Home > Publications

Publications

38601 - 38700 out of 41,430Page size: 100
  1. Conference contribution › Research
  2. Published

    Three learnable models for the description of language

    Clark, A. & Adrian-Horia Dediu Henning Fernau, C. M-V. (ed.), 2010, Language and Automata Theory and Applications. p. 16--31

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Unpublished

    Through A Yellow Glass: Modernism, Mass Culture & Gossip

    Hember, P., 2018, (Unpublished) BAMs New Work in Modernist Studies Conference 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Through the Lens of Sequence Submodularity

    Bernardini, S., Fagnani, F. & Piacentini, C., 1 Jun 2020, Proceedings of the Thirtieth International Conference on Automated Planning and Scheduling. AAAI Press, Vol. 30. p. 38-47 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Tidal facies in siliciclastic, carbonate and mixed microtidal ancient systems of southern Italy

    Longhitano, S. G., Chiarella, D. & Spalluto, L., 2012, Tidalites 2012, 8th International Conference on tidal environments.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Albrecht, M., Orsini, E., Paterson, K., Peer, G. & Smart, N., 2017, Computer Security – ESORICS 2017. Springer, p. 29-46 18 p. (Lecture Notes in Computer Science; vol. 10492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Time independent and time dependent states of atoms in static external fields

    O'Mahony, P. F., Moser, I., Mota-Furtado, F. & dos Santos, J. P., 1998, ATOMS AND MOLECULES IN STRONG EXTERNAL FIELDS. NEW YORK: PLENUM PRESS DIV PLENUM PUBLISHING CORP, p. 169-180 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. E-pub ahead of print

    Time is of the Essence: Spatiotemporalities of Food Delivery Platform Work in China

    Wu, P. F. & Zheng, Y., 13 May 2020, (E-pub ahead of print) Proceedings of the European Conference on Information Systems (ECIS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Time Pattern Analysis of Malware by Circular Statistics

    Pan, L., Tomlinson, A. & Koloydenko, A., 3 Jul 2017, Architectures for Networking and Communications Systems (ANCS), 2017 ACM/IEEE Symposium on. IEEE, p. 119-130 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Time Specific Encryption

    Paterson, K. & Quaglia, E., 2010, SCN. Springer, Vol. 6280. p. 1-16 16 p. (Lecture Notes in Computer Science; vol. 6280).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Time-Resolved Transverse Beam Profile Measurements with a Rest Gas Ionisation Profile Monitor Based on Hybrid Pixel Detectors

    Levasseur, S., Gibson, S., Bodart, D., Huschauer, H., Schneider, G., Storey, J., Bertsche, W., Sandberg, H., Satou, K. & Sapinski, M., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPAL075

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Time-Storage Trade-Offs for Cryptographically-Enforced Access Control

    Crampton, J., 2011, ESORICS: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Atluri, V. & Diaz, C. (eds.). Springer, Vol. LNCS 6879. p. 245-261 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Unpublished

    To use or not to use Technology: Empowerment and ICTs

    Poveda Villalba, S., 2014, (Unpublished) To use or not to use Technology: Empowerment and ICTs. Human Development and Capability Association (HDCA)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. E-pub ahead of print

    Tokenisation Blacklisting Using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K., 14 Jun 2017, (E-pub ahead of print) Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. p. 182-198 17 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Too Much Information: Questioning Security in a Post-Digital Society

    Coles-Kemp, L., Jensen, R. B. & Heath, C. P. R., Apr 2020, CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Tool support for component-based semantics

    van Binsbergen, L. T., 14 Mar 2016, Companion Proceedings of the 15th International Conference on Modularity.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Tool Support for Coordination-Based Software Evolution

    Gouveia, J., Koutsoukos, G., Andrade, L. F. & Fiadeiro, J. L., 2001, TOOLS (38). IEEE Computer Society Press, p. 184-196 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Top Quark Measurements with ATLAS

    Bozson, A., 5 Mar 2019, Proceedings of the Tenth High-Energy Physics International Conference. Narison, S. (ed.). SLAC eConf, Vol. C180906. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Tourism in Canada’s North: Evaluating Experiences in Kluane National Park and Reserve, Yukon

    Prazeres, L., 2008, 12th Canadian Congress on Leisure Research Proceedings. Montréal, Canada, p. 349-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Toward a Tentative Strategy Implementation Model

    Aboutalebi, R. & Tan, H., 10 Sep 2013, In: BAM (British Academy of Management), 27th Annual Conference of BAM: Managing to Make a Difference. 10-12 September 2013, Aintree Racecourse, Liverpool, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Toward Modelling Organisational Success

    Aboutalebi, R., 7 Sep 2009, In: International Forum for Contemporary Chinese Studies, 2nd Conference of the International Forum for Contemporary Chinese Studies. 7-9 September 2009, University of Nottingham, England.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Toward the automation of business process ontology generation

    De Cesare, S., Juric, D. & Lycett, M., 18 Sep 2014, Proceedings - 16th IEEE Conference on Business Informatics, CBI 2014. Institute of Electrical and Electronics Engineers Inc., Vol. 1. p. 70-77 8 p. 6904139

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Towards a Common Notion of Privacy Leakage on Public Database

    Kiyomoto, S. & Martin, K. M., 2010, Proceedings of Fifth International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA’10). IEEE Computer Society Press, p. 186-191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Towards a conceptualization of the emergent properties of Twitter as an information and news sharing environment.

    Soler-Adillon, J., Freixa, P., Sora, C. & Ribas, J. I., 1 Jul 2014, Periodismo actual y futuro: investigación, docencia e innovación. Cortiñas-Rovira, S. (ed.). Barcelona: Sociedad Española de Periodistica, p. 390 397 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. E-pub ahead of print

    Towards a Framework for Testing the Security of IoT Devices Consistently

    Lally, G. & Sgandurra, D., 24 Nov 2018, (E-pub ahead of print) 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, Vol. 11263. p. 88-102 15 p. (Lecture Notes in Computer Science ; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Towards a model facilitating discussions about Cyber Attacks and Defences

    Happa, J., Fairclough, G., Goldsmith, M. & Creese, S., 2014, Proceedings of the Workshop on Ethics and Policies for Cyber Warfare. NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Towards a new tectonic model of the Askja caldera

    Browning, J., Gudmundsson, A. & Thordarson, T., 2015, Volcanic and Magmatic Studies Group Proceedings 2015. Vol. VMSG2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Towards a Sustainable Brand Loyalty: Attitudinal Loyalty Perspective

    Appiah, D., Ozuem, W. & Howell, K. E., 2016, Global Business and Technology Association. GBATA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Towards a Sustainable Demand Chain Framework: Successful Product Development Integration and Drivers

    Ganji, E. N., Shah, S., Coutroubis, A. & Gestring, I., 2 Jul 2018, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 166-171 6 p. 8691131. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Towards a Verification Logic for Rewriting Logic

    Fiadeiro, J. L., Maibaum, T. S. E., Martí-Oliet, N., Meseguer, J. & Pita, I., 2000, WADT. Springer, Vol. 1827. p. 438-458 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Unpublished

    Towards a Virtual Sense of Place: Exploring 'Walking Simulator' Video Games

    Lowe, J., 30 Aug 2017, (Unpublished) Geographies of Digital Games session at RGS-IBG 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Towards an architectural approach to location-aware business processes

    Aoumeur, N., Fiadeiro, J. & Oliveira, C., 1 Jan 2004, 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), Infrastructure for Collaborative Enterprises. Vol. 13. p. 147-152 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Towards an Interdisciplinary Definition of Trust Using Logical Partitioning

    Moin, S. M. A., Devlin, J., McKechnie, S. & Hosany, S., 2018, 51st Academy of Marketing Conference, Stirling, 2-5 July.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Towards Automated Diagnosis of Basal Cell Carcinoma

    Larraona-Puy, M., Ghita, A., Zoladek, A., Koloydenko, A., Perkins, W., Leach, I., Varma, S., Williams, H. & Notingher, I., 2010, American Institute of Physics Conference Series. Vol. 1267. p. 364-365 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2017, The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113. p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Towards Distributed Collaborative Workflow Management for Mobile Devices

    Kocúrová, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, Data-Driven Process Discovery and Analysis - First International Symposium, SIMPDA 2011, Campione d'Italia, Italy, June 29 - July 1, 2011, Revised Selected Papers. p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Towards enforcing on-the-fly policies in BYOD environments

    Costantino, G., Martinelli, F., Saracino, A. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 61-65 5 p. 6947734

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Towards General Algorithms for Grammatical Inference

    Clark, A., 1 Oct 2010, Algorithmic Learning Theory, 21st International Conference. Hutter, M., Stephan, F., Vovk, V. & Zeugmann, T. (eds.). Springer, p. 11-30

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Towards improved distributed collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, First International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Forthcoming

    Towards Improving Code-Stylometry Analysis in Underground Forums

    Blasco Alis, J., Pastrana, S., Suarez-Tangil, G. & Tereszkowski-Kaminski, M., 1 Aug 2021, (Accepted/In press) 22nd Privacy Enhancing Technologies Symposium (PETS 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Towards robust and efficient computation in dynamic peer-to-peer networks

    Augustine, J., Pandurangan, G., Robinson, P. & Upfal, E., 2012, Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2012, Kyoto, Japan, January 17-19, 2012. p. 551-569 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Towards Runtime Support for Norm-Governed Multi-Agent Systems

    Urovi, V., Bromuri, S., Stathis, K. & Artikis, A., 2010, Principles of Knowledge Representation and Reasoning: Proceedings of the Twelfth International Conference, KR 2010, Toronto, Ontario, Canada, May 9-13, 2010. Lin, F., Sattler, U. & Truszczynski, M. (eds.). AAAI Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Towards Static Analysis of Virtualization-Obfuscated Binaries

    Kinder, J., Oct 2012, Proc. 19th Working Conf. Reverse Engineering (WCRE 2012). IEEE, p. 61-70

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Towards trusted execution of multi-modal continuous authentication schemes

    Shepherd, C., Akram, R. & Markantonakis, K., 3 Apr 2017, Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM, p. 1444-1451 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Towards Understanding the Moderating Roles of Smartphones on Brand Switching

    Appiah, D. & Abayertey, S., 2018, Global Business and Technology Association . GBATA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Trace formulae for quantum graphs

    Bolte, J. & Endres, S., 2008, Analysis on Graphs and Its Applications. Exner, P., Keating, J. P., Kuchment, P., Sunada, T. & Teplyaev, A. (eds.). American Mathematical Society, p. 247-259 13 p. (Proceedings of Symposia in Pure Mathematics; vol. 77).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Trace measures in business and society research

    Preuss, L., 2015, Annual Meeting of the International Association for Business and Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Tracing Man-in-the-Middle in monoidal categories

    Pavlovic, D., 2012, Proceedings of CMCS 2012. Pattinson, D. & Schroeder, L. (eds.). Springer-Verlag, p. 28pp (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Tracing Success in the Voluntary Use of Open Technology in Organisational Setting

    Elbanna, A. & Linderoth, H. C. J., 2013, .. p. 89-104

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Tracing the global spread of CSR

    Preuss, L., Jun 2013, International Association for Business and Society (IABS) Annual Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Tracking the global diffusion of management ideas

    Preuss, L., Aug 2014, Annual Meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Trade-offs in corporate sustainability: Towards an analytical framework

    Hahn, T., Figge, F., Pinkse, J. & Preuss, L., Aug 2010, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Trade-offs in cryptographic implementations of temporal access control

    Crampton, J., 2009, Proceedings of 14th Nordic Workshop on Secure IT Systems. Springer, p. 72-87 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Tradition and Modernity in Buddhist Storytelling

    Utairat, M., 2016, Presenting the Theatrical Past, IFTR World Congress 2016, Stockholm, Sweden .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Traditional and (or) new media: teachers' work experience and application of media in schools

    Pavlovic, D., Stanisavljevic Petrovic, Z. & Soler-Adillon, J., 21 Apr 2016, eLearning Vision 2020!: Proceedings of the 12th International Scientific Conference "eLearning and Software for Education" Bucharest, April 21 - 22, 2016 . Roceanu, I. (ed.). Bucharest, Romania: "Carol I" National Defense University, Vol. 2. p. 182-187 6 p. 29

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Traffic control and resource management using a multi-agent system

    Luo, Z., Bigham, J., Cuthbert, L. & Hayzelden, A., 1999, Broadband Communications: Convergence of Network Technologies. Tsang, D. H. K. & Kuhn, P. J. (eds.). USA: Kluwer Academic Publishers, p. 595-606

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Traffic management in satellite ATM bridge

    Sun, Z., Komisarczuk, P., Coakley, FP. & Evans, BG., 1994, Teletraffic Symposium, 11th. Performance Engineering in Telecommunications Networks. IEE Eleventh UK. p. 8B-1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Training Data and Rationality

    Mersinas, K., Sobb, T., Sample, C., Bakdash, J. & Ormrod, D., Oct 2019, European Conference on the Impact of Artificial Intelligence and Robotics. Griffiths, P. & Kabir, M. N. (eds.). Oxford, UK: Academic Conferences and Publishing International Limited, p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Unpublished

    Training to fit a job vs training to enhance freedom: Computer skills and social activism in the youth

    Poveda Villalba, S., 2013, (Unpublished) Training to fit a job vs training to enhance freedom: Computer skills and social activism in the youth. Royal Geographical Society (with IBG)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Transcend: Detecting Concept Drift in Malware Classification Models

    Jordaney, R., Sharad, K., Dash, S., Wang, Z., Papini, D., Nouretdinov, I. & Cavallaro, L., 16 Aug 2017, Proceedings of the 26th USENIX Security Symposium. USENIX, p. 625-642 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Forthcoming

    Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift

    Barbero, F., Pendlebury, F., Pierazzi, F. & Cavallaro, L., 6 Nov 2021, (Accepted/In press) IEEE Symposium on Security and Privacy (IEEE S&P).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Transduction with confidence and credibility

    Saunders, C., Gammerman, A. & Vovk, V., 1999, Proceedings of the Sixteenth International Joint Conference on Articial Intelligence. Dean, T. (ed.). San Francisco, CA: Morgan Kaufmann, Vol. 2. p. 722-726 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Transductive Confidence Machine is universal

    Nouretdinov, I., Vyugin, V. & Gammerman, A., 2003, Lecture Notes in Artificial Intelligence. Springer, Vol. 2842. p. 283-297 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Transductive confidence machines for pattern recognition

    Proedrou, K., Nouretdinov, I., Vovk, V. & Gammerman, A., 2002, Proceedings of the Thirteenth European Conference on Machine Learning. Elomaa, T., Mannila, H. & Toivonen, H. (eds.). London: Springer, p. 381-390 10 p. (Lecture Notes in Computer Science; vol. 2430).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Transductive conformal predictors

    Vovk, V., 2013, Proceedings of the Ninth Conference on Artificial Intelligence Applications and Innovations. Heidelberg: Springer, Vol. 412. p. 348-360 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Transition dynamics in internationally assisted e-government projects: An Actor Network Theory perspective.

    Kromidha, E., 2013, Proceedings of IFIP 9.4: The 12th International Conference on Social Implications of Computers in Developing Countries, 19-22 May 2013. Ocho Rios, Jamaica

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    TransMIDI: A System for MIDI Sessions Over the Network Using Transis

    Gang, D., Chockler, G., Anker, T., Kremer, A. & Winkler, T., 1997, Proceedings of International Computer Music Conference (ICMC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Unpublished

    Transnational capital and the end of national social settlements?: evidence from Sweden

    Vernon, G. & Rees, C., Sep 2001, (Unpublished) International Conference on 'Small States in World Markets: Fifteen Years On'. Gothenburg.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Unpublished

    Transnational capital and the end of national social settlements?: recent developments in Sweden

    Vernon, G. & Rees, C., Apr 2001, (Unpublished) Industrial Relations in the European Community (IREC) Conference on 'Globalization, Competitiveness and the Government of Employment in Europe'. Madrid.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Transnational Clerical Elite Network: Shiite Political Activism in the Middle East

    Kalantari, M., 2014, 55th Annual International Studies Association Convention, Toronto. 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Transverse Profile and Emittance Measurements With a Laser Stripping System During the CERN LINAC4 Commissioning at 3 and 12 MeV

    Roncarolo, F., Bravin, E., Hofmann, T., Raich, U., Zocca, F., Boorman, G., Bosco, A., Gibson, S., Kruchinin, K., Pozimski, J. & Gabor, C., 5 Sep 2014, 27th Linear Accelerator Conference: LINAC14, Geneva, Switzerland, 31 August - 5 September 2014. p. 506-509 4 p. TUPP035

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices

    Reddington, J. & Coles-Kemp, L., 1 Jul 2011, Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies. Edinburgh, Scotland, UK: Association for Computational Linguistics, p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Trapping Domain Walls in Diode-like Structures

    Bryan, M. T., Schrefl, T., Gibbs, M. R. & Allwood, D. A., 25 Jun 2007, INTERMAG 2006 - IEEE International Magnetics Conference. p. 758 1 p. 4262191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Trashing IMSI catchers in mobile networks

    Khan, M. & Mitchell, C. J., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, July 18-20, 2017: WiSec '17 . Association for Computing Machinery (ACM), p. 207-218 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Travelling through facebook; exploring affordances through the Lens of age

    Panteli, N., Marder, B., Davenport, J. H. & Nemetz, F., 2014, ECIS 2014 Proceedings - 22nd European Conference on Information Systems. Association for Information Systems (AIS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Tree Automata as Algebras: Minimisation and Determinisation

    van Heerdt, G., Kappé, T., Rot, J., Sammartino, M. & Silva, A., Jun 2019, 8th Conference on Algebra and Coalgebra in Computer Science, CALCO 2019. Roggenbach, M. & Sokolova, A. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-22 22 p. 6. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 139).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Tree polymatrix games are PPAD-hard

    Deligkas, A., Fearnley, J. & Savani, R., 29 Jun 2020, 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Czumaj, A., Dawar, A. & Merelli, E. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. 38. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 168).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Tree-Based Cryptographic Access Control

    Alderman, J., Farley, N. & Crampton, J., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag, Vol. 10492 . p. 47-64 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Triassic and Jurassic Sandstones in the Banda Arc: Provenance and correlations with the Australian NW Shelf

    Zimmermann, S. & Hall, R., 25 May 2016, Proceedings, Indonesian Petroleum Association Fortieth Annual Convention 2016. Indonesian Petroleum Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots

    Seifert, C., Komisarczuk, P. & Welch, I., 2009, The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece. p. 63-69 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Trust Strategies for ART Testbed

    Kafali, O. & Yolum, P., 2006, Ninth International Workshop on Trust in Agent Societies, AAMAS. p. 43-49 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Forthcoming

    Trust under the Panopticon: Factors Influencing Trust within Contemporary Social Movements

    Azer, E., Zheng, Y. & Harindranath, G., 14 Feb 2019, (Accepted/In press) 35th EGOS Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Tunable balancing of RSA

    McKee, J., Galbraith, S. D. & Heneghan, C., 2005, ACISP 10. p. 280-292 (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Two Edge Modification Problems without Polynomial Kernels

    Kratsch, S. & Wahlström, M., 1 Sep 2009, Parameterized and Exact Computation : 4th International Workshop, IWPEC 2009. Chen, J. & Fomin, F. V. (eds.). Denmark, Copenhagen: Springer, Vol. 5917. p. 264-275 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Two Proposals for Improving the Image-Based Authentication System: H-IBAS-H

    Vuksanovic, B. & Al-Sinani, H., 2009, INTERNET-09: First International Conference on Evolving Internet, Cannes/La Bocca, French Riviera, France, August 23-29 2009 . Washington: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Two's Company, Three's a Crowd: Consensus-Halving for a Constant Number of Agents

    Deligkas, A., Filos-Ratsikas, A. & Hollender, A., 18 Jul 2021, ACM Conference on Economics and Computation: EC '21. p. 347-368 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Two-Stage Classification Model to Detect Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 113-120 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Typed Operational Semantics for Dependent Record Types

    Feng, Y. & Luo, Z., 2011, Proceedings of Types for Proofs and Programs (TYPES'09), EPTCS 53.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Type-theoretic semantics for SemNet

    Shiu, S., Luo, Z. & Garigliano, R., 1996, Proc. of Inter. Conf. on Formal and Applied Practical Reasoning, LNAI 1085.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Type-Theoretical Semantics with Coercive Subtyping

    Luo, Z., 2010, Semantics and Linguistic Theory. Vol. 20. p. 38-56 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures

    Bilal, Z. & Martin, K. M., 2013, Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. IEEE, p. 304-309

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Unboundedness and downward closures of higher-order pushdown automata

    Hague, M., Kochems, J. & Ong, C-H. L., 11 Jan 2016, Principles of Programming Languages: POPL '16. New York, NY: ACM, p. 151-163 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Understanding and developing role-based administrative models

    Crampton, J., 2005, Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Understanding knowledge management software acquisition in organisations: A conceptual framework

    Le-Nguyen, K., Harindranath, G. & Dyerson, R., 2007, PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2007, SECTIONS 1-6. KAOHSIUNG: NATL SUN YAT-SEN UNIV, p. U1096-U1108 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Understanding knowledge management software-organisation misalignments from an institutional perspective: A case study of a global IT-management consultancy firm

    Le-Nguyen, K., Harindranath, G. & Dyerson, R., 2008, 12TH PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS (PACIS 2008). KOWLOON: CITY UNIVERSITY HONG KONG, p. 85A-+ 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Understanding Subcultures and Change Dynamics in E-Government: An Empirical Study of a Local Government in Malaysia

    Jackson, S. & Wong, K., 11 Jul 2015, 10th Annual Midwest Association for Information Systems Conference, Pittsburg, Kansas. Vol. 23. p. 1-3 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution