Home > Publications

Publications

34501 - 34600 out of 39,421Page size: 100
  1. Conference contribution › Research
  2. Published

    A ‘We’ Identity ‘In Action’? Collective Consumption Via Competence Co‐Performance in Newly Cohabited Couples

    Khanijou, R., Cappellini, B. & Hosany, S., 2018, 51st Academy of Marketing Conference, Stirling, 2-5 July.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A 2-D Laser-wire Scanner at PETRA-III

    Aumeyr, T., Blair, G., Boogert, S., Boorman, G. & Bosco, A., 2010, Proceedings of IPAC'10, Kyoto, Japan. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    A Bayesian method with reparameterization for diffusion tensor imaging

    Zhou, D., Dryden, I. L., Koloydenko, A. & Li, B., 2008, Proceedings, SPIE conference. Medical Imaging. p. 69142J

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    A blended learning model for practical sessions

    Barreiro, N. & Pinto de Matos, C., 7 Nov 2016, Computer Science and Information Systems (FedCSIS), 2016 Federated Conference on. Gdansk: IEEE, p. 903-912 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    A board game for teaching internet engineering

    Komisarczuk, P. & Welch, I., 2006, Proceedings of the 8th Australasian Conference on Computing Education-Volume 52. p. 117-123 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks

    Askoxylakis, I. G., Sauveron, D., Markantonakis, K., Tryfonas, T. & Traganitis, A., 2008, Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies. Washington, DC, USA: IEEE Computer Society Press, p. 193-202 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    A Buddhist monks’ performance and a play, in the context of the Buddhist ritual event of giving

    Utairat, M., 2015, International Federation for Theatre Research (IFTR) 2015, Hyderabad, India .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published
  10. Published

    A case study on the usability of NXT-G programming language

    Nguyen, K. A., Sep 2011, 23rd Annual Conference in Psychology of Programming (PPIG). York, England, 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A Categorical Account of Replicated Data Types

    Gadducci, F., Melgratti, H., Roldán, C. & Sammartino, M., Dec 2019, 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2019. Chattopadhyay, A. & Gastin, P. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-15 15 p. 42. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 150).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    A client-side CardSpace-Liberty integration architecture

    Alrodhan, W. & Mitchell, C., 2008, IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA. ACM Press, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Forthcoming

    A closer look at adaptive regret

    Adamskiy, M., Koolen, W., Chernov, A. & Vovk, V., 2012, (Accepted/In press) Proceedings of the Twenty Third International Conference on Algorithmic Learning Theory. Bshouty, N., Stoltz, G., Vayatis, N. & Zeugmann, T. (eds.). Berlin: Springer, Vol. 7568. p. 290 - 304 15 p. (Lecture Notes in Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    A cluster-based approach to consensus based distributed task allocation

    Smith, D., Wetherall, J., Woodhead, S. & Adekunle, A., 2014, 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing. p. 428-431 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    A Coding-Theoretic Approach to Recovering Noisy RSA Keys

    Paterson, K., Polychroniadou, A. & Sibborn, D., 2012, ASIACRYPT 2012. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658. p. 386-403 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    A collaborative framework for generating probabilistic contracts

    Martinelli, F., Saracino, A., Sgandurra, D. & Aldini, A., 1 May 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS). p. 139-142 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    A combinatorial framework for frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M., 2014, Proceedings of the Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory. p. 271 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies

    Eagles, K., Markantonakis, K. & Mayes, K., 2007, Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems. Berlin, Heidelberg: Springer-Verlag, p. 161-174 14 p. (WISTP'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    A comparative analysis of online crowdfunding platforms in USA, Europe and Asia

    Kromidha, E., 2015, Proceedings of eChallenges e-2015 Conference, 25-26 November 2015. Vilnius, Lithuania, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    A Comparative GARCH Analysis of Macroeconomic Variables and Returns on FTSE 100 Implied Volatility Index Returns

    Alsheikhmubarak, A. & Giouvris, E., 13 Jul 2017, 43rd International Business Research Conference, Proceedings of : 13 - 15 July 2017, Ryerson University, Toronto, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    A Comparative GARCH Analysis of Macroeconomic Variables and Returns on FTSE 100 Implied Volatility Index Returns.

    Alsheikhmubarak, A. & Giouvris, E., 24 Jan 2018, International Business Academics Consortium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    A Comparative Study of Strategy Implementation Models

    Aboutalebi, R. & Tan, H., 11 Sep 2012, In: BAM (British Academy of Management), 26th Annual Conference of BAM: Management Research Revisited: Prospects for Theory and Practice. 11-13 September 2012, University of Cardiff, Cardiff, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    A comparison of differential optical absorption spectrometers for measurements of NO2, O3, SO2, and HONO

    Coe, H., Jones, R. L., Colin, R., Carleer, M., Harrison, R. M., Peak, J., Plane, J. M. C., Smith, N., Allan, B., Clemitshaw, K. C., Burgess, R. A., Platt, U., Etzkorn, T., Stutz, J., Pommereau, J. P., Goutail, F., NunesPinharanda, M., Simon, P., Hermans, C. & Vandaele, A. C., 1997, PROCEEDINGS OF EUROTRAC SYMPOSIUM '96 - TRANSPORT AND TRANSFORMATION OF POLLUTANTS IN THE TROPOSPHERE, VOL 2. SOUTHAMPTON: COMPUTATIONAL MECHANICS PUBLICATIONS LTD, p. 757-762 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    A comparison of social tagging designs and user participation

    Bentley, C. & Labelle, P., 2008, Proceedings from DC 2008: International Conference on Dublin Core and Metadata Applications. The Dublin Core Metadata Initiative, p. 205-205

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A comparison of the cryptographic requirements for digital secure speech systems operating at different bit rates

    Mitchell, C. J., 1984, International conference on Secure Communication Systems, IEE, London, 22-23rd February 1984. IEE Press, p. 32-37 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    A Comparison of Three Implementations of Multi-Label Conformal Prediction

    Wang, H., Liu, X., Nouretdinov, I. & Luo, Z., 3 Apr 2015, Statistical Learning and Data Sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 241-250 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    A Comparison of Venn Machine with Platt's Method in Probabilistic Outputs

    Zhou, C., Nouretdinov, I., Luo, Z., Adamskiy, M., Coldham, N. & Gammerman, A., 2011, 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, Artificial Intelligence Applications and Innovations 2011, Corfu, Greece, September 15-18, 2011, Proceedings , Part II. . p. 483-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Submitted

    A Complete Analysis of the BKZ Lattice Reduction Algorithm

    Li, J. & Nguyen, P. Q., 2020, (Submitted) TBC.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    A Completeness Theory for Polynomial (Turing) Kernelization

    Hermelin, D., Kratsch, S., Soltys, K., Wahlström, M. & Wu, X., 2013, IPEC. Springer, Vol. LNCS 8246. p. 202 215 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    A Compositional Approach to Connector Construction

    Lopes, A., Wermelinger, M. & Fiadeiro, J. L., 2001, WADT. Springer, Vol. 2267. p. 201-220 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    A Comprehensive Symbolic Analysis of TLS 1.3

    Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T., 30 Oct 2017, ACM SIGSAC Conference on Computer and Commuincations Security. ACM, p. 1773-1788 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Forthcoming

    A Conceptual Framework for Managing Expectations in Green IS Implementation

    Jackson, S. & Fearon, C., 17 Mar 2016, (Accepted/In press) 22nd IEEE International Technology Management Conference, Trondheim, Norway.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    A Conceptual Framework for Smartphone Security Among Arab Millennials

    Shah, M. & Ameen, N., 2019, UK Academy of Information Systems (UKAIS). p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    A Constructive Approach for Proving Data Structures’ Linearizability

    Lev-Ari, K., Chockler, G. & Keidar, I., 5 Nov 2015, Distributed Computing 29th International Symposium, DISC 2015 Tokyo, Japan, October 7–9, 2015 Proceedings. Moses, Y. (ed.). Springer-Verlag, Vol. 9363. p. 356–370 15 p. 97. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2009, Hannover, Germany, June 22-24, 2009. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    A contingency approach to entrepreneurial leadership: an exploratory case study of two Chinese private enterprises

    Wang, C. L., Tee, D. D. & Ahmed, P. K., 2011, 34th Annual Institute for Small Business and Entrepreneurship Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    A contract-based event driven model for collaborative security in financial information systems

    Baldoni, R., Lodi, G., Chockler, G., Dekel, E., Mulcahy, B. P. & Martufi, G., 2010, ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems. p. 147-153 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    A Cooperative Information System for the Connected Communities

    Pitt, J., Mamdani, E. & Stathis, K., 1 May 1998, Proceedings of COOP'98: Improving the Design of Cooperative Systems. Darses, F. & Zarate, P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    A cost bounded possibilistic ATMS

    Bigham, J., Luo, Z. & Banerjee, D., 1995, European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Lecture Notes in Computer Science . Froidevaux, C. & Kohlas, J. (eds.). Springer, Vol. 946. p. 52-59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    A cost bounded possibilistic ATMS

    Bigham, J., Luo, Z. & Banerjee, D., 1994, Proceedings of Expert Systems 94 . Bramer, M. A. & Macintosh, A. L. (eds.). p. 161-172

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    A criterion for the existence of predictive complexity for binary games

    Kalnishkan, Y., Vovk, V. & Vyugin, M. V., 2004, Proceedings of the Fifteenth International Conference on Algorithmic Learning Theory. Ben-David, S., Case, J. & Maruoka, A. (eds.). Heidelberg: Springer, Vol. 3244. p. 249-263 15 p. (Lecture Notes in Artificial Intelligence; vol. 3244).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. E-pub ahead of print

    A Critique of Game-Based Definitions of Receipt-Freeness for Voting

    Fraser, A., Quaglia, E. & Smyth, B., 26 Sep 2019, Provable Security : 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings. Springer, p. 189-205 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    A Cryptographic Analysis of the WireGuard Protocol

    Dowling, B. & Paterson, K. G., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer-Verlag, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    A cultural theory analysis of information systems adoption

    Jackson, S., 2010, AMCIS 2010: 16th Americas Conference on Information Systems: Sustainable IT Collaboration around the Globe, Lima, PE, 12 - 15 Aug .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    A device management framework for secure ubiquitous service delivery

    Leung, A. & Mitchell, C. J., 2008, Proceedings: the Fourth International Symposium on Information Assurance and Security (IAS 2008), Naples, Italy, September 2008. Los Alamitos, CA: IEEE Computer Society Press, p. 267-274 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    A dialectic architecture for computational autonomy

    Witkowski, M. & Stathis, K., 2004, Agents and computational autonomy: potential, risks, and solutions. Springer-Verlag, Vol. 2969. p. 261-273 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    A Distributed Treatment of Exceptions in Multiagent Contracts (Preliminary Report)

    Kafali, O. & Yolum, P., 2011, Proceedings of the 9th International Workshop on Declarative Agent Languages and Technologies (DALT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation

    Walter, C. D., 2012, CT-RSA. Dunkelman, O. (ed.). Springer, Vol. 7178. p. 84-97 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Sep 2010, 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 146-157 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins

    Zhang, Q., Markantonakis, K. & Mayes, K., 2007, A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins. China: Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    A Fair Biometric Enabled M-Payment Solution with Anonymity Support

    Zhang, Q., Mayes, K. & Markantonakis, K., 2005, A Fair Biometric Enabled M-Payment Solution with Anonymity Support. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    A FAST Front End Application

    Stathis, K., 1 Apr 1994, Proceedings of the 2nd International Conference on the Practical Applications of Prolog (PAP'94). Sterling, L. (ed.). p. 537-548 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    A Fast Glimpse of Knowledge-Based Front-Ends as Games

    Stathis, K. & Sergot, M. J., 1 Oct 1996, Proc. of 1st International Conference on Successes and Failures of Knowledge-Based Systems in Real World Applications. Batanov, D. & Brezillon, P. (eds.). Bangkok, Thailand: AIT Press, p. 19-33 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    A Faster Fixed-Parameter Approach to Drawing Binary Tanglegrams

    Böcker, S., Hüffner, F., Truss, A. & Wahlström, M., 2009, Parameterized and Exact Computation : 4th International Workshop, IWPEC 2009. Chen, J. & Fomin, F. V. (eds.). Copenhagen, Denmark: Springer, Vol. 5917. p. 38-49 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    A Fibre Coupled, Low Power Laserwire Emittance Scanner at CERN LINAC4

    Gibson, S., Boorman, G., Bosco, A., Kruchinin, K., Hofmann, T., Roncarolo, F., Pozimski, J., Gabor, C. & Letchford, A., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 3725-3728 4 p. THPME190

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    A flexible object-oriented system for teaching and learning structured IR

    de Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 2007, Proceedings of the First International Workshop on Teaching and Learning of Information Retrieval. London (UK), 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. E-pub ahead of print

    A Formal Model for Checking Cryptographic API Usage in JavaScript

    Mitchell, D. & Kinder, J., 15 Sep 2019, ESORICS'19: Proceedings of the 24th European Symposium on Research in Computer Security. Springer, Vol. 11735. p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    A formal transformation and refinement method for re-engineering concurrent programs

    Younger, E., Bennett, K. & Luo, Z., 1997, Proc of IEEE Inter. Conf. on Software Maintenance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    A four-element framework for research on the composite materials supply chain

    Mastrocinque, E., Coronado Mondragon, A. E. & Hogg, P., 16 Jun 2015, Engineering Technology, Engineering Education and Engineering Management: Proceedings of the International Conference on Engineering Technologies, Engineering Education and EngineeringManagement (ETEEEM 2014), Hong Kong, 15-16 November 2014. Tan, D. (ed.). CRC Press, p. 423-426 4 p. 94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. E-pub ahead of print

    A Framework for Cloud ERP System Implementation in Developing Countries: Learning from Lower Local Governments in Uganda

    Mpanga, D. & Elbanna, A., 19 May 2019, IFIP WG 8.6 Conference 2019. p. 274-292 19 p. (AICT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H., 2009, Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    A Framework for the Cryptographic Enforcement of Information Flow Policies

    Alderman, J., Crampton, J. & Farley, N., 7 Jun 2017, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 143-154 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. E-pub ahead of print

    A framework for understanding the empowerment effects of telecentres on rural communities in developing countries

    Kapondera, S. K., Bernadi, R. & Panteli, N., 26 Apr 2019, Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D: 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1–3, 2019, Proceedings, Part I. Nielsen, P. & Kimaro, H. C. (eds.). Springer, p. 104-115 12 p. (IFIP Advances in Information and Communication Technology; vol. 551).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    A Full Operational Semantics for Asynchronous Relational Networks

    Vissani, I., Lopez Pombo, C., Tutu, I. & Fiadeiro, J. L., 30 Dec 2015, Recent Advances in Algebraic Development Techniques. Springer, p. 131-150 20 p. (Lecture Notes in Computer Science; vol. 9463).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. E-pub ahead of print

    A Functional Perspective on Machine Learning via Programmable Induction and Abduction

    Cheung, S., Davariu, V., Ghica, D., Muroya, K. & Rowe, R., 24 Apr 2018, FLOPS 2018: Functional and Logic Programming. Springer, Vol. 10818. p. 84-98 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    A game of “Cut and Mouse”: bypassing antivirus by simulating user inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 9 Dec 2019, The Annual Computer Security Applications Conference (ACSAC). ACM, p. 456-465 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    A game of prediction with expert advice

    Vovk, V., 1995, Proceedings of the Eighth Annual Conference on Computational Learning Theory . Maass, W. (ed.). New York: ACM Press, p. 51-60

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Unpublished

    A Gender Agenda

    Broadbent, J., 2015, (Unpublished) Meditari Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    A Generic NFC-enabled Measurement System for Remote Monitoring and Control of Client-side Equipment

    Opperman, C. & Hancke, G., 2011, IEEE International Workshop on Near Field Communication . IEEE, p. 44-49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    A graph based architectural (re)configuration language

    Wermelinger, M., Lopes, A. & Fiadeiro, J. L., 1 Jan 2001, 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2001. p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs

    Bilal, Z. & Martin, K. M., 2014, Foundations and Practice of Security. Springer, Vol. 8352. p. 291-305 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    A High Power Fibre Laser for Electron Beam Emittance Measurements

    Corner, L., Nevay, L. J. & Walczak, R., 1 Dec 2010, IPAC 2010 - 1st International Particle Accelerator Conference. p. 3227-3229 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    A Holistic Approach to Simulating Beam Losses in the Large Hadron Collider Using BDSIM

    Walker, S., Abramov, A., Boogert, S., Garcia Morales, H., Gibson, S., Nevay, L., Pikhartova, H. & Shields, W., 4 May 2019, 13th International Computational Accelerator Physics Conference: ICAP2018, Key West, FL, USA. JACoW Publishing, p. 221-226 6 p. TUPAF15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    A Hybrid Model for International Strategy Implementation

    Aboutalebi, R. & Tan, H., 23 Jun 2014, In: AIB (Academy of International Business), 56th annual conference of AIB: International Business, Local Contexts in Global Business. 23-26 June 2014, Beedie School of Business, Simon Fraser University, Vancouver, Canada..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    A knowledge management perspective on a corporate portal implementation: A case study of a global IT-management consultancy firm

    Le Nguyen, K., Harindranath, G. & Dyerson, R., 2008, Proceedings of the 2008 European Conference on Information Systems (ECIS), Galway, Ireland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    A Lambek Calculus with Dependent Types

    Luo, Z., 2015, Types for Proofs and Programs.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    A learnable representation for syntax using residuated lattices

    Clark, A., 2009, Proceedings of the Conference on Formal Grammar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    A Lightweight Service Registry for Unstable Ad-hoc Networks

    Goncalves, P., Stathis, K. & Peach, N., 16 Nov 2011, Proceedings of the International Joint Conference on Ambient Intelligence (AmI 2011). p. 136-140 (Lecture Notes in Computer Science; vol. 7040/2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. E-pub ahead of print

    A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts

    Karafili, E., Sgandurra, D. & Lupu, E., 24 Nov 2018, 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, p. 73-87 15 p. (Lecture Notes in Computer Science; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    A long-range self-similarity approach to segmenting DJ mixed music streams

    Scarfe, T., Koolen, W. M. & Kalnishkan, Y., 2013, Artificial Intelligence Applications and Innovations: Proceedings of the 9th IFIP WG 12.5 International Conference, AIAI 2013, Paphos, Cyprus, September 30 – October 2, 2013. Papadopoulos, H., Andreou, A. S., Iliadis, L. & Maglogiannis, I. (eds.). Springer, p. 235-244 10 p. (IFIP Advances in Information and Communication Technology; vol. 412).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    A methodological approach to visual reasoning

    Liu, X., Zhang, G. & Luo, Z., 1989, Proceeding of International workshop on industrial applications of machine intelligence and vision. Japan, p. 50-55

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Unpublished

    A micromorphological assessment of Lateglacial Swedish clay varves from Svinstadsjön, Östergötland – understanding proglacial lake processes and refining a site varve chronology

    Devine, R., 2018, (Unpublished) Conference abstract - Poster presentation.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    A Middleware Framework for Robust Applications in Wireless Ad Hoc Networks

    Chockler, G., Demirbas, M., Gilbert, S. & Newport, C., Sep 2005, Proceeding of the 43rd Allerton Conference on Communication, Control, and Computing. Curran Associates

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    A mobile phone based personal narrative system

    Black, R., Waller, A., Tintarev, N., Reiter, E. & Reddington, J., 2011, The proceedings of the 13th international ACM SIGACCESS conference on Computers and accessibility. p. 171-178 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation

    Baiocco, A., Foglietta, C., Panzieri, S. & Wolthusen, S. D., 19 May 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

    Davidson, A., Fenn, G. & Cid, C., 24 Oct 2016, WISCS '16 Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    A Modular Hierarchy of Logical Frameworks

    Adams, R., 2004, Types for Proofs and Programs. Berardi, S., Coppo, M. & Damiani, F. (eds.). Springer, Vol. 3085. p. 1-16 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    A multi-agent based management system for future ATM networks

    Hayzelden, A., Bigham, J. & Luo, Z., 1999, Proceedings of the Fourth International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agents (PAAM'99). p. 179-192

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    A multi-agent based management system for service provider negotiation and charging

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 1999, Proceedings of IFIP TC6 Workshop.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    A Multi-Robot Platform for the Autonomous Operation and Maintenance of Offshore Wind Farms

    Bernardini, S., Jovan, F., Jiang, Z., Watson, S., Weightman, A., Moradi, P., Richardson, T., Sadeghian, R. & Sareh, S., May 2020, International Conference on Autonomous Agents and Multi-Agent Systems 2020 . p. 1696-1700 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    A Multivocal and Multilevel Institutionalist Perspective to Analyse Information Technology Enabled Change in the Public Service in Africa

    Bernardi, R., 2008, IT in the Service Economy: Challenges and Possibilities for the 21st Century: IFIP International Federation for Information Processing. Barrett, M., Davidson, E., Middleton, C. & DeGross, J. (eds.). Boston: Springer, Vol. 267. p. 271-280

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    A New Approach to Modelling Centralised Reputation Systems

    Garms, L. & Quaglia, E., 29 Jun 2019, Progress in Cryptology – AFRICACRYPT 2019: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings. Springer, p. 429-447 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    A New Efficient In Situ Sampling Model for Heuristic Selection in Optimal Search

    Franco, S., Barley, M. W. & Riddle, P. J., 2013, AI 2013: Advances in Artificial Intelligence : 26th Australasian Joint Conference, Dunedin, New Zealand, December 1-6, 2013. Proceedings. Cranefield, S. & Nayak, A. C. (eds.). Springer, p. 178-189 12 p. (Lecture Notes in Computer Science; vol. 8272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    A new look at user commitment towards information systems: Evidence from Amazon’s Mechanical Turk

    van der Heijden, H., 2012, Proceedings of the European Conference on Information Systems (ECIS). Barcelona, Spain

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    A new model to explain the occurrence of volcanism along caldera ring faults

    Browning, J. & Gudmundsson, A., 2014, The Volcanic and Magmatic Studies Group Proceedings 2014. Vol. VMSG 2014 A.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

    Razouk, W., Sgandurra, D. & Sakurai, K., 17 Oct 2017, International Conference on Internet of Things and Machine Learning. ACM, p. 1-8 8 p. 35

    Research output: Chapter in Book/Report/Conference proceedingConference contribution