Home > Publications

Publications

37101 - 37200 out of 41,090Page size: 100
  1. Conference contribution › Research
  2. Published

    Information and available work in the perturbed baker's map

    Schack, R. & Caves, C. M., 1993, Workshop on Physics and Computation: PhysComp '92. Los Alamitos, California: IEEE Computer Society Press, p. 69-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Unpublished

    Information and consultation during takeovers in the UK: the IAG/BMI case

    Rees, C. & Gold, M., Mar 2015, (Unpublished) 'Infpreventa' Project Final Conference. Sofia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Informational and computation efficiency of set predictors

    Vovk, V., Sep 2012, Proceedings of the Fifth Workshop on Information-Theoretic Methods in Science and Engineering. de Rooij, S., Kotlowski, W., Rissanen, J., Millimaki, P., T. R. & Yamanishi, K. (eds.). Amsterdam: CWI, p. 48-51 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Informed Autonomous Exploration of Subterranean Environments

    Akbari, A. & Bernardini, S., 4 Aug 2021, IEEE Xplore IROS 2021 Proceedings. IEEE Xplore, Vol. 6. p. 7957-7964 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    InfoSec Cinema: Using Films for Information Security Teaching

    Blasco Alis, J. & Quaglia, E., 2018, ASE '18: 2018 USENIX Workshop on Advances in Security Education. USENIX, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Inhibiting Card Sharing Attacks

    Tunstall, M., Markantonakis, K. & Mayes, K., 2006, Advances in Information and Computer Security. Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y. & Kawamura, S. (eds.). Springer Berlin / Heidelberg, Vol. 4266. p. 239-251 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Innovating for corporate social responsibility: Integrating societal, industry, firm and individual level factors

    Preuss, L. & Dyerson, R., Apr 2011, Symposium on Corporate Responsibility and Innovation.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Insect fossil evidence on late Wisconsin environments of the Bering Land Bridge: new data on the nature and timing of inundation

    Elias, S., 1996, American Beginnings, The Prehistory and Palaeoecology of Beringia. West, F. H. (ed.). Chicago: University of Chicago Press, p. 110-119

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Insect Fossils

    Elias, S., 1995, Stratigraphy and Paleoenvironments of Late Quaternary Valley Fills on the Southern High Plains. Holliday, V. T. (ed.). Boulder, Colorado: Geological Society of America, Vol. Memoir 186. p. 50-53.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Insect fossils and Late Quaternary environments of the Chihuahuan Desert.

    Elias, S., 1999, Fourth Symposium on Resources of the Chihuahuan Desert. Barlow, J. C. & Miller, D. J. (eds.). Fort Davis, Texas: Chihuahuan Desert Research Institute, p. 1-10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Insights into the metabolism and ecophysiology of three acidithiobacilli by comparative genome analysis

    Valdes, J., Pedroso, I., Quatrini, R., Hallberg, K. B., Valenzuela, P. D. T. & Holmes, D. S., 2007, BIOHYDROMETALLURY: FROM THE SINGLE CELL TO THE ENVIRONMENT. Schippers, A., Sand, W., Glombitza, F. & Willscher, S. (eds.). STAFA-ZURICH: TRANS TECH PUBLICATIONS LTD, p. 439-442 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Installing fake root keys in a PC

    Alsaid, A. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, Vol. 3545. p. 227-239 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Installing micros in clinics: options and essentials

    Berger, M., 1989, Clinic Services: Monitoring, Evaluation and Microcomputers: Occasional Papers, No.1. Berger, M. (ed.). Association for Child Psychology and Psychiatry

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Institutional approaches and strategies of control and collaboration

    Kromidha, E., 2015, Proceedings of IFIP 9.4: 13th Conference on Social Implications of Computers in Developing Countries, 20-22 May 2015. Negombo, Sri Lanka

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Institutions for Behaviour Specification

    Fiadeiro, J. L. & Costa, J. F., 1995, COMPASS/ADT. Springer, Vol. 906. p. 273-289 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Institutions trust institutions: critiques of the BP/Tate partnership by artists

    Chong, D., 2011, 37th Annual Macromarketing Conference (Williamsburg, VA: College of William and Mary).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Instructors as Designated Leaders for Fostering Online Engagement: The Case of Online Learning Communities

    Wallace, A. & Panteli, N., 2016, Mediterranean Conference on Information Systems, MCIS2016: Track: E-learning. September 4-6, 2016, Paphos, Cyprus

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. E-pub ahead of print

    Integerwise Functional Bootstrapping on TFHE

    Okada, H., Kiyomoto, S. & Cid, C., 25 Nov 2020, (E-pub ahead of print) Information Security - 23rd International Conference, ISC 2020, Proceedings. Susilo, W., Deng, R. H., Guo, F., Li, Y. & Intan, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 107-125 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12472 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Integrated Simulation Tools for Collimation Cleaning in HL-LHC

    CERN Collimation Team, Gibson, S. & Nevay, L., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 160-162 3 p. MOPRO039

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Integrating Induction and Coinduction via Closure Operators and Proof Cycles

    Cohen, L. & Rowe, R. N. S., 24 Jun 2020, Automated Reasoning - 10th International Joint Conference, IJCAR 2020, Proceedings. Peltier, N. & Sofronie-Stokkermans, V. (eds.). Springer, p. 375-394 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12166 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Integrating OAuth with Information Card Systems

    Al-Sinani, H. S., 2011, Proceedings of IAS '11: 7th International Conference on Information Assurance and Security, Malacca, Malaysia, 5-8 December 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Integrating Social Circles and Network Representation Learning for Item Recommendation

    Yu, Y., Wang, Q., Zhang, L., Wang, C., Wu, S., Qi, B. & Wu, X., 30 Sep 2019, 2019 International Joint Conference on Neural Networks (IJCNN). International Joint Conference on Neural Networks (IJCNN): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Forthcoming

    Intelligent Exploration and Autonomous Navigation in Confined Spaces

    Akbari, A. & Bernardini, S., 1 Jul 2020, (Accepted/In press) International Conference on Intelligent Robots and Systems (IROS): 2020 IEEE/RSJ. IEEE Xplore, p. 2157-2164 8 p. 1209

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Intelligent Facial Expression Recognition Using Particle Swarm Optimization Based Feature Selection

    Robson, A. & Zhang, L., 31 Jan 2019, 2018 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE Symposium Series on Computational Intelligence (SSCI): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Interactions between insects and mycorrhizal fungi

    Gange, A. & Bower, E., 1997, MULTITROPHIC INTERACTIONS IN TERRESTRIAL SYSTEMS. OXFORD: BLACKWELL SCIENCE PUBL, p. 115-132 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    INTERACTIONS BETWEEN SOIL-DWELLING INSECTS AND MYCORRHIZAS DURING EARLY PLANT SUCCESSION

    Gange, A. & BROWN, V. K., 1992, MYCORRHIZAS IN ECOSYSTEMS. WALLINGFORD: C A B INTERNATIONAL, p. 177-182 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments

    Lunden, N., Sveen, R., Lund, H., Svendsen, N. & Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 171-183

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Interconnecting formalisms: Supporting modularity, reuse and incrementality

    Fiadeiro, J. L. & Maibaum, T., 1 Jan 1995, Proceedings of the Third ACM SIGSOFT Symposium on Foundations of Software Engineering. ACM Press, p. 72-80 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Interconnecting objects via contracts

    Fiadeiro, J. L. & Andrade, L. F., 1 Jan 2001, 38th International Conference on Technology of Object-Oriented Languages and Systems, Components for Mobile Computing. p. 182 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Interconnecting Objects Via Contracts

    Andrade, L. F. & Fiadeiro, J. L., 1999, UML. Springer, Vol. 1723. p. 566-583 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Inter-Continental Strategy Implementation

    Aboutalebi, R., Tan, H. & Lobo, R., 27 Nov 2013, In: EAMSA (Euro-Asia Management Studies Association), 30th Annual Conference of EAMSA: Innovation in Asia and Europe Approaches and Answers to new Challenges. Institute of East Asian Studies (IN-EAST); 27-30 November 2013, University of Duisburg-Essen, Duisburg, Germany.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Unpublished

    Intercultural Communication of Chinese Traditional Opera Programs under the View of Deconstructionism

    Li, X., 13 Aug 2018, (Unpublished) Second World Conference of Chinese Studies & 17th Intl. Conference on the Digitalization of Premodern Chinese Novel & Drama.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Inter-domain role mapping and least privilege

    Chen, L. & Crampton, J., 2007, Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 157-162 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Interfirm relational governance through media choice and communication practices in the coopetitive context

    Lee, J. Y. H., Saunders, C. & Panteli, N., 30 Oct 2018, International Conference on Information Systems 2018, ICIS 2018. Association for Information Systems, (International Conference on Information Systems 2018, ICIS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Interleaving Search and Heuristic Improvement

    Franco, S. & Torralba, Á., 5 Jul 2019, Proceedings of the Twelfth International Symposium on Combinatorial Search, SOCS 2019, Napa, California, 16-17 July 2019. Surynek, P. & Yeoh, W. (eds.). AAAI Press, p. 130-134 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    International Manufacturing Strategies: A Taxonomy

    Aboutalebi, R., 6 Sep 2016, In: BAM (British Academy of Management), 30th Annual Conference of BAM: Thriving in Turbulent Time. 06-08 September 2016, Newcastle University, England, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Internet background radiation arrival density and network telescope sampling strategies

    Pemberton, D., Komisarczuk, P. & Welch, I., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 246-252 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Internet Sensor Grid: Experiences with Passive and Active Instruments

    Komisarczuk, P. & Welch, I., 2010, Communications: Wireless in Developing Countries and Networks of the Future - Third IFIP TC 6 International Conference, WCITD 2010 and IFIP TC 6 International Conference, NF 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings. p. 132-145 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Internet Users' Security and Privacy While They Interact with Amazon

    Bella, G. & Coles-Kemp, L., 2011, Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, p. 878-883 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Interoperability of security and quality of Service Policies Over Tactical SOA

    Gkioulos, V., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J. & Wolthusen, S., 13 Feb 2017, Proceedings of the 2016 Symposium on Computational Intelligence (SSCI 2016) . p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Interorganisational information sharing and the use of category management

    Feldberg, F. & van der Heijden, H., 2003, Proceedings of the 16th Bled Electronic Commerce conference. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. E-pub ahead of print

    Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

    Crampton, J. & Sellwood, J., 2 Jul 2016, (E-pub ahead of print) Data and Applications Security and Privacy XXX. Springer-Verlag, Vol. 9766. p. 96-105 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Unpublished

    Inter-temporal variation in the illiquidity premium and its relationship with monetary conditions within the United Kingdom market

    Said, H. & Giouvris, E., 2015, (Unpublished) Banking, Financial markets, risk and financial vulnerability, 5th International Conference of the Financial Engineering and Banking Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Intriguing Dehydrated Phyllosilicates Found in an Unusual Clast in the LL3.15 Chondrite NWS6925

    Johnson, J. M., Zolensky, M. E., Chan, Q. & Kring, D. A., 21 Mar 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Intriguing Properties of Adversarial ML Attacks in the Problem Space

    Pierazzi, F., Pendlebury, F., Cortellazzi, J. & Cavallaro, L., 30 Jul 2020, IEEE Symposium on Security and Privacy (IEEE S&P). IEEE, p. 1332-1349 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Intrinsic circuit evolution using programmable analogue arrays

    Flockton, S. J. & Sheehan, K., 1998, EVOLVABLE SYSTEMS: FROM BIOLOGY TO HARDWARE. Sipper, M., Mange, D. & PerezUribe, A. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-153 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Introducing probabilities in contract-based approaches for mobile application security

    Dini, G., Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer-Verlag, Vol. 8247 LNCS. p. 284-299 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. E-pub ahead of print

    Intrusion Detection in Robotic Swarms

    Sargeant, I. & Tomlinson, A., 24 Aug 2019, (E-pub ahead of print) Proceedings of SAI Intelligent Systems Conference. Bi, Y., Bhatia, R. & Kapoor, S. (eds.). Springer, Vol. 2. p. 968-980 13 p. (Advances in Intelligent Systems and Computing; vol. 1038).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Intuiting Form: Memory and (Dis)continuity in Enescu's Piano Quintet, Op. 29

    Savage-Hanford, J., 2017, Proceedings of the "George Enescu" International Musicology Symposium 2017. Cosma, M. (ed.). Bucharest: Editura Muzicala

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Invariant statistics and coding of natural microimages

    Geman, D. & Koloydenko, A., 1999, IEEE Workshop on Statistical and Computational Theories of Vision.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Invariants of Finite Groups and Involutive Division

    Cid, C. & Plesken, W., 2001, Computer Algebra in Scientific Computing CASC 2001. Springer, p. 123-135 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    In-vehicle object detection in the wild for driverless vehicles

    Dinakaran, R., Zhang, L. & Jiang, R., 15 Aug 2020, World Scientific Proceedings Series on Computer Engineering and Information Science. In: Developments of Artificial Intelligence Technologies in Computation and Robotics. World Scientific Proceedings Series on Computer Engineering and Information Science, 12.: World Scientific, Singapore, p. 1139-1147 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Investigating Outward FDI by Indian MNEs in the UK

    Aboutalebi, R. & Tan, H., 29 Mar 2012, In: AIB (Academy of International Business), 39th Academy of International Business: New Global Developments and the Changing Geography of International Business. 29-31 March 2012, the University of Liverpool, Liverpool, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. E-pub ahead of print

    Investigating the Applicability of Distributed Ledger/Blockchain Technology in Manufacturing and Perishable Goods Supply Chains

    Coronado Mondragon, A., Coronado, C. & Coronado, E., 16 May 2019, (E-pub ahead of print) 2019 IEEE 6th International Conference on Industrial Engineering and Applications (ICIEA). Tokyo, Japan: IEEE Xplore, p. 728-732 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM

    Wetherall, J., Taylor, M. & Hurley-Smith, D., 2 Nov 2015, 2015 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, p. 81-84 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Investigation of CLIC 380 GeV Post-Collision Line

    Bodenstein, R., Abramov, A., Boogert, S., Burrows, P., Nevay, L., Schulte, D. & Tomás, R., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 528-531 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Investigation of the fatigue failure mechanisms for stitched and unstitched unidirectional composites

    Zhang, C., Jamshidi, M., Barnes, S., Cauchi-Savona, S., Rouse, J., Bradley, R., Withers, P. & Hogg, P., 1 Dec 2011, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Unpublished

    Investment styles and the potential of using illiquidity as an investment style in United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Banking, Finance and Institutions: Stability and Risk, 6th International Conference of the Financial Engineering and Banking Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    IP access service provision for broadband customers

    Komisarczuk, P., 1999, Services Over the Internet-What Does Quality Cost?(Ref. No. 1999/099), IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Iron homeostasis strategies in acidophilic iron oxidizers: Comparative genomic analyses

    Quatrini, R., Martinez, V., Osorio, H., Veloso, F. A., Pedroso, I., Valdes, J., Jedlicki, E. & Holmes, D. S., 2007, BIOHYDROMETALLURY: FROM THE SINGLE CELL TO THE ENVIRONMENT. Schippers, A., Sand, W., Glombitza, F. & Willscher, S. (eds.). STAFA-ZURICH: TRANS TECH PUBLICATIONS LTD, p. 531-534 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Is entity authentication necessary?

    Mitchell, C. J. & Pagliusi, P., 2004, Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19 2002, Revised Papers. Springer-Verlag, Vol. 2004. p. 20-33 14 p. (Lecture Notes in Computer Science; vol. 2845).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Unpublished

    Is Islam still the Solution? Clerical Elites and Muslim Extremism in Post Arab- Spring Middle East: Panel on Extremism in Post-Arab Spring MENA: Origins and Catalysts for the Rise of Extremist Movements

    Kalantari, M., 4 Mar 2015, (Unpublished) Royal Holloway University of London Politics and International Relations Department’s 10th Anniversary Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Unpublished

    Is social inclusion the same for all? Critical Internet use as a tool to attend individual needs in Brazil

    Poveda Villalba, S., 2013, (Unpublished) Is social inclusion the same for all? Critical Internet use as a tool to attend individual needs in Brazil. Human Development and Capability Association (HDCA)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Island Grammar-Based Parsing Using GLL and Tom

    Afroozeh, A., Bach, J-C., van den Brand, M., Johnstone, A., Manders, M., Moreau, P-E. & Scott, E., 2013, Software Language Engineering Lecture Notes in Computer Science : 5th International Conference, SLE 2012, Dresden, Germany, September 26-28, 2012, Revised Selected Papers. p. 224-243 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Issues of Security with the Oswald-Aigner Exponentiation Algorithm

    Walter, C. D., 2004, CT-RSA 2004. Okamoto, T. (ed.). Springer, Vol. 2964. p. 208-221 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    IT Enactment of New Public Management in Africa: The Case Study of Health Information Systems in Kenya

    Bernardi, R., 2009, Proceedings of the 9th European Conference on e-Government. Remenyi, D. (ed.). Reading: Academic Publishing Ltd, p. 129-136

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Italianisierte Formen in 'Les Troyens'

    Charlton, D., 2011, Berlioz' 'Troyens' und Halévys 'Juive' im Spiegel der Grand Opéra. Stuttgart: Franz Steiner Verlag, p. 83-96 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    IT-enabled change into the structures of Health Information Systems in Africa: a case study in Kenya

    Bernardi, R., 2009, ECIS09 Proceedings. Newell, S., Whitley, E., Pouloudi, N., Wareham, J. & Mathiassen, L. (eds.). Padova: CLEUP

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    ITS and Smart Grid Networks for Increasing Live Shellfish Value

    Coronado Mondragon, A. E. & Coronado, E. S., 16 Jun 2014, 10th ITS European Congress. Helsinki, 9 p. TP0115

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Jakstab: A Static Analysis Platform for Binaries

    Kinder, J. & Veith, H., 2008, Proc. 20th Int. Conf. Computer Aided Verification (CAV 2008). Springer, p. 423-427

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Jean de La Taille et la scénographie du "creux": Saül le furieux (1572)

    Chesters, T., 2005, Dramaturgies de l'ombre: spectres et fantômes au théâtre. Lavocat, F. & Lecercle, F. (eds.). Presses Universitaires de Rennes, p. 101-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Johann Friedrich Fasch’s Mich vom Stricke meiner Sünden – a work for Zerbst?

    Springthorpe, N., 2007, Johann Friedrich Fasch als Instrumentalkomponist: Bericht über die Internationale Wissenshaftliche Konferenz am 8. und 9. April 2005 im Rahmen der 9. International Fasch-Festtage in Zerbst.: Schriften zur mitteldeutschen Musikgeschichte der Ständigen Konferenz Mitteldeutsche Barockmusik in Sachsen, Sachsen-Anhalt und Thüringen e.V. Band 14. Musketa, K. (ed.). Beeskow: Ortus Musikverlag, Vol. 14. p. 207-224 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Joining the dots: exploring technical and social issues in e-Science approaches to linking landscape and artifactual data in British archaeology

    Gosden, C., Kamash, Z., Kirkham, R. & Pybus, J., 2009, E-science workshops 2009: 5th IEEE International Conference. p. 171-174

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Joyce In The Shadow Of War And Fascism: A Review Of Finnegans Wake By Mario Praz (1939)

    Fordham, F., 2017, Joyce Studies in Italy. Ruggieri, F. (ed.). Rome, Vol. 19. p. 301-322 22 p. (Joyce Studies in italy; vol. 19).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    k-Distinct In- and Out-Branchings in Digraphs

    Gutin, G., Reidl, F. & Wahlstrom, M., 2017, 44th International Colloquium on Automata, Languages, and Programming: ICALP 2017. Dagstuhl, p. 1-13 13 p. (Leibniz International Proceedings in Informatics ; vol. 80).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Kernelization of Constraint Satisfaction Problems: A Study through Universal Algebra

    Lagerkvist, V. & Wahlstrom, M., 2017, Principles and Practice of Constraint Programming: 23rd International Conference, CP 2017, Melbourne, VIC, Australia, August 28 – September 1, 2017, Proceedings. Springer, p. 157-171 15 p. (Lecture Notes in Computer Science; vol. 10416).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Key distribution without individual trusted authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, Proceedings: The 8th IEEE Computer Security Foundations Workshop, Kenmare, Co. Kerry, Ireland, June 1995. IEEE Computer Society Press, p. 30-36 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Key escrow in multiple domains

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of INFOSEC'COM '97, Paris, June 1997. p. 101-116 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Key escrow in mutually mistrusting domains

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1997, Security Protocols - Proceedings, International Workshop, Cambridge, April 1996. Lomas, M. (ed.). Springer-Verlag, p. 139-153 15 p. (Lecture Notes in Computer Science; no. 1189).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Key Management for Secure Demand Data Communication in Constrained Micro-Grids

    Kayem, A. V. D. M., Strauss, H., Wolthusen, S. & Meinel, C., 2016, Advanced Information Networking and Applications Workshops (WAINA), 2016 30th International Conference on. IEEE Press, p. 585-590 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Key minimal authentication systems for unconditional secrecy

    Godlewski, P. & Mitchell, C. J., 1990, Advances in Cryptology - Eurocrypt '89. Quisquater, J-J. & Vandewalle, J. (eds.). Springer-Verlag, p. 497-501 5 p. (Lecture Notes in Computer Science; no. 434).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Key recovery and forgery attacks on the MacDES MAC algorithm

    Coppersmith, D., Knudsen, L. R. & Mitchell, C. J., 2000, Advances in Cryptology - Proceedings of Crypto 2000. Bellare, M. (ed.). Springer-Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science; no. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Key recovery attacks on MACs based on properties of cryptographic APIs

    Brincat, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 63-72 10 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Key recovery for archived data using smart cards

    Rantos, K. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 75-85 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Key recovery in ASPeCT authentication and initialisation of payment protocol

    Rantos, K. & Mitchell, C. J., 1999, Proceedings of the 4th ACTS Mobile Communications Summit, Sorrento, Italy, June 1999. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Key recovery scheme interoperability - a protocol for mechanism negotiation

    Rantos, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. E-pub ahead of print

    Key Rotation for Authenticated Encryption

    Everspaugh, A., Paterson, K., Ristenpart, T. & Scott, S., 2 Aug 2017, (E-pub ahead of print) Advances in Cryptology – CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part III. Springer, p. 98-129 32 p. (Lecture Notes in Computer Science ; vol. 10403 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Knowledge Intensive R&D? Employment Practices of Foreign invested R&D Centres in China

    Zheng, Y., Mar 2013, International Labour Process Conference, Rutgers University, NJ, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Knowledge management in small firms

    Panyasorn, J., Panteli, N. & Powell, P., 2009, Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises : IFIP WG 8.2 International Conference, CreativeSME 2009, Proceedings. Dhillon, G., Stahl, B. C. & Baskerville, R. (eds.). Springer, p. 192-210 19 p. (IFIP Advances in Information and Communication Technology; vol. 301).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Knowledge management orientation, product innovation and shared vision: an integration and empirical examination of performance effects

    Wang, C. L., Ahmed, P. K. & Rafiq, M., 2007, British Academy of Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Knowledge management orientation, shared vision, and product innovation: An integration and empirical examination of performance effects

    Wang, C. L., Ahmed, P. K. & Rafiq, M., 2008, Academy of Management Annual Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Knowledge Management System’s Characteristics that facilitate Knowledge Sharing to Support Decision Making Processes in Multinational Corporations

    Abdelrahman, M. & Papamichail, K., 2011, 17th Americas Conference on Information Systems AMCIS. Detroit, Michigan, USA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Knowledge Sharing to Support Decision Making Processes in Multinational Corporations

    Abdelrahman, M. & Papamichail, K., 2013, 26th European Conference on Operational Research. Rome, Italy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Knowledge, learning and transformation in transnational sites: relationship asymmetry, politics and institution building

    Clark, E., 2005, The end of transformation?. Lang, R. (ed.). Munich: Rainer Hampp Verlag, p. 281-304 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Kolmogorov's complexity conception of probability

    Vovk, V., 2001, Probability Theory: Philosophy, Recent History and Relations to Science. Dordrecht: Kluwer, p. 51-69 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    La comédie lyrique au temps de Diderot

    Charlton, D., 2016, Music et pantomime dans 'Le Neveu de Rameau'. Salaün, F. & Taïeb, P. (eds.). Paris: Hermann Editeurs, p. 50-77 28 p. (Fictions pensantes).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    La penna e il pennello. Retoriche a confronto

    Jossa, S., Hendrix, H. (ed.) & Procaccioli, P. (ed.), 2008, Officine del nuovo. Sodalizi fra letterati, artisti ed editori nella cultura italiana fra Riforma e Controriforma. Atti del Simposio internazionale, Utrecht, 8-10 novembre 2007. Roma: Vecchiarelli

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Forthcoming

    La relación entre la música, coreografía y elementos plásticos de El sombrero de tres picos (1919)

    Camacho Acevedo, L., 2 Oct 2020, (Accepted/In press) Repensar El sombrero de tres picos cien años después.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    La Rencontre de l'ancien et du nouveau dans 'La Fille mal gardée' de Duni et Favart.

    Charlton, D., 2015, Rire et sourire dans l'opéra-comique en France aux XVIIIe et XIXe siècles.. Loriot, C., Cailliez, M. & Bonche, V. (eds.). Lyon: Symétrie, p. 33-51 19 p. (Symétrie Recherche).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    La Vérité se rencontre-t-elle au train de la contingence?

    O'Brien, J., 2011, Les Chapitres oublis des 'Essais' de Montaigne. Paris: Champion, p. 93-106 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution