Home > Publications

Publications

2501 - 3000 out of 42,928Page size: 500
  1. Other contribution › Research
  2. Published

    Imagine... orientations towards a geoaesthetics, an aesthetics for the Anthropocene

    Hawkins, H., 2014, Tomas Saraceno, Magazine for Cloud Cities.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  3. Published

    India Decriminalises Homosexuality

    Mukherjee, U., 10 Sep 2018, Discover Society. Social Research Publications

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  4. Published

    Influence diagrams and structured retrieval: garnata implementing the SID and CID models at INEX'06

    De Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 1 Jan 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4518 LNCS. p. 165-177 13 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  5. Published

    Interfacing with Smart Card Applications (The PC/SC and OpenCard Framework)

    Markantonakis, K., 1999, Interfacing with Smart Card Applications (The PC/ SC and OpenCard Framework). 2 ed. Elsevier, Vol. 4. p. 69 77 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  6. Unpublished

    International M&As: HR’s contribution to success

    Edwards, T. & Rees, C., Nov 2003, (Unpublished) Chartered Institute of Personnel and Development (CIPD) International Forum. London

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  7. In preparation

    James Shirley, ‘Introduction to the Irish Plays’ and ‘The Royal Master’, in eds. Eugene Giddens, Teresa Grant and Barbara Ravelhofer, The Complete Works of James Shirley, 10 vols, (Oxford University Press, forthcoming 2015--).

    Rankin, D., 2016, (In preparation) The Complete Works of James Shirley. Oxford: Oxford University Press

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  8. Published

    Jean-Luc Godard dans la relève des Archives du Mal (Paris: L'Harmattan, 2017) by Saad Chakali (review)

    Williams, J., Jul 2018, French Studies . p. 481-482 Vol 72:3

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  9. Published

    Lady Precious Stream [Research Performance]

    Thorpe, A., Dec 2011, Bulmeshe Theatre, University of Reading / Islington Chinese Association.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  10. Published

    Leakage from Montgomery Multiplication

    Walter, C. D., 2008, Cryptographic Engineering. Koç, Ç. (ed.). Springer, p. 431-449 19 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  11. Published

    Learning latent semantic relations from clickthrough data for query suggestion

    Ma, H., Yang, H., King, I. & Lyu, M. R., 1 Jan 2008, International Conference on Information and Knowledge Management, Proceedings. p. 709-718 10 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  12. Published

    LEGO Proof Development System: User's Manual

    Luo, Z. & Pollack, R., 1992, LFCS Report Series. LFCS, Edinburgh Univ

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  13. Published

    LGBT Voices: Sharing Our Past, Shaping Our Future

    Summerskill, C. (ed.), Nov 2014, LGBT Voices. Stonewall Publications, 55 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  14. Published

    Link-based text classification using Bayesian networks

    De Campos, L. M., Fernández-Luna, J. M., Huete, J. F., Masegosa, A. R. & Romero, A. E., 1 Jan 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6203 LNCS. p. 397-406 10 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  15. Published

    Lovers and legislators of the world

    Berry, M., 12 Nov 2021, Liszt Harmonies poétiques et religieuses. Pentatone, p. 4-10 7 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  16. Published

    Making and Marking

    Hawkins, H., 2012, Drawing Place and Permanence. Biggs, I. (ed.). University of West of England, p. 4-10

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  17. Published

    Managing socio-technical interactions in healthcare systems

    El-Hassan, O., Fiadeiro, J. L. & Heckel, R., 1 Jan 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4928 LNCS. p. 347-358 12 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  18. Published

    Marcus Aurelius

    Sellars, J., 2015, Oxford Bibliographies in Philosophy. Pritchard, D. (ed.). Oxford University Press

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  19. Published

    'Martin Citywit'

    Roberts, A., 2 Apr 2012, Pandemonium: Stories of the Smoke. . Shurin, J. & Perin, A. (eds.). Jurassic London

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  20. Published

    Meerkat Mining and Processing plc: A teaching case study on budgeting, performance and control

    Gee, M., 2018, Management and Cost Accounting: Mind Tap®. Drury, C. (ed.). 10th ed. Cengage Learning

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  21. Published

    Mining social networks using heat diffusion processes for marketing candidates selection

    Ma, H., Yang, H., Lyu, M. R. & King, I., 1 Jan 2008, International Conference on Information and Knowledge Management, Proceedings. p. 233-242 10 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  22. Published

    Modular Arithmetic

    Contini, S., Koç, Ç. K. & Walter, C. D., 2005, Encyclopedia of Cryptography and Security. Tilborg, H. C. A. V. (ed.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  23. Published

    Modular Arithmetic

    Contini, S., Koç, Ç. K. & Walter, C. D., 2011, Encyclopedia of Cryptography and Security (2nd Ed.). Tilborg, H. C. A. V. & Jajodia, S. (eds.). Springer, p. 795-798 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  24. Published

    Montgomery Arithmetic

    Koç, Ç. K. & Walter, C. D., 2005, Encyclopedia of Cryptography and Security. Tilborg, H. C. A. V. (ed.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  25. Published

    Mourning, Variation, Transcription, Completion: Programme essay on works by Liszt, Mozart, and Busoni (Igor Levit recital)

    Berry, M., Jul 2019, Salzburg Festival programmes. Salzburger Festspiele

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  26. Published

    Mozart and Lorenzo Da Ponte

    Berry, M., Nov 2012, Royal Opera House programme to Don Giovanni. Royal Opera House Publications, p. 16-20 5 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  27. Published

    Musical mysteries: melodies lost and found: Programme note for Camerata Salzburg/Patricia Kopatchinskaja concert: works by Ligeti, Schubert, Dowland, and Kurtág, and Byzantine Chant

    Berry, M., Aug 2020, Salzburg Festival programme. Salzburger Festspiele

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  28. Published

    My Beethoven: The Spirit of Hope

    Berry, M., 1 Dec 2020, The Cross-Eyed Pianist.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  29. Published

    New utility models for the garnata information retrieval system at INEX'08

    De Campos, L. M., Fernández-Luna, J. M., Huete, J. F., Martín-Dancausa, C. & Romero, A. E., 1 Jan 2009, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5631 LNCS. p. 39-45 7 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  30. Published

    Non-commutative Formulas and Frege Lower Bounds: a New Characterization of Propositional Proofs

    Li, F., Tzameret, I. & Wang, Z., 30 Dec 2014, ArXiV. p. 1 32 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  31. Published

    Numerical simulations of a flux qubit coupled to a high quality resonator

    Lindstroem, T., Webster, C. H., Healey, J. E., Colclough, M. S., Muirhead, C. M. & Tzalenchuk, A., 2008, 8th European Conference on Applied Superconductivity. Vol. 97. p. 012319 (Journal of Physics Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  32. Published

    Obituary of Anne Wiazemsky

    Williams, J., 10 Oct 2017, The Guardian. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  33. Published

    On the challenge of engineering socio-technical systems

    Fiadeiro, J. L., 1 Jan 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5380 LNCS. p. 80-91 12 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  34. Published

    On Wanting the Moon: Avant-Garde Women and Ambition

    Hemus, R., 2012, Women of the Avant-Garde 1920-1940: Sophie Taeuber-Arp, Claude Cahun, Sonia Delaunay, Germaine Dulac, Florence Henri, Hannah Höch, Katarzyna Kobro, Dora Maar. Juul Holm, M., Degel, K., Marcus, M. & Rank, J. (eds.). Denmark: Louisiana Museum of Modern Art, p. 18-29 12 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  35. Published

    Partitional Clustering of Malware Using K-Means

    Amorim, R. C. D. & Komisarczuk, P., 2014, Cyberpatterns, Unifying Design Patterns with Security and Attack Patterns. p. 223-233 11 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  36. Published

    'Patagonian Ice Sheet deglaciation and paleo-lake evolution in the Río Cisnes-Ñirehuao-Toqui basins, Chile (44–45° S)' in: Proceedings of the Innsbruck Summer School of Alpine Research 2019: Abstract

    Cooper, E., 30 Jul 2019, Close Range Sensing Techniques in Alpine Terrain: Proceedings of the Innsbruck Summer School of Alpine Research 2019. IGF Forschungsberichte / IGF Research Reports, p. 40 1 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  37. Published

    Performance Evaluation of the TUAK algorithm in support of the GSMA and ETSI SAGE standardisation group

    Mayes, K., 31 Oct 2014, Crisp Telecom.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  38. Published

    Plaque

    Cole, J., 15 Nov 2016, Emergency Index. New York: Ugly Duckling Presse, Vol. 5. p. 36-37 2 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  39. Published

    Playing and meaning Bach

    Berry, M., Feb 2021, Bach Nostalghia (Francesco Piemontesi). Pentatone

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  40. Published

    'Practising Participation: A Conversation with Lone Twin'

    Lavery, C. & Williams, D., 2011, Performance Research: 'On Participation'. 4 ed. England: Taylor & Francis / Performance Research, Vol. 16. p. 7-14 8 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  41. Published

    Predictive random graph ranking on the web

    King, I., Lyu, M. R. & Yang, H., 1 Jan 2006, IEEE International Conference on Neural Networks - Conference Proceedings. p. 1825-1832 8 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  42. Published

    Predictive ranking: A novel page ranking approach by estimating the web structure

    Yang, H., King, I. & Lyu, M. R., 1 Jan 2005, 14th International World Wide Web Conference, WWW2005. p. 944-945 2 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  43. Published

    Preispitivanje konvencionalnih pretpostavki o ulozi žene u društvu

    Akbas, A., Jan 2017, Akademija političkog osnaživanja žena. Sarajevo, Banja Luka: Transparency International, Bosnia and Herzegovina, p. 28-34

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  44. Published

    Probabilistic methods for link-based classification at INEX 2008

    De Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 1 Jan 2009, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5631 LNCS. p. 453-459 7 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  45. Published

    Probabilistic methods for structured document classification at INEX07

    De Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 1 Jan 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4862 LNCS. p. 195-206 12 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  46. Published

    Proceedings of the 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware, LADIS 2010: Foreword

    Aguilera, M. K., Shapiro, M., Vigfusson, Y. & Chockler, G., 2010, Proceedings of the 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware, LADIS 2010.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  47. Published

    Programme note for Mozart's three last symphonies (nos 39-41)

    Berry, M., Aug 2013, Salzburg Festival programme. Salzburger Festspiele

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  48. Published

    Programme note for recital (violin and piano)

    Berry, M., 16 Jul 2013, Wigmore Hall programme.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  49. Published

    Programme note: Die Walküre Act I and Siegfried-Idyll

    Berry, M., Aug 2013, Salzburg Festival programme. Salzburger Festspiele

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  50. Published

    Programme note: Mozart and the voice

    Berry, M., Aug 2013, Salzburg Festival programme. Salzburger Festspiele

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  51. Published

    Programme note: two Wagner excerpts

    Berry, M., Aug 2013, Salzburg Festival programme. Salzburger Festspiele

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  52. Published

    Proof Complexity Lower Bounds from Algebraic Circuit Complexity

    Forbes, M., Shpilka, A., Tzameret, I. & Wigderson, A., 1 Oct 2017, Theory of Computation (ToC) . p. 1 78 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  53. Published

    Properties of high-quality coplanar waveguide resonators for QIP and detector applications

    Lindstroem, T., Healey, J. E., Colclough, M. S., Webster, C. H., Muirhead, C. M. & Tzalenchuk, A., 2009, 25th International Conference on Low Temperature Physics. Vol. 150. p. 052140 (Journal of Physics Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  54. Published

    Properties of Tl2Ba2CaCu2O8 step and bicrystal junctions and dc-SQUIDs on LaAlO3 substrates

    Chen, Y. F., Ivanov, Z. G., Stepantsov, E. A., Tzalenchuk, A. Y., Zarembinski, S., Vasiliev, A. L., Olsson, E., Yi, H. R., Claeson, T. & Johansson, L. G., 1995, Applied Superconductivity 1995, Vols. 1 and 2: Vol 1: Plenary Talks and High Current Applications; Vol 2: Small Scale Applications. Vol. 148. p. 1335-1338 4 p. (Institute of Physics Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  55. Unpublished

    ProVerif Model of the Robust Multiple IMSI Scheme

    Khan, M., May 2017, (Unpublished) Supplementary files for paper published in WiSec 2017 .

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  56. Published

    Proving atomicity: An assertional approach

    Chockler, G., Lynch, N., Mitra, S. & Tauber, J., 2005, Proceedings of the 19th International Conference on Distributed Computing (DISC '05). p. 152-168 17 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  57. Published

    Public Interest

    Hanretty, C., 2016, The international encyclopedia of political communication. Mazzoleni, G., Ikeda, K. & Barnhurst, K. (eds.). Oxford: Wiley-Blackwell, Vol. 3.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  58. Published

    Published Work

    Reid, J., 2013, Various.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  59. Published

    Purchase power: the marketing of performance and its discursive effects

    Thorpe, A., 2014, Contemporary Theatre Review Interventions.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  60. Published

    Quantum Hall Resistance Standard based on Graphene

    Janssen, T. J. B. M. & Tzalenchuk, A., 2010, 2010 Conference on Precision Electromagnetic Measurements Cpem. p. 579-580 2 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  61. Published

    Randomised Exponentiation Algorithms

    Walter, C. D., 2008, Cryptographic Engineering. Koç, Ç. (ed.). Springer, p. 451-473 23 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  62. Published

    Raoul Coutard obituary

    Williams, J., 9 Nov 2016, The Guardian. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  63. Unpublished

    Recent developments in cross-border mergers

    Rees, C. & Edwards, T., Nov 2000, (Unpublished) Kingston Business School Research Seminar. Kingston University

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  64. Published

    Reflections on Careers, JBE and Business Ethics

    Spence, L., 2013, Citation Classics from the Journal of Business Ethics. Michalos, A. & Poff, D. (eds.). Dordrecht: Springer, p. 691-803

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  65. Published

    Responsible lobbying

    Anastasiadis, S. & Wagner, S., 2013, UN Global Compact International Yearbook 2013. United Nations Global Compact

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  66. Published

    Review of Kelsey L. Haskett, Dans le miroir des mots: identité féminine et relations familiales dans l'œuvre romanesque de Marguerite Duras (Birmingham, AL: Summa, 2011)

    Williams, J., Jan 2013, French Studies . 1 ed. Oxford , Vol. 67. p. 124 1 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  67. Published

    Review of Will Higbee, Post-Beur Cinema: North African Emigre and Maghrebi-French Filmmaking in France since 2000

    Williams, J., Jun 2014, French Studies. 3 ed. Oxford , Vol. 68. p. 442-442 1 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  68. Published

    SCRUB

    Harris, C., Sandhu, K. & Wallace, N., Oct 2020, Green Blues. p. 17-22 6 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  69. Published

    Semantics from narrative: state of the art and future perspectives

    Murtagh, F., Ganz, A. & Reddington, J., 2011, Statistical Learning and Data Science. Summa, M. G., Bottou, L., Goldfarb, B., Murtagh, F., Pardoux, C. & Touati, M. (eds.). Taylor and Francis, (Computer Science and Data Analysis).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  70. Published

    Semi-nonnegative matrix factorization with global statistical consistency for collaborative filtering

    Ma, H., King, I., Lyu, M. R. & Yang, H., 1 Jan 2009, International Conference on Information and Knowledge Management, Proceedings. p. 767-775 9 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  71. Published

    Separating distribution from coordination and computation as architectural dimensions

    Fiadeiro, J. L., 1 Jan 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4037 LNCS. p. 17 1 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  72. Published

    Sierra Ltd: A teaching case study on costing and pricing practices

    Gee, M., 2018, Management and Cost Accounting: Mind Tap®. Drury, C. (ed.). 10th ed. Cengage Learning

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  73. Forthcoming

    Slavery and Anti-Slavery

    McGettigan, K., 20 Nov 2017, (Accepted/In press) Oxford Bibliographies in Victorian Literature. Oxford University Press Online

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  74. Published

    Small zeros of homogeneous cubic congruences

    Dietmann, R., 2013, Diophantine methods, lattices, and arithmetic theory of quadratic forms. Amer. Math. Soc., Providence, RI, Vol. 587. p. 59-68 10 p. (Contemp. Math.).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  75. Published

    Smart Card Technology in the Public Transport Industry: Secure Magazine - The Silicon Trust Report

    Markantonakis, K. & Mayes, K., Feb 2004, Secure Magazine - The Silicon Trust Report. 1 ed. The Silicon Trust, p. 26 29 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  76. Published

    SoRec: Social recommendation using probabilistic matrix factorization

    Ma, H., Yang, H., Lyu, M. R. & King, I., 1 Jan 2008, International Conference on Information and Knowledge Management, Proceedings. p. 931-940 10 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  77. Published

    Special Edition: A Scandinavian Perspective

    Brodzinski, E. (ed.) & Torrissen, W. (ed.), 2015, Journal of Applied Arts and Health. 2 ed. Intellect Books, Vol. 6.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  78. Published

    Specifying and composing interaction protocols for service-oriented system modelling

    Abreu, J., Bocchi, L., Fiadeiro, J. L., Lopes, A. & Fiadeiro, J. L., 1 Jan 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4574 LNCS. p. 358-373 16 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  79. Published

    SpiderCast: A scalable interest-aware overlay for topic-based pub/sub communication

    Chockler, G., Melamed, R., Tock, Y. & Vitenberg, R., 2007, Proceedings of the Inaugural International Conference on Distributed Event-Based Systems (DEBS’07). ACM, p. 14-25 12 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  80. Published

    Spin Ice, Fractionalization, and Topological Order

    Castelnovo, C., Moessner, R. & Sondhi, S. L., 2012, ANNUAL REVIEW OF CONDENSED MATTER PHYSICS, VOL 3. PALO ALTO: ANNUAL REVIEWS, Vol. 3. p. 35-55 21 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  81. Unpublished

    Structure and internal politics in MNCs

    Rees, C. & Edwards, T., Mar 1998, (Unpublished) Kingston Business School Research Seminar. Kingston University.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  82. Published

    Structured Co-spans: An algebra of interaction protocols

    Fiadeiro, J. L. & Schmitt, V., 1 Jan 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4624 LNCS. p. 194-208 15 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  83. Published

    Sums of two squares and a power

    Dietmann, R. & Elsholtz, C., 31 Dec 2016, From arithmetic to zeta-functions. Springer, [Cham], p. 103-108 6 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  84. Published

    Superconducting Nanostructures in a Single Step Process

    Cox, D., Kazakova, O., Bowyer, E., Favata, A. L. & Tzalenchuk, A., 2009, 25th International Conference on Low Temperature Physics. Vol. 150. p. 052275 (Journal of Physics Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  85. Published

    Superconducting thallium cuprate thin films; Processing and characterisation

    Johansson, L. G., Langer, V., Stepantsov, E. A., Litvinchuk, A., Borjesson, L., Chen, Y. F., Claeson, T., Ivanov, Z. G., Olsson, E. & Tzalenchuk, A. Y., 1995, Applied Superconductivity 1995, Vols. 1 and 2: Vol 1: Plenary Talks and High Current Applications; Vol 2: Small Scale Applications. Vol. 148. p. 797-800 4 p. (Institute of Physics Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  86. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1998, Recent Advances in Information Science and Technology. Mastorakis, N. (ed.). World Scientific, p. 157-161 5 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  87. Published

    The Annual Register 2003, Germany, Austria, Switzerland

    Sloam, J., 2004, The Annual Register 2003.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  88. Published

    The Emerging Industrial Relations of China, edited by William Brown and Chang Kai. Cambridge University Press, Cambridge, 2017, 266 pp

    Smith, C., Jun 2019, British Journal of Industrial Relations. 2 ed. Vol. 57. p. 416-418 3 p. 2

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  89. Published

    The Encyclopedia of Modern Political Thought

    Claeys, G. (ed.), 2013, The Encyclopedia of Modern Political Thought. Los Angeles: Sage publications, p. 2 vols 903 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  90. Published

    The EU issue space, party competition and news coverage of EP elections

    Banducci, S. & Hanretty, C., 2016, (Un)intended consequences of European Parliament elections. van der Brug, W. & de Vreese, C. (eds.). Oxford: Oxford University Press

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  91. Published

    The Garnata information retrieval system at INEX07

    De Campos, L. M., Fernández-Luna, J. M., Huete, J. F., Martín-Dancausa, C. & Romero, A. E., 1 Jan 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4862 LNCS. p. 57-69 13 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  92. Unpublished

    The industrial relations implications of TQM

    Rees, C., Mar 1994, (Unpublished) Industrial Relations Research Unit (IRRU) Seminar. University of Warwick.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  93. Published

    The Italian media between market and politics

    Hanretty, C., 2010, Italy Today: The Sick Man of Europe. Mammone, A. & Veltri, G. A. (eds.). London: Routledge

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  94. Unpublished

    The KBS employee engagement consortium project

    Truss, K., Soane, E., Rees, C., Alfes, K. & Gatenby, M., Jan 2009, (Unpublished) Department for Business, Enterprise and Regulatory Reform (BERR) Employee Engagement Review Meeting. London

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  95. Published

    The many faces of complexity in software design

    Fiadeiro, J. L., 2012, Conquering Complexity. Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  96. Published

    The Militarisation of Cyberspace: Implications for the Private Sector

    Macropoulos, C. & Martin, K. M., 2014, ISSA Journal. 11 ed. ISSA, Vol. 12. p. 32-36

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  97. Unpublished

    The people management implications of mergers & acquisitions: findings from a survey of CIPD members

    Edwards, T. & Rees, C., Sep 2000, (Unpublished) Chartered Institute of Personnel and Development (CIPD) International Forum. London

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  98. Published

    The Point of Culture: Brazil Turned Upside Down

    Spowage, C., 2013, ed. by Paul Heritage and Rosie Hunter, with Poppy Spowage. Lisbon: Calouste Gulbenkian Foundation

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  99. Unpublished

    The politics of international mergers & acquisitions

    Rees, C. & Edwards, T., Jun 2002, (Unpublished) Chartered Institute of Personnel and Development (CIPD) International Forum. London

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  100. Published

    The pragmatism of new work organization

    Edwards, P., Collinson, M. & Rees, C., 2003, in IRRU Briefing No.9. University of Warwick.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  101. Unpublished

    The role of HR in international mergers & acquisitions

    Edwards, T. & Rees, C., Nov 2001, (Unpublished) Chartered Institute of Personnel and Development (CIPD) Anglo-French Exchange. London

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  102. Published

    The Sea: 6 Waves

    Williams, D., 2009, Cupola Bobber: reading companion to the performance 'Way Out West, The Sea Whispered Me'. Chicago, USA, p. unpaginated

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  103. Published

    The Second Viennese School: Alban Berg, Arnold Schoenberg and Anton Webern

    Berry, M., 2019, Discovering Music. The British Library

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  104. Published

    The SENSORIA reference modelling language

    Fiadeiro, J., Bocchi, L., Lopes, A. & Abreu, J., 1 Jan 2011, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6582. p. 61-114 54 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  105. Published

    The Sisterhood of Medial Meta-Structure: Songs and the Other Side

    Santos, S., 2021, Love Spells and Rituals For Another World.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  106. Published

    The Six Wild Ways of the Oak

    Overend, D., Lorimer, J., Narbed, S., Swingler, J. & Twynholm, S., 28 Sep 2021, Making Routes: Journeys in Performance 2010-2020. Bissell, L. & Overend, D. (eds.). Triarchy Press

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  107. Unpublished

    The social partners and direct participation in Britain

    Rees, C., Feb 1994, (Unpublished) European Foundation EPOC Project Research Seminar. Milan.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  108. Published

    The Superconducting Super Proton Synchrotron

    D'Alessandro, G. L., Alden, S., Harryman, D., Ross, A., Dyks, L., Poshtuma de Boer, D. & Backhouse, M., Jul 2019, The Superconducting Super Proton Synchrotron. CERN Reports (ISSN 2519-8076)

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  109. Unpublished

    The transfer of organizational practices in MNEs: why?, how?, what?, who?

    Rees, C., Tan, H. & Moore, F., Jul 2010, (Unpublished) Chartered Institute of Personnel and Development (CIPD) International Forum Networking Meeting. London.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  110. Published

    The troubled early years of the Partito Democratico

    Hanretty, C. & Wilson, A., 2010, Italian Politics: A Review. Giuliani, M. & Jones, E. (eds.). New York: Berghahn

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  111. Unpublished

    The UK Takeover Code and the role of trade unions in the AIG takeover of BMI

    Rees, C. & Gold, M., Sep 2014, (Unpublished) 'Infpreventa' Research Project European Roundtable Meeting. London

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  112. Forthcoming

    Theatre History of The Tempest

    Dymkowski, C., 2016, (Accepted/In press) New Variorum edition of The Tempest. Gurr, A. (ed.). Modern Language Association of America

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  113. Published

    Toni Morrison on Reality TV, Black Lives Matter, and Meeting Jeff Bezos

    Mohamed, N., Oct 2016, Lithub.com. online

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  114. Published

    Towards passive terahertz imaging using a semiconductor quantum dot sensor

    Kulik, L., Antonov, V., Giblin, S., Kleinschmide, P. & Tzalenchuk, A., 2007, 2007 Joint 32nd International Conference on Infrared and Millimeter Waves and 15th International Conference on Terahertz Electronics, Vols 1 and 2. p. 352-353 2 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  115. Unpublished

    Trade union attitudes towards CSR across Europe: scepticism and engagement combined

    Rees, C., Preuss, L. & Gold, M., Apr 2015, (Unpublished) British Journal of Industrial Relations (BJIR) Workshop - CSR and Labour Standards: Bridging Private Governance, Industrial Relations and Management Perspectives.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  116. Unpublished

    Trade unions and the challenge of TQM

    Rees, C., Feb 1994, (Unpublished) Jim Conway Foundation Weekend School on 'The Organization of Work'. Northampton.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  117. Published

    Transatlantic Perspectives on the Use of Data Science in Museums and Heritage

    Platts, H., Howard, D., Dalton, P. & Watkins, C., Jul 2020, UK Research and Innovation.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  118. Published

    Transport in mesoscopic superconductors and superconducting/normal metal contacts

    Claeson, T., Delsing, P., Ivanov, Z., Kubatkin, S., Kuzmin, L., Olin, H., Petrashov, V., Shaikhadarov, R. S. & Tzalenchuk, A., 1998, Nanoscale Science and Technology. Vol. 348. p. 79-89 11 p. (Nato Advanced Science Institutes Series, Series E, Applied Sciences).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  119. Published

    Turning research ideas into reality: How can we better support ‘on the ground’ clinicians to become research active

    Barney, D., Reynolds, S., Blacklock, J., E, C., Bradbury, A., Creswell, C., Cox, E., Hosanye, Z., Jacobsen, P., Kunorubwe, P., Kent, T., Kingston, J., Loades, M., Priddy, J. & Stevens, R., Dec 2019, CBT Today. p. 18-20 2 p. 47(4)

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  120. Published

    Unanswered Questions: Programme note for Royal Opera House production of Strauss, Capriccio

    Berry, M., 19 Jul 2013, Royal Opera House programme for Strauss, Capriccio. Royal Opera House Publications

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  121. Published

    Unfolding in particle physics: a window on solving inverse problems: Lecture at the SOS 2012 – IN2P3 School of Statistics - May 28 – June 2, 2012

    Spano, F., 2013, EPJ Web of Conferences. 2013 ed. EDP Sciences - Web of Conferences, Vol. 55.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  122. Published

    Unpicking PLAID

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Guenther, F., Marson, G. A., Mittelbach, A. & Paterson, K. G., 2014, Security Standardisation Research. Chen, L. & Mitchell, C. (eds.). Springer International Publishing, Vol. 8893. p. 1-25 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  123. Published

    Validation of simplified mathematical model for turbidity currents

    Bitton, L. F., Martha, L. F., Waltham, D., Keevil, G. & Peakall, J., 1 Jan 2008, Proceedings - SPE Annual Technical Conference and Exhibition. Vol. 7. p. 4994-5002 9 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  124. Published

    Varieties of auditory distraction

    Jones, D. M., Hughes, R., Marsh, J. E. & Macken, W. J., 2008, Proceedings of the 9th International Congress on Noise as a Public Health Problem .

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  125. Published

    WATSUJI Tetsurō

    Murphy, M., 15 Jan 2016, http://globalsocialtheory.org/. Bhambra, G., Mayblin, L. & Tilley, L. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  126. Published

    What do semantics matter when the meat is overcooked?

    Fiadeiro, J. L., 1 Jan 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5065 LNCS. p. 563-580 18 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  127. Published

    WIth Gardens and poems from GARGANTUA

    Cole, J., 2015, Argument. RHUL/Oxunibooks

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  128. Published

    Workshop contributions

    Gilbert, D., 2002, Landing : Eight Collaborative Projects Between Artists and Geographers . Royal Holloway, University of London

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  129. Foreword/postscript › Research
  130. Published

    Afterword: Emblematic Landscapes of the British Modern

    Matless, D., Short, B. & Gilbert, D., 1 Jan 2003, Geographies of British Modernity: Space and Society in the Twentieth Century. Gilbert, D., Matless, D. & Short, B. (eds.). Blackwell Publishing, p. 250-257 8 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  131. Published

    Afterword

    Samson, J., 2019, Music, Language and Identity in Greece: Defining a National Art Music in the Nineteenth and Twentieth Centuries. Tambakaki, P., Vlagopoulos, P., Levidou, K. & Beaton, R. (eds.). Newcastle-upon-Tyne: Cambridge Scholars Publishing, p. 292-299 8 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  132. Published

    Dagsthul Seminar on Foundations of Global Computing

    Fiadeiro, J. L., Montanari, U. & Wirsing, M., 2006, Foundations of Global Computing. Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, Vol. 05081. (Dagstuhl Seminar Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  133. Published

    'Dedication': The Literary Legacy of Byzantium. Editions, Translations, and Studies in Honour of Joseph A. Munitiz SJ, ed. Bram Roosen and Peter Van Deun

    Dendrinos, C., 2019, Βυζάντιος: Studies in Byzantine History and Civilization. Turnhout: Brepols, Vol. 15. p. 1-3

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  134. Published

    Director's Note

    Overend, D., Aug 2017, The Majority by Rob Drummond. Bloomsbury Methuen Drama, p. 5-6

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  135. Published

    Editors' introduction

    Hutter, M., Stephan, F., Vovk, V. & Zeugmann, T., 2010, Proceedings of the Twentieth International Conference on Algorithmic Learning Theory. Berlin: Springer, Vol. 6331. p. 1-10 10 p. (Lecture Notes in Articial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  136. Published

    Evolving critical systems

    Hinchey, M., Nuseibeh, B., Coyle, L. & Fiadeiro, J. L., 1 Feb 2011, Dagsthul seminar. Vol. 34. p. 105-107 3 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  137. Published

    Foreword

    Hampson, R., 2012, False memory (by Tony Lopez). Shearsman/ University of Plymouth Press

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  138. Published

    Introduction

    Widder, N., 2012, I am your Anti-Matter. Chen, L-E. (ed.). Li-E Chen, p. 8-10 3 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  139. Published

    Introduction

    Sheppard, A., Jul 2013, Ancient Approaches to Plato's Republic. London: Institute of Classical Studies, London, p. 1-2 2 p. (BICS Supplements; no. 117).

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  140. Published

    Introduction

    Ansari, S., 2005, Decade of the Dacoits by Imdad Hussain Sahito. Karachi: OUP, p. ix-xv 7 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  141. Published

    Introduction

    Dymkowski, C., 1991, Eugene O’Neill, Long Day’s Journey into Night. London: Nick Hern Books, p. vii-xxvii

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  142. Published

    Introduction

    Dymkowski, C., 1991, Eugene O’Neill, Strange Interlude. London: Nick Hern Books, p. v-xxiii

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  143. Published

    Introduction

    Dymkowski, C. & vii-xxix, 1991, Anna Christie & The Emperor Jones: Introduction by Christine Dymkowski. London: Nick Hern Books

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  144. Published

    Introduction

    Dymkowski, C., 1992, Eugene O’Neill, A Moon for the Misbegotten. London: Nick Hern Books, p. v-xxvii

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  145. Published

    Introduction

    Dymkowski, C., 1992, Eugene O’Neill, Mourning Becomes Electra. London: Nick Hern Books, p. v-xxix

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  146. Published

    Introduction

    Dymkowski, C., 1993, Eugene O’Neill, The Hairy Ape and All God’s Chillun Got Wings. London: Nick Hern Books, p. vi-xxvi

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  147. Published

    Introduction

    Dymkowski, C., 1993, Eugene O’Neill, A Touch of the Poet. London: Nick Hern Books, p. v-xxv

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  148. Published

    Introduction

    Dymkowski, C., 1993, Eugene O’Neill, The Iceman Cometh. London: Nick Hern Books, p. v-xxvi

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  149. Published

    Introduction

    Dymkowski, C., 1995, Eugene O’Neill, Ah! Wilderness. London: Nick Hern Books, p. vii-xxvi

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  150. Published

    Introduction

    Dymkowski, C., 1995, Eugene O’Neill, Desire under the Elms and The Great God Brown. London: Nick Hern Books, p. vii-xxviii

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  151. Published

    Introduction: Hermann Hesse and Siddhartha in Context

    Hughes, J., Nov 2012, Hermann Hesse, Siddhartha : Special Limited Anniversary Edition. London: Peter Owen, p. 19-46 28 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  152. Published

    Introduction

    Sheppard, A., Sep 2015, BICS Virtual Issue on Ancient Philosophy. Sheppard, A. (ed.). Wiley-Blackwell, 6 p. (Bulletin of the Institute of Classical Studies).

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  153. Published

    Introduction

    Gabe, J. & Calnan, M., 5 May 2009, The New Sociology of the Health Service. Routledge Taylor & Francis Group, p. 1-16 16 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  154. Published

    Introduction to Folio Society edition of Selected Poems of Emily Dickinson

    Greenlaw, L., 1 Jun 2016, Emily Dickinson Selected Poems. London: Folio Society, p. xv-xxii 7 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  155. Published

    Introduction: "A presence queer unwelcome here": On Eris and Unhappiness

    Bullen, D., 2018, ERIS by John King. London and New York: Methuen Drama

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  156. Published

    Introduction: Le Pas Mal de Siecle

    Fordham, F. & Sakr, R., 2011, James Joyce and the 19th Century French Novel. Fordham, F. & Sakr, R. (eds.). Rodopi

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  157. Published

    Marjorie Reeves: A Personal Tribute

    Gould, W., 2011, The Life and Thought of Marjorie Reeves FBA (1905-2003): : Advocate for Humanist Scholarship and Opponent of Utilitarian University Education. Lewiston, Queenston, Lampeter: The Edwin Mellen Press, p. ii-xxiii 21 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  158. Published

    McMurdo's Account of Sind: An Introduction

    Ansari, S., 2008, McMurdo's Account of Sind (ed.). Karachi: OUP

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  159. Published

    Play it Again Morris: On Pianos, the Past, and all that Jazz

    Maclaran, P., 2015, Legends in Marketing – Morris B. Holbrook, Volume 6:. Thousand Oaks, CA: Sage publications

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  160. Published

    Preface

    Gabe, J. & Calnan, M., 5 May 2009, The New Sociology of the Health Service. Routledge Taylor & Francis Group, p. ix-x

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  161. Published

    Preface

    Samson, T., 2019, Anetta Floirat, Karol Szymanowski à la rencontre des arts. Paris: Éditions Delatour, p. xi-xviii 8 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  162. Published

    Prefazione

    Dymkowski, C. & Gandolfi, R. (ed.), 2003, La Prima Regista: Edith Craig, fra rivoluzione della scena e cultura della donne. Roma: Bulzone Editore, p. 13-14

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  163. Published

    Proceedings – 4th International Conference on Business Process Management, BPM'06

    Dustdar, S., Fiadeiro, J. & Sheth, A., 1 Jan 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4102 LNCS.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  164. Published

    Proceedings – Conference on Algebra and Coalgebra in Computer Science, CALCO'05

    Fiadeiro, J. L. (ed.), Harman, N. (ed.), Roggenbach, M. (ed.) & Rutten, J. J. M. M. (ed.), 2005, Algebra and Coalgebra in Computer Science: First International Conference, CALCO 2005, Swansea, UK, September 3-6, 2005, Proceedings. Springer, Vol. 3629.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  165. Published

    Proceedings – Fundamental Aspects of Software Engineering, FASE'08

    Fiadeiro, J. & Inverardi, P., 1 Jan 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4961 LNCS.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  166. Published

    Proceedings – Workshop on Algebraic Development Techniques, WADT'06

    Fiadeiro, J. & Schobbens, P-Y., 1 Jan 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4409 LNCS.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  167. Published

    Recent Trends in Algebraic Development Techniques, 13th International Workshop, WADT '98, Lisbon, Portugal, April 2-4, 1998, Selected Papers

    Fiadeiro, J. L. (ed.), 1999, Lecture Notes in Computer Science. Springer, Vol. 1589.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  168. Published

    Reflections on a Family History

    Samson, J. & Piotr Myslakowski and Andrzej Sikorski, 2010, Fryderyk Chopin : The Origins. Warsaw: Narodowy Instytut Fryderyka Chopina, p. 7-10

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  169. Published

    Russell W. Belk: The Odyssian Wanderer

    Maclaran, P., 2014, An Alternative Approach: Re-Enchanting Consumption (Legends in Consumer Behavior: Russell Belk, Vol. 2). Sage publications, Vol. 2.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  170. Published

    Understanding medical dominance in the modern world

    Gabe, J., 1 Jan 2013, Challenging Medicine: Second Edition. Taylor and Francis Inc., p. xiii-xxxiv

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  171. Published

    이탈리아 파시즘 약사

    Moon, J., 19 Apr 2014, 쿠데타의 기술. Lee, S. & Jung, K. I. (eds.). Seoul, South Korea: echaeck, p. 286-300 15 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  172. Published

    쿠르찌오 말라파르테의 생애와 문학, 이탈리아 파시즘

    Moon, J., 19 Apr 2014, 쿠데타의 기술. Lee, S. & Jung, K. I. (eds.). Seoul, S.Korea: echaeck, p. 301-17 17 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  173. Conference contribution › Research
  174. Published

    "Doing battle": a metaphorical analysis of IT-induced cultural change

    Jackson, S., 2013, 13th International Conference on Knowledge, Culture and Change in Organisations, Vancouver, CA, 13 - 14 Jun .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  175. Published

    "Institutional Entrepreneurship Promotes Cluster Development in Yiwu".

    Rui, H., 2018, Proceedings of the 60th Annual Meeting of the Academy of International Business. June 25-28, 2018, Minneapolis, USA.. Academy of International Business

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  176. Published

    "Non giucando ... ma novellando": Primi appunti per una lettura comunitaria del Decameron

    Jossa, S., 2015, Levia Gravia: «Umana cosa è aver compassione degli afflitti…» Raccontare, consolare, curare nella narrativa europea da Boccaccio al Seicento. Vol. XV-XVI. p. 17-29 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  177. Published

    "Treten und getreten werden." Journalismus und Berufsschriftstellertum im Briefwechsel zwischen Karl Gutzkow und Levin Schücking.

    Peters, A., Jul 2013, Karl Gutzkow (1811-1878) Publizistik, Literatur und Buchmarkt zwischen Vormärz und Gründerzeit. Lukas, W. & Schneider, U. (eds.). First ed. Wiesbaden: Harrassowitz, Vol. 84. p. 223-237 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  178. E-pub ahead of print

    (One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes

    D'Anvers, J-P., Rossi, M. & Virdia, F., 1 May 2020, (E-pub ahead of print) Advances in Cryptology – EUROCRYPT 2020. Springer, p. 3-33 31 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  179. Unpublished

    .: "Immigration and neo liberalism: Three stories and counter accounts. Asian Pacific Interdisciplinary Research in Accounting, Kobe, Japan (International Conference: July, 2013).

    Agyemang, G., Lehman, C. R. & Annisette, M., 26 Jul 2013, (Unpublished) Asian Pacific Interdisciplinary Research In Accounting Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  180. Published

    ‘At home with royalty: Constructing the ancient Greek palace’

    Morgan, J., 2013, The Hellenistic Court. Erskine, A., Llewellyn-Jones, L. & Wallace, S. (eds.). Classical Press of Wales

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  181. Unpublished

    ‘Digital technologies and migration: Reducing inequalities or creating new ones?’: TREO Talk presentation

    Harindranath, G. & Unwin, T., 2019, (Unpublished) International Conference on Information Systems, 15th December, Munich, Germany..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  182. Published

    ‘If there is no struggle there is no victory’: Christiana Herringham and the British tempera revival

    Jones, M., Mar 2019, Tempera Painting 1800-1950: Experiment and Innovation from the Nazarene Movement to Abstract Art. Dietemann, P., Neugebauer, W., Ortner, E., Poggendorf, R., Reinkowski-Häfner, E. & Stege, H. (eds.). Archetype Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  183. Published

    ‘Karen Solie and the Poetics of the Open Road’

    Stevens, G., 2021, 2020 RHUL Humanities Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  184. Published

    ‘Me’ to ‘We’: Conflicts and Synergies in Doing the Collective Meal

    Khanijou, R., Cappellini, B. & Hosany, S., 2019, 52nd Academy of Marketing Conference, London, 2-4 July.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  185. Published

    ‘Resistance to Institutional Work: Power and Gender in the Fair Trade Cocoa Value Chain’

    McCarthy, L., 30 Nov 2014, Academy of Management Proceedings. Academy of Management

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  186. Published

    ‘The Encomium on St Barnabas by Alexander the Monk: ecclesiastical and imperial politics in 6th century Byzantium’

    Kyriacou, C. & Dendrinos, C., 9 Dec 2021, Κυπριακή Αγιολογία: Πρακτικά Β΄ Διεθνούς Συνεδρίου «Από τον άγιο Επιφάνιο στον άγιο Νεόφυτο τον Έγκλειστο (4ος-12ος αι.», Παραλίμνι, 13-15 Φεβρουαρίου 2014. Yiangou, T. X., Kakkoura, C., Christodoulou, P. C. & Papantoniou, P. N. (eds.). Agia Napa, Paralimni: Ιερά Μητρόπολις Κωνσταντίας - Αμμοχώστου, Πολιτιστική Ακαδημία "Ἀγιος Επιφάνιος", p. 374-415

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  187. Published

    “‘This is about the future’: voiceover, gesture and the subversion/perversion of virtuosity in 2018 for piano and multimedia by Neil Luck” at the Music and/as Process conference, Edinburgh Napier University

    Kanga, Z., 2018, Music and/as Process conference, Edinburgh Napier University.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  188. Unpublished

    “Agency in Germany’s ‘War on Terror’ – Applying a Multi-Modal Framework to Study Newspaper Representations of the Kunduz Air Strike in 2009”

    Van Efferink, L., 2015, (Unpublished) Bremen Conference on Multimodality (BREMM15).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  189. Submitted

    “Archive and Asylum – experiential memories of Kneehigh Theatre’s performance venue and theatre archive” at Shared Memories II Eastap Conference at the University of Lison, Portugal

    Trenchfield, C., 24 Sep 2019, (Submitted) Shared Memories II Eastap Conference at the University of Lison, Portugal.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  190. Published

    “Breaking down the remaining walls”: Prospects for EU-NATO co-operation

    Miskimmon, A., 2011, Security Policy Library 3/2011. Norwegian Atlantic Committee, (Security Policy Library; vol. 2011, no. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  191. Submitted

    “Kneehigh Theatre Company and Cultural Hybridisation”at Hybrid Practices: Methodologies, Histories, and Performance hosted by the School of Performing Arts at the University of Malta

    Trenchfield, C., 14 Mar 2019, (Submitted) Hybrid Practices: Methodologies, Histories, and Performance hosted by the School of Performing Arts at the University of Malta.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  192. Published

    “Refusing all Definite Form, the Abstract Horror”: Communication, Code and Power in the fiction of Stanislaw Lem

    Gene-Rowe, F., Jun 2015, Current Research in Speculative Fiction, 2015. Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  193. Published

    “The Theatre of the Invisible-Made-Visible”: Shakespeare and the Politics of Perception

    Ryan, K., 12 Sep 2015, Actes des congrès de la Société française Shakespeare. Vol. 33. p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  194. Published

    «In cibo e in ozio». Conviti cavallereschi

    Jossa, S., Jun 2013, Le tavole di corte tra Cinquecento e Settecento (Roma: Bulzoni, 2013). Merlotti, A. (ed.). Bulzoni, p. 59-74 16 p. (Europa delle Corti).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  195. Published

    0bserving play in a public square with a dancer, a writer and a painter.

    Coppard, H., 2014, International Play Association World Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  196. Published

    2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2004, Proceedings: 5th World Wireless Congress (WWC 2004), San Francisco, USA, May 25-28, 2004. Delson Group, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  197. Published

    30 years of Polish Government Spokespersons: History of governmental communication practice and their implications for education of Public Relations in Poland

    Chmiel, M., 2019, 10th International History of Public Relations Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  198. Published

    3D virtual environments and corporate learning: An empirical investigation of benefits

    Massey, A. P., Montoya, M. M. & Wu, P. F., 3 Apr 2013, Proceedings of the Annual Hawaii International Conference on System Sciences. p. 893-902 10 p. 6479940

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  199. Published

    4D-SETL a semantic data integration framework

    De Cesare, S., Foy, G. & Lycett, M., 2016, ICEIS 2016 - Proceedings of the 18th International Conference on Enterprise Information Systems. SciTePress, Vol. 1. p. 127-134 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  200. Published

    A ‘We’ Identity ‘In Action’? Collective Consumption Via Competence Co‐Performance in Newly Cohabited Couples

    Khanijou, R., Cappellini, B. & Hosany, S., 2018, 51st Academy of Marketing Conference, Stirling, 2-5 July.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  201. Published

    A 2-D Laser-wire Scanner at PETRA-III

    Aumeyr, T., Blair, G., Boogert, S., Boorman, G. & Bosco, A., 2010, Proceedings of IPAC'10, Kyoto, Japan. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  202. Published

    A Bayesian method with reparameterization for diffusion tensor imaging

    Zhou, D., Dryden, I. L., Koloydenko, A. & Li, B., 2008, Proceedings, SPIE conference. Medical Imaging. p. 69142J

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  203. Published

    A blended learning model for practical sessions

    Barreiro, N. & Pinto de Matos, C., 7 Nov 2016, Computer Science and Information Systems (FedCSIS), 2016 Federated Conference on. Gdansk: IEEE, p. 903-912 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  204. Published

    A board game for teaching internet engineering

    Komisarczuk, P. & Welch, I., 2006, Proceedings of the 8th Australasian Conference on Computing Education-Volume 52. p. 117-123 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  205. Published

    A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks

    Askoxylakis, I. G., Sauveron, D., Markantonakis, K., Tryfonas, T. & Traganitis, A., 2008, Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies. Washington, DC, USA: IEEE Computer Society Press, p. 193-202 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  206. Published

    A Buddhist monks’ performance and a play, in the context of the Buddhist ritual event of giving

    Utairat, M., 2015, International Federation for Theatre Research (IFTR) 2015, Hyderabad, India .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  207. Published
  208. Published

    A case study on the usability of NXT-G programming language

    Nguyen, K. A., Sep 2011, 23rd Annual Conference in Psychology of Programming (PPIG). York, England, 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  209. Published

    A Categorical Account of Replicated Data Types

    Gadducci, F., Melgratti, H., Roldán, C. & Sammartino, M., Dec 2019, 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2019. Chattopadhyay, A. & Gastin, P. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-15 15 p. 42. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 150).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  210. Published

    A client-side CardSpace-Liberty integration architecture

    Alrodhan, W. & Mitchell, C., 2008, IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA. ACM Press, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  211. Forthcoming

    A closer look at adaptive regret

    Adamskiy, M., Koolen, W., Chernov, A. & Vovk, V., 2012, (Accepted/In press) Proceedings of the Twenty Third International Conference on Algorithmic Learning Theory. Bshouty, N., Stoltz, G., Vayatis, N. & Zeugmann, T. (eds.). Berlin: Springer, Vol. 7568. p. 290 - 304 15 p. (Lecture Notes in Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  212. Published

    A cluster-based approach to consensus based distributed task allocation

    Smith, D., Wetherall, J., Woodhead, S. & Adekunle, A., 2014, 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing. p. 428-431 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  213. Published

    A Coding-Theoretic Approach to Recovering Noisy RSA Keys

    Paterson, K., Polychroniadou, A. & Sibborn, D., 2012, ASIACRYPT 2012. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658. p. 386-403 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  214. Published

    A collaborative framework for generating probabilistic contracts

    Martinelli, F., Saracino, A., Sgandurra, D. & Aldini, A., 1 May 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS). p. 139-142 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  215. Published

    A combinatorial framework for frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M., 2014, Proceedings of the Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory. p. 271 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  216. Published

    A Combined Study Investigating the Insoluble and Soluble Organic Compounds in Category 3 Carbonaceous Itokawa Particles Recovered by the Hayabusa Mission

    Chan, QHS., Zolensky, M., Burton, A., Clemett, S., Fries, M. & Kebukawa, Y., 2015, Hayabusa Symposium 2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  217. Published

    A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies

    Eagles, K., Markantonakis, K. & Mayes, K., 2007, Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems. Berlin, Heidelberg: Springer-Verlag, p. 161-174 14 p. (WISTP'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  218. Published

    A comparative analysis of online crowdfunding platforms in USA, Europe and Asia

    Kromidha, E., 2015, Proceedings of eChallenges e-2015 Conference, 25-26 November 2015. Vilnius, Lithuania, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  219. Published

    A comparative examination of the tensions of sustainability managers in Korean and Japanese MNCs

    Fontana, E., Shin, H., Oka, C. & Gamble, J., 1 Aug 2021, Academy of Management Annual Meeting Proceedings . 1 ed. Academy of Management, Vol. 2021.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  220. Published

    A Comparative GARCH Analysis of Macroeconomic Variables and Returns on FTSE 100 Implied Volatility Index Returns

    Alsheikhmubarak, A. & Giouvris, E., 13 Jul 2017, 43rd International Business Research Conference, Proceedings of : 13 - 15 July 2017, Ryerson University, Toronto, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  221. Published

    A Comparative GARCH Analysis of Macroeconomic Variables and Returns on FTSE 100 Implied Volatility Index Returns.

    Alsheikhmubarak, A. & Giouvris, E., 24 Jan 2018, International Business Academics Consortium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  222. Published

    A Comparative Study of Strategy Implementation Models

    Aboutalebi, R. & Tan, H., 11 Sep 2012, In: BAM (British Academy of Management), 26th Annual Conference of BAM: Management Research Revisited: Prospects for Theory and Practice. 11-13 September 2012, University of Cardiff, Cardiff, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  223. Published

    A comparison of differential optical absorption spectrometers for measurements of NO2, O3, SO2, and HONO

    Coe, H., Jones, R. L., Colin, R., Carleer, M., Harrison, R. M., Peak, J., Plane, J. M. C., Smith, N., Allan, B., Clemitshaw, K. C., Burgess, R. A., Platt, U., Etzkorn, T., Stutz, J., Pommereau, J. P., Goutail, F., NunesPinharanda, M., Simon, P., Hermans, C. & Vandaele, A. C., 1997, PROCEEDINGS OF EUROTRAC SYMPOSIUM '96 - TRANSPORT AND TRANSFORMATION OF POLLUTANTS IN THE TROPOSPHERE, VOL 2. SOUTHAMPTON: COMPUTATIONAL MECHANICS PUBLICATIONS LTD, p. 757-762 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  224. Published

    A comparison of social tagging designs and user participation

    Bentley, C. & Labelle, P., 2008, Proceedings from DC 2008: International Conference on Dublin Core and Metadata Applications. The Dublin Core Metadata Initiative, p. 205-205

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  225. Published

    A comparison of the cryptographic requirements for digital secure speech systems operating at different bit rates

    Mitchell, C. J., 1984, International conference on Secure Communication Systems, IEE, London, 22-23rd February 1984. IEE Press, p. 32-37 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  226. Published

    A Comparison of Three Implementations of Multi-Label Conformal Prediction

    Wang, H., Liu, X., Nouretdinov, I. & Luo, Z., 3 Apr 2015, Statistical Learning and Data Sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 241-250 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  227. Published

    A Comparison of Trust Models

    Sel, M., 15 Sep 2015, ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference. Pohlmann, N., Reimer, H. & Schneider, W. (eds.). Springer-Verlag, p. 206-215 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  228. Published

    A Comparison of Venn Machine with Platt's Method in Probabilistic Outputs

    Zhou, C., Nouretdinov, I., Luo, Z., Adamskiy, M., Coldham, N. & Gammerman, A., 2011, 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, Artificial Intelligence Applications and Innovations 2011, Corfu, Greece, September 15-18, 2011, Proceedings , Part II. . p. 483-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Submitted

    A Complete Analysis of the BKZ Lattice Reduction Algorithm

    Li, J. & Nguyen, P. Q., 2020, (Submitted) TBC.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  230. Published

    A Completeness Theory for Polynomial (Turing) Kernelization

    Hermelin, D., Kratsch, S., Soltys, K., Wahlström, M. & Wu, X., 2013, IPEC. Springer, Vol. LNCS 8246. p. 202 215 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  231. Published

    A Compositional Approach to Connector Construction

    Lopes, A., Wermelinger, M. & Fiadeiro, J. L., 2001, WADT. Springer, Vol. 2267. p. 201-220 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  232. A Comprehensive Formal Security Analysis of OAuth 2.0

    Fett, D., Küsters, R. & Schmitz, G., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1204-1215 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  233. Published

    A Comprehensive Symbolic Analysis of TLS 1.3

    Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T., 30 Oct 2017, ACM SIGSAC Conference on Computer and Commuincations Security. ACM, p. 1773-1788 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  234. Forthcoming

    A Conceptual Framework for Managing Expectations in Green IS Implementation

    Jackson, S. & Fearon, C., 17 Mar 2016, (Accepted/In press) 22nd IEEE International Technology Management Conference, Trondheim, Norway.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  235. Published

    A Conceptual Framework for Smartphone Security Among Arab Millennials

    Shah, M. & Ameen, N., 2019, UK Academy of Information Systems (UKAIS). p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  236. A conceptual framework towards continuous transformation of sustainable food manufacturing and logistics

    Ojo, O. O. & Shah, S., Jan 2020, Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020. Institute of Electrical and Electronics Engineers Inc., p. 209-214 6 p. 9051539. (Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  237. Published

    A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs

    Hashimoto, K., Katsumata, S., Postlethwaite, E., Prest, T. & Westerbaan, B., 13 Nov 2021, CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1441-1462 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  238. Published

    A Constructive Approach for Proving Data Structures’ Linearizability

    Lev-Ari, K., Chockler, G. & Keidar, I., 5 Nov 2015, Distributed Computing 29th International Symposium, DISC 2015 Tokyo, Japan, October 7–9, 2015 Proceedings. Moses, Y. (ed.). Springer-Verlag, Vol. 9363. p. 356–370 15 p. 97. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. Published

    A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2009, Hannover, Germany, June 22-24, 2009. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  240. Published

    A contingency approach to entrepreneurial leadership: an exploratory case study of two Chinese private enterprises

    Wang, C. L., Tee, D. D. & Ahmed, P. K., 2011, 34th Annual Institute for Small Business and Entrepreneurship Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  241. Published

    A contract-based event driven model for collaborative security in financial information systems

    Baldoni, R., Lodi, G., Chockler, G., Dekel, E., Mulcahy, B. P. & Martufi, G., 2010, ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems. p. 147-153 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  242. Published

    A Cooperative Information System for the Connected Communities

    Pitt, J., Mamdani, E. & Stathis, K., 1 May 1998, Proceedings of COOP'98: Improving the Design of Cooperative Systems. Darses, F. & Zarate, P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  243. Published

    A cost bounded possibilistic ATMS

    Bigham, J., Luo, Z. & Banerjee, D., 1995, European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Lecture Notes in Computer Science . Froidevaux, C. & Kohlas, J. (eds.). Springer, Vol. 946. p. 52-59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  244. Published

    A cost bounded possibilistic ATMS

    Bigham, J., Luo, Z. & Banerjee, D., 1994, Proceedings of Expert Systems 94 . Bramer, M. A. & Macintosh, A. L. (eds.). p. 161-172

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  245. Published

    A criterion for the existence of predictive complexity for binary games

    Kalnishkan, Y., Vovk, V. & Vyugin, M. V., 2004, Proceedings of the Fifteenth International Conference on Algorithmic Learning Theory. Ben-David, S., Case, J. & Maruoka, A. (eds.). Heidelberg: Springer, Vol. 3244. p. 249-263 15 p. (Lecture Notes in Artificial Intelligence; vol. 3244).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  246. Published

    A Critique of Game-Based Definitions of Receipt-Freeness for Voting

    Fraser, A., Quaglia, E. & Smyth, B., 26 Sep 2019, Provable Security : 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings. Springer, Vol. 11821. p. 189-205 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  247. Published

    A Cryptographic Analysis of the WireGuard Protocol

    Dowling, B. & Paterson, K. G., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer-Verlag, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  248. Published

    A cultural theory analysis of information systems adoption

    Jackson, S., 2010, AMCIS 2010: 16th Americas Conference on Information Systems: Sustainable IT Collaboration around the Globe, Lima, PE, 12 - 15 Aug .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  249. Published

    A device management framework for secure ubiquitous service delivery

    Leung, A. & Mitchell, C. J., 2008, Proceedings: the Fourth International Symposium on Information Assurance and Security (IAS 2008), Naples, Italy, September 2008. Los Alamitos, CA: IEEE Computer Society Press, p. 267-274 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  250. Published

    A dialectic architecture for computational autonomy

    Witkowski, M. & Stathis, K., 2004, Agents and computational autonomy: potential, risks, and solutions. Springer-Verlag, Vol. 2969. p. 261-273 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  251. Published

    A Distributed Treatment of Exceptions in Multiagent Contracts (Preliminary Report)

    Kafali, O. & Yolum, P., 2011, Proceedings of the 9th International Workshop on Declarative Agent Languages and Technologies (DALT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  252. Published

    A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation

    Walter, C. D., 2012, CT-RSA. Dunkelman, O. (ed.). Springer, Vol. 7178. p. 84-97 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  253. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Sep 2010, 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  254. Published

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 146-157 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  255. Published

    A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins

    Zhang, Q., Markantonakis, K. & Mayes, K., 2007, A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins. China: Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  256. Published

    A Fair Biometric Enabled M-Payment Solution with Anonymity Support

    Zhang, Q., Mayes, K. & Markantonakis, K., 2005, A Fair Biometric Enabled M-Payment Solution with Anonymity Support. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  257. Published

    A FAST Front End Application

    Stathis, K., 1 Apr 1994, Proceedings of the 2nd International Conference on the Practical Applications of Prolog (PAP'94). Sterling, L. (ed.). p. 537-548 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  258. Published

    A Fast Glimpse of Knowledge-Based Front-Ends as Games

    Stathis, K. & Sergot, M. J., 1 Oct 1996, Proc. of 1st International Conference on Successes and Failures of Knowledge-Based Systems in Real World Applications. Batanov, D. & Brezillon, P. (eds.). Bangkok, Thailand: AIT Press, p. 19-33 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  259. Published

    A Faster Fixed-Parameter Approach to Drawing Binary Tanglegrams

    Böcker, S., Hüffner, F., Truss, A. & Wahlström, M., 2009, Parameterized and Exact Computation : 4th International Workshop, IWPEC 2009. Chen, J. & Fomin, F. V. (eds.). Copenhagen, Denmark: Springer, Vol. 5917. p. 38-49 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  260. Published

    A Fibre Coupled, Low Power Laserwire Emittance Scanner at CERN LINAC4

    Gibson, S., Boorman, G., Bosco, A., Kruchinin, K., Hofmann, T., Roncarolo, F., Pozimski, J., Gabor, C. & Letchford, A., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 3725-3728 4 p. THPME190

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  261. Published

    A flexible object-oriented system for teaching and learning structured IR

    de Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 2007, Proceedings of the First International Workshop on Teaching and Learning of Information Retrieval. London (UK), 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  262. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  263. E-pub ahead of print

    A Formal Model for Checking Cryptographic API Usage in JavaScript

    Mitchell, D. & Kinder, J., 15 Sep 2019, (E-pub ahead of print) ESORICS'19: Proceedings of the 24th European Symposium on Research in Computer Security. Springer, Vol. 11735. p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  264. Forthcoming

    A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N. & Würtele, T., 3 Jul 2021, (Accepted/In press) 43rd IEEE Symposium on Security and Privacy (S&P 2022). Institute of Electrical Engineers

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  265. Published

    A formal transformation and refinement method for re-engineering concurrent programs

    Younger, E., Bennett, K. & Luo, Z., 1997, Proc of IEEE Inter. Conf. on Software Maintenance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. Published

    A four-element framework for research on the composite materials supply chain

    Mastrocinque, E., Coronado Mondragon, A. E. & Hogg, P., 16 Jun 2015, Engineering Technology, Engineering Education and Engineering Management: Proceedings of the International Conference on Engineering Technologies, Engineering Education and EngineeringManagement (ETEEEM 2014), Hong Kong, 15-16 November 2014. Tan, D. (ed.). CRC Press, p. 423-426 4 p. 94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  267. E-pub ahead of print

    A Framework for Cloud ERP System Implementation in Developing Countries: Learning from Lower Local Governments in Uganda

    Mpanga, D. & Elbanna, A., 19 May 2019, (E-pub ahead of print) IFIP WG 8.6 Conference 2019. p. 274-292 19 p. (AICT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  268. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H., 2009, Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  269. A Framework for Improving the Sharing of Manufacturing Knowledge through Micro-Blogging

    Evans, R. D., Gao, J. X., Owodunni, O., Shah, S., Mahdikhah, S., Messaadia, M. & Baudry, D., 24 Sep 2014, Advances in Production Management Systems: Innovative and Knowledge-Based Production Management in a Global-Local World - IFIP WG 5.7 International Conference, APMS 2014, Proceedings. PART 1 ed. Springer New York LLC, p. 19-26 8 p. (IFIP Advances in Information and Communication Technology; vol. 438, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  270. Published

    A Framework for the Cryptographic Enforcement of Information Flow Policies

    Alderman, J., Crampton, J. & Farley, N., 7 Jun 2017, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 143-154 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  271. E-pub ahead of print

    A framework for understanding the empowerment effects of telecentres on rural communities in developing countries

    Kapondera, S. K., Bernadi, R. & Panteli, N., 26 Apr 2019, (E-pub ahead of print) Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D: 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1–3, 2019, Proceedings, Part I. Nielsen, P. & Kimaro, H. C. (eds.). Springer, p. 104-115 12 p. (IFIP Advances in Information and Communication Technology; vol. 551).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  272. Published

    A Full Operational Semantics for Asynchronous Relational Networks

    Vissani, I., Lopez Pombo, C., Tutu, I. & Fiadeiro, J. L., 30 Dec 2015, Recent Advances in Algebraic Development Techniques. Springer, p. 131-150 20 p. (Lecture Notes in Computer Science; vol. 9463).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  273. E-pub ahead of print

    A Functional Perspective on Machine Learning via Programmable Induction and Abduction

    Cheung, S., Davariu, V., Ghica, D., Muroya, K. & Rowe, R., 24 Apr 2018, (E-pub ahead of print) FLOPS 2018: Functional and Logic Programming. Springer, Vol. 10818. p. 84-98 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  274. Published

    A game of “Cut and Mouse”: bypassing antivirus by simulating user inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 9 Dec 2019, The Annual Computer Security Applications Conference (ACSAC). ACM, p. 456-465 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  275. Published

    A game of prediction with expert advice

    Vovk, V., 1995, Proceedings of the Eighth Annual Conference on Computational Learning Theory . Maass, W. (ed.). New York: ACM Press, p. 51-60

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  276. Unpublished

    A Gender Agenda

    Broadbent, J., 2015, (Unpublished) Meditari Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  277. Published

    A Generic NFC-enabled Measurement System for Remote Monitoring and Control of Client-side Equipment

    Opperman, C. & Hancke, G., 2011, IEEE International Workshop on Near Field Communication . IEEE, p. 44-49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  278. Published

    A graph based architectural (re)configuration language

    Wermelinger, M., Lopes, A. & Fiadeiro, J. L., 1 Jan 2001, 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2001. p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  279. Published

    A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs

    Bilal, Z. & Martin, K. M., 2014, Foundations and Practice of Security. Springer, Vol. 8352. p. 291-305 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  280. Published

    A High Power Fibre Laser for Electron Beam Emittance Measurements

    Corner, L., Nevay, L. J. & Walczak, R., 1 Dec 2010, IPAC 2010 - 1st International Particle Accelerator Conference. p. 3227-3229 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  281. Published

    A Holistic Approach to Simulating Beam Losses in the Large Hadron Collider Using BDSIM

    Walker, S., Abramov, A., Boogert, S., Garcia Morales, H., Gibson, S., Nevay, L., Pikhartova, H. & Shields, W., 4 May 2019, 13th International Computational Accelerator Physics Conference: ICAP2018, Key West, FL, USA. JACoW Publishing, p. 221-226 6 p. TUPAF15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  282. Published

    A Hybrid Model for International Strategy Implementation

    Aboutalebi, R. & Tan, H., 23 Jun 2014, In: AIB (Academy of International Business), 56th annual conference of AIB: International Business, Local Contexts in Global Business. 23-26 June 2014, Beedie School of Business, Simon Fraser University, Vancouver, Canada..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  283. Published

    A knowledge management perspective on a corporate portal implementation: A case study of a global IT-management consultancy firm

    Le Nguyen, K., Harindranath, G. & Dyerson, R., 2008, Proceedings of the 2008 European Conference on Information Systems (ECIS), Galway, Ireland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  284. Published

    A Lambek Calculus with Dependent Types

    Luo, Z., 2015, Types for Proofs and Programs.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  285. Published

    A learnable representation for syntax using residuated lattices

    Clark, A., 2009, Proceedings of the Conference on Formal Grammar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  286. Published

    A Lightweight Service Registry for Unstable Ad-hoc Networks

    Goncalves, P., Stathis, K. & Peach, N., 16 Nov 2011, Proceedings of the International Joint Conference on Ambient Intelligence (AmI 2011). p. 136-140 (Lecture Notes in Computer Science; vol. 7040/2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  287. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  288. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  289. E-pub ahead of print

    A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts

    Karafili, E., Sgandurra, D. & Lupu, E., 24 Nov 2018, (E-pub ahead of print) 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, p. 73-87 15 p. (Lecture Notes in Computer Science; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  290. Published

    A long-range self-similarity approach to segmenting DJ mixed music streams

    Scarfe, T., Koolen, W. M. & Kalnishkan, Y., 2013, Artificial Intelligence Applications and Innovations: Proceedings of the 9th IFIP WG 12.5 International Conference, AIAI 2013, Paphos, Cyprus, September 30 – October 2, 2013. Papadopoulos, H., Andreou, A. S., Iliadis, L. & Maglogiannis, I. (eds.). Springer, p. 235-244 10 p. (IFIP Advances in Information and Communication Technology; vol. 412).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  291. Published

    A Lower Bound for a Prediction Algorithm under the Kullback-Leibler Game

    Dzhamtyrova, R. & Kalnishkan, Y., Sep 2021, Conformal and Probabilistic Prediction and Applications 2021. Carlsson, L., Luo, Z., Cherubin, G. & An Nguyen, K. (eds.). Proceedings of Machine Learning Research, Vol. 152. p. 39-51 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  292. Published

    A Meditation on Epistemic Pushback

    Hutton, M. & Lystor, C., 2021, Academy of Marketing Conference, July 5th-7th 2021.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  293. Published

    A methodological approach to visual reasoning

    Liu, X., Zhang, G. & Luo, Z., 1989, Proceeding of International workshop on industrial applications of machine intelligence and vision. Japan, p. 50-55

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  294. Unpublished

    A micromorphological assessment of Lateglacial Swedish clay varves from Svinstadsjön, Östergötland – understanding proglacial lake processes and refining a site varve chronology

    Devine, R., 2018, (Unpublished) Conference abstract - Poster presentation.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  295. Published

    A Middleware Framework for Robust Applications in Wireless Ad Hoc Networks

    Chockler, G., Demirbas, M., Gilbert, S. & Newport, C., Sep 2005, Proceeding of the 43rd Allerton Conference on Communication, Control, and Computing. Curran Associates

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  296. Published

    A mobile phone based personal narrative system

    Black, R., Waller, A., Tintarev, N., Reiter, E. & Reddington, J., 2011, The proceedings of the 13th international ACM SIGACCESS conference on Computers and accessibility. p. 171-178 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  297. Published

    A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation

    Baiocco, A., Foglietta, C., Panzieri, S. & Wolthusen, S. D., 19 May 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  298. Published

    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

    Davidson, A., Fenn, G. & Cid, C., 24 Oct 2016, WISCS '16 Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  299. Published

    A model of actors and grey failures

    Bocchi, L., Lange, J., Thompson, S. & Voinea, A. L., 14 Jun 2022, 24th International Conference on Coordination Models and Languages. Springer-Verlag, Vol. 12371.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  300. Published

    A Modular Hierarchy of Logical Frameworks

    Adams, R., 2004, Types for Proofs and Programs. Berardi, S., Coppo, M. & Damiani, F. (eds.). Springer, Vol. 3085. p. 1-16 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  301. Published

    A multi-agent based management system for future ATM networks

    Hayzelden, A., Bigham, J. & Luo, Z., 1999, Proceedings of the Fourth International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agents (PAAM'99). p. 179-192

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  302. Published

    A multi-agent based management system for service provider negotiation and charging

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 1999, Proceedings of IFIP TC6 Workshop.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  303. Published

    A Multi-Population FA for Automatic Facial Emotion Recognition

    Mistry, K., Rizvi, B., Rook, C., Iqbal, S., Zhang, L. & Joy, C. P., 28 Sep 2020, A Multi-Population FA for Automatic Facial Emotion Recognition. International Joint Conference on Neural Networks (IJCNN): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  304. Published

    A Multi-Robot Platform for the Autonomous Operation and Maintenance of Offshore Wind Farms

    Bernardini, S., Jovan, F., Jiang, Z., Watson, S., Weightman, A., Moradi, P., Richardson, T., Sadeghian, R. & Sareh, S., May 2020, International Conference on Autonomous Agents and Multi-Agent Systems 2020 . p. 1696-1700 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  305. Published

    A Multivocal and Multilevel Institutionalist Perspective to Analyse Information Technology Enabled Change in the Public Service in Africa

    Bernardi, R., 2008, IT in the Service Economy: Challenges and Possibilities for the 21st Century: IFIP International Federation for Information Processing. Barrett, M., Davidson, E., Middleton, C. & DeGross, J. (eds.). Boston: Springer, Vol. 267. p. 271-280

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  306. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  307. Published

    A Network Flow Interpretation of Robust Goal Legibility in Path Finding

    Bernardini, S., Fagnani, F., Franco, S. & Neacsu, A., 13 Jun 2022, Proceedings of the Thirty-Second International Conference on Automated Planning and Scheduling (ICAPS 2022). 1 ed. Vol. 32. p. 668 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  308. Forthcoming

    A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles

    Vagal, V., Markantonakis, K. & Shepherd, C., 14 Apr 2021, (Accepted/In press) 40th IEEE Digital Avionics Systems Conference (DASC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  309. Published

    A New Approach to Modelling Centralised Reputation Systems

    Garms, L. & Quaglia, E., 29 Jun 2019, Progress in Cryptology – AFRICACRYPT 2019: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings. Springer, p. 429-447 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  310. Published

    A New Efficient In Situ Sampling Model for Heuristic Selection in Optimal Search

    Franco, S., Barley, M. W. & Riddle, P. J., 2013, AI 2013: Advances in Artificial Intelligence : 26th Australasian Joint Conference, Dunedin, New Zealand, December 1-6, 2013. Proceedings. Cranefield, S. & Nayak, A. C. (eds.). Springer, p. 178-189 12 p. (Lecture Notes in Computer Science; vol. 8272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  311. Published

    A new look at user commitment towards information systems: Evidence from Amazon’s Mechanical Turk

    van der Heijden, H., 2012, Proceedings of the European Conference on Information Systems (ECIS). Barcelona, Spain

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  312. Published

    A new model to explain the occurrence of volcanism along caldera ring faults

    Browning, J. & Gudmundsson, A., 2014, The Volcanic and Magmatic Studies Group Proceedings 2014. Vol. VMSG 2014 A.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  313. Published

    A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

    Razouk, W., Sgandurra, D. & Sakurai, K., 17 Oct 2017, International Conference on Internet of Things and Machine Learning. ACM, p. 1-8 8 p. 35

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  314. E-pub ahead of print

    A Non-wellfounded, Labelled Proof System for Propositional Dynamic Logic

    Docherty, S. & Rowe, R., 14 Aug 2019, (E-pub ahead of print) TABLEAUX 2019: Automated Reasoning with Analytic Tableaux and Related Methods. Springer, p. 335-352 18 p. (Lecture Notes in Computer Science; vol. 11714).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  315. Published

    A novel method for sub-micrometer transverse electron beam size measurements using optical transition radiation

    Aryshev, A., Boogert, S. T., Howell, D., Karataev, P., Terunuma, N. & Urakawa, J., 2010, VIII INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2009). Strikhanov, MN. & Pivovarov, YL. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  316. Published

    A Novel Scoring Model to Detect Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012. p. 254-263 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  317. Published

    A novel stateless authentication protocol

    Mitchell, C. J., 2013, Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009, Revised Selected Papers. Christianson, B., Malcolm, J. A., Matyas, V. & Roe, M. (eds.). Springer-Verlag, Vol. 7028. p. 269-274 6 p. (Lecture Notes in Computer Science; no. 7028).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  318. Published

    A paleoenvironmental setting for early Paleoindians in western North America: evidence from the insect fossil record

    Elias, S., 1995, Ancient Peoples and Landscapes. Johnson, E. (ed.). Lubbock, Texas: Texas Tech University Press, p. 255-272

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  319. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2010, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  320. Published

    A Parallel Architecture for Stateful, High-Speed Intrusion Detection

    Foschini, L., Thapliyal, A. V., Cavallaro, L., Kruegel, C. & Vigna, G., 2008, 4th International Conference on Information Systems Security (ICISS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  321. Published

    A Performant, Misuse-Resistant API for Primality Testing

    Massimo, J. & Kenneth G. Paterson, Oct 2020, Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020. p. 195-210 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. Published

    A person-to-person Internet payment system

    Al-Meaither, M. & Mitchell, C. J., 2001, Proceedings NordSec 2001 - 6th Nordic Workshop on Secure IT Systems, Lyngby, Denmark, November 2001. p. 5-17 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  323. Published

    A Pilot Study Investigating The Process of Risk Assessment and Re-Accreditation in UK Public Sector Systems

    Davies, M., Happa, J. & I, A., 2015, York Doctoral Symposium on Computer Science and Electronics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  324. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  325. Published

    A Pluralist Approach to Type-Theoretic Foundations.

    Luo, Z., 2013, Inter. Conf. on Type Theory, Homotopy Theory and Univalent Foundations. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  326. Published

    A polynomial kernel for 3-leaf power deletion

    Ahn, J., Eiben, E., Kwon, O. J. & Oum, S. I., 18 Aug 2020, 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020. Esparza, J., Kral�, D. & Kral�, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. MFCS-2020-5. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 170).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  327. Published

    A polynomial kernel for line graph deletion

    Eiben, E. & Lochet, W., 26 Aug 2020, 28th Annual European Symposium on Algorithms, ESA 2020. Grandoni, F., Herman, G. & Sanders, P. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-15 15 p. 42. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 173).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  328. Published

    A Position Paper: Towards an Utility Computing and Communications Infrastructure

    Bubendorfer, K. & Komisarczuk, P., 2005, Proceedings of the 2005 International Conference on Communications in Computing, CIC 2005, Las Vegas, Nevada, USA. p. 47-53 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  329. Published

    A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System

    Paterson, K. G. & Strefler, M., 14 Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. Bao, F., Miller, S., Zhou, J. & Ahn, G-J. (eds.). ACM, p. 475-482 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  330. E-pub ahead of print

    A Practical Cryptanalysis of the Algebraic Eraser

    Ben-Zvi, A., Blackburn, S. & Tsaban, B., 21 Jul 2016, (E-pub ahead of print) Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer, p. 179-189 11 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  331. Published

    A Practical Deployment Framework for Use of Attribute-Based Encryption in Data Protection

    Xu, Z. & Martin, K. M., 2013, The 15th IEEE International Conference on High Performance Computing and Communications. IEEE, p. 1593-1598

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  332. Published

    A Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery

    Zhang, Q., Markantonakis, K. & Mayes, K., 2006, Proceedings of the IEEE International Conference on Computer Systems and Applications. Washington, DC, USA: IEEE Computer Society Press, p. 851-858 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  333. Published

    A Pragmatic System-Failure Assessment and Response Model

    Happa, J., Fairclough, G., Nurse, JRC., Agrafiotis, I., Goldsmith, M. & S, C., 2016, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy. Vol. 1. p. 503-508 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  334. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jun 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  335. Published

    A privacy-aware reputation-based announcement scheme for VANETs

    Chen, LI., Li, Q., Martin, K. M. & Ng, S-L., 2013, Wireless Vehicular Communications (WiVeC), 2013 IEEE 5th International Symposium on. IEEE, p. 1-5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  336. Published

    A probabilistic reasoning system based on a causal graph approach

    Luo, Z. & Gammerman, A., 1990, Proceeding of IEE Colloquium on Knowledge Engineering.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  337. Published

    A propagation model of a vulnerability mitigation computer worm - SeaWave

    Al-Salloum, Z. & Wolthusen, S. D., 6 Sep 2011, Proceedings of the 2011 5th International Network and System Security Conference (NSS 2011). IEEE Computer Society Press, p. 347-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  338. Published

    A protocol compiler for secure sessions in ML

    Corin, R. & Denielou, P-M., 2008, TRUSTWORTHY GLOBAL COMPUTING. Barthe, G. & Fournet, C. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 276-293 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  339. Published

    A Raman study of carbonates and organic contents in five CM chondrites

    Chan, QHS., Zolensky, ME., Bodnar, RJ., Farley, C. & Cheung, JCH., 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  340. Published

    A Recommender System Approach for Predicting Drug Side Effects

    Galeano Galeano, D. & Paccanaro, A., 2018, IJCNN 2018: International Joint Conference on Neural Networks. IEEE Xplore, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  341. Published

    A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition

    Saeed, M. Q. & Walter, C. D., 2011, 6th Internat. Conf. for Internet Technology and Secured Transactions (ICITST-2011). p. 283 - 287

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  342. Published

    A reference monitor for workflow systems with constrained task execution

    Crampton, J., 2005, Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 38-47 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  343. Published

    A Robust Augmented Nodal Analysis Approach to Distribution Network Solution

    Nduka, O., Yu, Y., Pal, B. & Okafor, E., 16 Dec 2020, 2020 IEEE Power and Energy Society General Meeting (PESGM). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  344. Published

    A Saturation Method for Collapsible Pushdown Systems

    Broadbent, C., Carayol, A., Hague, M. & Serre, O., 2012, ICALP: International Colloquium on Automata, Languages and Programming.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  345. Published

    A scanning tool for PC root public key stores

    Alsaid, A. & Mitchell, C. J., 2005, WEWoRC 2005 - Western European Workshop on Research in Cryptology, Leuven, Belgium, July 2005. Wolf, C., Lucks, S. & Yau, P-W. (eds.). Gesellschaft fuer Informatik , p. 45-52 8 p. (LNI; vol. P-74).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  346. Published

    A scenario method to automatically assess ICT risk

    Baiardi, F., Corò, F., Tonelli, F. & Sgandurra, D., 2014, Proceedings - 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014. IEEE Computer Society, p. 544-551 8 p. 6787327

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  347. Published

    A Scorecard Tool for the Measurement of Performance for Both the Forward and Reverse Supply Chain

    Coronado Mondragon, A. E., 6 Jul 2008, Proceedings of the 13th International Symposium on Logistics (ISL 2008): Integrating the Global Supply Chain. Pawar, KS., Banomyong, R. & Lalwani, CS. (eds.). Nottingham, UK: Nottingham University Business School, Vol. 1. p. 196-203 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  348. Published

    A secure and efficient mutual authentication protocol for low-cost RFID systems

    Poulopoulos, G., Markantonakis, K. & Mayes, K., 1 Jan 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 706-711 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  349. Published

    A secure and trusted boot process for Avionics Wireless Networks

    Markantonakis, K. & Akram, R., 9 Jun 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE Computer Society, p. 1C3-1-1C3-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  350. E-pub ahead of print

    A Secure and Trusted Channel Protocol for UAVs Fleets

    Akram, R. N., Markantonakis, K., Mayes, K., Bonnefoi, P. F., Cherif, A., Sauveron, D. & Chaumette, S., 21 Jun 2018, (E-pub ahead of print) Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Proceedings. Springer-Verlag, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10741 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  351. Published

    A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 16 Jul 2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  352. Published

    A SECURE CHANNEL PROTOCOL FOR MULTI- APPLICATION SMART CARDS BASED ON PUBLIC KEY CRYPTOGRAPHY

    Markantonakis, K. & Mayes, K., 2004, Eight IFIP TC-6-11 Conference on Communications and Multimedia Security. Kluwer Academic Publishers

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  353. Published

    A secure electronic Murabaha transaction

    Al-Meaither, M. & Mitchell, C. J., 2003, Proceedings of eTransformation, 16th Bled eCommerce Conference, Bled, Slovenia, June 2003. p. 662-674

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  354. Published

    A secure electronic payment scheme for charity donations

    Al-Meaither, M. & Mitchell, C. J., 2003, E-Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, Vol. 2738. p. 50-61 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  355. Published

    A secure GSM-based Murabaha transaction

    Al-Meaither, M. & Mitchell, C. J., 2004, Proceedings of ICTTA 04, The 1st International Conference on Information & Communication Technologies from Theory to Applications, Damascus, Syria, April 2004. IEEE, p. 77-78 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  356. Published

    A secure marketplace for online services that induces good conduct

    Li, Q. & Martin, K. M., 2010, Proceedings of Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010). p. 65-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  357. Published

    A Security Analysis of Biometric Template Protection Schemes

    Zhou, X., Busch, C., Kuijper, A. & Wolthusen, S. D., 6 Jul 2009, Proceedings of the 6th International Conference on Image Analysis and Recognition (ICIAR 2009). Springer-Verlag, p. 429-438

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  358. Published

    A security architecture for agent-based mobile systems

    Borselius, N., Hur, N., Kaprynski, M. & Mitchell, C. J., 2002, Proceedings - 3G2002, Third International Conference on Mobile Communications Technologies, London, UK, May 2002. IEE Press, p. 312-318 7 p. (Conference Publication; vol. 489).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  359. Published

    A security model for anonymous credential systems

    Pashalidis, A. & Mitchell, C. J., 2004, Information Security Management, Education and Privacy, Proceedings of the 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems, I-NetSec'04. Deswarte, Y., Cuppens, F., Jajodia, S. & Wang, L. (eds.). Kluwer Academic Publishers, p. 183-189 (IFIP Conference Proceedings; vol. 148).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  360. Published

    A Security Policy Infrastructure for Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 37-51 15 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  361. Published

    A semantical approach to equilibria and rationality

    Pavlovic, D., 2009, Proceedings of CALCO 2009. Kurz, A. & Tarlecki, A. (eds.). Springer-Verlag, Vol. 5728. p. 317-334 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  362. Published

    A Semantics of Business Configurations Using Symbolic Graphs

    Mylonakis, N., Orejas, F. & Fiadeiro, J. L., 20 Aug 2015, Proceedings of the 12th IEEE International Conference on Services Computing. IEEE Computer Society Press, p. 146-153 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  363. Published

    A service discovery threat model for ad hoc networks

    Leung, A. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 167-174

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  364. E-pub ahead of print

    A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags

    Bonnefoi, P-F., Dusart, P., Sauveron, D., Akram, R. & Markantonakis, K., 3 Dec 2015, (E-pub ahead of print) The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). IEEE Computer Society, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  365. Published

    A short-form measure of attitudes towards using mobile information systems

    Ogertschnig, M. & van der Heijden, H., 2004, Proceedings of the 17th Bled Electronic Commerce conference. Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  366. Published

    A Simulation Framework for Photon-Particle Interactions for Laserwires and Further Applications

    Alden, S., Gibson, S. & Nevay, L., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 4045-4048 4 p. THPRB095

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  367. Published

    A situated knowledge work context perspective on knowledge management software-organisation misalignments

    Le Nguyen, K., Dyerson, R. & Harindranath, G., 2009, Proceedings of the 2009 European Conference on Information Systems (ECIS), Verona, Italy. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  368. E-pub ahead of print

    A Smart Card Web Server in the Web of Things

    Kyrillidis, L., Cobourne, S., Mayes, K. & Markantonakis, K., 23 Aug 2017, (E-pub ahead of print) SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Springer, p. 769-784 16 p. (Lecture Notes in Networks and Systems ; vol. 16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  369. Published

    A Smart Micro-Grid Architecture for Resource Constrained Environments

    Kayem, A. V. D. M., Meinel, C. & Wolthusen, S., 2017, Advanced Information Networking and Applications (AINA), 2017 IEEE 31st International Conference on. IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  370. Published

    A sound algorithm for asynchronous session subtyping

    Bravetti, M., Carbone, M., Lange, J., Yoshida, N. & Zavattaro, G., 20 Aug 2019, 30th International Conference on Concurrency Theory, CONCUR 2019. Fokkink, W. & van Glabbeek, R. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 16 p. 38. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 140).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  371. Published

    A Spatial Perspective of Innovation and Development: Innovation Hubs in Zambia and the UK

    Jimenez Cisneros, A. & Zheng, Y., 16 May 2017, 14th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2017, Yogyakarta, Indonesia, May 22-24, 2017, Proceedings. Springer, p. 171-181 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  372. Published

    A static verification framework for message passing in Go using behavioural types

    Lange, J., Ng, N., Toninho, B. & Yoshida, N., 27 May 2018, Proceedings of the 40th International Conference on Software Engineering, ICSE 2018. IEEE Computer Society, p. 1137-1148 12 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  373. Published

    A stochastic simulation system and its application to causal models

    Luo, Z. & Gammerman, A., 1990, Proceeding of 3rd International Conference on IPMU in Knowledge-Based Systems. p. 186-189

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  374. Published

    A storage complexity based analogue of Maurer key establishment using public channels

    Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 84-93 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  375. A Study of Internet of Things (IoT) and its Impacts on Global Supply Chains

    Shah, S., Bolton, M. & Menon, S., Jan 2020, Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020. Institute of Electrical and Electronics Engineers Inc., p. 245-250 6 p. 9051474. (Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  376. Published

    A study of the quantum dot in application to terahertz single photon counting

    Hashiba, H., Antonov, V., Kulik, L. & Komiyama, S., 2008, CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPRINTRONICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 209-214 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  377. E-pub ahead of print

    A Subfield Lattice Attack on Overstretched NTRU Assumptions: Cryptanalysis of Some FHE and Graded Encoding Schemes

    Albrecht, M., Bai, S. & Ducas, L., 21 Jul 2016, (E-pub ahead of print) Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer, p. 153-178 26 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  378. Published

    A Substitution Operation for Constraints

    Jeavons, P. G., Cohen, D. A. & Cooper, M. C., 1 May 1994, Principles and Practice of Constraint Programming: Second International Workshop, PPCP '94 Rosario, Orcas Island, WA, USA, May 2–4, 1994 Proceedings. Borning, A. (ed.). Vol. 874. p. 1-9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  379. Published

    A Surfeit of SSH Cipher Suites

    Albrecht, M., Degabriele, J., Hansen, T. & Paterson, K., 24 Oct 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1480-1491 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  380. Published

    A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks

    Wolthusen, S. D. & Al-Kuwari, S., Feb 2009, Digital Forensics and Cyber Crime: First International ICST Conference ICDF2C. Springer-Verlag, p. 19-32

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  381. E-pub ahead of print

    A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them

    Sbai, H., Goldsmith, M., Meftali, S. & Happa, J., 23 Sep 2018, (E-pub ahead of print) International Symposium on Cyberspace Safety and Security. p. 18-32 15 p. (Lecture Notes in Computer Science; vol. 11161).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  382. Published

    A survey of security services and techniques in distributed storage systems

    Xu, Z., Martin, K. M. & Kotnik, C., 2011, Proceedings of the 2011 International Conference on Security and Management (SAM '11). p. 3-9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  383. Published

    A Synthetic Strategy Implementation Model

    Aboutalebi, R. & Tan, H., 10 Sep 2013, In: BAM (British Academy of Management), 27th Annual Conference of BAM: Managing to Make a Difference. 10-12 September 2013, Aintree Racecourse, Liverpool, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  384. Published

    A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors

    Reina, A., Fattori, A. & Cavallaro, L., 14 Apr 2013, ACM European Workshop on Systems Security (EuroSec). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  385. Published

    A system for intrinsic evolution of linear and non-linear filters

    Flockton, S. & Sheehan, K., 1999, Proceedings 1st NASA/DoD Workshop on Evolvable Hardware. p. 93-100 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  386. Published

    A System-Based Strategy Implementation Model

    Aboutalebi, R. & Tan, H., 8 Sep 2013, In: UK Systems Society, 17th Annual Conference of the UK Systems Society: Systems and Society- Ideas from Practice. 08-10 September 2013, St Anne’s College, Oxford University, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  387. Published

    A Tactile Visual Library To Support User Experience Storytelling

    Lewis, M. & Coles-Kemp, L., 2014, Proceedings of NordDesign 2014. Design Society, 2014.. Aalto Design Factory, p. 386 395 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  388. Published

    A taxonomy of government approaches towards online identity management

    Seltsikas, P. & van der Heijden, H., 2010, 43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010). LOS ALAMITOS: IEEE COMPUTER SOC, p. 1852-1859 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  389. Published

    A taxonomy of single sign-on systems

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security and Privacy - 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11 2003, Proceedings. Safavi-Naini, R. & Seberry, J. (eds.). Springer-Verlag, Vol. 2727. p. 249-264 16 p. (Lecture Notes in Computer Science; vol. 2727).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  390. Published

    A Tentative Model of Strategy Implementation

    Aboutalebi, R., 21 Mar 2013, In: AIB (Academy of International Business), 40th Academy of International Business: International Business, Institutions and Performance after the Financial Crisis. 21-23 March 2013, Aston Business School, Birmingham, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  391. Published

    A Tighter Bound for Counting Max-Weight Solutions to 2SAT Instances

    Wahlström, M., 1 May 2008, 3rd International Workshop on Parameterized and Exact Computation (IWPEC 2008). Grohe, M. & Niedermeier, R. (eds.). Victoria (BC), Canada: Springer, Vol. 5018. p. 202-213 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  392. Published

    A time- and message-optimal distributed algorithm for minimum spanning trees

    Pandurangan, G., Robinson, P. & Scquizzato, M., 19 Jun 2017, STOC 2017: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing. New York: Association for Computing Machinery (ACM), p. 743-756 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  393. Published

    A timed component algebra for services

    Delahaye, B., Fiadeiro, J. L., Legay, A. & Lopes, A., 2013, FMOODS/FORTE. Beyer, D. & Borelae, M. (eds.). Springer, p. 242-257 16 p. (Lecture Notes in Computer Science; vol. 7892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  394. Published

    A tour around finitely presented infinite simple groups

    Scott, E., 1989, Algorithms And Classification in Combinatorial Group Theory. Springer-Verlag, p. 83-119

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  395. Published

    A tunable proof of ownership scheme for deduplication using Bloom filters

    Blasco, J., Di Pietro, R., Orfila, A. & Sorniotti, A., 29 Dec 2014, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 481-489 9 p. 6997518. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  396. Published

    A type-theoretic framework for formal reasoning with different logical foundations

    Luo, Z., 2007, Advances in Computer Science, Proc of the 11th Annual Asian Computing Science Conference. LNCS 4435. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  397. Published

    A Unifying Theory of Dependent Types: the schematic approach

    Luo, Z., 1992, Proc. of Symp. on Logical Foundations of Computer Science (Logic at Tver'92), LNCS 620.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  398. Published

    A Universal Client-based Identity Management Tool

    Al-Sinani, H. S. & Mitchell, C. J., 2012, Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers: 8th European Workshop on Public Key Infrastructures, Services and Applications, Leuven, Belgium, 15th/16th September 2011. Petkova-Nikova, S., Pashalidis, A. & Pernul, G. (eds.). Springer-Verlag, p. 49-74 26 p. (Lecture Notes in Computer Science; no. 7163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  399. Published

    A user-centric m-payment solution

    Zhang, Q., Mayes, K. & Markantonakis, K., 1 Nov 2005, Mobile Technology, Applications and Systems, 2005 2nd International Conference on. p. 8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  400. Published

    A User-Centric Solution To Realise M-Payment

    Zhang, Q. & Mayes, K., 2005, A User-Centric Solution To Realise M-Payment. Belgium

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  401. Published

    A viable grid marketplace

    Li, Q. & Martin, K. M., 2010, Proceedings of IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2010). IEEE Computer Society Press, p. 427-432

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  402. Published

    A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 8 Jul 2013, The 25th IFIP International Information Security Conference (SEC 2013). Springer-Verlag, Vol. 405. p. 102-110 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  403. Published

    Abstract Constraint Data Types

    Fiadeiro, J. L. & Orejas, F., 2015, Software, Services, and Systems: Essays Dedicated to Martin Wirsing on the Occasion of His Retirement from the Chair of Programming and Software Engineering. de Nicola, R. & Hennicker, R. (eds.). Springer, p. 155-170 16 p. (Lecture Notes in Computer Science; vol. 8950).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  404. Published

    Abstract object types – a temporal perspective

    SERNADAS, A., FIADEIRO, J., SERNADAS, C. & EHRICH, H. D., 1989, TEMPORAL LOGIC IN SPECIFICATION. BANIEQBAL, B., BARRINGER, H. & PNUELI, A. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 324-350 27 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  405. Published

    Abusing the Tutte Matrix: An Algebraic Instance Compression for the K-set-cycle Problem

    Wahlström, M., 2013, STACS. p. 341-352 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  406. Published

    Access control and authorization constraints for WS-BPEL

    Bertino, E., Crampton, J. & Paci, F., 2006, Proceedings of IEEE International Conference on Web Services. IEEE Computer Society Press, p. 275-284 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  407. Published

    Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S., 2017, Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers. Havarneanu, G., Setola, R., Nassopoulos, H. & Wolthusen, S. (eds.). Springer, p. 239-251 13 p. (Lecture Notes in Computer Science; vol. 10242).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  408. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of 3rd Annual Information Security South Africa Conference (ISSA 2003). p. 75-88 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  409. Published

    Access Control in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 14 Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2015. ACM, p. 657-662 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  410. Published

    Accessibility and Adoption of Industry 4.0 Technologies for Small Manufacturing Firms

    Shah, S., Samadi, S. & Lin, T. F., Nov 2021, IEEE Int. Conference on Technology Management Operations and Decisions. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  411. Published

    Accessing a New Land: Designing for a Social Conceptualisation of Access

    Coles-Kemp, L. & Jensen, R. B., 2 May 2019, CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-12 12 p. 181

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  412. Published

    Accessing External Applications from Knowledge-Based Systems

    Cosmadopoulos, Y., Southwick, R. & Stathis, K., 1990, Proceedings of Expert Systems 90, Research and Development in Expert Systems VII. Addis, T. R. & Muir, R. M. (eds.). p. 54-65 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  413. Unpublished

    Accreditation of Hospitals in Iran” Presented at the Critical Perspectives on Accounting Conference, Toronto, Canada, (International conference: July, 2014).

    Agyemang, G. & Agrizzi, D., 8 Jul 2014, (Unpublished) Critical Perspectives on Accounting Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  414. Published

    Achieving Context Awareness and Intelligence in Distributed Cognitive Radio Networks: A Payoff Propagation Approach

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 210-215 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  415. Published

    Achieving Efficient and Optimal Joint Action in Distributed Cognitive Radio Networks Using Payoff Propagation

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. In preparation

    Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution

    Bhattacharya, S., Garcia-Morchon, O., Player, R. & Tolhuizen, L., 2019, (In preparation) Eprint.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  417. Published

    Achieving social integration to implement ERP systems

    Elbanna, A., 2003, The European Conference of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  418. Achieving strategic growth in microenterprises through information technology: UK micro enterprise case study

    Shah, S., Long, M. & Ganji, E. N., 9 Feb 2018, 2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017. IEEE Computer Society Press, p. 1133-1137 5 p. (IEEE International Conference on Industrial Engineering and Engineering Management; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  419. Published

    Action-Based Environment Modeling for Maintaining Trust

    Kafali, O. & Yolum, P., 2008, Trust in Agent Societies. Vol. 5396. p. 81-98 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  420. Published

    Active Disk Paxos with infinitely many processes

    Chockler, G. & Malkhi, D., 1 Jan 2002, Proceedings of the 21st Annual ACM Symposium on Principles of Distributed Computing (PODC 2002). p. 78-87 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  421. Published

    Activity Recognition for an Agent-oriented Personal Health System

    Kafali, O., Romero, A. E. & Stathis, K., Dec 2014, Principles and Practice of Multi-Agent Systems - 17th International Conference, PRIMA 2014. Khanh Dam, H., Pitt, J., Xu, Y., Governatori, G. & Ito, T. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  422. Published

    Actor-Network Procedures

    Pavlovic, D. & Meadows, C., 2012, Distributed Computing and Internet Technology: 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012: Proceedings. Ramanujam, R. & Ramaswamy, S. (eds.). Springer-Verlag, p. 7-26 (Lecture Notes in Computer Science; vol. 7154).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  423. Published

    Acts of Omission and Commission: Lack of Marketplace Representation

    Bennett, A., Menzel Baker, S., Cross, S., Hutton, M., Stovall, T. & Ekpo, A., 2016, AMA Marketing and Public Policy Conference, California Polytechnic State University, U.S., June 23-25, 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. Published

    Actual and perceived levels of risk in consumer e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2001, Proceedings - 2nd International We-B Conference 2001, Perth, Western Australia, November 2001. p. 207-216 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  425. Published

    Adapting Reinforcement Learning For Trust: Effective Modeling in Dynamic Environments (Short Paper)

    Kafali, O. & Yolum, P., 2009, IEEE / WIC / ACM International Conference on Web Intelligence. p. 383-386 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  426. Published

    Adaptive bone abnormality detection in medical imagery using deep neural networks

    Storey, O., Wei, B., Zhang, L. & Romuald Fotso Mtope, F., 15 Aug 2020, World Scientific Proceedings Series on Computer Engineering and Information Science. In: Developments of Artificial Intelligence Technologies in Computation and Robotics. World Scientific Proceedings Series on Computer Engineering and Information Science, 12.: World Scientific, Singapore, p. 915-922 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  427. Published

    Adaptive Hedge

    Erven, T. V., Rooij, S. D., Koolen, W. M. & Grünwald, P., 1 Dec 2011, Proceedings of the 25th Annual Conference on Neural Information Processing Systems (NIPS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  428. Published

    Adaptive totally ordered multicast protocol that tolerates partitions

    Chockler, G. V., Huleihel, N. & Dolev, D., 1998, Proceedings of the 17th ACM Symposium on Principles of Distributed Computing (PODC '98). ACM, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  429. Published

    Addressing privacy issues in CardSpace

    Alrodhan, W. & Mitchell, C. J., 2007, Proceedings of IAS '07, Third International Symposium on Information Assurance and Security, Manchester, UK, August 2007. IEEE Computer Society Press, p. 285-291 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  430. Published

    Addressing privacy issues in location-based collaborative and distributed environments

    Saracino, A., Sgandurra, D. & Spagnuelo, D., 2014, 2014 International Conference on Collaboration Technologies and Systems, CTS 2014. IEEE Computer Society, p. 166-172 7 p. 6867560

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  431. Published

    Addressing Threats to Real-World Identity Management Systems

    Li, W. & Mitchell, C., 16 Oct 2015, ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference. Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Wiesbaden: Springer Vieweg, p. 251-259 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  432. Published

    Administrative scope and hierarchy operations

    Crampton, J. & Loizou, G., 2002, Proceedings of 7th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 145-154 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  433. Published

    Adopting a ‘Search’ Lens in Exploration of How Organisations Transform Digitally

    Hafezieh, N. & Eshraghian, F., 2022, European Conference on Information Systems. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  434. Adoption of Additive Manufacturing Approaches: The Case of Manufacturing SMEs

    Shah, S. & Mattiuzza, S., 13 Aug 2018, 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. IEEE, 8436257. (2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  435. Published

    Adoption of mobile technologies in Malawian academic libraries: the case of Mzuzu University Library

    Kapondera, S. K. & Ngalande, E., 2016, Standing Conference of Eastern, Central and Southern African Library and Information Associations. p. 165-174 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  436. Advanced technology integration in food manufacturing supply chain environment: Pathway to sustainability and companies' prosperity

    Ojo, O. O., Shah, S., Zigan, S. & Orchard, J., Jun 2019, 2019 IEEE Technology and Engineering Management Conference, TEMSCON 2019. Institute of Electrical and Electronics Engineers Inc., 8813713. (2019 IEEE Technology and Engineering Management Conference, TEMSCON 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  437. Published

    Adventures with Lucos Cozza: a conduit beneath the grounds of the Villa Wolkonsky - the Lateran branch of the Acqua Felice (1586-88)

    Claridge, A., 20 Apr 2014, Scritti in onore di Lucos Cozza. Coates-Stephens, R. & Cozza, L. (eds.). Rome: Edizioni Quasar Rome, p. 192-197 5 p. (Lexicon Topographicum Urbis Romae Supplementum; vol. VII).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  438. E-pub ahead of print

    Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols

    Nweke, L. O., Kahsay Weldehawaryat, G. & Wolthusen, S. D., 11 May 2020, (E-pub ahead of print) 2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. 9089346. (2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  439. Unpublished

    Aesthetics of Conventionalisation and the Contributions to Xiqu's Intercultural Communication

    Li, X., 2018, (Unpublished) Intercultural Communications, Translation, and Methods of Teaching Foreign Languages.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  440. Published

    Affordance Theory in Social Media Research: Systematic Review and Synthesis of The Literature

    Hafezieh, N. & Eshraghian, F., 2017, European Conference on Information Systems Proceedings. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  441. Published

    'Affordance’-what does this mean?

    Hafezieh, N. & Harwood, S., 2017, Proceedings of Twenty Second UK Academy of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  442. Published

    After Beckett: Edward Bond’s Post-Auschwitz Dramaturgy of Ruins

    Chen, C-C., 5 Sep 2016, TaPRA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  443. Unpublished

    Agency and institutions in MNC research: the contribution of critical realism

    Rees, C., Jul 2012, (Unpublished) 28th European Group for Organizational Studies (EGOS) Colloquium. Helsinki

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  444. Unpublished

    Agency Issues and Investment: A Comparative Analysis of the UK and Pakistani Listed firms

    Naeem, K. & Li, M. C., 2018, (Unpublished) Proceedings of New York International Business and Social Science Research Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  445. Forthcoming

    Agent Interaction and State Determination in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  446. Published

    Agent-based host enumeration and vulnerability scanning using dynamic topology information

    Al-Salloum, Z. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2010 (ISSA). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  447. Published

    Aggregating strategies

    Vovk, V., 1990, Proceedings of the Third Annual Workshop on Computational Learning Theory. Fulk, M. & Case, J. (eds.). San Mateo, CA: Morgan Kaufmann, p. 371-383 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  448. Published

    Aggregation Algorithm vs. Average For Time Series Prediction

    Jamil, W., Kalnishkan, Y. & Bouchachia, H., 23 Sep 2016, Proceedings of the ECML PKDD 2016 Workshop on Large-scale Learning from Data Streams in Evolving Environments, STREAMEVOLV-2016. p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  449. Published

    Agreement in Directed Dynamic Networks

    Biely, M., Robinson, P. & Schmid, U., 2012, Structural Information and Communication Complexity - 19th International Colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30-July 2, 2012, Revised Selected Papers. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  450. Published

    Algebraic Cryptanalysis and RFID Authentication

    Cid, C., Ferreira, L., Procter, G. & Robshaw, M., 21 Nov 2015, The 11th Workshop on RFID Security - RFIDSec 2015. Springer, p. 104-121 18 p. (Lecture Notes in Computer Science; vol. 9440).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  451. E-pub ahead of print

    Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

    Albrecht, M., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 22 Nov 2019, (E-pub ahead of print) ASIACRYPT 2019. p. 371-397 17 p. (Lecture Notes in Computer Science; vol. 11923).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  452. Published

    Algebraic Knowledge Representation: The Unification of Procedure, Logic and Structure

    Sernadas, A., Sernadas, C. & Fiadeiro, J. L., 1986, ADT.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  453. Published

    Algebraic Precomputations in Differential and Integral Cryptanalysis

    Albrecht, M., Cid, C., Dullien, T., Faugere, J-C. & Perret, L., 2010, Information Security and Cryptology - 6th International Conference, Inscrypt 2010. Springer, Vol. 6584. p. 387-403 17 p. (Lecture Notes in Computer Science - LNCS; vol. 6584).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  454. Published

    Algebraic Proof Complexity: Progress, Frontiers and Challenges

    Pitassi, T. & Tzameret, I., 2017, Electronic Colloquium on Computation Complexity .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  455. Published

    Algebraic Proofs over Noncommutative Formulas

    Tzameret, I., 2010, 7th Annual Conference on Theory and Applications of Models of Computation. Berlin, Vol. 6108. p. 60 71 p. (Lecture Notes in Computer Science (LNCS)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  456. Published

    Algebraic Semantics of Coordination or What Is in a Signature

    Fiadeiro, J. L. & Lopes, A., 1999, AMAST. Springer, Vol. 1548. p. 293-307 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  457. Published

    Algebraic Software Architecture Reconfiguration

    Wermelinger, M. & Fiadeiro, J. L., 1999, ESEC / SIGSOFT FSE. Springer, Vol. 1687. p. 393-409 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  458. Published

    Algebraic Techniques in Differential Cryptanalysis

    Albrecht, M. & Cid, C., 2009, Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009: Revised Selected Papers. Dunkelman, O. (ed.). Springer, p. 193-208 16 p. (Lecture Notes in Computer Science - LNCS; vol. 5665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  459. E-pub ahead of print

    Algebras for Tree Decomposable Graphs

    Bruni, R., Montanari, U. & Sammartino, M., 23 Jun 2020, (E-pub ahead of print) Graph Transformation - 13th International Conference, ICGT 2020, Held as Part of STAF 2020, Proceedings. Gadducci, F. & Kehrer, T. (eds.). Springer, p. 203-220 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12150 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  460. Published

    Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks

    Wolthusen, S. D. & Al-Kuwari, S., May 2010, Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference (MobiSec 2010). Springer-Verlag, p. 67-79

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  461. Published

    Alternating Control Flow Reconstruction

    Kinder, J. & Kravchenko, D., Jan 2012, Proc. 13th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI 2012). Springer, p. 267-282

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  462. Published

    Amino acids in the asteroidal water-bearing salt crystals hosted in the Zag meteorite

    Chan, QHS., Zolensky, ME., Burton, AS. & Locke, DR., 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  463. Published

    Amnesic distributed storage

    Chockler, G., Guerraoui, R. & Keidar, I., 1 Jan 2007, Proceedings of the 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007. Vol. 4731 LNCS. p. 139-151 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  464. Published

    An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries

    Kinder, J., Zuleger, F. & Veith, H., 2009, Proc. 10th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI 2009). Springer, p. 214-228

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  465. Published

    An Agent Architecture for Concurrent Bilateral Negotiations

    Alrayes, B. & Stathis, K., 2014, Lecture Notes in Business Information Processing: Impact of Decision Support Systems for Global Environments. Springer, p. 79-89

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  466. Published

    An Agent Development Framework based on Social Positions

    Lekeas, G. K. & Stathis, K., 1 Oct 2004, IEEE Interantional Conference on Systems, Man and Cybernetics. Thiessen, W. & Wieringa, P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  467. Published

    An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems

    Mcevoy, R. & Wolthusen, S. D., May 2010, Proceedings of the 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 125-133

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  468. Published

    An Algebraic Approach to the Analysis of Constrained Workflow Systems

    Crampton, J., 2004, Proceedings of 3rd Workshop on Foundations of Computer Security (FCS'04). p. 61-74 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  469. Published

    An Algebraic Theory of Complexity for Valued Constraints: Establishing a Galois Connection

    Cohen, D. A., Creed, P., Jeavons, P. G. & Živný, S., 2011, Mathematical Foundations of Computer Science 2011: 36th International Symposium, MFCS 2011, Warsaw, Poland, August 22-26, 2011: Proceedings. Springer, p. 231-242 (Lecture Notes in Computer Science; vol. 6907).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  470. Published

    An Algorithm for the SAT Problem for Formulae of Linear Length

    Wahlström, M., 2005, ESA. p. 107-118 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  471. Published

    An Analysis of Cyclical Interdependencies in Critical Infrastructures

    Svendsen, N. & Wolthusen, S. D., 3 Oct 2007, Proc. Second International Workshop on Critical Information Infrastructures Security (CRITIS 2007). Springer-Verlag, p. 25-36

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  472. Published

    An Analysis of DepenDNS

    Alfardan, N. & Paterson, K., 2010, Information Security. Springer, Vol. 6531. p. 31-37 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  473. Published

    An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 3. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  474. Published

    An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

    Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  475. Published

    An analysis of the 3gpp-MAC scheme

    Knudsen, L. R. & Mitchell, C. J., 2001, Proceedings of WCC 2001, Paris, France, 8-12 January 2001. Augot, D. & Carlet, C. (eds.). p. 319-328 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  476. Published

    An Analysis of the Hermes8 Stream Ciphers

    Babbage, S., Cid, C., Pramstaller, N. & Raddum, H., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007. Springer, Vol. 4586. p. 1-10 11 p. (Lecture Notes in Computer Science - LNCS; vol. 4586).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  477. Published

    An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems (UKAIS)

    Ameen, N. & Willis, R., 2018, An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  478. Published

    An Analysis of the Perceived Value of Using Knowledge Management Systems in Supporting Decision Making Processes

    Abdelrahman, M., Papamichail, K. & French, S., 2010, 11th European Conference on Knowledge Management ECKM . p. 1115-1128

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  479. Published

    An Analysis of the XSL Algorithm

    Cid, C. & Gaetan, L., Dec 2005, Advances in Cryptology - ASIACRYPT 2005. Springer, Vol. 3788. p. 333-352 20 p. (Lecture Notes in Computer Science - LNCS; vol. 3788).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  480. Published

    An anonymous and undeniable payment scheme

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of the First International Conference on Information and Communications Security, ICICS '97, Beijing, China, November 1997. Han, Y., Okamoto, T. & Qing, S. (eds.). Springer-Verlag, p. 478-482 5 p. (Lecture Notes in Computer Science; no. 1334).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  481. Published

    An Architecture for Audit Logging in a Smart Card Environment

    Markantonakis, K., Mar 1999, An Architecture for Audit Logging in a Smart Card Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  482. Published

    An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems

    Francis, L., Mayes, K. & Markantonakis, K., 2008, THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 386-395 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  483. Published

    An Argumentative Model for Service-oriented Agents

    Morge, M., McGinnis, J., Bromuri, S., Mancarella, P. & Stathis, K., 1 Mar 2008, Proc. of the International Symposium on Architectures for Intelligent Theory-Based Agents. Balduccini, M. & Baral, C. (eds.). p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  484. Published

    An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.

    Rantos, K. & Markantonakis, K., 2004, SEC'04. p. 351-366 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  485. Forthcoming

    An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms

    McEvoy, R. & Wolthusen, S. D., 2014, (Accepted/In press) Proceedings of the 9th International Workshop on Critical Information Infrastructures Security. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  486. Published

    An authorization framework resilient to policy evaluation failures

    Crampton, J. & Huth, M., 2010, Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010: Proceedings. Springer, p. 472-487 16 p. (Lecture Notes in Computer Science; vol. 6345).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  487. Published

    An Auto-Delegation Mechanism for Access Control Systems

    Crampton, J. & Morisset, C., 2010, Proceedings of 6th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  488. Published

    An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  489. Published

    An Efficient Toolkit for Computing Private Set Operations

    Davidson, A. & Cid, C., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II. Pieprzyk, J. & Suriadi, S. (eds.). Springer Heidelberg, Vol. 2. p. 261-278 18 p. (Lecture Notes in Computer Science; vol. 10343).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  490. E-pub ahead of print

    An efficient, secure and trusted channel protocol for avionics wireless networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, (E-pub ahead of print) 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  491. Published

    An electronic array on liquid helium

    Rees, D. G., Glasson, P., Antonov, V., Bennett, R., Fozooni, P., Frayne, P. G., Lea, M. J., Meeson, P. J., Simkins, L. & Mukharsky, Y., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 1464-1465 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  492. Published

    An Emerging research Program on Employment Relations in Small Firms in Advanced Capitalist Economies

    Edwards, P., Sen Gupta, S. & Tsai, C-J., 2006, Academy of Management Conference (AOM), Atlanta.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  493. Published

    An Empirical Study of Messaging Passing Concurrency in Go Projects

    Dilley, N. & Lange, J., 18 Mar 2019, SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering. Shihab, E., Lo, D. & Wang, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 377-387 11 p. 8668036. (SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  494. An evaluation of demand focused chain contribution to industrial sustainability

    Naghi Ganji, E., Shah, S. & Coutroubis, A., 15 Nov 2017, Advances in Manufacturing Technology XXXI : Proceedings of the 15th International Conference on Manufacturing Research, ICMR 2017, Incorporating the 32nd National Conference on Manufacturing Research. El Souri, M., Gao, J. & Keates, S. (eds.). United Kingdom: IOS Press BV, Vol. 6. p. 359-364 6 p. (Advances in Transdisciplinary Engineering; vol. 6).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  495. Published

    An examination of computer-mediated communication for engineering-related tasks

    Lee, J. Y. H. & Panteli, N., 2010, Proceedings of the Annual Hawaii International Conference on System Sciences. 5428613

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  496. Published

    An Examination of the Impacts of a Learning Management System: A Case from Jamaica

    Craig, J. & Harindranath, G., Aug 2015, Proceedings of the 2015 Americas Conference on Information Systems (AMCIS), Puerto Rico, Auguest..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  497. Published

    An experimental comparison of different carbon and glass laminates for ballistic protection

    Zhou, F., Zhang, C., Chen, X., Zhu, C. & Hogg, P. J., 1 Dec 2011, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  498. Published

    An Exploration of Consumers' Use of Disposing Practices in their Daily Lives

    Türe, M. & Ger, G., 2011, NA - Advances in Consumer Research. Vol. 39. p. 32-33

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  499. Published

    An exploration of the dependence relationships between self-reported aggression and interpersonal style

    Glorney, E., Lyons, E. & Fritzon, K., 2006, Proceedings of the Conference of the European Association of Psychology and Law: University of Liverpool.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  500. E-pub ahead of print

    An Exploratory Analysis of the Security Risks of the Internet of Things in Finance

    Shepherd, C., Petitcolas, F., Akram, R. N. & Markantonakis, K., 27 Jul 2017, (E-pub ahead of print) Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lopez, J., Fischer-Hübner, S. & Lambrinoudakis, C. (eds.). Springer-Verlag, p. 164-179 16 p. (Lecture Notes in Computer Science; vol. 10442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  501. Published

    An Exploratory Analysis on Drug Target Locality

    Caceres Silva, J. & Paccanaro, A., Sep 2017, AGRANDA - Simposio Argentino de GRANdes DAtos 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  502. An Exploratory Study to Examine Big Data Application on Services and SCM

    Shah, S. & Theodosoulaki, A., 15 Apr 2019, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 155-159 5 p. 8691279. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  503. An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System

    Fett, D., Küsters, R. & Schmitz, G., 13 Nov 2014, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., p. 673-688 16 p. 6956594. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 12 3 4 5 6 7 8 9 ...86 Next