Home > Publications

Publications

37251 - 37275 out of 39,876Page size: 25
  1. Conference contribution › Research
  2. Unpublished

    Transnational capital and the end of national social settlements?: recent developments in Sweden

    Vernon, G. & Rees, C., Apr 2001, (Unpublished) Industrial Relations in the European Community (IREC) Conference on 'Globalization, Competitiveness and the Government of Employment in Europe'. Madrid.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Transnational Clerical Elite Network: Shiite Political Activism in the Middle East

    Kalantari, M., 2014, 55th Annual International Studies Association Convention, Toronto. 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Transverse Profile and Emittance Measurements With a Laser Stripping System During the CERN LINAC4 Commissioning at 3 and 12 MeV

    Roncarolo, F., Bravin, E., Hofmann, T., Raich, U., Zocca, F., Boorman, G., Bosco, A., Gibson, S., Kruchinin, K., Pozimski, J. & Gabor, C., 5 Sep 2014, 27th Linear Accelerator Conference: LINAC14, Geneva, Switzerland, 31 August - 5 September 2014. p. 506-509 4 p. TUPP035

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices

    Reddington, J. & Coles-Kemp, L., 1 Jul 2011, Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies. Edinburgh, Scotland, UK: Association for Computational Linguistics, p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Trapping Domain Walls in Diode-like Structures

    Bryan, M. T., Schrefl, T., Gibbs, M. R. & Allwood, D. A., 25 Jun 2007, INTERMAG 2006 - IEEE International Magnetics Conference. p. 758 1 p. 4262191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Trashing IMSI catchers in mobile networks

    Khan, M. & Mitchell, C. J., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, July 18-20, 2017: WiSec '17 . Association for Computing Machinery (ACM), p. 207-218 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Travelling through facebook; exploring affordances through the Lens of age

    Panteli, N., Marder, B., Davenport, J. H. & Nemetz, F., 2014, ECIS 2014 Proceedings - 22nd European Conference on Information Systems. Association for Information Systems (AIS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Tree Automata as Algebras: Minimisation and Determinisation

    van Heerdt, G., Kappé, T., Rot, J., Sammartino, M. & Silva, A., Jun 2019, 8th Conference on Algebra and Coalgebra in Computer Science, CALCO 2019. Roggenbach, M. & Sokolova, A. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-22 22 p. 6. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 139).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Tree polymatrix games are PPAD-hard

    Deligkas, A., Fearnley, J. & Savani, R., 29 Jun 2020, 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Czumaj, A., Dawar, A. & Merelli, E. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. 38. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 168).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Tree-Based Cryptographic Access Control

    Alderman, J., Farley, N. & Crampton, J., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag, Vol. 10492 . p. 47-64 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Triassic and Jurassic Sandstones in the Banda Arc: Provenance and correlations with the Australian NW Shelf

    Zimmermann, S. & Hall, R., 25 May 2016, Proceedings, Indonesian Petroleum Association Fortieth Annual Convention 2016. Indonesian Petroleum Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots

    Seifert, C., Komisarczuk, P. & Welch, I., 2009, The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece. p. 63-69 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Trust Strategies for ART Testbed

    Kafali, O. & Yolum, P., 2006, Ninth International Workshop on Trust in Agent Societies, AAMAS. p. 43-49 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Forthcoming

    Trust under the Panopticon: Factors Influencing Trust within Contemporary Social Movements

    Azer, E., Zheng, Y. & Harindranath, G., 14 Feb 2019, (Accepted/In press) 35th EGOS Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Tunable balancing of RSA

    McKee, J., Galbraith, S. D. & Heneghan, C., 2005, ACISP 10. p. 280-292 (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Two Edge Modification Problems without Polynomial Kernels

    Kratsch, S. & Wahlström, M., 1 Sep 2009, Parameterized and Exact Computation : 4th International Workshop, IWPEC 2009. Chen, J. & Fomin, F. V. (eds.). Denmark, Copenhagen: Springer, Vol. 5917. p. 264-275 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Two Proposals for Improving the Image-Based Authentication System: H-IBAS-H

    Vuksanovic, B. & Al-Sinani, H., 2009, INTERNET-09: First International Conference on Evolving Internet, Cannes/La Bocca, French Riviera, France, August 23-29 2009 . Washington: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Two-Stage Classification Model to Detect Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 113-120 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Typed Operational Semantics for Dependent Record Types

    Feng, Y. & Luo, Z., 2011, Proceedings of Types for Proofs and Programs (TYPES'09), EPTCS 53.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Type-theoretic semantics for SemNet

    Shiu, S., Luo, Z. & Garigliano, R., 1996, Proc. of Inter. Conf. on Formal and Applied Practical Reasoning, LNAI 1085.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution