Home > Publications

Publications

38601 - 38700 out of 41,443Page size: 100
  1. Conference contribution › Research
  2. Published

    The Usage of Khudze Multipurpose Community Telecentre in Mwanza District, Malawi

    Martha, C. & Kapondera, S., 9 Nov 2017, IST-Africa 2017 Conference Proceedings. Cunningham, P. & Cunningham, M. (eds.). IEEE Xplore, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    The Use of Cloud Computing by Small Service Business in Canada: An Exploratory Study

    Stanberry, C. A. & Harindranath, G., 13 Jan 2016, 2015 International Conference on Information Resource Management (Conf-IRM), Ottawa, Canada, May.. Vol. 18.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    The use of CSR tools by companies from tax havens

    Preuss, L., Mar 2009, 2nd conference of the British Academy of Management Special Interest Group on CSR (BAM CSR SIG).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    The use of Trusted Third Parties and Secure Billing in UMTS

    Chen, LI., Hitz, H-J., Horn, G., Howker, K., Kessler, V., Knudsen, L. R., Mitchell, C. J. & Radu, C., 1996, Proceedings of the ACTS Mobile Communications Summit, Granada, Spain, 27-29 November 1996. Vol. 2. p. 493-499 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. E-pub ahead of print

    The Vacuity of the Open Source Security Testing Methodology Manual

    Albrecht, M. & Jensen, R. B., 24 Nov 2020, (E-pub ahead of print) Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings. van der Merwe, T., Mitchell, C. & Mehrnezhad, M. (eds.). Springer, p. 114-147 34 p. (Lecture Notes in Computer Science; vol. 12529).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    THE WAY FORWARD FOR LONG-TERM COAL RESEARCH, DEVELOPMENT AND DEMONSTRATION IN THE UK - A PROPOSED NEW STRATEGY TO DEVELOP TECHNOLOGIES TO REDUCE GREENHOUSE GAS EMISSIONS

    Heyes, A., 1992, INTERNATIONAL CONF ON COAL, THE ENVIRONMENT AND DEVELOPMENT : TECHNOLOGIES TO REDUCE GREENHOUSE GAS EMISSIONS. PARIS: ORGANIZATION ECONOMIC COOPERATION, p. 845-849 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Unpublished

    The Zemiology of Student Housing in Dublin

    Reynolds, A., 2019, (Unpublished) The Zemiology of Student Housing in Dublin.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Unpublished

    Theorising national institutions and MNE actors: what scope for critical realism?

    Rees, C., Aug 2009, (Unpublished) International Industrial Relations Association (IIRA) 15th World Congress. Sydney.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Unpublished

    Theorising wandering game experiences: post-phenomenology, navigation and narrative

    Lowe, J., 12 Jul 2019, (Unpublished) Theorising & Navigating session at Wandering Games Conference 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    There Are a Thousand Hamlets in a Thousand People's Eyes

    Zhang, H., Li, X., Zhang, L. E. & Zhang, J., 23 Feb 2013, Academy of Management Proceedings. 1 ed. Vol. 2013.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Unpublished

    Thinking-With the Animal-That-We-Are and Are-Not: Notes toward a Non-Anthropocentric Anthropomorphism

    Hazell, C., 2021, (Unpublished) La Filosofia, Il Castello e la Torre - Ischia and Naples International Festival of Philosophy: Universes - VII Edition 1-26 September 2021.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Thoughts into Interdisciplinary Action: A 12-Step Programme for Earth

    Cole, J., Foster, A., Farlow, A., Petrikova, I. & Cheema, K., 5 Nov 2019, Eighth Annual Conference of inVIVO Planetary Health: From Challenges to Opportunities for People, Place, Purpose and Planet. MPDI International Journal of Environmental Research and Public Health, Vol. Special Issue. p. 61-63 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Threat analysis model of an agent-based vulnerability mitigation mechanism using Bayesian Belief Networks

    Al-Salloum, Z. & Wolthusen, S. D., 22 Jun 2011, Proceedings of the 2011 First IEEE Network Science Workshop (NSW 2011). IEEE Computer Society Press, p. 144-151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Three learnable models for the description of language

    Clark, A. & Adrian-Horia Dediu Henning Fernau, C. M-V. (ed.), 2010, Language and Automata Theory and Applications. p. 16--31

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Unpublished

    Through A Yellow Glass: Modernism, Mass Culture & Gossip

    Hember, P., 2018, (Unpublished) BAMs New Work in Modernist Studies Conference 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Through the Lens of Sequence Submodularity

    Bernardini, S., Fagnani, F. & Piacentini, C., 1 Jun 2020, Proceedings of the Thirtieth International Conference on Automated Planning and Scheduling. AAAI Press, Vol. 30. p. 38-47 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Tidal facies in siliciclastic, carbonate and mixed microtidal ancient systems of southern Italy

    Longhitano, S. G., Chiarella, D. & Spalluto, L., 2012, Tidalites 2012, 8th International Conference on tidal environments.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Albrecht, M., Orsini, E., Paterson, K., Peer, G. & Smart, N., 2017, Computer Security – ESORICS 2017. Springer, p. 29-46 18 p. (Lecture Notes in Computer Science; vol. 10492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Time independent and time dependent states of atoms in static external fields

    O'Mahony, P. F., Moser, I., Mota-Furtado, F. & dos Santos, J. P., 1998, ATOMS AND MOLECULES IN STRONG EXTERNAL FIELDS. NEW YORK: PLENUM PRESS DIV PLENUM PUBLISHING CORP, p. 169-180 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. E-pub ahead of print

    Time is of the Essence: Spatiotemporalities of Food Delivery Platform Work in China

    Wu, P. F. & Zheng, Y., 13 May 2020, (E-pub ahead of print) Proceedings of the European Conference on Information Systems (ECIS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Time Pattern Analysis of Malware by Circular Statistics

    Pan, L., Tomlinson, A. & Koloydenko, A., 3 Jul 2017, Architectures for Networking and Communications Systems (ANCS), 2017 ACM/IEEE Symposium on. IEEE, p. 119-130 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Time Specific Encryption

    Paterson, K. & Quaglia, E., 2010, SCN. Springer, Vol. 6280. p. 1-16 16 p. (Lecture Notes in Computer Science; vol. 6280).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Time-Resolved Transverse Beam Profile Measurements with a Rest Gas Ionisation Profile Monitor Based on Hybrid Pixel Detectors

    Levasseur, S., Gibson, S., Bodart, D., Huschauer, H., Schneider, G., Storey, J., Bertsche, W., Sandberg, H., Satou, K. & Sapinski, M., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPAL075

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Time-Storage Trade-Offs for Cryptographically-Enforced Access Control

    Crampton, J., 2011, ESORICS: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Atluri, V. & Diaz, C. (eds.). Springer, Vol. LNCS 6879. p. 245-261 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Unpublished

    To use or not to use Technology: Empowerment and ICTs

    Poveda Villalba, S., 2014, (Unpublished) To use or not to use Technology: Empowerment and ICTs. Human Development and Capability Association (HDCA)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. E-pub ahead of print

    Tokenisation Blacklisting Using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K., 14 Jun 2017, (E-pub ahead of print) Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. p. 182-198 17 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Too Much Information: Questioning Security in a Post-Digital Society

    Coles-Kemp, L., Jensen, R. B. & Heath, C. P. R., Apr 2020, CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Tool support for component-based semantics

    van Binsbergen, L. T., 14 Mar 2016, Companion Proceedings of the 15th International Conference on Modularity.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Tool Support for Coordination-Based Software Evolution

    Gouveia, J., Koutsoukos, G., Andrade, L. F. & Fiadeiro, J. L., 2001, TOOLS (38). IEEE Computer Society Press, p. 184-196 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Top Quark Measurements with ATLAS

    Bozson, A., 5 Mar 2019, Proceedings of the Tenth High-Energy Physics International Conference. Narison, S. (ed.). SLAC eConf, Vol. C180906. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Tourism in Canada’s North: Evaluating Experiences in Kluane National Park and Reserve, Yukon

    Prazeres, L., 2008, 12th Canadian Congress on Leisure Research Proceedings. Montréal, Canada, p. 349-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Toward a Tentative Strategy Implementation Model

    Aboutalebi, R. & Tan, H., 10 Sep 2013, In: BAM (British Academy of Management), 27th Annual Conference of BAM: Managing to Make a Difference. 10-12 September 2013, Aintree Racecourse, Liverpool, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Toward Modelling Organisational Success

    Aboutalebi, R., 7 Sep 2009, In: International Forum for Contemporary Chinese Studies, 2nd Conference of the International Forum for Contemporary Chinese Studies. 7-9 September 2009, University of Nottingham, England.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Toward the automation of business process ontology generation

    De Cesare, S., Juric, D. & Lycett, M., 18 Sep 2014, Proceedings - 16th IEEE Conference on Business Informatics, CBI 2014. Institute of Electrical and Electronics Engineers Inc., Vol. 1. p. 70-77 8 p. 6904139

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Towards a Common Notion of Privacy Leakage on Public Database

    Kiyomoto, S. & Martin, K. M., 2010, Proceedings of Fifth International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA’10). IEEE Computer Society Press, p. 186-191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Towards a conceptualization of the emergent properties of Twitter as an information and news sharing environment.

    Soler-Adillon, J., Freixa, P., Sora, C. & Ribas, J. I., 1 Jul 2014, Periodismo actual y futuro: investigación, docencia e innovación. Cortiñas-Rovira, S. (ed.). Barcelona: Sociedad Española de Periodistica, p. 390 397 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. E-pub ahead of print

    Towards a Framework for Testing the Security of IoT Devices Consistently

    Lally, G. & Sgandurra, D., 24 Nov 2018, (E-pub ahead of print) 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, Vol. 11263. p. 88-102 15 p. (Lecture Notes in Computer Science ; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Towards a model facilitating discussions about Cyber Attacks and Defences

    Happa, J., Fairclough, G., Goldsmith, M. & Creese, S., 2014, Proceedings of the Workshop on Ethics and Policies for Cyber Warfare. NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Towards a new tectonic model of the Askja caldera

    Browning, J., Gudmundsson, A. & Thordarson, T., 2015, Volcanic and Magmatic Studies Group Proceedings 2015. Vol. VMSG2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Towards a Sustainable Brand Loyalty: Attitudinal Loyalty Perspective

    Appiah, D., Ozuem, W. & Howell, K. E., 2016, Global Business and Technology Association. GBATA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Towards a Sustainable Demand Chain Framework: Successful Product Development Integration and Drivers

    Ganji, E. N., Shah, S., Coutroubis, A. & Gestring, I., 2 Jul 2018, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 166-171 6 p. 8691131. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Towards a Verification Logic for Rewriting Logic

    Fiadeiro, J. L., Maibaum, T. S. E., Martí-Oliet, N., Meseguer, J. & Pita, I., 2000, WADT. Springer, Vol. 1827. p. 438-458 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Unpublished

    Towards a Virtual Sense of Place: Exploring 'Walking Simulator' Video Games

    Lowe, J., 30 Aug 2017, (Unpublished) Geographies of Digital Games session at RGS-IBG 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Towards an architectural approach to location-aware business processes

    Aoumeur, N., Fiadeiro, J. & Oliveira, C., 1 Jan 2004, 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), Infrastructure for Collaborative Enterprises. Vol. 13. p. 147-152 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Towards an Interdisciplinary Definition of Trust Using Logical Partitioning

    Moin, S. M. A., Devlin, J., McKechnie, S. & Hosany, S., 2018, 51st Academy of Marketing Conference, Stirling, 2-5 July.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Towards Automated Diagnosis of Basal Cell Carcinoma

    Larraona-Puy, M., Ghita, A., Zoladek, A., Koloydenko, A., Perkins, W., Leach, I., Varma, S., Williams, H. & Notingher, I., 2010, American Institute of Physics Conference Series. Vol. 1267. p. 364-365 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2017, The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113. p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Towards Distributed Collaborative Workflow Management for Mobile Devices

    Kocúrová, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, Data-Driven Process Discovery and Analysis - First International Symposium, SIMPDA 2011, Campione d'Italia, Italy, June 29 - July 1, 2011, Revised Selected Papers. p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Towards enforcing on-the-fly policies in BYOD environments

    Costantino, G., Martinelli, F., Saracino, A. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 61-65 5 p. 6947734

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Towards General Algorithms for Grammatical Inference

    Clark, A., 1 Oct 2010, Algorithmic Learning Theory, 21st International Conference. Hutter, M., Stephan, F., Vovk, V. & Zeugmann, T. (eds.). Springer, p. 11-30

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Towards improved distributed collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, First International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Forthcoming

    Towards Improving Code-Stylometry Analysis in Underground Forums

    Blasco Alis, J., Pastrana, S., Suarez-Tangil, G. & Tereszkowski-Kaminski, M., 1 Aug 2021, (Accepted/In press) 22nd Privacy Enhancing Technologies Symposium (PETS 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Towards robust and efficient computation in dynamic peer-to-peer networks

    Augustine, J., Pandurangan, G., Robinson, P. & Upfal, E., 2012, Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2012, Kyoto, Japan, January 17-19, 2012. p. 551-569 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Towards Runtime Support for Norm-Governed Multi-Agent Systems

    Urovi, V., Bromuri, S., Stathis, K. & Artikis, A., 2010, Principles of Knowledge Representation and Reasoning: Proceedings of the Twelfth International Conference, KR 2010, Toronto, Ontario, Canada, May 9-13, 2010. Lin, F., Sattler, U. & Truszczynski, M. (eds.). AAAI Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Towards Static Analysis of Virtualization-Obfuscated Binaries

    Kinder, J., Oct 2012, Proc. 19th Working Conf. Reverse Engineering (WCRE 2012). IEEE, p. 61-70

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Towards trusted execution of multi-modal continuous authentication schemes

    Shepherd, C., Akram, R. & Markantonakis, K., 3 Apr 2017, Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM, p. 1444-1451 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Towards Understanding the Moderating Roles of Smartphones on Brand Switching

    Appiah, D. & Abayertey, S., 2018, Global Business and Technology Association . GBATA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Trace formulae for quantum graphs

    Bolte, J. & Endres, S., 2008, Analysis on Graphs and Its Applications. Exner, P., Keating, J. P., Kuchment, P., Sunada, T. & Teplyaev, A. (eds.). American Mathematical Society, p. 247-259 13 p. (Proceedings of Symposia in Pure Mathematics; vol. 77).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Trace measures in business and society research

    Preuss, L., 2015, Annual Meeting of the International Association for Business and Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Tracing Man-in-the-Middle in monoidal categories

    Pavlovic, D., 2012, Proceedings of CMCS 2012. Pattinson, D. & Schroeder, L. (eds.). Springer-Verlag, p. 28pp (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Tracing Success in the Voluntary Use of Open Technology in Organisational Setting

    Elbanna, A. & Linderoth, H. C. J., 2013, .. p. 89-104

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Tracing the global spread of CSR

    Preuss, L., Jun 2013, International Association for Business and Society (IABS) Annual Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Tracking the global diffusion of management ideas

    Preuss, L., Aug 2014, Annual Meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Trade-offs in corporate sustainability: Towards an analytical framework

    Hahn, T., Figge, F., Pinkse, J. & Preuss, L., Aug 2010, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Trade-offs in cryptographic implementations of temporal access control

    Crampton, J., 2009, Proceedings of 14th Nordic Workshop on Secure IT Systems. Springer, p. 72-87 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Tradition and Modernity in Buddhist Storytelling

    Utairat, M., 2016, Presenting the Theatrical Past, IFTR World Congress 2016, Stockholm, Sweden .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Traditional and (or) new media: teachers' work experience and application of media in schools

    Pavlovic, D., Stanisavljevic Petrovic, Z. & Soler-Adillon, J., 21 Apr 2016, eLearning Vision 2020!: Proceedings of the 12th International Scientific Conference "eLearning and Software for Education" Bucharest, April 21 - 22, 2016 . Roceanu, I. (ed.). Bucharest, Romania: "Carol I" National Defense University, Vol. 2. p. 182-187 6 p. 29

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Traffic control and resource management using a multi-agent system

    Luo, Z., Bigham, J., Cuthbert, L. & Hayzelden, A., 1999, Broadband Communications: Convergence of Network Technologies. Tsang, D. H. K. & Kuhn, P. J. (eds.). USA: Kluwer Academic Publishers, p. 595-606

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Traffic management in satellite ATM bridge

    Sun, Z., Komisarczuk, P., Coakley, FP. & Evans, BG., 1994, Teletraffic Symposium, 11th. Performance Engineering in Telecommunications Networks. IEE Eleventh UK. p. 8B-1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Training Data and Rationality

    Mersinas, K., Sobb, T., Sample, C., Bakdash, J. & Ormrod, D., Oct 2019, European Conference on the Impact of Artificial Intelligence and Robotics. Griffiths, P. & Kabir, M. N. (eds.). Oxford, UK: Academic Conferences and Publishing International Limited, p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Unpublished

    Training to fit a job vs training to enhance freedom: Computer skills and social activism in the youth

    Poveda Villalba, S., 2013, (Unpublished) Training to fit a job vs training to enhance freedom: Computer skills and social activism in the youth. Royal Geographical Society (with IBG)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Transcend: Detecting Concept Drift in Malware Classification Models

    Jordaney, R., Sharad, K., Dash, S., Wang, Z., Papini, D., Nouretdinov, I. & Cavallaro, L., 16 Aug 2017, Proceedings of the 26th USENIX Security Symposium. USENIX, p. 625-642 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Forthcoming

    Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift

    Barbero, F., Pendlebury, F., Pierazzi, F. & Cavallaro, L., 6 Nov 2021, (Accepted/In press) IEEE Symposium on Security and Privacy (IEEE S&P).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Transduction with confidence and credibility

    Saunders, C., Gammerman, A. & Vovk, V., 1999, Proceedings of the Sixteenth International Joint Conference on Articial Intelligence. Dean, T. (ed.). San Francisco, CA: Morgan Kaufmann, Vol. 2. p. 722-726 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Transductive Confidence Machine is universal

    Nouretdinov, I., Vyugin, V. & Gammerman, A., 2003, Lecture Notes in Artificial Intelligence. Springer, Vol. 2842. p. 283-297 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Transductive confidence machines for pattern recognition

    Proedrou, K., Nouretdinov, I., Vovk, V. & Gammerman, A., 2002, Proceedings of the Thirteenth European Conference on Machine Learning. Elomaa, T., Mannila, H. & Toivonen, H. (eds.). London: Springer, p. 381-390 10 p. (Lecture Notes in Computer Science; vol. 2430).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Transductive conformal predictors

    Vovk, V., 2013, Proceedings of the Ninth Conference on Artificial Intelligence Applications and Innovations. Heidelberg: Springer, Vol. 412. p. 348-360 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Transition dynamics in internationally assisted e-government projects: An Actor Network Theory perspective.

    Kromidha, E., 2013, Proceedings of IFIP 9.4: The 12th International Conference on Social Implications of Computers in Developing Countries, 19-22 May 2013. Ocho Rios, Jamaica

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    TransMIDI: A System for MIDI Sessions Over the Network Using Transis

    Gang, D., Chockler, G., Anker, T., Kremer, A. & Winkler, T., 1997, Proceedings of International Computer Music Conference (ICMC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Unpublished

    Transnational capital and the end of national social settlements?: evidence from Sweden

    Vernon, G. & Rees, C., Sep 2001, (Unpublished) International Conference on 'Small States in World Markets: Fifteen Years On'. Gothenburg.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Unpublished

    Transnational capital and the end of national social settlements?: recent developments in Sweden

    Vernon, G. & Rees, C., Apr 2001, (Unpublished) Industrial Relations in the European Community (IREC) Conference on 'Globalization, Competitiveness and the Government of Employment in Europe'. Madrid.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Transnational Clerical Elite Network: Shiite Political Activism in the Middle East

    Kalantari, M., 2014, 55th Annual International Studies Association Convention, Toronto. 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Transverse Profile and Emittance Measurements With a Laser Stripping System During the CERN LINAC4 Commissioning at 3 and 12 MeV

    Roncarolo, F., Bravin, E., Hofmann, T., Raich, U., Zocca, F., Boorman, G., Bosco, A., Gibson, S., Kruchinin, K., Pozimski, J. & Gabor, C., 5 Sep 2014, 27th Linear Accelerator Conference: LINAC14, Geneva, Switzerland, 31 August - 5 September 2014. p. 506-509 4 p. TUPP035

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices

    Reddington, J. & Coles-Kemp, L., 1 Jul 2011, Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies. Edinburgh, Scotland, UK: Association for Computational Linguistics, p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Trapping Domain Walls in Diode-like Structures

    Bryan, M. T., Schrefl, T., Gibbs, M. R. & Allwood, D. A., 25 Jun 2007, INTERMAG 2006 - IEEE International Magnetics Conference. p. 758 1 p. 4262191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Trashing IMSI catchers in mobile networks

    Khan, M. & Mitchell, C. J., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, July 18-20, 2017: WiSec '17 . Association for Computing Machinery (ACM), p. 207-218 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Travelling through facebook; exploring affordances through the Lens of age

    Panteli, N., Marder, B., Davenport, J. H. & Nemetz, F., 2014, ECIS 2014 Proceedings - 22nd European Conference on Information Systems. Association for Information Systems (AIS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Tree Automata as Algebras: Minimisation and Determinisation

    van Heerdt, G., Kappé, T., Rot, J., Sammartino, M. & Silva, A., Jun 2019, 8th Conference on Algebra and Coalgebra in Computer Science, CALCO 2019. Roggenbach, M. & Sokolova, A. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-22 22 p. 6. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 139).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Tree polymatrix games are PPAD-hard

    Deligkas, A., Fearnley, J. & Savani, R., 29 Jun 2020, 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Czumaj, A., Dawar, A. & Merelli, E. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. 38. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 168).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Tree-Based Cryptographic Access Control

    Alderman, J., Farley, N. & Crampton, J., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag, Vol. 10492 . p. 47-64 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Triassic and Jurassic Sandstones in the Banda Arc: Provenance and correlations with the Australian NW Shelf

    Zimmermann, S. & Hall, R., 25 May 2016, Proceedings, Indonesian Petroleum Association Fortieth Annual Convention 2016. Indonesian Petroleum Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots

    Seifert, C., Komisarczuk, P. & Welch, I., 2009, The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece. p. 63-69 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Trust Strategies for ART Testbed

    Kafali, O. & Yolum, P., 2006, Ninth International Workshop on Trust in Agent Societies, AAMAS. p. 43-49 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Forthcoming

    Trust under the Panopticon: Factors Influencing Trust within Contemporary Social Movements

    Azer, E., Zheng, Y. & Harindranath, G., 14 Feb 2019, (Accepted/In press) 35th EGOS Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Tunable balancing of RSA

    McKee, J., Galbraith, S. D. & Heneghan, C., 2005, ACISP 10. p. 280-292 (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution