Home > Publications

Publications

34701 - 34800 out of 38,489Page size: 100
  1. Conference contribution › Research
  2. Published

    Group Theory in Cryptography

    Blackburn, S., Cid, C. & Mullan, C., 2011, Group St Andrews 2009 in Bath. The London Mathematical Society, Vol. 387. p. 133-149 17 p. (LMS Lecture Note Series; vol. 387).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Guaranteed network traffic demand prediction using FARIMA models

    Dashevskiy, M. & Luo, Z., 2008, Lecture Notes in Computer Sc. Vol. 5326. p. 274-281

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Guiding Reification in OWL through Aggregation

    Severi, P., Fiadeiro, J. L. & Ekserdjian, D., 2010, Description Logics. CEUR-WS.org, Vol. 573. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Hadron Therapy Machine Simulations Using BDSIM

    Shields, W., Boogert, S., Nevay, L. & Snuverink, J., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 546-549 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Half-integrality, LP-branching and FPT Algorithms

    Wahlström, M., 2014, SODA. Chekuri, C. (ed.). SIAM, p. 1762-1781 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Harmonic characterisation model of grid interactive photovoltaic systems

    Nduka, O. & Pal, B., 2016, 2016 IEEE International Conference on Power System Technology (POWERCON). IEEE, p. 1-6

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Harmonic Domain Modeling of PV System for the Assessment of Grid Integration Impact

    Pal, B. & Nduka, O., 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Unpublished

    Harnessing employee engagement in UK public services

    Gatenby, M., Alfes, K., Truss, K., Rees, C. & Soane, E., Oct 2009, (Unpublished) 10th Public Management Research Association (PMRA) Conference. Columbus.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    He-3 bilayer film adsorbed on graphite plated with a bilayer of He-4: A new frustrated 2D magnetic system

    Neumann, M., Nyeki, J., Cowan, B. & Saunders, J., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 317-318 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Hearing Through the Eye in Eighteenth-Century French Opera

    Charlton, D., 2014, Exchanges and Tensions in Art, Theatre and Opera, c.1750-1850. Hibberd, S. & Wrigley, R. (eds.). Ashgate

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Heavy-light decay constants from relativistic N-f=2, 0 QCD

    Shanahan, H. P. & CP-PACS Collaboration, 2000, HIGH ENERGY PHYSICS 99, PROCEEDINGS. BRISTOL: IOP PUBLISHING LTD, p. 943-944 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Hedging Structured Concepts

    Koolen, W. M., Warmuth, M. K. & Kivinen, J., 1 Jun 2010, Proceedings of the 23rd Annual Conference on Learning Theory (COLT 2010). p. 93-105 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Hemispheric lateralization of sentence intonation in left handed subjects with typical and atypical language lateralization: An fMRI study

    Varga, E., Schnell, Z., Perlaki, G., Orsi, G., Aradi, M., Auer, T., John, F., Dóczi, T., Komoly, S., Kovács, N., Schwarcz, A., Tényi, T., Herold, R., Janszky, J. & Horváth, R., 2014, Proceedings of the International Conference on Speech Prosody. International Speech Communications Association, p. 1130-1133 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Heterogeneous and Asynchronous Networks of Timed Systems

    Fiadeiro, J. L. & Lopes, A., 2014, Fundamental Approaches to Software Engineering - 17th International Conference, FASE 2014. Springer, Vol. 8411. p. 79-93 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Heterogeneous Internet access via PANA/UMTS

    Pagliusi, P. S. & Mitchell, C. J., 2004, Proceedings of the 3rd International Conference on Information Security, Hardware/Software Codesign and Computer Networks - ISCOCO 2004, Rio De Janeiro, Brazil, October 2004. World Scientific, 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Heterogeneous Timed Machines

    Delahaye, B., Fiadeiro, J. L., Legay, A. & Lopes, A., 2014, Theoretical Aspects of Computing - ICTAC 2014 - 11th International Colloquium, Bucharest, Romania, September 17-19, 2014.. Springer, Vol. 8687. p. 115-132 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Heuristic subset selection in classical planning

    Lelis, L. H. S., Franco, S., Abisrror, M., Barley, M., Zilles, S. & Holte, R. C., 2016, Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, New York, NY, USA, 9-15 July 2016. International Joint Conferences on Artificial Intelligence, p. 3185-3191 7 p. (IJCAI International Joint Conference on Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    H-IBAS-H - Authentication System for University Student Portals Using Images

    Al-Sinani, H., Nguyen, C. & Vuksanovic, B., 2009, Proceedings of ICCCP-09: International Conference on Communication, Computing and Power, jointly organised with IEEE, Muscat, Oman, February 15-18 2009. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Hidden histories? Local knowledge and indigenous agency in the history of geographical exploration

    Driver, F. & Jones, L., 2010, Proceedings of the 14th International Conference of Historical Geographers, Kyoto Proceedings of the 14th International Conference of Historical Geographers, Kyoto . Kyoto University Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Hidden Markov Models with Confidence

    Cherubin, G. & Nouretdinov, I., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 128-144 17 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    High Frequency Electro-Optic Beam Position Monitors for Intra-Bunch Diagnostics at the LHC

    Gibson, S., Arteche, A., Bosco, A., Darmedru, P. Y., Lefevre, T. & Levens, T., Jan 2016, 4th International Beam Instrumentation Conference: IBIC2015, Melbourne, Australia. JACoW Publishing, p. 606-610 5 p. WEDLA02

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    High occupancy resource allocation for grid and cloud systems, a study with DRIVE

    Chard, K., Bubendorfer, K. & Komisarczuk, P., 2010, Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, HPDC 2010, Chicago, Illinois, USA, June 21-25, 2010. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. E-pub ahead of print

    High System-Code Security with Low Overhead

    Wagner, J., Kuznetsov, V., Candea, G. & Kinder, J., 20 Jul 2015, Proc. IEEE Symp. Security and Privacy (S&P 2015). p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    High-Precision Arithmetic in Homomorphic Encryption

    Chen, H., Laine, K., Player, R. & Xia, Y., 2018, Topics in Cryptology – CT-RSA 2018 - The Cryptographers’ Track at the RSA Conference 2018, Proceedings. Springer-Verlag, Vol. 10808 LNCS. p. 116-136 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10808 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    History of Quaternary Science

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 10-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. In preparation

    Homomorphic noise growth in practice: comparing BGV and FV

    Costache, A., Laine, K. & Player, R., 2019, (In preparation) Eprint.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Host-Based Security Sensor Integrity in Multiprocessing Environments

    Mcevoy, R. & Wolthusen, S. D., May 2010, Information Security, Practice and Experience: 6th International Conference, ISPEC 2010. Springer-Verlag, p. 138-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Unpublished

    Household food waste simulation model: Investigation of interventions for staple food items waste

    Kandemir, C., Quested, T., Reynolds, C., Fisher, K. & Devine, R., 10 Jun 2019, (Unpublished) Household food waste simulation model: Investigation of interventions for staple food items waste.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    How ‘search’ Has Become the Watchword of the Digital Organisation

    Hafezieh, N. & Pollock, N., 2018, Academy of Management Proceedings. 1 ed. Academy of Management, Vol. 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    How ‘Search’ Has Become the Watchword of the Digital Organisation

    Hafezieh, N. & Pollock, N., 2018, Academy of Management Global Proceedings. 2018 ed. Academy of Management, Vol. Surrey.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    How damaging is caldera collapse for a volcanic edifice?

    Drymoni, K., Browning, J. & Gudmundsson, A., 2017, JOINT ASSEMBLY TSG-BGA-VMSG.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    How do knowledge workers with flexible jobs manage constant connectivity? An affordance perspective

    Farivar, F., Eshraghian, F. & Hafezieh, N., 2020, Academy of Management Proceedings. Academy of Management

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    How do management ideas diffuse? Lessons from the global spread of corporate social responsibility

    Preuss, L., Mar 2013, 40th annual conference of the Academy of International Business – UK and Ireland Chapter (AIB-UKI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    How Do Online Communities of Patients Aggregate on Twitter? An Affordance Perspective

    Bernardi, R., 11 Dec 2016, Proceedings of the Thirty Seventh International Conference on Information Systems: 2016 International Conference on Information Systems (ICIS 2016), December 11-14, 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Unpublished

    How Hezbollah affects Lebanon’s sovereignty

    Van Efferink, L., 2010, (Unpublished) Political Studies Association Graduate Network, University of Oxford.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Unpublished

    How important are national industrial relations systems in shaping restructuring in MNCs?

    Edwards, T., Coller, X., Ortiz, L., Rees, C. & Wortmann, M., Jul 2004, (Unpublished) IESE/DMU Conference on 'Multinationals and the International Diffusion of Organizational Forms and Practices'. Barcelona.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Forthcoming

    How private is your period?: A systematic analysis of menstrual app privacy policies

    Shipp, L. & Blasco Alis, J., 1 May 2029, (Accepted/In press) Proceedings on Privacy Enhancing Technologies 2020 (PoPETs 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    How to give FAST Advice

    Stathis, K., 1 Oct 1994, Proceedings of the 7th Symposium and Exhibition on Industrial Applications of Prolog (INAP'94). p. 59-67 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    How to grant less permissions to facebook applications

    Costantino, G., Martinelli, F. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 55-60 6 p. 6947733

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    How to identify all cheaters in Pinch's scheme

    Yeun, C. Y. & Mitchell, C. J., 1998, Proceedings of JWIS '98, Singapore, December 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Human resource Management, Organisational Performance, Employee Attitudes and Behaviours: Exploring the linkages

    Tsai, C-J., Edwards, P. & Sen Gupta, S., 2007, European Academy of Management (EURAM), Paris, France.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Human rights policies and corporate financial performance: Evidence from UK corporations

    Preuss, L. & Brown, D., Mar 2010, annual meeting of the International Association for Business and Society .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Hungarian IT: Coping with economic transition and globalisation

    Harindranath, G., 2004, Proceedings of the 2004 European Conference on Information Systems (ECIS), Turku School of Economics and Business Administration, Turku, Finland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Hybrid metallic mesoscopic structures: Some unanswered questions

    Petrashov, V., 2003, TOWARDS THE CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPINTRONICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 255-261 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Hybrid Publicly Verifiable Computation

    Alderman, J., Janson, C., Crampton, J. & Cid, C., 2 Feb 2016, Topics in Cryptology - CT-RSA 2016. Sako, K. (ed.). Springer, Vol. 9610. p. 147-163 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Hydrogen Isotopes in Beetle Chitin

    Grocke, D., van Hardenbroeck, M., Elias, S. & Sauer, P., 2011, Chitin: Formation and Diagenesis. Gupta, S. N. (ed.). Springer, p. 105-116

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Hypersensitivity to perturbation on an NMR quantum computer

    Schack, R. & Brun, T. A., 2000, Quantum Communication, Computing, and Measurement 2. Kumar, P., D'Ariano, G. M. & Hirota, O. (eds.). New York: Kluwer, p. 257-262

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Hypersensitivity to perturbation: An information-theoretical characterization of classical and quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Communication, Computing, and Measurement. Hirota, O., Holevo, A. S. & Caves, C. M. (eds.). New York: Plenum Press, p. 317-330

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Hypertesting: The Case for Automated Testing of Hyperproperties

    Kinder, J., Mar 2015, 3rd Workshop on Hot Issues in Security Principles and Trust (HotSpot 2015). p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Hypothesis elimination on a quantum computer

    Soklakov, A. N. & Schack, R., 2004, Quantum Communication, Measurement and Computing (QCMC'04). Barnett, S. M. (ed.). Melville, New York: AIP Press, p. 151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    I feel attached: Motivation and Tourists’ Emotions as Antecedents of Place Attachment

    Prayag, G., Hosany, S. & Soscia, I., 2014, European Marketing Academy (EMAC) 43rd Annual Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Submitted

    I.R.R.I.T.A.T.E: Warning! This is an Artist's Book

    Sandhu, K., 2014, (Submitted) Perversions of Paper.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. E-pub ahead of print

    IBC-C: A Dataset for Armed Conflict Event Analysis

    Zukov Gregoric, A., Veyhe, B. & Luo, Z., Aug 2016, Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics: Aug 7 to 12th 2016. p. 374-379 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    ICARUS: Intelligent Coupon Allocation for Retailers Using Search

    Swift, S., Shi, A., Crampton, J. & Tucker, A., 2005, Proceedings of 2005 IEEE Congress on Evolutionary Computation. IEEE Computer Society Press, p. 182-189 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    ICT Adoption & Use in UK SMEs

    Harindranath, G., Dyerson, R. & Barnes, D., 2007, Proceedings of the European Conference on Information Management and Evaluation, Conservatoire National des Arts et Metiers (CNAM), Montpellier, France, September. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    ICT Enabling Customer Agility: A Dynamic Capabilities Perspective

    Elbanna, A., Hallikainen, P. & Merisalo-Rantanen, H., Dec 2017, Thirty Eighth International Conference on Information Systems (ICIS). South Korea

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    ICT in early education: reasons for insufficient application

    Stanisavljevic Petrovic, Z., Pavlovic, D. & Soler-Adillon, J., 21 Apr 2016, eLearning Vision 2020!: Proceedings of the 12th International Scientific Conference "eLearning and Software for Education" Bucharest, April 21 - 22, 2016 . Roceanu, I. (ed.). Budapest, Rumania: "Carol I" National Defense University, Vol. 2. p. 227 232 p. 36

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    ICT in small firms: Factors affecting the adoption and use of ICT in Southeast England SMEs

    Harindranath, G., Dyerson, R. & Barnes, D., 2008, Proceedings of the 2008 European Conference on Information Systems (ECIS), Galway, Ireland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    ICT in South African SMEs: A study of the Manufacturing and Logistics sectors: BEST PAPER in ICT, IT and E-Business in the Small Firm Sector track, 36th ISBE Conference 2013, Cardiff, UK

    Gono, S., Harindranath, G. & Özcan, G. B., 13 Nov 2013, Proceedings of ISBE 2013, November, Cardiff. 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    ICT use in SMES: A comparison between the North West of England and the Province of Genoa

    Dyerson, R., Harindranath, G., Barnes, D. & Spinelli, R., 2009, ICE-B 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS. SETUBAL: INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL, p. 244-251 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    ICT4DWhat? Using the Choice Framework to Operationalise the Capability Approach to Development

    Kleine, D., 19 Apr 2009, Proceedings of the IEEE/ACM International Conference on Information Technology and Development 2009 in Doha, Qatar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    ICTs and hope for development: a theoretical framework

    Krishna Raja Gopalan, S. & Heeks, R., 2015, IFIP WG 9.4: Social Implications of Computers in Developing Countries: 13th International Conference on Social Implications of Computers in Developing Countries. Oslo, p. 414-428 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Unpublished

    ICTs and the city: Impacts on place and mobility. A case study of Campinas, Brazil

    Poveda Villalba, S., 2014, (Unpublished) CivCity: Symposium on Civilisation, Infrastructure and the City. University College London Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Identification in the Limit of Substitutable Context Free Languages

    Clark, A. & Eyraud, R., 2005, Proceedings of The 16th International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. U. & Tomita, E. (eds.). p. 283-296

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Identification of malicious web pages through analysis of underlying DNS and web server relationships

    Seifert, C., Welch, I., Komisarczuk, P., Aval, C. U. & Endicott-Popovsky, B., 2008, LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings. p. 935-941 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Identification of malicious web pages through analysis of underlying DNS and web server relationships.

    Seifert, C., Welch, I., Komisarczuk, P., Aval, C. U. & Endicott-Popovsky, B., 2008, Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on. p. 935-941 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Identification of malicious web pages with static heuristics

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Identification of Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011. p. 33-40 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Identification of resource allocation trends in irregular ATM networks

    Cosmas, J., Pitts, J., Bocci, M., Luo, Z., Nyong, D. & Rai, S., Mar 1997, Proceeding of Fourth UKTS on Performance Modelling and Evaluation of ATM Networks. p. 24/1-24/12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Identifying and Analyzing Web Server Attacks

    Seifert, C., Endicott-Popovsky, B., Frincke, D. A., Komisarczuk, P., Muschevici, R. & Welch, I., 2008, Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008. p. 151-161 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Identifying manipulated images

    Nightingale, S., Wade, K. & Watson, D., Jun 2015, Society for Applied Research in Memory and Cognition.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Identifying patient experience from online resources via sentiment analysis and topic modelling

    Bahja, M. & Lycett, M., 6 Dec 2016, Proceedings - 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT 2016. Association for Computing Machinery, Inc, p. 94-99 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    IDENTIFYING THE RISKS ASSOCIATED WITH AGILE SOFTWARE DEVELOPMENT: AN EMPIRICAL INVESTIGATION

    Elbanna, A., 2014, ..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Igneous Intrusions in the Carnarvon Basin, NW Shelf, Australia

    McClay, K., Scarselli, N. & Jitmahantakul, S., 31 Aug 2013, Proceedings of the Western Australian Basins Conference. 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Il 'Furioso' spiritualizzato

    Anelotti, A., 2019, ‘Dreaming again on things already dreamed’: 500 years of 'Orlando Furioso' (1516-2016) . Dorigatti, M. & Pavlova, M. (eds.). Oxford-New York: Peter Lang

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Unpublished

    Illiquidity, investment styles and January returns in United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Corporate Finance Decisions in a Changing Global Environment, International Finance and Banking Society (IFABS) Asia 2016 Brunei Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. In preparation

    IMMIGRATION AND NEO-LIBERALISM: THREE STORIES AND COUNTER ACCOUNTS

    Agyemang, G., Lehman, C. R. & Annisette, M., 9 Jul 2013, (In preparation) IMMIGRATION AND NEO-LIBERALISM: THREE STORIES AND COUNTER ACCOUNTS.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Implementable Internationalization Strategies for Companies from Emerging Economies

    Aboutalebi, R., 23 Nov 2011, In: EAMSA (Euro-Asia Management Studies Association), 28th Annual Conference: Strategies of international development in Euro-Asian Business. 23-26 November 2011, University of Gothenburg, Gothenburg, Sweden.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Implementation aspects of SET/EMV

    Jarupunphol, P. & Mitchell, C. J., 2002, Towards the Knowledge Society: eCommerce, eBusiness and eGovernment, The 2nd IFIP Conference on e-commerce, e-business and e-government, IFIP I3E 2002, Lisbon, Portugal, October 2002. Monteiro, J. L., Swatman, P. M. C. & Tavares, L. V. (eds.). Kluwer Academic Publishers, p. 305-315 11 p. (IFIP Conference Proceedings; no. 233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Implementation of a component-by-component algorithm to generate small low-discrepancy samples

    Doerr, B., Gnewuch, M. & Wahlström, M., 1 Jul 2009, Monte Carlo and Quasi-Monte Carlo Methods 2008. L'Ecuyer, P. & Owen, A. B. (eds.). Montreal, Canada: Springer, p. 323-338 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Implementation of agents for connection admission control on an ATM testbed

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 2000, On The Way to Information Society: Five Years of European ACTS Research on Intelligence in Services and Networks. IOS Press, p. 413-426

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Implementation of CERN Secondary Beam Lines T9 and T10 in BDSIM

    D'Alessandro, G. L., Boogert, S., Gibson, S., Nevay, L., Shields, W., Bernhard, J., Gerbershagen, A. & Rosenthal, M. S., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 3746-3748 3 p. THPGW069

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Implementation techniques for inductive types in Plastic

    Callaghan, P. & Luo, Z., 2000, Types for Proofs and Programs, Proc of Inter Conf of TYPES'99. LNCS 1956.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Implementing a Caching Service for Distributed CORBA Objects

    Chockler, G., Dolev, D., Friedman, R. & Vitenberg, R., 2000, Proceedings of the 2nd IFIP/ACM International Conference on Distributed systems platforms (Middleware '00). Springer-Verlag, p. 1-23 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Implementing a model checker for Lego

    Yu, S. & Luo, Z., 1997, Proc. of the 4th Inter Symp. of Formal Methods Europe, FME'97: Industrial Applications and Strengthened Foundations of Formal Methods. LNCS 1313.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Implementing Candidate Graded Encoding Schemes from Ideal Lattices

    Albrecht, M., Cocis, C., Laguillaumie, F. & Langlois, A., 30 Dec 2015, Advances in Cryptology – ASIACRYPT 2015. Iwata, T. & Cheon, J. H. (eds.). Springer, p. 752-775 24 p. ( Lecture Notes in Computer Science; vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. E-pub ahead of print

    Implementing Grover Oracles for Quantum Key Search on AES and LowMC

    Jaques, S., Naehrig, M., Roetteler, M. & Virdia, F., 1 May 2020, Advances in Cryptology – EUROCRYPT 2020. Springer, p. 280-310 31 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    IMPORTANT DETERMINANTS OF FOREIGN COMPANY PERFORMANCE IN CHINA: BIG DATA ANALYSIS

    Wang, C. & Giouvris, E., 2018, BAI-winter Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Impostor: A single sign-on system for use from untrusted devices

    Pashalidis, A. & Mitchell, C. J., 2004, Proceedings of IEEE Globecom 2004, Global Telecommunications Conference, Dallas, Texas, USA, November/December 2004. IEEE, Vol. 4. p. 2191-2195

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. E-pub ahead of print

    Improved Classical Cryptanalysis of SIKE in Practice

    Costello, C., Longa, P., Naehrig, M., Renes, J. & Virdia, F., 29 Apr 2020, Public-Key Cryptography – PKC 2020. Springer, p. 505-534 30 p. (Lecture Notes in Computer Science; vol. 12111).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Improved Higgs Naturalness with Supersymmetry

    Gripaios, B. & West, S., 30 Oct 2006, Proceedings of SUSY06.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage

    Lacharite, M-S., Minaud, B. & Paterson, K., 26 Jul 2018, 2018 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Improved Security Notions for Proxy Re-Encryption to Enforce Access Control

    Lee, E., 20 Jul 2019, Progress in Cryptology – LATINCRYPT 2017: International Conference on Cryptology and Information Security in Latin America. Springer, p. 66-85 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. E-pub ahead of print

    Improving Air Interface User Privacy in Mobile Telephony

    Khan, M. & Mitchell, C. J., 9 Dec 2015, Security Standardisation Research, Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 165-184 20 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Improving IP address autoconfiguration security in MANETs using trust modelling

    Hu, S. & Mitchell, C. J., 2005, Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedings. Jia, X., Wu, J. & He, Y. (eds.). Springer-Verlag, Vol. 3794. p. 83-92 10 p. (Lecture Notes in Computer Science; vol. 3794).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Improving model quality through foundational ontologies: Two contrasting approaches to the representation of roles

    de Cesare, S., Henderson-Sellers, B., Partridge, C. & Lycett, M., 2015, Advances in Conceptual Modeling - ER 2015 Workshops, AHA, CMS, EMoV, MoBiD, MORE-BI, MReBA, QMMQ, and SCME, Proceedings. Springer Verlag, Vol. 9382. p. 304-314 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9382).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Improving Planning Performance in PDDL+ Domains via Automated Predicate Reformulation

    Franco, S., Vallati, M., Lindsay, A. & McCluskey, T. L., 2019, Computational Science - ICCS 2019 : 19th International Conference, Faro, Portugal, June 12–14, 2019, Proceedings, Part V. Rodrigues, J. M. F., Cardoso, P. J. S., Monteiro, J. M., Lam, R., Krzhizhanovskaya, V. V., Lees, M. H., Dongarra, J. J. & Sloot, P. M. A. (eds.). Springer, Vol. 11540. p. 491-498 8 p. (Lecture Notes in Computer Science; vol. 11540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Improving Reliable Probabilistic Prediction by Using Additional Knowledge

    Nouretdinov, I., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). Vol. 60. p. 193-200 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Improving Self-organized Resource Allocation with Effective Communication

    Kafali, O. & Yolum, P., 2012, Agents and Peer-to-Peer Computing. Beneventano, D., Despotovic, Z., Guerra, F., Joseph, S., Moro, G. & Pinninck, A. (eds.). Springer Berlin / Heidelberg, Vol. 6573. p. 35-46 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities

    Coles-Kemp, L., Jensen, R. B. & Talhouk, R., 21 Apr 2018, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, p. 1-13 13 p. 584

    Research output: Chapter in Book/Report/Conference proceedingConference contribution