Home > Publications

Publications

38651 - 38675 out of 42,628Page size: 25
  1. Conference contribution › Research
  2. Published

    Les instruments à vent: Les sons et les gestes

    Charlton, D., 1991, Le Tambour et la harpe: Oeuvres, pratiques et manifestations musicales sous la Révolution, 1788-1800. Julien, J-R. & Mongrédien, J. (eds.). Paris: Éditions Du May, p. 209-20 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Les Prolongements romanesques de la matière épique

    Everson, J., 2008, Acts of the XVIIth conference of the international Société Rencesvals, University of Connecticut, July 2006: Olifant special issue. Vol. 2 vols.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Less harm, less worry or how to improve network security by bounding system offensiveness

    Bruschi, D., Cavallaro, L. & Rosti, E., 2000, 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Let’s Get Mobile: Secure FOTA for Automotive System

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 6 Nov 2015, Network and System Security. Springer, Vol. 9408. p. 503-510 8 p. (Lecture Notes in Computer Science; vol. 9408).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Unpublished

    Let’s talk about our ways of seeing the world. Exploring more explicit ways to study media representations in Critical Geopolitics

    Van Efferink, L., 2013, (Unpublished) Warwick Graduate Conference in Political Geography,Department of Politics and International Studies (PAIS),University of Warwick.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Letting Go: Working with the Rhythm of Participants

    Coles-Kemp, L., Angus, A. & Stang, F., 2013, CHI '13 Extended Abstracts on Human Factors in Computing Systems. 2013: ACM, p. 373-378 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Leveraging probabilistic reasoning in deterministic planning for large-scale autonomous Search-and-Tracking

    Bernardini, S., Fox, M., Long, D. & Piacentini, C., 12 Jun 2016, Proceedings of the Twenty Sixth International Conference on Automated Planning and Scheduling (ICAPS- 16) . p. 47-55 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    LHC Collimation and Energy Deposition Studies Using Beam Delivery Simulation (BDSIM)

    Nevay, L., Boogert, S., Garcia Morales, H., Gibson, S., Kwee-Hinzmann, R., Bruce, R. & Redaelli, S., Jun 2016, 7th International Particle Accelerator Conference: May 8-13, 2016, Busan, Korea. JACoW Publishing, p. 1-3 3 p. WEPOY047

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    LibSEAL: revealing service integrity violations using trusted execution

    Aublin, P-L., Kelbert, F., O'Keeffe, D., Muthukumaran, D., Priebe, C., Lind, J., Krahn, R., Fetzer, C., Eyers, D. M. & Pietzuch, P. R., 23 Apr 2018, Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, April 23-26, 2018. p. 1-15 15 p. 24

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Life detection and organic characterization in the solar system

    Chan, Q. H. S., Martins, Z. & Sephton, MA., 2010, Astrobiology Science Conference 2010: Evolution and Life: Surviving Catastrophes and Extremes on Earth and Beyond. Vol. 1538. p. 5233 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Lightweight Classification of IoT Malware Based on Image Recognition

    Su, J., Vasconcellos Vargas, D., Prasad, S., Sgandurra, D., Feng, Y. & Sakurai, K., 2018, 8th IEEE International Workshop on Network Technologies for Security, Administration, and Protection (NETSAP 2018). IEEE Xplore, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Limitations of IEC62351-3's public key management

    Wright, J. & Wolthusen, S., 19 Dec 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Limits to anonymity when using credentials

    Pashalidis, A. & Mitchell, C. J., 2006, Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004, Revised Selected Papers. Springer-Verlag, Vol. 3957. p. 4-12 9 p. (Lecture Notes in Computer Science; vol. 3957).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Linear Depth Integer-Wise Homomorphic Division

    Okada, H., Cid, C., Hidano, S. & Kiyomoto, S., 2019, Information Security Theory and Practice. WISTP 2018. Springer, p. 91-106 16 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Linear Probability Forecasting

    Zhdanov, F. & Kalnishkan, Y., 2010, Artificial Intelligence Applications and Innovations, AIAI 2010, Proceedings: vol 339 of IFIP Advances in Information and Communication Technology. Springer, p. 4-11 (IFIP Advances in Information and Communication Technology; vol. 339).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Linear Relations between Square-Loss and Kolmogorov Complexity

    Kalnishkan, Y., 1999, of the Twelfth Annual Conference on Computation Learning Theory. ACM, p. 226-232

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Linearly Ordered Attribute Grammar Scheduling Using SAT-Solving

    van Binsbergen, L. T., 1 Jan 2015, Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin / Heidelberg, p. 289-303 15 p. (Lecture Notes in Computer Science; vol. 9035).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Linguistic categories in mathematical vernacular and their type-theoretic semantics (extended abstract)

    Luo, Z. & Callaghan, P., 1997, Logical Aspects of Computational Linguistics 97 (LACL'97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Forthcoming

    Linguistic tremours: Language diversity as a fault line in intercultural virtual teams

    Drabble, D., 2016, (Accepted/In press) THE 10th MEDITERRANEAN CONFERENCE ON INFORMATION SYSTEMS, MCIS 2016, PAPHOS, CYPRUS, SEPTEMBER 4-6, 2016. UNIVERSITY OF NICOSIA, P.O.Box 24005, 1700 ΛΕΥΚΩΣΙΑ, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    L'insegnamento della letteratura italiana come scuola di educazione civica

    Jossa, S., 2013, Fare il cittadino: La formazione di un nuovo soggetto sociale nell’Europa tra XIX e XXI secolo. Botteri, I., Riva, E. & Scotto di Luzio, A. (eds.). Rubbettino, p. 131-146 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Liquid xenon for gamma-ray imaging of special nuclear materials

    Larsen, N. A. N. A., Bernard, E. P. E. P., Cahn, S. B. S. B., Edwards, B. W. H. B. W. H., Linck, E. E., Lyashenko, A. V. A. V., McKinsey, D. N. D. N., Nikkel, J. A. J. A., Rhyne, C. A. C. A., Shin, Y. Y., Tennyson, B. P. B. P., Wahl, C. G. C. G., Destefano, N. E. N. E., Gai, M. M. & De Silva, M. S. M. S., 1 Dec 2012, 2012 IEEE International Conference on Technologies for Homeland Security, HST 2012. p. 378-383 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

    Shepherd, C., Markantonakis, K. & Jaloyan, G-A., May 2021, IEEE Workshop on the Internet of Safe Things: IEEE Security and Privacy Workshops (in conjunction with IEEE Security & Privacy '21). IEEE, Vol. 1. p. 221-227 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    LISABETH: Automated Content-based Signatures Generator for Zero-day Polymorphic Worms

    Cavallaro, L., Lanzi, A., Mayer, L. & Monga, M., 2008, International Workshop on Software Engineering for Secure Systems (SESS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Live and Trustworthy Forensic Analysis of Commodity Production Systems

    Martignoni, L., Fattori, A., Paleari, R. & Cavallaro, L., 15 Sep 2010, Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010: Proceedings. Springer, p. 297-316 (Lecture Notes in Computer Science; vol. 6307).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Load Optimisation and its Influence on Automotive Supply Chain

    Shah, S. & Hong, H. W., 15 Nov 2021, 2021 26th International Conference on Automation and Computing (ICAC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution