Home > Publications

Publications

34501 - 35000 out of 38,446Page size: 500
  1. Conference contribution › Research
  2. Published

    Entrepreneurship, small family business and Yiwu's historical development

    Rui, H., 2018, International Conference of Family Business and Entrepreneurship, 2-4 May 2018, Bali, Indonesia . International Conference of Family Business and Entrepreneurship

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Enumerating highly non-soluble groups

    Klopsch, B., 2005, FINITE GROUPS 2003. BERLIN 30: WALTER DE GRUYTER, p. 219-227 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Unpublished

    Environmental Storytelling: A Digital Frontier for Narrative Geography

    Lowe, J., 29 Aug 2019, (Unpublished) Geographies of Interactive Digital Narratives session at RGS-IBG 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Epitaxial growing of refractory metal films by laser ablation deposition

    Mikhailov, G. M., Malikov, I. V., Chernikh, A. V. & Petrashov, V., 1996, IEEE/LEOS 1996 SUMMER TOPICAL MEETINGS - ADVANCED APPLICATIONS OF LASERS IN MATERIALS AND PROCESSING, DIGEST. NEW YORK: Elphinstone Institute, p. 56 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Equal amongst Unequals: Comparing the employee share ownership experiencein the UK and Korea

    Sen Gupta, S. & Yoon, Y. J., 2015, Society for the Advancement of Socio Economics, London School of Economics, London.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    Mitchell, C. J., 2005, Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings. Zhou, J., Lopez, J., R. H. D. & Bao, F. (eds.). Springer-Verlag, Vol. 3650. p. 244-258 15 p. (Lecture Notes in Computer Science; vol. 3650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. E-pub ahead of print

    Error Propagation after Reordering Attacks on Hierarchical State Estimation

    Gul, A. & Wolthusen, S., 18 Dec 2018, Proceedings of the Twelfth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Staggs, J. & Shenoi, S. (eds.). Springer-Verlag, p. 67-79 13 p. (IFIP Advances in Information and Communication Technology; vol. 542).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Escape from Time: Immortality and Reality in William Burroughs & Philip Dick

    Gene-Rowe, F., May 2014, Memories of the Future Conference. Senate House Library, London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    E-society barriers: Public and private divide for women returners to IT

    Panteli, N. & Cochliou, D., 2008, Proceedings of the IADIS International Conference on e-Society 2008. IADIS, p. 16-23 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

    Shepherd, C., Akram, R. & Markantonakis, K., 29 Aug 2017, 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware

    Hurier, M., Suarez de Tangil Rotaeche, G., Dash, S., Bissyandé, T., Le Traon, Y., Klein, J. & Cavallaro, L., 3 Jul 2017, Mining Software Repositories (MSR), 2017 IEEE/ACM 14th International Conference on. IEEE, p. 425-435 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    European Dissemination of the ultra-low temperature scale, PLTS-2000

    Rusby, R., Head, D., Cousins, D., Godfrin, H., Bunkov, Y. M., Rapp, R. E., Gay, F., Meschke, M., Lusher, C., Li, J., Casey, A., Shvarts, D., Cowan, B., Saunders, J., Mikheev, V., Pekola, J., Gloos, K., Hernandez, P., Triqueneaux, S., de Groot, M. & 14 others, Peruzzi, A., Jochemsen, R., Chinchure, A., van Heumen, E., de Groot, G. E., Bosch, W., Mathu, F., Flokstra, J., Veldhuis, D., Hermier, Y., Pitre, L., Verge, A., Fellmuth, B. & Engert, J., 2003, TEMPERATURE: ITS MEASUREMENT AND CONTROL IN SCIENCE AND INDUSTRY, VOL 7, PTS 1 AND 2. Ripple, DC. (ed.). MELVILLE: AMER INST PHYSICS, p. 89-94 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Evaluating IT readiness in Small Firms: A Survey of UK Manufacturing Firms

    Spinelli, R., Dyerson, R. & Harindranath, G., 1 Nov 2013, ISBE 2013, November, Cardiff.. 2013

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Jul 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. p. 1541-1546 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Evaluating Transferability of Japanese Organizational Culture

    Aboutalebi, R. & Ozaki, Y., 21 Jun 2014, In: AJBS (Association of Japanese Business Studies), 27th Annual Meeting of AJBS: Issues regarding Japanese business system. 21-22 June 2014, Westin Bayshore, Vancouver, Canada..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay

    Haken, G., Markantonakis, K., Gurulian, I., Shepherd, C. & Akram, R., 2 Apr 2017, Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security: CPSS '17. New York: ACM, p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Evaluation of Information Visibility Benefits Downstream in the Supply Chain: The Case of Finished Vehicle Transportation

    Coronado Mondragon, A. E. & Lalwani, C. S., 6 Jul 2008, Proceedings of the 13th International Symposium on Logistics (ISL 2008): Integrating the Global Supply Chain. Pawar, KS., Banomyong, R. & Lalwani, CS. (eds.). Nottingham, UK: Nottingham University Business School, Vol. 1. p. 37-44 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Event dissemination in mobile wireless sensor networks

    Taherian, S., O'Keeffe, D. & Bacon, J., 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Fort Lauderdale, FL, USA, October 25-27, 2004. p. 573-575 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Evolution of Terrestrial Ecosystems

    Elias, S., 2002, Encyclopaedia of Life Sciences. London: Nature Publishing Group, Vol. 6. p. 669-673

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Evolutionary algorithms with a coarse-to-fine function smoothing

    Yang, D. & Flockton, S. J., 1 Jan 1995, 1995 IEEE Conference on Evolutionary Computation (ICEC 95). IEEE, Vol. 2. p. 657-662 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Evolving specification engineering

    Pavlovic, D., Pepper, P. & Smith, D. R., 2008, Proceedings of AMAST 2008. Meseguer, J. & Rosu, G. (eds.). Springer-Verlag, Vol. 5140. p. 299-314 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Exact and approximate algorithms and their implementations in mixed graphical models

    Gammerman, A., Luo, Z., Aitken, C. & Brewer, M., 1995, Probabilistic Reasoning and Bayesian Belief Networks. Henley-on-Thames: Alfred Waller, p. 33-53

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking

    Moeckel, C., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19): 1st International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). Association for Computing Machinery (ACM), 93

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Examining the Contribution of Critical Visualisation to Information Security

    Hall, P., Heath, C., Coles-Kemp, L. & Tanner, A., 8 Sep 2015, Proceedings of NSPW 2015. ACM, p. 59-72 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Exchangeability and de Finetti's theorem: from probabilities to quantum-mechanical states

    Schack, R., 2004, Bayesian Inference and Maximum Entropy Methods in Science and Engineering: AIP Conference Proceedings Vol.~735. Fischer, R., Preuss, R. & von Toussaint, U. (eds.). Melville, New York: AIP Press, p. 565

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Execution Replay with Compact Logs for Shared-Memory Programs

    Levrouw, L., Audenaert, K. & Van Campenhout, J., 1994, Applications in Parallel and Distributed Computing.. Caracas: North-Holland, p. 125-134 (IFIP Transactions: Computer Science and Technology; vol. A-44).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Expansion and densification of cities: linking urban form to urban ecology

    Mohajeri, N., Gudmundsson, A. & Scartezzini, J., 2015, CISBAT 2015- Future Buildings and Districts - Sustainability from Nano to Urban Scale.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Experiences in Automated Workflow using Dialectical Argumentation

    Urovi, V., Bromuri, S., McGinnis, J., Stathis, K. & Omicini, A., 1 Jul 2007, Proceedings of Intelligent Systems and Agents International Conference (IADIS07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Experimental and numerical 2D analysis of hydraulic fracturing using high-power electric discharge

    Bazargan, M., Meredith, P., Forbes Inskip, N., Gudmundsson, A., Habibpour, M. & Mohammadi, R., 2015, 49th US Rock Mechanics / Geomechanics Symposium held in San Francisco, CA, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Experimental Elicitation of Risk Behaviour amongst Information Security Professionals

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 2015, Workshop on the Economics of Information Security . p. 1-55 55 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Experimental Results of a Compact Laserwire System for Non-Invasive H− Beam Profile Measurements at CERN's Linac4

    Gibson, S., Boorman, G., Bosco, A., Hofmann, T., Raich, U. & Roncarolo, F., Feb 2017, 5th International Beam Instrumentation Conference: 11-15 September 2016, Barcelona, Spain.. JACoW Publishing, p. 1-4 4 p. TUPG77

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Experiments on Persian weblogs

    Sheykh Esmaili, K., Jamali, M., Neshati, M., Abolhassani, H. & Soltan-Zadeh, Y., 2006, In Proceedings of the WWW06 Workshop on Web Intelligence.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. E-pub ahead of print

    Explaining Deep Learning Models with Constrained Adversarial Examples

    Moore, J., Hammerla, N. & Watkins, C., 23 Aug 2019, Pacific Rim International Conference on Artificial Intelligence. Springer, p. 43-56 14 p. (Lecture Notes in Computer Science; vol. 11670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Explaining innovation in healthcare: The elastic role of identity ambiguity and praxis mastery

    Jashapara, A., 2015, GSTF Proceedings of 5th Annual International Conference on Business Strategy & Asian Economic Transformation. Singapore: Global Science and Technology Forum

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Exploiting uncertain and temporal information in correlation

    Bigham, J. & Luo, Z., 1996, Proceedings of the 6th International Conference Information Processing and the Management of Uncertainty (IPMU-96).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Exploring Co-presence Enabled Collaboration in Social Computing Inspired Enterprise Systems

    Subramaniam, N., Nandhakumar, J. & Baptista, J., 2010, AIS electronic Library (AISeL). ICIS 2010 PROCEEDINGS, 141

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Exploring information ethics for inclusive open development

    Bentley, C., 2013, IFIP 9.4 12th International Conference on Social Implications of Computers in Developing Countries.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Exploring new and emerging applications of cognitive radio systems: Preliminary insights and framework

    Yau, K-L. A., Tan, F-A. G., Komisarczuk, P. & Teal, P. D., 2011, Humanities, Science and Engineering (CHUSER), 2011 IEEE Colloquium on. p. 153-157 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Exploring online crowd-funding innovation and opportunities for small businesses

    Kromidha, E., 23 Jun 2014, Proceedings of the 3rd International Conference on Innovation, Trade and Economics- ICITE 2014, June 22-23, 2014. Moscow, Russia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Exploring online crowdfunding innovation, networks and locations: Small businesses in Indiegogo.com

    Kromidha, E., 2014, 2014 ISBE Conference, 5-6 November 2014. Manchester, UK

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Exploring the association between organisational performance, employee attitudes and HRM practices in small firms

    Tsai, C-J., Edwards, P. & Sen Gupta, S., 2008, British Academy of management, Harrowgate.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Unpublished

    Exploring the Combined Potential of Critical Discourse Analysis, Framing Analysis and Semiotics. An Analysis of German Newspaper Representations of the ‘War on Terror’

    Van Efferink, L., 2015, (Unpublished) “Reframing Media/Cultural Studies” Conference, Communication and Media Research Institute (CAMRI), University of Westminster.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Exploring the development of an Internet of Things (IoT) environment for value generation in third-party logistics operations

    Coronado Mondragon, A., Coronado, C. E. & Coronado, E. S., 3 Jul 2016, Abstracts of papers presented at the 21st International Symposium on Logistics. Pawar, K. S. & Tsai, K. M. (eds.). Taiwan, p. 133 8 p. 144

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Exploring the Equifinality of Dynamic Capabilities: A Mixed Method Study of UK High-Tech SMEs

    Senaratne, P., Wang, C. L. & Sharma, M., 2015, European Academy of Management Annual Conference. Poland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Exploring the limits of single-iteration clarification dialogs

    Lin, J., Wu, P., Demner-Fushman, D. & Abels, E., 31 Oct 2006, Proceedings of the Twenty-Ninth Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. Vol. 2006. p. 469-476 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Exploring the nature of virtuality: An interplay of global and local interactions

    Panteli, N., Chiasson, M., Yan, L., Poulymenakou, A. & Papargyris, A., 2007, Virtuality and Virtualization: Proceedings of the International Federation of Information Processing Working Groups 8.2 on Information Systems and Organizations and 9.5 on Virtuality and Society. Crowston, K., Sieber, S. & Wynn, E. (eds.). Springer, p. 373-377 5 p. (IFIP International Federation for Information Processing; vol. 236).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Exploring the Role of Organisational Context and Work Flexibility in Perceiving Digital Technology Affordances: A Study of Knowledge Workers

    Hafezieh, N., Farivar, F. & Eshraghian, F., 2020, British Academy of Management Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Exploring the traces of fault-related microstructural damage at the Santorini caldera

    Drymoni, K., Browning, J., Mitchell, T. & Gudmundsson, A., 2017, AGU FALL MEETING 2017. T21C-1221

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. E-pub ahead of print

    Exploring Trade-offs in Batch Bounded Distance Decoding

    Albrecht, M., Curtis, B. & Wunderer, T., 10 Jan 2020, SAC 2019. Springer, p. 467-491 25 p. (Lecture Notes in Computer Science; vol. 11959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Exponentiation using Division Chains

    Walter, C. D., 1997, 13th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 92-97 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    ExpoSE: practical symbolic execution of standalone JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 13 Jul 2017, SPIN 2017 : Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software. ACM, p. 196–199 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Extended Computation Tree Logic (Extended Abstract)

    Alexsson, R., Hague, M., Kreutzer, S., Lange, M. & Latte, M., 2010, LPAR International Conference on Logic for Programming Artificial Intelligence and Reasoning.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. E-pub ahead of print

    Extended Functionality in Verifiable Searchable Encryption

    Alderman, J., Janson, C., Martin, K. & Renwick, S., 9 Jan 2016, Proceedings of the 2nd International Conference on Cryptography and Information Security in the Balkans - BalkanCryptSec 2015. Springer, Vol. 9540. p. 187-205 19 p. (Lecture Notes in Computer Science; vol. 9540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Extended privilege inheritance in RBAC

    Dekker, M., Cederquist, J. G., Crampton, J. & Etalle, S., 2007, Proceedings of 2007 ACM Symposium on Information, Computer and Communications Security. Bao, F. & Miller, S. (eds.). ACM Press, p. 383-385 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Extending B AMN with concurrency

    Lano, K., Fiadeiro, J. & Dick, J., 1996, ADVANCES IN THEORY AND FORMAL METHODS OF COMPUTING. Edalat, A., Jourdan, S. & McCusker, G. (eds.). LONDON: Imperial College Press, p. 228-239 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Extending EMV to support Murabaha transactions

    Al-Meaither, M. & Mitchell, C. J., 2003, NORDSEC 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems - Encouraging Cooperation, Gjøvik University College, Norway, October 2003. p. 95-108 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Extending EMV Tokenised Payments To Offline-Environments

    Jayasinghe, D., Markantonakis, K., Gurulian, I., Akram, R. & Mayes, K., 9 Feb 2017, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Extending the Scope of CardSpace

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. Orgun, M. A., Elci, A., Makarevich, O. B., Huss, S. A., Pieprzyk, J., Babenko, L. K., Chefranov, A. G. & Shankaran, R. (eds.). New York: ACM, p. 235-238 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Facilitating plausible deniability for cloud providers regarding tenants' activities using trusted execution

    O'Keeffe, D., Vranaki, A., Pasquier, T. & Eyers, D., 19 May 2020, Proceedings - 2020 IEEE International Conference on Cloud Engineering, IC2E 2020. Institute of Electrical and Electronics Engineers Inc., p. 59-65 7 p. (Proceedings - 2020 IEEE International Conference on Cloud Engineering, IC2E 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Facilitating program comprehension by mining association rules from source code

    Tjortjis, C., Sinos, L. & Layzell, P., 2003, 11th IEEE International Workshop on Program Comprehension, Portland, USA, May 2003. p. 125-132 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Facilities Services Contracts: The Search for Effective Contract Structures for Outsourcing Agreements in London Hospitals

    Jashapara, A., 2000, Proceedings of CIB W70 International Symposium on Facilities Management & Asset Maintenance. p. 447 454 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Failing with Style: Designing for Aesthetic Failure in Interactive Performance

    Hazzard, A., Greenhalgh, C., Kallionpaa, M., Benford, S., Veinberg, A., Kanga, Z. & McPherson, A., 2 May 2019, CHI '19 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Glasgow, Scotland, p. 1-13 13 p. 30

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Failure in the Design and Implementation of Government ICT Projects in Africa: A Complexity Theory Perspective

    Bernardi, R., 2007, IST-Africa 2007 Conference Proceedings. Cunningham, P. & Cunningham, M. (eds.). IIMC International Information Management Corporation

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Failure-avoidance in Strategy Implementation

    Aboutalebi, R., 8 Sep 2015, In: BAM (British Academy of Management), 29th Annual Conference of BAM: The Value of Pluralism in Advancing Management Research, Education and Practice. 08-10 September 2015, The University of Portsmouth, England, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Failures of SET implementation - What is amiss?

