Home > Publications

Publications

37551 - 37575 out of 40,451Page size: 25
  1. Conference contribution › Research
  2. Published

    The Entasis of Greek Doric Columns and Curve Fitting: a Case Study Based on the Peristyle Column of the Temple of Athena Alea at Tegea

    Pakkanen, J., 1996, III Convegno Internazionale di Archeologia e Informatica. III International Symposium on Computing and Archaeology. Moscati, P. & Mariotti, S. (eds.). Firenze, p. 693–702 (Archeologia e Calcolatori; vol. 7).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    The 1st European Stag Beetle Survey: preliminary results

    Campanaro, A., Al Fulaij, N., Bardiani, M., Corezzola, S., Della Rocca, F., Hardersen, S., Harvey, D., Hawes, C., Kadej, M., Karg, J., Mendez, M., Minari, E., Rink, M., Smolis, A., Sprecher-Uebersax, E., Thomaes, A., Toni, I., Vrezec, A., Zapponi, L., Zauli, A. & 2 others, Zilioli, M. & Chiari, S., Sep 2013, 4th meeting of the European Stag Beetle Group.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    The Agency Exerted by Analytic Systems on Public Sector Organisations: The Case of Controlling and Preventing a Life-Threatening Virus (Paper Development)

    Shahid, A. R. & Shaikh, S. E., 2018, International Federation for Information Processing (IFIP) WG 8.6.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

    Shepherd, C., Gurulian, I., Frank, E., Markantonakis, K., Akram, R., Mayes, K. & Panaousis, E., 21 Dec 2017, Mobile Security Technologies (MoST '17), IEEE Security & Privacy Workshops. IEEE, p. 179-188 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    The Apriori Stochastic Dependency Detection (ASDD) algorithm for learning Stochastic logic rules

    Child, C. & Stathis, K., 2004, Computational logic in multi-agent systems (CLIMA 2004). Springer-Verlag, Vol. 3259. p. 234-249 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    The Asynchronous Bounded-Cycle Model

    Robinson, P. & Schmid, U., 2008, Stabilization, Safety, and Security of Distributed Systems, 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings. p. 246-262 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. In preparation

    The Banking Industry; Regulation and ‎Performance: A Data Envelopment Analysis on Total Factor ‎Productivity Changes

    Hassan, M. & Giouvris, E. (ed.), 2016, (In preparation) IFABS-International Finance and Banking Society: Corporate Finance Decisions in a Changing Global Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    The basic building blocks of information systems

    SERNADAS, A., FIADEIRO, J., SERNADAS, C. & EHRICH, H. D., 1989, INFORMATION SYSTEM CONCEPTS : AN IN-DEPTH ANALYSIS. FALKENBERG, ED. (ed.). AMSTERDAM: ELSEVIER SCIENCE PUBL B V, p. 225-246 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    The Beam Gas Vertex Profile Monitoring Station for HL-LHC

    Kieffer, R., Alexopoulos, A., Fosse, L., Gonzalez Berges, M., Gibson, S., Guerin, H., Jones, R., Marriott-Dodington, T., Storey, J., Veness, R., Vlachos, S., Würkner, B. & Zamantzas, C., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPGW082

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    The bigger the better and the more the merrier? Realistic office reverberation levels abolish cognitive distraction by multiple-voice speech

    Vachon, F., Winder, E., Lavandier, M. & Hughes, R., 18 Jun 2017, Proceedings of the 12th ICBEN Congress on Noise as a Public Health Problem. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

    Msgna, M., Markantonakis, K. & Mayes, K., 25 Sep 2013, Security and Privacy in Communication Networks: 9th International ICST Conference. Sydney, Australia, Vol. 127. p. 288-304 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Information and Telecommunication Engineering; vol. 127).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    The Business of Practice: Examining GP Training: British Academy of Management Conference 5th -7th September 2017 University of Warwick

    Dyerson, R., Sep 2017, British Academy of Management Conference Proceedings 2017. 7 p. 838

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    The Caelum Toolkit for CSCW: The Sky is the Limit

    Anker, T., Chockler, G., Dolev, D. & Keidar, I., 1997, Proceedings of the 3rd International Workshop on Next Generation Information Technologies and Systems (NGITS '97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Unpublished

    The care home as a performative space: possibilities for creative practice

    Hatton, N., 2014, (Unpublished) The care home as a performative space: possibilities for creative practice.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    The Case for a Secure Multi-Application Smart Card Operating System

    Markantonakis, K., 1998, Proceedings of the First International Workshop on Information Security. London, UK: Springer-Verlag, p. 188-197 10 p. (ISW '97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    The challenges to distributed leadership and the boundary spanning of local entrepreneurs in emergent healthcare innovation: the telehealth experience of one Clinical Commissioning Group (CCG) in England

    Bernardi, R. & Exworthy, M., 2015, BAM2015 Conference Proceedings. British Academy of Management, p. 1-17 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    The Channel Capacity of Evolution: Ultimate Limits on the Amount of Information Maintainable in the Genome

    Watkins, C., 2002, Proceedings of the Third International Conference on Bioinformatics of Genome Regulation and Structure. Novisibirsk, Russia, Vol. 2. p. 58--60 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    The Complexity of Leader Election: A Chasm at Diameter Two

    Chatterjee, S., Pandurangan, G. & Robinson, P., 4 Jan 2018, ICDCN 2018: Proceedings of the 19th International Conference on Distributed Computing and Networking. Association for Computing Machinery (ACM), p. 1-10 10 p. 13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    The Complexity of Model Checking (Collapsible) Higher‐Order Pushdown Systems

    Hague, M. & Lin, A., 2010, FSTTCS: Foundations of Software Technology and Theoretical Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    The consistency of task-based authorization constraints in workflow systems

    Tan, K., Crampton, J. & Gunter, C., 2004, Proceedings of 17th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 155-169 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    The construction of the relationship between ERP and the organisation through negotiation

    Elbanna, A., 2006, The 14th European Conference of Information Systems (ECIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    The cost of manufacturing creativity

    Sen Gupta, S., 2011, Society for the Advancement of Socio Economics, Massacheusets institute of Technology, Boston, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    The cost of observation for intrusion detection: Performance impact of concurrent host observation

    Seeger, M., Busch, C., Baier, H. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2012 (ISSA). 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    The Demise of Management and Share Ownership Schemes

    Sen Gupta, S., 2003, Employment Research Unit (ERU), Cardiff.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. E-pub ahead of print

    The design and performance of the ATLAS Inner Detector trigger for Run 2 LHC Collisions at √s=13 TeV

    Kilby, C., 21 Nov 2016, Journal of Physics: Conference Series. Vol. 762. p. 1-5 5 p. (Journal of Physics: Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution