Home > Publications

Publications

34501 - 35000 out of 37,649Page size: 500
  1. Conference contribution › Research
  2. Published

    Parameterized Pre-Coloring Extension and List Coloring Problems

    Gutin, G., Majumdar, D., Ordyniak, S. & Wahlström, M., 27 Feb 2020, LIPIcs, Proceedings of STACS 2020. Vol. 154. p. 1-18 18 p. 15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. E-pub ahead of print

    Parameterized Resiliency Problems via Integer Linear Programming

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 14 Apr 2017, CIAC 2017, 10th International Conference on Algorithms and Complexity May 26, 2017 - May 28, 2017. Springer, Vol. 10236. p. 164-176 13 p. (Lecture Notes in Computer Science; vol. 10236).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Parameterized Study of the Test Cover Problem

    Crowston, R., Gutin, G., Jones, M., Saurabh, S. & Yeo, A., 2012, MFCS 2012: Lecture Notes in Computer Science . Vol. 7464. p. 283-295

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Parameterized Two-Player Nash Equilibrium

    Hermelin, D., Huang, C-C., Kratsch, S. & Wahlström, M., 2011, Graph-Theoretic Concepts in Computer Science : 37th International Workshop, WG 2011. Kolman, P. & Kratochvíl, J. (eds.). Teplá Monastery, Czech Republic: Springer, Vol. 6986. p. 215-226 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Parent Subsidiary Relationship of EM MNCs: The Chinese Experience

    Rui, H., 2011, Proceedings of the 53rd Annual Meeting of the Academy of International Business: "International Business for Sustainable World Development". Makino, S. & Kiyak, T. (eds.). 2011 Academy of International Business

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    PAriCheck: an efficient pointer arithmetic checker for C programs

    Younan, Y., Philippaerts, P., Cavallaro, L., Sekar, R., Piessens, F. & Joosen, W., 13 Apr 2010, ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. Beijing, China: ACM, p. 145-156 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Parity to Safety in Polynomial Time for Pushdown and Collapsible Pushdown Systems

    Hague, M., Meyer, R., Muskalla, S. & Zimmermann, M., 20 Aug 2018, International Symposium of Mathematical Foundations of Computer Science. p. 1-15 15 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 117).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Partial Awareness

    Piermont, E. & Joseph Y. Halpern, 2019, Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Partial key recovery attacks on XCBC, TMAC and OMAC

    Mitchell, C. J., 2005, Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings. Smart, N. (ed.). Springer-Verlag, Vol. 3796. p. 155-167 13 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Partially Distribution-Free Learning of Regular Languages from Positive Samples

    Clark, A. & Thollard, F., 2004, Proceedings of COLING. p. 85-91

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Partially Preserved Colonnades in Greek Architecture: the Probability of Matching Column Drums

    Mustonen, S. & Pakkanen, J., 2004, Making the Connection to the Past. CAA 99: Computer Applications and Quantitative Methods in Archaeology. Proceedings of the 27th Conference, Dublin, April 1999. Fennema, K. & Kamermans, H. (eds.). Leiden, p. 57–59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Participation, dialogue and curriculum development in school based AIDS education

    McLaughlin, C., Cobbett, M. & Kiragu, S., 2012, AIDS 2012.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Particle Tracking for the FETS Laser Wire Emittance Scanner

    Pozimski, J. & Gibson, S., 19 Sep 2013, 2nd International Beam Instrumentation Conference. p. 503-506 4 p. TUPF05

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Path Conditions and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 2014, 19th ACM Symposium on Access Control Models and Technologies. ACM, p. 187-198

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Path-Contractions, Edge Deletions and Connectivity Preservation

    Gutin, G., Ramanujan, M. S., Reidl, F. & Wahlstrom, M., 3 Sep 2017, The 25th Annual European Symposium on Algorithms (ESA 2017). p. 1-13 13 p. 47. (LIPICS; vol. 87).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Patient centred approaches to improving self care

    Bradley, C., 2002, Cyberconference: Compliance, concordance and control – Measures to improve outcome [Website not available].

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Pattern recognition and density estimation under the general i.i.d assumption

    Nouretdinov, I., Vovk, V., Vyugin, M. & Gammerman, A., 2001, Proceedings of the Fourteenth Annual Conference on Computational Learning Theory and Fifth European Conference on Computational Learning Theory. Helmbold, D. & Williamson, B. (eds.). London: Springer, p. 337-353 17 p. (Lecture Notes in Artificial Intelligence; vol. 2111).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Patterns for Coordination

    Andrade, L. F., Fiadeiro, J. L., Gouveia, J., Lopes, A. & Wermelinger, M., 2000, COORDINATION. Springer, Vol. 1906. p. 317-322 6 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Pay Cuts vs Downsizing: How job security and Pay level related perceptions affect work attitudes of remaining employees

    Sen Gupta, S. & Yoon, Y. J., 26 Jun 2019, Society for Advancement of Socio Economics Conference . Society for Advancement of Socio Economics, NY, USA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Perceived Group diversity, Communication, and Social Integration: The Moderating Effect of Group Interdependence and Group Longevity

    Alsolamy, M. & Tsai, C-J., 14 Sep 2015, BAM 2015 Conference Proceedings . British Academy of Management, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Perceptions of martyrdom and terrorism amongst British Muslims

    Ansari, H., Cinnirella, M., Rogers, M. B., Loewenthal, K. M. & Lewis, C. A., 2006, Proceedings of the British Psychological Society Seminar Series Aspects of Terrorism and Martyrdom. Rogers, M. B., Lewis, C. A., Loewenthal, K. M., Cinnirella, M., Amlôt, R. & Ansari, H. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Performance Analysis of Reinforcement Learning for Achieving Context Awareness and Intelligence in Mobile Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Performance analysis of Reinforcement Learning for achieving context-awareness and intelligence in Cognitive Radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings. p. 1046-1053 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Performance Appraisal: Much ado about nothing

    Edwards, P. & Sen Gupta, S., 2017, Society for Advancement of Socio Economics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element

    Umar, A., Mayes, K. & Markantonakis, K., 20 Feb 2015, 2015 First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Peroxy radical intercomparison exercise: A joint TOR/OCTA Experiment at Schauinsland 1994

    VoltThomas, A., Gilge, S., Heitlinger, M., Mihelcic, D., Musgen, P., Patz, H. W., Schultz, M., Borrell, P., Borrell, P. M., Slemr, J., Behmann, T., Burrows, J. P., Weissenmayer, M., Arnold, T., Klupfel, T., Perner, D., Cantrell, C. A., Shetter, R., Carpenter, L. J., Clemitshaw, K. C. & 1 others, Penkett, S. A., 1997, PROCEEDINGS OF EUROTRAC SYMPOSIUM '96 - TRANSPORT AND TRANSFORMATION OF POLLUTANTS IN THE TROPOSPHERE, VOL 2. SOUTHAMPTON: COMPUTATIONAL MECHANICS PUBLICATIONS LTD, p. 621-626 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Pervasive Healthcare Using Self-Healing Agent Environments

    Bromuri, S., Ignaz Schumacher, M. & Stathis, K., 2011, HIGHLIGHTS IN PRACTICAL APPLICATIONS OF AGENTS AND MULTIAGENT SYSTEMS. Perez, JB., Corchado, JM., Moreno, MN., Julian, V., Mathieu, P., CanadaBago, J., Ortega, A. & Caballero, AF. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 159-166 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. E-pub ahead of print

    Philanthropy on the Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N. & Mayes, K., 21 Jun 2018, The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017). Springer, p. 25-38 14 p. (Lecture Notes in Computer Science (LNCS); vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Phoenix: DGA-Based Botnet Tracking and Intelligence

    Schiavoni, S., Maggi, F., Cavallaro, L. & Zanero, S., 10 Jul 2014, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). London: Springer, Vol. 8550. p. 192-211 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Photonic Crystal Fibre Laser for Electron Beam Emittance Measurement

    Corner, L., Nevay, L. J. & Walczak, R., 1 Dec 2011, IPAC 2011 - 2nd International Particle Accelerator Conference. p. 577-579 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Photoproduction of neutral strange hadrons at ZEUS

    Boogert, S. & ZEUS Collaboration, 2001, PHOTON 2001. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids

    Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 52-68 17 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Physiological vs. Social complexity in software design

    Fiadeiro, J. L., 1 Jan 2006, Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS. p. 3 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. E-pub ahead of print

    Picking vs. Guessing Secrets: A Game-Theoretic Analysis

    Khouzani, A., Mardziel, P., Cid, C. & Srivatsa, M., 7 Sep 2015, IEEE 28th Computer Security Foundations Symposium. p. 243-257 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    PKI implementation issues in B2B e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2003, EICAR Conference Best Paper Proceedings, Copenhagen, Denmark, May 2003. Gattiker, U. E. (ed.). 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Placing and scaling ethical choices: ethical consumption and ethical public procurement

    Kleine, D., 2013, Proceedings of the 11th Congress of the European Society for Agricultural and Food Ethics. EurSafe

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Plaintext Recovery Attacks Against SSH

    Albrecht, M. R., Paterson, K. G. & Watson, G. J., 2009, Proceedings of the 2009 30th IEEE Symposium on Security and Privacy: 17-20 May 2009 / Berkley, CA, US. IEEE Computer Society, p. 16-26 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Plaintext Recovery Attacks Against WPA/TKIP

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. p. 325-349 25 p. (Lecture Notes in Computer Science; vol. 8540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR

    Paterson, K. G. & Watson, G. J., 2010, Advances in Cryptology – EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010: Proceedings. Gilbert, H. (ed.). Springer, p. 345-361 17 p. (Lecture Notes in Computer Science; vol. 6110).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Plaintext-Recovery Attacks Against Datagram TLS

    Alfardan, N. & Paterson, K., 2012, Network and Distributed System Security Symposium. The Internet Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Plant macrofossils from rodent middens

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 3. p. 2356-2367

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Playing with Agent Coordination Patterns in MAGE

    Urovi, V. & Stathis, K., 2010, Lecture Notes in Computer Science. Springer, Vol. 6069. p. 86-101 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Plug-in martingales for testing exchangeability on-line

    Fedorova, V., Gammerman, A., Nouretdinov, I. & Vovk, V., 2012, Proceedings of the 29th International Conference on Machine Learning (ICML-12). Langford, J. & Pineau, J. (eds.). Omnipress, p. 1639-1646 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    POLE-ZERO SYSTEM-IDENTIFICATION USING GENETIC ALGORITHMS

    FLOCKTON, S. J. & WHITE, M. S., 1993, PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON GENETIC ALGORITHMS. Forrest, S. (ed.). SAN MATEO: MORGAN KAUFMANN PUB INC, p. 531-535 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Policy Conflict Resolution in IoT via Planning

    Göynügür, E., Bernardini, S., de Mel, G., Talamadupula, K. & Şensoy, M., 2017, Canadian Conference on Artificial Intelligence: AI 2017: Advances in Artificial Intelligence. Springer, Vol. 10233. p. 169-175 7 p. (Lecture Notes in Computer Science; vol. 10233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Polynomial Kernels and User Reductions for the Workflow Satisfiability Problem

    Gutin, G., Kratsch, S. & Wahlström, M., 2014, Proceedings of IPEC 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Polynomial Time Learning of Some Multiple Context-Free Languages with a Minimally Adequate Teacher

    Yoshinaka, R. & Clark, A., 2010, Proceedings of Formal Grammar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Polynomially Closed Co-clones

    Lagerkvist, V. & Wahlström, M., 2014, Proceedings of ISMVL 2014: IEEE 44th International Symposium on Multiple-Valued Logic. IEEE, p. 85-90 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Position Statement on the Psychological Aspects of Diabetes Education and Care

    Gallichan, M., Anderson, B., Bradley, C., Kilmartin, J., Peyrot, M. & Dunning, T., 2000, International Consensus Position Statements for Diabetes Education. London: Class publishing

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Postglacial Beetle Records from North America

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 275-286

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Posturography Platform and Balance Control Training and Research System Based on FES and Muscle Synergies

    Galeano Galeano, D., Brunetti, F., Torricelli, D., Piazza, S. & Pons, J. L., 2013, Neurotechnology, Electronics, and Informatics. Londral, A. R., Encarnação, P. & Pons Rovira, J. L. (eds.). Springer-Verlag, Vol. 13. ( Springer Series in Computational Neuroscience; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Potential based reward shaping for hierarchical reinforcement learning

    Gao, Y. & Toni, F., 25 Jul 2015, IJCAI'15 Proceedings of the 24th International Conference on Artificial Intelligence. AAAI Press, p. 3504-3510 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.

    Francis, L., Hancke, G. P., Mayes, K. & Markantonakis, K., 2009, ICITST'09. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Aug 2017, USENIX Workshop on Offensive Technologies (WOOT). USENIX, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. E-pub ahead of print

    Practical Attacks Against the Walnut Digital Signature Scheme

    Beullens, W. & Blackburn, S., 27 Oct 2018, Advances in Cryptology - ASIACRYPT 2018. Springer, p. 35-61 27 p. (Lecture Notes in Computer Science; vol. 11272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Practical attacks on proximity identification systems

    Hancke, G., 2006, IEEE Symposium on Security and Privacy . p. 328-333

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Practical Automated Vulnerability Monitoring Using Program State Invariants

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 23 Jun 2013, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '13). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, Radio Frequency Identification: Security and Privacy Issues: RFIDSec 2010. Ors Yalcin, S. (ed.). Springer Berlin / Heidelberg, Vol. 6370. p. 35-49 15 p. (Lecture Notes in Computer Science; vol. 6370).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., Nov 2012, The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8. p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Practical solutions to key escrow and regulatory aspects

    Jefferies, N., Mitchell, C. J. & Walker, M., 1996, Proceedings of Public Key Solutions '96, Zurich, Switzerland, September/October 1996.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Practical 'what-if?' modelling for resource management of corporate voice-data networks

    Pitts, J., Luo, Z. & Cosmas, J., 1999, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 3842. p. 132-141

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Practice Makes Perfect: Motivating Confident Privacy Protection Practices

    Coles-Kemp, L. & Kani-Zabihi, E., 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). IEEE, p. 866-871 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Submitted

    Precarity Amongst Service Managers in the NHS: a review in the midst of austerity and Brexit

    Zahmatkesh, M., 2017, (Submitted) 20th Annual Irish Academy of Management Conference 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Precise Bounds for Montgomery Modular Multiplication and some Potentially Insecure RSA Moduli

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 30-39 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Precise Instruction-Level Side Channel Profiling of Embedded Processors

    Msgna, M., Markantonakis, K. & Mayes, K., 5 May 2014, Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Vol. 8434. p. 129-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Precise parameter synthesis for stochastic biochemical systems

    Ceska, M., Dannenberg, F., Kwiatkowska, M. & Paoletti, N., 2014, Computational Methods in Systems Biology. p. 86-98 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Precise static analysis of untrusted driver binaries

    Kinder, J. & Veith, H., 2010, Proc. 10th Int. Conf. Formal Methods in Computer Aided Design (FMCAD 2010). p. 43-50

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Precision Modelling of Energy Deposition in the LHC using BDSIM

    Walker, S., Abramov, A., Boogert, S., Gibson, S., Pikhartova, H. & Nevay, L., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. MOPRB064

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Predicting Cognitive Recovery of Stroke Patients from the Structural MRI Connectome Using a Naïve Bayesian Tree Classifier

    Dacosta-Aguayo, R., Stephan-Otto, C., Auer, T., Clemente, I., Davalos, A., Bargallo, N., Mataro, M. & Klados, M. A., 2017, Proceedings - 2017 IEEE 30th International Symposium on Computer-Based Medical Systems, CBMS 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-June. p. 413-418 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Prediction of long-range dependent time series data with performance guarantee

    Dashevskiy, M. & Luo, Z., 2009, Stochastic Algorithms: Foundations and Applications, Lecture Notes in Computer Science. Vol. 5792. p. 31-45

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Prediction with advice of unknown number of experts

    Chernov, A. & Vovk, V., 2010, Proceedings of the Twenty Sixth Conference on Uncertainty in Articial Intelligence. Grunwald, P. & Spirtes, P. (eds.). Arlington, VA: AUAI Press, p. 117-125 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Prediction with Confidence Based on a Random Forest Classifier

    Devetyarov, D. & Nouretdinov, I., 2010, Aritificial Intelligence and Innovations: Proceedings od 6th IFIP WG 12.5 International Conference. p. 37-44 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Prediction with expert advice for the Brier game

    Vovk, V. & Zhdanov, F., 2008, Proceedings of the Twenty Fifth International Conference on Machine Learning. McCallum, A. & Roweis, S. (eds.). New York: ACM Press, p. 1104-1111 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Prediction with Expert Evaluators' Advice

    Chernov, A. & Vovk, V., 2009, Proceedings of the Twentieth International Conference on Algorithmic Learning Theory. Gavalda, R., Lugosi, G., Zeugmann, T. & Zilles, S. (eds.). Springer, p. 8-22 15 p. (Lecture Notes in Artificial Intelligence; vol. 5809).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Predictions with confidence in applications,

    Dashevskiy, M. & Luo, Z., 2009, Lecture Notes in Computer Science. Vol. 5632. p. 775-786

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Predmetnyi mir v romane D.S. Merezhkovskogo 'Piotr i Aleksei' (iz trilogii 'Khristos i Antikhrist')

    Poljakowa, N., 2005, Stavropol'skii almanakh rossiiskogo obshchestva intellektual'noi istorii: Materialy mezhdunarodnoi nauchnoi konferentsii ''Fakt-Sobytie' v razlichnykh diskursakh' (Piatigorsk, 26-27 Marta 2005. Special Edition ed. Stavropol': Izdatel'stvo Stavropol'skogo Gosudarstvennogo Universiteta, Vol. 8. p. 208-214

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Preferred Cross-continental Strategies

    Aboutalebi, R. & Lobo, R., 27 Jun 2016, In: AIB (Academy of International Business), 58th annual conference of AIB: The Locus of Global Innovation. 27-30 June 2016, New Orleans, Louisiana, U.S.A.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Preforming of fibre bridging for improved damage tolerance

    Potluri, P., Arshad, M., Jetavat, D., Jamshidi, P. & Hogg, P., 1 Dec 2011, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Preprocessing of Min Ones Problems: A Dichotomy

    Kratsch, S. & Wahlström, M., 2010, Automata, Languages and Programming : 37th International Colloquium, ICALP 2010. Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F. & Spirakis, P. G. (eds.). Bordeaux, France: Springer, Vol. 6198. p. 653-665 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Prequential probability: game-theoretic = measure-theoretic

    Vovk, V., 2009, Proceedings of the 2009 Joint Statistical Meetings: Section on Risk Analysis, Session on Predictive and Prequential Statistics. Alexandria, VA: American Statistical Association, p. 3859-3872 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection

    Deo, A., Dash, S., Suarez de Tangil Rotaeche, G., Vovk, V. & Cavallaro, L., 28 Oct 2016, ACM Workshop on Artificial Intelligence and Security. Vienna, Austria: ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Preservation and Reflection in Specification

    Lopes, A. & Fiadeiro, J. L., 1997, AMAST. Springer, Vol. 1349. p. 380-394 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Preservation of coralline-algal reef frameworks

    Bosence, D., 1985, Proceedings of The Fifth International Coral Reef Congress. Gabrie, C. & Harmelin, M. (eds.). Vol. 6. p. 623-628 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    PRESS - a probabilistic reasoning expert system shell

    Luo, Z. & Gammerman, A., 1991, European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Lecture Notes in Computer Science. Kruse, R. & Siegel, P. (eds.). Springer-Verlag, Vol. 548. p. 232-237

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Preventing Failure of Strategy Implementation

    Aboutalebi, R., 28 Oct 2015, In: EAMSA (Euro-Asia Management Studies Association), the 32nd Annual Conference of EAMSA: Theory and Practice in Bringing Europe and Asia- Contemporary Challenges in International Marketing. 28-31 October 2015, SOAS, University of London, England, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Preventing phishing attacks using trusted computing technology

    Alsaid, A. & Mitchell, C. J., 2006, Proceedings of INC 2006, Sixth International Network Conference, Plymouth, UK, July 2006. p. 221-228

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Preventing relay attacks in mobile transactions using infrared light

    Gurulian, I., Akram, R., Markantonakis, K. & Mayes, K., 3 Apr 2017, SAC '17 Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, p. 1724-1731 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Prime and Prejudice: Primality Testing Under Adversarial Conditions

    Albrecht, M., Massimo, J., Paterson, K. & Somorovsky, J., 8 Oct 2018, 25th ACM Conference on Computer and Communications Security 2018. p. 281-298 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Priorities in corporate sustainability reporting: Does East meet West, does South converge on North?

    Barkemeyer, R. & Preuss, L., Aug 2011, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Priors in Quantum Bayesian Inference

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J. -A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 255-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. E-pub ahead of print

    PRISM-PSY: Precise GPU-Accelerated Parameter Synthesis for Stochastic Systems

    Ceska, M., Pilar, P., Paoletti, N., Brim, L. & Kwiatkowska, M., 9 Apr 2016, Tools and Algorithms for the Construction and Analysis of Systems. Chechik, M. & Raskin, J-F. (eds.). p. 367-384 18 p. (Lecture Notes in Computer Science; vol. 9636).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Privacy Risks in Resource Constrained Smart Micro-Grids

    Ambassa, P. L., Kayem, A. V. D. M., Wolthusen, S. D. & Meinel, C., 23 Jul 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2018. Ogiela, L., Enokido, T., Ogiela, M. R., Javaid, N., Barolli, L. & Takizawa, M. (eds.). Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 527-532 6 p. 8418124

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Privacy Violations in Constrained Micro-Grids: Adversarial Cases

    Ambassa, P., Kayem, A. V. D. M., Meinel, C. & Wolthusen, S., 19 May 2016, Proceedings of the 2016 30th International Conference on Advanced Information Networking and Applications Workshops (AINA 2016). IEEE Press, p. 601-606 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Private Outsourced Kriging Interpolation

    Alderman, J., Curtis, B., Farràs Ventura, O., Martin, K. & Ribes-González, J., 7 Apr 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 75-90 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Probabilistic Contract Compliance for Mobile Applications

    Dini, G., Martinelli, F., Saracino, A. & Sgandurra, D., 1 Sep 2013, 2013 International Conference on Availability, Reliability and Security. p. 599-606 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Probabilistic Reasoning in Mixed Models Using Bayesian Belief Networks and Its Application

    Luo, Z., 1992, Proceedings of 10th European Conference on Artificial Intelligence (ECAI 92),. p. 3-7

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion

    Al-Kuwari, S. & Wolthusen, S. D., May 2010, Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference (CMS 2010). Springer-Verlag, p. 16-27

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Probability theory for the Brier game

    Vovk, V., 1997, Proceedings of the Workshop on Algorithmic Learning Theory. Li, M. & Maruoka, A. (eds.). Springer, p. 323-338 16 p. (Lecture Notes in Computer Science; vol. 1316).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Procrustes Analysis of Diffusion Tensor Data

    Zhou, D., Dryden, IL., Koloydenko, A. & Bai, L., 2009, Proceedings 17th Scientific Meeting, International Society for Magnetic Resonance in Medicine.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Producing Enactable Protocols in Artificial Agent Societies

    Lekeas, G., Kloukinas, C. & Stathis, K., 18 Nov 2011, Agents in Principle, Agents in Practice (PRIMA'11). p. 311-322 (Lecture Notes in Computer Science; vol. 7047/2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Program specification and data refinement in type theory

    Luo, Z., 1991, Proc. of the Fourth Inter. Joint Conf. on the Theory and Practice of Software Development (TAPSOFT), LNCS 493.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    Programmable Hash Functions in the Multilinear Setting

    Freire, E. S. V., Hofheinz, D., Paterson, K. G. & Striecks, C., Aug 2013, CRYPTO 2013 (1). Canetti, R. & J. G. (eds.). Springer, Vol. 8042. p. 513-530 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Published

    PROGRESS TOWARDS AN ELECTRONIC ARRAY ON LIQUID HELIUM

    Rees, D. G., Glasson, P., Meeson, P. J., Simkins, L. R., Antonov, V., Frayne, P. G. & Lea, M. J., 2008, CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPRINTRONICS. Takayanagi, H., Nitta, J. & Nakano, H. (eds.). SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 353-358 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  105. E-pub ahead of print

    Proof Assistants for Natural Language Semantics

    Chatzikyriakidis, S. & Luo, Z., 10 Nov 2016, Logical Aspects of Computational Linguistics. Celebrating 20 Years of LACL (1996–2016) : 9th International Conference, LACL 2016, Nancy, France, December 5-7, 2016, Proceedings. Springer Heidelberg, Vol. 10054. p. 85-98 14 p. (Lecture Notes in Computer Science; vol. 10054).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. Published

    Proof complexity lower bounds from algebraic circuit complexity

    Forbes, M., Shpilka, A., Tzameret, I. & Wigderson, A., 2016, 31st Conference on Computational Complexity (CCC 2016). Dagstuhl, Germany: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 50. p. 32:1-32:17 17 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 50).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  107. Published

    Proof-theoretic conceptual modeling – the NIAM case-study

    SERNADAS, C., FIADEIRO, J., MEERSMAN, R. & SERNADAS, A., 1989, INFORMATION SYSTEM CONCEPTS : AN IN-DEPTH ANALYSIS. FALKENBERG, ED. (ed.). AMSTERDAM: ELSEVIER SCIENCE PUBL B V, p. 1-30 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  108. Published

    PROSOCS: a platform for programming software agents in computational logic

    Stathis, K., Kakas, A. C., Lu, W., emetriou, N. D., Endriss, U. & Bracciali, A., 1 Apr 2004, Proceedings of the Fourth International Symposium ``From Agent Th eory to Agent Implementation'' (AT2AI-4 -- EMCSR'2004 Session M). Müller, J. & Petta, P. (eds.). p. 523-528 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    PROTOSS: A run time tool for detecting PRivacy viOlaTions in Online Social networkS (Short Paper)

    Kafali, O., Gunay, A. & Yolum, P., 2012, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  110. Published

    Prototyping symbolic execution engines for interpreted languages

    Bucur, S., Kinder, J. & Candea, G., 2014, Proc. Architectural Support for Programming Languages and Operating Systems (ASPLOS 2014). ACM, p. 239-254

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  111. Published

    Provably Secure Key Assignment Schemes from Factoring

    Freire, E. S. V. & Paterson, K. G., 2011, ACISP. Parampalli, U. & Hawkes, P. (eds.). Springer, Vol. 6812. p. 292-309 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  112. Published

    Provenance of Mesozoic sandstones in the Banda Arc, Indonesia

    Zimmermann, S. & Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-301 1-13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  113. Published

    Proving memory safety of floating-point computations by combining static and dynamic program analysis

    Godefroid, P. & Kinder, J., 2010, Proc. 19th Int. Symp. Software Testing and Analysis (ISSTA 2010). ACM, p. 1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  114. Published

    Proving Random Formulas in Propositional Logic

    Tzameret, I. & Muller, S., 2013, Logic Across the University: Foundations and Application: Proceedings of the Tsinghua Logic Conference. van Benthem, J. & Liu, F. (eds.). London: College Publications London, Vol. 47. p. 201-208 8 p. (Studies in Logic).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  115. Published

    Provisioning Software with Hardware-Software Binding

    Lee, R., Markantonakis, K. & Akram, R., 29 Aug 2017, FARES '17 Proceedings of the 12th International Workshop on Frontiers in Availability, Reliability and Security. ACM, p. 1-9 9 p. 49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  116. Published

    Proximity Assurances Based on Natural and Artificial Ambient Environments

    Gurulian, I., Markantonakis, K., Shepherd, C., Frank, E. & Akram, R., 2017, 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. Springer, p. 83-103 21 p. (Security and Cryptology; vol. 10543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  117. Published

    Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure

    Ronen, E., Paterson, K. G. & Shamir, A., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1397-1414 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  118. Published

    Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 May 2012, 5th International Conference on New Technologies, Mobility and Security (NTMS). Mana, A. & Klonowski, M. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  119. Published

    PSInSAR remote sensing observations of deformation behaviour at Salisbury Plain, UK

    Agar, S. A., Lawrence, J. A., Ghail, R. C., Mason, P. J. & Thompson, S., 16 Sep 2018, Engineering in Chalk - Proceedings of the Chalk 2018 Conference. Lawrence, J. A., Preene, M., Lawrence, U. L. & Buckley, R. (eds.). ICE Publishing, p. 269-274 6 p. (Engineering in Chalk - Proceedings of the Chalk 2018 Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  120. Published

    PsycoTrace: Virtual and Transparent Monitoring of a Process Self

    Baiardi, F., Maggiari, D., Sgandurra, D. & Tamberi, F., 1 Feb 2009, 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing. p. 393-397 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  121. Published

    PTaCL: A Language for Attribute-Based Access Control in Open Systems

    Crampton, J. & Morisset, C., 2012, POST 2012: Principles of Security and Trust - First International Conference. Degano, P. & Guttman, J. (eds.). Springer, p. 390-409 20 p. (Lecture Notes in Computer Science; vol. 7215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  122. Published

    Public sector ICT management strategy and its impact on e-government: A case study

    Stea, B. & Harindranath, G., 2006, Proceedings of the 2006 European Conference on Information Systems (ECIS), Gothenburg, Sweden. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  123. Published

    Pulsed-Disk-Laser welding of Ti6Al4V

    Mastrocinque, E., Corrado, G., Caiazzo, F., Pasquino, N. & Sergi, V., 2011, Ninth International Conference on Advanced Manufacturing Systems and Technology. p. 383-393

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  124. Published

    Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries

    Grubbs, P., Lacharité, M. S., Minaud, B. & Paterson, K. G., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 315-331 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  125. Published

    Pyg4ometry: A Tool to Create Geometries for Geant4, BDSIM, G4Beamline and FLUKA for Particle Loss and Energy Deposit Studies

    Boogert, S., Abramov, A., Albrecht, J., D'Alessandro, G. L., Nevay, L., Shields, W. & Walker, S., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 3244-3247 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  126. Published

    Qualified predictions for large data sets in the case of pattern recognition

    Papadopoulos, H., Vovk, V. & Gammerman, A., 2002, Proceedings of the International Conference on Machine Learning and Applications. Wani, M., Arabnia, H., Cios, K., Hafeez, K. & Kendall, G. (eds.). CSREA Press, p. 159-163 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  127. Published

    Qualified predictions for proteomics pattern diagnostics with confidence machines

    Luo, Z., Bellotti, T. & Gammerman, A., 2004, Lecture Notes in Computer Science . Vol. 3177. p. 46-51

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  128. Published

    Qualified probabilistic predictions using graphical models

    Luo, Z. & Gammerman, A., 2005, Lecture Notes in Artificial Intelligence. Vol. 3571. p. 111-122

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  129. Unpublished

    Quality management strategies and employee participation in Europe

    Rees, C., Jul 1994, (Unpublished) Industrial Relations in the European Community (IREC) Conference on 'Multinational Companies and the Future of Collective Bargaining'. Dublin.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  130. Published

    Quality of Life: Psychological dimensions of health

    Bradley, C., 1998, Royal Holloway Report. Royal Holloway, University of London, p. 17

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  131. Published

    Quantifying and qualifying trust: Spectral decomposition of trust networks

    Pavlovic, D., 2011, Proceedings of FAST 2010. Degano, P., Etalle, S. & Guttman, J. (eds.). Springer-Verlag, Vol. 6561. p. 1-17 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  132. Published

    Quantitative Concept Analysis

    Pavlovic, D., 2012, Formal Concept Analysis: 10th International Conference, ICFCA 2012, Leuven, Belgium, May 7-10, 2012: Proceedings. Domenach, F., Ignatov, D. I. & Poelmans, J. (eds.). Springer, p. 260-277 18 p. (Lecture Notes in Computer Science; vol. 7278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  133. E-pub ahead of print

    Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving

    Kirshanova, E., Mårtensson, E., Postlethwaite, E. & Roy Moulik, S., 25 Nov 2019, Advances in Cryptology -- ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Springer, p. 521-551 31 p. (Lecture Notes in Computer Science; vol. 11921).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  134. Published

    Quantum and classical structures in nondeterministic computation

    Pavlovic, D., 2009, Proceedings of Quantum Interaction 2009. Bruza, P., Sofge, D. & Rijsbergen, K. V. (eds.). Springer-Verlag, Vol. 5494. p. 143-158 16 p. (Lecture Notes in Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  135. Published

    Quantum computing with separable states?

    Schack, R., 2001, Macroscopic Quantum Coherence and Quantum Computing. Averin, D. V., Ruggiero, B. & Silvestrini, P. (eds.). New York: Kluwer, p. 285

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  136. Published

    Quantum crystals: from quantum plasticity to supersolidity

    Balibar, S., Haziot, A. & Rojas, X., 2011, QUANTUM SENSING AND NANOPHOTONIC DEVICES VIII. Razeghi, M., Sudharsanan, R. & Brown, GJ. (eds.). SPIE - INT SOC OPTICAL ENGINEERING, 7 p. (Proceedings of SPIE; vol. 7945).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  137. Published

    Quantum Theory and Global Optimisation

    Audenaert, K., 2004, Sixteenth International Symposium on Mathematical Theory of Networks and Systems (MTNS2004), Mini-Symposium on Quantum Information, Catholic University of Leuven, Belgium, 5-9 July 2004.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  138. Published

    Quaternary life on land

    Elias, S., 2002, Encyclopaedia of Life Sciences. London: Nature Publishing Group, Vol. 15. p. 739-742

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  139. Published

    R&D internationalisation of developing country firms: the case of China

    Rui, H., 2014, Proceedings of the 56th Annual Meeting of the Academy of International Business: Local contexts in Global Business. Meyer, K. & Kiyak, T. (eds.). 2014 Academy of International Business, p. 176 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  140. Published

    Random planar graphs with n nodes and a fixed number of edges

    Gerke, S., McDiarmid, C., Steger, A. & Weissl, A., 2005, PROCEEDINGS OF THE SIXTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS. PHILADELPHIA: SIAM, p. 999-1007 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  141. Published

    Randomized Rounding for Routing and Covering Problems: Experiments and Improvements

    Doerr, B., Künnemann, M. & Wahlström, M., 2010, Experimental Algorithms : 9th International Symposium, SEA 2010. Festa, P. (ed.). Naples, Italy: Springer, Vol. 6049. p. 190-201 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  142. Published

    Randomized Rounding in the Presence of a Cardinality Constraint

    Doerr, B. & Wahlström, M., 2009, 2009 Proceedings of the Eleventh Workshop on Algorithm Engineering and Experiments (ALENEX). Finocchi, I. & Hershberger, J. (eds.). New York, USA: SIAM, p. 162-174 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  143. Published

    RBAC administration in distributed systems

    Dekker, M., Crampton, J. & Etalle, S., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 93--102 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  144. Published

    RBSLA based implementation for architectural management laws

    Alghamdi, A., Fiadeiro, J. L. & Paschke, A., 1 Jan 2008, Innovations'07: 4th International Conference on Innovations in Information Technology, IIT. p. 556-560 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  145. E-pub ahead of print

    Reactive and Proactive Standardisation of TLS

    Paterson, K. & Merwe, T. V. D., 2 Nov 2016, Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings. Chen, L., McGrew, D. A. & Mitchell, C. (eds.). Springer Verlag, Vol. 10074. p. 160-186 27 p. (Lecture Notes in Computer Science; vol. 10074).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  146. Published

    Reactive/proactive connectivity management in a tactical service-oriented infrastructure

    Lopes, R. R. F., Nieminen, M., Viidanoja, A. & Wolthusen, S., 26 Jun 2017, Proceedings of the 2017 International Conference on Military Communications and Information Systems (ICMCIS 2017). IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  147. Published

    Reading order independent grouping proof for RFID tags

    Lien, Y., Leng, X., Mayes, K. & Chiu, J-H., 2008, ISI. p. 128-136 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  148. E-pub ahead of print

    Realizability in Cyclic Proof: Extracting Ordering Information for Infinite Descent

    Rowe, R. & Brotherston, J., 30 Aug 2017, TABLEAUX 2017: Automated Reasoning with Analytic Tableaux and Related Methods. Springer, p. 295-310 16 p. (Lecture Notes in Computer Science; vol. 10501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  149. Published

    Reasonable Doubts, Unspoken Fears: Reassessing the Trial Film's "Heroic Age"

    Langford, B., 2019, Trial Films on Trial: Law, Justice, and Popular Culture. Sarat, A., Silbey, J. & Umphrey, M. M. (eds.). University of Alabama Press, p. 81-110 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  150. Published

    Reasoning About Exceptions to Contracts

    Kafali, O., Toni, F. & Torroni, P., 2011, Computational Logic in Multi-Agent Systems (CLIMA XII). Vol. 6814. p. 225-242 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  151. Published

    Reasoning in time with uncertain information

    Ramparany, F., Lorquet, V., Bouyssounous, B., Bigham, J. & Luo, Z., 1994, IFAC/IFIP/IMACS Symposium on Artificial Intelligence in Real Time Control.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  152. Published

    Recent Developments in Beam Delivery Simulation - BDSIM

    Nevay, L., Abramov, A., Boogert, S., Garcia Morales, H., Gibson, S., Shields, W., Walker, S. & Snuverink, J., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. THPAK025

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  153. Published

    Recent research on Roman dams in the Near East

    Kamash, Z., 2006, Cura Aquarum in Ephesus: Proceedings of the 12th International Conference on the History of Water Management and Hydraulic Engineering, Ephesus, 2-10 October 2004. Leuven: Peeters Press, p. 233-238

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  154. Published

    Recent Results on Non-invasive Beam Size Measurement Methods Based on Polarization Currents

    Mazzoni, S. & Karataev, P., 29 Jan 2019, International Beam Instrumentation Conference (7th) IBIC2018. JACoW Publishing, p. 464-467 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  155. Forthcoming

    Reciprocity norms in online knowledge sharing: A conceptual analysis

    Wu, P. & Preece, J., 16 Mar 2016, (Accepted/In press) The 76th Annual Meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  156. Published

    Recognising lifestyle activities of diabetic patients with a smartphone

    Lustrek, M., Kvetkovic, B., Mirchevska, V., Kafali, R., Romero Lopez, A. & Stathis, K., 3 Aug 2015, Pervasive Health 2015 : Workshop on Personal Health Systems for Chronic Diseases (PHSCD 2015). p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  157. Published

    Recognition of hypoxia with a preset confidence level based on EEG analysis

    Zhang, J., Li, G., Meng, H., Li, J. & Luo, Z., Jun 2008, IEEE International Joint Conference on Neural Networks, 2008. p. 3005-3008

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  158. Published

    RECON: a Robust multi-agent Environment for simulating COncurrent Negotiations

    Alrayes, B., Kafali, O. & Stathis, K., 2014, In Seventh International Workshop on Agent-based Complex Automated Negotiations (ACAN), AAMAS: best student paper award.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  159. Forthcoming

    Reconceptualizing the politics of corporate responsibility: Uncovering and addressing neo-colonial tendencies

    Kim, J., Feb 2020, (Accepted/In press) EGOS.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  160. Published

    Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast

    Chockler, G., Demirbas, M., Gilbert, S., Lynch, N. A., Newport, C. C. & Nolte, T., 2005, Proceedings of the 4th International Workshop on Assurance in Distributed Systems and Networks (ADSN '05): ICDCS Workshops. p. 42-48 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  161. Published

    Reconfigurable Distributed Storage for Dynamic Networks

    Chockler, G., Gilbert, S., Gramoli, V., Musial, P. & Shvartsman, A., 2005, Proceedings of the 9th International Conference on Principles of Distributed Systems (OPODIS '05). Springer-Verlag, p. 351-365 15 p. (Lecture Notes in Computer Science; vol. 3974).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  162. Published

    Reconfigurable state machine replication from non-reconfigurable building blocks

    Bortnikov, V., Chockler, G., Roytman, A., Shachor, S., Shnayderman, I. & Perelman, D., 2012, Proceedings of the 31st Annual ACM Symposium on Principles of Distributed Computing. ACM, p. 93-94 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  163. Published

    Reconstructing the temple of Apollo on the Palatine hill in Rome

    Claridge, A., Nov 2014, Reconstruction and the Historic City: Rome and Abroad - an interdisciplinary approach. Haeuber, C., Winder, G. M. & Schuetz, F-X. (eds.). (Beitraege Wirtschaftsgeographie Muenchen ; vol. 6).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  164. Published

    Reconstruction of fundamental SUSY parameters

    Zerwas, P. M., Blair, G. A., Choi, S. Y., Freitas, A., Kalinowski, J., Marlyn, H. U., Moortgat-Pick, G. & Porod, W., 2002, ICHEP 2002, PROCEEDINGS. AMSTERDAM: Elsevier Science Publishers B.V. (North-Holland), 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  165. Published

    Reconstruction of Structural Controllability over Erdös-Rényi Graphs via Power Dominating Sets

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR '14). ACM Press, p. 57 60 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  166. Published

    Recovering from Lost Digital Wallet

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 4th IEEE International Symposium on Trust, Security, and Privacy for Emerging Applications (TSP-13). Y. Xiang, F. G. M. & Ruj, S. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  167. Published

    Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths

    Walter, C. D., 2008, CHES 2008. Oswald, E. & Rohatgi, P. (eds.). Springer, Vol. 5154. p. 214-227 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  168. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs in the Presence of Compromised Nodes

    Alwasel, B. & Wolthusen, S., 18 May 2016, Proceedings of the 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015). Springer-Verlag, Vol. 9578. p. 105-119 15 p. (Lecture Notes in Computer Science; vol. 9578).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  169. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs via Partial Control Structure Re-Use

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th International Conference on Critical Information Infrastructures Security (CRITIS 2014). Springer-Verlag, p. 293-307

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  170. Published

    Recovery of Structural Controllability for Process Control Systems

    Alcaraz, C. & Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47 63 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  171. E-pub ahead of print

    Recurrent Auto-Encoder Model for Large-Scale Industrial Sensor Signal Analysis

    Wong, T. & Luo, Z., 27 Jul 2018, International Conference on Engineering Applications of Neural Networks: EANN 2018. Pimenidis, E. & Jayne, C. (eds.). Springer, p. 203-216 14 p. (Communications in Computer and Information Science; vol. 893).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  172. Published

    Reducing Normative Conflicts in Information Security

    Pieters, W. & Coles-Kemp, L., 2011, NSPW '11: Proceedings of the 2011 New security paradigms workshop, 12-15 Sep 2011, Marin County, CA. . ACM, p. 11-24 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  173. Published

    Reducing the Space Requirements of Instant Replay

    Levrouw, L. J. & Audenaert, K., 1993, Proc. of the ACM/ONR Workshop on Parallel and Distributed Debugging. San Diego: ACM, p. 205-207

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  174. Published

    Re-Evaluating SMEs IT Readiness in the Age of the Cloud

    Dyerson, R. & Spinelli, R., Sep 2017, 2017 Proceedings of the European Conference on Information Management and Evaluation, Genoa.. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  175. Forthcoming

    Refining Process Descriptions from Execution Data in Hybrid Planning Domain Models

    Linday, A., Franco Aixela, S., Reya, R. & McCluskey, L., 20 Jan 2020, (Accepted/In press) Proceedings International Conference on Automated Planning and Scheduling, ICAPS. AAAI Press, Vol. 2020.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  176. Published

    Regional consecutive leader election in mobile ad-hoc networks

    Chung, H. C., Robinson, P. & Welch, J. L., 2010, Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cambridge, Massachusetts, USA, September 16, 2010. p. 81-90 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  177. Published

    Regular Strategies in Pushdown Reachability Games

    Hague, M. & Carayol, A., 2014, 8th International Workshop on Reachability Problems 2014. 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  178. Published

    Re-imagining the disruptive innovation theory in the digital platforms era

    Elbanna, A., Jun 2017, IFIP 8.6 Working Conference 2017: Re-Imagining Diffusion of Information Technology. Guimarães, Portugal

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  179. Published

    Related Randomness Attacks for Public Key Encryption

    Paterson, K. G., Schuldt, J. C. N. & Sibborn, D. L., 2014, PKC 2014. Krawczyk, H. (ed.). Springer, Vol. 8383. p. 465-482 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  180. Published

    Related-Key Impossible-Differential Attack on Reduced-Round Skinny

    Ankele, R., Banik, S., Chakraborti, A., List, E., Mendel, F., Sim, S. M. & Wang, G., 2017, Applied Cryptography and Network Security. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Kanazawa, Japan: Springer International Publishing, Vol. 10355. p. 208-228 21 p. (Lecture Notes in Computer Science; vol. 10355, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  181. Published

    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

    Abdalla, M., Benhamouda, F., Passelègue, A. & Paterson, K. G., 2014, Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, Vol. 8616. p. 77-94 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  182. Published

    Relations are more than Bytes: Re-thinking the Benefits of Smart Services with People and Things

    Heath, C. P., Crivellaro, C. & Coles-Kemp, L., 2 May 2019, CHI Conference on Human Factors in Computing Systems Proceedings: CHI 2019. ACM, p. 1-12 12 p. 308

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  183. Unpublished

    Relationship between illiquidity and monetary conditions within the United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Corporate Finance Decisions in a Changing Global Environment, International Finance and Banking Society (IFABS) Asia 2016 Brunei Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  184. Published

    Relationship-based Access Control for an Open-source Medical Records System

    Rizvi, S. Z. R., Fong, P. W. L., Crampton, J. & Sellwood, J., 1 Jun 2015, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. ACM, Vol. 2015-June. p. 113-124 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  185. Published

    Reliable Classification of Acute Leukaemia from Gene Expression Data using Confidence Machines

    Bellotti, T., Luo, Z. & Gammerman, A., 2006, IEEE International Conference on Granular Computing. IEEE, p. 148-153

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  186. Published

    Reliable complex event detection for pervasive computing

    O'Keeffe, D. & Bacon, J., 2010, Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, DEBS 2010, Cambridge, United Kingdom, July 12-15, 2010. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  187. Published

    Reliable probabilistic classification and its application to Internet traffic

    Dashevskiy, M. & Luo, Z., 2008, Lecture Notes in Computer Science. Vol. 5226. p. 380-388

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  188. Published

    Reliable Probability Estimates Based on Support Vector Machines for Large Multiclass Datasets

    Lambrou, A., Papadopoulos, H., Nouretdinov, I. & Gammerman, A., Sep 2012, Artificial Intelligence Applications and Innovations - AIAI 2012 International Workshops: AIAB, AIeIA, CISE, COPA, IIVC, ISQL, MHDW, and WADTMB, Proceedings.. Halkidiki, Greece, Vol. II. p. 182-191 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  189. Published

    Relieved at last: cataloguing with LibraryThing

    Kanyundo, A. & Kapondera, S. K., 2016, Standing Conference of the Eastern, Central and Southern Africa Librarians and Institutions . p. 73-79 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  190. Published

    Remote Attestation Mechanism based on Physical Unclonable Functions

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia). J. Zhou, C. M. & Weng, J. (eds.). Guangzhou, China: IOS Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  191. Published

    Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, 5th International Conference on Information and Communications Security (ICICS 2013). Qing, S. & Zhou, J. (eds.). Beijing, China: Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  192. E-pub ahead of print

    Remote Credential Management with Mutual Attestation for Trusted Execution Environments

    Shepherd, C., Akram, R. N. & Markantonakis, K., 12 May 2019, 12th IFIP International Conference on Information Security Theory and Practice (WISTP '18). Springer, p. 157-173 17 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  193. Published

    Remote user authentication using public information

    Mitchell, C. J., 2003, Cryptography and Coding, 9th IMA International Conference on Cryptography and Coding, Cirencester, UK, December 2003, Proceedings. Paterson, K. (ed.). Springer-Verlag, p. 360-369 10 p. (Lecture Notes in Computer Science; vol. 2898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  194. Published

    Renewing cryptographic timestamps

    Al-Riyami, S. S. & Mitchell, C. J., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, p. 9-16 8 p. (IFIP Conference Proceedings; vol. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  195. Forthcoming

    Rent generation mechanism of first-order and second-order capabilities: integrating resource based view and dynamic capabilities view framework

    Qaiyum, S. & Wang, C. L., 22 Oct 2015, (Accepted/In press) The 38th Annual Institute for Small Business and Entrepreneurship Conference, Glasgow, 11-12 November. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  196. Published

    Replay Attack in TCG Specification and Solution

    Bruschi, D., Cavallaro, L., Lanzi, A. A. & Monga, M., 2005, 21th Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, Arizona, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  197. Published

    Replaying Programs Allowing Interrupts on a Multiprocessor

    Audenaert, K. & Levrouw, L. J., 1993, Int'l Workshop on Systems Engineering for Real Time Applications, SERTA '93. Cirencester: IEE Press, p. 107-112

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  198. Published

    Representative sets and irrelevant vertices: New tools for kernelization

    Kratsch, S. & Wahlström, M., 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science (FOCS). IEEE, p. 450-459 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  199. Published

    Reprint of Algorithmic information and simplicity in statistical physics (1997)

    Schack, R., 2002, Maxwell's Demon 2: Entropy, Classical and Quantum Information, Computing. Leff, H. S. & Rex, A. F. (eds.). London: Institute of Physics Publishing, p. 246

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  200. Unpublished

    Reprogramming landscapes of play: navigation and narrative in Geocaching

    Lowe, J., 31 Aug 2018, (Unpublished) Landscapes of Digital Games session at RGS-IBG 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  201. Published

    Reputation methods for routing security for mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 130-137 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  202. Published

    Reputation Schemes for Pervasive Social Networks with Anonymity

    Garms, L., Martin, K. & Ng, S-L., 1 Oct 2017, Proceedings of the fifteenth International Conference on Privacy, Security and Trust (PST 2017). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  203. Published

    Research Populations in International Context

    Aboutalebi, R. & Tan, H., 27 Nov 2013, In: EAMSA (Euro-Asia Management Studies Association), 30th Annual Conference of EAMSA: Innovation in Asia and Europe Approaches and Answers to new Challenges. Institute of East Asian Studies (IN-EAST); 27-30 November 2013, University of Duisburg-Essen, Duisburg, Germany.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  204. Published

    Researching the practical ethics of discretion

    Evans, A., 27 Aug 2015, 2015 EGPA Annual Conference: Permanent Study Group XIII: Public Policy.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  205. Published

    Resolving performance conflicts in new wind turbine blade designs

    Peesapati, V., Cotton, I., Rashid, L. S., Brown, A., Jamshidi, P. & Hogg, P. J., 1 Dec 2009, European Wind Energy Conference and Exhibition 2009, EWEC 2009. Vol. 1. p. 260-287 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  206. Published

    Resource-constrained signal propagation modeling for tactical mobile ad hoc networks

    Reidt, S., Ebinger, P., Wolthusen, S. D. & Kuijper, A., 22 Jun 2011, Proceedings of the 2011 IEEE First International Workshop on Network Science (NSW 2011). IEEE Computer Society Press, p. 67-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  207. Published

    Response of Acropora to warm climates; lessons from the geological past

    White, C., Bosence, D. & Wallace, C. C., Jul 2008, Proceedings of the 11th International Coral Reef Symposium, Ft. Lauderdale, Florida, 7-11 July 2008 Session number 1 . Riegl, B. & Dodge, R. E. (eds.). Davie, Florida: Nova Southeastern University National Coral Reef Institute, p. 7-12 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  208. Published

    Response of Chrysomelidae to Quaternary environmental changes.

    Elias, S. & Kuzmina, S., 2008, Research on Chrysomelidae. Jolivet, P., Santiago-Blay, J. & Schmitt, M. (eds.). Brill, Vol. 1. p. 167-186

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  209. Published

    RESPONSE OF THE HOMOGENEOUSLY PRECESSING DOMAIN TO LONGITUDINAL PUMPING

    BUNKOV, Y. M., DMITRIEV, V. V., FEHER, A., GAZO, E., KUPKA, M., NYEKI, J. & SKYBA, P., 1992, PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MACROSCOPIC QUANTUM PHENOMENA. Benacka, S. & Kedro, M. (eds.). BRATISLAVA: SLOVAK ACAD SCIENCES INST ELECTRICAL ENGINEERING, p. 49-53 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  210. Published

    Responsibility in paradise? CSR tools of companies domiciled in tax havens

    Preuss, L., Sep 2009, 8th annual colloquium of the Academy of Business in Society (ABIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  211. Published

    Results From the Laserwire Emittance Scanner and Profile Monitor at CERN's Linac4

    Hofmann, T., Boorman, G., Bosco, A., Gibson, S., Raich, U. & Roncarolo, F., May 2017, 28th Linear Accelerator Conference: 25-30 September 2016, East Lansing, MI, USA.. JACoW Publishing, p. 715-719 5 p. TH2A02

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  212. Published

    Rethinking Musical Space

    Johnson, J., 2015, Lithuanian Musicology. Vol. 16. p. 8-15 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  213. Published

    Re-thinking the Management of Technological Innovations, Product Complexity and Modularity: The Effects of Low-Probability, High-Impact Events on Automotive Supply Chains

    Coronado Mondragon, A. E. & Coronado Mondragon, C. E., 16 Jul 2012, Driving the Economy through Innovation and Entrepeneurship: Emerging Agenda for Technology Management. Balachandra, P. (ed.). 1 ed. Bangalore: Springer, Vol. 1. p. 567-577 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  214. Published

    Rethinking the Smart Card Technology, Invited Paper

    Akram, R. N. & Markantonakis, K., 1 Jun 2014, 16th International Conference on Human-Computer Interaction. Tryfonas, T. & Askoxylakis, I. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  215. Published

    Retrofitting Mutual Authentication to GSM Using RAND Hijacking

    Khan, M. & Mitchell, C. J., 17 Sep 2016, Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Barthe, G., Markatos, E. & Samarati, P. (eds.). Springer-Verlag, p. 17-31 15 p. (Lecture Notes in Computer Science; vol. 9871).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  216. Published

    Reverse Conformal Approach for On-line Experimental Design

    Nouretdinov, I., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). Vol. 60. p. 185-192 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  217. Published

    Reverse engineering concurrent programs using formal modelling and analysis

    Younger, E., Luo, Z., Bennett, K. & Bull, T., 1996, Proc of IEEE Inter. Conf. on Software Maintenance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  218. Published

    Review of work experience in a Bachelor of Information Technology

    Pauling, J. W. & Komisarczuk, P., 2007, Proceedings of the ninth Australasian conference on Computing education-Volume 66. p. 125-132 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  219. Published

    Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme

    Chen, LI., Laing, T. & Martin, K., 2017, Progress in Cryptology - AFRICACRYPT 2017: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. Springer, p. 40-57 18 p. (Lecture Notes in Computer Science; vol. 10239).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  220. Published

    Revisiting the Changing nature of Professional Identity in the Digital Era; the case of curators

    Godfrey, K., Foley, S. & Panteli, N., 2017, Proceedings of the British Academy of Management Conference, BAM2017: Track: identity. University of Warwick, September 5-7, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  221. Published

    Revisiting the Expected Cost of Solving uSVP and Applications to LWE

    Albrecht, M., Göpfert, F., Virdia, F. & Wunderer, T., 2017, Advances in Cryptology - ASIACRYPT 2017. p. 297-322 26 p. (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  222. Published

    Revisiting the Institutional Approach to Herbrand's Theorem

    Tutu, I. & Fiadeiro, J. L., 21 Oct 2015, Revisiting the Institutional Approach to Herbrand's Theorem. p. 304-319 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  223. Published

    Revisiting the role of ICT in development

    Harindranath, G. & Sein, M. K., 2007, Proceedings of the IFIP TC 9/WG 9.4 International Conference on Social Implications of Computers in Developing Countries. Sao Paulo: IFIP WG9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  224. Published

    Revocation in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 2014, Proceedings of the 10th International Conference on Information Security and Cryptology - Inscrypt 2014. Springer, Vol. 8957. p. 51-71 (Lecture Notes in Computer Science - LNCS; vol. 8957)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  225. Published

    Reward Learning for Efficient Reinforcement Learning in Extractive Document Summarisation

    Gao, Y., Meyer, C. M., Mesgar, M. & Gurevych, I., Aug 2019, Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence (IJCAI-19). International Joint Conferences on Artificial Intelligence, p. 2350-2356 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  226. Published

    RFID authentication protocol for low-cost tags

    Song, B. & Mitchell, C. J., 2008, Proceedings of the First ACM Conference on Wireless Network Security, WiSec 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM Press, p. 140-147 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  227. Published

    Rhythmic Routes: Developing a nomadic physical practice for the daily commute

    Overend, D. & Bissell, L., 2014, Scottish Journal of Performance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  228. Published

    Ridge Regression Confidence Machine

    Nouretdinov, I., Melluish, T. & Vovk, V., 2001, Proceedings of the Eighteenth International Conference on Machine Learning. p. 385-392

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Published

    Ridge Regression learning algorithm in dual variables

    Saunders, C., Gammerman, A. & Vovk, V., 1998, Proceedings of the Fifteenth International Conference on Machine Learning. San Francisco, CA: Morgan Kaufmann, p. 515-521 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  230. Published

    Risk Tolerance And Risk Management In Everyday Life Of SMEs

    Kouraklis, I. J., 2005, Proceedings of Small And Medium Enterprises In European Economies, International Conference, Babes-Bolyai University, Cluj-Napoca, Romania.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  231. Published

    Risk-Aware Role-Based Access Control

    Chen, L. & Crampton, J., 2011, Proceedings of the 7th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  232. Published

    RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures

    Bellare, M., Paterson, K. & Thomson, S., 2012, ASIACRYPT. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658. p. 331-348 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  233. Published

    Robust and efficient communication overlays for trust authority computations

    Reidt, S., Balfe, S. & Wolthusen, S. D., 30 Mar 2009, Proceedings of the 2009 Sarnoff Symposium. IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  234. Published

    Robust Coordination of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 2013 Third International Conference on Cloud and Green Computing (CGC). IEEE Computer Society Press, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  235. Published

    Robust Encryption, Revisited

    Farshim, P., Libert, B., Paterson, K. G. & Quaglia, E. A., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 352-368 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  236. Published

    Robust Leader Election in a Fast-Changing World

    Augustine, J., Kulkarni, T., Nakhe, P. & Robinson, P., 2013, Proceedings Ninth International Workshop on Foundations of Mobile Computing, FOMC 2013, Jerusalem, Israel, October 17-18, 2013.. p. 38-49 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  237. Published

    Robustness Against Unknown Noise for Raw Data Fusing Neural Networks

    Bijelic, M., Muench, C., Ritter, W., Kalnishkan, Y. & Dietmayer, K., Dec 2018, 21st IEEE International Conference on Intelligent Transportation Systems (IEEE ITSC 2018). IEEE Xplore, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  238. Published

    'Roellig in charge': a reassessment of the cantata repertoire in Zerbst between 1749 and 1765

    Springthorpe, N., 2017, Fasch-Studien 14: 'Fasch und die Konfessionen': Bericht über die Internationale Wissenschaftliche Konferenz vom 21. bis 22. April 2017 im Rahmen der 14. Internationalen Fasch-Festtage in Zerbst. Beeskow: Ortus Musikverlag, p. 225-252 27 p. (Fasch-Studien; vol. XIV).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. Published

    Role signatures for access control in open distributed systems

    Crampton, J. & Lim, H. W., 2008, Proceedings of IFIP TC-11 23rd International Information Security Conference. Springer, p. 205-220 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  240. Published

    ROTOR: A Tool for Renaming Values in OCaml's Module System

    Rowe, R., Férée, H., Thompson, S. & Owens, S., 28 May 2019, IWOR '19 Proceedings of the 3rd International Workshop on Refactoring. IEEE Press, p. 27-30 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  241. Published

    Rule Value Reinforcement Learning for Cognitive Agents

    Child, C. & Stathis, K., 1 May 2006, Proc. of 5th International Conference on Autonomous Agents an d Multi-agent Systems (AAMAS06). p. 792-794 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  242. Published

    Saadiyat and sovereign wealth in the United Arab Emirates: the making of a premier island destination

    Chong, D., 2016, The Art Marketing in Global Perspective (Amsterdam: University of Amsterdam).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  243. Published

    Safe Specification of Operator Precedence Rules

    Afroozeh, A., van den Brand, M., Johnstone, A., Scott, E. & Vinju, J., 2013, Software Language Engineering Lecture Notes in Computer Science . Vol. 8225. p. 137-156 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  244. Published

    Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation

    Galbraith, S., Massimo, J. & Paterson, K., 6 Apr 2019, 22nd IACR Conference on Practice and Theory in Public Key Cryptography 2019. Springer, p. 379-407 29 p. (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  245. In preparation

    Saladin and Gift-Giving

    Phillips, J., 2019, (In preparation) The History of Syria, 1099-1250: Conflict and Co-existence. Hillenbrand, C. (ed.). Edinburgh University Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  246. Published

    Salem numbers and Pisot numbers from stars

    McKee, J., Smyth, C. J. & Rowlinson, P., 1999, Number Theory in Progress: Number ThProceedings of the International Conference on Number Theory in Honor of Andrzej Schinzel, held in Zakopane, Poland, June 30 – July 9, 1997. Part I: Diophantine Problems and Polynomials. de Gruyter, p. 309-319

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  247. Published

    Salience and Asset Prices

    Bordalo, P., Gennaioli, N. & Shleifer, A., May 2013, American Economic Review, Papers & Proceedings. Vol. 103(3). p. 623-628

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  248. Published

    Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography

    Aguilar-Melchor, C., Albrecht, M. & Ricosset, T., 2017, Applied Cryptography and Network Security: ACNS 2017. Springer, Vol. 10355. p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  249. Published

    Sandnet: Network Traffic Analysis of Malicious Software

    Rossow, C., Dietrich, C. J., Bos, H., Cavallaro, L., Steen, M. V., Freiling, F. C. & Pohlmann, N., 1 Apr 2011, 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  250. Published

    Satellite connections for multimedia communications

    Sun, Z., Hadjitheodosiou, MH., Komisarczuk, P. & Coakley, FP., 1994, Multimedia Communication Systems, IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  251. Published

    Saturation algorithms for model-checking pushdown systems

    Hague, M. & Carayol, A., May 2014, Proceedings of the 14th International Conference on Automata and Formal Languages . 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  252. Published

    Saturation of Concurrent Collapsible Pushdown Systems

    Hague, M., 12 Dec 2013, FSTTCS: Foundations of Software Technology and Theoretical Computer Science. 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  253. Published

    Scalable communication middleware for permissioned distributed ledgers

    Barger, A., Manevich, Y., Mandler, B., Bortnikov, V., Laventman, G. & Chockler, G., 22 May 2017, SYSTOR '17: Proceedings of the 10th ACM International Systems and Storage Conference. New York: ACM, p. 1 1 p. 23

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  254. Published

    Scalable Group Membership Services for Novel Applications

    Anker, T., Chockler, G., Dolev, D. & Keidar, I., 1998, Proceedings of the DIMACS Workshop on Networks in Distributed Computing. Merritt, M. & Shavit, N. (eds.). American Mathematical Society, p. 23-42 20 p. (DIMACS Series in Discrete Mathematics and Theoretical Computer Science; vol. 45).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  255. Published

    Scalable RFID pseudonym protocol

    Song, B. & Mitchell, C. J., 2009, NSS 2009, Network & System Security, 19-21 October 2009, Gold Coast, Queensland, Australia. IEEE Computer Society Press, p. 216-224

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  256. Published

    Science as a vocation? Hybrid academics in overlapping institutional and career spaces

    Lam, A., Jun 2019, National Science Foundation (NSF) Workshop: 'Science as a Vocation: A Centennial Perspective', Boston.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  257. Published

    SCONE: Secure Linux Containers with Intel SGX

    Arnautov, S., Trach, B., Gregor, F., Knauth, T., Martin, A., Priebe, C., Lind, J., Muthukumaran, D., O'Keeffe, D., Stillwell, M., Goltzsche, D., Eyers, D. M., Kapitza, R., Pietzuch, P. R. & Fetzer, C., Nov 2016, 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016, Savannah, GA, USA, November 2-4, 2016.. p. 689-703 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  258. Published

    Scriptcloud.com: Content Clouds for Screenplays

    McKie, S., 2 Jan 2008, Semantic Media Adaptation and Personalization, Second International Workshop .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  259. E-pub ahead of print

    SDN-Actors: Modeling and Verification of SDN Programs

    Albert, E., Gómez-Zamalloa, M., Rubio, A., Sammartino, M. & Silva, A., 12 Jul 2018, Formal Methods - 22nd International Symposium, FM 2018, Held as Part of the Federated Logic Conference, FloC 2018, Proceedings. Havelund, K., Peleska, J., Roscoe, B. & de Vink, E. (eds.). Springer-Verlag, p. 550-567 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10951 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  260. Published

    Searches for gravitational effects at the TeV scale with the ATLAS detector

    Berry, T., 18 Mar 2014, Proceedings of the European Physical Society Conference on High Energy Physics. Proceedings of Science, p. 1-6 6 p. PoS(EPS-HEP 2013)261

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  261. Published

    Secret sharing with reusable polynomials

    Chen, LI., Gollmann, D., Mitchell, C. J. & Wild, P., 1997, Information Security and Privacy - Proceedings 2nd Australasian Conference, ACISP '97, Sydney, Australia, July 1997. Varadharajan, V., Pieprzyk, J. & Mu, Y. (eds.). Springer-Verlag, p. 183-193 11 p. (Lecture Notes in Computer Science; no. 1270).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  262. E-pub ahead of print

    Secure and Trusted Application Execution on Embedded Devices

    Markantonakis, K., Akram, R. & Msgna, M., 15 Jan 2016, 8th International Conference on Security for Information Technology and Communications – SECITC’15 . Naccache, D. & Simion, E. (eds.). Springer, Vol. 9522. p. 3-24 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  263. Published

    Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems

    Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R., Markantonakis, K., Akram, R., Sauveron, D. & Conchon, E., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). . Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 168-177 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  264. E-pub ahead of print

    Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements

    Akram, R., Bonnefoi, P-F., Chaumette, S., Markantonakis, K. & Sauveron, D., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 606-614 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  265. Published

    Secure Deployment of Applications to Fielded Devices and Smart Cards

    Sirett, W. G., Macdonald, J. A., Mayes, K. & Markantonakis, K., 2006, Security in Information Systems. p. 195-206 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. Published

    Secure implementations for typed session abstractions

    Corin, R., Denielou, P-M., Fournet, C., Bhargavan, K. & Leifer, J., 2007, 20th IEEE Computer Security Foundations Symposium (CSFS20), Proceedings. LOS ALAMITOS: IEEE COMPUTER SOC, p. 170-186 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  267. Published

    Secure Improved Cloud-Based RFID Authentication Protocol

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 10 Sep 2014, The 9th DPM International Workshop on Data Privacy Management (DPM 2014). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  268. Published

    Secure Log File Download Mechanisms for Smart Cards

    Markantonakis, K., 2000, Proceedings of the The International Conference on Smart Card Research and Applications. London, UK: Springer-Verlag, p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  269. Published

    Secure Log File Download Mechanisms for Smart Cards.

    Markantonakis, K., 1998, CARDIS'98. p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  270. Published

    Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 26 Sep 2014, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  271. Published

    Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs

    Zang, Y., Thomas, J. P., Ghinea, G., Thomas, M. & Darwish, S., 6 Sep 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 777-784 8 p. 6296048

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  272. Published

    Securing a Community Cloud

    Baiardi, F. & Sgandurra, D., 1 Jun 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops. p. 32-41 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  273. Published

    Securing access to mobile networks beyond 3G

    Gehrmann, C., Horn, G., Jefferies, N. & Mitchell, C. J., 2001, Proceedings of the IST Mobile Communications Summit 2001, Barcelona, Spain, September 2001. p. 844-849 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  274. Published

    Securing FIPA agent communication

    Borselius, N. & Mitchell, C. J., 2003, Proceedings of the 2003 International Conference on Security and Management (SAM '03), Las Vegas, Nevada, USA, June 2003. Arabnia, H. R. & Mun, Y. (eds.). CSREA Press, Vol. 1. p. 135-141 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  275. Published

    Securing Personal Area Networks

    Garefalakis, T. & Mitchell, C. J., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, Vol. 3. p. 1257-1259 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  276. Published

    Securing Reconfigurable Terminals - mechanisms and protocols

    Gultchev, S., Mitchell, C. J., Moessner, K. & Tafazolli, R., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, p. 804-808 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  277. Published

    Security Against Related Randomness Attacks via Reconstructive Extractors

    Paterson, K., Sibborn, D., Schuldt, J. & Wee, H., 8 Dec 2015, Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer Verlag, Vol. 9496. p. 23-40 18 p. (Lecture Notes in Computer Science; vol. 9496).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  278. Published

    Security analysis of smartcard to card reader communications for biometric cardholder authentication

    Rila, L. & Mitchell, C. J., 2002, Proceedings of CARDIS '02, 5th Smart Card Research and Advanced Application Conference, San Jose, California, November 2002. USENIX, p. 19-28 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  279. Published

    Security and Integrity of a Distributed File Storage in a Virtual Environment

    Sala, G., Sgandurra, D. & Baiardi, F., 1 Sep 2007, Fourth International IEEE Security in Storage Workshop. p. 58-69 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  280. Published

    Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism

    Al-Salloum, Z. & Wolthusen, S. D., 15 Feb 2010, ARES '10 International Conference on Availability, Reliability, and Security. IEEE Computer Society Press, p. 549-554

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  281. E-pub ahead of print

    Security and performance comparison of different secure channel protocols for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  282. Published

    Security in future mobile networks

    Mitchell, C. J., 1995, Proceedings of the Second International Workshop on Mobile Multi-Media Communications (MoMuC-2), Bristol, April 1995.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  283. Published

    Security Infrastructure for Service Oriented Architectures at the Tactical Edge

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2017). Springer-Verlag, p. 310-322 13 p. (Advances in Intelligent Systems and Computing; vol. 611).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  284. Published

    Security Issues in OAuth 2.0 SSO Implementations

    Li, W. & Mitchell, C. J., 2014, Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Chow, S., Camenisch, J., Hui, L. & Yiu, S-M. (eds.). Springer-Verlag, p. 529-541 13 p. (Lecture Notes in Computer Science; vol. 8783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  285. Published

    Security of Symmetric Encryption against Mass Surveillance

    Bellare, M., Paterson, K. G. & Rogaway, P., 2014, Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, Vol. 8616. p. 1-19 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  286. Published

    Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation

    Boldyreva, A., Degabriele, J. P., Paterson, K. G. & Stam, M., 2012, EUROCRYPT. Pointcheval, D. & Johansson, T. (eds.). Springer, Vol. 7237. p. 682-699 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  287. Published

    Security properties of two authenticated conference key agreement protocols

    Tang, Q. & Mitchell, C. J., 2005, Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings. Qing, S., Mao, W., Lopez, J. & Wang, G. (eds.). Springer-Verlag, Vol. 3783. p. 304-314 11 p. (Lecture Notes in Computer Science; vol. 3783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  288. Published

    Security protocols for biometrics-based cardholder authentication in smartcards

    Rila, L. & Mitchell, C. J., 2003, Applied Cryptography and Network Security - First International Conference, ACNS 2003 - Kunming, China, October 16-19 2003 - Proceedings. Zhou, J., Yung, M. & Han, Y. (eds.). Springer-Verlag, p. 254-264 11 p. (Lecture Notes in Computer Science; vol. 2846).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  289. Published

    Security Requirements for the Deployment of Services Across Tactical SOA

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 2017 International Conference on Mathematical Methods, Models,and Architectures for Computer Network Security (MMM-ACNS 2017). Springer-Verlag, Vol. 10446. p. 115-127 13 p. (Lecture Notes in Computer Science; vol. 10446).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  290. Published

    Security Server-Based Architecture for Mobile Ad Hoc Networks

    Darwish, S., Taylor, S. J. E. & Ghinea, G., 6 Sep 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 926-930 5 p. 6296071

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  291. Published

    Security techniques

    Mitchell, C. J., 1995, Proceedings of the IEE Electronics Division Colloquium on Security in Networks, London, February 1995. IEE Press, p. 2/1-2/6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  292. Published

    Security V&V Within Software SMEs: A Socio-Technical Interaction Network Analysis

    Kreeger, M. N. & Harindranath, G., 22 Jun 2017, Proceedings of the 2017 International Conference on Information Resources Management (Conf-IRM 2017). Janczewski, L., Cunha, M. A. & Sánchez, A. (eds.). Santiago, Chile: Conf-IRM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  293. Published

    Security Verification and Validation by Software SMEs: Theory versus Practice

    Kreeger, M. N. & Harindranath, G., 2012, Proceedings of the 2012 International Conference on Information Resources Management (Conf-IRM 2012). Brandtweiner, R. & Janczewski, L. (eds.). Vienna, Austria: Conf-IRM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  294. Published

    Security vulnerabilities in ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of ISCTA '03, 7th International Symposium on Communications Theory and Applications, Ambleside, UK, July 2003. p. 99-104 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  295. Published

    Security vulnerabilities in DNS and DNSSEC

    Ariyapperuma, S. & Mitchell, C. J., 2007, Proceedings of ARES 2007, The International Conference on Availability, Reliability and Security, Vienna, April 2007. IEEE Computer Society Press, p. 335-342 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  296. Published

    Sedimentation in structurally-confined narrow basins: toward the identification of uncommon depositional system

    Longhitano, S. G., Casciano, C., Chiarella, D., Sabato, L. & Tropeano, M., 2016, AAPG Annual Convention & Exhibition 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  297. Published

    Sedimentation in tectonically-confined narrow basins: do classical depositional models still work?

    Longhitano, S. G. & Chiarella, D., 2016, Advances in siliciclastic and carbonate sedimentology:concepts and case studies from the Norwegian Continental Shelf. p. 9-10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  298. Published

    Sedimentology of a mixed (bioclastic/siliciclastic) Pliocene succession near Acerenza (Southern Apennines, Basilicata, Italy

    Chiarella, D., Longhitano, S. G., Sabato, L. & Tropeano, M., 2008, 26th IAS 2009 – Books of Abstract. p. 78

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  299. Published

    Sediments segregation rate as tool for discriminating depositional environments in ancient mixed (silici-/bioclastic) shallow-water marine system (Pliocene, Southern Apennines, Italy)

    Chiarella, D. & Longhitano, S. G., 2009, 27th IAS 2009 – Books of Abstract. p. 469

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  300. Published

    Seeing the full picture: The case for extending security ceremony analysis

    Bella, G. & Coles-Kemp, L., 2011, Proceedings of 9th Australian Information Security Management Conference. p. 49-55 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  301. Published

    Seeing through MIST Given a Small Fraction of an RSA Private Key

    Walter, C. D., 2003, CT-RSA 2003. Joye, M. (ed.). Springer, Vol. 2612. p. 391-402 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  302. Published

    Select Response Grouping Proof for RFID Tags

    Leng, X., Lien, Y., Mayes, K., Markantonakis, K. & Chiu, J-H., 2009, Proceedings of the 2009 First Asian Conference on Intelligent Information and Database Systems. Washington, DC, USA: IEEE Computer Society Press, p. 73-77 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  303. Published

    Selective mixture of Gaussians clustering for location fingerprinting

    Nguyen, K. & Luo, Z., 5 Dec 2014, 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (i-Locate, MOBIQUITOUS 2014). London, UK: ACM, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  304. Published

    Selective, multi-level modelling for accelerated simulation of large, heterogeneous corporate telecommunications networks

    Pitts, J., Luo, Z., Nyong, D. & Cosmas, J., 1998, 15th IEE UK Teletraffic Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  305. Published

    Self-calibrating probability forecasting

    Vovk, V., Shafer, G. & Nouretdinov, I., 2004, Advances in Neural Information Processing Systems. Thrun, S., Saul, L. & Schoelkopf, B. (eds.). Cambridge, MA: MIT Press, Vol. 16. p. 1133-1140 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  306. Published

    Self-organization and novelty: pre-configurations of emergence in early British Cybernetics

    Soler-Adillon, J. & Penny, S., 24 Jun 2014, Norbert Wiener in the 21st Century (21CW), 2014 IEEE Conference on. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  307. Published

    Semantics of Architectural Connectors

    Fiadeiro, J. L. & Lopes, A., 1997, TAPSOFT. Springer, Vol. 1214. p. 505-519 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  308. Published

    Semantics of Interworking Knowledge Based Systems

    Reichwein, G. & Fiadeiro, J. L., 1993, EPIA. Springer, Vol. 727. p. 93-104 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  309. Published

    Semantics-Driven Introspection in a Virtual Environment

    Tamberi, F., Maggiari, D., Sgandurra, D. & Baiardi, F., 1 Sep 2008, 2008 The Fourth International Conference on Information Assurance and Security. p. 299-302 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  310. Forthcoming

    Semi-Algebraic Proofs, IPS Lower Bounds and the τ-Conjecture: Can a Natural Number be Negative?

    Yaroslav, A., Grigoriev, D., Hirsch, E. & Tzameret, I., 6 Feb 2020, (Accepted/In press) Proceedings of the 52th Annual ACM Symposium on the Theory of Computing (STOC), 2020. Association for Computing Machinery (ACM), Vol. 52. 56 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  311. Published

    Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination

    Wolthusen, S. D. & Al-Salloum, Z., 15 Sep 2009, Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics 2009. IEEE Computer Society Press, p. 41-53

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  312. Published

    Senescent ground tree rewrite systems

    Hague, M., 14 Jul 2014, CSL-LICS '14 Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). ACM, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  313. Published

    Senior tourists’ preferences of smart tourism destinations in Europe: Challenges of Europe: Growth, Competitiveness, Innovation and Well-being”, University of Split.

    Ameen, N. & Shah, M., 2019, Senior tourists’ preferences of smart tourism destinations in Europe: Challenges of Europe: Growth, Competitiveness, Innovation and Well-being”, University of Split.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  314. Published

    Sensor Network Grids: Agent Environment combined with QoS in Wireless Sensor Networks

    Stathis, K., Kafetzoglou, S. & Bromuri, S. P. A. N. S., 1 Jun 2007, Proceedings of the 3rd International Conference on Autonomic and Autonomous Systems (ICAS'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  315. Published

    Separable states of $N$ quantum bits

    Schack, R. & Caves, C. M., 1999, Proceedings of the X. International Symposium on Theoretical Electrical Engineering. Mathis, W. & Schindler, T. (eds.). Magdeburg: Otto-von-Guericke University, p. 73-78

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  316. Published

    Serverless protocols for inventory and tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K. & Chaumette, S., 9 Nov 2017, Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. St. Petersburg, Florida, USA: IEEE Computer Society Press, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  317. Published

    Service Extraction from Legacy Systems

    Matos, C., 2008, Proceedings of the International Conference on Graph Transformation (ICGT). Ehrig, H., Heckel, R., Rozenberg, G. & Taentzer, G. (eds.). Springer-Verlag, Vol. 4758. p. 505-507 3 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  318. Published

    Service providers perceptions of Japans e-government services using the importance-performance (IPA) model

    Wong, K., Nishimoto, H., Nishigaki, Y. & Jackson, S., 2012, Asian Conference on Information Systems, Siem Reap, Cambodia, 06 - 08 Dec.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  319. Published

    Service-oriented modelling of automotive systems

    Bocchi, L., Fiadeiro, J. L. & Lopes, A., 1 Jan 2008, Proceedings - International Computer Software and Applications Conference. p. 1059-1064 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  320. Published

    Set cover problems in role-based access control

    Chen, L. & Crampton, J., 2009, Proceedings of 14th European Symposium on Research in Computer Security. Springer, p. 689-704 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  321. Published

    Setting the Stage: Environmental Conditions in Beringia as People Entered the New World.

    Elias, S., 2002, The First Americans: The Pleistocene Colonization of the New World. Jablonski, N. (ed.). San Francisco: California Academy of Sciences, p. 9-26 (Memoirs of the California Academy of Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. Published

    Shallow magma chamber formation and evolution

    Barnett, Z. & Gudmundsson, A., 2013, Rock Fractures in Geological Processes: Abstracts of the Presentations at the Symposium. University Press Göttingen

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  323. Published

    Share ownership and trade unions: sleeping with the enemy?

    Sen Gupta, S., 2007, International Industrial Relations Association (IIRA), Manchester.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  324. Published

    Share ownership and unions: are they compatible in the present industrial climate?

    Sen Gupta, S., 2010, British Universities Industrial Relations Association (BUIRA), Manchester.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  325. Published

    Sharing Data through Confidential Clouds: An Architectural Perspective

    Sgandurra, D., Di Cerbo, F., Trabelsi, S., Martinelli, F. & Lupu, E., 7 Aug 2015, Proceedings - 1st International Workshop on TEchnicaland LEgal Aspects of Data pRIvacy and Security, TELERISE 2015. p. 58-61 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  326. Published

    Shifting the mainstream: Conference Keynote Speech

    Conroy, C., 2003, Shifting Aesthetic: Disability and Performance: Conference Proceedings. London Arts Board

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  327. Published

    Shiite Marja’iyya: The Association of Shiite Quietism and Activism

    Kalantari, M., 28 Mar 2012, British Society for Middle Eastern Studies Annual Conference: LSE, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  328. Published

    Short Proofs for the Determinant Identities

    Hrubes, P. & Tzameret, I., 19 May 2012, Proceedings of the 44th Annual ACM Symposium on the Theory of Computing (STOC). p. 193-212

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  329. Published

    Short Propositional Refutations for Dense Random 3CNF Formulas

    Muller, S. & Tzameret, I., Jun 2012, Proceedings of the 27th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS): 25-28 June 2012. p. 501-510 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  330. Published

    Short-term periodicity tidal cycles within ancient mixed siliciclastic/bioclastic deposits: examples from Pliocene shallow-water successions of southern Apennines (Italy)

    Longhitano, S. G. & Chiarella, D., 2008, 26th IAS 2009 – Books of Abstract. p. 174

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  331. Published

    Simple Encrypted Arithmetic Library - SEAL v2.1

    Chen, H., Laine, K. & Player, R., 2017, Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Revised Selected Papers. Springer-Verlag, Vol. 10323 LNCS. p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10323 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  332. Published

    Simple Power Analysis of Unified Code for ECC Double and Add

    Walter, C. D., 2004, CHES 2004. Joye, M. & Quisquater, J-J. (eds.). Springer, Vol. 3156. p. 191-204 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  333. Published

    Simple techniques for enhancing the robustness of DSR

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of the 3rd Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC '03), Stockholm, Sweden, May 2003. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  334. Published

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    Freire, E. S. V., Paterson, K. G. & Poettering, B., 2013, CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 101-114 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  335. Published

    SIMPLE: developing a LBS positioning solution

    Wierenga, J. & Komisarczuk, P., 2005, Proceedings of the 4th International Conference on Mobile and Ubiquitous Multimedia, MUM 2005, Christchurch, New Zealand, December 8-10, 2005. p. 48-55 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  336. E-pub ahead of print

    Simplifying Automated Pattern Selection for Planning with Symbolic Pattern Databases

    Moraru, I., Edelkamp, S., Franco Aixela, S. & Martinez, M., 24 Aug 2019, KI 2019: Advances in Artificial Intelligence. Benzmüller, C. & Stuckenschmidt, H. (eds.). Springer, p. 249-263 15 p. (Lecture Notes in Computer Science; vol. 11793).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  337. Published

    Simulating Attack Plans Against ICT Infrastructures

    Baiardi, F., Corò, F., Tonelli, F., Guidi, L. & Sgandurra, D., 2014, Vulnerability, Uncertainty, and Risk: Quantification, Mitigation, and Management - Proceedings of the 2nd International Conference on Vulnerability and Risk Analysis and Management, ICVRAM 2014 and the 6th International Symposium on Uncertainty Modeling and Analysis, ISUMA 2014. American Society of Civil Engineers (ASCE), p. 627-637 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  338. Published

    Simulating future events in psychosis. Schizophrenia Bulletin

    Huddy, V., Brown, G. & Boyd, T., 2009, Schizophrenia Bulletin. Vol. 35. p. 277 277 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  339. Published

    Simulating Matter Interactions of Partially Stripped Ions in BDSIM

    Abramov, A., Boogert, S. & Nevay, L., 21 Jun 2019, 10th International Partile Accelerator Conference. JACoW Publishing, p. 3514-3517 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  340. Published

    Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance

    Borgen, H., Bours, P. & Wolthusen, S. D., 2 Jun 2009, Third International Conference on Advances in Biometrics (ICB 2009). Springer-Verlag, p. 857-867

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  341. Published

    SIMULATION OF A CAVITY BPM FOR HIGH RESOLUTION SINGLEPASS BEAM POSITION MEASUREMENTS

    Morgan, A., Rehm, G., Joshi, N., Lyapin, A., Boogert, S. & Molloy, S., 2010, Proceedings of Beam Instrumentation Workshop,2010, Santa Fe, New Mexico, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  342. Published

    Simulation Results of the FETS Laserwire Emittance Scanner

    Kruchinin, K., Bosco, A., Gibson, S., Karataev, P., Faircloth, D., Gabor, C., Lawrie, S. & Pozimski, J., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 3729-3731 3 p. THPME191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  343. E-pub ahead of print

    Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms

    Liu, S. & Paterson, K. G., 17 Mar 2015, Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. Katz, J. (ed.). Springer, Vol. 9020. p. 3-26 24 p. (Lecture Notes in Computer Science; vol. 9020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  344. Published

    Simulations of the Activation of a Proton Therapy Facility Using a Complete Beamline Model With BDSIM

    Tesse, R., Gnacadja, E., Hernalsteens, C., Pauly, N., Boogert, S., Nevay, L. & Shields, W., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 4176-4179 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  345. Published

    Simulations of the FETS Laser Diagnostic

    Kurup, A., Pozimski, J., Gibson, S., Kruchinin, K. & Letchford, A., Jan 2016, 4th International Beam Instrumentation Conference: IBC2015, Melbourne, Australia. JACoW Publishing, p. 521-525 5 p. TUPB071

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  346. Published

    Simulator Problem in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Dec 2010, 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). Tang, H. Y. & Fu, X. (eds.). HongKong, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  347. Published

    Simultaneously Satisfying Linear Equations Over F_2: MaxLin2 and Max-r-Lin2 Parameterized Above Average

    Crowston, R., Fellows, M., Gutin, G., Jones, M., Rosamond, F., Thomasse, S. & Yeo, A., 2011, IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science. p. 229--240 (LIPICS - Leibniz International Proceedings in Informatics; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  348. Published

    Single sign-on using trusted platforms

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 2003, Proceedings. Springer-Verlag, Vol. 2851. p. 54-68 15 p. (Lecture Notes in Computer Science; vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  349. Published

    Sit-to-Stand Movement Recognition Using Kinect

    Acorn, E., Dipsis, N., Pincus, T. & Stathis, K., 20 Apr 2015, 3rd International Symposium on Statistical Learning and Data Sciences. Springer, p. 179-192 14 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  350. Published

    Situating cognitive agents in GOLEM

    Bromuri, S. & Stathis, K., 2008, Engineering Environment-Mediated Multi-Agent Systems (EEMAS'07). Springer, Vol. 5049. p. 115-134 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  351. Published

    Sleeping Android: The Danger of Dormant Permissions

    Sellwood, J. & Crampton, J., 8 Nov 2013, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 55-66 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  352. Published

    Sliding Windows Succumbs to Big Mac Attack

    Walter, C. D., 2001, CHES 2001. Koç, Ç. K., Naccache, D. & Paar, C. (eds.). Springer, Vol. 2162. p. 286-299 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  353. Published

    Small Firm Workers in the New Economy: Perceptions of work in Three Sectors

    Sen Gupta, S., Tsai, C-J. & Edwards, P., 2006, British Universities Industrial Relations Association (BUIRA), Galway.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  354. Published

    Small Scale Variants of the AES

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2005, Fast Software Encryption, 12th International Workshop, FSE 2005. Springer, Vol. 3557. p. 145-162 18 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  355. Published

    Small-span characteristic polynomials of integer symmetric matrices

    McKee, J., 2010, ANTS IX. p. 272-286 (Lecture Notes in Computer Science; vol. 6197).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  356. Published

    SMART (Stochastic Model Acquisition with ReinforcemenT) learning agents: A preliminary report

    Child, C. & Stathis, K., 2005, Adaptive agents and multi-agent systems II. Springer-Verlag, Vol. 3394. p. 73-87 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  357. Published

    Smart Cards: State-of-the-Art to Future Directions, Invited Paper

    Akram, R. N. & Markantonakis, K., 1 Dec 2013, IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013). Douligeris, C. & Serpanos, D. (eds.). Athens, Greece: IEEE Computer Science

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  358. Published

    Smartphones as a Platform for Advanced Measurement and Processing

    Opperman, C. & Hancke, G., 2012, IEEE Instrumentation and Measurement Technology Conference. IEEE, p. 703 706 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  359. Published

    SME: Balancing Across The Pathways Of A Changing Future

    Kouraklis, I. J., 2005, Proceedings of 1st International Conference on Business, Management and Economics, Yaşar University, Izmir, Turkey.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  360. Published

    SMEs and e-commerce: A comparative pilot study of experiences in the UK and Italy

    Dyerson, R., Spinelli, R., Harindranath, G. & Barnes, D., 2009, Proceedings of the 2009 Institute for Small Business & Entrepreneurship Conference, Liverpool.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  361. Published

    Smith-Purcell radiation from a chain of spheres

    Lekomtsev, K., Strikhanov, M. N. & Tishchenko, A., 2010, Journal of Physics: Conference Series. Vol. 236, Number 1.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  362. Published

    Social Capital and R&D Performance in Higher Education

    Iskandar, I. M. & Jashapara, A., 2004, Proceedings of the 5th European Conference on Knowledge Management. Paris, p. 445 454 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  363. Published

    Social capital: Re-interpreting the cultural and political dynamics of knowledge sharing

    Jashapara, A. & Iskandar, I. M., 2003, Proceedings of ECKM 2003: The 4th European Conference on Knowledge Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  364. Published

    Social Commitment Delegation and Monitoring

    Kafali, O. & Torroni, P., 2011, Computational Logic in Multi-Agent Systems (CLIMA XII). Vol. 6814. p. 171-189 19 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  365. Published

    Social Media And Institutional Innovation: the Case of Free Lunch for Children in China

    Zheng, Y., 14 Dec 2014, Interntional Conference of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  366. Published

    Social Media and Social Transformation Movements: The Role of Affordances and Platforms

    Harindranath, G., Bernroider, E. W. N. & Kamel, S. H., 17 Jun 2015, Proceedings of the Twenty-Third European Conference on Information Systems (ECIS), Münster, Germany, 2015. Munster, Germany: ECIS, p. 1-13 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  367. Published

    Social order and organizational dynamics in an alternative currency movement network

    Laamanen, M., Moser, C., Bor, S. & den Hond, F., 2018, XIX ISA World Congress of Sociology: Power, Violence and Justice: Reflections, Responses and Responsibilities. Toronto: International Sociological Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  368. Unpublished

    Social Work, Social Justice and the Capability Approach: Keynote lecture at JSWEC conference 2015

    Gupta, A., 23 Jul 2015, (Unpublished) Social Work, Social Justice and The Capability Approach.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  369. Published

    Societal Relevance of Quaternary Research

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 1-10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  370. Published

    Socio-Cognitive Grids: The Net as a Universal Human Resource

    Bruijn, O. D. & Stathis, K., 1 Jun 2003, Proceedings of the Conference of ``Tales of the Disappearing Computer".

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  371. Published

    Sodi's Opera for Mme Favart: "Baiocco et Serpilla"

    Charlton, D., 2005, La 'Querelle des Bouffons' dans la vie culturelle française du XVIIIe siècle. Fabiano, A. (ed.). Paris : CNRS, p. 205-18 14 p. (Sciences de la musique. Série Études.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  372. Published

    Soft-sediments deformations in tidal cross-stratified deposits - triggering mechanisms in the Early Pleistocene Catanzaro strait-fill succession, Calabrian Arc (Southern Italy)

    Chiarella, D., Moretti, M., Longhitano, S. G. & Muto, F., 2015, Geophysical Research Abstracts. Vol. 17. p. 11453

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  373. Published

    Soil biodiversity, root herbivory and carbon and nitrogen cycling in grassland soils

    Cook, R., Dawson, L. A., Gange, A., Grayston, S. J., Murray, P. J. & Treonis, A. M., 2001, PROCEEDINGS OF THE XIX INTERNATIONAL GRASSLAND CONGRESS. PIRACICABA: FUNDACAO ESTUDOS AGRARIOS LUIZ QUEIROZ (FEALQ), p. 902-902 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  374. Forthcoming

    Solo singing at the Comédie-Italienne, 1716 to c.1752

    Charlton, D., 2018, (Accepted/In press) La Comédie-Italienne de Paris, 1716-1780. Fabiano, A. & De Luca, E. (eds.). Paris: Presses de l'Université Paris-Sorbonne

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  375. Published

    Solving k-Set Agreement with Stable Skeleton Graphs

    Biely, M., Robinson, P. & Schmid, U., 2011, 25th IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2011, Anchorage, Alaska, USA, 16-20 May 2011 - Workshop Proceedings. p. 1488-1495 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  376. Published

    Solving SAT for CNF formulas with a one-sided variable occurrence restriction

    Johannsen, D., Razgon, I. & Wahlström, M., 2009, Theory and Applications of Satisfiability Testing, SAT 2009 : 12th International Conference, SAT 2009. Kullmann, O. (ed.). Swansea, Wales, United Kingdom: Springer, Vol. 5584. p. 80-85 6 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  377. Published

    Some Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., 2004, Advanced Encryption Standard - AES 2004, 4th International Conference. Berlin: Springer, Vol. 3373. p. 58-66 9 p. (Lecture Notes in Computer Science; vol. 3373).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  378. Published

    Some proof-theoretic and algorithmic aspects of coercive subtyping

    Jones, A., Luo, Z. & Soloviev, S., 1998, Types for proofs and programs, Proc. of the Inter. Conf. TYPES'96, LNCS 1512.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  379. Published

    Some Security Aspects of the MIST Randomized Exponentiation Algorithm

    Walter, C. D., 2003, CHES 2002. Jr., B. S. K., Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 2523. p. 276-290 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  380. Published

    Sometimes "Tomorrow" is "Sometime" - Action Refinement in a Temporal Logic of Objects

    Fiadeiro, J. L. & Maibaum, T. S. E., 1994, ICTL. Springer, Vol. 827. p. 48-66 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  381. Published

    Sound regular expression semantics for dynamic symbolic execution of JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 8 Jun 2019, PLDI'19: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, p. 425-438 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  382. Published

    South Asia and West Asia from the Delhi Sultanate to the Present: Security, Resources and Influence

    Robinson, F., 2012, Working Papers: Symposium on the Academic Chairs of His Majesty Sultan Qaboos bin Said and their Contribution to the Development of Human Knowledge. Muscat: Ministry of Higher Education, Oman, p. 74-86 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  383. Published

    Space Bounds for Reliable Storage: Fundamental Limits of Coding

    Spiegelman, A., Cassuto, Y., Chockler, G. & Keidar, I., 25 Jul 2016, Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing. ACM, p. 249-258 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  384. Published

    Space Complexity of Fault-Tolerant Register Emulations

    Chockler, G. & Spiegelman, A., 25 Jul 2017, The 36th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2017)). ACM, p. 83-92 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  385. Published

    Sparser Random 3SAT Refutation Algorithms and the Interpolation Problem: Extended Abstract

    Tzameret, I., 8 Jul 2014, Automata, Languages, and Programming - 41st International Colloquium, (ICALP) 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part {I}: --. p. 1015-1026 12 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  386. Unpublished

    Speaking-in-the-last-instance: Non-Standard Usage, Superposition, and the (H)interlinguistic State

    Hazell, C., 2019, (Unpublished) TUJ Philosophy Lecture Series. 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  387. Published

    Specialist Experts for Prediction with Side Information

    Kalnishkan, Y., Adamskiy, D., Chernov, A. & Scarfe, T., 2016, 2015 IEEE International Conference on Data Mining Workshop (ICDMW). IEEE, p. 1470-1477 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  388. E-pub ahead of print

    Specification and Verification of Invariant Properties of Transition Systems

    Gaina, D., Tutu, I. & Riesco, A., 23 May 2019, 25th Asia-Pacific Software Engineering Conference: 4-7 December 2018, Nara, Japan. IEEE, p. 99-108 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  389. Published

    Specification of Required Non-determinism

    Lano, K., Bicarregui, J., Fiadeiro, J. L. & Lopes, A., 1997, FME. Springer, Vol. 1313. p. 298-317 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  390. Published

    Specifying and enforcing constraints in role-based access control

    Crampton, J., 2003, Proceedings of 8th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 43-50 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  391. Published

    Spectral clustering of protein sequences

    Paccanaro, A., Trifonov, V., Yu, H. & Gerstein, M. B., 2005, International Joint Conference on Neural Networks. p. 161-166

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  392. Published

    Spectral clustering of protein sequences using sequence-profile scores

    Sasidharan, R., Gerstein, M. B. & Paccanaro, A., 2006, Proceedings of ICNPSC – 3rd International Conference on Neural Parallel and Scientific Computations.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  393. Published

    Speculation by the 1% and the financialization of art

    Chong, D., 2013, 38th Annual Macromarketing Conference (Toronto: York University).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  394. Published

    Speculative Landscapes: H.P. Lovecraft’s Weird System

    Gene-Rowe, F., Nov 2013, The Weird: Fugitive Fictions/Hybrid Genres. Senate House Library, London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  395. Published

    Speculative Landscapes: H.P. Lovecraft’s Weird System

    Gene-Rowe, F., Nov 2013, The Weird: Fugitive Fictions/Hybrid Genres. Senate House Library, London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  396. Published

    Speech security and permanents of (0,1) matrices

    Mitchell, C. J., 1989, Cryptography and Coding: Proceedings of the IMA Cryptography and Coding Conference, Cirencester, December 1986. Beker, H. J. & Piper, F. C. (eds.). Oxford University Press, p. 231-240 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  397. Published

    Sports and Fitness Wellness Tourism: Segmenting Muay Thai Tourists by Travel Motivation and Quality of Life Perception

    Hosany, S. & Deesilatham, S., 2017, 50th Academy of Marketing Conference, Hull, 3-6 July.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  398. Published

    Spy agents: Evaluating trust in remote environments

    Kalogridis, G., Mitchell, C. J. & Clemo, G., 2005, Proceedings of the 2005 International Conference on Security and Management (SAM '05), June 2005, Las Vegas, USA. Arabnia, H. R. (ed.). CSREA Press, p. 405-411 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  399. Published

    SSL/TLS session-aware user authentication using a GAA bootstrapped key

    Chen, C., Mitchell, C. J. & Tang, S., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication, 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings. Ardagna, C. & Zhou, J. (eds.). Springer-Verlag, Vol. 6633. p. 54-68 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  400. Published

    Stability of Power Network State Estimation Under Attack

    Baiocco, A. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference Asia (ISGT Asia 2014). IEEE Press, p. 441 446 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  401. Published

    Stable multi-agent systems

    Bracciali, A., Mancarella, P., Stathis, K. & Toni, F., 2005, Engineering Societies in the Agents World V. Springer-Verlang, Vol. 3451. p. 322-334 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  402. Published

    Stack Object Protection with Low Fat Pointers

    Duck, G., Yap, R. & Cavallaro, L., 27 Feb 2017, NDSS Symposium 2017. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  403. Published

    Static Analysis on x86 Executable for Preventing Automatic Mimicry Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 12 Jul 2007, In the Proceedings of the GI SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  404. Published

    Statistical applications of algorithmic randomness

    Vovk, V. & Gammerman, A., 1999, Bulletin of the International Statistical Institute. Proceedings of the Fifty Second Session: Contributed Papers. book 3 ed. Vol. 58. p. 469-470 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  405. Published

    Statistical Guarantees for the Robustness of Bayesian Neural Networks

    Cardelli, L., Kwiatkowska, M., Laurenti, L., Paoletti, N., Patanè, A. & Wicker, M., Aug 2019, International Joint Conference on Artificial Intelligence (IJCAI 2019). International Joint Conferences on Artificial Intelligence, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  406. Published

    Status of and Future Plans for the CERN LINAC4 Emittance Meter based on Laser Electron-Detachment and a Diamond Strip-Detector

    Hofmann, T., Bravin, E., Raich, U., Roncarolo, F., Zocca, F., Boorman, G., Bosco, A., Gibson, S., Kruchinin, K. & Griesmayer, E., 18 Sep 2014, 3rd International Beam Instrumentation Conference: Monterey, CA, USA, September 14-18, 2014.. p. 83-87 5 p. MOPF15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  407. Published

    Status of the FETS Project

    The FETS Collaboration, Boorman, G., Bosco, A. & Gibson, S., 5 Sep 2014, 27th Linear Accelerator Conference: LINAC14, Geneva, Switzerland, 31 August - 5 September 2014. p. 361-363 3 p. MOPP129

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  408. Published

    Status of the LUX Dark Matter Search

    Fiorucci, S., Akerib, D. S., Bedikian, S., Bernstein, A., Bolozdynya, A., Bradley, A., Carr, D., Chapman, J., Clark, K., Classen, T., Curioni, A., Dahl, E., Dazeley, S., de Viveiros, L., Druszkiewicz, E., Gaitskell, R., Hall, C., Faham, C. H., Holbrook, B., Kastens, L. & 27 others, Kazkaz, K., Lander, R., Lesko, K., Malling, D., Mannino, R., McKinsey, D., Mei, D., Mock, J., Nikkel, J., Phelps, P., Schroeder, U., Shutt, T., Skulski, W., Sorensen, P., Spaans, J., Stiegler, T., Svoboda, R., Sweany, M., Thomson, J., Toke, J., Tripathi, M., Walsh, N., Webb, R., White, J., Wolfs, F., Woods, M. & Zhang, C., 2009, SUSY09: THE 17TH INTERNATIONAL CONFERENCE ON SUPERSYMMETRY AND THE UNIFICATION OF FUNDAMENTAL INTERACTIONS. Nath, P., Alverson, G. & Nelson, B. (eds.). MELVILLE: AMER INST PHYSICS, p. 977-980 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  409. Published

    Status of the RAL Front End Test Stand

    The FETS Collaboration, Boorman, G., Bosco, A. & Gibson, S., 17 May 2013, 4th International Particle Accelerator Conference: Shanghai, China, 12-17 May 2013. p. 3963-3965 3 p. THPWO086

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  410. Published

    Status of the RAL Front End Test Stand

    The FETS Collaboration, Boorman, G., Bosco, A. & Gibson, S., 8 May 2015, 6th International Particle Accelerator Conference: IPAC2015, Richmond, VA, USA. p. 3959-3961 3 p. THPF105

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  411. Published

    Status Report of the FETS Photo Detachment Emittance Instrument at RAL

    Gabor, C., Letchford, A., Bosco, A., Boorman, G., Gibson, S., Savage, P. & Scarpine, V., 17 May 2013, 4th International Particle Accelerator Conference: Shanghai, China, 12-17 May 2013. p. 783-785 3 p. MOPWA049

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  412. Published

    Staying with the inbetween

    Coppard, H., 12 Jun 2015, Philosophy at Play conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  413. E-pub ahead of print

    Stealthy Injection Attacks Against IEC61850’s GOOSE Messaging Service

    Wright, J. & Wolthusen, S., 13 Dec 2018, Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  414. Published

    STFT-based denoising of elastograms

    Hon, T. K., Subramaniam, S. R., Georgakis, A. & Alty, S., 12 Jul 2011, 2011 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011 - Proceedings. p. 677-680 4 p. 5946494

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  415. Published

    Sticking and Making: Technology as glue for families separated by prison

    Coles-Kemp, L. & Kotova, A., 2014, UK Academy for Information Systems Conference Proceedings 2014. p. 1-28 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. Published

    Stochastic simulation in mixed graphical association models

    Brewer, M., Aitken, C., Luo, Z. & Gammerman, A., 1992, Computational Statistics. Dodge, K. & Whittaker, F. (eds.). Vol. 1. p. 257-262

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  417. Unpublished

    Stock Market Liquidity and The Business Cycle: An Empirical Study of Asia-Pacific countries

    Lim, S. & Giouvris, E., 2015, (Unpublished) Stock Market Liquidity and The Business Cycle: An Empirical Study of Asia-Pacific countries.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  418. Published

    Storage and search in dynamic peer-to-peer networks

    Augustine, J., Molla, A. R., Morsy, E., Pandurangan, G., Robinson, P. & Upfal, E., 2013, 25th ACM Symposium on Parallelism in Algorithms and Architectures, SPAA '13, Montreal, QC, Canada - July 23 - 25, 2013. p. 53-62 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  419. Published

    Stored products research in Europe – a very personal perspective!

    Credland, P., 2010, Proceedings of the 10th International Working Conference on Stored Product Protection. Carvalho et al., M. O. (ed.). Berlin: Julius Kühn-Institut, p. 14-25 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  420. Published

    Strangeness minimisation feature selection with confidence machines

    Bellotti, T., Luo, Z. & Gammerman, A., 2006, Lecture Notes in Computer Science. Vol. 4224. p. 978-985

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  421. Published

    Strategic CSR? Innovative CSR!

    Preuss, L., Mar 2010, annual meeting of the International Association for Business and Society (IABS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  422. Published

    Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments

    Rezaei Khouzani, M., Pham, V. & Cid, C., Nov 2014, Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840. p. 59-78 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  423. Published

    Strategies to encourage local ownership of online collaboration technologies in West Africa

    Bentley, C., 2008, Proceedings from ALT-C 2008: Rethinking the Digital Divide, the 15th Association for Learning Technology Conference. Whitton, N. & McPherson, M. (eds.). ALT

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. Published

    Strategy Implementation as a System

    Aboutalebi, R. & Tan, H., 8 Sep 2013, In: UK Systems Society, 17th Annual Conference of the UK Systems Society: Systems and Society- Ideas from Practice. 08-10 September 2013, St Anne’s College, Oxford University, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  425. E-pub ahead of print

    Strong Post-Compromise Secure Proxy Re-Encryption

    Davidson, A., Deo, A., Lee, E. & Martin, K., 30 May 2019, Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Springer-Verlag, p. 58-77 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11547 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  426. Published

    Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs

    Gennaro, R., Halevi, S., Krawczyk, H., Rabin, T., Reidt, S. & Wolthusen, S. D., 6 Oct 2008, Computer Security - ESORICS 2008: Proc. 13th European Symposium on Research in Computer Security. Springer-Verlag, p. 49-65

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  427. Published

    Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs

    Alwasel, B. & Wolthusen, S. D., 30 Apr 2015, The proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015). IEEE, p. 418-423 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  428. Published

    Structural Controllability of Networks for Non-Interactive Adversarial Vertex Removal

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, Proceedings of the 8th International Workshop on Critical Information Infrastructures Security. Springer-Verlag, p. 120-132

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  429. Published

    Structural data from the Trollaskagi peninsula, North Iceland

    Langbacka, B. & Gudmundsson, A., 1989, Nordic Volcanological Institute Report 9301. Reykjavik, p. 1-39 39 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  430. Published

    Structural Style and Evolution of the Songkhla Basin, western Gulf of Thailand

    Kaewkor, C., Watkinson, I. & Burgess, P., 23 Nov 2015, Proceedings of the International Conference on Geology, Geotechnology, and Mineral Resources of INDOCHINA. Khon Kaen, Thailand, 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  431. Published

    Structure and Behaviour of Virtual Organisation Breeding Environments

    Bocchi, L., Fiadeiro, J. L., Rajper, N. & Reiff-Marganiec, S., 2009, FAVO. Vol. 16. p. 26-40 15 p. (EPTCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  432. Unpublished

    Structure and internal politics in MNCs: three case studies

    Edwards, T. & Rees, C., Aug 1997, (Unpublished) International Industrial Relations Association (IIRA) 5th European Congress. Dublin.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  433. Published

    Structuring Time Series Data to Gain Insight into Agent Behaviour

    Al-Baghdadi, N., Wisniewski, W., Lindsay, D., Lindsay, S., Kalnishkan, Y. & Watkins, C., 24 Feb 2020, Proceedings of the 3rd International Workshop on Big Data for Financial News and Data. IEEE, p. 5480-5490 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  434. Forthcoming

    Studies of top quark production with the ATLAS detector at the LHC

    Spano, F., 2014, (Accepted/In press) Proceedings for Les Rencontres de Physique de la Vall\'ee d'Aoste, La Thuile, Vall\'ee d'Aoste, Italy, February 23rd - March 1st 2014. In press by Nuovo Cimento C.. 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  435. Published

    Study of a Proton Therapy Beamline for Eye Treatment with Beam Delivery Simulation (BDSIM) and an In-House Tracking Code

    Gnacadja, E., Hernalsteens, C., Pauly, N., Tesse, R., Boogert, S., Nevay, L. & Shields, W., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 3088-3091 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  436. Published

    Subexponential Parameterized Odd Cycle Transversal on Planar Graphs

    Lokshtanov, D., Saurabh, S. & Wahlström, M., 2012, FSTTCS.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  437. Published

    Sublinear Bounds for Randomized Leader Election

    Kutten, S., Pandurangan, G., Peleg, D., Robinson, P. & Trehan, A., 2013, Distributed Computing and Networking, 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings. p. 348-362 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  438. Published

    Submarine Slide and Slump Complexes, Exmouth Plateau, NW Shelf of Australia

    Scarselli, N., McClay, K. & Elders, C., 31 Aug 2013, Preoceedings of the Western Australian Basins Conference. 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  439. Published

    SUB-MICROMETER RESOLUTION TRANSVERSE ELECTRON BEAM SIZE MEASUREMENT SYSTEM BASED ON OPTICAL TRANSITION RADIATION

    Boogert, S., Aryshev, A., Terunuma, N., Urakawa, J., Karataev, P. & Howell, D., 2010, Proceedings of IPAC'10, Kyoto, Japan.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  440. Published

    Sub-micrometre resolution laser wire transverse beam size measurement system

    Nevay, L. J., Blair, G. A., Boogert, S. T., Karataev, P., Kruchinin, K., Corner, L. & Walczak, R., 24 Dec 2013, IPAC 2013 - 4th International Particle Accelerator Conference. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  441. Published

    Subscriber Centric Conditional Access System for Pay-TV Systems

    Msgna, M., Markantonakis, K., Mayes, K. & Akram, R. N., 11 Sep 2013, IEEE 10th International Conference on e-Business Engineering (ICEBE): IEEE Computer Society. p. 459-455 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  442. Published

    Subsets More Representative Than Random Ones

    Nouretdinov, I., 2007, 7th Industrial Conference on Data Mining 2007 Proceedings. p. 15-20 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  443. Published

    Subsidiary Embeddedness, Subsidiary Strategy and Subsidiary HR: Exploring an extended model of strategic HR in MNCs

    Zheng, Y., Nov 2012, 29th Annual Conference of EAMSA, National University of Singapore, Singapore.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  444. Published

    SUBTERRANEAN INSECTS AND FUNGI - HIDDEN COSTS AND BENEFITS TO THE GREENKEEPER

    Gange, A., 1994, SCIENCE AND GOLF II. NEW YORK: Routledge, p. 461-466 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  445. E-pub ahead of print

    Subverting Decryption in AEAD

    Armour, M. & Poettering, B., 18 Nov 2019, Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 22-41 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11929 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  446. Published

    Sums of two numbers having only prime factors congruent to one modulo four

    Dietmann, R. & Elsholtz, C., 2018, Proceedings of the Number Theory Week 2017 conference: Banach Center Publications.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  447. Published

    Supermartingales in Prediction with Expert Advice

    Chernov, A., Kalnishkan, Y., Zhdanov, F. & Vovk, V., 2008, Lecture Notes in Articial Intelligence. Springer, Vol. 5254. p. 199-213 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  448. Published

    Superposing Connectors

    Wermelinger, M., Lopes, A. & Fiadeiro, J. L., 2000, IWSSD. IEEE Computer Society Press, p. 87-94 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  449. Published

    Supply Chain Strategies: New Taxonomy

    Aboutalebi, R., 8 Sep 2015, In: BAM (British Academy of Management), 29th Annual Conference of BAM: The Value of Pluralism in Advancing Management Research, Education and Practice. 08-10 September 2015, The University of Portsmouth, England, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  450. Published

    Supporting Domain-Specific State Space Reductions through Local Partial-Order Reduction

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 2011, Proc. 26th Int. Conf. Automated Software Engineering (ASE 2011). p. 113-122

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  451. Published

    Supporting institutional decision making with an intelligent student engagement tracking system

    Ong, V., Duan, Y. & Jackson, S., 2012, IADIS International Conference: Information Systems 2012, Berlin, DE, 10 - 12 Mar .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  452. Published

    Surface Potential Variations in Epitaxial Graphene Devices Investigated by Electrostatic Force Spectroscopy

    Panchal, V., Burnett, T. L., Pearce, R., Cedergren, K., Yakimova, R., Tzalenchuk, A. & Kazakova, O., 2012, 2012 12TH IEEE CONFERENCE ON NANOTECHNOLOGY (IEEE-NANO). NEW YORK: IEEE, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  453. Published

    SVM Venn Machine with k-Means Clustering

    Zhou, C., Nouretdinov, I., Luo, Z. & Gammerman, A., 2014, Artificial Intelligence Applications and Innovations: AIAI2014 Workshops. Rhodes, Greece, p. 251-260 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  454. Published

    Swarm intelligence based dynamic routing and wavelength assignment for wavelength constrained all-optical networks

    Hassan, A., Luo, Z. & Phillips, C., 2009, Proceedings of the 9th international conference on Communications and information technologies . IEEE, p. 987-992

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  455. Published

    Switching Investments

    Koolen, W. M. & Rooij, S. D., 1 Oct 2010, Proceedings of the 21st International Conference on Algorithmic Learning Theory (ALT 2010). Hutter, M., Stephan, F., Vovk, V. & Zeugman, T. (eds.). Springer Berlin / Heidelberg, p. 239-254 16 p. (LNAI 6331).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  456. Published

    Symbolic Backwards Reachability Analysis for Higher‐Order Pushdown Systems

    Hague, M. & Ong, C-H. L., 2007, FoSSaCS: Foundations of Software Science and Computation Structures.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  457. E-pub ahead of print

    Symbolic Register Automata

    D’Antoni, L., Ferreira, T., Sammartino, M. & Silva, A., 12 Jul 2019, Computer Aided Verification - 31st International Conference, CAV 2019, Proceedings. Dillig, I. & Tasiran, S. (eds.). Springer-Verlag, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11561 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  458. Published

    Symmetry Breaking in the Congest Model: Time- and Message-Efficient Algorithms for Ruling Sets

    Pai, S., Pandurangan, G., Pemmaraju, S. V., Riaz, T. & Robinson, P., 2017, 31st International Symposium on Distributed Computing: DISC 2017. LIPIcs, Vol. 91. p. 38:1-38:16 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  459. Published

    SYMPOSIUM PRESENTATION (one of three): Decision Making in Social Work: Analytic, Moral and Emotional Dimensions: Troubling narratives - the emotional dimensions of practitioner decision-making in social work

    Leonard, K. & O'Connor, L., 2015, European Social Work Research Association Conference April 2015 Ljubljana, Slovenia.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  460. Published

    Synchronisation‐ and Reversal‐Bounded Analysis of Multithreaded Programs with Counters

    Hague, M. & Lin, A., 2012, CAV: Computer Aided Verification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  461. E-pub ahead of print

    Syntax-Guided Optimal Synthesis for Chemical Reaction Networks

    Cardelli, L., Ceska, M., Fränzle, M., Kwiatkowska, M., Laurenti, L., Paoletti, N. & Whitby, M., 13 Jul 2017, International Conference on Computer Aided Verification. Majumdar, R. & Kunčak, V. (eds.). p. 375-395 21 p. (Lecture Notes in Computer Science; vol. 10427).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  462. Published

    Synthesising interconnections

    Fiadeiro, J. L., Lopes, A. & Maibaum, T. S. E., 1997, Algorithmic Languages and Calculi. Chapman & Hall, Vol. 95. p. 240-264 25 p. (IFIP Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  463. Published

    Synthesizing and Verifying Plans for Constrained Workflows: Transferring Tools from Formal Methods

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 Workshop on Verification and Validation of Planning and Scheduling Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  464. Published

    Synthesizing stealthy reprogramming attacks on cardiac devices

    Paoletti, N., Jiang, Z., Islam, M. A., Abbas, H., Mangharam, R., Lin, S., Gruber, Z. & Smolka, S. A., 16 Apr 2019, 10th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS 2019). ACM, p. 13-22 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  465. E-pub ahead of print

    Systems Metagenomics: Applying Systems Biology Thinking to Human Microbiome Analysis

    Radwan, G. S. & Shanahan, H., 24 Aug 2018, Computational Methods in Systems Biology - 16th International Conference, CMSB 2018, Proceedings. Springer-Verlag, Vol. 11095 LNBI. p. 318-321 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11095 LNBI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  466. Published

    Systems Security at VU University Amsterdam

    Bos, H. J. & Cavallaro, L., 1 Jul 2011, 1st SysSec Workshop on Systems Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  467. Forthcoming

    Tag Group Authentication using Bit Collisions

    Leng, X., Hancke, G., Mayes, K. & Markantonakis, K., Oct 2012, (Accepted/In press) Information Security South Africa (ISSA). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  468. Published

    Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol

    Paterson, K. G., Ristenpart, T. & Shrimpton, T., 2011, Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011: Proceedings. Lee, D. H. & Wang, X. (eds.). Springer, p. 372-389 (Lecture Notes in Computer Science; vol. 7073).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  469. Published

    Tailoring authentication protocols to match underlying mechanisms

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1996, Information Security and Privacy - Proceedings: First Australasian Conference, Wollongong, NSW, Australia, June 1996. Pieprzyk, J. & Seberry, J. (eds.). Springer-Verlag, p. 121-133 13 p. (Lecture Notes in Computer Science; no. 1172).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  470. Published

    Taint-Enhanced Anomaly Detection

    Cavallaro, L. & Sekar, R., 2011, ICISS. p. 160-174 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  471. Published

    Take a Deep Breath: a Stealthy, Resilient and Cost-Effective Botnet Using Skype

    Nappa, A., Fattori, A., Balduzzi, M., Dell'Amico, M. & Cavallaro, L., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  472. Published

    Taking photos might not impair memory

    Nightingale, S., Wade, K., Watson, D., Mills, A., Zajac, R., Henkel, L. & Garry, M., Jul 2016, International Conference on Memory.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  473. Published

    TALEN-directed genome surgery of the DMD gene

    Popplewell, L., Marsh, J., Kymalainen, H., Yanez, R. & Dickson, J., 15 May 2013, Human Gene Therapy. Mary Ann Liebert Inc., Vol. 24. p. A21 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  474. Published

    Task Facilitation and Navigation via a Mediator: An Application from Software Integration

    Stathis, K., 1 Dec 1995, Proceedings of the 5th Hellenic Conference on Informatics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  475. Published

    Taste and Toasts in Early Eighteenth-Century Club Culture

    Hawley, J., 2011, Taste and the Senses in the Eighteenth Century. Wagner, P. & Ogée, F. (eds.). Trier: Wissenschaftlicher Verlag Trier, p. 299-318 20 p. (LAPASEC: Landau Paris Studies on the Eighteenth Century; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  476. Published

    Taxonomy of Barriers to Strategy Implementation

    Aboutalebi, R., 8 Sep 2015, BAM (British Academy of Management), 29th Annual Conference of BAM: The Value of Pluralism in Advancing Management Research, Education and Practice. 08-10 September 2015, The University of Portsmouth, England, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  477. Published

    Tear-Insert-Fold grammars

    Johnstone, A. & Scott, E., 28 Mar 2010, LDTA '10 Proceedings of the Tenth Workshop on Language Descriptions, Tools and Applications. ACM, p. 1-8 8 p. 6

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  478. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1 Oct 1998, Proc. 2nd IMACS Internat. Conf. on Circuits, Systems Computers. Vol. 2. p. 945-949 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  479. Published

    Technology, globalization, and the future

    Reppel, A. & Mitussis, D., 9 Jul 2018, Proceedings of the 43rd Annual Macromarketing Conference. Leipzig, Germany, p. 218

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  480. Published

    Tectono-stratigraphic evolution and hydrocarbon prospectivity of the South Halmahera Basin, Indonesia

    Chandra, J. & Hall, R., 25 May 2016, Proceedings, Indonesian Petroleum Association Fortieth Annual Convention 2016. Indonesian Petroleum Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  481. Published

    Teeth Segmentation and Feature Extraction for Odontological Biometrics

    Mairaj, D., Busch, C. & Wolthusen, S. D., Oct 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE Computer Society Press, p. 323-328

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  482. Published

    Telescopic Relative Entropy

    Audenaert, K., 2014, Theory of Quantum Computation, Communication, and Cryptography - 6th Conference, TQC 2011, Madrid. Springer, Vol. LNCS 6745. p. 39-52

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  483. Published

    Temperature and magnetic-field driven dynamics in artificial magnetic square ice

    Morley, S. A., Stein, A., Rosamond, M. C., Venero, D. A., Hrabec, A., Shepley, P. M., Im, M. Y., Fischer, P., Bryan, M. T., Allwood, D. A., Steadman, P., Langridge, S. & Marrows, C. H., 8 Sep 2015, Spintronics VIII. Drouhin, H-J., Wegrowe, J-E. & Razeghi, M. (eds.). SPIE, Vol. 9551. 95511Q

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  484. Published

    Temporally Aware Behaviour-Based Security in Smart Cards

    Sirett, W. G., Markantonakis, K. & Mayes, K., 1 Nov 2006, Computational Intelligence and Security, 2006 International Conference on. Vol. 1. p. 604 -608

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  485. Published

    Ten reasons WHY IRIS Needed 20:20 Foresight: Some Lessons for Introducing Biometric Border Control Systems

    Palmer, A. & Hurrey, C., 2012, Proceedings of the 2012 European Intelligence and Security Informatics Conference. Washington: IEEE Computer Society, p. 311-316 6 p. Palmer:2012:TRW:2373856.2372920

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  486. Published

    Tensor decomposition via joint matrix schur decomposition

    Colombo, N. & Vlassis, N., 19 Jun 2016, ICML'16 Proceedings of the 33rd International Conference on International Conference on Machine Learning. Weinberger, K. Q. & Balcan, M. F. (eds.). International Machine Learning Society (IMLS), p. 2820-2828 9 p. (33rd International Conference on Machine Learning, ICML 2016; vol. 48).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  487. Published

    Terrestrial Ecosystems in the past 100 Myr

    Elias, S., 2002, Encyclopaedia of Life Sciences. London: Nature Publishing Group, Vol. 18. p. 169-173

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  488. Published

    TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., Aug 2019, 28th USENIX Security Symposium. p. 729-746 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  489. Published

    Testing exchangeability on-line

    Vovk, V., Nouretdinov, I. & Gammerman, A., 2003, Proceedings of the Twentieth International Conference on Machine Learning. Fawcett, T. & Mishra, N. (eds.). Menlo Park, CA: AAAI Press, p. 768-775

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  490. Published

    Textures in experimentally deformed olivine aggregates: the effects of added water and melt.

    Heidelbach, F., Holtzman, B., Hier-Majumder, S. & Kohlstedt, D., 2005, ICOTOM 14: TEXTURES OF MATERIALS, PTS 1AND 2. Houtte, PV. & Kestens, L. (eds.). ZURICH-UETIKON: TRANS TECH PUBLICATIONS LTD, p. 63-68 6 p. (MATERIALS SCIENCE FORUM; vol. 495-497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  491. Published

    The ‘reinvention’ of the Mahachat Sung Sermon as a theatre play for new generations of Thai Buddhist audience in the context of urban migration

    Utairat, M., 2018, Theatre and Migration: Theatre, Nation and Identity between Migration and Stasis, IFTR World Congress 2018, Belgrade, Serbia .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  492. Published

    The “Coralligène” of the Mediterranean — a Recent Analog for Tertiary Coralline Algal Limestones

    Bosence, D., 1985, Paleoalgology: Contemporary Research and Applications. Toomey, D. F. & Nitecki, M. H. (eds.). Springer Berlin / Heidelberg, p. 216-225 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  493. Published

    The Entasis of Greek Doric Columns and Curve Fitting: a Case Study Based on the Peristyle Column of the Temple of Athena Alea at Tegea

    Pakkanen, J., 1996, III Convegno Internazionale di Archeologia e Informatica. III International Symposium on Computing and Archaeology. Moscati, P. & Mariotti, S. (eds.). Firenze, p. 693–702 (Archeologia e Calcolatori; vol. 7).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  494. Published

    The 1st European Stag Beetle Survey: preliminary results

    Campanaro, A., Al Fulaij, N., Bardiani, M., Corezzola, S., Della Rocca, F., Hardersen, S., Harvey, D., Hawes, C., Kadej, M., Karg, J., Mendez, M., Minari, E., Rink, M., Smolis, A., Sprecher-Uebersax, E., Thomaes, A., Toni, I., Vrezec, A., Zapponi, L., Zauli, A. & 2 others, Zilioli, M. & Chiari, S., Sep 2013, 4th meeting of the European Stag Beetle Group.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  495. Published

    The Agency Exerted by Analytic Systems on Public Sector Organisations: The Case of Controlling and Preventing a Life-Threatening Virus (Paper Development)

    Shahid, A. R. & Shaikh, S. E., 2018, International Federation for Information Processing (IFIP) WG 8.6.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  496. Published

    The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

    Shepherd, C., Gurulian, I., Frank, E., Markantonakis, K., Akram, R., Mayes, K. & Panaousis, E., 21 Dec 2017, Mobile Security Technologies (MoST '17), IEEE Security & Privacy Workshops. IEEE, p. 179-188 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  497. Published

    The Apriori Stochastic Dependency Detection (ASDD) algorithm for learning Stochastic logic rules

    Child, C. & Stathis, K., 2004, Computational logic in multi-agent systems (CLIMA 2004). Springer-Verlag, Vol. 3259. p. 234-249 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  498. Published

    The Asynchronous Bounded-Cycle Model

    Robinson, P. & Schmid, U., 2008, Stabilization, Safety, and Security of Distributed Systems, 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings. p. 246-262 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  499. In preparation

    The Banking Industry; Regulation and ‎Performance: A Data Envelopment Analysis on Total Factor ‎Productivity Changes

    Hassan, M. & Giouvris, E. (ed.), 2016, (In preparation) IFABS-International Finance and Banking Society: Corporate Finance Decisions in a Changing Global Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  500. Published

    The basic building blocks of information systems

    SERNADAS, A., FIADEIRO, J., SERNADAS, C. & EHRICH, H. D., 1989, INFORMATION SYSTEM CONCEPTS : AN IN-DEPTH ANALYSIS. FALKENBERG, ED. (ed.). AMSTERDAM: ELSEVIER SCIENCE PUBL B V, p. 225-246 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  501. Published

    The Beam Gas Vertex Profile Monitoring Station for HL-LHC

    Kieffer, R., Alexopoulos, A., Fosse, L., Gonzalez Berges, M., Gibson, S., Guerin, H., Jones, R., Marriott-Dodington, T., Storey, J., Veness, R., Vlachos, S., Würkner, B. & Zamantzas, C., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPGW082

    Research output: Chapter in Book/Report/Conference proceedingConference contribution