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - APDSI 2002, 7th Asia-Pacific Decision Sciences Institute Conference, Bangkok, Thailand, July 2002. 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Fairtracing.org and Ethical Marketing 2.0

    Kleine, D., 2010, Proceedings of the Research Councils UK Annual Digital Economy Meeting .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Falsa Ilusão de Ter: Investigando os Tipos de Valor para o Consumidor de Falsificações

    Ferreira, M. C., 9 Sep 2008, Proceedings of the XXXII ANPAD Meeting. ANPAD Brazilian Association of Graduate Studies and Research in Business Administration, Vol. 32. p. 1-16

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Unpublished

    Family involvement and firm performance: a critical review

    Wang, C. L., Wale-Oshinowo, B. & Gamble, J., 2010, (Unpublished) The 33rd Annual Institute for Small Business and Entrepreneurship Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Fano factor reduction on the 0.7 structure

    Roche, P., Segala, J., Glattli, D. C., Nicholls, J. T., Pepper, M., Graham, A. C., Thomas, K. J., Simmons, M. Y. & Ritchie, D. A., 2005, Noise and Fluctuations. Gonzalez, T., Mateos, J. & Pardo, D. (eds.). MELVILLE: AMER INST PHYSICS, p. 417-420 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Fast byzantine agreement in dynamic networks

    Augustine, J., Pandurangan, G. & Robinson, P., 2013, ACM Symposium on Principles of Distributed Computing, PODC '13, Montreal, QC, Canada, July 22-24, 2013. p. 74-83 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Fast Byzantine Leader Election in Dynamic Networks

    Augustine, J., Pandurangan, G. & Robinson, P., 2015, Distributed Computing: 29th International Symposium, DISC 2015, Tokyo, Japan, 2015. Proceedings. Springer Berlin / Heidelberg, Vol. 9363. p. 276-291 16 p. (Lecture Notes in Computer Science; vol. 9363).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Fast Distributed Algorithms for Connectivity and MST in Large Graphs

    Pandurangan, G., Robinson, P. & Scquizzato, M., 11 Jul 2016, 28th ACM Symposium on Parallelism in Algorithms and Architectures : SPAA 2016. ACM, p. 429-438 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Fast Scalar Multiplication for ECC over GF(it p) using Division Chains

    Walter, C. D., 2011, WISA 2010. Chung, Y. & Yung, M. (eds.). Springer, Vol. 6513. p. 61-75 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Forthcoming

    Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k))

    Albrecht, M., Bai, S., Fouque, P-A., Kirchner, P., Stehlé, D. & Wen, W., 15 May 2020, (Accepted/In press) CRYPTO 2020. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Faster Exact Solving of SAT Formulae with a Low Number of Occurrences per Variable

    Wahlström, M., 2005, SAT. p. 309-323 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Faster Modular Multiplication by Operand Scaling

    Walter, C. D., 1992, CRYPTO '91. Feigenbaum, J. (ed.). Springer, Vol. 576. p. 313-323 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    FAULT DETECTION IN A MECHANICAL SYSTEM BY NEURAL NETWORKS

    THOMAS, M. D. & FLOCKTON, S. J., 1994, SECOND EUROPEAN CONFERENCE ON SMART STRUCTURES AND MATERIALS. McDonach, A., Gardiner, PT., McEwen, RS. & Culshaw, B. (eds.). BELLINGHAM: SPIE - INT SOC OPTICAL ENGINEERING, p. 55-58 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 1 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). SciTePress, p. 448-456 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Feasibility of Internet of Things and Agnostic Blockchain Technology Solutions: A Case in the Fisheries Supply Chain

    Coronado Mondragon, A. E., Coronado Mondragon, C. E. & Coronado, E. S., 27 May 2020, 2020 IEEE 7th International Conference on Industrial Engineering and Applications. April 16-21, Bangkok, Thailand: IEEE Xplore, p. 504-508 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Feasibility, Recipient Ownership and Knowledge Transfer Strategy: A Case of Chinese MNCs in Africa

    Rui, H. & Zhang, M., 2015, Proceedings of the 57th Annual Meeting of the Academy of International Business: "Global Networks: Organizations and People" Bengaluru, India June 27-30, 2015. Mudambi, R. & Kiyak, T. (eds.). 2015 Academy of International Business, p. 109 1 p. ID#61

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Feature Correlation Attack on Biometric Privacy Protection Schemes

    Zhou, X., Busch, C., Kuijper, A. & Wolthusen, S. D., 12 Sep 2009, Proc. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009). IEEE Computer Society Press, p. 1061-1065

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. E-pub ahead of print

    Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures

    Akram, R., Markantonakis, K. & Sauveron, D., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Yan, Z. & Mueller, P. (eds.). Helsinki, Finland: IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Feature Modeling and Composition with Coordination Contracts

    Andrade, L. F. & Fiadeiro, J. L., 2001, FICS. University of Karlsruhe, Institut für Programmstrukturen und Datenorganisation, Vol. 2001-14. p. 49-54 6 p. (Technical Report).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Feature Selection by Conformal Predictor

    Yang, M., Nouretdinov, I., Luo, Z. & Gammerman, A., 2011, 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, Artificial Intelligence Applications and Innovations 2011, Corfu, Greece, September 15-18, 2011, Proceedings, Part II. . p. 449-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. E-pub ahead of print

    Feistel Structures for MPC, and More

    Albrecht, M., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 15 Sep 2019, ESORICS 2019. p. 151-171 21 p. (Lecture Notes in Computer Science ; vol. 11736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Fiber bridging strategies for damage tolerance

    Potluri, P., Arshad, M., Jamshidi, P. & Hogg, P., 1 Dec 2011, Collection of Technical Papers - AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics and Materials Conference. AIAA 2011-1983

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Fighting decoherence in a Josephson qubit circuit

    Collin, E., Ithier, G., Joyez, P., Vion, D. & Esteve, D., 2004, Realizing Controllable Quantum States. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 247-254 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Fine Grained Resource Reservation and Management in Grid Economics

    Chard, K., Komisarczuk, P., Bubendorfer, K. & Desai, A., 2005, Proceedings of The 2005 International Conference on Grid Computing and Applications, GCA 2005, Las Vegas, Nevada, USA, June 20-23, 2005. p. 31-38 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Fingerprinting Seismic Activity across an Internet of Things

    Moore, J. P. T., Bagale, J. N., Kheirkhahzadeh, A. D. & Komisarczuk, P., 2012, 5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Firewall Mechanism in a User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Apr 2010, Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010. Gollmann, D., Lanet, J-L. & Iguchi-Cartigny, J. (eds.). Passau, Germany: Springer, Vol. 6035/2010. p. 118-132 15 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    First Beam Background Simulation Studies at IR1 for High Luminosity LHC

    Kwee-Hinzmann, R., Gibson, S., Bregliozzi, G., Bruce, R., Cerutti, F., Esposito, L., Kersevan, R., Lechner, A. & Shetty, N., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 1074-1077 4 p. TUPRO027

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    First Beam Tests at the CERN SPS of an Electro-Optic Beam Position Monitor for the HL-LHC

    Arteche, A., Bashforth, S., Boorman, G., Gibson, S., Bosco, A., Chritin, N., Krupa, M., Lefevre, T. & Levens, T., Mar 2018, 6th International Beam Instrumentation Conference. Geneva: JACoW Publishing, p. 1-4 4 p. TUPCF23

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    First Results From the Operation of a Rest Gas Ionisation Profile Monitor Based on a Hybrid Pixel Detector

    Storey, J., Bodart, D., Dehning, B., Schneider, G., Veness, R., Bertsche, W., Sandberg, H., Gibson, S., Levasseur, S., Sapinski, M. & Satou, K., Mar 2018, 6th International Beam Instrumentation Conference. JACoW Publishing, p. 1-5 5 p. WE2AB5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    First Studies of Ion Collimation for the LHC Using BDSIM

    Abramov, A., Boogert, S., Nevay, L. & Walker, S., Jun 2018, 10th International Particle Accelerator Conference. JACoW Publishing, p. 341-344 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    First-class protocols for agent-based coordination of scientific instruments

    Miller, T., McBurney, P., McGinnis, J. & Stathis, K., 2007, WET ICE 2007: 16TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 41-46 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Fixed-Parameter Tractability of Multicut in Directed Acyclic Graphs

    Kratsch, S., Pilipczuk, M., Pilipczuk, M. & Wahlström, M., 2012, ICALP (1). p. 581-593 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Forthcoming

    Fixed-parameter tractability of satisfying beyond the number of variables

    Crowston, R., Gutin, G., Jones, M., Raman, V., Saurabh, S. & Yeo, A., 2012, (Accepted/In press) SAT 2012. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Fixed-Parameter Tractability of Workflow Satisability in the Presence of Seniority Constraints

    Crampton, J., Crowston, R., Gutin, G., Jones, M. & Ramanujan, M. S., 2013, FAW-AAIM 2013: Lecture Notes in Computer Science. Vol. 7924. p. 198-209

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Flexible decentralised control of connection admission

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 2000, Agent Technology for Communications Infrastructure. Hayzelden, A. & Bourne, R. A. (eds.). John Wiley & Sons, p. 144-155

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Flexible decentralised control of connection admission communications networks and the IMPACT of software agents

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., Nov 1999, Proceedings of IMPACT'99 .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Flora, fauna and stable isotopes in Late-Würm deposits at Lobsigensee (Swiss Plateau)

    Ammann, B., Chaix, L., Eicher, U., Elias, S., Gaillard, M. J., Hoffmann, W., Siegenthaler, U., Tobolski, K. & Wilkinson, B., 1984, Climatic Changes on a Yearly to Millennial Basis. Morner, N. A. & Karlen, W. (eds.). Dordrecht: D. Reidel Publishing Company, p. 69-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications

    Muthukumaran, D., O'Keeffe, D., Priebe, C., Eyers, D. M., Shand, B. & Pietzuch, P. R., 12 Oct 2015, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. p. 603-615 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Published

    Fluid overpressure of quartz mineral veins in the South Wales coalfield: implication for mechanism of fracture formation in foreland basins

    Fukunari, T. & Gudmundsson, A., 2013, Rock Fractures in Geological Processes: Abstracts of the Presentations at the Symposium. U

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  105. Published

    Foreign Investors, Local Community and the Acquired Firm: a case study of work organization and employment relations in a Chinese MNCs in Canada

    Zheng, Y., Sep 2013, 8th China Goes Global Conference. Jocob University, Germany

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. Published

    Forensic Entropy Analysis of Microsoft Windows Storage Volumes

    Weston, P. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  107. Published

    Forensic Tracking and Mobility Prediction in Vehicular Networks

    Al-Kuwari, S. & Wolthusen, S. D., 2012, Advances in Digital Forensics VIII: Proceedings of the Eighth IFIP WG 11.9 International Conference on Digital Forensics. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  108. Published

    Formal derivation of concurrent garbage collectors

    Pavlovic, D., Pepper, P. & Smith, D. R., 2010, Proceedings of MPC 2010. Desharnais, J. (ed.). Springer-Verlag, Vol. 6120. p. 353-376 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    Formalization of Validation Extension Metamodel for Enterprise Architecture Frameworks

    Oussena, S., Essien, J. & Komisarczuk, P., 2014, ICEIS 2014 - Proceedings of the 16th International Conference on Enterprise Information Systems, Volume 3, Lisbon, Portugal, 27-30 April, 2014. p. 427-434 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  110. Published

    Formalized Metatheory with Terms Represented by an Indexed Family of Types

    Adams, R., 2006, Types for Proofs and Programs. Filliatre, J-C., Paulin-Mohring, C. & Werner, B. (eds.). Springer, Vol. 3839. p. 1-16 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  111. Published

    Formalizing threat models for virtualized systems

    Sgandurra, D., Karafili, E. & Lupu, E., 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Springer-Verlag, Vol. 9766. p. 251-267 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  112. Published

    Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

    Bost, R., Minaud, B. & Ohrimenko, O., 30 Oct 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security: CCS '17. Association for Computing Machinery (ACM), p. 1465-1482 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  113. Published

    FRACTURE TOUGHNESS AND CRACK PROPAGATION IN POLYESTER RESINS.

    Gatward, C. H., Hogg, P. J. & Hull, D., 1 Dec 1985, Deformation Yield and Fracture of Polymers. London, Engl: Plastics & Rubber Inst

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  114. Published

    Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence

    Malek, W. W., Mayes, K. & Markantonakis, K., 2008, Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications. Berlin, Heidelberg: Springer-Verlag, p. 118-132 15 p. (CARDIS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  115. Published

    Fredholm Multiple Kernel Learning for Semi-Supervised Domain Adaptation

    Wang, W., Wang, H., Zhang, C. & Gao, Y., 2017, Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17). AAAI Press, p. 2732-2738 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  116. Published

    Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data

    Lacharite, M-S. & Paterson, K., 1 Mar 2018, IACR Transactions on Symmetric Cryptology. 1 ed. Ruhr-Universität Bochum, Vol. 2018. p. 277-313 37 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  117. Published

    From Boundary Spanning to Creolization: Cross-cultural Strategies from the Offshore Provider’s Perspective

    Abbott, P., Zheng, Y., Du, R. & Willcocks, L. P., 2010, AmericasConference of Information Systems 2010.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  118. Published

    From conformal to probabilistic prediction

    Vovk, V., Petej, I. & Fedorova, V., 2014, COPA 2014 Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  119. Published

    From me to we: Understanding how a new collective practice is born

    Khanijou, R., Cappellini, B. & Hosany, S., 2019, 10th EIASM Interpretive Consumer Research Conference, Lyon, 9-10 May.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  120. Published

    From Quantum Interference to Bayesian Coherence and Back Round Again

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J-A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 260-279

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  121. Published

    From Separation Logic to First‐Order Logic

    Calcagno, C., Gardner, P. & Hague, M., 2005, FoSSaCS: Foundations of Software Science and Computation Structures.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  122. Published

    From Start-up to Maturity: studies based in three Chinese pharmaceutical and medical device companies’

    Zheng, Y., Li, X. & Wang, C. L., 17 Jul 2009, The Annual Conference of the Academy of Innovation and Entrepreneurship.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  123. Published

    From the individual to the collective: religion and memory in Roman Britain

    Kamash, Z., 2016, Cultural Memories in the Roman Empire. Galinsky, K. & Lapatin, K. (eds.). Getty Museum Press, p. 153-169 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  124. Published

    From the Mouths of Mothers: Using drama and service user testimonies to facilitate reflective learning for qualified social workers who are working with children and families who are affected by child sexual abuse

    Leonard, K., Gupta, A., Stuart-Fisher, A. & Lowe, K., Jul 2015, EASSW - European Association of Schools of Social Work conference, Milan, Italy..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  125. Published

    From user-centred design to security: building attacker personas for digital banking

    Moeckel, C., 29 Sep 2018, NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction . Association for Computing Machinery (ACM), p. 892-897 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  126. In preparation

    From Victim to Perpetrator: On the Blurring of Identities in Soazig Aaron’s Le Nom de Klara (2002)

    Duffy, H., 28 Jul 2019, (In preparation) Victims, Perpetrators and Implicated Subjects : Rethinking Agency at the Intersections of Narrative and Memory.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  127. Forthcoming

    Future trends in Employment Relations: Lessons from SMEs in the creative industry

    Sen Gupta, S., 26 Jun 2019, (Accepted/In press) Lessons from SMEs in the creative industry.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  128. Published

    Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework

    Wolthusen, S. D., 26 May 2011, Proc. 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011). IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  129. Published

    'Gainst Nature Still: Reading Macbeth's Murder of Duncan

    Uotinen, T., 2011, Villains: Global Persceptives in Villains and Villainy. Genc, B. & Lenhardt, C. (eds.). Inter-Disciplinary Press, p. 157-163 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  130. Published

    Games as a Metaphor for Interactive Systems

    Stathis, K. & Sergot, M. J., 1 Aug 1996, People and Computers XI (Proceedings of HCI'96). Sasse, M. A., Cunningham, R. J. & Winder, R. L. (eds.). London, UK: Springer-Verlag, p. 19-33 15 p. (BCS Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  131. Published

    Gaming security by obscurity

    Pavlovic, D., 2011, NSPW '11 Proceedings of the 2011 workshop on New security paradigms workshop. Gates, C. & Hearley, C. (eds.). New York, NY, USA: ACM, p. 125-140 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  132. Published

    Gamma Factory at CERN: Design of a Proof-of-Principle Experiment

    The Gamma Factory Collaboration, Alden, S., Bosco, A., Gibson, S. & Nevay, L., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 1-4 4 p. MOPRB052

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  133. E-pub ahead of print

    Gamma Factory at CERN – novel research tools made of light

    The Gamma Factory Collaboration, Abramov, A., Alden, S., Bosco, A., Gibson, S. & Nevay, L., 14 Jun 2019, XXV Cracow Epiphany Conference on Advances in Heavy Ion Physics: 8-11 January 2019, Cracow, Poland. Acta Physica Polonica B, p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  134. Published

    GARMDROID: IoT Potential Security Threats Analysis through the Inference of Android Applications Hardware Features Requirements

    Rodriguez-Mota, A., Escamilla-Ambrosio, P. J., Happa, J. & Aguirre-Anaya, E., 2017, AFI 360 Conference Track on Future Internet and Internet of Things Applications. p. 63-74 12 p. (Lecture Notes of the Institute for Computer Sciences; vol. 179).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  135. Published

    Garnata: An Information Retrieval System for Structured Documents based on Probabilistic Graphical Models

    de Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 2006, Proceedings of the 11th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU 2006). Paris (France), p. 1024-1031 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  136. Unpublished

    Gender and ICTs in Brazil

    Poveda Villalba, S., 2014, (Unpublished) ICT4D London Meet-Up. ICT4D London Meet-Up

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  137. Published

    Gene selection using Wilcoxon rank sum test and Support Vector Machine for cancer classification

    Liao, C., Li, S. & Luo, Z., 2007, Lecture Notes in Computer Science. Springer, Vol. 4456. p. 57-66

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  138. Published

    General Linear Relations among Different Types of Predictive Complexity

    Kalnishkan, Y., 1999, Algorithmic Learning Theory, 10th International Conference, ALT'99, Proceedings: volume 1720 of Lecture Notes in Artificial Intelligence. Springer, p. 323-334 (Lecture Notes in Artificial Intelligence; vol. 1720).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  139. Published

    Generalised entropy and asymptotic complexities of languages

    Kalnishkan, Y., Vovk, V. & Vyugin, M. V., 2007, Proceedings of the Twentieth Annual Conference on Learning Theory. Bshouty, N. & Gentily, C. (eds.). Berlin: Springer, Vol. 4539. p. 293-307 15 p. (Lecture Notes in Artificial Intelligence; vol. 4539).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  140. Published

    Generalising Interpretations between Theories in the context of (pi-) Institutions

    Fiadeiro, J. L. & Maibaum, T. S. E., 1993, Theory and Formal Methods. Springer, p. 126-147 22 p. (Workshops in Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  141. Published

    Generalized entropies and asymptotic complexities of languages

    Kalnishkan, Y., Vyugin, M. V. & Vovk, V., Sep 2012, Proceedings of the Fifth Workshop on Information-Theoretic Methods in Science and Engineering. de Rooij, S., Kotlowski, W., Rissanen, J., Millimaki, P., T. R. & Yamanishi, K. (eds.). Amsterdam: CWI, p. 44-47 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  142. Published

    Generating Concurrency Checks Automatically

    Hague, M. & Hoyland, J., 17 Jul 2016, Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs . ACM, p. 1-15 15 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  143. Published

    Generating social value through online communities: The case of medicine Africa

    Chamakiotis, P. & Panteli, N., 17 May 2017, AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation. Americas Conference on Information Systems, p. 1-5 5 p. (AMCIS 2017 - America's Conference on Information Systems: A Tradition of Innovation; vol. 2017-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  144. Published

    Generating Social Value through Online Communities: The Case of MedicineAfrica

    Chamakiotis, P. & Panteli, N., 2017, Proceedings of the 23rd Americas Conference on Information Systems (AMCIS): ‘A Tradition of Innovation’: Mini-Track: 8: ‘Virtual Communities and Social Media in Healthcare. August 10-12, Boston, MA, USA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  145. E-pub ahead of print

    Generating Unlinkable IPv6 Addresses

    Nyirenda, M., Khan, M., Li, W., Mitchell, C. & Yau, P-W., 9 Dec 2015, Proceedings of SSR 15, Tokyo, December 2015. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 185-199 15 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  146. Published

    Geometry of abstraction in quantum computation

    Pavlovic, D., 19 Jul 2012, Proceedings of Symposia in Applied Mathematics. Abramsky, S. & Mislove, M. (eds.). AMS, Vol. 71. p. 233-267 (Proceedings of Symposia in Applied Mathematics; vol. 71).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  147. Published

    Geometry, displacements, and driving stresses of seismogenic faults in Iceland

    Gudmundsson, A., 1989, Seismology in Europe. Thorkelsson, B. (ed.). Reykjavik: Iceland Meteorological Office, Reykjavik, p. 193-198

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  148. Published

    Giant mounded drifts in the Mozambique continental margin: Origins and global implications for the history of thermohaline circulation

    Thieblemont, A., Hernández-Molina, F. J. & Raisson, F., 2017, 3rd EAGE Eastern Africa Petroleum Geoscience Forum: Managing Subsurface Risk in Finding and Developing Hydrocarbons. European Association of Geoscientists and Engineers, EAGE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  149. Published

    Glamdring: Automatic Application Partitioning for Intel SGX

    Lind, J., Priebe, C., Muthukumaran, D., O'Keeffe, D., Aublin, P-L., Kelbert, F., Reiher, T., Goltzsche, D., Eyers, D. M., Kapitza, R., Fetzer, C. & Pietzuch, P. R., 2017, 2017 USENIX Annual Technical Conference, USENIX ATC 2017, Santa Clara, CA, USA, July 12-14, 2017.. p. 285-298 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  150. Published

    Gli Eroi e i Mostri: mito e storia nell’Ercole

    Jossa, S., Cherchi, P. (ed.), Rinaldi, M. (ed.) & Tempera, M. (ed.), 2008, Giovan Battista Giraldi Cinzio gentiluomo ferrarese. Firenze: Gabinetto Scientifico Letterario G. P. Vieusseux, Studi 13, Leo Olschki

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  151. Published

    Global changes in gene expression during Alstroemeria petal senescence

    Wagstaff, C., Bramke, I., Breeze, E., Thomas, B., Buchanan-Wollaston, V., Harrison, L., Rogers, H. & Stead, A., 2005, Proceedings of the VIIIth International Symposium on Postharvest Physiology of Ornamental Plants. Marissen, N., VanDoorn, WG. & VanMeeteren, U. (eds.). LEUVEN 1: INTERNATIONAL SOCIETY HORTICULTURAL SCIENCE, p. 127-134 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  152. Published

    Global human mobility and knowledge transfer: Highly skilled return migrants in Ethiopia

    Lam, A. & Rui, H., Jun 2018, 30th Annual Conference of the Society for the Advancement of Socio-Economics (SASE): Global Reordering.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  153. Published

    Going with the flow? What CSR can learn from innovation

    Preuss, L. & Dyerson, R., Nov 2010, Open University Social Marketing and Socially Responsible Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  154. Published

    Gracefully Degrading Consensus and k-Set Agreement in Directed Dynamic Networks

    Biely, M., Robinson, P., Schmid, U., Schwarz, M. & Winkler, K., 2015, Networked Systems - Third International Conference, NETYS 2015, Agadir, Morocco, May 13-15, 2015, Revised Selected Papers. Bouajjani, A. & Fauconnier, H. (eds.). Springer Berlin / Heidelberg, Vol. 9466. p. 109-124 16 p. (Lecture Notes in Computer Science; vol. 9466).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  155. Published

    Graded Encoding Schemes from Obfuscation

    Farshim, P., Hesse, J., Hofheinz, D. & Larraia de Vega, E., 1 Mar 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Springer-Verlag, Vol. 10769 LNCS. p. 371-400 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  156. Published

    Grameen Bank’s Housing Program for Rural Poor in Bangladesh: A Case Study

    Adri, N. & Sultana, S., 2004, Papers of the Applied Geography Conferences. Montz, B. & Tobin, G. (eds.). Vol. 27. p. 247-253 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  157. Published

    Granddaughter beware! An intergenerational case study of managing trust issues in the use of Facebook

    Light, A. & Coles-Kemp, L., 2013, International Conference on Trust and Trustworthy Computing. Springer Berlin / Heidelberg, p. 196-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  158. Published

    Graphical user interfaces in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, 4th International Workshop on Product LinE Approaches in Software Engineering, PLEASE 2013, San Francisco, CA, USA, May 20, 2013. p. 25-28 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  159. E-pub ahead of print

    Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification

    Hurley-Smith, D. & Hernandez-Castro, J., 21 Nov 2018, 4th International Conference on Research in Security Standardisation: SSR 2018. Cremers, C. & Lehmann, A. (eds.). Springer, p. 143-163 21 p. (Lecture Notes in Computer Science; vol. 11322).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  160. Published

    Grétry et les connaissances modernes

    Charlton, D., 2013, Art & Fact: Revue des historiens de l'art, des archéologues et des musicologues de l'Université de Liège. Tilkin, F. (ed.). Liège: Université de Liège, Vol. 32. p. 42-8 7 p. (Art & Fact; vol. 32).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  161. Published

    Grid Enabled Internet Instruments

    Komisarczuk, P., Seifert, C. & Pemberton, D., 2007, Proceedings of the Global Communications Conference, 2007. GLOBECOM '07, Washington, DC, USA, 26-30 November 2007. p. 1906-1911 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  162. Published

    Group communication as an infrastructure for distributed system management

    Amir, Y., Breitgand, D., Chockler, G. V. & Dolev, D., 1 Jan 1996, Proceedings of the 3rd International IEEE Workshop on Services in Distributed and Networked Environments (SDNE '96). p. 84-91 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  163. Published

    Group decision support for resource allocation decisions in three-person groups

    van Leeuwen, J., van der Heijden, H., Kronsteiner, R. & Kotsis, G., 2004, Proceedings of the European Conference on Information Systems (ECIS). Turku, Finland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  164. E-pub ahead of print

    Group Signatures with Selective Linkability

    Garms, L. & Lehmann, A., 6 Apr 2019, 22nd International Conference on Practice and Theory of Public Key Cryptography. p. 190-220 31 p. (Lecture Notes in Computer Science; vol. 11442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  165. Published

    Group Theory in Cryptography

    Blackburn, S., Cid, C. & Mullan, C., 2011, Group St Andrews 2009 in Bath. The London Mathematical Society, Vol. 387. p. 133-149 17 p. (LMS Lecture Note Series; vol. 387).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  166. Published

    Guaranteed network traffic demand prediction using FARIMA models

    Dashevskiy, M. & Luo, Z., 2008, Lecture Notes in Computer Sc. Vol. 5326. p. 274-281

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  167. Published

    Guiding Reification in OWL through Aggregation

    Severi, P., Fiadeiro, J. L. & Ekserdjian, D., 2010, Description Logics. CEUR-WS.org, Vol. 573. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  168. Published

    Hadron Therapy Machine Simulations Using BDSIM

    Shields, W., Boogert, S., Nevay, L. & Snuverink, J., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 546-549 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  169. Published

    Half-integrality, LP-branching and FPT Algorithms

    Wahlström, M., 2014, SODA. Chekuri, C. (ed.). SIAM, p. 1762-1781 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  170. Unpublished

    Harnessing employee engagement in UK public services

    Gatenby, M., Alfes, K., Truss, K., Rees, C. & Soane, E., Oct 2009, (Unpublished) 10th Public Management Research Association (PMRA) Conference. Columbus.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  171. Published

    He-3 bilayer film adsorbed on graphite plated with a bilayer of He-4: A new frustrated 2D magnetic system

    Neumann, M., Nyeki, J., Cowan, B. & Saunders, J., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 317-318 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  172. Published

    Hearing Through the Eye in Eighteenth-Century French Opera

    Charlton, D., 2014, Exchanges and Tensions in Art, Theatre and Opera, c.1750-1850. Hibberd, S. & Wrigley, R. (eds.). Ashgate

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  173. Published

    Heavy-light decay constants from relativistic N-f=2, 0 QCD

    Shanahan, H. P. & CP-PACS Collaboration, 2000, HIGH ENERGY PHYSICS 99, PROCEEDINGS. BRISTOL: IOP PUBLISHING LTD, p. 943-944 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  174. Published

    Hedging Structured Concepts

    Koolen, W. M., Warmuth, M. K. & Kivinen, J., 1 Jun 2010, Proceedings of the 23rd Annual Conference on Learning Theory (COLT 2010). p. 93-105 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  175. Published

    Hemispheric lateralization of sentence intonation in left handed subjects with typical and atypical language lateralization: An fMRI study

    Varga, E., Schnell, Z., Perlaki, G., Orsi, G., Aradi, M., Auer, T., John, F., Dóczi, T., Komoly, S., Kovács, N., Schwarcz, A., Tényi, T., Herold, R., Janszky, J. & Horváth, R., 2014, Proceedings of the International Conference on Speech Prosody. International Speech Communications Association, p. 1130-1133 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  176. Published

    Heterogeneous and Asynchronous Networks of Timed Systems

    Fiadeiro, J. L. & Lopes, A., 2014, Fundamental Approaches to Software Engineering - 17th International Conference, FASE 2014. Springer, Vol. 8411. p. 79-93 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  177. Published

    Heterogeneous Internet access via PANA/UMTS

    Pagliusi, P. S. & Mitchell, C. J., 2004, Proceedings of the 3rd International Conference on Information Security, Hardware/Software Codesign and Computer Networks - ISCOCO 2004, Rio De Janeiro, Brazil, October 2004. World Scientific, 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  178. Published

    Heterogeneous Timed Machines

    Delahaye, B., Fiadeiro, J. L., Legay, A. & Lopes, A., 2014, Theoretical Aspects of Computing - ICTAC 2014 - 11th International Colloquium, Bucharest, Romania, September 17-19, 2014.. Springer, Vol. 8687. p. 115-132 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  179. Published

    Heuristic subset selection in classical planning

    Lelis, L. H. S., Franco, S., Abisrror, M., Barley, M., Zilles, S. & Holte, R. C., 2016, Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, New York, NY, USA, 9-15 July 2016. International Joint Conferences on Artificial Intelligence, p. 3185-3191 7 p. (IJCAI International Joint Conference on Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  180. Published

    H-IBAS-H - Authentication System for University Student Portals Using Images

    Al-Sinani, H., Nguyen, C. & Vuksanovic, B., 2009, Proceedings of ICCCP-09: International Conference on Communication, Computing and Power, jointly organised with IEEE, Muscat, Oman, February 15-18 2009. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  181. Published

    Hidden histories? Local knowledge and indigenous agency in the history of geographical exploration

    Driver, F. & Jones, L., 2010, Proceedings of the 14th International Conference of Historical Geographers, Kyoto Proceedings of the 14th International Conference of Historical Geographers, Kyoto . Kyoto University Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  182. Published

    Hidden Markov Models with Confidence

    Cherubin, G. & Nouretdinov, I., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 128-144 17 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  183. Published

    High Frequency Electro-Optic Beam Position Monitors for Intra-Bunch Diagnostics at the LHC

    Gibson, S., Arteche, A., Bosco, A., Darmedru, P. Y., Lefevre, T. & Levens, T., Jan 2016, 4th International Beam Instrumentation Conference: IBIC2015, Melbourne, Australia. JACoW Publishing, p. 606-610 5 p. WEDLA02

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  184. Published

    High occupancy resource allocation for grid and cloud systems, a study with DRIVE

    Chard, K., Bubendorfer, K. & Komisarczuk, P., 2010, Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, HPDC 2010, Chicago, Illinois, USA, June 21-25, 2010. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  185. E-pub ahead of print

    High System-Code Security with Low Overhead

    Wagner, J., Kuznetsov, V., Candea, G. & Kinder, J., 20 Jul 2015, Proc. IEEE Symp. Security and Privacy (S&P 2015). p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  186. Published

    High-Precision Arithmetic in Homomorphic Encryption

    Chen, H., Laine, K., Player, R. & Xia, Y., 2018, Topics in Cryptology – CT-RSA 2018 - The Cryptographers’ Track at the RSA Conference 2018, Proceedings. Springer-Verlag, Vol. 10808 LNCS. p. 116-136 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10808 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  187. Published

    History of Quaternary Science

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 10-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  188. In preparation

    Homomorphic noise growth in practice: comparing BGV and FV

    Costache, A., Laine, K. & Player, R., 2019, (In preparation) Eprint.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  189. Published

    Host-Based Security Sensor Integrity in Multiprocessing Environments

    Mcevoy, R. & Wolthusen, S. D., May 2010, Information Security, Practice and Experience: 6th International Conference, ISPEC 2010. Springer-Verlag, p. 138-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  190. Unpublished

    Household food waste simulation model: Investigation of interventions for staple food items waste

    Kandemir, C., Quested, T., Reynolds, C., Fisher, K. & Devine, R., 10 Jun 2019, (Unpublished) Household food waste simulation model: Investigation of interventions for staple food items waste.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  191. Published

    How ‘search’ Has Become the Watchword of the Digital Organisation

    Hafezieh, N. & Pollock, N., 2018, Academy of Management Proceedings. 1 ed. Academy of Management, Vol. 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  192. Published

    How ‘Search’ Has Become the Watchword of the Digital Organisation

    Hafezieh, N. & Pollock, N., 2018, Academy of Management Global Proceedings. 2018 ed. Academy of Management, Vol. Surrey.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  193. Published

    How damaging is caldera collapse for a volcanic edifice?

    Drymoni, K., Browning, J. & Gudmundsson, A., 2017, JOINT ASSEMBLY TSG-BGA-VMSG.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  194. Published

    How do knowledge workers with flexible jobs manage constant connectivity? An affordance perspective

    Farivar, F., Eshraghian, F. & Hafezieh, N., 2020, Academy of Management Proceedings. Academy of Management

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  195. Published

    How do management ideas diffuse? Lessons from the global spread of corporate social responsibility

    Preuss, L., Mar 2013, 40th annual conference of the Academy of International Business – UK and Ireland Chapter (AIB-UKI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  196. Published

    How Do Online Communities of Patients Aggregate on Twitter? An Affordance Perspective

    Bernardi, R., 11 Dec 2016, Proceedings of the Thirty Seventh International Conference on Information Systems: 2016 International Conference on Information Systems (ICIS 2016), December 11-14, 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  197. Unpublished

    How Hezbollah affects Lebanon’s sovereignty

    Van Efferink, L., 2010, (Unpublished) Political Studies Association Graduate Network, University of Oxford.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  198. Unpublished

    How important are national industrial relations systems in shaping restructuring in MNCs?

    Edwards, T., Coller, X., Ortiz, L., Rees, C. & Wortmann, M., Jul 2004, (Unpublished) IESE/DMU Conference on 'Multinationals and the International Diffusion of Organizational Forms and Practices'. Barcelona.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  199. Forthcoming

    How private is your period?: A systematic analysis of menstrual app privacy policies

    Shipp, L. & Blasco Alis, J., 1 May 2029, (Accepted/In press) Proceedings on Privacy Enhancing Technologies 2020 (PoPETs 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  200. Published

    How to give FAST Advice

    Stathis, K., 1 Oct 1994, Proceedings of the 7th Symposium and Exhibition on Industrial Applications of Prolog (INAP'94). p. 59-67 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  201. Published

    How to grant less permissions to facebook applications

    Costantino, G., Martinelli, F. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 55-60 6 p. 6947733

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  202. Published

    How to identify all cheaters in Pinch's scheme

    Yeun, C. Y. & Mitchell, C. J., 1998, Proceedings of JWIS '98, Singapore, December 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  203. Published

    Human resource Management, Organisational Performance, Employee Attitudes and Behaviours: Exploring the linkages

    Tsai, C-J., Edwards, P. & Sen Gupta, S., 2007, European Academy of Management (EURAM), Paris, France.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  204. Published

    Human rights policies and corporate financial performance: Evidence from UK corporations

    Preuss, L. & Brown, D., Mar 2010, annual meeting of the International Association for Business and Society .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  205. Published

    Hungarian IT: Coping with economic transition and globalisation

    Harindranath, G., 2004, Proceedings of the 2004 European Conference on Information Systems (ECIS), Turku School of Economics and Business Administration, Turku, Finland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  206. Published

    Hybrid metallic mesoscopic structures: Some unanswered questions

    Petrashov, V., 2003, TOWARDS THE CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPINTRONICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 255-261 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  207. Published

    Hybrid Publicly Verifiable Computation

    Alderman, J., Janson, C., Crampton, J. & Cid, C., 2 Feb 2016, Topics in Cryptology - CT-RSA 2016. Sako, K. (ed.). Springer, Vol. 9610. p. 147-163 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  208. Published

    Hydrogen Isotopes in Beetle Chitin

    Grocke, D., van Hardenbroeck, M., Elias, S. & Sauer, P., 2011, Chitin: Formation and Diagenesis. Gupta, S. N. (ed.). Springer, p. 105-116

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  209. Published

    Hypersensitivity to perturbation on an NMR quantum computer

    Schack, R. & Brun, T. A., 2000, Quantum Communication, Computing, and Measurement 2. Kumar, P., D'Ariano, G. M. & Hirota, O. (eds.). New York: Kluwer, p. 257-262

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  210. Published

    Hypersensitivity to perturbation: An information-theoretical characterization of classical and quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Communication, Computing, and Measurement. Hirota, O., Holevo, A. S. & Caves, C. M. (eds.). New York: Plenum Press, p. 317-330

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  211. Published

    Hypertesting: The Case for Automated Testing of Hyperproperties

    Kinder, J., Mar 2015, 3rd Workshop on Hot Issues in Security Principles and Trust (HotSpot 2015). p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  212. Published

    Hypothesis elimination on a quantum computer

    Soklakov, A. N. & Schack, R., 2004, Quantum Communication, Measurement and Computing (QCMC'04). Barnett, S. M. (ed.). Melville, New York: AIP Press, p. 151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  213. Published

    I feel attached: Motivation and Tourists’ Emotions as Antecedents of Place Attachment

    Prayag, G., Hosany, S. & Soscia, I., 2014, European Marketing Academy (EMAC) 43rd Annual Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  214. Submitted

    I.R.R.I.T.A.T.E: Warning! This is an Artist's Book

    Sandhu, K., 2014, (Submitted) Perversions of Paper.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  215. E-pub ahead of print

    IBC-C: A Dataset for Armed Conflict Event Analysis

    Zukov Gregoric, A., Veyhe, B. & Luo, Z., Aug 2016, Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics: Aug 7 to 12th 2016. p. 374-379 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  216. Published

    ICARUS: Intelligent Coupon Allocation for Retailers Using Search

    Swift, S., Shi, A., Crampton, J. & Tucker, A., 2005, Proceedings of 2005 IEEE Congress on Evolutionary Computation. IEEE Computer Society Press, p. 182-189 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  217. Published

    ICT Adoption & Use in UK SMEs

    Harindranath, G., Dyerson, R. & Barnes, D., 2007, Proceedings of the European Conference on Information Management and Evaluation, Conservatoire National des Arts et Metiers (CNAM), Montpellier, France, September. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  218. Published

    ICT Enabling Customer Agility: A Dynamic Capabilities Perspective

    Elbanna, A., Hallikainen, P. & Merisalo-Rantanen, H., Dec 2017, Thirty Eighth International Conference on Information Systems (ICIS). South Korea

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  219. Published

    ICT in early education: reasons for insufficient application

    Stanisavljevic Petrovic, Z., Pavlovic, D. & Soler-Adillon, J., 21 Apr 2016, eLearning Vision 2020!: Proceedings of the 12th International Scientific Conference "eLearning and Software for Education" Bucharest, April 21 - 22, 2016 . Roceanu, I. (ed.). Budapest, Rumania: "Carol I" National Defense University, Vol. 2. p. 227 232 p. 36

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  220. Published

    ICT in small firms: Factors affecting the adoption and use of ICT in Southeast England SMEs

    Harindranath, G., Dyerson, R. & Barnes, D., 2008, Proceedings of the 2008 European Conference on Information Systems (ECIS), Galway, Ireland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  221. Published

    ICT in South African SMEs: A study of the Manufacturing and Logistics sectors: BEST PAPER in ICT, IT and E-Business in the Small Firm Sector track, 36th ISBE Conference 2013, Cardiff, UK

    Gono, S., Harindranath, G. & Özcan, G. B., 13 Nov 2013, Proceedings of ISBE 2013, November, Cardiff. 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  222. Published

    ICT use in SMES: A comparison between the North West of England and the Province of Genoa

    Dyerson, R., Harindranath, G., Barnes, D. & Spinelli, R., 2009, ICE-B 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS. SETUBAL: INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL, p. 244-251 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  223. Published

    ICT4DWhat? Using the Choice Framework to Operationalise the Capability Approach to Development

    Kleine, D., 19 Apr 2009, Proceedings of the IEEE/ACM International Conference on Information Technology and Development 2009 in Doha, Qatar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  224. Published

    ICTs and hope for development: a theoretical framework

    Krishna Raja Gopalan, S. & Heeks, R., 2015, IFIP WG 9.4: Social Implications of Computers in Developing Countries: 13th International Conference on Social Implications of Computers in Developing Countries. Oslo, p. 414-428 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  225. Unpublished

    ICTs and the city: Impacts on place and mobility. A case study of Campinas, Brazil

    Poveda Villalba, S., 2014, (Unpublished) CivCity: Symposium on Civilisation, Infrastructure and the City. University College London Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  226. Published

    Identification in the Limit of Substitutable Context Free Languages

    Clark, A. & Eyraud, R., 2005, Proceedings of The 16th International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. U. & Tomita, E. (eds.). p. 283-296

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  227. Published

    Identification of malicious web pages through analysis of underlying DNS and web server relationships

    Seifert, C., Welch, I., Komisarczuk, P., Aval, C. U. & Endicott-Popovsky, B., 2008, LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings. p. 935-941 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  228. Published

    Identification of malicious web pages through analysis of underlying DNS and web server relationships.

    Seifert, C., Welch, I., Komisarczuk, P., Aval, C. U. & Endicott-Popovsky, B., 2008, Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on. p. 935-941 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Published

    Identification of malicious web pages with static heuristics

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  230. Published

    Identification of Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011. p. 33-40 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  231. Published

    Identification of resource allocation trends in irregular ATM networks

    Cosmas, J., Pitts, J., Bocci, M., Luo, Z., Nyong, D. & Rai, S., Mar 1997, Proceeding of Fourth UKTS on Performance Modelling and Evaluation of ATM Networks. p. 24/1-24/12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  232. Published

    Identifying and Analyzing Web Server Attacks

    Seifert, C., Endicott-Popovsky, B., Frincke, D. A., Komisarczuk, P., Muschevici, R. & Welch, I., 2008, Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008. p. 151-161 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  233. Published

    Identifying manipulated images

    Nightingale, S., Wade, K. & Watson, D., Jun 2015, Society for Applied Research in Memory and Cognition.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  234. Published

    Identifying patient experience from online resources via sentiment analysis and topic modelling

    Bahja, M. & Lycett, M., 6 Dec 2016, Proceedings - 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT 2016. Association for Computing Machinery, Inc, p. 94-99 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  235. Published

    IDENTIFYING THE RISKS ASSOCIATED WITH AGILE SOFTWARE DEVELOPMENT: AN EMPIRICAL INVESTIGATION

    Elbanna, A., 2014, ..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  236. Published

    Igneous Intrusions in the Carnarvon Basin, NW Shelf, Australia

    McClay, K., Scarselli, N. & Jitmahantakul, S., 31 Aug 2013, Proceedings of the Western Australian Basins Conference. 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  237. Published

    Il 'Furioso' spiritualizzato

    Anelotti, A., 2019, ‘Dreaming again on things already dreamed’: 500 years of 'Orlando Furioso' (1516-2016) . Dorigatti, M. & Pavlova, M. (eds.). Oxford-New York: Peter Lang

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  238. Unpublished

    Illiquidity, investment styles and January returns in United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Corporate Finance Decisions in a Changing Global Environment, International Finance and Banking Society (IFABS) Asia 2016 Brunei Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. In preparation

    IMMIGRATION AND NEO-LIBERALISM: THREE STORIES AND COUNTER ACCOUNTS

    Agyemang, G., Lehman, C. R. & Annisette, M., 9 Jul 2013, (In preparation) IMMIGRATION AND NEO-LIBERALISM: THREE STORIES AND COUNTER ACCOUNTS.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  240. Published

    Implementable Internationalization Strategies for Companies from Emerging Economies

    Aboutalebi, R., 23 Nov 2011, In: EAMSA (Euro-Asia Management Studies Association), 28th Annual Conference: Strategies of international development in Euro-Asian Business. 23-26 November 2011, University of Gothenburg, Gothenburg, Sweden.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  241. Published

    Implementation aspects of SET/EMV

    Jarupunphol, P. & Mitchell, C. J., 2002, Towards the Knowledge Society: eCommerce, eBusiness and eGovernment, The 2nd IFIP Conference on e-commerce, e-business and e-government, IFIP I3E 2002, Lisbon, Portugal, October 2002. Monteiro, J. L., Swatman, P. M. C. & Tavares, L. V. (eds.). Kluwer Academic Publishers, p. 305-315 11 p. (IFIP Conference Proceedings; no. 233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  242. Published

    Implementation of a component-by-component algorithm to generate small low-discrepancy samples

    Doerr, B., Gnewuch, M. & Wahlström, M., 1 Jul 2009, Monte Carlo and Quasi-Monte Carlo Methods 2008. L'Ecuyer, P. & Owen, A. B. (eds.). Montreal, Canada: Springer, p. 323-338 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  243. Published

    Implementation of agents for connection admission control on an ATM testbed

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 2000, On The Way to Information Society: Five Years of European ACTS Research on Intelligence in Services and Networks. IOS Press, p. 413-426

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  244. Published

    Implementation of CERN Secondary Beam Lines T9 and T10 in BDSIM

    D'Alessandro, G. L., Boogert, S., Gibson, S., Nevay, L., Shields, W., Bernhard, J., Gerbershagen, A. & Rosenthal, M. S., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 3746-3748 3 p. THPGW069

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  245. Published

    Implementation techniques for inductive types in Plastic

    Callaghan, P. & Luo, Z., 2000, Types for Proofs and Programs, Proc of Inter Conf of TYPES'99. LNCS 1956.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  246. Published

    Implementing a Caching Service for Distributed CORBA Objects

    Chockler, G., Dolev, D., Friedman, R. & Vitenberg, R., 2000, Proceedings of the 2nd IFIP/ACM International Conference on Distributed systems platforms (Middleware '00). Springer-Verlag, p. 1-23 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  247. Published

    Implementing a model checker for Lego

    Yu, S. & Luo, Z., 1997, Proc. of the 4th Inter Symp. of Formal Methods Europe, FME'97: Industrial Applications and Strengthened Foundations of Formal Methods. LNCS 1313.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  248. Published

    Implementing Candidate Graded Encoding Schemes from Ideal Lattices

    Albrecht, M., Cocis, C., Laguillaumie, F. & Langlois, A., 30 Dec 2015, Advances in Cryptology – ASIACRYPT 2015. Iwata, T. & Cheon, J. H. (eds.). Springer, p. 752-775 24 p. ( Lecture Notes in Computer Science; vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  249. E-pub ahead of print

    Implementing Grover Oracles for Quantum Key Search on AES and LowMC

    Jaques, S., Naehrig, M., Roetteler, M. & Virdia, F., 1 May 2020, Advances in Cryptology – EUROCRYPT 2020. Springer, p. 280-310 31 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  250. Published

    IMPORTANT DETERMINANTS OF FOREIGN COMPANY PERFORMANCE IN CHINA: BIG DATA ANALYSIS

    Wang, C. & Giouvris, E., 2018, BAI-winter Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  251. Published

    Impostor: A single sign-on system for use from untrusted devices

    Pashalidis, A. & Mitchell, C. J., 2004, Proceedings of IEEE Globecom 2004, Global Telecommunications Conference, Dallas, Texas, USA, November/December 2004. IEEE, Vol. 4. p. 2191-2195

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  252. E-pub ahead of print

    Improved Classical Cryptanalysis of SIKE in Practice

    Costello, C., Longa, P., Naehrig, M., Renes, J. & Virdia, F., 29 Apr 2020, Public-Key Cryptography – PKC 2020. Springer, p. 505-534 30 p. (Lecture Notes in Computer Science; vol. 12111).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  253. Published

    Improved Higgs Naturalness with Supersymmetry

    Gripaios, B. & West, S., 30 Oct 2006, Proceedings of SUSY06.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  254. Published

    Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage

    Lacharite, M-S., Minaud, B. & Paterson, K., 26 Jul 2018, 2018 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  255. Published

    Improved Security Notions for Proxy Re-Encryption to Enforce Access Control

    Lee, E., 20 Jul 2019, Progress in Cryptology – LATINCRYPT 2017: International Conference on Cryptology and Information Security in Latin America. Springer, p. 66-85 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  256. E-pub ahead of print

    Improving Air Interface User Privacy in Mobile Telephony

    Khan, M. & Mitchell, C. J., 9 Dec 2015, Security Standardisation Research, Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 165-184 20 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  257. Published

    Improving IP address autoconfiguration security in MANETs using trust modelling

    Hu, S. & Mitchell, C. J., 2005, Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedings. Jia, X., Wu, J. & He, Y. (eds.). Springer-Verlag, Vol. 3794. p. 83-92 10 p. (Lecture Notes in Computer Science; vol. 3794).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  258. Published

    Improving model quality through foundational ontologies: Two contrasting approaches to the representation of roles

    de Cesare, S., Henderson-Sellers, B., Partridge, C. & Lycett, M., 2015, Advances in Conceptual Modeling - ER 2015 Workshops, AHA, CMS, EMoV, MoBiD, MORE-BI, MReBA, QMMQ, and SCME, Proceedings. Springer Verlag, Vol. 9382. p. 304-314 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9382).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  259. Published

    Improving Planning Performance in PDDL+ Domains via Automated Predicate Reformulation

    Franco, S., Vallati, M., Lindsay, A. & McCluskey, T. L., 2019, Computational Science - ICCS 2019 : 19th International Conference, Faro, Portugal, June 12–14, 2019, Proceedings, Part V. Rodrigues, J. M. F., Cardoso, P. J. S., Monteiro, J. M., Lam, R., Krzhizhanovskaya, V. V., Lees, M. H., Dongarra, J. J. & Sloot, P. M. A. (eds.). Springer, Vol. 11540. p. 491-498 8 p. (Lecture Notes in Computer Science; vol. 11540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  260. Published

    Improving Reliable Probabilistic Prediction by Using Additional Knowledge

    Nouretdinov, I., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). Vol. 60. p. 193-200 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  261. Published

    Improving Self-organized Resource Allocation with Effective Communication

    Kafali, O. & Yolum, P., 2012, Agents and Peer-to-Peer Computing. Beneventano, D., Despotovic, Z., Guerra, F., Joseph, S., Moro, G. & Pinninck, A. (eds.). Springer Berlin / Heidelberg, Vol. 6573. p. 35-46 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  262. Published

    In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities

    Coles-Kemp, L., Jensen, R. B. & Talhouk, R., 21 Apr 2018, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, p. 1-13 13 p. 584

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  263. Published

    In search for theory: What hampers innovation

    Guenther, E., Hueske, A-K., Hoelzle, K., Kesting, P., Linnenluecke, M. & Preuss, L., Aug 2011, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  264. Published

    Incentive Engineering for Outsourced Computation in the Face of Collusion

    Rezaei Khouzani, M., Pham, V. & Cid, C., 2014, Proceedings of WEIS 2014 – 13th Annual Workshop on the Economics of Information Security,. 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  265. Published

    Incubating New Entrepreneurship Practices: The Case of Plan9 Incubator in Pakistan

    Shahid, A. R. & Morlacchi, P., 2019, Fourth Annual Entrepreneurship as Practice Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. E-pub ahead of print

    In-Cycle Sequential Topology Faults and Attacks: Effects on State Estimation

    Gul, A. & Wolthusen, S., 30 Dec 2018, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (eds.). Springer Verlag, p. 17-28 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  267. Published

    Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard

    Baiocco, A. & Wolthusen, S., 2018, Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  268. Published

    Individuals’ smartphone security behaviour: similarities and differences in developing countries

    Shah, M. & Ameen, N., 2019, Data, Organisations and Society Conference, Coventry University.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  269. Published

    Indonesian tectonics: Subduction, extension, provenance and more

    Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-360 1-13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  270. Published

    Inducing Syntactic Categories by Context Distribution Clustering

    Clark, A., 2000, Proc. of Conference on Computational Natural Language Learning. p. 91-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  271. Published

    Inductive Confidence Machine for pattern recognition

    Surkov, D., Gammerman, A. & Vovk, V., 2002, Proceedings of the ICDM 2002 Workshop on the Foundation of Data Mining and Knowledge Discovery. Lin, T. & Ohsuga, S. (eds.). Shimane Medical University, p. 249-255 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  272. Published

    Inductive confidence machines for regression

    Papadopoulos, H., Proedrou, K., Vovk, V. & Gammerman, A., 2002, Proceedings of the Thirteenth European Conference on Machine Learning. Elomaa, T., Mannila, H. & Toivonen, H. (eds.). London: Springer, p. 345-356 12 p. (Lecture Notes in Computer Science; vol. 2430).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  273. Published

    Inductive Conformal Martingales for Change-Point Detection

    Volkhonskiy, D., Burnaev, E., Nouretdinov, I., Gammerman, A. & Vovk, V., 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). p. 1-22 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  274. Published

    Inductive Venn-Abers Predictive Distribution

    Nouretdinov, I., Volkhonskiy, D., Lim, P., Toccaceli, P. & Gammerman, A., Jun 2018, 7th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2018). Vol. 91. p. 15-36 22 p. (Proceedings of Machine Learning Research).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  275. Published

    Inferring protein-protein interactions using interaction network topologies

    Paccanaro, A., Trifonov, V., Yu, H. & Gerstein, M. B., 2005, Proceedings of the International Joint Conference on Neural Networks. p. 161 166 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  276. Published

    Influence of erosion on the kinematics of bivergent orogens: Results from scaled sandbox simulations

    Hoth, S., Adam, J., Kukowski, N. & Oncken, O., 2006, TECTONICS, CLIMATE, AND LANDSCAPE EVOLUTION. Willett, SD., Hovius, N., Brandon, MT. & Fisher, DM. (eds.). BOULDER: GEOLOGICAL SOC AMER INC, p. 201-225 25 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  277. Published

    Influence of normal-faults on magma propagation with examples from the Hafnarfjall caldera, Iceland, and Santorini, Greece

    Browning, J., Gudmundsson, A. & Drymoni, K., 2019, LASI VI.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  278. Published

    Influence of product manufacturing, supplier and technology selection in the configuration of the UK composites supply chain

    Coronado Mondragon, A. E., Mastrocinque, E. & Hogg, P., 15 Jun 2015, Proceedings of the International Conference on Engineering Technologies, Engineering Education and Engineering Management (ETEEEM 2014), Hong Kong, 15-16 November 2014. Tan, D. (ed.). CRC Press, p. 1079–1082 4 p. 235

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  279. Published

    Information and available work in the perturbed baker's map

    Schack, R. & Caves, C. M., 1993, Workshop on Physics and Computation: PhysComp '92. Los Alamitos, California: IEEE Computer Society Press, p. 69-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  280. Unpublished

    Information and consultation during takeovers in the UK: the IAG/BMI case

    Rees, C. & Gold, M., Mar 2015, (Unpublished) 'Infpreventa' Project Final Conference. Sofia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  281. Published

    Informational and computation efficiency of set predictors

    Vovk, V., Sep 2012, Proceedings of the Fifth Workshop on Information-Theoretic Methods in Science and Engineering. de Rooij, S., Kotlowski, W., Rissanen, J., Millimaki, P., T. R. & Yamanishi, K. (eds.). Amsterdam: CWI, p. 48-51 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  282. Published

    Inhibiting Card Sharing Attacks

    Tunstall, M., Markantonakis, K. & Mayes, K., 2006, Advances in Information and Computer Security. Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y. & Kawamura, S. (eds.). Springer Berlin / Heidelberg, Vol. 4266. p. 239-251 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  283. Published

    Innovating for corporate social responsibility: Integrating societal, industry, firm and individual level factors

    Preuss, L. & Dyerson, R., Apr 2011, Symposium on Corporate Responsibility and Innovation.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  284. Published

    Insect fossil evidence on late Wisconsin environments of the Bering Land Bridge: new data on the nature and timing of inundation

    Elias, S., 1996, American Beginnings, The Prehistory and Palaeoecology of Beringia. West, F. H. (ed.). Chicago: University of Chicago Press, p. 110-119

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  285. Published

    Insect Fossils

    Elias, S., 1995, Stratigraphy and Paleoenvironments of Late Quaternary Valley Fills on the Southern High Plains. Holliday, V. T. (ed.). Boulder, Colorado: Geological Society of America, Vol. Memoir 186. p. 50-53.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  286. Published

    Insect fossils and Late Quaternary environments of the Chihuahuan Desert.

    Elias, S., 1999, Fourth Symposium on Resources of the Chihuahuan Desert. Barlow, J. C. & Miller, D. J. (eds.). Fort Davis, Texas: Chihuahuan Desert Research Institute, p. 1-10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  287. Published

    Insights into the metabolism and ecophysiology of three acidithiobacilli by comparative genome analysis

    Valdes, J., Pedroso, I., Quatrini, R., Hallberg, K. B., Valenzuela, P. D. T. & Holmes, D. S., 2007, BIOHYDROMETALLURY: FROM THE SINGLE CELL TO THE ENVIRONMENT. Schippers, A., Sand, W., Glombitza, F. & Willscher, S. (eds.). STAFA-ZURICH: TRANS TECH PUBLICATIONS LTD, p. 439-442 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  288. Published

    Installing fake root keys in a PC

    Alsaid, A. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, Vol. 3545. p. 227-239 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  289. Published

    Institutional approaches and strategies of control and collaboration

    Kromidha, E., 2015, Proceedings of IFIP 9.4: 13th Conference on Social Implications of Computers in Developing Countries, 20-22 May 2015. Negombo, Sri Lanka

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  290. Published

    Institutions for Behaviour Specification

    Fiadeiro, J. L. & Costa, J. F., 1995, COMPASS/ADT. Springer, Vol. 906. p. 273-289 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  291. Published

    Institutions trust institutions: critiques of the BP/Tate partnership by artists

    Chong, D., 2011, 37th Annual Macromarketing Conference (Williamsburg, VA: College of William and Mary).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  292. Published

    Instructors as Designated Leaders for Fostering Online Engagement: The Case of Online Learning Communities

    Wallace, A. & Panteli, N., 2016, Mediterranean Conference on Information Systems, MCIS2016: Track: E-learning. September 4-6, 2016, Paphos, Cyprus

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  293. Published

    Integrated Simulation Tools for Collimation Cleaning in HL-LHC

    CERN Collimation Team, Gibson, S. & Nevay, L., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 160-162 3 p. MOPRO039

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  294. Published

    Integrating OAuth with Information Card Systems

    Al-Sinani, H. S., 2011, Proceedings of IAS '11: 7th International Conference on Information Assurance and Security, Malacca, Malaysia, 5-8 December 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  295. Forthcoming

    Intelligent Exploration and Autonomous Navigation in Confined Spaces

    Akbari, A. & Bernardini, S., 1 Jul 2020, (Accepted/In press) International Conference on Intelligent Robots and Systems (IROS): 2020 IEEE/RSJ. IEEE Xplore, 1209

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  296. Published

    Interactions between insects and mycorrhizal fungi

    Gange, A. & Bower, E., 1997, MULTITROPHIC INTERACTIONS IN TERRESTRIAL SYSTEMS. OXFORD: BLACKWELL SCIENCE PUBL, p. 115-132 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  297. Published

    INTERACTIONS BETWEEN SOIL-DWELLING INSECTS AND MYCORRHIZAS DURING EARLY PLANT SUCCESSION

    Gange, A. & BROWN, V. K., 1992, MYCORRHIZAS IN ECOSYSTEMS. WALLINGFORD: C A B INTERNATIONAL, p. 177-182 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  298. Published

    Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments

    Lunden, N., Sveen, R., Lund, H., Svendsen, N. & Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 171-183

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  299. Published

    Interconnecting formalisms: Supporting modularity, reuse and incrementality

    Fiadeiro, J. L. & Maibaum, T., 1 Jan 1995, Proceedings of the Third ACM SIGSOFT Symposium on Foundations of Software Engineering. ACM Press, p. 72-80 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  300. Published

    Interconnecting objects via contracts

    Fiadeiro, J. L. & Andrade, L. F., 1 Jan 2001, 38th International Conference on Technology of Object-Oriented Languages and Systems, Components for Mobile Computing. p. 182 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  301. Published

    Interconnecting Objects Via Contracts

    Andrade, L. F. & Fiadeiro, J. L., 1999, UML. Springer, Vol. 1723. p. 566-583 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  302. Published

    Inter-Continental Strategy Implementation

    Aboutalebi, R., Tan, H. & Lobo, R., 27 Nov 2013, In: EAMSA (Euro-Asia Management Studies Association), 30th Annual Conference of EAMSA: Innovation in Asia and Europe Approaches and Answers to new Challenges. Institute of East Asian Studies (IN-EAST); 27-30 November 2013, University of Duisburg-Essen, Duisburg, Germany.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  303. Unpublished

    Intercultural Communication of Chinese Traditional Opera Programs under the View of Deconstructionism

    Li, X., 13 Aug 2018, (Unpublished) Second World Conference of Chinese Studies & 17th Intl. Conference on the Digitalization of Premodern Chinese Novel & Drama.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  304. Published

    Inter-domain role mapping and least privilege

    Chen, L. & Crampton, J., 2007, Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 157-162 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  305. Published

    Interfirm relational governance through media choice and communication practices in the coopetitive context

    Lee, J. Y. H., Saunders, C. & Panteli, N., 30 Oct 2018, International Conference on Information Systems 2018, ICIS 2018. Association for Information Systems, (International Conference on Information Systems 2018, ICIS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  306. Published

    Interleaving Search and Heuristic Improvement

    Franco, S. & Torralba, Á., 5 Jul 2019, Proceedings of the Twelfth International Symposium on Combinatorial Search, SOCS 2019, Napa, California, 16-17 July 2019. Surynek, P. & Yeoh, W. (eds.). AAAI Press, p. 130-134 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  307. Published

    International Manufacturing Strategies: A Taxonomy

    Aboutalebi, R., 6 Sep 2016, In: BAM (British Academy of Management), 30th Annual Conference of BAM: Thriving in Turbulent Time. 06-08 September 2016, Newcastle University, England, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  308. Published

    Internet background radiation arrival density and network telescope sampling strategies

    Pemberton, D., Komisarczuk, P. & Welch, I., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 246-252 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  309. Published

    Internet Sensor Grid: Experiences with Passive and Active Instruments

    Komisarczuk, P. & Welch, I., 2010, Communications: Wireless in Developing Countries and Networks of the Future - Third IFIP TC 6 International Conference, WCITD 2010 and IFIP TC 6 International Conference, NF 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings. p. 132-145 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  310. Published

    Internet Users' Security and Privacy While They Interact with Amazon

    Bella, G. & Coles-Kemp, L., 2011, Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, p. 878-883 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  311. Published

    Interoperability of security and quality of Service Policies Over Tactical SOA

    Gkioulos, V., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J. & Wolthusen, S., 13 Feb 2017, Proceedings of the 2016 Symposium on Computational Intelligence (SSCI 2016) . p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  312. Published

    Interorganisational information sharing and the use of category management

    Feldberg, F. & van der Heijden, H., 2003, Proceedings of the 16th Bled Electronic Commerce conference. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  313. E-pub ahead of print

    Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

    Crampton, J. & Sellwood, J., 2 Jul 2016, Data and Applications Security and Privacy XXX. Springer-Verlag, Vol. 9766. p. 96-105 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  314. Unpublished

    Inter-temporal variation in the illiquidity premium and its relationship with monetary conditions within the United Kingdom market

    Said, H. & Giouvris, E., 2015, (Unpublished) Banking, Financial markets, risk and financial vulnerability, 5th International Conference of the Financial Engineering and Banking Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  315. Published

    Intriguing Properties of Adversarial ML Attacks in the Problem Space

    Pierazzi, F., Pendlebury, F., Cortellazzi, J. & Cavallaro, L., Mar 2020, IEEE Symposium on Security and Privacy. p. 1308-1325 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  316. Published

    Intrinsic circuit evolution using programmable analogue arrays

    Flockton, S. J. & Sheehan, K., 1998, EVOLVABLE SYSTEMS: FROM BIOLOGY TO HARDWARE. Sipper, M., Mange, D. & PerezUribe, A. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-153 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  317. Published

    Introducing probabilities in contract-based approaches for mobile application security

    Dini, G., Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer-Verlag, Vol. 8247 LNCS. p. 284-299 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  318. E-pub ahead of print

    Intrusion Detection in Robotic Swarms

    Sargeant, I. & Tomlinson, A., 24 Aug 2019, Proceedings of SAI Intelligent Systems Conference. Bi, Y., Bhatia, R. & Kapoor, S. (eds.). Springer, Vol. 2. p. 968-980 13 p. (Advances in Intelligent Systems and Computing; vol. 1038).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  319. Published

    Intuiting Form: Memory and (Dis)continuity in Enescu's Piano Quintet, Op. 29

    Savage-Hanford, J., 2017, Proceedings of the "George Enescu" International Musicology Symposium 2017. Cosma, M. (ed.). Bucharest: Editura Muzicala

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  320. Published

    Invariant statistics and coding of natural microimages

    Geman, D. & Koloydenko, A., 1999, IEEE Workshop on Statistical and Computational Theories of Vision.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  321. Published

    Invariants of Finite Groups and Involutive Division

    Cid, C. & Plesken, W., 2001, Computer Algebra in Scientific Computing CASC 2001. Springer, p. 123-135 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. Published

    Investigating Outward FDI by Indian MNEs in the UK

    Aboutalebi, R. & Tan, H., 29 Mar 2012, In: AIB (Academy of International Business), 39th Academy of International Business: New Global Developments and the Changing Geography of International Business. 29-31 March 2012, the University of Liverpool, Liverpool, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  323. E-pub ahead of print

    Investigating the Applicability of Distributed Ledger/Blockchain Technology in Manufacturing and Perishable Goods Supply Chains

    Coronado Mondragon, A., Coronado, C. & Coronado, E., 16 May 2019, 2019 IEEE 6th International Conference on Industrial Engineering and Applications (ICIEA). Tokyo, Japan: IEEE Xplore, p. 728-732 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  324. Published

    Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM

    Wetherall, J., Taylor, M. & Hurley-Smith, D., 2 Nov 2015, 2015 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, p. 81-84 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  325. Published

    Investigation of CLIC 380 GeV Post-Collision Line

    Bodenstein, R., Abramov, A., Boogert, S., Burrows, P., Nevay, L., Schulte, D. & Tomás, R., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 528-531 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  326. Published

    Investigation of the fatigue failure mechanisms for stitched and unstitched unidirectional composites

    Zhang, C., Jamshidi, M., Barnes, S., Cauchi-Savona, S., Rouse, J., Bradley, R., Withers, P. & Hogg, P., 1 Dec 2011, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  327. Unpublished

    Investment styles and the potential of using illiquidity as an investment style in United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Banking, Finance and Institutions: Stability and Risk, 6th International Conference of the Financial Engineering and Banking Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  328. Published

    IP access service provision for broadband customers

    Komisarczuk, P., 1999, Services Over the Internet-What Does Quality Cost?(Ref. No. 1999/099), IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  329. Published

    Iron homeostasis strategies in acidophilic iron oxidizers: Comparative genomic analyses

    Quatrini, R., Martinez, V., Osorio, H., Veloso, F. A., Pedroso, I., Valdes, J., Jedlicki, E. & Holmes, D. S., 2007, BIOHYDROMETALLURY: FROM THE SINGLE CELL TO THE ENVIRONMENT. Schippers, A., Sand, W., Glombitza, F. & Willscher, S. (eds.). STAFA-ZURICH: TRANS TECH PUBLICATIONS LTD, p. 531-534 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  330. Published

    Is entity authentication necessary?

    Mitchell, C. J. & Pagliusi, P., 2004, Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19 2002, Revised Papers. Springer-Verlag, Vol. 2004. p. 20-33 14 p. (Lecture Notes in Computer Science; vol. 2845).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  331. Unpublished

    Is Islam still the Solution? Clerical Elites and Muslim Extremism in Post Arab- Spring Middle East: Panel on Extremism in Post-Arab Spring MENA: Origins and Catalysts for the Rise of Extremist Movements

    Kalantari, M., 4 Mar 2015, (Unpublished) Royal Holloway University of London Politics and International Relations Department’s 10th Anniversary Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  332. Unpublished

    Is social inclusion the same for all? Critical Internet use as a tool to attend individual needs in Brazil

    Poveda Villalba, S., 2013, (Unpublished) Is social inclusion the same for all? Critical Internet use as a tool to attend individual needs in Brazil. Human Development and Capability Association (HDCA)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  333. Published

    Island Grammar-Based Parsing Using GLL and Tom

    Afroozeh, A., Bach, J-C., van den Brand, M., Johnstone, A., Manders, M., Moreau, P-E. & Scott, E., 2013, Software Language Engineering Lecture Notes in Computer Science : 5th International Conference, SLE 2012, Dresden, Germany, September 26-28, 2012, Revised Selected Papers. p. 224-243 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  334. Published

    Issues of Security with the Oswald-Aigner Exponentiation Algorithm

    Walter, C. D., 2004, CT-RSA 2004. Okamoto, T. (ed.). Springer, Vol. 2964. p. 208-221 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  335. Published

    IT Enactment of New Public Management in Africa: The Case Study of Health Information Systems in Kenya

    Bernardi, R., 2009, Proceedings of the 9th European Conference on e-Government. Remenyi, D. (ed.). Reading: Academic Publishing Ltd, p. 129-136

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  336. Published

    Italianisierte Formen in 'Les Troyens'

    Charlton, D., 2011, Berlioz' 'Troyens' und Halévys 'Juive' im Spiegel der Grand Opéra. Stuttgart: Franz Steiner Verlag, p. 83-96 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  337. Published

    IT-enabled change into the structures of Health Information Systems in Africa: a case study in Kenya

    Bernardi, R., 2009, ECIS09 Proceedings. Newell, S., Whitley, E., Pouloudi, N., Wareham, J. & Mathiassen, L. (eds.). Padova: CLEUP

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  338. Published

    ITS and Smart Grid Networks for Increasing Live Shellfish Value

    Coronado Mondragon, A. E. & Coronado, E. S., 16 Jun 2014, 10th ITS European Congress. Helsinki, 9 p. TP0115

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  339. Published

    Jakstab: A Static Analysis Platform for Binaries

    Kinder, J. & Veith, H., 2008, Proc. 20th Int. Conf. Computer Aided Verification (CAV 2008). Springer, p. 423-427

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  340. Published

    Jean de La Taille et la scénographie du "creux": Saül le furieux (1572)

    Chesters, T., 2005, Dramaturgies de l'ombre: spectres et fantômes au théâtre. Lavocat, F. & Lecercle, F. (eds.). Presses Universitaires de Rennes, p. 101-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  341. Published

    Johann Friedrich Fasch’s Mich vom Stricke meiner Sünden – a work for Zerbst?

    Springthorpe, N., 2007, Johann Friedrich Fasch als Instrumentalkomponist: Bericht über die Internationale Wissenshaftliche Konferenz am 8. und 9. April 2005 im Rahmen der 9. International Fasch-Festtage in Zerbst.: Schriften zur mitteldeutschen Musikgeschichte der Ständigen Konferenz Mitteldeutsche Barockmusik in Sachsen, Sachsen-Anhalt und Thüringen e.V. Band 14. Musketa, K. (ed.). Beeskow: Ortus Musikverlag, Vol. 14. p. 207-224 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  342. Published

    Joining the dots: exploring technical and social issues in e-Science approaches to linking landscape and artifactual data in British archaeology

    Gosden, C., Kamash, Z., Kirkham, R. & Pybus, J., 2009, E-science workshops 2009: 5th IEEE International Conference. p. 171-174

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  343. Published

    Joyce In The Shadow Of War And Fascism: A Review Of Finnegans Wake By Mario Praz (1939)

    Fordham, F., 2017, Joyce Studies in Italy. Ruggieri, F. (ed.). Rome, Vol. 19. p. 301-322 22 p. (Joyce Studies in italy; vol. 19).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  344. Published

    k-Distinct In- and Out-Branchings in Digraphs

    Gutin, G., Reidl, F. & Wahlstrom, M., 2017, 44th International Colloquium on Automata, Languages, and Programming: ICALP 2017. Dagstuhl, p. 1-13 13 p. (Leibniz International Proceedings in Informatics ; vol. 80).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  345. Published

    Kernelization of Constraint Satisfaction Problems: A Study through Universal Algebra

    Lagerkvist, V. & Wahlstrom, M., 2017, Principles and Practice of Constraint Programming: 23rd International Conference, CP 2017, Melbourne, VIC, Australia, August 28 – September 1, 2017, Proceedings. Springer, p. 157-171 15 p. (Lecture Notes in Computer Science; vol. 10416).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  346. Published

    Key distribution without individual trusted authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, Proceedings: The 8th IEEE Computer Security Foundations Workshop, Kenmare, Co. Kerry, Ireland, June 1995. IEEE Computer Society Press, p. 30-36 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  347. Published

    Key escrow in multiple domains

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of INFOSEC'COM '97, Paris, June 1997. p. 101-116 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  348. Published

    Key escrow in mutually mistrusting domains

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1997, Security Protocols - Proceedings, International Workshop, Cambridge, April 1996. Lomas, M. (ed.). Springer-Verlag, p. 139-153 15 p. (Lecture Notes in Computer Science; no. 1189).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  349. Published

    Key Management for Secure Demand Data Communication in Constrained Micro-Grids

    Kayem, A. V. D. M., Strauss, H., Wolthusen, S. & Meinel, C., 2016, Advanced Information Networking and Applications Workshops (WAINA), 2016 30th International Conference on. IEEE Press, p. 585-590 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  350. Published

    Key minimal authentication systems for unconditional secrecy

    Godlewski, P. & Mitchell, C. J., 1990, Advances in Cryptology - Eurocrypt '89. Quisquater, J-J. & Vandewalle, J. (eds.). Springer-Verlag, p. 497-501 5 p. (Lecture Notes in Computer Science; no. 434).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  351. Published

    Key recovery and forgery attacks on the MacDES MAC algorithm

    Coppersmith, D., Knudsen, L. R. & Mitchell, C. J., 2000, Advances in Cryptology - Proceedings of Crypto 2000. Bellare, M. (ed.). Springer-Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science; no. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  352. Published

    Key recovery attacks on MACs based on properties of cryptographic APIs

    Brincat, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 63-72 10 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  353. Published

    Key recovery for archived data using smart cards

    Rantos, K. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 75-85 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  354. Published

    Key recovery in ASPeCT authentication and initialisation of payment protocol

    Rantos, K. & Mitchell, C. J., 1999, Proceedings of the 4th ACTS Mobile Communications Summit, Sorrento, Italy, June 1999. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  355. Published

    Key recovery scheme interoperability - a protocol for mechanism negotiation

    Rantos, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  356. Published

    Key Rotation for Authenticated Encryption

    Everspaugh, A., Paterson, K., Ristenpart, T. & Scott, S., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Springer-Verlag, Vol. 10403. p. 98-129 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10403 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  357. Published

    Knowledge Intensive R&D? Employment Practices of Foreign invested R&D Centres in China

    Zheng, Y., Mar 2013, International Labour Process Conference, Rutgers University, NJ, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  358. Published

    Knowledge management in small firms

    Panyasorn, J., Panteli, N. & Powell, P., 2009, Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises : IFIP WG 8.2 International Conference, CreativeSME 2009, Proceedings. Dhillon, G., Stahl, B. C. & Baskerville, R. (eds.). Springer, p. 192-210 19 p. (IFIP Advances in Information and Communication Technology; vol. 301).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  359. Published

    Knowledge management orientation, product innovation and shared vision: an integration and empirical examination of performance effects

    Wang, C. L., Ahmed, P. K. & Rafiq, M., 2007, British Academy of Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  360. Published

    Knowledge management orientation, shared vision, and product innovation: An integration and empirical examination of performance effects

    Wang, C. L., Ahmed, P. K. & Rafiq, M., 2008, Academy of Management Annual Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  361. Published

    Knowledge Management System’s Characteristics that facilitate Knowledge Sharing to Support Decision Making Processes in Multinational Corporations

    Abdelrahman, M. & Papamichail, K., 2011, 17th Americas Conference on Information Systems AMCIS. Detroit, Michigan, USA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  362. Published

    Knowledge Sharing to Support Decision Making Processes in Multinational Corporations

    Abdelrahman, M. & Papamichail, K., 2013, 26th European Conference on Operational Research. Rome, Italy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  363. Published

    Knowledge, learning and transformation in transnational sites: relationship asymmetry, politics and institution building

    Clark, E., 2005, The end of transformation?. Lang, R. (ed.). Munich: Rainer Hampp Verlag, p. 281-304 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  364. Published

    Kolmogorov's complexity conception of probability

    Vovk, V., 2001, Probability Theory: Philosophy, Recent History and Relations to Science. Dordrecht: Kluwer, p. 51-69 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  365. Published

    La comédie lyrique au temps de Diderot

    Charlton, D., 2016, Music et pantomime dans 'Le Neveu de Rameau'. Salaün, F. & Taïeb, P. (eds.). Paris: Hermann Editeurs, p. 50-77 28 p. (Fictions pensantes).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  366. Published

    La penna e il pennello. Retoriche a confronto

    Jossa, S., Hendrix, H. (ed.) & Procaccioli, P. (ed.), 2008, Officine del nuovo. Sodalizi fra letterati, artisti ed editori nella cultura italiana fra Riforma e Controriforma. Atti del Simposio internazionale, Utrecht, 8-10 novembre 2007. Roma: Vecchiarelli

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  367. Published

    La Rencontre de l'ancien et du nouveau dans 'La Fille mal gardée' de Duni et Favart.

    Charlton, D., 2015, Rire et sourire dans l'opéra-comique en France aux XVIIIe et XIXe siècles.. Loriot, C., Cailliez, M. & Bonche, V. (eds.). Lyon: Symétrie, p. 33-51 19 p. (Symétrie Recherche).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  368. Published

    La Vérité se rencontre-t-elle au train de la contingence?

    O'Brien, J., 2011, Les Chapitres oublis des 'Essais' de Montaigne. Paris: Champion, p. 93-106 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  369. Unpublished

    Labour unions and CSR: initial results from a cross-European research project

    Preuss, L., Rees, C. & Gold, M., Jun 2013, (Unpublished) International Association for Business and Society (IABS) Annual Meeting. Portland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  370. Published

    Labour-management partnership in the non-union retail sector

    Badigannavar, V. & Kelly, J., 2003, 21st International Labour Process Conference, Bristol Business School, UWE.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  371. Published

    Languages as Hyperplanes: grammatical inference with string kernels

    Clark, A., Costa Florêncio, C. & Watkins, C., 2006, Proceedings of ECML. p. 90-101

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  372. Published

    Large Modulus Ring-LWE > Module-LWE

    Albrecht, M. & Deo, A., 2017, Advances in Cryptology - ASIACRYPT 2017. p. 267-296 30 p. (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  373. Published

    Large sediment accumulations and major subsidence offshore; rapid uplift on land: Consequences of extension of Gorontalo Bay and northern Sulawesi

    Hennig, J., Hall, R., Advokaat, E. & Rudyawan, A., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-304 1-16

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  374. Published

    Large-scale probabilistic predictors with and without guarantees of validity

    Vovk, V., Petej, I. & Fedorova, V., 7 Dec 2015, Advances in Neural Information Processing Systems 28: Proceedings of NIPS 2015. Curran Associates, p. 892-900 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  375. Published

    Laser induced fluorescence detection of metastable He-2 molecules in superfluid helium

    Rellergert, W. G., Lippincott, W. H., Nikkel, J. A. & McKinsey, D. N., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 382-383 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  376. Published

    Laser Sculpted Cool Proton Beams

    Gibson, S., Alden, S. & Nevay, L., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 1-4 4 p. MOPRB116

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  377. Published

    Laserwire Emittance Scanner at CERN Linac 4

    Kruchinin, K., Boorman, G., Bosco, A., Gibson, S., Karataev, P., Bravin, E., Hofmann, T., Raich, U., Roncarolo, F., Letchford, A. & Pozimski, J., Jun 2015, 6th International Particle Accelerator Conference: IPAC2015, Richmond, VA, USA. JACoW Publishing, p. 1146-1149 4 p. MOPWI003

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  378. Published

    Late Pleistocene Beetle Records from North America

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 222-236

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  379. Published

    Late Pleistocene Glacial Events in Beringia

    Elias, S. & Brigham-Grette, J., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 2. p. 1057-1066

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  380. Published

    Late Pleistocene Megafaunal Extinctions.

    Elias, S. & Schreve, D., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 4. p. 3202-3217

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  381. Published

    Late Triassic – Mid-Jurassic to Neogene Extensional Fault Systems in the Exmouth Sub-Basin, Northern Carnarvon Basin, North West Shelf, Western Australia

    Jitmahantakul, S. & McClay, K., 31 Aug 2013, Proceedings Western Australian Basins Conference. 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  382. Published

    Layered Analysis of Security Ceremonies

    Bella, G. & Coles-Kemp, L., 2012, Information Security and Privacy Research: IFIP Advances in Information and Communication Technology. Boston: Springer, Vol. 376. p. 273-286 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  383. Published

    LDT: a language definition technique

    Johnstone, A., Scott, E. & van den Brand, M., 26 Mar 2011, LDTA '11 Proceedings of the Eleventh Workshop on Language Descriptions, Tools and Applications. ACM, p. 1-8 8 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  384. Published

    Le comte de Clermont et les intermèdes italiens vers 1752

    Charlton, D., 2005, Les Théâtres de société au XVIIIe siècle. Plagnol-Diéval, M-E. & Quéro, D. (eds.). Brussels: Éditions de l'Université de Bruxelles, p. 63-74 12 p. (Études sur le 18e siècle; vol. 33).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  385. Forthcoming

    Le corps en jeu: Debussy et l’art de toucher

    Johnson, J., 2018, (Accepted/In press) Le corps dans l'écriture musicale. Delaplace, J. & Olive, J. P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  386. Published

    Le Matériel musical de l'opéra-comique

    Charlton, D., 2010, L'Invention des genres lyriques français et leur redécouverte au XIXe siècle. Terrier, A. & Dratwicki, A. (eds.). Lyon: Symétrie, p. 239-56 17 p. (Perpetuum mobile).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  387. Published

    Leadership Behavior Adjustment and Leader Effectiveness

    Tsai, C-J. & Qiao, K., 2017, European Academy of Management Annual Conference (EURAM), Glasgow, Scotland, UK, 21-24 June..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  388. Published

    Leading strategies in competitive on-line prediction

    Vovk, V., 2006, Proceedings of the Seventeenth International Conference on Algorithmic Learning Theory. Balcazar, J., Long, P. M. & Stephan, F. (eds.). p. 214-228 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  389. Published

    Leading Structurally Dynamic Virtual Project Teams

    Chamakiotis, P. & Panteli, N., 2016, Proceedings of the 37th International Conference on Information Systems (ICIS): Digital Innovation at the Crossroads: Track 20: Social Media and Digital Collaboration. December 11-14, Dublin, Ireland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  390. Published

    Lean e-integration for development: The case of the National Licensing Center in Albania

    Kromidha, E., 2013, Proceedings of the ICTD 2013 Conference, 7-10 December 2013. Cape Town, South Africa

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  391. Published

    Learning an optimal decision strategy in an in uence diagram with latent variables

    Vovk, V., 1996, Proceedings of the Ninth Annual Conference on Computational Learning Theory. New York: ACM Press, p. 110-121 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  392. Published

    Learning by Conformal Predictors with Additional Information

    Yang, M., Nouretdinov, I. & Luo, Z., Oct 2013, The 9th Artificial Intelligence Applications and Innovations Conference (AIAI): 2nd Workshop on Conformal Prediction and its Applications. p. 394-400 7 p. (IFIP Advances in Information and Communication Technology; vol. 412).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  393. Published

    Learning by transduction

    Gammerman, A., Vapnik, V. & Vovk, V., 1998, Proceedings of the Fourteenth Conference on Uncertainty in Articial Intelligence. San Francisco, CA: Morgan Kaufmann, p. 148-156 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  394. Published

    Learning Context Free Grammars with the Syntactic Concept Lattice

    Clark, A., 1 Sep 2010, Grammatical Inference: Theoretical Results and Applications. Sempere, J. & Garcia, P. (eds.). Springer-Verlag, Vol. 6339. p. 38-51 (Lecture Notes in Computer Science; vol. 6339).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  395. Published

    Learning Eigenvectors for Free

    Koolen, W. M., Kotlowski, W. & Warmuth, M. K., 1 Dec 2011, Proceedings of the 25th Annual Conference on Neural Information Processing Systems (NIPS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  396. Forthcoming

    Learning interpretable disease self-representations for drug repositioning

    Galeano Galeano, D., Frasca, F., Gonzalez, G., Lapanogov, I., Veselkov, K., Paccanaro, A. & Bronstein, M. M., 2019, (Accepted/In press) Conference on Neural Information Processing Systems (NeurIPS) 2019: Graph representation Learning Workshop .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  397. Published

    Learning mechanisms for achieving context awareness and intelligence in Cognitive Radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, IEEE 36th Conference on Local Computer Networks, LCN 2011, Bonn, Germany, October 4-7, 2011. p. 738-745 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  398. Published

    Learning Morphology with Pair Hidden Markov Models

    Clark, A., 1 Jul 2001, Proceedings of the Association for Computational Linguistics: Student Session. p. 55-60

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  399. Published

    Learning nominal automata

    Moerman, J., Sammartino, M., Silva, A., Klin, B. & Szynwe, M., Jan 2017, POPL 2017 - Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. Gordon, A. D. & Castagna, G. (eds.). Association for Computing Machinery (ACM), p. 613-625 13 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  400. Published

    Learning the Past

    Charlton, D., 2003, Berlioz, Past, Present, Future: Bicentenary Essays. Bloom, P. (ed.). Rochester, NY: University of Rochester Press, p. 34-56 23 p. (Eastman Studies in Music).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  401. Published

    Les instruments à vent: Les sons et les gestes

    Charlton, D., 1991, Le Tambour et la harpe: Oeuvres, pratiques et manifestations musicales sous la Révolution, 1788-1800. Julien, J-R. & Mongrédien, J. (eds.). Paris: Éditions Du May, p. 209-20 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  402. Published

    Les Prolongements romanesques de la matière épique

    Everson, J., 2008, Acts of the XVIIth conference of the international Société Rencesvals, University of Connecticut, July 2006: Olifant special issue. Vol. 2 vols.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  403. Published

    Less harm, less worry or how to improve network security by bounding system offensiveness

    Bruschi, D., Cavallaro, L. & Rosti, E., 2000, 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  404. Published

    Let’s Get Mobile: Secure FOTA for Automotive System

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 6 Nov 2015, Network and System Security. Springer, Vol. 9408. p. 503-510 8 p. (Lecture Notes in Computer Science; vol. 9408).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  405. Unpublished

    Let’s talk about our ways of seeing the world. Exploring more explicit ways to study media representations in Critical Geopolitics

    Van Efferink, L., 2013, (Unpublished) Warwick Graduate Conference in Political Geography,Department of Politics and International Studies (PAIS),University of Warwick.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  406. Published

    Letting Go: Working with the Rhythm of Participants

    Coles-Kemp, L., Angus, A. & Stang, F., 2013, CHI '13 Extended Abstracts on Human Factors in Computing Systems. 2013: ACM, p. 373-378 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  407. Published

    Leveraging probabilistic reasoning in deterministic planning for large-scale autonomous Search-and-Tracking

    Bernardini, S., Fox, M., Long, D. & Piacentini, C., 12 Jun 2016, Proceedings of the Twenty Sixth International Conference on Automated Planning and Scheduling (ICAPS- 16) . p. 47-55 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  408. Published

    LHC Collimation and Energy Deposition Studies Using Beam Delivery Simulation (BDSIM)

    Nevay, L., Boogert, S., Garcia Morales, H., Gibson, S., Kwee-Hinzmann, R., Bruce, R. & Redaelli, S., Jun 2016, 7th International Particle Accelerator Conference: May 8-13, 2016, Busan, Korea. JACoW Publishing, p. 1-3 3 p. WEPOY047

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  409. Published

    LibSEAL: revealing service integrity violations using trusted execution

    Aublin, P-L., Kelbert, F., O'Keeffe, D., Muthukumaran, D., Priebe, C., Lind, J., Krahn, R., Fetzer, C., Eyers, D. M. & Pietzuch, P. R., 23 Apr 2018, Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, April 23-26, 2018. p. 1-15 15 p. 24

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  410. Published

    Lightweight Classification of IoT Malware Based on Image Recognition

    Su, J., Vasconcellos Vargas, D., Prasad, S., Sgandurra, D., Feng, Y. & Sakurai, K., 2018, 8th IEEE International Workshop on Network Technologies for Security, Administration, and Protection (NETSAP 2018). IEEE Xplore, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  411. Published

    Limitations of IEC62351-3's public key management

    Wright, J. & Wolthusen, S., 19 Dec 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  412. Published

    Limits to anonymity when using credentials

    Pashalidis, A. & Mitchell, C. J., 2006, Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004, Revised Selected Papers. Springer-Verlag, Vol. 3957. p. 4-12 9 p. (Lecture Notes in Computer Science; vol. 3957).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  413. Published

    Linear Depth Integer-Wise Homomorphic Division

    Okada, H., Cid, C., Hidano, S. & Kiyomoto, S., 2019, Information Security Theory and Practice. WISTP 2018. Springer, p. 91-106 16 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  414. Published

    Linear Probability Forecasting

    Zhdanov, F. & Kalnishkan, Y., 2010, Artificial Intelligence Applications and Innovations, AIAI 2010, Proceedings: vol 339 of IFIP Advances in Information and Communication Technology. Springer, p. 4-11 (IFIP Advances in Information and Communication Technology; vol. 339).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  415. Published

    Linear Relations between Square-Loss and Kolmogorov Complexity

    Kalnishkan, Y., 1999, of the Twelfth Annual Conference on Computation Learning Theory. ACM, p. 226-232

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. Published

    Linearly Ordered Attribute Grammar Scheduling Using SAT-Solving

    van Binsbergen, L. T., 1 Jan 2015, Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin / Heidelberg, p. 289-303 15 p. (Lecture Notes in Computer Science; vol. 9035).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  417. Published

    Linguistic categories in mathematical vernacular and their type-theoretic semantics (extended abstract)

    Luo, Z. & Callaghan, P., 1997, Logical Aspects of Computational Linguistics 97 (LACL'97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  418. Forthcoming

    Linguistic tremours: Language diversity as a fault line in intercultural virtual teams

    Drabble, D., 2016, (Accepted/In press) THE 10th MEDITERRANEAN CONFERENCE ON INFORMATION SYSTEMS, MCIS 2016, PAPHOS, CYPRUS, SEPTEMBER 4-6, 2016. UNIVERSITY OF NICOSIA, P.O.Box 24005, 1700 ΛΕΥΚΩΣΙΑ, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  419. Published

    L'insegnamento della letteratura italiana come scuola di educazione civica

    Jossa, S., 2013, Fare il cittadino: La formazione di un nuovo soggetto sociale nell’Europa tra XIX e XXI secolo. Botteri, I., Riva, E. & Scotto di Luzio, A. (eds.). Rubbettino, p. 131-146 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  420. Published

    Liquid xenon for gamma-ray imaging of special nuclear materials

    Larsen, N. A. N. A., Bernard, E. P. E. P., Cahn, S. B. S. B., Edwards, B. W. H. B. W. H., Linck, E. E., Lyashenko, A. V. A. V., McKinsey, D. N. D. N., Nikkel, J. A. J. A., Rhyne, C. A. C. A., Shin, Y. Y., Tennyson, B. P. B. P., Wahl, C. G. C. G., Destefano, N. E. N. E., Gai, M. M. & De Silva, M. S. M. S., 1 Dec 2012, 2012 IEEE International Conference on Technologies for Homeland Security, HST 2012. p. 378-383 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  421. Published

    LISABETH: Automated Content-based Signatures Generator for Zero-day Polymorphic Worms

    Cavallaro, L., Lanzi, A., Mayer, L. & Monga, M., 2008, International Workshop on Software Engineering for Secure Systems (SESS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  422. Published

    Live and Trustworthy Forensic Analysis of Commodity Production Systems

    Martignoni, L., Fattori, A., Paleari, R. & Cavallaro, L., 15 Sep 2010, Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010: Proceedings. Springer, p. 297-316 (Lecture Notes in Computer Science; vol. 6307).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  423. Published

    Location Based Application Availability

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2009, On the Move to Meaningful Internet Systems: OTM 2009 Workshops. Meersman, R., Herrero, P. & Dillon, T. (eds.). Vilamoura, Portugal: Springer, Vol. 5872/2009. p. 128 - 138 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. Published

    Location Tracking Using Smartphone Accelerometer and Magnetometer Traces

    Nguyen, D. K. A., Akram, R. N., Markantonakis, K., Luo, Z. & Watkins, C., 26 Aug 2019, The First Location Privacy Workshop (LPW 2019), the 14th International Conference on Availability, Reliability and Security (ARES 2019). Association for Computing Machinery (ACM), p. 1-9 9 p. 96

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  425. Published

    Log Your Car: The Non-invasive Vehicle Forensics

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 974-982 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  426. Published

    Log Your Car: Reliable Maintenance Services Record

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 2017, Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Springer, Vol. 10143. p. 484-504 21 p. (Lecture Notes in Computer Science ; vol. 10143).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  427. Published

    Logical Lego? Co-constructed perspectives on service design

    Heath, C., Coles-Kemp, L. & Hall, P., 2014, Proceedings of NordDesign 2014. Aalto Design Factory, p. 416 425 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  428. E-pub ahead of print

    Logical Support for Bike-Sharing System Design

    Tutu, I., Chirita, C-E., Lopes, A. & Fiadeiro, J. L., 9 Oct 2019, From Software Engineering to Formal Methods and Tools, and Back. ter Beek, M. H., Fantechi, A. & Semini, L. (eds.). Springer, p. 152-171 20 p. (Lecture Notes In Computer Science; vol. 11865).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  429. Published

    Logical truths in constructive type theory (abstract)

    Luo, Z., 1996, Logic Colloquium 96.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  430. E-pub ahead of print

    Logics for Actor Networks: A Case Study in Constrained Hybridization

    Lopes Fiadeiro, J., Tutu, I., Lopes, A. & Pavlovic, D., 3 Jan 2018, Dynamic Logic. New Trends and Applications: First International Workshop, DALI 2017, Brasilia, Brazil, September 23-24, 2017, Proceedings. Springer, p. 98-114 17 p. (Lecture Notes in Computer Science; vol. 10669).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  431. Published

    Longer Keys May Facilitate Side Channel Attacks

    Walter, C. D., 2003, Selected Areas in Cryptography. Matsui, M. & Zuccherato, R. J. (eds.). Springer, Vol. 3006. p. 42-57 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  432. Published

    Longer Randomly Blinded RSA Keys may be Weaker than Shorter Ones

    Walter, C. D., 2008, WISA 2007. Kim, S., Yung, M. & Lee, H-W. (eds.). Springer, Vol. 4867. p. 303-316 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  433. Forthcoming

    Longing to Belong: Nationalism and Sentimentalism in the Second Violin Concertos of Bartók and Szymanowski

    Downes, S., 1 Mar 2020, (Accepted/In press) Polski Rocznik Muzykologiczny. Lindstedt, I. (ed.). Musicologists Section of the Polish Composers' Union/ PWM Edition

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  434. Published

    Longitudinal Beam Profile Measurements at CTF3 Using Coherent Diffraction Radiation

    Micheler, M., Blair, G., Boorman, G., Karataev, P., Corsini, R. & Lefevre, T., 2009, Proceedings of PAC09, Vancouver, BC, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  435. Published

    LONGITUDINAL BEAM PROFILE MEASUREMENTS OF THE MICROBUNCHING INSTABILITY

    Shields, W., Karataev, P., Finn, A., Bartolini, R., Martin, I. P. S. & Rehm, G., Jul 2014, IPAC 2014 - The Fifth International Particle Accelerator Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  436. Published

    Longitudinal beam profile monitor at CTF3 based on Coherent Diffraction Radiation

    Micheler, M., Ainsworth, R., Blair, G., Boorman, G., Corsini, R., Lefevre, T. & Lekomtsev, K., 2010, Journal of Physics: Conference Series.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  437. Published

    Longitudinal beam profile monitor at CTF3 based on Coherent Diffraction Radiation

    Micheler, M., Ainsworth, R., Blair, G. A., Boorman, G., Corsini, R., Karataev, P., Lefevre, T. & Lekomtsev, K., 2010, VIII INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2009). Strikhanov, MN. & Pivovarov, YL. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  438. Published

    L'Orchestre et la métaphore du vivant de Mozart

    Charlton, D., 1997, Mozart: Les chemins de l'Europe. Massin, B. (ed.). Strasbourg: Editions du Conseil de l'Europe, p. 105-112 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  439. Published

    Loss functions, complexities, and the Legendre transformation

    Kalnishkan, Y., Vovk, V. & Vyugin, M. V., 2001, Proceedings of the Twelfth International Conference on Algorithmic Learning Theory. Abe, N., Khardon, R. & Zeugmann, T. (eds.). London: Springer, p. 181-189 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  440. Published

    L'Oubli comme mémoire: A propos de l'amitié politique

    O'Brien, J., 2012, Amitié et compagnie. Autour du 'Discours de la Servitude Volontaire' de La Boétie. Paris: Garnier, p. 95-111 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  441. Published

    LP-branching algorithms based on biased graphs

    Wahlström, M., 2017, Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, Vol. PRDA17. p. 1559-1570 12 p. (Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  442. Published

    Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS

    Albrecht, M. & Paterson, K., 28 Apr 2016, Advances in Cryptology – EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Vol. 9665. p. 622-643 22 p. (Lecture Notes in Computer Science; vol. 9665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  443. Published

    Lucky Thirteen: Breaking the TLS and DTLS Record Protocols

    Al Fardan, N. J. & Paterson, K. G., 2013, 2013 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, p. 526-540 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  444. Published

    Machine-learning applications of algorithmic randomness

    Vovk, V., Gammerman, A. & Saunders, C., 1999, Proceedings of the Sixteenth International Conference on Machine Learning. San Francisco, CA: Morgan Kaufmann, p. 444-453 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  445. Published

    Magnet: Practical Subscription Clustering for Internet-Scale Publish/Subscribe

    Girdzijauskas, S., Chockler, G., Vigfusson, Y., Melamed, R. & Tock, Y., Jul 2010, Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems (DEBS '10). Cambridge, UK: ACM, p. 172-183 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  446. Published

    MAGNETIC RESONANCE MULTI-SEQUENCE THROMBUS IMAGING (MSTI) PREDICTS THROMBUS LYSABILITY IN PATIENTS WITH ACUTE ILIOFEMORAL DEEP VEIN THROMBOSIS (DVT)

    Silickas, J., Phinikaridou, A., Black, S. A., Koloydenko, A., Lavin Plaza, B., Lyons, O., Gwozdz, A., Andia, M., Patel, A., Modarai, B., Botnar, R., Smith, A. & Saha, P., Apr 2019, Joint Meeting of the Royal-Society-of-Medicine / Annual Meeting of the Society-of-Academic-and-Research-Surgery. Wiley, Vol. 106 (S3). p. 9-9 1 p. O13. (British Journal of Surgery).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  447. Published

    Maintaining Concurrency Information for On-the-fly Data Race Detection

    Audenaert, K., D'Hollander, E. (ed.), Joubert, F. J. (ed.) & Trottenberg, F. (ed.), 1998, Parallel Computing: Fundamentals, Applications and New Directions. Bonn, p. 319-326 (Advances in Parallel Computing; vol. 12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  448. Published

    Making an entrance 2.0: The linguistics of introductory success in virtual communities

    Dove, J. A., Eubanks, D. L., Panteli, N., Watts, L. A. & Joinson, A. N., 2011, Proceedings of the Annual Hawaii International Conference on System Sciences. 5718716

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  449. Published

    Making Automated Testing of Cloud Applications an Integral Component of PaaS

    Bucur, S., Kinder, J. & Candea, G., Jul 2013, Proc. 4th Asia-Pacific Workshop on Systems (APSYS 2013). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  450. Published

    Making Home Away from Home: Social Relations and Food Consumption amongst Chinese Students in the UK

    Cappellini, B. & Yen, D. A., 2011, The New World: Macromarketing Yesterday, Today and Tomorrow. Proceedings of the 36thAnnual Macromarketing Conference. p. 227-239

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  451. Published

    Malicious False Data Injection in Hierarchical Electric Power Grid State Estimation Systems

    Feng, Y., Foglietta, C., Baiocco, A., Panzieri, S. & Wolthusen, S. D., 2013, Proceedings of the fourth international conference on Future energy systems (ACM e-Energy 2013). ACM Press, p. 183-192

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  452. Published

    Malicious MPLS Policy Engine Reconnaissance

    Almutairi, A. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014)}. Springer-Verlag, Vol. 8735. p. 3 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  453. In preparation

    MANAGEMENT CONTROL SYSTEMS AND RESEARCH MANAGEMENT IN UNIVERSITIES: an empirical and conceptual exploration.

    Agyemang, G. & Broadbent, J., 9 Jul 2013, (In preparation) MANAGEMENT CONTROL SYSTEMS AND RESEARCH MANAGEMENT IN UNIVERSITIES: an empirical and conceptual exploration.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  454. Published

    Management Control through Joint Activity: the role of managerial co-gravity

    Subramaniam, N., 2013, 9th International Management Control Research Conference, 4-6th September, 2013, Utrecht, Netherlands..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  455. Published

    Management of secure systems and security within Open Systems Interconnection (OSI)

    Mitchell, C. J., 1990, Proceedings of Information Security: Confidentiality, Integrity and Availability, London, July 1990. Uxbridge: UNICOM Seminars

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  456. Published

    Management system requirements for wireless systems beyond 3G

    Lazaro, O., Irvine, J., Girma, D., Dunlop, J., Liotta, A., Borselius, N. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 240-244 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  457. Unpublished

    Managerial perspectives on employee engagement

    Romanou, N., Soane, E., Truss, K., Alfes, K., Rees, C., Gatenby, M., Degleris, N., Mantelou, E., Solias, A. & Karamberi, M., Nov 2009, (Unpublished) 1st International Congress on Neurobiology and Clinical Psychopharmacology. Thessaloniki

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  458. Unpublished

    Managing a positive environment: engagement, wellbeing, performance and the role of meaningfulness

    Soane, E., Alfes, K., Gatenby, M., Rees, C. & Truss, K., Aug 2010, (Unpublished) Academy of Management (AoM) Annual Meeting. Montreal.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  459. Published

    Managing Evolution in Telecommunication Systems

    Koutsoukos, G., Gouveia, J., Andrade, L. F. & Fiadeiro, J. L., 2001, DAIS. Kluwer, Vol. 198. p. 133-140 8 p. (IFIP Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  460. Published

    Managing formality, size of firm and employee evaluation of work

    Storey, D., Saridakis, G., Sen Gupta, S., Edwards, P. & Blackburn, R., 2008, European Academy of Management (EURAM), Ljubljana, Slovenia.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  461. Published

    Managing Innovation in Perceived Low-Tech Industries: A Review of the Technology Management Practices of the Fish Processing Industry of Newfoundland and Labrador

    Coronado Mondragon, C. E. & Coronado Mondragon, A. E., 16 Jul 2012, Driving the Economy through Innovation and Entrepreneurship: Emerging Agenda for Technology Management. Balanchandra, P. (ed.). Bangalore: Springer, Vol. 1. p. 101-109 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  462. Published

    Manifest fields and module mechanisms in intensional type theory

    Luo, Z., 2009, Types for Proofs and Programs, Proc. of Inter. Conf. of TYPES'08. LNCS 5497. p. 237-255 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  463. E-pub ahead of print

    Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange

    Dowling, B., Hansen, T. B. & Paterson, K. G., 10 Apr 2020, Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Proceedings. Ding, J. & Tillich, J-P. (eds.). Springer, p. 483-502 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12100 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  464. Forthcoming

    Many visits TSP revisited

    Kowalik, L., Li, S., Nadara, W., Smulewicz, M. & Wahlström, M., 18 Jun 2020, (Accepted/In press) ESA 2020. p. 1-12 23 p. 51

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  465. Published

    Many-Valued Institutions for Constraint Specification

    Chirita, C-E., Luiz Fiadeiro, J. & Orejas, F., 2016, Fundamental Approaches to Software Engineering. Stevens, P. & Wasowski, A. (eds.). Berlin: Springer, Vol. 9633. p. 359-376 18 p. (Lecture Notes in Computer Science; vol. 9633).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  466. Published

    Market orientation as a mediating factor of the knowledge management and performance relationship

    Wang, C. L. & Ahmed, P. K., 2004, British Academy of Management Annual Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  467. Published

    Marketing thought and counterinsurgency: tracing the history of an overlooked relationship

    Chong, D., 2016, 41st Annual Macromarketing Conference (Dublin: Trinity College Dublin) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  468. Published

    Marking the 'Unmarked' Space: Gendered Vocal Construction in Female Electronic Artists

    McCarthy, R., Dec 2014, Proceedings of the 9th Conference on Interdisciplinary Musicology. Berlin, p. 33-38 6

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  469. Published

    Masterclass: Multisystemic Therapy as an intervention for complex needs

    Fox, S., 2014, European Forensic Child and Adolescent Psychiatrists, Psychologists and other disciplines: Royal College of Psychiatrists.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  470. Published

    Mathematical vernacular and conceptual well-formedness in mathematical language

    Luo, Z. & Callaghan, P., 1999, Proceedings of the 2nd Inter. Conf. on Logical Aspects of Computational Linguistics (LACL'97). LNAI 1582.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  471. Published

    Mathematical vernacular in type theory based proof assistants

    Callaghan, P. & Luo, Z., 1998, User Interfaces for Theorem Provers (UITP'98).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  472. Published

    Measurement of the nu(mu)-CCQE cross section in the SciBooNE experiment

    Alcaraz-Aunion, J. L. & Walding, J., 2009, SIXTH INTERNATIONAL WORKSHOP ON NEUTRINO-NUCLEUS INTERACTIONS IN THE FEW-GEV REGION. Sanchez, F., Sorel, M., AlvarezRuso, L., Cervera, A. & VicenteVacas, M. (eds.). MELVILLE: AMER INST PHYSICS, p. 145-150 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  473. Published

    Measurement re-ordering attacks on power system state estimation

    Gul, A. & Wolthusen, S., 18 Jan 2018, Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe 2017). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  474. Published

    Measurement Study on Malicious Web Servers in the .nz Domain

    Seifert, C., Delwadia, V., Komisarczuk, P., Stirling, D. & Welch, I., 2009, Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. p. 8-25 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  475. Published

    Measuring 3-D Secure and 3D SET against e-commerce end-user requirements

    Jarupunphol, P. & Mitchell, C. J., 2003, Proceedings of the 8th Collaborative electronic commerce technology and research conference (CollECTeR (Europe) 2003), National University of Ireland, Galway, June 2003. p. 51-64 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  476. Published

    Measuring Attitude towards Risk Treatment Actions amongst Information Security Professionals: an Experimental Approach

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 13 Jun 2016, Workshop on the Economics of Information Security. 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  477. Published

    Measuring attitudes towards mobile information services: an empirical validation of the HED/UT scale

    van der Heijden, H. & Sangstad Sørensen, L., 2003, Proceedings of the European Conference on Information Systems (ECIS). Naples, Italy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  478. Published

    Measuring SSL and SET against e-commerce consumer requirements

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - International Network Conference 2002 (INC 2002), University of Plymouth, UK, July 2002. p. 323-330 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  479. Published

    Measuring the Beam Profile by Counting Ionization Electrons

    Sandberg, H., Bertsche, W., Bodart, D., Dehning, B., Gibson, S., Levasseur, S., Satou, K., Schneider, G., Storey, J. & Veness, R., 12 Sep 2019, 8th International Beam Instrumentation Conference 2019. Malmö, Sweden: JACoW Publishing, TUBO04

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  480. Published

    Measuring the Effectiveness of Twitter's URL Shortener (t.co) at Protecting Users from Phishing and Malware Attacks

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 2. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  481. Published

    Measuring Tourists’ Emotional Experiences: Extension and Further Validation of the Destination Emotion Scale

    Hosany, S., Prayag, G., Deesilatham, S. & Odeh, K., 2013, 44th TTRA Annual International Conference, Kansas City, Missouri, USA, June 20-22.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  482. Published

    Mechanical characterisation of ancient Egyptian mortars

    Sanchez-Moral, S., Martinez-Martinez, J., Benavente, D., Cuezva, S. & Fernandez-Cortes, A., 2011, MATERIALS STRUCTURE MICROMECHANICS OF FRACTURE. Sandera, P. (ed.). LAUBLSRUTISTR 24, CH-8717 STAFA-ZURICH, SWITZERLAND: TRANS TECH PUBLICATIONS LTD, Vol. 465. p. 487-490 4 p. (Key Engineering Materials).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  483. Published

    Median based method for baseline wander removal in photoplethysmogram signals

    Awodeyi, A. E., Alty, S. R. & Ghavami, M., 5 Feb 2014, Proceedings - IEEE 14th International Conference on Bioinformatics and Bioengineering, BIBE 2014. Institute of Electrical and Electronics Engineers Inc., p. 311-314 4 p. 7033598

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  484. Published

    Members’ Commitment in online health communities: THE CASE OF MEDICINEAFRICA: Research in Progress

    Panteli, A. & Chamakiotis, P., 2018, Members’ Commitment in online health communities: THE CASE OF MEDICINEAFRICA, .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  485. Published

    Memory Access Pattern Protection for Resource-Constrained Devices

    Nakano, Y., Cid, C., Kiyomoto, S. & Miyake, Y., 2013, Proceedings of CARDIS 2012. Springer, Vol. 7771. p. 188-202 15 p. (Lecture Notes in Computer Science; no. 7771).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  486. Published

    Memory Errors: the Past, the Present, and the Future

    van der Veen, V., dutt-Sharma, N., Bos, H. J. & Cavallaro, L., 12 Sep 2012, 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  487. Published

    Memory-Based Learning of Morphology with Stochastic Transducers

    Clark, A., 2002, Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL). p. 513--520

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  488. Published

    MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

    Ankele, R., Böhl, F. & Friedberger, S., 2018, ACNS 2018 Applied Cryptography & Network security. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 381-399 19 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  489. Published

    Metabolic engineering of the mevalonate and non-mevalonate pathways in tomato

    Enfissi, EM., Fraser, PD., Lois, LM., Boronat, A., Schuch, W. & Bramley, PM., 2003, ADVANCED RESEARCH ON PLANT LIPIDS. Murata, N., Yamada, M., Nishida, Okuyama, H., Sekiya, J. & Hajime, W. (eds.). DORDRECHT: Springer, p. 237-240 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  490. Published

    Meta-Search Through the Space of Representations and Heuristics on a Problem by Problem Basis

    Fuentetaja, R., Barley, M., Borrajo, D., Douglas, J., Franco, S. & Riddle, P., 26 Apr 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI Press, p. 6169-6176 8 p. (32nd AAAI Conference on Artificial Intelligence, AAAI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  491. Published

    Microbunch Instability Observations from a THz Detector at Diamond Light Source

    Shields, W., Bartolini, R., Boorman, G., Karataev, P., Lyapin, A., Puntree, J. & Rehm, G., 2012, IX INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2011). Potylitsyn, A. & Karataev, P. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  492. Published

    Micron-scale Laser-wire at the ATF-II at KEK Commissioning and Results

    Nevay, L. J., Corner, L., Walczak, R., Blair, G., Boogert, S., Deacon, L. & Karataev, P., 1 Dec 2011, IPAC 2011 - 2nd International Particle Accelerator Conference. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  493. Published

    Migration of He-3 impurities along dislocation lines in He-4 single crystals

    Rojas, X., Haziot, A. & Balibar, S., 2012, 26TH INTERNATIONAL CONFERENCE ON LOW TEMPERATURE PHYSICS (LT26), PTS 1-5. IOP PUBLISHING LTD, 4 p. (Journal of Physics Conference Series; vol. 400).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  494. Published

    Millennial and century climate changes in the Colorado Alpine

    Elias, S., 2003, Climate Variability and Ecosystem Response. Greenland, D. (ed.). London: Oxford University Press, p. 370-383

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  495. E-pub ahead of print

    MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

    Albrecht, M., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T., 9 Nov 2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer, Vol. 10031. p. 191-219 29 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  496. E-pub ahead of print

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Ankele, R. & Kölbl, S., 13 Jan 2019, Selected Areas in Cryptography 2018. Lecture Notes in Computer Science ed. Calgary, Canada: Springer, Vol. 11349. p. 163-190 28 p. (Lecture Notes in Computer Science; vol. 11349).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  497. Published

    Minimal weight k-SR representations

    Han, Y., Gollmann, D. & Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 34-43 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  498. Published

    Minimizing the Log Size for Execution Replay of Shared-Memory Programs

    Levrouw, L. J. & Audenaert, K., 1994, Parallel Processing, Proceedings of Conpar 94–VAPP VI. Springer, p. 76-87 (Lecture Notes in Computer Science; vol. 854).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  499. Published

    Minimum description length estimators under the optimal coding scheme

    Vovk, V., 1995, Proceedings of the Second European Conference on Computational Learning Theory. Vitanyi, P. (ed.). Berlin: Springer, p. 237-251 (Lecture Notes in Computer Science; vol. 904).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  500. Published

    Mining the biomedical literature to predict shared drug targets in DrugBank

    Caniza Vierci, H., Galeano Galeano, D. & Paccanaro, A., 2017, XLIII Conferencia Latinoamericana en Informática CLEI 2017. IEEE Xplore, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  501. Published

    Mining the recent history of Macromarketing thought: A visualization of ideas

    Reppel, A. & Kravets, O., 7 Jul 2016, Proceedings of the 41st Annual Macromarketing Conference. Dublin, Ireland, p. 465-468

    Research output: Chapter in Book/Report/Conference proceedingConference contribution