Home > Publications

Publications

37501 - 37525 out of 42,601Page size: 25
  1. Conference contribution › Research
  2. Published

    An Exploration of Consumers' Use of Disposing Practices in their Daily Lives

    Türe, M. & Ger, G., 2011, NA - Advances in Consumer Research. Vol. 39. p. 32-33

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    An exploration of the dependence relationships between self-reported aggression and interpersonal style

    Glorney, E., Lyons, E. & Fritzon, K., 2006, Proceedings of the Conference of the European Association of Psychology and Law: University of Liverpool.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    An Exploratory Analysis of the Security Risks of the Internet of Things in Finance

    Shepherd, C., Petitcolas, F., Akram, R. N. & Markantonakis, K., 27 Jul 2017, (E-pub ahead of print) Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lopez, J., Fischer-Hübner, S. & Lambrinoudakis, C. (eds.). Springer-Verlag, p. 164-179 16 p. (Lecture Notes in Computer Science; vol. 10442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    An Exploratory Analysis on Drug Target Locality

    Caceres Silva, J. & Paccanaro, A., Sep 2017, AGRANDA - Simposio Argentino de GRANdes DAtos 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. An Exploratory Study to Examine Big Data Application on Services and SCM

    Shah, S. & Theodosoulaki, A., 15 Apr 2019, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 155-159 5 p. 8691279. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System

    Fett, D., Küsters, R. & Schmitz, G., 13 Nov 2014, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., p. 673-688 16 p. 6956594. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    An extensible, self contained, layered approach to context acquisition

    Kramer, D., Kocurova, A., Oussena, S., Clark, T. & Komisarczuk, P., 2011, Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing. p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    An Identity for Kernel Ridge Regression

    Zhdanov, F. & Kalnishkan, Y., 2010, Learning Theory 21st International Conference, ALT 2010, Proceedings: volume 6331 of Lecture Notes in Computer Science. Springer, p. 405-419 (Lecture Notes in Computer Science; vol. 6331).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data

    Swift, S., Tucker, A., Crampton, J. & Garway-Heath, D., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 2174-2181 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 13 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 2601-2617 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    An information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Classical Correspondence: Proceedings of the 4th Drexel Symposium on Quantum Nonintegrability. Feng, D. H. & Hu, B. L. (eds.). Cambridge, Massachusetts: International Press, p. 339-353

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    An Innovative Heuristic for Planning-Based Urban Traffic Control

    Franco, S., Lindsay, A., Vallati, M. & McCluskey, T. L., 2018, Computational Science - ICCS 2018: 18th International Conference, Wuxi, China, June 11–13, 2018, Proceedings, Part I. Shi, Y., Fu, H., Tian, Y., Krzhizhanovskaya, V. V., Lees, M. H., Dongarra, J. J. & Sloot, P. M. A. (eds.). Springer, p. 181-193 13 p. (Lecture Notes in Computer Science; vol. 10860).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    An institutionalist perspective of IT-enabled change of Health Management Information Systems in Africa: implications for the Open-Source Software

    Bernardi, R., 2009, 10th International Conference on Social Implications of Computers in Developing Countries: Assessing the Contribution of ICT to Development Goals. Byrne, E., Nicholson, B. & Salem, F. (eds.). IFIP WG9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    An Interactive Evolution Strategy based Deep Convolutional Generative Adversarial Network for 2D Video Game Level Procedural Content Generation

    Jiang, M. & Zhang, L., 20 Sep 2021, 2021 International Joint Conference on Neural Networks (IJCNN). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    An interface theory for service-oriented design

    Fiadeiro, J. L. & Lopes, A., 1 Jan 2011, Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011. Proceedings. Giannakopoulou, D. & Orejas, F. (eds.). p. 18-33 16 p. (Lecture Notes in Computer Science; vol. 6603).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    An NFC based consumer-level counterfeit detection framework

    Saeed, Q., Walter, C. & Bilal, Z., 2013, The 11th International Conference on Privacy, Security and Trust (PST 2013). IEEE, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    An Obfuscation-Based Approach against Injection Attacks

    Baiardi, F. & Sgandurra, D., 1 Aug 2011, 2011 Sixth International Conference on Availability, Reliability and Security. p. 51-58 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    An online secret sharing scheme which identifies all cheaters

    Yeun, C. Y., Mitchell, C. J. & Burmester, M., 1998, Proceedings of NORDSEC '98, Trondheim, Norway, November 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    An optimal-control application of two paradigms of on-line learning

    Vovk, V., 1994, Proceedings of the Seventh Annual Workshop on Computational Learning Theory. New York: ACM Press, p. 98-109 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    An Optimization Approach to Robust Goal Obfuscation

    Bernardini, S., Fagnani, F. & Franco, S., Sep 2020, Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoningg. International Joint Conferences on Artificial Intelligence, p. 119-129 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    An overview of change management within manufacturing environment

    Syed, M. H. & Shah, S., 2013, Manufacturing Science and Technology (ICMST2013). p. 1205-1209 5 p. (Advanced Materials Research; vol. 816-817).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    An Overview of RFID Technology in Field Material Transfer Management

    Shah, S. & Shim, J., Aug 2021, IEEE International Conference on Management in Emerging Markets.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. An Overview of Smart Manufacturing for Competitive and Digital Global Supply Chains

    Menon, S., Shah, S. & Coutroubis, A., 2 Jul 2018, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 178-183 6 p. 8691224. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. An overview of sustainable practices in food processing supply chain environments

    Ojo, O. O., Shah, S. & Coutroubis, A., 9 Feb 2018, 2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017. IEEE Computer Society Press, p. 1792-1796 5 p. (IEEE International Conference on Industrial Engineering and Engineering Management; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    An RFID distance bounding protocol

    Hancke, G. & Kuhn, M. G., 2005, Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm). p. 67-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution