Home > Publications

Publications

34501 - 34600 out of 38,489Page size: 100
  1. Conference contribution › Research
  2. Published

    Employee Share Ownership and Performance: re-estimation using WERS 2004

    Sen Gupta, S., Whitfield, K. & Pendleton, A., 2009, International Industrial Relations Association (IIRA), Sydney, Australia.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Employee share ownership design and organisational performance: Broad based versus narrow based schemes

    Sen Gupta, S. & Whitfield, K., 2009, British Academy of Management Conference (BAM), Cardiff - Best paper award.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Employee share Ownership in the United Kingdom and South Korea: Comparing the good and the bad days (recession versus boom)

    Sen Gupta, S. & Yoon, Y. J., 2015, Academy of Management Conference, Vancouver, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Unpublished

    Employee voice and employee engagement

    Rees, C. & Alfes, K., Mar 2012, (Unpublished) LSE/CIPD 'Voice and Value' Conference. London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Employee voice or vice: employee share ownership schemes and unions drawing on the 2011 WERS dataset

    Sen Gupta, S., 2013, Society for the Advancement of Socio Economics, Bocconi University Milano, Italy.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Unpublished

    Empowerment and ICTs: much more than IT skills

    Poveda Villalba, S., 2014, (Unpublished) Empowerment and ICTs: much more than IT skills. Department of Geography, Royal Holloway, University of London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Unpublished

    Empowerment through quality management: rhetoric or reality?

    Rees, C., Apr 1996, (Unpublished) Open University Business School Conference on 'HRM: The Inside Story'. Milton Keynes.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. E-pub ahead of print

    Enabling Robust and Efficient Distributed Computation in Dynamic Peer-to-Peer Networks

    Augustine, J., Pandurangan, G., Robinson, P., Roche, S. & Upfal, E., 17 Dec 2015, Foundations of Computer Science (FOCS), 2015 IEEE 56th Annual Symposium on. IEEE, p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Enabling virtual organisation in mobile worlds

    Komisarczuk, P., Bubendorfer, K. & Chard, K., 2004, 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on. p. 123-127 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Encoding the Factorisation Calculus

    Rowe, R., 27 Aug 2015, Proceedings of the Combined 22nd International Workshop on Expressiveness in Concurrency and the 12th Workshop on Structural Operational Semantics (EXPRESS/SOS 2015). Electronic Proceedings in Theoretical Computer Science, Vol. 190. p. 76-90 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Encouraging Self-Regulated Learning Through Electronic Portfolios

    Abrami, P., Pillay, V., Wade, A., Aslan, O., Bures, E. & Bentley, C., 2007, Proceedings from World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007. Bastiaens, T. & Carliner, S. (eds.). AACE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    End-to-end performance analysis for broadband island interconnection via satellite-RACE II/R2074 (Catalyst) project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1993, Satellite Communications-ECSC-3, 1993., 3rd European Conference on. p. 170-174 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    End-to-end protocol performance in ATM/satellite interconnected LANs

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F., Jeans, T. & Smythe, C., 1993, Broadband Services, Systems and Networks, 1993., Second International Conference on. p. 87-91 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    End-to-End Secure and Privacy Preserving Mobile Chat Application

    Akram, R. N. & Ko, R. K. L., 1 Jun 2014, Eighth Workshop in Information Security Theory and Practice (WISTP 2014). Naccache, D. & Sauveron, D. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Energy Modulation of Electron Beam in Corrugated Dielectric Waveguide

    Lyapin, A., Lekomtsev, K., Boogert, S., Gibson, S., Aryshev, A., Urakawa, J. & Tishchenko, A., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-3 3 p. WEPTS055

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Energy-efficient key distribution and revocation in tactical networks with asymmetric links

    Reidt, S. & Wolthusen, S. D., 18 Oct 2009, 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Enforcing Business Policies Through Automated Reconfiguration

    Andrade, L. F., Fiadeiro, J. L. & Wermelinger, M., 2001, ASE. IEEE Computer Society Press, p. 426-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Enforcing Mobile Application Security Through Probabilistic Contracts

    Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014.. Joosen, W., Martinelli, F. & Heyman, T. (eds.). CEUR-WS.org, Vol. 1298. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 2014, FAW 2014. (Lecture Notes in Computer Science; vol. 8497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Enhanced Bunch Monitoring by Interferometric Electro-Optic Methods

    Gibson, S., Arteche, A., Bashforth, S., Bosco, A., Krupa, M. & Lefevre, T., Jun 2018, 9th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 1-4 4 p. WEPAL073

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Enhanced Conformal Predictors for Indoor Localisation Based on Fingerprinting Method

    Nguyen, K. & Luo, Z., 2 Oct 2013, 9th IFIP International Conference on Artificial Intelligence Applications & Innovations (AIAI 2013). p. 411-420 10 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Forthcoming

    Enhanced Location Tracking for Tactical MANETs based on Particle Filters and Additional Information Sources

    Ebinger, P., Kuijper, A. & Wolthusen, S. D., Oct 2010, (Accepted/In press) Proc. 2012 Military Communications and Information Systems Conference. Piscataway, NJ, USA: IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Enhancing CardSpace Authentication Using a Mobile Device

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings. Li, Y. (ed.). Berlin: Springer-Verlag, Vol. 6818. p. 201-216 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Enhancing e-commerce security using GSM authentication

    Khu-smith, V. & Mitchell, C. J., 2003, -Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, p. 72-83 12 p. (Lecture Notes in Computer Science; vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K. & Mayes, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland: IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K., 20 Jul 2017, Radio Frequency Identification and IoT Security: RFIDSec 2016. Hancke, G. & Markantonakis, K. (eds.). Springer, p. 107-122 16 p. (Lecture Notes in Computer Science ; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. E-pub ahead of print

    Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

    Akram, R. & Markantonakis, K., 18 Nov 2015, 20th European Symposium on Research in Computer Security (ESORICS 2015). Ryan, P. Y. A. & Weippl, E. (eds.). Vienna, Austria: Springer, p. 541-560 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, The 35th Annual IEEE Conference on Local Computer Networks, LCN 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings. p. 152-159 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Enhancing student engagement through memes

    O'Brien, J., Apr 2018, Chartered Association of Business Schools: Learning, Teaching and Student Experience conference 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 13 May 2014, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Enhancing the security of cookies

    Khu-smith, V. & Mitchell, C. J., 2001, Information Security and Cryptology - ICISC 2001 - Proceedings of the 4th International Conference, Seoul, Korea, December 2001. Kim, K. (ed.). Springer-Verlag, p. 132-145 14 p. (Lecture Notes in Computer Science; no. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Enhancing the supply chain with composite materials: An analysis supported by IT tools in coach/bus manufacturing

    Coronado Mondragon, A. & Coronado Mondragon, C. E., 8 Jun 2017, Industrial Engineering and Applications (ICIEA), 2017 4th International Conference on. Nagoya, Japan: IEEE Xplore, p. 121-125 5 p. A022

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Enhancing User Authentication in Claim-Based Identity Management

    Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of CTS 2010, the 2010 International Symposium on Collaborative Technologies and Systems, 17-21 May 2010, Chicago, Illinois, USA. IEEE, p. 75-83 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Entanglement in systems of interacting harmonic oscillators

    Audenaert, K., Cramer, M., Eisert, J. & Plenio, M. B., 2006, Proc. 1st Intl. Conf. on “Quantum Computing: Back Action 2006”, Kanpur, India..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Enterprise fragmentation in the economic transition: repackaging assets from Czech state enterprises

    Clark, E., 1999, Enterprise in transition. Split: University of Split, p. 163-167 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Entrepreneurial capitalism and venture capital

    Chong, D., 2015, 9th Critical Management Studies Conference (Leicester: University of Leicester).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Entrepreneurial learning: past research and future challenges

    Wang, C. L. & Chugh, H., 2010, Babson College Entrepreneurship Research Conference .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Entrepreneurship, small family business and Yiwu's historical development

    Rui, H., 2018, International Conference of Family Business and Entrepreneurship, 2-4 May 2018, Bali, Indonesia . International Conference of Family Business and Entrepreneurship

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Enumerating highly non-soluble groups

    Klopsch, B., 2005, FINITE GROUPS 2003. BERLIN 30: WALTER DE GRUYTER, p. 219-227 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Unpublished

    Environmental Storytelling: A Digital Frontier for Narrative Geography

    Lowe, J., 29 Aug 2019, (Unpublished) Geographies of Interactive Digital Narratives session at RGS-IBG 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Epitaxial growing of refractory metal films by laser ablation deposition

    Mikhailov, G. M., Malikov, I. V., Chernikh, A. V. & Petrashov, V., 1996, IEEE/LEOS 1996 SUMMER TOPICAL MEETINGS - ADVANCED APPLICATIONS OF LASERS IN MATERIALS AND PROCESSING, DIGEST. NEW YORK: Elphinstone Institute, p. 56 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Equal amongst Unequals: Comparing the employee share ownership experiencein the UK and Korea

    Sen Gupta, S. & Yoon, Y. J., 2015, Society for the Advancement of Socio Economics, London School of Economics, London.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    Mitchell, C. J., 2005, Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings. Zhou, J., Lopez, J., R. H. D. & Bao, F. (eds.). Springer-Verlag, Vol. 3650. p. 244-258 15 p. (Lecture Notes in Computer Science; vol. 3650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. E-pub ahead of print

    Error Propagation after Reordering Attacks on Hierarchical State Estimation

    Gul, A. & Wolthusen, S., 18 Dec 2018, Proceedings of the Twelfth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Staggs, J. & Shenoi, S. (eds.). Springer-Verlag, p. 67-79 13 p. (IFIP Advances in Information and Communication Technology; vol. 542).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Escape from Time: Immortality and Reality in William Burroughs & Philip Dick

    Gene-Rowe, F., May 2014, Memories of the Future Conference. Senate House Library, London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    E-society barriers: Public and private divide for women returners to IT

    Panteli, N. & Cochliou, D., 2008, Proceedings of the IADIS International Conference on e-Society 2008. IADIS, p. 16-23 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

    Shepherd, C., Akram, R. & Markantonakis, K., 29 Aug 2017, 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware

    Hurier, M., Suarez de Tangil Rotaeche, G., Dash, S., Bissyandé, T., Le Traon, Y., Klein, J. & Cavallaro, L., 3 Jul 2017, Mining Software Repositories (MSR), 2017 IEEE/ACM 14th International Conference on. IEEE, p. 425-435 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    European Dissemination of the ultra-low temperature scale, PLTS-2000

    Rusby, R., Head, D., Cousins, D., Godfrin, H., Bunkov, Y. M., Rapp, R. E., Gay, F., Meschke, M., Lusher, C., Li, J., Casey, A., Shvarts, D., Cowan, B., Saunders, J., Mikheev, V., Pekola, J., Gloos, K., Hernandez, P., Triqueneaux, S., de Groot, M. & 14 others, Peruzzi, A., Jochemsen, R., Chinchure, A., van Heumen, E., de Groot, G. E., Bosch, W., Mathu, F., Flokstra, J., Veldhuis, D., Hermier, Y., Pitre, L., Verge, A., Fellmuth, B. & Engert, J., 2003, TEMPERATURE: ITS MEASUREMENT AND CONTROL IN SCIENCE AND INDUSTRY, VOL 7, PTS 1 AND 2. Ripple, DC. (ed.). MELVILLE: AMER INST PHYSICS, p. 89-94 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Evaluating IT readiness in Small Firms: A Survey of UK Manufacturing Firms

    Spinelli, R., Dyerson, R. & Harindranath, G., 1 Nov 2013, ISBE 2013, November, Cardiff.. 2013

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Jul 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. p. 1541-1546 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Evaluating Transferability of Japanese Organizational Culture

    Aboutalebi, R. & Ozaki, Y., 21 Jun 2014, In: AJBS (Association of Japanese Business Studies), 27th Annual Meeting of AJBS: Issues regarding Japanese business system. 21-22 June 2014, Westin Bayshore, Vancouver, Canada..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay

    Haken, G., Markantonakis, K., Gurulian, I., Shepherd, C. & Akram, R., 2 Apr 2017, Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security: CPSS '17. New York: ACM, p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Evaluation of Information Visibility Benefits Downstream in the Supply Chain: The Case of Finished Vehicle Transportation

    Coronado Mondragon, A. E. & Lalwani, C. S., 6 Jul 2008, Proceedings of the 13th International Symposium on Logistics (ISL 2008): Integrating the Global Supply Chain. Pawar, KS., Banomyong, R. & Lalwani, CS. (eds.). Nottingham, UK: Nottingham University Business School, Vol. 1. p. 37-44 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Event dissemination in mobile wireless sensor networks

    Taherian, S., O'Keeffe, D. & Bacon, J., 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Fort Lauderdale, FL, USA, October 25-27, 2004. p. 573-575 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Evolution of Terrestrial Ecosystems

    Elias, S., 2002, Encyclopaedia of Life Sciences. London: Nature Publishing Group, Vol. 6. p. 669-673

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Evolutionary algorithms with a coarse-to-fine function smoothing

    Yang, D. & Flockton, S. J., 1 Jan 1995, 1995 IEEE Conference on Evolutionary Computation (ICEC 95). IEEE, Vol. 2. p. 657-662 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Evolving specification engineering

    Pavlovic, D., Pepper, P. & Smith, D. R., 2008, Proceedings of AMAST 2008. Meseguer, J. & Rosu, G. (eds.). Springer-Verlag, Vol. 5140. p. 299-314 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Exact and approximate algorithms and their implementations in mixed graphical models

    Gammerman, A., Luo, Z., Aitken, C. & Brewer, M., 1995, Probabilistic Reasoning and Bayesian Belief Networks. Henley-on-Thames: Alfred Waller, p. 33-53

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking

    Moeckel, C., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19): 1st International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). Association for Computing Machinery (ACM), 93

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Examining the Contribution of Critical Visualisation to Information Security

    Hall, P., Heath, C., Coles-Kemp, L. & Tanner, A., 8 Sep 2015, Proceedings of NSPW 2015. ACM, p. 59-72 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Exchangeability and de Finetti's theorem: from probabilities to quantum-mechanical states

    Schack, R., 2004, Bayesian Inference and Maximum Entropy Methods in Science and Engineering: AIP Conference Proceedings Vol.~735. Fischer, R., Preuss, R. & von Toussaint, U. (eds.). Melville, New York: AIP Press, p. 565

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Execution Replay with Compact Logs for Shared-Memory Programs

    Levrouw, L., Audenaert, K. & Van Campenhout, J., 1994, Applications in Parallel and Distributed Computing.. Caracas: North-Holland, p. 125-134 (IFIP Transactions: Computer Science and Technology; vol. A-44).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Expansion and densification of cities: linking urban form to urban ecology

    Mohajeri, N., Gudmundsson, A. & Scartezzini, J., 2015, CISBAT 2015- Future Buildings and Districts - Sustainability from Nano to Urban Scale.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Experiences in Automated Workflow using Dialectical Argumentation

    Urovi, V., Bromuri, S., McGinnis, J., Stathis, K. & Omicini, A., 1 Jul 2007, Proceedings of Intelligent Systems and Agents International Conference (IADIS07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Experimental and numerical 2D analysis of hydraulic fracturing using high-power electric discharge

    Bazargan, M., Meredith, P., Forbes Inskip, N., Gudmundsson, A., Habibpour, M. & Mohammadi, R., 2015, 49th US Rock Mechanics / Geomechanics Symposium held in San Francisco, CA, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Experimental Elicitation of Risk Behaviour amongst Information Security Professionals

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 2015, Workshop on the Economics of Information Security . p. 1-55 55 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Experimental Results of a Compact Laserwire System for Non-Invasive H− Beam Profile Measurements at CERN's Linac4

    Gibson, S., Boorman, G., Bosco, A., Hofmann, T., Raich, U. & Roncarolo, F., Feb 2017, 5th International Beam Instrumentation Conference: 11-15 September 2016, Barcelona, Spain.. JACoW Publishing, p. 1-4 4 p. TUPG77

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Experiments on Persian weblogs

    Sheykh Esmaili, K., Jamali, M., Neshati, M., Abolhassani, H. & Soltan-Zadeh, Y., 2006, In Proceedings of the WWW06 Workshop on Web Intelligence.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. E-pub ahead of print

    Explaining Deep Learning Models with Constrained Adversarial Examples

    Moore, J., Hammerla, N. & Watkins, C., 23 Aug 2019, Pacific Rim International Conference on Artificial Intelligence. Springer, p. 43-56 14 p. (Lecture Notes in Computer Science; vol. 11670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Explaining innovation in healthcare: The elastic role of identity ambiguity and praxis mastery

    Jashapara, A., 2015, GSTF Proceedings of 5th Annual International Conference on Business Strategy & Asian Economic Transformation. Singapore: Global Science and Technology Forum

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Exploiting uncertain and temporal information in correlation

    Bigham, J. & Luo, Z., 1996, Proceedings of the 6th International Conference Information Processing and the Management of Uncertainty (IPMU-96).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Exploring Co-presence Enabled Collaboration in Social Computing Inspired Enterprise Systems

    Subramaniam, N., Nandhakumar, J. & Baptista, J., 2010, AIS electronic Library (AISeL). ICIS 2010 PROCEEDINGS, 141

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Exploring information ethics for inclusive open development

    Bentley, C., 2013, IFIP 9.4 12th International Conference on Social Implications of Computers in Developing Countries.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Exploring new and emerging applications of cognitive radio systems: Preliminary insights and framework

    Yau, K-L. A., Tan, F-A. G., Komisarczuk, P. & Teal, P. D., 2011, Humanities, Science and Engineering (CHUSER), 2011 IEEE Colloquium on. p. 153-157 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Exploring online crowd-funding innovation and opportunities for small businesses

    Kromidha, E., 23 Jun 2014, Proceedings of the 3rd International Conference on Innovation, Trade and Economics- ICITE 2014, June 22-23, 2014. Moscow, Russia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Exploring online crowdfunding innovation, networks and locations: Small businesses in Indiegogo.com

    Kromidha, E., 2014, 2014 ISBE Conference, 5-6 November 2014. Manchester, UK

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Exploring the association between organisational performance, employee attitudes and HRM practices in small firms

    Tsai, C-J., Edwards, P. & Sen Gupta, S., 2008, British Academy of management, Harrowgate.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Unpublished

    Exploring the Combined Potential of Critical Discourse Analysis, Framing Analysis and Semiotics. An Analysis of German Newspaper Representations of the ‘War on Terror’

    Van Efferink, L., 2015, (Unpublished) “Reframing Media/Cultural Studies” Conference, Communication and Media Research Institute (CAMRI), University of Westminster.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Exploring the development of an Internet of Things (IoT) environment for value generation in third-party logistics operations

    Coronado Mondragon, A., Coronado, C. E. & Coronado, E. S., 3 Jul 2016, Abstracts of papers presented at the 21st International Symposium on Logistics. Pawar, K. S. & Tsai, K. M. (eds.). Taiwan, p. 133 8 p. 144

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Exploring the Equifinality of Dynamic Capabilities: A Mixed Method Study of UK High-Tech SMEs

    Senaratne, P., Wang, C. L. & Sharma, M., 2015, European Academy of Management Annual Conference. Poland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Exploring the limits of single-iteration clarification dialogs

    Lin, J., Wu, P., Demner-Fushman, D. & Abels, E., 31 Oct 2006, Proceedings of the Twenty-Ninth Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. Vol. 2006. p. 469-476 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Exploring the nature of virtuality: An interplay of global and local interactions

    Panteli, N., Chiasson, M., Yan, L., Poulymenakou, A. & Papargyris, A., 2007, Virtuality and Virtualization: Proceedings of the International Federation of Information Processing Working Groups 8.2 on Information Systems and Organizations and 9.5 on Virtuality and Society. Crowston, K., Sieber, S. & Wynn, E. (eds.). Springer, p. 373-377 5 p. (IFIP International Federation for Information Processing; vol. 236).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Exploring the Role of Organisational Context and Work Flexibility in Perceiving Digital Technology Affordances: A Study of Knowledge Workers

    Hafezieh, N., Farivar, F. & Eshraghian, F., 2020, British Academy of Management Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Exploring the traces of fault-related microstructural damage at the Santorini caldera

    Drymoni, K., Browning, J., Mitchell, T. & Gudmundsson, A., 2017, AGU FALL MEETING 2017. T21C-1221

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. E-pub ahead of print

    Exploring Trade-offs in Batch Bounded Distance Decoding

    Albrecht, M., Curtis, B. & Wunderer, T., 10 Jan 2020, SAC 2019. Springer, p. 467-491 25 p. (Lecture Notes in Computer Science; vol. 11959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Exponentiation using Division Chains

    Walter, C. D., 1997, 13th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 92-97 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    ExpoSE: practical symbolic execution of standalone JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 13 Jul 2017, SPIN 2017 : Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software. ACM, p. 196–199 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Extended Computation Tree Logic (Extended Abstract)

    Alexsson, R., Hague, M., Kreutzer, S., Lange, M. & Latte, M., 2010, LPAR International Conference on Logic for Programming Artificial Intelligence and Reasoning.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. E-pub ahead of print

    Extended Functionality in Verifiable Searchable Encryption

    Alderman, J., Janson, C., Martin, K. & Renwick, S., 9 Jan 2016, Proceedings of the 2nd International Conference on Cryptography and Information Security in the Balkans - BalkanCryptSec 2015. Springer, Vol. 9540. p. 187-205 19 p. (Lecture Notes in Computer Science; vol. 9540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Extended privilege inheritance in RBAC

    Dekker, M., Cederquist, J. G., Crampton, J. & Etalle, S., 2007, Proceedings of 2007 ACM Symposium on Information, Computer and Communications Security. Bao, F. & Miller, S. (eds.). ACM Press, p. 383-385 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Extending B AMN with concurrency

    Lano, K., Fiadeiro, J. & Dick, J., 1996, ADVANCES IN THEORY AND FORMAL METHODS OF COMPUTING. Edalat, A., Jourdan, S. & McCusker, G. (eds.). LONDON: Imperial College Press, p. 228-239 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Extending EMV to support Murabaha transactions

    Al-Meaither, M. & Mitchell, C. J., 2003, NORDSEC 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems - Encouraging Cooperation, Gjøvik University College, Norway, October 2003. p. 95-108 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Extending EMV Tokenised Payments To Offline-Environments

    Jayasinghe, D., Markantonakis, K., Gurulian, I., Akram, R. & Mayes, K., 9 Feb 2017, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Extending the Scope of CardSpace

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. Orgun, M. A., Elci, A., Makarevich, O. B., Huss, S. A., Pieprzyk, J., Babenko, L. K., Chefranov, A. G. & Shankaran, R. (eds.). New York: ACM, p. 235-238 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Facilitating plausible deniability for cloud providers regarding tenants' activities using trusted execution

    O'Keeffe, D., Vranaki, A., Pasquier, T. & Eyers, D., 19 May 2020, Proceedings - 2020 IEEE International Conference on Cloud Engineering, IC2E 2020. Institute of Electrical and Electronics Engineers Inc., p. 59-65 7 p. (Proceedings - 2020 IEEE International Conference on Cloud Engineering, IC2E 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Facilitating program comprehension by mining association rules from source code

    Tjortjis, C., Sinos, L. & Layzell, P., 2003, 11th IEEE International Workshop on Program Comprehension, Portland, USA, May 2003. p. 125-132 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Facilities Services Contracts: The Search for Effective Contract Structures for Outsourcing Agreements in London Hospitals

    Jashapara, A., 2000, Proceedings of CIB W70 International Symposium on Facilities Management & Asset Maintenance. p. 447 454 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Failing with Style: Designing for Aesthetic Failure in Interactive Performance

    Hazzard, A., Greenhalgh, C., Kallionpaa, M., Benford, S., Veinberg, A., Kanga, Z. & McPherson, A., 2 May 2019, CHI '19 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Glasgow, Scotland, p. 1-13 13 p. 30

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Failure in the Design and Implementation of Government ICT Projects in Africa: A Complexity Theory Perspective

    Bernardi, R., 2007, IST-Africa 2007 Conference Proceedings. Cunningham, P. & Cunningham, M. (eds.). IIMC International Information Management Corporation

    Research output: Chapter in Book/Report/Conference proceedingConference contribution