Home > Publications

Publications

38851 - 38875 out of 43,220Page size: 25
  1. Conference contribution › Research
  2. Published

    Fixed-Parameter Tractability of Multicut in Directed Acyclic Graphs

    Kratsch, S., Pilipczuk, M., Pilipczuk, M. & Wahlström, M., 2012, ICALP (1). p. 581-593 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Forthcoming

    Fixed-parameter tractability of satisfying beyond the number of variables

    Crowston, R., Gutin, G., Jones, M., Raman, V., Saurabh, S. & Yeo, A., 2012, (Accepted/In press) SAT 2012. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Fixed-Parameter Tractability of Workflow Satisability in the Presence of Seniority Constraints

    Crampton, J., Crowston, R., Gutin, G., Jones, M. & Ramanujan, M. S., 2013, FAW-AAIM 2013: Lecture Notes in Computer Science. Vol. 7924. p. 198-209

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Flexible decentralised control of connection admission

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 2000, Agent Technology for Communications Infrastructure. Hayzelden, A. & Bourne, R. A. (eds.). John Wiley & Sons, p. 144-155

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Flexible decentralised control of connection admission communications networks and the IMPACT of software agents

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., Nov 1999, Proceedings of IMPACT'99 .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Flora, fauna and stable isotopes in Late-Würm deposits at Lobsigensee (Swiss Plateau)

    Ammann, B., Chaix, L., Eicher, U., Elias, S., Gaillard, M. J., Hoffmann, W., Siegenthaler, U., Tobolski, K. & Wilkinson, B., 1984, Climatic Changes on a Yearly to Millennial Basis. Morner, N. A. & Karlen, W. (eds.). Dordrecht: D. Reidel Publishing Company, p. 69-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications

    Muthukumaran, D., O'Keeffe, D., Priebe, C., Eyers, D. M., Shand, B. & Pietzuch, P. R., 12 Oct 2015, CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. p. 603-615 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Fluid overpressure of quartz mineral veins in the South Wales coalfield: implication for mechanism of fracture formation in foreland basins

    Fukunari, T. & Gudmundsson, A., 2013, Rock Fractures in Geological Processes: Abstracts of the Presentations at the Symposium. U

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Fluorescence spectroscopy as a life detection technique

    Martins, Z., Chan, Q. H. S. & Sephton, MA., 2010, Proceedings of the European Planetary Science Congress, Rome, Italy. Vol. 1. p. 600 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity

    Talhouk, R., Coles-Kemp, L., Jensen, R. B., Balaam, M., Garbett, A., Ghattas, H., Araujo-Soares, V., Ahmad, B. & Montague, K., Oct 2020, ACM Conference on Computer-Supported Cooperative Work and Social Computing. ACM, Vol. 4. p. 1-25 25 p. 134

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Foreign Investors, Local Community and the Acquired Firm: a case study of work organization and employment relations in a Chinese MNCs in Canada

    Zheng, Y., Sep 2013, 8th China Goes Global Conference. Jocob University, Germany

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Forensic Entropy Analysis of Microsoft Windows Storage Volumes

    Weston, P. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Forensic Tracking and Mobility Prediction in Vehicular Networks

    Al-Kuwari, S. & Wolthusen, S. D., 2012, Advances in Digital Forensics VIII: Proceedings of the Eighth IFIP WG 11.9 International Conference on Digital Forensics. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Formal derivation of concurrent garbage collectors

    Pavlovic, D., Pepper, P. & Smith, D. R., 2010, Proceedings of MPC 2010. Desharnais, J. (ed.). Springer-Verlag, Vol. 6120. p. 353-376 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Formalization of Validation Extension Metamodel for Enterprise Architecture Frameworks

    Oussena, S., Essien, J. & Komisarczuk, P., 2014, ICEIS 2014 - Proceedings of the 16th International Conference on Enterprise Information Systems, Volume 3, Lisbon, Portugal, 27-30 April, 2014. p. 427-434 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Formalized Metatheory with Terms Represented by an Indexed Family of Types

    Adams, R., 2006, Types for Proofs and Programs. Filliatre, J-C., Paulin-Mohring, C. & Werner, B. (eds.). Springer, Vol. 3839. p. 1-16 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Formalizing threat models for virtualized systems

    Sgandurra, D., Karafili, E. & Lupu, E., 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Springer-Verlag, Vol. 9766. p. 251-267 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

    Bost, R., Minaud, B. & Ohrimenko, O., 30 Oct 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security: CCS '17. Association for Computing Machinery (ACM), p. 1465-1482 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Four Attacks and a Proof for Telegram

    Albrecht, M., Marekova, L., Paterson, K. & Stepanovs, I., 2022, IEEE S&P 2022. Vol. 1. p. 223-242 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Forthcoming

    FPGA accelerators HLS-based design of hyper complex LMS filters

    Tisan, A-S., Monmasson, E. & Cheong Took, C., 2022, (Accepted/In press) IECON 2022 – 48th Annual Conference of the IEEE Industrial Electronics Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    FRACTURE TOUGHNESS AND CRACK PROPAGATION IN POLYESTER RESINS.

    Gatward, C. H., Hogg, P. J. & Hull, D., 1 Dec 1985, Deformation Yield and Fracture of Polymers. London, Engl: Plastics & Rubber Inst

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence

    Malek, W. W., Mayes, K. & Markantonakis, K., 2008, Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications. Berlin, Heidelberg: Springer-Verlag, p. 118-132 15 p. (CARDIS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Fredholm Multiple Kernel Learning for Semi-Supervised Domain Adaptation

    Wang, W., Wang, H., Zhang, C. & Gao, Y., 2017, Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17). AAAI Press, p. 2732-2738 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data

    Lacharite, M-S. & Paterson, K., 1 Mar 2018, IACR Transactions on Symmetric Cryptology. 1 ed. Ruhr-Universität Bochum, Vol. 2018. p. 277-313 37 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    From Boundary Spanning to Creolization: Cross-cultural Strategies from the Offshore Provider’s Perspective

    Abbott, P., Zheng, Y., Du, R. & Willcocks, L. P., 2010, AmericasConference of Information Systems 2010.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution