Home > Publications

Publications

37951 - 38000 out of 41,349Page size: 50
  1. Conference contribution › Research
  2. Published

    Proof complexity lower bounds from algebraic circuit complexity

    Forbes, M., Shpilka, A., Tzameret, I. & Wigderson, A., 19 May 2016, 31st Conference on Computational Complexity (CCC 2016). Dagstuhl, Germany: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 50. p. 1-17 17 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 50).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Proof-theoretic conceptual modeling – the NIAM case-study

    SERNADAS, C., FIADEIRO, J., MEERSMAN, R. & SERNADAS, A., 1989, INFORMATION SYSTEM CONCEPTS : AN IN-DEPTH ANALYSIS. FALKENBERG, ED. (ed.). AMSTERDAM: ELSEVIER SCIENCE PUBL B V, p. 1-30 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    PROSOCS: a platform for programming software agents in computational logic

    Stathis, K., Kakas, A. C., Lu, W., emetriou, N. D., Endriss, U. & Bracciali, A., 1 Apr 2004, Proceedings of the Fourth International Symposium ``From Agent Th eory to Agent Implementation'' (AT2AI-4 -- EMCSR'2004 Session M). Müller, J. & Petta, P. (eds.). p. 523-528 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. E-pub ahead of print

    Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting

    Fraser, A. & Quaglia, E., 8 Oct 2020, (E-pub ahead of print) SAC 2020 proceedings. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    PROTOSS: A run time tool for detecting PRivacy viOlaTions in Online Social networkS (Short Paper)

    Kafali, O., Gunay, A. & Yolum, P., 2012, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Prototyping symbolic execution engines for interpreted languages

    Bucur, S., Kinder, J. & Candea, G., Feb 2014, ASPLOS '14: Proceedings of the 19th international conference on Architectural support for programming languages and operating systems. ACM, p. 239-254 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Mitchell, C. J., 3 Apr 2021, Security and Privacy: Select Proceedings of ICSP 2020. Stănică, P., Gangopadhyay, S. & Debnath, S. K. (eds.). Singapore: Springer-Verlag, p. 151-162 12 p. (LNEE; vol. 744).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Provably Secure Key Assignment Schemes from Factoring

    Freire, E. S. V. & Paterson, K. G., 2011, ACISP. Parampalli, U. & Hawkes, P. (eds.). Springer, Vol. 6812. p. 292-309 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Provenance of Mesozoic sandstones in the Banda Arc, Indonesia

    Zimmermann, S. & Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-301 1-13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Proving memory safety of floating-point computations by combining static and dynamic program analysis

    Godefroid, P. & Kinder, J., 2010, Proc. 19th Int. Symp. Software Testing and Analysis (ISSTA 2010). ACM, p. 1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Proving Random Formulas in Propositional Logic

    Tzameret, I. & Muller, S., 2013, Logic Across the University: Foundations and Application: Proceedings of the Tsinghua Logic Conference. van Benthem, J. & Liu, F. (eds.). London: College Publications London, Vol. 47. p. 201-208 8 p. (Studies in Logic).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Provisioning Software with Hardware-Software Binding

    Lee, R., Markantonakis, K. & Akram, R., 29 Aug 2017, FARES '17 Proceedings of the 12th International Workshop on Frontiers in Availability, Reliability and Security. ACM, p. 1-9 9 p. 49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Proximity Assurances Based on Natural and Artificial Ambient Environments

    Gurulian, I., Markantonakis, K., Shepherd, C., Frank, E. & Akram, R., 2017, 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. Springer, p. 83-103 21 p. (Security and Cryptology; vol. 10543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Proximity-1 simulating the CCSDS Proximity-1 protocol for ExoMars

    Blommestijn, R., Lange, J., Taylor, C. & Winton, A., 2009, Proceedings of DASIA 2009 Conference on DAta Systems In Aerospace. (European Space Agency, (Special Publication) ESA SP; vol. 669 SP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure

    Ronen, E., Paterson, K. G. & Shamir, A., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1397-1414 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 May 2012, 5th International Conference on New Technologies, Mobility and Security (NTMS). Mana, A. & Klonowski, M. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    PSInSAR remote sensing observations of deformation behaviour at Salisbury Plain, UK

    Agar, S. A., Lawrence, J. A., Ghail, R. C., Mason, P. J. & Thompson, S., 16 Sep 2018, Engineering in Chalk - Proceedings of the Chalk 2018 Conference. Lawrence, J. A., Preene, M., Lawrence, U. L. & Buckley, R. (eds.). ICE Publishing, p. 269-274 6 p. (Engineering in Chalk - Proceedings of the Chalk 2018 Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    PsycoTrace: Virtual and Transparent Monitoring of a Process Self

    Baiardi, F., Maggiari, D., Sgandurra, D. & Tamberi, F., 1 Feb 2009, 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing. p. 393-397 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    PTaCL: A Language for Attribute-Based Access Control in Open Systems

    Crampton, J. & Morisset, C., 2012, POST 2012: Principles of Security and Trust - First International Conference. Degano, P. & Guttman, J. (eds.). Springer, p. 390-409 20 p. (Lecture Notes in Computer Science; vol. 7215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Public sector ICT management strategy and its impact on e-government: A case study

    Stea, B. & Harindranath, G., 2006, Proceedings of the 2006 European Conference on Information Systems (ECIS), Gothenburg, Sweden. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Pulsed-Disk-Laser welding of Ti6Al4V

    Mastrocinque, E., Corrado, G., Caiazzo, F., Pasquino, N. & Sergi, V., 2011, Ninth International Conference on Advanced Manufacturing Systems and Technology. p. 383-393

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries

    Grubbs, P., Lacharité, M. S., Minaud, B. & Paterson, K. G., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 315-331 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Pyg4ometry: A Tool to Create Geometries for Geant4, BDSIM, G4Beamline and FLUKA for Particle Loss and Energy Deposit Studies

    Boogert, S., Abramov, A., Albrecht, J., D'Alessandro, G. L., Nevay, L., Shields, W. & Walker, S., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 3244-3247 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Qualified predictions for large data sets in the case of pattern recognition

    Papadopoulos, H., Vovk, V. & Gammerman, A., 2002, Proceedings of the International Conference on Machine Learning and Applications. Wani, M., Arabnia, H., Cios, K., Hafeez, K. & Kendall, G. (eds.). CSREA Press, p. 159-163 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Qualified predictions for proteomics pattern diagnostics with confidence machines

    Luo, Z., Bellotti, T. & Gammerman, A., 2004, Lecture Notes in Computer Science . Vol. 3177. p. 46-51

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Qualified probabilistic predictions using graphical models

    Luo, Z. & Gammerman, A., 2005, Lecture Notes in Artificial Intelligence. Vol. 3571. p. 111-122

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Unpublished

    Quality management strategies and employee participation in Europe

    Rees, C., Jul 1994, (Unpublished) Industrial Relations in the European Community (IREC) Conference on 'Multinational Companies and the Future of Collective Bargaining'. Dublin.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Quality of Life: Psychological dimensions of health

    Bradley, C., 1998, Royal Holloway Report. Royal Holloway, University of London, p. 17

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Quantifying and qualifying trust: Spectral decomposition of trust networks

    Pavlovic, D., 2011, Proceedings of FAST 2010. Degano, P., Etalle, S. & Guttman, J. (eds.). Springer-Verlag, Vol. 6561. p. 1-17 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Quantitative Concept Analysis

    Pavlovic, D., 2012, Formal Concept Analysis: 10th International Conference, ICFCA 2012, Leuven, Belgium, May 7-10, 2012: Proceedings. Domenach, F., Ignatov, D. I. & Poelmans, J. (eds.). Springer, p. 260-277 18 p. (Lecture Notes in Computer Science; vol. 7278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. E-pub ahead of print

    Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving

    Kirshanova, E., Mårtensson, E., Postlethwaite, E. & Roy Moulik, S., 25 Nov 2019, (E-pub ahead of print) Advances in Cryptology -- ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Springer, p. 521-551 31 p. (Lecture Notes in Computer Science; vol. 11921).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Quantum and classical structures in nondeterministic computation

    Pavlovic, D., 2009, Proceedings of Quantum Interaction 2009. Bruza, P., Sofge, D. & Rijsbergen, K. V. (eds.). Springer-Verlag, Vol. 5494. p. 143-158 16 p. (Lecture Notes in Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Quantum computing with separable states?

    Schack, R., 2001, Macroscopic Quantum Coherence and Quantum Computing. Averin, D. V., Ruggiero, B. & Silvestrini, P. (eds.). New York: Kluwer, p. 285

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. E-pub ahead of print

    Quantum cryptanalysis on contracting feistel structures and observation on related-key settings

    Cid, C., Hosoyamada, A., Liu, Y. & Sim, S. M., 8 Dec 2020, (E-pub ahead of print) Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings. Bhargavan, K., Oswald, E. & Prabhakaran, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 373-394 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12578 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Quantum crystals: from quantum plasticity to supersolidity

    Balibar, S., Haziot, A. & Rojas, X., 2011, QUANTUM SENSING AND NANOPHOTONIC DEVICES VIII. Razeghi, M., Sudharsanan, R. & Brown, GJ. (eds.). SPIE - INT SOC OPTICAL ENGINEERING, 7 p. (Proceedings of SPIE; vol. 7945).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Quantum Theory and Global Optimisation

    Audenaert, K., 2004, Sixteenth International Symposium on Mathematical Theory of Networks and Systems (MTNS2004), Mini-Symposium on Quantum Information, Catholic University of Leuven, Belgium, 5-9 July 2004.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Quaternary life on land

    Elias, S., 2002, Encyclopaedia of Life Sciences. London: Nature Publishing Group, Vol. 15. p. 739-742

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    R&D internationalisation of developing country firms: the case of China

    Rui, H., 2014, Proceedings of the 56th Annual Meeting of the Academy of International Business: Local contexts in Global Business. Meyer, K. & Kiyak, T. (eds.). 2014 Academy of International Business, p. 176 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    r/Coronavirus and the Viral Pandemic: A source of truth, comfort and companionship during COVID19

    Cole, J., van de Ven, C., Sharkey, C. M., Williamson, P., Doherty, P. & Robb, F., 13 May 2021, CHI EA '21: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. Kitamura, Y., Quigley, A., Isbister, K. & Igarashi, T. (eds.). NY, USA: Association for Computing Machinery (ACM), p. 1-6 6 p. 153

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Random planar graphs with n nodes and a fixed number of edges

    Gerke, S., McDiarmid, C., Steger, A. & Weissl, A., 2005, PROCEEDINGS OF THE SIXTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS. PHILADELPHIA: SIAM, p. 999-1007 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Randomized Rounding for Routing and Covering Problems: Experiments and Improvements

    Doerr, B., Künnemann, M. & Wahlström, M., 2010, Experimental Algorithms : 9th International Symposium, SEA 2010. Festa, P. (ed.). Naples, Italy: Springer, Vol. 6049. p. 190-201 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Randomized Rounding in the Presence of a Cardinality Constraint

    Doerr, B. & Wahlström, M., 2009, 2009 Proceedings of the Eleventh Workshop on Algorithm Engineering and Experiments (ALENEX). Finocchi, I. & Hershberger, J. (eds.). New York, USA: SIAM, p. 162-174 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Ranking Bracelets in Polynomial Time

    Adamson, D., Gusev, V., Potapov, I. & Deligkas, A., 30 Jun 2021, Symposium on Combinatorial Pattern Matching: CPM 2021. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 191. p. 1-17 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Ransomclave: Ransomware Key Management using SGX

    Bhudia, A., O'Keeffe, D., Sgandurra, D. & Hurley-Smith, D., 17 Aug 2021, 10th International Workshop on Cyber Crime (IWCC 2021): In proceedings of the International Conference on Availability, Reliability and Security (ARES 2021). p. 1-10 10 p. 58

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    RBAC administration in distributed systems

    Dekker, M., Crampton, J. & Etalle, S., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 93--102 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    RBSLA based implementation for architectural management laws

    Alghamdi, A., Fiadeiro, J. L. & Paschke, A., 1 Jan 2008, Innovations'07: 4th International Conference on Innovations in Information Technology, IIT. p. 556-560 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. E-pub ahead of print

    Reactive and Proactive Standardisation of TLS

    Paterson, K. & Merwe, T. V. D., 2 Nov 2016, (E-pub ahead of print) Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings. Chen, L., McGrew, D. A. & Mitchell, C. (eds.). Springer Verlag, Vol. 10074. p. 160-186 27 p. (Lecture Notes in Computer Science; vol. 10074).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Reactive/proactive connectivity management in a tactical service-oriented infrastructure

    Lopes, R. R. F., Nieminen, M., Viidanoja, A. & Wolthusen, S., 26 Jun 2017, Proceedings of the 2017 International Conference on Military Communications and Information Systems (ICMCIS 2017). IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Reading order independent grouping proof for RFID tags

    Lien, Y., Leng, X., Mayes, K. & Chiu, J-H., 2008, ISI. p. 128-136 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Ready, Steady, Go! Altered Gravity Influences Responses to Environmental Stimuli

    Arshad, I. & Ferrè, E. R., 2021, Experimental Psychology Society .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution