Items where Subject is "G000 Computing and Mathematical Sciences > G600 Software Engineering"

Up a level
Export as [feed] RSS
Group by: Creators | Item Type
Number of items at this level: 67.


Magnusson, Thor (2012) ixi lang [Artefact]

Magnusson, Thor (2012) ixiQuarks v7 [Artefact]

Authored book

Fish, Andrew, Knapp, A. and Stoerrie, H. (2007) Proceedings of the workshop on the layout of (software) engineering diagrams (LED 2007), Idaho, USA, September 2007 European Association of Software Science and Technology (EASST), Berlin, Germany. ISBN 1863-2122

Hughes, Robert and Cotterell, M. (2002) Software project management McGraw Hill, London, UK. ISBN 007709834X

Hughes, Robert and Cotterell, M. (2009) Software project management McGraw-Hill, Maidenhead. ISBN 9780077122799

Chapter in book

Kapetanakis, Stylianos and Petridis, Miltiadis (2014) Evaluating a Case-based Reasoning Architecture for the intelligent monitoring of business workflows In: Montani, S. and Jain, L.C., eds. Successful Case-based Reasoning Applications-2. Studies in Computational Intelligence . Springer, Berlin Heidelberg, pp. 43-54. ISBN 9783642387357

Magnusson, Thor (2008) Expression and Time: The Question of Strata and Time Management in Art Practices using Technology In: de Valk, Marloes and Mansoux, Aymericx, eds. FLOSS + Art. OpenMute, London, UK, pp. 232-248. ISBN ISBN 978-1-906496-18-0

Magnusson, Thor (2008) Interview In: Hugill, Andrew, ed. The Digital Musician. Routledge, London, UK, pp. 207-209.

Mateos-Garcia, Juan and Steinmueller, W. Edward (2008) Open, but how much? Growth, conflict and institutional evolution in open-source communities In: Roberts, Joanne and Amin, Ash, eds. Community, economic creativity, and organization. Oxford University Press, Oxford, pp. 254-282. ISBN 9780199545490

Mouratidis, Haralambos, Argyropoulos, Nikolaos and Shei, Shaun (2016) Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach In: Karagiannis, D., Mayr, H.C. and Mylopoulos, J., eds. Domain-Specific Conceptual Modeling: Concepts, Methods and Tools. Springer International Publishing, Switzerland, pp. 357-380. ISBN 9783319394169

Contribution to conference proceedings in the public domain

Angelopoulos, Konstantinos, Diamantopoulou, Vasiliki, Pavlidis, Michail, Mouratidis, Haralambos, Salnitri, Mattia, Ruiz, Jose Francisco and Giorgini, Paolo (2017) A Holistic Approach for Privacy Protection in E-Government In: ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 29 Aug - 1 Sep, 2017.

Argyropoulos, Nikolaos, Alcañiz, Luis Márquez, Mouratidis, Haralambos, Fish, Andrew, Rosado, David G., de Guzmán, Ignacio García-Rodriguez and Fernandez-Medina, Eduardo (2015) Eliciting security requirements for business processes of legacy systems In: The Practice of Enterprise Modeling, Valencia, Spain, November 10-12, 2015.

Argyropoulos, Nikolaos, Kalloniatis, Christos, Mouratidis, Haralambos and Fish, Andrew (2016) Incorporating privacy patterns into semi-automatic business process derivation In: 2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS), Grenoble, France, 1-3 June 2016.

Argyropoulos, Nikolaos, Mouratidis, Haralambos and Fish, Andrew (2015) Towards the derivation of secure business process designs In: Advances in Conceptual Modeling, ER 2015 Workshops AHA, CMS, EMoV, MoBID, MORE-BI, MReBA, QMMQ, and SCME, Stockholm, Sweden, October 19-22, 2015.

Argyropoulos, Nikolaos, Shei, Shaun, Kalloniatis, Christos, Mouratidis, Haralambos, Delaney, Aidan, Fish, Andrew and Gritzalis, Stefanos (2017) A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements In: 50th Hawaii International Conference on System Sciences (HICSS), Hawaii, USA, January 2017.

Buckley, Jim, Mooney, Sean, Rosik, Jacek and Ali, Nour (2013) JITTAC: a just-in-time tool for architectural consistency In: ICSE '13: Proceedings of the 2013 International Conference on Software Engineering, Hyatt Regency San Francisco, 18-26 May, 2013.

De Chiara, Rosario and Fish, Andrew (2007) EulerView: a non-hierarchical visualization component In: 2007 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2007), Coeur d'Alene, Idaho, USA, 23-27 September, 2007.

Delaney, Aidan and Stapleton, Gem (2007) On the descriptional complexity of a diagrammatic notation In: Proceedings of the 13th international conference on Distributed Multimedia Systems, 6-8 Sep 2007, San Francisco, USA, 6-8 September, 2007.

Delaney, Aidan and Stapleton, Gem (2007) Spider diagrams of order In: Proceedings of the VLL 2007 workshop on Visual Languages and Logic, Coeur d'Aléne, Idaho, USA, 23 September 2007.

Diamantopoulou, Vasiliki, Angelopoulos, Konstantinos, Flake, Julian, Praitano, Andrea, Ruiz, Jose Francisco, Jurjens, Jan, Pavlidis, Michail, Bonutto, Dimitri, Castillo Sanz, Andres, Mouratidis, Haralambos, Garcia Robles, Javier and Tozzi, Alberto Eugenio (2017) Privacy Data Management and Awareness for Public Administrations: a Case Study from the Healthcare Domain In: APF2017 ENISA Annual Privacy Forum, Vienna, Austria, 7-8 June 2017.

Diamantopoulou, Vasiliki, Argyropoulos, Nikolaos, Kalloniatis, Christos and Gritzalis, Stefanos (2017) Supporting the Design of Privacy-Aware Business Processes via Privacy Process Patterns In: IEEE RCIS 2017 11th International Conference on Research Challenges in Information Science, Brighton, UK, 10-12 May 2017.

Diamantopoulou, Vasiliki, Kalloniatis, Christos, Gritzalis, Stefanos and Mouratidis, Haralambos (2017) Supporting Privacy by Design using Privacy Process Patterns In: IFIP SEC 2017 32nd IFIP International Information Security Conference, Rome, Italy, 29-31 May, 2017.

Diamantopoulou, Vasiliki and Pavlidis, Michail (2017) Visual Privacy Management in User Centric Open Environments In: 2017 IEEE 11th International Conference on Research Challenges in Information Science (RCIS), Brighton, UK.

Diamantopoulou, Vasiliki, Pavlidis, Michail and Mouratidis, Haralambos (2017) Evaluation of a Security and Privacy Requirements Methodology using the Physics of Notation In: 1st International Workshop on Security and Privacy Requirements Engineering SECPRE 2017, Oslo, Norway, 14-15 September 2017.

Diamantopoulou, Vasiliki, Pavlidis, Michail and Mouratidis, Haralambos (2017) Privacy Level Agreements for Public Administration Information Systems In: 29th International Conference on Advanced Information Systems Engineering (CAiSE) 2017 Forum, Essen, Germany, June 12-16, 2017.

Fish, Andrew, Khazaei, Babak and Roast, Chris (2007) Exploring human factors in formal diagram usage In: Proceedings of the EIS 2007 Joint Working Conferences, 22-24 Mar, 2007, Salamanca, Spain.

Hughes, Robert (2012) Could agile development have prevented the FireControl project failure? In: Proceedings of the 17th UK Academy for Information Systems Conference, New College, Oxford, 27-28 March, 2012.

Lee, Shin, Howlett, R.J., Walters, Simon and Crua, Cyril (2005) Fuzzy logic and neuro-fuzzy modelling of diesel spray penetration In: KES 2005, 14-16 September 2005, Melbourne, Australia.

Magnusson, Thor (2007) The Acoustic, the Digital and the Body: A Survey on Musical Instruments In: International Conference for New Instruments for Musical Expression, New York.

Magnusson, Thor (2006) Affordances and Constraints in Screen-Based Musical Instruments In: NordiCHI Conference, Oslo, Norway.

Magnusson, Thor (2008) Coding Music In: TechnArte 2008, April 24th - 25th, 2008, Bilbao, Spain.

Magnusson, Thor (2007) Musical Collaboration Over High-speed Networks In: The Potential of High Speed Networks as a New Space for Cultural Research, Innovation and Production, March 19th 2007, London, UK.

Magnusson, Thor (2011) SuperCollider workshop In: Introduction to Sound Synthesis and SuperCollider, 30 Sep - 2 Oct 2012, Barcelona, Spain. (Unpublished)

Magnusson, Thor (2005) ixi software: Open Controllers for Open Source Audio Software In: International Computer Music Conference, Barcelona, Spain.

Magnusson, Thor (2007) The ixiQuarks: Merging Code and GUI in One Creative Space In: International Computer Music Conference, September 2007, Copenhagen, Denmark.

Magnusson, Thor and Hurtado Mendieta, Enrike (2005) Interfaces as Music In: STEIM lecture series, 26 April 2005, Amsterdam, Holland. (Unpublished)

Magnusson, Thor and Hurtado Mendieta, Enrike (2006) Screen-Based Musical Instruments as Semiotic Machines In: International Conference for New Instruments for Musical Expression, Paris, France.

Magnusson, Thor and Hurtado Mendieta, Enrike (2006) ixi audio: A Collective In: MakeArt, 24 Jan - 29 Jan 2006, Poitiers, France. (Unpublished)

Magnusson, Thor (2011) Confessions of a live coder In: Proceedings of International Computer Music Conference, University of Huddersfield, UK, 31 July - 5 August, 2011.

Pavlidis, Michail, Mouratidis, Haralambos, Gonzalez-Perez, Cesar and Kalloniatis, Christos (2015) Addressing Privacy and Trust Issues in Cultural Heritage Modelling In: 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015.

Pavlidis, Michail, Mouratidis, Haralambos and Islam, Shareeful (2013) Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions In: 10th International Conference on Trust, Privacy and Security in Digital Business (TrustBus), Prague, Czech Republic, 28-29 Aug, 2013.

Pavlidis, Michail, Mouratidis, Haralambos, Islam, Shareeful and Kearney, Paul (2012) Dealing with Trust and Control: A Meta-Model for Trustworthy Information Systems Development In: Sixth International Conference on Research Challenges in Information Science (RCIS), 2012, Valencia, Spain, 16-18 May 2012.

Schauer, Stefan, Stamer, Martin, Bosse, Claudia, Pavlidis, Michail, Mouratidis, Haralambos, Koenig, Sandra and Papastergiou, Spyros (2017) An Adaptive Supply Chain Cyber Risk Management Methodology In: Hamburg International Conference of Logistics, Hamburg, Germany, 12-13 October 2017.

Stapleton, Gem and Delaney, Aidan (2007) Towards overcoming deficiencies in constraint diagrams In: Proceedings of the 2007 IEEE Symposium on Visual Languages and Human-Centric Computing, Coeur d'Alène, Idaho, USA, 23-27 September, 2007.

Stapleton, Gem and Masthoff, Judith (2007) Incoporating negation into visual logics: a case study using Euler diagrams In: Proceedings of the 13th International Conference on Distributed Multimedia Systems, DMS 2007, San Francisco Bay, USA, 6-8 September, 2007.

Stapleton, Gem, Rodgers, Peter, Howse, John and Taylor, John (2007) Properties of Euler diagrams In: Proceedings of the Workshop on the Layout of (Software) Engineering Diagrams (LED 2007), Coeur d'Alene, Idaho, USA, 27 September, 2007.

Walters, Simon, Lee, Shin, Crua, Cyril and Howlett, R.J. (2006) Neural network classification of diesel spray images In: KES2006 10th International Conference on Knowledge-Based & Intelligent Information & Engineering Systems, 9-11 October 2006, Bournemouth, United Kingdom.

Edited Collections

Mistrik, Ivan, Ali, Nour, Kazman, Rick, Grundy, John and Schmerl, Bradley (2016) Managing Trade-offs in Adaptable Software Architectures [Edited Collections]

Journal article

Alavi, Reza, Islam, Shareeful and Mouratidis, Haralambos (2016) An information security risk-driven investment model for analysing human factors Information Management and Computer Security, 24 (2). pp. 205-227. ISSN 0968-5227

Athreye, Suma and Hobday, Michael (2010) Overcoming development adversity: how entrepreneurs led software development in India International Journal of Technological Learning, Innovation and Development, 3 (1). pp. 36-46. ISSN 1753-1942

Bahsoon, Rami, Mistrík, Ivan, Ali, Nour, Mohan, T.S. and Medvidovic, Nenad (2013) The future of software engineering IN and FOR the cloud Journal of Systems and Software, 86 (9). pp. 2221-2224. ISSN 0164-1212

Brady, Tim and Hobday, Michael (1998) Rational versus soft management in complex software: lessons from flight simulation International Journal of Innovation Management, 2 (1). pp. 1-43. ISSN 1363-9196

Cemesova, Alexandra, Hopfe, Christina J. and McLeod, Robert (2015) PassivBIM: Enhancing interoperability between BIM and low energy design software Automation in Construction, 57. pp. 17-32. ISSN 0926-5805

Cox, Karl, Niazi, Mahmood and Verner, June (2009) Empirical study of Sommerville and Sawyer's requirements engineering practices IET Software, 3 (5). pp. 339-355. ISSN 1751-8806

Eden, Amnon, Gasparis, Epameinondas, Nicholson, Jonathan and Kazman, Rick (2013) Modeling and visualizing object-oriented programs with Codecharts Formal Methods in System Design, 43 (1). pp. 1-28. ISSN 0925-9856

Lee, Shin, Howlett, R.J., Crua, Cyril and Walters, Simon (2007) Fuzzy logic and neuro-fuzzy modelling of diesel spray penetration: a comparative study Journal of Intelligent and Fuzzy Systems, 18 (1). pp. 43-56. ISSN 1064-1246

Lee, Shin, Howlett, R.J., Walters, Simon and Crua, Cyril (2007) Modelling and control of internal combustion engines using intelligent techniques Cybernetics and Systems, 38 (5-6). pp. 509-533. ISSN 0196-9722

Magnusson, Thor (2005) Intelligent Tools in Music Artificial.

Magnusson, Thor (2011) Algorithms as scores: coding live music Leonardo Music Journal, 21. pp. 19-23. ISSN 0961-1215

Magnusson, Thor (2009) Of Epistemic Tools: musical instruments as cognitive extensions Organised Sound, 14 (2). pp. 168-176. ISSN 1355-7718

Magnusson, Thor and Hurtado, E. (2008) The phenomenology of musical instruments: a survey eContact!, 10 (4).

Pavlidis, Michail, Mouratidis, Haralambos and Islam, Shareeful (2012) Modelling Security Using Trust Based Concepts International Journal of Secure Software Engineering, 3 (2). pp. 36-53. ISSN 1947-3036

Petridis, Miltiadis, Ma, J. and Knight, B. (2011) Temporal model for business process Intelligent Decision Technologies, 5 (4). pp. 321-331. ISSN 1872-4981

Polatidis, Nikolaos, Pimenidis, Elias, Pavlidis, Michail, Papastergiou, Spyridon and Mouratidis, Haralambos (2018) From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks Evolving Systems. ISSN 1868-6478

Rebolloa, Oscar, Melladob, Daniel, Fernandez-Medinac, Eduardo and Mouratidis, Haralambos (2015) Empirical evaluation of a cloud computing information security governance Information and Software Technology, 58. pp. 44-57. ISSN 0950-5849


Magnusson, Thor and Magnusson, Runar (2009) SameSameButDifferent v.02 – Iceland [Software]

Other form of assessable output

Magnusson, Thor (2008) Working with Sound Folly, Leicester, UK.

This list was generated on Fri Jun 22 18:23:33 2018 BST.