Home > Publications

Publications

38251 - 38300 out of 41,642Page size: 50
  1. Conference contribution › Research
  2. Published

    Randomized Rounding in the Presence of a Cardinality Constraint

    Doerr, B. & Wahlström, M., 2009, 2009 Proceedings of the Eleventh Workshop on Algorithm Engineering and Experiments (ALENEX). Finocchi, I. & Hershberger, J. (eds.). New York, USA: SIAM, p. 162-174 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Ranking Bracelets in Polynomial Time

    Adamson, D., Gusev, V., Potapov, I. & Deligkas, A., 30 Jun 2021, Symposium on Combinatorial Pattern Matching: CPM 2021. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 191. p. 1-17 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Ransomclave: Ransomware Key Management using SGX

    Bhudia, A., O'Keeffe, D., Sgandurra, D. & Hurley-Smith, D., 17 Aug 2021, 10th International Workshop on Cyber Crime (IWCC 2021): In proceedings of the International Conference on Availability, Reliability and Security (ARES 2021). p. 1-10 10 p. 58

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    RBAC administration in distributed systems

    Dekker, M., Crampton, J. & Etalle, S., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 93--102 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    RBSLA based implementation for architectural management laws

    Alghamdi, A., Fiadeiro, J. L. & Paschke, A., 1 Jan 2008, Innovations'07: 4th International Conference on Innovations in Information Technology, IIT. p. 556-560 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print

    Reactive and Proactive Standardisation of TLS

    Paterson, K. & Merwe, T. V. D., 2 Nov 2016, (E-pub ahead of print) Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings. Chen, L., McGrew, D. A. & Mitchell, C. (eds.). Springer Verlag, Vol. 10074. p. 160-186 27 p. (Lecture Notes in Computer Science; vol. 10074).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Reactive/proactive connectivity management in a tactical service-oriented infrastructure

    Lopes, R. R. F., Nieminen, M., Viidanoja, A. & Wolthusen, S., 26 Jun 2017, Proceedings of the 2017 International Conference on Military Communications and Information Systems (ICMCIS 2017). IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Reading order independent grouping proof for RFID tags

    Lien, Y., Leng, X., Mayes, K. & Chiu, J-H., 2008, ISI. p. 128-136 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Ready, Steady, Go! Altered Gravity Influences Responses to Environmental Stimuli

    Arshad, I. & Ferrè, E. R., 2021, Experimental Psychology Society .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Reality of Big Data Adoption in Supply Chain for Sustainable Manufacturing SMEs

    Shah, S. & Wiese, J., 13 Aug 2018, 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8436343. (2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. E-pub ahead of print

    Realizability in Cyclic Proof: Extracting Ordering Information for Infinite Descent

    Rowe, R. & Brotherston, J., 30 Aug 2017, (E-pub ahead of print) TABLEAUX 2017: Automated Reasoning with Analytic Tableaux and Related Methods. Springer, p. 295-310 16 p. (Lecture Notes in Computer Science; vol. 10501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Reasonable Doubts, Unspoken Fears: Reassessing the Trial Film's "Heroic Age"

    Langford, B., Apr 2019, Trial Films on Trial: Law, Justice, and Popular Culture. Sarat, A., Silbey, J. & Umphrey, M. M. (eds.). University of Alabama Press, p. 81-110 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Reasoning About Exceptions to Contracts

    Kafali, O., Toni, F. & Torroni, P., 2011, Computational Logic in Multi-Agent Systems (CLIMA XII). Vol. 6814. p. 225-242 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Reasoning about plan robustness versus plan cost for partially informed agents

    Keren, S., Bernardini, S., Kwapong, K. & Parkes, D. C., Sep 2020, Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning. International Joint Conferences on Artificial Intelligence, p. 550-559 10 p. 64

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Reasoning in time with uncertain information

    Ramparany, F., Lorquet, V., Bouyssounous, B., Bigham, J. & Luo, Z., 1994, IFAC/IFIP/IMACS Symposium on Artificial Intelligence in Real Time Control.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Unpublished

    Reassuring Literary Legitimacy of Traditional Chinese Theatre Texts Through Translation Database Research

    Li, X., 21 Jul 2019, (Unpublished) Fourth International Symposium: Dialogue between Chinese Language Teaching and Culture and the Arts.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Recent BDSIM Related Developments and Modeling of Accelerators

    Nevay, L., Abramov, A., Alden, S., Boogert, S., D'Alessandro, G. L., Gibson, S., Lefebvre, H., Shields, W., Walker, S., Gnacadja, E., Hernalsteens, C., Ramoisiaux, E., Tesse, R. & Liu, S. L., 22 Aug 2021, 12th International Particle Accelerator Conference 2021. Campinas, SP, Brazil: JACoW Publishing, p. 4208-4211 4 p. THPAB214

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Recent Developments in Beam Delivery Simulation - BDSIM

    Nevay, L., Abramov, A., Boogert, S., Garcia Morales, H., Gibson, S., Shields, W., Walker, S. & Snuverink, J., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. THPAK025

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Recent research on Roman dams in the Near East

    Kamash, Z., 2006, Cura Aquarum in Ephesus: Proceedings of the 12th International Conference on the History of Water Management and Hydraulic Engineering, Ephesus, 2-10 October 2004. Leuven: Peeters Press, p. 233-238

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Recent Results on Non-invasive Beam Size Measurement Methods Based on Polarization Currents

    Mazzoni, S. & Karataev, P., 29 Jan 2019, International Beam Instrumentation Conference (7th) IBIC2018. JACoW Publishing, p. 464-467 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Forthcoming

    Reciprocity norms in online knowledge sharing: A conceptual analysis

    Wu, P. & Preece, J., 16 Mar 2016, (Accepted/In press) The 76th Annual Meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Recognising lifestyle activities of diabetic patients with a smartphone

    Lustrek, M., Kvetkovic, B., Mirchevska, V., Kafali, R., Romero Lopez, A. & Stathis, K., 3 Aug 2015, Pervasive Health 2015 : Workshop on Personal Health Systems for Chronic Diseases (PHSCD 2015). p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Recognition of hypoxia with a preset confidence level based on EEG analysis

    Zhang, J., Li, G., Meng, H., Li, J. & Luo, Z., Jun 2008, IEEE International Joint Conference on Neural Networks, 2008. p. 3005-3008

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    RECON: a Robust multi-agent Environment for simulating COncurrent Negotiations

    Alrayes, B., Kafali, O. & Stathis, K., 2014, In Seventh International Workshop on Agent-based Complex Automated Negotiations (ACAN), AAMAS: best student paper award.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast

    Chockler, G., Demirbas, M., Gilbert, S., Lynch, N. A., Newport, C. C. & Nolte, T., 2005, Proceedings of the 4th International Workshop on Assurance in Distributed Systems and Networks (ADSN '05): ICDCS Workshops. p. 42-48 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Reconfigurable Distributed Storage for Dynamic Networks

    Chockler, G., Gilbert, S., Gramoli, V., Musial, P. & Shvartsman, A., 2005, Proceedings of the 9th International Conference on Principles of Distributed Systems (OPODIS '05). Springer-Verlag, p. 351-365 15 p. (Lecture Notes in Computer Science; vol. 3974).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Reconfigurable state machine replication from non-reconfigurable building blocks

    Bortnikov, V., Chockler, G., Roytman, A., Shachor, S., Shnayderman, I. & Perelman, D., 2012, Proceedings of the 31st Annual ACM Symposium on Principles of Distributed Computing. ACM, p. 93-94 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Reconstructing the temple of Apollo on the Palatine hill in Rome

    Claridge, A., Nov 2014, Reconstruction and the Historic City: Rome and Abroad - an interdisciplinary approach. Haeuber, C., Winder, G. M. & Schuetz, F-X. (eds.). (Beitraege Wirtschaftsgeographie Muenchen ; vol. 6).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Reconstruction of fundamental SUSY parameters

    Zerwas, P. M., Blair, G. A., Choi, S. Y., Freitas, A., Kalinowski, J., Marlyn, H. U., Moortgat-Pick, G. & Porod, W., 2002, ICHEP 2002, PROCEEDINGS. AMSTERDAM: Elsevier Science Publishers B.V. (North-Holland), 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Reconstruction of Structural Controllability over Erdös-Rényi Graphs via Power Dominating Sets

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR '14). ACM Press, p. 57 60 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Recovering from Lost Digital Wallet

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 4th IEEE International Symposium on Trust, Security, and Privacy for Emerging Applications (TSP-13). Y. Xiang, F. G. M. & Ruj, S. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths

    Walter, C. D., 2008, CHES 2008. Oswald, E. & Rohatgi, P. (eds.). Springer, Vol. 5154. p. 214-227 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs in the Presence of Compromised Nodes

    Alwasel, B. & Wolthusen, S., 18 May 2016, Proceedings of the 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015). Springer-Verlag, Vol. 9578. p. 105-119 15 p. (Lecture Notes in Computer Science; vol. 9578).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs via Partial Control Structure Re-Use

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th International Conference on Critical Information Infrastructures Security (CRITIS 2014). Springer-Verlag, p. 293-307

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Recovery of Structural Controllability for Process Control Systems

    Alcaraz, C. & Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47 63 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. E-pub ahead of print

    Recurrent Auto-Encoder Model for Large-Scale Industrial Sensor Signal Analysis

    Wong, T. & Luo, Z., 27 Jul 2018, (E-pub ahead of print) International Conference on Engineering Applications of Neural Networks: EANN 2018. Pimenidis, E. & Jayne, C. (eds.). Springer, p. 203-216 14 p. (Communications in Computer and Information Science; vol. 893).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Reducing Normative Conflicts in Information Security

    Pieters, W. & Coles-Kemp, L., 2011, NSPW '11: Proceedings of the 2011 New security paradigms workshop, 12-15 Sep 2011, Marin County, CA. . ACM, p. 11-24 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Reducing the Space Requirements of Instant Replay

    Levrouw, L. J. & Audenaert, K., 1993, Proc. of the ACM/ONR Workshop on Parallel and Distributed Debugging. San Diego: ACM, p. 205-207

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Re-Evaluating SMEs IT Readiness in the Age of the Cloud

    Dyerson, R. & Spinelli, R., Sep 2017, 2017 Proceedings of the European Conference on Information Management and Evaluation, Genoa.. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Refining Process Descriptions from Execution Data in Hybrid Planning Domain Models

    Linday, A., Franco Aixela, S., Reya, R. & McCluskey, L., 1 Jun 2020, Proceedings of the Thirtieth International Conference on Automated Planning and Scheduling, Nancy, France, October 26-30, 2020. AAAI Press, Vol. 30 (2020). p. 469-477 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Regional consecutive leader election in mobile ad-hoc networks

    Chung, H. C., Robinson, P. & Welch, J. L., 2010, Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cambridge, Massachusetts, USA, September 16, 2010. p. 81-90 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Regular Strategies in Pushdown Reachability Games

    Hague, M. & Carayol, A., 2014, 8th International Workshop on Reachability Problems 2014. 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Re-imagining the disruptive innovation theory in the digital platforms era

    Elbanna, A., Jun 2017, IFIP 8.6 Working Conference 2017: Re-Imagining Diffusion of Information Technology. Guimarães, Portugal

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Related Randomness Attacks for Public Key Encryption

    Paterson, K. G., Schuldt, J. C. N. & Sibborn, D. L., 2014, PKC 2014. Krawczyk, H. (ed.). Springer, Vol. 8383. p. 465-482 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Related-Key Impossible-Differential Attack on Reduced-Round Skinny

    Ankele, R., Banik, S., Chakraborti, A., List, E., Mendel, F., Sim, S. M. & Wang, G., 2017, Applied Cryptography and Network Security. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Kanazawa, Japan: Springer International Publishing, Vol. 10355. p. 208-228 21 p. (Lecture Notes in Computer Science; vol. 10355, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

    Abdalla, M., Benhamouda, F., Passelègue, A. & Paterson, K. G., 2014, Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, Vol. 8616. p. 77-94 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Relations are more than Bytes: Re-thinking the Benefits of Smart Services with People and Things

    Heath, C. P., Crivellaro, C. & Coles-Kemp, L., 2 May 2019, CHI Conference on Human Factors in Computing Systems Proceedings: CHI 2019. ACM, p. 1-12 12 p. 308

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Unpublished

    Relationship between illiquidity and monetary conditions within the United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Corporate Finance Decisions in a Changing Global Environment, International Finance and Banking Society (IFABS) Asia 2016 Brunei Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Relationship-based Access Control for an Open-source Medical Records System

    Rizvi, S. Z. R., Fong, P. W. L., Crampton, J. & Sellwood, J., 1 Jun 2015, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. ACM, Vol. 2015-June. p. 113-124 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Reliable Classification of Acute Leukaemia from Gene Expression Data using Confidence Machines

    Bellotti, T., Luo, Z. & Gammerman, A., 2006, IEEE International Conference on Granular Computing. IEEE, p. 148-153

    Research output: Chapter in Book/Report/Conference proceedingConference contribution