Home > Publications

Publications

41201 - 41250 out of 42,928Page size: 50
  1. Published

    A Generalisation of the Discrete Fourier Transform: Determining the Minimal Polynomial of a Periodic Sequence

    Blackburn, S. R., 1994, In: IEEE Transactions on Information Theory. 40, 5, p. 1702-1704 3 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    A Generalisation of the Discrete Fourier Transform

    Blackburn, S. R., 1996, Applications of Finite Fields, Proceedings of a conference held at Royal Holloway, University of London, Surrey U.K.. Gollmann, D. (ed.). Oxford: Oxford University Press, p. 111-116 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Unpublished

    A generalisation of Mirsky's singular value inequalities

    Audenaert, K., 21 Oct 2014, (Unpublished) In: ArXiv.org. 1410.4941

    Research output: Contribution to journalArticle

  4. A general theory for preferential sampling in environmental networks

    Watson, J. O. E., Zidek, J. V. & Shaddick, G., Dec 2019, In: Annals of Applied Statistics. 13, 4, p. 2662-2700 39 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    A General Model of the Soviet Consumer

    Acharya, A. & Spagat, M., 1995, In: Journal of Comparative Economics. 20, 3, p. 302-315 14 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    A General Equilbrium Analysis of Corporate Control and the Stock Market

    Ritzberger, K. & Demichelis, S., 2011, In: Economic Theory. 46, 2, p. 221-254

    Research output: Contribution to journalArticlepeer-review

  7. Published

    A General Decomposition Construction for Incomplete Secret Sharing Schemes

    van Dijk, M., Jackson, W-A. & Martin, K. M., 1998, In: Designs, Codes and Cryptography. 15, 3, p. 301-321 21 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    A general approach to robust web metering

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In: Designs, Codes and Cryptography. 36, 1, p. 5-27 23 p.

    Research output: Contribution to journalArticlepeer-review

  9. Unpublished

    A Gender Agenda

    Broadbent, J., 2015, (Unpublished) Meditari Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    A gender agenda

    Broadbent, P., 2016, In: Meditari Accountancy Research. 24, 2, p. 169-181 13 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    A Gaze-Driven Evolutionary Algorithm to Study Aesthetic Evaluation of Visual Symmetry

    Makin, A. D. J., Bertamini, M., Jones, A., Holmes, T. & Zanker, J., 22 Mar 2016, In: i-Perception. 7, 2, p. 1-18 18 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    A game-theoretic explanation of the $dt$ effect

    Vovk, V. & Shafer, G., Jan 2003, (The Game-Theoretic Probability and Finance project, http://probabilityandfinance.com).

    Research output: Working paper

  13. Published

    A Game-based Architecture for developing Interactive Components in Computational Logic

    Stathis, K., Brogi, A. (ed.) & Hill, P. (ed.), 1 Mar 2000, In: Functional and Logic Programming, Special Issue on Logical Formalisms for Program Composition. 2000, 5

    Research output: Contribution to journalArticlepeer-review

  14. Published

    A game of prediction with expert advice

    Vovk, V., Apr 1998, In: Journal of Computer and System Sciences. 56, 2, p. 153-173 21 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    A game of prediction with expert advice

    Vovk, V., 1995, Proceedings of the Eighth Annual Conference on Computational Learning Theory . Maass, W. (ed.). New York: ACM Press, p. 51-60

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    A game of “Cut and Mouse”: bypassing antivirus by simulating user inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 9 Dec 2019, The Annual Computer Security Applications Conference (ACSAC). ACM, p. 456-465 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    A Future Health Information Provider Architecture

    Komisarczuk, P., 2006, In: HIC 2006 and HINZ 2006: Proceedings. p. 471 1 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    A future for higher education?

    Deem, R., Apr 2003, In: Public Money and Management. 23, 2, p. 78-79 2 p.

    Research output: Contribution to journalEditorialpeer-review

  19. Published

    A funny thing happened on the way to the suburbs: Social Change in Anglo-Jewry Between the Wars, 1914-45

    Cesarani, D., 1998, In: Jewish Culture and History. 1, 1, p. 5-26

    Research output: Contribution to journalArticlepeer-review

  20. Published

    A fundamental limitation of conjunctive codes in PDP models of cognition: Comments on Botvinick and Plaut

    Bowers, J. S., Damian, M. F. & Davis, C. J., 2009, In: Psychological Review. 116, p. 986-997

    Research output: Contribution to journalArticlepeer-review

  21. E-pub ahead of print

    A Functional Perspective on Machine Learning via Programmable Induction and Abduction

    Cheung, S., Davariu, V., Ghica, D., Muroya, K. & Rowe, R., 24 Apr 2018, (E-pub ahead of print) FLOPS 2018: Functional and Logic Programming. Springer, Vol. 10818. p. 84-98 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    A Functional Approach to Clinical Practise: Introducing the International Classification of Functions and its Implications for Clinical Psychology

    Berger, M., 2008, In: Leicester: British Psychological Society.

    Research output: Contribution to journalArticle

  23. Published

    A Full Operational Semantics for Asynchronous Relational Networks

    Vissani, I., Lopez Pombo, C., Tutu, I. & Fiadeiro, J. L., 30 Dec 2015, Recent Advances in Algebraic Development Techniques. Springer, p. 131-150 20 p. (Lecture Notes in Computer Science; vol. 9463).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    A Fresco Portrait of Virgil at Lucignano

    Houghton, L., 2003, In: Journal of the Warburg and Courtauld Institutes. 66, p. 1-28

    Research output: Contribution to journalArticlepeer-review

  25. E-pub ahead of print

    A framework for understanding the empowerment effects of telecentres on rural communities in developing countries

    Kapondera, S. K., Bernadi, R. & Panteli, N., 26 Apr 2019, (E-pub ahead of print) Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D: 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1–3, 2019, Proceedings, Part I. Nielsen, P. & Kimaro, H. C. (eds.). Springer, p. 104-115 12 p. (IFIP Advances in Information and Communication Technology; vol. 551).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    A Framework for the Cryptographic Enforcement of Information Flow Policies

    Alderman, J., Crampton, J. & Farley, N., 7 Jun 2017, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 143-154 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. A framework for predicting soft-fruit yields and phenology using embedded, networked microsensors, coupled weather models and machine-learning techniques

    Lee, M. A., Monteiro, A., Barclay, A., Marcar, J., Miteva-Neagu, M. & Parker, J., Jan 2020, In: Computers and Electronics in Agriculture. 168, 105103.

    Research output: Contribution to journalArticlepeer-review

  28. A framework for predicting personal exposures to environmental hazards

    Zidek, J. V., Shaddick, G., Meloche, J., Chatfield, C. & White, R., Dec 2007, In: Environmental and Ecological Statistics. 14, 4, p. 411-431 21 p.

    Research output: Contribution to journalArticlepeer-review

  29. A Framework for Improving the Sharing of Manufacturing Knowledge through Micro-Blogging

    Evans, R. D., Gao, J. X., Owodunni, O., Shah, S., Mahdikhah, S., Messaadia, M. & Baudry, D., 24 Sep 2014, Advances in Production Management Systems: Innovative and Knowledge-Based Production Management in a Global-Local World - IFIP WG 5.7 International Conference, APMS 2014, Proceedings. PART 1 ed. Springer New York LLC, p. 19-26 8 p. (IFIP Advances in Information and Communication Technology; vol. 438, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    A framework for exploring the policy implications of UK medical tourism and international patient flows

    Lunt, N. T., Mannion, R. & Exworthy, M., Feb 2013, In: Social Policy and Administration. 47, 1, p. 1-25

    Research output: Contribution to journalArticlepeer-review

  31. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H., 2009, Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    A framework for design and analysis of asymmetric fingerprinting protocols

    Martin, K. M. & Poh, G. S., 2007, Proceedings of Third International Symposium on Information Assurance and Security IAS 2007. IEEE Computer Society Press, p. 457-461 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  33. E-pub ahead of print

    A Framework for Cloud ERP System Implementation in Developing Countries: Learning from Lower Local Governments in Uganda

    Mpanga, D. & Elbanna, A., 19 May 2019, (E-pub ahead of print) IFIP WG 8.6 Conference 2019. p. 274-292 19 p. (AICT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    A framework for benchmarking small business consumers' need for and use of legal services

    Pleasence, P., Balmer, N., Blackburn, R. A. & Wainwright, T., 2012, 161 p. Cambridge : Legal Services Board.

    Research output: Other contribution

  35. Published

    A framework for audit in clinical psychology

    Berger, M., 1991, In: Clinical Psychology Forum.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    A four-element framework for research on the composite materials supply chain

    Mastrocinque, E., Coronado Mondragon, A. E. & Hogg, P., 16 Jun 2015, Engineering Technology, Engineering Education and Engineering Management: Proceedings of the International Conference on Engineering Technologies, Engineering Education and EngineeringManagement (ETEEEM 2014), Hong Kong, 15-16 November 2014. Tan, D. (ed.). CRC Press, p. 423-426 4 p. 94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Unpublished

    A Fountain for Memory: The Trevi Flow of Power and Transcultural Performance

    Krist, P., 2015, (Unpublished) 284 p.

    Research output: ThesisDoctoral Thesis

  38. Published

    A fossil lycopsid forest succession in the classic Joggins section of Nova Scotia: paleoecology of a disturbance-prone Pennsylvanian wetland.

    Calder, J. H., Gibling, M. R., Scott, A. C., Davies, S. J. & Herbert, B. L., 2006, Wetlands through Time. . Greb, S. J. & DiMichele, W. A. (eds.). Geological Society of America Special Publication , Vol. 399. p. 169-194 26 p. (Geological Society of America Special Paper.; vol. 399).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  39. Published

    A forward-modelling analysis of the controls on sequence stratigraphical geometries

    Burgess, P. & Allen, P., 1996, Sequence Stratigraphy in British Geology. Vol. 103.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  40. Published

    A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., Dec 2014, In: International Journal of RFID Security and Cryprography (IJRFIDSC). 3, 2, p. 156-169 14 p.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    A formal transformation and refinement method for re-engineering concurrent programs

    Younger, E., Bennett, K. & Luo, Z., 1997, Proc of IEEE Inter. Conf. on Software Maintenance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N. & Würtele, T., 30 Jul 2021, In: IACR Cryptology ePrint Archive.

    Research output: Contribution to journalArticle

  43. Forthcoming

    A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N. & Würtele, T., 3 Jul 2021, (Accepted/In press) 43rd IEEE Symposium on Security and Privacy (S&P 2022). Institute of Electrical Engineers

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    A formal model of agent-oriented virtual organisations and their formation

    McGinnis, J., Stathis, K. & Toni, F., 29 Dec 2011, In: Multiagent and Grid Systems. 7, 6, p. 291-310

    Research output: Contribution to journalArticlepeer-review

  45. Published

    A formal model for service-oriented interactions

    Fiadeiro, J., Lopes, A. & Abreu, J., 1 May 2012, In: Science of Computer Programming. 77, 5, p. 577-608 32 p.

    Research output: Contribution to journalArticlepeer-review

  46. E-pub ahead of print

    A Formal Model for Checking Cryptographic API Usage in JavaScript

    Mitchell, D. & Kinder, J., 15 Sep 2019, (E-pub ahead of print) ESORICS'19: Proceedings of the 24th European Symposium on Research in Computer Security. Springer, Vol. 11735. p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    A Formal Framework of Virtual Organisations as Agent Societies

    McGinnis, J., Stathis, K. & Toni, F., 25 Jan 2010, p. 1-14. 14 p.

    Research output: Contribution to conferencePaperpeer-review

  48. Published

    A formal approach to service component architecture

    Fiadeiro, J. L., Bocchi, L. & Lopes, A., 1 Jan 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4184 LNCS. p. 193-213 21 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  49. Published

    A formal approach to event-based architectures

    Fiadeiro, J. L. & Lopes, A., 1 Jan 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3922 LNCS. p. 18-32 15 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  50. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution