Home > Publications

Publications

37601 - 37625 out of 41,350Page size: 25
  1. Conference contribution › Research
  2. Published

    Model checking for symbolic-heap separation logic with inductive predicates

    Brotherston, J., Gorogiannis, N., Kanovich, M. & Rowe, R., Jan 2016, POPL '16 Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM, p. 84-96 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Model Checking Recursive Programs with Numeric Data Types

    Hague, M. & Lin, A., 2011, CAV: Computer Aided Verification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Modelando el nicho ecológico de los bambúes leñosos (Bambuseae, Poaceae) en Bolivia: Implicaciones para la construcción de aerófonos autóctonos y la conservación de los bambúes musicales

    Hachmeyer, S., 2017, La rebelión de los objetos Cestería y Maderas: Anales de la reunión anual de etnología. La Paz: MUSEF, Vol. XXXI. p. 183-210

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Modeling And Detecting Anomalies In Scada Systems

    Svendsen, N. & Wolthusen, S. D., Mar 2008, Critical Infrastructure Protection II: Proc. Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 101-113

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model

    Nweke, L. O. & Wolthusen, S. D., 7 Aug 2020, 2020 IEEE Conference on Communications and Network Security, CNS 2020. Institute of Electrical and Electronics Engineers Inc., 6 p. 9162191. (2020 IEEE Conference on Communications and Network Security, CNS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Modelling e-business security using business processes

    Nachtigal, S. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 459-464 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Modelling GLL Parser Implementations

    Johnstone, A. & Scott, E., 2011, Software Language Engineering: Third International Conference, SLE 2010, Eindhoven, The Netherlands, October 12-13, 2010, Revised Selected Papers. Malloy, B., Staab, S. & van den Brand, M. (eds.). Springer, p. 42-61 20 p. (Lecture Notes in Computer Science; vol. 6563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Modelling Implementation of Strategy

    Aboutalebi, R. & Tan, H., 9 Sep 2014, In: BAM (British Academy of Management), 28th Annual Conference of BAM: The Role of the Business School in Supporting Economic and Social Development. 09-11 September 2014, Belfast Waterfront, Northern Ireland, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Modelling the Satellite Bridge for B-ISDN Islands

    Sun, Z., Komisarczuk, P., Coakley, F. P. & Evans, B. G., 1994, Broadband Islands '94, Connecting with the End-User, Proceedings of the 3rd Intermational Conference on Broadband Islands, Hamburg, Germany, 7-9 June, 1994. p. 211-219 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L., 30 Oct 2017, PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Moduli for Testing Implementations of the RSA Cryptosystem

    Walter, C. D., 1999, 14th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 78-85 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. E-pub ahead of print

    Monadic Decomposition in Integer Linear Arithmetic

    Hague, M., Lin, A., Ruemmer, P. & Wu, Z., 24 Jun 2020, (E-pub ahead of print) International Joint Conference on Automated Reasoning: IJCAR 2020. Springer-Verlag, p. 122-140 19 p. (Lecture Notes in Computer Science; vol. 12166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Monitoring excavation-related ground deformation in london, UK using SqueeSAR™

    Bischoff, C. A., Mason, P. J., Ghail, R. C., Giannico, C. & Ferretti, A., 9 May 2019, Tunnels and Underground Cities: Engineering and Innovation meet Archaeology, Architecture and Art- Proceedings of the WTC 2019 ITA-AITES World Tunnel Congress. Viggiani, G., Celestino, T., Peila, D. & Viggiani, G. (eds.). CRC Press / Balkema, p. 5360-5367 8 p. (Tunnels and Underground Cities: Engineering and Innovation meet Archaeology, Architecture and Art- Proceedings of the WTC 2019 ITA-AITES World Tunnel Congress).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Monotonicity and Completeness in Attribute-Based Access Control

    Crampton, J. & Morisset, C., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 33-48

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Montgomery's Multiplication Technique: How to Make It Smaller and Faster

    Walter, C. D., 1999, CHES '99. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1717. p. 80-93 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Forthcoming

    Mood and confidence in seeking social support in university students with chronic pain

    Serbic, D. & Doyle, L., 2019, (Accepted/In press) Teaching and supporting students with invisible disabilities . Psychology Teaching Review

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    More Detail for a Combined Timing and Power Attack against Implementations of RSA

    Schindler, W. & Walter, C. D., 2003, 9th IMA Int. Conf. on Cryptography and Coding. Paterson, K. G. (ed.). Springer, Vol. 2898. p. 245-263 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Morphological effects on pronunciation

    Mousikou, P., Strycharczuk, P., Turk, A., Rastle, K. & Scobbie, J., 2015, The Scottish Consortium for ICPhS 2015 (Ed.), Proceedings of the 18th International Congress of Phonetic Sciences . Glasgow, UK: The University of Glasgow, paper number 0816

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    MoverScore: Text Generation Evaluating with Contextualized Embeddings and Earth Mover Distance

    Zhao, W., Peyrard, M., Liu, F., Gao, Y., Meyer, C. M. & Eger, S., Nov 2019, Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Association for Computational Linguistics, p. 563-578 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Mozart and Paris (1778)

    Charlton, D., 1995, Europa im Zeitalter Mozarts. Csáky, M. & Pass, W. (eds.). Vienna: Böhlau, p. 185-89 5 p. (Schriftenreihe der Osterreichischen Gesellschaft zur Erforschung des 18. Jahrhunderts ; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    MPLS policy target recognition network

    Al-Mutairi, A. & Wolthusen, S., 2 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9572. p. 71-87 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9572).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    MSL 14 - a Wellcome Manuscript of a Medical Practitioner

    Zipser, B. & Nutton, V., 2010, Histoire de la tradition et édition des médecins grecs: Actes du VIe colloque international (Paris, Université de Paris Sorbonne - Académie des Inscriptions et Belles Lettres, 10-12 avril 2008). Boudon-Millot, V., Garzya, A., Jouanna, J. & Roselli, A. (eds.). Napoli: M. D'Auria Editore, p. 259-270 11 p. (Collectanea; vol. 27).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Multi-agent interactions for an ATM management system (TeleMACS approach).

    Hayzelden, A., Bigham, J. & Luo, Z., 1999, Software Agents for Future Communications Systems. Hayzelden, A. L. G. & Bigham, J. (eds.). Springer-Verlag, p. 160-182

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Multi-agent systems for resource management

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 1999, 6th International Conference on Intelligence and Services in Networks, Also in Lecture Notes in Computer Science. Zuidweg, H., Campolargo, M., Delgado, J. & Mullery, A. (eds.). Springer-Verlag, Vol. 1597.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Multi-Budgeted Directed Cuts

    Kratsch, S., Li, S., Marx, D., Pilipczuk, M. & Wahlstrom, M., 25 Jan 2019, IPEC 2018. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 115. p. 18:1-18:14 14 p. 18. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution