Home > Publications

Publications

37301 - 37400 out of 41,090Page size: 100
  1. Conference contribution › Research
  2. Published

    Manifest fields and module mechanisms in intensional type theory

    Luo, Z., 2009, Types for Proofs and Programs, Proc. of Inter. Conf. of TYPES'08. LNCS 5497. p. 237-255 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. E-pub ahead of print

    Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange

    Dowling, B., Hansen, T. B. & Paterson, K. G., 10 Apr 2020, (E-pub ahead of print) Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Proceedings. Ding, J. & Tillich, J-P. (eds.). Springer, p. 483-502 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12100 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Many visits TSP revisited

    Kowalik, L., Li, S., Nadara, W., Smulewicz, M. & Wahlström, M., 26 Aug 2020, ESA 2020. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 173. p. 1-22 22 p. 66

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Many-Valued Institutions for Constraint Specification

    Chirita, C-E., Luiz Fiadeiro, J. & Orejas, F., 2016, Fundamental Approaches to Software Engineering. Stevens, P. & Wasowski, A. (eds.). Berlin: Springer, Vol. 9633. p. 359-376 18 p. (Lecture Notes in Computer Science; vol. 9633).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Market orientation as a mediating factor of the knowledge management and performance relationship

    Wang, C. L. & Ahmed, P. K., 2004, British Academy of Management Annual Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Marketing thought and counterinsurgency: tracing the history of an overlooked relationship

    Chong, D., 2016, 41st Annual Macromarketing Conference (Dublin: Trinity College Dublin) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Marking the 'Unmarked' Space: Gendered Vocal Construction in Female Electronic Artists

    McCarthy, R., Dec 2014, Proceedings of the 9th Conference on Interdisciplinary Musicology. Berlin, p. 33-38 6

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Masterclass: Multisystemic Therapy as an intervention for complex needs

    Fox, S., 2014, European Forensic Child and Adolescent Psychiatrists, Psychologists and other disciplines: Royal College of Psychiatrists.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Mathematical vernacular and conceptual well-formedness in mathematical language

    Luo, Z. & Callaghan, P., 1999, Proceedings of the 2nd Inter. Conf. on Logical Aspects of Computational Linguistics (LACL'97). LNAI 1582.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Mathematical vernacular in type theory based proof assistants

    Callaghan, P. & Luo, Z., 1998, User Interfaces for Theorem Provers (UITP'98).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Measurement of the nu(mu)-CCQE cross section in the SciBooNE experiment

    Alcaraz-Aunion, J. L. & Walding, J., 2009, SIXTH INTERNATIONAL WORKSHOP ON NEUTRINO-NUCLEUS INTERACTIONS IN THE FEW-GEV REGION. Sanchez, F., Sorel, M., AlvarezRuso, L., Cervera, A. & VicenteVacas, M. (eds.). MELVILLE: AMER INST PHYSICS, p. 145-150 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Measurement re-ordering attacks on power system state estimation

    Gul, A. & Wolthusen, S., 18 Jan 2018, Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe 2017). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Measurement Study on Malicious Web Servers in the .nz Domain

    Seifert, C., Delwadia, V., Komisarczuk, P., Stirling, D. & Welch, I., 2009, Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. p. 8-25 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Measuring 3-D Secure and 3D SET against e-commerce end-user requirements

    Jarupunphol, P. & Mitchell, C. J., 2003, Proceedings of the 8th Collaborative electronic commerce technology and research conference (CollECTeR (Europe) 2003), National University of Ireland, Galway, June 2003. p. 51-64 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Measuring Attitude towards Risk Treatment Actions amongst Information Security Professionals: an Experimental Approach

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 13 Jun 2016, Workshop on the Economics of Information Security. 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Measuring attitudes towards mobile information services: an empirical validation of the HED/UT scale

    van der Heijden, H. & Sangstad Sørensen, L., 2003, Proceedings of the European Conference on Information Systems (ECIS). Naples, Italy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Measuring SSL and SET against e-commerce consumer requirements

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - International Network Conference 2002 (INC 2002), University of Plymouth, UK, July 2002. p. 323-330 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Measuring the Beam Profile by Counting Ionization Electrons

    Sandberg, H., Bertsche, W., Bodart, D., Dehning, B., Gibson, S., Levasseur, S., Satou, K., Schneider, G., Storey, J. & Veness, R., 12 Sep 2019, 8th International Beam Instrumentation Conference 2019. Malmö, Sweden: JACoW Publishing, TUBO04

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Measuring the Effectiveness of Twitter's URL Shortener (t.co) at Protecting Users from Phishing and Malware Attacks

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 2. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Measuring Tourists’ Emotional Experiences: Extension and Further Validation of the Destination Emotion Scale

    Hosany, S., Prayag, G., Deesilatham, S. & Odeh, K., 2013, 44th TTRA Annual International Conference, Kansas City, Missouri, USA, June 20-22.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Mechanical characterisation of ancient Egyptian mortars

    Sanchez-Moral, S., Martinez-Martinez, J., Benavente, D., Cuezva, S. & Fernandez-Cortes, A., 2011, MATERIALS STRUCTURE MICROMECHANICS OF FRACTURE. Sandera, P. (ed.). LAUBLSRUTISTR 24, CH-8717 STAFA-ZURICH, SWITZERLAND: TRANS TECH PUBLICATIONS LTD, Vol. 465. p. 487-490 4 p. (Key Engineering Materials).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Median based method for baseline wander removal in photoplethysmogram signals

    Awodeyi, A. E., Alty, S. R. & Ghavami, M., 5 Feb 2014, Proceedings - IEEE 14th International Conference on Bioinformatics and Bioengineering, BIBE 2014. Institute of Electrical and Electronics Engineers Inc., p. 311-314 4 p. 7033598

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Meeting deadlines together

    Bocchi, L., Lange, J. & Yoshida, N., 26 Aug 2015, 26th International Conference on Concurrency Theory, CONCUR 2015. Aceto, L. & de Frutos Escrig, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 283-296 14 p. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 42).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Members’ Commitment in online health communities: THE CASE OF MEDICINEAFRICA: Research in Progress

    Panteli, A. & Chamakiotis, P., 2018, Members’ Commitment in online health communities: THE CASE OF MEDICINEAFRICA, .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Memory Access Pattern Protection for Resource-Constrained Devices

    Nakano, Y., Cid, C., Kiyomoto, S. & Miyake, Y., 2013, Proceedings of CARDIS 2012. Springer, Vol. 7771. p. 188-202 15 p. (Lecture Notes in Computer Science; no. 7771).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Memory Errors: the Past, the Present, and the Future

    van der Veen, V., dutt-Sharma, N., Bos, H. J. & Cavallaro, L., 12 Sep 2012, 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Memory-Based Learning of Morphology with Stochastic Transducers

    Clark, A., 2002, Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL). p. 513--520

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

    Ankele, R., Böhl, F. & Friedberger, S., 2018, ACNS 2018 Applied Cryptography & Network security. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 381-399 19 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. E-pub ahead of print

    Mesh Messaging in Large-scale Protests: Breaking Bridgefy

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., 11 May 2021, (E-pub ahead of print) CT-RSA 2021. Springer, p. 375-398 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Metabolic engineering of the mevalonate and non-mevalonate pathways in tomato

    Enfissi, EM., Fraser, PD., Lois, LM., Boronat, A., Schuch, W. & Bramley, PM., 2003, ADVANCED RESEARCH ON PLANT LIPIDS. Murata, N., Yamada, M., Nishida, Okuyama, H., Sekiya, J. & Hajime, W. (eds.). DORDRECHT: Springer, p. 237-240 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Meta-Search Through the Space of Representations and Heuristics on a Problem by Problem Basis

    Fuentetaja, R., Barley, M., Borrajo, D., Douglas, J., Franco, S. & Riddle, P., 26 Apr 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI Press, p. 6169-6176 8 p. (32nd AAAI Conference on Artificial Intelligence, AAAI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Microbunch Instability Observations from a THz Detector at Diamond Light Source

    Shields, W., Bartolini, R., Boorman, G., Karataev, P., Lyapin, A., Puntree, J. & Rehm, G., 2012, IX INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2011). Potylitsyn, A. & Karataev, P. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Micron-scale Laser-wire at the ATF-II at KEK Commissioning and Results

    Nevay, L. J., Corner, L., Walczak, R., Blair, G., Boogert, S., Deacon, L. & Karataev, P., 1 Dec 2011, IPAC 2011 - 2nd International Particle Accelerator Conference. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Migration of He-3 impurities along dislocation lines in He-4 single crystals

    Rojas, X., Haziot, A. & Balibar, S., 2012, 26TH INTERNATIONAL CONFERENCE ON LOW TEMPERATURE PHYSICS (LT26), PTS 1-5. IOP PUBLISHING LTD, 4 p. (Journal of Physics Conference Series; vol. 400).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Military student assignment using NexClass decision support system

    Rigopoulos, G., 2016, MCSI 2016 Chania, Greece.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Millennial and century climate changes in the Colorado Alpine

    Elias, S., 2003, Climate Variability and Ecosystem Response. Greenland, D. (ed.). London: Oxford University Press, p. 370-383

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. E-pub ahead of print

    MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

    Albrecht, M., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T., 9 Nov 2016, (E-pub ahead of print) Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer, Vol. 10031. p. 191-219 29 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. E-pub ahead of print

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Ankele, R. & Kölbl, S., 13 Jan 2019, (E-pub ahead of print) Selected Areas in Cryptography 2018. Lecture Notes in Computer Science ed. Calgary, Canada: Springer, Vol. 11349. p. 163-190 28 p. (Lecture Notes in Computer Science; vol. 11349).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Mineralogy of Experimentally Heated Tagish Lake

    Nakato, A., Chan, QHS., Nakamura, T., Kebukawa, Y. & Zolensky, ME., Mar 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Minimal weight k-SR representations

    Han, Y., Gollmann, D. & Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 34-43 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Minimizing the Log Size for Execution Replay of Shared-Memory Programs

    Levrouw, L. J. & Audenaert, K., 1994, Parallel Processing, Proceedings of Conpar 94–VAPP VI. Springer, p. 76-87 (Lecture Notes in Computer Science; vol. 854).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Minimum description length estimators under the optimal coding scheme

    Vovk, V., 1995, Proceedings of the Second European Conference on Computational Learning Theory. Vitanyi, P. (ed.). Berlin: Springer, p. 237-251 (Lecture Notes in Computer Science; vol. 904).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Mining the biomedical literature to predict shared drug targets in DrugBank

    Caniza Vierci, H., Galeano Galeano, D. & Paccanaro, A., 2017, XLIII Conferencia Latinoamericana en Informática CLEI 2017. IEEE Xplore, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Mining the recent history of Macromarketing thought: A visualization of ideas

    Reppel, A. & Kravets, O., 7 Jul 2016, Proceedings of the 41st Annual Macromarketing Conference. Dublin, Ireland, p. 465-468

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Unpublished

    Miracles, transformative moments and ‘A life’s work’: Exploring the intersection of individual and social identity

    Tzouramani, E., 2013, (Unpublished) 3rd Conference of Management, Spirituality and Religion, May 2013.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 53-66 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Mitigating CSRF attacks on OAuth 2.0 systems

    Li, W., Mitchell, C. J. & Chen, T. M., 1 Nov 2018, Proceedings of 2018 16th Annual Conference on Privacy, Security and Trust (PST): 28-30 Aug 2018. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Mitigation of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014). IEEE Computer Society Press, p. 478 483 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Mixability and the Existence of Weak Complexities

    Kalnishkan, Y. & Vyugin, M., 2002, Computational Learning Theory, 15th Annual Conference on Computational Learning Theory, COLT 2002, Proceedings: volume 2375 of Lecture Notes in Artificial Intelligence. Springer, p. 105-120 (Lecture Notes in Artificial Intelligence; vol. 2375).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Mixed Sneutrino Dark Matter and the Ratio Omega(b)/Omega(dm)

    West, S., 27 Oct 2006, Proceedings of SUSY06.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Mobile recommendation systems for decisions ‘on the go’

    van der Heijden, H., Kotsis, G. & Kronsteiner, R., 2005, Proceedings of the International Conference on Mobile Business (ICMB). Sydney, Australia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Mobile services for group decision support

    van Leeuwen, J. & van der Heijden, H., 2003, Proceedings of the 16th Bled Electronic Commerce conference. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Model checking for symbolic-heap separation logic with inductive predicates

    Brotherston, J., Gorogiannis, N., Kanovich, M. & Rowe, R., Jan 2016, POPL '16 Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM, p. 84-96 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Model Checking Recursive Programs with Numeric Data Types

    Hague, M. & Lin, A., 2011, CAV: Computer Aided Verification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Modelando el nicho ecológico de los bambúes leñosos (Bambuseae, Poaceae) en Bolivia: Implicaciones para la construcción de aerófonos autóctonos y la conservación de los bambúes musicales

    Hachmeyer, S., 2017, La rebelión de los objetos Cestería y Maderas: Anales de la reunión anual de etnología. La Paz: MUSEF, Vol. XXXI. p. 183-210

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Modeling And Detecting Anomalies In Scada Systems

    Svendsen, N. & Wolthusen, S. D., Mar 2008, Critical Infrastructure Protection II: Proc. Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 101-113

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model

    Nweke, L. O. & Wolthusen, S. D., 7 Aug 2020, 2020 IEEE Conference on Communications and Network Security, CNS 2020. Institute of Electrical and Electronics Engineers Inc., 6 p. 9162191. (2020 IEEE Conference on Communications and Network Security, CNS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Modelling e-business security using business processes

    Nachtigal, S. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 459-464 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Modelling GLL Parser Implementations

    Johnstone, A. & Scott, E., 2011, Software Language Engineering: Third International Conference, SLE 2010, Eindhoven, The Netherlands, October 12-13, 2010, Revised Selected Papers. Malloy, B., Staab, S. & van den Brand, M. (eds.). Springer, p. 42-61 20 p. (Lecture Notes in Computer Science; vol. 6563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Modelling Implementation of Strategy

    Aboutalebi, R. & Tan, H., 9 Sep 2014, In: BAM (British Academy of Management), 28th Annual Conference of BAM: The Role of the Business School in Supporting Economic and Social Development. 09-11 September 2014, Belfast Waterfront, Northern Ireland, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Modelling the Satellite Bridge for B-ISDN Islands

    Sun, Z., Komisarczuk, P., Coakley, F. P. & Evans, B. G., 1994, Broadband Islands '94, Connecting with the End-User, Proceedings of the 3rd Intermational Conference on Broadband Islands, Hamburg, Germany, 7-9 June, 1994. p. 211-219 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L., 30 Oct 2017, PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Moduli for Testing Implementations of the RSA Cryptosystem

    Walter, C. D., 1999, 14th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 78-85 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. E-pub ahead of print

    Monadic Decomposition in Integer Linear Arithmetic

    Hague, M., Lin, A., Ruemmer, P. & Wu, Z., 24 Jun 2020, (E-pub ahead of print) International Joint Conference on Automated Reasoning: IJCAR 2020. Springer-Verlag, p. 122-140 19 p. (Lecture Notes in Computer Science; vol. 12166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Monitoring excavation-related ground deformation in london, UK using SqueeSAR™

    Bischoff, C. A., Mason, P. J., Ghail, R. C., Giannico, C. & Ferretti, A., 9 May 2019, Tunnels and Underground Cities: Engineering and Innovation meet Archaeology, Architecture and Art- Proceedings of the WTC 2019 ITA-AITES World Tunnel Congress. Viggiani, G., Celestino, T., Peila, D. & Viggiani, G. (eds.). CRC Press / Balkema, p. 5360-5367 8 p. (Tunnels and Underground Cities: Engineering and Innovation meet Archaeology, Architecture and Art- Proceedings of the WTC 2019 ITA-AITES World Tunnel Congress).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Monotonicity and Completeness in Attribute-Based Access Control

    Crampton, J. & Morisset, C., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 33-48

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Montgomery's Multiplication Technique: How to Make It Smaller and Faster

    Walter, C. D., 1999, CHES '99. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1717. p. 80-93 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Forthcoming

    Mood and confidence in seeking social support in university students with chronic pain

    Serbic, D. & Doyle, L., 2019, (Accepted/In press) Teaching and supporting students with invisible disabilities . Psychology Teaching Review

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    More Detail for a Combined Timing and Power Attack against Implementations of RSA

    Schindler, W. & Walter, C. D., 2003, 9th IMA Int. Conf. on Cryptography and Coding. Paterson, K. G. (ed.). Springer, Vol. 2898. p. 245-263 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Morphological effects on pronunciation

    Mousikou, P., Strycharczuk, P., Turk, A., Rastle, K. & Scobbie, J., 2015, The Scottish Consortium for ICPhS 2015 (Ed.), Proceedings of the 18th International Congress of Phonetic Sciences . Glasgow, UK: The University of Glasgow, paper number 0816

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    MoverScore: Text Generation Evaluating with Contextualized Embeddings and Earth Mover Distance

    Zhao, W., Peyrard, M., Liu, F., Gao, Y., Meyer, C. M. & Eger, S., Nov 2019, Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Association for Computational Linguistics, p. 563-578 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Mozart and Paris (1778)

    Charlton, D., 1995, Europa im Zeitalter Mozarts. Csáky, M. & Pass, W. (eds.). Vienna: Böhlau, p. 185-89 5 p. (Schriftenreihe der Osterreichischen Gesellschaft zur Erforschung des 18. Jahrhunderts ; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    MPLS policy target recognition network

    Al-Mutairi, A. & Wolthusen, S., 2 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9572. p. 71-87 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9572).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    MSL 14 - a Wellcome Manuscript of a Medical Practitioner

    Zipser, B. & Nutton, V., 2010, Histoire de la tradition et édition des médecins grecs: Actes du VIe colloque international (Paris, Université de Paris Sorbonne - Académie des Inscriptions et Belles Lettres, 10-12 avril 2008). Boudon-Millot, V., Garzya, A., Jouanna, J. & Roselli, A. (eds.). Napoli: M. D'Auria Editore, p. 259-270 11 p. (Collectanea; vol. 27).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Multi-agent interactions for an ATM management system (TeleMACS approach).

    Hayzelden, A., Bigham, J. & Luo, Z., 1999, Software Agents for Future Communications Systems. Hayzelden, A. L. G. & Bigham, J. (eds.). Springer-Verlag, p. 160-182

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Multi-agent systems for resource management

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 1999, 6th International Conference on Intelligence and Services in Networks, Also in Lecture Notes in Computer Science. Zuidweg, H., Campolargo, M., Delgado, J. & Mullery, A. (eds.). Springer-Verlag, Vol. 1597.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Multi-Budgeted Directed Cuts

    Kratsch, S., Li, S., Marx, D., Pilipczuk, M. & Wahlstrom, M., 25 Jan 2019, IPEC 2018. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 115. p. 18:1-18:14 14 p. 18. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. E-pub ahead of print

    Multichannel Quaternion Least Mean Square Algorithm

    Cheong Took, C. & Xia, Y., 17 Apr 2019, (E-pub ahead of print) International Conference on Acoustics, Speech, and Signal Processing: ICASSP. Brighton UK: IEEE, p. 1-4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Multi-Client Non-Interactive Verifiable Computation

    Choi, S. G., Katz, J., Kumaresan, R. & Cid, C., Feb 2013, Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Sahai, A. (ed.). Springer, p. 499-518 20 p. (Lecture Notes in Computer Science; vol. 7785).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Multi-Dimensional Causal Discovery

    Schaechtle, U., Stathis, K. & Bromuri, S., 3 Aug 2013, Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence: Beijing, China, 3-9 August 2013. Rossi, F. (ed.). p. 1649-1655

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Multigraph Critical Infrastructure Model

    Schneidhofer, B. & Wolthusen, S., 2016, Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers. Springer-Verlag, Vol. 485. p. 149-167 19 p. (IFIP Advances in Information and Communication Technology; vol. 485).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Multi-level Access in Searchable Symmetric Encryption

    Alderman, J., Martin, K. & Renwick, S., 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 35-52 18 p. (Lecture Notes in Computer Science; vol. 10323).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Multilinear Maps from Obfuscation

    Albrecht, M., Farshim, P., Hofheinz, D., Larraia, E. & Paterson, K., 19 Dec 2015, Theory of Cryptography. Kushilevitz, E. & Malkin, T. (eds.). Springer, p. 446-473 27 p. (Lecture Notes in Computer Science; vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Multiparty Compatibility in Communicating Automata: Characterisation and Synthesis of Global Session Types

    Denielou, P-M. & Yoshida, N., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II: ICALP (2). 2013 ed. Springer, Vol. 7966. p. 174 186 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Multiparty Session Types Meet Communicating Automata

    Deniélou, P-M. & Yoshida, N., 2012, Programming Languages and Systems: 21st European Symposium on Programming, ESOP 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012: Proceedings. Seidl, H. (ed.). Springer, p. 194-213 20 p. (Lecture Notes in Computer Science; vol. 7211).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Unpublished

    Multiple countries response to oil price shocks and illiquidity shocks

    Said, H. & Giouvris, E., 2017, (Unpublished) 43rd International Business Research Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Multiple lexicalisation (a Java based study)

    Scott, E. & Johnstone, A., 20 Oct 2019, ACM Digital Library: Proceedings of Software Language Engineering 2019. ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Multiple Pulse Resonantly Enhanced Laser Plasma Wakefield Acceleration

    Corner, L., Walczak, R., Nevay, L. J., Dann, S., Hooker, S. M., Bourgeois, N. & Cowley, J., 2012, ADVANCED ACCELERATOR CONCEPTS. Zgadzaj, R., Gaul, E. & Downer, MC. (eds.). MELVILLE: AMER INST PHYSICS, p. 872-873 2 p. (AIP Conference Proceedings; vol. 1507).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Multiple sequence alignment based on new approaches of tree construction and sequences comparison

    Solovyev, V., Streletc, V. B., Milanesi, L., Lim, H. (ed.), Fickett, J. (ed.), Cantor, C. (ed.) & Robbins, R. (ed.), 1993, Proceedings of the 2nd International conference on Bioinformatics, Supercomputing, and Complex genome analysis.. World Scientific, p. 419-428

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Multiprobabilistic Venn Predictors with Logistic Regression

    Nouretdinov, I., Devetyarov, D., Burford, B., Camuzeaux, S., Gentry-Maharaj, A., Tiss, A., Smith, C., Luo, Z., Chervonenkis, A., Hallett, R., Vovk, V., Waterfield, M., Cramer, R., Timms, J. F., Jacobs, I., Menon, U. & Gammerman, A., 2012, Artificial Intelligence Applications and Innovations - AIAI 2012 International Workshops: AIAB, AIeIA, CISE, COPA, IIVC, ISQL, MHDW, and WADTMB, Halkidiki, Greece, September 27-30, 2012, Proceedings, Part II. Iliadis, L., Maglogiannis, I., Papadopoulos, H., Karatzas, K. & Sioutas, S. (eds.). Springer, Vol. 382. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Multiproxy Constraints on Redox Conditions of ~2.7 Ga Oceans

    Yang, J., Zerkle, A., Grassineau, N., Nisbet, E., Izon, G., Hunter, M. & Martin, T., 2016, Goldschmidt Conference 2016. p. 03F

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Forthcoming

    Multi-Round Attacks on Structural Controllability Properties for Non-Complete Random Graphs

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, (Accepted/In press) Proceedings of the 16th Information Security Conference (ISC 2013). Springer-Verlag, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Multi-Shot Distributed Transaction Commit

    Chockler, G. & Gotsman, A., 4 Oct 2018, 32nd International Symposium on Distributed Computing (DISC 2018). Springer-Verlag, p. 1-18 18 p. (LIPIcs–Leibniz International Proceedings in Informatics ; vol. 121).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Music as Function: Biofeedback in Games for Health

    Plans, E. & Plans, D., 10 Apr 2016, Ludomusicology - Videogame Music Research Group.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    My Beautiful Self’: an Exploration of the Effects of Advertising Campaigns on Female Empowerment

    Longo, C. & Türe, M., 2016, NA - Advances in Consumer Research . Vol. 44. p. 747-747 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. E-pub ahead of print

    Nanothermometry of electrons and phonons

    Weng, Q., Puttock, R., Barton, C., Panchal, V., Yang, L., An, Z., Kajihara, Y., Lu, W., Tzalenchuk, A. & Komiyama, S., 29 Oct 2018, (E-pub ahead of print) 2018 43rd International Conference on Infrared Millimeter and Terahertz Waves, IRMMW-THz 2018. IEEE Computer Society, Vol. 2018-September. 3 p. 8509939

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Nature vs Grammar: Annibal Caro's Apologia as a Manifesto for Orality

    Jossa, S., 24 Feb 2016, Interactions between Orality and Writing in Early Modern Italian Culture. Degl'Innocenti, L., Richardson, B. & Sbordoni, C. (eds.). Routledge

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Navigating the Sacred and the Profane: An Inquiry of ‘Askesis’ Emergent in Daily Lives and Grounded in Wisdom Traditions.

    Tzouramani, E. & Karakas, F., 2016, 11th Organization Studies Workshop, May 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Forthcoming

    Naxos di Sicilia: nuovi dati sulla città del V secolo a.C.

    Lentini, M. C. & Pakkanen, J., 2015, (Accepted/In press) La Città e le città della Sicilia antica. Atti delle Ottave Giornate Internazionali di studio sull’area elima e la Sicilia occidentale nel contesto mediterraneo. Pisa, Scuola Normale Superiore, 18-21 dicembre 2012, Pisa. Ampolo, C. (ed.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Naxos of Sicily in the 5th Century BC: New Research

    Lentini, M. C., Pakkanen, J. & Sarris, A., Dec 2015, Greek Colonisation: New Data, Current Approaches: Proceedings of the Scientific Meeting held in Thessaloniki (6 February 2015). Adam-Veleni, P. & Tsangari, D. (eds.). Athens: Alpha Bank, p. 23–35 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution