<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-8.2.4'-->
<?xml-stylesheet type="text/xsl" href="//uob.acm.org/image-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>http://uob.acm.org/acm_chapter1/</loc><lastmod>2014-12-04T00:38:08Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2014/12/acm_chapter12.jpg</image:loc><image:title>University of Bradford ACM Student Chapter</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/uob-2-2/</loc><lastmod>2014-12-04T01:14:17Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2014/12/uob-22.jpg</image:loc><image:title>University of Bradford ACM Student Chapter</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/uob-3/</loc><lastmod>2014-12-04T01:58:11Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2014/12/uob-3.jpg</image:loc><image:title>University of Bradford ACM Student Chapter</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/events/</loc><lastmod>2014-12-04T12:45:05Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2014/12/IMG_20141123_174357.jpg</image:loc><image:title>Virginia's Visit to our Chapter</image:title><image:caption>Virginia's Visit to our Chapter</image:caption></image:image></url><url><loc>http://uob.acm.org/uobacm/</loc><lastmod>2014-12-04T12:24:03Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2014/12/uobacm.gif</image:loc><image:title>University of Bradford ACM Student Chapter</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/uobacm1/</loc><lastmod>2014-12-04T12:27:47Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2014/12/uobacm1.png</image:loc><image:title>University of Bradford ACM Student Chapter</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-1-agent-based-modelling-and-its-role-in-interdisciplinary-research/</loc><lastmod>2015-06-11T00:56:05Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/06/20150528_171508.jpg</image:loc><image:title>20150528_171508</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-1-agent-based-modelling-and-its-role-in-interdisciplinary-research/</loc><lastmod>2015-06-11T00:56:09Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/06/20150528_171524-e1435318512578.jpg</image:loc><image:title>20150528_171524</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-1-agent-based-modelling-and-its-role-in-interdisciplinary-research/</loc><lastmod>2015-06-11T00:56:52Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/06/20150528_173739.jpg</image:loc><image:title>20150528_173739</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-1-agent-based-modelling-and-its-role-in-interdisciplinary-research/</loc><lastmod>2015-06-11T00:56:56Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/06/20150528_173746.jpg</image:loc><image:title>20150528_173746</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/the-methodology-of-analysing-technological-innovation-fashion-waves-a-case-of-e-government/</loc><lastmod>2015-06-26T11:42:25Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/06/ek1.jpg</image:loc><image:title>ek1</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/the-methodology-of-analysing-technological-innovation-fashion-waves-a-case-of-e-government/</loc><lastmod>2015-06-26T11:42:27Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/06/ek2.jpg</image:loc><image:title>ek2</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/the-methodology-of-analysing-technological-innovation-fashion-waves-a-case-of-e-government/</loc><lastmod>2015-06-26T11:42:29Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/06/ek3.jpg</image:loc><image:title>ek3</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/the-methodology-of-analysing-technological-innovation-fashion-waves-a-case-of-e-government/</loc><lastmod>2015-06-26T11:42:31Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/06/ek4.jpg</image:loc><image:title>ek4</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/the-methodology-of-analysing-technological-innovation-fashion-waves-a-case-of-e-government/</loc><lastmod>2015-06-26T11:42:33Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/06/ek5.jpg</image:loc><image:title>ek5</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/the-methodology-of-analysing-technological-innovation-fashion-waves-a-case-of-e-government/</loc><lastmod>2015-06-26T11:42:35Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/06/ek6.jpg</image:loc><image:title>ek6</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/the-methodology-of-analysing-technological-innovation-fashion-waves-a-case-of-e-government/</loc><lastmod>2015-06-26T11:42:36Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/06/ek7.jpg</image:loc><image:title>ek7</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/the-methodology-of-analysing-technological-innovation-fashion-waves-a-case-of-e-government/</loc><lastmod>2015-06-26T11:42:39Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/06/ek8.jpg</image:loc><image:title>ek8</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-5-semantic-signatures-to-detect-obfuscated-malware/</loc><lastmod>2015-08-04T02:12:22Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/07/ACM.jpg</image:loc><image:title>ACM</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-5-semantic-signatures-to-detect-obfuscated-malware/</loc><lastmod>2015-08-04T02:12:26Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/07/ACM2-e1438654385528.jpg</image:loc><image:title>ACM2</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-5-semantic-signatures-to-detect-obfuscated-malware/</loc><lastmod>2015-08-04T02:12:31Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/07/ACM3.jpg</image:loc><image:title>ACM3</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-7-data-quality-of-big-data/</loc><lastmod>2015-08-18T08:05:58Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/08/acm3.jpg</image:loc><image:title>acm3</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-7-data-quality-of-big-data/</loc><lastmod>2015-08-18T08:06:02Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/08/acm4.jpg</image:loc><image:title>acm4</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-7-data-quality-of-big-data/</loc><lastmod>2015-08-18T08:06:04Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/08/acm6.jpg</image:loc><image:title>acm6</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-7-data-quality-of-big-data/</loc><lastmod>2015-08-18T08:06:05Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/08/acm7.jpg</image:loc><image:title>acm7</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-7-data-quality-of-big-data/</loc><lastmod>2015-08-18T08:06:07Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/08/acm9.jpg</image:loc><image:title>acm9</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-7-data-quality-of-big-data/</loc><lastmod>2015-08-18T08:06:08Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/08/acm11.jpg</image:loc><image:title>acm11</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-7-data-quality-of-big-data/</loc><lastmod>2015-08-18T08:06:10Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/08/acm12.jpg</image:loc><image:title>acm12</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-8-using-agent-based-vm-placement-policy/</loc><lastmod>2015-08-21T05:05:55Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/08/Ashraf3.jpg</image:loc><image:title>Ashraf3</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-8-using-agent-based-vm-placement-policy/</loc><lastmod>2015-08-21T05:05:57Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/08/Ashraf4.jpg</image:loc><image:title>Ashraf4</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-9-analysis-of-cloud-testbeds-using-opensource-solutions/</loc><lastmod>2015-08-21T05:07:06Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/08/bashir1.jpg</image:loc><image:title>bashir1</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-9-analysis-of-cloud-testbeds-using-opensource-solutions/</loc><lastmod>2015-08-21T05:07:08Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/08/bashir2.jpg</image:loc><image:title>bashir2</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/talk-10-an-efficient-alternate-to-enterprise-antivirus-software/</loc><lastmod>2015-11-04T11:39:52Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2015/11/ali.jpg</image:loc><image:title>ali</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/cropped-acm_chapter12-jpg/</loc><lastmod>2016-04-01T17:08:33Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2014/12/cropped-acm_chapter12.jpg</image:loc><image:title>cropped-acm_chapter12.jpg</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/12939172_10204307567448016_1577441848_n/</loc><lastmod>2016-04-01T18:08:11Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2016/04/12939172_10204307567448016_1577441848_n.jpg</image:loc><image:title>12939172_10204307567448016_1577441848_n</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/acm-bradford2-fw/</loc><lastmod>2016-04-15T08:43:17Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2016/04/ACM-Bradford2.fw_.png</image:loc><image:title>ACM Bradford2.fw</image:title><image:caption></image:caption></image:image></url><url><loc>http://uob.acm.org/celebrating-success-with-anitta-patience-namanya/</loc><lastmod>2016-06-20T07:51:50Z</lastmod><image:image><image:loc>http://uob.acm.org/wp-content/uploads/2016/06/a.jpg</image:loc><image:title>a</image:title><image:caption></image:caption></image:image></url></urlset>
