Home > Publications

Publications

38701 - 38750 out of 42,597Page size: 50
  1. Conference contribution › Research
  2. Published

    Masterclass: Multisystemic Therapy as an intervention for complex needs

    Fox, S., 2014, European Forensic Child and Adolescent Psychiatrists, Psychologists and other disciplines: Royal College of Psychiatrists.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Mathematical vernacular and conceptual well-formedness in mathematical language

    Luo, Z. & Callaghan, P., 1999, Proceedings of the 2nd Inter. Conf. on Logical Aspects of Computational Linguistics (LACL'97). LNAI 1582.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Mathematical vernacular in type theory based proof assistants

    Callaghan, P. & Luo, Z., 1998, User Interfaces for Theorem Provers (UITP'98).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Measurement of the nu(mu)-CCQE cross section in the SciBooNE experiment

    Alcaraz-Aunion, J. L. & Walding, J., 2009, SIXTH INTERNATIONAL WORKSHOP ON NEUTRINO-NUCLEUS INTERACTIONS IN THE FEW-GEV REGION. Sanchez, F., Sorel, M., AlvarezRuso, L., Cervera, A. & VicenteVacas, M. (eds.). MELVILLE: AMER INST PHYSICS, p. 145-150 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Measurement re-ordering attacks on power system state estimation

    Gul, A. & Wolthusen, S., 18 Jan 2018, Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe 2017). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Measurement Study on Malicious Web Servers in the .nz Domain

    Seifert, C., Delwadia, V., Komisarczuk, P., Stirling, D. & Welch, I., 2009, Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. p. 8-25 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Measuring 3-D Secure and 3D SET against e-commerce end-user requirements

    Jarupunphol, P. & Mitchell, C. J., 2003, Proceedings of the 8th Collaborative electronic commerce technology and research conference (CollECTeR (Europe) 2003), National University of Ireland, Galway, June 2003. p. 51-64 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Measuring Attitude towards Risk Treatment Actions amongst Information Security Professionals: an Experimental Approach

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 13 Jun 2016, Workshop on the Economics of Information Security. 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Measuring attitudes towards mobile information services: an empirical validation of the HED/UT scale

    van der Heijden, H. & Sangstad Sørensen, L., 2003, Proceedings of the European Conference on Information Systems (ECIS). Naples, Italy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Measuring SSL and SET against e-commerce consumer requirements

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - International Network Conference 2002 (INC 2002), University of Plymouth, UK, July 2002. p. 323-330 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Measuring the Beam Profile by Counting Ionization Electrons

    Sandberg, H., Bertsche, W., Bodart, D., Dehning, B., Gibson, S., Levasseur, S., Satou, K., Schneider, G., Storey, J. & Veness, R., 12 Sep 2019, 8th International Beam Instrumentation Conference 2019. Malmö, Sweden: JACoW Publishing, TUBO04

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Measuring the Effectiveness of Twitter's URL Shortener (t.co) at Protecting Users from Phishing and Malware Attacks

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 2. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Measuring Tourists’ Emotional Experiences: Extension and Further Validation of the Destination Emotion Scale

    Hosany, S., Prayag, G., Deesilatham, S. & Odeh, K., 2013, 44th TTRA Annual International Conference, Kansas City, Missouri, USA, June 20-22.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Mechanical characterisation of ancient Egyptian mortars

    Sanchez-Moral, S., Martinez-Martinez, J., Benavente, D., Cuezva, S. & Fernandez-Cortes, A., 2011, MATERIALS STRUCTURE MICROMECHANICS OF FRACTURE. Sandera, P. (ed.). LAUBLSRUTISTR 24, CH-8717 STAFA-ZURICH, SWITZERLAND: TRANS TECH PUBLICATIONS LTD, Vol. 465. p. 487-490 4 p. (Key Engineering Materials).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Median based method for baseline wander removal in photoplethysmogram signals

    Awodeyi, A. E., Alty, S. R. & Ghavami, M., 5 Feb 2014, Proceedings - IEEE 14th International Conference on Bioinformatics and Bioengineering, BIBE 2014. Institute of Electrical and Electronics Engineers Inc., p. 311-314 4 p. 7033598

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Meeting deadlines together

    Bocchi, L., Lange, J. & Yoshida, N., 26 Aug 2015, 26th International Conference on Concurrency Theory, CONCUR 2015. Aceto, L. & de Frutos Escrig, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 283-296 14 p. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 42).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Members’ Commitment in online health communities: THE CASE OF MEDICINEAFRICA: Research in Progress

    Panteli, A. & Chamakiotis, P., 2018, Members’ Commitment in online health communities: THE CASE OF MEDICINEAFRICA, .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Memory Access Pattern Protection for Resource-Constrained Devices

    Nakano, Y., Cid, C., Kiyomoto, S. & Miyake, Y., 2013, Proceedings of CARDIS 2012. Springer, Vol. 7771. p. 188-202 15 p. (Lecture Notes in Computer Science; no. 7771).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Memory Errors: the Past, the Present, and the Future

    van der Veen, V., dutt-Sharma, N., Bos, H. J. & Cavallaro, L., 12 Sep 2012, 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Memory-Based Learning of Morphology with Stochastic Transducers

    Clark, A., 2002, Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL). p. 513--520

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

    Ankele, R., Böhl, F. & Friedberger, S., 2018, ACNS 2018 Applied Cryptography & Network security. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 381-399 19 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    Mesh Messaging in Large-scale Protests: Breaking Bridgefy

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., 11 May 2021, (E-pub ahead of print) CT-RSA 2021. Springer, p. 375-398 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Metabolic engineering of the mevalonate and non-mevalonate pathways in tomato

    Enfissi, EM., Fraser, PD., Lois, LM., Boronat, A., Schuch, W. & Bramley, PM., 2003, ADVANCED RESEARCH ON PLANT LIPIDS. Murata, N., Yamada, M., Nishida, Okuyama, H., Sekiya, J. & Hajime, W. (eds.). DORDRECHT: Springer, p. 237-240 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Meta-Search Through the Space of Representations and Heuristics on a Problem by Problem Basis

    Fuentetaja, R., Barley, M., Borrajo, D., Douglas, J., Franco, S. & Riddle, P., 26 Apr 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI Press, p. 6169-6176 8 p. (32nd AAAI Conference on Artificial Intelligence, AAAI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Microbunch Instability Observations from a THz Detector at Diamond Light Source

    Shields, W., Bartolini, R., Boorman, G., Karataev, P., Lyapin, A., Puntree, J. & Rehm, G., 2012, IX INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2011). Potylitsyn, A. & Karataev, P. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Micron-scale Laser-wire at the ATF-II at KEK Commissioning and Results

    Nevay, L. J., Corner, L., Walczak, R., Blair, G., Boogert, S., Deacon, L. & Karataev, P., 1 Dec 2011, IPAC 2011 - 2nd International Particle Accelerator Conference. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Migration of He-3 impurities along dislocation lines in He-4 single crystals

    Rojas, X., Haziot, A. & Balibar, S., 2012, 26TH INTERNATIONAL CONFERENCE ON LOW TEMPERATURE PHYSICS (LT26), PTS 1-5. IOP PUBLISHING LTD, 4 p. (Journal of Physics Conference Series; vol. 400).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Military student assignment using NexClass decision support system

    Rigopoulos, G., 2016, MCSI 2016 Chania, Greece.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Millennial and century climate changes in the Colorado Alpine

    Elias, S., 2003, Climate Variability and Ecosystem Response. Greenland, D. (ed.). London: Oxford University Press, p. 370-383

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. E-pub ahead of print

    MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

    Albrecht, M., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T., 9 Nov 2016, (E-pub ahead of print) Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer, Vol. 10031. p. 191-219 29 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. E-pub ahead of print

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Ankele, R. & Kölbl, S., 13 Jan 2019, (E-pub ahead of print) Selected Areas in Cryptography 2018. Lecture Notes in Computer Science ed. Calgary, Canada: Springer, Vol. 11349. p. 163-190 28 p. (Lecture Notes in Computer Science; vol. 11349).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Mineralogy of Experimentally Heated Tagish Lake

    Nakato, A., Chan, QHS., Nakamura, T., Kebukawa, Y. & Zolensky, ME., Mar 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Minimal weight k-SR representations

    Han, Y., Gollmann, D. & Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 34-43 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Minimizing the Log Size for Execution Replay of Shared-Memory Programs

    Levrouw, L. J. & Audenaert, K., 1994, Parallel Processing, Proceedings of Conpar 94–VAPP VI. Springer, p. 76-87 (Lecture Notes in Computer Science; vol. 854).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Minimum description length estimators under the optimal coding scheme

    Vovk, V., 1995, Proceedings of the Second European Conference on Computational Learning Theory. Vitanyi, P. (ed.). Berlin: Springer, p. 237-251 (Lecture Notes in Computer Science; vol. 904).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Mining the biomedical literature to predict shared drug targets in DrugBank

    Caniza Vierci, H., Galeano Galeano, D. & Paccanaro, A., 2017, XLIII Conferencia Latinoamericana en Informática CLEI 2017. IEEE Xplore, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Mining the recent history of macromarketing thought: A visualization of ideas

    Reppel, A. & Kravets, O., 7 Jul 2016, Proceedings of the 41st Annual Macromarketing Conference. Dublin, Ireland, p. 465-468

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Unpublished

    Miracles, transformative moments and ‘A life’s work’: Exploring the intersection of individual and social identity

    Tzouramani, E., 2013, (Unpublished) 3rd Conference of Management, Spirituality and Religion, May 2013.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 53-66 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Mitigating CSRF attacks on OAuth 2.0 systems

    Li, W., Mitchell, C. J. & Chen, T. M., 1 Nov 2018, Proceedings of 2018 16th Annual Conference on Privacy, Security and Trust (PST): 28-30 Aug 2018. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Mitigation of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014). IEEE Computer Society Press, p. 478 483 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Mixability and the Existence of Weak Complexities

    Kalnishkan, Y. & Vyugin, M., 2002, Computational Learning Theory, 15th Annual Conference on Computational Learning Theory, COLT 2002, Proceedings: volume 2375 of Lecture Notes in Artificial Intelligence. Springer, p. 105-120 (Lecture Notes in Artificial Intelligence; vol. 2375).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Mixed Sneutrino Dark Matter and the Ratio Omega(b)/Omega(dm)

    West, S., 27 Oct 2006, Proceedings of SUSY06.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Mobile recommendation systems for decisions ‘on the go’

    van der Heijden, H., Kotsis, G. & Kronsteiner, R., 2005, Proceedings of the International Conference on Mobile Business (ICMB). Sydney, Australia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Mobile services for group decision support

    van Leeuwen, J. & van der Heijden, H., 2003, Proceedings of the 16th Bled Electronic Commerce conference. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Model checking for symbolic-heap separation logic with inductive predicates

    Brotherston, J., Gorogiannis, N., Kanovich, M. & Rowe, R., Jan 2016, POPL '16 Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM, p. 84-96 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Model Checking Recursive Programs with Numeric Data Types

    Hague, M. & Lin, A., 2011, CAV: Computer Aided Verification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Modelando el nicho ecológico de los bambúes leñosos (Bambuseae, Poaceae) en Bolivia: Implicaciones para la construcción de aerófonos autóctonos y la conservación de los bambúes musicales

    Hachmeyer, S., 2017, La rebelión de los objetos Cestería y Maderas: Anales de la reunión anual de etnología. La Paz: MUSEF, Vol. XXXI. p. 183-210

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Modeling And Detecting Anomalies In Scada Systems

    Svendsen, N. & Wolthusen, S. D., Mar 2008, Critical Infrastructure Protection II: Proc. Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 101-113

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model

    Nweke, L. O. & Wolthusen, S. D., 7 Aug 2020, 2020 IEEE Conference on Communications and Network Security, CNS 2020. Institute of Electrical and Electronics Engineers Inc., 6 p. 9162191. (2020 IEEE Conference on Communications and Network Security, CNS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution