Home > Publications

Publications

38201 - 38225 out of 42,928Page size: 25
  1. Conference contribution › Research
  2. Published

    Countering “dead, causal reality”: The fusion of material and metaphysical oppression in Philip Dick’s late work

    Gene-Rowe, F., Jun 2014, Current Research in Speculative Fiction 2014. Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Counting Satisfying Assignments in 2-SAT and 3-SAT

    Dahllöf, V., Jonsson, P. & Wahlström, M., 2002, COCOON. p. 535-543 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Cover Your Cough: Detection of Respiratory Events with Confidence Using a Smartwatch

    Nguyen, D. K. A. & Luo, Z., Jun 2018, Proceedings of Machine Learning Research: Conformal and Probabilistic Prediction and Applications (COPA 2018). Vol. 91. p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Crafting IT jobs through the flexibility of contracting: The case of female contractors in a male-dominated sector

    Panteli, N., 5 Sep 2017, Proceedings of the British Academy of Management Conference, BAM2017: Track: Gender and Management, . The University of Warwick, September 5-7, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Unpublished

    Creating Digital Narrative Artworks: An Expanding Geographical Field

    Lowe, J., 25 Apr 2019, (Unpublished) Innovative Research Methods session at RGS-IBG PGF Mid-Term Conference 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print

    Creative Data Ontology: 'Russian Doll' Metadata Versioning in Film and TV Post-Production Workflows

    Dexiades, C. & Heath, C. P. R., 18 Mar 2021, (E-pub ahead of print) Metadata and Semantic Research. Springer, [Cham], Vol. 1355. p. 204-215 12 p. (Communications in Computer and Information Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Criteria of Efficiency for Conformal Prediction

    Vovk, V., Fedorova, V., Nouretdinov, I. & Gammerman, A., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 23-39 17 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Criterion of calibration for transductive confidence machine with limited feedback

    Nouretdinov, I. & Vovk, V., 2003, Lecture Notes in Articial Intelligence. Vol. 2842. p. 259-267 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Critical phase separation in solid helium isotopic mixtures

    Saunders, J., Cowan, B. & Poole, M., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 358-359 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Unpublished

    Cross-border mergers and the country-of-origin effect: implications for HRM?

    Edwards, T. & Rees, C., Nov 2000, (Unpublished) Association Francophone de Gestion des Ressources Humaines (AGRH) 11th Annual Congress. Paris.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Unpublished

    Cross-border mergers and the country-of-origin effect: trade union responses

    Edwards, T. & Rees, C., Mar 2001, (Unpublished) Wissenschaftszentrum Berlin (WZB) Conference on 'Cross-Border Mergers and Employee Participation in Europe'. Paris.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Forthcoming

    Cross-cultural leadership behavior adjustment and leader effectiveness

    Tsai, C-J., 2022, (Accepted/In press) Academy of Management Annual Meeting (AOM), Seattle, Washington, USA, August 5-9..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Cross-cultural Leadership Behavior Adjustment: Expatriate Senior Managers in China

    Tsai, C-J. & Qiao, K., 2017, Academy of Management Annual Meeting (AOM), Atlanta, Georgia, August 4-8. (Awarded Best Paper, HR Division).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2011, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Crossvergence in CSR priorities of developing country firms

    Preuss, L. & Barkemeyer, R., Jan 2014, Africa Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Crowdfunding and social identity in Northern and Latin America

    Kromidha, E., 2016, Proceedings of the 6th Latin American and European Meeting on Organization Studies, 6-9 April 2016 . Viña del Mar, Chile

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Crowdsourcing Lightweight Pyramids for Manual Summary Evaluation

    Shapira, O., Gabay, D., Gao, Y., Ronen, H., Pasunuru, R., Bansal, M., Amsterdamer, Y. & Dagan, I., Jun 2019, Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics, Vol. 1. p. 682-687 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Crusader Perceptions of Byzantium, c.1095 to c.1150

    Phillips, J., 21 Feb 2019, Byzantium and the West: Perception and Reality (C12th to C15th). Chrissis, N., Kolia-Dermitzaki, A. & Papageorgiou, A. (eds.). Abingdon: Routledge

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Cryptanalysis of the EPBC authenticated encryption mode

    Mitchell, C. J., 2007, Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings. Springer-Verlag, Vol. 4887. p. 118-128 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. E-pub ahead of print

    Cryptanalysis of the multivariate encryption scheme EFLASH

    Øygarden, M., Felke, P., Raddum, H. & Cid, C., 14 Feb 2020, (E-pub ahead of print) Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). Springer, p. 85-105 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Cryptanalysis of two variants of PCBC mode when used for message integrity

    Mitchell, C. J., 2005, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Boyd, C. & Gonzalez-Nieto, J. (eds.). Springer-Verlag, Vol. 3574. p. 560-571 12 p. (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    CryptoCache: Network caching with confidentiality

    Leguay, J., Paschos, G., Quaglia, E. & Smyth, B., 31 Jul 2017, 2017 IEEE International Conference on Communications (ICC). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. E-pub ahead of print

    Cryptographic Enforcement of Information Flow Policies Without Public Information

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 9 Jan 2016, (E-pub ahead of print) 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . Malkin, T., Kolesnikov, V., Bishop Lewko, A. & Polychronakis, M. (eds.). p. 389-408 20 p. (Lecture Notes in Computer Science; vol. 9092).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Cryptographic Enforcement of Role-Based Access Control

    Crampton, J., 2010, Proceedings of 7th International Workshop on Formal Aspects of Security and Trust. Springer, p. 191-205 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Cryptographic Protocol Synthesis and Verification for Multiparty Sessions

    Bhargavan, K., Corin, R., Denielou, P-M., Fournet, C. & Leifer, J. J., 2009, PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM. LOS ALAMITOS: IEEE COMPUTER SOC, p. 124-140 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution