Home > Publications

Publications

34401 - 34500 out of 36,783Page size: 100
  1. Conference contribution › Research
  2. Published

    Towards an Interdisciplinary Definition of Trust Using Logical Partitioning

    Moin, S. M. A., Devlin, J., McKechnie, S. & Hosany, S., 2018, 51st Academy of Marketing Conference, Stirling, 2-5 July.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Towards Automated Diagnosis of Basal Cell Carcinoma

    Larraona-Puy, M., Ghita, A., Zoladek, A., Koloydenko, A., Perkins, W., Leach, I., Varma, S., Williams, H. & Notingher, I., 2010, American Institute of Physics Conference Series. Vol. 1267. p. 364-365 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2017, The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113. p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Towards Distributed Collaborative Workflow Management for Mobile Devices

    Kocúrová, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, Data-Driven Process Discovery and Analysis - First International Symposium, SIMPDA 2011, Campione d'Italia, Italy, June 29 - July 1, 2011, Revised Selected Papers. p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Towards enforcing on-the-fly policies in BYOD environments

    Costantino, G., Martinelli, F., Saracino, A. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 61-65 5 p. 6947734

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Towards General Algorithms for Grammatical Inference

    Clark, A., 1 Oct 2010, Algorithmic Learning Theory, 21st International Conference. Hutter, M., Stephan, F., Vovk, V. & Zeugmann, T. (eds.). Springer, p. 11-30

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Towards improved distributed collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, First International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Towards robust and efficient computation in dynamic peer-to-peer networks

    Augustine, J., Pandurangan, G., Robinson, P. & Upfal, E., 2012, Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2012, Kyoto, Japan, January 17-19, 2012. p. 551-569 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Towards Runtime Support for Norm-Governed Multi-Agent Systems

    Urovi, V., Bromuri, S., Stathis, K. & Artikis, A., 2010, Principles of Knowledge Representation and Reasoning: Proceedings of the Twelfth International Conference, KR 2010, Toronto, Ontario, Canada, May 9-13, 2010. Lin, F., Sattler, U. & Truszczynski, M. (eds.). AAAI Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Towards Static Analysis of Virtualization-Obfuscated Binaries

    Kinder, J., Oct 2012, Proc. 19th Working Conf. Reverse Engineering (WCRE 2012). IEEE, p. 61-70

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Towards trusted execution of multi-modal continuous authentication schemes

    Shepherd, C., Akram, R. & Markantonakis, K., 3 Apr 2017, Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM, p. 1444-1451 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Trace formulae for quantum graphs

    Bolte, J. & Endres, S., 2008, Analysis on Graphs and Its Applications. Exner, P., Keating, J. P., Kuchment, P., Sunada, T. & Teplyaev, A. (eds.). American Mathematical Society, p. 247-259 13 p. (Proceedings of Symposia in Pure Mathematics; vol. 77).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Trace measures in business and society research

    Preuss, L., 2015, Annual Meeting of the International Association for Business and Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Tracing Man-in-the-Middle in monoidal categories

    Pavlovic, D., 2012, Proceedings of CMCS 2012. Pattinson, D. & Schroeder, L. (eds.). Springer-Verlag, p. 28pp (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Tracing Success in the Voluntary Use of Open Technology in Organisational Setting

    Elbanna, A. & Linderoth, H. C. J., 2013, .. p. 89-104

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Tracing the global spread of CSR

    Preuss, L., Jun 2013, International Association for Business and Society (IABS) Annual Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Tracking the global diffusion of management ideas

    Preuss, L., Aug 2014, Annual Meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Trade-offs in corporate sustainability: Towards an analytical framework

    Hahn, T., Figge, F., Pinkse, J. & Preuss, L., Aug 2010, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Trade-offs in cryptographic implementations of temporal access control

    Crampton, J., 2009, Proceedings of 14th Nordic Workshop on Secure IT Systems. Springer, p. 72-87 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Tradition and Modernity in Buddhist Storytelling

    Utairat, M., 2016, Presenting the Theatrical Past, IFTR World Congress 2016, Stockholm, Sweden .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Traditional and (or) new media: teachers' work experience and application of media in schools

    Pavlovic, D., Stanisavljevic Petrovic, Z. & Soler-Adillon, J., 21 Apr 2016, eLearning Vision 2020!: Proceedings of the 12th International Scientific Conference "eLearning and Software for Education" Bucharest, April 21 - 22, 2016 . Roceanu, I. (ed.). Bucharest, Romania: "Carol I" National Defense University, Vol. 2. p. 182-187 6 p. 29

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Traffic control and resource management using a multi-agent system

    Luo, Z., Bigham, J., Cuthbert, L. & Hayzelden, A., 1999, Broadband Communications: Convergence of Network Technologies. Tsang, D. H. K. & Kuhn, P. J. (eds.). USA: Kluwer Academic Publishers, p. 595-606

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Traffic management in satellite ATM bridge

    Sun, Z., Komisarczuk, P., Coakley, FP. & Evans, BG., 1994, Teletraffic Symposium, 11th. Performance Engineering in Telecommunications Networks. IEE Eleventh UK. p. 8B-1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Unpublished

    Training to fit a job vs training to enhance freedom: Computer skills and social activism in the youth

    Poveda Villalba, S., 2013, (Unpublished) Training to fit a job vs training to enhance freedom: Computer skills and social activism in the youth. Royal Geographical Society (with IBG)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Transcend: Detecting Concept Drift in Malware Classification Models

    Jordaney, R., Sharad, K., Dash, S., Wang, Z., Papini, D., Nouretdinov, I. & Cavallaro, L., 16 Aug 2017, Proceedings of the 26th USENIX Security Symposium. USENIX, p. 625-642 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Transduction with confidence and credibility

    Saunders, C., Gammerman, A. & Vovk, V., 1999, Proceedings of the Sixteenth International Joint Conference on Articial Intelligence. Dean, T. (ed.). San Francisco, CA: Morgan Kaufmann, Vol. 2. p. 722-726 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Transductive Confidence Machine is universal

    Nouretdinov, I., Vyugin, V. & Gammerman, A., 2003, Lecture Notes in Artificial Intelligence. Springer, Vol. 2842. p. 283-297 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Transductive confidence machines for pattern recognition

    Proedrou, K., Nouretdinov, I., Vovk, V. & Gammerman, A., 2002, Proceedings of the Thirteenth European Conference on Machine Learning. Elomaa, T., Mannila, H. & Toivonen, H. (eds.). London: Springer, p. 381-390 10 p. (Lecture Notes in Computer Science; vol. 2430).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Transductive conformal predictors

    Vovk, V., 2013, Proceedings of the Ninth Conference on Artificial Intelligence Applications and Innovations. Heidelberg: Springer, Vol. 412. p. 348-360 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Transition dynamics in internationally assisted e-government projects: An Actor Network Theory perspective.

    Kromidha, E., 2013, Proceedings of IFIP 9.4: The 12th International Conference on Social Implications of Computers in Developing Countries, 19-22 May 2013. Ocho Rios, Jamaica

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    TransMIDI: A System for MIDI Sessions Over the Network Using Transis

    Gang, D., Chockler, G., Anker, T., Kremer, A. & Winkler, T., 1997, Proceedings of International Computer Music Conference (ICMC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Unpublished

    Transnational capital and the end of national social settlements?: evidence from Sweden

    Vernon, G. & Rees, C., Sep 2001, (Unpublished) International Conference on 'Small States in World Markets: Fifteen Years On'. Gothenburg.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Unpublished

    Transnational capital and the end of national social settlements?: recent developments in Sweden

    Vernon, G. & Rees, C., Apr 2001, (Unpublished) Industrial Relations in the European Community (IREC) Conference on 'Globalization, Competitiveness and the Government of Employment in Europe'. Madrid.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Transnational Clerical Elite Network: Shiite Political Activism in the Middle East

    Kalantari, M., 2014, 55th Annual International Studies Association Convention, Toronto. 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Transverse Profile and Emittance Measurements With a Laser Stripping System During the CERN LINAC4 Commissioning at 3 and 12 MeV

    Roncarolo, F., Bravin, E., Hofmann, T., Raich, U., Zocca, F., Boorman, G., Bosco, A., Gibson, S., Kruchinin, K., Pozimski, J. & Gabor, C., 5 Sep 2014, 27th Linear Accelerator Conference: LINAC14, Geneva, Switzerland, 31 August - 5 September 2014. p. 506-509 4 p. TUPP035

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices

    Reddington, J. & Coles-Kemp, L., 1 Jul 2011, Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies. Edinburgh, Scotland, UK: Association for Computational Linguistics, p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Trapping Domain Walls in Diode-like Structures

    Bryan, M. T., Schrefl, T., Gibbs, M. R. & Allwood, D. A., 25 Jun 2007, INTERMAG 2006 - IEEE International Magnetics Conference. p. 758 1 p. 4262191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Trashing IMSI catchers in mobile networks

    Khan, M. & Mitchell, C. J., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, July 18-20, 2017: WiSec '17 . Association for Computing Machinery (ACM), p. 207-218 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Travelling through facebook; exploring affordances through the Lens of age

    Panteli, N., Marder, B., Davenport, J. H. & Nemetz, F., 2014, ECIS 2014 Proceedings - 22nd European Conference on Information Systems. Association for Information Systems (AIS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Tree-Based Cryptographic Access Control

    Alderman, J., Farley, N. & Crampton, J., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag, Vol. 10492 . p. 47-64 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Triassic and Jurassic Sandstones in the Banda Arc: Provenance and correlations with the Australian NW Shelf

    Zimmermann, S. & Hall, R., 25 May 2016, Proceedings, Indonesian Petroleum Association Fortieth Annual Convention 2016. Indonesian Petroleum Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots

    Seifert, C., Komisarczuk, P. & Welch, I., 2009, The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece. p. 63-69 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Trust Strategies for ART Testbed

    Kafali, O. & Yolum, P., 2006, Ninth International Workshop on Trust in Agent Societies, AAMAS. p. 43-49 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Forthcoming

    Trust under the Panopticon: Factors Influencing Trust within Contemporary Social Movements

    Azer, E., Zheng, Y. & Harindranath, G., 14 Feb 2019, (Accepted/In press) 35th EGOS Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Tunable balancing of RSA

    McKee, J., Galbraith, S. D. & Heneghan, C., 2005, ACISP 10. p. 280-292 (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Two Edge Modification Problems without Polynomial Kernels

    Kratsch, S. & Wahlström, M., 1 Sep 2009, Parameterized and Exact Computation : 4th International Workshop, IWPEC 2009. Chen, J. & Fomin, F. V. (eds.). Denmark, Copenhagen: Springer, Vol. 5917. p. 264-275 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Two Proposals for Improving the Image-Based Authentication System: H-IBAS-H

    Vuksanovic, B. & Al-Sinani, H., 2009, INTERNET-09: First International Conference on Evolving Internet, Cannes/La Bocca, French Riviera, France, August 23-29 2009 . Washington: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Two-Stage Classification Model to Detect Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 113-120 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Typed Operational Semantics for Dependent Record Types

    Feng, Y. & Luo, Z., 2011, Proceedings of Types for Proofs and Programs (TYPES'09), EPTCS 53.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Type-theoretic semantics for SemNet

    Shiu, S., Luo, Z. & Garigliano, R., 1996, Proc. of Inter. Conf. on Formal and Applied Practical Reasoning, LNAI 1085.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Type-Theoretical Semantics with Coercive Subtyping

    Luo, Z., 2010, Semantics and Linguistic Theory. Vol. 20. p. 38-56 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures

    Bilal, Z. & Martin, K. M., 2013, Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. IEEE, p. 304-309

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Unboundedness and downward closures of higher-order pushdown automata

    Hague, M., Ong, C-H. L. & Kochems, J., 11 Jan 2016, POPL: Principles of Programming Languages. New York, NY: ACM, p. 151-163 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Understanding and developing role-based administrative models

    Crampton, J., 2005, Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Understanding knowledge management software acquisition in organisations: A conceptual framework

    Le-Nguyen, K., Harindranath, G. & Dyerson, R., 2007, PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2007, SECTIONS 1-6. KAOHSIUNG: NATL SUN YAT-SEN UNIV, p. U1096-U1108 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Understanding knowledge management software-organisation misalignments from an institutional perspective: A case study of a global IT-management consultancy firm

    Le-Nguyen, K., Harindranath, G. & Dyerson, R., 2008, 12TH PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS (PACIS 2008). KOWLOON: CITY UNIVERSITY HONG KONG, p. 85A-+ 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Understanding Subcultures and Change Dynamics in E-Government: An Empirical Study of a Local Government in Malaysia

    Jackson, S. & Wong, K., 11 Jul 2015, 10th Annual Midwest Association for Information Systems Conference, Pittsburg, Kansas. Vol. 23. p. 1-3 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Understanding the creation of ICT-value in the building and construction industry

    Linderoth, H. C. J. & Elbanna, A., 5 Sep 2016, Proceedings of the 32nd Annual ARCOM Conference, 5-7 September 2016, Manchester, UK. Vol. 1. p. 103-112 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Understanding the dynamic process of emerging ICT adoption in UK service SMEs

    Eze, S., Duan, Y. & Jackson, S., 2011, UK Academy for Information Systems Conference Proceedings .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Understanding the experience-centeredness of security and privacy technologies

    Dunphy, P., Vines, J., Coles-Kemp, L., Clarke, R., Vlachokyriakos, V., Wright, P., McCarthy, J. & Olivier, P., 2014, Proceedings of the 2014 New Security Paradigms Workshop. . ACM, p. 83-94 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Understanding the Impact of ICT Adoption and Use in South African Manufacturing and Logistics SMEs: A Firm, Market and Regulatory (FMR) Context Perspective

    Gono, S., Harindranath, G. & Özcan, G. B., Nov 2014, Proceedings of the 2014 ISBE Conference, Manchester, 5-6 Nov 2014. ISBE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Understanding the implementation of social standards in global supply chains: A multi-dimensional analysis

    Soundararajan, V., Sep 2013, 27th annual British Academy of Management (BAM) Conference . Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Understanding the Indian Film Industry: the good, the bad and the ugly

    Sen Gupta, S., 2016, Knowledge Organisation and Learning Conference. London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Unfolding in particle physics: a window on solving inverse problems

    Spano, F., Oct 2014, contribution to Top2013, 6th International Workshop on Top Quark Phyiscs, 14th-19th September 2013 , Durbach, Germany. Husemann, U., Mildner, H. & Roscher, F. (eds.). Verlag Deutsches Elektronen-Synchrotron, Vol. DESY-PROC-2014-02. p. 256-261 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Unified Model for Data Security -- A Position Paper

    Akram, R. N. & Ko, R. K. L., 1 Sep 2014, The 1st International Workshop on the Emerging Future Internet and Network Security (IEEE EFINS 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Aiash, M. & Loo, J. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Uniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent

    Cohen, L. & Rowe, R., 4 Sep 2018, 27th EACSL Annual Conference on Computer Science Logic (CSL 2018). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 119. p. 17:1-17:16 16 p. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Uniform, integral and efficient proofs for the determinant identities

    Tzameret, I. & Cook, S., 18 Aug 2017, Logic in Computer Science (LICS), 2017 32nd Annual ACM/IEEE Symposium on. IEEE, Vol. 32. p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Unifying Theories in Different Institutions

    Arrais, M. & Fiadeiro, J. L., 1996, COMPASS/ADT. Springer, Vol. 1130. p. 81-101 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Universal portfolio selection

    Vovk, V. & Watkins, C. J. H. C., 1998, Proceedings of the Eleventh Annual Conference on Computational Learning Theory. New York: ACM Press, p. 12-23 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Universal Probability-Free Conformal Prediction

    Vovk, V. & Pavlovic, D., 2016, Proceedings of COPA 2016: Fifth Symposium on Conformal and Probabilistic Prediction with Applications. Springer, Vol. 9653. p. 40-47 8 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Universal well-calibrated algorithm for on-line classification

    Vovk, V., 2003, Proceedings of the Sixteenth Annual Conference on Learning Theory and Seventh Kernel Workshop. Scholkopf, B. & Warmuth, M. K. (eds.). p. 358-372 15 p. (Lecture Notes in Artificial Intelligence; vol. 2777).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Unknown quantum operations

    Schack, R., 2004, Quantum Theory: Reconsideration of Foundations 2. A., K. (ed.). Växjö: Växjö University Press, p. 507-518

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Unknown Quantum States and Operations, a Bayesian View

    Fuchs, C. A. & Schack, R., 2004, Quantum State Estimation: Lecture Notes in Physics {\bf 649}. Řeháček, J. & Paris, M. G. A. (eds.). Berlin: Springer Verlag, p. 147-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Unraveling the complexities of interdisciplinary software engineering

    Mehandjiev, N., Layzell, P. & Brereton, P., 2004, ELEVENTH ANNUAL INTERNATIONAL WORKSHOP ON SOFTWARE TECHNOLOGY AND ENGINEERING PRACTICE, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 214-221 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Unrestricted Faithful Rounding is Good Enough for Some LNS Applications

    Arnold, M. G. & Walter, C. D., 2001, 15th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Unsupervised Induction of Stochastic Context Free Grammars with Distributional Clustering

    Clark, A., 1 Jul 2001, Proc. of Conference on Computational Natural Language Learning. p. 105-112

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Upgrading Technological Capabilities by Developing Country Multinational Companies

    Rui, H. & Cuervo-Cazurra, A., 2013, Proceedings of the 55th Annual Meeting of the Academy of International Business: "Bridging the Divide: Linking IB to Complementary Disciplines and Practice". McDougall-Covin, P. & Kiyak, T. (eds.). 2013 Academy of International Business, p. 277-278 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Upgrading Technological Capabilities by Developing Country Multinational Companies

    Rui, H. & Cuervo-Cazurra, A., 2013, The 73rd Annual Meeting of the Academy of Management: “Capitalism in Question”. Academy of Management

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Submitted

    USAGE PATTERNS AND CHALLENGES OF MULTIPURPOSE COMMUNITY TELECENTRES IN MALAWI

    Kapondera, S. K. & Chigona, W., 2017, (Submitted) SIG Global Development.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Use of Satisfaction-Satisfaction Matrix (SSM) to evaluate E-Government services from the perspective of Japanese citizens and government service providers

    Wong, K., Nishimoto, H., Nishigaki, Y. & Jackson, S., 2013, 24th Australasian Conference on Information Systems, Melbourne, AU, 04 - 06 Dec.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    User acceptance of electronic commerce: lessons learned from the Bled eConference

    van der Heijden, H., 2012, 25th Special Anniversary Proceedings of the Bled eConference,. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    User acceptance of emergency alert technology: A case study

    Wu, P. F., 1 Jan 2009, ISCRAM 2009 - 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Information Systems for Crisis Response and Management, ISCRAM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    User Preference Analysis of Internet Social Media services

    Pant, V., Harindranath, G. & Wagner, W. P., 13 Jan 2016, 2015 International Conference on Information Resource Management (Conf-IRM), Ottawa, Canada, May.. Vol. 34.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    User satisfaction evaluation of Malaysian e-government education services

    Wong, M. S. & Jackson, S., 5 Feb 2018, 23rd IEEE International Technology Management Conference, Madeira Island, Portugal. IEEE, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Using Argument-based Features to Predict and Analyse Review Helpfulness

    Liu, H., Gao, Y., Lv, P., Li, M., Geng, S., Li, M. & Wang, H., Sep 2017, Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Copenhagen, Denmark: Association for Computational Linguistics, p. 1358–1363 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Using explicit state to describe architectures

    Lopes, A. & Fiadeiro, J. L., 1999, FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING. Finance, JP. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-160 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution