Home > Publications

Publications

38501 - 39000 out of 43,237Page size: 500
  1. Conference contribution › Research
  2. E-pub ahead of print

    Cryptanalysis of the multivariate encryption scheme EFLASH

    Øygarden, M., Felke, P., Raddum, H. & Cid, C., 14 Feb 2020, (E-pub ahead of print) Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). Springer, p. 85-105 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Cryptanalysis of two variants of PCBC mode when used for message integrity

    Mitchell, C. J., 2005, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Boyd, C. & Gonzalez-Nieto, J. (eds.). Springer-Verlag, Vol. 3574. p. 560-571 12 p. (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    CryptoCache: Network caching with confidentiality

    Leguay, J., Paschos, G., Quaglia, E. & Smyth, B., 31 Jul 2017, 2017 IEEE International Conference on Communications (ICC). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. E-pub ahead of print

    Cryptographic Enforcement of Information Flow Policies Without Public Information

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 9 Jan 2016, (E-pub ahead of print) 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . Malkin, T., Kolesnikov, V., Bishop Lewko, A. & Polychronakis, M. (eds.). p. 389-408 20 p. (Lecture Notes in Computer Science; vol. 9092).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Cryptographic Enforcement of Role-Based Access Control

    Crampton, J., 2010, Proceedings of 7th International Workshop on Formal Aspects of Security and Trust. Springer, p. 191-205 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Cryptographic Protocol Synthesis and Verification for Multiparty Sessions

    Bhargavan, K., Corin, R., Denielou, P-M., Fournet, C. & Leifer, J. J., 2009, PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM. LOS ALAMITOS: IEEE COMPUTER SOC, p. 124-140 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2007, Proceedings of the 12th Nordic Workshop on Secure IT Systems. p. 49-60 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Crystal Structure Prediction via Oblivious Local Search

    Antypov, D., Deligkas, A., Gusev, V., Rosseinsky, M. J., Spirakis, P. G. & Theofilatos, M., 12 Jun 2020, 18th International Symposium on Experimental Algorithms, SEA 2020. Faro, S. & Cantone, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. 21. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 160).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Crystallography of magnetite plaquettes and their significance as asymmetric catalysts for the synthesis of chiral organics in carbonaceous chondrites

    Chan, QHS. & Zolensky, ME., Oct 2015, European Planetary Science Congress 2015, held 27 September - 2 October, 2015 in Nantes, France.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    C-SHORe: A Collapsible Approach to Verifying Higher-Order Programs

    Broadbent, C., Carayol, A., Hague, M. & Serre, O., 25 Sep 2013, ICFP: International Conference on Functional Programming. p. 13-24 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    CSR priorities of emerging economy firms: Is Russia different from the other emerging economies

    Preuss, L. & Barkemeyer, R., Sep 2010, 9th annual colloquium of the Academy of Business in Society (ABIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published
  14. Unpublished

    Culture-Centric Studies of Marketing and Consumption in Brazil

    Ferreira, M. C., Figueiredo, B., Pereira, S. & Scaraboto, D., 2 Jul 2014, (Unpublished) Proceedings of the 39th Annual Macromarketing Conference. Macromarketing Society, Inc., p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Curb Your Enthusiasm: Why the Future is Not Stuxnet

    Haggman, A., 2 Jul 2015, Proceedings of the 14th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, p. 397-403 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Customer Agility Capabilities at EuroBank: The Role of ICT and Organizational Routines

    Hallikainen, P., Merisalo-Rantanen, H. & Elbanna, A., 2017, Australasian Conference on Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Customizing Conventional Patent-based Financial Instruments for Financing Nanotechnology Firms: An Iranian Perspective

    Nasiri, A., 2010, International Conference on Nanotechnology and Biosensors (ICNB). Hong Kong, China

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Cyber Exercises: A Vision for NATO: A CyCon 2021 Workshop Summary Report

    Ertan, A., Kuprys, A., Lillemets, P. & Nordli, G-M., 19 Aug 2021, CyCon 2021. NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE), 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. E-pub ahead of print

    'Cyber security is a dark art': The CISO as soothsayer

    Da Silva, J. & Jensen, R. B., 25 Feb 2022, (E-pub ahead of print) ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. E-pub ahead of print

    Cybersecurity Readiness of E-tail Organisations: A Technical Perspective

    Shah, M., Muhammad, R. & Ameen, N., 1 Apr 2020, (E-pub ahead of print) Responsible Design, Implementation and Use of Information and Communication Technology: 19th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6–8, 2020, Proceedings, Part I. p. 153-160 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise

    Creese, S., Goldsmith, M., Moffat, N., Happa, J. & Agrafiotis, I., 2013, IEEE Conference on Technologies for Homeland Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Dancing with strangers: observing play, movement and interaction in a public square through the lens of a dancer, a writer and a painter

    Coppard, H., 30 Sep 2014, Children and Families in Changing Urban Spaces conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Dare to innovate by taking care of hurdles to innovation

    Guenther, E., Hueske, A-K., Kesting, P., Linnenluecke, M., Moeller, K. & Preuss, L., Aug 2010, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Data caching as a cloud service

    Chockler, G., Laden, G. & Vigfusson, Y., 2010, Proceedings of the 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS '10). ACM, p. 18-21 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Data Dependent Power Use in Multipliers

    Walter, C. D. & Samyde, D., 2005, 17th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 4-12 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Data Integrity in Hardware for Modular Arithmetic

    Walter, C. D., 2000, CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1965. p. 204-215 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Data Is a Stream: Security of Stream-Based Channels

    Fischlin, M., Günther, F., Marson, G. A. & Paterson, K., 1 Aug 2015, Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Gennaro, R. & Robshaw, M. (eds.). Springer Verlag, Vol. 9216. p. 545-564 20 p. (Lecture Notes in Computer Science; vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Data Structures for Constraint Enforcement in Role-Based Systems

    Crampton, J. & Khambhammettu, H., 2005, Proceedings of the 2005 IASTED Conference on Network and Information Security. p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. E-pub ahead of print

    Data-Driven Robust Control for Type 1 Diabetes Under Meal and Exercise Uncertainties

    Paoletti, N., Liu, K. S., Smolka, S. A. & Lin, S., 1 Sep 2017, (E-pub ahead of print) Computational Methods in Systems Biology. Feret, J. & Koeppl, H. (eds.). Springer, p. 214-232 19 p. (Lecture Notes in Computer Science; vol. 10545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Dataset Construction and Analysis of Screenshot Malware

    Sbai, H., Happa, J., Goldsmith, M. & Meftali, S., 29 Dec 2020, International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. DCM 4.0: Integration of Industry 4.0 and Demand Chain in Global Manufacturing

    Ganji, E. N., Coutroubis, A. & Shah, S., 13 Aug 2018, 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8436383. (2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

    Weldehawaryat, G., Ambassa, P., Marufu, A., Wolthusen, S. & Kayem, A. V. D. M., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 69-86 18 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. E-pub ahead of print

    Decidable Models of Integer-Manipulating Programs with Recursive Parallelism

    Hague, M. & Lin, A., 13 Sep 2016, (E-pub ahead of print) Reachability Problems: 10th International Workshop, RP 2016, Aalborg, Denmark, September 19-21, 2016, Proceedings. Springer International Publishing, Vol. 9899. p. 148-162 15 p. (Lecture Notes in Computer Science; vol. 9899).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Declarative agent control

    Kakas, A., Mancarella, P., Sadri, F., Stathis, K. & Toni, F., 2004, Computational Logic in Multi-agent Systems (CLIMA 2004). Springer-Verlag, Vol. 3487. p. 96-110 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Decoherence of a quantum bit circuit

    Ithier, G., Nguyen, F., Collin, E., Boulant, N., Meeson, P. J., Joyez, P., Vion, D. & Esteve, D., 2007, Quantum Decoherence: Poincare Seminar 2005. Duplantier, B., Raimond, JM. & Rivasseau, V. (eds.). CAMBRIDGE: Birkhauser, Boston, p. 125-149 25 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Deconfinement and cold atoms in optical lattices

    Cazalilla, M. A., Ho, A. F. & Giamarchi, T., 2006, RECENT PROGRESS IN MANY-BODY THEORIES: Proceedings of the 13th International Conference, Buenos Aires, Argentina, 5 – 9 December 2005. Hernández, S. & Cataldo, H. (eds.). p. 208-217 10 p. (Series on Advances in Quantum Many-Body Theory ; vol. 10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Forthcoming

    Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper

    Meister, J. A., Akram, R. N. & Markantonakis, K., 7 Nov 2018, (Accepted/In press) The 12th WISTP International Conference on Information Security Theory and Practice (WISTP'2018). Blazy, O. & Yeun, C. Y. (eds.). Brussels, Belgium: Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Deep learning based melanoma diagnosis using dermoscopic images

    Wall, C., Young, F., Zhang, L., Phillips, E-J., Jiang, R. & Yu, Y., 15 Aug 2020, World Scientific Proceedings Series on Computer Engineering and Information Science. In: Developments of Artificial Intelligence Technologies in Computation and Robotics. World Scientific Proceedings Series on Computer Engineering and Information Science, 12. : World Scientific, Singapore, p. 907-914 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Deep learning-based fall detection

    Chiang, J. W. H. & Zhang, L., 15 Aug 2020, Deep learning-based fall detection . In: Developments of Artificial Intelligence Technologies in Computation and Robotics. World Scientific Proceedings Series on Computer Engineering and Information Science, 12.: World Scientific, Singapore, p. 891-898 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Deep Recurrent Neural Networks with Attention Mechanisms for Respiratory Anomaly Classification

    Wall, C., Zhang, L., Yu, Y. & Mistry, K., 20 Sep 2021, 2021 International Joint Conference on Neural Networks (IJCNN). International Joint Conference on Neural Networks (IJCNN): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Forthcoming

    Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the 6th International Workshop on Critical Information Infrastructures Security 2011 (CRITIS 2011). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Defending financial infrastructures through early warning systems: The intelligent cloud approach

    Lodi, G., Querzoni, L., Baldoni, R., Marchetti, M., Colajanni, M., Bortnikov, V., Chockler, G., Dekel, E., Laventman, G. & Roytman, A., 2009, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies (CSIIRW '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Defensive Forecast for Conformal Bounded Regression

    Nouretdinov, I. & Lebedev, A., Oct 2013, The 9th Artificial Intelligence Applications and Innovations Conference (AIAI): 2nd Workshop on Conformal Prediction and its Applications. p. 384-393 10 p. (IFIP Advances in Information and Communication Technology; vol. 412).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Defensive forecasting

    Vovk, V., Takemura, A. & Shafer, G., 2005, Proceedings of the Tenth International Workshop on Articial Intelligence and Statistics. Cowell, R. & Ghahramani, Z. (eds.). p. 365-372 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Defensive forecasting for linear protocols

    Vovk, V., Nouretdinov, I., Takemura, A. & Shafer, G., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, Vol. 3734. p. 459-473 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Defensive prediction with expert advice

    Vovk, V., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, p. 444-458 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Definitions of corporate social responsibility: Content, range of authors, evolution over time

    Preuss, L., 2015, Annual Meeting of the International Association for Business and Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Delay and jitter attacks on hierarchical state estimation

    Baiocco, A., Foglietta, C. & Wolthusen, S., 21 Mar 2016, Proceedings of the 2015 IEEE International Conference on Smart Grid Communications. IEEE Press, p. 485-490

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Delegation and satisfiability in workflow systems

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 31-40 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H., 2006, Proceedings of 11th European Symposium on Research in Computer Security. Springer, p. 174-191 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Democratising Capitalism: Employee Share ownership schemes and unions

    Sen Gupta, S., 2013, European Academy of Management, University of Galatsaray, Istanbul, Turkey.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Dependent coercions

    Luo, Z. & Soloviev, S., 1999, Proc of the 8th Inter. Conf. on Category Theory in Computer Science (CTCS'99), Edinburgh, Scotland. Electronic Notes in Theoretical Computer Science, Vol 29.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Dependent Randomized Rounding: The Bipartite Case

    Doerr, B., Künnemann, M. & Wahlström, M., 2011, 2011 Proceedings of the Thirteenth Workshop on Algorithm Engineering and Experiments (ALENEX). Müller-Hannemann, M. & Werneck, R. (eds.). San Francisco, California, USA: SIAM, p. 96-106 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Dependent record types revisited

    Luo, Z., 2009, Modules and Libraries for Proof Assistants (MLPA'09), ACM Inter. Conf. Proceeding Series. Vol. 429.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Derandomizing stochastic prediction strategies

    Vovk, V., 1997, Proceedings of the Tenth Annual Conference on Computational Learning Theory. Freund, Y. & Schapire, R. (eds.). New York: ACM Press, p. 32-44 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Deriving Ancient Foot Units from Building Dimensions: a Statistical Approach Employing Cosine Quantogram Analysis

    Pakkanen, J., 2002, Archaeological Informatics: Pushing the Envelope. CAA 2001: Computer Applications and Quantitative Methods in Archaeology. Proceedings of the 29th Conference, Gotland, April 2001. Burenhult, G. & Arvidsson, J. (eds.). Oxford: Archaeopress, p. 501–506 (BAR International Series; vol. 1016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Deriving authentication for pervasive security

    Pavlovic, D. & Meadows, C., 2008, Proceedings of the ISTPS 2008. McLean, J. (ed.). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Forthcoming

    Deriving ephemeral authentication using channel axioms

    Pavlovic, D. & Meadows, C., 2012, (Accepted/In press) Proceedings of the Cambridge Workshop on Security Protocols 2009. Christianson, B. (ed.). Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Description and Classification of Rhodoliths (Rhodoids, Rhodolites)

    Bosence, D., 1983, Coated Grains. Peryt, T. M. (ed.). Springer Berlin / Heidelberg, p. 217-224 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Description of Laser Transport and Delivery System for the FETS Laserwire Emittance Scanner

    Bosco, A., Boorman, G., Emery, S., Gibson, S., Gabor, C., Hofmann, T., Pozimski, J. & Savage, P., 19 Sep 2013, 2nd International Beam Instrumentation Conference. p. 527-530 4 p. TUPF14

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Design and development of a facebook application to raise privacy awareness

    Costantino, G. & Sgandurra, D., 2015, Proceedings - 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2015. Institute of Electrical and Electronics Engineers Inc., p. 583-586 4 p. 7092778

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Design of a Laser-based Profile Monitor for LINAC4 Commissioning at 50 MeV and 100 MeV

    Hofmann, T., Boorman, G., Bosco, A., Bravin, E., Gibson, S. & Griesmayer, E., Jan 2016, 4th International Beam Instrumentation Conference: IBIC2015, Melbourne, Australia. JACoW Publishing, p. 451-455 4 p. TUPB055

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Design of a multiagent-based e-marketplace to secure service trading on the Internet

    Li, Q., Martin, K. M. & Zhang, J., 2011, Proceedings of the 13th International Conference on Electronic Commerce (ICEC 2011) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Design of the beam delivery system for the international linear collider

    Seryi, A., Amann, J., Arnold, R., Asiri, F., Bane, K., Bellomo, P., Doyle, E., Fasso, A., Jonghoon, K., Keller, L., Ko, K., Li, Z., Markiewicz, T., Maruyama, T., Moffeit, K., Molloy, S., Nosochkov, Y., Phinney, N., Raubenheimer, T., Seletskiy, S. & 81 others, Smith, S., Spencer, C., Tenenbaum, P., Walz, D., White, G., Woodley, M., Woods, M., Xiao, L., Anerella, M., Jain, A., Marone, A., Parker, B., Delferriere, O., Napoly, O., Payet, J., Uriot, D., Watson, N., Agapov, I., Baldy, J-L., Schulte, D., Burt, G., Dexter, A., Buesser, K., Lohmann, W., Bellantoni, L., Drozhdin, A., Kashikhin, V., Kuchler, V., Lackowski, T., Mokhov, N., Nakao, N., Peterson, T., Ross, M., Striganov, S., Tompkins, J., Wendt, M., Yang, X., Enomoto, A., Kuroda, S., Okugi, T., Sanami, T., Suetsugu, Y., Tauchi, T., Alabau, M. D. C., Bambade, P., Brossard, J., Dadoun, O., Burrows, P., Christian, G., Clarke, C., Constance, B., Khah, H. D., Hartin, A., Perry, C., Swinson, C., Ferrari, A., Blair, G., Boogert, S., Carter, J., Angal-Kalinin, D., Beard, C., Densham, C., Fernandez-Hernando, L., Greenhalgh, J., Goudket, P., Jackson, F., Jones, J., Kalinin, A., Ma, L., McIntosh, P., Yamamoto, H., Mattison, T., Carwardine, J., Saunders, C., Appleby, R., Torrence, E., Gronberg, J., Sanuki, T., Iwashita, Y., Telnov, V. & Warner, D., 2007, Particle Accelerator Conference, 2007. PAC. IEEE. p. 3773-3775 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Design, development and use of the spectrometer for investigating coherent THz radiation produced by micro-bunching instabilities at Diamond Light Source

    Finn, A., Karataev, P. & Rehm, G., 1 Jul 2016, Journal of Physics: Conference Series. Karataev, P., Potylitsyn, A., Tyukhtin, A. & Strikhanov, M. (eds.). UK: IOP PUBLISHING LTD, Vol. 732. p. 1-9 9 p. 012039. (Radiation from Relativistic Electrons in Periodic Structures; vol. 732).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Design, Installation and Execution of a Security Agent for Mobile Stations.

    Sirett, W. G., MacDonald, J. A., Mayes, K. & Markantonakis, K., 2006, CARDIS. Domingo-Ferrer, J., Posegga, J. & Schreckling, D. (eds.). Springer, Vol. 3928. p. 1-15 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Unpublished

    Designing digital games as a geographical research method

    Lowe, J., 1 Jul 2020, (Unpublished) Using the Digital: Methodologies, Teaching, and Everyday Practice: Digital Geographies Research Group Virtual Annual Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Designing for creep in composites

    Hogg, P. J., 1998, DESIGNING COST-EFFECTIVE COMPOSITES. WESTMINISTER: PROFESSIONAL ENGINEERING PUBLISHING LTD, p. 93-106 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. E-pub ahead of print

    Designing Robust Software Systems through Parametric Markov Chain Synthesis

    Calinescu, R., Ceska, M., Gerasimou, S., Kwiatkowska, M. & Paoletti, N., 18 May 2017, (E-pub ahead of print) Software Architecture (ICSA), 2017 IEEE International Conference on. p. 131-140 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Designing Workflows for Grid Enabled Internet Instruments

    Stirling, D., Welch, I. & Komisarczuk, P., 2008, 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France. p. 218-225 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S., 9 Sep 2018, Proceedings of the 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017). Springer-Verlag, p. 131-143 13 p. (Lecture Notes in Computer Science; vol. 10707).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?

    Crampton, J. & Huth, M., 2009, Proceedings of 5th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. E-pub ahead of print

    Detecting disguised processes using application-behavior profiling

    Vaas, C. & Happa, J., 8 Jun 2017, (E-pub ahead of print) Technologies for Homeland Security (HST), 2017 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Detecting Exceptions in Commitment Protocols: Discovering Hidden States

    Kafali, O. & Yolum, P., 2010, Languages, Methodologies and Development Tools for Multi-Agent Systems. Vol. 6039. p. 112-127 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013. p. 300-303 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Detecting Malicious Code by Model Checking

    Kinder, J., Katzenbeisser, S., Schallhart, C. & Veith, H., 2005, Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, p. 174-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach

    Hague, M., Lin, A. & Ong, C-H. L., 23 Oct 2015, OOPSLA 2015: Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications. New York, NY: ACM, p. 1-19 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes

    Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 81-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Detecting video-game injectors exchanged in game cheating communities

    Karkallis, P., Blasco Alis, J., Suarez de Tangil Rotaeche, G. & Pastrana, S., Oct 2021, 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 310-316 7 p. (Lecture Notes in Computer Science; vol. 10898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Forthcoming

    Determining Confidence of Predicted Interactions Between HIV-1 and Human Proteins Using Conformal Method

    Nouretdinov, I., Gammerman, A., Qi, Y. & Klein-Seetharaman, J., 2012, (Accepted/In press) Pacific Symposium on Biocomputing. Vol. 17. p. 311-322 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) Attacks

    Esnaashari, S., Welch, I. & Komisarczuk, P., 2013, 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013. p. 725-729 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Deterministic versus Probabilistic Methods for Searching for an Evasive Target

    Bernardini, S., Fox, M., Long, D. & Piacentini, C., 12 Feb 2017, Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17). p. 3709-3715 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Developing a multi-level framework of sustainability innovation

    Dyerson, R. & Preuss, L., Sep 2011, 25th annual conference of the British Academy of Management (BAM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Developing a Typology of Social Commerce Websites- An Exploratory Study

    Panteli, N., 2015, 2015 Academy of Marketing Conference – The Magic in Marketing: University of Limerick, Ireland 7-9 July 2015. O'Malley, L. (ed.). p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Developing reuse technology in proof engineering

    Luo, Z., 1 Apr 1995, Proceedings of AISB95, Workshop on Automated Reasoning: bridging the gap between theory and practice, Sheffield, U.K..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Developing virtual medical communities

    Panteli, N. & Sims, J., 2010, Proceedings of the IADIS International Conference e-Health 2010, EH, Part of the IADIS Multi Conference on Computer Science and Information Systems 2010, MCCSIS 2010. p. 249-252 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Development and testing of the inTouch video link for people with dementia: Design approach and practical challenges

    Boyd, H., Jones, S., Harris, N., Panteli, N., Leake, J. & Jones, R., 29 Dec 2014, Proceedings - 2014 IEEE International Conference on Bioinformatics and Biomedicine, IEEE BIBM 2014. Institute of Electrical and Electronics Engineers Inc., p. 608-612 5 p. 6999231

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Development of a BPM System using a Commercial FPGA Card and Digitizer Adaptor Module for FETS

    Boorman, G., Gibson, S., Jolly, S., D'Arcy, R., Lawrie, S. & Letchford, A., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 3716-3719 4 p. THPME186

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Development of a Prototype Electro-Optic Beam Position Monitor at the CERN SPS

    Arteche, A., Bosco, A., Gibson, S., Chritin, N., Draskovic, D., Lefevre, T. & Levens, T., Feb 2017, 5th International Beam Instrumentation Conference: 11-15 September 2016, Barcelona, Spain. Geneva: JACoW Publishing, p. 1-4 4 p. WEPG09

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Development of microwave and soft X-ray sources based on coherent radiation and Thomson scattering

    Aryshev, A., Araki, A., Fukuda, M., Karataev, P., Naumenko, G., Potylitsyn, A., Sakaue, K., Sukhikh, L., Urakawa, J. & Verigin, D., 2010, VIII INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2009). Strikhanov, MN. & Pivovarov, YL. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Development of natural HEMP fibre sheet mould composites (NF- SMC)

    Ren, G., Patel, H., Hapuarachchi, D., Crowther, S., Fan, M. & Hogg, P. J., 1 Dec 2009, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Development of NPD portfolio management in project based environments

    Shah, S., Naghi Ganji, E. & Coutroubis, A., 5 Dec 2017, Advances in Manufacturing Technology XXXI: Proceedings of the 15th International Conference on Manufacturing Research, ICMR 2017, Incorporating the 32nd National Conference on Manufacturing Research. El Souri, M., Gao, J. & Keates, S. (eds.). IOS Press BV, p. 409-414 6 p. (Advances in Transdisciplinary Engineering; vol. 6).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Development of the C-Band BPM System for ATF2

    Molloy, S., Ainsworth, R., Boogert, S., Boorman, G., Heo, A., Kim, H. -S., Kim, E. -S., Honda, Y., Tauchi, T., Terunuma, N., Lyapin, A., Maiheu, B., Wing, M., McCormick, D. J., Nelson, J., White, G. R., Shin, S. & Ward, D. R., 2009, Proceedings of IPAC'09, Vancouver, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Development of the Sorong Fault Zone north of Misool Eastern Indonesia

    Saputra, A., Hall, R. & White, L., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. Jakarta, Indonesia, p. 1-14 IPA14-G-086

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    DEX: Self-Healing Expanders

    Pandurangan, G., Robinson, P. & Trehan, A., 2014, 2014 IEEE 28th International Parallel and Distributed Processing Symposium, Phoenix, AZ, USA, May 19-23, 2014. p. 702-711 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Diabetes, Type 1

    Riazi, A. & Bradley, C., 2000, Encyclopedia of Stress . Fink, G. (ed.). San Diego: Acadamic Press, p. 688-693 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Diagnosing Commitments: Delegation Revisited (Extended Abstract)

    Kafali, O. & Torroni, P., 2011, AAMAS 2011: 10th International Conference on Autonomous Agents and Multiagent Systems. p. 1175-1176 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Diagnosing the Clinician: Business Capability Development and GP Practices

    Dyerson, R., Nov 2017, 2017 Proceedings of the International Small Business & Entrepreneurship conference, Belfast. 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    DIESECT: A DIstributed Environment for Simulating E-commerce ContracTs

    Wood, D., Kafali, O. & Stathis, K., 2013, E-Commerce and Web Technologies. Huemer, C. & Lops, P. (eds.). Springer Berlin / Heidelberg, Vol. 152. p. 39-50 12 p. (Lecture Notes in Business Information Processing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Differential Cryptanalysis of Round-Reduced Sparx-64/128

    Ankele, R. & List, E., 2018, ACNS 2018 Applied Cryptography & Network security.. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 459-475 17 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Differential Privacy for Deep Learning-based Online Energy Disaggregation System

    Zhang, X. & Kuenzel, S., 10 Nov 2020, The 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe) . IEEE, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    DIFFUSE NEUTRON-SCATTERING FROM EXCESS OXYGEN IN UO2.13

    GOFF, J. P., HUTCHINGS, M. T., BROWN, K., HAYES, W. & GODFRIN, H., 1990, NEUTRON SCATTERING FOR MATERIALS SCIENCE. SHAPIRO, SM., MOSS, SC. & JORGENSEN, JD. (eds.). PITTSBURGH: MATERIALS RESEARCH SOC, p. 373-377 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Unpublished

    Digital game design as a geographical research method

    Lowe, J., 31 Aug 2021, (Unpublished) Innovative Digital Geographies session at RGS-IBG Annual International Conference 2021.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  105. Published

    Digital Liminalities: Understanding Isolated Communities on the Edge

    Jensen, R. B., Coles-Kemp, L., Wendt, N. & Lewis, M., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. Published

    Digital rights management using a mobile phone

    Abbadi, I. & Mitchell, C. J., 2007, Proceedings of ICEC 2007, Ninth International Conference on Electronic Commerce, Minneapolis, USA, August 2007. ACM Press, p. 185-194 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  107. Published

    Digital Trust - Trusted Computing and Beyond A Position Paper

    Akram, R. N. & Ko, R. K. L., 2014, The 7th IEEE International Symposium on Security, Privacy and Anonymity in Internet of Things (IEEE SpaIoT 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Marmol, F. G., Tapiador, J. E. & Dong, M. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  108. Published

    Digitalisation in Sustainable Manufacturing - A Literature Review

    Shah, S., Menon, S., Ojo, O. O. & Naghi Ganji, E., 18 Mar 2021, 2020 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2020. Institute of Electrical and Electronics Engineers Inc., 9380605. (2020 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    Digitalised Welfare: Systems For Both Seeing and Working With Mess

    Morris, A., Coles-Kemp, L. & Jones, W., 6 Jul 2020, WebSci '20 conference. ACM, p. 26-31 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  110. Published

    Digitally signed documents - Ambiguities and solutions

    Alsaid, A. & Mitchell, C. J., 2004, Proceedings - International Network Conference 2004 (INC 2004), University of Plymouth, UK, July 2004. Plymouth University, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  111. Published

    Directed Acyclic Subgraph Problem Parameterized above Poljak-Turzik Bound

    Crowston, R., Gutin, G. & Jones, M., 2012, FSTTCS 2012: LIPICS . Vol. 18. p. 400-411

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  112. E-pub ahead of print

    Directed Flow-Augmentation

    Kim, E. J., Kratsch, S., Pilipczuk, M. & Wahlström, M., 10 Jun 2022, (E-pub ahead of print) Proceedings of STOC 2022. Association for Computing Machinery (ACM), p. 938-947

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  113. Published

    Directed multicut is W[1]-hard, even for four terminal pairs

    Pilipczuk, M. & Wahlstrom, M., 2016, Proceedings of SODA 2016. Krauthgamer, R. (ed.). SIAM, p. 1167-1178 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  114. Unpublished

    Directionality of Cultural Flows in Intercultural Performance: Power Politics and Intercultural Identities

    Li, X., 5 Dec 2019, (Unpublished) 2019 Performance as Method from Global Perspectives: Historical Memory, Technologies of the Self, and Cultural Production.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  115. Published

    Discourse and organizational transformation in information systems research

    Barrett, M., Heracleous, L., Orlikowski, W. & Panteli, N., 2003, Global and Organizational Discourse about Information Technology : IFIP TC8 / WG8.2 Working Conference on Global and Organizational Discourse about Information Technology December 12–14, 2002, Barcelona, Spain. Springer, p. 533-538 6 p. (IFIP Advances in Information and Communication Technology; vol. 110).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  116. Published

    Discretionary and Mandatory Control for Role-Based Administration

    Crampton, J., 2006, Data Applications and Security XX. Damiani, E. & Liu, P. (eds.). Springer, p. 194-208 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  117. Published

    Disk laser welding of Ti6Al4V alloy

    Mastrocinque, E., Corrado, G., Caiazzo, F., Pasquino, N., Sergi, V. & Acerra, F., 2011, ICPR 21st International Conference on Production Research: Innovation in Product and Production. p. 1-6

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  118. Published

    Display and Dilemmas: Methodological Reflections on Grasping the We

    Khanijou, R. & Pirani, D., 2019, 6th BSA Food Study Group Conference, Prato, 24-25 June.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  119. Published

    Disrupt the disruptor: rethinking ‘disruption’ in digital innovation

    Elbanna, A. & Newman, M., Sep 2016, Tenth Mediterranean Conference on Information Systems (MCIS), Paphos, Cyprus, September 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  120. Published

    Dissecting the Role of Protectable Intellectual Property in Financing Nanotech Firms

    Nasiri, A., 2010, 2nd International Conference on Intellectual Capital Management (IICM). Zanajn, Iran

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  121. Published

    Dissemination of the ultra-low temperature scales PLTS-2000

    Rusby, R., Cousins, D., Head, D., Mohandas, P., Godfrin, H., Bunkov, M., Bauerle, C., Harakaly, R., Collin, E., Triqueneaux, S., Lusher, C., Li, J., Saunders, J., Cowan, B., Nyeki, J., Digby, M., Pekola, J., Gloos, K., Hernandez, P., de Groot, M. & 13 others, Peruzzi, A., Jochemsen, R., Chinchure, A., Bosch, W., Mathu, F., Flokstra, J., Veldhuis, D., Hermier, Y., Pitre, L., Verge, A., Benhalima, F., Fellmuth, B. & Engert, J., 2002, TEMPMEKO 2001: 8TH INTERNATIONAL SYMPOSIUM ON TEMPERATURE AND THERMAL MEASUREMENT IN INDUSTRY AND SCIENCE, VOL 1. BERLIN 12: V D E - VERLAG GMBH, p. 525-530 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  122. Forthcoming

    Distance Bounding for RFID: Effectiveness of Terrorist Fraud

    Hancke, G., Nov 2012, (Accepted/In press) IEEE RFID-TA. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  123. Published

    Distant Pedestrian Detection in the Wild using Single Shot Detector with Deep Convolutional Generative Adversarial Networks

    Dinakaran, R., Easom, P., Zhang, L., Bouridane, A., Jiang, R. & Edirisinghe, E., 30 Sep 2019, 2019 International Joint Conference on Neural Networks (IJCNN). International Joint Conference on Neural Networks (IJCNN): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  124. Published

    Distinguishing Exponent Digits by Observing Modular Subtractions

    Walter, C. D. & Thompson, S., 2001, CT-RSA 2001. Naccache, D. (ed.). Springer, Vol. 2020. p. 192-207 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  125. Published

    Distributed Computation of Large-scale Graph Problems

    Klauck, H., Nanongkai, D., Pandurangan, G. & Robinson, P., 2015, Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015, San Diego, CA, USA, January 4-6, 2015. p. 391-410 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  126. E-pub ahead of print

    Distributed Conformal Anomaly Detection

    Nouretdinov, I., 2 Feb 2017, (E-pub ahead of print) Machine Learning and Applications (ICMLA), 2016 15th IEEE International Conference on. IEEE Computer Society, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  127. Published

    Distributed e-Voting using the Smart Card Web Server

    Kyrillidis, L., Cobourne, S., Mayes, K., Dong, S. & Markantonakis, K., 2012, Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). Martinelli, F., Lanet, J-L., Fitzgerald, W. & Foley, S. (eds.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  128. Published

    Distributed Symmetry Breaking in Hypergraphs

    Kutten, S., Nanongkai, D., Pandurangan, G. & Robinson, P., 2014, Distributed Computing - 28th International Symposium, DISC 2014, Austin, TX, USA, October 12-15, 2014. Proceedings. p. 469-483 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  129. Published

    Distributing private data in challenged network environments

    Haile, Y., Reda, A. & Noble, B., 26 Apr 2010, WWW '10: Proceedings of the 19th international conference on World wide web. Association for Computing Machinery (ACM), p. 801-810 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  130. Published

    Distribution of Organic Components within Interplanetary Dust Particles

    Chan, QHS. & Franchi, IA., 2017, Lunar and Planetary Science Conference. Vol. 48.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  131. Published

    Distributional Learning of some Context-free Languages with a Minimally Adequate Teacher

    Clark, A., 1 Sep 2010, Grammatical Inference: Theoretical Results and Applications. p. 24-37

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  132. Published

    Diversified Process Replicae for Defeating Memory Error Exploits

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  133. Unpublished

    Diversity in international HR transfer processes: evidence from a Swiss MNC in Sri Lanka

    Rees, C. & Samaratunga, M., Jun 2007, (Unpublished) EBS/CRANET Conference on 'Changes in Society, Changes in Organizations, and the Changing Role of HRM' . Tallinn.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  134. Published

    Do Birds of a Feather Flock Together? Determinants of Social Enterprise Sustainability and Location

    thirlaway, K., Haugh, H. & Robson, P., Aug 2014, 2014 Academy of Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  135. Published

    Do employee share ownership schemes contribute towards greater economic and industrial democracy: analysis using the WERS 98 cross section dataset

    Sen Gupta, S., 2005, European Academy of Management (EURAM), Munich, Germany.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  136. Published

    Do people converge to the linguistic patterns of non-reliable speakers? Perceptual learning from non-native speakers.

    Lev Ari, S. & Peperkamp, S., 2014, Proceedings of the 10th International Seminar on Speech Production (ISSP). p. 261 264 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  137. Published

    Do resistant seeds offer a worthwhile avenue for progress in stored product protection?

    Credland, P. F. & Appleby, J. H., 2003, ADVANCES IN STORED PRODUCT PROTECTION. CAMBRIDGE: CABI PUBLISHING, p. 50-58 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  138. Published

    Documentation and computer reconstruction strategies in the study of architecture at the sanctuary of Poseidon at Kalaureia, Greece

    Pakkanen, J., 2009, Archäologie und Computer. Workshop 13: Kulturelles Erbe und Neue Technologien 03–05. November 2008. Börner, W. & Uhlirz, S. (eds.). Wien: Museen der Stadt Wien - Stadtarchäolgie, 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  139. Published

    Does My Rebuttal Matter? Insights from a Major NLP Conference

    Gao, Y., Eger, S., Kuznetsov, I., Gurevych, I. & Miyao, Y., Jun 2019, Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Minneapolis, Minnesota: Association for Computational Linguistics, Vol. 1. p. 1274–1290 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  140. Published

    Doing Contracting, Being Flexible, Crafting Careers: The case of female contractors in the IT sector

    Panteli, N., 2017, 10th Critical Management Conference 2017. Liverpool, July 3-5, 2017. : Stream: Reclaiming Flexibility: Workplace Flexibility in the Contemporary Economy. Liverpool, July 3-5, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  141. Published

    Domains for Higher-Order Games

    Hague, M., Meyer, R. & Muskalla, S., 2017, 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2017). LIPIcs, p. 59:1-59:15 15 p. 59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  142. Published

    Domination Above r-Independence: Does Sparseness Help?

    Einarson, C. & Reidl, F., 30 Aug 2019, 44th International Symposium on Mathematical Foundations of Computer Science (MFCS 2019). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 138. p. 40:1-40:13 13 p. 40. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  143. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 19 Oct 2015, 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  144. Published

    Dos and Don'ts of Machine Learning in Computer Security

    Arp, D., Quiring, E., Pendlebury, F., Warnecke, A., Pierazzi, F., Wressnegger, C., Cavallaro, L. & Rieck, K., 12 Aug 2021, 31st USENIX Security Symposium (USENIX Sec). 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  145. Published

    Dr. Multicast: Rx for Data Center Communication Scalability

    Vigfusson, Y., Abu-Libdeh, H., Balakrishnan, M., Birman, K., Burgess, R., Chockler, G., Li, H. & Tock, Y., Apr 2010, EuroSys '10 Proceedings of the 5th European conference on Computer systems. Paris, France: ACM, p. 349-362 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  146. E-pub ahead of print

    Drawing Out the Everyday Hyper-[In]Securities of Digital Identity

    Heath, C. P. R. & Coles-Kemp, L., 29 Apr 2022, (E-pub ahead of print) Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems.. ACM, p. 1-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  147. Published

    Drive-Witness Acceleration Scheme Based on Corrugated Dielectric mm-Scale Capillary

    Lekomtsev, K., Lyapin, A., Boogert, S., Karataev, P., Aryshev, A., Shevelev, M., Tishchenko, A., Terunuma, N. & Urakawa, J., 20 Jun 2017, Proceedings of the 8th International Particle Accelerator Conference. The Joint Accelerator Conferences Website, p. 3292-3295 4 p. (International Particle Accelerator Conference ; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  148. Published

    DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L., 4 Aug 2016, Security and Privacy Workshops (SPW), 2016 IEEE: Mobile Security Technologies (MoST 2016). IEEE, p. 252-261 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  149. Published

    DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

    Suarez de Tangil Rotaeche, G., Dash, S., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L., 22 Mar 2017, ACM CODASPY. ACM, p. 309-320 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  150. Published

    Drug cocktail selection for the treatment of chagas disease: A multi-objective approach

    Torres Bobadilla, M., Caceres Silva, J., Jimenez, R., Yubero, V., Vega, C., Rolón, M., Cernuzzi, L., Barán, B. & Paccanaro, A., 21 Dec 2017, SLIOIA - Simposio Latinoamericano de Investigación de Operaciones e Inteligencia Artificial 2017. p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  151. Published

    Drug targets prediction using chemical similarity

    Galeano Galeano, D. & Paccanaro, A., 26 Jan 2017, XLII Conferencia Latinoamericana de Informatica (CLEI). IEEE Xplore, p. 1-7 7 p. (2016 XLII Latin American Computing Conference (CLEI)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  152. Published

    Duni's 'Le Retour au village' and the Politics of Parma

    Charlton, D., 2014, I due mondi di Duni.: Il teatro musicale di un compositore illuminista fra Italia e Francia. Russo, P. (ed.). Lucca: Libreria Musicale Italiana, p. 119-54 36 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  153. Published

    DY: A modular symbolic verification framework for executable cryptographic protocol code

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., Sep 2021, Proceedings - 2021 IEEE European Symposium on Security and Privacy, Euro S and P 2021. Institute of Electrical and Electronics Engineers Inc., p. 523-542 20 p. (Proceedings - 2021 IEEE European Symposium on Security and Privacy, EuroS&P 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  154. Published

    DYKE EMPLACEMENT AT DIVERGENT PLATE BOUNDARIES

    GUDMUNDSSON, A., 1990, MAFIC DYKES AND EMPLACEMENT MECHANISMS. PARKER, AJ., RICKWOOD, PC. & TUCKER, DH. (eds.). ROTTERDAM: A A BALKEMA, p. 47-62 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  155. Published

    Dyke propagation paths in heterogeneous volcanoes

    Drymoni, K., Browning, J. & Gudmundsson, A., 2018, VMSG 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  156. Published

    Dyke propagation through heterogeneous successions

    Drymoni, K., Rust, A., Cashman, K., Browning, J. & Gudmundsson, A., 2017, IAVCEI 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  157. Published

    Dynamic Awareness

    Halpern, J. Y. & Piermont, E., Sep 2020, 17th International Conference on Principles of Knowledge Representation and Reasoning.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  158. Published

    Dynamic capabilities for sustainability

    Preuss, L. & Dyerson, R., Jul 2012, 11th annual colloquium of the Academy of Business in Society (ABIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  159. Published

    Dynamic data integration using web services

    Zhu, F., Turner, M., Kotsiopoulos, I., Bennett, K., Russell, M., Budgen, D., Brereton, P., Keane, J., Layzell, P., Rigby, M. & Xu, J., 2004, IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 262-269 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  160. Published

    Dynamic Forced Partitioning of Robust Hierarchical State Estimators for Power Networks

    Baiocco, A. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  161. Published

    Dynamic Linkages between the European and US stock markets”

    Xiao, L. & Dhesi, G., 4 Nov 2010, Proceedings of the 3rd BIFE Conference IEEE Computer Society, City University of Hong Kong.. IEEE Xplore

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  162. Published

    Dynamic Multirole Session Types

    Denielou, P-M. & Yoshida, N., 2011, POPL 11: PROCEEDINGS OF THE 38TH ANNUAL ACM SIGPLAN-SIGACT SYMPOSIUM ON PRINCIPLES OF PROGRAMMING LANGUAGES. NEW YORK: ACM, p. 435-446 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  163. Published

    Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014). Springer-Verlag, p. 73 85 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  164. Published

    Dynamic pricing and benchmarking in AirBnB

    Sims, J., Ameen, N. & Bauer, R., 2019, UK Academy of Information Systems (UKAIS). p. 1-29 29 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  165. Published

    Dynamic Programming on Nominal Graphs

    Hoch, N., Montanari, U. & Sammartino, M., 2015, Proceedings Graphs as Models. Rensink, A. & Zambon, E. (eds.). Electronic Proceedings in Theoretical Computer Science, Vol. 181. p. 80-96 17 p. (EPTCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  166. Published

    Dynamics, robustness and fragility of trust

    Pavlovic, D., 2008, Proceedings of FAST 2008. Degano, P., Guttman, J. & Martinelli, F. (eds.). Springer-Verlag, Vol. 5491. p. 97-113 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  167. Published

    Earthquake focal mechanisms and recent faulting: a seismotectonic analysis in the Vordufell area, South Iceland Seismic Zone

    Angelier, J., Rognvaldsson, S., Bergerat, F., Gudmundsson, A., Jakobsdottir, S. & Stefansson, R., 1996, Seismology in Europe. Thorkelsson, B. (ed.). Reykjavik: Iceland Meteorological Office, Reykjavik, p. 199-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  168. Published

    Easy Impossibility Proofs for k-Set Agreement in Message Passing Systems

    Biely, M., Robinson, P. & Schmid, U., 2011, Principles of Distributed Systems - 15th International Conference, OPODIS 2011, Toulouse, France, December 13-16, 2011. Proceedings. p. 299-312 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  169. Published

    Eavesdropping Attacks on High-Frequency RFID Tokens

    Hancke, G. P., 1 Jul 2008, Workshop on RFID Security -- RFIDSec'08. Budapest, Hungary, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  170. Published

    ECC, an Extended Calculus of Constructions

    Luo, Z., 1 Jun 1989, Logics in Computer Science (LICS 1989).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  171. Published

    Ecological Studies on two Carbonate Sediment-Producing Algae

    Bosence, D., 1977, Fossil Algae. Flügel, E. (ed.). Springer Berlin / Heidelberg, p. 270-278 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  172. Published

    Ecological Succession from Corals to Coralline Algae in Eocene Patch Reefs, Northern Spain

    Taberner, C. & Bosence, D., 1985, Paleoalgology: Contemporary Research and Applications. Toomey, D. F. & Nitecki, M. H. (eds.). Springer Berlin / Heidelberg, p. 226-236 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  173. Published

    E-commerce and the media - Influences on security risk perceptions

    Jarupunphol, P. & Mitchell, C. J., 2002, Internet Technologies, Applications and Societal Impact, The 1st IFIP Workshop on Internet Technologies, Applications and Societal Impact, WITASI '02, Wroclaw, Poland, October 2002. Cellary, W. & Iyengar, A. (eds.). Kluwer Academic Publishers, p. 163-173 11 p. (IFIP Conference Proceedings; no. 232).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  174. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K., 27 Mar 2017, Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  175. Forthcoming

    Ecrire, trobar: le troubadour entre création et représentation

    Harvey, R., 2015, (Accepted/In press) L’Italie et les troubadours (XIIIe-XVe siècles). Paris: Classiques Garnier

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  176. Published

    Effect of rerouting on NGN VoIP Quality

    Komisarczuk, P. & Koudrin, A., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 364-370 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  177. Published

    Effects of context relevance and perceived risk on user acceptance of mobile information services

    van der Heijden, H., Ogertschnig, M. & van der Gaast, L., 2005, Proceedings of the European Conference on Information Systems (ECIS). Regensburg, Germany

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  178. Published

    Effects of Innovative Patterns of Smartphones on Brand Switching

    Appiah, D. & Ozuem, W., 2019, UK Academy of Information Services (UKAIS). UK Academy of Information Services (UKAIS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  179. Published

    EFFECTS OF INSECTICIDE APPLICATION ON WEED AND PASTURE PLANT-COMMUNITIES

    Gange, A. & BROWN, V. K., 1991, BRIGHTON CROP PROTECTION CONFERENCE : WEEDS - 1991, VOLS 1-3. FARNHAM: BRITISH CROP PROTECTION COUNCIL, p. 901-910 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  180. Published

    Effects of see-through interfaces on user acceptance of small screen information systems

    Acton, T., Golden, W. & van der Heijden, H., 2005, Proceedings of the European Conference on Information Systems (ECIS). Regensburg, Germany

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  181. Published

    Effects of Short-Term Thermal Alteration on Organic Matter in Experimentally-Heated Tagish Lake Observed by Raman Spectroscopy

    Chan, QHS., Nakato, A., Zolensky, ME., Nakamura, T., Kebukawa, Y., Maisano, J., Colbert, M. & Martinez, JE., 2017, 48th Lunar and Planetary Science Conference, held 20-24 March 2017, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  182. Published

    Efficiency Improvements for Encrypt-to-Self

    Pijnenburg, J. & Poettering, B., Nov 2020, CYSARM 2020 - Proceedings of the 2nd Workshop on Cyber-Security Arms Race. Association for Computing Machinery, Inc, p. 13-23 11 p. (CYSARM 2020 - Proceedings of the 2nd Workshop on Cyber-Security Arms Race).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  183. Published

    Efficiency of conformalized ridge regression

    Burnaev, E. & Vovk, V., 2014, Proceedings of the Twenty Seventh Annual Conference on Learning Theory: JMLR: Workshop and Conference Proceedings. Vol. 35. p. 605-622 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  184. Published

    Efficiency updates for the restricted growth function GA for grouping problems

    Tucker, A., Swift, S. & Crampton, J., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 1536 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  185. E-pub ahead of print

    Efficient and Provable White-Box Primitives

    Fouque, P-A., Karpman, P., Kirchner, P. & Minaud, B., 9 Nov 2016, (E-pub ahead of print) Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer Verlag, p. 159-188 30 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  186. Published

    Efficient compilers for authenticated group key exchange

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 192-197 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  187. Published

    Efficient Computation of Balanced Structures

    Harris, D. G., Morsy, E., Pandurangan, G., Robinson, P. & Srinivasan, A., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II. p. 581-593 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  188. Published

    Efficient dynamic resource specifications

    Bubendorfer, K., Komisarczuk, P. & Chard, K., 2005, 6th International Conference on Mobile Data Management (MDM 2005), Ayia Napa, Cyprus, May 9-13, 2005. p. 281-285 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  189. Published

    Efficient implementation of the local capon spectral estimate

    Alty, S. R., Benesty, J. & Jakobsson, A., Sep 2007, 15th European Signal Processing Conference, EUSIPCO 2007 - Proceedings. p. 2125-2128 4 p. (European Signal Processing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  190. Published

    Efficient implementation of the time-recursive Capon and APES spectral estimators

    Alty, S. R., Jakobsson, A. & Larsson, E. G., 3 Apr 2015, 2004 12th European Signal Processing Conference, EUSIPCO 2004. European Signal Processing Conference, EUSIPCO, Vol. 06-10-September-2004. p. 1269-1272 4 p. 7080094

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  191. Published

    Efficient model checking of fault-tolerant distributed protocols

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 2011, Proc. 41st Int Conf. Dependable Systems and Networks (DSN-DCCS 2011). IEEE, p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  192. Published

    Efficient Sampling with Small Populations: a Genetic Algorithm Satisfying Detailed Balance

    Watkins, C. & Buttkewitz, Y., 11 Jul 2015, Gecco Companion '15: Proceedings of the Companion Publication of the 2015 Genetic and Evolutionary Computation Conference. p. 1517-1518 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  193. Published

    Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures

    Wolthusen, S., 2016, Proceedings of the Second International Conference on Future Network Systems and Security. Springer-Verlag, p. 47-61 15 p. (Communications in Computer and Information Science; vol. 670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  194. Published

    Efficient state estimation and Byzantine behavior identification in Tactical MANETs

    Ebinger, P. & Wolthusen, S. D., 18 Oct 2009, Proc. 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  195. Published

    Efficient state merging in symbolic execution

    Kuznetsov, V., Kinder, J., Bucur, S. & Candea, G., Jun 2012, Proc. 33rd Conf. Programming Language Design and Implementation (PLDI 2012). ACM, p. 193-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  196. Published

    Efficient, correct, unsupervised learning of context-sensitive languages

    Clark, A., 2010, Proceedings of the Fourteenth Conference on Computational Natural Language Learning. p. 28-37

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  197. Published

    Either / Or

    Samson, J., 2008, Rethinking Musical Modernism: Proceedings of the international conference held from October 11 to 13, 2007. Despić, D. & Milin, M. (eds.). Belgrade: Serbian Academy of Sciences and Arts, p. 15-26

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  198. Published

    Electroantennogram obtained from honeybee antennae for odor detection

    Wang, Y., Zheng, Y., Luo, Z. & Li, G., 2010, Lecture Notes in Computer Science. Springer, Vol. 6063. p. 63-66

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  199. Published

    Electronic Case Management System in the judiciary: Perspectives from the Judiciary of Malawi

    Chawinga, C., Chawinga, W., Majawa, F. & Kapondera, S., 2018, Standing Conference of Eastern Central and Southern African Libraries Associatio.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  200. Published

    Electronic transaction security: An analysis of the effectiveness of SSL and TLS

    Khu-smith, V. & Mitchell, C. J., 2002, Proceedings of the International Conference on Security and Management (SAM '02), Las Vegas, Nevada, USA, June 2002. CSREA Press, p. 425-429 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  201. Published

    Email-based Password Recovery - Risking or Rescuing Users?

    Al Maqbali, F. & Mitchell, C. J., 24 Dec 2018, Proceedings of ICCST 2018: 52nd Annual IEEE International Carnahan Conference on Security Technology. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  202. Published

    Embedding knowledge management into business process: The use of threaded discussion forums and knowledge objects at AstraZeneca

    Jashapara, A. & Adelmann, H., 2003, Proceedings of ECKM 2003: The 4th European Conference on Knowledge Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  203. Published

    Emergence and mutability of social media work practices

    Hafezieh, N. & Amis, J., 2017, International Conference on Information Systems Proceedings. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  204. Forthcoming

    Emerging market MNEs' expatriate Management

    Rui, H. & Zhang, M., 16 Mar 2016, (Accepted/In press) Academy of International Business 2016 conference proceeding. AIB

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  205. Emerging technologies of IoT usage in global logistics

    Shah, S., Rutherford, R. & Menon, S., 2 Apr 2020, Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020. Institute of Electrical and Electronics Engineers Inc., p. 251-257 7 p. 9051530. (Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  206. E-pub ahead of print

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N. & Markantonakis, K., 21 Jun 2018, (E-pub ahead of print) 11th IFIP International Conference on Information Security Theory and Practice (WISTP'17). Springer, p. 75-92 18 p. (Lecture Notes in Computer Science; vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  207. Published

    EMNCs' Knowledge Transfer in Emerging Markets

    Rui, H., Zhang, M. & Shipman, A., 2016, Proceedings of the 58th Annual Meeting of the Academy of International Business . AIB

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  208. Published

    Emotions, Satisfaction, and Place Attachment: A Structural Model

    Prayag, G., Van Der Veen, R., Huang, S. & Hosany, S., 2015, 3rd World Research Summit for Tourism and Hospitality and 1st USA-China Tourism Research Summit, Orlando, USA, December 15-19.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  209. Published

    Emperor Manuel II Palaeologus’ Unpublished Treatise ‘On the Procession of the Holy Spirit’

    Dendrinos, C., 2006, Proceedings of the 21st International Congress of Byzantine Studies, London 21-26 August 2006. Jeffreys, E., Haarer, F. & Gilliland, J. (eds.). Aldershot: Ashgate, Vol. 3. p. 124-125

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  210. Published

    Emplacement of dyke swarms in regions of multiple caldera collapses: the case study of Santorini volcano, Greece

    Drymoni, K., Rust, A., Cashman, K., Browning, J. & Gudmundsson, A., 2020, COV 11.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  211. Unpublished

    Employee autonomy and management control in the quality organization

    Rees, C., Mar 1996, (Unpublished) 14th International Labour Process Conference (ILPC). Aston.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  212. Unpublished

    Employee perceptions of quality management: making sense of the paradox

    Rees, C., Jul 1996, (Unpublished) British Universities Industrial Relations Association (BUIRA) 46th Annual Conference. Bradford.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  213. Published

    Employee Share ownership and Performance: Commitment or Entrapment

    Sen Gupta, S., 2011, Society for the Advancement of Socio Economics, University of Madrid, Madrid, Spain.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  214. Published

    Employee Share Ownership and Performance: Golden Path or Golden Handcuffs?

    Sen Gupta, S., Whitfield, K. & McNabb, B., 2006, Labor and Employment Relations Association (LERA), Boston .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  215. Published

    Employee Share Ownership and Performance: re-estimation using WERS 2004

    Sen Gupta, S., Whitfield, K. & Pendleton, A., 2009, International Industrial Relations Association (IIRA), Sydney, Australia.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  216. Published

    Employee share ownership design and organisational performance: Broad based versus narrow based schemes

    Sen Gupta, S. & Whitfield, K., 2009, British Academy of Management Conference (BAM), Cardiff - Best paper award.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  217. Published

    Employee share Ownership in the United Kingdom and South Korea: Comparing the good and the bad days (recession versus boom)

    Sen Gupta, S. & Yoon, Y. J., 2015, Academy of Management Conference, Vancouver, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  218. Unpublished

    Employee voice and employee engagement

    Rees, C. & Alfes, K., Mar 2012, (Unpublished) LSE/CIPD 'Voice and Value' Conference. London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  219. Published

    Employee voice or vice: employee share ownership schemes and unions drawing on the 2011 WERS dataset

    Sen Gupta, S., 2013, Society for the Advancement of Socio Economics, Bocconi University Milano, Italy.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  220. Unpublished

    Empowerment and ICTs: much more than IT skills

    Poveda Villalba, S., 2014, (Unpublished) Empowerment and ICTs: much more than IT skills. Department of Geography, Royal Holloway, University of London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  221. Unpublished

    Empowerment through quality management: rhetoric or reality?

    Rees, C., Apr 1996, (Unpublished) Open University Business School Conference on 'HRM: The Inside Story'. Milton Keynes.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  222. E-pub ahead of print

    Enabling Robust and Efficient Distributed Computation in Dynamic Peer-to-Peer Networks

    Augustine, J., Pandurangan, G., Robinson, P., Roche, S. & Upfal, E., 17 Dec 2015, (E-pub ahead of print) Foundations of Computer Science (FOCS), 2015 IEEE 56th Annual Symposium on. IEEE, p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  223. Published

    Enabling virtual organisation in mobile worlds

    Komisarczuk, P., Bubendorfer, K. & Chard, K., 2004, 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on. p. 123-127 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  224. Published

    Encoding the Factorisation Calculus

    Rowe, R., 27 Aug 2015, Proceedings of the Combined 22nd International Workshop on Expressiveness in Concurrency and the 12th Workshop on Structural Operational Semantics (EXPRESS/SOS 2015). Electronic Proceedings in Theoretical Computer Science, Vol. 190. p. 76-90 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  225. Published

    Encouraging Self-Regulated Learning Through Electronic Portfolios

    Abrami, P., Pillay, V., Wade, A., Aslan, O., Bures, E. & Bentley, C., 2007, Proceedings from World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007. Bastiaens, T. & Carliner, S. (eds.). AACE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  226. Published

    Encrypt-to-self: Securely outsourcing storage

    Pijnenburg, J. & Poettering, B., 12 Sep 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 635-654 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  227. Published

    End-to-end performance analysis for broadband island interconnection via satellite-RACE II/R2074 (Catalyst) project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1993, Satellite Communications-ECSC-3, 1993., 3rd European Conference on. p. 170-174 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  228. Published

    End-to-end protocol performance in ATM/satellite interconnected LANs

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F., Jeans, T. & Smythe, C., 1993, Broadband Services, Systems and Networks, 1993., Second International Conference on. p. 87-91 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Published

    End-to-End Secure and Privacy Preserving Mobile Chat Application

    Akram, R. N. & Ko, R. K. L., 1 Jun 2014, Eighth Workshop in Information Security Theory and Practice (WISTP 2014). Naccache, D. & Sauveron, D. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  230. Published

    Energy Modulation of Electron Beam in Corrugated Dielectric Waveguide

    Lyapin, A., Lekomtsev, K., Boogert, S., Gibson, S., Aryshev, A., Urakawa, J. & Tishchenko, A., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-3 3 p. WEPTS055

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  231. Published

    Energy-efficient key distribution and revocation in tactical networks with asymmetric links

    Reidt, S. & Wolthusen, S. D., 18 Oct 2009, 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  232. Published

    Enforcing Business Policies Through Automated Reconfiguration

    Andrade, L. F., Fiadeiro, J. L. & Wermelinger, M., 2001, ASE. IEEE Computer Society Press, p. 426-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  233. Published

    Enforcing Mobile Application Security Through Probabilistic Contracts

    Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014.. Joosen, W., Martinelli, F. & Heyman, T. (eds.). CEUR-WS.org, Vol. 1298. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  234. Published

    Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 2014, FAW 2014. (Lecture Notes in Computer Science; vol. 8497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  235. Published

    Enhanced Bunch Monitoring by Interferometric Electro-Optic Methods

    Gibson, S., Arteche, A., Bashforth, S., Bosco, A., Krupa, M. & Lefevre, T., Jun 2018, 9th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 1-4 4 p. WEPAL073

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  236. Published

    Enhanced Conformal Predictors for Indoor Localisation Based on Fingerprinting Method

    Nguyen, K. & Luo, Z., 2 Oct 2013, 9th IFIP International Conference on Artificial Intelligence Applications & Innovations (AIAI 2013). p. 411-420 10 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  237. Forthcoming

    Enhanced Location Tracking for Tactical MANETs based on Particle Filters and Additional Information Sources

    Ebinger, P., Kuijper, A. & Wolthusen, S. D., Oct 2010, (Accepted/In press) Proc. 2012 Military Communications and Information Systems Conference. Piscataway, NJ, USA: IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  238. Published

    Enhancing blended learners’ engagement and retention through web-based digital software applications: A preliminary study

    Appiah, D. & Murasiranwa, E., 2021, Learning, Teaching & Students’ Experience Conference (LTSE). London: Association of Business Schools (ABS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. Published

    Enhancing CardSpace Authentication Using a Mobile Device

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings. Li, Y. (ed.). Berlin: Springer-Verlag, Vol. 6818. p. 201-216 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  240. Published

    Enhancing e-commerce security using GSM authentication

    Khu-smith, V. & Mitchell, C. J., 2003, -Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, p. 72-83 12 p. (Lecture Notes in Computer Science; vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  241. Published

    Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K. & Mayes, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland: IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  242. Published

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K., 20 Jul 2017, Radio Frequency Identification and IoT Security: RFIDSec 2016. Hancke, G. & Markantonakis, K. (eds.). Springer, p. 107-122 16 p. (Lecture Notes in Computer Science ; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  243. E-pub ahead of print

    Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

    Akram, R. N., Markantonakis, K. & Mayes, K., 18 Nov 2015, (E-pub ahead of print) Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Ryan, P. Y. A. & Weippl, E. (eds.). Vienna, Austria: Springer, p. 541-560 20 p. (Lecture Notes in Computer Science; vol. 9327).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  244. Published

    Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, The 35th Annual IEEE Conference on Local Computer Networks, LCN 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings. p. 152-159 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  245. Published

    Enhancing student engagement through memes

    O'Brien, J., Apr 2018, Chartered Association of Business Schools: Learning, Teaching and Student Experience conference 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  246. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 13 May 2014, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  247. Published

    Enhancing the security of cookies

    Khu-smith, V. & Mitchell, C. J., 2001, Information Security and Cryptology - ICISC 2001 - Proceedings of the 4th International Conference, Seoul, Korea, December 2001. Kim, K. (ed.). Springer-Verlag, p. 132-145 14 p. (Lecture Notes in Computer Science; no. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  248. Published

    Enhancing the supply chain with composite materials: An analysis supported by IT tools in coach/bus manufacturing

    Coronado Mondragon, A. & Coronado Mondragon, C. E., 8 Jun 2017, Industrial Engineering and Applications (ICIEA), 2017 4th International Conference on. Nagoya, Japan: IEEE Xplore, p. 121-125 5 p. A022

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  249. Published

    Enhancing User Authentication in Claim-Based Identity Management

    Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of CTS 2010, the 2010 International Symposium on Collaborative Technologies and Systems, 17-21 May 2010, Chicago, Illinois, USA. IEEE, p. 75-83 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  250. Published

    Entanglement in systems of interacting harmonic oscillators

    Audenaert, K., Cramer, M., Eisert, J. & Plenio, M. B., 2006, Proc. 1st Intl. Conf. on “Quantum Computing: Back Action 2006”, Kanpur, India..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  251. Published

    Enterprise fragmentation in the economic transition: repackaging assets from Czech state enterprises

    Clark, E., 1999, Enterprise in transition. Split: University of Split, p. 163-167 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  252. Published

    Entrepreneurial capitalism and venture capital

    Chong, D., 2015, 9th Critical Management Studies Conference (Leicester: University of Leicester).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  253. Published

    Entrepreneurial learning: past research and future challenges

    Wang, C. L. & Chugh, H., 2010, Babson College Entrepreneurship Research Conference .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  254. Published

    Entrepreneurship, small family business and Yiwu's historical development

    Rui, H., 2018, International Conference of Family Business and Entrepreneurship, 2-4 May 2018, Bali, Indonesia . International Conference of Family Business and Entrepreneurship

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  255. Published

    Enumerating highly non-soluble groups

    Klopsch, B., 2005, FINITE GROUPS 2003. BERLIN 30: WALTER DE GRUYTER, p. 219-227 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  256. Unpublished

    Environmental Storytelling: A Digital Frontier for Narrative Geography

    Lowe, J., 29 Aug 2019, (Unpublished) Geographies of Interactive Digital Narratives session at RGS-IBG 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  257. Published

    Epitaxial growing of refractory metal films by laser ablation deposition

    Mikhailov, G. M., Malikov, I. V., Chernikh, A. V. & Petrashov, V., 1996, IEEE/LEOS 1996 SUMMER TOPICAL MEETINGS - ADVANCED APPLICATIONS OF LASERS IN MATERIALS AND PROCESSING, DIGEST. NEW YORK: Elphinstone Institute, p. 56 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  258. Forthcoming

    Epoch Confidentiality in Updatable Encryption

    Knapp, J. & Quaglia, E., 10 Sep 2022, (Accepted/In press) 16th International Conference on Provable and Practical Security : ProvSec 2022. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  259. Published

    Equal amongst Unequals: Comparing the employee share ownership experiencein the UK and Korea

    Sen Gupta, S. & Yoon, Y. J., 2015, Society for the Advancement of Socio Economics, London School of Economics, London.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  260. E-pub ahead of print

    Equilibrium Resolution for Epoch Partitioning

    Wisniewski, W., Kalnishkan, Y., Lindsay, D. & Lindsay, S., 10 Jun 2022, (E-pub ahead of print) Proceedings of the 18th International Conference on Artificial Intelligence Applications and Innovations. Springer, (SPRINGER IFIP AICT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  261. Published

    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    Mitchell, C. J., 2005, Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings. Zhou, J., Lopez, J., R. H. D. & Bao, F. (eds.). Springer-Verlag, Vol. 3650. p. 244-258 15 p. (Lecture Notes in Computer Science; vol. 3650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  262. E-pub ahead of print

    Error Propagation after Reordering Attacks on Hierarchical State Estimation

    Gul, A. & Wolthusen, S., 18 Dec 2018, (E-pub ahead of print) Proceedings of the Twelfth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Staggs, J. & Shenoi, S. (eds.). Springer-Verlag, p. 67-79 13 p. (IFIP Advances in Information and Communication Technology; vol. 542).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  263. Published

    Escape from Time: Immortality and Reality in William Burroughs & Philip Dick

    Gene-Rowe, F., May 2014, Memories of the Future Conference. Senate House Library, London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  264. Published

    E-society barriers: Public and private divide for women returners to IT

    Panteli, N. & Cochliou, D., 2008, Proceedings of the IADIS International Conference on e-Society 2008. IADIS, p. 16-23 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  265. Published

    Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

    Shepherd, C., Akram, R. & Markantonakis, K., 29 Aug 2017, 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. E-pub ahead of print

    Estimating quantum speedups for lattice sieves

    Albrecht, M., Gheorghiu, V., Postlethwaite, E. & Schanck, J., 5 Dec 2020, (E-pub ahead of print) ASIACRYPT 2020. Springer, p. 583-613 31 p. (Lecture Notes in Computer Science; vol. 12492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  267. Estimating the two-dimensional coherence function

    Jakobsson, A., Alty, S. R. & Benesty, J., Apr 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '07. p. III993-III996 4217879. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  268. Published

    Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware

    Hurier, M., Suarez de Tangil Rotaeche, G., Dash, S., Bissyandé, T., Le Traon, Y., Klein, J. & Cavallaro, L., 3 Jul 2017, Mining Software Repositories (MSR), 2017 IEEE/ACM 14th International Conference on. IEEE, p. 425-435 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  269. Published

    European Dissemination of the ultra-low temperature scale, PLTS-2000

    Rusby, R., Head, D., Cousins, D., Godfrin, H., Bunkov, Y. M., Rapp, R. E., Gay, F., Meschke, M., Lusher, C., Li, J., Casey, A., Shvarts, D., Cowan, B., Saunders, J., Mikheev, V., Pekola, J., Gloos, K., Hernandez, P., Triqueneaux, S., de Groot, M. & 14 others, Peruzzi, A., Jochemsen, R., Chinchure, A., van Heumen, E., de Groot, G. E., Bosch, W., Mathu, F., Flokstra, J., Veldhuis, D., Hermier, Y., Pitre, L., Verge, A., Fellmuth, B. & Engert, J., 2003, TEMPERATURE: ITS MEASUREMENT AND CONTROL IN SCIENCE AND INDUSTRY, VOL 7, PTS 1 AND 2. Ripple, DC. (ed.). MELVILLE: AMER INST PHYSICS, p. 89-94 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  270. Published

    Evaluating IT readiness in Small Firms: A Survey of UK Manufacturing Firms

    Spinelli, R., Dyerson, R. & Harindranath, G., 1 Nov 2013, ISBE 2013, November, Cardiff.. 2013

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  271. E-pub ahead of print

    Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE

    Costache, A., Laine, K. & Player, R., 13 Sep 2020, (E-pub ahead of print) Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II. Springer, p. 546-565 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  272. Published

    Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Jul 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. p. 1541-1546 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  273. Published

    Evaluating Transferability of Japanese Organizational Culture

    Aboutalebi, R. & Ozaki, Y., 21 Jun 2014, In: AJBS (Association of Japanese Business Studies), 27th Annual Meeting of AJBS: Issues regarding Japanese business system. 21-22 June 2014, Westin Bayshore, Vancouver, Canada..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  274. Published

    Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay

    Haken, G., Markantonakis, K., Gurulian, I., Shepherd, C. & Akram, R., 2 Apr 2017, Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security: CPSS '17. New York: ACM, p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  275. Published

    Evaluation of Information Visibility Benefits Downstream in the Supply Chain: The Case of Finished Vehicle Transportation

    Coronado Mondragon, A. E. & Lalwani, C. S., 6 Jul 2008, Proceedings of the 13th International Symposium on Logistics (ISL 2008): Integrating the Global Supply Chain. Pawar, KS., Banomyong, R. & Lalwani, CS. (eds.). Nottingham, UK: Nottingham University Business School, Vol. 1. p. 37-44 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  276. Evaluation of Internet of Things (IoT) and its Impacts on Global Supply Chains

    Shah, S. & Ververi, A., 15 Apr 2019, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 160-165 6 p. 8691124. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  277. Published

    Event dissemination in mobile wireless sensor networks

    Taherian, S., O'Keeffe, D. & Bacon, J., 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Fort Lauderdale, FL, USA, October 25-27, 2004. p. 573-575 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  278. Published

    Evolution of Terrestrial Ecosystems

    Elias, S., 2002, Encyclopaedia of Life Sciences. London: Nature Publishing Group, Vol. 6. p. 669-673

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  279. Published

    Evolutionary algorithms with a coarse-to-fine function smoothing

    Yang, D. & Flockton, S. J., 1 Jan 1995, 1995 IEEE Conference on Evolutionary Computation (ICEC 95). IEEE, Vol. 2. p. 657-662 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  280. Published

    Evolving and Ensembling Deep CNN Architectures for Image Classification

    Fielding, B., Lawrence, T. & Zhang, L., 30 Sep 2019, 2019 International Joint Conference on Neural Networks (IJCNN). International Joint Conference on Neural Networks (IJCNN): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  281. Published

    Evolving specification engineering

    Pavlovic, D., Pepper, P. & Smith, D. R., 2008, Proceedings of AMAST 2008. Meseguer, J. & Rosu, G. (eds.). Springer-Verlag, Vol. 5140. p. 299-314 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  282. Published

    Exact and approximate algorithms and their implementations in mixed graphical models

    Gammerman, A., Luo, Z., Aitken, C. & Brewer, M., 1995, Probabilistic Reasoning and Bayesian Belief Networks. Henley-on-Thames: Alfred Waller, p. 33-53

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  283. Published

    Exact and approximate algorithms for computing a second hamiltonian cycle

    Deligkas, A., Mertzios, G. B., Spirakis, P. G. & Zamaraev, V., 18 Aug 2020, 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020. Esparza, J., Kral�, D. & Kral�, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-13 13 p. MFCS-2020-27. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 170).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  284. Published

    Examine the impact of Technology and Industry 4.0 for Student Performance in Higher Education

    Shah, S. & Mogul, I., 11 Apr 2022, 2021 IEEE International Conference on Technology Management, Operations and Decisions (ICTMOD). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  285. Published

    Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking

    Moeckel, C., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19): 1st International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). Association for Computing Machinery (ACM), 93

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  286. Published

    Examining the Contribution of Critical Visualisation to Information Security

    Hall, P., Heath, C., Coles-Kemp, L. & Tanner, A., 8 Sep 2015, Proceedings of NSPW 2015. ACM, p. 59-72 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  287. Published

    Exchangeability and de Finetti's theorem: from probabilities to quantum-mechanical states

    Schack, R., 2004, Bayesian Inference and Maximum Entropy Methods in Science and Engineering: AIP Conference Proceedings Vol.~735. Fischer, R., Preuss, R. & von Toussaint, U. (eds.). Melville, New York: AIP Press, p. 565

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  288. Published

    Execution Replay with Compact Logs for Shared-Memory Programs

    Levrouw, L., Audenaert, K. & Van Campenhout, J., 1994, Applications in Parallel and Distributed Computing.. Caracas: North-Holland, p. 125-134 (IFIP Transactions: Computer Science and Technology; vol. A-44).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  289. Published

    Expansion and densification of cities: linking urban form to urban ecology

    Mohajeri, N., Gudmundsson, A. & Scartezzini, J., 2015, CISBAT 2015- Future Buildings and Districts - Sustainability from Nano to Urban Scale.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  290. Published

    Experiences in Automated Workflow using Dialectical Argumentation

    Urovi, V., Bromuri, S., McGinnis, J., Stathis, K. & Omicini, A., 1 Jul 2007, Proceedings of Intelligent Systems and Agents International Conference (IADIS07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  291. Published

    Experimental and numerical 2D analysis of hydraulic fracturing using high-power electric discharge

    Bazargan, M., Meredith, P., Forbes Inskip, N., Gudmundsson, A., Habibpour, M. & Mohammadi, R., 2015, 49th US Rock Mechanics / Geomechanics Symposium held in San Francisco, CA, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  292. Published

    Experimental Elicitation of Risk Behaviour amongst Information Security Professionals

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 2015, Workshop on the Economics of Information Security . p. 1-55 55 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  293. Published

    Experimental Results of a Compact Laserwire System for Non-Invasive H− Beam Profile Measurements at CERN's Linac4

    Gibson, S., Boorman, G., Bosco, A., Hofmann, T., Raich, U. & Roncarolo, F., Feb 2017, 5th International Beam Instrumentation Conference: 11-15 September 2016, Barcelona, Spain.. JACoW Publishing, p. 1-4 4 p. TUPG77

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  294. Published

    Experiments on Persian weblogs

    Sheykh Esmaili, K., Jamali, M., Neshati, M., Abolhassani, H. & Soltan-Zadeh, Y., 2006, In Proceedings of the WWW06 Workshop on Web Intelligence.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  295. E-pub ahead of print

    Explaining Deep Learning Models with Constrained Adversarial Examples

    Moore, J., Hammerla, N. & Watkins, C., 23 Aug 2019, (E-pub ahead of print) Pacific Rim International Conference on Artificial Intelligence. Springer, p. 43-56 14 p. (Lecture Notes in Computer Science; vol. 11670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  296. Published

    Explaining innovation in healthcare: The elastic role of identity ambiguity and praxis mastery

    Jashapara, A., 2015, GSTF Proceedings of 5th Annual International Conference on Business Strategy & Asian Economic Transformation. Singapore: Global Science and Technology Forum

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  297. Published

    Exploiting uncertain and temporal information in correlation

    Bigham, J. & Luo, Z., 1996, Proceedings of the 6th International Conference Information Processing and the Management of Uncertainty (IPMU-96).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  298. Published

    Exploring Co-presence Enabled Collaboration in Social Computing Inspired Enterprise Systems

    Subramaniam, N., Nandhakumar, J. & Baptista, J., 2010, AIS electronic Library (AISeL). ICIS 2010 PROCEEDINGS, 141

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  299. Published

    Exploring information ethics for inclusive open development

    Bentley, C., 2013, IFIP 9.4 12th International Conference on Social Implications of Computers in Developing Countries.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  300. Published

    Exploring new and emerging applications of cognitive radio systems: Preliminary insights and framework

    Yau, K-L. A., Tan, F-A. G., Komisarczuk, P. & Teal, P. D., 2011, Humanities, Science and Engineering (CHUSER), 2011 IEEE Colloquium on. p. 153-157 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  301. Published

    Exploring online crowd-funding innovation and opportunities for small businesses

    Kromidha, E., 23 Jun 2014, Proceedings of the 3rd International Conference on Innovation, Trade and Economics- ICITE 2014, June 22-23, 2014. Moscow, Russia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  302. Published

    Exploring online crowdfunding innovation, networks and locations: Small businesses in Indiegogo.com

    Kromidha, E., 2014, 2014 ISBE Conference, 5-6 November 2014. Manchester, UK

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  303. Published

    Exploring the association between organisational performance, employee attitudes and HRM practices in small firms

    Tsai, C-J., Edwards, P. & Sen Gupta, S., 2008, British Academy of management, Harrowgate.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  304. Unpublished

    Exploring the Combined Potential of Critical Discourse Analysis, Framing Analysis and Semiotics. An Analysis of German Newspaper Representations of the ‘War on Terror’

    Van Efferink, L., 2015, (Unpublished) “Reframing Media/Cultural Studies” Conference, Communication and Media Research Institute (CAMRI), University of Westminster.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  305. Published

    Exploring the development of an Internet of Things (IoT) environment for value generation in third-party logistics operations

    Coronado Mondragon, A., Coronado, C. E. & Coronado, E. S., 3 Jul 2016, Abstracts of papers presented at the 21st International Symposium on Logistics. Pawar, K. S. & Tsai, K. M. (eds.). Taiwan, p. 133 8 p. 144

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  306. Published

    Exploring the Equifinality of Dynamic Capabilities: A Mixed Method Study of UK High-Tech SMEs

    Senaratne, P., Wang, C. L. & Sharma, M., 2015, European Academy of Management Annual Conference. Poland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  307. Published

    Exploring the Help-Seeking Experience of Concerned Persons: Findings From an Elder Abuse UK Helpline

    Fraga Dominguez, S., Storey, J. & Glorney, E., 16 Dec 2020, Innovation in Aging. Vol. 4. p. 628-629 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  308. Published

    Exploring the limits of single-iteration clarification dialogs

    Lin, J., Wu, P., Demner-Fushman, D. & Abels, E., 31 Oct 2006, Proceedings of the Twenty-Ninth Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. Vol. 2006. p. 469-476 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  309. Published

    Exploring the nature of virtuality: An interplay of global and local interactions

    Panteli, N., Chiasson, M., Yan, L., Poulymenakou, A. & Papargyris, A., 2007, Virtuality and Virtualization: Proceedings of the International Federation of Information Processing Working Groups 8.2 on Information Systems and Organizations and 9.5 on Virtuality and Society. Crowston, K., Sieber, S. & Wynn, E. (eds.). Springer, p. 373-377 5 p. (IFIP International Federation for Information Processing; vol. 236).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  310. Published

    Exploring the Role of Organisational Context and Work Flexibility in Perceiving Digital Technology Affordances: A Study of Knowledge Workers

    Hafezieh, N., Farivar, F. & Eshraghian, F., 2020, British Academy of Management Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  311. Published

    Exploring the traces of fault-related microstructural damage at the Santorini caldera

    Drymoni, K., Browning, J., Mitchell, T. & Gudmundsson, A., 2017, AGU FALL MEETING 2017. T21C-1221

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  312. E-pub ahead of print

    Exploring Trade-offs in Batch Bounded Distance Decoding

    Albrecht, M., Curtis, B. & Wunderer, T., 10 Jan 2020, (E-pub ahead of print) SAC 2019. Springer, p. 467-491 25 p. (Lecture Notes in Computer Science; vol. 11959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  313. Published

    Exponentiation using Division Chains

    Walter, C. D., 1997, 13th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 92-97 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  314. Published

    ExpoSE: practical symbolic execution of standalone JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 13 Jul 2017, SPIN 2017 : Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software. ACM, p. 196–199 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  315. Published

    Extended Computation Tree Logic (Extended Abstract)

    Alexsson, R., Hague, M., Kreutzer, S., Lange, M. & Latte, M., 2010, LPAR International Conference on Logic for Programming Artificial Intelligence and Reasoning.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  316. E-pub ahead of print

    Extended Functionality in Verifiable Searchable Encryption

    Alderman, J., Janson, C., Martin, K. & Renwick, S., 9 Jan 2016, (E-pub ahead of print) Proceedings of the 2nd International Conference on Cryptography and Information Security in the Balkans - BalkanCryptSec 2015. Springer, Vol. 9540. p. 187-205 19 p. (Lecture Notes in Computer Science; vol. 9540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  317. Published

    Extended privilege inheritance in RBAC

    Dekker, M., Cederquist, J. G., Crampton, J. & Etalle, S., 2007, Proceedings of 2007 ACM Symposium on Information, Computer and Communications Security. Bao, F. & Miller, S. (eds.). ACM Press, p. 383-385 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  318. Published

    Extending B AMN with concurrency

    Lano, K., Fiadeiro, J. & Dick, J., 1996, ADVANCES IN THEORY AND FORMAL METHODS OF COMPUTING. Edalat, A., Jourdan, S. & McCusker, G. (eds.). LONDON: Imperial College Press, p. 228-239 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  319. Published

    Extending EMV to support Murabaha transactions

    Al-Meaither, M. & Mitchell, C. J., 2003, NORDSEC 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems - Encouraging Cooperation, Gjøvik University College, Norway, October 2003. p. 95-108 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  320. Published

    Extending EMV Tokenised Payments To Offline-Environments

    Jayasinghe, D., Markantonakis, K., Gurulian, I., Akram, R. & Mayes, K., 9 Feb 2017, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  321. Published

    Extending nearly complete 1-planar drawings in polynomial time

    Eiben, E., Ganian, R., Hamm, T., Klute, F. & Nöllenburg, M., 18 Aug 2020, 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020. Esparza, J., Kral�, D. & Kral�, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-16 16 p. MFCS-2020-31. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 170).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. Published

    Extending partial 1-planar drawings

    Eiben, E., Ganian, R., Hamm, T., Klute, F. & Nöllenburg, M., 29 Jun 2020, 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Czumaj, A., Dawar, A. & Merelli, E. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-19 19 p. 43. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 168).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  323. Published

    Extending the Scope of CardSpace

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. Orgun, M. A., Elci, A., Makarevich, O. B., Huss, S. A., Pieprzyk, J., Babenko, L. K., Chefranov, A. G. & Shankaran, R. (eds.). New York: ACM, p. 235-238 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  324. Published

    Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism

    Bhudia, A., Cartwright, A., Cartwright, E., Hernandez-Castro, J. & Hurley-Smith, D., 2022, IEEE International Conference on Omni-layer Intelligent Systems (COINS2022): Distributed Ledger Technologies and Blockchain. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  325. Published

    Facilitating plausible deniability for cloud providers regarding tenants' activities using trusted execution

    O'Keeffe, D., Vranaki, A., Pasquier, T. & Eyers, D., 19 May 2020, Proceedings - 2020 IEEE International Conference on Cloud Engineering, IC2E 2020. Institute of Electrical and Electronics Engineers Inc., p. 59-65 7 p. (Proceedings - 2020 IEEE International Conference on Cloud Engineering, IC2E 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  326. Published

    Facilitating program comprehension by mining association rules from source code

    Tjortjis, C., Sinos, L. & Layzell, P., 2003, 11th IEEE International Workshop on Program Comprehension, Portland, USA, May 2003. p. 125-132 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  327. Published

    Facilities Services Contracts: The Search for Effective Contract Structures for Outsourcing Agreements in London Hospitals

    Jashapara, A., 2000, Proceedings of CIB W70 International Symposium on Facilities Management & Asset Maintenance. p. 447 454 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  328. Published

    Failing with Style: Designing for Aesthetic Failure in Interactive Performance

    Hazzard, A., Greenhalgh, C., Kallionpaa, M., Benford, S., Veinberg, A., Kanga, Z. & McPherson, A., 2 May 2019, CHI '19 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Glasgow, Scotland, p. 1-13 13 p. 30

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  329. Published

    Failure in the Design and Implementation of Government ICT Projects in Africa: A Complexity Theory Perspective

    Bernardi, R., 2007, IST-Africa 2007 Conference Proceedings. Cunningham, P. & Cunningham, M. (eds.). IIMC International Information Management Corporation

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  330. Published

    Failure-avoidance in Strategy Implementation

    Aboutalebi, R., 8 Sep 2015, In: BAM (British Academy of Management), 29th Annual Conference of BAM: The Value of Pluralism in Advancing Management Research, Education and Practice. 08-10 September 2015, The University of Portsmouth, England, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  331. Published

    Failures of SET implementation - What is amiss?

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - APDSI 2002, 7th Asia-Pacific Decision Sciences Institute Conference, Bangkok, Thailand, July 2002. 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  332. E-pub ahead of print

    Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles

    Knapp, J. & Quaglia, E., 20 Nov 2020, (E-pub ahead of print) Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings. Nguyen, K., Wu, W., Lam, K. Y. & Wang, H. (eds.). Springer, p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  333. Published

    Fairtracing.org and Ethical Marketing 2.0

    Kleine, D., 2010, Proceedings of the Research Councils UK Annual Digital Economy Meeting .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  334. Published

    Fake News, My News, Real News. Source credibility crisis and the rise of PR professionals as indirect gatekeepers

    Chmiel, M., 2018, 25th BledCom Conference, Bled, Slovenia..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  335. Published

    Falsa Ilusão de Ter: Investigando os Tipos de Valor para o Consumidor de Falsificações

    Ferreira, M. C., 9 Sep 2008, Proceedings of the XXXII ANPAD Meeting. ANPAD Brazilian Association of Graduate Studies and Research in Business Administration, Vol. 32. p. 1-16

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  336. Unpublished

    Family involvement and firm performance: a critical review

    Wang, C. L., Wale-Oshinowo, B. & Gamble, J., 2010, (Unpublished) The 33rd Annual Institute for Small Business and Entrepreneurship Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  337. Published

    Fano factor reduction on the 0.7 structure

    Roche, P., Segala, J., Glattli, D. C., Nicholls, J. T., Pepper, M., Graham, A. C., Thomas, K. J., Simmons, M. Y. & Ritchie, D. A., 2005, Noise and Fluctuations. Gonzalez, T., Mateos, J. & Pardo, D. (eds.). MELVILLE: AMER INST PHYSICS, p. 417-420 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  338. Published

    Fast byzantine agreement in dynamic networks

    Augustine, J., Pandurangan, G. & Robinson, P., 2013, ACM Symposium on Principles of Distributed Computing, PODC '13, Montreal, QC, Canada, July 22-24, 2013. p. 74-83 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  339. Published

    Fast Byzantine Leader Election in Dynamic Networks

    Augustine, J., Pandurangan, G. & Robinson, P., 2015, Distributed Computing: 29th International Symposium, DISC 2015, Tokyo, Japan, 2015. Proceedings. Springer Berlin / Heidelberg, Vol. 9363. p. 276-291 16 p. (Lecture Notes in Computer Science; vol. 9363).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  340. Published

    Fast Distributed Algorithms for Connectivity and MST in Large Graphs

    Pandurangan, G., Robinson, P. & Scquizzato, M., 11 Jul 2016, SPAA '16: Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures. ACM, p. 429-438 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  341. Published

    Fast probabilistic prediction for kernel SVM via enclosing balls

    Riquelme-Granada, N., Nguyen, D. K. A. & Luo, Z., 2020, Proceedings of Machine Learning Research: Proceedings of the Ninth Symposium on Conformal and Probabilistic Prediction and Applications. Vol. 128. p. 189-208 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  342. Published

    Fast Scalar Multiplication for ECC over GF(it p) using Division Chains

    Walter, C. D., 2011, WISA 2010. Chung, Y. & Yung, M. (eds.). Springer, Vol. 6513. p. 61-75 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  343. E-pub ahead of print

    Faster Enumeration-based Lattice Reduction: Root Hermite Factor k1/(2k) Time kk/8+o(k)

    Albrecht, M., Bai, S., Fouque, P-A., Kirchner, P., Stehlé, D. & Wen, W., 10 Aug 2020, (E-pub ahead of print) CRYPTO 2020. Springer, p. 186-212 27 p. (Lecture Notes in Computer Science; vol. 12171).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  344. Published

    Faster Exact Solving of SAT Formulae with a Low Number of Occurrences per Variable

    Wahlström, M., 2005, SAT. p. 309-323 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  345. Published

    Faster Modular Multiplication by Operand Scaling

    Walter, C. D., 1992, CRYPTO '91. Feigenbaum, J. (ed.). Springer, Vol. 576. p. 313-323 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  346. Published

    FAULT DETECTION IN A MECHANICAL SYSTEM BY NEURAL NETWORKS

    THOMAS, M. D. & FLOCKTON, S. J., 1994, SECOND EUROPEAN CONFERENCE ON SMART STRUCTURES AND MATERIALS. McDonach, A., Gardiner, PT., McEwen, RS. & Culshaw, B. (eds.). BELLINGHAM: SPIE - INT SOC OPTICAL ENGINEERING, p. 55-58 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  347. Published

    Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 1 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). SciTePress, p. 448-456 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  348. Published

    Feasibility of Internet of Things and Agnostic Blockchain Technology Solutions: A Case in the Fisheries Supply Chain

    Coronado Mondragon, A. E., Coronado Mondragon, C. E. & Coronado, E. S., 27 May 2020, 2020 IEEE 7th International Conference on Industrial Engineering and Applications. April 16-21, Bangkok, Thailand: IEEE Xplore, p. 504-508 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  349. Published

    Feasibility, Recipient Ownership and Knowledge Transfer Strategy: A Case of Chinese MNCs in Africa

    Rui, H. & Zhang, M., 2015, Proceedings of the 57th Annual Meeting of the Academy of International Business: "Global Networks: Organizations and People" Bengaluru, India June 27-30, 2015. Mudambi, R. & Kiyak, T. (eds.). 2015 Academy of International Business, p. 109 1 p. ID#61

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  350. Published

    Feature Correlation Attack on Biometric Privacy Protection Schemes

    Zhou, X., Busch, C., Kuijper, A. & Wolthusen, S. D., 12 Sep 2009, Proc. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009). IEEE Computer Society Press, p. 1061-1065

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  351. E-pub ahead of print

    Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures

    Akram, R., Markantonakis, K. & Sauveron, D., 3 Dec 2015, (E-pub ahead of print) The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Yan, Z. & Mueller, P. (eds.). Helsinki, Finland: IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  352. Published

    Feature Modeling and Composition with Coordination Contracts

    Andrade, L. F. & Fiadeiro, J. L., 2001, FICS. University of Karlsruhe, Institut für Programmstrukturen und Datenorganisation, Vol. 2001-14. p. 49-54 6 p. (Technical Report).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  353. Published

    Feature Selection by Conformal Predictor

    Yang, M., Nouretdinov, I., Luo, Z. & Gammerman, A., 2011, 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, Artificial Intelligence Applications and Innovations 2011, Corfu, Greece, September 15-18, 2011, Proceedings, Part II. . p. 449-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  354. E-pub ahead of print

    Feistel Structures for MPC, and More

    Albrecht, M., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 15 Sep 2019, (E-pub ahead of print) ESORICS 2019. p. 151-171 21 p. (Lecture Notes in Computer Science ; vol. 11736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  355. Published

    Female Deviance and (Re)Integration Markets

    Hutton, M. & Crangle-Sim, F., 2021, AMA Marketing and Public Policy Conference, Washington D.C. June 24th – 26th 2021.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  356. Published

    Fencing off Go: Liveness and safety for channel-based programming

    Lange, J., Ng, N., Toninho, B. & Yoshida, N., Jan 2017, POPL 2017 - Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. Gordon, A. D. & Castagna, G. (eds.). Association for Computing Machinery (ACM), p. 748-761 14 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  357. Published

    Fiber bridging strategies for damage tolerance

    Potluri, P., Arshad, M., Jamshidi, P. & Hogg, P., 1 Dec 2011, Collection of Technical Papers - AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics and Materials Conference. AIAA 2011-1983

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  358. Published

    Fighting decoherence in a Josephson qubit circuit

    Collin, E., Ithier, G., Joyez, P., Vion, D. & Esteve, D., 2004, Realizing Controllable Quantum States. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 247-254 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  359. Published

    Fine Grained Resource Reservation and Management in Grid Economics

    Chard, K., Komisarczuk, P., Bubendorfer, K. & Desai, A., 2005, Proceedings of The 2005 International Conference on Grid Computing and Applications, GCA 2005, Las Vegas, Nevada, USA, June 20-23, 2005. p. 31-38 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  360. Published

    Fingerprinting Seismic Activity across an Internet of Things

    Moore, J. P. T., Bagale, J. N., Kheirkhahzadeh, A. D. & Komisarczuk, P., 2012, 5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  361. Unpublished

    FinTech - the agent of financial services disintermediation.

    Anagnostopoulos, I., Sails, T. & Alexandrou, G., 2018, (Unpublished) 9th Annual Faculty of Business Research Conference: Contemporary Issues in Business. p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  362. Unpublished

    Fintech and RegTech

    Anagnostopoulos, I., 2017, (Unpublished) FinTech and Global Banking Services’, Fintech: The Impact on Consumers, Banking, and Regulatory Policy.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  363. Published

    Firewall Mechanism in a User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Apr 2010, Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010. Gollmann, D., Lanet, J-L. & Iguchi-Cartigny, J. (eds.). Passau, Germany: Springer, Vol. 6035/2010. p. 118-132 15 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  364. Published

    First Beam Background Simulation Studies at IR1 for High Luminosity LHC

    Kwee-Hinzmann, R., Gibson, S., Bregliozzi, G., Bruce, R., Cerutti, F., Esposito, L., Kersevan, R., Lechner, A. & Shetty, N., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 1074-1077 4 p. TUPRO027

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  365. Published

    First Beam Tests at the CERN SPS of an Electro-Optic Beam Position Monitor for the HL-LHC

    Arteche, A., Bashforth, S., Boorman, G., Gibson, S., Bosco, A., Chritin, N., Krupa, M., Lefevre, T. & Levens, T., Mar 2018, 6th International Beam Instrumentation Conference. Geneva: JACoW Publishing, p. 1-4 4 p. TUPCF23

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  366. Published

    First Results From the Operation of a Rest Gas Ionisation Profile Monitor Based on a Hybrid Pixel Detector

    Storey, J., Bodart, D., Dehning, B., Schneider, G., Veness, R., Bertsche, W., Sandberg, H., Gibson, S., Levasseur, S., Sapinski, M. & Satou, K., Mar 2018, 6th International Beam Instrumentation Conference. JACoW Publishing, p. 1-5 5 p. WE2AB5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  367. Published

    First Studies of Ion Collimation for the LHC Using BDSIM

    Abramov, A., Boogert, S., Nevay, L. & Walker, S., Jun 2018, 10th International Particle Accelerator Conference. JACoW Publishing, p. 341-344 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  368. Published

    First-class protocols for agent-based coordination of scientific instruments

    Miller, T., McBurney, P., McGinnis, J. & Stathis, K., 2007, WET ICE 2007: 16TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 41-46 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  369. Published

    Fixed-Parameter Tractability of Multicut in Directed Acyclic Graphs

    Kratsch, S., Pilipczuk, M., Pilipczuk, M. & Wahlström, M., 2012, ICALP (1). p. 581-593 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  370. Forthcoming

    Fixed-parameter tractability of satisfying beyond the number of variables

    Crowston, R., Gutin, G., Jones, M., Raman, V., Saurabh, S. & Yeo, A., 2012, (Accepted/In press) SAT 2012. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  371. Published

    Fixed-Parameter Tractability of Workflow Satisability in the Presence of Seniority Constraints

    Crampton, J., Crowston, R., Gutin, G., Jones, M. & Ramanujan, M. S., 2013, FAW-AAIM 2013: Lecture Notes in Computer Science. Vol. 7924. p. 198-209

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  372. Published

    Flexible decentralised control of connection admission

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 2000, Agent Technology for Communications Infrastructure. Hayzelden, A. & Bourne, R. A. (eds.). John Wiley & Sons, p. 144-155

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  373. Published

    Flexible decentralised control of connection admission communications networks and the IMPACT of software agents

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., Nov 1999, Proceedings of IMPACT'99 .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  374. Published

    Flora, fauna and stable isotopes in Late-Würm deposits at Lobsigensee (Swiss Plateau)

    Ammann, B., Chaix, L., Eicher, U., Elias, S., Gaillard, M. J., Hoffmann, W., Siegenthaler, U., Tobolski, K. & Wilkinson, B., 1984, Climatic Changes on a Yearly to Millennial Basis. Morner, N. A. & Karlen, W. (eds.). Dordrecht: D. Reidel Publishing Company, p. 69-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  375. Published

    FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications

    Muthukumaran, D., O'Keeffe, D., Priebe, C., Eyers, D. M., Shand, B. & Pietzuch, P. R., 12 Oct 2015, CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. p. 603-615 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  376. Published

    Fluid overpressure of quartz mineral veins in the South Wales coalfield: implication for mechanism of fracture formation in foreland basins

    Fukunari, T. & Gudmundsson, A., 2013, Rock Fractures in Geological Processes: Abstracts of the Presentations at the Symposium. U

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  377. Published

    Fluorescence spectroscopy as a life detection technique

    Martins, Z., Chan, Q. H. S. & Sephton, MA., 2010, Proceedings of the European Planetary Science Congress, Rome, Italy. Vol. 1. p. 600 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  378. Published

    Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity

    Talhouk, R., Coles-Kemp, L., Jensen, R. B., Balaam, M., Garbett, A., Ghattas, H., Araujo-Soares, V., Ahmad, B. & Montague, K., Oct 2020, ACM Conference on Computer-Supported Cooperative Work and Social Computing. ACM, Vol. 4. p. 1-25 25 p. 134

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  379. Published

    Foreign Investors, Local Community and the Acquired Firm: a case study of work organization and employment relations in a Chinese MNCs in Canada

    Zheng, Y., Sep 2013, 8th China Goes Global Conference. Jocob University, Germany

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  380. Published

    Forensic Entropy Analysis of Microsoft Windows Storage Volumes

    Weston, P. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  381. Published

    Forensic Tracking and Mobility Prediction in Vehicular Networks

    Al-Kuwari, S. & Wolthusen, S. D., 2012, Advances in Digital Forensics VIII: Proceedings of the Eighth IFIP WG 11.9 International Conference on Digital Forensics. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  382. Published

    Formal derivation of concurrent garbage collectors

    Pavlovic, D., Pepper, P. & Smith, D. R., 2010, Proceedings of MPC 2010. Desharnais, J. (ed.). Springer-Verlag, Vol. 6120. p. 353-376 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  383. Published

    Formalization of Validation Extension Metamodel for Enterprise Architecture Frameworks

    Oussena, S., Essien, J. & Komisarczuk, P., 2014, ICEIS 2014 - Proceedings of the 16th International Conference on Enterprise Information Systems, Volume 3, Lisbon, Portugal, 27-30 April, 2014. p. 427-434 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  384. Published

    Formalized Metatheory with Terms Represented by an Indexed Family of Types

    Adams, R., 2006, Types for Proofs and Programs. Filliatre, J-C., Paulin-Mohring, C. & Werner, B. (eds.). Springer, Vol. 3839. p. 1-16 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  385. Published

    Formalizing threat models for virtualized systems

    Sgandurra, D., Karafili, E. & Lupu, E., 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Springer-Verlag, Vol. 9766. p. 251-267 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  386. Published

    Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

    Bost, R., Minaud, B. & Ohrimenko, O., 30 Oct 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security: CCS '17. Association for Computing Machinery (ACM), p. 1465-1482 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  387. Published

    Four Attacks and a Proof for Telegram

    Albrecht, M., Marekova, L., Paterson, K. & Stepanovs, I., 2022, IEEE S&P 2022. Vol. 1. p. 223-242 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  388. Forthcoming

    FPGA accelerators HLS-based design of hyper complex LMS filters

    Tisan, A-S., Monmasson, E. & Cheong Took, C., 2022, (Accepted/In press) IECON 2022 – 48th Annual Conference of the IEEE Industrial Electronics Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  389. Published

    FRACTURE TOUGHNESS AND CRACK PROPAGATION IN POLYESTER RESINS.

    Gatward, C. H., Hogg, P. J. & Hull, D., 1 Dec 1985, Deformation Yield and Fracture of Polymers. London, Engl: Plastics & Rubber Inst

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  390. Published

    Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence

    Malek, W. W., Mayes, K. & Markantonakis, K., 2008, Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications. Berlin, Heidelberg: Springer-Verlag, p. 118-132 15 p. (CARDIS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  391. Published

    Fredholm Multiple Kernel Learning for Semi-Supervised Domain Adaptation

    Wang, W., Wang, H., Zhang, C. & Gao, Y., 2017, Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17). AAAI Press, p. 2732-2738 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  392. Published

    Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data

    Lacharite, M-S. & Paterson, K., 1 Mar 2018, IACR Transactions on Symmetric Cryptology. 1 ed. Ruhr-Universität Bochum, Vol. 2018. p. 277-313 37 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  393. Published

    From Boundary Spanning to Creolization: Cross-cultural Strategies from the Offshore Provider’s Perspective

    Abbott, P., Zheng, Y., Du, R. & Willcocks, L. P., 2010, AmericasConference of Information Systems 2010.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  394. Published

    From conformal to probabilistic prediction

    Vovk, V., Petej, I. & Fedorova, V., 2014, COPA 2014 Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  395. Published

    From Makerspaces to MOOCs: Recalibrating historical thinking for the digital age

    Gigliotti, S., Shep, S., Dudding, M., Plummer, M., Priestley, R. & Towl, L., 1 May 2016, There and back: Charting flexible pathways in open, mobile and distance education. p. 195-199

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  396. Forthcoming

    From matrix pivots to graphs in surfaces: exploring combinatorics through partial duals

    Moffatt, I., 2 Oct 2021, (Accepted/In press) European Congress of Mathematics Portorož, 20–26 June.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  397. Published

    From me to we: Understanding how a new collective practice is born

    Khanijou, R., Cappellini, B. & Hosany, S., 2019, 10th EIASM Interpretive Consumer Research Conference, Lyon, 9-10 May.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  398. Published

    From Quantum Interference to Bayesian Coherence and Back Round Again

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J-A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 260-279

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  399. Published

    From Separation Logic to First‐Order Logic

    Calcagno, C., Gardner, P. & Hague, M., 2005, FoSSaCS: Foundations of Software Science and Computation Structures.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  400. Published

    From Start-up to Maturity: studies based in three Chinese pharmaceutical and medical device companies’

    Zheng, Y., Li, X. & Wang, C. L., 17 Jul 2009, The Annual Conference of the Academy of Innovation and Entrepreneurship.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  401. Published

    From the individual to the collective: religion and memory in Roman Britain

    Kamash, Z., 2016, Cultural Memories in the Roman Empire. Galinsky, K. & Lapatin, K. (eds.). Getty Museum Press, p. 153-169 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  402. Published

    From the Mouths of Mothers: Using drama and service user testimonies to facilitate reflective learning for qualified social workers who are working with children and families who are affected by child sexual abuse

    Leonard, K., Gupta, A., Stuart-Fisher, A. & Lowe, K., Jul 2015, EASSW - European Association of Schools of Social Work conference, Milan, Italy..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  403. Published

    From user-centred design to security: building attacker personas for digital banking

    Moeckel, C., 29 Sep 2018, NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction . Association for Computing Machinery (ACM), p. 892-897 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  404. In preparation

    From Victim to Perpetrator: On the Blurring of Identities in Soazig Aaron’s Le Nom de Klara (2002)

    Duffy, H., 28 Jul 2019, (In preparation) Victims, Perpetrators and Implicated Subjects : Rethinking Agency at the Intersections of Narrative and Memory.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  405. Published

    Frustration and Reactive Aggression: A Response Force Measure

    Arshad, I., Lickley, R., Sebastian, C. & Balsters, J., May 2019, Poster presented at the British Psychological Society Annual Conference in May 2019, Harrogate, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  406. Published

    FSO-CDMA Systems Supporting end-to-end Network Slicing

    R. Raddo, T., Perez-Santacruz, J., Johannsen, U., Dayoubb, I., Haxha, S., Tafur Monroy, I. & Jurado-Navas, A., 20 Sep 2020, Imaging and Applied Optics Congress. Vancouver, BC, Canada, Vancouver, Canada: OSA Technical Digest (Optical Society of America, 2020, 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  407. Forthcoming

    Future trends in Employment Relations: Lessons from SMEs in the creative industry

    Sen Gupta, S., 26 Jun 2019, (Accepted/In press) Lessons from SMEs in the creative industry.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  408. Published

    Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework

    Wolthusen, S. D., 26 May 2011, Proc. 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011). IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  409. Published

    'Gainst Nature Still: Reading Macbeth's Murder of Duncan

    Uotinen, T., 2011, Villains: Global Persceptives in Villains and Villainy. Genc, B. & Lenhardt, C. (eds.). Inter-Disciplinary Press, p. 157-163 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  410. Published

    Games as a Metaphor for Interactive Systems

    Stathis, K. & Sergot, M. J., 1 Aug 1996, People and Computers XI (Proceedings of HCI'96). Sasse, M. A., Cunningham, R. J. & Winder, R. L. (eds.). London, UK: Springer-Verlag, p. 19-33 15 p. (BCS Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  411. Published

    Game-theoretic Simulations with Cognitive Agents

    Shahid, N., O'Keeffe, D. & Stathis, K., 21 Dec 2021, The 33rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI). IEEE Computer Society, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  412. Published

    Gaming security by obscurity

    Pavlovic, D., 2011, NSPW '11 Proceedings of the 2011 workshop on New security paradigms workshop. Gates, C. & Hearley, C. (eds.). New York, NY, USA: ACM, p. 125-140 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  413. Published

    Gamma Factory at CERN: Design of a Proof-of-Principle Experiment

    The Gamma Factory Collaboration, Alden, S., Bosco, A., Gibson, S. & Nevay, L., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 1-4 4 p. MOPRB052

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  414. E-pub ahead of print

    Gamma Factory at CERN – novel research tools made of light

    The Gamma Factory Collaboration, Abramov, A., Alden, S., Bosco, A., Gibson, S. & Nevay, L., 14 Jun 2019, (E-pub ahead of print) XXV Cracow Epiphany Conference on Advances in Heavy Ion Physics: 8-11 January 2019, Cracow, Poland. Acta Physica Polonica B, p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  415. Published

    Gamma Factory for CERN initiative - progress report

    The Gamma Factory Collaboration, Abramov, A., Alden, S., Gibson, S. & Nevay, L., 12 Nov 2020, Proceedings of Science: European Physical Society Conference on High Energy Physics EPS-HEP2019. PoS (EPS-HEP2019) 020 ed. Ghent, Belgium: Proceedings of Science, Vol. 364. 8 p. PoS (EPS-HEP2019) 020

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. Published

    GARMDROID: IoT Potential Security Threats Analysis through the Inference of Android Applications Hardware Features Requirements

    Rodriguez-Mota, A., Escamilla-Ambrosio, P. J., Happa, J. & Aguirre-Anaya, E., 2017, AFI 360 Conference Track on Future Internet and Internet of Things Applications. p. 63-74 12 p. (Lecture Notes of the Institute for Computer Sciences; vol. 179).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  417. Published

    Garnata: An Information Retrieval System for Structured Documents based on Probabilistic Graphical Models

    de Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 2006, Proceedings of the 11th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU 2006). Paris (France), p. 1024-1031 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  418. Unpublished

    Gender and ICTs in Brazil

    Poveda Villalba, S., 2014, (Unpublished) ICT4D London Meet-Up. ICT4D London Meet-Up

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  419. Published

    Gene selection using Wilcoxon rank sum test and Support Vector Machine for cancer classification

    Liao, C., Li, S. & Luo, Z., 2007, Lecture Notes in Computer Science. Springer, Vol. 4456. p. 57-66

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  420. Published

    General Linear Relations among Different Types of Predictive Complexity

    Kalnishkan, Y., 1999, Algorithmic Learning Theory, 10th International Conference, ALT'99, Proceedings: volume 1720 of Lecture Notes in Artificial Intelligence. Springer, p. 323-334 (Lecture Notes in Artificial Intelligence; vol. 1720).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  421. Published

    Generalised entropy and asymptotic complexities of languages

    Kalnishkan, Y., Vovk, V. & Vyugin, M. V., 2007, Proceedings of the Twentieth Annual Conference on Learning Theory. Bshouty, N. & Gentily, C. (eds.). Berlin: Springer, Vol. 4539. p. 293-307 15 p. (Lecture Notes in Artificial Intelligence; vol. 4539).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  422. Published

    Generalising Interpretations between Theories in the context of (pi-) Institutions

    Fiadeiro, J. L. & Maibaum, T. S. E., 1993, Theory and Formal Methods. Springer, p. 126-147 22 p. (Workshops in Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  423. Published

    Generalized entropies and asymptotic complexities of languages

    Kalnishkan, Y., Vyugin, M. V. & Vovk, V., Sep 2012, Proceedings of the Fifth Workshop on Information-Theoretic Methods in Science and Engineering. de Rooij, S., Kotlowski, W., Rissanen, J., Millimaki, P., T. R. & Yamanishi, K. (eds.). Amsterdam: CWI, p. 44-47 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. Published

    Generating Concurrency Checks Automatically

    Hague, M. & Hoyland, J., 17 Jul 2016, Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs . ACM, p. 1-15 15 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  425. Published

    Generating social value through online communities: The case of medicine Africa

    Chamakiotis, P. & Panteli, N., 17 May 2017, AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation. Americas Conference on Information Systems, p. 1-5 5 p. (AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation; vol. 2017-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  426. Published

    Generating Social Value through Online Communities: The Case of MedicineAfrica

    Chamakiotis, P. & Panteli, N., 2017, Proceedings of the 23rd Americas Conference on Information Systems (AMCIS): ‘A Tradition of Innovation’: Mini-Track: 8: ‘Virtual Communities and Social Media in Healthcare. August 10-12, Boston, MA, USA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  427. E-pub ahead of print

    Generating Unlinkable IPv6 Addresses

    Nyirenda, M., Khan, M., Li, W., Mitchell, C. & Yau, P-W., 9 Dec 2015, (E-pub ahead of print) Proceedings of SSR 15, Tokyo, December 2015. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 185-199 15 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  428. Published

    Geometry of abstraction in quantum computation

    Pavlovic, D., 19 Jul 2012, Proceedings of Symposia in Applied Mathematics. Abramsky, S. & Mislove, M. (eds.). AMS, Vol. 71. p. 233-267 (Proceedings of Symposia in Applied Mathematics; vol. 71).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  429. Published

    Geometry, displacements, and driving stresses of seismogenic faults in Iceland

    Gudmundsson, A., 1989, Seismology in Europe. Thorkelsson, B. (ed.). Reykjavik: Iceland Meteorological Office, Reykjavik, p. 193-198

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  430. Published

    Giant mounded drifts in the Mozambique continental margin: Origins and global implications for the history of thermohaline circulation

    Thieblemont, A., Hernández-Molina, F. J. & Raisson, F., 2017, 3rd EAGE Eastern Africa Petroleum Geoscience Forum: Managing Subsurface Risk in Finding and Developing Hydrocarbons. European Association of Geoscientists and Engineers, EAGE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  431. Published

    Glamdring: Automatic Application Partitioning for Intel SGX

    Lind, J., Priebe, C., Muthukumaran, D., O'Keeffe, D., Aublin, P-L., Kelbert, F., Reiher, T., Goltzsche, D., Eyers, D. M., Kapitza, R., Fetzer, C. & Pietzuch, P. R., 2017, Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC ’17). USENIX, p. 285-298 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  432. Published

    Gli Eroi e i Mostri: mito e storia nell’Ercole

    Jossa, S., Cherchi, P. (ed.), Rinaldi, M. (ed.) & Tempera, M. (ed.), 2008, Giovan Battista Giraldi Cinzio gentiluomo ferrarese. Firenze: Gabinetto Scientifico Letterario G. P. Vieusseux, Studi 13, Leo Olschki

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  433. Published

    Global changes in gene expression during Alstroemeria petal senescence

    Wagstaff, C., Bramke, I., Breeze, E., Thomas, B., Buchanan-Wollaston, V., Harrison, L., Rogers, H. & Stead, A., 2005, Proceedings of the VIIIth International Symposium on Postharvest Physiology of Ornamental Plants. Marissen, N., VanDoorn, WG. & VanMeeteren, U. (eds.). LEUVEN 1: INTERNATIONAL SOCIETY HORTICULTURAL SCIENCE, p. 127-134 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  434. Published

    Global human mobility and knowledge transfer: Highly skilled return migrants in Ethiopia

    Lam, A. & Rui, H., Jun 2018, 30th Annual Conference of the Society for the Advancement of Socio-Economics (SASE): Global Reordering.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  435. Published

    Going with the flow? What CSR can learn from innovation

    Preuss, L. & Dyerson, R., Nov 2010, Open University Social Marketing and Socially Responsible Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  436. Published

    Gracefully Degrading Consensus and k-Set Agreement in Directed Dynamic Networks

    Biely, M., Robinson, P., Schmid, U., Schwarz, M. & Winkler, K., 2015, Networked Systems - Third International Conference, NETYS 2015, Agadir, Morocco, May 13-15, 2015, Revised Selected Papers. Bouajjani, A. & Fauconnier, H. (eds.). Springer Berlin / Heidelberg, Vol. 9466. p. 109-124 16 p. (Lecture Notes in Computer Science; vol. 9466).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  437. Published

    Graded Encoding Schemes from Obfuscation

    Farshim, P., Hesse, J., Hofheinz, D. & Larraia de Vega, E., 1 Mar 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Springer-Verlag, Vol. 10769 LNCS. p. 371-400 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  438. Published

    Grameen Bank’s Housing Program for Rural Poor in Bangladesh: A Case Study

    Adri, N. & Sultana, S., 2004, Papers of the Applied Geography Conferences. Montz, B. & Tobin, G. (eds.). Vol. 27. p. 247-253 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  439. Published

    Granddaughter beware! An intergenerational case study of managing trust issues in the use of Facebook

    Light, A. & Coles-Kemp, L., 2013, International Conference on Trust and Trustworthy Computing. Springer Berlin / Heidelberg, p. 196-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  440. Published

    Graph Neural Networks Boosted Personalized Tag Recommendation Algorithm

    Chen, X., Yu, Y., Jiang, F., Zhang, L., Gao, R. & Gao, H., 28 Sep 2020, Graph Neural Networks Boosted Personalized Tag Recommendation Algorithm. Glasgow: IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  441. Published

    Graphical user interfaces in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, 4th International Workshop on Product LinE Approaches in Software Engineering, PLEASE 2013, San Francisco, CA, USA, May 20, 2013. p. 25-28 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  442. E-pub ahead of print

    Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification

    Hurley-Smith, D. & Hernandez-Castro, J., 21 Nov 2018, (E-pub ahead of print) 4th International Conference on Research in Security Standardisation: SSR 2018. Cremers, C. & Lehmann, A. (eds.). Springer, p. 143-163 21 p. (Lecture Notes in Computer Science; vol. 11322).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  443. Published

    Green Supply Chain Management (GSCM) in Food Retail Industry: An Exploratory Study

    Shah, S. & Wen, C., Aug 2021, IEEE International Conference on Management in Emerging Markets. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  444. Published

    Grétry et les connaissances modernes

    Charlton, D., 2013, Art & Fact: Revue des historiens de l'art, des archéologues et des musicologues de l'Université de Liège. Tilkin, F. (ed.). Liège: Université de Liège, Vol. 32. p. 42-8 7 p. (Art & Fact; vol. 32).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  445. Published

    Grid Enabled Internet Instruments

    Komisarczuk, P., Seifert, C. & Pemberton, D., 2007, Proceedings of the Global Communications Conference, 2007. GLOBECOM '07, Washington, DC, USA, 26-30 November 2007. p. 1906-1911 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  446. Published

    Group communication as an infrastructure for distributed system management

    Amir, Y., Breitgand, D., Chockler, G. V. & Dolev, D., 1 Jan 1996, Proceedings of the 3rd International IEEE Workshop on Services in Distributed and Networked Environments (SDNE '96). p. 84-91 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  447. Published

    Group decision support for resource allocation decisions in three-person groups

    van Leeuwen, J., van der Heijden, H., Kronsteiner, R. & Kotsis, G., 2004, Proceedings of the European Conference on Information Systems (ECIS). Turku, Finland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  448. Published

    Group Signatures with Selective Linkability

    Garms, L. & Lehmann, A., 2019, 22nd International Conference on Practice and Theory of Public Key Cryptography. p. 190-220 31 p. (Lecture Notes in Computer Science; vol. 11442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  449. Published

    Group Theory in Cryptography

    Blackburn, S., Cid, C. & Mullan, C., 2011, Group St Andrews 2009 in Bath. The London Mathematical Society, Vol. 387. p. 133-149 17 p. (LMS Lecture Note Series; vol. 387).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  450. Published

    Growth of Digital Supply Chains for SME Transformation

    Menon, S. & Shah, S., 24 Nov 2020, 2020 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2020. Institute of Electrical and Electronics Engineers Inc., 9380603. (2020 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  451. Published

    Guaranteed network traffic demand prediction using FARIMA models

    Dashevskiy, M. & Luo, Z., 2008, Lecture Notes in Computer Sc. Vol. 5326. p. 274-281

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  452. Published

    Guiding Reification in OWL through Aggregation

    Severi, P., Fiadeiro, J. L. & Ekserdjian, D., 2010, Description Logics. CEUR-WS.org, Vol. 573. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  453. Published

    Hack the Heap: Heap Layout Manipulation made Easy

    Gennissen, J. & O'Keeffe, D., 26 May 2022, Hack the Heap: Heap Layout Manipulation made Easy. 16th Workshop on Offensive Technologies (WOOT) 2022

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  454. Published

    Hadron Therapy Machine Simulations Using BDSIM

    Shields, W., Boogert, S., Nevay, L. & Snuverink, J., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 546-549 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  455. Published

    Half-integrality, LP-branching and FPT Algorithms

    Wahlström, M., 2014, SODA. Chekuri, C. (ed.). SIAM, p. 1762-1781 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  456. Published

    Harmonic characterisation model of grid interactive photovoltaic systems

    Nduka, O. & Pal, B., 24 Nov 2016, 2016 IEEE International Conference on Power System Technology (POWERCON). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  457. Published

    Harmonic Domain Modeling of PV System for the Assessment of Grid Integration Impact

    Pal, B. & Nduka, O., 24 Dec 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  458. Unpublished

    Harnessing employee engagement in UK public services

    Gatenby, M., Alfes, K., Truss, K., Rees, C. & Soane, E., Oct 2009, (Unpublished) 10th Public Management Research Association (PMRA) Conference. Columbus.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  459. Published

    He-3 bilayer film adsorbed on graphite plated with a bilayer of He-4: A new frustrated 2D magnetic system

    Neumann, M., Nyeki, J., Cowan, B. & Saunders, J., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 317-318 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  460. Published

    Hearing Through the Eye in Eighteenth-Century French Opera

    Charlton, D., 2014, Exchanges and Tensions in Art, Theatre and Opera, c.1750-1850. Hibberd, S. & Wrigley, R. (eds.). Ashgate

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  461. Published

    Heavy-light decay constants from relativistic N-f=2, 0 QCD

    Shanahan, H. P. & CP-PACS Collaboration, 2000, HIGH ENERGY PHYSICS 99, PROCEEDINGS. BRISTOL: IOP PUBLISHING LTD, p. 943-944 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  462. Published

    Hedging Structured Concepts

    Koolen, W. M., Warmuth, M. K. & Kivinen, J., 1 Jun 2010, Proceedings of the 23rd Annual Conference on Learning Theory (COLT 2010). p. 93-105 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  463. Published

    Hemispheric lateralization of sentence intonation in left handed subjects with typical and atypical language lateralization: An fMRI study

    Varga, E., Schnell, Z., Perlaki, G., Orsi, G., Aradi, M., Auer, T., John, F., Dóczi, T., Komoly, S., Kovács, N., Schwarcz, A., Tényi, T., Herold, R., Janszky, J. & Horváth, R., 2014, Proceedings of the International Conference on Speech Prosody. International Speech Communications Association, p. 1130-1133 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  464. Published

    Heterogeneous and Asynchronous Networks of Timed Systems

    Fiadeiro, J. L. & Lopes, A., 2014, Fundamental Approaches to Software Engineering - 17th International Conference, FASE 2014. Springer, Vol. 8411. p. 79-93 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  465. Forthcoming

    Heterogeneous Facility Location with Limited Resources

    Deligkas, A., Filos-Ratsikas, A. & Voudouris, A., 2022, (Accepted/In press) AAAI Conference on Artificial Intelligence, AAAI 2022.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  466. Published

    Heterogeneous Internet access via PANA/UMTS

    Pagliusi, P. S. & Mitchell, C. J., 2004, Proceedings of the 3rd International Conference on Information Security, Hardware/Software Codesign and Computer Networks - ISCOCO 2004, Rio De Janeiro, Brazil, October 2004. World Scientific, 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  467. Published

    Heterogeneous Timed Machines

    Delahaye, B., Fiadeiro, J. L., Legay, A. & Lopes, A., 2014, Theoretical Aspects of Computing - ICTAC 2014 - 11th International Colloquium, Bucharest, Romania, September 17-19, 2014.. Springer, Vol. 8687. p. 115-132 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  468. Published

    Heuristic subset selection in classical planning

    Lelis, L. H. S., Franco, S., Abisrror, M., Barley, M., Zilles, S. & Holte, R. C., Jul 2016, Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence: New York, New York, USA 9–15 July 2016. International Joint Conferences on Artificial Intelligence, p. 3185-3191 7 p. (IJCAI International Joint Conference on Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  469. Published

    H-IBAS-H - Authentication System for University Student Portals Using Images

    Al-Sinani, H., Nguyen, C. & Vuksanovic, B., 2009, Proceedings of ICCCP-09: International Conference on Communication, Computing and Power, jointly organised with IEEE, Muscat, Oman, February 15-18 2009. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  470. Published

    Hidden histories? Local knowledge and indigenous agency in the history of geographical exploration

    Driver, F. & Jones, L., 2010, Proceedings of the 14th International Conference of Historical Geographers, Kyoto Proceedings of the 14th International Conference of Historical Geographers, Kyoto . Kyoto University Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  471. Published

    Hidden Markov Models with Confidence

    Cherubin, G. & Nouretdinov, I., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 128-144 17 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  472. Published

    High Frequency Electro-Optic Beam Position Monitors for Intra-Bunch Diagnostics at the LHC

    Gibson, S., Arteche, A., Bosco, A., Darmedru, P. Y., Lefevre, T. & Levens, T., Jan 2016, 4th International Beam Instrumentation Conference: IBIC2015, Melbourne, Australia. JACoW Publishing, p. 606-610 5 p. WEDLA02

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  473. Published

    High occupancy resource allocation for grid and cloud systems, a study with DRIVE

    Chard, K., Bubendorfer, K. & Komisarczuk, P., 2010, Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, HPDC 2010, Chicago, Illinois, USA, June 21-25, 2010. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  474. E-pub ahead of print

    High System-Code Security with Low Overhead

    Wagner, J., Kuznetsov, V., Candea, G. & Kinder, J., 20 Jul 2015, (E-pub ahead of print) 2015 IEEE Symposium on Security and Privacy. IEEE, p. 866-879 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  475. Published

    Highly Pristine Organic Matter in a Xenolith Clast in the Zag H Chrondrite

    Kebukawa, Y., Ito, M., Zolensky, ME., Nakato, A., Suga, H., Takahashi, Y., Takeichi, Y., Mase, K., Chan, Q. & Fries, M., 20 Mar 2017, 48th Lunar and Planetary Science Conference, held 20-24 March 2017, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  476. E-pub ahead of print

    High-Precision Arithmetic in Homomorphic Encryption

    Chen, H., Laine, K., Player, R. & Xia, Y., 7 Mar 2018, (E-pub ahead of print) Topics in Cryptology – CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings. Springer, p. 116-136 21 p. (Lecture Notes in Computer Science ; vol. 10808 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  477. Published

    History of Quaternary Science

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 10-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  478. Published

    Host-Based Security Sensor Integrity in Multiprocessing Environments

    Mcevoy, R. & Wolthusen, S. D., May 2010, Information Security, Practice and Experience: 6th International Conference, ISPEC 2010. Springer-Verlag, p. 138-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  479. Unpublished

    Household food waste simulation model: Investigation of interventions for staple food items waste

    Kandemir, C., Quested, T., Reynolds, C., Fisher, K. & Devine, R., 10 Jun 2019, (Unpublished) Household food waste simulation model: Investigation of interventions for staple food items waste.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  480. Published

    How ‘search’ Has Become the Watchword of the Digital Organisation

    Hafezieh, N. & Pollock, N., 2018, Academy of Management Proceedings. 1 ed. Academy of Management, Vol. 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  481. Published

    How ‘Search’ Has Become the Watchword of the Digital Organisation

    Hafezieh, N. & Pollock, N., 2018, Academy of Management Global Proceedings. 2018 ed. Academy of Management, Vol. Surrey.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  482. Published

    How Civil Society Organizations Can Promote Financial Inclusion

    Neriamparampil, C., 27 Mar 2020, Development Asia. Asian Development Bank

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  483. Published

    How damaging is caldera collapse for a volcanic edifice?

    Drymoni, K., Browning, J. & Gudmundsson, A., 2017, JOINT ASSEMBLY TSG-BGA-VMSG.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  484. Published

    How do knowledge workers with flexible jobs manage constant connectivity? An affordance perspective

    Farivar, F., Eshraghian, F. & Hafezieh, N., 2020, Academy of Management Proceedings. Academy of Management

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  485. Published

    How do management ideas diffuse? Lessons from the global spread of corporate social responsibility

    Preuss, L., Mar 2013, 40th annual conference of the Academy of International Business – UK and Ireland Chapter (AIB-UKI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  486. Published

    How Do Online Communities of Patients Aggregate on Twitter? An Affordance Perspective

    Bernardi, R., 11 Dec 2016, Proceedings of the Thirty Seventh International Conference on Information Systems: 2016 International Conference on Information Systems (ICIS 2016), December 11-14, 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  487. Unpublished

    How Hezbollah affects Lebanon’s sovereignty

    Van Efferink, L., 2010, (Unpublished) Political Studies Association Graduate Network, University of Oxford.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  488. Unpublished

    How important are national industrial relations systems in shaping restructuring in MNCs?

    Edwards, T., Coller, X., Ortiz, L., Rees, C. & Wortmann, M., Jul 2004, (Unpublished) IESE/DMU Conference on 'Multinationals and the International Diffusion of Organizational Forms and Practices'. Barcelona.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  489. Published

    How private is your period? A systematic analysis of menstrual app privacy policies

    Shipp, L. & Blasco Alis, J., 2020, Proceedings on Privacy Enhancing Technologies 2020 (PoPETs 2020). Vol. 2020(4). p. 491-510 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  490. Published

    How to give FAST Advice

    Stathis, K., 1 Oct 1994, Proceedings of the 7th Symposium and Exhibition on Industrial Applications of Prolog (INAP'94). p. 59-67 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  491. Published

    How to grant less permissions to facebook applications

    Costantino, G., Martinelli, F. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 55-60 6 p. 6947733

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  492. Published

    How to identify all cheaters in Pinch's scheme

    Yeun, C. Y. & Mitchell, C. J., 1998, Proceedings of JWIS '98, Singapore, December 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  493. Published

    Human resource Management, Organisational Performance, Employee Attitudes and Behaviours: Exploring the linkages

    Tsai, C-J., Edwards, P. & Sen Gupta, S., 2007, European Academy of Management (EURAM), Paris, France.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  494. Published

    Human rights policies and corporate financial performance: Evidence from UK corporations

    Preuss, L. & Brown, D., Mar 2010, annual meeting of the International Association for Business and Society .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  495. E-pub ahead of print

    Humans in (digital) space: Representing humans in virtual environments

    Lycett, M. & Reppel, A., 6 Jun 2022, (E-pub ahead of print) AVI 2022: Proceedings of the 2022 International Conference on Advanced Visual Interfaces. p. 1-5 5 p. 28

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  496. Published

    Hungarian IT: Coping with economic transition and globalisation

    Harindranath, G., 2004, Proceedings of the 2004 European Conference on Information Systems (ECIS), Turku School of Economics and Business Administration, Turku, Finland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  497. Forthcoming

    Hybrid Discrete-Continuous Path Planning for Lattice Traversal

    Franco Aixela, S., Sustarevas, J. & Bernardini, S., 30 Jul 2022, (Accepted/In press) IEEE/RSJ International Conference on Intelligent Robots and Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  498. Published

    Hybrid metallic mesoscopic structures: Some unanswered questions

    Petrashov, V., 2003, TOWARDS THE CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPINTRONICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 255-261 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  499. Published

    Hybrid Publicly Verifiable Computation

    Alderman, J., Janson, C., Crampton, J. & Cid, C., 2 Feb 2016, Topics in Cryptology - CT-RSA 2016. Sako, K. (ed.). Springer, Vol. 9610. p. 147-163 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  500. Published

    Hydrogen Isotopes in Beetle Chitin

    Grocke, D., van Hardenbroeck, M., Elias, S. & Sauer, P., 2011, Chitin: Formation and Diagenesis. Gupta, S. N. (ed.). Springer, p. 105-116

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  501. Unpublished

    Hype Cycles of the Digital Economy: Productisation of Expectations and the Gartner Hype Cycle

    Pollock, N., Williams, R. & Hafezieh, N., 2021, (Unpublished) Society for the Advancement of Socio-Economics (SASE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution