Home > Publications

Publications

34201 - 34300 out of 36,954Page size: 100
  1. Conference contribution › Research
  2. Published

    Sedimentation in tectonically-confined narrow basins: do classical depositional models still work?

    Longhitano, S. G. & Chiarella, D., 2016, Advances in siliciclastic and carbonate sedimentology:concepts and case studies from the Norwegian Continental Shelf. p. 9-10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Sedimentology of a mixed (bioclastic/siliciclastic) Pliocene succession near Acerenza (Southern Apennines, Basilicata, Italy

    Chiarella, D., Longhitano, S. G., Sabato, L. & Tropeano, M., 2008, 26th IAS 2009 – Books of Abstract. p. 78

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Sediments segregation rate as tool for discriminating depositional environments in ancient mixed (silici-/bioclastic) shallow-water marine system (Pliocene, Southern Apennines, Italy)

    Chiarella, D. & Longhitano, S. G., 2009, 27th IAS 2009 – Books of Abstract. p. 469

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Seeing the full picture: The case for extending security ceremony analysis

    Bella, G. & Coles-Kemp, L., 2011, Proceedings of 9th Australian Information Security Management Conference. p. 49-55 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Seeing through MIST Given a Small Fraction of an RSA Private Key

    Walter, C. D., 2003, CT-RSA 2003. Joye, M. (ed.). Springer, Vol. 2612. p. 391-402 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Select Response Grouping Proof for RFID Tags

    Leng, X., Lien, Y., Mayes, K., Markantonakis, K. & Chiu, J-H., 2009, Proceedings of the 2009 First Asian Conference on Intelligent Information and Database Systems. Washington, DC, USA: IEEE Computer Society Press, p. 73-77 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Selective mixture of Gaussians clustering for location fingerprinting

    Nguyen, K. & Luo, Z., 5 Dec 2014, 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (i-Locate, MOBIQUITOUS 2014). London, UK: ACM, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Selective, multi-level modelling for accelerated simulation of large, heterogeneous corporate telecommunications networks

    Pitts, J., Luo, Z., Nyong, D. & Cosmas, J., 1998, 15th IEE UK Teletraffic Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Self-calibrating probability forecasting

    Vovk, V., Shafer, G. & Nouretdinov, I., 2004, Advances in Neural Information Processing Systems. Thrun, S., Saul, L. & Schoelkopf, B. (eds.). Cambridge, MA: MIT Press, Vol. 16. p. 1133-1140 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Self-organization and novelty: pre-configurations of emergence in early British Cybernetics

    Soler-Adillon, J. & Penny, S., 24 Jun 2014, Norbert Wiener in the 21st Century (21CW), 2014 IEEE Conference on. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Semantics of Architectural Connectors

    Fiadeiro, J. L. & Lopes, A., 1997, TAPSOFT. Springer, Vol. 1214. p. 505-519 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Semantics of Interworking Knowledge Based Systems

    Reichwein, G. & Fiadeiro, J. L., 1993, EPIA. Springer, Vol. 727. p. 93-104 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Semantics-Driven Introspection in a Virtual Environment

    Tamberi, F., Maggiari, D., Sgandurra, D. & Baiardi, F., 1 Sep 2008, 2008 The Fourth International Conference on Information Assurance and Security. p. 299-302 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination

    Wolthusen, S. D. & Al-Salloum, Z., 15 Sep 2009, Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics 2009. IEEE Computer Society Press, p. 41-53

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Senescent ground tree rewrite systems

    Hague, M., 14 Jul 2014, CSL-LICS '14 Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). ACM, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Senior tourists’ preferences of smart tourism destinations in Europe: Challenges of Europe: Growth, Competitiveness, Innovation and Well-being”, University of Split.

    Ameen, N. & Shah, M., 2019, Senior tourists’ preferences of smart tourism destinations in Europe: Challenges of Europe: Growth, Competitiveness, Innovation and Well-being”, University of Split.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Sensor Network Grids: Agent Environment combined with QoS in Wireless Sensor Networks

    Stathis, K., Kafetzoglou, S. & Bromuri, S. P. A. N. S., 1 Jun 2007, Proceedings of the 3rd International Conference on Autonomic and Autonomous Systems (ICAS'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Separable states of $N$ quantum bits

    Schack, R. & Caves, C. M., 1999, Proceedings of the X. International Symposium on Theoretical Electrical Engineering. Mathis, W. & Schindler, T. (eds.). Magdeburg: Otto-von-Guericke University, p. 73-78

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Serverless protocols for inventory and tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K. & Chaumette, S., 9 Nov 2017, Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. St. Petersburg, Florida, USA: IEEE Computer Society Press, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Service Extraction from Legacy Systems

    Matos, C., 2008, Proceedings of the International Conference on Graph Transformation (ICGT). Ehrig, H., Heckel, R., Rozenberg, G. & Taentzer, G. (eds.). Springer-Verlag, Vol. 4758. p. 505-507 3 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Service providers perceptions of Japans e-government services using the importance-performance (IPA) model

    Wong, K., Nishimoto, H., Nishigaki, Y. & Jackson, S., 2012, Asian Conference on Information Systems, Siem Reap, Cambodia, 06 - 08 Dec.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Service-oriented modelling of automotive systems

    Bocchi, L., Fiadeiro, J. L. & Lopes, A., 1 Jan 2008, Proceedings - International Computer Software and Applications Conference. p. 1059-1064 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Set cover problems in role-based access control

    Chen, L. & Crampton, J., 2009, Proceedings of 14th European Symposium on Research in Computer Security. Springer, p. 689-704 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Setting the Stage: Environmental Conditions in Beringia as People Entered the New World.

    Elias, S., 2002, The First Americans: The Pleistocene Colonization of the New World. Jablonski, N. (ed.). San Francisco: California Academy of Sciences, p. 9-26 (Memoirs of the California Academy of Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Shallow magma chamber formation and evolution

    Barnett, Z. & Gudmundsson, A., 2013, Rock Fractures in Geological Processes: Abstracts of the Presentations at the Symposium. University Press Göttingen

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Share ownership and trade unions: sleeping with the enemy?

    Sen Gupta, S., 2007, International Industrial Relations Association (IIRA), Manchester.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Share ownership and unions: are they compatible in the present industrial climate?

    Sen Gupta, S., 2010, British Universities Industrial Relations Association (BUIRA), Manchester.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Sharing Data through Confidential Clouds: An Architectural Perspective

    Sgandurra, D., Di Cerbo, F., Trabelsi, S., Martinelli, F. & Lupu, E., 7 Aug 2015, Proceedings - 1st International Workshop on TEchnicaland LEgal Aspects of Data pRIvacy and Security, TELERISE 2015. p. 58-61 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Shifting the mainstream: Conference Keynote Speech

    Conroy, C., 2003, Shifting Aesthetic: Disability and Performance: Conference Proceedings. London Arts Board

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Shiite Marja’iyya: The Association of Shiite Quietism and Activism

    Kalantari, M., 28 Mar 2012, British Society for Middle Eastern Studies Annual Conference: LSE, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Short Proofs for the Determinant Identities

    Hrubes, P. & Tzameret, I., 19 May 2012, Proceedings of the 44th Annual ACM Symposium on the Theory of Computing (STOC). p. 193-212

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Short Propositional Refutations for Dense Random 3CNF Formulas

    Muller, S. & Tzameret, I., Jun 2012, Proceedings of the 27th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS): 25-28 June 2012. p. 501-510 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Short-term periodicity tidal cycles within ancient mixed siliciclastic/bioclastic deposits: examples from Pliocene shallow-water successions of southern Apennines (Italy)

    Longhitano, S. G. & Chiarella, D., 2008, 26th IAS 2009 – Books of Abstract. p. 174

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Simple Encrypted Arithmetic Library - SEAL v2.1

    Chen, H., Laine, K. & Player, R., 2017, Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Revised Selected Papers. Springer-Verlag, Vol. 10323 LNCS. p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10323 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Simple Power Analysis of Unified Code for ECC Double and Add

    Walter, C. D., 2004, CHES 2004. Joye, M. & Quisquater, J-J. (eds.). Springer, Vol. 3156. p. 191-204 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Simple techniques for enhancing the robustness of DSR

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of the 3rd Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC '03), Stockholm, Sweden, May 2003. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    Freire, E. S. V., Paterson, K. G. & Poettering, B., 2013, CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 101-114 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    SIMPLE: developing a LBS positioning solution

    Wierenga, J. & Komisarczuk, P., 2005, Proceedings of the 4th International Conference on Mobile and Ubiquitous Multimedia, MUM 2005, Christchurch, New Zealand, December 8-10, 2005. p. 48-55 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. E-pub ahead of print

    Simplifying Automated Pattern Selection for Planning with Symbolic Pattern Databases

    Moraru, I., Edelkamp, S., Franco Aixela, S. & Martinez, M., 24 Aug 2019, KI 2019: Advances in Artificial Intelligence. Benzmüller, C. & Stuckenschmidt, H. (eds.). Springer, p. 249-263 15 p. (Lecture Notes in Computer Science; vol. 11793).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Simulating Attack Plans Against ICT Infrastructures

    Baiardi, F., Corò, F., Tonelli, F., Guidi, L. & Sgandurra, D., 2014, Vulnerability, Uncertainty, and Risk: Quantification, Mitigation, and Management - Proceedings of the 2nd International Conference on Vulnerability and Risk Analysis and Management, ICVRAM 2014 and the 6th International Symposium on Uncertainty Modeling and Analysis, ISUMA 2014. American Society of Civil Engineers (ASCE), p. 627-637 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Simulating future events in psychosis. Schizophrenia Bulletin

    Huddy, V., Brown, G. & Boyd, T., 2009, Schizophrenia Bulletin. Vol. 35. p. 277 277 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance

    Borgen, H., Bours, P. & Wolthusen, S. D., 2 Jun 2009, Third International Conference on Advances in Biometrics (ICB 2009). Springer-Verlag, p. 857-867

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    SIMULATION OF A CAVITY BPM FOR HIGH RESOLUTION SINGLEPASS BEAM POSITION MEASUREMENTS

    Morgan, A., Rehm, G., Joshi, N., Lyapin, A., Boogert, S. & Molloy, S., 2010, Proceedings of Beam Instrumentation Workshop,2010, Santa Fe, New Mexico, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Simulation Results of the FETS Laserwire Emittance Scanner

    Kruchinin, K., Bosco, A., Gibson, S., Karataev, P., Faircloth, D., Gabor, C., Lawrie, S. & Pozimski, J., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 3729-3731 3 p. THPME191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. E-pub ahead of print

    Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms

    Liu, S. & Paterson, K. G., 17 Mar 2015, Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. Katz, J. (ed.). Springer, Vol. 9020. p. 3-26 24 p. (Lecture Notes in Computer Science; vol. 9020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Simulations of the FETS Laser Diagnostic

    Kurup, A., Pozimski, J., Gibson, S., Kruchinin, K. & Letchford, A., Jan 2016, 4th International Beam Instrumentation Conference: IBC2015, Melbourne, Australia. JACoW Publishing, p. 521-525 5 p. TUPB071

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Simulator Problem in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Dec 2010, 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). Tang, H. Y. & Fu, X. (eds.). HongKong, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Simultaneously Satisfying Linear Equations Over F_2: MaxLin2 and Max-r-Lin2 Parameterized Above Average

    Crowston, R., Fellows, M., Gutin, G., Jones, M., Rosamond, F., Thomasse, S. & Yeo, A., 2011, IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science. p. 229--240 (LIPICS - Leibniz International Proceedings in Informatics; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Single sign-on using trusted platforms

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 2003, Proceedings. Springer-Verlag, Vol. 2851. p. 54-68 15 p. (Lecture Notes in Computer Science; vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Sit-to-Stand Movement Recognition Using Kinect

    Acorn, E., Dipsis, N., Pincus, T. & Stathis, K., 20 Apr 2015, 3rd International Symposium on Statistical Learning and Data Sciences. Springer, p. 179-192 14 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Situating cognitive agents in GOLEM

    Bromuri, S. & Stathis, K., 2008, Engineering Environment-Mediated Multi-Agent Systems (EEMAS'07). Springer, Vol. 5049. p. 115-134 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Sleeping Android: The Danger of Dormant Permissions

    Sellwood, J. & Crampton, J., 8 Nov 2013, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 55-66 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Sliding Windows Succumbs to Big Mac Attack

    Walter, C. D., 2001, CHES 2001. Koç, Ç. K., Naccache, D. & Paar, C. (eds.). Springer, Vol. 2162. p. 286-299 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Small Firm Workers in the New Economy: Perceptions of work in Three Sectors

    Sen Gupta, S., Tsai, C-J. & Edwards, P., 2006, British Universities Industrial Relations Association (BUIRA), Galway.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Small Scale Variants of the AES

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2005, Fast Software Encryption, 12th International Workshop, FSE 2005. Springer, Vol. 3557. p. 145-162 18 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Small-span characteristic polynomials of integer symmetric matrices

    McKee, J., 2010, ANTS IX. p. 272-286 (Lecture Notes in Computer Science; vol. 6197).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    SMART (Stochastic Model Acquisition with ReinforcemenT) learning agents: A preliminary report

    Child, C. & Stathis, K., 2005, Adaptive agents and multi-agent systems II. Springer-Verlag, Vol. 3394. p. 73-87 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Smart Cards: State-of-the-Art to Future Directions, Invited Paper

    Akram, R. N. & Markantonakis, K., 1 Dec 2013, IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013). Douligeris, C. & Serpanos, D. (eds.). Athens, Greece: IEEE Computer Science

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Smartphones as a Platform for Advanced Measurement and Processing

    Opperman, C. & Hancke, G., 2012, IEEE Instrumentation and Measurement Technology Conference. IEEE, p. 703 706 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    SME: Balancing Across The Pathways Of A Changing Future

    Kouraklis, I. J., 2005, Proceedings of 1st International Conference on Business, Management and Economics, Yaşar University, Izmir, Turkey.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    SMEs and e-commerce: A comparative pilot study of experiences in the UK and Italy

    Dyerson, R., Spinelli, R., Harindranath, G. & Barnes, D., 2009, Proceedings of the 2009 Institute for Small Business & Entrepreneurship Conference, Liverpool.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Smith-Purcell radiation from a chain of spheres

    Lekomtsev, K., Strikhanov, M. N. & Tishchenko, A., 2010, Journal of Physics: Conference Series. Vol. 236, Number 1.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Social Capital and R&D Performance in Higher Education

    Iskandar, I. M. & Jashapara, A., 2004, Proceedings of the 5th European Conference on Knowledge Management. Paris, p. 445 454 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Social capital: Re-interpreting the cultural and political dynamics of knowledge sharing

    Jashapara, A. & Iskandar, I. M., 2003, Proceedings of ECKM 2003: The 4th European Conference on Knowledge Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Social Commitment Delegation and Monitoring

    Kafali, O. & Torroni, P., 2011, Computational Logic in Multi-Agent Systems (CLIMA XII). Vol. 6814. p. 171-189 19 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Social Media And Institutional Innovation: the Case of Free Lunch for Children in China

    Zheng, Y., 14 Dec 2014, Interntional Conference of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Social Media and Social Transformation Movements: The Role of Affordances and Platforms

    Harindranath, G., Bernroider, E. W. N. & Kamel, S. H., 17 Jun 2015, Proceedings of the Twenty-Third European Conference on Information Systems (ECIS), Münster, Germany, 2015. Munster, Germany: ECIS, p. 1-13 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Social order and organizational dynamics in an alternative currency movement network

    Laamanen, M., Moser, C., Bor, S. & den Hond, F., 2018, XIX ISA World Congress of Sociology: Power, Violence and Justice: Reflections, Responses and Responsibilities. Toronto: International Sociological Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Unpublished

    Social Work, Social Justice and the Capability Approach: Keynote lecture at JSWEC conference 2015

    Gupta, A., 23 Jul 2015, (Unpublished) Social Work, Social Justice and The Capability Approach.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Societal Relevance of Quaternary Research

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 1-10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Socio-Cognitive Grids: The Net as a Universal Human Resource

    Bruijn, O. D. & Stathis, K., 1 Jun 2003, Proceedings of the Conference of ``Tales of the Disappearing Computer".

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Sodi's Opera for Mme Favart: "Baiocco et Serpilla"

    Charlton, D., 2005, La 'Querelle des Bouffons' dans la vie culturelle française du XVIIIe siècle. Fabiano, A. (ed.). Paris : CNRS, p. 205-18 14 p. (Sciences de la musique. Série Études.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Soft-sediments deformations in tidal cross-stratified deposits - triggering mechanisms in the Early Pleistocene Catanzaro strait-fill succession, Calabrian Arc (Southern Italy)

    Chiarella, D., Moretti, M., Longhitano, S. G. & Muto, F., 2015, Geophysical Research Abstracts. Vol. 17. p. 11453

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Soil biodiversity, root herbivory and carbon and nitrogen cycling in grassland soils

    Cook, R., Dawson, L. A., Gange, A., Grayston, S. J., Murray, P. J. & Treonis, A. M., 2001, PROCEEDINGS OF THE XIX INTERNATIONAL GRASSLAND CONGRESS. PIRACICABA: FUNDACAO ESTUDOS AGRARIOS LUIZ QUEIROZ (FEALQ), p. 902-902 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Forthcoming

    Solo singing at the Comédie-Italienne, 1716 to c.1752

    Charlton, D., 2018, (Accepted/In press) La Comédie-Italienne de Paris, 1716-1780. Fabiano, A. & De Luca, E. (eds.). Paris: Presses de l'Université Paris-Sorbonne

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Solving k-Set Agreement with Stable Skeleton Graphs

    Biely, M., Robinson, P. & Schmid, U., 2011, 25th IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2011, Anchorage, Alaska, USA, 16-20 May 2011 - Workshop Proceedings. p. 1488-1495 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Solving SAT for CNF formulas with a one-sided variable occurrence restriction

    Johannsen, D., Razgon, I. & Wahlström, M., 2009, Theory and Applications of Satisfiability Testing, SAT 2009 : 12th International Conference, SAT 2009. Kullmann, O. (ed.). Swansea, Wales, United Kingdom: Springer, Vol. 5584. p. 80-85 6 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Some Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., 2004, Advanced Encryption Standard - AES 2004, 4th International Conference. Berlin: Springer, Vol. 3373. p. 58-66 9 p. (Lecture Notes in Computer Science; vol. 3373).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Some proof-theoretic and algorithmic aspects of coercive subtyping

    Jones, A., Luo, Z. & Soloviev, S., 1998, Types for proofs and programs, Proc. of the Inter. Conf. TYPES'96, LNCS 1512.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Some Security Aspects of the MIST Randomized Exponentiation Algorithm

    Walter, C. D., 2003, CHES 2002. Jr., B. S. K., Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 2523. p. 276-290 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Sometimes "Tomorrow" is "Sometime" - Action Refinement in a Temporal Logic of Objects

    Fiadeiro, J. L. & Maibaum, T. S. E., 1994, ICTL. Springer, Vol. 827. p. 48-66 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Sound regular expression semantics for dynamic symbolic execution of JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 8 Jun 2019, PLDI'19: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, p. 425-438 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    South Asia and West Asia from the Delhi Sultanate to the Present: Security, Resources and Influence

    Robinson, F., 2012, Working Papers: Symposium on the Academic Chairs of His Majesty Sultan Qaboos bin Said and their Contribution to the Development of Human Knowledge. Muscat: Ministry of Higher Education, Oman, p. 74-86 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Space Bounds for Reliable Storage: Fundamental Limits of Coding

    Spiegelman, A., Cassuto, Y., Chockler, G. & Keidar, I., 25 Jul 2016, Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing. ACM, p. 249-258 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Space Complexity of Fault-Tolerant Register Emulations

    Chockler, G. & Spiegelman, A., 25 Jul 2017, The 36th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2017)). ACM, p. 83-92 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Sparser Random 3SAT Refutation Algorithms and the Interpolation Problem: Extended Abstract

    Tzameret, I., 8 Jul 2014, Automata, Languages, and Programming - 41st International Colloquium, (ICALP) 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part {I}: --. p. 1015-1026 12 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Unpublished

    Speaking-in-the-last-instance: Non-Standard Usage, Superposition, and the (H)interlinguistic State

    Hazell, C., 2019, (Unpublished) TUJ Philosophy Lecture Series. 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Specialist Experts for Prediction with Side Information

    Kalnishkan, Y., Adamskiy, D., Chernov, A. & Scarfe, T., 2016, 2015 IEEE International Conference on Data Mining Workshop (ICDMW). IEEE, p. 1470-1477 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. E-pub ahead of print

    Specification and Verification of Invariant Properties of Transition Systems

    Gaina, D., Tutu, I. & Riesco, A., 23 May 2019, 25th Asia-Pacific Software Engineering Conference: 4-7 December 2018, Nara, Japan. IEEE, p. 99-108 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Specification of Required Non-determinism

    Lano, K., Bicarregui, J., Fiadeiro, J. L. & Lopes, A., 1997, FME. Springer, Vol. 1313. p. 298-317 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Specifying and enforcing constraints in role-based access control

    Crampton, J., 2003, Proceedings of 8th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 43-50 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Spectral clustering of protein sequences

    Paccanaro, A., Trifonov, V., Yu, H. & Gerstein, M. B., 2005, International Joint Conference on Neural Networks. p. 161-166

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Spectral clustering of protein sequences using sequence-profile scores

    Sasidharan, R., Gerstein, M. B. & Paccanaro, A., 2006, Proceedings of ICNPSC – 3rd International Conference on Neural Parallel and Scientific Computations.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Speculation by the 1% and the financialization of art

    Chong, D., 2013, 38th Annual Macromarketing Conference (Toronto: York University).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Speculative Landscapes: H.P. Lovecraft’s Weird System

    Gene-Rowe, F., Nov 2013, The Weird: Fugitive Fictions/Hybrid Genres. Senate House Library, London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Speculative Landscapes: H.P. Lovecraft’s Weird System

    Gene-Rowe, F., Nov 2013, The Weird: Fugitive Fictions/Hybrid Genres. Senate House Library, London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Speech security and permanents of (0,1) matrices

    Mitchell, C. J., 1989, Cryptography and Coding: Proceedings of the IMA Cryptography and Coding Conference, Cirencester, December 1986. Beker, H. J. & Piper, F. C. (eds.). Oxford University Press, p. 231-240 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Sports and Fitness Wellness Tourism: Segmenting Muay Thai Tourists by Travel Motivation and Quality of Life Perception

    Hosany, S. & Deesilatham, S., 2017, 50th Academy of Marketing Conference, Hull, 3-6 July.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Spy agents: Evaluating trust in remote environments

    Kalogridis, G., Mitchell, C. J. & Clemo, G., 2005, Proceedings of the 2005 International Conference on Security and Management (SAM '05), June 2005, Las Vegas, USA. Arabnia, H. R. (ed.). CSREA Press, p. 405-411 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    SSL/TLS session-aware user authentication using a GAA bootstrapped key

    Chen, C., Mitchell, C. J. & Tang, S., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication, 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings. Ardagna, C. & Zhou, J. (eds.). Springer-Verlag, Vol. 6633. p. 54-68 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution