Search Constraints
Filtering by:
Department, School or Faculty
Department of Computer and Information Sciences.
Remove constraint Department, School or Faculty: Department of Computer and Information Sciences.
« Previous |
1 - 100 of 120
|
Next »
Number of results to display per page
Search Results
Select an image to start the slideshow
MARA and public user characteristics in response to phishing emails
1 of 100
Integration of operations research and artificial intelligence approaches to solve the nurse rostering problem
2 of 100
Quantitative Methods for AI CS801 exam papers
3 of 100
Theory of Computation CS411 exam papers
4 of 100
Information and Information Systems CS104 exam papers
5 of 100
Programming Language Definition and Implementation CS311 exam papers
6 of 100
AI for Autonomous Systems CS814 exam papers
7 of 100
Software Architecture and Design CS409 exam papers
8 of 100
Distributed Information Systems CS549 exam papers
9 of 100
Foundations of Artificial intelligence CS310 exam papers
10 of 100
Computer Systems and Concurrency CS313 exam papers
11 of 100
Agile Software Engineering in Practice CS217 exam papers
12 of 100
Database Fundamentals CS990 exam papers
13 of 100
Machines, Languages and Computation CS103 exam papers
14 of 100
Database Development CS992 exam papers
15 of 100
Fundamentals of Computer Systems CS107 exam papers
16 of 100
Computer Systems and Organisation CS106 exam papers
17 of 100
Information Systems Architecture CS951 exam papers
18 of 100
User and Data Modelling CS209 exam papers
19 of 100
Computer Security Fundamentals CS996 exam papers
20 of 100
Decision Support and Health Analytics CS979 exam papers
21 of 100
Information Retreival CS976 exam papers
22 of 100
Information Retreival and Access CS954 exam papers
23 of 100
Mobile App Development CS317 exam papers
24 of 100
Logic and Algorithms CS208 exam papers
25 of 100
Database and Web Systems Development CS952 exam papers
26 of 100
Web Applications Development CS312 exam papers
27 of 100
Computer Systems and Architecture CS210 exam papers
28 of 100
Computer Security Fundamentals CS808 exam papers
29 of 100
Information Law CS955 exam papers
30 of 100
Computer Security CS407 exam papers
31 of 100
Information Access and Mining CS412 exam papers
32 of 100
Closing the gap between guidance and practice, an investigation of the relevance of design guidance to practitioners using object-oriented technologies
33 of 100
On the Möbius function and topology of the permutation poset
34 of 100
Studying the lives of software bugs
35 of 100
Pragmatic cost estimation for web applications
36 of 100
Investigating effective inspection of object-oriented code
37 of 100
Planning as Quantified Boolean Formulae
38 of 100
A comparative analysis of algorithms for satellite operations scheduling
39 of 100
Exploring the information seeking behaviour of Muslim migrants in Scotland, a Glasgow case of study
40 of 100
Navigating social systems, information behaviour in refugee integration
41 of 100
Critical information literacy and political agency, a critical, phenomenographic and personal construct study of young people's experiences of political information
42 of 100
Generalising plans to influence landscapes for robust agent execution in virtual worlds
43 of 100
Algebraic methods for incremental maintenance and updates of views within XML databases
44 of 100
Understanding emergence, a pragmatic interdisciplinary approach
45 of 100
Robotic navigation and spatial reasoning in uncertain environments with a navigation mesh
46 of 100
Extracting and exploiting interaction information in constraint-based local search
47 of 100
Evaluating readability as a factor in information security policies
48 of 100
Understanding the motivators and barriers for adolescents using digital diabetes technology to manage glycaemia in type 1 diabetes
49 of 100
A new heuristic-based model of goal recognition without libraries
50 of 100
Design and evaluation of an Interactive Topic Detection and Tracking interface
51 of 100
A cosmology of datatypes, reusability and dependent types
52 of 100
Automated software development and model generation by means of syntactic and semantic analysis
53 of 100
Developing predictive models for postoperative complications in cardiac patients
54 of 100
Users' relevance criteria for videos in leisure contexts
55 of 100
The information needs and information seeking behaviors of SME managers, a study of the manufacturing industry in Botswana
56 of 100
Creation of a goal-driven and reactive agent architecture
57 of 100
End-user interaction with thesaurus-enhanced search interfaces, an evaluation of search term selection for query expansion
58 of 100
From sentiment analysis to choreography of emotions, social media analysis for improved customer relationship management (CRM) in the Omani telecom sector
59 of 100
Updating RDF in the semantic web
60 of 100
Induction and coinduction schemes in category theory
61 of 100
Resource discovery in heterogeneous digital content environments
62 of 100
Investigations into inductive-recursive definitions
63 of 100
Uncertainty in information seeking and retrieval in the context of higher education
64 of 100
Data value storage for compressed semi-structured data
65 of 100
Delegated private set intersection on outsourced private datasets
66 of 100
Type inference, Haskell and dependent types
67 of 100
Developing information services for special library users in Libya by designing a low cost digital library
68 of 100

'No, you press yours first!', sharing interaction and socially interacting with companions at tangible hybrid interactive museum exhibits
69 of 100
The information audit, theory versus practice
70 of 100
Exploring the organisational, social and cultural factors influencing those employee attitudes and behaviours that impact the implementation of an information security culture within Omani organisations
71 of 100
E-government adoption and implementation in developing countries, an exploratory study of adoption success factors for e-government services to citizens (G2C) in Libya
72 of 100
Multi-objective planning using linear programming
73 of 100
Grouping of semistructured data for efficient query processing
74 of 100
Best practice in a digital library of Arabic manuscripts
75 of 100
Social interfaces to digital libraries
76 of 100
Distress detection
77 of 100
Classification of Arabic extremist web content through Arabic textual analysis
78 of 100
Brainplay, an investigation of serious games that tap into cognitive processes
79 of 100
A digital aid to support adults with mild learning disabilities during clinical consultations
80 of 100
Exploring the impact of conversational strategies on user search experience in goal-oriented tasks in a voice-only domain
81 of 100
Interval order enumeration
82 of 100
E-business opportunities for the electricity industry, an exploratory study of the UK deregulated and Malaysian regulated electricity environments
83 of 100
Designing, developing and evaluating an age-appropriate digital educational tool for younger children with Type-1 Diabetes
84 of 100
General video game playing using ensemble decision systems
85 of 100
Self-efficacy sources and outcome expectations of researchers for sharing knowledge via social media
86 of 100
Assessing the effectiveness of direct gesture interaction for a safety critical maritime application
87 of 100
A user-centred design framework for context-aware computing
88 of 100
Investigating the use of ensemble techniques in predicting object-oriented software maintainability
89 of 100
The panoptic principle, privacy and surveillance in the public library as evidenced in the acceptable use policy
90 of 100
Heuristically guided constraint satisfaction for AI planning
91 of 100
Types, categories, actions
92 of 100
Problem models for rule based planning
93 of 100
Developing a model for school librarians in Scotland
94 of 100
eGovernment in Saudi Arabia, an investigation from information architecture perspective
95 of 100
Innovative features of e-books and e-book builders, Potential learning and authoring tools for the Malaysian smart school environment
96 of 100
Bifibrational parametricity, from zero to two dimensions
97 of 100
Mixed methods evaluation of the cost benefit of a telehealth programme for chronic obstructive pulmonary disease in NHS Highland
98 of 100
A model and architecture for pervasive situation determination
99 of 100
E-Journal publishing in Academic environments, a study of E-journal publishing projects and operations in Academic Departments and Research Libraries
100 of 100