Home > Publications

Publications

37301 - 37400 out of 41,351Page size: 100
  1. Conference contribution › Research
  2. Published

    Il Vicus Augustanus e la questione dell'insediamento coloniale del Laurentino

    Claridge, A., 10 Oct 2021, Il sistema ambientale della Tenuta presidenziale di Castelporziano: Ricerche sulla complessit¬a di un ecosistema forestale costiero mediterraneo. Rome: Accademia nazional delle scienze detta dei XL, Vol. 62.3. p. 889-992 33 p. (Scritti e documenti; vol. LXII (62), no. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Unpublished

    Illiquidity, investment styles and January returns in United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Corporate Finance Decisions in a Changing Global Environment, International Finance and Banking Society (IFABS) Asia 2016 Brunei Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. In preparation

    IMMIGRATION AND NEO-LIBERALISM: THREE STORIES AND COUNTER ACCOUNTS

    Agyemang, G., Lehman, C. R. & Annisette, M., 9 Jul 2013, (In preparation) IMMIGRATION AND NEO-LIBERALISM: THREE STORIES AND COUNTER ACCOUNTS.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Implementable Internationalization Strategies for Companies from Emerging Economies

    Aboutalebi, R., 23 Nov 2011, In: EAMSA (Euro-Asia Management Studies Association), 28th Annual Conference: Strategies of international development in Euro-Asian Business. 23-26 November 2011, University of Gothenburg, Gothenburg, Sweden.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Implementation aspects of SET/EMV

    Jarupunphol, P. & Mitchell, C. J., 2002, Towards the Knowledge Society: eCommerce, eBusiness and eGovernment, The 2nd IFIP Conference on e-commerce, e-business and e-government, IFIP I3E 2002, Lisbon, Portugal, October 2002. Monteiro, J. L., Swatman, P. M. C. & Tavares, L. V. (eds.). Kluwer Academic Publishers, p. 305-315 11 p. (IFIP Conference Proceedings; no. 233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print

    Implementation Correctness for Replicated Data Types, Categorically

    Gadducci, F., Melgratti, H., Roldán, C. & Sammartino, M., 25 Nov 2020, (E-pub ahead of print) Theoretical Aspects of Computing – ICTAC 2020 - 17th International Colloquium, 2020, Proceedings. Pun, V. K., Stolz, V. & Simao, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 283-303 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12545 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Implementation of a component-by-component algorithm to generate small low-discrepancy samples

    Doerr, B., Gnewuch, M. & Wahlström, M., 1 Jul 2009, Monte Carlo and Quasi-Monte Carlo Methods 2008. L'Ecuyer, P. & Owen, A. B. (eds.). Montreal, Canada: Springer, p. 323-338 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Implementation of agents for connection admission control on an ATM testbed

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 2000, On The Way to Information Society: Five Years of European ACTS Research on Intelligence in Services and Networks. IOS Press, p. 413-426

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Implementation of CERN Secondary Beam Lines T9 and T10 in BDSIM

    D'Alessandro, G. L., Boogert, S., Gibson, S., Nevay, L., Shields, W., Bernhard, J., Gerbershagen, A. & Rosenthal, M. S., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 3746-3748 3 p. THPGW069

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Implementation techniques for inductive types in Plastic

    Callaghan, P. & Luo, Z., 2000, Types for Proofs and Programs, Proc of Inter Conf of TYPES'99. LNCS 1956.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Implementing a Caching Service for Distributed CORBA Objects

    Chockler, G., Dolev, D., Friedman, R. & Vitenberg, R., 2000, Proceedings of the 2nd IFIP/ACM International Conference on Distributed systems platforms (Middleware '00). Springer-Verlag, p. 1-23 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Implementing a model checker for Lego

    Yu, S. & Luo, Z., 1997, Proc. of the 4th Inter Symp. of Formal Methods Europe, FME'97: Industrial Applications and Strengthened Foundations of Formal Methods. LNCS 1313.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Implementing Candidate Graded Encoding Schemes from Ideal Lattices

    Albrecht, M., Cocis, C., Laguillaumie, F. & Langlois, A., 30 Dec 2015, Advances in Cryptology – ASIACRYPT 2015. Iwata, T. & Cheon, J. H. (eds.). Springer, p. 752-775 24 p. ( Lecture Notes in Computer Science; vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. E-pub ahead of print

    Implementing Grover Oracles for Quantum Key Search on AES and LowMC

    Jaques, S., Naehrig, M., Roetteler, M. & Virdia, F., 1 May 2020, (E-pub ahead of print) Advances in Cryptology – EUROCRYPT 2020. Springer, p. 280-310 31 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    IMPORTANT DETERMINANTS OF FOREIGN COMPANY PERFORMANCE IN CHINA: BIG DATA ANALYSIS

    Wang, C. & Giouvris, E., 2018, BAI-winter Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Impostor: A single sign-on system for use from untrusted devices

    Pashalidis, A. & Mitchell, C. J., 2004, Proceedings of IEEE Globecom 2004, Global Telecommunications Conference, Dallas, Texas, USA, November/December 2004. IEEE, Vol. 4. p. 2191-2195

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. E-pub ahead of print

    Improved Classical Cryptanalysis of SIKE in Practice

    Costello, C., Longa, P., Naehrig, M., Renes, J. & Virdia, F., 29 Apr 2020, (E-pub ahead of print) Public-Key Cryptography – PKC 2020. Springer, p. 505-534 30 p. (Lecture Notes in Computer Science; vol. 12111).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Improved Higgs Naturalness with Supersymmetry

    Gripaios, B. & West, S., 30 Oct 2006, Proceedings of SUSY06.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Improved privacy-preserving training using fixed-Hessian minimisation

    Ogilvie, T., Player, R. & Rowell, J., 15 Dec 2020, Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography: WAHC 2020. p. 6-18 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage

    Lacharite, M-S., Minaud, B. & Paterson, K., 26 Jul 2018, 2018 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Improved Security Notions for Proxy Re-Encryption to Enforce Access Control

    Lee, E., 20 Jul 2019, Progress in Cryptology – LATINCRYPT 2017: International Conference on Cryptology and Information Security in Latin America. Springer, p. 66-85 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    Improving Air Interface User Privacy in Mobile Telephony

    Khan, M. & Mitchell, C. J., 9 Dec 2015, (E-pub ahead of print) Security Standardisation Research, Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 165-184 20 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Improving interpretations of trust claims

    Sel, M., 24 May 2017, Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Proceedings. Vassileva, J., Mauw, S., Habib, S. M. & Muhlhauser, M. (eds.). Springer New York LLC, p. 164-173 10 p. (IFIP Advances in Information and Communication Technology; vol. 473).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Improving IP address autoconfiguration security in MANETs using trust modelling

    Hu, S. & Mitchell, C. J., 2005, Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedings. Jia, X., Wu, J. & He, Y. (eds.). Springer-Verlag, Vol. 3794. p. 83-92 10 p. (Lecture Notes in Computer Science; vol. 3794).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Improving model quality through foundational ontologies: Two contrasting approaches to the representation of roles

    de Cesare, S., Henderson-Sellers, B., Partridge, C. & Lycett, M., 2015, Advances in Conceptual Modeling - ER 2015 Workshops, AHA, CMS, EMoV, MoBiD, MORE-BI, MReBA, QMMQ, and SCME, Proceedings. Springer Verlag, Vol. 9382. p. 304-314 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9382).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Improving Planning Performance in PDDL+ Domains via Automated Predicate Reformulation

    Franco, S., Vallati, M., Lindsay, A. & McCluskey, T. L., 2019, Computational Science - ICCS 2019 : 19th International Conference, Faro, Portugal, June 12–14, 2019, Proceedings, Part V. Rodrigues, J. M. F., Cardoso, P. J. S., Monteiro, J. M., Lam, R., Krzhizhanovskaya, V. V., Lees, M. H., Dongarra, J. J. & Sloot, P. M. A. (eds.). Springer, Vol. 11540. p. 491-498 8 p. (Lecture Notes in Computer Science; vol. 11540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Improving Reliable Probabilistic Prediction by Using Additional Knowledge

    Nouretdinov, I., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). Vol. 60. p. 193-200 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Improving Self-organized Resource Allocation with Effective Communication

    Kafali, O. & Yolum, P., 2012, Agents and Peer-to-Peer Computing. Beneventano, D., Despotovic, Z., Guerra, F., Joseph, S., Moro, G. & Pinninck, A. (eds.). Springer Berlin / Heidelberg, Vol. 6573. p. 35-46 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Improving the mental health of BME men: Researching men's experiences

    Robinson, M., Keating, F. & Robertson, S., 18 Nov 2013, Journal of Mens Health. 3 ed. Vol. 7. p. 304 305 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities

    Coles-Kemp, L., Jensen, R. B. & Talhouk, R., Apr 2018, CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-13 13 p. 584

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    In search for theory: What hampers innovation

    Guenther, E., Hueske, A-K., Hoelzle, K., Kesting, P., Linnenluecke, M. & Preuss, L., Aug 2011, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Incentive Engineering for Outsourced Computation in the Face of Collusion

    Rezaei Khouzani, M., Pham, V. & Cid, C., 2014, Proceedings of WEIS 2014 – 13th Annual Workshop on the Economics of Information Security,. 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. E-pub ahead of print

    Increasing the Security of Wireless Communication through Relaying and Interference Generation

    Rose, L., Quaglia, E. & Valentin, S., 11 May 2017, (E-pub ahead of print) 2017 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Incubating New Entrepreneurship Practices: The Case of Plan9 Incubator in Pakistan

    Shahid, A. R. & Morlacchi, P., 2019, Fourth Annual Entrepreneurship as Practice Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. E-pub ahead of print

    In-Cycle Sequential Topology Faults and Attacks: Effects on State Estimation

    Gul, A. & Wolthusen, S., 30 Dec 2018, (E-pub ahead of print) Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (eds.). Springer Verlag, p. 17-28 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard

    Baiocco, A. & Wolthusen, S., 2018, Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Individuals’ smartphone security behaviour: similarities and differences in developing countries

    Shah, M. & Ameen, N., 2019, Data, Organisations and Society Conference, Coventry University.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Indonesian tectonics: Subduction, extension, provenance and more

    Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-360 1-13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Inducing Syntactic Categories by Context Distribution Clustering

    Clark, A., 2000, Proc. of Conference on Computational Natural Language Learning. p. 91-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Inductive Confidence Machine for pattern recognition

    Surkov, D., Gammerman, A. & Vovk, V., 2002, Proceedings of the ICDM 2002 Workshop on the Foundation of Data Mining and Knowledge Discovery. Lin, T. & Ohsuga, S. (eds.). Shimane Medical University, p. 249-255 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Inductive confidence machines for regression

    Papadopoulos, H., Proedrou, K., Vovk, V. & Gammerman, A., 2002, Proceedings of the Thirteenth European Conference on Machine Learning. Elomaa, T., Mannila, H. & Toivonen, H. (eds.). London: Springer, p. 345-356 12 p. (Lecture Notes in Computer Science; vol. 2430).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Inductive Conformal Martingales for Change-Point Detection

    Volkhonskiy, D., Burnaev, E., Nouretdinov, I., Gammerman, A. & Vovk, V., 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). p. 1-22 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Inductive Venn-Abers Predictive Distribution

    Nouretdinov, I., Volkhonskiy, D., Lim, P., Toccaceli, P. & Gammerman, A., Jun 2018, 7th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2018). Vol. 91. p. 15-36 22 p. (Proceedings of Machine Learning Research).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Inferring protein-protein interactions using interaction network topologies

    Paccanaro, A., Trifonov, V., Yu, H. & Gerstein, M. B., 2005, Proceedings of the International Joint Conference on Neural Networks. p. 161 166 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Influence of erosion on the kinematics of bivergent orogens: Results from scaled sandbox simulations

    Hoth, S., Adam, J., Kukowski, N. & Oncken, O., 2006, TECTONICS, CLIMATE, AND LANDSCAPE EVOLUTION. Willett, SD., Hovius, N., Brandon, MT. & Fisher, DM. (eds.). BOULDER: GEOLOGICAL SOC AMER INC, p. 201-225 25 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Influence of normal-faults on magma propagation with examples from the Hafnarfjall caldera, Iceland, and Santorini, Greece

    Browning, J., Gudmundsson, A. & Drymoni, K., 2019, LASI VI.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Influence of product manufacturing, supplier and technology selection in the configuration of the UK composites supply chain

    Coronado Mondragon, A. E., Mastrocinque, E. & Hogg, P., 15 Jun 2015, Proceedings of the International Conference on Engineering Technologies, Engineering Education and Engineering Management (ETEEEM 2014), Hong Kong, 15-16 November 2014. Tan, D. (ed.). CRC Press, p. 1079–1082 4 p. 235

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Information and available work in the perturbed baker's map

    Schack, R. & Caves, C. M., 1993, Workshop on Physics and Computation: PhysComp '92. Los Alamitos, California: IEEE Computer Society Press, p. 69-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Unpublished

    Information and consultation during takeovers in the UK: the IAG/BMI case

    Rees, C. & Gold, M., Mar 2015, (Unpublished) 'Infpreventa' Project Final Conference. Sofia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Informational and computation efficiency of set predictors

    Vovk, V., Sep 2012, Proceedings of the Fifth Workshop on Information-Theoretic Methods in Science and Engineering. de Rooij, S., Kotlowski, W., Rissanen, J., Millimaki, P., T. R. & Yamanishi, K. (eds.). Amsterdam: CWI, p. 48-51 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Informed Autonomous Exploration of Subterranean Environments

    Akbari, A. & Bernardini, S., 4 Aug 2021, IEEE Xplore IROS 2021 Proceedings. IEEE Xplore, Vol. 6. p. 7957-7964 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    InfoSec Cinema: Using Films for Information Security Teaching

    Blasco Alis, J. & Quaglia, E., 2018, ASE '18: 2018 USENIX Workshop on Advances in Security Education. USENIX, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Inhibiting Card Sharing Attacks

    Tunstall, M., Markantonakis, K. & Mayes, K., 2006, Advances in Information and Computer Security. Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y. & Kawamura, S. (eds.). Springer Berlin / Heidelberg, Vol. 4266. p. 239-251 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Innovating for corporate social responsibility: Integrating societal, industry, firm and individual level factors

    Preuss, L. & Dyerson, R., Apr 2011, Symposium on Corporate Responsibility and Innovation.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Insect fossil evidence on late Wisconsin environments of the Bering Land Bridge: new data on the nature and timing of inundation

    Elias, S., 1996, American Beginnings, The Prehistory and Palaeoecology of Beringia. West, F. H. (ed.). Chicago: University of Chicago Press, p. 110-119

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Insect Fossils

    Elias, S., 1995, Stratigraphy and Paleoenvironments of Late Quaternary Valley Fills on the Southern High Plains. Holliday, V. T. (ed.). Boulder, Colorado: Geological Society of America, Vol. Memoir 186. p. 50-53.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Insect fossils and Late Quaternary environments of the Chihuahuan Desert.

    Elias, S., 1999, Fourth Symposium on Resources of the Chihuahuan Desert. Barlow, J. C. & Miller, D. J. (eds.). Fort Davis, Texas: Chihuahuan Desert Research Institute, p. 1-10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Insights into the metabolism and ecophysiology of three acidithiobacilli by comparative genome analysis

    Valdes, J., Pedroso, I., Quatrini, R., Hallberg, K. B., Valenzuela, P. D. T. & Holmes, D. S., 2007, BIOHYDROMETALLURY: FROM THE SINGLE CELL TO THE ENVIRONMENT. Schippers, A., Sand, W., Glombitza, F. & Willscher, S. (eds.). STAFA-ZURICH: TRANS TECH PUBLICATIONS LTD, p. 439-442 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    INSOMNIA: Towards Concept-Drift Robustness in Network Intrusion Detection

    Andresini, G., Pendlebury, F., Pierazzi, F., Loglisci, C., Appice, A. & Cavallaro, L., 15 Nov 2021, AISec '21: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security. ACM, p. 111-122 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Installing fake root keys in a PC

    Alsaid, A. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, Vol. 3545. p. 227-239 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Installing micros in clinics: options and essentials

    Berger, M., 1989, Clinic Services: Monitoring, Evaluation and Microcomputers: Occasional Papers, No.1. Berger, M. (ed.). Association for Child Psychology and Psychiatry

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Institutional approaches and strategies of control and collaboration

    Kromidha, E., 2015, Proceedings of IFIP 9.4: 13th Conference on Social Implications of Computers in Developing Countries, 20-22 May 2015. Negombo, Sri Lanka

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Institutions for Behaviour Specification

    Fiadeiro, J. L. & Costa, J. F., 1995, COMPASS/ADT. Springer, Vol. 906. p. 273-289 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Institutions trust institutions: critiques of the BP/Tate partnership by artists

    Chong, D., 2011, 37th Annual Macromarketing Conference (Williamsburg, VA: College of William and Mary).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Instructors as Designated Leaders for Fostering Online Engagement: The Case of Online Learning Communities

    Wallace, A. & Panteli, N., 2016, Mediterranean Conference on Information Systems, MCIS2016: Track: E-learning. September 4-6, 2016, Paphos, Cyprus

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. E-pub ahead of print

    Integerwise Functional Bootstrapping on TFHE

    Okada, H., Kiyomoto, S. & Cid, C., 25 Nov 2020, (E-pub ahead of print) Information Security - 23rd International Conference, ISC 2020, Proceedings. Susilo, W., Deng, R. H., Guo, F., Li, Y. & Intan, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 107-125 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12472 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Integrated Simulation Tools for Collimation Cleaning in HL-LHC

    CERN Collimation Team, Gibson, S. & Nevay, L., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 160-162 3 p. MOPRO039

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Integrating Induction and Coinduction via Closure Operators and Proof Cycles

    Cohen, L. & Rowe, R. N. S., 24 Jun 2020, Automated Reasoning - 10th International Joint Conference, IJCAR 2020, Proceedings. Peltier, N. & Sofronie-Stokkermans, V. (eds.). Springer, p. 375-394 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12166 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Integrating OAuth with Information Card Systems

    Al-Sinani, H. S., 2011, Proceedings of IAS '11: 7th International Conference on Information Assurance and Security, Malacca, Malaysia, 5-8 December 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Integrating Social Circles and Network Representation Learning for Item Recommendation

    Yu, Y., Wang, Q., Zhang, L., Wang, C., Wu, S., Qi, B. & Wu, X., 30 Sep 2019, 2019 International Joint Conference on Neural Networks (IJCNN). International Joint Conference on Neural Networks (IJCNN): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Forthcoming

    Intelligent Exploration and Autonomous Navigation in Confined Spaces

    Akbari, A. & Bernardini, S., 1 Jul 2020, (Accepted/In press) International Conference on Intelligent Robots and Systems (IROS): 2020 IEEE/RSJ. IEEE Xplore, p. 2157-2164 8 p. 1209

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Intelligent Facial Expression Recognition Using Particle Swarm Optimization Based Feature Selection

    Robson, A. & Zhang, L., 31 Jan 2019, 2018 IEEE Symposium Series on Computational Intelligence (SSCI). IEEE Symposium Series on Computational Intelligence (SSCI): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Interactions between insects and mycorrhizal fungi

    Gange, A. & Bower, E., 1997, MULTITROPHIC INTERACTIONS IN TERRESTRIAL SYSTEMS. OXFORD: BLACKWELL SCIENCE PUBL, p. 115-132 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    INTERACTIONS BETWEEN SOIL-DWELLING INSECTS AND MYCORRHIZAS DURING EARLY PLANT SUCCESSION

    Gange, A. & BROWN, V. K., 1992, MYCORRHIZAS IN ECOSYSTEMS. WALLINGFORD: C A B INTERNATIONAL, p. 177-182 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments

    Lunden, N., Sveen, R., Lund, H., Svendsen, N. & Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 171-183

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Interconnecting formalisms: Supporting modularity, reuse and incrementality

    Fiadeiro, J. L. & Maibaum, T., 1 Jan 1995, Proceedings of the Third ACM SIGSOFT Symposium on Foundations of Software Engineering. ACM Press, p. 72-80 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Interconnecting objects via contracts

    Fiadeiro, J. L. & Andrade, L. F., 1 Jan 2001, 38th International Conference on Technology of Object-Oriented Languages and Systems, Components for Mobile Computing. p. 182 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Interconnecting Objects Via Contracts

    Andrade, L. F. & Fiadeiro, J. L., 1999, UML. Springer, Vol. 1723. p. 566-583 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Inter-Continental Strategy Implementation

    Aboutalebi, R., Tan, H. & Lobo, R., 27 Nov 2013, In: EAMSA (Euro-Asia Management Studies Association), 30th Annual Conference of EAMSA: Innovation in Asia and Europe Approaches and Answers to new Challenges. Institute of East Asian Studies (IN-EAST); 27-30 November 2013, University of Duisburg-Essen, Duisburg, Germany.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Unpublished

    Intercultural Communication of Chinese Traditional Opera Programs under the View of Deconstructionism

    Li, X., 13 Aug 2018, (Unpublished) Second World Conference of Chinese Studies & 17th Intl. Conference on the Digitalization of Premodern Chinese Novel & Drama.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Inter-domain role mapping and least privilege

    Chen, L. & Crampton, J., 2007, Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 157-162 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Interfirm relational governance through media choice and communication practices in the coopetitive context

    Lee, J. Y. H., Saunders, C. & Panteli, N., 30 Oct 2018, International Conference on Information Systems 2018, ICIS 2018. Association for Information Systems, (International Conference on Information Systems 2018, ICIS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Interleaving Search and Heuristic Improvement

    Franco, S. & Torralba, Á., 5 Jul 2019, Proceedings of the Twelfth International Symposium on Combinatorial Search, SOCS 2019, Napa, California, 16-17 July 2019. Surynek, P. & Yeoh, W. (eds.). AAAI Press, p. 130-134 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    International Manufacturing Strategies: A Taxonomy

    Aboutalebi, R., 6 Sep 2016, In: BAM (British Academy of Management), 30th Annual Conference of BAM: Thriving in Turbulent Time. 06-08 September 2016, Newcastle University, England, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Internet background radiation arrival density and network telescope sampling strategies

    Pemberton, D., Komisarczuk, P. & Welch, I., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 246-252 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Internet Sensor Grid: Experiences with Passive and Active Instruments

    Komisarczuk, P. & Welch, I., 2010, Communications: Wireless in Developing Countries and Networks of the Future - Third IFIP TC 6 International Conference, WCITD 2010 and IFIP TC 6 International Conference, NF 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings. p. 132-145 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Internet Users' Security and Privacy While They Interact with Amazon

    Bella, G. & Coles-Kemp, L., 2011, Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, p. 878-883 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Interoperability of security and quality of Service Policies Over Tactical SOA

    Gkioulos, V., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J. & Wolthusen, S., 13 Feb 2017, Proceedings of the 2016 Symposium on Computational Intelligence (SSCI 2016) . p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Interorganisational information sharing and the use of category management

    Feldberg, F. & van der Heijden, H., 2003, Proceedings of the 16th Bled Electronic Commerce conference. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. E-pub ahead of print

    Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

    Crampton, J. & Sellwood, J., 2 Jul 2016, (E-pub ahead of print) Data and Applications Security and Privacy XXX. Springer-Verlag, Vol. 9766. p. 96-105 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Unpublished

    Inter-temporal variation in the illiquidity premium and its relationship with monetary conditions within the United Kingdom market

    Said, H. & Giouvris, E., 2015, (Unpublished) Banking, Financial markets, risk and financial vulnerability, 5th International Conference of the Financial Engineering and Banking Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Intriguing Dehydrated Phyllosilicates Found in an Unusual Clast in the LL3.15 Chondrite NWS6925

    Johnson, J. M., Zolensky, M. E., Chan, Q. & Kring, D. A., 21 Mar 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Intriguing Properties of Adversarial ML Attacks in the Problem Space

    Pierazzi, F., Pendlebury, F., Cortellazzi, J. & Cavallaro, L., 30 Jul 2020, IEEE Symposium on Security and Privacy (IEEE S&P). IEEE, p. 1332-1349 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Intrinsic circuit evolution using programmable analogue arrays

    Flockton, S. J. & Sheehan, K., 1998, EVOLVABLE SYSTEMS: FROM BIOLOGY TO HARDWARE. Sipper, M., Mange, D. & PerezUribe, A. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-153 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Introducing probabilities in contract-based approaches for mobile application security

    Dini, G., Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer-Verlag, Vol. 8247 LNCS. p. 284-299 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. E-pub ahead of print

    Intrusion Detection in Robotic Swarms

    Sargeant, I. & Tomlinson, A., 24 Aug 2019, (E-pub ahead of print) Proceedings of SAI Intelligent Systems Conference. Bi, Y., Bhatia, R. & Kapoor, S. (eds.). Springer, Vol. 2. p. 968-980 13 p. (Advances in Intelligent Systems and Computing; vol. 1038).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Intuiting Form: Memory and (Dis)continuity in Enescu's Piano Quintet, Op. 29

    Savage-Hanford, J., 2017, Proceedings of the "George Enescu" International Musicology Symposium 2017. Cosma, M. (ed.). Bucharest: Editura Muzicala

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Invariant statistics and coding of natural microimages

    Geman, D. & Koloydenko, A., 1999, IEEE Workshop on Statistical and Computational Theories of Vision.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Invariants of Finite Groups and Involutive Division

    Cid, C. & Plesken, W., 2001, Computer Algebra in Scientific Computing CASC 2001. Springer, p. 123-135 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    In-vehicle object detection in the wild for driverless vehicles

    Dinakaran, R., Zhang, L. & Jiang, R., 15 Aug 2020, World Scientific Proceedings Series on Computer Engineering and Information Science. In: Developments of Artificial Intelligence Technologies in Computation and Robotics. World Scientific Proceedings Series on Computer Engineering and Information Science, 12.: World Scientific, Singapore, p. 1139-1147 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution