Home > Publications

Publications

37401 - 37425 out of 40,623Page size: 25
  1. Conference contribution › Research
  2. Published

    Results From the Laserwire Emittance Scanner and Profile Monitor at CERN's Linac4

    Hofmann, T., Boorman, G., Bosco, A., Gibson, S., Raich, U. & Roncarolo, F., May 2017, 28th Linear Accelerator Conference: 25-30 September 2016, East Lansing, MI, USA.. JACoW Publishing, p. 715-719 5 p. TH2A02

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Rethinking Musical Space

    Johnson, J., 2015, Lithuanian Musicology. Vol. 16. p. 8-15 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Re-thinking the Management of Technological Innovations, Product Complexity and Modularity: The Effects of Low-Probability, High-Impact Events on Automotive Supply Chains

    Coronado Mondragon, A. E. & Coronado Mondragon, C. E., 16 Jul 2012, Driving the Economy through Innovation and Entrepeneurship: Emerging Agenda for Technology Management. Balachandra, P. (ed.). 1 ed. Bangalore: Springer, Vol. 1. p. 567-577 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Rethinking the Smart Card Technology, Invited Paper

    Akram, R. N. & Markantonakis, K., 1 Jun 2014, 16th International Conference on Human-Computer Interaction. Tryfonas, T. & Askoxylakis, I. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Retrofitting Mutual Authentication to GSM Using RAND Hijacking

    Khan, M. & Mitchell, C. J., 17 Sep 2016, Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Barthe, G., Markatos, E. & Samarati, P. (eds.). Springer-Verlag, p. 17-31 15 p. (Lecture Notes in Computer Science; vol. 9871).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Reverse Conformal Approach for On-line Experimental Design

    Nouretdinov, I., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). Vol. 60. p. 185-192 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Reverse engineering concurrent programs using formal modelling and analysis

    Younger, E., Luo, Z., Bennett, K. & Bull, T., 1996, Proc of IEEE Inter. Conf. on Software Maintenance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Review of work experience in a Bachelor of Information Technology

    Pauling, J. W. & Komisarczuk, P., 2007, Proceedings of the ninth Australasian conference on Computing education-Volume 66. p. 125-132 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme

    Chen, LI., Laing, T. & Martin, K., 2017, Progress in Cryptology - AFRICACRYPT 2017: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. Springer, p. 40-57 18 p. (Lecture Notes in Computer Science; vol. 10239).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Revisiting the Changing nature of Professional Identity in the Digital Era; the case of curators

    Godfrey, K., Foley, S. & Panteli, N., 2017, Proceedings of the British Academy of Management Conference, BAM2017: Track: identity. University of Warwick, September 5-7, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Revisiting the Expected Cost of Solving uSVP and Applications to LWE

    Albrecht, M., Göpfert, F., Virdia, F. & Wunderer, T., 2017, Advances in Cryptology - ASIACRYPT 2017. p. 297-322 26 p. (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Revisiting the Institutional Approach to Herbrand's Theorem

    Tutu, I. & Fiadeiro, J. L., 21 Oct 2015, Revisiting the Institutional Approach to Herbrand's Theorem. p. 304-319 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Revisiting the role of ICT in development

    Harindranath, G. & Sein, M. K., 2007, Proceedings of the IFIP TC 9/WG 9.4 International Conference on Social Implications of Computers in Developing Countries. Sao Paulo: IFIP WG9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Revocation in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 2014, Proceedings of the 10th International Conference on Information Security and Cryptology - Inscrypt 2014. Springer, Vol. 8957. p. 51-71 (Lecture Notes in Computer Science - LNCS; vol. 8957)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Reward Learning for Efficient Reinforcement Learning in Extractive Document Summarisation

    Gao, Y., Meyer, C. M., Mesgar, M. & Gurevych, I., Aug 2019, Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence (IJCAI-19). International Joint Conferences on Artificial Intelligence, p. 2350-2356 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    RFID authentication protocol for low-cost tags

    Song, B. & Mitchell, C. J., 2008, Proceedings of the First ACM Conference on Wireless Network Security, WiSec 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM Press, p. 140-147 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Rhythmic Routes: Developing a nomadic physical practice for the daily commute

    Overend, D. & Bissell, L., 2014, Scottish Journal of Performance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Ridge Regression Confidence Machine

    Nouretdinov, I., Melluish, T. & Vovk, V., 2001, Proceedings of the Eighteenth International Conference on Machine Learning. p. 385-392

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Ridge Regression learning algorithm in dual variables

    Saunders, C., Gammerman, A. & Vovk, V., 1998, Proceedings of the Fifteenth International Conference on Machine Learning. San Francisco, CA: Morgan Kaufmann, p. 515-521 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Unpublished

    Risk Disclosure Policies: A cross-sectional study of the Greek Banking Industry

    Anagnostopoulos, I., 2011, (Unpublished) GSTF (Global Science Forum), 23-24 May 2011, Singapore .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Risk Tolerance And Risk Management In Everyday Life Of SMEs

    Kouraklis, I. J., 2005, Proceedings of Small And Medium Enterprises In European Economies, International Conference, Babes-Bolyai University, Cluj-Napoca, Romania.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Risk-Aware Role-Based Access Control

    Chen, L. & Crampton, J., 2011, Proceedings of the 7th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures

    Bellare, M., Paterson, K. & Thomson, S., 2012, ASIACRYPT. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658. p. 331-348 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Robit: an extensible auction-based market platform for challenged environments

    Haile, Y., Reda, A., Noble, B., Duong, Q. & Alperovich, T., 30 Dec 2010, ICTD '10: Proceedings of the 4th ACM/IEEE International Conference on Information and Communication Technologies and Development. Association for Computing Machinery (ACM), p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Robust and efficient communication overlays for trust authority computations

    Reidt, S., Balfe, S. & Wolthusen, S. D., 30 Mar 2009, Proceedings of the 2009 Sarnoff Symposium. IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution