Home > Publications

Publications

38251 - 38275 out of 42,928Page size: 25
  1. Conference contribution › Research
  2. Published

    Declarative agent control

    Kakas, A., Mancarella, P., Sadri, F., Stathis, K. & Toni, F., 2004, Computational Logic in Multi-agent Systems (CLIMA 2004). Springer-Verlag, Vol. 3487. p. 96-110 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Decoherence of a quantum bit circuit

    Ithier, G., Nguyen, F., Collin, E., Boulant, N., Meeson, P. J., Joyez, P., Vion, D. & Esteve, D., 2007, Quantum Decoherence: Poincare Seminar 2005. Duplantier, B., Raimond, JM. & Rivasseau, V. (eds.). CAMBRIDGE: Birkhauser, Boston, p. 125-149 25 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Deconfinement and cold atoms in optical lattices

    Cazalilla, M. A., Ho, A. F. & Giamarchi, T., 2006, RECENT PROGRESS IN MANY-BODY THEORIES: Proceedings of the 13th International Conference, Buenos Aires, Argentina, 5 – 9 December 2005. Hernández, S. & Cataldo, H. (eds.). p. 208-217 10 p. (Series on Advances in Quantum Many-Body Theory ; vol. 10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Forthcoming

    Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper

    Meister, J. A., Akram, R. N. & Markantonakis, K., 7 Nov 2018, (Accepted/In press) The 12th WISTP International Conference on Information Security Theory and Practice (WISTP'2018). Blazy, O. & Yeun, C. Y. (eds.). Brussels, Belgium: Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Deep learning based melanoma diagnosis using dermoscopic images

    Wall, C., Young, F., Zhang, L., Phillips, E-J., Jiang, R. & Yu, Y., 15 Aug 2020, World Scientific Proceedings Series on Computer Engineering and Information Science. In: Developments of Artificial Intelligence Technologies in Computation and Robotics. World Scientific Proceedings Series on Computer Engineering and Information Science, 12. : World Scientific, Singapore, p. 907-914 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Deep learning-based fall detection

    Chiang, J. W. H. & Zhang, L., 15 Aug 2020, Deep learning-based fall detection . In: Developments of Artificial Intelligence Technologies in Computation and Robotics. World Scientific Proceedings Series on Computer Engineering and Information Science, 12.: World Scientific, Singapore, p. 891-898 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Deep Recurrent Neural Networks with Attention Mechanisms for Respiratory Anomaly Classification

    Wall, C., Zhang, L., Yu, Y. & Mistry, K., 20 Sep 2021, 2021 International Joint Conference on Neural Networks (IJCNN). International Joint Conference on Neural Networks (IJCNN): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Forthcoming

    Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the 6th International Workshop on Critical Information Infrastructures Security 2011 (CRITIS 2011). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Defending financial infrastructures through early warning systems: The intelligent cloud approach

    Lodi, G., Querzoni, L., Baldoni, R., Marchetti, M., Colajanni, M., Bortnikov, V., Chockler, G., Dekel, E., Laventman, G. & Roytman, A., 2009, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies (CSIIRW '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Defensive Forecast for Conformal Bounded Regression

    Nouretdinov, I. & Lebedev, A., Oct 2013, The 9th Artificial Intelligence Applications and Innovations Conference (AIAI): 2nd Workshop on Conformal Prediction and its Applications. p. 384-393 10 p. (IFIP Advances in Information and Communication Technology; vol. 412).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Defensive forecasting

    Vovk, V., Takemura, A. & Shafer, G., 2005, Proceedings of the Tenth International Workshop on Articial Intelligence and Statistics. Cowell, R. & Ghahramani, Z. (eds.). p. 365-372 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Defensive forecasting for linear protocols

    Vovk, V., Nouretdinov, I., Takemura, A. & Shafer, G., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, Vol. 3734. p. 459-473 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Defensive prediction with expert advice

    Vovk, V., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, p. 444-458 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Definitions of corporate social responsibility: Content, range of authors, evolution over time

    Preuss, L., 2015, Annual Meeting of the International Association for Business and Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Delay and jitter attacks on hierarchical state estimation

    Baiocco, A., Foglietta, C. & Wolthusen, S., 21 Mar 2016, Proceedings of the 2015 IEEE International Conference on Smart Grid Communications. IEEE Press, p. 485-490

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Delegation and satisfiability in workflow systems

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 31-40 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H., 2006, Proceedings of 11th European Symposium on Research in Computer Security. Springer, p. 174-191 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Democratising Capitalism: Employee Share ownership schemes and unions

    Sen Gupta, S., 2013, European Academy of Management, University of Galatsaray, Istanbul, Turkey.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Dependent coercions

    Luo, Z. & Soloviev, S., 1999, Proc of the 8th Inter. Conf. on Category Theory in Computer Science (CTCS'99), Edinburgh, Scotland. Electronic Notes in Theoretical Computer Science, Vol 29.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Dependent Randomized Rounding: The Bipartite Case

    Doerr, B., Künnemann, M. & Wahlström, M., 2011, 2011 Proceedings of the Thirteenth Workshop on Algorithm Engineering and Experiments (ALENEX). Müller-Hannemann, M. & Werneck, R. (eds.). San Francisco, California, USA: SIAM, p. 96-106 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Dependent record types revisited

    Luo, Z., 2009, Modules and Libraries for Proof Assistants (MLPA'09), ACM Inter. Conf. Proceeding Series. Vol. 429.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Derandomizing stochastic prediction strategies

    Vovk, V., 1997, Proceedings of the Tenth Annual Conference on Computational Learning Theory. Freund, Y. & Schapire, R. (eds.). New York: ACM Press, p. 32-44 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Deriving Ancient Foot Units from Building Dimensions: a Statistical Approach Employing Cosine Quantogram Analysis

    Pakkanen, J., 2002, Archaeological Informatics: Pushing the Envelope. CAA 2001: Computer Applications and Quantitative Methods in Archaeology. Proceedings of the 29th Conference, Gotland, April 2001. Burenhult, G. & Arvidsson, J. (eds.). Oxford: Archaeopress, p. 501–506 (BAR International Series; vol. 1016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Deriving authentication for pervasive security

    Pavlovic, D. & Meadows, C., 2008, Proceedings of the ISTPS 2008. McLean, J. (ed.). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Forthcoming

    Deriving ephemeral authentication using channel axioms

    Pavlovic, D. & Meadows, C., 2012, (Accepted/In press) Proceedings of the Cambridge Workshop on Security Protocols 2009. Christianson, B. (ed.). Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution