Home > Publications

Publications

37526 - 37550 out of 40,084Page size: 25
  1. Conference contribution › Research
  2. Published

    Validation of a Seven Serum Biomarker Panel in Ovarian Cancer

    Timms, J. F., Arslan-Low, E., Cubizolles, M., Lomas, L., Yip, C., Meng, X-Y., Hogdall, E., Gentry-Maharaj, A., Ford, J., Burford, B., Nouretdinov, I., Vovk, V., Luo, Z., Menon, U., Gammerman, A., Fung, E. T. & Jacobs, I., 2007, Proceedings of the 15th International Meeting of the European Society of Gynaecological Oncology.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Variability and rigour in Service Computing engineering

    Ter Beek, M. H., Gnesi, S., Fantechi, A. & Fiadeiro, J. L., 1 Jan 2012, Proceedings - 2011 34th IEEE Software Engineering Workshop, SEW 2011. p. 122-127 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Varying Representation Schemata vs Fact Updating in KB Management

    Carapuça, R. & Fiadeiro, J. L., 1986, DS-2. p. 71-87 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Venn-Abers predictors

    Vovk, V. & Petej, I., 2014, Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence. p. 829-838 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Veraci fizioni. Sullo statuto della letteratura nella cultura delle Corti

    Jossa, S., 2010, A. Quondam (ed.), Classicismo e culture di Antico regime (Roma: Bulzoni, 2010). Quondam, A. (ed.). Bulzoni, p. 197-212 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Verifying Asynchronous Interactions via Communicating Session Automata

    Lange, J. & Yoshida, N., 12 Jul 2019, Computer Aided Verification - 31st International Conference, CAV 2019, Proceedings. Dillig, I. & Tasiran, S. (eds.). Springer Verlag, p. 97-117 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11561 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Vers une architecture modulaire d'agent argumentatif pour la composition de services

    Morge, M., McGinnis, J., Bromuri, S., Toni, F. C., Mancarella, P. & Stathis, K., 1 Nov 2006, Proc. of the of 15th Journees Francophones sur les Systemes M ulti-Agents (JFSMA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Dec 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, p. 391-398 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Virtual infrastructure for collision-prone wireless networks

    Chockler, G., Gilbert, S. & Lynch, N., Aug 2008, Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing. Toronto, ON, Canada: ACM, p. 233-242 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Virtual Interacting Network Community: Exploiting Multi-core Architectures to Increase Security

    Baiardi, F. & Sgandurra, D., 2008, Proceedings of the 5th Conference on Computing Frontiers. New York, NY, USA: ACM, p. 111-112 2 p. (CF '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Visible-Spectrum Biometric Retina Recognition

    Borgen, H., Bours, P. & Wolthusen, S. D., 15 Aug 2008, Proc. 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP '08). IEEE Computer Society Press, p. 1056-1062

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Visualizing narratives: The case of the celebrity CEO (Panel discussion)

    Reppel, A. & Kravets, O., 7 Jul 2016, Proceedings of the 41st Annual Macromarketing Conference. p. 107-108

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Forthcoming

    vPlanSim: An Open Source Graphical Interface for the Visualisation and Simulation of AI Systems

    Roberts, J., Mastorakis, G., Lazaruk, B., Franco Aixela, S., Stokes, A. & Bernardini, S., 16 Feb 2021, (Accepted/In press) The 31st International Conference on Automated Planning and Scheduling (ICAPS 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Warlordism and the making of the Roman imperial army

    Rankov, B., 2018, Warlords and Interstate Relations in the Ancient Mediterranean. Naco del Hoyo, T. & Lopez Sanchez, F. (eds.). Leiden/Boston MA: E. J. Brill, p. 415-25 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Water Logging in Keshanbpur: A Focus to the Coping Strategies of the People

    Adri, N. & Islam, I., 2010, Proceedings of International Conference on Environmental aspects of Bangladesh (ICEAB 10). Japan, p. 33-36 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    We Crashed, Now What?

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 3 Oct 2010, Proceedings of the 6th Workshop on Hot Topics in System Dependability (HotDep'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Weak Synchrony Models and Failure Detectors for Message Passing (k-)Set Agreement

    Biely, M., Robinson, P. & Schmid, U., 2009, Principles of Distributed Systems, 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings. p. 285-299 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Weak Transitivity in Coercive Subtyping

    Luo, Y., Luo, Z. & Soloviev, S., 2003, Types for Proofs and Programs, Proc. of Inter Conf of TYPES'02. LNCS 2646. p. 220--239

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Tileria, M., Blasco, J. & Suarez-Tangil, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Web based student information management system in universities: experiences from Mzuzu University

    Lubanga, S. C., Chawinga, W. D., Majawa, F. & Kapondera, S., 2018, Standing Conference of the Eastern, Central and Southern Africa Librarians and Institutions (SCESCAL).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Web Password Recovery: A Necessary Evil?

    Al Maqbali, F. & Mitchell, C. J., 2019, Proceedings of the Future Technology Conference (FTC) 2018, Volume 2: Vancouver, November 2018. Springer-Verlag, p. 324-341 18 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Web Server on a SIM Card

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2010, Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. Ao, S. I., Gelman, L., Hukins, D. WL., Hunter, A. & Korsunsky, A. M. (eds.). Newswood Limited, Vol. I. p. 253-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution