Home > Publications

Publications

3001 - 3500 out of 39,422Page size: 500
  1. Conference contribution › Research
  2. Published

    Computationally efficient transductive machines

    Saunders, C., Gammerman, A. & Vovk, V., 2000, Proceedings of the Eleventh International Conference on Algorithmic Learning Theory. Arimura, H., Jain, S. & Sharma, A. (eds.). Berlin: Springer, p. 325-333 9 p. (Lecture Notes in Artificial Intelligence; vol. 1968).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Computing Exact Solutions of Consensus Halving and the Borsuk-Ulam Theorem

    Deligkas, A., Fearnley, J., Melissourgos, T. & Spirakis, P., Jul 2019, 46th International Colloquium on Automata, Languages, and Programming (ICALP 2019). p. 1-14 14 p. 138

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    CONAN: a heuristic strategy for COncurrent Negotiating AgeNts

    Alrayes, B., Kafali, O. & Stathis, K., 2014, Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems. ACM, p. 1585-1586

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Conceptualising the role of intermediaries in developing SMEs’ ICT capabilities

    Dyerson, R., Harindranath, G. & Levy, M., 2009, Proceedings of the 2009 Institute for Small Business & Entrepreneurship Conference, Liverpool. ISBE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Conditional prediction intervals for linear regression

    McCullagh, P., Vovk, V., Nouretdinov, I., Devetyarov, D. & Gammerman, A., 2009, Proceedings of the International Conference on Machine Learning and Applications. p. 131-138 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Confidence in Ability: The Non-Traditional University Student

    Chaney, I., 12 Nov 2018, 11th International Conference of Education, Research and Innovation, Seville, 12-14 November 2018. p. 7206-7211 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Confidence Machine and its application to medical diagnosis

    Devetyarov, D., Nouretdinov, I. & Gammerman, A., 2009, International Conference on Bioinformatics and Computational Biology. p. 448-454 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Confidence Predictions for the Diagnosis of Acute Abdominal Pain

    Papadopoulos, H., Gammerman, A. & Vovk, V., 2009, Artificial Intelligence Applications & Innovations III. Iliadis, L., Vlahavas, I. & Bramer, M. (eds.). Springer, Vol. 296. p. 175-184 10 p. (IFIP International Federation for Information Processing; vol. 296).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Conformal anomaly detection for visual reconstruction using gestalt principles

    Nouretdinov, I., Balinsky, A. & Gammerman, A., 21 Aug 2020, Proceedings of the Ninth Symposium on Conformal and Probabilistic Prediction and Applications. Vol. 128. p. 151-170 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Conformal Anomaly Detection of Trajectories with a Multi-class Hierarchy

    Smith, J., Nouretdinov, I., Craddock, R., Offer, C. & Gammerman, A., 3 Apr 2015, Statistical Learning and Data Sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 281-290 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Conformal Clustering and Its Application to Botnet Traffic

    Cherubin, G., Nouretdinov, I., Gammerman, A., Jordaney, R., Wang, Z., Papini, D. & Cavallaro, L., 3 Apr 2015, Statistical Learning and Data Sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 313-322 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Conformal Prediction for Indoor Localisation with Fingerprinting Method

    Nguyen, K. & Luo, Z., Sep 2012, Artificial Intelligence Applications and Innovations: First Conformal Prediction and Its Applications Workshop (COPA 2012). Halkidiki, Greece: Springer, p. 214-223 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Conformal prediction under hypergraphical models

    Fedorova, V., Gammerman, A., Nouretdinov, I. & Vovk, V., Oct 2013, The 9th Artificial Intelligence Applications and Innovations Conference (AIAI): 2nd Workshop on Conformal Prediction and its Applications. p. 371-383 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Conformal Prediction under Probabilistic Input

    Nouretdinov, I., 19 Sep 2014, Artificial Intelligence Applications and Innovations: AIAI2014 Workshops. Rhodes, Greece, p. 291-300 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Conformal prediction with Neural Networks

    Papadopoulos, H., Vovk, V. & Gammerman, A., 2007, Proceedings of the Nineteenth IEEE International Conference on Tools with Artificial Intelligence. Vol. 2. p. 388-395 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. E-pub ahead of print

    Conformal Predictive Distributions with Kernels

    Vovk, V., Nouretdinov, I., Manokhin, V. & Gammerman, A., 23 Aug 2018, Braverman Readings in Machine Learning. Key Ideas from Inception to Current State - International Conference Commemorating the 40th Anniversary of Emmanuil Braverman’s Decease, Invited Talks. Springer-Verlag, Vol. 11100 . p. 103-121 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11100 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Conformal predictor combination using Neyman–Pearson Lemma

    Toccaceli, P., 2019, Proceedings of the Eighth Symposium on Conformal and Probabilistic Prediction and Applications. Proceedings of Machine Learning Research, Vol. 105. p. 66-88 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Conformal Predictors for Compound Activity Prediction

    Toccaceli, P., Nouretdinov, I. & Gammerman, A., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 51-66 16 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Conjuring Bambi: Cuteness, incantation and reclamation in Pascale Petit’s Mama Amazonica

    Harris, C., 1 Oct 2020, Love Spells & Rituals for Another World. Markaki, L. & Harris, C. (eds.). UK, (Love Spells & Rituals for Another World).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Connectivity augmentation in tactical mobile ad hoc networks

    Reidt, S. & Wolthusen, S. D., 16 Nov 2008, Proc. 2008 IEEE Military Communications Conference. IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Conquering Generals: an NP-Hard Proof of Useful Work

    Loe, A. & Quaglia, E., 15 Jun 2018, CryBlock'18: Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. ACM, p. 54-59 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Consensus and collision deteotors in wireless ad hoc networks

    Chockler, G., Demirbas, M., Gilbert, S., Newport, C. & Nolte, T., 1 Jan 2005, Proceedings of the 24th annual ACM symposium on Principles of distributed computing (PODC '05). p. 197-206 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Consistency Conditions for a CORBA Caching Service

    Chockler, G., Friedman, R. & Vitenberg, R., 2000, Proceedings of the 14th International Conference on Distributed Computing (DISC '00). Springer-Verlag, p. 374-388 15 p. (Lecture Notes In Computer Science; no. 1914).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Constrained Dynamic Tree Networks

    Hague, M. & Penelle, V., 2018, 12th International Conference on Reachability Problems. Springer International Publishing, p. 45-58 14 p. (Lecture Notes in Computer Science; vol. 11123).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Constrained LMS for Dynamic Flow Networks

    Eftaxias, K., Cheong Took, C., Venturini, B. & Arscott, D., 3 Jul 2017, 2017 International Joint Conference on Neural Networks (IJCNN). IEEE, p. 3254-3258 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. E-pub ahead of print

    Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 25 Dec 2016, Advances in Network Systems : Architectures, Security, and Applications. AISC ed. Springer-Verlag, Vol. 461. p. 149-166 18 p. (Advances in Intelligent Systems and Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Constraint Branching in Workflow Satisfiability Problem

    Gutin, G. & Karapetyan, D., Jun 2020, SACMAT 2020: Symposium on Access Control Models and Technologies. p. 93-103 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Constraint Expressions and Workflow Satisability

    Crampton, J. & Gutin, G., 2013, 18th ACM SACMAT. p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Forthcoming

    Constraint satisfaction problems parameterized above or below tight bounds: a survey

    Gutin, G. & Yeo, A., 2012, (Accepted/In press) Fellows Festschrift. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection

    Seeger, M., Baier, H., Busch, C. & Wolthusen, S. D., 26 May 2010, Proc. 2010 2nd International Workshop on Security and Communication Networks (IWSCN). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Constructing corporate social responsibility: A discursive and multi-level institutional approach

    Preuss, L. & Schaefer, A., Jul 2011, 27th colloquium of the European Group for Organisation Studies (EGOS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Constructing Key Assignment Schemes from Chain Partitions

    Crampton, J., Daud, R., Martin, K. M., Foresti, S. (ed.) & Jajodia, S. (ed.), 2010, Data and Applications Security and Privacy XXIV. Springer, Vol. 6166. p. 130-145 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Constructing scalable overlays for pub-sub with many topics

    Chockler, G., Melamed, R., Tock, Y. & Vitenberg, R., 1 Jan 2007, Proceedings of the 26th Annual ACM Symposium on Principles of Distributed Computing: PODC 2007. p. 109-118 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. E-pub ahead of print

    Consumer attention towards brands and products versus human face in video advertisement: An eye tracking study

    Rizvi, W. & Ameen, N., Aug 2020, American Marketing Association Summer Academic Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Consumer risk perceptions in e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 308-315 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Consumer-Centric Protection for Online Social Networks

    Akram, R. N., Ko, R. K. L. & Law, T. F., 2014, 1st Workshop on Social Network Security (SocialSec 2014) in conjunction with 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI 2014). Hasan, R. (ed.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Consuming Sustainability Narratives

    Haynes, P., 2015, Advances in Consumer Research. Diehl, K. & Yoon, C. (eds.). NA-43 ed. Duluth, MN, Vol. 43. p. 364-367 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Context-aware content-centric collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P. & Clark, T., 2012, Proceedings of the 2nd International Conference on Advanced Collaborative Networks, Systems and Applications (COLLA?12). p. 54-57 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Context-awareness and intelligence in distributed cognitive radio networks: A reinforcement learning approach

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Theory Workshop (AusCTW), 2010 Australian. p. 35-42 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Contextual analysis of word meanings in type-theoretical semantics

    Luo, Z., 2011, Logical Aspects of Computational Linguistics:6th International Conference, LACL 2011, Montpellier, France, June 29 – July 1, 2011: Proceedings. Pogodalla, S. & Prost, J-P. (eds.). Springer, p. 159-174 16 p. (Lecture Notes in Computer Science; vol. 6736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Continuous Beam Energy Measurements at Diamond Light Source

    Vitoratou, N., Karataev, P. & Rehm, G., 29 Jan 2019, International Beam Instrumentation Conference (7th) IBIC2018. JACoW Publishing, p. 107-110 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Unpublished

    Contradictions and tensions in the experience of public sector work: an ethnographic study in UK local government

    Gatenby, M. & Rees, C., Apr 2010, (Unpublished) British Sociological Association (BSA) Annual Conference. Glasgow.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture

    Akram, R. N., Markantonakis, K. & Mayes, K., Oct 2012, The 2012 International Conference on Information and Communications Security (ICICS 2012). Chow, K. P. & Hui, L. C. K. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Coordination: The evolutionary dimension

    Andrade, L. F. & Fiadeiro, J. L., 1 Jan 2001, 38th International Conference on Technology of Object-Oriented Languages and Systems, Components for Mobile Computing. p. 136-147 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Coordination Durative Actions

    Nunes, I., Fiadeiro, J. L. & Turski, W. M., 1997, COORDINATION. Springer, Vol. 1282. p. 115-130 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Coordination for Distributed Business Systems

    Andrade, L. F., Fiadeiro, J. L., Lopes, A. & Wermelinger, M., 2003, CAiSE Workshops. CEUR-WS.org, Vol. 75. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Coordination Technologies for Managing Information System Evolution

    Andrade, L. F. & Fiadeiro, J. L., 2001, CAiSE. Springer, Vol. 2068. p. 374-387 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    CopperDroid: Automatic Reconstruction of Android Malware Behaviors

    Tam, K., Khan, S., Fattori, A. & Cavallaro, L., 7 Feb 2015, NDSS Symposium 2015. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Coreset-based Conformal Prediction for Large-scale Learning

    Riquelme Granada, N., Nguyen, D. K. A. & Luo, Z., Sep 2019, Proceedings of Machine Learning Research: Proceedings of the Eighth Symposium on Conformal and Probabilistic Prediction and Applications. Vol. 105. p. 142-162 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Corporate engagement with the challenge of corruption

    Barkemeyer, R., Preuss, L. & Lee, L., Jan 2014, Africa Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Corporate engagement with the challenge of corruption: An international comparison

    Preuss, L. & Barkemeyer, R., Oct 2011, 10th annual colloquium of the Academy of Business in Society .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Corporate Investment Efficiency: The Role of Financial Development in Firms with Financeing and Agency Issues

    Naeem, K. & Li, M. C., 28 Oct 2018, Proceedings of 10th Economics & Finance Conference, Rome (Italy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Unpublished

    Corporate investment efficiency: The role of financial development in firms with financing constraints and agency issues in OECD non-financial firms

    Li, M. C., 2018, (Unpublished) New York International Business and Social Science Research Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Corporate reporting on corruption: An international comparison

    Barkemeyer, R. & Preuss, L., Aug 2012, Annual Meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Corporate social responsibility and discursive control of corporations

    Schaefer, A. & Preuss, L., Aug 2008, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Corporate social responsibility in the management of supply chains: Toward a holistic framework

    Preuss, L. & Seuring, S., Aug 2008, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Unpublished

    Corporate social responsibility: the challenge for trade unions in Europe

    Preuss, L., Rees, C. & Gold, M., Jun 2012, (Unpublished) British Universities Industrial Relations Association (BUIRA) 62nd Annual Conference. Bradford

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Correspondence between Johann George Roellig and the Court of Anhalt-Zerbst: musical responsibilities in the 1780s and the Swedish connection

    Springthorpe, N., 2015, Fasch Studien 13: 'Zerbst zur Zeit Faschs - ein anhaltinischer Musenhof'', Bericht über die Internationale Wissenschaftliche Konferenz am 17. bis 18. April 2015 im Rahmen der 13. Internationalen Fasch-Festtage in Zerbst. : Fasch-Studien Herausgegeben von der Internationale Fasch-Gesellschaft e.V. Band XIII. Siegmund, B., Musketa, K. & Reul, B. M. (eds.). Beeskow: Ortus Musikverlag, p. 229-246 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Corruption: What do multinationals have to say in the emerging debate?

    Preuss, L. & Barkemeyer, R., Jun 2012, annual meeting of the International Association for Business and Society (IABS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Countering “dead, causal reality”: The fusion of material and metaphysical oppression in Philip Dick’s late work

    Gene-Rowe, F., Jun 2014, Current Research in Speculative Fiction 2014. Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Counting Satisfying Assignments in 2-SAT and 3-SAT

    Dahllöf, V., Jonsson, P. & Wahlström, M., 2002, COCOON. p. 535-543 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Cover Your Cough: Detection of Respiratory Events with Confidence Using a Smartwatch

    Nguyen, D. K. A. & Luo, Z., Jun 2018, Proceedings of Machine Learning Research: Conformal and Probabilistic Prediction and Applications (COPA 2018). Vol. 91. p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Crafting IT jobs through the flexibility of contracting: The case of female contractors in a male-dominated sector

    Panteli, N., 5 Sep 2017, Proceedings of the British Academy of Management Conference, BAM2017: Track: Gender and Management, . The University of Warwick, September 5-7, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Unpublished

    Creating Digital Narrative Artworks: An Expanding Geographical Field

    Lowe, J., 25 Apr 2019, (Unpublished) Innovative Research Methods session at RGS-IBG PGF Mid-Term Conference 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Criteria of Efficiency for Conformal Prediction

    Vovk, V., Fedorova, V., Nouretdinov, I. & Gammerman, A., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 23-39 17 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Criterion of calibration for transductive confidence machine with limited feedback

    Nouretdinov, I. & Vovk, V., 2003, Lecture Notes in Articial Intelligence. Vol. 2842. p. 259-267 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Critical phase separation in solid helium isotopic mixtures

    Saunders, J., Cowan, B. & Poole, M., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 358-359 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Unpublished

    Cross-border mergers and the country-of-origin effect: implications for HRM?

    Edwards, T. & Rees, C., Nov 2000, (Unpublished) Association Francophone de Gestion des Ressources Humaines (AGRH) 11th Annual Congress. Paris.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Unpublished

    Cross-border mergers and the country-of-origin effect: trade union responses

    Edwards, T. & Rees, C., Mar 2001, (Unpublished) Wissenschaftszentrum Berlin (WZB) Conference on 'Cross-Border Mergers and Employee Participation in Europe'. Paris.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Cross-cultural Leadership Behavior Adjustment: Expatriate Senior Managers in China

    Tsai, C-J. & Qiao, K., 2017, Academy of Management Annual Meeting (AOM), Atlanta, Georgia, August 4-8. (Awarded Best Paper, HR Division).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2011, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Crossvergence in CSR priorities of developing country firms

    Preuss, L. & Barkemeyer, R., Jan 2014, Africa Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Crowdfunding and social identity in Northern and Latin America

    Kromidha, E., 2016, Proceedings of the 6th Latin American and European Meeting on Organization Studies, 6-9 April 2016 . Viña del Mar, Chile

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Crowdsourcing Lightweight Pyramids for Manual Summary Evaluation

    Shapira, O., Gabay, D., Gao, Y., Ronen, H., Pasunuru, R., Bansal, M., Amsterdamer, Y. & Dagan, I., Jun 2019, Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics, Vol. 1. p. 682-687 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Crusader Perceptions of Byzantium, c.1095 to c.1150

    Phillips, J., 21 Feb 2019, Byzantium and the West: Perception and Reality (C12th to C15th). Chrissis, N., Kolia-Dermitzaki, A. & Papageorgiou, A. (eds.). Abingdon: Routledge

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Cryptanalysis of the EPBC authenticated encryption mode

    Mitchell, C. J., 2007, Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings. Springer-Verlag, Vol. 4887. p. 118-128 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. E-pub ahead of print

    Cryptanalysis of the multivariate encryption scheme EFLASH

    Øygarden, M., Felke, P., Raddum, H. & Cid, C., 14 Feb 2020, Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). Springer, p. 85-105 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Cryptanalysis of two variants of PCBC mode when used for message integrity

    Mitchell, C. J., 2005, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Boyd, C. & Gonzalez-Nieto, J. (eds.). Springer-Verlag, Vol. 3574. p. 560-571 12 p. (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    CryptoCache: Network caching with confidentiality

    Leguay, J., Paschos, G., Quaglia, E. & Smyth, B., 31 Jul 2017, 2017 IEEE International Conference on Communications (ICC). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. E-pub ahead of print

    Cryptographic Enforcement of Information Flow Policies Without Public Information

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 9 Jan 2016, 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . Malkin, T., Kolesnikov, V., Bishop Lewko, A. & Polychronakis, M. (eds.). p. 389-408 20 p. (Lecture Notes in Computer Science; vol. 9092).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Cryptographic Enforcement of Role-Based Access Control

    Crampton, J., 2010, Proceedings of 7th International Workshop on Formal Aspects of Security and Trust. Springer, p. 191-205 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Cryptographic Protocol Synthesis and Verification for Multiparty Sessions

    Bhargavan, K., Corin, R., Denielou, P-M., Fournet, C. & Leifer, J. J., 2009, PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM. LOS ALAMITOS: IEEE COMPUTER SOC, p. 124-140 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2007, Proceedings of the 12th Nordic Workshop on Secure IT Systems. p. 49-60 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Crystal Structure Prediction via Oblivious Local Search

    Antypov, D., Deligkas, A., Gusev, V., Rosseinsky, M. J., Spirakis, P. G. & Theofilatos, M., 12 Jun 2020, 18th International Symposium on Experimental Algorithms, SEA 2020. Faro, S. & Cantone, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. 21. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 160).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    C-SHORe: A Collapsible Approach to Verifying Higher-Order Programs

    Broadbent, C., Carayol, A., Hague, M. & Serre, O., 25 Sep 2013, ICFP: International Conference on Functional Programming. p. 13-24 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    CSR priorities of emerging economy firms: Is Russia different from the other emerging economies

    Preuss, L. & Barkemeyer, R., Sep 2010, 9th annual colloquium of the Academy of Business in Society (ABIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published
  89. Unpublished

    Culture-Centric Studies of Marketing and Consumption in Brazil

    Ferreira, M. C., Figueiredo, B., Pereira, S. & Scaraboto, D., 2 Jul 2014, (Unpublished) Proceedings of the 39th Annual Macromarketing Conference. Macromarketing Society, Inc., p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Curb Your Enthusiasm: Why the Future is Not Stuxnet

    Haggman, A., 2 Jul 2015, Proceedings of the 14th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, p. 397-403 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Customer Agility Capabilities at EuroBank: The Role of ICT and Organizational Routines

    Hallikainen, P., Merisalo-Rantanen, H. & Elbanna, A., 2017, Australasian Conference on Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Customizing Conventional Patent-based Financial Instruments for Financing Nanotechnology Firms: An Iranian Perspective

    Nasiri, A., 2010, International Conference on Nanotechnology and Biosensors (ICNB). Hong Kong, China

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. E-pub ahead of print

    Cybersecurity Readiness of E-tail Organisations: A Technical Perspective

    Shah, M., Muhammad, R. & Ameen, N., 1 Apr 2020, Responsible Design, Implementation and Use of Information and Communication Technology: 19th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6–8, 2020, Proceedings, Part I. p. 153-160 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise

    Creese, S., Goldsmith, M., Moffat, N., Happa, J. & Agrafiotis, I., 2013, IEEE Conference on Technologies for Homeland Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Dancing with strangers: observing play, movement and interaction in a public square through the lens of a dancer, a writer and a painter

    Coppard, H., 30 Sep 2014, Children and Families in Changing Urban Spaces conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Dare to innovate by taking care of hurdles to innovation

    Guenther, E., Hueske, A-K., Kesting, P., Linnenluecke, M., Moeller, K. & Preuss, L., Aug 2010, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Data caching as a cloud service

    Chockler, G., Laden, G. & Vigfusson, Y., 2010, Proceedings of the 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS '10). ACM, p. 18-21 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Data Dependent Power Use in Multipliers

    Walter, C. D. & Samyde, D., 2005, 17th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 4-12 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Data Integrity in Hardware for Modular Arithmetic

    Walter, C. D., 2000, CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1965. p. 204-215 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Data Is a Stream: Security of Stream-Based Channels

    Fischlin, M., Günther, F., Marson, G. A. & Paterson, K., 1 Aug 2015, Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Gennaro, R. & Robshaw, M. (eds.). Springer Verlag, Vol. 9216. p. 545-564 20 p. (Lecture Notes in Computer Science; vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Data Structures for Constraint Enforcement in Role-Based Systems

    Crampton, J. & Khambhammettu, H., 2005, Proceedings of the 2005 IASTED Conference on Network and Information Security. p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. E-pub ahead of print

    Data-Driven Robust Control for Type 1 Diabetes Under Meal and Exercise Uncertainties

    Paoletti, N., Liu, K. S., Smolka, S. A. & Lin, S., 1 Sep 2017, Computational Methods in Systems Biology. Feret, J. & Koeppl, H. (eds.). Springer, p. 214-232 19 p. (Lecture Notes in Computer Science; vol. 10545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    Dataset Construction and Analysis of Screenshot Malware

    Sbai, H., Happa, J., Goldsmith, M. & Meftali, S., 29 Dec 2020, International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Published

    Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

    Weldehawaryat, G., Ambassa, P., Marufu, A., Wolthusen, S. & Kayem, A. V. D. M., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 69-86 18 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  105. E-pub ahead of print

    Decidable Models of Integer-Manipulating Programs with Recursive Parallelism

    Hague, M. & Lin, A., 13 Sep 2016, Reachability Problems: 10th International Workshop, RP 2016, Aalborg, Denmark, September 19-21, 2016, Proceedings. Springer International Publishing, Vol. 9899. p. 148-162 15 p. (Lecture Notes in Computer Science; vol. 9899).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. Published

    Declarative agent control

    Kakas, A., Mancarella, P., Sadri, F., Stathis, K. & Toni, F., 2004, Computational Logic in Multi-agent Systems (CLIMA 2004). Springer-Verlag, Vol. 3487. p. 96-110 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  107. Published

    Decoherence of a quantum bit circuit

    Ithier, G., Nguyen, F., Collin, E., Boulant, N., Meeson, P. J., Joyez, P., Vion, D. & Esteve, D., 2007, Quantum Decoherence: Poincare Seminar 2005. Duplantier, B., Raimond, JM. & Rivasseau, V. (eds.). CAMBRIDGE: Birkhauser, Boston, p. 125-149 25 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  108. Published

    Deconfinement and cold atoms in optical lattices

    Cazalilla, M. A., Ho, A. F. & Giamarchi, T., 2006, RECENT PROGRESS IN MANY-BODY THEORIES: Proceedings of the 13th International Conference, Buenos Aires, Argentina, 5 – 9 December 2005. Hernández, S. & Cataldo, H. (eds.). p. 208-217 10 p. (Series on Advances in Quantum Many-Body Theory ; vol. 10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Forthcoming

    Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper

    Meister, J. A., Akram, R. N. & Markantonakis, K., 7 Nov 2018, (Accepted/In press) The 12th WISTP International Conference on Information Security Theory and Practice (WISTP'2018). Blazy, O. & Yeun, C. Y. (eds.). Brussels, Belgium: Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  110. Forthcoming

    Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the 6th International Workshop on Critical Information Infrastructures Security 2011 (CRITIS 2011). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  111. Published

    Defending financial infrastructures through early warning systems: The intelligent cloud approach

    Lodi, G., Querzoni, L., Baldoni, R., Marchetti, M., Colajanni, M., Bortnikov, V., Chockler, G., Dekel, E., Laventman, G. & Roytman, A., 2009, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies (CSIIRW '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  112. Published

    Defensive Forecast for Conformal Bounded Regression

    Nouretdinov, I. & Lebedev, A., Oct 2013, The 9th Artificial Intelligence Applications and Innovations Conference (AIAI): 2nd Workshop on Conformal Prediction and its Applications. p. 384-393 10 p. (IFIP Advances in Information and Communication Technology; vol. 412).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  113. Published

    Defensive forecasting

    Vovk, V., Takemura, A. & Shafer, G., 2005, Proceedings of the Tenth International Workshop on Articial Intelligence and Statistics. Cowell, R. & Ghahramani, Z. (eds.). p. 365-372 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  114. Published

    Defensive forecasting for linear protocols

    Vovk, V., Nouretdinov, I., Takemura, A. & Shafer, G., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, Vol. 3734. p. 459-473 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  115. Published

    Defensive prediction with expert advice

    Vovk, V., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, p. 444-458 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  116. Published

    Definitions of corporate social responsibility: Content, range of authors, evolution over time

    Preuss, L., 2015, Annual Meeting of the International Association for Business and Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  117. Published

    Delay and jitter attacks on hierarchical state estimation

    Baiocco, A., Foglietta, C. & Wolthusen, S., 21 Mar 2016, Proceedings of the 2015 IEEE International Conference on Smart Grid Communications. IEEE Press, p. 485-490

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  118. Published

    Delegation and satisfiability in workflow systems

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 31-40 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  119. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H., 2006, Proceedings of 11th European Symposium on Research in Computer Security. Springer, p. 174-191 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  120. Published

    Democratising Capitalism: Employee Share ownership schemes and unions

    Sen Gupta, S., 2013, European Academy of Management, University of Galatsaray, Istanbul, Turkey.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  121. Published

    Dependent coercions

    Luo, Z. & Soloviev, S., 1999, Proc of the 8th Inter. Conf. on Category Theory in Computer Science (CTCS'99), Edinburgh, Scotland. Electronic Notes in Theoretical Computer Science, Vol 29.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  122. Published

    Dependent Randomized Rounding: The Bipartite Case

    Doerr, B., Künnemann, M. & Wahlström, M., 2011, 2011 Proceedings of the Thirteenth Workshop on Algorithm Engineering and Experiments (ALENEX). Müller-Hannemann, M. & Werneck, R. (eds.). San Francisco, California, USA: SIAM, p. 96-106 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  123. Published

    Dependent record types revisited

    Luo, Z., 2009, Modules and Libraries for Proof Assistants (MLPA'09), ACM Inter. Conf. Proceeding Series. Vol. 429.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  124. Published

    Derandomizing stochastic prediction strategies

    Vovk, V., 1997, Proceedings of the Tenth Annual Conference on Computational Learning Theory. Freund, Y. & Schapire, R. (eds.). New York: ACM Press, p. 32-44 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  125. Published

    Deriving Ancient Foot Units from Building Dimensions: a Statistical Approach Employing Cosine Quantogram Analysis

    Pakkanen, J., 2002, Archaeological Informatics: Pushing the Envelope. CAA 2001: Computer Applications and Quantitative Methods in Archaeology. Proceedings of the 29th Conference, Gotland, April 2001. Burenhult, G. & Arvidsson, J. (eds.). Oxford: Archaeopress, p. 501–506 (BAR International Series; vol. 1016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  126. Published

    Deriving authentication for pervasive security

    Pavlovic, D. & Meadows, C., 2008, Proceedings of the ISTPS 2008. McLean, J. (ed.). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  127. Forthcoming

    Deriving ephemeral authentication using channel axioms

    Pavlovic, D. & Meadows, C., 2012, (Accepted/In press) Proceedings of the Cambridge Workshop on Security Protocols 2009. Christianson, B. (ed.). Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  128. Published

    Description and Classification of Rhodoliths (Rhodoids, Rhodolites)

    Bosence, D., 1983, Coated Grains. Peryt, T. M. (ed.). Springer Berlin / Heidelberg, p. 217-224 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  129. Published

    Description of Laser Transport and Delivery System for the FETS Laserwire Emittance Scanner

    Bosco, A., Boorman, G., Emery, S., Gibson, S., Gabor, C., Hofmann, T., Pozimski, J. & Savage, P., 19 Sep 2013, 2nd International Beam Instrumentation Conference. p. 527-530 4 p. TUPF14

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  130. Published

    Design and development of a facebook application to raise privacy awareness

    Costantino, G. & Sgandurra, D., 2015, Proceedings - 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2015. Institute of Electrical and Electronics Engineers Inc., p. 583-586 4 p. 7092778

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  131. Published

    Design of a Laser-based Profile Monitor for LINAC4 Commissioning at 50 MeV and 100 MeV

    Hofmann, T., Boorman, G., Bosco, A., Bravin, E., Gibson, S. & Griesmayer, E., Jan 2016, 4th International Beam Instrumentation Conference: IBIC2015, Melbourne, Australia. JACoW Publishing, p. 451-455 4 p. TUPB055

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  132. Published

    Design of a multiagent-based e-marketplace to secure service trading on the Internet

    Li, Q., Martin, K. M. & Zhang, J., 2011, Proceedings of the 13th International Conference on Electronic Commerce (ICEC 2011) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  133. Published

    Design of the beam delivery system for the international linear collider

    Seryi, A., Amann, J., Arnold, R., Asiri, F., Bane, K., Bellomo, P., Doyle, E., Fasso, A., Jonghoon, K., Keller, L., Ko, K., Li, Z., Markiewicz, T., Maruyama, T., Moffeit, K., Molloy, S., Nosochkov, Y., Phinney, N., Raubenheimer, T., Seletskiy, S. & 81 others, Smith, S., Spencer, C., Tenenbaum, P., Walz, D., White, G., Woodley, M., Woods, M., Xiao, L., Anerella, M., Jain, A., Marone, A., Parker, B., Delferriere, O., Napoly, O., Payet, J., Uriot, D., Watson, N., Agapov, I., Baldy, J-L., Schulte, D., Burt, G., Dexter, A., Buesser, K., Lohmann, W., Bellantoni, L., Drozhdin, A., Kashikhin, V., Kuchler, V., Lackowski, T., Mokhov, N., Nakao, N., Peterson, T., Ross, M., Striganov, S., Tompkins, J., Wendt, M., Yang, X., Enomoto, A., Kuroda, S., Okugi, T., Sanami, T., Suetsugu, Y., Tauchi, T., Alabau, M. D. C., Bambade, P., Brossard, J., Dadoun, O., Burrows, P., Christian, G., Clarke, C., Constance, B., Khah, H. D., Hartin, A., Perry, C., Swinson, C., Ferrari, A., Blair, G., Boogert, S., Carter, J., Angal-Kalinin, D., Beard, C., Densham, C., Fernandez-Hernando, L., Greenhalgh, J., Goudket, P., Jackson, F., Jones, J., Kalinin, A., Ma, L., McIntosh, P., Yamamoto, H., Mattison, T., Carwardine, J., Saunders, C., Appleby, R., Torrence, E., Gronberg, J., Sanuki, T., Iwashita, Y., Telnov, V. & Warner, D., 2007, Particle Accelerator Conference, 2007. PAC. IEEE. p. 3773-3775 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  134. Published

    Design, development and use of the spectrometer for investigating coherent THz radiation produced by micro-bunching instabilities at Diamond Light Source

    Finn, A., Karataev, P. & Rehm, G., 1 Jul 2016, Journal of Physics: Conference Series. Karataev, P., Potylitsyn, A., Tyukhtin, A. & Strikhanov, M. (eds.). UK: IOP PUBLISHING LTD, Vol. 732. p. 1-9 9 p. 012039. (Radiation from Relativistic Electrons in Periodic Structures; vol. 732).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  135. Published

    Design, Installation and Execution of a Security Agent for Mobile Stations.

    Sirett, W. G., MacDonald, J. A., Mayes, K. & Markantonakis, K., 2006, CARDIS. Domingo-Ferrer, J., Posegga, J. & Schreckling, D. (eds.). Springer, Vol. 3928. p. 1-15 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  136. Unpublished

    Designing digital games as a geographical research method

    Lowe, J., 1 Jul 2020, (Unpublished) Using the Digital: Methodologies, Teaching, and Everyday Practice: Digital Geographies Research Group Virtual Annual Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  137. Published

    Designing for creep in composites

    Hogg, P. J., 1998, DESIGNING COST-EFFECTIVE COMPOSITES. WESTMINISTER: PROFESSIONAL ENGINEERING PUBLISHING LTD, p. 93-106 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  138. E-pub ahead of print

    Designing Robust Software Systems through Parametric Markov Chain Synthesis

    Calinescu, R., Ceska, M., Gerasimou, S., Kwiatkowska, M. & Paoletti, N., 18 May 2017, Software Architecture (ICSA), 2017 IEEE International Conference on. p. 131-140 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  139. Published

    Designing Workflows for Grid Enabled Internet Instruments

    Stirling, D., Welch, I. & Komisarczuk, P., 2008, 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France. p. 218-225 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  140. Published

    De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S., 9 Sep 2018, Proceedings of the 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017). Springer-Verlag, p. 131-143 13 p. (Lecture Notes in Computer Science; vol. 10707).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  141. Published

    Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?

    Crampton, J. & Huth, M., 2009, Proceedings of 5th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  142. E-pub ahead of print

    Detecting disguised processes using application-behavior profiling

    Vaas, C. & Happa, J., 8 Jun 2017, Technologies for Homeland Security (HST), 2017 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  143. Published

    Detecting Exceptions in Commitment Protocols: Discovering Hidden States

    Kafali, O. & Yolum, P., 2010, Languages, Methodologies and Development Tools for Multi-Agent Systems. Vol. 6039. p. 112-127 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  144. Published

    Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013. p. 300-303 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  145. Published

    Detecting Malicious Code by Model Checking

    Kinder, J., Katzenbeisser, S., Schallhart, C. & Veith, H., 2005, Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, p. 174-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  146. Published

    Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach

    Hague, M., Lin, A. & Ong, C-H. L., 23 Oct 2015, OOPSLA: Object-Oriented Programming Systems, Languages and Applications. New York, NY: ACM, p. 1-19 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  147. Published

    Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes

    Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 81-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  148. Published

    Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 310-316 7 p. (Lecture Notes in Computer Science; vol. 10898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  149. Forthcoming

    Determining Confidence of Predicted Interactions Between HIV-1 and Human Proteins Using Conformal Method

    Nouretdinov, I., Gammerman, A., Qi, Y. & Klein-Seetharaman, J., 2012, (Accepted/In press) Pacific Symposium on Biocomputing. Vol. 17. p. 311-322 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  150. Published

    Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) Attacks

    Esnaashari, S., Welch, I. & Komisarczuk, P., 2013, 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013. p. 725-729 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  151. Published

    Deterministic versus Probabilistic Methods for Searching for an Evasive Target

    Bernardini, S., Fox, M., Long, D. & Piacentini, C., 12 Feb 2017, Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17). p. 3709-3715 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  152. Published

    Developing a multi-level framework of sustainability innovation

    Dyerson, R. & Preuss, L., Sep 2011, 25th annual conference of the British Academy of Management (BAM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  153. Published

    Developing a Typology of Social Commerce Websites- An Exploratory Study

    Panteli, N., 2015, 2015 Academy of Marketing Conference – The Magic in Marketing: University of Limerick, Ireland 7-9 July 2015. O'Malley, L. (ed.). p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  154. Published

    Developing reuse technology in proof engineering

    Luo, Z., 1 Apr 1995, Proceedings of AISB95, Workshop on Automated Reasoning: bridging the gap between theory and practice, Sheffield, U.K..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  155. Published

    Developing virtual medical communities

    Panteli, N. & Sims, J., 2010, Proceedings of the IADIS International Conference e-Health 2010, EH, Part of the IADIS Multi Conference on Computer Science and Information Systems 2010, MCCSIS 2010. p. 249-252 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  156. Published

    Development and testing of the inTouch video link for people with dementia: Design approach and practical challenges

    Boyd, H., Jones, S., Harris, N., Panteli, N., Leake, J. & Jones, R., 29 Dec 2014, Proceedings - 2014 IEEE International Conference on Bioinformatics and Biomedicine, IEEE BIBM 2014. Institute of Electrical and Electronics Engineers Inc., p. 608-612 5 p. 6999231

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  157. Published

    Development of a BPM System using a Commercial FPGA Card and Digitizer Adaptor Module for FETS

    Boorman, G., Gibson, S., Jolly, S., D'Arcy, R., Lawrie, S. & Letchford, A., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 3716-3719 4 p. THPME186

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  158. Published

    Development of a Prototype Electro-Optic Beam Position Monitor at the CERN SPS

    Arteche, A., Bosco, A., Gibson, S., Chritin, N., Draskovic, D., Lefevre, T. & Levens, T., Feb 2017, 5th International Beam Instrumentation Conference: 11-15 September 2016, Barcelona, Spain. Geneva: JACoW Publishing, p. 1-4 4 p. WEPG09

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  159. Published

    Development of microwave and soft X-ray sources based on coherent radiation and Thomson scattering

    Aryshev, A., Araki, A., Fukuda, M., Karataev, P., Naumenko, G., Potylitsyn, A., Sakaue, K., Sukhikh, L., Urakawa, J. & Verigin, D., 2010, VIII INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2009). Strikhanov, MN. & Pivovarov, YL. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  160. Published

    Development of natural HEMP fibre sheet mould composites (NF- SMC)

    Ren, G., Patel, H., Hapuarachchi, D., Crowther, S., Fan, M. & Hogg, P. J., 1 Dec 2009, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  161. Published

    Development of the C-Band BPM System for ATF2

    Molloy, S., Ainsworth, R., Boogert, S., Boorman, G., Heo, A., Kim, H. -S., Kim, E. -S., Honda, Y., Tauchi, T., Terunuma, N., Lyapin, A., Maiheu, B., Wing, M., McCormick, D. J., Nelson, J., White, G. R., Shin, S. & Ward, D. R., 2009, Proceedings of IPAC'09, Vancouver, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  162. Published

    Development of the Sorong Fault Zone north of Misool Eastern Indonesia

    Saputra, A., Hall, R. & White, L., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. Jakarta, Indonesia, p. 1-14 IPA14-G-086

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  163. Published

    DEX: Self-Healing Expanders

    Pandurangan, G., Robinson, P. & Trehan, A., 2014, 2014 IEEE 28th International Parallel and Distributed Processing Symposium, Phoenix, AZ, USA, May 19-23, 2014. p. 702-711 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  164. Published

    Diabetes, Type 1

    Riazi, A. & Bradley, C., 2000, Encyclopedia of Stress . Fink, G. (ed.). San Diego: Acadamic Press, p. 688-693 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  165. Published

    Diagnosing Commitments: Delegation Revisited (Extended Abstract)

    Kafali, O. & Torroni, P., 2011, AAMAS 2011: 10th International Conference on Autonomous Agents and Multiagent Systems. p. 1175-1176 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  166. Published

    Diagnosing the Clinician: Business Capability Development and GP Practices

    Dyerson, R., Nov 2017, 2017 Proceedings of the International Small Business & Entrepreneurship conference, Belfast. 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  167. Published

    DIESECT: A DIstributed Environment for Simulating E-commerce ContracTs

    Wood, D., Kafali, O. & Stathis, K., 2013, E-Commerce and Web Technologies. Huemer, C. & Lops, P. (eds.). Springer Berlin / Heidelberg, Vol. 152. p. 39-50 12 p. (Lecture Notes in Business Information Processing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  168. Published

    Differential Cryptanalysis of Round-Reduced Sparx-64/128

    Ankele, R. & List, E., 2018, ACNS 2018 Applied Cryptography & Network security.. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 459-475 17 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  169. Published

    Differential Privacy for Deep Learning-based Online Energy Disaggregation System

    Zhang, X. & Kuenzel, S., 10 Nov 2020, The 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe) . IEEE, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  170. Published

    DIFFUSE NEUTRON-SCATTERING FROM EXCESS OXYGEN IN UO2.13

    GOFF, J. P., HUTCHINGS, M. T., BROWN, K., HAYES, W. & GODFRIN, H., 1990, NEUTRON SCATTERING FOR MATERIALS SCIENCE. SHAPIRO, SM., MOSS, SC. & JORGENSEN, JD. (eds.). PITTSBURGH: MATERIALS RESEARCH SOC, p. 373-377 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  171. Published

    Digital Liminalities: Understanding Isolated Communities on the Edge

    Jensen, R. B., Coles-Kemp, L., Wendt, N. & Lewis, M., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  172. Published

    Digital rights management using a mobile phone

    Abbadi, I. & Mitchell, C. J., 2007, Proceedings of ICEC 2007, Ninth International Conference on Electronic Commerce, Minneapolis, USA, August 2007. ACM Press, p. 185-194 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  173. Published

    Digital Trust - Trusted Computing and Beyond A Position Paper

    Akram, R. N. & Ko, R. K. L., 2014, The 7th IEEE International Symposium on Security, Privacy and Anonymity in Internet of Things (IEEE SpaIoT 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Marmol, F. G., Tapiador, J. E. & Dong, M. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  174. Published

    Digitalised Welfare: Systems For Both Seeing and Working With Mess

    Morris, A., Coles-Kemp, L. & Jones, W., Jul 2020, WebSci '20 conference. ACM, p. 26-31 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  175. Published

    Digitally signed documents - Ambiguities and solutions

    Alsaid, A. & Mitchell, C. J., 2004, Proceedings - International Network Conference 2004 (INC 2004), University of Plymouth, UK, July 2004. Plymouth University, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  176. Published

    Directed Acyclic Subgraph Problem Parameterized above Poljak-Turzik Bound

    Crowston, R., Gutin, G. & Jones, M., 2012, FSTTCS 2012: LIPICS . Vol. 18. p. 400-411

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  177. Published

    Directed multicut is W[1]-hard, even for four terminal pairs

    Pilipczuk, M. & Wahlstrom, M., 2016, Proceedings of SODA 2016. Krauthgamer, R. (ed.). SIAM, p. 1167-1178 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  178. Unpublished

    Directionality of Cultural Flows in Intercultural Performance: Power Politics and Intercultural Identities

    Li, X., 5 Dec 2019, (Unpublished) 2019 Performance as Method from Global Perspectives: Historical Memory, Technologies of the Self, and Cultural Production.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  179. Published

    Discourse and organizational transformation in information systems research

    Barrett, M., Heracleous, L., Orlikowski, W. & Panteli, N., 2003, Global and Organizational Discourse about Information Technology : IFIP TC8 / WG8.2 Working Conference on Global and Organizational Discourse about Information Technology December 12–14, 2002, Barcelona, Spain. Springer, p. 533-538 6 p. (IFIP Advances in Information and Communication Technology; vol. 110).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  180. Published

    Discretionary and Mandatory Control for Role-Based Administration

    Crampton, J., 2006, Data Applications and Security XX. Damiani, E. & Liu, P. (eds.). Springer, p. 194-208 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  181. Published

    Disk laser welding of Ti6Al4V alloy

    Mastrocinque, E., Corrado, G., Caiazzo, F., Pasquino, N., Sergi, V. & Acerra, F., 2011, ICPR 21st International Conference on Production Research: Innovation in Product and Production. p. 1-6

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  182. Published

    Display and Dilemmas: Methodological Reflections on Grasping the We

    Khanijou, R. & Pirani, D., 2019, 6th BSA Food Study Group Conference, Prato, 24-25 June.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  183. Published

    Disrupt the disruptor: rethinking ‘disruption’ in digital innovation

    Elbanna, A. & Newman, M., Sep 2016, Tenth Mediterranean Conference on Information Systems (MCIS), Paphos, Cyprus, September 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  184. Published

    Dissecting the Role of Protectable Intellectual Property in Financing Nanotech Firms

    Nasiri, A., 2010, 2nd International Conference on Intellectual Capital Management (IICM). Zanajn, Iran

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  185. Published

    Dissemination of the ultra-low temperature scales PLTS-2000

    Rusby, R., Cousins, D., Head, D., Mohandas, P., Godfrin, H., Bunkov, M., Bauerle, C., Harakaly, R., Collin, E., Triqueneaux, S., Lusher, C., Li, J., Saunders, J., Cowan, B., Nyeki, J., Digby, M., Pekola, J., Gloos, K., Hernandez, P., de Groot, M. & 13 others, Peruzzi, A., Jochemsen, R., Chinchure, A., Bosch, W., Mathu, F., Flokstra, J., Veldhuis, D., Hermier, Y., Pitre, L., Verge, A., Benhalima, F., Fellmuth, B. & Engert, J., 2002, TEMPMEKO 2001: 8TH INTERNATIONAL SYMPOSIUM ON TEMPERATURE AND THERMAL MEASUREMENT IN INDUSTRY AND SCIENCE, VOL 1. BERLIN 12: V D E - VERLAG GMBH, p. 525-530 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  186. Forthcoming

    Distance Bounding for RFID: Effectiveness of Terrorist Fraud

    Hancke, G., Nov 2012, (Accepted/In press) IEEE RFID-TA. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  187. Published

    Distinguishing Exponent Digits by Observing Modular Subtractions

    Walter, C. D. & Thompson, S., 2001, CT-RSA 2001. Naccache, D. (ed.). Springer, Vol. 2020. p. 192-207 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  188. Published

    Distributed Computation of Large-scale Graph Problems

    Klauck, H., Nanongkai, D., Pandurangan, G. & Robinson, P., 2015, Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015, San Diego, CA, USA, January 4-6, 2015. p. 391-410 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  189. E-pub ahead of print

    Distributed Conformal Anomaly Detection

    Nouretdinov, I., 2 Feb 2017, Machine Learning and Applications (ICMLA), 2016 15th IEEE International Conference on. IEEE Computer Society, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  190. Published

    Distributed e-Voting using the Smart Card Web Server

    Kyrillidis, L., Cobourne, S., Mayes, K., Dong, S. & Markantonakis, K., 2012, Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). Martinelli, F., Lanet, J-L., Fitzgerald, W. & Foley, S. (eds.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  191. Published

    Distributed Symmetry Breaking in Hypergraphs

    Kutten, S., Nanongkai, D., Pandurangan, G. & Robinson, P., 2014, Distributed Computing - 28th International Symposium, DISC 2014, Austin, TX, USA, October 12-15, 2014. Proceedings. p. 469-483 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  192. Published

    Distributing private data in challenged network environments

    Haile, Y., Reda, A. & Noble, B., 26 Apr 2010, WWW '10: Proceedings of the 19th international conference on World wide web. Association for Computing Machinery (ACM), p. 801-810 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  193. Published

    Distributional Learning of some Context-free Languages with a Minimally Adequate Teacher

    Clark, A., 1 Sep 2010, Grammatical Inference: Theoretical Results and Applications. p. 24-37

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  194. Published

    Diversified Process Replicae for Defeating Memory Error Exploits

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  195. Unpublished

    Diversity in international HR transfer processes: evidence from a Swiss MNC in Sri Lanka

    Rees, C. & Samaratunga, M., Jun 2007, (Unpublished) EBS/CRANET Conference on 'Changes in Society, Changes in Organizations, and the Changing Role of HRM' . Tallinn.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  196. Published

    Do Birds of a Feather Flock Together? Determinants of Social Enterprise Sustainability and Location

    thirlaway, K., Haugh, H. & Robson, P., Aug 2014, 2014 Academy of Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  197. Published

    Do employee share ownership schemes contribute towards greater economic and industrial democracy: analysis using the WERS 98 cross section dataset

    Sen Gupta, S., 2005, European Academy of Management (EURAM), Munich, Germany.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  198. Published

    Do people converge to the linguistic patterns of non-reliable speakers? Perceptual learning from non-native speakers.

    Lev Ari, S. & Peperkamp, S., 2014, Proceedings of the 10th International Seminar on Speech Production (ISSP). p. 261 264 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  199. Published

    Do resistant seeds offer a worthwhile avenue for progress in stored product protection?

    Credland, P. F. & Appleby, J. H., 2003, ADVANCES IN STORED PRODUCT PROTECTION. CAMBRIDGE: CABI PUBLISHING, p. 50-58 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  200. Published

    Documentation and computer reconstruction strategies in the study of architecture at the sanctuary of Poseidon at Kalaureia, Greece

    Pakkanen, J., 2009, Archäologie und Computer. Workshop 13: Kulturelles Erbe und Neue Technologien 03–05. November 2008. Börner, W. & Uhlirz, S. (eds.). Wien: Museen der Stadt Wien - Stadtarchäolgie, 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  201. Published

    Does My Rebuttal Matter? Insights from a Major NLP Conference

    Gao, Y., Eger, S., Kuznetsov, I., Gurevych, I. & Miyao, Y., Jun 2019, Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Minneapolis, Minnesota: Association for Computational Linguistics, Vol. 1. p. 1274–1290 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  202. Published

    Doing Contracting, Being Flexible, Crafting Careers: The case of female contractors in the IT sector

    Panteli, N., 2017, 10th Critical Management Conference 2017. Liverpool, July 3-5, 2017. : Stream: Reclaiming Flexibility: Workplace Flexibility in the Contemporary Economy. Liverpool, July 3-5, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  203. Published

    Domains for Higher-Order Games

    Hague, M., Meyer, R. & Muskalla, S., 2017, 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2017). LIPIcs, p. 59:1-59:15 15 p. 59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  204. Published

    Domination Above r-Independence: Does Sparseness Help?

    Einarson, C. & Reidl, F., 30 Aug 2019, 44th International Symposium on Mathematical Foundations of Computer Science (MFCS 2019). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 138. p. 40:1-40:13 13 p. 40. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  205. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 19 Oct 2015, 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  206. Published

    Dr. Multicast: Rx for Data Center Communication Scalability

    Vigfusson, Y., Abu-Libdeh, H., Balakrishnan, M., Birman, K., Burgess, R., Chockler, G., Li, H. & Tock, Y., Apr 2010, EuroSys '10 Proceedings of the 5th European conference on Computer systems. Paris, France: ACM, p. 349-362 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  207. Published

    Drive-Witness Acceleration Scheme Based on Corrugated Dielectric mm-Scale Capillary

    Lekomtsev, K., Lyapin, A., Boogert, S., Karataev, P., Aryshev, A., Shevelev, M., Tishchenko, A., Terunuma, N. & Urakawa, J., 20 Jun 2017, Proceedings of the 8th International Particle Accelerator Conference. The Joint Accelerator Conferences Website, p. 3292-3295 4 p. (International Particle Accelerator Conference ; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  208. Published

    DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L., 4 Aug 2016, Security and Privacy Workshops (SPW), 2016 IEEE: Mobile Security Technologies (MoST 2016). IEEE, p. 252-261 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  209. Published

    DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

    Suarez de Tangil Rotaeche, G., Dash, S., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L., 22 Mar 2017, ACM CODASPY. ACM, p. 309-320 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  210. Published

    Drug cocktail selection for the treatment of chagas disease: A multi-objective approach

    Torres Bobadilla, M., Caceres Silva, J., Jimenez, R., Yubero, V., Vega, C., Rolón, M., Cernuzzi, L., Barán, B. & Paccanaro, A., 21 Dec 2017, SLIOIA - Simposio Latinoamericano de Investigación de Operaciones e Inteligencia Artificial 2017. p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  211. Published

    Drug targets prediction using chemical similarity

    Galeano Galeano, D. & Paccanaro, A., 26 Jan 2017, XLII Conferencia Latinoamericana de Informatica (CLEI). IEEE Xplore, p. 1-7 7 p. (2016 XLII Latin American Computing Conference (CLEI)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  212. Published

    Duni's 'Le Retour au village' and the Politics of Parma

    Charlton, D., 2014, I due mondi di Duni.: Il teatro musicale di un compositore illuminista fra Italia e Francia. Russo, P. (ed.). Lucca: Libreria Musicale Italiana, p. 119-54 36 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  213. Published

    DYKE EMPLACEMENT AT DIVERGENT PLATE BOUNDARIES

    GUDMUNDSSON, A., 1990, MAFIC DYKES AND EMPLACEMENT MECHANISMS. PARKER, AJ., RICKWOOD, PC. & TUCKER, DH. (eds.). ROTTERDAM: A A BALKEMA, p. 47-62 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  214. Published

    Dyke propagation paths in heterogeneous volcanoes

    Drymoni, K., Browning, J. & Gudmundsson, A., 2018, VMSG 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  215. Published

    Dyke propagation through heterogeneous successions

    Drymoni, K., Rust, A., Cashman, K., Browning, J. & Gudmundsson, A., 2017, IAVCEI 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  216. Published

    Dynamic capabilities for sustainability

    Preuss, L. & Dyerson, R., Jul 2012, 11th annual colloquium of the Academy of Business in Society (ABIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  217. Published

    Dynamic data integration using web services

    Zhu, F., Turner, M., Kotsiopoulos, I., Bennett, K., Russell, M., Budgen, D., Brereton, P., Keane, J., Layzell, P., Rigby, M. & Xu, J., 2004, IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 262-269 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  218. Published

    Dynamic Forced Partitioning of Robust Hierarchical State Estimators for Power Networks

    Baiocco, A. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  219. Published

    Dynamic Linkages between the European and US stock markets”

    Xiao, L. & Dhesi, G., 4 Nov 2010, Proceedings of the 3rd BIFE Conference IEEE Computer Society, City University of Hong Kong.. IEEE Xplore

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  220. Published

    Dynamic Multirole Session Types

    Denielou, P-M. & Yoshida, N., 2011, POPL 11: PROCEEDINGS OF THE 38TH ANNUAL ACM SIGPLAN-SIGACT SYMPOSIUM ON PRINCIPLES OF PROGRAMMING LANGUAGES. NEW YORK: ACM, p. 435-446 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  221. Published

    Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014). Springer-Verlag, p. 73 85 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  222. Published

    Dynamic pricing and benchmarking in AirBnB

    Sims, J., Ameen, N. & Bauer, R., 2019, UK Academy of Information Systems (UKAIS). p. 1-29 29 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  223. Published

    Dynamic Programming on Nominal Graphs

    Hoch, N., Montanari, U. & Sammartino, M., 2015, Proceedings Graphs as Models. Rensink, A. & Zambon, E. (eds.). Electronic Proceedings in Theoretical Computer Science, Vol. 181. p. 80-96 17 p. (EPTCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  224. Published

    Dynamics, robustness and fragility of trust

    Pavlovic, D., 2008, Proceedings of FAST 2008. Degano, P., Guttman, J. & Martinelli, F. (eds.). Springer-Verlag, Vol. 5491. p. 97-113 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  225. Published

    Earthquake focal mechanisms and recent faulting: a seismotectonic analysis in the Vordufell area, South Iceland Seismic Zone

    Angelier, J., Rognvaldsson, S., Bergerat, F., Gudmundsson, A., Jakobsdottir, S. & Stefansson, R., 1996, Seismology in Europe. Thorkelsson, B. (ed.). Reykjavik: Iceland Meteorological Office, Reykjavik, p. 199-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  226. Published

    Easy Impossibility Proofs for k-Set Agreement in Message Passing Systems

    Biely, M., Robinson, P. & Schmid, U., 2011, Principles of Distributed Systems - 15th International Conference, OPODIS 2011, Toulouse, France, December 13-16, 2011. Proceedings. p. 299-312 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  227. Published

    Eavesdropping Attacks on High-Frequency RFID Tokens

    Hancke, G. P., 1 Jul 2008, Workshop on RFID Security -- RFIDSec'08. Budapest, Hungary, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  228. Published

    ECC, an Extended Calculus of Constructions

    Luo, Z., 1 Jun 1989, Logics in Computer Science (LICS 1989).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Published

    Ecological Studies on two Carbonate Sediment-Producing Algae

    Bosence, D., 1977, Fossil Algae. Flügel, E. (ed.). Springer Berlin / Heidelberg, p. 270-278 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  230. Published

    Ecological Succession from Corals to Coralline Algae in Eocene Patch Reefs, Northern Spain

    Taberner, C. & Bosence, D., 1985, Paleoalgology: Contemporary Research and Applications. Toomey, D. F. & Nitecki, M. H. (eds.). Springer Berlin / Heidelberg, p. 226-236 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  231. Published

    E-commerce and the media - Influences on security risk perceptions

    Jarupunphol, P. & Mitchell, C. J., 2002, Internet Technologies, Applications and Societal Impact, The 1st IFIP Workshop on Internet Technologies, Applications and Societal Impact, WITASI '02, Wroclaw, Poland, October 2002. Cellary, W. & Iyengar, A. (eds.). Kluwer Academic Publishers, p. 163-173 11 p. (IFIP Conference Proceedings; no. 232).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  232. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K., 27 Mar 2017, Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  233. Forthcoming

    Ecrire, trobar: le troubadour entre création et représentation

    Harvey, R., 2015, (Accepted/In press) L’Italie et les troubadours (XIIIe-XVe siècles). Paris: Classiques Garnier

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  234. Published

    Effect of rerouting on NGN VoIP Quality

    Komisarczuk, P. & Koudrin, A., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 364-370 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  235. Published

    Effects of context relevance and perceived risk on user acceptance of mobile information services

    van der Heijden, H., Ogertschnig, M. & van der Gaast, L., 2005, Proceedings of the European Conference on Information Systems (ECIS). Regensburg, Germany

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  236. Published

    EFFECTS OF INSECTICIDE APPLICATION ON WEED AND PASTURE PLANT-COMMUNITIES

    Gange, A. & BROWN, V. K., 1991, BRIGHTON CROP PROTECTION CONFERENCE : WEEDS - 1991, VOLS 1-3. FARNHAM: BRITISH CROP PROTECTION COUNCIL, p. 901-910 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  237. Published

    Effects of see-through interfaces on user acceptance of small screen information systems

    Acton, T., Golden, W. & van der Heijden, H., 2005, Proceedings of the European Conference on Information Systems (ECIS). Regensburg, Germany

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  238. Published

    Efficiency of conformalized ridge regression

    Burnaev, E. & Vovk, V., 2014, Proceedings of the Twenty Seventh Annual Conference on Learning Theory: JMLR: Workshop and Conference Proceedings. Vol. 35. p. 605-622 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. Published

    Efficiency updates for the restricted growth function GA for grouping problems

    Tucker, A., Swift, S. & Crampton, J., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 1536 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  240. E-pub ahead of print

    Efficient and Provable White-Box Primitives

    Fouque, P-A., Karpman, P., Kirchner, P. & Minaud, B., 9 Nov 2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer Verlag, p. 159-188 30 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  241. Published

    Efficient compilers for authenticated group key exchange

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 192-197 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  242. Published

    Efficient Computation of Balanced Structures

    Harris, D. G., Morsy, E., Pandurangan, G., Robinson, P. & Srinivasan, A., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II. p. 581-593 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  243. Published

    Efficient dynamic resource specifications

    Bubendorfer, K., Komisarczuk, P. & Chard, K., 2005, 6th International Conference on Mobile Data Management (MDM 2005), Ayia Napa, Cyprus, May 9-13, 2005. p. 281-285 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  244. Published

    Efficient implementation of the local capon spectral estimate

    Alty, S. R., Benesty, J. & Jakobsson, A., Sep 2007, 15th European Signal Processing Conference, EUSIPCO 2007 - Proceedings. p. 2125-2128 4 p. (European Signal Processing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  245. Published

    Efficient implementation of the time-recursive Capon and APES spectral estimators

    Alty, S. R., Jakobsson, A. & Larsson, E. G., 3 Apr 2015, 2004 12th European Signal Processing Conference, EUSIPCO 2004. European Signal Processing Conference, EUSIPCO, Vol. 06-10-September-2004. p. 1269-1272 4 p. 7080094

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  246. Published

    Efficient model checking of fault-tolerant distributed protocols

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 2011, Proc. 41st Int Conf. Dependable Systems and Networks (DSN-DCCS 2011). IEEE, p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  247. Published

    Efficient Sampling with Small Populations: a Genetic Algorithm Satisfying Detailed Balance

    Watkins, C. & Buttkewitz, Y., 11 Jul 2015, Gecco Companion '15: Proceedings of the Companion Publication of the 2015 Genetic and Evolutionary Computation Conference. p. 1517-1518 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  248. Published

    Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures

    Wolthusen, S., 2016, Proceedings of the Second International Conference on Future Network Systems and Security. Springer-Verlag, p. 47-61 15 p. (Communications in Computer and Information Science; vol. 670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  249. Published

    Efficient state estimation and Byzantine behavior identification in Tactical MANETs

    Ebinger, P. & Wolthusen, S. D., 18 Oct 2009, Proc. 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  250. Published

    Efficient state merging in symbolic execution

    Kuznetsov, V., Kinder, J., Bucur, S. & Candea, G., Jun 2012, Proc. 33rd Conf. Programming Language Design and Implementation (PLDI 2012). ACM, p. 193-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  251. Published

    Efficient, correct, unsupervised learning of context-sensitive languages

    Clark, A., 2010, Proceedings of the Fourteenth Conference on Computational Natural Language Learning. p. 28-37

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  252. Published

    Either / Or

    Samson, J., 2008, Rethinking Musical Modernism: Proceedings of the international conference held from October 11 to 13, 2007. Despić, D. & Milin, M. (eds.). Belgrade: Serbian Academy of Sciences and Arts, p. 15-26

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  253. Published

    Electroantennogram obtained from honeybee antennae for odor detection

    Wang, Y., Zheng, Y., Luo, Z. & Li, G., 2010, Lecture Notes in Computer Science. Springer, Vol. 6063. p. 63-66

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  254. Published

    Electronic Case Management System in the judiciary: Perspectives from the Judiciary of Malawi

    Chawinga, C., Chawinga, W., Majawa, F. & Kapondera, S., 2018, Standing Conference of Eastern Central and Southern African Libraries Associatio.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  255. Published

    Electronic transaction security: An analysis of the effectiveness of SSL and TLS

    Khu-smith, V. & Mitchell, C. J., 2002, Proceedings of the International Conference on Security and Management (SAM '02), Las Vegas, Nevada, USA, June 2002. CSREA Press, p. 425-429 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  256. Published

    Email-based Password Recovery - Risking or Rescuing Users?

    Al Maqbali, F. & Mitchell, C. J., 24 Dec 2018, Proceedings of ICCST 2018: 52nd Annual IEEE International Carnahan Conference on Security Technology. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  257. Published

    Embedding knowledge management into business process: The use of threaded discussion forums and knowledge objects at AstraZeneca

    Jashapara, A. & Adelmann, H., 2003, Proceedings of ECKM 2003: The 4th European Conference on Knowledge Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  258. Published

    Emergence and mutability of social media work practices

    Hafezieh, N. & Amis, J., 2017, International Conference on Information Systems Proceedings. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  259. Forthcoming

    Emerging market MNEs' expatriate Management

    Rui, H. & Zhang, M., 16 Mar 2016, (Accepted/In press) Academy of International Business 2016 conference proceeding. AIB

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  260. E-pub ahead of print

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N. & Markantonakis, K., 21 Jun 2018, 11th IFIP International Conference on Information Security Theory and Practice (WISTP'17). Springer, p. 75-92 18 p. (Lecture Notes in Computer Science; vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  261. Published

    EMNCs' Knowledge Transfer in Emerging Markets

    Rui, H., Zhang, M. & Shipman, A., 2016, Proceedings of the 58th Annual Meeting of the Academy of International Business . AIB

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  262. Published

    Emotions, Satisfaction, and Place Attachment: A Structural Model

    Prayag, G., Van Der Veen, R., Huang, S. & Hosany, S., 2015, 3rd World Research Summit for Tourism and Hospitality and 1st USA-China Tourism Research Summit, Orlando, USA, December 15-19.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  263. Published

    Emperor Manuel II Palaeologus’ Unpublished Treatise ‘On the Procession of the Holy Spirit’

    Dendrinos, C., 2006, Proceedings of the 21st International Congress of Byzantine Studies, London 21-26 August 2006. Jeffreys, E., Haarer, F. & Gilliland, J. (eds.). Aldershot: Ashgate, Vol. 3. p. 124-125

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  264. Published

    Emplacement of dyke swarms in regions of multiple caldera collapses: the case study of Santorini volcano, Greece

    Drymoni, K., Rust, A., Cashman, K., Browning, J. & Gudmundsson, A., 2020, COV 11.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  265. Unpublished

    Employee autonomy and management control in the quality organization

    Rees, C., Mar 1996, (Unpublished) 14th International Labour Process Conference (ILPC). Aston.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. Unpublished

    Employee perceptions of quality management: making sense of the paradox

    Rees, C., Jul 1996, (Unpublished) British Universities Industrial Relations Association (BUIRA) 46th Annual Conference. Bradford.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  267. Published

    Employee Share ownership and Performance: Commitment or Entrapment

    Sen Gupta, S., 2011, Society for the Advancement of Socio Economics, University of Madrid, Madrid, Spain.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  268. Published

    Employee Share Ownership and Performance: Golden Path or Golden Handcuffs?

    Sen Gupta, S., Whitfield, K. & McNabb, B., 2006, Labor and Employment Relations Association (LERA), Boston .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  269. Published

    Employee Share Ownership and Performance: re-estimation using WERS 2004

    Sen Gupta, S., Whitfield, K. & Pendleton, A., 2009, International Industrial Relations Association (IIRA), Sydney, Australia.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  270. Published

    Employee share ownership design and organisational performance: Broad based versus narrow based schemes

    Sen Gupta, S. & Whitfield, K., 2009, British Academy of Management Conference (BAM), Cardiff - Best paper award.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  271. Published

    Employee share Ownership in the United Kingdom and South Korea: Comparing the good and the bad days (recession versus boom)

    Sen Gupta, S. & Yoon, Y. J., 2015, Academy of Management Conference, Vancouver, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  272. Unpublished

    Employee voice and employee engagement

    Rees, C. & Alfes, K., Mar 2012, (Unpublished) LSE/CIPD 'Voice and Value' Conference. London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  273. Published

    Employee voice or vice: employee share ownership schemes and unions drawing on the 2011 WERS dataset

    Sen Gupta, S., 2013, Society for the Advancement of Socio Economics, Bocconi University Milano, Italy.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  274. Unpublished

    Empowerment and ICTs: much more than IT skills

    Poveda Villalba, S., 2014, (Unpublished) Empowerment and ICTs: much more than IT skills. Department of Geography, Royal Holloway, University of London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  275. Unpublished

    Empowerment through quality management: rhetoric or reality?

    Rees, C., Apr 1996, (Unpublished) Open University Business School Conference on 'HRM: The Inside Story'. Milton Keynes.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  276. E-pub ahead of print

    Enabling Robust and Efficient Distributed Computation in Dynamic Peer-to-Peer Networks

    Augustine, J., Pandurangan, G., Robinson, P., Roche, S. & Upfal, E., 17 Dec 2015, Foundations of Computer Science (FOCS), 2015 IEEE 56th Annual Symposium on. IEEE, p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  277. Published

    Enabling virtual organisation in mobile worlds

    Komisarczuk, P., Bubendorfer, K. & Chard, K., 2004, 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on. p. 123-127 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  278. Published

    Encoding the Factorisation Calculus

    Rowe, R., 27 Aug 2015, Proceedings of the Combined 22nd International Workshop on Expressiveness in Concurrency and the 12th Workshop on Structural Operational Semantics (EXPRESS/SOS 2015). Electronic Proceedings in Theoretical Computer Science, Vol. 190. p. 76-90 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  279. Published

    Encouraging Self-Regulated Learning Through Electronic Portfolios

    Abrami, P., Pillay, V., Wade, A., Aslan, O., Bures, E. & Bentley, C., 2007, Proceedings from World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007. Bastiaens, T. & Carliner, S. (eds.). AACE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  280. E-pub ahead of print

    Encrypt-to-self: Securely outsourcing storage

    Pijnenburg, J. & Poettering, B., 12 Sep 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 635-654 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  281. Published

    End-to-end performance analysis for broadband island interconnection via satellite-RACE II/R2074 (Catalyst) project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1993, Satellite Communications-ECSC-3, 1993., 3rd European Conference on. p. 170-174 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  282. Published

    End-to-end protocol performance in ATM/satellite interconnected LANs

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F., Jeans, T. & Smythe, C., 1993, Broadband Services, Systems and Networks, 1993., Second International Conference on. p. 87-91 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  283. Published

    End-to-End Secure and Privacy Preserving Mobile Chat Application

    Akram, R. N. & Ko, R. K. L., 1 Jun 2014, Eighth Workshop in Information Security Theory and Practice (WISTP 2014). Naccache, D. & Sauveron, D. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  284. Published

    Energy Modulation of Electron Beam in Corrugated Dielectric Waveguide

    Lyapin, A., Lekomtsev, K., Boogert, S., Gibson, S., Aryshev, A., Urakawa, J. & Tishchenko, A., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-3 3 p. WEPTS055

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  285. Published

    Energy-efficient key distribution and revocation in tactical networks with asymmetric links

    Reidt, S. & Wolthusen, S. D., 18 Oct 2009, 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  286. Published

    Enforcing Business Policies Through Automated Reconfiguration

    Andrade, L. F., Fiadeiro, J. L. & Wermelinger, M., 2001, ASE. IEEE Computer Society Press, p. 426-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  287. Published

    Enforcing Mobile Application Security Through Probabilistic Contracts

    Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014.. Joosen, W., Martinelli, F. & Heyman, T. (eds.). CEUR-WS.org, Vol. 1298. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  288. Published

    Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 2014, FAW 2014. (Lecture Notes in Computer Science; vol. 8497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  289. Published

    Enhanced Bunch Monitoring by Interferometric Electro-Optic Methods

    Gibson, S., Arteche, A., Bashforth, S., Bosco, A., Krupa, M. & Lefevre, T., Jun 2018, 9th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 1-4 4 p. WEPAL073

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  290. Published

    Enhanced Conformal Predictors for Indoor Localisation Based on Fingerprinting Method

    Nguyen, K. & Luo, Z., 2 Oct 2013, 9th IFIP International Conference on Artificial Intelligence Applications & Innovations (AIAI 2013). p. 411-420 10 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  291. Forthcoming

    Enhanced Location Tracking for Tactical MANETs based on Particle Filters and Additional Information Sources

    Ebinger, P., Kuijper, A. & Wolthusen, S. D., Oct 2010, (Accepted/In press) Proc. 2012 Military Communications and Information Systems Conference. Piscataway, NJ, USA: IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  292. Published

    Enhancing CardSpace Authentication Using a Mobile Device

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings. Li, Y. (ed.). Berlin: Springer-Verlag, Vol. 6818. p. 201-216 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  293. Published

    Enhancing e-commerce security using GSM authentication

    Khu-smith, V. & Mitchell, C. J., 2003, -Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, p. 72-83 12 p. (Lecture Notes in Computer Science; vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  294. Published

    Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K. & Mayes, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland: IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  295. Published

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K., 20 Jul 2017, Radio Frequency Identification and IoT Security: RFIDSec 2016. Hancke, G. & Markantonakis, K. (eds.). Springer, p. 107-122 16 p. (Lecture Notes in Computer Science ; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  296. E-pub ahead of print

    Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

    Akram, R. N., Markantonakis, K. & Mayes, K., 18 Nov 2015, Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Ryan, P. Y. A. & Weippl, E. (eds.). Vienna, Austria: Springer, p. 541-560 20 p. (Lecture Notes in Computer Science; vol. 9327).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  297. Published

    Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, The 35th Annual IEEE Conference on Local Computer Networks, LCN 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings. p. 152-159 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  298. Published

    Enhancing student engagement through memes

    O'Brien, J., Apr 2018, Chartered Association of Business Schools: Learning, Teaching and Student Experience conference 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  299. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 13 May 2014, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  300. Published

    Enhancing the security of cookies

    Khu-smith, V. & Mitchell, C. J., 2001, Information Security and Cryptology - ICISC 2001 - Proceedings of the 4th International Conference, Seoul, Korea, December 2001. Kim, K. (ed.). Springer-Verlag, p. 132-145 14 p. (Lecture Notes in Computer Science; no. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  301. Published

    Enhancing the supply chain with composite materials: An analysis supported by IT tools in coach/bus manufacturing

    Coronado Mondragon, A. & Coronado Mondragon, C. E., 8 Jun 2017, Industrial Engineering and Applications (ICIEA), 2017 4th International Conference on. Nagoya, Japan: IEEE Xplore, p. 121-125 5 p. A022

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  302. Published

    Enhancing User Authentication in Claim-Based Identity Management

    Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of CTS 2010, the 2010 International Symposium on Collaborative Technologies and Systems, 17-21 May 2010, Chicago, Illinois, USA. IEEE, p. 75-83 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  303. Published

    Entanglement in systems of interacting harmonic oscillators

    Audenaert, K., Cramer, M., Eisert, J. & Plenio, M. B., 2006, Proc. 1st Intl. Conf. on “Quantum Computing: Back Action 2006”, Kanpur, India..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  304. Published

    Enterprise fragmentation in the economic transition: repackaging assets from Czech state enterprises

    Clark, E., 1999, Enterprise in transition. Split: University of Split, p. 163-167 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  305. Published

    Entrepreneurial capitalism and venture capital

    Chong, D., 2015, 9th Critical Management Studies Conference (Leicester: University of Leicester).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  306. Published

    Entrepreneurial learning: past research and future challenges

    Wang, C. L. & Chugh, H., 2010, Babson College Entrepreneurship Research Conference .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  307. Published

    Entrepreneurship, small family business and Yiwu's historical development

    Rui, H., 2018, International Conference of Family Business and Entrepreneurship, 2-4 May 2018, Bali, Indonesia . International Conference of Family Business and Entrepreneurship

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  308. Published

    Enumerating highly non-soluble groups

    Klopsch, B., 2005, FINITE GROUPS 2003. BERLIN 30: WALTER DE GRUYTER, p. 219-227 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  309. Unpublished

    Environmental Storytelling: A Digital Frontier for Narrative Geography

    Lowe, J., 29 Aug 2019, (Unpublished) Geographies of Interactive Digital Narratives session at RGS-IBG 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  310. Published

    Epitaxial growing of refractory metal films by laser ablation deposition

    Mikhailov, G. M., Malikov, I. V., Chernikh, A. V. & Petrashov, V., 1996, IEEE/LEOS 1996 SUMMER TOPICAL MEETINGS - ADVANCED APPLICATIONS OF LASERS IN MATERIALS AND PROCESSING, DIGEST. NEW YORK: Elphinstone Institute, p. 56 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  311. Published

    Equal amongst Unequals: Comparing the employee share ownership experiencein the UK and Korea

    Sen Gupta, S. & Yoon, Y. J., 2015, Society for the Advancement of Socio Economics, London School of Economics, London.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  312. Published

    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    Mitchell, C. J., 2005, Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings. Zhou, J., Lopez, J., R. H. D. & Bao, F. (eds.). Springer-Verlag, Vol. 3650. p. 244-258 15 p. (Lecture Notes in Computer Science; vol. 3650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  313. E-pub ahead of print

    Error Propagation after Reordering Attacks on Hierarchical State Estimation

    Gul, A. & Wolthusen, S., 18 Dec 2018, Proceedings of the Twelfth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Staggs, J. & Shenoi, S. (eds.). Springer-Verlag, p. 67-79 13 p. (IFIP Advances in Information and Communication Technology; vol. 542).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  314. Published

    Escape from Time: Immortality and Reality in William Burroughs & Philip Dick

    Gene-Rowe, F., May 2014, Memories of the Future Conference. Senate House Library, London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  315. Published

    E-society barriers: Public and private divide for women returners to IT

    Panteli, N. & Cochliou, D., 2008, Proceedings of the IADIS International Conference on e-Society 2008. IADIS, p. 16-23 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  316. Published

    Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

    Shepherd, C., Akram, R. & Markantonakis, K., 29 Aug 2017, 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  317. Forthcoming

    Estimating quantum speedups for lattice sieves

    Albrecht, M., Gheorghiu, V., Postlethwaite, E. & Schanck, J., 16 Aug 2020, (Accepted/In press) ASIACRYPT 2020. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  318. Published

    Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware

    Hurier, M., Suarez de Tangil Rotaeche, G., Dash, S., Bissyandé, T., Le Traon, Y., Klein, J. & Cavallaro, L., 3 Jul 2017, Mining Software Repositories (MSR), 2017 IEEE/ACM 14th International Conference on. IEEE, p. 425-435 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  319. Published

    European Dissemination of the ultra-low temperature scale, PLTS-2000

    Rusby, R., Head, D., Cousins, D., Godfrin, H., Bunkov, Y. M., Rapp, R. E., Gay, F., Meschke, M., Lusher, C., Li, J., Casey, A., Shvarts, D., Cowan, B., Saunders, J., Mikheev, V., Pekola, J., Gloos, K., Hernandez, P., Triqueneaux, S., de Groot, M. & 14 others, Peruzzi, A., Jochemsen, R., Chinchure, A., van Heumen, E., de Groot, G. E., Bosch, W., Mathu, F., Flokstra, J., Veldhuis, D., Hermier, Y., Pitre, L., Verge, A., Fellmuth, B. & Engert, J., 2003, TEMPERATURE: ITS MEASUREMENT AND CONTROL IN SCIENCE AND INDUSTRY, VOL 7, PTS 1 AND 2. Ripple, DC. (ed.). MELVILLE: AMER INST PHYSICS, p. 89-94 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  320. Published

    Evaluating IT readiness in Small Firms: A Survey of UK Manufacturing Firms

    Spinelli, R., Dyerson, R. & Harindranath, G., 1 Nov 2013, ISBE 2013, November, Cardiff.. 2013

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  321. E-pub ahead of print

    Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE

    Costache, A., Laine, K. & Player, R., 13 Sep 2020, Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II. Springer, p. 546-565 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. Published

    Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Jul 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. p. 1541-1546 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  323. Published

    Evaluating Transferability of Japanese Organizational Culture

    Aboutalebi, R. & Ozaki, Y., 21 Jun 2014, In: AJBS (Association of Japanese Business Studies), 27th Annual Meeting of AJBS: Issues regarding Japanese business system. 21-22 June 2014, Westin Bayshore, Vancouver, Canada..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  324. Published

    Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay

    Haken, G., Markantonakis, K., Gurulian, I., Shepherd, C. & Akram, R., 2 Apr 2017, Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security: CPSS '17. New York: ACM, p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  325. Published

    Evaluation of Information Visibility Benefits Downstream in the Supply Chain: The Case of Finished Vehicle Transportation

    Coronado Mondragon, A. E. & Lalwani, C. S., 6 Jul 2008, Proceedings of the 13th International Symposium on Logistics (ISL 2008): Integrating the Global Supply Chain. Pawar, KS., Banomyong, R. & Lalwani, CS. (eds.). Nottingham, UK: Nottingham University Business School, Vol. 1. p. 37-44 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  326. Published

    Event dissemination in mobile wireless sensor networks

    Taherian, S., O'Keeffe, D. & Bacon, J., 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Fort Lauderdale, FL, USA, October 25-27, 2004. p. 573-575 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  327. Published

    Evolution of Terrestrial Ecosystems

    Elias, S., 2002, Encyclopaedia of Life Sciences. London: Nature Publishing Group, Vol. 6. p. 669-673

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  328. Published

    Evolutionary algorithms with a coarse-to-fine function smoothing

    Yang, D. & Flockton, S. J., 1 Jan 1995, 1995 IEEE Conference on Evolutionary Computation (ICEC 95). IEEE, Vol. 2. p. 657-662 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  329. Published

    Evolving specification engineering

    Pavlovic, D., Pepper, P. & Smith, D. R., 2008, Proceedings of AMAST 2008. Meseguer, J. & Rosu, G. (eds.). Springer-Verlag, Vol. 5140. p. 299-314 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  330. Published

    Exact and approximate algorithms and their implementations in mixed graphical models

    Gammerman, A., Luo, Z., Aitken, C. & Brewer, M., 1995, Probabilistic Reasoning and Bayesian Belief Networks. Henley-on-Thames: Alfred Waller, p. 33-53

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  331. Published

    Exact and approximate algorithms for computing a second hamiltonian cycle

    Deligkas, A., Mertzios, G. B., Spirakis, P. G. & Zamaraev, V., 18 Aug 2020, 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020. Esparza, J., Kral�, D. & Kral�, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-13 13 p. MFCS-2020-27. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 170).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  332. Published

    Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking

    Moeckel, C., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19): 1st International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). Association for Computing Machinery (ACM), 93

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  333. Published

    Examining the Contribution of Critical Visualisation to Information Security

    Hall, P., Heath, C., Coles-Kemp, L. & Tanner, A., 8 Sep 2015, Proceedings of NSPW 2015. ACM, p. 59-72 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  334. Published

    Exchangeability and de Finetti's theorem: from probabilities to quantum-mechanical states

    Schack, R., 2004, Bayesian Inference and Maximum Entropy Methods in Science and Engineering: AIP Conference Proceedings Vol.~735. Fischer, R., Preuss, R. & von Toussaint, U. (eds.). Melville, New York: AIP Press, p. 565

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  335. Published

    Execution Replay with Compact Logs for Shared-Memory Programs

    Levrouw, L., Audenaert, K. & Van Campenhout, J., 1994, Applications in Parallel and Distributed Computing.. Caracas: North-Holland, p. 125-134 (IFIP Transactions: Computer Science and Technology; vol. A-44).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  336. Published

    Expansion and densification of cities: linking urban form to urban ecology

    Mohajeri, N., Gudmundsson, A. & Scartezzini, J., 2015, CISBAT 2015- Future Buildings and Districts - Sustainability from Nano to Urban Scale.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  337. Published

    Experiences in Automated Workflow using Dialectical Argumentation

    Urovi, V., Bromuri, S., McGinnis, J., Stathis, K. & Omicini, A., 1 Jul 2007, Proceedings of Intelligent Systems and Agents International Conference (IADIS07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  338. Published

    Experimental and numerical 2D analysis of hydraulic fracturing using high-power electric discharge

    Bazargan, M., Meredith, P., Forbes Inskip, N., Gudmundsson, A., Habibpour, M. & Mohammadi, R., 2015, 49th US Rock Mechanics / Geomechanics Symposium held in San Francisco, CA, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  339. Published

    Experimental Elicitation of Risk Behaviour amongst Information Security Professionals

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 2015, Workshop on the Economics of Information Security . p. 1-55 55 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  340. Published

    Experimental Results of a Compact Laserwire System for Non-Invasive H− Beam Profile Measurements at CERN's Linac4

    Gibson, S., Boorman, G., Bosco, A., Hofmann, T., Raich, U. & Roncarolo, F., Feb 2017, 5th International Beam Instrumentation Conference: 11-15 September 2016, Barcelona, Spain.. JACoW Publishing, p. 1-4 4 p. TUPG77

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  341. Published

    Experiments on Persian weblogs

    Sheykh Esmaili, K., Jamali, M., Neshati, M., Abolhassani, H. & Soltan-Zadeh, Y., 2006, In Proceedings of the WWW06 Workshop on Web Intelligence.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  342. E-pub ahead of print

    Explaining Deep Learning Models with Constrained Adversarial Examples

    Moore, J., Hammerla, N. & Watkins, C., 23 Aug 2019, Pacific Rim International Conference on Artificial Intelligence. Springer, p. 43-56 14 p. (Lecture Notes in Computer Science; vol. 11670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  343. Published

    Explaining innovation in healthcare: The elastic role of identity ambiguity and praxis mastery

    Jashapara, A., 2015, GSTF Proceedings of 5th Annual International Conference on Business Strategy & Asian Economic Transformation. Singapore: Global Science and Technology Forum

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  344. Published

    Exploiting uncertain and temporal information in correlation

    Bigham, J. & Luo, Z., 1996, Proceedings of the 6th International Conference Information Processing and the Management of Uncertainty (IPMU-96).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  345. Published

    Exploring Co-presence Enabled Collaboration in Social Computing Inspired Enterprise Systems

    Subramaniam, N., Nandhakumar, J. & Baptista, J., 2010, AIS electronic Library (AISeL). ICIS 2010 PROCEEDINGS, 141

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  346. Published

    Exploring information ethics for inclusive open development

    Bentley, C., 2013, IFIP 9.4 12th International Conference on Social Implications of Computers in Developing Countries.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  347. Published

    Exploring new and emerging applications of cognitive radio systems: Preliminary insights and framework

    Yau, K-L. A., Tan, F-A. G., Komisarczuk, P. & Teal, P. D., 2011, Humanities, Science and Engineering (CHUSER), 2011 IEEE Colloquium on. p. 153-157 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  348. Published

    Exploring online crowd-funding innovation and opportunities for small businesses

    Kromidha, E., 23 Jun 2014, Proceedings of the 3rd International Conference on Innovation, Trade and Economics- ICITE 2014, June 22-23, 2014. Moscow, Russia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  349. Published

    Exploring online crowdfunding innovation, networks and locations: Small businesses in Indiegogo.com

    Kromidha, E., 2014, 2014 ISBE Conference, 5-6 November 2014. Manchester, UK

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  350. Published

    Exploring the association between organisational performance, employee attitudes and HRM practices in small firms

    Tsai, C-J., Edwards, P. & Sen Gupta, S., 2008, British Academy of management, Harrowgate.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  351. Unpublished

    Exploring the Combined Potential of Critical Discourse Analysis, Framing Analysis and Semiotics. An Analysis of German Newspaper Representations of the ‘War on Terror’

    Van Efferink, L., 2015, (Unpublished) “Reframing Media/Cultural Studies” Conference, Communication and Media Research Institute (CAMRI), University of Westminster.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  352. Published

    Exploring the development of an Internet of Things (IoT) environment for value generation in third-party logistics operations

    Coronado Mondragon, A., Coronado, C. E. & Coronado, E. S., 3 Jul 2016, Abstracts of papers presented at the 21st International Symposium on Logistics. Pawar, K. S. & Tsai, K. M. (eds.). Taiwan, p. 133 8 p. 144

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  353. Published

    Exploring the Equifinality of Dynamic Capabilities: A Mixed Method Study of UK High-Tech SMEs

    Senaratne, P., Wang, C. L. & Sharma, M., 2015, European Academy of Management Annual Conference. Poland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  354. Published

    Exploring the limits of single-iteration clarification dialogs

    Lin, J., Wu, P., Demner-Fushman, D. & Abels, E., 31 Oct 2006, Proceedings of the Twenty-Ninth Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. Vol. 2006. p. 469-476 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  355. Published

    Exploring the nature of virtuality: An interplay of global and local interactions

    Panteli, N., Chiasson, M., Yan, L., Poulymenakou, A. & Papargyris, A., 2007, Virtuality and Virtualization: Proceedings of the International Federation of Information Processing Working Groups 8.2 on Information Systems and Organizations and 9.5 on Virtuality and Society. Crowston, K., Sieber, S. & Wynn, E. (eds.). Springer, p. 373-377 5 p. (IFIP International Federation for Information Processing; vol. 236).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  356. Published

    Exploring the Role of Organisational Context and Work Flexibility in Perceiving Digital Technology Affordances: A Study of Knowledge Workers

    Hafezieh, N., Farivar, F. & Eshraghian, F., 2020, British Academy of Management Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  357. Published

    Exploring the traces of fault-related microstructural damage at the Santorini caldera

    Drymoni, K., Browning, J., Mitchell, T. & Gudmundsson, A., 2017, AGU FALL MEETING 2017. T21C-1221

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  358. E-pub ahead of print

    Exploring Trade-offs in Batch Bounded Distance Decoding

    Albrecht, M., Curtis, B. & Wunderer, T., 10 Jan 2020, SAC 2019. Springer, p. 467-491 25 p. (Lecture Notes in Computer Science; vol. 11959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  359. Published

    Exponentiation using Division Chains

    Walter, C. D., 1997, 13th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 92-97 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  360. Published

    ExpoSE: practical symbolic execution of standalone JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 13 Jul 2017, SPIN 2017 : Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software. ACM, p. 196–199 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  361. Published

    Extended Computation Tree Logic (Extended Abstract)

    Alexsson, R., Hague, M., Kreutzer, S., Lange, M. & Latte, M., 2010, LPAR International Conference on Logic for Programming Artificial Intelligence and Reasoning.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  362. E-pub ahead of print

    Extended Functionality in Verifiable Searchable Encryption

    Alderman, J., Janson, C., Martin, K. & Renwick, S., 9 Jan 2016, Proceedings of the 2nd International Conference on Cryptography and Information Security in the Balkans - BalkanCryptSec 2015. Springer, Vol. 9540. p. 187-205 19 p. (Lecture Notes in Computer Science; vol. 9540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  363. Published

    Extended privilege inheritance in RBAC

    Dekker, M., Cederquist, J. G., Crampton, J. & Etalle, S., 2007, Proceedings of 2007 ACM Symposium on Information, Computer and Communications Security. Bao, F. & Miller, S. (eds.). ACM Press, p. 383-385 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  364. Published

    Extending B AMN with concurrency

    Lano, K., Fiadeiro, J. & Dick, J., 1996, ADVANCES IN THEORY AND FORMAL METHODS OF COMPUTING. Edalat, A., Jourdan, S. & McCusker, G. (eds.). LONDON: Imperial College Press, p. 228-239 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  365. Published

    Extending EMV to support Murabaha transactions

    Al-Meaither, M. & Mitchell, C. J., 2003, NORDSEC 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems - Encouraging Cooperation, Gjøvik University College, Norway, October 2003. p. 95-108 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  366. Published

    Extending EMV Tokenised Payments To Offline-Environments

    Jayasinghe, D., Markantonakis, K., Gurulian, I., Akram, R. & Mayes, K., 9 Feb 2017, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  367. Published

    Extending nearly complete 1-planar drawings in polynomial time

    Eiben, E., Ganian, R., Hamm, T., Klute, F. & Nöllenburg, M., 18 Aug 2020, 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020. Esparza, J., Kral�, D. & Kral�, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-16 16 p. MFCS-2020-31. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 170).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  368. Published

    Extending partial 1-planar drawings

    Eiben, E., Ganian, R., Hamm, T., Klute, F. & Nöllenburg, M., 29 Jun 2020, 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Czumaj, A., Dawar, A. & Merelli, E. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-19 19 p. 43. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 168).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  369. Published

    Extending the Scope of CardSpace

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. Orgun, M. A., Elci, A., Makarevich, O. B., Huss, S. A., Pieprzyk, J., Babenko, L. K., Chefranov, A. G. & Shankaran, R. (eds.). New York: ACM, p. 235-238 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  370. Published

    Facilitating plausible deniability for cloud providers regarding tenants' activities using trusted execution

    O'Keeffe, D., Vranaki, A., Pasquier, T. & Eyers, D., 19 May 2020, Proceedings - 2020 IEEE International Conference on Cloud Engineering, IC2E 2020. Institute of Electrical and Electronics Engineers Inc., p. 59-65 7 p. (Proceedings - 2020 IEEE International Conference on Cloud Engineering, IC2E 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  371. Published

    Facilitating program comprehension by mining association rules from source code

    Tjortjis, C., Sinos, L. & Layzell, P., 2003, 11th IEEE International Workshop on Program Comprehension, Portland, USA, May 2003. p. 125-132 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  372. Published

    Facilities Services Contracts: The Search for Effective Contract Structures for Outsourcing Agreements in London Hospitals

    Jashapara, A., 2000, Proceedings of CIB W70 International Symposium on Facilities Management & Asset Maintenance. p. 447 454 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  373. Published

    Failing with Style: Designing for Aesthetic Failure in Interactive Performance

    Hazzard, A., Greenhalgh, C., Kallionpaa, M., Benford, S., Veinberg, A., Kanga, Z. & McPherson, A., 2 May 2019, CHI '19 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Glasgow, Scotland, p. 1-13 13 p. 30

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  374. Published

    Failure in the Design and Implementation of Government ICT Projects in Africa: A Complexity Theory Perspective

    Bernardi, R., 2007, IST-Africa 2007 Conference Proceedings. Cunningham, P. & Cunningham, M. (eds.). IIMC International Information Management Corporation

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  375. Published

    Failure-avoidance in Strategy Implementation

    Aboutalebi, R., 8 Sep 2015, In: BAM (British Academy of Management), 29th Annual Conference of BAM: The Value of Pluralism in Advancing Management Research, Education and Practice. 08-10 September 2015, The University of Portsmouth, England, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  376. Published

    Failures of SET implementation - What is amiss?

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - APDSI 2002, 7th Asia-Pacific Decision Sciences Institute Conference, Bangkok, Thailand, July 2002. 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  377. E-pub ahead of print

    Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles

    Knapp, J. & Quaglia, E., 20 Nov 2020, Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings. Nguyen, K., Wu, W., Lam, K. Y. & Wang, H. (eds.). Springer, p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  378. Published

    Fairtracing.org and Ethical Marketing 2.0

    Kleine, D., 2010, Proceedings of the Research Councils UK Annual Digital Economy Meeting .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  379. Published

    Falsa Ilusão de Ter: Investigando os Tipos de Valor para o Consumidor de Falsificações

    Ferreira, M. C., 9 Sep 2008, Proceedings of the XXXII ANPAD Meeting. ANPAD Brazilian Association of Graduate Studies and Research in Business Administration, Vol. 32. p. 1-16

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  380. Unpublished

    Family involvement and firm performance: a critical review

    Wang, C. L., Wale-Oshinowo, B. & Gamble, J., 2010, (Unpublished) The 33rd Annual Institute for Small Business and Entrepreneurship Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  381. Published

    Fano factor reduction on the 0.7 structure

    Roche, P., Segala, J., Glattli, D. C., Nicholls, J. T., Pepper, M., Graham, A. C., Thomas, K. J., Simmons, M. Y. & Ritchie, D. A., 2005, Noise and Fluctuations. Gonzalez, T., Mateos, J. & Pardo, D. (eds.). MELVILLE: AMER INST PHYSICS, p. 417-420 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  382. Published

    Fast byzantine agreement in dynamic networks

    Augustine, J., Pandurangan, G. & Robinson, P., 2013, ACM Symposium on Principles of Distributed Computing, PODC '13, Montreal, QC, Canada, July 22-24, 2013. p. 74-83 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  383. Published

    Fast Byzantine Leader Election in Dynamic Networks

    Augustine, J., Pandurangan, G. & Robinson, P., 2015, Distributed Computing: 29th International Symposium, DISC 2015, Tokyo, Japan, 2015. Proceedings. Springer Berlin / Heidelberg, Vol. 9363. p. 276-291 16 p. (Lecture Notes in Computer Science; vol. 9363).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  384. Published

    Fast Distributed Algorithms for Connectivity and MST in Large Graphs

    Pandurangan, G., Robinson, P. & Scquizzato, M., 11 Jul 2016, SPAA '16: Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures. ACM, p. 429-438 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  385. Published

    Fast probabilistic prediction for kernel SVM via enclosing balls

    Riquelme-Granada, N., Nguyen, D. K. A. & Luo, Z., 2020, Proceedings of Machine Learning Research: Proceedings of the Ninth Symposium on Conformal and Probabilistic Prediction and Applications. Vol. 128. p. 189-208 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  386. Published

    Fast Scalar Multiplication for ECC over GF(it p) using Division Chains

    Walter, C. D., 2011, WISA 2010. Chung, Y. & Yung, M. (eds.). Springer, Vol. 6513. p. 61-75 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  387. E-pub ahead of print

    Faster Enumeration-based Lattice Reduction: Root Hermite Factor k1/(2k) Time kk/8+o(k)

    Albrecht, M., Bai, S., Fouque, P-A., Kirchner, P., Stehlé, D. & Wen, W., 10 Aug 2020, CRYPTO 2020. Springer, p. 186-212 27 p. (Lecture Notes in Computer Science; vol. 12171).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  388. Published

    Faster Exact Solving of SAT Formulae with a Low Number of Occurrences per Variable

    Wahlström, M., 2005, SAT. p. 309-323 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  389. Published

    Faster Modular Multiplication by Operand Scaling

    Walter, C. D., 1992, CRYPTO '91. Feigenbaum, J. (ed.). Springer, Vol. 576. p. 313-323 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  390. Published

    FAULT DETECTION IN A MECHANICAL SYSTEM BY NEURAL NETWORKS

    THOMAS, M. D. & FLOCKTON, S. J., 1994, SECOND EUROPEAN CONFERENCE ON SMART STRUCTURES AND MATERIALS. McDonach, A., Gardiner, PT., McEwen, RS. & Culshaw, B. (eds.). BELLINGHAM: SPIE - INT SOC OPTICAL ENGINEERING, p. 55-58 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  391. Published

    Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 1 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). SciTePress, p. 448-456 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  392. Published

    Feasibility of Internet of Things and Agnostic Blockchain Technology Solutions: A Case in the Fisheries Supply Chain

    Coronado Mondragon, A. E., Coronado Mondragon, C. E. & Coronado, E. S., 27 May 2020, 2020 IEEE 7th International Conference on Industrial Engineering and Applications. April 16-21, Bangkok, Thailand: IEEE Xplore, p. 504-508 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  393. Published

    Feasibility, Recipient Ownership and Knowledge Transfer Strategy: A Case of Chinese MNCs in Africa

    Rui, H. & Zhang, M., 2015, Proceedings of the 57th Annual Meeting of the Academy of International Business: "Global Networks: Organizations and People" Bengaluru, India June 27-30, 2015. Mudambi, R. & Kiyak, T. (eds.). 2015 Academy of International Business, p. 109 1 p. ID#61

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  394. Published

    Feature Correlation Attack on Biometric Privacy Protection Schemes

    Zhou, X., Busch, C., Kuijper, A. & Wolthusen, S. D., 12 Sep 2009, Proc. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009). IEEE Computer Society Press, p. 1061-1065

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  395. E-pub ahead of print

    Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures

    Akram, R., Markantonakis, K. & Sauveron, D., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Yan, Z. & Mueller, P. (eds.). Helsinki, Finland: IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  396. Published

    Feature Modeling and Composition with Coordination Contracts

    Andrade, L. F. & Fiadeiro, J. L., 2001, FICS. University of Karlsruhe, Institut für Programmstrukturen und Datenorganisation, Vol. 2001-14. p. 49-54 6 p. (Technical Report).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  397. Published

    Feature Selection by Conformal Predictor

    Yang, M., Nouretdinov, I., Luo, Z. & Gammerman, A., 2011, 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, Artificial Intelligence Applications and Innovations 2011, Corfu, Greece, September 15-18, 2011, Proceedings, Part II. . p. 449-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  398. E-pub ahead of print

    Feistel Structures for MPC, and More

    Albrecht, M., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 15 Sep 2019, ESORICS 2019. p. 151-171 21 p. (Lecture Notes in Computer Science ; vol. 11736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  399. Published

    Fencing off Go: Liveness and safety for channel-based programming

    Lange, J., Ng, N., Toninho, B. & Yoshida, N., Jan 2017, POPL 2017 - Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. Gordon, A. D. & Castagna, G. (eds.). Association for Computing Machinery (ACM), p. 748-761 14 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  400. Published

    Fiber bridging strategies for damage tolerance

    Potluri, P., Arshad, M., Jamshidi, P. & Hogg, P., 1 Dec 2011, Collection of Technical Papers - AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics and Materials Conference. AIAA 2011-1983

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  401. Published

    Fighting decoherence in a Josephson qubit circuit

    Collin, E., Ithier, G., Joyez, P., Vion, D. & Esteve, D., 2004, Realizing Controllable Quantum States. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 247-254 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  402. Published

    Fine Grained Resource Reservation and Management in Grid Economics

    Chard, K., Komisarczuk, P., Bubendorfer, K. & Desai, A., 2005, Proceedings of The 2005 International Conference on Grid Computing and Applications, GCA 2005, Las Vegas, Nevada, USA, June 20-23, 2005. p. 31-38 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  403. Published

    Fingerprinting Seismic Activity across an Internet of Things

    Moore, J. P. T., Bagale, J. N., Kheirkhahzadeh, A. D. & Komisarczuk, P., 2012, 5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  404. Unpublished

    FinTech - the agent of financial services disintermediation.

    Anagnostopoulos, I., Sails, T. & Alexandrou, G., 2018, (Unpublished) 9th Annual Faculty of Business Research Conference: Contemporary Issues in Business. p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  405. Unpublished

    Fintech and RegTech

    Anagnostopoulos, I., 2017, (Unpublished) FinTech and Global Banking Services’, Fintech: The Impact on Consumers, Banking, and Regulatory Policy.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  406. Published

    Firewall Mechanism in a User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Apr 2010, Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010. Gollmann, D., Lanet, J-L. & Iguchi-Cartigny, J. (eds.). Passau, Germany: Springer, Vol. 6035/2010. p. 118-132 15 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  407. Published

    First Beam Background Simulation Studies at IR1 for High Luminosity LHC

    Kwee-Hinzmann, R., Gibson, S., Bregliozzi, G., Bruce, R., Cerutti, F., Esposito, L., Kersevan, R., Lechner, A. & Shetty, N., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 1074-1077 4 p. TUPRO027

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  408. Published

    First Beam Tests at the CERN SPS of an Electro-Optic Beam Position Monitor for the HL-LHC

    Arteche, A., Bashforth, S., Boorman, G., Gibson, S., Bosco, A., Chritin, N., Krupa, M., Lefevre, T. & Levens, T., Mar 2018, 6th International Beam Instrumentation Conference. Geneva: JACoW Publishing, p. 1-4 4 p. TUPCF23

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  409. Published

    First Results From the Operation of a Rest Gas Ionisation Profile Monitor Based on a Hybrid Pixel Detector

    Storey, J., Bodart, D., Dehning, B., Schneider, G., Veness, R., Bertsche, W., Sandberg, H., Gibson, S., Levasseur, S., Sapinski, M. & Satou, K., Mar 2018, 6th International Beam Instrumentation Conference. JACoW Publishing, p. 1-5 5 p. WE2AB5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  410. Published

    First Studies of Ion Collimation for the LHC Using BDSIM

    Abramov, A., Boogert, S., Nevay, L. & Walker, S., Jun 2018, 10th International Particle Accelerator Conference. JACoW Publishing, p. 341-344 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  411. Published

    First-class protocols for agent-based coordination of scientific instruments

    Miller, T., McBurney, P., McGinnis, J. & Stathis, K., 2007, WET ICE 2007: 16TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 41-46 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  412. Published

    Fixed-Parameter Tractability of Multicut in Directed Acyclic Graphs

    Kratsch, S., Pilipczuk, M., Pilipczuk, M. & Wahlström, M., 2012, ICALP (1). p. 581-593 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  413. Forthcoming

    Fixed-parameter tractability of satisfying beyond the number of variables

    Crowston, R., Gutin, G., Jones, M., Raman, V., Saurabh, S. & Yeo, A., 2012, (Accepted/In press) SAT 2012. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  414. Published

    Fixed-Parameter Tractability of Workflow Satisability in the Presence of Seniority Constraints

    Crampton, J., Crowston, R., Gutin, G., Jones, M. & Ramanujan, M. S., 2013, FAW-AAIM 2013: Lecture Notes in Computer Science. Vol. 7924. p. 198-209

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  415. Published

    Flexible decentralised control of connection admission

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 2000, Agent Technology for Communications Infrastructure. Hayzelden, A. & Bourne, R. A. (eds.). John Wiley & Sons, p. 144-155

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. Published

    Flexible decentralised control of connection admission communications networks and the IMPACT of software agents

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., Nov 1999, Proceedings of IMPACT'99 .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  417. Published

    Flora, fauna and stable isotopes in Late-Würm deposits at Lobsigensee (Swiss Plateau)

    Ammann, B., Chaix, L., Eicher, U., Elias, S., Gaillard, M. J., Hoffmann, W., Siegenthaler, U., Tobolski, K. & Wilkinson, B., 1984, Climatic Changes on a Yearly to Millennial Basis. Morner, N. A. & Karlen, W. (eds.). Dordrecht: D. Reidel Publishing Company, p. 69-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  418. Published

    FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications

    Muthukumaran, D., O'Keeffe, D., Priebe, C., Eyers, D. M., Shand, B. & Pietzuch, P. R., 12 Oct 2015, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. p. 603-615 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  419. Published

    Fluid overpressure of quartz mineral veins in the South Wales coalfield: implication for mechanism of fracture formation in foreland basins

    Fukunari, T. & Gudmundsson, A., 2013, Rock Fractures in Geological Processes: Abstracts of the Presentations at the Symposium. U

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  420. Published

    Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity

    Talhouk, R., Coles-Kemp, L., Jensen, R. B., Balaam, M., Garbett, A., Ghattas, H., Araujo-Soares, V., Ahmad, B. & Montague, K., Oct 2020, ACM Conference on Computer-Supported Cooperative Work and Social Computing. ACM, Vol. 4. p. 1-25 25 p. 134

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  421. Published

    Foreign Investors, Local Community and the Acquired Firm: a case study of work organization and employment relations in a Chinese MNCs in Canada

    Zheng, Y., Sep 2013, 8th China Goes Global Conference. Jocob University, Germany

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  422. Published

    Forensic Entropy Analysis of Microsoft Windows Storage Volumes

    Weston, P. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  423. Published

    Forensic Tracking and Mobility Prediction in Vehicular Networks

    Al-Kuwari, S. & Wolthusen, S. D., 2012, Advances in Digital Forensics VIII: Proceedings of the Eighth IFIP WG 11.9 International Conference on Digital Forensics. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. Published

    Formal derivation of concurrent garbage collectors

    Pavlovic, D., Pepper, P. & Smith, D. R., 2010, Proceedings of MPC 2010. Desharnais, J. (ed.). Springer-Verlag, Vol. 6120. p. 353-376 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  425. Published

    Formalization of Validation Extension Metamodel for Enterprise Architecture Frameworks

    Oussena, S., Essien, J. & Komisarczuk, P., 2014, ICEIS 2014 - Proceedings of the 16th International Conference on Enterprise Information Systems, Volume 3, Lisbon, Portugal, 27-30 April, 2014. p. 427-434 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  426. Published

    Formalized Metatheory with Terms Represented by an Indexed Family of Types

    Adams, R., 2006, Types for Proofs and Programs. Filliatre, J-C., Paulin-Mohring, C. & Werner, B. (eds.). Springer, Vol. 3839. p. 1-16 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  427. Published

    Formalizing threat models for virtualized systems

    Sgandurra, D., Karafili, E. & Lupu, E., 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Springer-Verlag, Vol. 9766. p. 251-267 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  428. Published

    Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

    Bost, R., Minaud, B. & Ohrimenko, O., 30 Oct 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security: CCS '17. Association for Computing Machinery (ACM), p. 1465-1482 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  429. Published

    FRACTURE TOUGHNESS AND CRACK PROPAGATION IN POLYESTER RESINS.

    Gatward, C. H., Hogg, P. J. & Hull, D., 1 Dec 1985, Deformation Yield and Fracture of Polymers. London, Engl: Plastics & Rubber Inst

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  430. Published

    Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence

    Malek, W. W., Mayes, K. & Markantonakis, K., 2008, Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications. Berlin, Heidelberg: Springer-Verlag, p. 118-132 15 p. (CARDIS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  431. Published

    Fredholm Multiple Kernel Learning for Semi-Supervised Domain Adaptation

    Wang, W., Wang, H., Zhang, C. & Gao, Y., 2017, Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17). AAAI Press, p. 2732-2738 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  432. Published

    Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data

    Lacharite, M-S. & Paterson, K., 1 Mar 2018, IACR Transactions on Symmetric Cryptology. 1 ed. Ruhr-Universität Bochum, Vol. 2018. p. 277-313 37 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  433. Published

    From Boundary Spanning to Creolization: Cross-cultural Strategies from the Offshore Provider’s Perspective

    Abbott, P., Zheng, Y., Du, R. & Willcocks, L. P., 2010, AmericasConference of Information Systems 2010.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  434. Published

    From conformal to probabilistic prediction

    Vovk, V., Petej, I. & Fedorova, V., 2014, COPA 2014 Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  435. Published

    From me to we: Understanding how a new collective practice is born

    Khanijou, R., Cappellini, B. & Hosany, S., 2019, 10th EIASM Interpretive Consumer Research Conference, Lyon, 9-10 May.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  436. Published

    From Quantum Interference to Bayesian Coherence and Back Round Again

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J-A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 260-279

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  437. Published

    From Separation Logic to First‐Order Logic

    Calcagno, C., Gardner, P. & Hague, M., 2005, FoSSaCS: Foundations of Software Science and Computation Structures.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  438. Published

    From Start-up to Maturity: studies based in three Chinese pharmaceutical and medical device companies’

    Zheng, Y., Li, X. & Wang, C. L., 17 Jul 2009, The Annual Conference of the Academy of Innovation and Entrepreneurship.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  439. Published

    From the individual to the collective: religion and memory in Roman Britain

    Kamash, Z., 2016, Cultural Memories in the Roman Empire. Galinsky, K. & Lapatin, K. (eds.). Getty Museum Press, p. 153-169 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  440. Published

    From the Mouths of Mothers: Using drama and service user testimonies to facilitate reflective learning for qualified social workers who are working with children and families who are affected by child sexual abuse

    Leonard, K., Gupta, A., Stuart-Fisher, A. & Lowe, K., Jul 2015, EASSW - European Association of Schools of Social Work conference, Milan, Italy..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  441. Published

    From user-centred design to security: building attacker personas for digital banking

    Moeckel, C., 29 Sep 2018, NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction . Association for Computing Machinery (ACM), p. 892-897 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  442. In preparation

    From Victim to Perpetrator: On the Blurring of Identities in Soazig Aaron’s Le Nom de Klara (2002)

    Duffy, H., 28 Jul 2019, (In preparation) Victims, Perpetrators and Implicated Subjects : Rethinking Agency at the Intersections of Narrative and Memory.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  443. Published

    Frustration and Reactive Aggression: A Response Force Measure

    Arshad, I., Lickley, R., Sebastian, C. & Balsters, J., May 2019, Poster presented at the British Psychological Society Annual Conference in May 2019, Harrogate, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  444. Published

    FSO-CDMA Systems Supporting end-to-end Network Slicing

    R. Raddo, T., Perez-Santacruz, J., Johannsen, U., Dayoubb, I., Haxha, S., Tafur Monroy, I. & Jurado-Navas, A., 20 Sep 2020, Imaging and Applied Optics Congress. Vancouver, BC, Canada, Vancouver, Canada: OSA Technical Digest (Optical Society of America, 2020, 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  445. Forthcoming

    Future trends in Employment Relations: Lessons from SMEs in the creative industry

    Sen Gupta, S., 26 Jun 2019, (Accepted/In press) Lessons from SMEs in the creative industry.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  446. Published

    Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework

    Wolthusen, S. D., 26 May 2011, Proc. 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011). IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  447. Published

    'Gainst Nature Still: Reading Macbeth's Murder of Duncan

    Uotinen, T., 2011, Villains: Global Persceptives in Villains and Villainy. Genc, B. & Lenhardt, C. (eds.). Inter-Disciplinary Press, p. 157-163 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  448. Published

    Games as a Metaphor for Interactive Systems

    Stathis, K. & Sergot, M. J., 1 Aug 1996, People and Computers XI (Proceedings of HCI'96). Sasse, M. A., Cunningham, R. J. & Winder, R. L. (eds.). London, UK: Springer-Verlag, p. 19-33 15 p. (BCS Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  449. Published

    Gaming security by obscurity

    Pavlovic, D., 2011, NSPW '11 Proceedings of the 2011 workshop on New security paradigms workshop. Gates, C. & Hearley, C. (eds.). New York, NY, USA: ACM, p. 125-140 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  450. Published

    Gamma Factory at CERN: Design of a Proof-of-Principle Experiment

    The Gamma Factory Collaboration, Alden, S., Bosco, A., Gibson, S. & Nevay, L., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 1-4 4 p. MOPRB052

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  451. E-pub ahead of print

    Gamma Factory at CERN – novel research tools made of light

    The Gamma Factory Collaboration, Abramov, A., Alden, S., Bosco, A., Gibson, S. & Nevay, L., 14 Jun 2019, XXV Cracow Epiphany Conference on Advances in Heavy Ion Physics: 8-11 January 2019, Cracow, Poland. Acta Physica Polonica B, p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  452. Published

    GARMDROID: IoT Potential Security Threats Analysis through the Inference of Android Applications Hardware Features Requirements

    Rodriguez-Mota, A., Escamilla-Ambrosio, P. J., Happa, J. & Aguirre-Anaya, E., 2017, AFI 360 Conference Track on Future Internet and Internet of Things Applications. p. 63-74 12 p. (Lecture Notes of the Institute for Computer Sciences; vol. 179).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  453. Published

    Garnata: An Information Retrieval System for Structured Documents based on Probabilistic Graphical Models

    de Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 2006, Proceedings of the 11th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU 2006). Paris (France), p. 1024-1031 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  454. Unpublished

    Gender and ICTs in Brazil

    Poveda Villalba, S., 2014, (Unpublished) ICT4D London Meet-Up. ICT4D London Meet-Up

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  455. Published

    Gene selection using Wilcoxon rank sum test and Support Vector Machine for cancer classification

    Liao, C., Li, S. & Luo, Z., 2007, Lecture Notes in Computer Science. Springer, Vol. 4456. p. 57-66

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  456. Published

    General Linear Relations among Different Types of Predictive Complexity

    Kalnishkan, Y., 1999, Algorithmic Learning Theory, 10th International Conference, ALT'99, Proceedings: volume 1720 of Lecture Notes in Artificial Intelligence. Springer, p. 323-334 (Lecture Notes in Artificial Intelligence; vol. 1720).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  457. Published

    Generalised entropy and asymptotic complexities of languages

    Kalnishkan, Y., Vovk, V. & Vyugin, M. V., 2007, Proceedings of the Twentieth Annual Conference on Learning Theory. Bshouty, N. & Gentily, C. (eds.). Berlin: Springer, Vol. 4539. p. 293-307 15 p. (Lecture Notes in Artificial Intelligence; vol. 4539).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  458. Published

    Generalising Interpretations between Theories in the context of (pi-) Institutions

    Fiadeiro, J. L. & Maibaum, T. S. E., 1993, Theory and Formal Methods. Springer, p. 126-147 22 p. (Workshops in Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  459. Published

    Generalized entropies and asymptotic complexities of languages

    Kalnishkan, Y., Vyugin, M. V. & Vovk, V., Sep 2012, Proceedings of the Fifth Workshop on Information-Theoretic Methods in Science and Engineering. de Rooij, S., Kotlowski, W., Rissanen, J., Millimaki, P., T. R. & Yamanishi, K. (eds.). Amsterdam: CWI, p. 44-47 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  460. Published

    Generating Concurrency Checks Automatically

    Hague, M. & Hoyland, J., 17 Jul 2016, Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs . ACM, p. 1-15 15 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  461. Published

    Generating social value through online communities: The case of medicine Africa

    Chamakiotis, P. & Panteli, N., 17 May 2017, AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation. Americas Conference on Information Systems, p. 1-5 5 p. (AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation; vol. 2017-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  462. Published

    Generating Social Value through Online Communities: The Case of MedicineAfrica

    Chamakiotis, P. & Panteli, N., 2017, Proceedings of the 23rd Americas Conference on Information Systems (AMCIS): ‘A Tradition of Innovation’: Mini-Track: 8: ‘Virtual Communities and Social Media in Healthcare. August 10-12, Boston, MA, USA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  463. E-pub ahead of print

    Generating Unlinkable IPv6 Addresses

    Nyirenda, M., Khan, M., Li, W., Mitchell, C. & Yau, P-W., 9 Dec 2015, Proceedings of SSR 15, Tokyo, December 2015. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 185-199 15 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  464. Published

    Geometry of abstraction in quantum computation

    Pavlovic, D., 19 Jul 2012, Proceedings of Symposia in Applied Mathematics. Abramsky, S. & Mislove, M. (eds.). AMS, Vol. 71. p. 233-267 (Proceedings of Symposia in Applied Mathematics; vol. 71).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  465. Published

    Geometry, displacements, and driving stresses of seismogenic faults in Iceland

    Gudmundsson, A., 1989, Seismology in Europe. Thorkelsson, B. (ed.). Reykjavik: Iceland Meteorological Office, Reykjavik, p. 193-198

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  466. Published

    Giant mounded drifts in the Mozambique continental margin: Origins and global implications for the history of thermohaline circulation

    Thieblemont, A., Hernández-Molina, F. J. & Raisson, F., 2017, 3rd EAGE Eastern Africa Petroleum Geoscience Forum: Managing Subsurface Risk in Finding and Developing Hydrocarbons. European Association of Geoscientists and Engineers, EAGE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  467. Published

    Glamdring: Automatic Application Partitioning for Intel SGX

    Lind, J., Priebe, C., Muthukumaran, D., O'Keeffe, D., Aublin, P-L., Kelbert, F., Reiher, T., Goltzsche, D., Eyers, D. M., Kapitza, R., Fetzer, C. & Pietzuch, P. R., 2017, Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC ’17). USENIX, p. 285-298 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  468. Published

    Gli Eroi e i Mostri: mito e storia nell’Ercole

    Jossa, S., Cherchi, P. (ed.), Rinaldi, M. (ed.) & Tempera, M. (ed.), 2008, Giovan Battista Giraldi Cinzio gentiluomo ferrarese. Firenze: Gabinetto Scientifico Letterario G. P. Vieusseux, Studi 13, Leo Olschki

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  469. Published

    Global changes in gene expression during Alstroemeria petal senescence

    Wagstaff, C., Bramke, I., Breeze, E., Thomas, B., Buchanan-Wollaston, V., Harrison, L., Rogers, H. & Stead, A., 2005, Proceedings of the VIIIth International Symposium on Postharvest Physiology of Ornamental Plants. Marissen, N., VanDoorn, WG. & VanMeeteren, U. (eds.). LEUVEN 1: INTERNATIONAL SOCIETY HORTICULTURAL SCIENCE, p. 127-134 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  470. Published

    Global human mobility and knowledge transfer: Highly skilled return migrants in Ethiopia

    Lam, A. & Rui, H., Jun 2018, 30th Annual Conference of the Society for the Advancement of Socio-Economics (SASE): Global Reordering.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  471. Published

    Going with the flow? What CSR can learn from innovation

    Preuss, L. & Dyerson, R., Nov 2010, Open University Social Marketing and Socially Responsible Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  472. Published

    Gracefully Degrading Consensus and k-Set Agreement in Directed Dynamic Networks

    Biely, M., Robinson, P., Schmid, U., Schwarz, M. & Winkler, K., 2015, Networked Systems - Third International Conference, NETYS 2015, Agadir, Morocco, May 13-15, 2015, Revised Selected Papers. Bouajjani, A. & Fauconnier, H. (eds.). Springer Berlin / Heidelberg, Vol. 9466. p. 109-124 16 p. (Lecture Notes in Computer Science; vol. 9466).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  473. Published

    Graded Encoding Schemes from Obfuscation

    Farshim, P., Hesse, J., Hofheinz, D. & Larraia de Vega, E., 1 Mar 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Springer-Verlag, Vol. 10769 LNCS. p. 371-400 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  474. Published

    Grameen Bank’s Housing Program for Rural Poor in Bangladesh: A Case Study

    Adri, N. & Sultana, S., 2004, Papers of the Applied Geography Conferences. Montz, B. & Tobin, G. (eds.). Vol. 27. p. 247-253 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  475. Published

    Granddaughter beware! An intergenerational case study of managing trust issues in the use of Facebook

    Light, A. & Coles-Kemp, L., 2013, International Conference on Trust and Trustworthy Computing. Springer Berlin / Heidelberg, p. 196-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  476. Published

    Graphical user interfaces in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, 4th International Workshop on Product LinE Approaches in Software Engineering, PLEASE 2013, San Francisco, CA, USA, May 20, 2013. p. 25-28 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  477. E-pub ahead of print

    Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification

    Hurley-Smith, D. & Hernandez-Castro, J., 21 Nov 2018, 4th International Conference on Research in Security Standardisation: SSR 2018. Cremers, C. & Lehmann, A. (eds.). Springer, p. 143-163 21 p. (Lecture Notes in Computer Science; vol. 11322).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  478. Published

    Grétry et les connaissances modernes

    Charlton, D., 2013, Art & Fact: Revue des historiens de l'art, des archéologues et des musicologues de l'Université de Liège. Tilkin, F. (ed.). Liège: Université de Liège, Vol. 32. p. 42-8 7 p. (Art & Fact; vol. 32).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  479. Published

    Grid Enabled Internet Instruments

    Komisarczuk, P., Seifert, C. & Pemberton, D., 2007, Proceedings of the Global Communications Conference, 2007. GLOBECOM '07, Washington, DC, USA, 26-30 November 2007. p. 1906-1911 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  480. Published

    Group communication as an infrastructure for distributed system management

    Amir, Y., Breitgand, D., Chockler, G. V. & Dolev, D., 1 Jan 1996, Proceedings of the 3rd International IEEE Workshop on Services in Distributed and Networked Environments (SDNE '96). p. 84-91 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  481. Published

    Group decision support for resource allocation decisions in three-person groups

    van Leeuwen, J., van der Heijden, H., Kronsteiner, R. & Kotsis, G., 2004, Proceedings of the European Conference on Information Systems (ECIS). Turku, Finland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  482. Published

    Group Signatures with Selective Linkability

    Garms, L. & Lehmann, A., 2019, 22nd International Conference on Practice and Theory of Public Key Cryptography. p. 190-220 31 p. (Lecture Notes in Computer Science; vol. 11442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  483. Published

    Group Theory in Cryptography

    Blackburn, S., Cid, C. & Mullan, C., 2011, Group St Andrews 2009 in Bath. The London Mathematical Society, Vol. 387. p. 133-149 17 p. (LMS Lecture Note Series; vol. 387).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  484. Published

    Guaranteed network traffic demand prediction using FARIMA models

    Dashevskiy, M. & Luo, Z., 2008, Lecture Notes in Computer Sc. Vol. 5326. p. 274-281

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  485. Published

    Guiding Reification in OWL through Aggregation

    Severi, P., Fiadeiro, J. L. & Ekserdjian, D., 2010, Description Logics. CEUR-WS.org, Vol. 573. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  486. Published

    Hadron Therapy Machine Simulations Using BDSIM

    Shields, W., Boogert, S., Nevay, L. & Snuverink, J., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 546-549 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  487. Published

    Half-integrality, LP-branching and FPT Algorithms

    Wahlström, M., 2014, SODA. Chekuri, C. (ed.). SIAM, p. 1762-1781 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  488. Published

    Harmonic characterisation model of grid interactive photovoltaic systems

    Nduka, O. & Pal, B., 24 Nov 2016, 2016 IEEE International Conference on Power System Technology (POWERCON). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  489. Published

    Harmonic Domain Modeling of PV System for the Assessment of Grid Integration Impact

    Pal, B. & Nduka, O., 24 Dec 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  490. Unpublished

    Harnessing employee engagement in UK public services

    Gatenby, M., Alfes, K., Truss, K., Rees, C. & Soane, E., Oct 2009, (Unpublished) 10th Public Management Research Association (PMRA) Conference. Columbus.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  491. Published

    He-3 bilayer film adsorbed on graphite plated with a bilayer of He-4: A new frustrated 2D magnetic system

    Neumann, M., Nyeki, J., Cowan, B. & Saunders, J., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 317-318 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  492. Published

    Hearing Through the Eye in Eighteenth-Century French Opera

    Charlton, D., 2014, Exchanges and Tensions in Art, Theatre and Opera, c.1750-1850. Hibberd, S. & Wrigley, R. (eds.). Ashgate

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  493. Published

    Heavy-light decay constants from relativistic N-f=2, 0 QCD

    Shanahan, H. P. & CP-PACS Collaboration, 2000, HIGH ENERGY PHYSICS 99, PROCEEDINGS. BRISTOL: IOP PUBLISHING LTD, p. 943-944 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  494. Published

    Hedging Structured Concepts

    Koolen, W. M., Warmuth, M. K. & Kivinen, J., 1 Jun 2010, Proceedings of the 23rd Annual Conference on Learning Theory (COLT 2010). p. 93-105 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  495. Published

    Hemispheric lateralization of sentence intonation in left handed subjects with typical and atypical language lateralization: An fMRI study

    Varga, E., Schnell, Z., Perlaki, G., Orsi, G., Aradi, M., Auer, T., John, F., Dóczi, T., Komoly, S., Kovács, N., Schwarcz, A., Tényi, T., Herold, R., Janszky, J. & Horváth, R., 2014, Proceedings of the International Conference on Speech Prosody. International Speech Communications Association, p. 1130-1133 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  496. Published

    Heterogeneous and Asynchronous Networks of Timed Systems

    Fiadeiro, J. L. & Lopes, A., 2014, Fundamental Approaches to Software Engineering - 17th International Conference, FASE 2014. Springer, Vol. 8411. p. 79-93 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  497. Published

    Heterogeneous Internet access via PANA/UMTS

    Pagliusi, P. S. & Mitchell, C. J., 2004, Proceedings of the 3rd International Conference on Information Security, Hardware/Software Codesign and Computer Networks - ISCOCO 2004, Rio De Janeiro, Brazil, October 2004. World Scientific, 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  498. Published

    Heterogeneous Timed Machines

    Delahaye, B., Fiadeiro, J. L., Legay, A. & Lopes, A., 2014, Theoretical Aspects of Computing - ICTAC 2014 - 11th International Colloquium, Bucharest, Romania, September 17-19, 2014.. Springer, Vol. 8687. p. 115-132 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  499. Published

    Heuristic subset selection in classical planning

    Lelis, L. H. S., Franco, S., Abisrror, M., Barley, M., Zilles, S. & Holte, R. C., 2016, Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, New York, NY, USA, 9-15 July 2016. International Joint Conferences on Artificial Intelligence, p. 3185-3191 7 p. (IJCAI International Joint Conference on Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  500. Published

    H-IBAS-H - Authentication System for University Student Portals Using Images

    Al-Sinani, H., Nguyen, C. & Vuksanovic, B., 2009, Proceedings of ICCCP-09: International Conference on Communication, Computing and Power, jointly organised with IEEE, Muscat, Oman, February 15-18 2009. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  501. Published

    Hidden histories? Local knowledge and indigenous agency in the history of geographical exploration

    Driver, F. & Jones, L., 2010, Proceedings of the 14th International Conference of Historical Geographers, Kyoto Proceedings of the 14th International Conference of Historical Geographers, Kyoto . Kyoto University Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...3 4 5 6 7 8 9 10 ...79 Next