Home > Publications

Publications

34501 - 34600 out of 39,043Page size: 100
  1. Conference contribution › Research
  2. Published

    Aperture Measurements with AC Dipole at the Large Hadron Collider

    Fuster-Martinez, N., Bruce, R., Dilly, J., Maclean, E., Persson, T., Redaelli, S., Tomás, R. & Nevay, L., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 212-215 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Aug 2009, The 10th International Workshop on Information Security Applications (WISA09). YOUM, H. Y. & Yung, M. (eds.). Busan, Korea: Springer, Vol. 5932/2009. p. 20-35 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Application of conformal predictors to tea classification based on electronic nose

    Nouretdinov, I., Li, G., Gammerman, A. & Luo, Z., 2010, Artificial Intelligence Applications and Innovations. Springer, p. 303-310

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008. p. 1426-1432 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    APPLICATION OF GENETIC ALGORITHMS TO INFINITE IMPULSE-RESPONSE ADAPTIVE FILTERS

    FLOCKTON, S. J. & WHITE, M. S., 1993, SCIENCE OF ARTIFICIAL NEURAL NETWORKS II. Ruck, DW. (ed.). BELLINGHAM: SPIE - INT SOC OPTICAL ENGINEERING, p. 414-419 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Application of Inductive Confidence Machine to ICMLA competition data

    Nouretdinov, I., Burford, B. & Gammerman, A., 2009, Proceedings of The Eighth International Conference on Machine Learning and Applications. p. 435-438 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Application of optical diffraction radiation to a non-invasive low-emittance high-brightness beam diagnostics

    Karataev, P., Hamatsu, R., Muto, T., Araki, S., Hayano, H., Urakawa, J., Naumenko, G., Potylitsyn, A. & Hirose, T., 2004, QUANTUM ASPECTS OF BEAM PHYSICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 111-118 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Applications of reinforcement learning to cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Workshops (ICC), 2010 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Applications of the oriented permission role-based access control model

    Crampton, J. & Chen, L., 2007, Proceedings of the 26th IEEE International Performance Computing and Communications Conference. IEEE Computer Society Press, p. 387-394 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Applying Conformal Prediction to the Bovine TB Diagnosing

    Adamskiy, M., Nouretdinov, I., Mitchell, A., Coldham, N. & Gammerman, A., 2011, 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, Artificial Intelligence Applications and Innovations 2011, Corfu, Greece, September 15--18, 2011, Proceedings , Part II. . p. 449-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Applying hierarchial and role-based access control to XML documents

    Crampton, J., 2004, Proceedings of 2004 ACM Workshop on Secure Web Services. ACM Press, p. 37-46 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Approaches to integration of uncertain and temporal information in diagnostic reasoning

    Bigham, J., Luo, Z., Cayrac, D., Nordbo, I. & Bouyssounous, B., 1994, Proceedings of Information Processing and the Management of Uncertainty in Knowledge Based Systems. p. 250-255

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. E-pub ahead of print

    Approximation algorithms for general cluster routing problem

    Zhang, X., Du, D., Gutin, G., Ming, Q. & Sun, J., 27 Aug 2020, Computing and Combinatorics : 26th International Conference, COCOON 2020, Atlanta, GA, USA, August 29–31, 2020, Proceedings. Kim, D., Uma, R. N., Cai, Z. & Lee, D. H. (eds.). Springer, p. 472-483 12 p. (Lecture Notes in Computer Science; vol. 12273).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    APRIL: Interactively Learning to Summarise by Combining Active Preference Learning and Reinforcement Learning

    Gao, Y., Meyer, C. M. & Gurevych, I., 31 Oct 2018, Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. Brussels, Belgium: Association for Computational Linguistics, p. 4120-4130 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Architectural Handling of Management Concerns in Service-Driven Business Processes

    Al-Ghamdi, A. & Fiadeiro, J. L., 2006, MSVVEIS. INSTICC Press, p. 111-120 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Architecture Migration driven by Code Categorization

    Correia, R., Matos, C., Heckel, R. & El-Ramly, M., 2007, Proceedings of the European Conference on Software Architecture (ECSA). Oquendo, F. (ed.). Springer-Verlag, Vol. 4758. p. 115-122 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Architecture of the ATLAS online physics-selection software at LHC

    Armstrong, S., Baines, J. T., Bee, C. P., Biglietti, M., Bogaerts, A., Boisvert, V., Bosman, M., Brandt, S., Caron, B., Casado, P., Cataldi, G., Cavalli, D., Cervetto, M., Comune, G., Corso-Radu, A., Di Mattia, A., Gomez, M. D., dos Anjos, A., Drohan, J., Ellis, N. & 58 others, Elsing, M., Epp, B., Etienne, F., Falciano, S., Farilla, A., George, S., Ghete, V., Gonzalez, S., Grothe, M., Kaczmarska, A., Karr, K., Khomich, A., Konstantinidis, N., Krasny, W., Li, W., Lowe, A., Luminari, L., Ma, H., Meessen, C., Mello, A. G., Merino, G., Morettini, P., Moyse, E., Nairz, A., Negri, A., Nikitin, N., Nisati, A., Padilla, C., Parodi, F., Perez-Reale, V., Pinfold, J. L., Pinto, P., Polesello, G., Qian, Z., Rajagopalan, S., Resconi, S., Rosati, S., Scannicchio, D. A., Schiavi, C., Schoerner-Sadenius, T., Segura, E., de Seixas, J. M., Shears, T., Sivoklokov, S., Smizanska, M., Soluk, R., Stanescu, C., Tapprogge, S., Touchard, F., Vercesi, V., Watson, A., Wengler, T., Werner, P., Wheeler, S., Wickens, F. J., Wiedenmann, W., Wielers, M. & Zobernig, H., 2004, ASTROPARTICLE, PARTICLE AND SPACE PHYSICS , DETECTORS AND MEDICAL PHYSICS APPLICATIONS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 255-259 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Are Dynamic Capabilities Idiosyncratic? A Mixed Method Study of UK High-Tech SMEs

    Senaratne, P., Wang, C. L. & Sarma, M., 2015, British Academy of Management Annual Conference. Portsmouth

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Are We Compromised? Modelling Security Assessment Games

    Pham, V. & Cid, C., Nov 2012, Decision and Game Theory for Security - Third International Conference, GameSec 2012. Springer, p. 234-247 14 p. (Lecture Notes in Computer Science - LNCS; vol. 7638).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Arguing over Motivations within the V3A-Architecture for Self-Adaptation

    Morge, M., Stathis, K. & Vercouter, L., 2009, ICAART 2009: Proceedings of the International Conference on Agents and Artificial Intelligence. SETUBAL: INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL, p. 214-219 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Argumentation accelerated reinforcement learning for cooperative multi-agent systems

    Gao, Y. & Toni, F., 18 Aug 2014, ECAI'14 Proceedings of the Twenty-first European Conference on Artificial Intelligence. IOS Press, p. 333-338 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Argumentation sur les motivations propres dans l'architecture V3A pour des agents auto-adaptatifs

    Morge, M., Stathis, K. & Vercouter, L., 2008, Actes des 16ème Journées Francophones sur les Systèmes Multi-Agen ts (JFSMA). France: Cepudes

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Argumentation-Based Multi-Agent Decision Making with Privacy Preserved

    Gao, Y., Toni, F., Wang, H. & Xu, F., 9 May 2016, Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, p. 1153-1161 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Ariosto o Boiardo? Giovan Battista Giraldi Cinzio critico dell’Orlando furioso

    Jossa, S., 2011, Volteggiando in su le carte. Ludovico Ariosto e i suoi lettori. Garavelli, E. (ed.). University of Helsinki Press, p. 45-72 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Art, finance, politics, and the art museum as a public institution

    Chong, D., 2018, Market orientation of cultural institutions (University of Borås).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K., 29 Aug 2017, ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 1-10 10 p. 5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Artistic versus the commercial logics: A comparitive analysis of the UK and Indian creative and media industry

    Sen Gupta, S., 2011, Society for the Advancement of Socio Economics, Madrid Spain.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Sep 2013, ESORICS 2013. Springer, Vol. 8134. p. 381-399 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Aspects of terrorism and martyrdom: Seminar one - What roles are played by religious beliefs and identity in supporting views of violent activists as terrorists or martyrs?

    Cinnirella, M., Ansari, H., Rogers, M. B., Lewis, C. A. & Loewenthal, K. M., 2006, Proceedings of the British Psychological Society Seminar Series Aspects of Terrorism and Martyrdom. Rogers, M. B., Lewis, C. A., Loewenthal, K. M., Cinnirella, M., Amlot, R. & Ansari, H. (eds.). (eCOMMUNITY: International Journal of Mental Health & Addiction).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Aspects of terrorism and martyrdom: Seminar three - Exploring organisational contributory factors and socio-religious outcomes of terrorism and martyrdom

    Cinnirella, M., Ansari, H., Lewis, C. A., Rogers, M. B., Amlot, R. & Loewenthal, K. M., 2006, Proceedings of the British Psychological Society Seminar Series Aspects of Terrorism and Martyrdom. (eCOMMUNITY: International Journal of Mental Health & Addiction).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Assessing Electronic Portfolios -- Now that we have them, what can we do with them?

    Bures, E. & Bentley, C., 2007, Proceedings from World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007. Bastiaens, T. & Carliner, S. (eds.). AACE, p. 7030-7038

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Asymmetric Sneutrino Dark Matter

    West, S., 13 May 2006, 41st Rencontres de Moriond on Electroweak Interactions and Unified Theories.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Asymptotic optimality of transductive confidence machine

    Vovk, V., 2002, Lecture Notes in Articial Intelligence. Vol. 2533. p. 336-350 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Asynchronous Binary Byzantine Consensus over Graphs with Power Law Degree Sequence

    Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 263 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs

    Weldehawaryat, G. & Wolthusen, S. D., 2013, Proceedings of the 2013 IEEE 2nd International Workshop on Network Science (NSW 2013). IEEE Computer Society Press, p. 9-15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Attacks on time-of-flight distance bounding channels

    Hancke, G. P. & Kuhn, M. G., 2008, Proceedings of the first ACM conference on Wireless network security. New York, NY, USA: ACM, p. 194-202 9 p. (WiSec '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS

    Garman, C., Paterson, K. & Van Der Merwe, T., Aug 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 113-128 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Attainment, ability and adjustment in a metropolitan setting. I: The prevalence of...

    Berger, M. & Yule, W., 1972, Conference, Nottingham.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Attribute Expressions, Policy Tables and Attribute-Based Access Control

    Crampton, J. & Williams, C., 7 Jun 2017, SACMAT'17: Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. ACM Press, p. 79-90 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Attribute-Based Encryption for Access Control Using Elementary Operations

    Crampton, J. & Pinto, A., 2014, 27th Computer Security Foundations Symposium. IEEE, p. 125-139

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Unpublished

    Audience familiarity and children's understanding of disclaimers

    Watling, D. & Nesbit, R., 2015, (Unpublished) Audience familiarity and children's understanding of disclaimers.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    AudioNode : Prototypical Affective Modelling in Experience-driven Procedural Music Generation

    Plans, E., Morelli, D. & Plans, D., 28 Jun 2015, COMPUTATIONAL CREATIVITY & GAMES WORKSHOP.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Authenticated-Encryption with Padding: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J., 2012, Cryptography and Security. Naccache, D. (ed.). Springer, Vol. 6805. p. 83-107 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Authorization and Certificates: Are We Pushing When We Should Be Pulling?

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of IASTED Conference on Network and Information Security. p. 62-66 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Authorization recycling in RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication

    Cremers, C., Horvat, M., Scott, S. & Van Der Merwe, T., 18 Aug 2016, IEEE Symposium on Security and Privacy 2016. p. 470-485 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Automated Debugging for Arbitrarily Long Executions

    Zamfir, C., Kasikci, B., Kinder, J., Bugnion, E. & Candea, G., May 2013, Proc. 14th Workshop on Hot Topics in Operating Systems (HotOS 2013). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. E-pub ahead of print

    Automated peripheral neuropathy assessment of diabetic patients using optical imaging and binary processing techniques

    Siddiqui, H. U. R., Alty, S. R., Spruce, M. & Dudley, S. E., 14 Feb 2013, IEEE EMBS Special Topic Conference on Point-of-Care (POC) Healthcare Technologies: Synergy Towards Better Global Healthcare, PHT 2013. p. 200-203 4 p. 6461319

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Automated Planning for Urban Traffic Management

    McCluskey, T. L., Vallati, M. & Franco, S., 2017, Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, IJCAI 2017, Melbourne, Australia, August 19-25, 2017. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 5238-5240 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Automated Semmes Weinstein monofilament examination replication using optical imaging and mechanical probe assembly

    Siddiqui, H. U. R., Spruce, M., Alty, S. R. & Dudley, S., 21 Jul 2015, 2015 IEEE 12th International Symposium on Biomedical Imaging, ISBI 2015. IEEE Computer Society, Vol. 2015-July. p. 552-555 4 p. 7163933

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Automated taxonomy extraction from semantic business process models

    De Cesare, S., Juric, D. & Lycett, M., 7 Mar 2016, Proceedings of the 49th Annual Hawaii International Conference on System Sciences, HICSS 2016. IEEE Computer Society, Vol. 2016-March. p. 4394-4403 10 p. 7427732

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Automated Transformation of PDDL Representations

    Riddle, P. J., Barley, M. W., Franco, S. & Douglas, J., 14 May 2015, Proceedings of the Eighth Annual Symposium on Combinatorial Search, SOCS 2015: 11-13 June 2015, Ein Gedi, the Dead Sea, Israel. Lelis, L. & Stern, R. (eds.). AAAI Press, p. 214-215 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Automated Workflows using Dialectical Argumentation

    McGinnis, J., Bromuri, S., Urovi, V. & Stathis, K., 1 May 2007, German e-Science Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Automatic cyclic termination proofs for recursive procedures in separation logic

    Rowe, R. & Brotherston, J., 16 Jan 2017, CPP 2017 Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs. ACM, p. 53-65 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Automatic path generation for multirotor descents through varying air masses above Ascension Island

    Greatwood, C., Richardson, T., Freer, J., Thomas, R., Brownlow, R., Lowry, D., Fisher, R. E. & Nisbet, E. G., 2016, AIAA Atmospheric Flight Mechanics Conference. American Institute of Aeronautics and Astronautics Inc, AIAA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Automating Malware Scanning Using Workflows

    Stirling, D., Welch, I., Komisarczuk, P. & Seifert, C., 2009, 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009. p. 562-567 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    AutoPass: An automatic password generator

    Al Maqbali, F. & Mitchell, C. J., 7 Dec 2017, 2017 International Carnahan Conference on Security Technology (ICCST): Proceedings. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Avoiding key redistribution in key assignment schemes

    Rowe, H. & Crampton, J., 2007, Proceedings of the Fourth International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. p. 127-140 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    Rizzo, C., Cavallaro, L. & Kinder, J., 2018, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018). Springer, p. 25-46 22 p. (Lecture Notes in Computer Science (LNCS); vol. 11050).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Back to basics: Sharing goals and developing trust in global virtual teams

    Tucker, R. & Panteli, N., 2003, IFIP Advances in Information and Communication Technology. Springer New York LLC, Vol. 126. p. 85-98 14 p. (IFIP Advances in Information and Communication Technology; vol. 126).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Backoff protocols for distributed mutual exclusion and ordering

    Chockler, G., Malkhi, D. & Reiter, M. K., 1 Jan 2001, Proceedings of the 21st IEEE International Conference on Distributed Computing Systems (ICDCS '01). p. 11-20 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Ballistic impact of composite laminates: Experiments and simulations

    Guild, F. J., El-Habti, M. & Hogg, P. J., 1 Dec 2007, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Bank Mergers’ Risks: the Macro and Micro Prudential approaches and their determinants

    Hassan, M. & Giouvris, E., 18 Jun 2019, The 12th International Risk Management Conference. Altman, E., Brenner, M., Dalocchio, M. & Gabbi, G. (eds.). Italy: The Risk, Banking and Finace Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Bark beetle fossils from two early post-glacial age sites at high altitude in the Colorado Rocky Mountains

    Elias, S., 1982, Journal of Paleontology: 1982 North American Paleontological Convention Proceedings Volume . Vol. 1. p. 53-57

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Barriers to Absorptive Capacity and Capability Upgrading in Developing Country Multinationals

    Cuervo-Cazurra, A. & Rui, H., 2013, Proceedings of the 55th Annual Meeting of the Academy of International Business: "Bridging the Divide: Linking IB to Complementary Disciplines and Practice". McDougall-Covin, P. & Kiyak, T. (eds.). 2013 Academy of International Business, p. 263 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Basin-scale salt tectonic processes of the Laurentian Basin, Eastern Canada: insights from integrated regional 2D seismic interpretation and 4D physical experiments

    Adam, J. & Krezsek, C., 2012, Salt tectonics, Sediments and Prospectivity. Alsop, G. I., Archer, S. G., Grant, N. T. & Hodgkinson, R. (eds.). Geological Society of London Special Publication, Vol. 363. p. 331 360 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Bayesian probability in quantum mechanics

    Schack, R., 2007, Bayesian Statistics 8: Proceedings of the Eighth Valencia International Meeting. Bernardo, J. M., Bayarri, M. J., Berger, J. O., Dawid, A. P., Heckerman, D., Smith, A. F. M. & West, M. (eds.). Oxford: Oxford University Press, p. 453-464

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Bayesian versus frequentist predictions in quantum tomography

    Schack, R., 2007, Foundations of Probability and Physics 4: AIP Conference Proceedings Vol.~889. Adenier, G., Fuchs, C. A. & Khrennikov, A. (eds.). Melville, New York: American Institute of Physics, p. 230-234

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    BBOB: Nelder-Mead with resize and halfruns

    Doerr, B., Fouz, M., Schmidt, M. & Wahlström, M., 2009, Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference (GECCO 2009). Rothlauf, F. (ed.). Montreal, Québec, Canada: ACM, p. 2239-2246 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    BDSIM: Recent Developments and New Features Beyond V1.0

    Nevay, L., Abramov, A., Joshua, A., Alden, S., Boogert, S., Garcia Morales, H., Gibson, S., Shields, W., Walker, S. & Snuverink, J., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPTS058

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Beam Delivery Simulation - Recent Developments and Optimization

    Snuverink, J., Boogert, S., Garcia Morales, H., Gibson, S., Kwee-Hinzmann, R., Nevay, L. & Deacon, L., Jun 2015, 6th International Particle Accelerator Conference: IPAC2015, Richmond, VA, USA. JACoW Publishing, p. 499-501 3 p. MOPJE078

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Beam Delivery Simulation (BDSIM): A Geant4 Based Toolkit for Diagnostics and Loss Simulation

    Boogert, S., Gibson, S., Kwee-Hinzmann, R., Nevay, L., Snuverink, J. & Deacon, L., 19 Sep 2013, 2nd International Beam Instrumentation Conference: 16-19 September 2013, Oxford, UK. p. 799-802 4 p. WEPC46

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Beam Delivery Simulation: BDSIM - Automatic Geant4 Models of Accelerators

    Nevay, L., Boogert, S., Garcia Morales, H., Gibson, S., Kwee-Hinzmann, R., Shields, W., Snuverink, J. & Deacon, L., Jun 2016, 7th International Particle Accelerator Conference: May 8-13, 2016, Busan, Korea. JACoW Publishing, p. 1-3 3 p. WEPOY046

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Beam Delivery Simulation: BDSIM - Development & Optimisation

    Nevay, L., Boogert, S., Garcia Morales, H., Gibson, S., Kwee-Hinzmann, R. & Deacon, L., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 182-184 3 p. MOPRO045

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Beam Induced Background Simulation Studies at IR1 with New High Luminosity LHC Layout

    Kwee-Hinzmann, R., Gibson, S., Bruce, R., Cerutti, F., Esposito, L. & Lechner, A., Jun 2015, 6th International Particle Accelerator Conference: IPAC2015, Richmond, VA, USA. JACoW Publishing, p. 2184-2187 4 p. TUPTY067

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Beam loss monitoring in the ISIS synchrotron main dipole magnets

    Harryman, D., Sep 2018, International Beam Instrumentation Conference 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Beam Measurements at the CERN SPS Using Interferometric Electro-Optic Pickups

    Arteche, A., Bashforth, S., Bosco, A., Gibson, S., Krupa, M. & Lefevre, T., 12 Sep 2019, 8th International Beam Instrumentation Conference 2019. Malmö, Sweden: JACoW Publishing, 3 p. WEAO04

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Beam test proposal of an ODR beam size monitor at SLAC FFTB

    Fukui, Y., Cline, D., Zhou, F., Ross, M., Bolton, P., Urakawa, J., Tobiyama, M., Muto, T., Karataev, P., Aryshev, A., Hamatsu, R., Potylitsyn, A., Naumenko, G. & Sharafutdinov, A., 2005, IEEE. p. 1922-1924 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Beam-Gas Background Observations at LHC

    Gibson, S. & LHC Background Study Group, 19 May 2017, 8th International Particle Accelerator Conference: Copenhagen, Denmark 2017, May 14-19. Geneva: JACoW Publishing, p. 1-4 4 p. TUPVA032

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Beam-line Diagnostics at the Front End Test Stand (FETS), Rutherford Appleton Laboratory, Oxfordshire, UK

    Boorman, G., Gibson, S., D'Arcy, R., Jolly, S., Gabor, C., Lawrie, S. & Letchford, A., 19 Sep 2013, 2nd International Beam Instrumentation Conference: 16-19 September 2013, Oxford, UK.. p. 431-434 4 p. TUPC26

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Behaviour of a building block for intrinsic evolution of analogue signal shaping and filtering circuits

    Flockton, S. J. & Sheehan, K., 2000, SECOND NASA/DOD WORKSHOP ON EVOLVABLE HARDWARE, PROCEEDINGS. Lohn, J., Stoica, A., Keymeulen, D. & Colombano, S. (eds.). LOS ALAMITOS: IEEE COMPUTER SOC, p. 117-123 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Behavioural Aspects of Intelligent Knowledge-Based Information Systems

    Fiadeiro, J. L. & Sernadas, A., 1987, Temporal Aspects in Information Systems. p. 77-92 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Behavioural control in the classroom

    Berger, M., 1971, Proceedings of the Conference on Behaviour Modification . Dublin: Papers in Psychology

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Bench-marking of 3D preforming strategies

    Potluri, P., Sharif, T., Jetavat, D., Aktas, A., Choudhry, R., Hogg, P., Foreman, A., Stringer, G. & Starink, L., 1 Dec 2009, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Better Rewards Yield Better Summaries: Learning to Summarise Without References

    Böhm, F., Gao, Y., Meyer, C. M., Shapira, O., Dagan, I. & Gurevych, I., Nov 2019, Proceedings of 2019 Conference on Empirical Methods in Natural Language Processing (EMNLP 2019) . p. 3101–3111 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Better Than Optimal: Fast Identification of Custom Instruction Candidates

    Reddington, J., Gutin, G., Johnstone, A., Scott, E. & Yeo, A., 2009, CSE '09: International Conference on Computational Science and Engineering, 2009. Vol. 2. p. 17-24 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Unpublished

    Between the Stranger and the Thief: A Non-Standard Reading of Bill Griffiths's Liam's Song

    Hazell, C., 2018, (Unpublished) Between the Stranger and the Thief: A Non-Standard Reading of Bill Griffiths's Liam's Song.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Beyond autonomy and control: An identity-based view of information privacy on social media

    Wu, P., Jun 2016, The 24th European Conference on Information Systems (ECIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Beyond the enterprise-Widening the Horizons of International HRM

    Delbridge, R., Hauptmeier, M. & Sen Gupta, S., 2010, European research unit annual conference (ERU), Cardiff.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Bias in the Mifare DESFire EV1 TRNG

    Hurley-Smith, D. & Hernandez-Castro, J., 2016, International Workshop on Radio Frequency Identification: Security and Privacy Issues (RFIDSec 2016). Hancke, G. P. & Markantonakis, K. (eds.). Springer, p. 123-133 11 p. (Lecture Notes in Computer Science; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Springer, p. 398-419 22 p. (Lecture Notes in Computer Science; vol. 8873).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Big data and humanitarian supply networks: Can Big Data give voice to the voiceless?

    Monaghan, A. & Lycett, M., 2013, Global Humanitarian Technology Conference (GHTC). IEEE Xplore, p. 432-437

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting

    Lee, R., Markantonakis, K. & Akram, R., 30 May 2016, CPSS '16 Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. ACM Press, p. 70-81 12 p. (Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Biogas potential of residues generated by the tomato processing industry under different substrate and inoculum conditions

    Martínez, M., Driller, L., Chamy, R., Schuch, W., Nogueira, M. & Fraser, P., 1 May 2017, 14th International Symposium on Processing Tomato. International Society for Horticultural Science, Vol. 1159. p. 151-157 7 p. (Acta Horticulturae; vol. 1159).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. E-pub ahead of print

    Birkhoff Completeness for Hybrid-Dynamic First-Order Logic

    Gaina, D. & Tutu, I., 14 Aug 2019, The 28th International Conference on Automated Reasoning with Analytic Tableaux and Related Methods: 3-5 September 2019, London, UK . Springer, p. 277-293 17 p. (Lecture Notes in Computer Science; vol. 11714).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    B-ISDN implementation via satellite: the catalyst project

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F. & Smythe, C., 1993, Teletraffic Symposium, 10th. Performance Engineering in Telecommunications Network, Tenth UK. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Black-Scholes formula without stochastic assumptions

    Vovk, V., May 2000, Models for Credit Risk. London: UNICOM Seminars, p. 149-154 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Blasting Open the Historical Continuum: Antihistoricism in Benjamin, Dick & Le Guin

    Gene-Rowe, F., Mar 2015, Sideways in Time Conference. Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution