Home > Publications

Publications

4001 - 4500 out of 41,105Page size: 500
  1. Conference contribution › Research
  2. Published

    MAGNETIC RESONANCE MULTI-SEQUENCE THROMBUS IMAGING (MSTI) PREDICTS THROMBUS LYSABILITY IN PATIENTS WITH ACUTE ILIOFEMORAL DEEP VEIN THROMBOSIS (DVT)

    Silickas, J., Phinikaridou, A., Black, S. A., Koloydenko, A., Lavin Plaza, B., Lyons, O., Gwozdz, A., Andia, M., Patel, A., Modarai, B., Botnar, R., Smith, A. & Saha, P., Apr 2019, Joint Meeting of the Royal-Society-of-Medicine / Annual Meeting of the Society-of-Academic-and-Research-Surgery. Wiley, Vol. 106 (S3). p. 9-9 1 p. O13. (British Journal of Surgery).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Magnetite Plaquettes Provide an Extraterrestrial Source of Asymmetric Components

    Chan, QHS., Zolensky, ME. & Martinez, JE., 2015, Astrobiology Science Conference 2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Maintaining Concurrency Information for On-the-fly Data Race Detection

    Audenaert, K., D'Hollander, E. (ed.), Joubert, F. J. (ed.) & Trottenberg, F. (ed.), 1998, Parallel Computing: Fundamentals, Applications and New Directions. Bonn, p. 319-326 (Advances in Parallel Computing; vol. 12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Making an entrance 2.0: The linguistics of introductory success in virtual communities

    Dove, J. A., Eubanks, D. L., Panteli, N., Watts, L. A. & Joinson, A. N., 2011, Proceedings of the Annual Hawaii International Conference on System Sciences. 5718716

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Making Automated Testing of Cloud Applications an Integral Component of PaaS

    Bucur, S., Kinder, J. & Candea, G., Jul 2013, Proc. 4th Asia-Pacific Workshop on Systems (APSYS 2013). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Making Home Away from Home: Social Relations and Food Consumption amongst Chinese Students in the UK

    Cappellini, B. & Yen, D. A., 2011, The New World: Macromarketing Yesterday, Today and Tomorrow. Proceedings of the 36thAnnual Macromarketing Conference. p. 227-239

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Malicious False Data Injection in Hierarchical Electric Power Grid State Estimation Systems

    Feng, Y., Foglietta, C., Baiocco, A., Panzieri, S. & Wolthusen, S. D., 2013, Proceedings of the fourth international conference on Future energy systems (ACM e-Energy 2013). ACM Press, p. 183-192

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Malicious MPLS Policy Engine Reconnaissance

    Almutairi, A. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014)}. Springer-Verlag, Vol. 8735. p. 3 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. In preparation

    MANAGEMENT CONTROL SYSTEMS AND RESEARCH MANAGEMENT IN UNIVERSITIES: an empirical and conceptual exploration.

    Agyemang, G. & Broadbent, J., 9 Jul 2013, (In preparation) MANAGEMENT CONTROL SYSTEMS AND RESEARCH MANAGEMENT IN UNIVERSITIES: an empirical and conceptual exploration.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Management Control through Joint Activity: the role of managerial co-gravity

    Subramaniam, N., 2013, 9th International Management Control Research Conference, 4-6th September, 2013, Utrecht, Netherlands..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Management of secure systems and security within Open Systems Interconnection (OSI)

    Mitchell, C. J., 1990, Proceedings of Information Security: Confidentiality, Integrity and Availability, London, July 1990. Uxbridge: UNICOM Seminars

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Management system requirements for wireless systems beyond 3G

    Lazaro, O., Irvine, J., Girma, D., Dunlop, J., Liotta, A., Borselius, N. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 240-244 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Unpublished

    Managerial perspectives on employee engagement

    Romanou, N., Soane, E., Truss, K., Alfes, K., Rees, C., Gatenby, M., Degleris, N., Mantelou, E., Solias, A. & Karamberi, M., Nov 2009, (Unpublished) 1st International Congress on Neurobiology and Clinical Psychopharmacology. Thessaloniki

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Unpublished

    Managing a positive environment: engagement, wellbeing, performance and the role of meaningfulness

    Soane, E., Alfes, K., Gatenby, M., Rees, C. & Truss, K., Aug 2010, (Unpublished) Academy of Management (AoM) Annual Meeting. Montreal.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Managing Evolution in Telecommunication Systems

    Koutsoukos, G., Gouveia, J., Andrade, L. F. & Fiadeiro, J. L., 2001, DAIS. Kluwer, Vol. 198. p. 133-140 8 p. (IFIP Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Managing formality, size of firm and employee evaluation of work

    Storey, D., Saridakis, G., Sen Gupta, S., Edwards, P. & Blackburn, R., 2008, European Academy of Management (EURAM), Ljubljana, Slovenia.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Managing Innovation in Perceived Low-Tech Industries: A Review of the Technology Management Practices of the Fish Processing Industry of Newfoundland and Labrador

    Coronado Mondragon, C. E. & Coronado Mondragon, A. E., 16 Jul 2012, Driving the Economy through Innovation and Entrepreneurship: Emerging Agenda for Technology Management. Balanchandra, P. (ed.). Bangalore: Springer, Vol. 1. p. 101-109 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Manifest fields and module mechanisms in intensional type theory

    Luo, Z., 2009, Types for Proofs and Programs, Proc. of Inter. Conf. of TYPES'08. LNCS 5497. p. 237-255 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. E-pub ahead of print

    Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange

    Dowling, B., Hansen, T. B. & Paterson, K. G., 10 Apr 2020, (E-pub ahead of print) Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Proceedings. Ding, J. & Tillich, J-P. (eds.). Springer, p. 483-502 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12100 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Many visits TSP revisited

    Kowalik, L., Li, S., Nadara, W., Smulewicz, M. & Wahlström, M., 26 Aug 2020, ESA 2020. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 173. p. 1-22 22 p. 66

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Many-Valued Institutions for Constraint Specification

    Chirita, C-E., Luiz Fiadeiro, J. & Orejas, F., 2016, Fundamental Approaches to Software Engineering. Stevens, P. & Wasowski, A. (eds.). Berlin: Springer, Vol. 9633. p. 359-376 18 p. (Lecture Notes in Computer Science; vol. 9633).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Market orientation as a mediating factor of the knowledge management and performance relationship

    Wang, C. L. & Ahmed, P. K., 2004, British Academy of Management Annual Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Marketing thought and counterinsurgency: tracing the history of an overlooked relationship

    Chong, D., 2016, 41st Annual Macromarketing Conference (Dublin: Trinity College Dublin) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Marking the 'Unmarked' Space: Gendered Vocal Construction in Female Electronic Artists

    McCarthy, R., Dec 2014, Proceedings of the 9th Conference on Interdisciplinary Musicology. Berlin, p. 33-38 6

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Masterclass: Multisystemic Therapy as an intervention for complex needs

    Fox, S., 2014, European Forensic Child and Adolescent Psychiatrists, Psychologists and other disciplines: Royal College of Psychiatrists.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Mathematical vernacular and conceptual well-formedness in mathematical language

    Luo, Z. & Callaghan, P., 1999, Proceedings of the 2nd Inter. Conf. on Logical Aspects of Computational Linguistics (LACL'97). LNAI 1582.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Mathematical vernacular in type theory based proof assistants

    Callaghan, P. & Luo, Z., 1998, User Interfaces for Theorem Provers (UITP'98).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Measurement of the nu(mu)-CCQE cross section in the SciBooNE experiment

    Alcaraz-Aunion, J. L. & Walding, J., 2009, SIXTH INTERNATIONAL WORKSHOP ON NEUTRINO-NUCLEUS INTERACTIONS IN THE FEW-GEV REGION. Sanchez, F., Sorel, M., AlvarezRuso, L., Cervera, A. & VicenteVacas, M. (eds.). MELVILLE: AMER INST PHYSICS, p. 145-150 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Measurement re-ordering attacks on power system state estimation

    Gul, A. & Wolthusen, S., 18 Jan 2018, Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe 2017). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Measurement Study on Malicious Web Servers in the .nz Domain

    Seifert, C., Delwadia, V., Komisarczuk, P., Stirling, D. & Welch, I., 2009, Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. p. 8-25 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Measuring 3-D Secure and 3D SET against e-commerce end-user requirements

    Jarupunphol, P. & Mitchell, C. J., 2003, Proceedings of the 8th Collaborative electronic commerce technology and research conference (CollECTeR (Europe) 2003), National University of Ireland, Galway, June 2003. p. 51-64 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Measuring Attitude towards Risk Treatment Actions amongst Information Security Professionals: an Experimental Approach

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 13 Jun 2016, Workshop on the Economics of Information Security. 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Measuring attitudes towards mobile information services: an empirical validation of the HED/UT scale

    van der Heijden, H. & Sangstad Sørensen, L., 2003, Proceedings of the European Conference on Information Systems (ECIS). Naples, Italy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Measuring SSL and SET against e-commerce consumer requirements

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - International Network Conference 2002 (INC 2002), University of Plymouth, UK, July 2002. p. 323-330 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Measuring the Beam Profile by Counting Ionization Electrons

    Sandberg, H., Bertsche, W., Bodart, D., Dehning, B., Gibson, S., Levasseur, S., Satou, K., Schneider, G., Storey, J. & Veness, R., 12 Sep 2019, 8th International Beam Instrumentation Conference 2019. Malmö, Sweden: JACoW Publishing, TUBO04

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Measuring the Effectiveness of Twitter's URL Shortener (t.co) at Protecting Users from Phishing and Malware Attacks

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 2. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Measuring Tourists’ Emotional Experiences: Extension and Further Validation of the Destination Emotion Scale

    Hosany, S., Prayag, G., Deesilatham, S. & Odeh, K., 2013, 44th TTRA Annual International Conference, Kansas City, Missouri, USA, June 20-22.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Mechanical characterisation of ancient Egyptian mortars

    Sanchez-Moral, S., Martinez-Martinez, J., Benavente, D., Cuezva, S. & Fernandez-Cortes, A., 2011, MATERIALS STRUCTURE MICROMECHANICS OF FRACTURE. Sandera, P. (ed.). LAUBLSRUTISTR 24, CH-8717 STAFA-ZURICH, SWITZERLAND: TRANS TECH PUBLICATIONS LTD, Vol. 465. p. 487-490 4 p. (Key Engineering Materials).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Median based method for baseline wander removal in photoplethysmogram signals

    Awodeyi, A. E., Alty, S. R. & Ghavami, M., 5 Feb 2014, Proceedings - IEEE 14th International Conference on Bioinformatics and Bioengineering, BIBE 2014. Institute of Electrical and Electronics Engineers Inc., p. 311-314 4 p. 7033598

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Meeting deadlines together

    Bocchi, L., Lange, J. & Yoshida, N., 26 Aug 2015, 26th International Conference on Concurrency Theory, CONCUR 2015. Aceto, L. & de Frutos Escrig, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 283-296 14 p. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 42).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Members’ Commitment in online health communities: THE CASE OF MEDICINEAFRICA: Research in Progress

    Panteli, A. & Chamakiotis, P., 2018, Members’ Commitment in online health communities: THE CASE OF MEDICINEAFRICA, .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Memory Access Pattern Protection for Resource-Constrained Devices

    Nakano, Y., Cid, C., Kiyomoto, S. & Miyake, Y., 2013, Proceedings of CARDIS 2012. Springer, Vol. 7771. p. 188-202 15 p. (Lecture Notes in Computer Science; no. 7771).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Memory Errors: the Past, the Present, and the Future

    van der Veen, V., dutt-Sharma, N., Bos, H. J. & Cavallaro, L., 12 Sep 2012, 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Memory-Based Learning of Morphology with Stochastic Transducers

    Clark, A., 2002, Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL). p. 513--520

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

    Ankele, R., Böhl, F. & Friedberger, S., 2018, ACNS 2018 Applied Cryptography & Network security. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 381-399 19 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. E-pub ahead of print

    Mesh Messaging in Large-scale Protests: Breaking Bridgefy

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., 11 May 2021, (E-pub ahead of print) CT-RSA 2021. Springer, p. 375-398 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Metabolic engineering of the mevalonate and non-mevalonate pathways in tomato

    Enfissi, EM., Fraser, PD., Lois, LM., Boronat, A., Schuch, W. & Bramley, PM., 2003, ADVANCED RESEARCH ON PLANT LIPIDS. Murata, N., Yamada, M., Nishida, Okuyama, H., Sekiya, J. & Hajime, W. (eds.). DORDRECHT: Springer, p. 237-240 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Meta-Search Through the Space of Representations and Heuristics on a Problem by Problem Basis

    Fuentetaja, R., Barley, M., Borrajo, D., Douglas, J., Franco, S. & Riddle, P., 26 Apr 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI Press, p. 6169-6176 8 p. (32nd AAAI Conference on Artificial Intelligence, AAAI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Microbunch Instability Observations from a THz Detector at Diamond Light Source

    Shields, W., Bartolini, R., Boorman, G., Karataev, P., Lyapin, A., Puntree, J. & Rehm, G., 2012, IX INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2011). Potylitsyn, A. & Karataev, P. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Micron-scale Laser-wire at the ATF-II at KEK Commissioning and Results

    Nevay, L. J., Corner, L., Walczak, R., Blair, G., Boogert, S., Deacon, L. & Karataev, P., 1 Dec 2011, IPAC 2011 - 2nd International Particle Accelerator Conference. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Migration of He-3 impurities along dislocation lines in He-4 single crystals

    Rojas, X., Haziot, A. & Balibar, S., 2012, 26TH INTERNATIONAL CONFERENCE ON LOW TEMPERATURE PHYSICS (LT26), PTS 1-5. IOP PUBLISHING LTD, 4 p. (Journal of Physics Conference Series; vol. 400).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Military student assignment using NexClass decision support system

    Rigopoulos, G., 2016, MCSI 2016 Chania, Greece.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Millennial and century climate changes in the Colorado Alpine

    Elias, S., 2003, Climate Variability and Ecosystem Response. Greenland, D. (ed.). London: Oxford University Press, p. 370-383

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. E-pub ahead of print

    MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

    Albrecht, M., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T., 9 Nov 2016, (E-pub ahead of print) Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer, Vol. 10031. p. 191-219 29 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. E-pub ahead of print

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Ankele, R. & Kölbl, S., 13 Jan 2019, (E-pub ahead of print) Selected Areas in Cryptography 2018. Lecture Notes in Computer Science ed. Calgary, Canada: Springer, Vol. 11349. p. 163-190 28 p. (Lecture Notes in Computer Science; vol. 11349).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Mineralogy of Experimentally Heated Tagish Lake

    Nakato, A., Chan, QHS., Nakamura, T., Kebukawa, Y. & Zolensky, ME., Mar 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Minimal weight k-SR representations

    Han, Y., Gollmann, D. & Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 34-43 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Minimizing the Log Size for Execution Replay of Shared-Memory Programs

    Levrouw, L. J. & Audenaert, K., 1994, Parallel Processing, Proceedings of Conpar 94–VAPP VI. Springer, p. 76-87 (Lecture Notes in Computer Science; vol. 854).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Minimum description length estimators under the optimal coding scheme

    Vovk, V., 1995, Proceedings of the Second European Conference on Computational Learning Theory. Vitanyi, P. (ed.). Berlin: Springer, p. 237-251 (Lecture Notes in Computer Science; vol. 904).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Mining the biomedical literature to predict shared drug targets in DrugBank

    Caniza Vierci, H., Galeano Galeano, D. & Paccanaro, A., 2017, XLIII Conferencia Latinoamericana en Informática CLEI 2017. IEEE Xplore, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Mining the recent history of Macromarketing thought: A visualization of ideas

    Reppel, A. & Kravets, O., 7 Jul 2016, Proceedings of the 41st Annual Macromarketing Conference. Dublin, Ireland, p. 465-468

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Unpublished

    Miracles, transformative moments and ‘A life’s work’: Exploring the intersection of individual and social identity

    Tzouramani, E., 2013, (Unpublished) 3rd Conference of Management, Spirituality and Religion, May 2013.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 53-66 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Mitigating CSRF attacks on OAuth 2.0 systems

    Li, W., Mitchell, C. J. & Chen, T. M., 1 Nov 2018, Proceedings of 2018 16th Annual Conference on Privacy, Security and Trust (PST): 28-30 Aug 2018. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Mitigation of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014). IEEE Computer Society Press, p. 478 483 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Mixability and the Existence of Weak Complexities

    Kalnishkan, Y. & Vyugin, M., 2002, Computational Learning Theory, 15th Annual Conference on Computational Learning Theory, COLT 2002, Proceedings: volume 2375 of Lecture Notes in Artificial Intelligence. Springer, p. 105-120 (Lecture Notes in Artificial Intelligence; vol. 2375).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Mixed Sneutrino Dark Matter and the Ratio Omega(b)/Omega(dm)

    West, S., 27 Oct 2006, Proceedings of SUSY06.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Mobile recommendation systems for decisions ‘on the go’

    van der Heijden, H., Kotsis, G. & Kronsteiner, R., 2005, Proceedings of the International Conference on Mobile Business (ICMB). Sydney, Australia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Mobile services for group decision support

    van Leeuwen, J. & van der Heijden, H., 2003, Proceedings of the 16th Bled Electronic Commerce conference. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Model checking for symbolic-heap separation logic with inductive predicates

    Brotherston, J., Gorogiannis, N., Kanovich, M. & Rowe, R., Jan 2016, POPL '16 Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM, p. 84-96 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Model Checking Recursive Programs with Numeric Data Types

    Hague, M. & Lin, A., 2011, CAV: Computer Aided Verification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Modelando el nicho ecológico de los bambúes leñosos (Bambuseae, Poaceae) en Bolivia: Implicaciones para la construcción de aerófonos autóctonos y la conservación de los bambúes musicales

    Hachmeyer, S., 2017, La rebelión de los objetos Cestería y Maderas: Anales de la reunión anual de etnología. La Paz: MUSEF, Vol. XXXI. p. 183-210

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Modeling And Detecting Anomalies In Scada Systems

    Svendsen, N. & Wolthusen, S. D., Mar 2008, Critical Infrastructure Protection II: Proc. Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 101-113

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model

    Nweke, L. O. & Wolthusen, S. D., 7 Aug 2020, 2020 IEEE Conference on Communications and Network Security, CNS 2020. Institute of Electrical and Electronics Engineers Inc., 6 p. 9162191. (2020 IEEE Conference on Communications and Network Security, CNS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Modelling e-business security using business processes

    Nachtigal, S. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 459-464 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Modelling GLL Parser Implementations

    Johnstone, A. & Scott, E., 2011, Software Language Engineering: Third International Conference, SLE 2010, Eindhoven, The Netherlands, October 12-13, 2010, Revised Selected Papers. Malloy, B., Staab, S. & van den Brand, M. (eds.). Springer, p. 42-61 20 p. (Lecture Notes in Computer Science; vol. 6563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Modelling Implementation of Strategy

    Aboutalebi, R. & Tan, H., 9 Sep 2014, In: BAM (British Academy of Management), 28th Annual Conference of BAM: The Role of the Business School in Supporting Economic and Social Development. 09-11 September 2014, Belfast Waterfront, Northern Ireland, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Modelling the Satellite Bridge for B-ISDN Islands

    Sun, Z., Komisarczuk, P., Coakley, F. P. & Evans, B. G., 1994, Broadband Islands '94, Connecting with the End-User, Proceedings of the 3rd Intermational Conference on Broadband Islands, Hamburg, Germany, 7-9 June, 1994. p. 211-219 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L., 30 Oct 2017, PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Moduli for Testing Implementations of the RSA Cryptosystem

    Walter, C. D., 1999, 14th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 78-85 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. E-pub ahead of print

    Monadic Decomposition in Integer Linear Arithmetic

    Hague, M., Lin, A., Ruemmer, P. & Wu, Z., 24 Jun 2020, (E-pub ahead of print) International Joint Conference on Automated Reasoning: IJCAR 2020. Springer-Verlag, p. 122-140 19 p. (Lecture Notes in Computer Science; vol. 12166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Monitoring excavation-related ground deformation in london, UK using SqueeSAR™

    Bischoff, C. A., Mason, P. J., Ghail, R. C., Giannico, C. & Ferretti, A., 9 May 2019, Tunnels and Underground Cities: Engineering and Innovation meet Archaeology, Architecture and Art- Proceedings of the WTC 2019 ITA-AITES World Tunnel Congress. Viggiani, G., Celestino, T., Peila, D. & Viggiani, G. (eds.). CRC Press / Balkema, p. 5360-5367 8 p. (Tunnels and Underground Cities: Engineering and Innovation meet Archaeology, Architecture and Art- Proceedings of the WTC 2019 ITA-AITES World Tunnel Congress).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Monotonicity and Completeness in Attribute-Based Access Control

    Crampton, J. & Morisset, C., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 33-48

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Montgomery's Multiplication Technique: How to Make It Smaller and Faster

    Walter, C. D., 1999, CHES '99. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1717. p. 80-93 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Forthcoming

    Mood and confidence in seeking social support in university students with chronic pain

    Serbic, D. & Doyle, L., 2019, (Accepted/In press) Teaching and supporting students with invisible disabilities . Psychology Teaching Review

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    More Detail for a Combined Timing and Power Attack against Implementations of RSA

    Schindler, W. & Walter, C. D., 2003, 9th IMA Int. Conf. on Cryptography and Coding. Paterson, K. G. (ed.). Springer, Vol. 2898. p. 245-263 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Morphological effects on pronunciation

    Mousikou, P., Strycharczuk, P., Turk, A., Rastle, K. & Scobbie, J., 2015, The Scottish Consortium for ICPhS 2015 (Ed.), Proceedings of the 18th International Congress of Phonetic Sciences . Glasgow, UK: The University of Glasgow, paper number 0816

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    MoverScore: Text Generation Evaluating with Contextualized Embeddings and Earth Mover Distance

    Zhao, W., Peyrard, M., Liu, F., Gao, Y., Meyer, C. M. & Eger, S., Nov 2019, Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Association for Computational Linguistics, p. 563-578 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Mozart and Paris (1778)

    Charlton, D., 1995, Europa im Zeitalter Mozarts. Csáky, M. & Pass, W. (eds.). Vienna: Böhlau, p. 185-89 5 p. (Schriftenreihe der Osterreichischen Gesellschaft zur Erforschung des 18. Jahrhunderts ; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    MPLS policy target recognition network

    Al-Mutairi, A. & Wolthusen, S., 2 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9572. p. 71-87 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9572).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    MSL 14 - a Wellcome Manuscript of a Medical Practitioner

    Zipser, B. & Nutton, V., 2010, Histoire de la tradition et édition des médecins grecs: Actes du VIe colloque international (Paris, Université de Paris Sorbonne - Académie des Inscriptions et Belles Lettres, 10-12 avril 2008). Boudon-Millot, V., Garzya, A., Jouanna, J. & Roselli, A. (eds.). Napoli: M. D'Auria Editore, p. 259-270 11 p. (Collectanea; vol. 27).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Multi-agent interactions for an ATM management system (TeleMACS approach).

    Hayzelden, A., Bigham, J. & Luo, Z., 1999, Software Agents for Future Communications Systems. Hayzelden, A. L. G. & Bigham, J. (eds.). Springer-Verlag, p. 160-182

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Multi-agent systems for resource management

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 1999, 6th International Conference on Intelligence and Services in Networks, Also in Lecture Notes in Computer Science. Zuidweg, H., Campolargo, M., Delgado, J. & Mullery, A. (eds.). Springer-Verlag, Vol. 1597.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Multi-Budgeted Directed Cuts

    Kratsch, S., Li, S., Marx, D., Pilipczuk, M. & Wahlstrom, M., 25 Jan 2019, IPEC 2018. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 115. p. 18:1-18:14 14 p. 18. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. E-pub ahead of print

    Multichannel Quaternion Least Mean Square Algorithm

    Cheong Took, C. & Xia, Y., 17 Apr 2019, (E-pub ahead of print) International Conference on Acoustics, Speech, and Signal Processing: ICASSP. Brighton UK: IEEE, p. 1-4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Multi-Client Non-Interactive Verifiable Computation

    Choi, S. G., Katz, J., Kumaresan, R. & Cid, C., Feb 2013, Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Sahai, A. (ed.). Springer, p. 499-518 20 p. (Lecture Notes in Computer Science; vol. 7785).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Multi-Dimensional Causal Discovery

    Schaechtle, U., Stathis, K. & Bromuri, S., 3 Aug 2013, Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence: Beijing, China, 3-9 August 2013. Rossi, F. (ed.). p. 1649-1655

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Multigraph Critical Infrastructure Model

    Schneidhofer, B. & Wolthusen, S., 2016, Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers. Springer-Verlag, Vol. 485. p. 149-167 19 p. (IFIP Advances in Information and Communication Technology; vol. 485).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Multi-level Access in Searchable Symmetric Encryption

    Alderman, J., Martin, K. & Renwick, S., 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 35-52 18 p. (Lecture Notes in Computer Science; vol. 10323).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Multilinear Maps from Obfuscation

    Albrecht, M., Farshim, P., Hofheinz, D., Larraia, E. & Paterson, K., 19 Dec 2015, Theory of Cryptography. Kushilevitz, E. & Malkin, T. (eds.). Springer, p. 446-473 27 p. (Lecture Notes in Computer Science; vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Multiparty Compatibility in Communicating Automata: Characterisation and Synthesis of Global Session Types

    Denielou, P-M. & Yoshida, N., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II: ICALP (2). 2013 ed. Springer, Vol. 7966. p. 174 186 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    Multiparty Session Types Meet Communicating Automata

    Deniélou, P-M. & Yoshida, N., 2012, Programming Languages and Systems: 21st European Symposium on Programming, ESOP 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012: Proceedings. Seidl, H. (ed.). Springer, p. 194-213 20 p. (Lecture Notes in Computer Science; vol. 7211).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Unpublished

    Multiple countries response to oil price shocks and illiquidity shocks

    Said, H. & Giouvris, E., 2017, (Unpublished) 43rd International Business Research Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  105. Published

    Multiple lexicalisation (a Java based study)

    Scott, E. & Johnstone, A., 20 Oct 2019, ACM Digital Library: Proceedings of Software Language Engineering 2019. ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. Published

    Multiple Pulse Resonantly Enhanced Laser Plasma Wakefield Acceleration

    Corner, L., Walczak, R., Nevay, L. J., Dann, S., Hooker, S. M., Bourgeois, N. & Cowley, J., 2012, ADVANCED ACCELERATOR CONCEPTS. Zgadzaj, R., Gaul, E. & Downer, MC. (eds.). MELVILLE: AMER INST PHYSICS, p. 872-873 2 p. (AIP Conference Proceedings; vol. 1507).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  107. Published

    Multiple sequence alignment based on new approaches of tree construction and sequences comparison

    Solovyev, V., Streletc, V. B., Milanesi, L., Lim, H. (ed.), Fickett, J. (ed.), Cantor, C. (ed.) & Robbins, R. (ed.), 1993, Proceedings of the 2nd International conference on Bioinformatics, Supercomputing, and Complex genome analysis.. World Scientific, p. 419-428

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  108. Published

    Multiprobabilistic Venn Predictors with Logistic Regression

    Nouretdinov, I., Devetyarov, D., Burford, B., Camuzeaux, S., Gentry-Maharaj, A., Tiss, A., Smith, C., Luo, Z., Chervonenkis, A., Hallett, R., Vovk, V., Waterfield, M., Cramer, R., Timms, J. F., Jacobs, I., Menon, U. & Gammerman, A., 2012, Artificial Intelligence Applications and Innovations - AIAI 2012 International Workshops: AIAB, AIeIA, CISE, COPA, IIVC, ISQL, MHDW, and WADTMB, Halkidiki, Greece, September 27-30, 2012, Proceedings, Part II. Iliadis, L., Maglogiannis, I., Papadopoulos, H., Karatzas, K. & Sioutas, S. (eds.). Springer, Vol. 382. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    Multiproxy Constraints on Redox Conditions of ~2.7 Ga Oceans

    Yang, J., Zerkle, A., Grassineau, N., Nisbet, E., Izon, G., Hunter, M. & Martin, T., 2016, Goldschmidt Conference 2016. p. 03F

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  110. Forthcoming

    Multi-Round Attacks on Structural Controllability Properties for Non-Complete Random Graphs

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, (Accepted/In press) Proceedings of the 16th Information Security Conference (ISC 2013). Springer-Verlag, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  111. Published

    Multi-Shot Distributed Transaction Commit

    Chockler, G. & Gotsman, A., 4 Oct 2018, 32nd International Symposium on Distributed Computing (DISC 2018). Springer-Verlag, p. 1-18 18 p. (LIPIcs–Leibniz International Proceedings in Informatics ; vol. 121).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  112. Published

    Music as Function: Biofeedback in Games for Health

    Plans, E. & Plans, D., 10 Apr 2016, Ludomusicology - Videogame Music Research Group.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  113. Published

    My Beautiful Self’: an Exploration of the Effects of Advertising Campaigns on Female Empowerment

    Longo, C. & Türe, M., 2016, NA - Advances in Consumer Research . Vol. 44. p. 747-747 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  114. E-pub ahead of print

    Nanothermometry of electrons and phonons

    Weng, Q., Puttock, R., Barton, C., Panchal, V., Yang, L., An, Z., Kajihara, Y., Lu, W., Tzalenchuk, A. & Komiyama, S., 29 Oct 2018, (E-pub ahead of print) 2018 43rd International Conference on Infrared Millimeter and Terahertz Waves, IRMMW-THz 2018. IEEE Computer Society, Vol. 2018-September. 3 p. 8509939

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  115. Published

    Nature vs Grammar: Annibal Caro's Apologia as a Manifesto for Orality

    Jossa, S., 24 Feb 2016, Interactions between Orality and Writing in Early Modern Italian Culture. Degl'Innocenti, L., Richardson, B. & Sbordoni, C. (eds.). Routledge

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  116. Published

    Navigating the Sacred and the Profane: An Inquiry of ‘Askesis’ Emergent in Daily Lives and Grounded in Wisdom Traditions.

    Tzouramani, E. & Karakas, F., 2016, 11th Organization Studies Workshop, May 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  117. Forthcoming

    Naxos di Sicilia: nuovi dati sulla città del V secolo a.C.

    Lentini, M. C. & Pakkanen, J., 2015, (Accepted/In press) La Città e le città della Sicilia antica. Atti delle Ottave Giornate Internazionali di studio sull’area elima e la Sicilia occidentale nel contesto mediterraneo. Pisa, Scuola Normale Superiore, 18-21 dicembre 2012, Pisa. Ampolo, C. (ed.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  118. Published

    Naxos of Sicily in the 5th Century BC: New Research

    Lentini, M. C., Pakkanen, J. & Sarris, A., Dec 2015, Greek Colonisation: New Data, Current Approaches: Proceedings of the Scientific Meeting held in Thessaloniki (6 February 2015). Adam-Veleni, P. & Tsangari, D. (eds.). Athens: Alpha Bank, p. 23–35 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  119. Published

    Near and yet So Far: Distance-Bounding Attacks in Wireless Networks

    Clulow, J., Hancke, G., Kuhn, M. G. & Moore, T., 2006, European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS). Springer-Verlag, Vol. 4357. p. 83-97

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  120. E-pub ahead of print

    Near-linear-time, Optimal Vertex Cut Sparsifiers in Directed Acyclic Graphs

    He, Z., Li, J. & Wahlström, M., 3 Jul 2021, (E-pub ahead of print) Proceedings of ESA 2021. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, p. 1-14 14 p. 52

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  121. Published

    Negotiating expatriate identity in the global era: Implications on expatriate performance

    Li, C. & Zhang, L. E., 1 Jan 2015, Academy of Management Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  122. Published

    Neighbourhood morphology and solar irradiance in relation to urban climate

    Mohajeri, N., Gudmundsson, A., Assouline, D. & Scartezzini, J., 2015, ICUC9 - The 9th International Conference on Urban Climate. ICUC9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  123. Published

    Nella terra di Dante

    Jossa, S. & Gesù, M. D. (ed.), 2009, Letteratura, identità, nazione. Palermo: duepunti, p. 41-58 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  124. Published

    Neo-Archaean Palaeo-Environmental Changes Determined by Microbial Activities Using Stable Isotopic Compositions

    Grassineau, N., Yang, J., Zerkle, A. & Nisbet, E., 12 Dec 2017, American Geophysical Union Fall Annual Meeting. New Orleans, p. B23F-05 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  125. Published

    Neogene extension on Seram: A new tectonic model for the northern Banda Arc

    Pownall, J. & Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-305 1-17

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  126. Published

    NetVis: a visualization tool enabling multiple perspectives of network traffic data

    Peters, D., Slawinski, A., Spoor, T., Vicol, S., Happa, J., Goldsmith, M. & Creese, S., 2013, Proceedings of the 31st conference on Theory and Practice of Computer Graphics, Eurographics UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  127. Published

    Network as a computer: ranking paths to find flows

    Pavlovic, D., 2008, Proceedings of CSR 2008. Razborov, A. & Slissenko, A. (eds.). Springer-Verlag, Vol. 5010. p. 384-397 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  128. Published

    Network provider domain federation in TINA

    Pavón, J., Montes, E. & Komisarczuk, P., 1997, Global Convergence of Telecommunications and Distributed Object Computing, 1997. Proceedings., TINA 97. p. 334-342 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  129. Published

    Network structure and the cultural evolution of linguistic structure: A group communication experiment

    Raviv, L., Meyer, A. & Lev - Ari, S., 2020, Ravignani, A. and Barbieri, C. and Martins, M. and Flaherty, M. and Jadoul, Y. and Lattenkamp, E. and Little, H. and Mudd, K. and Verhoef, T. (Eds) Evolution of Language: Proceedings of the 13th International Conference (EvoLang13). Brussels, Belgium..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  130. Published

    Network traffic demand prediction with confidence

    Dashevskiy, M. & Luo, Z., 2008, IEEE GLOBECOM 2008. p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  131. Published

    Network-aware stream query processing in mobile ad-hoc networks

    O'Keeffe, D., Salonidis, T. & Pietzuch, P. R., 17 Dec 2015, 34th IEEE Military Communications Conference, MILCOM 2015, Tampa, FL, USA, October 26-28, 2015. p. 1335-1340 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  132. E-pub ahead of print

    Neural Pairwise Ranking Factorization Machine for Item Recommendation

    Jiao, L., Yu, Y., Zhou, N., Zhang, L. & Yin, H., 18 Sep 2020, (E-pub ahead of print) Neural Pairwise Ranking Factorization Machine for Item Recommendation. Proceedings, Part I. ed. Springer, [Cham], p. 680-688 9 p. (Lecture Notes in Computer Science (12112)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  133. Published

    Neural Simplex Architecture

    Phan, D. T., Grosu, R., Jansen, N., Paoletti, N., Smolka, S. A. & Stoller, S. D., 2020, NASA Formal Methods - 12th International Symposium, NFM 2020, Proceedings. Lee, R., Jha, S. & Mavridou, A. (eds.). Springer, p. 97-114 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12229 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  134. E-pub ahead of print

    Neural State Classification for Hybrid Systems

    Phan, D., Paoletti, N., Zhang, T., Grosu, R., Smolka, S. A. & Stoller, S. D., 30 Sep 2018, (E-pub ahead of print) 16th International Symposium on Automated Technology for Verification and Analysis (ATVA 2018). Lahiri, S. K. & Wang, C. (eds.). Springer, p. 422-440 19 p. (Lecture Notes in Computer Science; vol. 11138).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  135. Published

    New c-ary perfect factors in the de Bruijn Graph

    Mitchell, C. J., 1995, Codes and Cyphers - Cryptography and Coding IV: Proceedings of the fourth IMA Cryptography and Coding Conference, Cirencester, December 1993. Southend: Formara Ltd., p. 299-313 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  136. Published

    New CBC-MAC forgery attacks

    Brincat, K. & Mitchell, C. J., 2001, Information Security and Privacy, ACISP 2001, Sydney, Australia, July 2001. Varadharajan, V. & Mu, Y. (eds.). Springer-Verlag, p. 3-14 12 p. (Lecture Notes in Computer Science; no. 2119).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  137. Published

    New Directions in Secure African Branchless Banking

    Heath, C. & Quaglia, E., 2017, Strategic Narratives of Technology and Africa.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  138. Published

    New Insights on Architectural Connectors

    Bruni, R., Fiadeiro, J. L., Lanese, I., Lopes, A. & Montanari, U., 2004, IFIP TCS. Kluwer, p. 367-380 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  139. Published

    New Plain-Exponential Time Classes for Graph Homomorphism

    Wahlström, M., 2009, Computer Science - Theory and Applications : 4th International Computer Science Symposium in Russia, CSR 2009. Frid, A., Morozov, A., Rybalchenko, A. & Wagner, K. W. (eds.). Novosibirsk, Russia: Springer, Vol. 5675. p. 346-355 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  140. E-pub ahead of print

    New radiometric calibration site located at Gobabeb, Namib desert

    Bialek, A., Greenwell, C., Lamare, M., Meygret, A., Marcq, S., Lacherade, S., Woolliams, E., Berthelot, B., Bouvet, M., King, M., Underwood, C. & Fox, N., 3 Nov 2016, (E-pub ahead of print) 2016 IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-November. p. 6094-6097 4 p. 7730592

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  141. Published

    NFC mobile payment with Citizen Digital Certificate

    Chen, W., Mayes, K., Lien, Y-H. & Chiu, J-H., 1 Jun 2011, Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on. Gyeongju: IEEE COMPUTER SOC, p. 120 -126

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  142. Published

    NFC Mobile Transactions and Authentication Based on GSM Network

    Chen, W., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J-H., 1 Apr 2010, Near Field Communication (NFC), 2010 Second International Workshop on. p. 83 -89

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  143. Published

    Ninja: Non identity based, privacy preserving authentication for ubiquitous environments

    Leung, A. & Mitchell, C. J., 2007, UbiComp 2007: Ubiquitous Computing, 9th International Conference, Innsbruck, Austria, September 16-19 2007. Krumm, J., Abowd, G. D., Seneviratne, A. & Strang, T. (eds.). Springer-Verlag, Vol. 4717. p. 73-90 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  144. Published

    Nitrogen cycling in ~2.7 Ga oceans

    Yang, J., Zerkle, A., Grassineau, N., Nisbet, E., Mettam, C., Hunter, M., Martin, A., Newton, J. & Boyce, A., 13 Dec 2016, American Geophysical Union Fall Annual Meeting. San Francisco, p. PP21D-04

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  145. Published

    NLO automated tools for QCD and beyond

    Kauer, N., 26 Feb 2012, LC11: Understanding QCD at linear colliders in searching for old and new physics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  146. Published

    Noisy Carrier Modulation for HF RFID: First International EURASIP Workshop on RFID Technology

    Hancke, G. P., 1 Sep 2007, First International EURASIP Workshop on RFID Technology. Austria, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  147. Unpublished

    Nomadic Metrology

    Hazell, C., 2019, (Unpublished) A Day with Rosi Braidotti: ZOE-GEO-TECHNO Egalitarianism .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  148. Published

    Non-asymptotic calibration and resolution

    Vovk, V., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, Vol. 3734. p. 429-443 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  149. Published

    NON-CRIMP THERMOPLASTIC COMPOSITE FABRICS - AEROSPACE SOLUTIONS TO AUTOMOTIVE PROBLEMS

    WOOLSTENCROFT, D. H. & Hogg, P., 1991, ADVANCED COMPOSITE MATERIALS : NEW DEVELOPMENTS AND APPLICATIONS. MATERIALS PARK: ASM INTERNATIONAL, p. 339-349 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  150. Published

    Non-Forensic Odontological Biometrics

    Busch, C. & Wolthusen, S. D., 12 Sep 2009, Proc. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '09). IEEE Computer Society Press, p. 1105-1109

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  151. Published

    Non-Interactive Key Exchange

    Freire, E. S. V., Hofheinz, D., Kiltz, E. & Paterson, K. G., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 254-271 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  152. Submitted

    Non-Latin Alphabets in the transmission of Simon of Genoa's Clavis Sanationis

    Zipser, B., 2019, (Submitted) De Bagdad à Constantinople: le transfert des savoirs médicaux, XIe-XVe s.. Cronier, M. (ed.). Paris: Collection Orient et Méditerranée

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  153. Published

    Nonlinear Equivalence of Stream Ciphers

    Rønjom, S. & Cid, C., 2010, Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Springer, p. 40-54 15 p. (Lecture Notes in Computer Science; vol. 6147).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  154. Published

    Nonresponse in cross-cultural telephone surveys: reflections on telephone survey interviews with Chinese managers

    Wang, C. L. & Saunders, M., 2011, British Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  155. Published

    Normalized nonconformity measures for regression conformal prediction

    Papadopoulos, H., Gammerman, A. & Vovk, V., 2008, Proceedings of the IASTED International Conference on Articial Intelligence and Applications. p. 64-69 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  156. Published

    Normative KGP Agents: A Preliminary Report

    Sadri, F., Toni, F. & Stathis, K., 1 Dec 2005, Symposium on Normative Multi-Agent Systems, NORMAS 2005, part of the SSAISB 2005 Convention, University of Hertfordshire, Hatfield, UK. p. 85-96 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  157. Published

    Not in Silos: locating ERP project into a complex network- A multiple-project perspective

    Elbanna, A., 2008, Proceedings of the European Conference of Information Systems 2008.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  158. Published

    Novel Genetic Bees Algorithm applied to single machine scheduling problem

    Packianather, M. S., Yuce, B., Mastrocinque, E., Fruggiero, F., Pham, D. T. & Lambiase, A., 2014, World Automation Congress (WAC), 2014. Waikoloa, HI, USA : IEEE, p. 906-911 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  159. Published

    Numerical modelling of stress fields around magma chambers and the generation of ring faults

    Gudmundsson, A., Turon, E. & Marti, J., 1997, Proceedings of IAMG97 Third Annual Conference of the International Association for Mathematical Geology. Pawlowsky-Glahan, V. (ed.). Barcelona, p. 401-406

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  160. Published

    O Debate Político e o Conflito Inter-Profissional em redor da Regulamentação das Medicinas Alternativas e Complementares em Portugal

    Almeida, J., 2008, VI Congresso Português de Sociologia. Lisbon, Portugal, p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  161. Published

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. J. & Chen, T., 11 Nov 2019, Proceedings of the Security Standardisation Research Conference 2019 (SSR 2019, an ACM CCS 2019 Workshop), London, November 11 2019. ACM, p. 35-44 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  162. Published

    Obfuscation and Formal Grammars Revisited

    Repel, D. & Stengel, I., 13 Sep 2013, Fifth International Conference on Internet Technologies and Applications. p. 267-274 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  163. Published

    Object languages in a type-theoretic meta-framework

    Callaghan, P. C., Luo, Z. & Pang, J., 2001, Proof Transformation and Presentation and Proof Complexities.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  164. Published

    Object-Oriented Conceptual Modeling from Law

    Sernadas, C., Fiadeiro, J. L. & Sernadas, A., 1988, DS-3. p. 305-327 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  165. Published

    Oblique: Accelerating Page Loads Using Symbolic Execution

    Ko, R., Mickens, J., Loring, B. & Netravali, R., Apr 2021, NSDI 2021. USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  166. Published

    Observation Mechanism and Cost Model for Tightly Coupled Asymmetric Concurrency

    Seeger, M. & Wolthusen, S. D., May 2010, Proceedings, 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 158-163

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  167. Published

    Observation of stages of homogeneous nucleation of liquid droplets in solid isotopic helium mixtures

    Poole, M., Saunders, J. & Cowan, B., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 360-361 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  168. Published

    Observations on the use of mobile decision aids for consumer decision making

    van der Heijden, H. & Sangstad Sørensen, L., 2003, Proceedings of the 2nd International Conference on Mobile Business (ICMB). Vienna, Austria

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  169. Published

    Oceanographic MOWER Cruise

    Valencia, J., Ercilla, G., Hernández-Molina, F. J. & Casas, D., 9 Apr 2015, International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences - ISPRS Archives. 5W5 ed. International Society for Photogrammetry and Remote Sensing, Vol. 40. p. 223-230 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  170. Published

    Off-line Nearest Neighbour Transductive Confidence Machine

    Nouretdinov, I., 2008, 8th Industrial Conference on Data Mining 2008 Poster and Workshop Proceedings. p. 16-24 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  171. Published

    Offline Peer-to-Peer Broadcast with Anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M., 2011, E-business and Telecommunications. 3 ed. Springer, Vol. 130. p. 174-185 (Communications in Computer and Information Science ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  172. Unpublished

    Oil, Baltic Dry index, foreign exchange, market liquidity and business cycles: Evidence from net oil exporting countries and net oil importing countries

    Said, H. & Giouvris, E., 2018, (Unpublished) 2018 International Conference on Business and Information-Winter session.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  173. Published

    Old and new deterministic factoring algorithms

    McKee, J. & Pinch, R., 1996, Proceedings of the second Algorithmic Number Theory Symposium (ANTS II). Springer, p. 217-224

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  174. Published

    On a possible privacy flaw in Direct Anonymous Attestation (DAA)

    Leung, A., Chen, L. & Mitchell, C. J., 2008, Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, Villach, Austria, March 11-12, 2008, Proceedings. Lipp, P., Sadeghi, A-R. & K-M. K. (eds.). Berlin: Springer-Verlag, p. 179-190 12 p. (Lecture Notes in Computer Science; vol. 4968).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  175. Published

    On assessing the positioning accuracy of Google Tango in challenging indoor environments

    Nguyen, D. K. A. & Luo, Z., 23 Nov 2017, The 8th International Conference on Indoor Positioning and Indoor Navigation, Sept 18-21, 2017, Japan. IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  176. Published

    On becoming bicultural: a taxonomy of expatriate cultural identity

    Zhang, L. E., 2014, Academy of Management Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  177. E-pub ahead of print

    On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem

    Albrecht, M. & Heninger, N., 16 Jun 2021, (E-pub ahead of print) EUROCRYPT 2021. Springer, (Lecture Notes in Computer Science; vol. 12696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  178. Published

    On Cipher-Dependent Related-Key Attacks in the Ideal Cipher Model

    Albrecht, M., Farshim, P., Paterson, K. & Watson, G., 2011, Fast Software Encryption (FSE). Joux, A. (ed.). Springer, Vol. 6733. p. 128-145 (Lecutre Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  179. Published

    On Completeness in Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 6 Jun 2016, Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies: SACMAT '16. New York: ACM Press, p. 149-160 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  180. Published

    On Correctness of Data Structures under Reads-Write Concurrency

    Lev-Ari, K., Chockler, G. & Keidar, I., 2014, Distributed Computing: 28th International Symposium DISC 2014, Austin, TX, USA, October 12-15, 2014, Proceedings. Kuhn, F. (ed.). 1 ed. Springer-Verlag Berlin Heidelberg, Vol. 8784. p. 273-287 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  181. Published

    On Creating Complementary Pattern Databases

    Franco, S., Torralba, Á., Lelis, L. H. S. & Barley, M., 2017, Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 4302-4309 8 p. (IJCAI International Joint Conference on Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  182. E-pub ahead of print

    On Deception-Based Protection Against Cryptographic Ransomware

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 6 Jun 2019, (E-pub ahead of print) DIMVA 2019: 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Springer, p. 219-239 21 p. (Lecture Notes in Computer Science; vol. 11543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  183. Published

    On delegation and workflow execution models

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing. ACM Press, p. 2137-2144 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  184. Published

    On drive-by-download attacks and malware classification

    Puttaroo, M., Komisarczuk, P. & De Amorim, R. C., 2013, Proceedings of the 5th International Conference on Internet Technologies and Applications, ITA 2013. Glyndwr University, p. 217-225 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  185. E-pub ahead of print

    On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL

    Albrecht, M., 1 Apr 2017, (E-pub ahead of print) Annual International Conference on the Theory and Applications of Cryptographic Techniques: EUROCRYPT 2017: Advances in Cryptology . Springer, p. 103-129 27 p. (Lecture Notes in Computer Science; vol. 10210).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  186. Published

    On Generating Efficient Data Summaries for Logistic Regression: A Coreset-based Approach

    Riquelme Granada, N., Nguyen, D. K. A. & Luo, Z., Jul 2020, 9th International Conference on Data Science, Technology and Applications (DATA 2020). Vol. 1. p. 78-89 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  187. Published

    On Initializations for the Minkowski Weighted K-Means

    Amorim, R. C. D. & Komisarczuk, P., 2012, Advances in Intelligent Data Analysis XI - 11th International Symposium, IDA 2012, Helsinki, Finland, October 25-27, 2012. Proceedings. p. 45-55 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  188. Published

    On Key Assignment for Hierarchical Access Control

    Crampton, J., Martin, K. M. & Wild, P., 2006, Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 98-111 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  189. Published

    On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval

    Crampton, J., Morisset, C. & Zannone, N., 1 Jun 2015, 20th ACM Symposium on Access Control Models and Technologies. ACM, p. 99-109 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  190. Published

    On mobile agent based transactions in moderately hostile environments

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Advances in Network and Distributed Systems Security, Proceedings of IFIP TC11 WG11.4 First Annual Working Conference on Network Security, KU Leuven, Belgium, November 2001. De Decker, B., Piessens, F., Smits, J. & Van Herreweghen, E. (eds.). Kluwer Academic Publishers, p. 173-186 14 p. (IFIP Conference Proceedings; no. 206).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  191. Published

    On modelling multi-agent systems declaratively

    Bracciali, A., Mancarella, P., Stathis, K. & Toni, F., 2005, Declarative agent languages and technologies II. Springer-Verlag, Vol. 3476. p. 53-68 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  192. Published

    On multi-channel MAC protocols in cognitive radio networks

    Yau, A. K-L., Komisarczuk, P. & Teal, P. D., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 300-305 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  193. Published

    On partitional clustering of malware

    de Amorim, R. C. & Komisarczuk, P., 2012, Cyberpatterns 2012. p. 47-51 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  194. Published

    On permissions, inheritance and role hierarchies

    Crampton, J., 2003, Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM Press, p. 85-92 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  195. Published

    On Problems as Hard as CNF-SAT

    Cygan, M., Dell, H., Lokshtanov, D., Marx, D., Nederlof, J., Okamoto, Y., Paturi, R., Saurabh, S. & Wahlström, M., 2012, IEEE Conference on Computational Complexity. p. 74-84 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  196. Published

    On quantum statistics in data analysis

    Pavlovic, D., 2008, Quantum Interaction 2008. Bruza, P. (ed.). AAAI Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  197. Published

    On quasipolynomial multicut-mimicking networks and kernelization of multiway cut problems

    Wahlström, M., 29 Jun 2020, ICALP 2020. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 168. p. 1-14 14 p. 101

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  198. Published

    On Redefinitions of 'Rescue opera'

    Charlton, D., 1992, Music and the French Revolution. Boyd, M. (ed.). 1992: Cambridge University Press, p. 169-88 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  199. Published

    On r-Simple k-Path and Related Problems Parameterized by k/r

    Gutin, G., Wahlstrom, M. & Zehavi, M., Jan 2019, Proceedings of the 2019 Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, p. 1750-1769 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  200. Published

    On security vulnerabilities and mitigation in the cognition cycle of Distributed Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P., Poh, G-S. & Martin, K., 2011, Proceedings of the 6th International Conference on Broadband Communications & Biomedical Applications. IEEE, p. 132-137

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  201. Published

    On Singleton Arc Consistency for CSPs Defined by Monotone Patterns

    Carbonnel, C., Cohen, D. A., Cooper, M. C. & Živný, S., 20 Feb 2018, 35th Symposium on Theoretical Aspects of Computer Science, STACS 2018. Niedermeier, R. & Vallée, B. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 96. p. 19:1-19:15 15 p. 19

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  202. Published

    On solutions to the key escrow problem

    Hoyle, M. P. & Mitchell, C. J., 1998, State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 1997. Preneel, B. & Rijmen, V. (eds.). Springer-Verlag, p. 277-306 30 p. (Lecture Notes in Computer Science; no. 1528).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  203. Published

    On spatio-temporal constraints and inheritance in role-based access control

    Chen, L. & Crampton, J., 2008, Proceedings of ACM Symposium on Information, Computer and Communications Security. ACM Press, p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  204. Published

    On Subtyping in Type Theories with Canonical Objects

    Lungu, G. & Luo, Z., Nov 2018, Types for Proofs and Programs: Post-proceedings of the 22nd Int. Conf. on Types for Proofs and Programs (TYPES 2016). Leibniz International Proceedings in Informatics, Vol. 97. p. 13:1-13:31 31 p. 13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  205. Published

    On Symmetric Encryption with Distinguishable Decryption Failures

    Boldyreva, A., Degabriele, J. P., Paterson, K. & Stam, M., 2014, FSE 2013. Moriai, S. (ed.). Springer, Vol. 8424. p. 1–24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  206. Published

    On the (in)security of IPsec in MAC-then-encrypt configurations

    Degabriele, J. P. & Paterson, K. G., 2010, CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 493-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  207. Published

    On the Absence of Predictive Complexity for Some Games

    Kalnishkan, Y. & Vyugin, M. V., 2002, Algorithmic Learning Theory 13th International Conference, ALT 2002, Proceedings: volume 2533 of Lecture Notes in Artificial Intelligence. Springer, (Lecture Notes in Artificial Intelligence; vol. 2533).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  208. Published

    On the complexity of universal leader election

    Kutten, S., Pandurangan, G., Peleg, D., Robinson, P. & Trehan, A., 2013, ACM Symposium on Principles of Distributed Computing, PODC '13, Montreal, QC, Canada, July 22-24, 2013. p. 100-109 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  209. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K., 2017, Trustcom/BigDataSE/ICESS, 2017 IEEE. p. 41-49 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  210. Published

    On the Emergence of Properties in Component-Based Systems

    Fiadeiro, J. L., 1996, AMAST. Springer, Vol. 1101. p. 421-443 23 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  211. Published

    On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

    Curtis, B. & Player, R., 11 Nov 2019, 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. Springer, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  212. Published

    On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles

    Al-Kuwari, S. & Wolthusen, S. D., 2011, Forensics in Telecommunications, Information, and Multimedia: Proceedings of the Third International ICST Conference (e-Forensics 2010). Springer-Verlag, p. 207-223

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  213. Published

    On the filtering of photoplethysmography signals

    Awodeyi, A. E., Alty, S. R. & Ghavami, M., 5 Feb 2014, Proceedings - IEEE 14th International Conference on Bioinformatics and Bioengineering, BIBE 2014. Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 7033577

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  214. Published

    On the hardness of LWE with binary error: Revisiting the hybrid lattice-reduction and meet-in-the-middle attack

    Buchmann, J., Göpfert, F., Player, R. & Wunderer, T., 7 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9646. p. 24-43 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  215. Published

    On the interplay between strategic performance measurement and managerial accounting change for sustainable development

    Subramaniam, N., 2015, European Network for Research in Organisational & Accounting Change (ENROAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  216. Published

    On the Joint Security of Encryption and Signature in EMV

    Degabriele, J. P., Lehmann, A., Paterson, K. G., Smart, N. P. & Strefler, M., 2012, CT-RSA. Dunkelmann, O. (ed.). Springer, Vol. 7178. p. 116-135 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  217. Published

    On the Joint Security of Encryption and Signature, Revisited

    Paterson, K., Thomson, S., Schuldt, J. & Stam, M., 2011, ASIACRYPT. Lee, D. H. & Wang, X. (eds.). Springer, Vol. 7073. p. 161-178 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  218. Published

    On the Life Cycle of the Certification Authority key pairs in EMV'96

    Markantonakis, K. & Rantos, K., Apr 1999, On the Life Cycle of the Certification Authority key pairs in EMV'96. Society for Computer Simulation, p. 125-130

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  219. Published

    On the Limits of Information Flow Techniques for Malware Analysis and Containment

    Cavallaro, L., Saxena, P. & Sekar, R., 10 Jul 2008, Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. Zamboni, D. (ed.). Springer, p. 143-163 (Lecture Notes in Computer Science; vol. 5137).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  220. Published

    On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 BPM Workshop on Workflow Security Audit and Certification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  221. Published

    On the parameterized complexity of the workflow satisfiability problem

    Crampton, J., Gutin, G. & Yeo, A., 2012, CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security. New York: ACM, p. 857-868

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  222. Published

    On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation

    Papapanagiotou, K., Markantonakis, K., Zhang, Q., Sirett, W. & Mayes, K., 2005, Security and Privacy in the Age of Ubiquitous Computing. Sasaki, R., Qing, S., Okamoto, E. & Yoshiura, H. (eds.). Springer Boston, Vol. 181. p. 551-563 13 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  223. Unpublished

    On the pricing of commonality across various liquidity proxies in the London Stock Exchange

    Lim, S. & Giouvris, E., 2015, (Unpublished) On the pricing of commonality across various liquidity proxies in the London Stock Exchange.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  224. Published

    On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks

    Kendall, M. & Martin, K. M., 2012, Research in Cryptology – 4th Western European Workshop WEWoRC 2011. Springer, Vol. 7242. p. 62-82 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  225. Published

    On the Satisfiability of Workflows with Release Points

    Crampton, J., Gutin, G. & Watrigant, R., Jun 2017, SACMAT '17 Abstracts: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 207-217 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  226. Published

    On the security of a structural proven signer ordering multisignature scheme

    Mitchell, C. J. & Hur, N., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, Vol. 228. p. 1-8 8 p. (IFIP Conference Proceedings; no. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  227. Published

    On the security of some password-based key agreement schemes

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 149-154 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  228. E-pub ahead of print

    On the Security of the Algebraic Eraser Tag Authentication Protocol

    Blackburn, S. & Robshaw, M. J. B., 9 Jun 2016, (E-pub ahead of print) Applied Cryptology and Network Security: 14th International Conference, ACNS 2016, London (Guildford), UK, June 19-22, 2016. Springer-Verlang, Vol. 9696. p. 3-17 15 p. (Lecture Notes in Computer Science; vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Published

    On the Security of the TLS Protocol: A Systematic Analysis

    Krawczyk, H., Paterson, K. G. & Wee, H., Aug 2013, Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings. Garay, J. A. & Canetti, R. (eds.). Springer, Vol. 1. p. 429-448 (Lecture Notes in Computer Science; vol. 8042).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  230. Published

    On the Smallest Ratio Problem of Lattice Bases

    Li, J., Jul 2021, ISSAC 2021. ACM, p. 289-296 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  231. Published

    On the undecidability of asynchronous session subtyping

    Lange, J. & Yoshida, N., 16 Mar 2017, Foundations of Software Science and Computation Structures - 20th International Conference, FOSSACS 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings. Esparza, J. & Murawski, A. S. (eds.). Springer Verlag, p. 441-457 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10203 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  232. Published

    On the use of variable user goals to measure perceived usefulness

    Matook, S. & van der Heijden, H., 2007, Proceedings of the European Conference on Information Systems (ECIS). St Gallen, Switzerland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  233. Published

    On the Way to 'Euphonia': Berlioz's Promotion of Earlier Music

    Charlton, D., 2015, Von Gluck zu Berlioz.: Die französische Oper zwischen Antikenrezeption und Monumentalität.. Betzwieser, T. & Mauksch, S. (eds.). Würzburg: Konigshausen & Neumann, p. 139-58 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  234. Published

    On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes

    Procter, G. & Cid, C., 2013, Fast Software Encryption, 20th International Workshop, FSE 2013. Springer, Vol. 8424. p. 287-304 18 p. (Lecture Notes in Computer Science - LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  235. Published

    One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography

    Jager, T., Paterson, K. & Somorovsky, J., 24 Apr 2013, Network and Distributed System Security Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  236. Published

    Online community response to major disaster: A study of Tianya forum in the 2008 Sichuan earthquake

    Qu, Y., Wu, P. F. & Wang, X., 6 Apr 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755366

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  237. Published

    On-line confidence machines are well-calibrated

    Vovk, V., 2002, Proceedings of the Forty Third Annual Symposium on Foundations of Computer Science. Los Alamitos, CA: IEEE Computer Society, p. 187-196 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  238. Published

    Online conformal prediction for classifying different types of herbal medicines with electronic nose

    Zhan, X., Guan, X., Wu, R., Wang, Z., Wang, Y., Luo, Z. & Li, G., 4 Nov 2018, IET Doctoral Forum on Biomedical Engineering, Healthcare, Robotics and Artificial Intelligence 2018: BRAIN 2018. IET Conference Publications, Vol. 2018. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. Published

    Online distance learning as a public policy tool for development

    Kromidha, E., 2013, Proceedings of the European Consortium for Political Research 2013 General Conference, 8-9 September 2013. Bordeaux, France

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  240. Published

    Online Instructors: How does the presence on e-learning platforms matter?

    Wallace, A. & Panteli, N., 5 Sep 2017, Proceedings of the British Academy of Management Conference, BAM2017: Track: E-business. The University of Warwick, September 5-7, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  241. Published

    On-line network resource consumption prediction with confidence

    Luo, Z., 2007, Second International Conference on Communications and Networking in China, 2007. CHINACOM '07. . p. 104-108

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  242. Published

    Online Prediction of Ovarian Cancer

    Zhdanov, F., Vovk, V., Burford, B., Devetyarov, D., Nouretdinov, I. & Gammerman, A., 2009, Proceedings of the 12th Conference on Artificial Intelligence in Medicine. p. 375-379 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  243. Published

    On-line Prediction with Kernels and the Complexity Approximation Principle

    Gammerman, A., Kalnishkan, Y. & Vovk, V., 2004, Uncertainty in Artificial Intelligence, Proceedings of the Twentieth Conference. Chickering, M. & Halpern, J. (eds.). AUAI Press, p. 170-176

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  244. Published

    On-Line Probability, Complexity and Randomness

    Chernov, A., Shen, A., Vereshchagin, N. & Vovk, V., 2008, Proceedings of the Nineteenth International Conference on Algorithmic Learning Theory. Freund, Y., Gyorfi, L., Turan, G. & Zeugmann, T. (eds.). Berlin: Springer, Vol. 5254. p. 138-153 16 p. (Lecture Notes in Artificial Intelligence; vol. 5254).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  245. Published

    On-line Regression Competitive with Changing Predictors

    Busuttil, S. & Kalnishkan, Y., 2007, Algorithmic Learning Theory, 18th International Conference, ALT 2007, Proceedings: 4754 of Lecture Notes in Computer Science. Springer, p. 181-195 (Lecture Notes in Computer Science,; vol. 4754).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  246. Published

    On-line regression competitive with reproducing kernel Hilbert spaces

    Vovk, V., 2006, Theory and Applications of Models of Computation. Proceedings of the Third Annual Conference on Computation and Logic. Cai, J-Y., Cooper, S. & Li, A. (eds.). Berlin: Springer, Vol. 3959. p. 452-463 12 p. (Lecture Notes in Computer Science; vol. 3959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  247. Published

    Online Total Ionisation Dosimeter (TID) monitoring using semiconductor based radiation sensors in the isis proton synchrotron

    Harryman, D., Sep 2016, International Beam Instrumentation Conference 2016. p. 379-382 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  248. Published

    Open Game Tournaments in STARLITE

    Hopkins, J., Kafali, O. & Stathis, K., 4 May 2015, Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015). IFAAMAS, p. 1927-1928 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  249. Published

    Open Innovation and The Erosion of the Traditional Information Systems Project’s Boundaries

    Elbanna, A., 2008, IFIP WG 8.6.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  250. Published

    Opening the black boxes of TAM: Towards a mixed methods approach

    Wu, P. F., 1 Dec 2009, ICIS 2009 Proceedings - Thirtieth International Conference on Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  251. Published

    Opéra Comique: Identity and Manipulation

    Charlton, D., 2001, Reading Critics Reading: Opera and Ballet Criticism in France from the Revolution to 1848. Parker, R. & Smart, M. A. (eds.). Oxford: Oxford University Press, p. 13-45 32 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  252. Published

    Opéra-comique and the computer

    Charlton, D., 1992, Grétry et l'Europe de l'Opéra-Comique. Vendrix, P. (ed.). Liège: Mardaga, p. 367-78 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  253. Published

    Optical Information

    Soklakov, A. N. & Schack, R., 2003, Proceedings of the 6th International Conference on Quantum Communication, Measurement and Computing (QCMC'02). Shapiro, J. H. & Hirota, O. (eds.). Princeton, New Jersey: Rinton Press, p. 205-208

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  254. Published

    Optimal Contracts for Outsourced Computation

    Pham, V., Rezaei Khouzani, M. & Cid, C., Nov 2014, Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840. p. 79-98 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  255. Published

    Optimal Left-to-Right Pattern-Matching Automata

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1997, ALP '97 - HOA '97. Hanus, M., Heering, J. & Meinke, K. (eds.). Springer, Vol. 1298. p. 273-286 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  256. Published

    Optimal non-perfect uniform secret sharing schemes

    Farràs, O., Hansen, T., Kaced, T. & Padró, C., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Springer-Verlag, Vol. 8617 LNCS. p. 217-234 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  257. Published

    Optimal Recovery of Secret Keys from Weak Side Channel Traces

    Schindler, W. & Walter, C. D., 2009, 12th IMA Int. Conf. on Cryptography and Coding. Parker, M. G. (ed.). Springer, Vol. 5921. p. 446-468 23 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  258. Published

    Optimal regional consecutive leader election in mobile ad-hoc networks

    Chung, H. C., Robinson, P. & Welch, J. L., 2011, FOMC'11, The Seventh ACM SIGACT/SIGMOBILE International Workshop on Foundations of Mobile Computing (part of FCRC 2011), San Jose, CA, USA, June 9, 2011, Proceedings. p. 52-61 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  259. Published

    Optimal Strategies in Pushdown Reachability Games

    Hague, M. & Carayol, A., 20 Aug 2018, International Symposium on Mathematical Foundations of Computer Science. p. 1-14 14 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 117).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  260. Published

    Optimisation and validation of a minimum data set for the identification and quality control of EST expression libraries

    Milnthorpe, A. T. & Soloviev, M., 2013, BIOINFORMATICS 2013 - Proceedings of the International Conference on Bioinformatics Models, Methods and Algorithms. p. 278-281 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  261. Published

    Optimistic Fair-Exchange with Anonymity for Bitcoin Users

    Jayasinghe, D., Markantonakis, K. & Mayes, K., 11 Dec 2014, The 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). Guangzhou, China: IEEE Computer Society, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  262. Published

    Or gate Bayesian networks for text classification: A discriminative alternative approach to multinomial naive Bayes

    de Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 2008, Actas del XIV Congreso Español sobre Tecnologías y Lógica Fuzzy. p. 385-390 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  263. Published

    ORC: an Ontology Reasoning Component for Diabetes

    Kafali, O., Sindlar, M., Weide, T. V. D. & Stathis, K., 2013, 2nd International Workshop on Artificial Intelligence and Netmedicine (NetMed'13).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  264. Published

    Organic components in interplanetary dust particles and their implications for the synthesis of cometary organics

    Chan, Q. H. S., Franchi, I. A. & Wright, I. P., Jul 2017, 80th Annual Meeting of the Meteoritical Society 2017. 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  265. Published

    Organisational cultural factors and strategic sensemaking in the opportunity exploration and exploitation processes

    Wang, C. L., 2007, British Academy of Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. Published

    Organisational Success: Fact or Fiction

    Aboutalebi, R., 8 Oct 2009, In: Graduate Conference on Social Sciences and Management, the 3rd Graduate Conference on Social Sciences and Management, 8-9 October 2009, University of Bradford, England.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  267. Published

    Organisational Success: Impacts of Ethic/Values, Organisation’s Social Responsibility, and Culture

    Aboutalebi, R., 5 Nov 2009, In: European Parliament, the 6th Conference on Ethics in Business, Corporate Culture & Spirituality. 5-6 November 2009, European Parliament, Brussels.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  268. Published

    Organizational diversity and shared vision: resolving the paradox of opportunity exploration and exploitation

    Wang, C. L., 2007, Strategic Management Society Special Conference on Entrepreneurship.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  269. Published

    Organizational misfits and positive identity construction: Practitioner-academics as agents of change

    Lam, A., Jul 2018, 34th EGOS Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  270. Published

    Organizing Is Projects for Innovation: A Collective Mindfulness Perspective

    Elbanna, A. & Murray, D., 2009, The 15th Americas Conference on Information Systems . San Francisco

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  271. Published

    Organizing Large Scale Hacking Competitions

    Childers, N., Boe, B., Cavallaro, L., Cavedon, L., Cova, M., Egele, M. & Vigna, G., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  272. Published

    Organo-Carbonate Association in Carbonaceous Chondrites

    Chan, QHS., Zolensky, ME. & Fries, M., 2015, 78th Annual Meeting of the Meteoritical Society. Vol. 1856. 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  273. Published

    OSI and X.400 security

    Mitchell, C. J., 1990, Proceedings of Network Management '90, London, March 1990. London: Blenheim Online Ltd, p. 157-167 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  274. Published

    OSI and X.400 security

    Mitchell, C. J. & Walker, M., 1989, Proceedings of COMPSEC 89, London, October 1989. Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 145-163 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  275. Published

    Overcoming channel bandwidth constraints in secure SIM applications

    Macdonald, J. A., Sirett, W. G. & Mitchell, C. J., 2005, Security and privacy in the age of ubiquitous computing: Proceedings of IFIP Working Groups 11.2/8.8 Small Systems Security/Smart Cards Working Conference at 20th IFIP International Information Security Conference (SEC 2005), Makuhari-Messe, Chiba, Japan, May 2005. Sasaki, R., Qing, S. & Okamoto, E. (eds.). Springer-Verlag, p. 539–-549

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  276. Published

    Overcoming the utility problem in heuristic generation: Why time matters

    Barley, M., Franco, S. & Riddle, P., 10 Dec 2014, Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, ICAPS 2014: Portsmouth, New Hampshire, USA, June 21-26, 2014. Chien, S. A., Do, M. B., Fern, A. & Ruml, W. (eds.). AAAI Press, p. 38-46 9 p. (Proceedings International Conference on Automated Planning and Scheduling, ICAPS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  277. Published

    Overview of Fossil Beetles

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 153-163

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  278. Published

    Overview of Laserwire Beam Profile and Emittance Measurements for High Power Proton Accelerators

    Gibson, S., Boorman, G., Bosco, A., Gabor, C., Letchford, A., Pozimski, J., Savage, P. & Hofmann, T., 19 Sep 2013, 2nd International Beam Instrumentation Conference: 16-19 September 2013, Oxford, UK. p. 531-534 4 p. TUPF15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  279. Published

    Overview of Security Threats for Smart Cards in the Public Transport Industry

    Markantonakis, K., Mayes, K., Sauveron, D. & Askoxylakis, I. G., 2008, Proceedings of the 2008 IEEE International Conference on e-Business Engineering. Washington, DC, USA: IEEE Computer Society Press, p. 506-513 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  280. Published

    Oxygenation at the onset of the Neoproterozoic – evidence from North China

    Zhou, Y., Basu, A., Dickson, A., Zhu, M. & Shields, G. A., 2021, Goldschmidt 2021 .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  281. Published

    Packrat middens: archives of desert biotic history

    Elias, S., 1995, Encyclopedia of Environmental Biology. Nierenburg, W. A. (ed.). San Diego, California: Academic Press, Vol. 3. p. 19-35

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  282. Published

    PAIGE: Towards a hybrid-edge design for privacy-preserving intelligent personal assistants

    Liang, Y., O'Keeffe, D. & Sastry, N., 27 Apr 2020, EdgeSys 2020 - Proceedings of the 3rd ACM International Workshop on Edge Systems, Analytics and Networking, Part of EuroSys 2020. Association for Computing Machinery, Inc, p. 55-60 6 p. (EdgeSys 2020 - Proceedings of the 3rd ACM International Workshop on Edge Systems, Analytics and Networking, Part of EuroSys 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  283. Published

    Pairings for elliptic curves over finite commutative rings

    McKee, J. & Galbraith, S. D., 2005, Cryptography and Coding, Cirencester. p. 392-409 (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  284. Published

    PAL+: a lambda-free logical framework

    Luo, Z., 2000, Inter Workshop on Logical Frameworks and Meta-languages (LFM 2000).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  285. Published

    Palaeocurrent data representation in tectonically-driven basins: insight from Ager Basin (Miocene, Spain) and Catanzaro Strait (Pleistocene, Italy)

    Chiarella, D. & Gioia, D., 2013, Geophysical Research Abstracts. Vol. 15. p. 9937

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  286. Published

    Paleoclimatic studies: Insects and climate change

    Elias, S. A., 1996, SYMPOSIUM ON ENVIRONMENTAL APPLICATIONS. BOSTON: AMER METEOROLOGICAL SOC, p. 211-213 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  287. Published

    Paleoecology and Late Quaternary environments of the Colorado Rockies

    Elias, S., 2001, Structure and Function of an Alpine Ecosystem, Niwot Ridge, Colorado. Bowman, W. (ed.). London: Oxford University Press, p. 285-303

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  288. Published

    PANA/GSM authentication for Internet access

    Pagliusi, P. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 146-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  289. Published

    PANA/IKEv2: An Internet authentication protocol for heterogeneous access

    Pagliusi, P. & Mitchell, C. J., 2003, Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. Springer-Verlag, Vol. 2908. p. 135-149 15 p. (Lecture Notes in Computer Science; vol. 2908).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  290. Published

    Pancake: Frequency Smoothing for Encrypted Data Stores

    Grubbs, P., Khandelwal, A., Lacharite, M-S., Brown, L., Li, L., Agarwal, R. & Ristenpart, T., Aug 2020, 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, p. 2451-2468 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  291. Published
  292. Published

    Paradoxes of Visibility in Activism: The Inter-play of Online Power Dynamics Between Activists and the State in the Egyptian Revolution

    Azer, E., Zheng, Y. & Harindranath, G., 29 Sep 2018, The 12th Mediterranean Conference on Information Systems. Corfu, Greece

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  293. Published

    Parameter Learning in Bayesian Belief Networks

    Luo, Z. & Gammerman, A., 1992, Proceeding of IPMU'92. p. 25-28

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  294. Published

    Parameterised Multiparty Session Types

    Yoshida, N., Denielou, P-M., Bejleri, A. & Hu, R., 2010, FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATIONAL STRUCTURES, PROCEEDINGS. Ong, L. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 128-145 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  295. Published

    Parameterised Pushdown Systems with Non‐Atomic Writes

    Hague, M., 2011, FSTTCS: Foundations of Software Technology and Theoretical Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  296. Published

    Parameterized Algorithms for Zero Extension and Metric Labelling Problems

    Reidl, F. & Wahlstrom, M., 2018, ICALP 2018 Track A. Vol. 107. p. 94:1-94:14 14 p. (Leibniz International Proceedings in Informatics ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  297. Published

    Parameterized and Approximation Algorithms for the Load Coloring Problem

    Barbero, F., Gutin, G., Jones, M. & Sheng, B., 9 Nov 2015, 10th International Symposium on Parameterized and Exact Computation. Schloss Dagstuhl –Leibniz Center for Informatics, p. 43-54 12 p. (LIPIcs).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  298. Published

    Parameterized Complexity and Kernelizability of Max Ones and Exact Ones Problems

    Kratsch, S., Marx, D. & Wahlström, M., 2010, Mathematical Foundations of Computer Science 2010 : 35th International Symposium, MFCS 2010. Hlinený, P. & Kucera, A. (eds.). Brno, Czech Republic: Springer, Vol. 6281. p. 489-500 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  299. Published

    Parameterized Complexity of Conflict-Free Set Cover

    Jacob, A., Majumdar, D. & Raman, V., 1 Jul 2019, Computer Science – Theory and Applications - 14th International Computer Science Symposium in Russia, CSR 2019, Proceedings. Kucherov, G. & van Bevern, R. (eds.). Springer-Verlag, Vol. 11532 LNCS. p. 191-202 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11532 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  300. Published

    Parameterized Complexity of Deletion to Scattered Graph Classes

    Jacob, A., Majumdar, D. & Raman, V., 4 Dec 2020, The 15th International Symposium on Parameterized and Exact Computation. LIPIcs, Vol. 180. p. 1-17 17 p. 18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  301. Published

    Parameterized Complexity of MaxSat Above Average

    Crowston, R., Gutin, G., Jones, M., Raman, V. & Saurabh, S., 2012, LATIN 2012: Lect. Notes Comput. Sci.. Springer-Verlag, Vol. 7256. p. 184--194

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  302. Published

    Parameterized Complexity of the $k$-Arc Chinese Postman Problem

    Gutin, G., Jones, M. & Sheng, B., 6 Mar 2014, European Symposium on Algorithms 2014. Springer-Verlag, Vol. 8737. p. 530-541 (Lecture Notes in Computer Science; vol. 8737).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  303. Published

    Parameterized Directed k-Chinese Postman Problem and k Arc-Disjoint Cycles Problem on Euler Digraphs

    Gutin, G., Jones, M., Sheng, B. & Wahlström, M., 2014, Proceedings of WG 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  304. Published

    Parameterized Pre-Coloring Extension and List Coloring Problems

    Gutin, G., Majumdar, D., Ordyniak, S. & Wahlström, M., 27 Feb 2020, LIPIcs, Proceedings of STACS 2020. Vol. 154. p. 1-18 18 p. 15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  305. E-pub ahead of print

    Parameterized Resiliency Problems via Integer Linear Programming

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 14 Apr 2017, (E-pub ahead of print) CIAC 2017, 10th International Conference on Algorithms and Complexity May 26, 2017 - May 28, 2017. Springer, Vol. 10236. p. 164-176 13 p. (Lecture Notes in Computer Science; vol. 10236).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  306. Published

    Parameterized Study of the Test Cover Problem

    Crowston, R., Gutin, G., Jones, M., Saurabh, S. & Yeo, A., 2012, MFCS 2012: Lecture Notes in Computer Science . Vol. 7464. p. 283-295

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  307. Published

    Parameterized Two-Player Nash Equilibrium

    Hermelin, D., Huang, C-C., Kratsch, S. & Wahlström, M., 2011, Graph-Theoretic Concepts in Computer Science : 37th International Workshop, WG 2011. Kolman, P. & Kratochvíl, J. (eds.). Teplá Monastery, Czech Republic: Springer, Vol. 6986. p. 215-226 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  308. Published

    Parent Subsidiary Relationship of EM MNCs: The Chinese Experience

    Rui, H., 2011, Proceedings of the 53rd Annual Meeting of the Academy of International Business: "International Business for Sustainable World Development". Makino, S. & Kiyak, T. (eds.). 2011 Academy of International Business

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  309. Published

    Pareto Bid Estimation for Multi-Issue Bilateral Negotiation under User Preference Uncertainty

    Bagga, P., Paoletti, N. & Stathis, K., 5 Aug 2021, FUZZ-IEEE 2021. IEEE Xplore

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  310. Published

    PAriCheck: an efficient pointer arithmetic checker for C programs

    Younan, Y., Philippaerts, P., Cavallaro, L., Sekar, R., Piessens, F. & Joosen, W., 13 Apr 2010, ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. Beijing, China: ACM, p. 145-156 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  311. Published

    Parity to Safety in Polynomial Time for Pushdown and Collapsible Pushdown Systems

    Hague, M., Meyer, R., Muskalla, S. & Zimmermann, M., 20 Aug 2018, International Symposium of Mathematical Foundations of Computer Science. p. 1-15 15 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 117).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  312. Published

    Partial Awareness

    Piermont, E. & Joseph Y. Halpern, 2019, Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  313. Published

    Partial key recovery attacks on XCBC, TMAC and OMAC

    Mitchell, C. J., 2005, Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings. Smart, N. (ed.). Springer-Verlag, Vol. 3796. p. 155-167 13 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  314. Published

    Partially Distribution-Free Learning of Regular Languages from Positive Samples

    Clark, A. & Thollard, F., 2004, Proceedings of COLING. p. 85-91

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  315. Published

    Partially Preserved Colonnades in Greek Architecture: the Probability of Matching Column Drums

    Mustonen, S. & Pakkanen, J., 2004, Making the Connection to the Past. CAA 99: Computer Applications and Quantitative Methods in Archaeology. Proceedings of the 27th Conference, Dublin, April 1999. Fennema, K. & Kamermans, H. (eds.). Leiden, p. 57–59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  316. Published

    Participation, dialogue and curriculum development in school based AIDS education

    McLaughlin, C., Cobbett, M. & Kiragu, S., 2012, AIDS 2012.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  317. Published

    Particle Tracking for the FETS Laser Wire Emittance Scanner

    Pozimski, J. & Gibson, S., 19 Sep 2013, 2nd International Beam Instrumentation Conference. p. 503-506 4 p. TUPF05

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  318. Published

    Path Conditions and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 2014, 19th ACM Symposium on Access Control Models and Technologies. ACM, p. 187-198

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  319. Published

    Path-Contractions, Edge Deletions and Connectivity Preservation

    Gutin, G., Ramanujan, M. S., Reidl, F. & Wahlstrom, M., 3 Sep 2017, The 25th Annual European Symposium on Algorithms (ESA 2017). p. 1-13 13 p. 47. (LIPICS; vol. 87).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  320. Published

    Patient centred approaches to improving self care

    Bradley, C., 2002, Cyberconference: Compliance, concordance and control – Measures to improve outcome [Website not available].

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  321. Published

    Pattern recognition and density estimation under the general i.i.d assumption

    Nouretdinov, I., Vovk, V., Vyugin, M. & Gammerman, A., 2001, Proceedings of the Fourteenth Annual Conference on Computational Learning Theory and Fifth European Conference on Computational Learning Theory. Helmbold, D. & Williamson, B. (eds.). London: Springer, p. 337-353 17 p. (Lecture Notes in Artificial Intelligence; vol. 2111).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. Published

    Patterns for Coordination

    Andrade, L. F., Fiadeiro, J. L., Gouveia, J., Lopes, A. & Wermelinger, M., 2000, COORDINATION. Springer, Vol. 1906. p. 317-322 6 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  323. Published

    Pay Cuts vs Downsizing: How job security and Pay level related perceptions affect work attitudes of remaining employees

    Sen Gupta, S. & Yoon, Y. J., 26 Jun 2019, Society for Advancement of Socio Economics Conference . Society for Advancement of Socio Economics, NY, USA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  324. Unpublished

    Pentecostalism & Politics in Africa: The Case of Zimbabwe

    Zigomo, K., 10 Sep 2018, (Unpublished) Interdisciplinary thematic panels.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  325. Published

    Perceived Group diversity, Communication, and Social Integration: The Moderating Effect of Group Interdependence and Group Longevity

    Alsolamy, M. & Tsai, C-J., 14 Sep 2015, BAM 2015 Conference Proceedings . British Academy of Management, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  326. Published

    Perceiving the Gravitational Vertical in 3D-Space

    Arshad, I., Gallagher, M. & Ferrè, E. R., Jan 2018, Poster presented at the Experimental Psychology Society January 2019 Meeting, London, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  327. Published

    Perceiving the Gravitational-Vertical: Head Versus Torso Contributions to the Aubert Effect

    Arshad, I., Gallagher, M. & Ferrè, E. R., Jan 2018, Poster presented at the Experimental Psychology Society January 2018 Meeting, London, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  328. Published

    Perceptions of martyrdom and terrorism amongst British Muslims

    Ansari, H., Cinnirella, M., Rogers, M. B., Loewenthal, K. M. & Lewis, C. A., 2006, Proceedings of the British Psychological Society Seminar Series Aspects of Terrorism and Martyrdom. Rogers, M. B., Lewis, C. A., Loewenthal, K. M., Cinnirella, M., Amlôt, R. & Ansari, H. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  329. Published

    Perfect Forests in Graphs and Their Extensions

    Gutin, G. & Yeo, A., 18 Aug 2021, 46th International Symposium on Mathematical Foundations of Computer Science: LIPIcs (Leibniz International Proceedings in Informatics). Schloss Dagstuhl –Leibniz Center for Informatics, p. 1-13 13 p. 54

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  330. Published

    Performance Analysis of Reinforcement Learning for Achieving Context Awareness and Intelligence in Mobile Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  331. Published

    Performance analysis of Reinforcement Learning for achieving context-awareness and intelligence in Cognitive Radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings. p. 1046-1053 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  332. Published

    Performance Appraisal: Much ado about nothing

    Edwards, P. & Sen Gupta, S., 2017, Society for Advancement of Socio Economics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  333. Published

    Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element

    Umar, A., Mayes, K. & Markantonakis, K., 20 Feb 2015, 2015 First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  334. Published

    Peroxy radical intercomparison exercise: A joint TOR/OCTA Experiment at Schauinsland 1994

    VoltThomas, A., Gilge, S., Heitlinger, M., Mihelcic, D., Musgen, P., Patz, H. W., Schultz, M., Borrell, P., Borrell, P. M., Slemr, J., Behmann, T., Burrows, J. P., Weissenmayer, M., Arnold, T., Klupfel, T., Perner, D., Cantrell, C. A., Shetter, R., Carpenter, L. J., Clemitshaw, K. C. & 1 others, Penkett, S. A., 1997, PROCEEDINGS OF EUROTRAC SYMPOSIUM '96 - TRANSPORT AND TRANSFORMATION OF POLLUTANTS IN THE TROPOSPHERE, VOL 2. SOUTHAMPTON: COMPUTATIONAL MECHANICS PUBLICATIONS LTD, p. 621-626 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  335. Published

    Pervasive Healthcare Using Self-Healing Agent Environments

    Bromuri, S., Ignaz Schumacher, M. & Stathis, K., 2011, HIGHLIGHTS IN PRACTICAL APPLICATIONS OF AGENTS AND MULTIAGENT SYSTEMS. Perez, JB., Corchado, JM., Moreno, MN., Julian, V., Mathieu, P., CanadaBago, J., Ortega, A. & Caballero, AF. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 159-166 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  336. E-pub ahead of print

    Philanthropy on the Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N. & Mayes, K., 21 Jun 2018, (E-pub ahead of print) The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017). Springer, p. 25-38 14 p. (Lecture Notes in Computer Science (LNCS); vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  337. Published

    Phoenix: DGA-Based Botnet Tracking and Intelligence

    Schiavoni, S., Maggi, F., Cavallaro, L. & Zanero, S., 10 Jul 2014, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). London: Springer, Vol. 8550. p. 192-211 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  338. Published

    Photonic Crystal Fibre Laser for Electron Beam Emittance Measurement

    Corner, L., Nevay, L. J. & Walczak, R., 1 Dec 2011, IPAC 2011 - 2nd International Particle Accelerator Conference. p. 577-579 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  339. Published

    Photoproduction of neutral strange hadrons at ZEUS

    Boogert, S. & ZEUS Collaboration, 2001, PHOTON 2001. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  340. Published

    Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids

    Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 52-68 17 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  341. Published

    Physiological vs. Social complexity in software design

    Fiadeiro, J. L., 1 Jan 2006, Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS. p. 3 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  342. Published

    Picking vs. Guessing Secrets: A Game-Theoretic Analysis

    Khouzani, A., Mardziel, P., Cid, C. & Srivatsa, M., 2015, IEEE 28th Computer Security Foundations Symposium. p. 243-257 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  343. Published

    PKI implementation issues in B2B e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2003, EICAR Conference Best Paper Proceedings, Copenhagen, Denmark, May 2003. Gattiker, U. E. (ed.). 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  344. Published

    Placing and scaling ethical choices: ethical consumption and ethical public procurement

    Kleine, D., 2013, Proceedings of the 11th Congress of the European Society for Agricultural and Food Ethics. EurSafe

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  345. Published

    Plaintext Recovery Attacks Against SSH

    Albrecht, M. R., Paterson, K. G. & Watson, G. J., 2009, Proceedings of the 2009 30th IEEE Symposium on Security and Privacy: 17-20 May 2009 / Berkley, CA, US. IEEE Computer Society, p. 16-26 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  346. Published

    Plaintext Recovery Attacks Against WPA/TKIP

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. p. 325-349 25 p. (Lecture Notes in Computer Science; vol. 8540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  347. Published

    Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR

    Paterson, K. G. & Watson, G. J., 2010, Advances in Cryptology – EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010: Proceedings. Gilbert, H. (ed.). Springer, p. 345-361 17 p. (Lecture Notes in Computer Science; vol. 6110).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  348. Published

    Plaintext-Recovery Attacks Against Datagram TLS

    Alfardan, N. & Paterson, K., 2012, Network and Distributed System Security Symposium. The Internet Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  349. Published

    Plant macrofossils from rodent middens

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 3. p. 2356-2367

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  350. Unpublished

    Platforming place narratives with location-based games: playful and participatory storytelling using What3Words

    Lowe, J., 12 Jun 2020, (Unpublished) 20 Years of Seeing with GPS: Perspectives and Future Directions.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  351. Unpublished

    Platformization of Technology dominance: the case study of developing cryptocurrencies on GitHub

    Eshraghian, F. & Hafezieh, N., 2019, (Unpublished) The 6th Innovation in Information Infrastructures Workshop, University of Surrey, Surrey, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  352. Published

    Playing with Agent Coordination Patterns in MAGE

    Urovi, V. & Stathis, K., 2010, Lecture Notes in Computer Science. Springer, Vol. 6069. p. 86-101 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  353. Published

    Plug-in martingales for testing exchangeability on-line

    Fedorova, V., Gammerman, A., Nouretdinov, I. & Vovk, V., 2012, Proceedings of the 29th International Conference on Machine Learning (ICML-12). Langford, J. & Pineau, J. (eds.). Omnipress, p. 1639-1646 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  354. Published

    POLE-ZERO SYSTEM-IDENTIFICATION USING GENETIC ALGORITHMS

    FLOCKTON, S. J. & WHITE, M. S., 1993, PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON GENETIC ALGORITHMS. Forrest, S. (ed.). SAN MATEO: MORGAN KAUFMANN PUB INC, p. 531-535 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  355. Published

    Policy Conflict Resolution in IoT via Planning

    Göynügür, E., Bernardini, S., de Mel, G., Talamadupula, K. & Şensoy, M., 2017, Canadian Conference on Artificial Intelligence: AI 2017: Advances in Artificial Intelligence. Springer, Vol. 10233. p. 169-175 7 p. (Lecture Notes in Computer Science; vol. 10233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  356. Published

    Polynomial Kernels and User Reductions for the Workflow Satisfiability Problem

    Gutin, G., Kratsch, S. & Wahlström, M., 2014, Proceedings of IPEC 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  357. Published

    Polynomial Time Learning of Some Multiple Context-Free Languages with a Minimally Adequate Teacher

    Yoshinaka, R. & Clark, A., 2010, Proceedings of Formal Grammar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  358. Published

    Polynomially Closed Co-clones

    Lagerkvist, V. & Wahlström, M., 2014, Proceedings of ISMVL 2014: IEEE 44th International Symposium on Multiple-Valued Logic. IEEE, p. 85-90 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  359. Published

    Position Statement on the Psychological Aspects of Diabetes Education and Care

    Gallichan, M., Anderson, B., Bradley, C., Kilmartin, J., Peyrot, M. & Dunning, T., 2000, International Consensus Position Statements for Diabetes Education. London: Class publishing

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  360. Published

    Postglacial Beetle Records from North America

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 275-286

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  361. Published

    Post-Quantum Certificates for Electronic Travel Documents

    Pradel, G. & Mitchell, C. J., 24 Dec 2020, Proceedings of DETIPS 2020 (Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy), September 18 2020. Springer, p. 56-73 18 p. (Lecture Notes in Computer Science; vol. 12580).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  362. Published

    Posturography Platform and Balance Control Training and Research System Based on FES and Muscle Synergies

    Galeano Galeano, D., Brunetti, F., Torricelli, D., Piazza, S. & Pons, J. L., 2013, Neurotechnology, Electronics, and Informatics. Londral, A. R., Encarnação, P. & Pons Rovira, J. L. (eds.). Springer-Verlag, Vol. 13. ( Springer Series in Computational Neuroscience; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  363. Published

    Potential based reward shaping for hierarchical reinforcement learning

    Gao, Y. & Toni, F., 25 Jul 2015, IJCAI'15 Proceedings of the 24th International Conference on Artificial Intelligence. AAAI Press, p. 3504-3510 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  364. Published

    Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.

    Francis, L., Hancke, G. P., Mayes, K. & Markantonakis, K., 2009, ICITST'09. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  365. Published

    POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Aug 2017, USENIX Workshop on Offensive Technologies (WOOT). USENIX, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  366. Published

    Power Quality Ancillary Services Support from Customer-owned Electric Vehicles in Low Voltage Distribution Networks

    Luo, H. & Nduka, O., 13 Oct 2020, 2020 IEEE PES Asia-Pacific Power & Energy Engineering Conference (APPEEC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  367. E-pub ahead of print

    Practical Attacks Against the Walnut Digital Signature Scheme

    Beullens, W. & Blackburn, S., 27 Oct 2018, (E-pub ahead of print) Advances in Cryptology - ASIACRYPT 2018. Springer, p. 35-61 27 p. (Lecture Notes in Computer Science; vol. 11272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  368. Published

    Practical attacks on proximity identification systems

    Hancke, G., 2006, IEEE Symposium on Security and Privacy . p. 328-333

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  369. Published

    Practical Automated Vulnerability Monitoring Using Program State Invariants

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 23 Jun 2013, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '13). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  370. Published

    Practical investment with the long-short game

    Al-Baghdadi, N., Lindsay, D., Kalnishkan, Y. & Lindsay, S., Sep 2020, Conformal and Probabilistic Prediction and Applications: COPA 2020. Proceedings of Machine Learning Research, Vol. 128. p. 209-228 20 p. (Proceedings of Machine Learning Research ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  371. Published

    Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, Radio Frequency Identification: Security and Privacy Issues: RFIDSec 2010. Ors Yalcin, S. (ed.). Springer Berlin / Heidelberg, Vol. 6370. p. 35-49 15 p. (Lecture Notes in Computer Science; vol. 6370).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  372. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., Nov 2012, The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8. p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  373. Published

    Practical solutions to key escrow and regulatory aspects

    Jefferies, N., Mitchell, C. J. & Walker, M., 1996, Proceedings of Public Key Solutions '96, Zurich, Switzerland, September/October 1996.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  374. Published

    Practical 'what-if?' modelling for resource management of corporate voice-data networks

    Pitts, J., Luo, Z. & Cosmas, J., 1999, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 3842. p. 132-141

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  375. Published

    Practice Makes Perfect: Motivating Confident Privacy Protection Practices

    Coles-Kemp, L. & Kani-Zabihi, E., 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). IEEE, p. 866-871 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  376. Submitted

    Precarity Amongst Service Managers in the NHS: a review in the midst of austerity and Brexit

    Zahmatkesh, M., 2017, (Submitted) 20th Annual Irish Academy of Management Conference 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  377. Published

    Precise Bounds for Montgomery Modular Multiplication and some Potentially Insecure RSA Moduli

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 30-39 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  378. Published

    Precise Instruction-Level Side Channel Profiling of Embedded Processors

    Msgna, M., Markantonakis, K. & Mayes, K., 5 May 2014, Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Vol. 8434. p. 129-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  379. Published

    Precise parameter synthesis for stochastic biochemical systems

    Ceska, M., Dannenberg, F., Kwiatkowska, M. & Paoletti, N., 2014, Computational Methods in Systems Biology. p. 86-98 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  380. Published

    Precise static analysis of untrusted driver binaries

    Kinder, J. & Veith, H., 2010, Proc. 10th Int. Conf. Formal Methods in Computer Aided Design (FMCAD 2010). p. 43-50

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  381. Published

    Precision Modelling of Energy Deposition in the LHC using BDSIM

    Walker, S., Abramov, A., Boogert, S., Gibson, S., Pikhartova, H. & Nevay, L., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. MOPRB064

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  382. Published

    Predicting Cognitive Recovery of Stroke Patients from the Structural MRI Connectome Using a Naïve Bayesian Tree Classifier

    Dacosta-Aguayo, R., Stephan-Otto, C., Auer, T., Clemente, I., Davalos, A., Bargallo, N., Mataro, M. & Klados, M. A., 2017, Proceedings - 2017 IEEE 30th International Symposium on Computer-Based Medical Systems, CBMS 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-June. p. 413-418 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  383. Published

    Prediction of long-range dependent time series data with performance guarantee

    Dashevskiy, M. & Luo, Z., 2009, Stochastic Algorithms: Foundations and Applications, Lecture Notes in Computer Science. Vol. 5792. p. 31-45

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  384. Published

    Prediction of Metabolic Transformations using Cross Venn-ABERS Predictors

    Arvidsson, S., Spjuth, O., Carlsson, L. & Toccaceli, P., 31 May 2017, Proceedings of Machine Learning Research. Vol. 60. p. 118-131 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  385. Published

    Prediction with advice of unknown number of experts

    Chernov, A. & Vovk, V., 2010, Proceedings of the Twenty Sixth Conference on Uncertainty in Articial Intelligence. Grunwald, P. & Spirtes, P. (eds.). Arlington, VA: AUAI Press, p. 117-125 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  386. Published

    Prediction with Confidence Based on a Random Forest Classifier

    Devetyarov, D. & Nouretdinov, I., 2010, Aritificial Intelligence and Innovations: Proceedings od 6th IFIP WG 12.5 International Conference. p. 37-44 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  387. Published

    Prediction with expert advice for the Brier game

    Vovk, V. & Zhdanov, F., 2008, Proceedings of the Twenty Fifth International Conference on Machine Learning. McCallum, A. & Roweis, S. (eds.). New York: ACM Press, p. 1104-1111 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  388. Published

    Prediction with Expert Advice for Value at Risk

    Dzhamtyrova, R. & Kalnishkan, Y., 28 Sep 2020, Proceedings of The 2020 International Joint Conference on Neural Networks (IJCNN 2020). IEEE, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  389. Published

    Prediction with Expert Evaluators' Advice

    Chernov, A. & Vovk, V., 2009, Proceedings of the Twentieth International Conference on Algorithmic Learning Theory. Gavalda, R., Lugosi, G., Zeugmann, T. & Zilles, S. (eds.). Springer, p. 8-22 15 p. (Lecture Notes in Artificial Intelligence; vol. 5809).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  390. Published

    Predictions with confidence in applications,

    Dashevskiy, M. & Luo, Z., 2009, Lecture Notes in Computer Science. Vol. 5632. p. 775-786

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  391. Published

    Predmetnyi mir v romane D.S. Merezhkovskogo 'Piotr i Aleksei' (iz trilogii 'Khristos i Antikhrist')

    Poljakowa, N., 2005, Stavropol'skii almanakh rossiiskogo obshchestva intellektual'noi istorii: Materialy mezhdunarodnoi nauchnoi konferentsii ''Fakt-Sobytie' v razlichnykh diskursakh' (Piatigorsk, 26-27 Marta 2005. Special Edition ed. Stavropol': Izdatel'stvo Stavropol'skogo Gosudarstvennogo Universiteta, Vol. 8. p. 208-214

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  392. Published

    Preferred Cross-continental Strategies

    Aboutalebi, R. & Lobo, R., 27 Jun 2016, In: AIB (Academy of International Business), 58th annual conference of AIB: The Locus of Global Innovation. 27-30 June 2016, New Orleans, Louisiana, U.S.A.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  393. Published

    Preforming of fibre bridging for improved damage tolerance

    Potluri, P., Arshad, M., Jetavat, D., Jamshidi, P. & Hogg, P., 1 Dec 2011, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  394. Published

    Preprocessing of Min Ones Problems: A Dichotomy

    Kratsch, S. & Wahlström, M., 2010, Automata, Languages and Programming : 37th International Colloquium, ICALP 2010. Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F. & Spirakis, P. G. (eds.). Bordeaux, France: Springer, Vol. 6198. p. 653-665 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  395. Published

    Prequential probability: game-theoretic = measure-theoretic

    Vovk, V., 2009, Proceedings of the 2009 Joint Statistical Meetings: Section on Risk Analysis, Session on Predictive and Prequential Statistics. Alexandria, VA: American Statistical Association, p. 3859-3872 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  396. Published

    Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection

    Deo, A., Dash, S., Suarez de Tangil Rotaeche, G., Vovk, V. & Cavallaro, L., 28 Oct 2016, ACM Workshop on Artificial Intelligence and Security. Vienna, Austria: ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  397. Published

    Preservation and Reflection in Specification

    Lopes, A. & Fiadeiro, J. L., 1997, AMAST. Springer, Vol. 1349. p. 380-394 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  398. Published

    Preservation of coralline-algal reef frameworks

    Bosence, D., 1985, Proceedings of The Fifth International Coral Reef Congress. Gabrie, C. & Harmelin, M. (eds.). Vol. 6. p. 623-628 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  399. Published

    PRESS - a probabilistic reasoning expert system shell

    Luo, Z. & Gammerman, A., 1991, European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Lecture Notes in Computer Science. Kruse, R. & Siegel, P. (eds.). Springer-Verlag, Vol. 548. p. 232-237

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  400. Published

    Preventing Failure of Strategy Implementation

    Aboutalebi, R., 28 Oct 2015, In: EAMSA (Euro-Asia Management Studies Association), the 32nd Annual Conference of EAMSA: Theory and Practice in Bringing Europe and Asia- Contemporary Challenges in International Marketing. 28-31 October 2015, SOAS, University of London, England, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  401. Published

    Preventing phishing attacks using trusted computing technology

    Alsaid, A. & Mitchell, C. J., 2006, Proceedings of INC 2006, Sixth International Network Conference, Plymouth, UK, July 2006. p. 221-228

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  402. Published

    Preventing relay attacks in mobile transactions using infrared light

    Gurulian, I., Akram, R., Markantonakis, K. & Mayes, K., 3 Apr 2017, SAC '17 Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, p. 1724-1731 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  403. Published

    Prime and Prejudice: Primality Testing Under Adversarial Conditions

    Albrecht, M., Massimo, J., Paterson, K. & Somorovsky, J., 8 Oct 2018, CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. p. 281-298 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  404. Published

    Priorities in corporate sustainability reporting: Does East meet West, does South converge on North?

    Barkemeyer, R. & Preuss, L., Aug 2011, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  405. Published

    Priors in Quantum Bayesian Inference

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J. -A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 255-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  406. E-pub ahead of print

    PRISM-PSY: Precise GPU-Accelerated Parameter Synthesis for Stochastic Systems

    Ceska, M., Pilar, P., Paoletti, N., Brim, L. & Kwiatkowska, M., 9 Apr 2016, (E-pub ahead of print) Tools and Algorithms for the Construction and Analysis of Systems. Chechik, M. & Raskin, J-F. (eds.). p. 367-384 18 p. (Lecture Notes in Computer Science; vol. 9636).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  407. Published

    Privacy Risks in Resource Constrained Smart Micro-Grids

    Ambassa, P. L., Kayem, A. V. D. M., Wolthusen, S. D. & Meinel, C., 23 Jul 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2018. Ogiela, L., Enokido, T., Ogiela, M. R., Javaid, N., Barolli, L. & Takizawa, M. (eds.). Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 527-532 6 p. 8418124

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  408. Published

    Privacy Violations in Constrained Micro-Grids: Adversarial Cases

    Ambassa, P., Kayem, A. V. D. M., Meinel, C. & Wolthusen, S., 19 May 2016, Proceedings of the 2016 30th International Conference on Advanced Information Networking and Applications Workshops (AINA 2016). IEEE Press, p. 601-606 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  409. Published

    Privacy-preserving biometric matching using homomorphic encryption

    Pradel, G. & Mitchell, C., 22 Oct 2021, roceedings: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China. Zhao, L., Kumar, N., Hsu, R. C. & Zou, Z. (eds.). Los Alamitos: IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  410. Published

    Private Outsourced Kriging Interpolation

    Alderman, J., Curtis, B., Farràs Ventura, O., Martin, K. & Ribes-González, J., 7 Apr 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 75-90 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  411. Published

    Probabilistic Contract Compliance for Mobile Applications

    Dini, G., Martinelli, F., Saracino, A. & Sgandurra, D., 1 Sep 2013, 2013 International Conference on Availability, Reliability and Security. p. 599-606 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  412. Published

    Probabilistic Naming of Functions in Stripped Binaries

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Dec 2020, Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020. Association for Computing Machinery, Inc, p. 373-385 13 p. 3427265. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  413. Published

    Probabilistic Reasoning in Mixed Models Using Bayesian Belief Networks and Its Application

    Luo, Z., 1992, Proceedings of 10th European Conference on Artificial Intelligence (ECAI 92),. p. 3-7

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  414. Published

    Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion

    Al-Kuwari, S. & Wolthusen, S. D., May 2010, Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference (CMS 2010). Springer-Verlag, p. 16-27

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  415. Published

    Probability theory for the Brier game

    Vovk, V., 1997, Proceedings of the Workshop on Algorithmic Learning Theory. Li, M. & Maruoka, A. (eds.). Springer, p. 323-338 16 p. (Lecture Notes in Computer Science; vol. 1316).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. Published

    Procrustes Analysis of Diffusion Tensor Data

    Zhou, D., Dryden, IL., Koloydenko, A. & Bai, L., 2009, Proceedings 17th Scientific Meeting, International Society for Magnetic Resonance in Medicine.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  417. Published

    Producing Enactable Protocols in Artificial Agent Societies

    Lekeas, G., Kloukinas, C. & Stathis, K., 18 Nov 2011, Agents in Principle, Agents in Practice (PRIMA'11). p. 311-322 (Lecture Notes in Computer Science; vol. 7047/2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  418. Published

    Program specification and data refinement in type theory

    Luo, Z., 1991, Proc. of the Fourth Inter. Joint Conf. on the Theory and Practice of Software Development (TAPSOFT), LNCS 493.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  419. Published

    Programmable Hash Functions in the Multilinear Setting

    Freire, E. S. V., Hofheinz, D., Paterson, K. G. & Striecks, C., Aug 2013, CRYPTO 2013 (1). Canetti, R. & J. G. (eds.). Springer, Vol. 8042. p. 513-530 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  420. Published

    PROGRESS TOWARDS AN ELECTRONIC ARRAY ON LIQUID HELIUM

    Rees, D. G., Glasson, P., Meeson, P. J., Simkins, L. R., Antonov, V., Frayne, P. G. & Lea, M. J., 2008, CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPRINTRONICS. Takayanagi, H., Nitta, J. & Nakano, H. (eds.). SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 353-358 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  421. E-pub ahead of print

    Proof Assistants for Natural Language Semantics

    Chatzikyriakidis, S. & Luo, Z., 10 Nov 2016, (E-pub ahead of print) Logical Aspects of Computational Linguistics. Celebrating 20 Years of LACL (1996–2016) : 9th International Conference, LACL 2016, Nancy, France, December 5-7, 2016, Proceedings. Springer Heidelberg, Vol. 10054. p. 85-98 14 p. (Lecture Notes in Computer Science; vol. 10054).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  422. Published

    Proof complexity lower bounds from algebraic circuit complexity

    Forbes, M., Shpilka, A., Tzameret, I. & Wigderson, A., 19 May 2016, 31st Conference on Computational Complexity (CCC 2016). Dagstuhl, Germany: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 50. p. 1-17 17 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 50).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  423. Published

    Proof-theoretic conceptual modeling – the NIAM case-study

    SERNADAS, C., FIADEIRO, J., MEERSMAN, R. & SERNADAS, A., 1989, INFORMATION SYSTEM CONCEPTS : AN IN-DEPTH ANALYSIS. FALKENBERG, ED. (ed.). AMSTERDAM: ELSEVIER SCIENCE PUBL B V, p. 1-30 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. Published

    PROSOCS: a platform for programming software agents in computational logic

    Stathis, K., Kakas, A. C., Lu, W., emetriou, N. D., Endriss, U. & Bracciali, A., 1 Apr 2004, Proceedings of the Fourth International Symposium ``From Agent Th eory to Agent Implementation'' (AT2AI-4 -- EMCSR'2004 Session M). Müller, J. & Petta, P. (eds.). p. 523-528 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  425. E-pub ahead of print

    Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting

    Fraser, A. & Quaglia, E., 8 Oct 2020, (E-pub ahead of print) SAC 2020 proceedings. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  426. Published

    PROTOSS: A run time tool for detecting PRivacy viOlaTions in Online Social networkS (Short Paper)

    Kafali, O., Gunay, A. & Yolum, P., 2012, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  427. Published

    Prototyping symbolic execution engines for interpreted languages

    Bucur, S., Kinder, J. & Candea, G., Feb 2014, ASPLOS '14: Proceedings of the 19th international conference on Architectural support for programming languages and operating systems. ACM, p. 239-254 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  428. Published

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Mitchell, C. J., 3 Apr 2021, Security and Privacy: Select Proceedings of ICSP 2020. Stănică, P., Gangopadhyay, S. & Debnath, S. K. (eds.). Singapore: Springer-Verlag, p. 151-162 12 p. (LNEE; vol. 744).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  429. Published

    Provably Secure Key Assignment Schemes from Factoring

    Freire, E. S. V. & Paterson, K. G., 2011, ACISP. Parampalli, U. & Hawkes, P. (eds.). Springer, Vol. 6812. p. 292-309 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  430. Published

    Provenance of Mesozoic sandstones in the Banda Arc, Indonesia

    Zimmermann, S. & Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-301 1-13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  431. Published

    Proving memory safety of floating-point computations by combining static and dynamic program analysis

    Godefroid, P. & Kinder, J., 2010, Proc. 19th Int. Symp. Software Testing and Analysis (ISSTA 2010). ACM, p. 1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  432. Published

    Proving Random Formulas in Propositional Logic

    Tzameret, I. & Muller, S., 2013, Logic Across the University: Foundations and Application: Proceedings of the Tsinghua Logic Conference. van Benthem, J. & Liu, F. (eds.). London: College Publications London, Vol. 47. p. 201-208 8 p. (Studies in Logic).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  433. Published

    Provisioning Software with Hardware-Software Binding

    Lee, R., Markantonakis, K. & Akram, R., 29 Aug 2017, FARES '17 Proceedings of the 12th International Workshop on Frontiers in Availability, Reliability and Security. ACM, p. 1-9 9 p. 49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  434. Published

    Proximity Assurances Based on Natural and Artificial Ambient Environments

    Gurulian, I., Markantonakis, K., Shepherd, C., Frank, E. & Akram, R., 2017, 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. Springer, p. 83-103 21 p. (Security and Cryptology; vol. 10543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  435. Published

    Proximity-1 simulating the CCSDS Proximity-1 protocol for ExoMars

    Blommestijn, R., Lange, J., Taylor, C. & Winton, A., 2009, Proceedings of DASIA 2009 Conference on DAta Systems In Aerospace. (European Space Agency, (Special Publication) ESA SP; vol. 669 SP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  436. Published

    Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure

    Ronen, E., Paterson, K. G. & Shamir, A., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1397-1414 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  437. Published

    Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 May 2012, 5th International Conference on New Technologies, Mobility and Security (NTMS). Mana, A. & Klonowski, M. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  438. Published

    PSInSAR remote sensing observations of deformation behaviour at Salisbury Plain, UK

    Agar, S. A., Lawrence, J. A., Ghail, R. C., Mason, P. J. & Thompson, S., 16 Sep 2018, Engineering in Chalk - Proceedings of the Chalk 2018 Conference. Lawrence, J. A., Preene, M., Lawrence, U. L. & Buckley, R. (eds.). ICE Publishing, p. 269-274 6 p. (Engineering in Chalk - Proceedings of the Chalk 2018 Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  439. Published

    PsycoTrace: Virtual and Transparent Monitoring of a Process Self

    Baiardi, F., Maggiari, D., Sgandurra, D. & Tamberi, F., 1 Feb 2009, 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing. p. 393-397 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  440. Published

    PTaCL: A Language for Attribute-Based Access Control in Open Systems

    Crampton, J. & Morisset, C., 2012, POST 2012: Principles of Security and Trust - First International Conference. Degano, P. & Guttman, J. (eds.). Springer, p. 390-409 20 p. (Lecture Notes in Computer Science; vol. 7215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  441. Published

    Public sector ICT management strategy and its impact on e-government: A case study

    Stea, B. & Harindranath, G., 2006, Proceedings of the 2006 European Conference on Information Systems (ECIS), Gothenburg, Sweden. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  442. Published

    Pulsed-Disk-Laser welding of Ti6Al4V

    Mastrocinque, E., Corrado, G., Caiazzo, F., Pasquino, N. & Sergi, V., 2011, Ninth International Conference on Advanced Manufacturing Systems and Technology. p. 383-393

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  443. Published

    Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries

    Grubbs, P., Lacharité, M. S., Minaud, B. & Paterson, K. G., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 315-331 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  444. Published

    Pyg4ometry: A Tool to Create Geometries for Geant4, BDSIM, G4Beamline and FLUKA for Particle Loss and Energy Deposit Studies

    Boogert, S., Abramov, A., Albrecht, J., D'Alessandro, G. L., Nevay, L., Shields, W. & Walker, S., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 3244-3247 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  445. Published

    Qualified predictions for large data sets in the case of pattern recognition

    Papadopoulos, H., Vovk, V. & Gammerman, A., 2002, Proceedings of the International Conference on Machine Learning and Applications. Wani, M., Arabnia, H., Cios, K., Hafeez, K. & Kendall, G. (eds.). CSREA Press, p. 159-163 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  446. Published

    Qualified predictions for proteomics pattern diagnostics with confidence machines

    Luo, Z., Bellotti, T. & Gammerman, A., 2004, Lecture Notes in Computer Science . Vol. 3177. p. 46-51

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  447. Published

    Qualified probabilistic predictions using graphical models

    Luo, Z. & Gammerman, A., 2005, Lecture Notes in Artificial Intelligence. Vol. 3571. p. 111-122

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  448. Unpublished

    Quality management strategies and employee participation in Europe

    Rees, C., Jul 1994, (Unpublished) Industrial Relations in the European Community (IREC) Conference on 'Multinational Companies and the Future of Collective Bargaining'. Dublin.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  449. Published

    Quality of Life: Psychological dimensions of health

    Bradley, C., 1998, Royal Holloway Report. Royal Holloway, University of London, p. 17

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  450. Published

    Quantifying and qualifying trust: Spectral decomposition of trust networks

    Pavlovic, D., 2011, Proceedings of FAST 2010. Degano, P., Etalle, S. & Guttman, J. (eds.). Springer-Verlag, Vol. 6561. p. 1-17 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  451. Published

    Quantitative Concept Analysis

    Pavlovic, D., 2012, Formal Concept Analysis: 10th International Conference, ICFCA 2012, Leuven, Belgium, May 7-10, 2012: Proceedings. Domenach, F., Ignatov, D. I. & Poelmans, J. (eds.). Springer, p. 260-277 18 p. (Lecture Notes in Computer Science; vol. 7278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  452. E-pub ahead of print

    Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving

    Kirshanova, E., Mårtensson, E., Postlethwaite, E. & Roy Moulik, S., 25 Nov 2019, (E-pub ahead of print) Advances in Cryptology -- ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Springer, p. 521-551 31 p. (Lecture Notes in Computer Science; vol. 11921).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  453. Published

    Quantum and classical structures in nondeterministic computation

    Pavlovic, D., 2009, Proceedings of Quantum Interaction 2009. Bruza, P., Sofge, D. & Rijsbergen, K. V. (eds.). Springer-Verlag, Vol. 5494. p. 143-158 16 p. (Lecture Notes in Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  454. Published

    Quantum computing with separable states?

    Schack, R., 2001, Macroscopic Quantum Coherence and Quantum Computing. Averin, D. V., Ruggiero, B. & Silvestrini, P. (eds.). New York: Kluwer, p. 285

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  455. E-pub ahead of print

    Quantum cryptanalysis on contracting feistel structures and observation on related-key settings

    Cid, C., Hosoyamada, A., Liu, Y. & Sim, S. M., 8 Dec 2020, (E-pub ahead of print) Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings. Bhargavan, K., Oswald, E. & Prabhakaran, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 373-394 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12578 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  456. Published

    Quantum crystals: from quantum plasticity to supersolidity

    Balibar, S., Haziot, A. & Rojas, X., 2011, QUANTUM SENSING AND NANOPHOTONIC DEVICES VIII. Razeghi, M., Sudharsanan, R. & Brown, GJ. (eds.). SPIE - INT SOC OPTICAL ENGINEERING, 7 p. (Proceedings of SPIE; vol. 7945).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  457. Published

    Quantum Theory and Global Optimisation

    Audenaert, K., 2004, Sixteenth International Symposium on Mathematical Theory of Networks and Systems (MTNS2004), Mini-Symposium on Quantum Information, Catholic University of Leuven, Belgium, 5-9 July 2004.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  458. Published

    Quaternary life on land

    Elias, S., 2002, Encyclopaedia of Life Sciences. London: Nature Publishing Group, Vol. 15. p. 739-742

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  459. Published

    R&D internationalisation of developing country firms: the case of China

    Rui, H., 2014, Proceedings of the 56th Annual Meeting of the Academy of International Business: Local contexts in Global Business. Meyer, K. & Kiyak, T. (eds.). 2014 Academy of International Business, p. 176 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  460. Published

    r/Coronavirus and the Viral Pandemic: A source of truth, comfort and companionship during COVID19

    Cole, J., van de Ven, C., Sharkey, C. M., Williamson, P., Doherty, P. & Robb, F., 13 May 2021, CHI EA '21: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. Kitamura, Y., Quigley, A., Isbister, K. & Igarashi, T. (eds.). NY, USA: Association for Computing Machinery (ACM), p. 1-6 6 p. 153

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  461. Published

    Random planar graphs with n nodes and a fixed number of edges

    Gerke, S., McDiarmid, C., Steger, A. & Weissl, A., 2005, PROCEEDINGS OF THE SIXTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS. PHILADELPHIA: SIAM, p. 999-1007 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  462. Published

    Randomized Rounding for Routing and Covering Problems: Experiments and Improvements

    Doerr, B., Künnemann, M. & Wahlström, M., 2010, Experimental Algorithms : 9th International Symposium, SEA 2010. Festa, P. (ed.). Naples, Italy: Springer, Vol. 6049. p. 190-201 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  463. Published

    Randomized Rounding in the Presence of a Cardinality Constraint

    Doerr, B. & Wahlström, M., 2009, 2009 Proceedings of the Eleventh Workshop on Algorithm Engineering and Experiments (ALENEX). Finocchi, I. & Hershberger, J. (eds.). New York, USA: SIAM, p. 162-174 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  464. Published

    Ranking Bracelets in Polynomial Time

    Adamson, D., Gusev, V., Potapov, I. & Deligkas, A., 30 Jun 2021, Symposium on Combinatorial Pattern Matching: CPM 2021. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 191. p. 1-17 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  465. Published

    Ransomclave: Ransomware Key Management using SGX

    Bhudia, A., O'Keeffe, D., Sgandurra, D. & Hurley-Smith, D., 17 Aug 2021, 10th International Workshop on Cyber Crime (IWCC 2021): In proceedings of the International Conference on Availability, Reliability and Security (ARES 2021). p. 1-10 10 p. 58

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  466. Published

    RBAC administration in distributed systems

    Dekker, M., Crampton, J. & Etalle, S., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 93--102 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  467. Published

    RBSLA based implementation for architectural management laws

    Alghamdi, A., Fiadeiro, J. L. & Paschke, A., 1 Jan 2008, Innovations'07: 4th International Conference on Innovations in Information Technology, IIT. p. 556-560 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  468. E-pub ahead of print

    Reactive and Proactive Standardisation of TLS

    Paterson, K. & Merwe, T. V. D., 2 Nov 2016, (E-pub ahead of print) Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings. Chen, L., McGrew, D. A. & Mitchell, C. (eds.). Springer Verlag, Vol. 10074. p. 160-186 27 p. (Lecture Notes in Computer Science; vol. 10074).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  469. Published

    Reactive/proactive connectivity management in a tactical service-oriented infrastructure

    Lopes, R. R. F., Nieminen, M., Viidanoja, A. & Wolthusen, S., 26 Jun 2017, Proceedings of the 2017 International Conference on Military Communications and Information Systems (ICMCIS 2017). IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  470. Published

    Reading order independent grouping proof for RFID tags

    Lien, Y., Leng, X., Mayes, K. & Chiu, J-H., 2008, ISI. p. 128-136 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  471. Published

    Ready, Steady, Go! Altered Gravity Influences Responses to Environmental Stimuli

    Arshad, I. & Ferrè, E. R., 2021, Experimental Psychology Society .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  472. E-pub ahead of print

    Realizability in Cyclic Proof: Extracting Ordering Information for Infinite Descent

    Rowe, R. & Brotherston, J., 30 Aug 2017, (E-pub ahead of print) TABLEAUX 2017: Automated Reasoning with Analytic Tableaux and Related Methods. Springer, p. 295-310 16 p. (Lecture Notes in Computer Science; vol. 10501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  473. Published

    Reasonable Doubts, Unspoken Fears: Reassessing the Trial Film's "Heroic Age"

    Langford, B., Apr 2019, Trial Films on Trial: Law, Justice, and Popular Culture. Sarat, A., Silbey, J. & Umphrey, M. M. (eds.). University of Alabama Press, p. 81-110 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  474. Published

    Reasoning About Exceptions to Contracts

    Kafali, O., Toni, F. & Torroni, P., 2011, Computational Logic in Multi-Agent Systems (CLIMA XII). Vol. 6814. p. 225-242 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  475. Published

    Reasoning about plan robustness versus plan cost for partially informed agents

    Keren, S., Bernardini, S., Kwapong, K. & Parkes, D. C., Sep 2020, Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning. International Joint Conferences on Artificial Intelligence, p. 550-559 10 p. 64

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  476. Published

    Reasoning in time with uncertain information

    Ramparany, F., Lorquet, V., Bouyssounous, B., Bigham, J. & Luo, Z., 1994, IFAC/IFIP/IMACS Symposium on Artificial Intelligence in Real Time Control.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  477. Unpublished

    Reassuring Literary Legitimacy of Traditional Chinese Theatre Texts Through Translation Database Research

    Li, X., 21 Jul 2019, (Unpublished) Fourth International Symposium: Dialogue between Chinese Language Teaching and Culture and the Arts.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  478. Published

    Recent BDSIM Related Developments and Modeling of Accelerators

    Nevay, L., Abramov, A., Alden, S., Boogert, S., D'Alessandro, G. L., Gibson, S., Lefebvre, H., Shields, W., Walker, S., Gnacadja, E., Hernalsteens, C., Ramoisiaux, E., Tesse, R. & Liu, S. L., 22 Aug 2021, 12th International Particle Accelerator Conference 2021. Campinas, SP, Brazil: JACoW Publishing, p. 4208-4211 4 p. THPAB214

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  479. Published

    Recent Developments in Beam Delivery Simulation - BDSIM

    Nevay, L., Abramov, A., Boogert, S., Garcia Morales, H., Gibson, S., Shields, W., Walker, S. & Snuverink, J., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. THPAK025

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  480. Published

    Recent research on Roman dams in the Near East

    Kamash, Z., 2006, Cura Aquarum in Ephesus: Proceedings of the 12th International Conference on the History of Water Management and Hydraulic Engineering, Ephesus, 2-10 October 2004. Leuven: Peeters Press, p. 233-238

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  481. Published

    Recent Results on Non-invasive Beam Size Measurement Methods Based on Polarization Currents

    Mazzoni, S. & Karataev, P., 29 Jan 2019, International Beam Instrumentation Conference (7th) IBIC2018. JACoW Publishing, p. 464-467 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  482. Forthcoming

    Reciprocity norms in online knowledge sharing: A conceptual analysis

    Wu, P. & Preece, J., 16 Mar 2016, (Accepted/In press) The 76th Annual Meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  483. Published

    Recognising lifestyle activities of diabetic patients with a smartphone

    Lustrek, M., Kvetkovic, B., Mirchevska, V., Kafali, R., Romero Lopez, A. & Stathis, K., 3 Aug 2015, Pervasive Health 2015 : Workshop on Personal Health Systems for Chronic Diseases (PHSCD 2015). p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  484. Published

    Recognition of hypoxia with a preset confidence level based on EEG analysis

    Zhang, J., Li, G., Meng, H., Li, J. & Luo, Z., Jun 2008, IEEE International Joint Conference on Neural Networks, 2008. p. 3005-3008

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  485. Published

    RECON: a Robust multi-agent Environment for simulating COncurrent Negotiations

    Alrayes, B., Kafali, O. & Stathis, K., 2014, In Seventh International Workshop on Agent-based Complex Automated Negotiations (ACAN), AAMAS: best student paper award.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  486. Published

    Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast

    Chockler, G., Demirbas, M., Gilbert, S., Lynch, N. A., Newport, C. C. & Nolte, T., 2005, Proceedings of the 4th International Workshop on Assurance in Distributed Systems and Networks (ADSN '05): ICDCS Workshops. p. 42-48 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  487. Published

    Reconfigurable Distributed Storage for Dynamic Networks

    Chockler, G., Gilbert, S., Gramoli, V., Musial, P. & Shvartsman, A., 2005, Proceedings of the 9th International Conference on Principles of Distributed Systems (OPODIS '05). Springer-Verlag, p. 351-365 15 p. (Lecture Notes in Computer Science; vol. 3974).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  488. Published

    Reconfigurable state machine replication from non-reconfigurable building blocks

    Bortnikov, V., Chockler, G., Roytman, A., Shachor, S., Shnayderman, I. & Perelman, D., 2012, Proceedings of the 31st Annual ACM Symposium on Principles of Distributed Computing. ACM, p. 93-94 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  489. Published

    Reconstructing the temple of Apollo on the Palatine hill in Rome

    Claridge, A., Nov 2014, Reconstruction and the Historic City: Rome and Abroad - an interdisciplinary approach. Haeuber, C., Winder, G. M. & Schuetz, F-X. (eds.). (Beitraege Wirtschaftsgeographie Muenchen ; vol. 6).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  490. Published

    Reconstruction of fundamental SUSY parameters

    Zerwas, P. M., Blair, G. A., Choi, S. Y., Freitas, A., Kalinowski, J., Marlyn, H. U., Moortgat-Pick, G. & Porod, W., 2002, ICHEP 2002, PROCEEDINGS. AMSTERDAM: Elsevier Science Publishers B.V. (North-Holland), 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  491. Published

    Reconstruction of Structural Controllability over Erdös-Rényi Graphs via Power Dominating Sets

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR '14). ACM Press, p. 57 60 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  492. Published

    Recovering from Lost Digital Wallet

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 4th IEEE International Symposium on Trust, Security, and Privacy for Emerging Applications (TSP-13). Y. Xiang, F. G. M. & Ruj, S. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  493. Published

    Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths

    Walter, C. D., 2008, CHES 2008. Oswald, E. & Rohatgi, P. (eds.). Springer, Vol. 5154. p. 214-227 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  494. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs in the Presence of Compromised Nodes

    Alwasel, B. & Wolthusen, S., 18 May 2016, Proceedings of the 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015). Springer-Verlag, Vol. 9578. p. 105-119 15 p. (Lecture Notes in Computer Science; vol. 9578).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  495. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs via Partial Control Structure Re-Use

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th International Conference on Critical Information Infrastructures Security (CRITIS 2014). Springer-Verlag, p. 293-307

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  496. Published

    Recovery of Structural Controllability for Process Control Systems

    Alcaraz, C. & Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47 63 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  497. E-pub ahead of print

    Recurrent Auto-Encoder Model for Large-Scale Industrial Sensor Signal Analysis

    Wong, T. & Luo, Z., 27 Jul 2018, (E-pub ahead of print) International Conference on Engineering Applications of Neural Networks: EANN 2018. Pimenidis, E. & Jayne, C. (eds.). Springer, p. 203-216 14 p. (Communications in Computer and Information Science; vol. 893).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  498. Published

    Reducing Normative Conflicts in Information Security

    Pieters, W. & Coles-Kemp, L., 2011, NSPW '11: Proceedings of the 2011 New security paradigms workshop, 12-15 Sep 2011, Marin County, CA. . ACM, p. 11-24 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  499. Published

    Reducing the Space Requirements of Instant Replay

    Levrouw, L. J. & Audenaert, K., 1993, Proc. of the ACM/ONR Workshop on Parallel and Distributed Debugging. San Diego: ACM, p. 205-207

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  500. Published

    Re-Evaluating SMEs IT Readiness in the Age of the Cloud

    Dyerson, R. & Spinelli, R., Sep 2017, 2017 Proceedings of the European Conference on Information Management and Evaluation, Genoa.. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  501. Published

    Refining Process Descriptions from Execution Data in Hybrid Planning Domain Models

    Linday, A., Franco Aixela, S., Reya, R. & McCluskey, L., 1 Jun 2020, Proceedings of the Thirtieth International Conference on Automated Planning and Scheduling, Nancy, France, October 26-30, 2020. AAAI Press, Vol. 30 (2020). p. 469-477 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...5 6 7 8 9 10 11 12 ...83 Next