PROGRAM
Days: Tuesday, April 23rd Wednesday, April 24th Thursday, April 25th
Tuesday, April 23rd
View this program: with abstractssession overviewtalk overview
09:00-10:30 Session 1: [APT]
Chair:
Location: Kilburn 1.5
09:00 | SpiNNak-Ear - Big ears for SpiNNaker! (abstract) |
09:15 | Accuracy of spiking neural network simulations using fixed-point arithmetic (abstract) |
09:30 | Execution of parallel C programs on Java Virtual Machine (abstract) |
09:45 | Resource Elastic Management for FPGAs (abstract) |
10:00 | Enable FPGA Virtualisation for Data Centres (abstract) |
10:15 | Simulating Structural Plasticity on the SpiNNaker Platform (abstract) |
10:30-11:00Coffee Break
11:00-12:30 Session 2: [IMG]
Location: Kilburn 1.5
11:00 | Question Answering over structured text representations (abstract) |
11:15 | Tagging Method for Integrity Preservation of Outsourced Data (abstract) |
11:30 | Behavioural monitoring to generate precision nudges (abstract) |
11:45 | Exploring relation extraction in diagnostic case-based MCQs (abstract) |
12:00 | Smart Measure of Social Withdrawal in Parkinson's disease (abstract) |
12:15 | Evaluating the Effectiveness of Data Visualisation in Facilitating ECG Self-monitoring for Medication-induced LQTS (abstract) |
13:30-15:00 Session 3: [FM,SS]
Chair:
Location: Kilburn 1.5
13:30 | Assessing The Usefulness of Mobile App Reviews For Software Development (abstract) |
13:45 | Forgetting-Based Abductive Reasoning in Ontologies (abstract) |
14:00 | Boolean Conjunctive Query Answering for the Horn Loosely Guarded Fragment (abstract) |
14:15 | Reasoning in higher-order logic with Vampire (abstract) |
14:30 | Using Semantic Frames to Analyse Software Requirements (abstract) |
14:45 | Trusted and Auditable Decision Aids over Dynamic Data (abstract) |
15:00-15:30Coffee Break
15:30-17:00 Session 4: [AI,MLO,TM]
Location: Kilburn 1.5
15:30 | Routing protocol design for wireless mesh network (abstract) |
15:45 | Avoiding Subsumption Tests During Classification Using the Atomic Decomposition (abstract) |
16:00 | Hand tracking with Differential Evolution (abstract) |
16:15 | Adverse Drug Events and Medication Relation Extraction (abstract) |
Wednesday, April 24th
View this program: with abstractssession overviewtalk overview
10:00-11:25 Session 5: Keynote Talks and Awards
Location: Kilburn 1.1
10:00 | An industry/academic career in Computer Engineering - with a PhD in aerodynamics along the way (abstract) |
10:30 | Reflections on a multi-disciplinary career in academia (abstract) |
11:00 | Presentation of Awards (abstract) |
11:10 | Presentation from Award Winner (abstract) |
11:45-12:30 Session 6: Industry Panel
11:45 | Industry Panel: How can we get from PhD Research to Industrial Impact? (abstract) |
12:30-15:00 Session 7: Poster Session (with Buffet Lunch)
Location: Kilburn Lower First
12:30 | Homing like an Ant (abstract) |
12:30 | Modelling Technology Usage, Machine Learning Perspective (abstract) |
12:30 | Magnetic Skyrmions in Synthetic Systems (abstract) |
12:30 | Predicting Gene Expression Using Meta-learning (abstract) |
12:30 | Controllable writing/deleting of an unique magnetic object (skyrmion), aiming to next generation storage devices (abstract) |
12:30 | Towards Automatically Evaluating Compliance of Website Privacy Policies with GDPR (abstract) |
12:30 | Removing Compression Artefacts from Video Streams (abstract) |
12:30 | Magnetic skyrmions for nanocomputing (abstract) |
12:30 | Characterisation of Size Distribution and Positional Misalignment of Nanoscale Islands by Small-Angle X-ray Scattering with High Statistical Significance (abstract) |
12:30 | Probing depth- and temperature-resolved magnetic properties of [CoPd]8/NiFe exchange springs using polarised neutron reflectometry (abstract) |
12:30 | Integration of theory reasoning in the Inst-Gen calculus (abstract) |
12:30 | A Neural Embedding Model for Informal Mathematical Discourse (abstract) |
12:30 | Named Entity Recognition for Requirements Engineering: A Corpus-Based Approach Supported by Deep Learning (abstract) |
12:30 | Scalability Analysis of optical Benes networks based on Thermally/Electrically Tuned Mach-Zender Interferometers (abstract) |
12:30 | Investigating the ultrafast dynamics of the metamagnetic phase transition of FeRh thin films by pump-probe microscopy (abstract) |
12:30 | Navigation System for Blind (abstract) |
12:30 | Mobile phone–based tools for independent living (abstract) |
12:30 | Learning Regression Models for Heterogeneous Data (abstract) |
12:30 | Knowledge Sharing Among Agents with Ontological Reasoning (abstract) |
12:30 | Motif Evolution of Spiking Neural Networks on SpiNNaker (abstract) |
12:30 | An Evolutionary Optimisation Framework for SpiNNaker (abstract) |
12:30 | Spiking Neural Network for Number Recognition on SpiNNaker (abstract) |
12:30 | Finding Vulnerabilities in IoT Protocols using Fuzzing, Symbolic Execution and Abstract Interpretation (abstract) |
12:30 | Dynamic Node Movement Control in a Mobile Medium Ad hoc Network (abstract) |
12:30 | Real-time Detection of Advanced Persistent Threats Using Heterogeneous Log-Files Monitoring and Machine Learning (abstract) |
12:30 | Pigment Analysis using Multispectral imaging Techniques (abstract) |
12:30 | Detecting Personality, A Step Towards Adaptive Robots (abstract) |
12:30 | Inferring Knowledge Acquisition through Web Navigation Behaviours (abstract) |
12:30 | Low-level vs. High-level Representations for Knowledge Transfer in Multi-task Reinforcement Learning: A Case Study (abstract) |
12:30 | Clarifying cooperativeness in services composition of Social Internet of Things (SIoTs) (abstract) |
12:30 | Sample-Efficient Deep Reinforcement LEarning for Human Robot Interaction (abstract) |
12:30 | Development of Patterning Techniques for Skyrmionic Devices (abstract) |
12:30 | Finding Vulnerabilities in Network Protocols using Fuzzing and Symbolic Execution (abstract) |
12:30 | Towards HPC applications on multiple-FPGAs (abstract) |
12:30 | Detecting Vulnerabilities in IoT cryptographic primitive using Fuzzing and Symbolic Execution. (abstract) |
12:30 | Security and Privacy for the Internet of Things (IoT) in E-health (abstract) |
12:30 | Exploring Trends in Scientific Literature (abstract) |
12:30 | Identifying MPs' policy preferences in parliamentary debates (abstract) |
12:30 | Hearty: how healthy is your heart? (abstract) |
12:30 | Optimising Heuristics for Theorem Proving using Machine Learning (abstract) |
12:30 | Language Extensions via Macros for Description Logics (abstract) |
12:30 | The Role of the Internet on Learning to Program (abstract) |
12:30 | Side Channel Attacks on ASIC AES Implementation (abstract) |
12:30 | A Context-Aware Access Control Model for Smart Homes (abstract) |
12:30 | Multiple Degrees-Of-Freedom Input Devices for Interactive Command and Control within Virtual Reality in Industrial Visualizations (abstract) |
12:30 | Visualization and Interaction with Argumentation Graphs (abstract) |
12:30 | Scanning Probe Microscopy Studies of FeRh (abstract) |
12:30 | Investigating the Effect of Device Stereotypes on Memory (abstract) |
12:30 | An Explanation-based Reinforcement Learning Approach (abstract) |
12:30 | Leveraging Explanations for Inference and Generalisation in Question Answering Systems (abstract) |
12:30 | Generating Explanations for Science Questions by Reasoning over Hybrid Semantic Knowledge Representation (abstract) |
12:30 | On How Artificial Intelligence and Distributed Ledger Technology May Change The Nature of The Firm (abstract) |
12:30 | Finding Software Vulnerabilities in Unmanned Aerial Vehicles (abstract) |
12:30 | An Authentication Framework for the Internet of Things (abstract) |
12:30 | Internet of Things Botnets (abstract) |
12:30 | An Effective Ensemble Method for Distributed Prediction Models (abstract) |
12:30 | Feature Selection in the Presence of Interventions: Information Theoretic Approaches (abstract) |
12:30 | Application of Artificial Intelligence to Understanding Cancer (abstract) |
12:30 | High Dimensional Data Visualization: Local Ordinal Embedding with Anchor Points (abstract) |
12:30 | WebAssembly Hosted on the Java Virtual Machine (abstract) |
12:30 | Meta Learning Reinforcement Learning Exploration Strategies via Learned Priors (abstract) |
12:30 | Understanding the Implications of Implementing FAIR Data in Life Sciences (abstract) |
12:30 | Investigating Cosmic Magnetism with Deep Learning (abstract) |
12:30 | The Structure of Vaccination Discussions in Online Social Networks (abstract) |
12:30 | FullFusion: real-time semantic reconstruction of dynamic indoor scenes (abstract) |
12:30 | A framework for representing and estimating AI systems (abstract) |
12:30 | High frequency ferromagnetic resonance study of synthetic antiferromagnetic structures (abstract) |
12:30 | Adaptive Word Reordering for Low-Power Inter-Chip Communication (abstract) |
12:30 | Concept symbol forgetting under background ontology (abstract) |
12:30 | Modularity Meets Forgetting: A Case Study with SNOMED CT Ontology (abstract) |
15:00-15:30Coffee Break
15:30-17:00 Session 8: [IMG,MLO]
Location: Kilburn 1.5
15:30 | An Authentication Framework for MapReduce in a Multiple Public Cloud Environment (abstract) |
15:45 | DesigningaSecureandPrivacy-PreservingDataCollection (SPDC)FrameworkforCollectingDatafromMobilePatients (abstract) |
16:00 | Recognising and Drawing Kittens in Chinese Painting Style (abstract) |
16:15 | Computational Reading of Arabic Calligraphic Text (abstract) |
Thursday, April 25th
View this program: with abstractssession overviewtalk overview
09:00-10:30 Session 9: [MLO]
Chair:
Location: Kilburn 1.5
09:00 | Machine learning and the predictability of stock markets. (abstract) |
09:15 | Online Learning with Long Short-Term Memory Networks for Anomaly Detection in Time Series (abstract) |
09:30 | Mindreading for Robots: Predicting Intentions via Dynamical Clustering of Human Postures (abstract) |
09:45 | Exploring Matrix Completion for Single Word to Multi-Word Transition in Cognitive Robotics (abstract) |
10:00 | Using Common-sense Knowledge to detect Human-Object Interactions (abstract) |
10:30-11:00Coffee Break
11:00-12:30 Session 10: [TM]
Chair:
Location: Kilburn 1.5
11:00 | Use of Graphic and Phonetic Features in Clinicial Named Entity Recognition in Chinese (abstract) |
11:15 | A Walk-based Model on Entity Graphs for Relation Extraction (abstract) |
11:30 | Topic-centric sentiment analysis of UK parliamentary debate transcripts (abstract) |
11:45 | An Empirical Study on End-to-End Sentence Modelling (abstract) |
12:00 | Modelling Instance-Level Annotator Reliability for Natural Language Labelling Tasks (abstract) |
12:15 | Nested Named Entity Recognition (abstract) |
13:30-15:00 Session 11: [NEST,APT,MLO]
Location: Kilburn 1.5
13:30 | Echo State: Embracing Randomness in Recurrent Neural Networks (abstract) |
13:45 | Novel approaches towards reducing switching current in magnetic tunnel junctions for STT-MRAM (abstract) |
14:00 | Beyond Polyhedral Analysis of OpenStream Programs (abstract) |
14:15 | Adaptation of Instantaneous Time Mirror from Water Waves to Electromagnetic Waves (abstract) |
14:30 | A functional linear regression approach for electric load forecasting (abstract) |
14:45 | Deep learning for prediction of DNA-TF binding (abstract) |
15:00-15:30Coffee Break
15:30-17:00 Session 12: [APT,BHI,ISBE,MLO]
Location: Kilburn 1.5
15:30 | Modelling Expression Rates of Hypoxia-inducible Factors in Growing Tumours: Investigating Potentials for Non-Invasive Cancer Therapies (abstract) |
15:45 | Quantitative Validation of Deformation Histories (abstract) |
16:00 | Gaussian process modelling of count data with application to bulk and single-cell RNA-Seq (abstract) |
16:15 | GeVIR: Gene Variation Intolerance Rank – an in silico approach to prioritise disease candidate genes. (abstract) |