Home > Publications

Publications

34301 - 34400 out of 38,490Page size: 100
  1. Conference contribution › Research
  2. Unpublished

    Creating Digital Narrative Artworks: An Expanding Geographical Field

    Lowe, J., 25 Apr 2019, (Unpublished) Innovative Research Methods session at RGS-IBG PGF Mid-Term Conference 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Criteria of Efficiency for Conformal Prediction

    Vovk, V., Fedorova, V., Nouretdinov, I. & Gammerman, A., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 23-39 17 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Criterion of calibration for transductive confidence machine with limited feedback

    Nouretdinov, I. & Vovk, V., 2003, Lecture Notes in Articial Intelligence. Vol. 2842. p. 259-267 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Critical phase separation in solid helium isotopic mixtures

    Saunders, J., Cowan, B. & Poole, M., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 358-359 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Unpublished

    Cross-border mergers and the country-of-origin effect: implications for HRM?

    Edwards, T. & Rees, C., Nov 2000, (Unpublished) Association Francophone de Gestion des Ressources Humaines (AGRH) 11th Annual Congress. Paris.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Unpublished

    Cross-border mergers and the country-of-origin effect: trade union responses

    Edwards, T. & Rees, C., Mar 2001, (Unpublished) Wissenschaftszentrum Berlin (WZB) Conference on 'Cross-Border Mergers and Employee Participation in Europe'. Paris.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Cross-cultural Leadership Behavior Adjustment: Expatriate Senior Managers in China

    Tsai, C-J. & Qiao, K., 2017, Academy of Management Annual Meeting (AOM), Atlanta, Georgia, August 4-8. (Awarded Best Paper, HR Division).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2011, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Crossvergence in CSR priorities of developing country firms

    Preuss, L. & Barkemeyer, R., Jan 2014, Africa Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Crowdfunding and social identity in Northern and Latin America

    Kromidha, E., 2016, Proceedings of the 6th Latin American and European Meeting on Organization Studies, 6-9 April 2016 . Viña del Mar, Chile

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Crowdsourcing Lightweight Pyramids for Manual Summary Evaluation

    Shapira, O., Gabay, D., Gao, Y., Ronen, H., Pasunuru, R., Bansal, M., Amsterdamer, Y. & Dagan, I., Jun 2019, Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics, Vol. 1. p. 682-687 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Crusader Perceptions of Byzantium, c.1095 to c.1150

    Phillips, J., 21 Feb 2019, Byzantium and the West: Perception and Reality (C12th to C15th). Chrissis, N., Kolia-Dermitzaki, A. & Papageorgiou, A. (eds.). Abingdon: Routledge

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Cryptanalysis of the EPBC authenticated encryption mode

    Mitchell, C. J., 2007, Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings. Springer-Verlag, Vol. 4887. p. 118-128 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. E-pub ahead of print

    Cryptanalysis of the multivariate encryption scheme EFLASH

    Øygarden, M., Felke, P., Raddum, H. & Cid, C., 14 Feb 2020, Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). Springer, p. 85-105 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Cryptanalysis of two variants of PCBC mode when used for message integrity

    Mitchell, C. J., 2005, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Boyd, C. & Gonzalez-Nieto, J. (eds.). Springer-Verlag, Vol. 3574. p. 560-571 12 p. (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. E-pub ahead of print

    Cryptographic Enforcement of Information Flow Policies Without Public Information

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 9 Jan 2016, 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . Malkin, T., Kolesnikov, V., Bishop Lewko, A. & Polychronakis, M. (eds.). p. 389-408 20 p. (Lecture Notes in Computer Science; vol. 9092).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Cryptographic Enforcement of Role-Based Access Control

    Crampton, J., 2010, Proceedings of 7th International Workshop on Formal Aspects of Security and Trust. Springer, p. 191-205 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Cryptographic Protocol Synthesis and Verification for Multiparty Sessions

    Bhargavan, K., Corin, R., Denielou, P-M., Fournet, C. & Leifer, J. J., 2009, PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM. LOS ALAMITOS: IEEE COMPUTER SOC, p. 124-140 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2007, Proceedings of the 12th Nordic Workshop on Secure IT Systems. p. 49-60 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    C-SHORe: A Collapsible Approach to Verifying Higher-Order Programs

    Broadbent, C., Carayol, A., Hague, M. & Serre, O., 25 Sep 2013, ICFP: International Conference on Functional Programming. p. 13-24 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    CSR priorities of emerging economy firms: Is Russia different from the other emerging economies

    Preuss, L. & Barkemeyer, R., Sep 2010, 9th annual colloquium of the Academy of Business in Society (ABIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published
  24. Unpublished

    Culture-Centric Studies of Marketing and Consumption in Brazil

    Ferreira, M. C., Figueiredo, B., Pereira, S. & Scaraboto, D., 2 Jul 2014, (Unpublished) Proceedings of the 39th Annual Macromarketing Conference. Macromarketing Society, Inc., p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Curb Your Enthusiasm: Why the Future is Not Stuxnet

    Haggman, A., 2 Jul 2015, Proceedings of the 14th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, p. 397-403 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Customer Agility Capabilities at EuroBank: The Role of ICT and Organizational Routines

    Hallikainen, P., Merisalo-Rantanen, H. & Elbanna, A., 2017, Australasian Conference on Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Customizing Conventional Patent-based Financial Instruments for Financing Nanotechnology Firms: An Iranian Perspective

    Nasiri, A., 2010, International Conference on Nanotechnology and Biosensors (ICNB). Hong Kong, China

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. E-pub ahead of print

    Cybersecurity Readiness of E-tail Organisations: A Technical Perspective

    Shah, M., Muhammad, R. & Ameen, N., 1 Apr 2020, Responsible Design, Implementation and Use of Information and Communication Technology: 19th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6–8, 2020, Proceedings, Part I. p. 153-160 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise

    Creese, S., Goldsmith, M., Moffat, N., Happa, J. & Agrafiotis, I., 2013, IEEE Conference on Technologies for Homeland Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Dancing with strangers: observing play, movement and interaction in a public square through the lens of a dancer, a writer and a painter

    Coppard, H., 30 Sep 2014, Children and Families in Changing Urban Spaces conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Dare to innovate by taking care of hurdles to innovation

    Guenther, E., Hueske, A-K., Kesting, P., Linnenluecke, M., Moeller, K. & Preuss, L., Aug 2010, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Data caching as a cloud service

    Chockler, G., Laden, G. & Vigfusson, Y., 2010, Proceedings of the 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS '10). ACM, p. 18-21 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Data Dependent Power Use in Multipliers

    Walter, C. D. & Samyde, D., 2005, 17th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 4-12 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Data Integrity in Hardware for Modular Arithmetic

    Walter, C. D., 2000, CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1965. p. 204-215 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Data Is a Stream: Security of Stream-Based Channels

    Fischlin, M., Guenther, F., Paterson, K. & Marson, G. A., 1 Aug 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Gennaro, R. & Robshaw, M. (eds.). Springer Verlag, Vol. 9216. p. 545-564 20 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Data Structures for Constraint Enforcement in Role-Based Systems

    Crampton, J. & Khambhammettu, H., 2005, Proceedings of the 2005 IASTED Conference on Network and Information Security. p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. E-pub ahead of print

    Data-Driven Robust Control for Type 1 Diabetes Under Meal and Exercise Uncertainties

    Paoletti, N., Liu, K. S., Smolka, S. A. & Lin, S., 1 Sep 2017, Computational Methods in Systems Biology. Feret, J. & Koeppl, H. (eds.). Springer, p. 214-232 19 p. (Lecture Notes in Computer Science; vol. 10545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

    Weldehawaryat, G., Ambassa, P., Marufu, A., Wolthusen, S. & Kayem, A. V. D. M., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 69-86 18 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. E-pub ahead of print

    Decidable Models of Integer-Manipulating Programs with Recursive Parallelism

    Hague, M. & Lin, A., 13 Sep 2016, Reachability Problems: 10th International Workshop, RP 2016, Aalborg, Denmark, September 19-21, 2016, Proceedings. Springer International Publishing, Vol. 9899. p. 148-162 15 p. (Lecture Notes in Computer Science; vol. 9899).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Declarative agent control

    Kakas, A., Mancarella, P., Sadri, F., Stathis, K. & Toni, F., 2004, Computational Logic in Multi-agent Systems (CLIMA 2004). Springer-Verlag, Vol. 3487. p. 96-110 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Decoherence of a quantum bit circuit

    Ithier, G., Nguyen, F., Collin, E., Boulant, N., Meeson, P. J., Joyez, P., Vion, D. & Esteve, D., 2007, Quantum Decoherence: Poincare Seminar 2005. Duplantier, B., Raimond, JM. & Rivasseau, V. (eds.). CAMBRIDGE: Birkhauser, Boston, p. 125-149 25 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Deconfinement and cold atoms in optical lattices

    Cazalilla, M. A., Ho, A. F. & Giamarchi, T., 2006, RECENT PROGRESS IN MANY-BODY THEORIES: Proceedings of the 13th International Conference, Buenos Aires, Argentina, 5 – 9 December 2005. Hernández, S. & Cataldo, H. (eds.). p. 208-217 10 p. (Series on Advances in Quantum Many-Body Theory ; vol. 10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Forthcoming

    Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper

    Meister, J. A., Akram, R. N. & Markantonakis, K., 7 Nov 2018, (Accepted/In press) The 12th WISTP International Conference on Information Security Theory and Practice (WISTP'2018). Blazy, O. & Yeun, C. Y. (eds.). Brussels, Belgium: Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Forthcoming

    Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the 6th International Workshop on Critical Information Infrastructures Security 2011 (CRITIS 2011). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Defending financial infrastructures through early warning systems: The intelligent cloud approach

    Lodi, G., Querzoni, L., Baldoni, R., Marchetti, M., Colajanni, M., Bortnikov, V., Chockler, G., Dekel, E., Laventman, G. & Roytman, A., 2009, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies (CSIIRW '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Defensive Forecast for Conformal Bounded Regression

    Nouretdinov, I. & Lebedev, A., Oct 2013, The 9th Artificial Intelligence Applications and Innovations Conference (AIAI): 2nd Workshop on Conformal Prediction and its Applications. p. 384-393 10 p. (IFIP Advances in Information and Communication Technology; vol. 412).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Defensive forecasting

    Vovk, V., Takemura, A. & Shafer, G., 2005, Proceedings of the Tenth International Workshop on Articial Intelligence and Statistics. Cowell, R. & Ghahramani, Z. (eds.). p. 365-372 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Defensive forecasting for linear protocols

    Vovk, V., Nouretdinov, I., Takemura, A. & Shafer, G., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, Vol. 3734. p. 459-473 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Defensive prediction with expert advice

    Vovk, V., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, p. 444-458 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Definitions of corporate social responsibility: Content, range of authors, evolution over time

    Preuss, L., 2015, Annual Meeting of the International Association for Business and Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Delay and jitter attacks on hierarchical state estimation

    Baiocco, A., Foglietta, C. & Wolthusen, S., 21 Mar 2016, Proceedings of the 2015 IEEE International Conference on Smart Grid Communications. IEEE Press, p. 485-490

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Delegation and satisfiability in workflow systems

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 31-40 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H., 2006, Proceedings of 11th European Symposium on Research in Computer Security. Springer, p. 174-191 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Democratising Capitalism: Employee Share ownership schemes and unions

    Sen Gupta, S., 2013, European Academy of Management, University of Galatsaray, Istanbul, Turkey.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Dependent coercions

    Luo, Z. & Soloviev, S., 1999, Proc of the 8th Inter. Conf. on Category Theory in Computer Science (CTCS'99), Edinburgh, Scotland. Electronic Notes in Theoretical Computer Science, Vol 29.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Dependent Randomized Rounding: The Bipartite Case

    Doerr, B., Künnemann, M. & Wahlström, M., 2011, 2011 Proceedings of the Thirteenth Workshop on Algorithm Engineering and Experiments (ALENEX). Müller-Hannemann, M. & Werneck, R. (eds.). San Francisco, California, USA: SIAM, p. 96-106 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Dependent record types revisited

    Luo, Z., 2009, Modules and Libraries for Proof Assistants (MLPA'09), ACM Inter. Conf. Proceeding Series. Vol. 429.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Derandomizing stochastic prediction strategies

    Vovk, V., 1997, Proceedings of the Tenth Annual Conference on Computational Learning Theory. Freund, Y. & Schapire, R. (eds.). New York: ACM Press, p. 32-44 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Deriving Ancient Foot Units from Building Dimensions: a Statistical Approach Employing Cosine Quantogram Analysis

    Pakkanen, J., 2002, Archaeological Informatics: Pushing the Envelope. CAA 2001: Computer Applications and Quantitative Methods in Archaeology. Proceedings of the 29th Conference, Gotland, April 2001. Burenhult, G. & Arvidsson, J. (eds.). Oxford: Archaeopress, p. 501–506 (BAR International Series; vol. 1016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Deriving authentication for pervasive security

    Pavlovic, D. & Meadows, C., 2008, Proceedings of the ISTPS 2008. McLean, J. (ed.). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Forthcoming

    Deriving ephemeral authentication using channel axioms

    Pavlovic, D. & Meadows, C., 2012, (Accepted/In press) Proceedings of the Cambridge Workshop on Security Protocols 2009. Christianson, B. (ed.). Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Description and Classification of Rhodoliths (Rhodoids, Rhodolites)

    Bosence, D., 1983, Coated Grains. Peryt, T. M. (ed.). Springer Berlin / Heidelberg, p. 217-224 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Description of Laser Transport and Delivery System for the FETS Laserwire Emittance Scanner

    Bosco, A., Boorman, G., Emery, S., Gibson, S., Gabor, C., Hofmann, T., Pozimski, J. & Savage, P., 19 Sep 2013, 2nd International Beam Instrumentation Conference. p. 527-530 4 p. TUPF14

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Design and development of a facebook application to raise privacy awareness

    Costantino, G. & Sgandurra, D., 2015, Proceedings - 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2015. Institute of Electrical and Electronics Engineers Inc., p. 583-586 4 p. 7092778

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Design of a Laser-based Profile Monitor for LINAC4 Commissioning at 50 MeV and 100 MeV

    Hofmann, T., Boorman, G., Bosco, A., Bravin, E., Gibson, S. & Griesmayer, E., Jan 2016, 4th International Beam Instrumentation Conference: IBIC2015, Melbourne, Australia. JACoW Publishing, p. 451-455 4 p. TUPB055

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Design of a multiagent-based e-marketplace to secure service trading on the Internet

    Li, Q., Martin, K. M. & Zhang, J., 2011, Proceedings of the 13th International Conference on Electronic Commerce (ICEC 2011) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Design of the beam delivery system for the international linear collider

    Seryi, A., Amann, J., Arnold, R., Asiri, F., Bane, K., Bellomo, P., Doyle, E., Fasso, A., Jonghoon, K., Keller, L., Ko, K., Li, Z., Markiewicz, T., Maruyama, T., Moffeit, K., Molloy, S., Nosochkov, Y., Phinney, N., Raubenheimer, T., Seletskiy, S. & 81 others, Smith, S., Spencer, C., Tenenbaum, P., Walz, D., White, G., Woodley, M., Woods, M., Xiao, L., Anerella, M., Jain, A., Marone, A., Parker, B., Delferriere, O., Napoly, O., Payet, J., Uriot, D., Watson, N., Agapov, I., Baldy, J-L., Schulte, D., Burt, G., Dexter, A., Buesser, K., Lohmann, W., Bellantoni, L., Drozhdin, A., Kashikhin, V., Kuchler, V., Lackowski, T., Mokhov, N., Nakao, N., Peterson, T., Ross, M., Striganov, S., Tompkins, J., Wendt, M., Yang, X., Enomoto, A., Kuroda, S., Okugi, T., Sanami, T., Suetsugu, Y., Tauchi, T., Alabau, M. D. C., Bambade, P., Brossard, J., Dadoun, O., Burrows, P., Christian, G., Clarke, C., Constance, B., Khah, H. D., Hartin, A., Perry, C., Swinson, C., Ferrari, A., Blair, G., Boogert, S., Carter, J., Angal-Kalinin, D., Beard, C., Densham, C., Fernandez-Hernando, L., Greenhalgh, J., Goudket, P., Jackson, F., Jones, J., Kalinin, A., Ma, L., McIntosh, P., Yamamoto, H., Mattison, T., Carwardine, J., Saunders, C., Appleby, R., Torrence, E., Gronberg, J., Sanuki, T., Iwashita, Y., Telnov, V. & Warner, D., 2007, Particle Accelerator Conference, 2007. PAC. IEEE. p. 3773-3775 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Design, development and use of the spectrometer for investigating coherent THz radiation produced by micro-bunching instabilities at Diamond Light Source

    Finn, A., Karataev, P. & Rehm, G., 1 Jul 2016, Journal of Physics: Conference Series. Karataev, P., Potylitsyn, A., Tyukhtin, A. & Strikhanov, M. (eds.). UK: IOP PUBLISHING LTD, Vol. 732. p. 1-9 9 p. 012039. (Radiation from Relativistic Electrons in Periodic Structures; vol. 732).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Design, Installation and Execution of a Security Agent for Mobile Stations.

    Sirett, W. G., MacDonald, J. A., Mayes, K. & Markantonakis, K., 2006, CARDIS. Domingo-Ferrer, J., Posegga, J. & Schreckling, D. (eds.). Springer, Vol. 3928. p. 1-15 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Unpublished

    Designing digital games as a geographical research method

    Lowe, J., 1 Jul 2020, (Unpublished) Using the Digital: Methodologies, Teaching, and Everyday Practice: Digital Geographies Research Group Virtual Annual Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Designing for creep in composites

    Hogg, P. J., 1998, DESIGNING COST-EFFECTIVE COMPOSITES. WESTMINISTER: PROFESSIONAL ENGINEERING PUBLISHING LTD, p. 93-106 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. E-pub ahead of print

    Designing Robust Software Systems through Parametric Markov Chain Synthesis

    Calinescu, R., Ceska, M., Gerasimou, S., Kwiatkowska, M. & Paoletti, N., 18 May 2017, Software Architecture (ICSA), 2017 IEEE International Conference on. p. 131-140 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Designing Workflows for Grid Enabled Internet Instruments

    Stirling, D., Welch, I. & Komisarczuk, P., 2008, 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France. p. 218-225 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S., 9 Sep 2018, Proceedings of the 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017). Springer-Verlag, p. 131-143 13 p. (Lecture Notes in Computer Science; vol. 10707).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?

    Crampton, J. & Huth, M., 2009, Proceedings of 5th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. E-pub ahead of print

    Detecting disguised processes using application-behavior profiling

    Vaas, C. & Happa, J., 8 Jun 2017, Technologies for Homeland Security (HST), 2017 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Detecting Exceptions in Commitment Protocols: Discovering Hidden States

    Kafali, O. & Yolum, P., 2010, Languages, Methodologies and Development Tools for Multi-Agent Systems. Vol. 6039. p. 112-127 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013. p. 300-303 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Detecting Malicious Code by Model Checking

    Kinder, J., Katzenbeisser, S., Schallhart, C. & Veith, H., 2005, Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, p. 174-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach

    Hague, M., Lin, A. & Ong, C-H. L., 23 Oct 2015, OOPSLA: Object-Oriented Programming Systems, Languages and Applications. New York, NY: ACM, p. 1-19 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes

    Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 81-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 310-316 7 p. (Lecture Notes in Computer Science; vol. 10898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Forthcoming

    Determining Confidence of Predicted Interactions Between HIV-1 and Human Proteins Using Conformal Method

    Nouretdinov, I., Gammerman, A., Qi, Y. & Klein-Seetharaman, J., 2012, (Accepted/In press) Pacific Symposium on Biocomputing. Vol. 17. p. 311-322 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) Attacks

    Esnaashari, S., Welch, I. & Komisarczuk, P., 2013, 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013. p. 725-729 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Deterministic versus Probabilistic Methods for Searching for an Evasive Target

    Bernardini, S., Fox, M., Long, D. & Piacentini, C., 12 Feb 2017, Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17). p. 3709-3715 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Developing a multi-level framework of sustainability innovation

    Dyerson, R. & Preuss, L., Sep 2011, 25th annual conference of the British Academy of Management (BAM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Developing a Typology of Social Commerce Websites- An Exploratory Study

    Panteli, N., 2015, 2015 Academy of Marketing Conference – The Magic in Marketing: University of Limerick, Ireland 7-9 July 2015. O'Malley, L. (ed.). p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Developing reuse technology in proof engineering

    Luo, Z., 1 Apr 1995, Proceedings of AISB95, Workshop on Automated Reasoning: bridging the gap between theory and practice, Sheffield, U.K..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Developing virtual medical communities

    Panteli, N. & Sims, J., 2010, Proceedings of the IADIS International Conference e-Health 2010, EH, Part of the IADIS Multi Conference on Computer Science and Information Systems 2010, MCCSIS 2010. p. 249-252 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Development and testing of the inTouch video link for people with dementia: Design approach and practical challenges

    Boyd, H., Jones, S., Harris, N., Panteli, N., Leake, J. & Jones, R., 29 Dec 2014, Proceedings - 2014 IEEE International Conference on Bioinformatics and Biomedicine, IEEE BIBM 2014. Institute of Electrical and Electronics Engineers Inc., p. 608-612 5 p. 6999231

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Development of a BPM System using a Commercial FPGA Card and Digitizer Adaptor Module for FETS

    Boorman, G., Gibson, S., Jolly, S., D'Arcy, R., Lawrie, S. & Letchford, A., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 3716-3719 4 p. THPME186

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Development of a Prototype Electro-Optic Beam Position Monitor at the CERN SPS

    Arteche, A., Bosco, A., Gibson, S., Chritin, N., Draskovic, D., Lefevre, T. & Levens, T., Feb 2017, 5th International Beam Instrumentation Conference: 11-15 September 2016, Barcelona, Spain. Geneva: JACoW Publishing, p. 1-4 4 p. WEPG09

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Development of microwave and soft X-ray sources based on coherent radiation and Thomson scattering

    Aryshev, A., Araki, A., Fukuda, M., Karataev, P., Naumenko, G., Potylitsyn, A., Sakaue, K., Sukhikh, L., Urakawa, J. & Verigin, D., 2010, VIII INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2009). Strikhanov, MN. & Pivovarov, YL. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Development of natural HEMP fibre sheet mould composites (NF- SMC)

    Ren, G., Patel, H., Hapuarachchi, D., Crowther, S., Fan, M. & Hogg, P. J., 1 Dec 2009, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Development of the C-Band BPM System for ATF2

    Molloy, S., Ainsworth, R., Boogert, S., Boorman, G., Heo, A., Kim, H. -S., Kim, E. -S., Honda, Y., Tauchi, T., Terunuma, N., Lyapin, A., Maiheu, B., Wing, M., McCormick, D. J., Nelson, J., White, G. R., Shin, S. & Ward, D. R., 2009, Proceedings of IPAC'09, Vancouver, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Development of the Sorong Fault Zone north of Misool Eastern Indonesia

    Saputra, A., Hall, R. & White, L., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. Jakarta, Indonesia, p. 1-14 IPA14-G-086

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    DEX: Self-Healing Expanders

    Pandurangan, G., Robinson, P. & Trehan, A., 2014, 2014 IEEE 28th International Parallel and Distributed Processing Symposium, Phoenix, AZ, USA, May 19-23, 2014. p. 702-711 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Diabetes, Type 1

    Riazi, A. & Bradley, C., 2000, Encyclopedia of Stress . Fink, G. (ed.). San Diego: Acadamic Press, p. 688-693 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Diagnosing Commitments: Delegation Revisited (Extended Abstract)

    Kafali, O. & Torroni, P., 2011, AAMAS 2011: 10th International Conference on Autonomous Agents and Multiagent Systems. p. 1175-1176 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Diagnosing the Clinician: Business Capability Development and GP Practices

    Dyerson, R., Nov 2017, 2017 Proceedings of the International Small Business & Entrepreneurship conference, Belfast. 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    DIESECT: A DIstributed Environment for Simulating E-commerce ContracTs

    Wood, D., Kafali, O. & Stathis, K., 2013, E-Commerce and Web Technologies. Huemer, C. & Lops, P. (eds.). Springer Berlin / Heidelberg, Vol. 152. p. 39-50 12 p. (Lecture Notes in Business Information Processing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution