Further Information

Research Notes

To obtain a unique RN Number please email the Postgraduate Administrator, with the title and names of co-authors.  Once the Administrator gives you a RN number then please fill out a  UCL template cover page and attach it to your Research Note and send the document over as a pdf.

2013

RN NumberTitleAuthor 1Author 2Author 3Author 4Author 5Author 6
RN/13/01 First International Workshop on Interference and DependenceKelly Androutsopoulos
RN/13/02
RN/13/03Which is faster: Bowtie2GP > Bowtie > Bowtie2 > BWAW.B.Langdon
RN/13/04
Cost-cognisant Test Suite Reduction for Service-centric Systems
Mustafa Bozkurt
RN/13/05
Being There Together
Mel Slater
Anthony Steed
Martin Usoh
RN/13/06
Shin Yoo
RN/13/07
Gaussian-jittered sampling for bias-variance trade-off in stochastic integration
Kartic Subr
Jan Kautz
RN/13/08
The QRSim quadrotors simulator
Renzo de Nardi
RN/13/09
Efficiently Vectorized Code for Population Based Optimization Algorithms
Oliver Rice
Rickard Nyman

2012

RN Number Title Author 1 Author 2 Author 3 Author 4 Author 5 Author 6 
RN/12/01

Revision Control Database for 3D Assets

Jozef DobošAnthony Steed
RN/12/02Dependence for Slicing State-based Models: A SurveyKelly Androutsopoulos
RN/12/03Evolving Human Competitive Spectra-Based Fault Localisation
Techniques
Shin Yoo
RN/12/04Colocation and Latency OptimizationAyub Hanif
RN/12/05Finance: Communicating the IncommunicableAyub Hanif
RN/12/06How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the OrganizationSteffen BartschM.Angela Sasse
RN/12/07Initial experiences of the Emerald:E-infrastructure South GPU SupercomputerW.B. Langdon
RN/12/08Putting Ubiquitous Crowd-sourcing into ContextAfra Mashhadi

Giovanni QuattroneLicia Capra
RN/12/09

Genetically Improving 50000 Lines of C++

WB LangdonMark Harman
RN/12/10
LOUP: The Principles and Practice of Intra-Domain Route Dissemination
Nikola Gvozdiev
Brad KarpMark Handley
RN/12/11
Correlation of Microarray Probes give Evidence for Mycoplasma Contamination in Human Studies
W.B. Langdon
RN/12/12
From Corporate Bully to Security Cheerleader: Transforming the identity of the CISO
Debi Ashenden
M. Angela Sasse
RN/12/13
RN/12/14
A Performance Analysis of Distributed Indexing using Terrier
Amaury Couste
Jakub Kozłowski
William Martin
RN/12/15
Dynamic Learning Gaussian Process Bandits
Diogo Dubart Norinho
RN/12/16
Automatic Correction of Topic Coherence
William Martin
John Shawe-Taylor