Home > Publications

Publications

37651 - 37700 out of 41,642Page size: 50
  1. Conference contribution › Research
  2. Published

    Investigating Labelless Drift Adaptation for Malware Detection

    Kan, Z., Pendlebury, F., Pierazzi, F. & Cavallaro, L., 15 Nov 2021, AISec '21: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security. ACM, p. 123-134 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Investigating Outward FDI by Indian MNEs in the UK

    Aboutalebi, R. & Tan, H., 29 Mar 2012, In: AIB (Academy of International Business), 39th Academy of International Business: New Global Developments and the Changing Geography of International Business. 29-31 March 2012, the University of Liverpool, Liverpool, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    Investigating the Applicability of Distributed Ledger/Blockchain Technology in Manufacturing and Perishable Goods Supply Chains

    Coronado Mondragon, A., Coronado, C. & Coronado, E., 16 May 2019, (E-pub ahead of print) 2019 IEEE 6th International Conference on Industrial Engineering and Applications (ICIEA). Tokyo, Japan: IEEE Xplore, p. 728-732 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM

    Wetherall, J., Taylor, M. & Hurley-Smith, D., 2 Nov 2015, 2015 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, p. 81-84 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Investigation of CLIC 380 GeV Post-Collision Line

    Bodenstein, R., Abramov, A., Boogert, S., Burrows, P., Nevay, L., Schulte, D. & Tomás, R., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 528-531 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Investigation of the fatigue failure mechanisms for stitched and unstitched unidirectional composites

    Zhang, C., Jamshidi, M., Barnes, S., Cauchi-Savona, S., Rouse, J., Bradley, R., Withers, P. & Hogg, P., 1 Dec 2011, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Unpublished

    Investment styles and the potential of using illiquidity as an investment style in United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Banking, Finance and Institutions: Stability and Risk, 6th International Conference of the Financial Engineering and Banking Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    IP access service provision for broadband customers

    Komisarczuk, P., 1999, Services Over the Internet-What Does Quality Cost?(Ref. No. 1999/099), IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Iron homeostasis strategies in acidophilic iron oxidizers: Comparative genomic analyses

    Quatrini, R., Martinez, V., Osorio, H., Veloso, F. A., Pedroso, I., Valdes, J., Jedlicki, E. & Holmes, D. S., 2007, BIOHYDROMETALLURY: FROM THE SINGLE CELL TO THE ENVIRONMENT. Schippers, A., Sand, W., Glombitza, F. & Willscher, S. (eds.). STAFA-ZURICH: TRANS TECH PUBLICATIONS LTD, p. 531-534 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Is big data for everyone? the challenges of big data adoption in SMEs

    Shah, S., Soriano, C. B. & Coutroubis, A., 9 Feb 2018, 2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017. IEEE Computer Society Press, p. 803-807 5 p. (IEEE International Conference on Industrial Engineering and Engineering Management; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Is entity authentication necessary?

    Mitchell, C. J. & Pagliusi, P., 2004, Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19 2002, Revised Papers. Springer-Verlag, Vol. 2004. p. 20-33 14 p. (Lecture Notes in Computer Science; vol. 2845).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Unpublished

    Is Islam still the Solution? Clerical Elites and Muslim Extremism in Post Arab- Spring Middle East: Panel on Extremism in Post-Arab Spring MENA: Origins and Catalysts for the Rise of Extremist Movements

    Kalantari, M., 4 Mar 2015, (Unpublished) Royal Holloway University of London Politics and International Relations Department’s 10th Anniversary Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Unpublished

    Is social inclusion the same for all? Critical Internet use as a tool to attend individual needs in Brazil

    Poveda Villalba, S., 2013, (Unpublished) Is social inclusion the same for all? Critical Internet use as a tool to attend individual needs in Brazil. Human Development and Capability Association (HDCA)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Island Grammar-Based Parsing Using GLL and Tom

    Afroozeh, A., Bach, J-C., van den Brand, M., Johnstone, A., Manders, M., Moreau, P-E. & Scott, E., 2013, Software Language Engineering Lecture Notes in Computer Science : 5th International Conference, SLE 2012, Dresden, Germany, September 26-28, 2012, Revised Selected Papers. p. 224-243 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Issues of Security with the Oswald-Aigner Exponentiation Algorithm

    Walter, C. D., 2004, CT-RSA 2004. Okamoto, T. (ed.). Springer, Vol. 2964. p. 208-221 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    IT Enactment of New Public Management in Africa: The Case Study of Health Information Systems in Kenya

    Bernardi, R., 2009, Proceedings of the 9th European Conference on e-Government. Remenyi, D. (ed.). Reading: Academic Publishing Ltd, p. 129-136

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Italianisierte Formen in 'Les Troyens'

    Charlton, D., 2011, Berlioz' 'Troyens' und Halévys 'Juive' im Spiegel der Grand Opéra. Stuttgart: Franz Steiner Verlag, p. 83-96 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    IT-enabled change into the structures of Health Information Systems in Africa: a case study in Kenya

    Bernardi, R., 2009, ECIS09 Proceedings. Newell, S., Whitley, E., Pouloudi, N., Wareham, J. & Mathiassen, L. (eds.). Padova: CLEUP

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    ITS and Smart Grid Networks for Increasing Live Shellfish Value

    Coronado Mondragon, A. E. & Coronado, E. S., 16 Jun 2014, 10th ITS European Congress. Helsinki, 9 p. TP0115

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Jakstab: A Static Analysis Platform for Binaries

    Kinder, J. & Veith, H., 2008, Proc. 20th Int. Conf. Computer Aided Verification (CAV 2008). Springer, p. 423-427

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Jean de La Taille et la scénographie du "creux": Saül le furieux (1572)

    Chesters, T., 2005, Dramaturgies de l'ombre: spectres et fantômes au théâtre. Lavocat, F. & Lecercle, F. (eds.). Presses Universitaires de Rennes, p. 101-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Johann Friedrich Fasch’s Mich vom Stricke meiner Sünden – a work for Zerbst?

    Springthorpe, N., 2007, Johann Friedrich Fasch als Instrumentalkomponist: Bericht über die Internationale Wissenshaftliche Konferenz am 8. und 9. April 2005 im Rahmen der 9. International Fasch-Festtage in Zerbst.: Schriften zur mitteldeutschen Musikgeschichte der Ständigen Konferenz Mitteldeutsche Barockmusik in Sachsen, Sachsen-Anhalt und Thüringen e.V. Band 14. Musketa, K. (ed.). Beeskow: Ortus Musikverlag, Vol. 14. p. 207-224 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Joining the dots: exploring technical and social issues in e-Science approaches to linking landscape and artifactual data in British archaeology

    Gosden, C., Kamash, Z., Kirkham, R. & Pybus, J., 2009, E-science workshops 2009: 5th IEEE International Conference. p. 171-174

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Joyce In The Shadow Of War And Fascism: A Review Of Finnegans Wake By Mario Praz (1939)

    Fordham, F., 2017, Joyce Studies in Italy. Ruggieri, F. (ed.). Rome, Vol. 19. p. 301-322 22 p. (Joyce Studies in italy; vol. 19).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    k-Distinct In- and Out-Branchings in Digraphs

    Gutin, G., Reidl, F. & Wahlstrom, M., 2017, 44th International Colloquium on Automata, Languages, and Programming: ICALP 2017. Dagstuhl, p. 1-13 13 p. (Leibniz International Proceedings in Informatics ; vol. 80).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Kernelization of Constraint Satisfaction Problems: A Study through Universal Algebra

    Lagerkvist, V. & Wahlstrom, M., 2017, Principles and Practice of Constraint Programming: 23rd International Conference, CP 2017, Melbourne, VIC, Australia, August 28 – September 1, 2017, Proceedings. Springer, p. 157-171 15 p. (Lecture Notes in Computer Science; vol. 10416).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Key distribution without individual trusted authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, Proceedings: The 8th IEEE Computer Security Foundations Workshop, Kenmare, Co. Kerry, Ireland, June 1995. IEEE Computer Society Press, p. 30-36 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Key escrow in multiple domains

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of INFOSEC'COM '97, Paris, June 1997. p. 101-116 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Key escrow in mutually mistrusting domains

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1997, Security Protocols - Proceedings, International Workshop, Cambridge, April 1996. Lomas, M. (ed.). Springer-Verlag, p. 139-153 15 p. (Lecture Notes in Computer Science; no. 1189).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Key Management for Secure Demand Data Communication in Constrained Micro-Grids

    Kayem, A. V. D. M., Strauss, H., Wolthusen, S. & Meinel, C., 2016, Advanced Information Networking and Applications Workshops (WAINA), 2016 30th International Conference on. IEEE Press, p. 585-590 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Key minimal authentication systems for unconditional secrecy

    Godlewski, P. & Mitchell, C. J., 1990, Advances in Cryptology - Eurocrypt '89. Quisquater, J-J. & Vandewalle, J. (eds.). Springer-Verlag, p. 497-501 5 p. (Lecture Notes in Computer Science; no. 434).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Key recovery and forgery attacks on the MacDES MAC algorithm

    Coppersmith, D., Knudsen, L. R. & Mitchell, C. J., 2000, Advances in Cryptology - Proceedings of Crypto 2000. Bellare, M. (ed.). Springer-Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science; no. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Key recovery attacks on MACs based on properties of cryptographic APIs

    Brincat, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 63-72 10 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Key recovery for archived data using smart cards

    Rantos, K. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 75-85 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Key recovery in ASPeCT authentication and initialisation of payment protocol

    Rantos, K. & Mitchell, C. J., 1999, Proceedings of the 4th ACTS Mobile Communications Summit, Sorrento, Italy, June 1999. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Key recovery scheme interoperability - a protocol for mechanism negotiation

    Rantos, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. E-pub ahead of print

    Key Rotation for Authenticated Encryption

    Everspaugh, A., Paterson, K., Ristenpart, T. & Scott, S., 2 Aug 2017, (E-pub ahead of print) Advances in Cryptology – CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part III. Springer, p. 98-129 32 p. (Lecture Notes in Computer Science ; vol. 10403 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Knowledge Intensive R&D? Employment Practices of Foreign invested R&D Centres in China

    Zheng, Y., Mar 2013, International Labour Process Conference, Rutgers University, NJ, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Knowledge management in small firms

    Panyasorn, J., Panteli, N. & Powell, P., 2009, Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises : IFIP WG 8.2 International Conference, CreativeSME 2009, Proceedings. Dhillon, G., Stahl, B. C. & Baskerville, R. (eds.). Springer, p. 192-210 19 p. (IFIP Advances in Information and Communication Technology; vol. 301).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Knowledge management orientation, product innovation and shared vision: an integration and empirical examination of performance effects

    Wang, C. L., Ahmed, P. K. & Rafiq, M., 2007, British Academy of Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Knowledge management orientation, shared vision, and product innovation: An integration and empirical examination of performance effects

    Wang, C. L., Ahmed, P. K. & Rafiq, M., 2008, Academy of Management Annual Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Knowledge Management System’s Characteristics that facilitate Knowledge Sharing to Support Decision Making Processes in Multinational Corporations

    Abdelrahman, M. & Papamichail, K., 2011, 17th Americas Conference on Information Systems AMCIS. Detroit, Michigan, USA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Knowledge Sharing to Support Decision Making Processes in Multinational Corporations

    Abdelrahman, M. & Papamichail, K., 2013, 26th European Conference on Operational Research. Rome, Italy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Knowledge, learning and transformation in transnational sites: relationship asymmetry, politics and institution building

    Clark, E., 2005, The end of transformation?. Lang, R. (ed.). Munich: Rainer Hampp Verlag, p. 281-304 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Kolmogorov's complexity conception of probability

    Vovk, V., 2001, Probability Theory: Philosophy, Recent History and Relations to Science. Dordrecht: Kluwer, p. 51-69 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    La comédie lyrique au temps de Diderot

    Charlton, D., 2016, Music et pantomime dans 'Le Neveu de Rameau'. Salaün, F. & Taïeb, P. (eds.). Paris: Hermann Editeurs, p. 50-77 28 p. (Fictions pensantes).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    La penna e il pennello. Retoriche a confronto

    Jossa, S., Hendrix, H. (ed.) & Procaccioli, P. (ed.), 2008, Officine del nuovo. Sodalizi fra letterati, artisti ed editori nella cultura italiana fra Riforma e Controriforma. Atti del Simposio internazionale, Utrecht, 8-10 novembre 2007. Roma: Vecchiarelli

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Forthcoming

    La relación entre la música, coreografía y elementos plásticos de El sombrero de tres picos (1919)

    Camacho Acevedo, L., 2 Oct 2020, (Accepted/In press) Repensar El sombrero de tres picos cien años después.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    La Rencontre de l'ancien et du nouveau dans 'La Fille mal gardée' de Duni et Favart.

    Charlton, D., 2015, Rire et sourire dans l'opéra-comique en France aux XVIIIe et XIXe siècles.. Loriot, C., Cailliez, M. & Bonche, V. (eds.). Lyon: Symétrie, p. 33-51 19 p. (Symétrie Recherche).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    La Vérité se rencontre-t-elle au train de la contingence?

    O'Brien, J., 2011, Les Chapitres oublis des 'Essais' de Montaigne. Paris: Champion, p. 93-106 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution