Home > Publications

Publications

33801 - 33900 out of 37,081Page size: 100
  1. Conference contribution › Research
  2. Published

    Micron-scale Laser-wire at the ATF-II at KEK Commissioning and Results

    Nevay, L. J., Corner, L., Walczak, R., Blair, G., Boogert, S., Deacon, L. & Karataev, P., 1 Dec 2011, IPAC 2011 - 2nd International Particle Accelerator Conference. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Migration of He-3 impurities along dislocation lines in He-4 single crystals

    Rojas, X., Haziot, A. & Balibar, S., 2012, 26TH INTERNATIONAL CONFERENCE ON LOW TEMPERATURE PHYSICS (LT26), PTS 1-5. IOP PUBLISHING LTD, 4 p. (Journal of Physics Conference Series; vol. 400).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Millennial and century climate changes in the Colorado Alpine

    Elias, S., 2003, Climate Variability and Ecosystem Response. Greenland, D. (ed.). London: Oxford University Press, p. 370-383

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. E-pub ahead of print

    MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

    Albrecht, M., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T., 9 Nov 2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer, Vol. 10031. p. 191-219 29 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. E-pub ahead of print

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Ankele, R. & Kölbl, S., 13 Jan 2019, Selected Areas in Cryptography 2018. Lecture Notes in Computer Science ed. Calgary, Canada: Springer, Vol. 11349. p. 163-190 28 p. (Lecture Notes in Computer Science; vol. 11349).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Minimal weight k-SR representations

    Han, Y., Gollmann, D. & Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 34-43 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Minimizing the Log Size for Execution Replay of Shared-Memory Programs

    Levrouw, L. J. & Audenaert, K., 1994, Parallel Processing, Proceedings of Conpar 94–VAPP VI. Springer, p. 76-87 (Lecture Notes in Computer Science; vol. 854).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Minimum description length estimators under the optimal coding scheme

    Vovk, V., 1995, Proceedings of the Second European Conference on Computational Learning Theory. Vitanyi, P. (ed.). Berlin: Springer, p. 237-251 (Lecture Notes in Computer Science; vol. 904).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Mining the biomedical literature to predict shared drug targets in DrugBank

    Caniza Vierci, H., Galeano Galeano, D. & Paccanaro, A., 2017, XLIII Conferencia Latinoamericana en Informática CLEI 2017. IEEE Xplore, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Mining the recent history of Macromarketing thought: A visualization of ideas

    Reppel, A. & Kravets, O., 7 Jul 2016, Proceedings of the 41st Annual Macromarketing Conference. Dublin, Ireland, p. 465-468

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Unpublished

    Miracles, transformative moments and ‘A life’s work’: Exploring the intersection of individual and social identity

    Tzouramani, E., 2013, (Unpublished) 3rd Conference of Management, Spirituality and Religion, May 2013.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 53-66 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Mitigating CSRF attacks on OAuth 2.0 systems

    Li, W., Mitchell, C. J. & Chen, T. M., 1 Nov 2018, Proceedings of 2018 16th Annual Conference on Privacy, Security and Trust (PST): 28-30 Aug 2018. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Mitigation of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014). IEEE Computer Society Press, p. 478 483 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Mixability and the Existence of Weak Complexities

    Kalnishkan, Y. & Vyugin, M., 2002, Computational Learning Theory, 15th Annual Conference on Computational Learning Theory, COLT 2002, Proceedings: volume 2375 of Lecture Notes in Artificial Intelligence. Springer, p. 105-120 (Lecture Notes in Artificial Intelligence; vol. 2375).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Mixed Sneutrino Dark Matter and the Ratio Omega(b)/Omega(dm)

    West, S., 27 Oct 2006, Proceedings of SUSY06.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Mobile recommendation systems for decisions ‘on the go’

    van der Heijden, H., Kotsis, G. & Kronsteiner, R., 2005, Proceedings of the International Conference on Mobile Business (ICMB). Sydney, Australia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Mobile services for group decision support

    van Leeuwen, J. & van der Heijden, H., 2003, Proceedings of the 16th Bled Electronic Commerce conference. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Model checking for symbolic-heap separation logic with inductive predicates

    Brotherston, J., Gorogiannis, N., Kanovich, M. & Rowe, R., 11 Jan 2016, POPL '16 Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM, p. 84-96 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Model Checking Recursive Programs with Numeric Data Types

    Hague, M. & Lin, A., 2011, CAV: Computer Aided Verification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Modelando el nicho ecológico de los bambúes leñosos (Bambuseae, Poaceae) en Bolivia: Implicaciones para la construcción de aerófonos autóctonos y la conservación de los bambúes musicales

    Hachmeyer, S., 2017, La rebelión de los objetos Cestería y Maderas: Anales de la reunión anual de etnología. La Paz: MUSEF, Vol. XXXI. p. 183-210

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Modeling And Detecting Anomalies In Scada Systems

    Svendsen, N. & Wolthusen, S. D., Mar 2008, Critical Infrastructure Protection II: Proc. Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 101-113

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Modelling e-business security using business processes

    Nachtigal, S. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 459-464 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Modelling GLL Parser Implementations

    Johnstone, A. & Scott, E., 2011, Software Language Engineering: Third International Conference, SLE 2010, Eindhoven, The Netherlands, October 12-13, 2010, Revised Selected Papers. Malloy, B., Staab, S. & van den Brand, M. (eds.). Springer, p. 42-61 20 p. (Lecture Notes in Computer Science; vol. 6563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Modelling Implementation of Strategy

    Aboutalebi, R. & Tan, H., 9 Sep 2014, In: BAM (British Academy of Management), 28th Annual Conference of BAM: The Role of the Business School in Supporting Economic and Social Development. 09-11 September 2014, Belfast Waterfront, Northern Ireland, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Modelling the Satellite Bridge for B-ISDN Islands

    Sun, Z., Komisarczuk, P., Coakley, F. P. & Evans, B. G., 1994, Broadband Islands '94, Connecting with the End-User, Proceedings of the 3rd Intermational Conference on Broadband Islands, Hamburg, Germany, 7-9 June, 1994. p. 211-219 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L., 30 Oct 2017, PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Moduli for Testing Implementations of the RSA Cryptosystem

    Walter, C. D., 1999, 14th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 78-85 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Monitoring excavation-related ground deformation in london, UK using SqueeSAR™

    Bischoff, C. A., Mason, P. J., Ghail, R. C., Giannico, C. & Ferretti, A., 9 May 2019, Tunnels and Underground Cities: Engineering and Innovation meet Archaeology, Architecture and Art- Proceedings of the WTC 2019 ITA-AITES World Tunnel Congress. Viggiani, G., Celestino, T., Peila, D. & Viggiani, G. (eds.). CRC Press / Balkema, p. 5360-5367 8 p. (Tunnels and Underground Cities: Engineering and Innovation meet Archaeology, Architecture and Art- Proceedings of the WTC 2019 ITA-AITES World Tunnel Congress).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Monotonicity and Completeness in Attribute-Based Access Control

    Crampton, J. & Morisset, C., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 33-48

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Montgomery's Multiplication Technique: How to Make It Smaller and Faster

    Walter, C. D., 1999, CHES '99. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1717. p. 80-93 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Forthcoming

    Mood and confidence in seeking social support in university students with chronic pain

    Serbic, D. & Doyle, L., 2019, (Accepted/In press) Teaching and supporting students with invisible disabilities . Psychology Teaching Review

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    More Detail for a Combined Timing and Power Attack against Implementations of RSA

    Schindler, W. & Walter, C. D., 2003, 9th IMA Int. Conf. on Cryptography and Coding. Paterson, K. G. (ed.). Springer, Vol. 2898. p. 245-263 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Morphological effects on pronunciation

    Mousikou, P., Strycharczuk, P., Turk, A., Rastle, K. & Scobbie, J., 2015, The Scottish Consortium for ICPhS 2015 (Ed.), Proceedings of the 18th International Congress of Phonetic Sciences . Glasgow, UK: The University of Glasgow, paper number 0816

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    MoverScore: Text Generation Evaluating with Contextualized Embeddings and Earth Mover Distance

    Zhao, W., Peyrard, M., Liu, F., Gao, Y., Meyer, C. M. & Eger, S., Nov 2019, Proceedings of 2019 Conference on Empirical Methods in Natural Language Processing (EMNLP 2019). p. 563-578 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Mozart and Paris (1778)

    Charlton, D., 1995, Europa im Zeitalter Mozarts. Csáky, M. & Pass, W. (eds.). Vienna: Böhlau, p. 185-89 5 p. (Schriftenreihe der Osterreichischen Gesellschaft zur Erforschung des 18. Jahrhunderts ; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    MPLS policy target recognition network

    Al-Mutairi, A. & Wolthusen, S., 2 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9572. p. 71-87 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9572).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    MSL 14 - a Wellcome Manuscript of a Medical Practitioner

    Zipser, B. & Nutton, V., 2010, Histoire de la tradition et édition des médecins grecs: Actes du VIe colloque international (Paris, Université de Paris Sorbonne - Académie des Inscriptions et Belles Lettres, 10-12 avril 2008). Boudon-Millot, V., Garzya, A., Jouanna, J. & Roselli, A. (eds.). Napoli: M. D'Auria Editore, p. 259-270 11 p. (Collectanea; vol. 27).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Forthcoming

    MSL 14 as a Therapeutic Handbook

    Zipser, B., 25 Nov 2019, (Accepted/In press) Exploring Greek Manuscripts in the Wellcome Library. Bouras-Vallianatos, P. (ed.). Routledge

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Multi-agent interactions for an ATM management system (TeleMACS approach).

    Hayzelden, A., Bigham, J. & Luo, Z., 1999, Software Agents for Future Communications Systems. Hayzelden, A. L. G. & Bigham, J. (eds.). Springer-Verlag, p. 160-182

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Multi-agent systems for resource management

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 1999, 6th International Conference on Intelligence and Services in Networks, Also in Lecture Notes in Computer Science. Zuidweg, H., Campolargo, M., Delgado, J. & Mullery, A. (eds.). Springer-Verlag, Vol. 1597.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Multi-Budgeted Directed Cuts

    Kratsch, S., Li, S., Marx, D., Pilipczuk, M. & Wahlstrom, M., 25 Jan 2019, IPEC 2018. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 115. p. 18:1-18:14 14 p. 18. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. E-pub ahead of print

    Multichannel Quaternion Least Mean Square Algorithm

    Cheong Took, C. & Xia, Y., 17 Apr 2019, International Conference on Acoustics, Speech, and Signal Processing: ICASSP. Brighton UK: IEEE, p. 1-4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Multi-Client Non-Interactive Verifiable Computation

    Choi, S. G., Katz, J., Kumaresan, R. & Cid, C., Feb 2013, Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Sahai, A. (ed.). Springer, p. 499-518 20 p. (Lecture Notes in Computer Science; vol. 7785).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Multi-Dimensional Causal Discovery

    Schaechtle, U., Stathis, K. & Bromuri, S., 3 Aug 2013, Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence: Beijing, China, 3-9 August 2013. Rossi, F. (ed.). p. 1649-1655

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Multigraph Critical Infrastructure Model

    Schneidhofer, B. & Wolthusen, S., 2016, Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers. Springer-Verlag, Vol. 485. p. 149-167 19 p. (IFIP Advances in Information and Communication Technology; vol. 485).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Multi-level Access in Searchable Symmetric Encryption

    Alderman, J., Martin, K. & Renwick, S., 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 35-52 18 p. (Lecture Notes in Computer Science; vol. 10323).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Multilinear Maps from Obfuscation

    Albrecht, M., Farshim, P., Hofheinz, D., Larraia de Vega, E. & Paterson, K., 19 Dec 2015, Theory of Cryptography. Kushilevitz, E. & Malkin, T. (eds.). Springer, Vol. 9562. p. 446-473 27 p. (Lecture Notes in Computer Science; vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Multiparty Compatibility in Communicating Automata: Characterisation and Synthesis of Global Session Types

    Denielou, P-M. & Yoshida, N., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II: ICALP (2). 2013 ed. Springer, Vol. 7966. p. 174 186 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Multiparty Session Types Meet Communicating Automata

    Deniélou, P-M. & Yoshida, N., 2012, Programming Languages and Systems: 21st European Symposium on Programming, ESOP 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012: Proceedings. Seidl, H. (ed.). Springer, p. 194-213 20 p. (Lecture Notes in Computer Science; vol. 7211).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Unpublished

    Multiple countries response to oil price shocks and illiquidity shocks

    Said, H. & Giouvris, E., 2017, (Unpublished) 43rd International Business Research Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Multiple lexicalisation (a Java based study)

    Scott, E. & Johnstone, A., 20 Oct 2019, ACM Digital Library: Proceedings of Software Language Engineering 2019. ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Multiple Pulse Resonantly Enhanced Laser Plasma Wakefield Acceleration

    Corner, L., Walczak, R., Nevay, L. J., Dann, S., Hooker, S. M., Bourgeois, N. & Cowley, J., 2012, ADVANCED ACCELERATOR CONCEPTS. Zgadzaj, R., Gaul, E. & Downer, MC. (eds.). MELVILLE: AMER INST PHYSICS, p. 872-873 2 p. (AIP Conference Proceedings; vol. 1507).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Multiple sequence alignment based on new approaches of tree construction and sequences comparison

    Solovyev, V., Streletc, V. B., Milanesi, L., Lim, H. (ed.), Fickett, J. (ed.), Cantor, C. (ed.) & Robbins, R. (ed.), 1993, Proceedings of the 2nd International conference on Bioinformatics, Supercomputing, and Complex genome analysis.. World Scientific, p. 419-428

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Multiprobabilistic Venn Predictors with Logistic Regression

    Nouretdinov, I., Devetyarov, D., Burford, B., Camuzeaux, S., Gentry-Maharaj, A., Tiss, A., Smith, C., Luo, Z., Chervonenkis, A., Hallett, R., Vovk, V., Waterfield, M., Cramer, R., Timms, J. F., Jacobs, I., Menon, U. & Gammerman, A., 2012, Artificial Intelligence Applications and Innovations - AIAI 2012 International Workshops: AIAB, AIeIA, CISE, COPA, IIVC, ISQL, MHDW, and WADTMB, Halkidiki, Greece, September 27-30, 2012, Proceedings, Part II. Iliadis, L., Maglogiannis, I., Papadopoulos, H., Karatzas, K. & Sioutas, S. (eds.). Springer, Vol. 382. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Multiproxy Constraints on Redox Conditions of ~2.7 Ga Oceans

    Yang, J., Zerkle, A., Grassineau, N., Nisbet, E., Izon, G., Hunter, M. & Martin, T., 2016, Goldschmidt Conference 2016. p. 03F

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Forthcoming

    Multi-Round Attacks on Structural Controllability Properties for Non-Complete Random Graphs

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, (Accepted/In press) Proceedings of the 16th Information Security Conference (ISC 2013). Springer-Verlag, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Multi-Shot Distributed Transaction Commit

    Chockler, G. & Gotsman, A., 28 Sep 2018, 32nd International Symposium on DIStributed Computing (DISC 2018). Springer-Verlag, p. 1-18 18 p. (LIPIcs–Leibniz International Proceedings in Informatics ; vol. 121).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Music as Function: Biofeedback in Games for Health

    Plans, E. & Plans, D., 10 Apr 2016, Ludomusicology - Videogame Music Research Group.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. E-pub ahead of print

    Nanothermometry of electrons and phonons

    Weng, Q., Puttock, R., Barton, C., Panchal, V., Yang, L., An, Z., Kajihara, Y., Lu, W., Tzalenchuk, A. & Komiyama, S., 29 Oct 2018, 2018 43rd International Conference on Infrared Millimeter and Terahertz Waves, IRMMW-THz 2018. IEEE Computer Society, Vol. 2018-September. 3 p. 8509939

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Nature vs Grammar: Annibal Caro's Apologia as a Manifesto for Orality

    Jossa, S., 24 Feb 2016, Interactions between Orality and Writing in Early Modern Italian Culture. Degl'Innocenti, L., Richardson, B. & Sbordoni, C. (eds.). Routledge

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Navigating the Sacred and the Profane: An Inquiry of ‘Askesis’ Emergent in Daily Lives and Grounded in Wisdom Traditions.

    Tzouramani, E. & Karakas, F., 2016, 11th Organization Studies Workshop, May 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Forthcoming

    Naxos di Sicilia: nuovi dati sulla città del V secolo a.C.

    Lentini, M. C. & Pakkanen, J., 2015, (Accepted/In press) La Città e le città della Sicilia antica. Atti delle Ottave Giornate Internazionali di studio sull’area elima e la Sicilia occidentale nel contesto mediterraneo. Pisa, Scuola Normale Superiore, 18-21 dicembre 2012, Pisa. Ampolo, C. (ed.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Naxos of Sicily in the 5th Century BC: New Research

    Lentini, M. C., Pakkanen, J. & Sarris, A., Dec 2015, Greek Colonisation: New Data, Current Approaches: Proceedings of the Scientific Meeting held in Thessaloniki (6 February 2015). Adam-Veleni, P. & Tsangari, D. (eds.). Athens: Alpha Bank, p. 23–35 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Near and yet So Far: Distance-Bounding Attacks in Wireless Networks

    Clulow, J., Hancke, G., Kuhn, M. G. & Moore, T., 2006, European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS). Springer-Verlag, Vol. 4357. p. 83-97

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Negotiating expatriate identity in the global era: Implications on expatriate performance

    Li, C. & Zhang, L. E., 1 Jan 2015, Academy of Management Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Neighbourhood morphology and solar irradiance in relation to urban climate

    Mohajeri, N., Gudmundsson, A., Assouline, D. & Scartezzini, J., 2015, ICUC9 - The 9th International Conference on Urban Climate. ICUC9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Nella terra di Dante

    Jossa, S. & Gesù, M. D. (ed.), 2009, Letteratura, identità, nazione. Palermo: duepunti, p. 41-58 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Neo-Archaean Palaeo-Environmental Changes Determined by Microbial Activities Using Stable Isotopic Compositions

    Grassineau, N., Yang, J., Zerkle, A. & Nisbet, E., 12 Dec 2017, American Geophysical Union Fall Annual Meeting. New Orleans, p. B23F-05 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Neogene extension on Seram: A new tectonic model for the northern Banda Arc

    Pownall, J. & Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-305 1-17

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    NetVis: a visualization tool enabling multiple perspectives of network traffic data

    Peters, D., Slawinski, A., Spoor, T., Vicol, S., Happa, J., Goldsmith, M. & Creese, S., 2013, Proceedings of the 31st conference on Theory and Practice of Computer Graphics, Eurographics UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Network as a computer: ranking paths to find flows

    Pavlovic, D., 2008, Proceedings of CSR 2008. Razborov, A. & Slissenko, A. (eds.). Springer-Verlag, Vol. 5010. p. 384-397 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Network provider domain federation in TINA

    Pavón, J., Montes, E. & Komisarczuk, P., 1997, Global Convergence of Telecommunications and Distributed Object Computing, 1997. Proceedings., TINA 97. p. 334-342 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Network traffic demand prediction with confidence

    Dashevskiy, M. & Luo, Z., 2008, IEEE GLOBECOM 2008. p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Network-aware stream query processing in mobile ad-hoc networks

    O'Keeffe, D., Salonidis, T. & Pietzuch, P. R., 17 Dec 2015, 34th IEEE Military Communications Conference, MILCOM 2015, Tampa, FL, USA, October 26-28, 2015. p. 1335-1340 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. E-pub ahead of print

    Neural State Classification for Hybrid Systems

    Phan, D., Paoletti, N., Zhang, T., Grosu, R., Smolka, S. A. & Stoller, S. D., 30 Sep 2018, 16th International Symposium on Automated Technology for Verification and Analysis (ATVA 2018). Lahiri, S. K. & Wang, C. (eds.). Springer, p. 422-440 19 p. (Lecture Notes in Computer Science; vol. 11138).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    New c-ary perfect factors in the de Bruijn Graph

    Mitchell, C. J., 1995, Codes and Cyphers - Cryptography and Coding IV: Proceedings of the fourth IMA Cryptography and Coding Conference, Cirencester, December 1993. Southend: Formara Ltd., p. 299-313 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    New CBC-MAC forgery attacks

    Brincat, K. & Mitchell, C. J., 2001, Information Security and Privacy, ACISP 2001, Sydney, Australia, July 2001. Varadharajan, V. & Mu, Y. (eds.). Springer-Verlag, p. 3-14 12 p. (Lecture Notes in Computer Science; no. 2119).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    New Insights on Architectural Connectors

    Bruni, R., Fiadeiro, J. L., Lanese, I., Lopes, A. & Montanari, U., 2004, IFIP TCS. Kluwer, p. 367-380 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    New Plain-Exponential Time Classes for Graph Homomorphism

    Wahlström, M., 2009, Computer Science - Theory and Applications : 4th International Computer Science Symposium in Russia, CSR 2009. Frid, A., Morozov, A., Rybalchenko, A. & Wagner, K. W. (eds.). Novosibirsk, Russia: Springer, Vol. 5675. p. 346-355 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. E-pub ahead of print

    New radiometric calibration site located at Gobabeb, Namib desert

    Bialek, A., Greenwell, C., Lamare, M., Meygret, A., Marcq, S., Lacherade, S., Woolliams, E., Berthelot, B., Bouvet, M., King, M., Underwood, C. & Fox, N., 3 Nov 2016, 2016 IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-November. p. 6094-6097 4 p. 7730592

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    NFC mobile payment with Citizen Digital Certificate

    Chen, W., Mayes, K., Lien, Y-H. & Chiu, J-H., 1 Jun 2011, Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on. Gyeongju: IEEE COMPUTER SOC, p. 120 -126

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    NFC Mobile Transactions and Authentication Based on GSM Network

    Chen, W., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J-H., 1 Apr 2010, Near Field Communication (NFC), 2010 Second International Workshop on. p. 83 -89

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Ninja: Non identity based, privacy preserving authentication for ubiquitous environments

    Leung, A. & Mitchell, C. J., 2007, UbiComp 2007: Ubiquitous Computing, 9th International Conference, Innsbruck, Austria, September 16-19 2007. Krumm, J., Abowd, G. D., Seneviratne, A. & Strang, T. (eds.). Springer-Verlag, Vol. 4717. p. 73-90 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Nitrogen cycling in ~2.7 Ga oceans

    Yang, J., Zerkle, A., Grassineau, N., Nisbet, E., Mettam, C., Hunter, M., Martin, A., Newton, J. & Boyce, A., 13 Dec 2016, American Geophysical Union Fall Annual Meeting. San Francisco, p. PP21D-04

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    NLO automated tools for QCD and beyond

    Kauer, N., 26 Feb 2012, LC11: Understanding QCD at linear colliders in searching for old and new physics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Noisy Carrier Modulation for HF RFID: First International EURASIP Workshop on RFID Technology

    Hancke, G. P., 1 Sep 2007, First International EURASIP Workshop on RFID Technology. Austria, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Unpublished

    Nomadic Metrology

    Hazell, C., 2019, (Unpublished) A Day with Rosi Braidotti: ZOE-GEO-TECHNO Egalitarianism .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Non-asymptotic calibration and resolution

    Vovk, V., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, Vol. 3734. p. 429-443 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    NON-CRIMP THERMOPLASTIC COMPOSITE FABRICS - AEROSPACE SOLUTIONS TO AUTOMOTIVE PROBLEMS

    WOOLSTENCROFT, D. H. & Hogg, P., 1991, ADVANCED COMPOSITE MATERIALS : NEW DEVELOPMENTS AND APPLICATIONS. MATERIALS PARK: ASM INTERNATIONAL, p. 339-349 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Non-Forensic Odontological Biometrics

    Busch, C. & Wolthusen, S. D., 12 Sep 2009, Proc. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '09). IEEE Computer Society Press, p. 1105-1109

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Non-Interactive Key Exchange

    Freire, E. S. V., Hofheinz, D., Kiltz, E. & Paterson, K. G., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 254-271 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Submitted

    Non-Latin Alphabets in the transmission of Simon of Genoa's Clavis Sanationis

    Zipser, B., 2019, (Submitted) De Bagdad à Constantinople: le transfert des savoirs médicaux, XIe-XVe s.. Cronier, M. (ed.). Paris: Collection Orient et Méditerranée

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Nonlinear Equivalence of Stream Ciphers

    Rønjom, S. & Cid, C., 2010, Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Springer, p. 40-54 15 p. (Lecture Notes in Computer Science; vol. 6147).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Nonresponse in cross-cultural telephone surveys: reflections on telephone survey interviews with Chinese managers

    Wang, C. L. & Saunders, M., 2011, British Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Normalized nonconformity measures for regression conformal prediction

    Papadopoulos, H., Gammerman, A. & Vovk, V., 2008, Proceedings of the IASTED International Conference on Articial Intelligence and Applications. p. 64-69 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Normative KGP Agents: A Preliminary Report

    Sadri, F., Toni, F. & Stathis, K., 1 Dec 2005, Symposium on Normative Multi-Agent Systems, NORMAS 2005, part of the SSAISB 2005 Convention, University of Hertfordshire, Hatfield, UK. p. 85-96 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Not in Silos: locating ERP project into a complex network- A multiple-project perspective

    Elbanna, A., 2008, Proceedings of the European Conference of Information Systems 2008.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Novel Genetic Bees Algorithm applied to single machine scheduling problem

    Packianather, M. S., Yuce, B., Mastrocinque, E., Fruggiero, F., Pham, D. T. & Lambiase, A., 2014, World Automation Congress (WAC), 2014. Waikoloa, HI, USA : IEEE, p. 906-911 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Numerical modelling of stress fields around magma chambers and the generation of ring faults

    Gudmundsson, A., Turon, E. & Marti, J., 1997, Proceedings of IAMG97 Third Annual Conference of the International Association for Mathematical Geology. Pawlowsky-Glahan, V. (ed.). Barcelona, p. 401-406

    Research output: Chapter in Book/Report/Conference proceedingConference contribution