Home > Publications

Publications

3501 - 4000 out of 39,422Page size: 500
  1. Conference contribution › Research
  2. Published

    Hidden Markov Models with Confidence

    Cherubin, G. & Nouretdinov, I., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 128-144 17 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    High Frequency Electro-Optic Beam Position Monitors for Intra-Bunch Diagnostics at the LHC

    Gibson, S., Arteche, A., Bosco, A., Darmedru, P. Y., Lefevre, T. & Levens, T., Jan 2016, 4th International Beam Instrumentation Conference: IBIC2015, Melbourne, Australia. JACoW Publishing, p. 606-610 5 p. WEDLA02

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    High occupancy resource allocation for grid and cloud systems, a study with DRIVE

    Chard, K., Bubendorfer, K. & Komisarczuk, P., 2010, Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, HPDC 2010, Chicago, Illinois, USA, June 21-25, 2010. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. E-pub ahead of print

    High System-Code Security with Low Overhead

    Wagner, J., Kuznetsov, V., Candea, G. & Kinder, J., 20 Jul 2015, 2015 IEEE Symposium on Security and Privacy. IEEE, p. 866-879 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. E-pub ahead of print

    High-Precision Arithmetic in Homomorphic Encryption

    Chen, H., Laine, K., Player, R. & Xia, Y., 7 Mar 2018, Topics in Cryptology – CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings. Springer, p. 116-136 21 p. (Lecture Notes in Computer Science ; vol. 10808 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    History of Quaternary Science

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 10-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Host-Based Security Sensor Integrity in Multiprocessing Environments

    Mcevoy, R. & Wolthusen, S. D., May 2010, Information Security, Practice and Experience: 6th International Conference, ISPEC 2010. Springer-Verlag, p. 138-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Unpublished

    Household food waste simulation model: Investigation of interventions for staple food items waste

    Kandemir, C., Quested, T., Reynolds, C., Fisher, K. & Devine, R., 10 Jun 2019, (Unpublished) Household food waste simulation model: Investigation of interventions for staple food items waste.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    How ‘search’ Has Become the Watchword of the Digital Organisation

    Hafezieh, N. & Pollock, N., 2018, Academy of Management Proceedings. 1 ed. Academy of Management, Vol. 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    How ‘Search’ Has Become the Watchword of the Digital Organisation

    Hafezieh, N. & Pollock, N., 2018, Academy of Management Global Proceedings. 2018 ed. Academy of Management, Vol. Surrey.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    How damaging is caldera collapse for a volcanic edifice?

    Drymoni, K., Browning, J. & Gudmundsson, A., 2017, JOINT ASSEMBLY TSG-BGA-VMSG.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    How do knowledge workers with flexible jobs manage constant connectivity? An affordance perspective

    Farivar, F., Eshraghian, F. & Hafezieh, N., 2020, Academy of Management Proceedings. Academy of Management

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    How do management ideas diffuse? Lessons from the global spread of corporate social responsibility

    Preuss, L., Mar 2013, 40th annual conference of the Academy of International Business – UK and Ireland Chapter (AIB-UKI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    How Do Online Communities of Patients Aggregate on Twitter? An Affordance Perspective

    Bernardi, R., 11 Dec 2016, Proceedings of the Thirty Seventh International Conference on Information Systems: 2016 International Conference on Information Systems (ICIS 2016), December 11-14, 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Unpublished

    How Hezbollah affects Lebanon’s sovereignty

    Van Efferink, L., 2010, (Unpublished) Political Studies Association Graduate Network, University of Oxford.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Unpublished

    How important are national industrial relations systems in shaping restructuring in MNCs?

    Edwards, T., Coller, X., Ortiz, L., Rees, C. & Wortmann, M., Jul 2004, (Unpublished) IESE/DMU Conference on 'Multinationals and the International Diffusion of Organizational Forms and Practices'. Barcelona.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    How private is your period? A systematic analysis of menstrual app privacy policies

    Shipp, L. & Blasco Alis, J., 2020, Proceedings on Privacy Enhancing Technologies 2020 (PoPETs 2020). Vol. 2020(4). p. 491-510 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    How to give FAST Advice

    Stathis, K., 1 Oct 1994, Proceedings of the 7th Symposium and Exhibition on Industrial Applications of Prolog (INAP'94). p. 59-67 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    How to grant less permissions to facebook applications

    Costantino, G., Martinelli, F. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 55-60 6 p. 6947733

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    How to identify all cheaters in Pinch's scheme

    Yeun, C. Y. & Mitchell, C. J., 1998, Proceedings of JWIS '98, Singapore, December 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Human resource Management, Organisational Performance, Employee Attitudes and Behaviours: Exploring the linkages

    Tsai, C-J., Edwards, P. & Sen Gupta, S., 2007, European Academy of Management (EURAM), Paris, France.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Human rights policies and corporate financial performance: Evidence from UK corporations

    Preuss, L. & Brown, D., Mar 2010, annual meeting of the International Association for Business and Society .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Hungarian IT: Coping with economic transition and globalisation

    Harindranath, G., 2004, Proceedings of the 2004 European Conference on Information Systems (ECIS), Turku School of Economics and Business Administration, Turku, Finland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Hybrid metallic mesoscopic structures: Some unanswered questions

    Petrashov, V., 2003, TOWARDS THE CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPINTRONICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 255-261 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Hybrid Publicly Verifiable Computation

    Alderman, J., Janson, C., Crampton, J. & Cid, C., 2 Feb 2016, Topics in Cryptology - CT-RSA 2016. Sako, K. (ed.). Springer, Vol. 9610. p. 147-163 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Hydrogen Isotopes in Beetle Chitin

    Grocke, D., van Hardenbroeck, M., Elias, S. & Sauer, P., 2011, Chitin: Formation and Diagenesis. Gupta, S. N. (ed.). Springer, p. 105-116

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Hypersensitivity to perturbation on an NMR quantum computer

    Schack, R. & Brun, T. A., 2000, Quantum Communication, Computing, and Measurement 2. Kumar, P., D'Ariano, G. M. & Hirota, O. (eds.). New York: Kluwer, p. 257-262

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Hypersensitivity to perturbation: An information-theoretical characterization of classical and quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Communication, Computing, and Measurement. Hirota, O., Holevo, A. S. & Caves, C. M. (eds.). New York: Plenum Press, p. 317-330

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Hypertesting: The Case for Automated Testing of Hyperproperties

    Kinder, J., Mar 2015, 3rd Workshop on Hot Issues in Security Principles and Trust (HotSpot 2015). p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Hypothesis elimination on a quantum computer

    Soklakov, A. N. & Schack, R., 2004, Quantum Communication, Measurement and Computing (QCMC'04). Barnett, S. M. (ed.). Melville, New York: AIP Press, p. 151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    I feel attached: Motivation and Tourists’ Emotions as Antecedents of Place Attachment

    Prayag, G., Hosany, S. & Soscia, I., 2014, European Marketing Academy (EMAC) 43rd Annual Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Submitted

    I.R.R.I.T.A.T.E: Warning! This is an Artist's Book

    Sandhu, K., 2014, (Submitted) Perversions of Paper.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. E-pub ahead of print

    IBC-C: A Dataset for Armed Conflict Event Analysis

    Zukov Gregoric, A., Veyhe, B. & Luo, Z., Aug 2016, Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics: Aug 7 to 12th 2016. p. 374-379 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    ICARUS: Intelligent Coupon Allocation for Retailers Using Search

    Swift, S., Shi, A., Crampton, J. & Tucker, A., 2005, Proceedings of 2005 IEEE Congress on Evolutionary Computation. IEEE Computer Society Press, p. 182-189 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    ICT Adoption & Use in UK SMEs

    Harindranath, G., Dyerson, R. & Barnes, D., 2007, Proceedings of the European Conference on Information Management and Evaluation, Conservatoire National des Arts et Metiers (CNAM), Montpellier, France, September. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    ICT Enabling Customer Agility: A Dynamic Capabilities Perspective

    Elbanna, A., Hallikainen, P. & Merisalo-Rantanen, H., Dec 2017, Thirty Eighth International Conference on Information Systems (ICIS). South Korea

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    ICT in early education: reasons for insufficient application

    Stanisavljevic Petrovic, Z., Pavlovic, D. & Soler-Adillon, J., 21 Apr 2016, eLearning Vision 2020!: Proceedings of the 12th International Scientific Conference "eLearning and Software for Education" Bucharest, April 21 - 22, 2016 . Roceanu, I. (ed.). Budapest, Rumania: "Carol I" National Defense University, Vol. 2. p. 227 232 p. 36

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    ICT in small firms: Factors affecting the adoption and use of ICT in Southeast England SMEs

    Harindranath, G., Dyerson, R. & Barnes, D., 2008, Proceedings of the 2008 European Conference on Information Systems (ECIS), Galway, Ireland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    ICT in South African SMEs: A study of the Manufacturing and Logistics sectors: BEST PAPER in ICT, IT and E-Business in the Small Firm Sector track, 36th ISBE Conference 2013, Cardiff, UK

    Gono, S., Harindranath, G. & Özcan, G. B., 13 Nov 2013, Proceedings of ISBE 2013, November, Cardiff. 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    ICT use in SMES: A comparison between the North West of England and the Province of Genoa

    Dyerson, R., Harindranath, G., Barnes, D. & Spinelli, R., 2009, ICE-B 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS. SETUBAL: INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL, p. 244-251 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    ICT4DWhat? Using the Choice Framework to Operationalise the Capability Approach to Development

    Kleine, D., 19 Apr 2009, Proceedings of the IEEE/ACM International Conference on Information Technology and Development 2009 in Doha, Qatar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    ICTs and hope for development: a theoretical framework

    Krishna Raja Gopalan, S. & Heeks, R., 2015, IFIP WG 9.4: Social Implications of Computers in Developing Countries: 13th International Conference on Social Implications of Computers in Developing Countries. Oslo, p. 414-428 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Unpublished

    ICTs and the city: Impacts on place and mobility. A case study of Campinas, Brazil

    Poveda Villalba, S., 2014, (Unpublished) CivCity: Symposium on Civilisation, Infrastructure and the City. University College London Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Identification in the Limit of Substitutable Context Free Languages

    Clark, A. & Eyraud, R., 2005, Proceedings of The 16th International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. U. & Tomita, E. (eds.). p. 283-296

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Identification of malicious web pages through analysis of underlying DNS and web server relationships

    Seifert, C., Welch, I., Komisarczuk, P., Aval, C. U. & Endicott-Popovsky, B., 2008, LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings. p. 935-941 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Identification of malicious web pages through analysis of underlying DNS and web server relationships.

    Seifert, C., Welch, I., Komisarczuk, P., Aval, C. U. & Endicott-Popovsky, B., 2008, Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on. p. 935-941 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Identification of malicious web pages with static heuristics

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Identification of Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011. p. 33-40 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Identification of resource allocation trends in irregular ATM networks

    Cosmas, J., Pitts, J., Bocci, M., Luo, Z., Nyong, D. & Rai, S., Mar 1997, Proceeding of Fourth UKTS on Performance Modelling and Evaluation of ATM Networks. p. 24/1-24/12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Identifying and Analyzing Web Server Attacks

    Seifert, C., Endicott-Popovsky, B., Frincke, D. A., Komisarczuk, P., Muschevici, R. & Welch, I., 2008, Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008. p. 151-161 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Identifying manipulated images

    Nightingale, S., Wade, K. & Watson, D., Jun 2015, Society for Applied Research in Memory and Cognition.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Identifying patient experience from online resources via sentiment analysis and topic modelling

    Bahja, M. & Lycett, M., 6 Dec 2016, Proceedings - 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT 2016. Association for Computing Machinery, Inc, p. 94-99 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    IDENTIFYING THE RISKS ASSOCIATED WITH AGILE SOFTWARE DEVELOPMENT: AN EMPIRICAL INVESTIGATION

    Elbanna, A., 2014, ..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Igneous Intrusions in the Carnarvon Basin, NW Shelf, Australia

    McClay, K., Scarselli, N. & Jitmahantakul, S., 31 Aug 2013, Proceedings of the Western Australian Basins Conference. 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Il 'Furioso' spiritualizzato

    Anelotti, A., 2019, ‘Dreaming again on things already dreamed’: 500 years of 'Orlando Furioso' (1516-2016) . Dorigatti, M. & Pavlova, M. (eds.). Oxford-New York: Peter Lang

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Unpublished

    Illiquidity, investment styles and January returns in United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Corporate Finance Decisions in a Changing Global Environment, International Finance and Banking Society (IFABS) Asia 2016 Brunei Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. In preparation

    IMMIGRATION AND NEO-LIBERALISM: THREE STORIES AND COUNTER ACCOUNTS

    Agyemang, G., Lehman, C. R. & Annisette, M., 9 Jul 2013, (In preparation) IMMIGRATION AND NEO-LIBERALISM: THREE STORIES AND COUNTER ACCOUNTS.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Implementable Internationalization Strategies for Companies from Emerging Economies

    Aboutalebi, R., 23 Nov 2011, In: EAMSA (Euro-Asia Management Studies Association), 28th Annual Conference: Strategies of international development in Euro-Asian Business. 23-26 November 2011, University of Gothenburg, Gothenburg, Sweden.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Implementation aspects of SET/EMV

    Jarupunphol, P. & Mitchell, C. J., 2002, Towards the Knowledge Society: eCommerce, eBusiness and eGovernment, The 2nd IFIP Conference on e-commerce, e-business and e-government, IFIP I3E 2002, Lisbon, Portugal, October 2002. Monteiro, J. L., Swatman, P. M. C. & Tavares, L. V. (eds.). Kluwer Academic Publishers, p. 305-315 11 p. (IFIP Conference Proceedings; no. 233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Implementation of a component-by-component algorithm to generate small low-discrepancy samples

    Doerr, B., Gnewuch, M. & Wahlström, M., 1 Jul 2009, Monte Carlo and Quasi-Monte Carlo Methods 2008. L'Ecuyer, P. & Owen, A. B. (eds.). Montreal, Canada: Springer, p. 323-338 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Implementation of agents for connection admission control on an ATM testbed

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 2000, On The Way to Information Society: Five Years of European ACTS Research on Intelligence in Services and Networks. IOS Press, p. 413-426

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Implementation of CERN Secondary Beam Lines T9 and T10 in BDSIM

    D'Alessandro, G. L., Boogert, S., Gibson, S., Nevay, L., Shields, W., Bernhard, J., Gerbershagen, A. & Rosenthal, M. S., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 3746-3748 3 p. THPGW069

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Implementation techniques for inductive types in Plastic

    Callaghan, P. & Luo, Z., 2000, Types for Proofs and Programs, Proc of Inter Conf of TYPES'99. LNCS 1956.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Implementing a Caching Service for Distributed CORBA Objects

    Chockler, G., Dolev, D., Friedman, R. & Vitenberg, R., 2000, Proceedings of the 2nd IFIP/ACM International Conference on Distributed systems platforms (Middleware '00). Springer-Verlag, p. 1-23 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Implementing a model checker for Lego

    Yu, S. & Luo, Z., 1997, Proc. of the 4th Inter Symp. of Formal Methods Europe, FME'97: Industrial Applications and Strengthened Foundations of Formal Methods. LNCS 1313.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Implementing Candidate Graded Encoding Schemes from Ideal Lattices

    Albrecht, M., Cocis, C., Laguillaumie, F. & Langlois, A., 30 Dec 2015, Advances in Cryptology – ASIACRYPT 2015. Iwata, T. & Cheon, J. H. (eds.). Springer, p. 752-775 24 p. ( Lecture Notes in Computer Science; vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. E-pub ahead of print

    Implementing Grover Oracles for Quantum Key Search on AES and LowMC

    Jaques, S., Naehrig, M., Roetteler, M. & Virdia, F., 1 May 2020, Advances in Cryptology – EUROCRYPT 2020. Springer, p. 280-310 31 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    IMPORTANT DETERMINANTS OF FOREIGN COMPANY PERFORMANCE IN CHINA: BIG DATA ANALYSIS

    Wang, C. & Giouvris, E., 2018, BAI-winter Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Impostor: A single sign-on system for use from untrusted devices

    Pashalidis, A. & Mitchell, C. J., 2004, Proceedings of IEEE Globecom 2004, Global Telecommunications Conference, Dallas, Texas, USA, November/December 2004. IEEE, Vol. 4. p. 2191-2195

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. E-pub ahead of print

    Improved Classical Cryptanalysis of SIKE in Practice

    Costello, C., Longa, P., Naehrig, M., Renes, J. & Virdia, F., 29 Apr 2020, Public-Key Cryptography – PKC 2020. Springer, p. 505-534 30 p. (Lecture Notes in Computer Science; vol. 12111).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Improved Higgs Naturalness with Supersymmetry

    Gripaios, B. & West, S., 30 Oct 2006, Proceedings of SUSY06.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage

    Lacharite, M-S., Minaud, B. & Paterson, K., 26 Jul 2018, 2018 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Improved Security Notions for Proxy Re-Encryption to Enforce Access Control

    Lee, E., 20 Jul 2019, Progress in Cryptology – LATINCRYPT 2017: International Conference on Cryptology and Information Security in Latin America. Springer, p. 66-85 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. E-pub ahead of print

    Improving Air Interface User Privacy in Mobile Telephony

    Khan, M. & Mitchell, C. J., 9 Dec 2015, Security Standardisation Research, Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 165-184 20 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Improving IP address autoconfiguration security in MANETs using trust modelling

    Hu, S. & Mitchell, C. J., 2005, Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedings. Jia, X., Wu, J. & He, Y. (eds.). Springer-Verlag, Vol. 3794. p. 83-92 10 p. (Lecture Notes in Computer Science; vol. 3794).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Improving model quality through foundational ontologies: Two contrasting approaches to the representation of roles

    de Cesare, S., Henderson-Sellers, B., Partridge, C. & Lycett, M., 2015, Advances in Conceptual Modeling - ER 2015 Workshops, AHA, CMS, EMoV, MoBiD, MORE-BI, MReBA, QMMQ, and SCME, Proceedings. Springer Verlag, Vol. 9382. p. 304-314 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9382).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Improving Planning Performance in PDDL+ Domains via Automated Predicate Reformulation

    Franco, S., Vallati, M., Lindsay, A. & McCluskey, T. L., 2019, Computational Science - ICCS 2019 : 19th International Conference, Faro, Portugal, June 12–14, 2019, Proceedings, Part V. Rodrigues, J. M. F., Cardoso, P. J. S., Monteiro, J. M., Lam, R., Krzhizhanovskaya, V. V., Lees, M. H., Dongarra, J. J. & Sloot, P. M. A. (eds.). Springer, Vol. 11540. p. 491-498 8 p. (Lecture Notes in Computer Science; vol. 11540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Improving Reliable Probabilistic Prediction by Using Additional Knowledge

    Nouretdinov, I., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). Vol. 60. p. 193-200 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Improving Self-organized Resource Allocation with Effective Communication

    Kafali, O. & Yolum, P., 2012, Agents and Peer-to-Peer Computing. Beneventano, D., Despotovic, Z., Guerra, F., Joseph, S., Moro, G. & Pinninck, A. (eds.). Springer Berlin / Heidelberg, Vol. 6573. p. 35-46 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Improving the mental health of BME men: Researching men's experiences

    Robinson, M., Keating, F. & Robertson, S., 18 Nov 2013, Journal of Mens Health. 3 ed. Vol. 7. p. 304 305 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities

    Coles-Kemp, L., Jensen, R. B. & Talhouk, R., Apr 2018, CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-13 13 p. 584

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    In search for theory: What hampers innovation

    Guenther, E., Hueske, A-K., Hoelzle, K., Kesting, P., Linnenluecke, M. & Preuss, L., Aug 2011, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Incentive Engineering for Outsourced Computation in the Face of Collusion

    Rezaei Khouzani, M., Pham, V. & Cid, C., 2014, Proceedings of WEIS 2014 – 13th Annual Workshop on the Economics of Information Security,. 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. E-pub ahead of print

    Increasing the Security of Wireless Communication through Relaying and Interference Generation

    Rose, L., Quaglia, E. & Valentin, S., 11 May 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Incubating New Entrepreneurship Practices: The Case of Plan9 Incubator in Pakistan

    Shahid, A. R. & Morlacchi, P., 2019, Fourth Annual Entrepreneurship as Practice Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. E-pub ahead of print

    In-Cycle Sequential Topology Faults and Attacks: Effects on State Estimation

    Gul, A. & Wolthusen, S., 30 Dec 2018, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (eds.). Springer Verlag, p. 17-28 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard

    Baiocco, A. & Wolthusen, S., 2018, Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Individuals’ smartphone security behaviour: similarities and differences in developing countries

    Shah, M. & Ameen, N., 2019, Data, Organisations and Society Conference, Coventry University.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Indonesian tectonics: Subduction, extension, provenance and more

    Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-360 1-13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Inducing Syntactic Categories by Context Distribution Clustering

    Clark, A., 2000, Proc. of Conference on Computational Natural Language Learning. p. 91-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Inductive Confidence Machine for pattern recognition

    Surkov, D., Gammerman, A. & Vovk, V., 2002, Proceedings of the ICDM 2002 Workshop on the Foundation of Data Mining and Knowledge Discovery. Lin, T. & Ohsuga, S. (eds.). Shimane Medical University, p. 249-255 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Inductive confidence machines for regression

    Papadopoulos, H., Proedrou, K., Vovk, V. & Gammerman, A., 2002, Proceedings of the Thirteenth European Conference on Machine Learning. Elomaa, T., Mannila, H. & Toivonen, H. (eds.). London: Springer, p. 345-356 12 p. (Lecture Notes in Computer Science; vol. 2430).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Inductive Conformal Martingales for Change-Point Detection

    Volkhonskiy, D., Burnaev, E., Nouretdinov, I., Gammerman, A. & Vovk, V., 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). p. 1-22 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Inductive Venn-Abers Predictive Distribution

    Nouretdinov, I., Volkhonskiy, D., Lim, P., Toccaceli, P. & Gammerman, A., Jun 2018, 7th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2018). Vol. 91. p. 15-36 22 p. (Proceedings of Machine Learning Research).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Inferring protein-protein interactions using interaction network topologies

    Paccanaro, A., Trifonov, V., Yu, H. & Gerstein, M. B., 2005, Proceedings of the International Joint Conference on Neural Networks. p. 161 166 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Influence of erosion on the kinematics of bivergent orogens: Results from scaled sandbox simulations

    Hoth, S., Adam, J., Kukowski, N. & Oncken, O., 2006, TECTONICS, CLIMATE, AND LANDSCAPE EVOLUTION. Willett, SD., Hovius, N., Brandon, MT. & Fisher, DM. (eds.). BOULDER: GEOLOGICAL SOC AMER INC, p. 201-225 25 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Influence of normal-faults on magma propagation with examples from the Hafnarfjall caldera, Iceland, and Santorini, Greece

    Browning, J., Gudmundsson, A. & Drymoni, K., 2019, LASI VI.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Influence of product manufacturing, supplier and technology selection in the configuration of the UK composites supply chain

    Coronado Mondragon, A. E., Mastrocinque, E. & Hogg, P., 15 Jun 2015, Proceedings of the International Conference on Engineering Technologies, Engineering Education and Engineering Management (ETEEEM 2014), Hong Kong, 15-16 November 2014. Tan, D. (ed.). CRC Press, p. 1079–1082 4 p. 235

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Information and available work in the perturbed baker's map

    Schack, R. & Caves, C. M., 1993, Workshop on Physics and Computation: PhysComp '92. Los Alamitos, California: IEEE Computer Society Press, p. 69-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Unpublished

    Information and consultation during takeovers in the UK: the IAG/BMI case

    Rees, C. & Gold, M., Mar 2015, (Unpublished) 'Infpreventa' Project Final Conference. Sofia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Informational and computation efficiency of set predictors

    Vovk, V., Sep 2012, Proceedings of the Fifth Workshop on Information-Theoretic Methods in Science and Engineering. de Rooij, S., Kotlowski, W., Rissanen, J., Millimaki, P., T. R. & Yamanishi, K. (eds.). Amsterdam: CWI, p. 48-51 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    InfoSec Cinema: Using Films for Information Security Teaching

    Blasco Alis, J. & Quaglia, E., 2018, ASE '18: 2018 USENIX Workshop on Advances in Security Education. USENIX, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Published

    Inhibiting Card Sharing Attacks

    Tunstall, M., Markantonakis, K. & Mayes, K., 2006, Advances in Information and Computer Security. Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y. & Kawamura, S. (eds.). Springer Berlin / Heidelberg, Vol. 4266. p. 239-251 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  105. Published

    Innovating for corporate social responsibility: Integrating societal, industry, firm and individual level factors

    Preuss, L. & Dyerson, R., Apr 2011, Symposium on Corporate Responsibility and Innovation.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. Published

    Insect fossil evidence on late Wisconsin environments of the Bering Land Bridge: new data on the nature and timing of inundation

    Elias, S., 1996, American Beginnings, The Prehistory and Palaeoecology of Beringia. West, F. H. (ed.). Chicago: University of Chicago Press, p. 110-119

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  107. Published

    Insect Fossils

    Elias, S., 1995, Stratigraphy and Paleoenvironments of Late Quaternary Valley Fills on the Southern High Plains. Holliday, V. T. (ed.). Boulder, Colorado: Geological Society of America, Vol. Memoir 186. p. 50-53.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  108. Published

    Insect fossils and Late Quaternary environments of the Chihuahuan Desert.

    Elias, S., 1999, Fourth Symposium on Resources of the Chihuahuan Desert. Barlow, J. C. & Miller, D. J. (eds.). Fort Davis, Texas: Chihuahuan Desert Research Institute, p. 1-10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    Insights into the metabolism and ecophysiology of three acidithiobacilli by comparative genome analysis

    Valdes, J., Pedroso, I., Quatrini, R., Hallberg, K. B., Valenzuela, P. D. T. & Holmes, D. S., 2007, BIOHYDROMETALLURY: FROM THE SINGLE CELL TO THE ENVIRONMENT. Schippers, A., Sand, W., Glombitza, F. & Willscher, S. (eds.). STAFA-ZURICH: TRANS TECH PUBLICATIONS LTD, p. 439-442 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  110. Published

    Installing fake root keys in a PC

    Alsaid, A. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, Vol. 3545. p. 227-239 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  111. Published

    Installing micros in clinics: options and essentials

    Berger, M., 1989, Clinic Services: Monitoring, Evaluation and Microcomputers: Occasional Papers, No.1. Berger, M. (ed.). Association for Child Psychology and Psychiatry

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  112. Published

    Institutional approaches and strategies of control and collaboration

    Kromidha, E., 2015, Proceedings of IFIP 9.4: 13th Conference on Social Implications of Computers in Developing Countries, 20-22 May 2015. Negombo, Sri Lanka

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  113. Published

    Institutions for Behaviour Specification

    Fiadeiro, J. L. & Costa, J. F., 1995, COMPASS/ADT. Springer, Vol. 906. p. 273-289 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  114. Published

    Institutions trust institutions: critiques of the BP/Tate partnership by artists

    Chong, D., 2011, 37th Annual Macromarketing Conference (Williamsburg, VA: College of William and Mary).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  115. Published

    Instructors as Designated Leaders for Fostering Online Engagement: The Case of Online Learning Communities

    Wallace, A. & Panteli, N., 2016, Mediterranean Conference on Information Systems, MCIS2016: Track: E-learning. September 4-6, 2016, Paphos, Cyprus

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  116. Published

    Integrated Simulation Tools for Collimation Cleaning in HL-LHC

    CERN Collimation Team, Gibson, S. & Nevay, L., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 160-162 3 p. MOPRO039

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  117. Published

    Integrating Induction and Coinduction via Closure Operators and Proof Cycles

    Cohen, L. & Rowe, R. N. S., 24 Jun 2020, Automated Reasoning - 10th International Joint Conference, IJCAR 2020, Proceedings. Peltier, N. & Sofronie-Stokkermans, V. (eds.). Springer, p. 375-394 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12166 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  118. Published

    Integrating OAuth with Information Card Systems

    Al-Sinani, H. S., 2011, Proceedings of IAS '11: 7th International Conference on Information Assurance and Security, Malacca, Malaysia, 5-8 December 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  119. Forthcoming

    Intelligent Exploration and Autonomous Navigation in Confined Spaces

    Akbari, A. & Bernardini, S., 1 Jul 2020, (Accepted/In press) International Conference on Intelligent Robots and Systems (IROS): 2020 IEEE/RSJ. IEEE Xplore, 1209

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  120. Published

    Interactions between insects and mycorrhizal fungi

    Gange, A. & Bower, E., 1997, MULTITROPHIC INTERACTIONS IN TERRESTRIAL SYSTEMS. OXFORD: BLACKWELL SCIENCE PUBL, p. 115-132 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  121. Published

    INTERACTIONS BETWEEN SOIL-DWELLING INSECTS AND MYCORRHIZAS DURING EARLY PLANT SUCCESSION

    Gange, A. & BROWN, V. K., 1992, MYCORRHIZAS IN ECOSYSTEMS. WALLINGFORD: C A B INTERNATIONAL, p. 177-182 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  122. Published

    Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments

    Lunden, N., Sveen, R., Lund, H., Svendsen, N. & Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 171-183

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  123. Published

    Interconnecting formalisms: Supporting modularity, reuse and incrementality

    Fiadeiro, J. L. & Maibaum, T., 1 Jan 1995, Proceedings of the Third ACM SIGSOFT Symposium on Foundations of Software Engineering. ACM Press, p. 72-80 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  124. Published

    Interconnecting objects via contracts

    Fiadeiro, J. L. & Andrade, L. F., 1 Jan 2001, 38th International Conference on Technology of Object-Oriented Languages and Systems, Components for Mobile Computing. p. 182 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  125. Published

    Interconnecting Objects Via Contracts

    Andrade, L. F. & Fiadeiro, J. L., 1999, UML. Springer, Vol. 1723. p. 566-583 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  126. Published

    Inter-Continental Strategy Implementation

    Aboutalebi, R., Tan, H. & Lobo, R., 27 Nov 2013, In: EAMSA (Euro-Asia Management Studies Association), 30th Annual Conference of EAMSA: Innovation in Asia and Europe Approaches and Answers to new Challenges. Institute of East Asian Studies (IN-EAST); 27-30 November 2013, University of Duisburg-Essen, Duisburg, Germany.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  127. Unpublished

    Intercultural Communication of Chinese Traditional Opera Programs under the View of Deconstructionism

    Li, X., 13 Aug 2018, (Unpublished) Second World Conference of Chinese Studies & 17th Intl. Conference on the Digitalization of Premodern Chinese Novel & Drama.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  128. Published

    Inter-domain role mapping and least privilege

    Chen, L. & Crampton, J., 2007, Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 157-162 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  129. Published

    Interfirm relational governance through media choice and communication practices in the coopetitive context

    Lee, J. Y. H., Saunders, C. & Panteli, N., 30 Oct 2018, International Conference on Information Systems 2018, ICIS 2018. Association for Information Systems, (International Conference on Information Systems 2018, ICIS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  130. Published

    Interleaving Search and Heuristic Improvement

    Franco, S. & Torralba, Á., 5 Jul 2019, Proceedings of the Twelfth International Symposium on Combinatorial Search, SOCS 2019, Napa, California, 16-17 July 2019. Surynek, P. & Yeoh, W. (eds.). AAAI Press, p. 130-134 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  131. Published

    International Manufacturing Strategies: A Taxonomy

    Aboutalebi, R., 6 Sep 2016, In: BAM (British Academy of Management), 30th Annual Conference of BAM: Thriving in Turbulent Time. 06-08 September 2016, Newcastle University, England, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  132. Published

    Internet background radiation arrival density and network telescope sampling strategies

    Pemberton, D., Komisarczuk, P. & Welch, I., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 246-252 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  133. Published

    Internet Sensor Grid: Experiences with Passive and Active Instruments

    Komisarczuk, P. & Welch, I., 2010, Communications: Wireless in Developing Countries and Networks of the Future - Third IFIP TC 6 International Conference, WCITD 2010 and IFIP TC 6 International Conference, NF 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings. p. 132-145 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  134. Published

    Internet Users' Security and Privacy While They Interact with Amazon

    Bella, G. & Coles-Kemp, L., 2011, Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, p. 878-883 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  135. Published

    Interoperability of security and quality of Service Policies Over Tactical SOA

    Gkioulos, V., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J. & Wolthusen, S., 13 Feb 2017, Proceedings of the 2016 Symposium on Computational Intelligence (SSCI 2016) . p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  136. Published

    Interorganisational information sharing and the use of category management

    Feldberg, F. & van der Heijden, H., 2003, Proceedings of the 16th Bled Electronic Commerce conference. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  137. E-pub ahead of print

    Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

    Crampton, J. & Sellwood, J., 2 Jul 2016, Data and Applications Security and Privacy XXX. Springer-Verlag, Vol. 9766. p. 96-105 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  138. Unpublished

    Inter-temporal variation in the illiquidity premium and its relationship with monetary conditions within the United Kingdom market

    Said, H. & Giouvris, E., 2015, (Unpublished) Banking, Financial markets, risk and financial vulnerability, 5th International Conference of the Financial Engineering and Banking Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  139. Published

    Intriguing Properties of Adversarial ML Attacks in the Problem Space

    Pierazzi, F., Pendlebury, F., Cortellazzi, J. & Cavallaro, L., 30 Jul 2020, IEEE Symposium on Security and Privacy (IEEE S&P). IEEE, p. 1332-1349 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  140. Published

    Intrinsic circuit evolution using programmable analogue arrays

    Flockton, S. J. & Sheehan, K., 1998, EVOLVABLE SYSTEMS: FROM BIOLOGY TO HARDWARE. Sipper, M., Mange, D. & PerezUribe, A. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-153 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  141. Published

    Introducing probabilities in contract-based approaches for mobile application security

    Dini, G., Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer-Verlag, Vol. 8247 LNCS. p. 284-299 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  142. E-pub ahead of print

    Intrusion Detection in Robotic Swarms

    Sargeant, I. & Tomlinson, A., 24 Aug 2019, Proceedings of SAI Intelligent Systems Conference. Bi, Y., Bhatia, R. & Kapoor, S. (eds.). Springer, Vol. 2. p. 968-980 13 p. (Advances in Intelligent Systems and Computing; vol. 1038).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  143. Published

    Intuiting Form: Memory and (Dis)continuity in Enescu's Piano Quintet, Op. 29

    Savage-Hanford, J., 2017, Proceedings of the "George Enescu" International Musicology Symposium 2017. Cosma, M. (ed.). Bucharest: Editura Muzicala

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  144. Published

    Invariant statistics and coding of natural microimages

    Geman, D. & Koloydenko, A., 1999, IEEE Workshop on Statistical and Computational Theories of Vision.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  145. Published

    Invariants of Finite Groups and Involutive Division

    Cid, C. & Plesken, W., 2001, Computer Algebra in Scientific Computing CASC 2001. Springer, p. 123-135 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  146. Published

    Investigating Outward FDI by Indian MNEs in the UK

    Aboutalebi, R. & Tan, H., 29 Mar 2012, In: AIB (Academy of International Business), 39th Academy of International Business: New Global Developments and the Changing Geography of International Business. 29-31 March 2012, the University of Liverpool, Liverpool, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  147. E-pub ahead of print

    Investigating the Applicability of Distributed Ledger/Blockchain Technology in Manufacturing and Perishable Goods Supply Chains

    Coronado Mondragon, A., Coronado, C. & Coronado, E., 16 May 2019, 2019 IEEE 6th International Conference on Industrial Engineering and Applications (ICIEA). Tokyo, Japan: IEEE Xplore, p. 728-732 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  148. Published

    Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM

    Wetherall, J., Taylor, M. & Hurley-Smith, D., 2 Nov 2015, 2015 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, p. 81-84 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  149. Published

    Investigation of CLIC 380 GeV Post-Collision Line

    Bodenstein, R., Abramov, A., Boogert, S., Burrows, P., Nevay, L., Schulte, D. & Tomás, R., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 528-531 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  150. Published

    Investigation of the fatigue failure mechanisms for stitched and unstitched unidirectional composites

    Zhang, C., Jamshidi, M., Barnes, S., Cauchi-Savona, S., Rouse, J., Bradley, R., Withers, P. & Hogg, P., 1 Dec 2011, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  151. Unpublished

    Investment styles and the potential of using illiquidity as an investment style in United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Banking, Finance and Institutions: Stability and Risk, 6th International Conference of the Financial Engineering and Banking Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  152. Published

    IP access service provision for broadband customers

    Komisarczuk, P., 1999, Services Over the Internet-What Does Quality Cost?(Ref. No. 1999/099), IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  153. Published

    Iron homeostasis strategies in acidophilic iron oxidizers: Comparative genomic analyses

    Quatrini, R., Martinez, V., Osorio, H., Veloso, F. A., Pedroso, I., Valdes, J., Jedlicki, E. & Holmes, D. S., 2007, BIOHYDROMETALLURY: FROM THE SINGLE CELL TO THE ENVIRONMENT. Schippers, A., Sand, W., Glombitza, F. & Willscher, S. (eds.). STAFA-ZURICH: TRANS TECH PUBLICATIONS LTD, p. 531-534 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  154. Published

    Is entity authentication necessary?

    Mitchell, C. J. & Pagliusi, P., 2004, Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19 2002, Revised Papers. Springer-Verlag, Vol. 2004. p. 20-33 14 p. (Lecture Notes in Computer Science; vol. 2845).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  155. Unpublished

    Is Islam still the Solution? Clerical Elites and Muslim Extremism in Post Arab- Spring Middle East: Panel on Extremism in Post-Arab Spring MENA: Origins and Catalysts for the Rise of Extremist Movements

    Kalantari, M., 4 Mar 2015, (Unpublished) Royal Holloway University of London Politics and International Relations Department’s 10th Anniversary Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  156. Unpublished

    Is social inclusion the same for all? Critical Internet use as a tool to attend individual needs in Brazil

    Poveda Villalba, S., 2013, (Unpublished) Is social inclusion the same for all? Critical Internet use as a tool to attend individual needs in Brazil. Human Development and Capability Association (HDCA)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  157. Published

    Island Grammar-Based Parsing Using GLL and Tom

    Afroozeh, A., Bach, J-C., van den Brand, M., Johnstone, A., Manders, M., Moreau, P-E. & Scott, E., 2013, Software Language Engineering Lecture Notes in Computer Science : 5th International Conference, SLE 2012, Dresden, Germany, September 26-28, 2012, Revised Selected Papers. p. 224-243 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  158. Published

    Issues of Security with the Oswald-Aigner Exponentiation Algorithm

    Walter, C. D., 2004, CT-RSA 2004. Okamoto, T. (ed.). Springer, Vol. 2964. p. 208-221 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  159. Published

    IT Enactment of New Public Management in Africa: The Case Study of Health Information Systems in Kenya

    Bernardi, R., 2009, Proceedings of the 9th European Conference on e-Government. Remenyi, D. (ed.). Reading: Academic Publishing Ltd, p. 129-136

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  160. Published

    Italianisierte Formen in 'Les Troyens'

    Charlton, D., 2011, Berlioz' 'Troyens' und Halévys 'Juive' im Spiegel der Grand Opéra. Stuttgart: Franz Steiner Verlag, p. 83-96 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  161. Published

    IT-enabled change into the structures of Health Information Systems in Africa: a case study in Kenya

    Bernardi, R., 2009, ECIS09 Proceedings. Newell, S., Whitley, E., Pouloudi, N., Wareham, J. & Mathiassen, L. (eds.). Padova: CLEUP

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  162. Published

    ITS and Smart Grid Networks for Increasing Live Shellfish Value

    Coronado Mondragon, A. E. & Coronado, E. S., 16 Jun 2014, 10th ITS European Congress. Helsinki, 9 p. TP0115

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  163. Published

    Jakstab: A Static Analysis Platform for Binaries

    Kinder, J. & Veith, H., 2008, Proc. 20th Int. Conf. Computer Aided Verification (CAV 2008). Springer, p. 423-427

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  164. Published

    Jean de La Taille et la scénographie du "creux": Saül le furieux (1572)

    Chesters, T., 2005, Dramaturgies de l'ombre: spectres et fantômes au théâtre. Lavocat, F. & Lecercle, F. (eds.). Presses Universitaires de Rennes, p. 101-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  165. Published

    Johann Friedrich Fasch’s Mich vom Stricke meiner Sünden – a work for Zerbst?

    Springthorpe, N., 2007, Johann Friedrich Fasch als Instrumentalkomponist: Bericht über die Internationale Wissenshaftliche Konferenz am 8. und 9. April 2005 im Rahmen der 9. International Fasch-Festtage in Zerbst.: Schriften zur mitteldeutschen Musikgeschichte der Ständigen Konferenz Mitteldeutsche Barockmusik in Sachsen, Sachsen-Anhalt und Thüringen e.V. Band 14. Musketa, K. (ed.). Beeskow: Ortus Musikverlag, Vol. 14. p. 207-224 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  166. Published

    Joining the dots: exploring technical and social issues in e-Science approaches to linking landscape and artifactual data in British archaeology

    Gosden, C., Kamash, Z., Kirkham, R. & Pybus, J., 2009, E-science workshops 2009: 5th IEEE International Conference. p. 171-174

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  167. Published

    Joyce In The Shadow Of War And Fascism: A Review Of Finnegans Wake By Mario Praz (1939)

    Fordham, F., 2017, Joyce Studies in Italy. Ruggieri, F. (ed.). Rome, Vol. 19. p. 301-322 22 p. (Joyce Studies in italy; vol. 19).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  168. Published

    k-Distinct In- and Out-Branchings in Digraphs

    Gutin, G., Reidl, F. & Wahlstrom, M., 2017, 44th International Colloquium on Automata, Languages, and Programming: ICALP 2017. Dagstuhl, p. 1-13 13 p. (Leibniz International Proceedings in Informatics ; vol. 80).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  169. Published

    Kernelization of Constraint Satisfaction Problems: A Study through Universal Algebra

    Lagerkvist, V. & Wahlstrom, M., 2017, Principles and Practice of Constraint Programming: 23rd International Conference, CP 2017, Melbourne, VIC, Australia, August 28 – September 1, 2017, Proceedings. Springer, p. 157-171 15 p. (Lecture Notes in Computer Science; vol. 10416).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  170. Published

    Key distribution without individual trusted authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, Proceedings: The 8th IEEE Computer Security Foundations Workshop, Kenmare, Co. Kerry, Ireland, June 1995. IEEE Computer Society Press, p. 30-36 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  171. Published

    Key escrow in multiple domains

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of INFOSEC'COM '97, Paris, June 1997. p. 101-116 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  172. Published

    Key escrow in mutually mistrusting domains

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1997, Security Protocols - Proceedings, International Workshop, Cambridge, April 1996. Lomas, M. (ed.). Springer-Verlag, p. 139-153 15 p. (Lecture Notes in Computer Science; no. 1189).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  173. Published

    Key Management for Secure Demand Data Communication in Constrained Micro-Grids

    Kayem, A. V. D. M., Strauss, H., Wolthusen, S. & Meinel, C., 2016, Advanced Information Networking and Applications Workshops (WAINA), 2016 30th International Conference on. IEEE Press, p. 585-590 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  174. Published

    Key minimal authentication systems for unconditional secrecy

    Godlewski, P. & Mitchell, C. J., 1990, Advances in Cryptology - Eurocrypt '89. Quisquater, J-J. & Vandewalle, J. (eds.). Springer-Verlag, p. 497-501 5 p. (Lecture Notes in Computer Science; no. 434).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  175. Published

    Key recovery and forgery attacks on the MacDES MAC algorithm

    Coppersmith, D., Knudsen, L. R. & Mitchell, C. J., 2000, Advances in Cryptology - Proceedings of Crypto 2000. Bellare, M. (ed.). Springer-Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science; no. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  176. Published

    Key recovery attacks on MACs based on properties of cryptographic APIs

    Brincat, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 63-72 10 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  177. Published

    Key recovery for archived data using smart cards

    Rantos, K. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 75-85 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  178. Published

    Key recovery in ASPeCT authentication and initialisation of payment protocol

    Rantos, K. & Mitchell, C. J., 1999, Proceedings of the 4th ACTS Mobile Communications Summit, Sorrento, Italy, June 1999. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  179. Published

    Key recovery scheme interoperability - a protocol for mechanism negotiation

    Rantos, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  180. E-pub ahead of print

    Key Rotation for Authenticated Encryption

    Everspaugh, A., Paterson, K., Ristenpart, T. & Scott, S., 2 Aug 2017, Advances in Cryptology – CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part III. Springer, p. 98-129 32 p. (Lecture Notes in Computer Science ; vol. 10403 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  181. Published

    Knowledge Intensive R&D? Employment Practices of Foreign invested R&D Centres in China

    Zheng, Y., Mar 2013, International Labour Process Conference, Rutgers University, NJ, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  182. Published

    Knowledge management in small firms

    Panyasorn, J., Panteli, N. & Powell, P., 2009, Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises : IFIP WG 8.2 International Conference, CreativeSME 2009, Proceedings. Dhillon, G., Stahl, B. C. & Baskerville, R. (eds.). Springer, p. 192-210 19 p. (IFIP Advances in Information and Communication Technology; vol. 301).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  183. Published

    Knowledge management orientation, product innovation and shared vision: an integration and empirical examination of performance effects

    Wang, C. L., Ahmed, P. K. & Rafiq, M., 2007, British Academy of Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  184. Published

    Knowledge management orientation, shared vision, and product innovation: An integration and empirical examination of performance effects

    Wang, C. L., Ahmed, P. K. & Rafiq, M., 2008, Academy of Management Annual Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  185. Published

    Knowledge Management System’s Characteristics that facilitate Knowledge Sharing to Support Decision Making Processes in Multinational Corporations

    Abdelrahman, M. & Papamichail, K., 2011, 17th Americas Conference on Information Systems AMCIS. Detroit, Michigan, USA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  186. Published

    Knowledge Sharing to Support Decision Making Processes in Multinational Corporations

    Abdelrahman, M. & Papamichail, K., 2013, 26th European Conference on Operational Research. Rome, Italy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  187. Published

    Knowledge, learning and transformation in transnational sites: relationship asymmetry, politics and institution building

    Clark, E., 2005, The end of transformation?. Lang, R. (ed.). Munich: Rainer Hampp Verlag, p. 281-304 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  188. Published

    Kolmogorov's complexity conception of probability

    Vovk, V., 2001, Probability Theory: Philosophy, Recent History and Relations to Science. Dordrecht: Kluwer, p. 51-69 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  189. Published

    La comédie lyrique au temps de Diderot

    Charlton, D., 2016, Music et pantomime dans 'Le Neveu de Rameau'. Salaün, F. & Taïeb, P. (eds.). Paris: Hermann Editeurs, p. 50-77 28 p. (Fictions pensantes).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  190. Published

    La penna e il pennello. Retoriche a confronto

    Jossa, S., Hendrix, H. (ed.) & Procaccioli, P. (ed.), 2008, Officine del nuovo. Sodalizi fra letterati, artisti ed editori nella cultura italiana fra Riforma e Controriforma. Atti del Simposio internazionale, Utrecht, 8-10 novembre 2007. Roma: Vecchiarelli

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  191. Forthcoming

    La relación entre la música, coreografía y elementos plásticos de El sombrero de tres picos (1919)

    Camacho Acevedo, L., 2 Oct 2020, (Accepted/In press) Repensar El sombrero de tres picos cien años después.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  192. Published

    La Rencontre de l'ancien et du nouveau dans 'La Fille mal gardée' de Duni et Favart.

    Charlton, D., 2015, Rire et sourire dans l'opéra-comique en France aux XVIIIe et XIXe siècles.. Loriot, C., Cailliez, M. & Bonche, V. (eds.). Lyon: Symétrie, p. 33-51 19 p. (Symétrie Recherche).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  193. Published

    La Vérité se rencontre-t-elle au train de la contingence?

    O'Brien, J., 2011, Les Chapitres oublis des 'Essais' de Montaigne. Paris: Champion, p. 93-106 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  194. Unpublished

    Labour unions and CSR: initial results from a cross-European research project

    Preuss, L., Rees, C. & Gold, M., Jun 2013, (Unpublished) International Association for Business and Society (IABS) Annual Meeting. Portland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  195. Published

    Labour-management partnership in the non-union retail sector

    Badigannavar, V. & Kelly, J., 2003, 21st International Labour Process Conference, Bristol Business School, UWE.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  196. Published

    Languages as Hyperplanes: grammatical inference with string kernels

    Clark, A., Costa Florêncio, C. & Watkins, C., 2006, Proceedings of ECML. p. 90-101

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  197. Published

    Large Modulus Ring-LWE > Module-LWE

    Albrecht, M. & Deo, A., 2017, Advances in Cryptology - ASIACRYPT 2017. p. 267-296 30 p. (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  198. Published

    Large sediment accumulations and major subsidence offshore; rapid uplift on land: Consequences of extension of Gorontalo Bay and northern Sulawesi

    Hennig, J., Hall, R., Advokaat, E. & Rudyawan, A., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-304 1-16

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  199. Published

    Large-scale probabilistic predictors with and without guarantees of validity

    Vovk, V., Petej, I. & Fedorova, V., 7 Dec 2015, Advances in Neural Information Processing Systems 28: Proceedings of NIPS 2015. Curran Associates, p. 892-900 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  200. Published

    Laser induced fluorescence detection of metastable He-2 molecules in superfluid helium

    Rellergert, W. G., Lippincott, W. H., Nikkel, J. A. & McKinsey, D. N., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 382-383 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  201. Published

    Laser Sculpted Cool Proton Beams

    Gibson, S., Alden, S. & Nevay, L., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 1-4 4 p. MOPRB116

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  202. Published

    Laserwire Emittance Scanner at CERN Linac 4

    Kruchinin, K., Boorman, G., Bosco, A., Gibson, S., Karataev, P., Bravin, E., Hofmann, T., Raich, U., Roncarolo, F., Letchford, A. & Pozimski, J., Jun 2015, 6th International Particle Accelerator Conference: IPAC2015, Richmond, VA, USA. JACoW Publishing, p. 1146-1149 4 p. MOPWI003

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  203. Published

    Late Pleistocene Beetle Records from North America

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 222-236

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  204. Published

    Late Pleistocene Glacial Events in Beringia

    Elias, S. & Brigham-Grette, J., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 2. p. 1057-1066

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  205. Published

    Late Pleistocene Megafaunal Extinctions.

    Elias, S. & Schreve, D., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 4. p. 3202-3217

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  206. Published

    Late Triassic – Mid-Jurassic to Neogene Extensional Fault Systems in the Exmouth Sub-Basin, Northern Carnarvon Basin, North West Shelf, Western Australia

    Jitmahantakul, S. & McClay, K., 31 Aug 2013, Proceedings Western Australian Basins Conference. 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  207. Published

    Layered Analysis of Security Ceremonies

    Bella, G. & Coles-Kemp, L., 2012, Information Security and Privacy Research: IFIP Advances in Information and Communication Technology. Boston: Springer, Vol. 376. p. 273-286 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  208. Published

    LDT: a language definition technique

    Johnstone, A., Scott, E. & van den Brand, M., 26 Mar 2011, LDTA '11 Proceedings of the Eleventh Workshop on Language Descriptions, Tools and Applications. ACM, p. 1-8 8 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  209. Published

    Le comte de Clermont et les intermèdes italiens vers 1752

    Charlton, D., 2005, Les Théâtres de société au XVIIIe siècle. Plagnol-Diéval, M-E. & Quéro, D. (eds.). Brussels: Éditions de l'Université de Bruxelles, p. 63-74 12 p. (Études sur le 18e siècle; vol. 33).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  210. Forthcoming

    Le corps en jeu: Debussy et l’art de toucher

    Johnson, J., 2018, (Accepted/In press) Le corps dans l'écriture musicale. Delaplace, J. & Olive, J. P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  211. Published

    Le Matériel musical de l'opéra-comique

    Charlton, D., 2010, L'Invention des genres lyriques français et leur redécouverte au XIXe siècle. Terrier, A. & Dratwicki, A. (eds.). Lyon: Symétrie, p. 239-56 17 p. (Perpetuum mobile).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  212. Published

    Leadership Behavior Adjustment and Leader Effectiveness

    Tsai, C-J. & Qiao, K., 2017, European Academy of Management Annual Conference (EURAM), Glasgow, Scotland, UK, 21-24 June..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  213. Published

    Leading strategies in competitive on-line prediction

    Vovk, V., 2006, Proceedings of the Seventeenth International Conference on Algorithmic Learning Theory. Balcazar, J., Long, P. M. & Stephan, F. (eds.). p. 214-228 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  214. Published

    Leading Structurally Dynamic Virtual Project Teams

    Chamakiotis, P. & Panteli, N., 2016, Proceedings of the 37th International Conference on Information Systems (ICIS): Digital Innovation at the Crossroads: Track 20: Social Media and Digital Collaboration. December 11-14, Dublin, Ireland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  215. Published

    Lean e-integration for development: The case of the National Licensing Center in Albania

    Kromidha, E., 2013, Proceedings of the ICTD 2013 Conference, 7-10 December 2013. Cape Town, South Africa

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  216. Published

    Learning an optimal decision strategy in an in uence diagram with latent variables

    Vovk, V., 1996, Proceedings of the Ninth Annual Conference on Computational Learning Theory. New York: ACM Press, p. 110-121 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  217. Published

    Learning automata with side-effects

    van Heerdt, G., Sammartino, M. & Silva, A., 21 Aug 2020, Coalgebraic Methods in Computer Science - 15th IFIP WG 1.3 International Workshop, CMCS 2020, Colocated with ETAPS 2020, Proceedings. Petrisan, D. & Rot, J. (eds.). Springer, p. 68-89 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12094 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  218. Published

    Learning by Conformal Predictors with Additional Information

    Yang, M., Nouretdinov, I. & Luo, Z., Oct 2013, The 9th Artificial Intelligence Applications and Innovations Conference (AIAI): 2nd Workshop on Conformal Prediction and its Applications. p. 394-400 7 p. (IFIP Advances in Information and Communication Technology; vol. 412).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  219. Published

    Learning by transduction

    Gammerman, A., Vapnik, V. & Vovk, V., 1998, Proceedings of the Fourteenth Conference on Uncertainty in Articial Intelligence. San Francisco, CA: Morgan Kaufmann, p. 148-156 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  220. Published

    Learning Context Free Grammars with the Syntactic Concept Lattice

    Clark, A., 1 Sep 2010, Grammatical Inference: Theoretical Results and Applications. Sempere, J. & Garcia, P. (eds.). Springer-Verlag, Vol. 6339. p. 38-51 (Lecture Notes in Computer Science; vol. 6339).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  221. Published

    Learning Eigenvectors for Free

    Koolen, W. M., Kotlowski, W. & Warmuth, M. K., 1 Dec 2011, Proceedings of the 25th Annual Conference on Neural Information Processing Systems (NIPS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  222. Forthcoming

    Learning interpretable disease self-representations for drug repositioning

    Galeano Galeano, D., Frasca, F., Gonzalez, G., Lapanogov, I., Veselkov, K., Paccanaro, A. & Bronstein, M. M., 2019, (Accepted/In press) Conference on Neural Information Processing Systems (NeurIPS) 2019: Graph representation Learning Workshop .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  223. Published

    Learning mechanisms for achieving context awareness and intelligence in Cognitive Radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, IEEE 36th Conference on Local Computer Networks, LCN 2011, Bonn, Germany, October 4-7, 2011. p. 738-745 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  224. Published

    Learning Morphology with Pair Hidden Markov Models

    Clark, A., 1 Jul 2001, Proceedings of the Association for Computational Linguistics: Student Session. p. 55-60

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  225. Published

    Learning nominal automata

    Moerman, J., Sammartino, M., Silva, A., Klin, B. & Szynwelski, M., Jan 2017, POPL 2017 : Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. Gordon, A. D. & Castagna, G. (eds.). Association for Computing Machinery (ACM), p. 613-625 13 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  226. Published

    Learning the Past

    Charlton, D., 2003, Berlioz, Past, Present, Future: Bicentenary Essays. Bloom, P. (ed.). Rochester, NY: University of Rochester Press, p. 34-56 23 p. (Eastman Studies in Music).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  227. Published

    Les instruments à vent: Les sons et les gestes

    Charlton, D., 1991, Le Tambour et la harpe: Oeuvres, pratiques et manifestations musicales sous la Révolution, 1788-1800. Julien, J-R. & Mongrédien, J. (eds.). Paris: Éditions Du May, p. 209-20 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  228. Published

    Les Prolongements romanesques de la matière épique

    Everson, J., 2008, Acts of the XVIIth conference of the international Société Rencesvals, University of Connecticut, July 2006: Olifant special issue. Vol. 2 vols.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Published

    Less harm, less worry or how to improve network security by bounding system offensiveness

    Bruschi, D., Cavallaro, L. & Rosti, E., 2000, 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  230. Published

    Let’s Get Mobile: Secure FOTA for Automotive System

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 6 Nov 2015, Network and System Security. Springer, Vol. 9408. p. 503-510 8 p. (Lecture Notes in Computer Science; vol. 9408).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  231. Unpublished

    Let’s talk about our ways of seeing the world. Exploring more explicit ways to study media representations in Critical Geopolitics

    Van Efferink, L., 2013, (Unpublished) Warwick Graduate Conference in Political Geography,Department of Politics and International Studies (PAIS),University of Warwick.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  232. Published

    Letting Go: Working with the Rhythm of Participants

    Coles-Kemp, L., Angus, A. & Stang, F., 2013, CHI '13 Extended Abstracts on Human Factors in Computing Systems. 2013: ACM, p. 373-378 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  233. Published

    Leveraging probabilistic reasoning in deterministic planning for large-scale autonomous Search-and-Tracking

    Bernardini, S., Fox, M., Long, D. & Piacentini, C., 12 Jun 2016, Proceedings of the Twenty Sixth International Conference on Automated Planning and Scheduling (ICAPS- 16) . p. 47-55 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  234. Published

    LHC Collimation and Energy Deposition Studies Using Beam Delivery Simulation (BDSIM)

    Nevay, L., Boogert, S., Garcia Morales, H., Gibson, S., Kwee-Hinzmann, R., Bruce, R. & Redaelli, S., Jun 2016, 7th International Particle Accelerator Conference: May 8-13, 2016, Busan, Korea. JACoW Publishing, p. 1-3 3 p. WEPOY047

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  235. Published

    LibSEAL: revealing service integrity violations using trusted execution

    Aublin, P-L., Kelbert, F., O'Keeffe, D., Muthukumaran, D., Priebe, C., Lind, J., Krahn, R., Fetzer, C., Eyers, D. M. & Pietzuch, P. R., 23 Apr 2018, Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, April 23-26, 2018. p. 1-15 15 p. 24

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  236. Published

    Lightweight Classification of IoT Malware Based on Image Recognition

    Su, J., Vasconcellos Vargas, D., Prasad, S., Sgandurra, D., Feng, Y. & Sakurai, K., 2018, 8th IEEE International Workshop on Network Technologies for Security, Administration, and Protection (NETSAP 2018). IEEE Xplore, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  237. Published

    Limitations of IEC62351-3's public key management

    Wright, J. & Wolthusen, S., 19 Dec 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  238. Published

    Limits to anonymity when using credentials

    Pashalidis, A. & Mitchell, C. J., 2006, Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004, Revised Selected Papers. Springer-Verlag, Vol. 3957. p. 4-12 9 p. (Lecture Notes in Computer Science; vol. 3957).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. Published

    Linear Depth Integer-Wise Homomorphic Division

    Okada, H., Cid, C., Hidano, S. & Kiyomoto, S., 2019, Information Security Theory and Practice. WISTP 2018. Springer, p. 91-106 16 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  240. Published

    Linear Probability Forecasting

    Zhdanov, F. & Kalnishkan, Y., 2010, Artificial Intelligence Applications and Innovations, AIAI 2010, Proceedings: vol 339 of IFIP Advances in Information and Communication Technology. Springer, p. 4-11 (IFIP Advances in Information and Communication Technology; vol. 339).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  241. Published

    Linear Relations between Square-Loss and Kolmogorov Complexity

    Kalnishkan, Y., 1999, of the Twelfth Annual Conference on Computation Learning Theory. ACM, p. 226-232

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  242. Published

    Linearly Ordered Attribute Grammar Scheduling Using SAT-Solving

    van Binsbergen, L. T., 1 Jan 2015, Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin / Heidelberg, p. 289-303 15 p. (Lecture Notes in Computer Science; vol. 9035).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  243. Published

    Linguistic categories in mathematical vernacular and their type-theoretic semantics (extended abstract)

    Luo, Z. & Callaghan, P., 1997, Logical Aspects of Computational Linguistics 97 (LACL'97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  244. Forthcoming

    Linguistic tremours: Language diversity as a fault line in intercultural virtual teams

    Drabble, D., 2016, (Accepted/In press) THE 10th MEDITERRANEAN CONFERENCE ON INFORMATION SYSTEMS, MCIS 2016, PAPHOS, CYPRUS, SEPTEMBER 4-6, 2016. UNIVERSITY OF NICOSIA, P.O.Box 24005, 1700 ΛΕΥΚΩΣΙΑ, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  245. Published

    L'insegnamento della letteratura italiana come scuola di educazione civica

    Jossa, S., 2013, Fare il cittadino: La formazione di un nuovo soggetto sociale nell’Europa tra XIX e XXI secolo. Botteri, I., Riva, E. & Scotto di Luzio, A. (eds.). Rubbettino, p. 131-146 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  246. Published

    Liquid xenon for gamma-ray imaging of special nuclear materials

    Larsen, N. A. N. A., Bernard, E. P. E. P., Cahn, S. B. S. B., Edwards, B. W. H. B. W. H., Linck, E. E., Lyashenko, A. V. A. V., McKinsey, D. N. D. N., Nikkel, J. A. J. A., Rhyne, C. A. C. A., Shin, Y. Y., Tennyson, B. P. B. P., Wahl, C. G. C. G., Destefano, N. E. N. E., Gai, M. M. & De Silva, M. S. M. S., 1 Dec 2012, 2012 IEEE International Conference on Technologies for Homeland Security, HST 2012. p. 378-383 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  247. Published

    LISABETH: Automated Content-based Signatures Generator for Zero-day Polymorphic Worms

    Cavallaro, L., Lanzi, A., Mayer, L. & Monga, M., 2008, International Workshop on Software Engineering for Secure Systems (SESS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  248. Published

    Live and Trustworthy Forensic Analysis of Commodity Production Systems

    Martignoni, L., Fattori, A., Paleari, R. & Cavallaro, L., 15 Sep 2010, Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010: Proceedings. Springer, p. 297-316 (Lecture Notes in Computer Science; vol. 6307).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  249. Published

    Local Thermophysical Properties Measurements on Polymers using Doped Silicon SThM Probe: Uncertainty Analysis and Interlaboratory Comparison

    Guen, E., Chapuis, P. O., Klapetek, P., Puttock, R., Hay, B., Allard, A., Maxwell, T., Renahy, D., Valtr, M., Martinek, J. & Gomès, S., 31 Dec 2018, THERMINIC 2018 - 24th International Workshop on Thermal Investigations of ICs and Systems, Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. 8593308. (THERMINIC 2018 - 24th International Workshop on Thermal Investigations of ICs and Systems, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  250. Published

    Location Based Application Availability

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2009, On the Move to Meaningful Internet Systems: OTM 2009 Workshops. Meersman, R., Herrero, P. & Dillon, T. (eds.). Vilamoura, Portugal: Springer, Vol. 5872/2009. p. 128 - 138 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  251. Published

    Location Tracking Using Smartphone Accelerometer and Magnetometer Traces

    Nguyen, D. K. A., Akram, R. N., Markantonakis, K., Luo, Z. & Watkins, C., 26 Aug 2019, The First Location Privacy Workshop (LPW 2019), the 14th International Conference on Availability, Reliability and Security (ARES 2019). Association for Computing Machinery (ACM), p. 1-9 9 p. 96

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  252. Unpublished

    Location-based games as platforms for site-specific storytelling

    Lowe, J., 15 Jul 2020, (Unpublished) Canterbury Arts E-Conference 2020.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  253. Published

    Log Your Car: Reliable Maintenance Services Record

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 2017, Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Springer, Vol. 10143. p. 484-504 21 p. (Lecture Notes in Computer Science ; vol. 10143).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  254. Published

    Log Your Car: The Non-invasive Vehicle Forensics

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 974-982 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  255. Published

    Logical Lego? Co-constructed perspectives on service design

    Heath, C., Coles-Kemp, L. & Hall, P., 2014, Proceedings of NordDesign 2014. Aalto Design Factory, p. 416 425 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  256. E-pub ahead of print

    Logical Support for Bike-Sharing System Design

    Tutu, I., Chirita, C-E., Lopes, A. & Fiadeiro, J. L., 9 Oct 2019, From Software Engineering to Formal Methods and Tools, and Back. ter Beek, M. H., Fantechi, A. & Semini, L. (eds.). Springer, p. 152-171 20 p. (Lecture Notes In Computer Science; vol. 11865).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  257. Published

    Logical truths in constructive type theory (abstract)

    Luo, Z., 1996, Logic Colloquium 96.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  258. E-pub ahead of print

    Logics for Actor Networks: A Case Study in Constrained Hybridization

    Lopes Fiadeiro, J., Tutu, I., Lopes, A. & Pavlovic, D., 3 Jan 2018, Dynamic Logic. New Trends and Applications: First International Workshop, DALI 2017, Brasilia, Brazil, September 23-24, 2017, Proceedings. Springer, p. 98-114 17 p. (Lecture Notes in Computer Science; vol. 10669).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  259. Published

    Longer Keys May Facilitate Side Channel Attacks

    Walter, C. D., 2003, Selected Areas in Cryptography. Matsui, M. & Zuccherato, R. J. (eds.). Springer, Vol. 3006. p. 42-57 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  260. Published

    Longer Randomly Blinded RSA Keys may be Weaker than Shorter Ones

    Walter, C. D., 2008, WISA 2007. Kim, S., Yung, M. & Lee, H-W. (eds.). Springer, Vol. 4867. p. 303-316 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  261. Forthcoming

    Longing to Belong: Nationalism and Sentimentalism in the Second Violin Concertos of Bartók and Szymanowski

    Downes, S., 1 Mar 2020, (Accepted/In press) Polski Rocznik Muzykologiczny. Lindstedt, I. (ed.). Musicologists Section of the Polish Composers' Union/ PWM Edition

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  262. Published

    Longitudinal Beam Profile Measurements at CTF3 Using Coherent Diffraction Radiation

    Micheler, M., Blair, G., Boorman, G., Karataev, P., Corsini, R. & Lefevre, T., 2009, Proceedings of PAC09, Vancouver, BC, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  263. Published

    LONGITUDINAL BEAM PROFILE MEASUREMENTS OF THE MICROBUNCHING INSTABILITY

    Shields, W., Karataev, P., Finn, A., Bartolini, R., Martin, I. P. S. & Rehm, G., Jul 2014, IPAC 2014 - The Fifth International Particle Accelerator Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  264. Published

    Longitudinal beam profile monitor at CTF3 based on Coherent Diffraction Radiation

    Micheler, M., Ainsworth, R., Blair, G., Boorman, G., Corsini, R., Lefevre, T. & Lekomtsev, K., 2010, Journal of Physics: Conference Series.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  265. Published

    Longitudinal beam profile monitor at CTF3 based on Coherent Diffraction Radiation

    Micheler, M., Ainsworth, R., Blair, G. A., Boorman, G., Corsini, R., Karataev, P., Lefevre, T. & Lekomtsev, K., 2010, VIII INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2009). Strikhanov, MN. & Pivovarov, YL. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. Published

    L'Orchestre et la métaphore du vivant de Mozart

    Charlton, D., 1997, Mozart: Les chemins de l'Europe. Massin, B. (ed.). Strasbourg: Editions du Conseil de l'Europe, p. 105-112 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  267. Published

    Loss functions, complexities, and the Legendre transformation

    Kalnishkan, Y., Vovk, V. & Vyugin, M. V., 2001, Proceedings of the Twelfth International Conference on Algorithmic Learning Theory. Abe, N., Khardon, R. & Zeugmann, T. (eds.). London: Springer, p. 181-189 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  268. Published

    L'Oubli comme mémoire: A propos de l'amitié politique

    O'Brien, J., 2012, Amitié et compagnie. Autour du 'Discours de la Servitude Volontaire' de La Boétie. Paris: Garnier, p. 95-111 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  269. Published

    LP-branching algorithms based on biased graphs

    Wahlström, M., 2017, Proceedings of the 2017 Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, p. 1559-1570 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  270. Published

    Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS

    Albrecht, M. & Paterson, K., 28 Apr 2016, Advances in Cryptology – EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Vol. 9665. p. 622-643 22 p. (Lecture Notes in Computer Science; vol. 9665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  271. Published

    Lucky Thirteen: Breaking the TLS and DTLS Record Protocols

    Al Fardan, N. J. & Paterson, K. G., 2013, 2013 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, p. 526-540 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  272. Published

    Machine-learning applications of algorithmic randomness

    Vovk, V., Gammerman, A. & Saunders, C., 1999, Proceedings of the Sixteenth International Conference on Machine Learning. San Francisco, CA: Morgan Kaufmann, p. 444-453 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  273. Published

    Magnet: Practical Subscription Clustering for Internet-Scale Publish/Subscribe

    Girdzijauskas, S., Chockler, G., Vigfusson, Y., Melamed, R. & Tock, Y., Jul 2010, Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems (DEBS '10). Cambridge, UK: ACM, p. 172-183 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  274. Published

    MAGNETIC RESONANCE MULTI-SEQUENCE THROMBUS IMAGING (MSTI) PREDICTS THROMBUS LYSABILITY IN PATIENTS WITH ACUTE ILIOFEMORAL DEEP VEIN THROMBOSIS (DVT)

    Silickas, J., Phinikaridou, A., Black, S. A., Koloydenko, A., Lavin Plaza, B., Lyons, O., Gwozdz, A., Andia, M., Patel, A., Modarai, B., Botnar, R., Smith, A. & Saha, P., Apr 2019, Joint Meeting of the Royal-Society-of-Medicine / Annual Meeting of the Society-of-Academic-and-Research-Surgery. Wiley, Vol. 106 (S3). p. 9-9 1 p. O13. (British Journal of Surgery).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  275. Published

    Maintaining Concurrency Information for On-the-fly Data Race Detection

    Audenaert, K., D'Hollander, E. (ed.), Joubert, F. J. (ed.) & Trottenberg, F. (ed.), 1998, Parallel Computing: Fundamentals, Applications and New Directions. Bonn, p. 319-326 (Advances in Parallel Computing; vol. 12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  276. Published

    Making an entrance 2.0: The linguistics of introductory success in virtual communities

    Dove, J. A., Eubanks, D. L., Panteli, N., Watts, L. A. & Joinson, A. N., 2011, Proceedings of the Annual Hawaii International Conference on System Sciences. 5718716

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  277. Published

    Making Automated Testing of Cloud Applications an Integral Component of PaaS

    Bucur, S., Kinder, J. & Candea, G., Jul 2013, Proc. 4th Asia-Pacific Workshop on Systems (APSYS 2013). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  278. Published

    Making Home Away from Home: Social Relations and Food Consumption amongst Chinese Students in the UK

    Cappellini, B. & Yen, D. A., 2011, The New World: Macromarketing Yesterday, Today and Tomorrow. Proceedings of the 36thAnnual Macromarketing Conference. p. 227-239

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  279. Published

    Malicious False Data Injection in Hierarchical Electric Power Grid State Estimation Systems

    Feng, Y., Foglietta, C., Baiocco, A., Panzieri, S. & Wolthusen, S. D., 2013, Proceedings of the fourth international conference on Future energy systems (ACM e-Energy 2013). ACM Press, p. 183-192

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  280. Published

    Malicious MPLS Policy Engine Reconnaissance

    Almutairi, A. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014)}. Springer-Verlag, Vol. 8735. p. 3 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  281. In preparation

    MANAGEMENT CONTROL SYSTEMS AND RESEARCH MANAGEMENT IN UNIVERSITIES: an empirical and conceptual exploration.

    Agyemang, G. & Broadbent, J., 9 Jul 2013, (In preparation) MANAGEMENT CONTROL SYSTEMS AND RESEARCH MANAGEMENT IN UNIVERSITIES: an empirical and conceptual exploration.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  282. Published

    Management Control through Joint Activity: the role of managerial co-gravity

    Subramaniam, N., 2013, 9th International Management Control Research Conference, 4-6th September, 2013, Utrecht, Netherlands..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  283. Published

    Management of secure systems and security within Open Systems Interconnection (OSI)

    Mitchell, C. J., 1990, Proceedings of Information Security: Confidentiality, Integrity and Availability, London, July 1990. Uxbridge: UNICOM Seminars

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  284. Published

    Management system requirements for wireless systems beyond 3G

    Lazaro, O., Irvine, J., Girma, D., Dunlop, J., Liotta, A., Borselius, N. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 240-244 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  285. Unpublished

    Managerial perspectives on employee engagement

    Romanou, N., Soane, E., Truss, K., Alfes, K., Rees, C., Gatenby, M., Degleris, N., Mantelou, E., Solias, A. & Karamberi, M., Nov 2009, (Unpublished) 1st International Congress on Neurobiology and Clinical Psychopharmacology. Thessaloniki

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  286. Unpublished

    Managing a positive environment: engagement, wellbeing, performance and the role of meaningfulness

    Soane, E., Alfes, K., Gatenby, M., Rees, C. & Truss, K., Aug 2010, (Unpublished) Academy of Management (AoM) Annual Meeting. Montreal.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  287. Published

    Managing Evolution in Telecommunication Systems

    Koutsoukos, G., Gouveia, J., Andrade, L. F. & Fiadeiro, J. L., 2001, DAIS. Kluwer, Vol. 198. p. 133-140 8 p. (IFIP Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  288. Published

    Managing formality, size of firm and employee evaluation of work

    Storey, D., Saridakis, G., Sen Gupta, S., Edwards, P. & Blackburn, R., 2008, European Academy of Management (EURAM), Ljubljana, Slovenia.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  289. Published

    Managing Innovation in Perceived Low-Tech Industries: A Review of the Technology Management Practices of the Fish Processing Industry of Newfoundland and Labrador

    Coronado Mondragon, C. E. & Coronado Mondragon, A. E., 16 Jul 2012, Driving the Economy through Innovation and Entrepreneurship: Emerging Agenda for Technology Management. Balanchandra, P. (ed.). Bangalore: Springer, Vol. 1. p. 101-109 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  290. Published

    Manifest fields and module mechanisms in intensional type theory

    Luo, Z., 2009, Types for Proofs and Programs, Proc. of Inter. Conf. of TYPES'08. LNCS 5497. p. 237-255 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  291. E-pub ahead of print

    Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange

    Dowling, B., Hansen, T. B. & Paterson, K. G., 10 Apr 2020, Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Proceedings. Ding, J. & Tillich, J-P. (eds.). Springer, p. 483-502 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12100 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  292. Published

    Many visits TSP revisited

    Kowalik, L., Li, S., Nadara, W., Smulewicz, M. & Wahlström, M., 26 Aug 2020, ESA 2020. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 173. p. 1-22 22 p. 66

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  293. Published

    Many-Valued Institutions for Constraint Specification

    Chirita, C-E., Luiz Fiadeiro, J. & Orejas, F., 2016, Fundamental Approaches to Software Engineering. Stevens, P. & Wasowski, A. (eds.). Berlin: Springer, Vol. 9633. p. 359-376 18 p. (Lecture Notes in Computer Science; vol. 9633).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  294. Published

    Market orientation as a mediating factor of the knowledge management and performance relationship

    Wang, C. L. & Ahmed, P. K., 2004, British Academy of Management Annual Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  295. Published

    Marketing thought and counterinsurgency: tracing the history of an overlooked relationship

    Chong, D., 2016, 41st Annual Macromarketing Conference (Dublin: Trinity College Dublin) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  296. Published

    Marking the 'Unmarked' Space: Gendered Vocal Construction in Female Electronic Artists

    McCarthy, R., Dec 2014, Proceedings of the 9th Conference on Interdisciplinary Musicology. Berlin, p. 33-38 6

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  297. Published

    Masterclass: Multisystemic Therapy as an intervention for complex needs

    Fox, S., 2014, European Forensic Child and Adolescent Psychiatrists, Psychologists and other disciplines: Royal College of Psychiatrists.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  298. Published

    Mathematical vernacular and conceptual well-formedness in mathematical language

    Luo, Z. & Callaghan, P., 1999, Proceedings of the 2nd Inter. Conf. on Logical Aspects of Computational Linguistics (LACL'97). LNAI 1582.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  299. Published

    Mathematical vernacular in type theory based proof assistants

    Callaghan, P. & Luo, Z., 1998, User Interfaces for Theorem Provers (UITP'98).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  300. Published

    Measurement of the nu(mu)-CCQE cross section in the SciBooNE experiment

    Alcaraz-Aunion, J. L. & Walding, J., 2009, SIXTH INTERNATIONAL WORKSHOP ON NEUTRINO-NUCLEUS INTERACTIONS IN THE FEW-GEV REGION. Sanchez, F., Sorel, M., AlvarezRuso, L., Cervera, A. & VicenteVacas, M. (eds.). MELVILLE: AMER INST PHYSICS, p. 145-150 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  301. Published

    Measurement re-ordering attacks on power system state estimation

    Gul, A. & Wolthusen, S., 18 Jan 2018, Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe 2017). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  302. Published

    Measurement Study on Malicious Web Servers in the .nz Domain

    Seifert, C., Delwadia, V., Komisarczuk, P., Stirling, D. & Welch, I., 2009, Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. p. 8-25 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  303. Published

    Measuring 3-D Secure and 3D SET against e-commerce end-user requirements

    Jarupunphol, P. & Mitchell, C. J., 2003, Proceedings of the 8th Collaborative electronic commerce technology and research conference (CollECTeR (Europe) 2003), National University of Ireland, Galway, June 2003. p. 51-64 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  304. Published

    Measuring Attitude towards Risk Treatment Actions amongst Information Security Professionals: an Experimental Approach

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 13 Jun 2016, Workshop on the Economics of Information Security. 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  305. Published

    Measuring attitudes towards mobile information services: an empirical validation of the HED/UT scale

    van der Heijden, H. & Sangstad Sørensen, L., 2003, Proceedings of the European Conference on Information Systems (ECIS). Naples, Italy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  306. Published

    Measuring SSL and SET against e-commerce consumer requirements

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - International Network Conference 2002 (INC 2002), University of Plymouth, UK, July 2002. p. 323-330 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  307. Published

    Measuring the Beam Profile by Counting Ionization Electrons

    Sandberg, H., Bertsche, W., Bodart, D., Dehning, B., Gibson, S., Levasseur, S., Satou, K., Schneider, G., Storey, J. & Veness, R., 12 Sep 2019, 8th International Beam Instrumentation Conference 2019. Malmö, Sweden: JACoW Publishing, TUBO04

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  308. Published

    Measuring the Effectiveness of Twitter's URL Shortener (t.co) at Protecting Users from Phishing and Malware Attacks

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 2. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  309. Published

    Measuring Tourists’ Emotional Experiences: Extension and Further Validation of the Destination Emotion Scale

    Hosany, S., Prayag, G., Deesilatham, S. & Odeh, K., 2013, 44th TTRA Annual International Conference, Kansas City, Missouri, USA, June 20-22.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  310. Published

    Mechanical characterisation of ancient Egyptian mortars

    Sanchez-Moral, S., Martinez-Martinez, J., Benavente, D., Cuezva, S. & Fernandez-Cortes, A., 2011, MATERIALS STRUCTURE MICROMECHANICS OF FRACTURE. Sandera, P. (ed.). LAUBLSRUTISTR 24, CH-8717 STAFA-ZURICH, SWITZERLAND: TRANS TECH PUBLICATIONS LTD, Vol. 465. p. 487-490 4 p. (Key Engineering Materials).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  311. Published

    Median based method for baseline wander removal in photoplethysmogram signals

    Awodeyi, A. E., Alty, S. R. & Ghavami, M., 5 Feb 2014, Proceedings - IEEE 14th International Conference on Bioinformatics and Bioengineering, BIBE 2014. Institute of Electrical and Electronics Engineers Inc., p. 311-314 4 p. 7033598

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  312. Published

    Meeting deadlines together

    Bocchi, L., Lange, J. & Yoshida, N., 26 Aug 2015, 26th International Conference on Concurrency Theory, CONCUR 2015. Aceto, L. & de Frutos Escrig, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 283-296 14 p. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 42).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  313. Published

    Members’ Commitment in online health communities: THE CASE OF MEDICINEAFRICA: Research in Progress

    Panteli, A. & Chamakiotis, P., 2018, Members’ Commitment in online health communities: THE CASE OF MEDICINEAFRICA, .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  314. Published

    Memory Access Pattern Protection for Resource-Constrained Devices

    Nakano, Y., Cid, C., Kiyomoto, S. & Miyake, Y., 2013, Proceedings of CARDIS 2012. Springer, Vol. 7771. p. 188-202 15 p. (Lecture Notes in Computer Science; no. 7771).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  315. Published

    Memory Errors: the Past, the Present, and the Future

    van der Veen, V., dutt-Sharma, N., Bos, H. J. & Cavallaro, L., 12 Sep 2012, 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  316. Published

    Memory-Based Learning of Morphology with Stochastic Transducers

    Clark, A., 2002, Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL). p. 513--520

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  317. Published

    MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

    Ankele, R., Böhl, F. & Friedberger, S., 2018, ACNS 2018 Applied Cryptography & Network security. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 381-399 19 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  318. Published

    Metabolic engineering of the mevalonate and non-mevalonate pathways in tomato

    Enfissi, EM., Fraser, PD., Lois, LM., Boronat, A., Schuch, W. & Bramley, PM., 2003, ADVANCED RESEARCH ON PLANT LIPIDS. Murata, N., Yamada, M., Nishida, Okuyama, H., Sekiya, J. & Hajime, W. (eds.). DORDRECHT: Springer, p. 237-240 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  319. Published

    Meta-Search Through the Space of Representations and Heuristics on a Problem by Problem Basis

    Fuentetaja, R., Barley, M., Borrajo, D., Douglas, J., Franco, S. & Riddle, P., 26 Apr 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI Press, p. 6169-6176 8 p. (32nd AAAI Conference on Artificial Intelligence, AAAI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  320. Published

    Microbunch Instability Observations from a THz Detector at Diamond Light Source

    Shields, W., Bartolini, R., Boorman, G., Karataev, P., Lyapin, A., Puntree, J. & Rehm, G., 2012, IX INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2011). Potylitsyn, A. & Karataev, P. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  321. Published

    Micron-scale Laser-wire at the ATF-II at KEK Commissioning and Results

    Nevay, L. J., Corner, L., Walczak, R., Blair, G., Boogert, S., Deacon, L. & Karataev, P., 1 Dec 2011, IPAC 2011 - 2nd International Particle Accelerator Conference. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. Published

    Migration of He-3 impurities along dislocation lines in He-4 single crystals

    Rojas, X., Haziot, A. & Balibar, S., 2012, 26TH INTERNATIONAL CONFERENCE ON LOW TEMPERATURE PHYSICS (LT26), PTS 1-5. IOP PUBLISHING LTD, 4 p. (Journal of Physics Conference Series; vol. 400).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  323. Published

    Millennial and century climate changes in the Colorado Alpine

    Elias, S., 2003, Climate Variability and Ecosystem Response. Greenland, D. (ed.). London: Oxford University Press, p. 370-383

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  324. E-pub ahead of print

    MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

    Albrecht, M., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T., 9 Nov 2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer, Vol. 10031. p. 191-219 29 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  325. E-pub ahead of print

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Ankele, R. & Kölbl, S., 13 Jan 2019, Selected Areas in Cryptography 2018. Lecture Notes in Computer Science ed. Calgary, Canada: Springer, Vol. 11349. p. 163-190 28 p. (Lecture Notes in Computer Science; vol. 11349).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  326. Published

    Minimal weight k-SR representations

    Han, Y., Gollmann, D. & Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 34-43 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  327. Published

    Minimizing the Log Size for Execution Replay of Shared-Memory Programs

    Levrouw, L. J. & Audenaert, K., 1994, Parallel Processing, Proceedings of Conpar 94–VAPP VI. Springer, p. 76-87 (Lecture Notes in Computer Science; vol. 854).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  328. Published

    Minimum description length estimators under the optimal coding scheme

    Vovk, V., 1995, Proceedings of the Second European Conference on Computational Learning Theory. Vitanyi, P. (ed.). Berlin: Springer, p. 237-251 (Lecture Notes in Computer Science; vol. 904).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  329. Published

    Mining the biomedical literature to predict shared drug targets in DrugBank

    Caniza Vierci, H., Galeano Galeano, D. & Paccanaro, A., 2017, XLIII Conferencia Latinoamericana en Informática CLEI 2017. IEEE Xplore, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  330. Published

    Mining the recent history of Macromarketing thought: A visualization of ideas

    Reppel, A. & Kravets, O., 7 Jul 2016, Proceedings of the 41st Annual Macromarketing Conference. Dublin, Ireland, p. 465-468

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  331. Unpublished

    Miracles, transformative moments and ‘A life’s work’: Exploring the intersection of individual and social identity

    Tzouramani, E., 2013, (Unpublished) 3rd Conference of Management, Spirituality and Religion, May 2013.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  332. Published

    MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 53-66 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  333. Published

    Mitigating CSRF attacks on OAuth 2.0 systems

    Li, W., Mitchell, C. J. & Chen, T. M., 1 Nov 2018, Proceedings of 2018 16th Annual Conference on Privacy, Security and Trust (PST): 28-30 Aug 2018. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  334. Published

    Mitigation of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014). IEEE Computer Society Press, p. 478 483 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  335. Published

    Mixability and the Existence of Weak Complexities

    Kalnishkan, Y. & Vyugin, M., 2002, Computational Learning Theory, 15th Annual Conference on Computational Learning Theory, COLT 2002, Proceedings: volume 2375 of Lecture Notes in Artificial Intelligence. Springer, p. 105-120 (Lecture Notes in Artificial Intelligence; vol. 2375).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  336. Published

    Mixed Sneutrino Dark Matter and the Ratio Omega(b)/Omega(dm)

    West, S., 27 Oct 2006, Proceedings of SUSY06.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  337. Published

    Mobile recommendation systems for decisions ‘on the go’

    van der Heijden, H., Kotsis, G. & Kronsteiner, R., 2005, Proceedings of the International Conference on Mobile Business (ICMB). Sydney, Australia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  338. Published

    Mobile services for group decision support

    van Leeuwen, J. & van der Heijden, H., 2003, Proceedings of the 16th Bled Electronic Commerce conference. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  339. Published

    Model checking for symbolic-heap separation logic with inductive predicates

    Brotherston, J., Gorogiannis, N., Kanovich, M. & Rowe, R., Jan 2016, POPL '16 Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM, p. 84-96 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  340. Published

    Model Checking Recursive Programs with Numeric Data Types

    Hague, M. & Lin, A., 2011, CAV: Computer Aided Verification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  341. Published

    Modelando el nicho ecológico de los bambúes leñosos (Bambuseae, Poaceae) en Bolivia: Implicaciones para la construcción de aerófonos autóctonos y la conservación de los bambúes musicales

    Hachmeyer, S., 2017, La rebelión de los objetos Cestería y Maderas: Anales de la reunión anual de etnología. La Paz: MUSEF, Vol. XXXI. p. 183-210

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  342. Published

    Modeling And Detecting Anomalies In Scada Systems

    Svendsen, N. & Wolthusen, S. D., Mar 2008, Critical Infrastructure Protection II: Proc. Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 101-113

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  343. Published

    Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model

    Nweke, L. O. & Wolthusen, S. D., 7 Aug 2020, 2020 IEEE Conference on Communications and Network Security, CNS 2020. Institute of Electrical and Electronics Engineers Inc., 6 p. 9162191. (2020 IEEE Conference on Communications and Network Security, CNS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  344. Published

    Modelling e-business security using business processes

    Nachtigal, S. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 459-464 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  345. Published

    Modelling GLL Parser Implementations

    Johnstone, A. & Scott, E., 2011, Software Language Engineering: Third International Conference, SLE 2010, Eindhoven, The Netherlands, October 12-13, 2010, Revised Selected Papers. Malloy, B., Staab, S. & van den Brand, M. (eds.). Springer, p. 42-61 20 p. (Lecture Notes in Computer Science; vol. 6563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  346. Published

    Modelling Implementation of Strategy

    Aboutalebi, R. & Tan, H., 9 Sep 2014, In: BAM (British Academy of Management), 28th Annual Conference of BAM: The Role of the Business School in Supporting Economic and Social Development. 09-11 September 2014, Belfast Waterfront, Northern Ireland, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  347. Published

    Modelling the Satellite Bridge for B-ISDN Islands

    Sun, Z., Komisarczuk, P., Coakley, F. P. & Evans, B. G., 1994, Broadband Islands '94, Connecting with the End-User, Proceedings of the 3rd Intermational Conference on Broadband Islands, Hamburg, Germany, 7-9 June, 1994. p. 211-219 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  348. Published

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L., 30 Oct 2017, PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  349. Published

    Moduli for Testing Implementations of the RSA Cryptosystem

    Walter, C. D., 1999, 14th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 78-85 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  350. E-pub ahead of print

    Monadic Decomposition in Integer Linear Arithmetic

    Hague, M., Lin, A., Ruemmer, P. & Wu, Z., 24 Jun 2020, International Joint Conference on Automated Reasoning: IJCAR 2020. Springer-Verlag, p. 122-140 19 p. (Lecture Notes in Computer Science; vol. 12166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  351. Published

    Monitoring excavation-related ground deformation in london, UK using SqueeSAR™

    Bischoff, C. A., Mason, P. J., Ghail, R. C., Giannico, C. & Ferretti, A., 9 May 2019, Tunnels and Underground Cities: Engineering and Innovation meet Archaeology, Architecture and Art- Proceedings of the WTC 2019 ITA-AITES World Tunnel Congress. Viggiani, G., Celestino, T., Peila, D. & Viggiani, G. (eds.). CRC Press / Balkema, p. 5360-5367 8 p. (Tunnels and Underground Cities: Engineering and Innovation meet Archaeology, Architecture and Art- Proceedings of the WTC 2019 ITA-AITES World Tunnel Congress).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  352. Published

    Monotonicity and Completeness in Attribute-Based Access Control

    Crampton, J. & Morisset, C., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 33-48

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  353. Published

    Montgomery's Multiplication Technique: How to Make It Smaller and Faster

    Walter, C. D., 1999, CHES '99. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1717. p. 80-93 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  354. Forthcoming

    Mood and confidence in seeking social support in university students with chronic pain

    Serbic, D. & Doyle, L., 2019, (Accepted/In press) Teaching and supporting students with invisible disabilities . Psychology Teaching Review

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  355. Published

    More Detail for a Combined Timing and Power Attack against Implementations of RSA

    Schindler, W. & Walter, C. D., 2003, 9th IMA Int. Conf. on Cryptography and Coding. Paterson, K. G. (ed.). Springer, Vol. 2898. p. 245-263 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  356. Published

    Morphological effects on pronunciation

    Mousikou, P., Strycharczuk, P., Turk, A., Rastle, K. & Scobbie, J., 2015, The Scottish Consortium for ICPhS 2015 (Ed.), Proceedings of the 18th International Congress of Phonetic Sciences . Glasgow, UK: The University of Glasgow, paper number 0816

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  357. Published

    MoverScore: Text Generation Evaluating with Contextualized Embeddings and Earth Mover Distance

    Zhao, W., Peyrard, M., Liu, F., Gao, Y., Meyer, C. M. & Eger, S., Nov 2019, Proceedings of 2019 Conference on Empirical Methods in Natural Language Processing (EMNLP 2019). p. 563-578 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  358. Published

    Mozart and Paris (1778)

    Charlton, D., 1995, Europa im Zeitalter Mozarts. Csáky, M. & Pass, W. (eds.). Vienna: Böhlau, p. 185-89 5 p. (Schriftenreihe der Osterreichischen Gesellschaft zur Erforschung des 18. Jahrhunderts ; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  359. Published

    MPLS policy target recognition network

    Al-Mutairi, A. & Wolthusen, S., 2 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9572. p. 71-87 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9572).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  360. Published

    MSL 14 - a Wellcome Manuscript of a Medical Practitioner

    Zipser, B. & Nutton, V., 2010, Histoire de la tradition et édition des médecins grecs: Actes du VIe colloque international (Paris, Université de Paris Sorbonne - Académie des Inscriptions et Belles Lettres, 10-12 avril 2008). Boudon-Millot, V., Garzya, A., Jouanna, J. & Roselli, A. (eds.). Napoli: M. D'Auria Editore, p. 259-270 11 p. (Collectanea; vol. 27).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  361. Published

    Multi-agent interactions for an ATM management system (TeleMACS approach).

    Hayzelden, A., Bigham, J. & Luo, Z., 1999, Software Agents for Future Communications Systems. Hayzelden, A. L. G. & Bigham, J. (eds.). Springer-Verlag, p. 160-182

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  362. Published

    Multi-agent systems for resource management

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 1999, 6th International Conference on Intelligence and Services in Networks, Also in Lecture Notes in Computer Science. Zuidweg, H., Campolargo, M., Delgado, J. & Mullery, A. (eds.). Springer-Verlag, Vol. 1597.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  363. Published

    Multi-Budgeted Directed Cuts

    Kratsch, S., Li, S., Marx, D., Pilipczuk, M. & Wahlstrom, M., 25 Jan 2019, IPEC 2018. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 115. p. 18:1-18:14 14 p. 18. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  364. E-pub ahead of print

    Multichannel Quaternion Least Mean Square Algorithm

    Cheong Took, C. & Xia, Y., 17 Apr 2019, International Conference on Acoustics, Speech, and Signal Processing: ICASSP. Brighton UK: IEEE, p. 1-4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  365. Published

    Multi-Client Non-Interactive Verifiable Computation

    Choi, S. G., Katz, J., Kumaresan, R. & Cid, C., Feb 2013, Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Sahai, A. (ed.). Springer, p. 499-518 20 p. (Lecture Notes in Computer Science; vol. 7785).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  366. Published

    Multi-Dimensional Causal Discovery

    Schaechtle, U., Stathis, K. & Bromuri, S., 3 Aug 2013, Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence: Beijing, China, 3-9 August 2013. Rossi, F. (ed.). p. 1649-1655

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  367. Published

    Multigraph Critical Infrastructure Model

    Schneidhofer, B. & Wolthusen, S., 2016, Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers. Springer-Verlag, Vol. 485. p. 149-167 19 p. (IFIP Advances in Information and Communication Technology; vol. 485).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  368. Published

    Multi-level Access in Searchable Symmetric Encryption

    Alderman, J., Martin, K. & Renwick, S., 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 35-52 18 p. (Lecture Notes in Computer Science; vol. 10323).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  369. Published

    Multilinear Maps from Obfuscation

    Albrecht, M., Farshim, P., Hofheinz, D., Larraia de Vega, E. & Paterson, K., 19 Dec 2015, Theory of Cryptography. Kushilevitz, E. & Malkin, T. (eds.). Springer, Vol. 9562. p. 446-473 27 p. (Lecture Notes in Computer Science; vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  370. Published

    Multiparty Compatibility in Communicating Automata: Characterisation and Synthesis of Global Session Types

    Denielou, P-M. & Yoshida, N., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II: ICALP (2). 2013 ed. Springer, Vol. 7966. p. 174 186 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  371. Published

    Multiparty Session Types Meet Communicating Automata

    Deniélou, P-M. & Yoshida, N., 2012, Programming Languages and Systems: 21st European Symposium on Programming, ESOP 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012: Proceedings. Seidl, H. (ed.). Springer, p. 194-213 20 p. (Lecture Notes in Computer Science; vol. 7211).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  372. Unpublished

    Multiple countries response to oil price shocks and illiquidity shocks

    Said, H. & Giouvris, E., 2017, (Unpublished) 43rd International Business Research Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  373. Published

    Multiple lexicalisation (a Java based study)

    Scott, E. & Johnstone, A., 20 Oct 2019, ACM Digital Library: Proceedings of Software Language Engineering 2019. ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  374. Published

    Multiple Pulse Resonantly Enhanced Laser Plasma Wakefield Acceleration

    Corner, L., Walczak, R., Nevay, L. J., Dann, S., Hooker, S. M., Bourgeois, N. & Cowley, J., 2012, ADVANCED ACCELERATOR CONCEPTS. Zgadzaj, R., Gaul, E. & Downer, MC. (eds.). MELVILLE: AMER INST PHYSICS, p. 872-873 2 p. (AIP Conference Proceedings; vol. 1507).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  375. Published

    Multiple sequence alignment based on new approaches of tree construction and sequences comparison

    Solovyev, V., Streletc, V. B., Milanesi, L., Lim, H. (ed.), Fickett, J. (ed.), Cantor, C. (ed.) & Robbins, R. (ed.), 1993, Proceedings of the 2nd International conference on Bioinformatics, Supercomputing, and Complex genome analysis.. World Scientific, p. 419-428

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  376. Published

    Multiprobabilistic Venn Predictors with Logistic Regression

    Nouretdinov, I., Devetyarov, D., Burford, B., Camuzeaux, S., Gentry-Maharaj, A., Tiss, A., Smith, C., Luo, Z., Chervonenkis, A., Hallett, R., Vovk, V., Waterfield, M., Cramer, R., Timms, J. F., Jacobs, I., Menon, U. & Gammerman, A., 2012, Artificial Intelligence Applications and Innovations - AIAI 2012 International Workshops: AIAB, AIeIA, CISE, COPA, IIVC, ISQL, MHDW, and WADTMB, Halkidiki, Greece, September 27-30, 2012, Proceedings, Part II. Iliadis, L., Maglogiannis, I., Papadopoulos, H., Karatzas, K. & Sioutas, S. (eds.). Springer, Vol. 382. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  377. Published

    Multiproxy Constraints on Redox Conditions of ~2.7 Ga Oceans

    Yang, J., Zerkle, A., Grassineau, N., Nisbet, E., Izon, G., Hunter, M. & Martin, T., 2016, Goldschmidt Conference 2016. p. 03F

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  378. Forthcoming

    Multi-Round Attacks on Structural Controllability Properties for Non-Complete Random Graphs

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, (Accepted/In press) Proceedings of the 16th Information Security Conference (ISC 2013). Springer-Verlag, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  379. Published

    Multi-Shot Distributed Transaction Commit

    Chockler, G. & Gotsman, A., 4 Oct 2018, 32nd International Symposium on Distributed Computing (DISC 2018). Springer-Verlag, p. 1-18 18 p. (LIPIcs–Leibniz International Proceedings in Informatics ; vol. 121).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  380. Published

    Music as Function: Biofeedback in Games for Health

    Plans, E. & Plans, D., 10 Apr 2016, Ludomusicology - Videogame Music Research Group.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  381. Published

    My Beautiful Self’: an Exploration of the Effects of Advertising Campaigns on Female Empowerment

    Longo, C. & Türe, M., 2016, NA - Advances in Consumer Research . Vol. 44. p. 747-747 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  382. E-pub ahead of print

    Nanothermometry of electrons and phonons

    Weng, Q., Puttock, R., Barton, C., Panchal, V., Yang, L., An, Z., Kajihara, Y., Lu, W., Tzalenchuk, A. & Komiyama, S., 29 Oct 2018, 2018 43rd International Conference on Infrared Millimeter and Terahertz Waves, IRMMW-THz 2018. IEEE Computer Society, Vol. 2018-September. 3 p. 8509939

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  383. Published

    Nature vs Grammar: Annibal Caro's Apologia as a Manifesto for Orality

    Jossa, S., 24 Feb 2016, Interactions between Orality and Writing in Early Modern Italian Culture. Degl'Innocenti, L., Richardson, B. & Sbordoni, C. (eds.). Routledge

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  384. Published

    Navigating the Sacred and the Profane: An Inquiry of ‘Askesis’ Emergent in Daily Lives and Grounded in Wisdom Traditions.

    Tzouramani, E. & Karakas, F., 2016, 11th Organization Studies Workshop, May 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  385. Forthcoming

    Naxos di Sicilia: nuovi dati sulla città del V secolo a.C.

    Lentini, M. C. & Pakkanen, J., 2015, (Accepted/In press) La Città e le città della Sicilia antica. Atti delle Ottave Giornate Internazionali di studio sull’area elima e la Sicilia occidentale nel contesto mediterraneo. Pisa, Scuola Normale Superiore, 18-21 dicembre 2012, Pisa. Ampolo, C. (ed.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  386. Published

    Naxos of Sicily in the 5th Century BC: New Research

    Lentini, M. C., Pakkanen, J. & Sarris, A., Dec 2015, Greek Colonisation: New Data, Current Approaches: Proceedings of the Scientific Meeting held in Thessaloniki (6 February 2015). Adam-Veleni, P. & Tsangari, D. (eds.). Athens: Alpha Bank, p. 23–35 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  387. Published

    Near and yet So Far: Distance-Bounding Attacks in Wireless Networks

    Clulow, J., Hancke, G., Kuhn, M. G. & Moore, T., 2006, European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS). Springer-Verlag, Vol. 4357. p. 83-97

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  388. Published

    Negotiating expatriate identity in the global era: Implications on expatriate performance

    Li, C. & Zhang, L. E., 1 Jan 2015, Academy of Management Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  389. Published

    Neighbourhood morphology and solar irradiance in relation to urban climate

    Mohajeri, N., Gudmundsson, A., Assouline, D. & Scartezzini, J., 2015, ICUC9 - The 9th International Conference on Urban Climate. ICUC9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  390. Published

    Nella terra di Dante

    Jossa, S. & Gesù, M. D. (ed.), 2009, Letteratura, identità, nazione. Palermo: duepunti, p. 41-58 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  391. Published

    Neo-Archaean Palaeo-Environmental Changes Determined by Microbial Activities Using Stable Isotopic Compositions

    Grassineau, N., Yang, J., Zerkle, A. & Nisbet, E., 12 Dec 2017, American Geophysical Union Fall Annual Meeting. New Orleans, p. B23F-05 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  392. Published

    Neogene extension on Seram: A new tectonic model for the northern Banda Arc

    Pownall, J. & Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-305 1-17

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  393. Published

    NetVis: a visualization tool enabling multiple perspectives of network traffic data

    Peters, D., Slawinski, A., Spoor, T., Vicol, S., Happa, J., Goldsmith, M. & Creese, S., 2013, Proceedings of the 31st conference on Theory and Practice of Computer Graphics, Eurographics UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  394. Published

    Network as a computer: ranking paths to find flows

    Pavlovic, D., 2008, Proceedings of CSR 2008. Razborov, A. & Slissenko, A. (eds.). Springer-Verlag, Vol. 5010. p. 384-397 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  395. Published

    Network provider domain federation in TINA

    Pavón, J., Montes, E. & Komisarczuk, P., 1997, Global Convergence of Telecommunications and Distributed Object Computing, 1997. Proceedings., TINA 97. p. 334-342 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  396. Published

    Network structure and the cultural evolution of linguistic structure: A group communication experiment

    Raviv, L., Meyer, A. & Lev - Ari, S., 2020, Ravignani, A. and Barbieri, C. and Martins, M. and Flaherty, M. and Jadoul, Y. and Lattenkamp, E. and Little, H. and Mudd, K. and Verhoef, T. (Eds) Evolution of Language: Proceedings of the 13th International Conference (EvoLang13). Brussels, Belgium..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  397. Published

    Network traffic demand prediction with confidence

    Dashevskiy, M. & Luo, Z., 2008, IEEE GLOBECOM 2008. p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  398. Published

    Network-aware stream query processing in mobile ad-hoc networks

    O'Keeffe, D., Salonidis, T. & Pietzuch, P. R., 17 Dec 2015, 34th IEEE Military Communications Conference, MILCOM 2015, Tampa, FL, USA, October 26-28, 2015. p. 1335-1340 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  399. Published

    Neural Simplex Architecture

    Phan, D. T., Grosu, R., Jansen, N., Paoletti, N., Smolka, S. A. & Stoller, S. D., 2020, NASA Formal Methods - 12th International Symposium, NFM 2020, Proceedings. Lee, R., Jha, S. & Mavridou, A. (eds.). Springer, p. 97-114 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12229 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  400. E-pub ahead of print

    Neural State Classification for Hybrid Systems

    Phan, D., Paoletti, N., Zhang, T., Grosu, R., Smolka, S. A. & Stoller, S. D., 30 Sep 2018, 16th International Symposium on Automated Technology for Verification and Analysis (ATVA 2018). Lahiri, S. K. & Wang, C. (eds.). Springer, p. 422-440 19 p. (Lecture Notes in Computer Science; vol. 11138).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  401. Published

    New c-ary perfect factors in the de Bruijn Graph

    Mitchell, C. J., 1995, Codes and Cyphers - Cryptography and Coding IV: Proceedings of the fourth IMA Cryptography and Coding Conference, Cirencester, December 1993. Southend: Formara Ltd., p. 299-313 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  402. Published

    New CBC-MAC forgery attacks

    Brincat, K. & Mitchell, C. J., 2001, Information Security and Privacy, ACISP 2001, Sydney, Australia, July 2001. Varadharajan, V. & Mu, Y. (eds.). Springer-Verlag, p. 3-14 12 p. (Lecture Notes in Computer Science; no. 2119).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  403. Published

    New Directions in Secure African Branchless Banking

    Heath, C. & Quaglia, E., 2017, Strategic Narratives of Technology and Africa.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  404. Published

    New Insights on Architectural Connectors

    Bruni, R., Fiadeiro, J. L., Lanese, I., Lopes, A. & Montanari, U., 2004, IFIP TCS. Kluwer, p. 367-380 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  405. Published

    New Plain-Exponential Time Classes for Graph Homomorphism

    Wahlström, M., 2009, Computer Science - Theory and Applications : 4th International Computer Science Symposium in Russia, CSR 2009. Frid, A., Morozov, A., Rybalchenko, A. & Wagner, K. W. (eds.). Novosibirsk, Russia: Springer, Vol. 5675. p. 346-355 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  406. E-pub ahead of print

    New radiometric calibration site located at Gobabeb, Namib desert

    Bialek, A., Greenwell, C., Lamare, M., Meygret, A., Marcq, S., Lacherade, S., Woolliams, E., Berthelot, B., Bouvet, M., King, M., Underwood, C. & Fox, N., 3 Nov 2016, 2016 IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-November. p. 6094-6097 4 p. 7730592

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  407. Published

    NFC mobile payment with Citizen Digital Certificate

    Chen, W., Mayes, K., Lien, Y-H. & Chiu, J-H., 1 Jun 2011, Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on. Gyeongju: IEEE COMPUTER SOC, p. 120 -126

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  408. Published

    NFC Mobile Transactions and Authentication Based on GSM Network

    Chen, W., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J-H., 1 Apr 2010, Near Field Communication (NFC), 2010 Second International Workshop on. p. 83 -89

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  409. Published

    Ninja: Non identity based, privacy preserving authentication for ubiquitous environments

    Leung, A. & Mitchell, C. J., 2007, UbiComp 2007: Ubiquitous Computing, 9th International Conference, Innsbruck, Austria, September 16-19 2007. Krumm, J., Abowd, G. D., Seneviratne, A. & Strang, T. (eds.). Springer-Verlag, Vol. 4717. p. 73-90 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  410. Published

    Nitrogen cycling in ~2.7 Ga oceans

    Yang, J., Zerkle, A., Grassineau, N., Nisbet, E., Mettam, C., Hunter, M., Martin, A., Newton, J. & Boyce, A., 13 Dec 2016, American Geophysical Union Fall Annual Meeting. San Francisco, p. PP21D-04

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  411. Published

    NLO automated tools for QCD and beyond

    Kauer, N., 26 Feb 2012, LC11: Understanding QCD at linear colliders in searching for old and new physics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  412. Published

    Noisy Carrier Modulation for HF RFID: First International EURASIP Workshop on RFID Technology

    Hancke, G. P., 1 Sep 2007, First International EURASIP Workshop on RFID Technology. Austria, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  413. Unpublished

    Nomadic Metrology

    Hazell, C., 2019, (Unpublished) A Day with Rosi Braidotti: ZOE-GEO-TECHNO Egalitarianism .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  414. Published

    Non-asymptotic calibration and resolution

    Vovk, V., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, Vol. 3734. p. 429-443 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  415. Published

    NON-CRIMP THERMOPLASTIC COMPOSITE FABRICS - AEROSPACE SOLUTIONS TO AUTOMOTIVE PROBLEMS

    WOOLSTENCROFT, D. H. & Hogg, P., 1991, ADVANCED COMPOSITE MATERIALS : NEW DEVELOPMENTS AND APPLICATIONS. MATERIALS PARK: ASM INTERNATIONAL, p. 339-349 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. Published

    Non-Forensic Odontological Biometrics

    Busch, C. & Wolthusen, S. D., 12 Sep 2009, Proc. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '09). IEEE Computer Society Press, p. 1105-1109

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  417. Published

    Non-Interactive Key Exchange

    Freire, E. S. V., Hofheinz, D., Kiltz, E. & Paterson, K. G., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 254-271 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  418. Submitted

    Non-Latin Alphabets in the transmission of Simon of Genoa's Clavis Sanationis

    Zipser, B., 2019, (Submitted) De Bagdad à Constantinople: le transfert des savoirs médicaux, XIe-XVe s.. Cronier, M. (ed.). Paris: Collection Orient et Méditerranée

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  419. Published

    Nonlinear Equivalence of Stream Ciphers

    Rønjom, S. & Cid, C., 2010, Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Springer, p. 40-54 15 p. (Lecture Notes in Computer Science; vol. 6147).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  420. Published

    Nonresponse in cross-cultural telephone surveys: reflections on telephone survey interviews with Chinese managers

    Wang, C. L. & Saunders, M., 2011, British Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  421. Published

    Normalized nonconformity measures for regression conformal prediction

    Papadopoulos, H., Gammerman, A. & Vovk, V., 2008, Proceedings of the IASTED International Conference on Articial Intelligence and Applications. p. 64-69 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  422. Published

    Normative KGP Agents: A Preliminary Report

    Sadri, F., Toni, F. & Stathis, K., 1 Dec 2005, Symposium on Normative Multi-Agent Systems, NORMAS 2005, part of the SSAISB 2005 Convention, University of Hertfordshire, Hatfield, UK. p. 85-96 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  423. Published

    Not in Silos: locating ERP project into a complex network- A multiple-project perspective

    Elbanna, A., 2008, Proceedings of the European Conference of Information Systems 2008.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. Published

    Novel Genetic Bees Algorithm applied to single machine scheduling problem

    Packianather, M. S., Yuce, B., Mastrocinque, E., Fruggiero, F., Pham, D. T. & Lambiase, A., 2014, World Automation Congress (WAC), 2014. Waikoloa, HI, USA : IEEE, p. 906-911 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  425. Published

    Numerical modelling of stress fields around magma chambers and the generation of ring faults

    Gudmundsson, A., Turon, E. & Marti, J., 1997, Proceedings of IAMG97 Third Annual Conference of the International Association for Mathematical Geology. Pawlowsky-Glahan, V. (ed.). Barcelona, p. 401-406

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  426. Published

    O Debate Político e o Conflito Inter-Profissional em redor da Regulamentação das Medicinas Alternativas e Complementares em Portugal

    Almeida, J., 2008, VI Congresso Português de Sociologia. Lisbon, Portugal, p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  427. Published

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. J. & Chen, T., 11 Nov 2019, Proceedings of the Security Standardisation Research Conference 2019 (SSR 2019, an ACM CCS 2019 Workshop), London, November 11 2019. ACM, p. 35-44 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  428. Published

    Obfuscation and Formal Grammars Revisited

    Repel, D. & Stengel, I., 13 Sep 2013, Fifth International Conference on Internet Technologies and Applications. p. 267-274 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  429. Published

    Object languages in a type-theoretic meta-framework

    Callaghan, P. C., Luo, Z. & Pang, J., 2001, Proof Transformation and Presentation and Proof Complexities.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  430. Published

    Object-Oriented Conceptual Modeling from Law

    Sernadas, C., Fiadeiro, J. L. & Sernadas, A., 1988, DS-3. p. 305-327 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  431. Published

    Observation Mechanism and Cost Model for Tightly Coupled Asymmetric Concurrency

    Seeger, M. & Wolthusen, S. D., May 2010, Proceedings, 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 158-163

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  432. Published

    Observation of stages of homogeneous nucleation of liquid droplets in solid isotopic helium mixtures

    Poole, M., Saunders, J. & Cowan, B., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 360-361 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  433. Published

    Observations on the use of mobile decision aids for consumer decision making

    van der Heijden, H. & Sangstad Sørensen, L., 2003, Proceedings of the 2nd International Conference on Mobile Business (ICMB). Vienna, Austria

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  434. Published

    Oceanographic MOWER Cruise

    Valencia, J., Ercilla, G., Hernández-Molina, F. J. & Casas, D., 9 Apr 2015, International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences - ISPRS Archives. 5W5 ed. International Society for Photogrammetry and Remote Sensing, Vol. 40. p. 223-230 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  435. Published

    Off-line Nearest Neighbour Transductive Confidence Machine

    Nouretdinov, I., 2008, 8th Industrial Conference on Data Mining 2008 Poster and Workshop Proceedings. p. 16-24 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  436. Published

    Offline Peer-to-Peer Broadcast with Anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M., 2011, E-business and Telecommunications. 3 ed. Springer, Vol. 130. p. 174-185 (Communications in Computer and Information Science ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  437. Unpublished

    Oil, Baltic Dry index, foreign exchange, market liquidity and business cycles: Evidence from net oil exporting countries and net oil importing countries

    Said, H. & Giouvris, E., 2018, (Unpublished) 2018 International Conference on Business and Information-Winter session.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  438. Published

    Old and new deterministic factoring algorithms

    McKee, J. & Pinch, R., 1996, Proceedings of the second Algorithmic Number Theory Symposium (ANTS II). Springer, p. 217-224

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  439. Published

    On a possible privacy flaw in Direct Anonymous Attestation (DAA)

    Leung, A., Chen, L. & Mitchell, C. J., 2008, Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, Villach, Austria, March 11-12, 2008, Proceedings. Lipp, P., Sadeghi, A-R. & K-M. K. (eds.). Berlin: Springer-Verlag, p. 179-190 12 p. (Lecture Notes in Computer Science; vol. 4968).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  440. Published

    On assessing the positioning accuracy of Google Tango in challenging indoor environments

    Nguyen, D. K. A. & Luo, Z., 23 Nov 2017, The 8th International Conference on Indoor Positioning and Indoor Navigation, Sept 18-21, 2017, Japan. IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  441. Published

    On becoming bicultural: a taxonomy of expatriate cultural identity

    Zhang, L. E., 2014, Academy of Management Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  442. Published

    On Cipher-Dependent Related-Key Attacks in the Ideal Cipher Model

    Albrecht, M., Farshim, P., Paterson, K. & Watson, G., 2011, Fast Software Encryption (FSE). Joux, A. (ed.). Springer, Vol. 6733. p. 128-145 (Lecutre Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  443. Published

    On Completeness in Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 6 Jun 2016, Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies: SACMAT '16. New York: ACM Press, p. 149-160 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  444. Published

    On Correctness of Data Structures under Reads-Write Concurrency

    Lev-Ari, K., Chockler, G. & Keidar, I., 2014, Distributed Computing: 28th International Symposium DISC 2014, Austin, TX, USA, October 12-15, 2014, Proceedings. Kuhn, F. (ed.). 1 ed. Springer-Verlag Berlin Heidelberg, Vol. 8784. p. 273-287 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  445. Published

    On Creating Complementary Pattern Databases

    Franco, S., Torralba, Á., Lelis, L. H. S. & Barley, M., 2017, Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 4302-4309 8 p. (IJCAI International Joint Conference on Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  446. E-pub ahead of print

    On Deception-Based Protection Against Cryptographic Ransomware

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 6 Jun 2019, DIMVA 2019: 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Springer, p. 219-239 21 p. (Lecture Notes in Computer Science; vol. 11543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  447. Published

    On delegation and workflow execution models

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing. ACM Press, p. 2137-2144 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  448. Published

    On drive-by-download attacks and malware classification

    Puttaroo, M., Komisarczuk, P. & De Amorim, R. C., 2013, Proceedings of the 5th International Conference on Internet Technologies and Applications, ITA 2013. Glyndwr University, p. 217-225 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  449. E-pub ahead of print

    On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL

    Albrecht, M., 1 Apr 2017, Annual International Conference on the Theory and Applications of Cryptographic Techniques: EUROCRYPT 2017: Advances in Cryptology . Springer, p. 103-129 27 p. (Lecture Notes in Computer Science; vol. 10210).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  450. Published

    On Generating Efficient Data Summaries for Logistic Regression: A Coreset-based Approach

    Riquelme Granada, N., Nguyen, D. K. A. & Luo, Z., Jul 2020, 9th International Conference on Data Science, Technology and Applications (DATA 2020). Vol. 1. p. 78-89 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  451. Published

    On Initializations for the Minkowski Weighted K-Means

    Amorim, R. C. D. & Komisarczuk, P., 2012, Advances in Intelligent Data Analysis XI - 11th International Symposium, IDA 2012, Helsinki, Finland, October 25-27, 2012. Proceedings. p. 45-55 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  452. Published

    On Key Assignment for Hierarchical Access Control

    Crampton, J., Martin, K. M. & Wild, P., 2006, Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 98-111 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  453. Published

    On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval

    Crampton, J., Morisset, C. & Zannone, N., 1 Jun 2015, 20th ACM Symposium on Access Control Models and Technologies. ACM, p. 99-109 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  454. Published

    On mobile agent based transactions in moderately hostile environments

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Advances in Network and Distributed Systems Security, Proceedings of IFIP TC11 WG11.4 First Annual Working Conference on Network Security, KU Leuven, Belgium, November 2001. De Decker, B., Piessens, F., Smits, J. & Van Herreweghen, E. (eds.). Kluwer Academic Publishers, p. 173-186 14 p. (IFIP Conference Proceedings; no. 206).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  455. Published

    On modelling multi-agent systems declaratively

    Bracciali, A., Mancarella, P., Stathis, K. & Toni, F., 2005, Declarative agent languages and technologies II. Springer-Verlag, Vol. 3476. p. 53-68 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  456. Published

    On multi-channel MAC protocols in cognitive radio networks

    Yau, A. K-L., Komisarczuk, P. & Teal, P. D., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 300-305 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  457. Published

    On partitional clustering of malware

    de Amorim, R. C. & Komisarczuk, P., 2012, Cyberpatterns 2012. p. 47-51 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  458. Published

    On permissions, inheritance and role hierarchies

    Crampton, J., 2003, Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM Press, p. 85-92 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  459. Published

    On Problems as Hard as CNF-SAT

    Cygan, M., Dell, H., Lokshtanov, D., Marx, D., Nederlof, J., Okamoto, Y., Paturi, R., Saurabh, S. & Wahlström, M., 2012, IEEE Conference on Computational Complexity. p. 74-84 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  460. Published

    On quantum statistics in data analysis

    Pavlovic, D., 2008, Quantum Interaction 2008. Bruza, P. (ed.). AAAI Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  461. Published

    On quasipolynomial multicut-mimicking networks and kernelization of multiway cut problems

    Wahlström, M., 29 Jun 2020, ICALP 2020. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 168. p. 1-14 14 p. 101

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  462. Published

    On Redefinitions of 'Rescue opera'

    Charlton, D., 1992, Music and the French Revolution. Boyd, M. (ed.). 1992: Cambridge University Press, p. 169-88 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  463. Published

    On r-Simple k-Path and Related Problems Parameterized by k/r

    Gutin, G., Wahlstrom, M. & Zehavi, M., Jan 2019, Proceedings of SODA 2019. p. 1750-1769 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  464. Published

    On security vulnerabilities and mitigation in the cognition cycle of Distributed Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P., Poh, G-S. & Martin, K., 2011, Proceedings of the 6th International Conference on Broadband Communications & Biomedical Applications. IEEE, p. 132-137

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  465. Published

    On Singleton Arc Consistency for CSPs Defined by Monotone Patterns

    Carbonnel, C., Cohen, D. A., Cooper, M. C. & Živný, S., 20 Feb 2018, 35th Symposium on Theoretical Aspects of Computer Science, STACS 2018. Niedermeier, R. & Vallée, B. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 96. p. 19:1-19:15 15 p. 19

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  466. Published

    On solutions to the key escrow problem

    Hoyle, M. P. & Mitchell, C. J., 1998, State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 1997. Preneel, B. & Rijmen, V. (eds.). Springer-Verlag, p. 277-306 30 p. (Lecture Notes in Computer Science; no. 1528).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  467. Published

    On spatio-temporal constraints and inheritance in role-based access control

    Chen, L. & Crampton, J., 2008, Proceedings of ACM Symposium on Information, Computer and Communications Security. ACM Press, p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  468. Published

    On Subtyping in Type Theories with Canonical Objects

    Lungu, G. & Luo, Z., Nov 2018, Types for Proofs and Programs: Post-proceedings of the 22nd Int. Conf. on Types for Proofs and Programs (TYPES 2016). Leibniz International Proceedings in Informatics, Vol. 97. p. 13:1-13:31 31 p. 13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  469. Published

    On Symmetric Encryption with Distinguishable Decryption Failures

    Boldyreva, A., Degabriele, J. P., Paterson, K. & Stam, M., 2014, FSE 2013. Moriai, S. (ed.). Springer, Vol. 8424. p. 1–24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  470. Published

    On the (in)security of IPsec in MAC-then-encrypt configurations

    Degabriele, J. P. & Paterson, K. G., 2010, CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 493-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  471. Published

    On the Absence of Predictive Complexity for Some Games

    Kalnishkan, Y. & Vyugin, M. V., 2002, Algorithmic Learning Theory 13th International Conference, ALT 2002, Proceedings: volume 2533 of Lecture Notes in Artificial Intelligence. Springer, (Lecture Notes in Artificial Intelligence; vol. 2533).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  472. Published

    On the complexity of universal leader election

    Kutten, S., Pandurangan, G., Peleg, D., Robinson, P. & Trehan, A., 2013, ACM Symposium on Principles of Distributed Computing, PODC '13, Montreal, QC, Canada, July 22-24, 2013. p. 100-109 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  473. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K., 2017, Trustcom/BigDataSE/ICESS, 2017 IEEE. p. 41-49 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  474. Published

    On the Emergence of Properties in Component-Based Systems

    Fiadeiro, J. L., 1996, AMAST. Springer, Vol. 1101. p. 421-443 23 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  475. Published

    On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

    Curtis, B. & Player, R., 11 Nov 2019, 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. Springer, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  476. Published

    On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles

    Al-Kuwari, S. & Wolthusen, S. D., 2011, Forensics in Telecommunications, Information, and Multimedia: Proceedings of the Third International ICST Conference (e-Forensics 2010). Springer-Verlag, p. 207-223

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  477. Published

    On the filtering of photoplethysmography signals

    Awodeyi, A. E., Alty, S. R. & Ghavami, M., 5 Feb 2014, Proceedings - IEEE 14th International Conference on Bioinformatics and Bioengineering, BIBE 2014. Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 7033577

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  478. Published

    On the hardness of LWE with binary error: Revisiting the hybrid lattice-reduction and meet-in-the-middle attack

    Buchmann, J., Göpfert, F., Player, R. & Wunderer, T., 7 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9646. p. 24-43 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  479. Published

    On the interplay between strategic performance measurement and managerial accounting change for sustainable development

    Subramaniam, N., 2015, European Network for Research in Organisational & Accounting Change (ENROAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  480. Published

    On the Joint Security of Encryption and Signature in EMV

    Degabriele, J. P., Lehmann, A., Paterson, K. G., Smart, N. P. & Strefler, M., 2012, CT-RSA. Dunkelmann, O. (ed.). Springer, Vol. 7178. p. 116-135 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  481. Published

    On the Joint Security of Encryption and Signature, Revisited

    Paterson, K., Thomson, S., Schuldt, J. & Stam, M., 2011, ASIACRYPT. Lee, D. H. & Wang, X. (eds.). Springer, Vol. 7073. p. 161-178 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  482. Published

    On the Life Cycle of the Certification Authority key pairs in EMV'96

    Markantonakis, K. & Rantos, K., Apr 1999, On the Life Cycle of the Certification Authority key pairs in EMV'96. Society for Computer Simulation, p. 125-130

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  483. Published

    On the Limits of Information Flow Techniques for Malware Analysis and Containment

    Cavallaro, L., Saxena, P. & Sekar, R., 10 Jul 2008, Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. Zamboni, D. (ed.). Springer, p. 143-163 (Lecture Notes in Computer Science; vol. 5137).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  484. Published

    On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 BPM Workshop on Workflow Security Audit and Certification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  485. Published

    On the parameterized complexity of the workflow satisfiability problem

    Crampton, J., Gutin, G. & Yeo, A., 2012, CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security. New York: ACM, p. 857-868

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  486. Published

    On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation

    Papapanagiotou, K., Markantonakis, K., Zhang, Q., Sirett, W. & Mayes, K., 2005, Security and Privacy in the Age of Ubiquitous Computing. Sasaki, R., Qing, S., Okamoto, E. & Yoshiura, H. (eds.). Springer Boston, Vol. 181. p. 551-563 13 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  487. Unpublished

    On the pricing of commonality across various liquidity proxies in the London Stock Exchange

    Lim, S. & Giouvris, E., 2015, (Unpublished) On the pricing of commonality across various liquidity proxies in the London Stock Exchange.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  488. Published

    On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks

    Kendall, M. & Martin, K. M., 2012, Research in Cryptology – 4th Western European Workshop WEWoRC 2011. Springer, Vol. 7242. p. 62-82 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  489. Published

    On the Satisfiability of Workflows with Release Points

    Crampton, J., Gutin, G. & Watrigant, R., Jun 2017, SACMAT '17 Abstracts: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 207-217 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  490. Published

    On the security of a structural proven signer ordering multisignature scheme

    Mitchell, C. J. & Hur, N., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, Vol. 228. p. 1-8 8 p. (IFIP Conference Proceedings; no. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  491. Published

    On the security of some password-based key agreement schemes

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 149-154 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  492. E-pub ahead of print

    On the Security of the Algebraic Eraser Tag Authentication Protocol

    Blackburn, S. & Robshaw, M. J. B., 9 Jun 2016, Applied Cryptology and Network Security: 14th International Conference, ACNS 2016, London (Guildford), UK, June 19-22, 2016. Springer-Verlang, Vol. 9696. p. 3-17 15 p. (Lecture Notes in Computer Science; vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  493. Published

    On the Security of the TLS Protocol: A Systematic Analysis

    Krawczyk, H., Paterson, K. G. & Wee, H., Aug 2013, Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings. Garay, J. A. & Canetti, R. (eds.). Springer, Vol. 1. p. 429-448 (Lecture Notes in Computer Science; vol. 8042).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  494. Published

    On the undecidability of asynchronous session subtyping

    Lange, J. & Yoshida, N., 16 Mar 2017, Foundations of Software Science and Computation Structures - 20th International Conference, FOSSACS 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings. Esparza, J. & Murawski, A. S. (eds.). Springer Verlag, p. 441-457 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10203 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  495. Published

    On the use of variable user goals to measure perceived usefulness

    Matook, S. & van der Heijden, H., 2007, Proceedings of the European Conference on Information Systems (ECIS). St Gallen, Switzerland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  496. Published

    On the Way to 'Euphonia': Berlioz's Promotion of Earlier Music

    Charlton, D., 2015, Von Gluck zu Berlioz.: Die französische Oper zwischen Antikenrezeption und Monumentalität.. Betzwieser, T. & Mauksch, S. (eds.). Würzburg: Konigshausen & Neumann, p. 139-58 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  497. Published

    On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes

    Procter, G. & Cid, C., 2013, Fast Software Encryption, 20th International Workshop, FSE 2013. Springer, Vol. 8424. p. 287-304 18 p. (Lecture Notes in Computer Science - LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  498. Published

    One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography

    Jager, T., Paterson, K. & Somorovsky, J., 24 Apr 2013, Network and Distributed System Security Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  499. Published

    Online community response to major disaster: A study of Tianya forum in the 2008 Sichuan earthquake

    Qu, Y., Wu, P. F. & Wang, X., 6 Apr 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755366

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  500. Published

    On-line confidence machines are well-calibrated

    Vovk, V., 2002, Proceedings of the Forty Third Annual Symposium on Foundations of Computer Science. Los Alamitos, CA: IEEE Computer Society, p. 187-196 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  501. Published

    Online conformal prediction for classifying different types of herbal medicines with electronic nose

    Zhan, X., Guan, X., Wu, R., Wang, Z., Wang, Y., Luo, Z. & Li, G., 4 Nov 2018, IET Doctoral Forum on Biomedical Engineering, Healthcare, Robotics and Artificial Intelligence 2018: BRAIN 2018. IET Conference Publications, Vol. 2018. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...4 5 6 7 8 9 10 11 ...79 Next