Home > Publications

Publications

38826 - 38850 out of 42,806Page size: 25
  1. Conference contribution › Research
  2. Published

    LHC Collimation and Energy Deposition Studies Using Beam Delivery Simulation (BDSIM)

    Nevay, L., Boogert, S., Garcia Morales, H., Gibson, S., Kwee-Hinzmann, R., Bruce, R. & Redaelli, S., Jun 2016, 7th International Particle Accelerator Conference: May 8-13, 2016, Busan, Korea. JACoW Publishing, p. 1-3 3 p. WEPOY047

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    LibSEAL: revealing service integrity violations using trusted execution

    Aublin, P-L., Kelbert, F., O'Keeffe, D., Muthukumaran, D., Priebe, C., Lind, J., Krahn, R., Fetzer, C., Eyers, D. M. & Pietzuch, P. R., 23 Apr 2018, Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, April 23-26, 2018. p. 1-15 15 p. 24

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Life detection and organic characterization in the solar system

    Chan, Q. H. S., Martins, Z. & Sephton, MA., 2010, Astrobiology Science Conference 2010: Evolution and Life: Surviving Catastrophes and Extremes on Earth and Beyond. Vol. 1538. p. 5233 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Lightweight Classification of IoT Malware Based on Image Recognition

    Su, J., Vasconcellos Vargas, D., Prasad, S., Sgandurra, D., Feng, Y. & Sakurai, K., 2018, 8th IEEE International Workshop on Network Technologies for Security, Administration, and Protection (NETSAP 2018). IEEE Xplore, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Limitations of IEC62351-3's public key management

    Wright, J. & Wolthusen, S., 19 Dec 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Limits to anonymity when using credentials

    Pashalidis, A. & Mitchell, C. J., 2006, Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004, Revised Selected Papers. Springer-Verlag, Vol. 3957. p. 4-12 9 p. (Lecture Notes in Computer Science; vol. 3957).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Linear Depth Integer-Wise Homomorphic Division

    Okada, H., Cid, C., Hidano, S. & Kiyomoto, S., 2019, Information Security Theory and Practice. WISTP 2018. Springer, p. 91-106 16 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Linear Probability Forecasting

    Zhdanov, F. & Kalnishkan, Y., 2010, Artificial Intelligence Applications and Innovations, AIAI 2010, Proceedings: vol 339 of IFIP Advances in Information and Communication Technology. Springer, p. 4-11 (IFIP Advances in Information and Communication Technology; vol. 339).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Linear Relations between Square-Loss and Kolmogorov Complexity

    Kalnishkan, Y., 1999, of the Twelfth Annual Conference on Computation Learning Theory. ACM, p. 226-232

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Linearly Ordered Attribute Grammar Scheduling Using SAT-Solving

    van Binsbergen, L. T., 1 Jan 2015, Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin / Heidelberg, p. 289-303 15 p. (Lecture Notes in Computer Science; vol. 9035).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Linguistic categories in mathematical vernacular and their type-theoretic semantics (extended abstract)

    Luo, Z. & Callaghan, P., 1997, Logical Aspects of Computational Linguistics 97 (LACL'97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Forthcoming

    Linguistic tremours: Language diversity as a fault line in intercultural virtual teams

    Drabble, D., 2016, (Accepted/In press) THE 10th MEDITERRANEAN CONFERENCE ON INFORMATION SYSTEMS, MCIS 2016, PAPHOS, CYPRUS, SEPTEMBER 4-6, 2016. UNIVERSITY OF NICOSIA, P.O.Box 24005, 1700 ΛΕΥΚΩΣΙΑ, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    L'insegnamento della letteratura italiana come scuola di educazione civica

    Jossa, S., 2013, Fare il cittadino: La formazione di un nuovo soggetto sociale nell’Europa tra XIX e XXI secolo. Botteri, I., Riva, E. & Scotto di Luzio, A. (eds.). Rubbettino, p. 131-146 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Liquid xenon for gamma-ray imaging of special nuclear materials

    Larsen, N. A. N. A., Bernard, E. P. E. P., Cahn, S. B. S. B., Edwards, B. W. H. B. W. H., Linck, E. E., Lyashenko, A. V. A. V., McKinsey, D. N. D. N., Nikkel, J. A. J. A., Rhyne, C. A. C. A., Shin, Y. Y., Tennyson, B. P. B. P., Wahl, C. G. C. G., Destefano, N. E. N. E., Gai, M. M. & De Silva, M. S. M. S., 1 Dec 2012, 2012 IEEE International Conference on Technologies for Homeland Security, HST 2012. p. 378-383 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

    Shepherd, C., Markantonakis, K. & Jaloyan, G-A., May 2021, IEEE Workshop on the Internet of Safe Things: IEEE Security and Privacy Workshops (in conjunction with IEEE Security & Privacy '21). IEEE, Vol. 1. p. 221-227 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    LISABETH: Automated Content-based Signatures Generator for Zero-day Polymorphic Worms

    Cavallaro, L., Lanzi, A., Mayer, L. & Monga, M., 2008, International Workshop on Software Engineering for Secure Systems (SESS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Live and Trustworthy Forensic Analysis of Commodity Production Systems

    Martignoni, L., Fattori, A., Paleari, R. & Cavallaro, L., 15 Sep 2010, Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010: Proceedings. Springer, p. 297-316 (Lecture Notes in Computer Science; vol. 6307).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Load Optimisation and its Influence on Automotive Supply Chain

    Shah, S. & Hong, H. W., 15 Nov 2021, 2021 26th International Conference on Automation and Computing (ICAC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Local Thermophysical Properties Measurements on Polymers using Doped Silicon SThM Probe: Uncertainty Analysis and Interlaboratory Comparison

    Guen, E., Chapuis, P. O., Klapetek, P., Puttock, R., Hay, B., Allard, A., Maxwell, T., Renahy, D., Valtr, M., Martinek, J. & Gomès, S., 31 Dec 2018, THERMINIC 2018 - 24th International Workshop on Thermal Investigations of ICs and Systems, Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. 8593308. (THERMINIC 2018 - 24th International Workshop on Thermal Investigations of ICs and Systems, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Location Based Application Availability

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2009, On the Move to Meaningful Internet Systems: OTM 2009 Workshops. Meersman, R., Herrero, P. & Dillon, T. (eds.). Vilamoura, Portugal: Springer, Vol. 5872/2009. p. 128 - 138 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Location Tracking Using Smartphone Accelerometer and Magnetometer Traces

    Nguyen, D. K. A., Akram, R. N., Markantonakis, K., Luo, Z. & Watkins, C., 26 Aug 2019, The First Location Privacy Workshop (LPW 2019), the 14th International Conference on Availability, Reliability and Security (ARES 2019). Association for Computing Machinery (ACM), p. 1-9 9 p. 96

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Unpublished

    Location-based games as platforms for site-specific storytelling

    Lowe, J., 15 Jul 2020, (Unpublished) Canterbury Arts E-Conference 2020.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Log Your Car: Reliable Maintenance Services Record

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 2017, Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Springer, Vol. 10143. p. 484-504 21 p. (Lecture Notes in Computer Science ; vol. 10143).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Log Your Car: The Non-invasive Vehicle Forensics

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 974-982 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Logical Lego? Co-constructed perspectives on service design

    Heath, C., Coles-Kemp, L. & Hall, P., 2014, Proceedings of NordDesign 2014. Aalto Design Factory, p. 416 425 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution