Home > Publications

Publications

5001 - 5500 out of 43,259Page size: 500
  1. Conference contribution › Research
  2. Published

    Strategies to encourage local ownership of online collaboration technologies in West Africa

    Bentley, C., 2008, Proceedings from ALT-C 2008: Rethinking the Digital Divide, the 15th Association for Learning Technology Conference. Whitton, N. & McPherson, M. (eds.). ALT

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Strategy Implementation as a System

    Aboutalebi, R. & Tan, H., 8 Sep 2013, In: UK Systems Society, 17th Annual Conference of the UK Systems Society: Systems and Society- Ideas from Practice. 08-10 September 2013, St Anne’s College, Oxford University, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Striking Graphite Bearing Clasts Found in Two Ordinary Chondrite Samples; NWA6169 and NWA8330

    Johnson, J. M., Zolensky, M. E., Chan, Q. & Kring, D. A., 2015, GSA Annual Meeting, November 2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. E-pub ahead of print

    Strong Post-Compromise Secure Proxy Re-Encryption

    Davidson, A., Deo, A., Lee, E. & Martin, K., 30 May 2019, (E-pub ahead of print) Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Springer-Verlag, p. 58-77 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11547 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs

    Gennaro, R., Halevi, S., Krawczyk, H., Rabin, T., Reidt, S. & Wolthusen, S. D., 6 Oct 2008, Computer Security - ESORICS 2008: Proc. 13th European Symposium on Research in Computer Security. Springer-Verlag, p. 49-65

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs

    Alwasel, B. & Wolthusen, S. D., 30 Apr 2015, The proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015). IEEE, p. 418-423 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Structural Controllability of Networks for Non-Interactive Adversarial Vertex Removal

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, Proceedings of the 8th International Workshop on Critical Information Infrastructures Security. Springer-Verlag, p. 120-132

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Structural data from the Trollaskagi peninsula, North Iceland

    Langbacka, B. & Gudmundsson, A., 1989, Nordic Volcanological Institute Report 9301. Reykjavik, p. 1-39 39 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Structural Style and Evolution of the Songkhla Basin, western Gulf of Thailand

    Kaewkor, C., Watkinson, I. & Burgess, P., 23 Nov 2015, Proceedings of the International Conference on Geology, Geotechnology, and Mineral Resources of INDOCHINA. Khon Kaen, Thailand, 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Structure and Behaviour of Virtual Organisation Breeding Environments

    Bocchi, L., Fiadeiro, J. L., Rajper, N. & Reiff-Marganiec, S., 2009, FAVO. Vol. 16. p. 26-40 15 p. (EPTCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Unpublished

    Structure and internal politics in MNCs: three case studies

    Edwards, T. & Rees, C., Aug 1997, (Unpublished) International Industrial Relations Association (IIRA) 5th European Congress. Dublin.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Structuring Time Series Data to Gain Insight into Agent Behaviour

    Al-Baghdadi, N., Wisniewski, W., Lindsay, D., Lindsay, S., Kalnishkan, Y. & Watkins, C., 24 Feb 2020, Proceedings of the 3rd International Workshop on Big Data for Financial News and Data. IEEE, p. 5480-5490 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Studies for the K12 High-Intensity Kaon Beam at CERN

    D'Alessandro, G. L., Banerjee, D., Bernhard, J., Brugger, M., Doble, N., Gatignon, L., Gerbershagen, A., Marchevski, R., Rae, B., Schuchmann, S., Stummer, F., van Dijk, M., Boogert, S., Gibson, S. & Nevay, L., 27 Aug 2021, 12th International Particle Accelerator Conference 2021. Campinas, SP, Brazil: JACoW Publishing, p. 3049-3052 4 p. WEPAB186

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Forthcoming

    Studies of top quark production with the ATLAS detector at the LHC

    Spano, F., 2014, (Accepted/In press) Proceedings for Les Rencontres de Physique de la Vall\'ee d'Aoste, La Thuile, Vall\'ee d'Aoste, Italy, February 23rd - March 1st 2014. In press by Nuovo Cimento C.. 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Study of a Proton Therapy Beamline for Eye Treatment with Beam Delivery Simulation (BDSIM) and an In-House Tracking Code

    Gnacadja, E., Hernalsteens, C., Pauly, N., Tesse, R., Boogert, S., Nevay, L. & Shields, W., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 3088-3091 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Study of Emergent Strategy Implementation during Global Pandemic

    Rutherford, R. & Shah, S., 11 Apr 2022, 2021 IEEE International Conference on Technology Management, Operations and Decisions (ICTMOD). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Subexponential Parameterized Odd Cycle Transversal on Planar Graphs

    Lokshtanov, D., Saurabh, S. & Wahlström, M., 2012, FSTTCS.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Sublinear Bounds for Randomized Leader Election

    Kutten, S., Pandurangan, G., Peleg, D., Robinson, P. & Trehan, A., 2013, Distributed Computing and Networking, 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings. p. 348-362 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Submarine Slide and Slump Complexes, Exmouth Plateau, NW Shelf of Australia

    Scarselli, N., McClay, K. & Elders, C., 31 Aug 2013, Preoceedings of the Western Australian Basins Conference. 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    SUB-MICROMETER RESOLUTION TRANSVERSE ELECTRON BEAM SIZE MEASUREMENT SYSTEM BASED ON OPTICAL TRANSITION RADIATION

    Boogert, S., Aryshev, A., Terunuma, N., Urakawa, J., Karataev, P. & Howell, D., 2010, Proceedings of IPAC'10, Kyoto, Japan.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Sub-micrometre resolution laser wire transverse beam size measurement system

    Nevay, L. J., Blair, G. A., Boogert, S. T., Karataev, P., Kruchinin, K., Corner, L. & Walczak, R., 24 Dec 2013, IPAC 2013 - 4th International Particle Accelerator Conference. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Subscriber Centric Conditional Access System for Pay-TV Systems

    Msgna, M., Markantonakis, K., Mayes, K. & Akram, R. N., 11 Sep 2013, IEEE 10th International Conference on e-Business Engineering (ICEBE): IEEE Computer Society. p. 459-455 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Subsets More Representative Than Random Ones

    Nouretdinov, I., 2007, 7th Industrial Conference on Data Mining 2007 Proceedings. p. 15-20 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Subsidiary Embeddedness, Subsidiary Strategy and Subsidiary HR: Exploring an extended model of strategic HR in MNCs

    Zheng, Y., Nov 2012, 29th Annual Conference of EAMSA, National University of Singapore, Singapore.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    SUBTERRANEAN INSECTS AND FUNGI - HIDDEN COSTS AND BENEFITS TO THE GREENKEEPER

    Gange, A., 1994, SCIENCE AND GOLF II. NEW YORK: Routledge, p. 461-466 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. E-pub ahead of print

    Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices

    Albrecht, M. & Lai, R., 11 Aug 2021, (E-pub ahead of print) CRYPTO 2021. Springer, p. 519-548 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. E-pub ahead of print

    Subverting Decryption in AEAD

    Armour, M. & Poettering, B., 18 Nov 2019, (E-pub ahead of print) Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 22-41 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11929 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Sums of two numbers having only prime factors congruent to one modulo four

    Dietmann, R. & Elsholtz, C., 2018, Proceedings of the Number Theory Week 2017 conference: Banach Center Publications.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Supermartingales in Prediction with Expert Advice

    Chernov, A., Kalnishkan, Y., Zhdanov, F. & Vovk, V., 2008, Lecture Notes in Articial Intelligence. Springer, Vol. 5254. p. 199-213 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Superposing Connectors

    Wermelinger, M., Lopes, A. & Fiadeiro, J. L., 2000, IWSSD. IEEE Computer Society Press, p. 87-94 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Supply Chain Risk Management to Supply Chain Performance: A Conceptual Framework Study

    Shah, S. & Goh, C., Aug 2021, IEEE International Conference on Management in Emerging Markets. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Supply Chain Strategies: New Taxonomy

    Aboutalebi, R., 8 Sep 2015, In: BAM (British Academy of Management), 29th Annual Conference of BAM: The Value of Pluralism in Advancing Management Research, Education and Practice. 08-10 September 2015, The University of Portsmouth, England, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Supporting Domain-Specific State Space Reductions through Local Partial-Order Reduction

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 2011, Proc. 26th Int. Conf. Automated Software Engineering (ASE 2011). p. 113-122

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Supporting institutional decision making with an intelligent student engagement tracking system

    Ong, V., Duan, Y. & Jackson, S., 2012, IADIS International Conference: Information Systems 2012, Berlin, DE, 10 - 12 Mar .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Surface Potential Variations in Epitaxial Graphene Devices Investigated by Electrostatic Force Spectroscopy

    Panchal, V., Burnett, T. L., Pearce, R., Cedergren, K., Yakimova, R., Tzalenchuk, A. & Kazakova, O., 2012, 2012 12TH IEEE CONFERENCE ON NANOTECHNOLOGY (IEEE-NANO). NEW YORK: IEEE, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Survival of Organic Materials in Ancient Cryovolcanically-Produced Halite Crystals

    Zolensky, M., Fries, M., Chan, QH-S., Kebukawa, Y., Bodnar, R., Burton, A., Callahan, M., Steele, A. & Sandford, S., Feb 2015, Workshop on the Potential for Finding Life in a Europa Plume, February 2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Sustainability Performance of Rice Manufacturing in Nigerian Supply Chains

    Ojo, O. O., Shah, S., Zigan, S. & Orchard, J., 24 Nov 2020, 2020 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2020. Institute of Electrical and Electronics Engineers Inc., 9380583. (2020 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Sustainable supply and demand chain integration within global manufacturing industries

    Ganji, E. N., Shah, S. & Coutroubis, A., 9 Feb 2018, 2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017. IEEE Computer Society Press, p. 1807-1811 5 p. (IEEE International Conference on Industrial Engineering and Engineering Management; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    SVM Venn Machine with k-Means Clustering

    Zhou, C., Nouretdinov, I., Luo, Z. & Gammerman, A., 2014, Artificial Intelligence Applications and Innovations: AIAI2014 Workshops. Rhodes, Greece, p. 251-260 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Swarm intelligence based dynamic routing and wavelength assignment for wavelength constrained all-optical networks

    Hassan, A., Luo, Z. & Phillips, C., 2009, Proceedings of the 9th international conference on Communications and information technologies . IEEE, p. 987-992

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Switching Investments

    Koolen, W. M. & Rooij, S. D., 1 Oct 2010, Proceedings of the 21st International Conference on Algorithmic Learning Theory (ALT 2010). Hutter, M., Stephan, F., Vovk, V. & Zeugman, T. (eds.). Springer Berlin / Heidelberg, p. 239-254 16 p. (LNAI 6331).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Symbolic Backwards Reachability Analysis for Higher‐Order Pushdown Systems

    Hague, M. & Ong, C-H. L., 2007, FoSSaCS: Foundations of Software Science and Computation Structures.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. E-pub ahead of print

    Symbolic Register Automata

    D’Antoni, L., Ferreira, T., Sammartino, M. & Silva, A., 12 Jul 2019, (E-pub ahead of print) Computer Aided Verification: 31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I. Dillig, I. & Tasiran, S. (eds.). Springer-Verlag, p. 3-21 19 p. (Lecture Notes in Computer Science ; vol. 11561 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Symmetry Breaking in the Congest Model: Time- and Message-Efficient Algorithms for Ruling Sets

    Pai, S., Pandurangan, G., Pemmaraju, S. V., Riaz, T. & Robinson, P., 2017, 31st International Symposium on Distributed Computing: DISC 2017. LIPIcs, Vol. 91. p. 38:1-38:16 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    SYMPOSIUM PRESENTATION (one of three): Decision Making in Social Work: Analytic, Moral and Emotional Dimensions: Troubling narratives - the emotional dimensions of practitioner decision-making in social work

    Leonard, K. & O'Connor, L., 2015, European Social Work Research Association Conference April 2015 Ljubljana, Slovenia.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Synchronisation‐ and Reversal‐Bounded Analysis of Multithreaded Programs with Counters

    Hague, M. & Lin, A., 2012, CAV: Computer Aided Verification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. E-pub ahead of print

    Syntax-Guided Optimal Synthesis for Chemical Reaction Networks

    Cardelli, L., Ceska, M., Fränzle, M., Kwiatkowska, M., Laurenti, L., Paoletti, N. & Whitby, M., 13 Jul 2017, (E-pub ahead of print) Computer Aided Verification: 29th International Conference, CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part II. Majumdar, R. & Kunčak, V. (eds.). Springer, p. 375-395 21 p. (Lecture Notes in Computer Science; vol. 10427).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Synthesis of Amino Acid Precursors with Organic Solids in Planetesimals with Liquid Water

    Kebukawa, Y., Misawa, S., Matsukuma, J., Chan, QHS., Kobayashi, J., Tachibana, S. & Zolensky, ME., Jul 2017, XVIIIth Intl Conf on Origin of Life 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Synthesising choreographies from local session types

    Lange, J. & Tuosto, E., 2012, Concurrency Theory - 23rd International Conference, CONCUR 2012, Proceedings. p. 225-239 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7454 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Synthesising interconnections

    Fiadeiro, J. L., Lopes, A. & Maibaum, T. S. E., 1997, Algorithmic Languages and Calculi. Chapman & Hall, Vol. 95. p. 240-264 25 p. (IFIP Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Synthesizing and Verifying Plans for Constrained Workflows: Transferring Tools from Formal Methods

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 Workshop on Verification and Validation of Planning and Scheduling Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Synthesizing stealthy reprogramming attacks on cardiac devices

    Paoletti, N., Jiang, Z., Islam, M. A., Abbas, H., Mangharam, R., Lin, S., Gruber, Z. & Smolka, S. A., 16 Apr 2019, 10th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS 2019). ACM, p. 13-22 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. E-pub ahead of print

    Systems Metagenomics: Applying Systems Biology Thinking to Human Microbiome Analysis

    Radwan, G. S. & Shanahan, H., 24 Aug 2018, (E-pub ahead of print) Computational Methods in Systems Biology - 16th International Conference, CMSB 2018, Proceedings. Springer-Verlag, Vol. 11095 LNBI. p. 318-321 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11095 LNBI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Systems Security at VU University Amsterdam

    Bos, H. J. & Cavallaro, L., 1 Jul 2011, 1st SysSec Workshop on Systems Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Forthcoming

    Tag Group Authentication using Bit Collisions

    Leng, X., Hancke, G., Mayes, K. & Markantonakis, K., Oct 2012, (Accepted/In press) Information Security South Africa (ISSA). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol

    Paterson, K. G., Ristenpart, T. & Shrimpton, T., 2011, Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011: Proceedings. Lee, D. H. & Wang, X. (eds.). Springer, p. 372-389 (Lecture Notes in Computer Science; vol. 7073).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Tailoring authentication protocols to match underlying mechanisms

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1996, Information Security and Privacy - Proceedings: First Australasian Conference, Wollongong, NSW, Australia, June 1996. Pieprzyk, J. & Seberry, J. (eds.). Springer-Verlag, p. 121-133 13 p. (Lecture Notes in Computer Science; no. 1172).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Taint-Enhanced Anomaly Detection

    Cavallaro, L. & Sekar, R., 2011, ICISS. p. 160-174 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Take a Deep Breath: a Stealthy, Resilient and Cost-Effective Botnet Using Skype

    Nappa, A., Fattori, A., Balduzzi, M., Dell'Amico, M. & Cavallaro, L., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Taking photos might not impair memory

    Nightingale, S., Wade, K., Watson, D., Mills, A., Zajac, R., Henkel, L. & Garry, M., Jul 2016, International Conference on Memory.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    TALEN-directed genome surgery of the DMD gene

    Popplewell, L., Marsh, J., Kymalainen, H., Yanez, R. & Dickson, J., 15 May 2013, Human Gene Therapy. Mary Ann Liebert Inc., Vol. 24. p. A21 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Target Bypass Beam Optics for Future High Intensity Fixed Target Experiments in the CERN North Area

    D'Alessandro, G. L., Benerjee, D., Bernhard, J., Brugger, M., Doble, N., Gerbershagen, A., Rae, B., Velotti, F. M. & Gibson, S., 27 Aug 2021, 12th International Particle Acceleartor Conference 2021: WEPAB185. Campinas, SP, Brazil: JACoW Publishing, p. 3046-3048 3 p. WEPAB185

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Target Search on Road Networks with Range-Constrained UAVs and Ground-Based Mobile Recharging Vehicles

    Booth, K. & Bernardini, S., Oct 2020, International Conference on Intelligent Robots and Systems (IROS): 2020 IEEE/RSJ. IEEE Xplore, p. 6702-6709 8 p. 3038

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Task Facilitation and Navigation via a Mediator: An Application from Software Integration

    Stathis, K., 1 Dec 1995, Proceedings of the 5th Hellenic Conference on Informatics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Taste and Toasts in Early Eighteenth-Century Club Culture

    Hawley, J., 2011, Taste and the Senses in the Eighteenth Century. Wagner, P. & Ogée, F. (eds.). Trier: Wissenschaftlicher Verlag Trier, p. 299-318 20 p. (LAPASEC: Landau Paris Studies on the Eighteenth Century; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Taxonomy of Barriers to Strategy Implementation

    Aboutalebi, R., 8 Sep 2015, BAM (British Academy of Management), 29th Annual Conference of BAM: The Value of Pluralism in Advancing Management Research, Education and Practice. 08-10 September 2015, The University of Portsmouth, England, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Tear-Insert-Fold grammars

    Johnstone, A. & Scott, E., 28 Mar 2010, LDTA '10 Proceedings of the Tenth Workshop on Language Descriptions, Tools and Applications. ACM, p. 1-8 8 p. 6

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1 Oct 1998, Proc. 2nd IMACS Internat. Conf. on Circuits, Systems Computers. Vol. 2. p. 945-949 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Technology, globalization, and the future

    Reppel, A. & Mitussis, D., 9 Jul 2018, Proceedings of the 43rd Annual Macromarketing Conference. Leipzig, Germany, p. 218

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Tectono-stratigraphic evolution and hydrocarbon prospectivity of the South Halmahera Basin, Indonesia

    Chandra, J. & Hall, R., 25 May 2016, Proceedings, Indonesian Petroleum Association Fortieth Annual Convention 2016. Indonesian Petroleum Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Teeth Segmentation and Feature Extraction for Odontological Biometrics

    Mairaj, D., Busch, C. & Wolthusen, S. D., Oct 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE Computer Society Press, p. 323-328

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Telescopic Relative Entropy

    Audenaert, K., 2014, Theory of Quantum Computation, Communication, and Cryptography - 6th Conference, TQC 2011, Madrid. Springer, Vol. LNCS 6745. p. 39-52

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Temperature and magnetic-field driven dynamics in artificial magnetic square ice

    Morley, S. A., Stein, A., Rosamond, M. C., Venero, D. A., Hrabec, A., Shepley, P. M., Im, M. Y., Fischer, P., Bryan, M. T., Allwood, D. A., Steadman, P., Langridge, S. & Marrows, C. H., 8 Sep 2015, Spintronics VIII. Drouhin, H-J., Wegrowe, J-E. & Razeghi, M. (eds.). SPIE, Vol. 9551. 95511Q

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Temporally Aware Behaviour-Based Security in Smart Cards

    Sirett, W. G., Markantonakis, K. & Mayes, K., 1 Nov 2006, Computational Intelligence and Security, 2006 International Conference on. Vol. 1. p. 604 -608

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Ten reasons WHY IRIS Needed 20:20 Foresight: Some Lessons for Introducing Biometric Border Control Systems

    Palmer, A. & Hurrey, C., 2012, Proceedings of the 2012 European Intelligence and Security Informatics Conference. Washington: IEEE Computer Society, p. 311-316 6 p. Palmer:2012:TRW:2373856.2372920

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Tensor decomposition via joint matrix schur decomposition

    Colombo, N. & Vlassis, N., 19 Jun 2016, ICML'16 : Proceedings of the 33rd International Conference on International Conference on Machine Learning. Weinberger, K. Q. & Balcan, M. F. (eds.). ACM, p. 2820-2828 9 p. (33rd International Conference on Machine Learning, ICML 2016; vol. 48).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Terrestrial Ecosystems in the past 100 Myr

    Elias, S., 2002, Encyclopaedia of Life Sciences. London: Nature Publishing Group, Vol. 18. p. 169-173

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., Aug 2019, 28th USENIX Security Symposium (USENIX Sec). p. 729-746 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Testing exchangeability on-line

    Vovk, V., Nouretdinov, I. & Gammerman, A., 2003, Proceedings of the Twentieth International Conference on Machine Learning. Fawcett, T. & Mishra, N. (eds.). Menlo Park, CA: AAAI Press, p. 768-775

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Textures in experimentally deformed olivine aggregates: the effects of added water and melt.

    Heidelbach, F., Holtzman, B., Hier-Majumder, S. & Kohlstedt, D., 2005, ICOTOM 14: TEXTURES OF MATERIALS, PTS 1AND 2. Houtte, PV. & Kestens, L. (eds.). ZURICH-UETIKON: TRANS TECH PUBLICATIONS LTD, p. 63-68 6 p. (MATERIALS SCIENCE FORUM; vol. 495-497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    The ‘reinvention’ of the Mahachat Sung Sermon as a theatre play for new generations of Thai Buddhist audience in the context of urban migration

    Utairat, M., 2018, Theatre and Migration: Theatre, Nation and Identity between Migration and Stasis, IFTR World Congress 2018, Belgrade, Serbia .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    The “Coralligène” of the Mediterranean — a Recent Analog for Tertiary Coralline Algal Limestones

    Bosence, D., 1985, Paleoalgology: Contemporary Research and Applications. Toomey, D. F. & Nitecki, M. H. (eds.). Springer Berlin / Heidelberg, p. 216-225 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    The Entasis of Greek Doric Columns and Curve Fitting: a Case Study Based on the Peristyle Column of the Temple of Athena Alea at Tegea

    Pakkanen, J., 1996, III Convegno Internazionale di Archeologia e Informatica. III International Symposium on Computing and Archaeology. Moscati, P. & Mariotti, S. (eds.). Firenze, p. 693–702 (Archeologia e Calcolatori; vol. 7).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    The 1st European Stag Beetle Survey: preliminary results

    Campanaro, A., Al Fulaij, N., Bardiani, M., Corezzola, S., Della Rocca, F., Hardersen, S., Harvey, D., Hawes, C., Kadej, M., Karg, J., Mendez, M., Minari, E., Rink, M., Smolis, A., Sprecher-Uebersax, E., Thomaes, A., Toni, I., Vrezec, A., Zapponi, L., Zauli, A. & 2 others, Zilioli, M. & Chiari, S., Sep 2013, 4th meeting of the European Stag Beetle Group.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    The Agency Exerted by Analytic Systems on Public Sector Organisations: The Case of Controlling and Preventing a Life-Threatening Virus (Paper Development)

    Shahid, A. R. & Shaikh, S. E., 2018, International Federation for Information Processing (IFIP) WG 8.6.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

    Shepherd, C., Gurulian, I., Frank, E., Markantonakis, K., Akram, R., Mayes, K. & Panaousis, E., 21 Dec 2017, Mobile Security Technologies (MoST '17), IEEE Security & Privacy Workshops. IEEE, p. 179-188 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    The Application of Vendor Managed Inventory (VMI) as Improvement Tool in Manufacturing

    Shah, S. & Huat, K. S., 15 Nov 2021, 26th IEEE International Conference on Automation and Computing. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    The Apriori Stochastic Dependency Detection (ASDD) algorithm for learning Stochastic logic rules

    Child, C. & Stathis, K., 2004, Computational logic in multi-agent systems (CLIMA 2004). Springer-Verlag, Vol. 3259. p. 234-249 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    The Asynchronous Bounded-Cycle Model

    Robinson, P. & Schmid, U., 2008, Stabilization, Safety, and Security of Distributed Systems, 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings. p. 246-262 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    The autocracy of Truth. Knowledge as a prerequisite of trust and dialogue in Public Relations.

    Chmiel, M., Jul 2019, 26th BledCom international conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. In preparation

    The Banking Industry; Regulation and ‎Performance: A Data Envelopment Analysis on Total Factor ‎Productivity Changes

    Hassan, M. & Giouvris, E. (ed.), 2016, (In preparation) IFABS-International Finance and Banking Society: Corporate Finance Decisions in a Changing Global Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    The basic building blocks of information systems

    SERNADAS, A., FIADEIRO, J., SERNADAS, C. & EHRICH, H. D., 1989, INFORMATION SYSTEM CONCEPTS : AN IN-DEPTH ANALYSIS. FALKENBERG, ED. (ed.). AMSTERDAM: ELSEVIER SCIENCE PUBL B V, p. 225-246 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    The Beam Gas Vertex Profile Monitoring Station for HL-LHC

    Kieffer, R., Alexopoulos, A., Fosse, L., Gonzalez Berges, M., Gibson, S., Guerin, H., Jones, R., Marriott-Dodington, T., Storey, J., Veness, R., Vlachos, S., Würkner, B. & Zamantzas, C., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPGW082

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    The bigger the better and the more the merrier? Realistic office reverberation levels abolish cognitive distraction by multiple-voice speech

    Vachon, F., Winder, E., Lavandier, M. & Hughes, R., 18 Jun 2017, Proceedings of the 12th ICBEN Congress on Noise as a Public Health Problem. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

    Msgna, M., Markantonakis, K. & Mayes, K., 25 Sep 2013, Security and Privacy in Communication Networks: 9th International ICST Conference. Sydney, Australia, Vol. 127. p. 288-304 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Information and Telecommunication Engineering; vol. 127).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    The Business of Practice: Examining GP Training: British Academy of Management Conference 5th -7th September 2017 University of Warwick

    Dyerson, R., Sep 2017, British Academy of Management Conference Proceedings 2017. 7 p. 838

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    The Caelum Toolkit for CSCW: The Sky is the Limit

    Anker, T., Chockler, G., Dolev, D. & Keidar, I., 1997, Proceedings of the 3rd International Workshop on Next Generation Information Technologies and Systems (NGITS '97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Unpublished

    The care home as a performative space: possibilities for creative practice

    Hatton, N., 2014, (Unpublished) The care home as a performative space: possibilities for creative practice.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    The Care-less Marketplace: Exclusion as Affective Inequality

    Hutton, M., 2018, 43rd International Macromarketing Conference, Leipzig University, July 9th–14th 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    The Case for a Secure Multi-Application Smart Card Operating System

    Markantonakis, K., 1998, Proceedings of the First International Workshop on Information Security. London, UK: Springer-Verlag, p. 188-197 10 p. (ISW '97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    The challenges to distributed leadership and the boundary spanning of local entrepreneurs in emergent healthcare innovation: the telehealth experience of one Clinical Commissioning Group (CCG) in England

    Bernardi, R. & Exworthy, M., 2015, BAM2015 Conference Proceedings. British Academy of Management, p. 1-17 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    The Channel Capacity of Evolution: Ultimate Limits on the Amount of Information Maintainable in the Genome

    Watkins, C., 2002, Proceedings of the Third International Conference on Bioinformatics of Genome Regulation and Structure. Novisibirsk, Russia, Vol. 2. p. 58--60 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Published

    The CODATA-RDA Data Steward School

    Shanahan, H., 15 Jun 2022, INTERNATIONAL JOURNAL OF DIGITAL CURATION. 1 ed. Edinburgh University Press, Vol. 15.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  105. Published

    The Complexity of Envy-Free Graph Cutting

    Deligkas, A., Eiben, E., Ganian, R., Hamm, T. & Ordyniak, S., 2022, International Joint Conference on Artificial Intelligence, IJCAI 2022. p. 237-243

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. Published

    The Complexity of Leader Election: A Chasm at Diameter Two

    Chatterjee, S., Pandurangan, G. & Robinson, P., 4 Jan 2018, ICDCN 2018: Proceedings of the 19th International Conference on Distributed Computing and Networking. Association for Computing Machinery (ACM), p. 1-10 10 p. 13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  107. Published

    The Complexity of Model Checking (Collapsible) Higher‐Order Pushdown Systems

    Hague, M. & Lin, A., 2010, FSTTCS: Foundations of Software Technology and Theoretical Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  108. Published

    The Complexity of Periodic Energy Minimisation

    Adamson, D., Deligkas, A., Gusev, V. & Potapov, I., 22 Aug 2022, 47th International Symposium on Mathematical Foundations of Computer Science (MFCS 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    The consistency of task-based authorization constraints in workflow systems

    Tan, K., Crampton, J. & Gunter, C., 2004, Proceedings of 17th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 155-169 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  110. Published

    The construction of the relationship between ERP and the organisation through negotiation

    Elbanna, A., 2006, The 14th European Conference of Information Systems (ECIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  111. Published

    The cost of manufacturing creativity

    Sen Gupta, S., 2011, Society for the Advancement of Socio Economics, Massacheusets institute of Technology, Boston, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  112. Published

    The cost of observation for intrusion detection: Performance impact of concurrent host observation

    Seeger, M., Busch, C., Baier, H. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2012 (ISSA). 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  113. Published

    The Demise of Management and Share Ownership Schemes

    Sen Gupta, S., 2003, Employment Research Unit (ERU), Cardiff.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  114. E-pub ahead of print

    The design and performance of the ATLAS Inner Detector trigger for Run 2 LHC Collisions at √s=13 TeV

    Kilby, C., 21 Nov 2016, (E-pub ahead of print) Journal of Physics: Conference Series. Vol. 762. p. 1-5 5 p. (Journal of Physics: Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  115. Published

    The design and performance of the atlas inner detector trigger in high pileup collisions at 13 TeV at the Large Hadron Collider

    Kilby, C., 18 Dec 2017, 26th International Symposium on Nuclear Electronics and Computing (NEC 2017). Korenkov, V. & Nechaevskiy, A. (eds.). Vladimir Korenkov, Andrey Nechaevskiy, Vol. 2023. p. 188-197 10 p. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  116. Unpublished

    The Development of Government Information Infrastructure: The case of Government Cloud Computing in Oman

    Al zadjali, K., 4 Apr 2017, (Unpublished) UK Academy for Information Systems International Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  117. Published

    The Development of Government Information Infrastructure: The case of Government Cloud Computing in Oman

    Alzadjali, K. & Elbanna, A., Apr 2017, UKAIS 2017: The 22nd UK Academy for Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  118. Published

    The Devil is in the Detail: Scribal Variance in Two Manuscripts of The Prick of Conscience

    Smith, I., 17 Jun 2022, MEMS Festival 2022.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  119. Published

    The Different Roles of Expectations in Phonetic and Lexical Processing

    Lev - Ari, S., Dodsworth, R., Mielke, J. & Peperkamp, S., 2019, Proceedings of Interspeech, Graz. p. 2305-2309 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  120. Published

    The digital turn in interpretive research: opportunities and limitations

    Elbanna, A., 26 Jun 2015, 21st Americas Conference on Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  121. Unpublished

    The direct and indirect influence of leadership and management on employee engagement

    Soane, E., Alfes, K., Gatenby, M., Rees, C. & Truss, K., Nov 2009, (Unpublished) 6th International Conference of the Dutch HRM Network. Amsterdam.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  122. Published

    The Discursive Construction of Presence in a Spiritually Oriented Work Context

    Tzouramani, E., Jul 2007, 5th International Critical Management Studies Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  123. Published

    The Dramaturgy of Grand Opera: Some Origins

    Charlton, D., 1990, Trasmissione e recezione delle forme di cultura musicale: Atti del XIV congresso della Società Internazionale di Musicologia. Bianconi, L. (ed.). Turin: EDT, Vol. 3. p. 853-58 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  124. Published

    The effect of HMW polyethylene powder and carbon fibres on the mechanical properties of a ceramic bioactive system

    Cortes, D., Hogg, P. J. & Tanner, K. E., 1 Jan 2000, UKSB First Annual Conference 6-7th July 2000. Deb, S. (ed.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  125. Published

    The effect of sill emplacement on petroleum systems

    Lotveit, I., Gudmundsson, A. & Sydnes, M., 2013, Rock Fractures in Geological Processes: Abstracts of the Presentations at the Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  126. Published

    The effects of learning orientation and market orientation on new product performance and business performance: an empirical analysis

    Wang, C. L. & Ahmed, P. K., 2005, British Academy of Management Annual Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  127. Published

    The emergence of ‘power with’: The case of a born global organization

    Yan, L. & Panteli, N., 2009, Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises : IFIP WG 8.2 International Conference, CreativeSME 2009, Proceedings. Dhillon, G., Stahl, B. C. & Baskerville, R. (eds.). Springer, p. 239-256 18 p. (IFIP Advances in Information and Communication Technology; vol. 301).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  128. Unpublished

    The EU takeover directive: a case study of information and consultation in the European airline industry

    Gold, M. & Rees, C., Jun 2016, (Unpublished) 66th British Universities Industrial Relations Association (BUIRA) Annual Conference. Leeds

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  129. Published

    The evolution of the wetland landscape of the Severn Estuary and Bristol Channel: Historical events and future implications

    French, P., 2003, European Landscapes: From mountain to sea: Proceedings of the 19th session of the permanent European conference for the study of the rural landscape. Tallin: Huma Publishers, p. 45-53 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  130. Published

    The Expressive Power of Binary Submodular Functions

    Zivný, S., Cohen, D. A. & Jeavons, P. G., 2009, MFCS 2009. p. 744-757

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  131. Published

    The factors leading to aggregation and reef formation in Serpula vermicularis

    Bosence, D., Jun 1979, Biology and Systematics of Colonial Organisms. Larwood, G. & Rosen, B. R. (eds.). Academic Press, Vol. Systematics Association Special Volume No. 11. p. 299-318 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  132. Published

    The formation and role of caldera ring faults

    Browning, J., Meredith, P. & Gudmundsson, A., 2013, Rock Fractures in Geological Processes: Abstracts of the Presentations at the Symposium. University Press Göttingen

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  133. Published

    The frontier fleets: what were they and what did they do?

    Rankov, N., 2017, Roman Frontier Studies 2009: Proceedings of the XXI International Congress of Roman Frontier Studies (Limes Kongress) held at Newcastle upon Tyne in Augusts 2009. Hodgson, N., Bidwell, P. & Sclachtmann, J. (eds.). Oxford: Archaeopress, Vol. Roman Archaeology 25. p. 590-592 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  134. E-pub ahead of print

    The Fundamental Nature of the Log Loss Function

    Vovk, V., 5 Sep 2015, (E-pub ahead of print) Lecture Notes in Computer Science. Beklemishev, L., Blass, A., Dershowitz, N., Finkbeiner, B. & Schulte, W. (eds.). Cham: Springer, Vol. 9300. p. 307-318 12 p. (Lecture Notes in Computer Science; vol. 9300).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  135. Published

    The future of SET

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 9-17 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  136. Published

    The Fuzzy Front End of Innovation in temporary virtual teams

    Chamakiotis, P., Boukis, A. & Panteli, N., 2016, Mediterranean Conference on Information Systems, MCIS2016: Track: Virtual Collaborations for Business Innovation.. September 4-6, 2016 , Paphos, Cyprus

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  137. Forthcoming

    The Game of Flying Pigs: Grassroots Micro-influencers in China’s Gig Economy

    Zheng, Y. & Li, Z., 2021, (Accepted/In press) 37th EGOS Colloquium, 8-10 July, 2021, Amsterdam.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  138. Published

    The Gene-Finder computer tools for analysis of human and model organisms genome sequences

    Solovyev, V. & Salamov, A., 1 Jan 1997, Proceedings of the Fifth International Conference on Intelligent Systems for Molecular Biology. Vol. 5. p. 294-302 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  139. E-pub ahead of print

    The General Sieve Kernel and New Records in Lattice Reduction

    Albrecht, M., Ducas, L., Herold, G., Kirshanova, E., Postlethwaite, E. & Stevens, M., 24 Apr 2019, (E-pub ahead of print) EUROCRYPT 2019. p. 717-746 30 p. (Lecture Notes in Computer Science; vol. 11477).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  140. Published

    The geological context and evidence for incipient inversion of the London Basin

    Ghail, R. C., Mason, P. J. & Skipper, J. A., 2015, Investigation, Classification, Testing and Forensics. ICE Publishing, Vol. 6. p. 3523-3528 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  141. Published

    The geometry and growth of dykes

    Gudmundsson, A., 1995, PHYSICS AND CHEMISTRY OF DYKES. Baer, G. & Heimann, A. (eds.). ROTTERDAM: A A BALKEMA, p. 23-34 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  142. Published

    The glamorization of information technology

    Reppel, A. & Kravets, O., 25 Jun 2015, Proceedings of the 40th Annual Macromarketing Conference. Chicago, IL, p. 475-476

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  143. Forthcoming

    The Great Mughals: Relationships, Emotions and Monuments

    Robinson, F., 2013, (Accepted/In press) The Turks in the Muslim World: Essays in Honour of Edmund Bosworth. Poonawala, I. (ed.). Berkeley & Los Angeles: University of California Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  144. Published

    The headquartering effect in international CSR: Evidence from UN Global Compact signatories

    Barkemeyer, R., Preuss, L. & Figge, F., Aug 2014, Annual Meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  145. Published

    The HL-LHC Beam Gas Vertex Monitor - Performance and Design Optimisation using Simulation

    Kolbinger, B., Guerin, H., Jones, R., Lefevre, T., Storey, J., Salzburger, A., Veness, R., Zamantzas, C., Gibson, S. & Kieffer, R., 2 Oct 2021, 10th International Beam Instrumentation Conference 2021. Pohang, Korea: JACoW Publishing, p. 249-253 5 p. TUPP21

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  146. Published

    The HL-LHC Beam Gas Vertex Monitor - Simulations for Design Optimisation and Performance Study

    Guerin, H., Jones, R., Kieffer, R., Kolbinger, B., Lefevre, T., Salvant, B., Storey, J., Veness, R., Zamantzas, C. & Gibson, S., 30 Aug 2021, 12th International Particle Accelerator Conference 2021. Campinas, SP, Brazil: JACoW Publishing, p. 2120-2123 4 p. TUPAB278

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  147. Unpublished

    The HR role in international mergers and acquisitions

    Edwards, T. & Rees, C., Oct 2002, (Unpublished) Chartered Institute of Personnel and Development (CIPD) Annual Conference. Harrogate.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  148. Published

    The impact of contextual influences on employment relations in SMEs: A comparative analysis of work organisations practices in the UK and Indian television industry

    Sen Gupta, S., 2012, Industrial relations in Europe, Lisbon, Portugal.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  149. Published

    The Impact of Crowdsourcing on Organisational Practices: The Case of Crowdmapping

    Shahid, A. R. & Elbanna, A., 17 Jun 2015, 23rd European Conference of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  150. Unpublished

    The impact of employee diversity on employment relations in the UK plant of a German automobile manufacturer

    Moore, F. & Rees, C., Sep 2004, (Unpublished) International Industrial Relations Association (IIRA) 7th European Congress. Lisbon.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  151. Published

    The impact of firm size on the incidence of employment tribunal cases: ana analysis using the SETA 2033 dataset

    Sen Gupta, S., Storey, D., Edwards, P. & Saridakis, G., 2006, Institute of Small Business and Entrepreneurship (ISBE), Cardiff (Best paper award).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  152. Published

    The Impact of Online Health Communities on Patients' Health Self-Management

    Bernardi, R. & Wu, P., 30 Oct 2017, Proceedings of the Thirty-Eight International Conference of Information Systems: 2017 (ICIS 2017), December 10-13, 21017. Association for Information Systems (AIS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  153. Unpublished

    The impact of regionalisation on HR transfer in MNCs

    Samaratunga, M., Zhang, M., Rees, C. & Edwards, C., Sep 2007, (Unpublished) European Institute for Advanced Studies in Management (EIASM) Conference. Istanbul.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  154. Published

    The Impact of the Arts in Social Work Education: A Systematic Review

    Leonard, K., Hafford Letchfield, T. & Couchman, W., 2016, Conference Abstract.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  155. Published

    The impact of trade unions on the Employee Share Ownership and Performance relationship: anaysis using the WERS 98 dataset

    Sen Gupta, S., 2005, British Universities Industrial Relations Association (BUIRA), Newcastle.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  156. Published

    The implications of the local configuration of a standard e-procurement system on the organisation’s power circuits

    Elbanna, A., 2003, The 16th Bled e-Commerce Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  157. Published

    The importance of testing for enhancing learning

    Rastle, K., 17 Oct 2016, Parliamentary Seminar on Measuring Literacy. Westminster

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  158. Published

    The inertia of ERP projects: Diffusion or drift?

    Elbanna, A., 2007, IFIP 8.6, 2007.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  159. Published

    The influence of guanxi on the human capital of returnee entrepreneurs in China

    Lyu, J., Robson, P. & Kromidha, E., 4 Dec 2020, European Academy of Management Conference 2020. Online

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  160. Published

    The influence of organisational culture on e-government uptake: a Malaysian context

    Jackson, S. & Wong, K., 2011, 16th International Business Information Management Association Conference on Innovation and Knowledge Management, Kuala Lumpur, MY, 29 - 30 Jun .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  161. Published

    The influences of negativity and review quality on the helpfulness of online reviews

    Wu, P. F., Van Der Heijden, H. & Korfiatis, N. T., 1 Dec 2011, International Conference on Information Systems 2011, ICIS 2011. Vol. 5. p. 3710-3719 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  162. Published

    The influences of negativity and review quality on the helpfulness of online reviews

    Wu, P., van der Heijden, H. & Korfiatis, N., 2011, Proceedings of the International Conference on Information Systems (ICIS). Shanghai

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  163. Published

    The Information Systems Artifact: A Conceptualization Based on General Systems Theory

    Chatterjee, S., Xiao, X., Elbanna, A. & Sarker, S., 4 Jan 2017, 50th Hawaii International Conference on System Sciences (HICSS 2017): January 4-7, 2017 |.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  164. Published

    The Ingredients of Cyber Weapons

    Repel, D. & Hersee, S., 24 Mar 2015, 10th International Conference on Cyber Warfare and Security (ICCWS15). p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  165. Published

    The invincible ‘Casteism’- Impacts of casteism on working conditions in Indian SMEs

    Soundararajan, V., Jun 2013, International Centre for CSR (ICCSR) PhD conference. Nottingham

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  166. Unpublished

    The IREC international companies network survey

    Rees, C., Oct 1995, (Unpublished) Industrial Relations in the European Community (IREC) Conference on 'Industrial Relations at the Sub-national Level'. Milan.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  167. Published

    The KGP model of agency for global computing: Computational model and prototype implementation

    Bracciali, A., Demetriou, N., Endriss, U., Kakas, A., Lu, W., Mancarella, P., Sadri, F., Stathis, K., Terreni, G. & Toni, F., 2005, Global computing. Springer-Verlag, Vol. 3267. p. 340-367 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  168. Published

    The link between telecentres and rural community telecentres in malawi: the case of vikwa community telecentre

    Kapondera, S. K., 2016, Standing Conference of Eastern, Central and Southern African Library and Information Associations. p. 143-152 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  169. Published

    The Location Information Preference Authority: Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2004, Nordsec 2004, The 9th Nordic Workshop on Secure IT-systems, Helsinki University of Technology, Finland, November 2004. Liimatainen, S. & Virtanen, T. (eds.). p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  170. Published

    The LUX Dark Matter Search

    McKinsey, D. N., Akerib, D., Bedikian, S., Bernstein, A., Bolozdynya, A., Bradley, A., Chapman, J., Clark, K., Classen, T., Curioni, A., Dahl, E., Dazeley, S., Dragowsky, M., de Viveiros, L., Druszkiewicz, E., Fiorucci, S., Gaitskell, R., Hall, C., Faham, C. H., Kastens, L. & 23 others, Kazkaz, K., Lander, R., Leonard, D., Malling, D., Mannino, R., Mei, D., Mock, J., Nikkel, J. A., Phelps, P., Shutt, T., Skulski, W., Sorensen, P., Spaans, J., Stiegler, T., Svoboda, R., Sweany, M., Tripathi, M., Walsh, N., Webb, R., White, J., Wolfs, F., Woods, M. & Zhang, C., 2010, TOPICS IN ASTROPARTICLE AND UNDERGROUND PHYSICS (TAUP2009). Coccia, E., Pandola, L., Fornengo, N. & Aloisio, R. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  171. Published

    The Making of Transparency in European Securitization: Rebuilding the market’s information infrastructures

    Kaniadakis, A. & Elbanna, A., Jul 2017, 33rd European Group of Organization Studies (EGOS), Copenhagen, Denmark.. EGOS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  172. Published

    The Maple Package “Janet”: I. Polynomials Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  173. Published

    The Maple Package “Janet”: II. Linear Partial Differential Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  174. Published

    The Marketing of Concerts in London 1672–1749

    Harbor, C., 1 May 2019, Proceedings of the 19th Biennial Conference on Historical Analysis & Research in Marketing (CHARM). Larsen, W. V. (ed.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  175. Published

    The Meaning of Work in Good and Bad Jobs

    Sen Gupta, S., Tsai, C-J. & Edwards, P., 2006, International Labour Process Conference (ILPC), London.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  176. Published

    The Melodic Language of 'Le Devin du village' and the evolution of opéra-comique

    Charlton, D., 2017, Rousseau on stage.: Playwright, Musician, Spectator. Gullstam, M. & O'Dea, M. (eds.). Oxford: Oxford: Voltaire Foundation, p. 179-207 29 p. (Oxford University Studies in the Enlightenment; vol. 2017, no. 09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  177. Published

    The Memory of Power, Muslim 'Political Importance' and the Muslim League

    Robinson, F., 2006, Papers Presented at the Three-Day International Conference on the All India Muslim League (1906-1947) 18-20 December 2006 (Islamabad) . Ahmad, R. (ed.). Islamabad: National Centre for Historical Research, Vol. 2. p. 157-75 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  178. Published

    The mineralogy of Ceres* (*or something an awful lot like it)

    Zolensky, ME., Fries, M., Chan, QH-S., Kebukawa, Y., Steele, A. & Bodnar, RJ., 2015, 78th Annual Meeting of the Meteoritical Society. Vol. 1856. 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  179. Published

    The Model of Organizational Success

    Aboutalebi, R., 5 Oct 2009, In: IBER (International Business & Economics Research), 10th Annual Conference of IBER: International Business. 5-7 October 2009, Las Vegas, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  180. Published

    The monitorability of service-level agreements for application-service provision

    Skene, J., Skene, A., Crampton, J. & Emmerich, W., 2007, Proceedings of the 6th International Workshop on Software and Performance. Cortellessa, V., Uchitel, S. & Yankelevich, D. (eds.). ACM Press, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  181. In preparation

    The Museum of Them and Us: curating class at work

    Evans, S., May 2022, (In preparation) Organisation Studies 16th Summer School: Dialogic Organizing . Chania, Greece

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  182. Published

    The Need for Modern Computing Paradigm: Science Applied to Computing

    Végh, J. & Tisan, A-S., 5 Dec 2019, 2019 International Conference on Computational Science and Computational Intelligence (CSCI). p. 1523-1532 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  183. Published

    The Occurrence and Ecology of Recent Rhodoliths — A Review

    Bosence, D., 1983, Coated Grains. Peryt, T. M. (ed.). Springer Berlin / Heidelberg, p. 225-242 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  184. Published

    The OLPC Laptop: Educational Revolution or Devolution?

    Bentley, C., 2007, Proceedings from World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007 . Bastiaens, T. & Carliner, S. (eds.). AACE, p. 647-652

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  185. Published

    The Organisational/Business Success: An Overview

    Aboutalebi, R., 11 Jun 2009, In: Scottish Doctoral Management, 5th Scottish Doctoral Management Conference. 11-12 June 2009, University of St Andrews, Scotland.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  186. Published

    The paradox of performance appraisals: Denounced yet Desired

    Sen Gupta, S. & Edwards, P., 2014, Society for the Advancement of Socio Economics; University of Chicago, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  187. Published

    The Parameterized Complexity of Connected Fair Division

    Deligkas, A., Eiben, E., Ganian, R., Hamm, T. & Ordyniak, S., Aug 2021, International Joint Conference on Artificial Intelligence: IJCAI 2021. p. 139-145 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  188. Published

    The Performance and Development of the Inner Detector Trigger Algorithms at ATLAS for LHC Run 2

    ATLAS Collaboration, 2015, Proceedings of the Division of Particles and Fields 2015 (DPF 2015). C150804 ed. SLAC, Vol. eConf. 8 p. hep-ph/1511.01136

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  189. Published

    The personal CA - PKI for a Personal Area Network

    Gehrmann, C., Nyberg, K. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 31-35 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  190. Published

    The Port in the Urban System of Sicilian Naxos (5th c. BC)

    Lentini, M. C., Blackman, D. & Pakkanen, J., 2016, Ancient Ports. The Geography of Connections: Proceedings of an International Conference at the Department of Archaeology and Ancient History, Uppsala University, 23–25 September 2010. Höghammar, K., Alroth, B. & Lindhagen, A. (eds.). Uppsala, p. 253–267 15 p. (Boreas. Uppsala Studies in Ancient Mediterranean and Near Eastern Civilizations; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  191. Published

    The Poso Basin in Gorontalo Bay, Sulawesi: Extension related to core complex formation on land

    Pezzati, G., Hall, R., Burgess, P. & Perez-Gusine, M., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-297 1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  192. Published

    The possibility of noninvasive micron high energy electron beam size measurement using diffraction radiation

    Naumenko, G., Potylitsyn, A., Araki, S., Aryshev, A., Hayano, H., Karataev, P., Muto, T., Urakawa, J., Ross, M., Cline, D., Fukui, Y. & Hamatsu, R., 2005, IEEE. p. 2554-2556 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  193. Published

    The Problem with 'Dance'

    Purkayastha, P., 1 Dec 2020, Conversations Across the Field of Dance Studies: Decolonizing Dance Discourses. Mitra, R., Banerji, A. & Candelario, R. (eds.). Vol. XL. p. 28-30

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  194. Published

    The Proof Complexity of Polynomial Identities

    Hrubes, P. & Tzameret, I., 2009, Proceedings of the 24th IEEE Conference on Computational Complexity (CCC). IEEE Computer Society Press, p. 41-51 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  195. Published

    The Pythia PRF Service

    Everspaugh, A., Chatterjee, R., Juels, A., Scott, S. & Ristenpart, T., Aug 2015, Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, p. 547 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  196. Published

    The RAKAPOSHI Stream Cipher

    Cid, C., Kiyomoto, S. & Kurihara, J., 2009, Information and Communications Security, 11th International Conference, ICICS 2009. Springer, Vol. 5927. p. 32-46 15 p. (Lecture Notes in Computer Sciences - LNCS; vol. 5927).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  197. Published

    The regulation of flexibility and working time: Long working hours in the UK

    Sen Gupta, S. & Arrowsmith, J., 2009, International Industrial Relations Association, Sydney, Australia.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  198. Unpublished

    The regulation of takeovers: a study of information and consultation in the European airline industry

    Rees, C. & Gold, M., Sep 2016, (Unpublished) International Labour and Employment Relations Association (ILERA) Regional Congress. Milan

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  199. Published

    The Relationship between Tourists’ Emotions, Overall Image, Satisfaction and Intention to Recommend: A Case Study of Sardinia

    Prayag, G., Hosany, S., Muskat, B. & del Chiappa, G., 2014, Second Biannual Forum, Advances in Destination Management .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  200. Published

    The Relevance of Business Networks: Contextualised Cases in Three Sectors

    Sen Gupta, S., Edwards, P. & Tsai, C-J., 2006, Institute for Small Business and Entrepreneurship Conference (ISBE), Cardiff.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  201. Unpublished

    The restructuring of public sector work: a critical realist account of workplace change in UK local government

    Gatenby, M. & Rees, C., Apr 2011, (Unpublished) 29th International Labour Process Conference (ILPC). Leeds.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  202. Published

    The rise and fall and rise of combinatorial key predistribution

    Martin, K. M., 2011, Selected Areas in Cryptography. Springer, Vol. 6544. p. 93-98 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  203. Published

    The Rise of New Occupations in Digital Technologies: The ‘Doing’ of Expert Knowledge and the Role of the Organisation

    Hafezieh, N. & Pollock, N., 2018, International Conference on Information Systems Proceedings. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  204. Published

    The role of ambidextrous organizational culture in resolving the exploration-exploitation paradox in new product innovation

    Wang, C. L. & Rafiq, M., 2010, The 33rd Annual Institute for Small Business and Entrepreneurship Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  205. Published

    The role of community size in the emergence of linguistic structure

    Raviv, L., Meyer, A. & Lev - Ari, S., 2018, The Evolution of Language: Proceedings of the 12th International Conference (EVOLANGXII).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  206. Published

    The role of co-presence of users on the orchestration of Accounting activities in Enterprise Systems.

    Subramaniam, N., 2014, International Symposium on Accounting Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  207. Published

    The Role of CSR in the Growth and Success of Chinese Multinationals

    Rui, H., 2013, Proceedings of the 55th Annual Meeting of the Academy of International Business: "Bridging the Divide: Linking IB to Complementary Disciplines and Practice". McDougall-Covin, P. & Kiyak, T. (eds.). 2013 Academy of International Business, p. 207 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  208. Published

    The role of Institutions and IT-artefacts in the restructuring of a HIS in Kenya

    Bernardi, R., 2009, 25th EGOS Colloquium Conference Proceedings: Sub-theme 8: Institutions and knowledge: the role of materiality.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  209. Published

    The Role of Middle Managers In Modular Digital Transformation: The Case of SERVU

    Paavola, R., Hallikainen, P. & Elbanna, A., Jun 2017, The 25th European Conference on Information Systems (ECIS). p. 887-903

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  210. Published

    The role of returnee entrepreneurs in the internationalisation of SMEs in China

    Lyu, J., Robson, P. & Kromidha, E., 3 Sep 2019, British Academy of Management Conference 2019. Birmingham, UK

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  211. The Role of Sustainable New Product Development in Demand Driven Chains

    Ganji, E. N., Shah, S. & Coutroubis, A., 19 Jul 2017, 2017 International Conference on Industrial Engineering, Management Science and Application, ICIMSA 2017. IEEE, 7985611. (2017 International Conference on Industrial Engineering, Management Science and Application, ICIMSA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  212. Published

    The role of telecentres in provision of agricultural information in Malawi

    Kapondera, S. K., Chawinga, W., Majawa, F. & Mphunda, J., 2018, 23rd Standing Conference of Eastern Central and Southern African Libraries Association .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  213. Published

    The Role of the Sprit of CSR in the Dynamics of the South Korean National Business System

    Shin, H., 30 Nov 2017, Academy of Management Annual Meeting Proceedings. 1 ed. Vol. 2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  214. Published

    The Screenplay as Boundary Object

    Ganz, A., 2018, Screenwriting Research Network.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  215. Published

    The Second Step in the Health Care Journey- Making Decisions

    Bradley, C., Mar 1997, Partners in the Health Care Journey moving towards patient-centred care, proceedings of an international conference. p. 30-31

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  216. Published

    The secondary and approximate authorization model and its application to Bell-LaPadula policies

    Crampton, J., Leung, W. & Beznosov, K., 2006, Proceedings of the 11th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 111-120 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  217. Published

    The Secure and Multiple Payment System based on the Mobile Phone Platform

    Zhang, Q., Brites Moita, J. N., Mayes, K. & Markantonakis, K., 2004, The Secure and Multiple Payment System based on the Mobile Phone Platform.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  218. Published

    The security architecture of the secure mobile messaging demonstrator

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1988, Proceedings of UK IT 88. IED, Swansea, p. 171-174 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  219. Published

    The security issue

    Mitchell, C. J., 1989, Proceedings of Value Added Network Services for Europe, London, September 1989. London: IBC Technical Services Ltd, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  220. Unpublished

    The Served and the Surveilled: Biometric Technologies as a Tool for Progress

    Krishna Raja Gopalan, S., 2015, (Unpublished) London Conference in Critical Thought 2015: Parallel Session: Questioning the Digital I: Security, Possibilities, Futures.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  221. Unpublished

    The social magic of a collections meritocracy: institutional distinction classed and unclassed in UK museum work

    Evans, S., 10 Jun 2021, (Unpublished) 37th EGOS Colloquium, sub theme Inequality, institutions and organizations, Amsterdam.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  222. Published

    The Spatial Dimension of Social Entrepreneurship: Manifesting the Imaginary during COVID19

    Costales, E., Zeyen, A. & Branzei, O., 26 Jul 2021, Academy of Management Annual Meeting Proceedings: Contribution to the 81st Annual Meeting of the Academy of Management. No. 1 ed. Academy of Management, Vol. 2021.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  223. Published

    The Stimulus Effect of the 2008 UK Temporary Vat Cut

    Lührmann, M., Chirakija, J., Crossley, T. F. & O'Dea, C., 2010, National Tax Association Proceedings. Vol. 2010. p. 15-21 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  224. Published

    The strength of virtuality in teams: Social capital built on 'weak ties'

    Dixon, K. & Panteli, N., 2007, Proceedings of the Annual Hawaii International Conference on System Sciences. 4076456

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  225. Published

    The Technology-enabled disruption of platform business: the network effect that forgot people

    Elbanna, A., Nov 2017, 5th Innovation in Information Infrastructure workshop.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  226. Published

    The Temple of Athena Alea at Tegea: Revisiting Design-Unit Derivation from Building Measurements

    Pakkanen, J., 2005, Ancient Arcadia: Papers from the Third International Seminar on Ancient Arcadia, Held at the Norwegian Institute at Athens, 7-10 May 2002. Østby, E. (ed.). Athens: The Norwegian Institute at Athens, p. 167–183 (Papers from the Norwegian Institute at Athens; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  227. Published

    The thermodynamics of fissure swarms and fault zones: application to the Husavik-Flatey Fault

    Gudmundsson, A. & Mohajeri, N., 2013, International Workshop on Earthquakes in North Iceland Húsavík, North Iceland, 6-8 June 2013 .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  228. Published

    The Thrifty Meal: Re-creating Value in the Kitchen

    Cappellini, B. & Parsons, E., 2012, Advances in Consumer Research .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Published

    The timing and intensity of environmental changes during the Paleoindian period in western North America: evidence from the insect fossil record

    Elias, S., 1990, Megafauna and Man. Agenbroad, L. & Mead, J. (eds.). Flagstaff, Arizona: Northern Arizona University Press, p. 11-14

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  230. Published

    The unreasonable ineffectiveness of security engineering: An overview

    Pavlovic, D., 2010, Proceedings of IEEE Conference on Software Engineering and Formal Methods, Pisa, Italy, 2010. Fiadeiro, J. L. & Gnesi, S. (eds.). IEEE, p. 12-18 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  231. Published

    The uptake of CSR tools among MNEs from developing countries

    Preuss, L. & Barkemeyer, R., Aug 2009, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  232. Published

    The Usage of Khudze Multipurpose Community Telecentre in Mwanza District, Malawi

    Martha, C. & Kapondera, S., 9 Nov 2017, IST-Africa 2017 Conference Proceedings. Cunningham, P. & Cunningham, M. (eds.). IEEE Xplore, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  233. Published

    The Use of Cloud Computing by Small Service Business in Canada: An Exploratory Study

    Stanberry, C. A. & Harindranath, G., 13 Jan 2016, 2015 International Conference on Information Resource Management (Conf-IRM), Ottawa, Canada, May.. Vol. 18.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  234. Published

    The use of CSR tools by companies from tax havens

    Preuss, L., Mar 2009, 2nd conference of the British Academy of Management Special Interest Group on CSR (BAM CSR SIG).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  235. Published

    The use of Trusted Third Parties and Secure Billing in UMTS

    Chen, LI., Hitz, H-J., Horn, G., Howker, K., Kessler, V., Knudsen, L. R., Mitchell, C. J. & Radu, C., 1996, Proceedings of the ACTS Mobile Communications Summit, Granada, Spain, 27-29 November 1996. Vol. 2. p. 493-499 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  236. E-pub ahead of print

    The Vacuity of the Open Source Security Testing Methodology Manual

    Albrecht, M. & Jensen, R. B., 24 Nov 2020, (E-pub ahead of print) Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings. van der Merwe, T., Mitchell, C. & Mehrnezhad, M. (eds.). Springer, p. 114-147 34 p. (Lecture Notes in Computer Science; vol. 12529).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  237. Published

    THE WAY FORWARD FOR LONG-TERM COAL RESEARCH, DEVELOPMENT AND DEMONSTRATION IN THE UK - A PROPOSED NEW STRATEGY TO DEVELOP TECHNOLOGIES TO REDUCE GREENHOUSE GAS EMISSIONS

    Heyes, A., 1992, INTERNATIONAL CONF ON COAL, THE ENVIRONMENT AND DEVELOPMENT : TECHNOLOGIES TO REDUCE GREENHOUSE GAS EMISSIONS. PARIS: ORGANIZATION ECONOMIC COOPERATION, p. 845-849 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  238. The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines

    Fett, D., Kusters, R. & Schmitz, G., 25 Sep 2017, Proceedings - IEEE 30th Computer Security Foundations Symposium, CSF 2017. IEEE Computer Society, p. 189-202 14 p. 8049720. (Proceedings - IEEE Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. Unpublished

    Theorising national institutions and MNE actors: what scope for critical realism?

    Rees, C., Aug 2009, (Unpublished) International Industrial Relations Association (IIRA) 15th World Congress. Sydney.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  240. Unpublished

    Theorising wandering game experiences: post-phenomenology, navigation and narrative

    Lowe, J., 12 Jul 2019, (Unpublished) Theorising & Navigating session at Wandering Games Conference 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  241. Published

    There Are a Thousand Hamlets in a Thousand People's Eyes

    Zhang, H., Li, X., Zhang, L. E. & Zhang, J., 23 Feb 2013, Academy of Management Proceedings. 1 ed. Vol. 2013.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  242. Published

    Thoughts into Interdisciplinary Action: A 12-Step Programme for Earth

    Cole, J., Foster, A., Farlow, A., Petrikova, I. & Cheema, K., 5 Nov 2019, Eighth Annual Conference of inVIVO Planetary Health: From Challenges to Opportunities for People, Place, Purpose and Planet. MPDI International Journal of Environmental Research and Public Health, Vol. Special Issue. p. 61-63 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  243. Published

    Threat analysis model of an agent-based vulnerability mitigation mechanism using Bayesian Belief Networks

    Al-Salloum, Z. & Wolthusen, S. D., 22 Jun 2011, Proceedings of the 2011 First IEEE Network Science Workshop (NSW 2011). IEEE Computer Society Press, p. 144-151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  244. Published

    Three learnable models for the description of language

    Clark, A. & Adrian-Horia Dediu Henning Fernau, C. M-V. (ed.), 2010, Language and Automata Theory and Applications. p. 16--31

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  245. Unpublished

    Through A Yellow Glass: Modernism, Mass Culture & Gossip

    Hember, P., 2018, (Unpublished) BAMs New Work in Modernist Studies Conference 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  246. Published

    Through the Lens of Sequence Submodularity

    Bernardini, S., Fagnani, F. & Piacentini, C., 1 Jun 2020, Proceedings of the Thirtieth International Conference on Automated Planning and Scheduling. AAAI Press, Vol. 30. p. 38-47 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  247. Published

    Tidal facies in siliciclastic, carbonate and mixed microtidal ancient systems of southern Italy

    Longhitano, S. G., Chiarella, D. & Spalluto, L., 2012, Tidalites 2012, 8th International Conference on tidal environments.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  248. Forthcoming

    TIDE: A novel approach to constructing timed-release encryption

    Loe, A. F., Medley, L., O'Connell, C. & Quaglia, E. A., 15 Apr 2022, (Accepted/In press) ACISP 2022.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  249. Published

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Albrecht, M., Orsini, E., Paterson, K., Peer, G. & Smart, N., 2017, Computer Security – ESORICS 2017. Springer, p. 29-46 18 p. (Lecture Notes in Computer Science; vol. 10492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  250. Published

    Tightly-secure signatures from Chameleon Hash Functions

    Blazy, O., Kakvi, S. A., Kiltz, E. & Pan, J., 17 Mar 2015, Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Katz, J. (ed.). Springer-Verlag, p. 256-279 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  251. Published

    Time independent and time dependent states of atoms in static external fields

    O'Mahony, P. F., Moser, I., Mota-Furtado, F. & dos Santos, J. P., 1998, ATOMS AND MOLECULES IN STRONG EXTERNAL FIELDS. NEW YORK: PLENUM PRESS DIV PLENUM PUBLISHING CORP, p. 169-180 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  252. E-pub ahead of print

    Time is of the Essence: Spatiotemporalities of Food Delivery Platform Work in China

    Wu, P. F. & Zheng, Y., 13 May 2020, (E-pub ahead of print) Proceedings of the European Conference on Information Systems (ECIS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  253. Published

    Time Pattern Analysis of Malware by Circular Statistics

    Pan, L., Tomlinson, A. & Koloydenko, A., 3 Jul 2017, Architectures for Networking and Communications Systems (ANCS), 2017 ACM/IEEE Symposium on. IEEE, p. 119-130 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  254. Published

    Time Specific Encryption

    Paterson, K. & Quaglia, E., 2010, SCN. Springer, Vol. 6280. p. 1-16 16 p. (Lecture Notes in Computer Science; vol. 6280).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  255. Published

    Time-Resolved Transverse Beam Profile Measurements with a Rest Gas Ionisation Profile Monitor Based on Hybrid Pixel Detectors

    Levasseur, S., Gibson, S., Bodart, D., Huschauer, H., Schneider, G., Storey, J., Bertsche, W., Sandberg, H., Satou, K. & Sapinski, M., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPAL075

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  256. Published

    Time-Storage Trade-Offs for Cryptographically-Enforced Access Control

    Crampton, J., 2011, ESORICS: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Atluri, V. & Diaz, C. (eds.). Springer, Vol. LNCS 6879. p. 245-261 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  257. Unpublished

    To use or not to use Technology: Empowerment and ICTs

    Poveda Villalba, S., 2014, (Unpublished) To use or not to use Technology: Empowerment and ICTs. Human Development and Capability Association (HDCA)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  258. E-pub ahead of print

    Tokenisation Blacklisting Using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K., 14 Jun 2017, (E-pub ahead of print) Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. p. 182-198 17 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  259. Published

    Too Much Information: Questioning Security in a Post-Digital Society

    Coles-Kemp, L., Jensen, R. B. & Heath, C. P. R., Apr 2020, CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  260. Published

    Tool support for component-based semantics

    van Binsbergen, L. T., 14 Mar 2016, Companion Proceedings of the 15th International Conference on Modularity.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  261. Published

    Tool Support for Coordination-Based Software Evolution

    Gouveia, J., Koutsoukos, G., Andrade, L. F. & Fiadeiro, J. L., 2001, TOOLS (38). IEEE Computer Society Press, p. 184-196 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  262. Published

    Top Quark Measurements with ATLAS

    Bozson, A., 5 Mar 2019, Proceedings of the Tenth High-Energy Physics International Conference. Narison, S. (ed.). SLAC eConf, Vol. C180906. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  263. Published

    Tourism in Canada’s North: Evaluating Experiences in Kluane National Park and Reserve, Yukon

    Prazeres, L., 2008, 12th Canadian Congress on Leisure Research Proceedings. Montréal, Canada, p. 349-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  264. Published

    Toward a Tentative Strategy Implementation Model

    Aboutalebi, R. & Tan, H., 10 Sep 2013, In: BAM (British Academy of Management), 27th Annual Conference of BAM: Managing to Make a Difference. 10-12 September 2013, Aintree Racecourse, Liverpool, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  265. Published

    Toward Modelling Organisational Success

    Aboutalebi, R., 7 Sep 2009, In: International Forum for Contemporary Chinese Studies, 2nd Conference of the International Forum for Contemporary Chinese Studies. 7-9 September 2009, University of Nottingham, England.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. Published

    Toward the automation of business process ontology generation

    De Cesare, S., Juric, D. & Lycett, M., 18 Sep 2014, Proceedings - 16th IEEE Conference on Business Informatics, CBI 2014. Institute of Electrical and Electronics Engineers Inc., Vol. 1. p. 70-77 8 p. 6904139

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  267. Published

    Towards a Common Notion of Privacy Leakage on Public Database

    Kiyomoto, S. & Martin, K. M., 2010, Proceedings of Fifth International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA’10). IEEE Computer Society Press, p. 186-191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  268. Published

    Towards a conceptualization of the emergent properties of Twitter as an information and news sharing environment.

    Soler-Adillon, J., Freixa, P., Sora, C. & Ribas, J. I., 1 Jul 2014, Periodismo actual y futuro: investigación, docencia e innovación. Cortiñas-Rovira, S. (ed.). Barcelona: Sociedad Española de Periodistica, p. 390 397 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  269. E-pub ahead of print

    Towards a Framework for Testing the Security of IoT Devices Consistently

    Lally, G. & Sgandurra, D., 24 Nov 2018, (E-pub ahead of print) 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, Vol. 11263. p. 88-102 15 p. (Lecture Notes in Computer Science ; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  270. Published

    Towards a model facilitating discussions about Cyber Attacks and Defences

    Happa, J., Fairclough, G., Goldsmith, M. & Creese, S., 2014, Proceedings of the Workshop on Ethics and Policies for Cyber Warfare. NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  271. Published

    Towards a new tectonic model of the Askja caldera

    Browning, J., Gudmundsson, A. & Thordarson, T., 2015, Volcanic and Magmatic Studies Group Proceedings 2015. Vol. VMSG2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  272. Published

    Towards a Sustainable Brand Loyalty: Attitudinal Loyalty Perspective

    Appiah, D., Ozuem, W. & Howell, K. E., 2016, Global Business and Technology Association. GBATA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  273. Towards a Sustainable Demand Chain Framework: Successful Product Development Integration and Drivers

    Ganji, E. N., Shah, S., Coutroubis, A. & Gestring, I., 2 Jul 2018, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 166-171 6 p. 8691131. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  274. Published

    Towards a Verification Logic for Rewriting Logic

    Fiadeiro, J. L., Maibaum, T. S. E., Martí-Oliet, N., Meseguer, J. & Pita, I., 2000, WADT. Springer, Vol. 1827. p. 438-458 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  275. Unpublished

    Towards a Virtual Sense of Place: Exploring 'Walking Simulator' Video Games

    Lowe, J., 30 Aug 2017, (Unpublished) Geographies of Digital Games session at RGS-IBG 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  276. Published

    Towards an architectural approach to location-aware business processes

    Aoumeur, N., Fiadeiro, J. & Oliveira, C., 1 Jan 2004, 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), Infrastructure for Collaborative Enterprises. Vol. 13. p. 147-152 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  277. Published

    Towards an Interdisciplinary Definition of Trust Using Logical Partitioning

    Moin, S. M. A., Devlin, J., McKechnie, S. & Hosany, S., 2018, 51st Academy of Marketing Conference, Stirling, 2-5 July.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  278. Published

    Towards Automated Diagnosis of Basal Cell Carcinoma

    Larraona-Puy, M., Ghita, A., Zoladek, A., Koloydenko, A., Perkins, W., Leach, I., Varma, S., Williams, H. & Notingher, I., 2010, American Institute of Physics Conference Series. Vol. 1267. p. 364-365 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  279. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2017, The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113. p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  280. Published

    Towards Distributed Collaborative Workflow Management for Mobile Devices

    Kocúrová, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, Data-Driven Process Discovery and Analysis - First International Symposium, SIMPDA 2011, Campione d'Italia, Italy, June 29 - July 1, 2011, Revised Selected Papers. p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  281. Published

    Towards enforcing on-the-fly policies in BYOD environments

    Costantino, G., Martinelli, F., Saracino, A. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 61-65 5 p. 6947734

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  282. Published

    Towards General Algorithms for Grammatical Inference

    Clark, A., 1 Oct 2010, Algorithmic Learning Theory, 21st International Conference. Hutter, M., Stephan, F., Vovk, V. & Zeugmann, T. (eds.). Springer, p. 11-30

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  283. Published

    Towards improved distributed collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, First International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  284. Forthcoming

    Towards Improving Code Stylometry Analysis in Underground Forums

    Tereszkowski-Kaminski, M., Pastrana, S., Blasco Alis, J. & Suarez-Tangil, G., 16 Sep 2021, (Accepted/In press) 22nd Privacy Enhancing Technologies Symposium (PETS 2022). p. 126-147 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  285. Published

    Towards robust and efficient computation in dynamic peer-to-peer networks

    Augustine, J., Pandurangan, G., Robinson, P. & Upfal, E., 2012, Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2012, Kyoto, Japan, January 17-19, 2012. p. 551-569 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  286. Published

    Towards Runtime Support for Norm-Governed Multi-Agent Systems

    Urovi, V., Bromuri, S., Stathis, K. & Artikis, A., 2010, Principles of Knowledge Representation and Reasoning: Proceedings of the Twelfth International Conference, KR 2010, Toronto, Ontario, Canada, May 9-13, 2010. Lin, F., Sattler, U. & Truszczynski, M. (eds.). AAAI Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  287. Published

    Towards Static Analysis of Virtualization-Obfuscated Binaries

    Kinder, J., Oct 2012, Proc. 19th Working Conf. Reverse Engineering (WCRE 2012). IEEE, p. 61-70

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  288. Published

    Towards trusted execution of multi-modal continuous authentication schemes

    Shepherd, C., Akram, R. & Markantonakis, K., 3 Apr 2017, Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM, p. 1444-1451 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  289. Published

    Towards Understanding the Moderating Roles of Smartphones on Brand Switching

    Appiah, D. & Abayertey, S., 2018, Global Business and Technology Association . GBATA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  290. Published

    Trace formulae for quantum graphs

    Bolte, J. & Endres, S., 2008, Analysis on Graphs and Its Applications. Exner, P., Keating, J. P., Kuchment, P., Sunada, T. & Teplyaev, A. (eds.). American Mathematical Society, p. 247-259 13 p. (Proceedings of Symposia in Pure Mathematics; vol. 77).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  291. Published

    Trace measures in business and society research

    Preuss, L., 2015, Annual Meeting of the International Association for Business and Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  292. Published

    Tracing Man-in-the-Middle in monoidal categories

    Pavlovic, D., 2012, Proceedings of CMCS 2012. Pattinson, D. & Schroeder, L. (eds.). Springer-Verlag, p. 28pp (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  293. Published

    Tracing Success in the Voluntary Use of Open Technology in Organisational Setting

    Elbanna, A. & Linderoth, H. C. J., 2013, .. p. 89-104

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  294. Published

    Tracing the global spread of CSR

    Preuss, L., Jun 2013, International Association for Business and Society (IABS) Annual Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  295. Published

    Tracking the global diffusion of management ideas

    Preuss, L., Aug 2014, Annual Meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  296. Published

    Trade-offs in corporate sustainability: Towards an analytical framework

    Hahn, T., Figge, F., Pinkse, J. & Preuss, L., Aug 2010, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  297. Published

    Trade-offs in cryptographic implementations of temporal access control

    Crampton, J., 2009, Proceedings of 14th Nordic Workshop on Secure IT Systems. Springer, p. 72-87 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  298. Published

    Tradition and Modernity in Buddhist Storytelling

    Utairat, M., 2016, Presenting the Theatrical Past, IFTR World Congress 2016, Stockholm, Sweden .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  299. Published

    Traditional and (or) new media: teachers' work experience and application of media in schools

    Pavlovic, D., Stanisavljevic Petrovic, Z. & Soler-Adillon, J., 21 Apr 2016, eLearning Vision 2020!: Proceedings of the 12th International Scientific Conference "eLearning and Software for Education" Bucharest, April 21 - 22, 2016 . Roceanu, I. (ed.). Bucharest, Romania: "Carol I" National Defense University, Vol. 2. p. 182-187 6 p. 29

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  300. Published

    Traffic control and resource management using a multi-agent system

    Luo, Z., Bigham, J., Cuthbert, L. & Hayzelden, A., 1999, Broadband Communications: Convergence of Network Technologies. Tsang, D. H. K. & Kuhn, P. J. (eds.). USA: Kluwer Academic Publishers, p. 595-606

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  301. Published

    Traffic management in satellite ATM bridge

    Sun, Z., Komisarczuk, P., Coakley, FP. & Evans, BG., 1994, Teletraffic Symposium, 11th. Performance Engineering in Telecommunications Networks. IEE Eleventh UK. p. 8B-1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  302. Published

    Training Data and Rationality

    Mersinas, K., Sobb, T., Sample, C., Bakdash, J. & Ormrod, D., Oct 2019, European Conference on the Impact of Artificial Intelligence and Robotics. Griffiths, P. & Kabir, M. N. (eds.). Oxford, UK: Academic Conferences and Publishing International Limited, p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  303. Unpublished

    Training to fit a job vs training to enhance freedom: Computer skills and social activism in the youth

    Poveda Villalba, S., 2013, (Unpublished) Training to fit a job vs training to enhance freedom: Computer skills and social activism in the youth. Royal Geographical Society (with IBG)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  304. Published

    Transcend: Detecting Concept Drift in Malware Classification Models

    Jordaney, R., Sharad, K., Dash, S., Wang, Z., Papini, D., Nouretdinov, I. & Cavallaro, L., 16 Aug 2017, Proceedings of the 26th USENIX Security Symposium. USENIX, p. 625-642 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  305. Published

    Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift

    Barbero, F., Pendlebury, F., Pierazzi, F. & Cavallaro, L., 2022, IEEE Symposium on Security and Privacy (IEEE S&P). p. 1165-1183

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  306. Published

    Transduction with confidence and credibility

    Saunders, C., Gammerman, A. & Vovk, V., 1999, Proceedings of the Sixteenth International Joint Conference on Articial Intelligence. Dean, T. (ed.). San Francisco, CA: Morgan Kaufmann, Vol. 2. p. 722-726 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  307. Published

    Transductive Confidence Machine is universal

    Nouretdinov, I., Vyugin, V. & Gammerman, A., 2003, Lecture Notes in Artificial Intelligence. Springer, Vol. 2842. p. 283-297 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  308. Published

    Transductive confidence machines for pattern recognition

    Proedrou, K., Nouretdinov, I., Vovk, V. & Gammerman, A., 2002, Proceedings of the Thirteenth European Conference on Machine Learning. Elomaa, T., Mannila, H. & Toivonen, H. (eds.). London: Springer, p. 381-390 10 p. (Lecture Notes in Computer Science; vol. 2430).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  309. Published

    Transductive conformal predictors

    Vovk, V., 2013, Proceedings of the Ninth Conference on Artificial Intelligence Applications and Innovations. Heidelberg: Springer, Vol. 412. p. 348-360 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  310. Published

    Transfer Learning of EEG for Analysis of Interictal Epileptiform Discharges

    Cheong Took, C., Alty, S., Martin-Lopez, D., Valentin, A., Alarcon, G. & Sanei, S., 19 Nov 2021, International Conference on e-Health and Bioengineering. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  311. Published

    Transition dynamics in internationally assisted e-government projects: An Actor Network Theory perspective.

    Kromidha, E., 2013, Proceedings of IFIP 9.4: The 12th International Conference on Social Implications of Computers in Developing Countries, 19-22 May 2013. Ocho Rios, Jamaica

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  312. Published

    TransMIDI: A System for MIDI Sessions Over the Network Using Transis

    Gang, D., Chockler, G., Anker, T., Kremer, A. & Winkler, T., 1997, Proceedings of International Computer Music Conference (ICMC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  313. Unpublished

    Transnational capital and the end of national social settlements?: evidence from Sweden

    Vernon, G. & Rees, C., Sep 2001, (Unpublished) International Conference on 'Small States in World Markets: Fifteen Years On'. Gothenburg.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  314. Unpublished

    Transnational capital and the end of national social settlements?: recent developments in Sweden

    Vernon, G. & Rees, C., Apr 2001, (Unpublished) Industrial Relations in the European Community (IREC) Conference on 'Globalization, Competitiveness and the Government of Employment in Europe'. Madrid.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  315. Published

    Transnational Clerical Elite Network: Shiite Political Activism in the Middle East

    Kalantari, M., 2014, 55th Annual International Studies Association Convention, Toronto. 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  316. Published

    Transverse Profile and Emittance Measurements With a Laser Stripping System During the CERN LINAC4 Commissioning at 3 and 12 MeV

    Roncarolo, F., Bravin, E., Hofmann, T., Raich, U., Zocca, F., Boorman, G., Bosco, A., Gibson, S., Kruchinin, K., Pozimski, J. & Gabor, C., 5 Sep 2014, 27th Linear Accelerator Conference: LINAC14, Geneva, Switzerland, 31 August - 5 September 2014. p. 506-509 4 p. TUPP035

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  317. Published

    Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices

    Reddington, J. & Coles-Kemp, L., 1 Jul 2011, Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies. Edinburgh, Scotland, UK: Association for Computational Linguistics, p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  318. Published

    Trapping Domain Walls in Diode-like Structures

    Bryan, M. T., Schrefl, T., Gibbs, M. R. & Allwood, D. A., 25 Jun 2007, INTERMAG 2006 - IEEE International Magnetics Conference. p. 758 1 p. 4262191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  319. Published

    Trashing IMSI catchers in mobile networks

    Khan, M. & Mitchell, C. J., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, July 18-20, 2017: WiSec '17 . Association for Computing Machinery (ACM), p. 207-218 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  320. Published

    Travelling through facebook; exploring affordances through the Lens of age

    Panteli, N., Marder, B., Davenport, J. H. & Nemetz, F., 2014, ECIS 2014 Proceedings - 22nd European Conference on Information Systems. Association for Information Systems (AIS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  321. Published

    Tree Automata as Algebras: Minimisation and Determinisation

    van Heerdt, G., Kappé, T., Rot, J., Sammartino, M. & Silva, A., Jun 2019, 8th Conference on Algebra and Coalgebra in Computer Science, CALCO 2019. Roggenbach, M. & Sokolova, A. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-22 22 p. 6. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 139).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. Published

    Tree polymatrix games are PPAD-hard

    Deligkas, A., Fearnley, J. & Savani, R., 29 Jun 2020, 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Czumaj, A., Dawar, A. & Merelli, E. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. 38. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 168).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  323. Published

    Tree-Based Cryptographic Access Control

    Alderman, J., Farley, N. & Crampton, J., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag, Vol. 10492 . p. 47-64 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  324. Published

    Triassic and Jurassic Sandstones in the Banda Arc: Provenance and correlations with the Australian NW Shelf

    Zimmermann, S. & Hall, R., 25 May 2016, Proceedings, Indonesian Petroleum Association Fortieth Annual Convention 2016. Indonesian Petroleum Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  325. Published

    True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots

    Seifert, C., Komisarczuk, P. & Welch, I., 2009, The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece. p. 63-69 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  326. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  327. Published

    Trust Strategies for ART Testbed

    Kafali, O. & Yolum, P., 2006, Ninth International Workshop on Trust in Agent Societies, AAMAS. p. 43-49 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  328. Forthcoming

    Trust under the Panopticon: Factors Influencing Trust within Contemporary Social Movements

    Azer, E., Zheng, Y. & Harindranath, G., 14 Feb 2019, (Accepted/In press) 35th EGOS Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  329. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  330. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  331. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  332. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  333. Forthcoming

    Truth-Functional Logic and the Form of a Tractarian Proposition

    Spinney, O., 2022, (Accepted/In press) Public Reason.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  334. Published

    Tunable balancing of RSA

    McKee, J., Galbraith, S. D. & Heneghan, C., 2005, ACISP 10. p. 280-292 (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  335. Published

    Two Edge Modification Problems without Polynomial Kernels

    Kratsch, S. & Wahlström, M., 1 Sep 2009, Parameterized and Exact Computation : 4th International Workshop, IWPEC 2009. Chen, J. & Fomin, F. V. (eds.). Denmark, Copenhagen: Springer, Vol. 5917. p. 264-275 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  336. Published

    Two Proposals for Improving the Image-Based Authentication System: H-IBAS-H

    Vuksanovic, B. & Al-Sinani, H., 2009, INTERNET-09: First International Conference on Evolving Internet, Cannes/La Bocca, French Riviera, France, August 23-29 2009 . Washington: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  337. Published

    Two's Company, Three's a Crowd: Consensus-Halving for a Constant Number of Agents

    Deligkas, A., Filos-Ratsikas, A. & Hollender, A., 18 Jul 2021, ACM Conference on Economics and Computation: EC '21. p. 347-368 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  338. Published

    Two-Stage Classification Model to Detect Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 113-120 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  339. Published

    Typed Operational Semantics for Dependent Record Types

    Feng, Y. & Luo, Z., 2011, Proceedings of Types for Proofs and Programs (TYPES'09), EPTCS 53.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  340. Published

    Type-theoretic semantics for SemNet

    Shiu, S., Luo, Z. & Garigliano, R., 1996, Proc. of Inter. Conf. on Formal and Applied Practical Reasoning, LNAI 1085.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  341. Published

    Type-Theoretical Semantics with Coercive Subtyping

    Luo, Z., 2010, Semantics and Linguistic Theory. Vol. 20. p. 38-56 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  342. Published

    Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures

    Bilal, Z. & Martin, K. M., 2013, Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. IEEE, p. 304-309

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  343. Published

    Unboundedness and downward closures of higher-order pushdown automata

    Hague, M., Kochems, J. & Ong, C-H. L., 11 Jan 2016, Principles of Programming Languages: POPL '16. New York, NY: ACM, p. 151-163 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  344. Published

    Understanding and developing role-based administrative models

    Crampton, J., 2005, Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  345. Published

    Understanding knowledge management software acquisition in organisations: A conceptual framework

    Le-Nguyen, K., Harindranath, G. & Dyerson, R., 2007, PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2007, SECTIONS 1-6. KAOHSIUNG: NATL SUN YAT-SEN UNIV, p. U1096-U1108 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  346. Published

    Understanding knowledge management software-organisation misalignments from an institutional perspective: A case study of a global IT-management consultancy firm

    Le-Nguyen, K., Harindranath, G. & Dyerson, R., 2008, 12TH PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS (PACIS 2008). KOWLOON: CITY UNIVERSITY HONG KONG, p. 85A-+ 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  347. Published

    Understanding Subcultures and Change Dynamics in E-Government: An Empirical Study of a Local Government in Malaysia

    Jackson, S. & Wong, K., 11 Jul 2015, 10th Annual Midwest Association for Information Systems Conference, Pittsburg, Kansas. Vol. 23. p. 1-3 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  348. Published

    Understanding the creation of ICT-value in the building and construction industry

    Linderoth, H. C. J. & Elbanna, A., 5 Sep 2016, Proceedings of the 32nd Annual ARCOM Conference, 5-7 September 2016, Manchester, UK. Vol. 1. p. 103-112 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  349. Published

    Understanding the dynamic process of emerging ICT adoption in UK service SMEs

    Eze, S., Duan, Y. & Jackson, S., 2011, UK Academy for Information Systems Conference Proceedings .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  350. Published

    Understanding the experience-centeredness of security and privacy technologies

    Dunphy, P., Vines, J., Coles-Kemp, L., Clarke, R., Vlachokyriakos, V., Wright, P., McCarthy, J. & Olivier, P., 2014, Proceedings of the 2014 New Security Paradigms Workshop. . ACM, p. 83-94 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  351. Published

    Understanding the Impact of ICT Adoption and Use in South African Manufacturing and Logistics SMEs: A Firm, Market and Regulatory (FMR) Context Perspective

    Gono, S., Harindranath, G. & Özcan, G. B., Nov 2014, Proceedings of the 2014 ISBE Conference, Manchester, 5-6 Nov 2014. ISBE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  352. Published

    Understanding the implementation of social standards in global supply chains: A multi-dimensional analysis

    Soundararajan, V., Sep 2013, 27th annual British Academy of Management (BAM) Conference . Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  353. Published

    Understanding the Indian Film Industry: the good, the bad and the ugly

    Sen Gupta, S., 2016, Knowledge Organisation and Learning Conference. London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  354. Published

    Understanding the organo-carbonate associations in carbonaceous chondrites with the use of micro-Raman analysis

    Chan, QHS. & Zolensky, ME., 2015, European Planetary Science Congress 2015, held 27 September - 2 October, 2015 in Nantes, France. 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  355. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  356. Published

    Unfolding in particle physics: a window on solving inverse problems

    Spano, F., Oct 2014, contribution to Top2013, 6th International Workshop on Top Quark Phyiscs, 14th-19th September 2013 , Durbach, Germany. Husemann, U., Mildner, H. & Roscher, F. (eds.). Verlag Deutsches Elektronen-Synchrotron, Vol. DESY-PROC-2014-02. p. 256-261 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  357. Published

    Unified Model for Data Security -- A Position Paper

    Akram, R. N. & Ko, R. K. L., 1 Sep 2014, The 1st International Workshop on the Emerging Future Internet and Network Security (IEEE EFINS 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Aiash, M. & Loo, J. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  358. Published

    Uniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent

    Cohen, L. & Rowe, R., 4 Sep 2018, 27th EACSL Annual Conference on Computer Science Logic (CSL 2018). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 119. p. 17:1-17:16 16 p. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  359. Published

    Uniform, integral and efficient proofs for the determinant identities

    Tzameret, I. & Cook, S., 18 Aug 2017, 2017 32nd Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). IEEE, Vol. 32. p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  360. Published

    Unifying Theories in Different Institutions

    Arrais, M. & Fiadeiro, J. L., 1996, COMPASS/ADT. Springer, Vol. 1130. p. 81-101 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  361. Published

    Unique View of C Asteriod Regolith from the Jbilet Winselwan CM Chondrite

    Zolensky, M., Mikouchi, T., Hagiya, K., Ohsumi, K., Komatsu, M., Chan, Q. HS., Le, L., Kring, D., Cato, M. & Fagan, A. L., 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  362. Published

    Universal portfolio selection

    Vovk, V. & Watkins, C. J. H. C., 1998, Proceedings of the Eleventh Annual Conference on Computational Learning Theory. New York: ACM Press, p. 12-23 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  363. Published

    Universal Probability-Free Conformal Prediction

    Vovk, V. & Pavlovic, D., 2016, Proceedings of COPA 2016: Fifth Symposium on Conformal and Probabilistic Prediction with Applications. Springer, Vol. 9653. p. 40-47 8 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  364. Published

    Universal well-calibrated algorithm for on-line classification

    Vovk, V., 2003, Proceedings of the Sixteenth Annual Conference on Learning Theory and Seventh Kernel Workshop. Scholkopf, B. & Warmuth, M. K. (eds.). p. 358-372 15 p. (Lecture Notes in Artificial Intelligence; vol. 2777).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  365. Published

    Unknown quantum operations

    Schack, R., 2004, Quantum Theory: Reconsideration of Foundations 2. A., K. (ed.). Växjö: Växjö University Press, p. 507-518

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  366. Published

    Unknown Quantum States and Operations, a Bayesian View

    Fuchs, C. A. & Schack, R., 2004, Quantum State Estimation: Lecture Notes in Physics {\bf 649}. Řeháček, J. & Paris, M. G. A. (eds.). Berlin: Springer Verlag, p. 147-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  367. Published

    Unraveling the complexities of interdisciplinary software engineering

    Mehandjiev, N., Layzell, P. & Brereton, P., 2004, ELEVENTH ANNUAL INTERNATIONAL WORKSHOP ON SOFTWARE TECHNOLOGY AND ENGINEERING PRACTICE, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 214-221 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  368. Published

    Unrestricted Faithful Rounding is Good Enough for Some LNS Applications

    Arnold, M. G. & Walter, C. D., 2001, 15th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  369. Published

    Unsupervised Induction of Stochastic Context Free Grammars with Distributional Clustering

    Clark, A., 1 Jul 2001, Proc. of Conference on Computational Natural Language Learning. p. 105-112

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  370. Published

    Upgrading Technological Capabilities by Developing Country Multinational Companies

    Rui, H. & Cuervo-Cazurra, A., 2013, Proceedings of the 55th Annual Meeting of the Academy of International Business: "Bridging the Divide: Linking IB to Complementary Disciplines and Practice". McDougall-Covin, P. & Kiyak, T. (eds.). 2013 Academy of International Business, p. 277-278 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  371. Published

    Upgrading Technological Capabilities by Developing Country Multinational Companies

    Rui, H. & Cuervo-Cazurra, A., 2013, The 73rd Annual Meeting of the Academy of Management: “Capitalism in Question”. Academy of Management

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  372. Published

    Uranium and metal concentrations in community water systems across the United States, 2006-2011

    Ravalli, F., Yu, Y., Bostick, B. C., Chillrud, S. N., Schilling, K., Basu, A., Navas-Acien, A. & Nigra, A. E., 2021, International Society for Environmental Epidemiology (ISEE) annual meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  373. Submitted

    USAGE PATTERNS AND CHALLENGES OF MULTIPURPOSE COMMUNITY TELECENTRES IN MALAWI

    Kapondera, S. K. & Chigona, W., 2017, (Submitted) SIG Global Development.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  374. Published

    Use of Improvement Strategies for Excessive Inventory Levels Reduction

    Shah, S. & Chen, S., 17 Mar 2021, Proceedings of 2nd IEEE International Conference on Computational Intelligence and Knowledge Economy, ICCIKE 2021. Naranje, V., Singh, B. & Velan, S. (eds.). IEEE, p. 181-186 6 p. 9410761. (Proceedings of 2nd IEEE International Conference on Computational Intelligence and Knowledge Economy, ICCIKE 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  375. Published

    Use of process modeling in product development integration within manufacturing environment

    Syed, M. H. & Shah, S., 2013, Manufacturing Science and Technology (ICMST2013). p. 1210-1214 5 p. (Advanced Materials Research; vol. 816-817).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  376. Published

    Use of Satisfaction-Satisfaction Matrix (SSM) to evaluate E-Government services from the perspective of Japanese citizens and government service providers

    Wong, K., Nishimoto, H., Nishigaki, Y. & Jackson, S., 2013, 24th Australasian Conference on Information Systems, Melbourne, AU, 04 - 06 Dec.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  377. Published

    User acceptance of electronic commerce: lessons learned from the Bled eConference

    van der Heijden, H., 2012, 25th Special Anniversary Proceedings of the Bled eConference,. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  378. Published

    User acceptance of emergency alert technology: A case study

    Wu, P. F., 1 Jan 2009, ISCRAM 2009 - 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Information Systems for Crisis Response and Management, ISCRAM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  379. Published

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 22 Oct 2020, Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press, p. 664-672 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  380. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  381. Published

    User Preference Analysis of Internet Social Media services

    Pant, V., Harindranath, G. & Wagner, W. P., 13 Jan 2016, 2015 International Conference on Information Resource Management (Conf-IRM), Ottawa, Canada, May.. Vol. 34.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  382. Published

    User satisfaction evaluation of Malaysian e-government education services

    Wong, M. S. & Jackson, S., 5 Feb 2018, 23rd IEEE International Technology Management Conference, Madeira Island, Portugal. IEEE, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  383. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  384. Published

    Using Argument-based Features to Predict and Analyse Review Helpfulness

    Liu, H., Gao, Y., Lv, P., Li, M., Geng, S., Li, M. & Wang, H., Sep 2017, Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Copenhagen, Denmark: Association for Computational Linguistics, p. 1358–1363 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  385. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  386. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  387. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  388. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  389. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  390. Published

    Using explicit state to describe architectures

    Lopes, A. & Fiadeiro, J. L., 1999, FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING. Finance, JP. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-160 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  391. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  392. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  393. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  394. Published

    Using multiple chains for Gibbs sampling in mixed graphical association models

    Brewer, M., Luo, Z. & Gammerman, A., 1994, Computational Statistics. p. 185-189

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  395. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  396. Published

    Using NLG and sensors to support personal narrative for children with complex communication needs

    Black, R., Reddington, J., Reiter, E., Tintarev, N. & Waller, A., 2010, Proceedings of the NAACL HLT 2010 Workshop on Speech and Language Processing for Assistive Technologies. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  397. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  398. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  399. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  400. Published

    USING SATELLITES FOR PROVIDING BROADBAND ISLAND INTERCONNECTION-THE RACE IIlR2074 (CATALYST) PROJECT

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, AIAA International Communications Satellite Systems Conference, 15 th, San Diego, CA. p. 407-412 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  401. Published

    Using the Choice Framework to Situate Cases of Collective Action in Capabilities Thinking: The Example of Public Procurement

    Kleine, D., Jun 2013, Maitreyee - e-Journal of the Human Development and Capability Association. Human Development and Capability Association (HDCA), p. 15-18 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  402. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  403. Published

    Using Verification Technology to Specify and Detect Malware

    Holzer, A., Kinder, J. & Veith, H., Feb 2007, 11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers. Springer, p. 497-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  404. Published

    Utilisation de la méthode de la matrice R dans les calculs de l'ionisation d'atomes par impact d'électrons rapides

    Mota-Furtado, F., O'Mahony, P. & Hennecart, D. (ed.), 1989, Proceedings of Invited Lectures presented at 12ème Colloque sur la Physique des Collisions Atomiques et Electroniques (Caen, 21-24 June 1988), Conférences Invitées. Vol. 2. p. 101-117

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  405. Published

    Utilising Geological Field Measurements and Historic Eruption Volumes to Estimate the Volume of Santorini's Magma Chamber

    Browning, J., Drymoni, K. & Gudmundsson, A., 2015, American Geophysical Union, Fall Meeting 2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  406. Published

    Valid Probabilistic Prediction of Life Status after Percutaneous Coronary Intervention procedure

    Volkhonskiy, D., Nouretdinov, I., Gammerman, A. & Lim, P., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  407. Published

    Validating an Insider Threat Detection System: A Real Scenario Perspective

    Agrafiotis, I., Erola, A., Happa, J., Goldsmith, M. & Creese, S., 4 Aug 2016, IEEE Security and Privacy Workshop on Research for Insider Threat. IEEE, p. 286-295 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  408. Published

    Validation of a Seven Serum Biomarker Panel in Ovarian Cancer

    Timms, J. F., Arslan-Low, E., Cubizolles, M., Lomas, L., Yip, C., Meng, X-Y., Hogdall, E., Gentry-Maharaj, A., Ford, J., Burford, B., Nouretdinov, I., Vovk, V., Luo, Z., Menon, U., Gammerman, A., Fung, E. T. & Jacobs, I., 2007, Proceedings of the 15th International Meeting of the European Society of Gynaecological Oncology.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  409. Published

    Variability and rigour in Service Computing engineering

    Ter Beek, M. H., Gnesi, S., Fantechi, A. & Fiadeiro, J. L., 1 Jan 2012, Proceedings - 2011 34th IEEE Software Engineering Workshop, SEW 2011. p. 122-127 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  410. Published

    Varying Representation Schemata vs Fact Updating in KB Management

    Carapuça, R. & Fiadeiro, J. L., 1986, DS-2. p. 71-87 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  411. Published

    Venn-Abers predictors

    Vovk, V. & Petej, I., 2014, Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence. p. 829-838 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  412. Published

    Veraci fizioni. Sullo statuto della letteratura nella cultura delle Corti

    Jossa, S., 2010, A. Quondam (ed.), Classicismo e culture di Antico regime (Roma: Bulzoni, 2010). Quondam, A. (ed.). Bulzoni, p. 197-212 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  413. Published

    Verifying Asynchronous Interactions via Communicating Session Automata

    Lange, J. & Yoshida, N., 12 Jul 2019, Computer Aided Verification - 31st International Conference, CAV 2019, Proceedings. Dillig, I. & Tasiran, S. (eds.). Springer Verlag, p. 97-117 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11561 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  414. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  415. Published

    Vers une architecture modulaire d'agent argumentatif pour la composition de services

    Morge, M., McGinnis, J., Bromuri, S., Toni, F. C., Mancarella, P. & Stathis, K., 1 Nov 2006, Proc. of the of 15th Journees Francophones sur les Systemes M ulti-Agents (JFSMA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. Published

    Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Dec 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, p. 391-398 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  417. Published

    Virtual infrastructure for collision-prone wireless networks

    Chockler, G., Gilbert, S. & Lynch, N., Aug 2008, Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing. Toronto, ON, Canada: ACM, p. 233-242 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  418. Published

    Virtual Interacting Network Community: Exploiting Multi-core Architectures to Increase Security

    Baiardi, F. & Sgandurra, D., 2008, Proceedings of the 5th Conference on Computing Frontiers. New York, NY, USA: ACM, p. 111-112 2 p. (CF '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  419. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  420. Published

    VISAR and VenSAR: Two Proposed Radar Investigations of Venus

    Hensley, S., Campbell, B., Perkovic-Martin, D., Wheeler, K., Kiefer, W. & Ghail, R., 21 Sep 2020, 2020 IEEE Radar Conference, RadarConf 2020. Institute of Electrical and Electronics Engineers Inc., 9266323. (IEEE National Radar Conference - Proceedings; vol. 2020-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  421. Published

    Visible-Spectrum Biometric Retina Recognition

    Borgen, H., Bours, P. & Wolthusen, S. D., 15 Aug 2008, Proc. 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP '08). IEEE Computer Society Press, p. 1056-1062

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  422. E-pub ahead of print

    Vision: Design Fiction for Cybersecurity: Using Science Fiction to Help Software Developers Anticipate Problems

    Loureiro-Koechlin, C., Córdoba-Pachón, J-R., Weir, C., Demetriou, S. & Coventry, L., 29 Sep 2022, (E-pub ahead of print) EuroUSEC '22: Proceedings of the 2022 European Symposium on Usable Security. Association for Computing Machinery (ACM), p. 79-84 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  423. Published

    Visualizing narratives: The case of the celebrity CEO (Panel discussion)

    Reppel, A. & Kravets, O., 7 Jul 2016, Proceedings of the 41st Annual Macromarketing Conference. p. 107-108

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. Published

    Visuo-Vestibular Self-Motion Conflicts Impact Vestibular Processing

    Arshad, I., Ferrè, E. R. & Gallagher, M., 2021, Experimental Psychology Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  425. Published

    vPlanSim: An Open Source Graphical Interface for the Visualisation and Simulation of AI Systems

    Roberts, J., Mastorakis, G., Lazaruk, B., Franco Aixela, S., Stokes, A. & Bernardini, S., 17 May 2021, The 31st International Conference on Automated Planning and Scheduling (ICAPS 2021). 1 ed. Vol. 31. p. 486-490 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  426. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  427. Published

    Walrasian Equilibria in Markets with Small Demands

    Deligkas, A., Melissourgos, T. & Spirakis, P. G., May 2021, International Conference on Autonomous Agents and Multiagent Systems: AAMAS '21. p. 413-419 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  428. Published

    Warlordism and the making of the Roman imperial army

    Rankov, B., 2018, Warlords and Interstate Relations in the Ancient Mediterranean. Naco del Hoyo, T. & Lopez Sanchez, F. (eds.). Leiden/Boston MA: E. J. Brill, p. 415-25 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  429. Published

    Water Logging in Keshanbpur: A Focus to the Coping Strategies of the People

    Adri, N. & Islam, I., 2010, Proceedings of International Conference on Environmental aspects of Bangladesh (ICEAB 10). Japan, p. 33-36 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  430. Published

    We Crashed, Now What?

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 3 Oct 2010, Proceedings of the 6th Workshop on Hot Topics in System Dependability (HotDep'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  431. Published

    Weak Synchrony Models and Failure Detectors for Message Passing (k-)Set Agreement

    Biely, M., Robinson, P. & Schmid, U., 2009, Principles of Distributed Systems, 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings. p. 285-299 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  432. Published

    Weak Transitivity in Coercive Subtyping

    Luo, Y., Luo, Z. & Soloviev, S., 2003, Types for Proofs and Programs, Proc. of Inter Conf of TYPES'02. LNCS 2646. p. 220--239

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  433. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Tileria, M., Blasco, J. & Suarez-Tangil, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  434. Published

    Weather Based Photovoltaic Energy Generation Prediction Using LSTM Networks

    Arshi, S., Zhang, L. & Strachan, B., 30 Sep 2019, 2019 International Joint Conference on Neural Networks (IJCNN). International Joint Conference on Neural Networks (IJCNN): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  435. Published

    Web based student information management system in universities: experiences from Mzuzu University

    Lubanga, S. C., Chawinga, W. D., Majawa, F. & Kapondera, S., 2018, Standing Conference of the Eastern, Central and Southern Africa Librarians and Institutions (SCESCAL).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  436. Published

    Web Password Recovery: A Necessary Evil?

    Al Maqbali, F. & Mitchell, C. J., 2019, Proceedings of the Future Technology Conference (FTC) 2018, Volume 2: Vancouver, November 2018. Springer-Verlag, p. 324-341 18 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  437. Published

    Web Server on a SIM Card

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2010, Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. Ao, S. I., Gelman, L., Hukins, D. WL., Hunter, A. & Korsunsky, A. M. (eds.). Newswood Limited, Vol. I. p. 253-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  438. Published

    Weighted Kernel Regression for Predicting Changing Dependencies

    Busuttil, S. & Kalnishkan, Y., 2007, Machine Learning: ECML 2007, 18th European Conference on Machine Learning: volume 4701 of Lecture Notes in Computer Science. Springer, p. 535-542 (Lecture Notes in Computer Science; vol. 4701).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  439. Published

    Wellbore instability during plasma-torch drilling in geothermal reservoirs

    Bazargan, M., Meredith, P., Forbes Inskip, N., Gudmundsson, A., Soliman, M., Habibpour, M., Rezaei, A. & Browning, J., 2015, 49th US Rock Mechanics / Geomechanics Symposium, San Francisco, CA, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  440. Published

    Well-calibrated predictions from online compression models

    Vovk, V., 2003, Proceedings of the Fourteenth International Conference on Algorithmic Learning Theory. Gavalda, R., Jantke, K. & Takimoto, E. (eds.). Berlin: Springer, p. 268-282 15 p. (Lecture Notes in Artificial Intelligence; vol. 2842).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  441. E-pub ahead of print

    Wellcomensis MS.MSL.14 as a Therapeutic Handbook

    Zipser, B., 18 May 2020, (E-pub ahead of print) Exploring Greek Manuscripts in the Library at Wellcome Collection London. Bouras-Vallianatos, P. (ed.). 1st ed. Routledge, p. 54-65 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  442. Published

    Wellness Tourism and Incremental Quality of Life: A Study of a Niche Tourist Segment of Muay Thai Enthusiasts

    Hosany, S. & Deesilatham, S., 2015, Travel and Tourism Research Association (TTRA) European Chapter Conference: Service Innovation and Experiences, Innsbruck, Austria, April 22-24.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  443. Published

    Wellness Tourism and Quality of Life: Understanding the Motives, Lifestyle, Feelings, Satisfaction and Subjective Well-Being of Muay Thai Enthusiasts.

    Deesilatham, S. & Hosany, S., 2015, The European Institute of Retailing and Service Studies (EIRASS) 22nd International Conference on Recent Advances in Retailing & Services Science. Montreal, Canada, July 27-30.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  444. Published

    Wellness Tourism: Determinants of Incremental Enhancement in Tourists’ Quality of Life

    Hosany, S. & Deesilatham, S., 2015, 3rd World Research Summit for Tourism and Hospitality and 1st USA-China Tourism Research Summit: Transforming Partnerships, Orlando, USA, December 15-19.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  445. Published

    Wellness Tourism: Understanding Muay Thai Tourists Travel Motivation

    Deesilatham, S. & Hosany, S., 2016, The European Institute of Retailing and Service Studies (EIRASS) 23rd International Conference on Recent Advances in Retailing & Services Science. Edinburgh, Scotland, July 11-14.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  446. Published

    Weyl's Predicative Classical Mathematics as a Logic-Enriched Type Theory

    Adams, R. & Luo, Z., 2007, Types for Proofs and Programs. Altenkirch, T. & McBride, C. (eds.). Springer, Vol. 4502. p. 1-17 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  447. Published

    What a clinical psychologist needs to know

    Berger, M., 1987, Conference on the Future of Training in Clinical Psychology. British Psychological Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  448. Published

    What CSR scholars can learn from the innovation literature

    Preuss, L., Apr 2010, annual conference of the UK Association of the European Business Ethics Network (EBEN-UK).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  449. Published

    What happened to my commitment? Exception diagnosis among misalignment and misbehavior

    Kafali, O., Chesani, F. & Torroni, P., 2010, Computational Logic in Multi-Agent Systems (CLIMA XI). Vol. 6245. p. 82-98 17 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  450. Published

    What impact does peer support have on school climate? Findings from a 4 month case study of an English secondary school

    James, A., Smith, P. K. & Radford, L., 2010, Proceedings of the II Congress on Community Life at School.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  451. Published

    What Influences People’s View of Cyber Security Culture in Higher Education Institutions? An Empirical Study

    Mersinas, K., Durojaiye, T. & Watling, D., 3 Oct 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems CYBER 2021. p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  452. E-pub ahead of print

    What is decidable about string constraints with the ReplaceAll function

    Chen, T., Chen, Y., Hague, M., Lin, A. & Wu, Z., 27 Dec 2017, (E-pub ahead of print) Proceedings of the ACM on Programming Languages. ACM, Vol. 2. p. 1-29 29 p. 3

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  453. Published

    When do propagating dykes erupt? Insights from a study of dyke paths at Santorini volcano, Greece

    Drymoni, K., Browning, J., Lecoeur, N. & Gudmundsson, A., 2016, VMSG 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  454. Published

    When Hardware Meets Software: a Bulletproof Solution to Forensic Memory Acquisition

    Reina, A., Fattori, A., Pagani, F., Cavallaro, L. & Bruschi, D., Dec 2012, Annual Computer Security Application Conference (ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  455. Published

    When the Civic Turn turns Digital: Designing Safe and Secure Refugee Resettlement

    Jensen, R. B., Coles-Kemp, L. & Talhouk, R., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  456. E-pub ahead of print

    White-Box Atomic Multicast

    Gotsman, A., Lefort, A. & Chockler, G., 22 Aug 2019, (E-pub ahead of print) 49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2019). p. 176-187 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  457. Published

    Who is in Control in Crowdsourcing Initiatives? An Examination of the Case of Crowdmapping

    Shahid, A. R. & Elbanna, A., 2 Aug 2016, Nordic Contributions in IS Research: 7th Scandinavian Conference on Information Systems, SCIS 2016 and IFIP8.6 2016, Ljungskile, Sweden, August 7-10, 2016, Proceedings. Springer International Publishing, Vol. 259. p. 135-148 14 p. (Lecture Notes in Business Information Processing; vol. 259).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  458. Published

    Who says personas can't dance? The use of comic strips to design information security personas

    Lewis, M. & Coles-Kemp, L., 2014, CHI EA '14 : CHI '14 Extended Abstracts on Human Factors in Computing Systems . ACM, p. 2485 2490 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  459. Published

    Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy

    Sivakumaran, P. & Blasco, J., Sep 2021, Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks: SECURECOMM 2021. Springer, p. 252-272 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  460. Published

    Why Do Shoppers Choose your Pack? The Impact of Product Package Design on Consumers’ Brand Stereotypes and Purchase Intention

    Yuen, T. W., Perschke, E., He, H. & Davies, G., 27 May 2020, Proceedings of the European Marketing Academy.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  461. Published

    Why don’t things happen? Hurdles to green practices

    Guenther, E., Hockerts, K., Linnenluecke, M. & Preuss, L., Aug 2009, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  462. Published

    Why we should take a second look at access control in Unix

    Crampton, J., 2008, Proceedings of 13th Nordic Workshop on Secure IT Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  463. Published

    Winning Regions of Higher‐Order Pushdown Games

    Carayol, A., Hague, M., Meyer, A., Ong, C-H. L. & Serre, O., 2008, LICS: Logic in Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  464. Published

    Winning Regions of Pushdown Parity Games: A Saturation Method

    Hague, M. & Ong, C-H. L., 2009, Concur: Concurrency Theory.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  465. Unpublished

    Women's Political Legitimacy in Zimbabwe

    Zigomo, K., 1 Jul 2019, (Unpublished) Women's Voices in Politics & Sexuality in Africa.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  466. Unpublished

    Work organization, employee voice and engagement: exploring the connections

    Rees, C., Gatenby, M., Alfes, K., Soane, E. & Truss, K., Jul 2009, (Unpublished) British Universities Industrial Relations Association (BUIRA) 59th Annual Conference. Cardiff.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  467. In preparation

    Working towards the Millennium Development Goals: NGO Accountability and Performance Assessment

    Agyemang, G., Owusu, C. & Giovannoni, E., 2015, (In preparation) British Accounting and Finance Association.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  468. Unpublished

    Workshop And the ICT4kids Oscar goes to…: Good practice in engaging children and youth in development

    Kleine, D., Hollow, D. & Poveda Villalba, S., 2014, (Unpublished) Workshop And the ICT4kids Oscar goes to…: Good practice in engaging children and youth in development. Deutsche Welle

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  469. Published

    Worldwide Supply Chain Strategies

    Aboutalebi, R., 28 Oct 2015, In: EAMSA (Euro-Asia Management Studies Association), the 32nd Annual Conference of EAMSA: Theory and Practice in Bringing Europe and Asia- Contemporary Challenges in International Marketing. 28-31 October 2015, SOAS, University of London, England, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  470. Published

    Yiddish Songs of London: Jewish Migration and Anglicisation

    Lachs, V., 2013, The London Reader 1: Essays from Londonicity 2011. p. 85-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  471. Published

    You Are The Hero: Stephen Mooney's The Cursory Epic

    Gene-Rowe, F., 28 Jun 2016, SFRA Conference 2016. Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  472. E-pub ahead of print

    You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques

    Loe, A. F. & Quaglia, E. A., 6 Nov 2019, (E-pub ahead of print) CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 2231-2247 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  473. Published

    Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G., 1 Nov 2009, CCS '09 Proceedings of the 16th ACM conference on Computer and communications security. New York: ACM, p. 635-647

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  474. Published

    Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    Li, W., Mitchell, C. J. & Chen, T., 22 Dec 2018, Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers. Matyáš, V., Švenda, P., Stajano, F., Christianson, B. & Anderson, J. (eds.). Springer, p. 24-41 18 p. (Lecture Notes in Computer Science; vol. 11286).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  475. Published

    Zemax simulations for an optical system for a diffraction radiation monitor at cesrta

    Aumeyr, T., Karataev, P., Bobb, L. M., Bolzon, B., Lefevre, T., Mazzoni, S. & Billing, M. G., 24 Dec 2013, IPAC 2013: Proceedings of the 4th International Particle Accelerator Conference. p. 789-791 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  476. Published

    Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

    Ankele, R., Dobraunig, C., Guo, J., Lambooij, E., Leander, G. & Todo, Y., 8 Mar 2019, IACR Transactions on Symmetric Cryptology. 1 ed. Paris, France: Ruhr-Universität Bochum, Vol. 2019. p. 192-235 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  477. Published

    Zero-point probability for linear source separation

    Scruby, G. J. & Flockton, S., 1999, Advances in Soft Computing - Engineering Design and Manufacturing. Roy, R., Furuhashi, T. & Chawdhry, P. K. (eds.). SPRINGER-VERLAG BERLIN

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  478. Published

    Zubin Kanga: “The soloist has many faces: Examining the expanding skillset of the modern freelance musician”, RMA Study Day, The Classical Musician in the 21st Century, 23 May 2019.

    Kanga, Z., 2019, RMA Study Day, The Classical Musician in the 21st Century, 23 May 2019. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  479. Published

    Zubin Kanga: “WIKI-PIANO: an internet-based collaborative composition”, lecture-recital at the Music and/as Process conference, Institute of Contemporary Music Performance, London, 26 July 2019.

    Kanga, Z., 2019, Music and/as Process conference, Institute of Contemporary Music Performance, London, 26 July 2019. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  480. Published

    Zubin Kanga: “WIKI-PIANO: realising an internet-composed solo piano work by Alexander Schubert”, Getting it Right? New Music/New Technologies conference, Guildhall School of Music and Drama and the London Symphony Orchestra, 20 March 2019.

    Kanga, Z., 2019, Getting it Right? New Music/New Technologies conference, Guildhall School of Music and Drama and the London Symphony Orchestra, 20 March 2019. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  481. Published

    Βυζαντινὲς Σπουδὲς στὸ Πανεπιστήμιο τοῦ Λονδίνου

    Dendrinos, C., 1999, Α' Συνάντηση Βυζαντινολόγων Ἑλλάδος καὶ Κύπρου, 25-27 Σεπτεμβρίου 1998, Πανεπιστήμιο Ἰωαννίνων, Φιλοσοφικὴ Σχολή . Ioannina, p. 99-100

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  482. E-pub ahead of print

    δ-subgaussian Random Variables in Cryptography

    Murphy, S. & Player, R., 30 May 2019, (E-pub ahead of print) ACISP 2019 -- The 24th Australasian Conference on Information Security and Privacy. Springer, p. 251-268 18 p. (LNCS; vol. 11547).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  483. Published

    Μανουὴλ Β' Παλαιολόγου Ὑποθῆκαι βασιλικῆς ἀγωγῆς

    Dendrinos, C., 2000, Β' Συνάντηση Βυζαντινολόγων Ἐλλάδος καὶ Κύπρου, 24-26 Σεπτεμβρίου 1999, Πανεπιστήμιο Ἀθηνῶν, Φιλοσοφικὴ Σχολή. Athens, p. 159-162

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  484. Published

    Об одном критерии случайности для полных последовательностей

    Vovk, V., 1986, Седьмая тематическая конференция механико-математического факультета: Алгебра, логика и теория чисел. Moscow: Moscow State University, p. 34-37 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  485. Published

    澳門開展地理鄉土教育的回顧與反思

    Tam, T-I., May 2013, 第十七屆臺灣地理國際學術研討會論文集: 十二年國教下地理教育與環境教育的展望. Taipei, Taiwan (R.O.C.): Department of Geography, National Taiwan Normal University, p. B2-1-B2-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  486. Entry for encyclopedia/dictionary › Research
  487. Published

    "Moriscos," "Capitulaciones de Santa Fe," and "Requerimiento"

    Cook, K., 2010, Encyclopedia of Latin America. Francis, J. M. (ed.). Washington DC: Facts on File, Vol. 1.

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  488. Published

    ‘aristocrazia’, ‘armi’, ‘cavallo’, ‘crociate’, ‘donna guerriera’, ‘nudità’, ‘spada’, ‘storia’ and ‘vergogna’

    Jossa, S., Ceserani, R. (ed.), Domenichelli, M. (ed.) & Fasano, P. (ed.), 2007, Dizionario tematico di letteratura. Torino: Utet

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  489. Published

    ‘British Empire Exhibition, 1924’, in The British Empire: A Historical Encyclopaedia, ed., Mark Doyle, 2 vols, (ABC-CLIO, 2018), Vol. 2, pp. 13-15.

    Akhtar, S., 2018, Mark Doyle, ed., The British Empire: A Historical Encyclopaedia. p. 13-15 2 p.

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  490. Published

    ‘Manuel II Palaeologus’

    Dendrinos, C., 18 Jul 2016, Encyclopedia of Renaissance Philosophy. Sgarbi, M. (ed.). Springer International Publishing, (SpringerReference).

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  491. Submitted

    ‘Rehearsal’, ‘Prologues’, ‘Actors’ Parts’, ‘Playbills’, ‘Titleboards’, ‘Prompters’, ‘Playbooks’

    Stern, T., 2016, (Submitted) The Stanford Global Shakespeare Encyclopedia . Stanford University Press

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  492. Published

    ‘Samsung: Industrialization, the State and the Transnational’

    Fitzgerald, R., 2009, P.Y.Saunier and P.Verley (eds), Palgrave Dictionary of Transnational History (2009). Palgrave

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  493. Published

    ‘The Transnational Corporation’

    Fitzgerald, R., 2009, P.Y.Saunier and P.Verley (eds), Palgrave Dictionary of Transnational History (2009). Palgrave

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  494. Published

    34 entries

    Natal Villazala, D., 2018, Oxford Dictionary of Late Antiquity. Nicholson, O. (ed.). Oxford University Press

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  495. Submitted

    Absurdism

    Goriunova, O. & Annet Dekker, 1 Jan 2022, (Submitted) Encyclopedia of New Media Art. Gere, C. (ed.). Bloomsbury

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  496. Published

    Adoption. Ancient Greek Law

    Rubinstein, L., 2009, The Oxford International Encyclopedia of Legal History. Katz, S. N. (ed.). Oxford, New York: Oxford University Press, Vol. 1. p. 40-42 3 p.

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  497. Published

    'Aestheticism'

    Livesey, R., 2011, Oxford Bibliographies Online: Victorian Literature. John, J. (ed.). Oxford University Press

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  498. Published

    Aid

    Desai, V., 2009, The International Encyclopaedia of Human Geography. Elsevier, Vol. 1. p. 84-90

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  499. Published

    Alaric I, Alexander I of Alexandria, Alexander of Jerusalem, Anatolius of Constantinople, Basiliscus, Eusebians, John Arkaph

    Gwynn, D., 2019, Brill Encyclopedia of Early Christianity.

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  500. Published

    Albania

    Zecevic, N., 2010, The Oxford Dictionary of the Middle Ages. Bjork, R. E. (ed.). Oxford University Press, Vol. 1. p. 27

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  501. Published

    Alexander Maconochie (1787-1860)

    Driver, F., 2004, Oxford Dictionary of National Biography. Oxford University Press, Vol. 35. p. 974-5

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  502. Published

    Alexandros von Tralleis

    Zipser, B., 2007, Der Neue Pauly Suppl.. Landfester, M. (ed.). J.B. Metzler Verlag, Vol. 2. p. 29-30 3 p.

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

Previous 1...7 8 9 10 11 12 13 14 ...87 Next