27, Macau, China.

2009

  • Adnane A, Bidan C, De Sousa R T, “Trust-Based Countermeasures for Securing OLSR Protocol,” IEEE International Conference on Computational Science and Engineering, 2009. CSE ’09, vol.2, pages 745-752.
  • Antonopoulos N. Editorial for Special Issue on Modelling and Applications of Computational P2P Networks, Vol 2, Issue 1, Journal of Peer-to-Peer Networking and Applications, Springer, 2009.
  • Angelopoulos S, Doerr B, Huber A and Panagiotou K. ‘Tight Bounds for Quasirandom Rumor Spreading’. The Electronic Journal of Combinatorics, 16(1), #R102, 19pp., 2009.
  • Chen S, Cheng O, Raouf Naguib G, Oikonomou A (2009) Hand Pressure Detection Among Image Sequence In Breast Self-Examination Multimedia System, 127-130. In 2009 International Forum on Information Technology and Applications.
  • Doerr B, Huber A and Levavi A. ‘Strong Robustness of Randomized Rumor Spreading Protocols’. Proceedings of the 20th International Symposium on Algorithms and Computation (ISAAC), LNCS 5878, pp.812–821, 2009
  • Dube T and Ma M.(2009) Flexible E-Assessment for Accommodating Diverse Learning Styles. In the Proceedings of London International Conference on Education (LICE-2009), Shoniregun, C. and Akmayeva, G. (Eds.), 360-363, London, UK, 9-12 November 2009. (ISBN: 978-0-9564263-0-7)
  • Dube T, Zhao Z and Ma M. (2009) E-assessment and Design Methodology Management. In the Proceedings of E-Assessment Live Conference 2009, Loughborough University, UK, 8 July 2009.
  • Evans D and Warren R H. (2009) Anonymity properties of stored or transmitted data taken from Bluetooth scans, Proceedings of the International Symposium on Secure Computing, the IEEE International Conference on Information Privacy, Security, Risk and Trust; in Proceedings of the 2009 International Conference on Computational Science and Engineering – Volume 03, 29-31 August, Vancouver, ISBN 978-0-7695-3823-5 pp: 133–138.
  • Evans d and Eyers D M. (2009) State needed to infer data use compliance in distributed transport applications, Proceedings of the InMotion Workshop, the 7th International Conference on Pervasive Computing, 11 May, Nara
  • Fountoulakis N and Huber A. ‘Quasirandom Broadcasting on the Complete Graph is as fast as Randomized Broadcasting’. Proceedings of the European Conference on Combinatorics, Graph Theory and Applications (EUROCOMB), ENDM 34, pp.553-559 2009
  • Fountoulakis N and Huber A and Panagiotou K. ‘The Speed of Broadcasting in Random Networks: Density Does Not Matter’. Brief announcement in Proceedings of the 23rd International Symposium on Distributed Computing (DISC), LNCS 5805, pp.529–530, 2009.
  • Fountoulakis N and Huber A.  ‘Quasirandom Rumor Spreading on The Complete Graph is as Fast as Randomized Rumor Spreading’. SIAM Journal on Discrete Mathematics, 23(4), pp.1964–1991, 2009.
  • Hill R (2009). ‘Why should I do this? Making the information systems curriculum relevant to strategic learners’, ITALICS Journal, Higher Education Academy Information and Computer Science Subject Centre, June 2009.
  • Hill R (2009). ‘The Marriage of IT Vendor Training with Postgraduate Attributes: An Unholy Union?’, Proceedings of the 10th Annual Conference of the HEA, Information and Computer Sciences Subject Centre, 25th-27th August 2009, University of Kent, UK.
  • Hill R (2009). ‘Conversations for change: Research, Teaching and Organisational Culture’, 2nd Institutional Research Conference, Building an IR Community in the UK and Eire, 8-9 July 2009, Sheffield Hallam University, Sheffield, UK.
  • Hill R (2009). ‘Changing Conversations: An Institutional Strategy for Research-Informed Learning and Teaching’, Eighth CLTR Learning & Teaching Research Conference, ‘Application, Integration & Discovery: Researching Learning & Teaching in the Disciplines’, 3rd June 2009, Education Building, Ormskirk Campus.
  • Hill R (2009). ‘Open Portfolios: Teaching for Learning with Web 2.0’, Proceedings of the 10th Annual Conference of the HEA, Information and Computer Sciences Subject Centre, 25th-27th August 2009, University of Kent, UK.
  • Hill R (2009). ‘Strategies for student learning through research’, Proceedings of the 10th Annual Conference of the HEA, Information and Computer Sciences Subject Centre, 25th-27th August 2009, University of Kent, UK.
  • Launders I, Polovina S, Hill R (2009). ‘The Transaction Pattern through Automating TrAM’, Supplementary Proceedings of the 17th International Conference on Conceptual Structures, Moscow, Russia, 26 – 31 July, Sebastian Rudolph, Frithjof Dau, Sergei O. Kuznetsov (Eds.), CEUR-WS (ISSN 1613-0073), 40-53.
  • Li M, Antonopoulos N. Automatically Wrapping Legacy Software into Services: A Grid Case Study, Journal of Peer-to-Peer Networking and Applications, Vol 1, Number 2, Springer, 2009.
  • Li M, Sahota V, Baker M, Antonopoulos N. A Grouped P2P Network for Scalable Grid Information Services, Journal of Peer-to-Peer Networking and Applications, Vol 2, Number 1, Springer, 2009.
  • Liu L, Russell D, Xu J, Webster D, Luo Z, Venters C, & Davies J. Modelling and Simulation of Network Enabled Capability on Service-Oriented Architecture, Simulation Modeling Practice and Theory, Elsevier Science, Vol 17 (8), September 2009, pp 1430-1442. 1569-190X (SCI-Indexed journal)
  • Liu L, Xu J, Russell D, Townend P, Webster D. Efficient and Scalable Search on Scale-free P2P Networks, Peer-to-Peer Networking and Applications, Springer, Vol 2(2), June 2009, pp 98 – 108. ISSN: 1936-6442. (SCI-Indexed journal)
  • Liu L, Antonopoulos N, Mackin S, Xu J, Russell D. Efficient Resource Discovery in Self-organized Unstructured Peer-to-Peer Networks, Concurrency and Computation: Practice and Experience, Wiley, Vol 23(2), February 2009, pp. 159-183, ISSN: 1532-0626 (SCI-Indexed journal)
  • Liu L, Xu J, Russell D, Lam KP, Luo Z, Wu K, Collins D. Dependable Dynamic Service Integration on Service-Oriented Peer-to-Peer Networks, Proceedings of International Conference in Advances in P2P Systems (AP2PS), Sliema, Malta, October 2009, pp. 116-121, ISBN: 978-0-7695-3831-0. IEEE Computer Society Press.
  • Liu L, Xu J, Russell D, Luo Z. Evolution of Social Models in Peer-to-Peer Networking: Towards Self-organising Networks, Proceedings of 6th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD’09), Tianjin, China, August 2009, pp. 250-254. ISBN: 978-0-7695-3735-1. IEEE Computer Society Press.
  • Liu L, Russell D, Webster D, Luo Z, Venters C, Xu J, Davies J, Delivering Sustainable Capability on Evolutionary Service-oriented Architecture, Proceedings of 12th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing (ISORC 2009), Tokyo, Japan, March 2009, pp. 12-19. ISBN: 978-0-7695-3573-9. IEEE Computer Society Press.
  • Liu L, Antonopoulos N. Small World Architecture for Building Effective Virtual Organizations, Chapter X, Grid Technology for Maximizing Collaborative Decision Management and Support: Advancing Effective Virtual Organizations, IGI Global, USA, May 2009, pp. 191-212. ISBN:  978-1-60566-364-7.
  • Ma M, Zhang J and Antonopoulos N (2009) Middleware for Next-generation Network Games. International Journal of Intelligent Information Technology Application, 2(4): 158-163, August 2009, Engineering Technology Press, Hong Kong. ISSN 1999-2459.
  • Ma M, Oikonomou A, and Zheng H (2009) Second Life as a Learning and Teaching Environment for Digital Games Education. In the Proceedings of the 12th Annual International Workshop on Presence (PRESENCE 2009), Lombard, M. et al. (Eds.), Los Angeles, California, USA, 11-13 November 2009.
  • Mahmood Z. E-Government: Stage Models for Successful Development, Proc 13th Int. IBIMA Conf on Knowledge Management and Innovation in Advancing Economies, Marrakech, Morocco, pp 77-83, 9-10 Nov 2009, ISBN: 978- 09821489-21
  • Mahmood Z. E-Government: E-Readiness Factors and Implementation Strategy, Proc. 13th Int. IBIMA Conf on Knowledge Management and Innovation in Advancing Economies, Marrakech, Morocco, pp 460-465, 9-10 Nov 2009, ISBN: 97809821489-21
  • Mahmood Z. An Objects-First Approach to Teaching Introductory Software Development, Proc 5th WSEAS/IASME Int Conf of Educational Technologies, pp 28-32, 22-24 July 2009, Rhodes, Greece, ISBN: 9789604741007
  • Mahmood Z. Plagiarism: Students’ Perception, Proc 5th WSEAS/IASME Int Conf of Educational Technologies, 1-3 July 2009, Tenerife, Spain, ISBN: 9789604740925
  • Mahmood Z. A Framework for Teaching Introductory Software Development, WSEAS Trans on Computers, Issue 8, Vol 8, pp 1225-1234, Aug. 2009, ISSN: 1109-2750
  • Mahmood Z. Students’ Understanding of Plagiarism and Collusion and Recommendadtions for Academics, WSEAS Trans on Information Science and Applications, Issue 8, Vol 6, pp 1349-1358, Aug 2009, ISSN: 1790-0832
  • Mahmood Z. Contract Cheating: A New Form of Cyber Plagiarism, Comm of the IBIMA, Vol 10, No 12, 2009, pp 93-97, ISSN: 1943-7765
  • Mahmood Z. Synergies Between SOA and Grid Computing, Comm of the IBIMA, Vol 8, No 22, 2009, pp 1164-169, ISSN: 1943-7765
  • Mahmood Z. Attitudes Towards the Use of E-Banking: Result of a Pilot Survey, Comm of the IBIMA, Vol 8, No 22, 2009, pp 170-174, ISSN: 1943-7765
  • Mahmood Z. Synergies Between SOA and Grid Computing, Proceedings of 11th IBIMA Conf on Innovation and Knowledge Management in Twin Track Economies, Cairo, Egypt, Jan 2009, ISBN: 97809821489-07
  • Mahmood Z. Attitudes Towards the Use of E-Banking: Result of a Pilot Survey, Proceedings of 11th IBIMA Conf on Innovation and Knowledge Management in Twin Track Economies, Cairo, Egypt, Jan 2009, ISBN:97809821489-07
  • Mahmood Z. Contract Cheating: A New Form of Cyber Plagiarism, Proceedings of 11th IBIMA Conf on Innovation and Knowledge Management in Twin Track Economies, Cairo, Egypt, Jan 2009, ISBN: 97809821489-07
  • Oikonomou A and Ma M. (2009) Assessing Presentations in Game Development Education. In the International Journal of Learning, 17(1): 329-338, CG Publishing: University of Illinois, Champaign, USA, ISSN 1447-9494.
  • Polovina S, Hill R (2009). ‘A Transactions Pattern for Structuring Unstructured Corporate Information in Enterprise Applications’, International Journal of Intelligent Information Technologies (IJIIT), April-June 2009, 5(2), pp33-47, IGI Publishing.
  • Polovina S, Hill R (2009). ‘Using vendor-specific training for explorative education in enterprise systems’, Proceedings of Computer Assisted Learning (CAL2009), ‘Learning in digital worlds’, March 23-25, 2009, Brighton, UK.
  • Rafael Timóteo de Sousa Júnior, A.  Adnane, Christophe Bidan and Ludovic Mé, Vulnerabilidades e Proteções do Protocolo de Roteamento Ad Hoc OLSR sob o Ponto de Vista da Confiança . Revista IEEE América Latina.
  • Self R, (2009) Addressing the Challenges of Low ICT Literacy in UK University Students, 4th International Conference on ICT for Development, Education and Training, 27-29 May 2009, Dakar, Senegal, ISBN 978-3-941055-04-9, pp. 126-129
  • Schaefer G and Zhu S (2009) Teaching Computer Game Development using Free and open-source software”, The International Conference on Education and New Learning Technologies (EDULEARN09), July 6-9, Barcelona, Spain, ISBN: 978-84-612-9801-3 pp: 2439-2444
  • Schaefer G, Staroloski R, Pawlak D and Zhu S (2008) Wavelet Based Retrieval of Medical Thermograms, 5th International Conference on Information Technology and Applications in Biomedicine (ITAB2008), May 30-31 Shen Zhen, China ISBN978-1-4244-2254-8 pp: 157-159
  • Shah M, Mohsin M, Mahmood Z, Aziz R. Organizational Barriers in Offering E-Banking, Journal of Electronic Commerce in Organisations, 7(2), pp 67-82, 2009, ISSN: 1539-2937
  • Starosolski R, Schaefer G, Moleda M and Zhu S (2008) Content-based retrieval of compressed medical thermograms, 5th Int. Conference on Information Technology and Applications in Biomedicine (ITAB2008), May 30-31 Shen Zhen, China  ISBN978-1-4244-2254-8 pp:135-137
  • Venters C, Russell D, Liu L, Luo Z, Webster D, and Xu J. A Scenario-Based Architecture Evaluation Framework for Network Enabled Capability, Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, Seattle, USA, July 20- July 24, 2009, pp. 9-12. ISSN: 0730-3157, ISBN: 978-0-7695-3726-9. IEEE Computer Society Press.
  • Vinod R, Exarchakos G, Antonopoulos N. Performance-Driven Calibration of ERGO, Journal of Peer-to-Peer Networking and Applications, Vol 2, Number 2, Springer, 2009.
  • Yi J, David S, Adnane A, Parrein B, Lecourtier X. Multipath OLSR: Simulation and Testbed. 5th OLSR Interop/Workshop, Vienna : Austria 2009.
  • Zhang K, Antonopoulos N. A Review of Incentive Mechanisms in P2P Systems, in Proceedings of the 1st International Conference on Advances in P2P Systems, 2009, IEEE Computer Society Press, Sliema, Malta. (Best Paper Award)
  • Zhang K, Antonopoulos N. Towards a Cluster-based Incentive Mechanism for Service-Oriented P2P Networks, in Proceedings of the 9th IEEE International Symposium on Cluster Computing and the Grid, 2009, IEEE Press, Shanghai, China.
  • Zhu S and Schaefer G (2009) Using Network Simulation Tools to Support Teaching in Computer Networks, The International Conference on Education and New Learning Technologies (EDULEARN09), July 6-9, Barcelona, Spain, ISBN: 978-84-612-9801-3 pp: 2136-2140.

2008

  • Abdulrub S, Polovina S, Sandberg-Petersen U, Hill R (2008). ‘Implementing Interoperability through an Ontology Importer for Amine’, Proceedings of the Third Conceptual Structures Tool Interoperability Workshop (CS-TIW 2008): ‘Conceptual Structures Tools and the Web’, co-located with the 16th International Conference on Conceptual Structures (ICCS 2008), Published by CEUR-WS, Vol-352 (ISSN 1613-0073), pp1-6.
  • Adams N, Polovina S, Hill R (2008). ‘The Role of FLIPP Explainers as a Tool to Assist the Visual Composition of Web Services for Enterprise Systems’, Proceedings of the Third Conceptual Structures Tool Interoperability Workshop (CS-TIW 2008): ‘Conceptual Structures Tools and the Web’ collocated with the 16th International Conference on Conceptual Structures (ICCS 2008), Published by CEUR-WS, Vol-352 (ISSN 1613-0073), 7-12.
  • Adnane A, Bidan C and Timoteo de Sousa Jr. R. Validation of the OLSR routing table based on trust reasoning , International Workshop on Trust in Mobile Environments(TIME 08), colocated with iTrust/PST. Presented at Trondheim, Norway, June 17th 2008.
  • Adnane A, Bidan C and Timoteo de Sousa Jr. R. Effectiveness of trust reasoning for attack detection in OLSR, The 6th International Workshop on Security in Information Systems (WOSIS2008). Presented at Barcelona, Spain. June 2008.
  • Adnane A, Timoteo de Sousa Jr. R, Bidan C, and Mé L. Autonomic trust reasoning enables misbehaviour detection in OLSR, the 23rd Annual ACM Symposium on Applied Computing (ACM SAC 2008): Trust, Recommendations, Evidence and other Collaboration Know-how (TRECK) track.Presented at in Fortaleza, Ceará, Brazil. March 16 – 20.
  • Antonopoulos N, Exarchakos G, Zhang K. Sharing Supply-Demand Trends for Efficient Resource Discovery in GRID Environments, in Proceedings of the 7th International Network Conference (INC2008), 8-10 July 2008, Plymouth, UK.
  • Evans D and Eyers D M. (2008) Deontic logic for modelling data flow and use compliance, Proceedings of MPAC ’08: the 6th International Workshop on Middleware for Pervasive and Ad-hoc Computing, 1-5 December, Leuven, ISBN 978-1-60558-364-8 pp: 19–24.
  • Exarchakos G, Antonopoulos N, Zhang K. Firewalks: A Discovery Mechanism for Non-replicable Reusable Resources, in Proceedings of the 7th International Network Conference (INC2008), 8-10 July 2008, Plymouth, UK.
  • Exarchakos G, Antonopoulos N. Non-Replicable Reusable Resource Discovery on Scale-Free Peer-to-Peer Networks, in press, 2nd IEEE International Conference on Digital Ecosystems and Technologies, 2008, IEEE Press, Phitsanulok, Thailand. (Best Paper Award).
  • Hill R, Polovina S (2008). ‘An Automated Conceptual Catalogue for the Enterprise’, Supplementary Proceedings of the 16th International Conference on Conceptual Structures (ICCS 2008), Conceptual Structures: Knowledge Visualization and Reasoning, Toulouse, France, July 2008, Eklund, P., Haemmerlé, O., (Eds.), Published by CEUR-WS, Vol-354 (ISSN 1613-0073), 99-106.
  • Hill R, Bramhall M (2008). ‘An Introduction to Research-Informed Learning and Teaching’, The First International Workshop on Research-Informed Learning and Teaching (RILT08), Tunku Abdul Rahman College, Malaysia, 6th August 2008.
  • Koukoumpetsos K, Antonopoulos N, Zhang K, Exarchakos G. Improving Availability of Mobile Code Systems by Decoupling Interaction from Mobility, in press, 7th International Conference on Networking, 2008, IEEE Computer Science Press, Cancun, Mexico.
  • Liu L, Antonopoulos N. Managing Peer-to-Peer networks with Human tactics in Social Interactions, Journal of Supercomputing, Vol 44, Number 3, Springer Verlag, 2008.
  • Liu L, Antonopoulos N. Efficient Resource Discovery in Self-organized Unstructured Peer-to-Peer Networks, Journal of Concurrency and Computation, Vol 21, Issue 2, Elsevier Science, 2008.
  • Liu L, Antonopoulos N, Mackin S, Managing Peer-to-Peer Networks with Human Tactics in Social Interactions, Journal of Supercomputing, Springer, Vol. 44(3), June 2008, pp. 217-236, ISSN: 0920-8542. (SCI-Indexed journal)
  • Liu L, Russell D, Xu J, Davies J, Irvin K. Agile Properties of Service Oriented Architectures for Network Enabled Capability, Proceedings of International Conference on Realising Network Enabled Capability, Leeds, United Kingdom, October 2008. (Best Paper Award)
  • Liu L, Antonopoulos N, Xu J, Russell D. Investigation of Research Towards Efficient Social Peer-to-Peer Networks, Proceedings of International Conference on Computing in the Global Information Technology (ICCGI 2008), Athens, Greece, July 2008, pp. 263-270, ISBN: 978-0-7695-3275-2/08. IEEE Computer Society Press.
  • Liu L, Russell D, Looker N, Webster D, Xu J, Davies J, Irvin K, Evolutionary Service-Oriented Architecture for Network Enabled Capability, Proceedings of the Second International Workshop on Verification and Evaluation of Computer and Communication Systems (VeCoS), Leeds, United Kingdom, July 2008, pp.1-11, eWiC series of the British Computer Society (BCS). ISSN: 1477-9358.
  • Liu L, Xu J, Russell D, Antonopoulos N, Self-organization of Autonomous Peers with Human Strategies, Proceedings of International Conference on Internet and Web Applications and Services (ICIW), Peer-to-Peer Systems and Applications (P2PSA) Track, Athens, Greece, June 2008, pp. 348-357, ISBN 978-0-7695-3163-2. IEEE Computer Society Press.
  • Liu L, Xiu J, Russell D, Antonopoulos N. Self-Organisation of Autonomous Peers with Human Strategies, in Proceedings of the 3rd International Conference on Internet and Web Applications and Services (ICIW), 2008, IEEE Computer Society Press, Athens, Greece.
  • Liu L, Antonopoulos N. Investigation of Research towards Efficient Social P2P Networks, in Proceedings of the 1st International Workshop on Computational P2P Networks: Theory & Practice (ComP2P), 2008, IEEE Computer Society Press, Athens, Greece.
  • Liu L, Antonopoulos N, Mackin S. Small World Peer-to-peer for Resource Discovery, Proceedings of 21st International Conference on Information Networking, Estoril, Portugal, January 2007,  Selected to be published in the book – Information Networking. Towards Ubiquitous Networking and Services, Lecture Notes in Computer Science (LNCS 5200), Springer, 2008, ISSN 0302-9743, ISBN: 978-3-540-89523-7, pp. 223-233.
  •             Ma M and Bechkoum K (2008) Serious Games for Movement Therapy after Stroke. In IEEE International Conference on Systems, Man and Cybernetics (IEEE SMC 2008), D. S. Yeung, A. N. Poo, and M. H. Ang Jr (Eds.), 1872-1877, Singapore, 12-15 October. (ISBN: 978-1-4244-2384-2)
  • Ma M (2008) 3D Visualisation of Crime Scenes: Computer Animation in Forensics. In the 3rd Annual Teaching & Assessment Conference: Flexibity, current and future practice, University of Derby, Buxton, 10 July 2008.
  • Macdonald R, Hill R (2008). ‘It ain’t what you do it’s the way that you do it – exploring some dilemmas in educational change for academic developers, wherever they are’, Proceedings of the 13th Annual Staff and Educational Development Association (SEDA) Conference ‘Changing Educational Development: Whose Values? Whose Agendas? Whose Future?’, Aston Business School Conference Centre, Birmingham, UK, 18-19 November 2008.
  • Macdonald R, Hill R, Bramhall M (2008). ‘An institutional strategy for Research-Informed Learning and Teaching’, Proceedings of the First International Conference on Learning and Teaching ‘Enhancing Learning and Teaching in Higher Education’ (TIC 2008), Tunku Abdul Rahman College, Putrajaya Marriott Hotel, Malaysia, 4-5 August 2008.
  • Macdonald R, Hill R (2008). ‘Enhancing the Links between Research, Learning and Teaching: an Institutional and Local Perspective’, Proceedings of the first Institutional Research Conference 2008, ‘Exploring the Hinterlands: Mapping an Agenda for Institutional Research in the UK’, Southampton Solent University, UK, 25-26 June 2008.
  • Mahmood Z. Software Products and Technologies for the Development and Implementation of SOA, WSEAS Transactions on Computer Research, Issue 1, Vol 3, pp 28-34, Jan 2008, ISSN: 1991-8755
  • Mahmood Z. Saeed S. Teaching Quality Assurance and Project Management to Undergraduate Computing Students in Pakistan, Proceedings of Int Conf on Business, Management and Commerce, Vol 2, pp 166-173, Cseme, Turkey, June 2008, ISBN: 978-975-6339
  • Mahmood Z, Saeed S, Raza M, M T Ayub. Software Industry in Pakistan: An Investigation into the CMMI Practice of Project Planning, Monitoring and Control, Proceedings of 9th IBIMA Int Conf on Information Management in Modern Organisations, Morocco, Marrakech, 4-6 Jan 2008, ISBN: 0-9753393-89
  • Oikonomou A. (2008) Video Games – Instrument Of Crime Or Educational Tool?, 9-10. In Personalised Education Now Autumn-Win (8).
  • Pournaras E, Antonopoulos N, Exarchakos G. Load-driven Neighbourhood Reconfiguration of Gnutella Overlay, Journal of Computer Communications, Vol 31, Issue 13, Elsevier Science, 2008.
  • Russell D, Looker N, Liu L, Xu J. Service-Oriented Integration of Systems for Military Capability, Proceedings of 11th IEEE International Symposium on Object/component/service-oriented Real-time distributed Computing (ISORC 2008), Orlando, Florida, USA, May 2008, ISBN: 978-0-7695-3132-8. pp. 33-41, IEEE Computer Society Press.
  • Saeed S, Mahmood Z, Ayub M T, Raza M. Pracice of Software Project Planning in IT Industry in Pakistan, Proceedings of 9th IBIMA Int Conf on Information Management in Modern Organisations, Morocco, Marrakech, 4-6 Jan 2008, ISBN: 0-9753393-89
  • Self R (2008). A Case Study Analysis of the Costs of eLearning Provision in HE, 3rd International Conference on ICT for Development, Education and Training, 28-30 May 2008, Accra, Ghana, ISBN 978-3-941055-00-1 , pp.123-128
  • Trovati M, Ashwin P, Byott N, Packings induced by piecewise isometries cannot contain the Arbelos. Discrete and Continuous Dynamical Systems, Volume 22, Number 3, (2008).
  • Webster D, Looker N, Russell D, Liu L and Xu J. An Ontology for Evaluation of Network Enabled Capability, Proceedings of International Conference on Realising Network Enabled Capability,  Leeds, United Kingdom, October 2008.