Home > Publications

Publications

36601 - 36700 out of 41,420Page size: 100
  1. Conference contribution › Research
  2. Published

    Brand Meanings in Kinetic Circulation: Consumer Reception of Brand Paratexts

    Hackley, C., Jun 2019, Consumer Culture Theory Conference 2019: Concordia University, Montreal, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Brand Switching: Background to Contestable Customer–Brand Relationships

    Appiah, D. & Ozuem, W., 2019, Global Business and Technology Association (GBATA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Brand Switching in the Smartphone Industry: A Preliminary Study

    Appiah, D., Ozuem, W. & Howell, K. E., 2017, Global Business and Technology Association. GBATA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Breaking An Identity-Based Encryption Scheme based on DHIES

    Albrecht, M. & Paterson, K., 2011, IMA International Conference on Cryptography and Coding. Chen, L. (ed.). Springer, Vol. 7089. p. 344-355 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Breaking the Liardet-Smart Randomized Exponentiation Algorithm

    Walter, C. D., 2002, CARDIS '02. USENIX, p. 59-68 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Brief Announcement: Gossiping with Latencies

    Gilbert, S., Robinson, P. & Sourav, S., 25 Jul 2017, PODC '17 : Proceedings of the ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery (ACM), p. 255-257 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Brief announcement: gracefully degrading consensus and k-set agreement under dynamic link failures

    Schwarz, M., Winkler, K., Schmid, U., Biely, M. & Robinson, P., 2014, Proceedings of the 2014 ACM symposium on Principles of distributed computing. p. 341-343 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Brief Announcement: Regional Consecutive Leader Election in Mobile Ad-Hoc Networks

    Chung, H. C., Robinson, P. & Welch, J. L., 2010, Algorithms for Sensor Systems - 6th International Workshop on Algorithms for Sensor Systems, Wireless Ad Hoc Networks, and Autonomous Mobile Entities, ALGOSENSORS 2010, Bordeaux, France, July 5, 2010, Revised Selected Papers. p. 89-91 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Brief Announcement: Space Bounds for Reliable Multi-Writer Data Store: Inherent Cost of Read/Write Primitives

    Chockler, G., Dobre, D., Shraer, A. & Spiegelman, A., Oct 2015, Distributed Computing: 29th International Symposium, DISC 2015, Tokyo, Japan, October 7-9, 2015, Proceedings. Moses, Y. (ed.). 1 ed. Springer-Verlag Berlin Heidelberg, Vol. 9363. p. 673-674 2 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Brief Announcement: Weak Synchrony Models and Failure Detectors for Message Passing (k-)Set Agreement

    Biely, M., Robinson, P. & Schmid, U., 2009, Distributed Computing, 23rd International Symposium, DISC 2009, Elche, Spain, September 23-25, 2009. Proceedings. Springer Berlin / Heidelberg, p. 360-361 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. E-pub ahead of print

    Bright ICT and Unbounded Employment: Typology of Crowdworkers and Their Lived and Envisaged Career Trajectory in Nigeria

    Idowu, A. & Elbanna, A., 19 May 2019, (E-pub ahead of print) IFIP WG 8.6 Conference 2019. p. 470-486 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Bright Stuff on Ceres = Sulfates and Carbonates on CI Chondrites

    Zolensky, M., Chan, Q. HS., Gounelle, M. & Fries, M., 21 Mar 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Bringing back joy to ‘leftover women’: The Impact of SK-II Marriage Market Takeover Campaign on the perception of women in China and PR practice

    Chmiel, M. & Yung-Chun, C., Jul 2020, 27th BledCom international conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Broken hearted: How to attack ECG biometrics

    Eberz, S., Paoletti, N., Roeschlin, M., Patanè, A., Kwiatkowska, M. & Martinovic, I., 27 Feb 2017, Network and Distributed System Security Symposium. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Buddhist Monks' Performance and a Play in the Context of the Buddhist Ritual Event of Giving

    Utairat, M., 2014, Theatre and Stratification, IFTR World Congress, Warwick, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Buffered Communication Analysis in Distributed Multiparty Sessions

    Denielou, P-M. & Yoshida, N., 2010, CONCUR 2010 - CONCURRENCY THEORY. Gastin, P. & Laroussinie, F. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 343-357 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Building Attacker Personas in Practice - a Digital Banking Example

    Moeckel, C., 4 Jul 2018, Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018). British Computer Society (BCS), p. 1-5 5 p. (Electronic Workshops in Computing (eWiC)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Building Brand Loyalty: Identity Theory Perspective

    Appiah, D., 2014, Institute of Economic Research. Prishtine, Albania..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Building general-purpose security services on EMV payment cards

    Chen, C., Tang, S. & Mitchell, C. J., 2013, Security and Privacy in Communication Networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Springer-Verlag, p. 29-44 16 p. (LNICST; vol. 106).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Building next generation Service-Oriented Architectures using Argumentation Agents

    Curcin, V., Ghanem, M., Guo, Y., Stathis, K. & Toni, F., 1 Sep 2006, 3rd International Conference on Grid Services Engineering and Management (GSEM 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Building Power Consumption Models from Executable Timed I/O Automata Specifications

    Barbot, B., Kwiatkowska, M., Mereacre, A. & Paoletti, N., 11 Apr 2016, Hybrid Systems : Computation and Control. p. 195-204 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem

    Akram, R. N., Markantonakis, K. & Mayes, K., Nov 2012, The 8th International Conference on Computational Intelligence and Security (CIS 2012). Xie, S. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Building Trustworthy Intrusion Detection through VM Introspection

    Baiardi, F. & Sgandurra, D., 1 Aug 2007, Third International Symposium on Information Assurance and Security. p. 209-214 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Business ethics doesn’t reside in tax havens, does it?

    Preuss, L., Apr 2009, annual conference of the UK Association of the European Business Ethics Network (EBEN-UK).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Business Intelligence at Telenor Pakistan

    Shaikh, S. E., Hassan, Z., Farooq, B. & Shahid, A. R., 2012, 33rd International Conference on Information Systems (ICIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Business Success as Network of Networks

    Aboutalebi, R., 22 Oct 2009, In: EAMSA (Euro-Asia Management Studies Association), 26th Annual Conference: Globalization of Technology, Innovation & Knowledge: The Euro-Asia Connection. 22-24 October 2009, Lausanne, Switzerland.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Forthcoming

    Buy low, sell high

    Koolen, W. & Vovk, V., 2012, (Accepted/In press) Proceedings of the Twenty Third International Conference on Algorithmic Learning Theory. Bshouty, N., Stoltz, G., Vayatis, N. & Zeugmann, T. (eds.). Berlin: Springer, Vol. 7568. p. 335 - 349 15 p. (Lecture Notes in Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Bylands: reverse engineering safety-critical systems

    Bull, T., Younger, E., Bennett, K. & Luo, Z., 1995, Proc. of Inter. Conf. on Software Maintenance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Byzantine disk Paxos: Optimal resilience with byzantine shared memory

    Abraham, I., Chockler, G. V., Keidar, I. & Malkhi, D., 2004, Proceedings of the 23rd Annual ACM SIGACT-SIGOPS Symposium on. Principles of Distributed Computing (PODC 2004). ACM, p. 226-235 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    C 2 net: A Cross-Layer Quality of Service (QoS) Architecture for Cognitive Wireless Ad Hoc Networks

    Yau, A. K-L., Komisarczuk, P. & Teal, P. D., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 306-311 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    C chondrite clasts in H chondrite regolith breccias: something different

    Zolensky, M. E., Fries, M., Utas, J., Chan, QH-S., Kebukawa, Y., Steele, A., Bodnar, R. J., Ito, M., Nakashima, D., Nakamura, T., Greenwood, R., Rahman, Z., Le, L. & Ross, D. K., 2016, 79th Annual Meeting of the Meteoritical Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Caching and Auditing in the RPPM Model

    Crampton, J. & Sellwood, J., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 49-64 16 p. (Lecture Notes in Computer Science; vol. 8743).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    CALF: Categorical automata learning framework

    Van Heerdt, G., Sammartino, M. & Silva, A., Aug 2017, Computer Science Logic 2017, CSL 2017. Goranko, V. & Dam, M. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-24 24 p. 29. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 82).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Can Being Similar in Product Category a Liability for Cross-gender Brand Extension?

    Yuen, T. W., Nieroda, M., He, H. & Park, Y., 28 May 2019, Proceedings of the European Marketing Academy.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Unpublished

    Can Digital Inclusion promote freedom? Development as freedom, Freedom as Critical Awakening

    Poveda Villalba, S., 2012, (Unpublished) Can Digital Inclusion promote freedom? Development as freedom, Freedom as Critical Awakening. Department of Geography, Royal Holloway, University of London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Can shadows and reflections help in the detection of photo forgeries?

    Nightingale, S., Wade, K., Faird, H. & Watson, D., 6 Jan 2017, Society for Applied Research in Memory and Cognition.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Can Upward Brand Extensions be an Opportunity for Marketing Managers During the Covid-19 Pandemic and Beyond?

    Yuen, T. W. & Mount, P., Jun 2021, ISMS Marketing Science Conference 2021.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Can We Operate in a Shared Economy: Insights from Global Logistics Sector

    Shah, S. & Wong, S., Aug 2021, IEEE International Conference on Management in Emerging Markets. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Can you call the software in your device firmware?

    Hassan, M., Markantonakis, K. & Akram, R., 9 Jan 2017, e-Business Engineering (ICEBE), 2016 IEEE 13th International Conference on. Macau, China: IEEE Computer Society Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. E-pub ahead of print

    Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 22 Mar 2017, (E-pub ahead of print) 7th ACM Conference on Data and Application Security and Privacy. ACM Press, p. 47-58 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Capability Building of Developing Country MNEs: the Chinese Experience

    Rui, H., 2015, Proceedings of the 57th Annual Meeting of the Academy of International Business: "Global Networks: Organizations and People". Mudambi, R. & Kiyak, T. (eds.). 2015 Academy of International Business, p. 103 1 p. ID#1653

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Capturing sensemaking patterns during data analysis: A conceptual framework

    Lycett, M. & Marshan, A., 24 Aug 2016, 25th International Conference on Information Systems Development, ISD 2016. Association for Information Systems, p. 106-116 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Carbon Nanotube Bolometer: Transport Properties and Noise Characteristics

    Rod, I., Wirtz, C., Kazakova, O., Panchal, V., Cox, D., Zaehres, H., Posth, O., Lindner, J., Meckenstock, R. & Farle, M., 2012, MAGNETISM AND MAGNETIC MATERIALS V. Perov, N. & Rodionova (eds.). STAFA-ZURICH: TRANS TECH PUBLICATIONS LTD, p. 510-513 4 p. (Solid State Phenomena; vol. 190).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Carbonate budgets for carbonate mounds, Florida, USA

    Bosence, D., 1988, Proceedings of the 6th International Coral Reef Symposium. Choat, J. H., Barnes, D., Borowitzka, M. A., Coll, J. C., Davies, P. J., Flood, P., Hatcher, B. G., Hopley, D., Hutchings, P. A., Kinsey, D., Orme, G. R., Pichon, M., Sale, P. F., Sammarco, P., Wallace, C. C., Wilkinson, C., Wolanski, E. & Bellwood, O. (eds.). Vol. 2. p. 529-534 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Card-present Transactions On The Internet Using The Smart Card Web Server

    Kyrillidis, L., Chazalet, B., Mayes, K. & Markantonakis, K., 2013, Proceedings of TrustCom 2013. IEEE Computer Society, p. 611-619 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    CardSpace-Liberty Integration for CardSpace Users

    Al-Sinani, H., Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of the 9th Symposium on Identity and Trust on the Internet 2010 (IDtrust 2010), Gaithersburg, MD, USA, 13-15 April 2010. ACM Press, p. 12-25 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 14 Nov 2019, Central European Cybersecurity Conference 2019. ACM, p. 1-4 4 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Case Study Analysis on Readiness of 3PL Industry in Fruit Distribution Company

    Shah, S. & Huey Yin, L., 17 Mar 2021, Proceedings of 2nd IEEE International Conference on Computational Intelligence and Knowledge Economy, ICCIKE 2021. Naranje, V., Singh, B. & Velan, S. (eds.). IEEE, p. 175-180 6 p. 9410788. (Proceedings of 2nd IEEE International Conference on Computational Intelligence and Knowledge Economy, ICCIKE 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Casting the Outcast: Perspectives on Acting Style

    Conroy, C., 2003, Conference Proceedings: Finding The Spotlight.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol

    Baiocco, A. & Wolthusen, S., 24 Dec 2018, Proceedings of the 2018 IEEE PES General Meeting. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Cavity Beam Position Monitor System for ATF2

    Boogert, S., Ainsworth, R., Boorman, G., Swinson, C., Molloy, S., Aryshev, A., Honda, Y., Tauchi, T., Terunuma, N., Urakawa, J., Frisch, J., May, J., McCormick, D., Nelson, J., Smith, T., Smith, G., Woodley, M., Heo, A., Kim, E-S., Kim, H-S. & 5 others, Kim, Y., Lyapin, A., Park, H., Ross, M. & Shin, S., 2010, Proceedings of IPAC'10, Kyoto, Japan.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Cérémonie et néoclassicisme à Fontainebleau

    Charlton, D., 2014, D'un 'Orphée', l'autre: 1762-1859...Métamorphoses d'un mythe . Ramaut, A. & Saby, P. (eds.). Saint-Étienne : Publications de l'Université de Saint-Étienne, p. 57-68 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Ceres Revealed in a Grain of Salt

    Zolensky, ME., Bodnar, RJ., Fries, M., Chan, QH-S., Kebukawa, Y., Mikouchi, T., Hagiya, K., Komatsu, M., Ohsumi, K. & Steele, A., Jun 2016, 26th Goldschmidt Conference, June 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Certificate translation

    Borselius, N. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 289-300 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Challenges and Opportunities in Last Mile Delivery: A Malaysian Case Study

    Shah, S. & Chan, M., 15 Nov 2021, 2021 26th International Conference on Automation and Computing (ICAC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Challenges in developing Capture-HPC exclusion lists

    Puttaroo, M., Komisarczuk, P. & Amorim, R. C. D., 2014, Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014. p. 334 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Challenges of security and trust in Avionics Wireless Networks

    Akram, R., Markantonakis, K., Kariyawasam, S., Ayub, S., Seem, A. & Atkinson, R., 13 Sep 2015, 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). IEEE Computer Society, p. 4B1-1-4B1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Challenges of security and trust of mobile devices as digital avionics component

    Akram, R. & Markantonakis, K., 9 Jun 2016, Integrated Communications Navigation and Surveillance (ICNS), 2016. IEEE Computer Society, p. 1C4-1-1C4-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Unpublished

    'Changing Measurement Boundaries in Banks'

    Anagnostopoulos, I., 2009, (Unpublished) BAA: South East Accounting Group, Kingston University, 10 September 2009 .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Changing patterns of employment in privatised Czech enterprises: management action in a transitional context

    Soulsby, A. & Clark, E., 2002, Personalmanagement im transformationsprozess. Lang, R. (ed.). Munich: Rainer Hampp Verlag, p. 201-223 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Changing societies, changing images: Masculinities and gender relations in Greek cinema, 1950-67

    Hadjikyriacou, A., 2012, Update! Perspektiven der Zeitgeschichte. Erker-Alexander, L., Dreidemy, S-L. & Sabo, K. (eds.). Vienna: Studienverlag, p. 241-248 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Characterisation of Electro-Optic Pickups for High Bandwidth Diagnostics at the High Luminosity LHC

    Arteche, A., Bashforth, S., Bosco, A., Gibson, S., Penman, I., Krupa, M. & Lefevre, T., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPGW088

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Characterising renaming within OCaml's module system: theory and implementation

    Rowe, R., Férée, H., Thompson, S. & Owens, S., 8 Jun 2019, PLDI 2019: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. Association for Computing Machinery (ACM), p. 950-965 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Characterising the Signal Processing System for Beam Position Monitors at the Front End Test Stand

    Boorman, G., Gibson, S., Gale, J., Rajaeifar, N., Jolly, S., Lawrie, S. & Letchford, A., Jan 2016, 4th International Beam Instrumentation Conference : IBIC2015, Melbourne, Australia. Geneva: JACoW Publishing, p. 526-529 4 p. TUPB073

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Characteristic formulae for session types

    Lange, J. & Yoshida, N., 9 Apr 2016, Tools and Algorithms for the Construction and Analysis of Systems - 22nd International Conference, TACAS 2016 and Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Proceedings. Raskin, J-F. & Chechik, M. (eds.). Springer Verlag, p. 833-850 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9636).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Characteristics of Smith-Purcell radiation in millimeter wavelength region

    Naumenko, G., Potylitsyn, A., Karataev, P., Bleko, V., Sukhikh, L., Shevelev, M. & Popov, Y., 1 Jul 2016, Journal of Physics: Conference Series. Karataev, P., Potylitsyn, A., Tyukhtin, A. & Strikhanov, M. (eds.). UK: IOP PUBLISHING LTD, Vol. 732. p. 1-9 9 p. 012018. (Radiation from Relativistic Electrons in Periodic Structures; vol. 732).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Characterization of Organic Materials in the Xenolithic Clasts in Sharps (H3.4) Meteorite Using Microraman Spectroscopy

    Chan, QHS., Zolensky, ME., Bodnar, RJ. & Kebukawa, Y., Jun 2015, Astrobiology Science Conference 2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Chatbots at Work: An Employees’ Perspective

    Gkinko, L. & Elbanna, A., 2020, IFIP Joint Working Conference 2020.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Checking cryptographic API usage with composable annotations

    Mitchell, D., van Binsbergen, L. T., Loring, B. & Kinder, J., 25 Dec 2017, ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM 2018). p. 53-59 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. E-pub ahead of print

    Checking Data-Race Freedom of GPU Kernels, Compositionally

    Cogumbreiro, T., Lange, J., Liew Zhen Rong, D. & Zicarelli, H., 15 Jul 2021, (E-pub ahead of print) International Conference on Computer-Aided Verification. Springer-Verlag, Vol. 12759.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    CheR: Cheating resilience in the cloud via smart resource allocation

    Roberto, D. P., Lombardi, F., Martinelli, F. & Sgandurra, D., 2014, Foundations and Practice of Security - 6th International Symposium, FPS 2013, Revised Selected Papers. Springer-Verlag, Vol. 8352 LNCS. p. 339-352 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8352 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Child, adolescent and family psychiatry and psychology services: psychology departments: some issues in setting up information systems.

    Berger, M., 1989, Clinic Services: Monitoring, Evaluation and Microcomputers: Occasional Papers, No.1. Berger, M. (ed.). Association for Child Psychology and Psychiatry

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Unpublished

    Children, childhood and youth: online and offline

    Kleine, D., Hollow, D. & Poveda Villalba, S., 2014, (Unpublished) Children, childhood and youth: online and offline. Royal Geographical Society (with IBG)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    CIM Justification

    Pilkington, A., 1989, IFS.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Ciphers for MPC and FHE

    Albrecht, M., Rechberger, C., Schneider, T., Tiessen, T. & Zohner, M., 14 Apr 2015, Advances in Cryptology -- EUROCRYPT 2015. Oswald, E. & Fischlin, M. (eds.). Springer, p. 430-454 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 26 Jan 2017, Proceedings of the 14th International Conference of Smart City (SmartCity 2016). IEEE Press, p. 1380-1387 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Unpublished

    Citizen and Subject in an Age of Migration & Digital Media: The Case of Zimbabwe

    Zigomo, K., 30 Jun 2017, (Unpublished) Urban Africa- Urban Africans: New Encounters of the Urban and the Rural.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Civic Empowerment through Digitalisation: The Case of Greenlandic Women

    Wendt, N., Jensen, R. B. & Coles-Kemp, L., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-13 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Unpublished

    Civil society organisations shaping corporate social responsibility: a comparison of NGO and trade union involvement

    Preuss, L., Rees, C. & Gold, M., Jul 2014, (Unpublished) 30th European Group for Organizational Studies (EGOS) Colloquium. Rotterdam

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Unpublished

    Civil society organisations shaping CSR: what role for organised labour?

    Preuss, L., Rees, C. & Gold, M., Aug 2015, (Unpublished) Academy of Management (AoM) Annual Meeting. Vancouver

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Unpublished

    Civil society organizations shaping CSR: what role for trade unions?

    Preuss, L., Rees, C. & Gold, M., Jun 2015, (Unpublished) 65th British Universities Industrial Relations Association (BUIRA) Annual Conference. Leicester

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Class War on Wonga: morality of inequality

    Chong, D., 2014, 6th Critical Finance Studies Conference (Amsterdam: University of Amsterdam).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Classification of acute leukaemia from gene expression data using confidence machines

    Bellotti, T., Luo, Z. & Gammerman, A., May 2006, IEEE International Conference on Granular Computing . p. 148-153

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. E-pub ahead of print

    Classification of Malware Families Based on Runtime Behaviour

    Geden, M. & Happa, J., 23 Sep 2018, (E-pub ahead of print) International Symposium on Cyberspace Safety and Security. p. 33-48 16 p. (Lecture Notes in Computer Science; vol. 11161).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Classifying android malware through subgraph mining

    Martinelli, F., Saracino, A. & Sgandurra, D., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer-Verlag, Vol. 8247 LNCS. p. 268-283 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Client-based CardSpace-OpenID Interoperation

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of ISCIS, 26th International Symposium on Computer and Information Sciences, London, UK, 26-28 September 2011. Gelenbe, E., Lent, R. & Sakellari, G. (eds.). London: Springer-Verlag, p. 387-393 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Clinical translation of Raman-based multimodal spectral histopathology for margin assessment during surgery of basal cell carcinoma

    Boitor, R., Kong, K., Varma, S., Koloydenko, A., Williams, H. & Notingher, I., 22 Jul 2019, Proceedings SPIE, Medical Laser Applications and Laser-Tissue Interactions IX, 110790G . SPIE - INT SOC OPTICAL ENGINEERING, Vol. 11079. p. 1-4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Clique Cover and Graph Separation: New Incompressibility Results

    Cygan, M., Kratsch, S., Pilipczuk, M., Pilipczuk, M. & Wahlström, M., 2012, ICALP (1). p. 254-265 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Cloud Security is Not (Just) Virtualization Security: A Short Paper

    Christodorescu, M., Sailer, R., Schales, D. L., Sgandurra, D. & Zamboni, D., 2009, Proceedings of the 2009 ACM Workshop on Cloud Computing Security. New York, NY, USA: ACM, p. 97-102 6 p. (CCSW '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Cloud Storage File Recoverability

    Gorke, C., Janson, C., Armknecht, F. & Cid, C., 2 Apr 2017, SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing. New York, NY, USA: ACM, p. 19-26 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    CloudSafetyNet: Detecting Data Leakage between Cloud Tenants

    Priebe, C., Muthukumaran, D., O'Keeffe, D., Eyers, D. M., Shand, B., Kapitza, R. & Pietzuch, P. R., 2014, Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14, Scottsdale, Arizona, USA, November 7, 2014. p. 117-128 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Coding schemes for two-dimensional position sensing

    Burns, J. & Mitchell, C. J., 1993, Cryptography and Coding III: Proceedings of the third IMA Cryptography and Coding Conference, Cirencester, December 1991. Ganley, M. J. (ed.). Oxford University Press, p. 31-66 36 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Coercions in Hindley-Milner systems

    Kießling, R. & Luo, Z., 2004, Types for Proofs and Programs, Proc. of Inter. Conf. of TYPES'03. LNCS'3085.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Coercive subtyping and lexical semantics (extended abstract)

    Luo, Z. & Callaghan, P., 1998, Logical Aspects of Computational Linguistics (LACL'98).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Coercive Subtyping in Lambda-Free Logical Frameworks

    Adams, R., 2009, Proceedings of the Fourth international Workshop on Logical Frameworks and Meta-Languages. Cheney, J. & Felty, A. (eds.). New York: ACM, p. 30-39 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Coercive subtyping in type theory

    Luo, Z., 1997, CSL'96, LNCS'1258.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Cognitive assessment in MS

    Langdon, D., Dec 2015, Neurodegenerative disease management. 6S ed. Vol. 5. p. 43-45 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Cognitive Radio-based Wireless Sensor Networks: Conceptual design and open issues

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings. p. 955-962 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Cognitive strategic groups: Real or artefact?

    Robson, J. & van der Heijden, H., 2012, British Academy of Management (BAM) conference. Cardiff

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Coherence and transitivity in coercive subtyping

    Luo, Y. & Luo, Z., 2001, Proc. of the 8th Inter. Conf. on Logic for Programming, Artificial Intelligence and Reasoning (LPAR'01), LNAI 2250.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution