Home > Publications

Publications

34401 - 34500 out of 36,669Page size: 100
  1. Conference contribution › Research
  2. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    USING SATELLITES FOR PROVIDING BROADBAND ISLAND INTERCONNECTION-THE RACE IIlR2074 (CATALYST) PROJECT

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, AIAA International Communications Satellite Systems Conference, 15 th, San Diego, CA. p. 407-412 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Using the Choice Framework to Situate Cases of Collective Action in Capabilities Thinking: The Example of Public Procurement

    Kleine, D., Jun 2013, Maitreyee - e-Journal of the Human Development and Capability Association. Human Development and Capability Association (HDCA), p. 15-18 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Using Verification Technology to Specify and Detect Malware

    Holzer, A., Kinder, J. & Veith, H., Feb 2007, 11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers. Springer, p. 497-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Utilisation de la méthode de la matrice R dans les calculs de l'ionisation d'atomes par impact d'électrons rapides

    Mota-Furtado, F., O'Mahony, P. & Hennecart, D. (ed.), 1989, Proceedings of Invited Lectures presented at 12ème Colloque sur la Physique des Collisions Atomiques et Electroniques (Caen, 21-24 June 1988), Conférences Invitées. Vol. 2. p. 101-117

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Valid Probabilistic Prediction of Life Status after Percutaneous Coronary Intervention procedure

    Volkhonskiy, D., Nouretdinov, I., Gammerman, A. & Lim, P., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Validating an Insider Threat Detection System: A Real Scenario Perspective

    Agrafiotis, I., Erola, A., Happa, J., Goldsmith, M. & Creese, S., 4 Aug 2016, IEEE Security and Privacy Workshop on Research for Insider Threat. IEEE, p. 286-295 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Validation of a Seven Serum Biomarker Panel in Ovarian Cancer

    Timms, J. F., Arslan-Low, E., Cubizolles, M., Lomas, L., Yip, C., Meng, X-Y., Hogdall, E., Gentry-Maharaj, A., Ford, J., Burford, B., Nouretdinov, I., Vovk, V., Luo, Z., Menon, U., Gammerman, A., Fung, E. T. & Jacobs, I., 2007, Proceedings of the 15th International Meeting of the European Society of Gynaecological Oncology.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Variability and rigour in Service Computing engineering

    Ter Beek, M. H., Gnesi, S., Fantechi, A. & Fiadeiro, J. L., 1 Jan 2012, Proceedings - 2011 34th IEEE Software Engineering Workshop, SEW 2011. p. 122-127 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Varying Representation Schemata vs Fact Updating in KB Management

    Carapuça, R. & Fiadeiro, J. L., 1986, DS-2. p. 71-87 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Venn-Abers predictors

    Vovk, V. & Petej, I., 2014, Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence. p. 829-838 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Veraci fizioni. Sullo statuto della letteratura nella cultura delle Corti

    Jossa, S., 2010, A. Quondam (ed.), Classicismo e culture di Antico regime (Roma: Bulzoni, 2010). Quondam, A. (ed.). Bulzoni, p. 197-212 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Vers une architecture modulaire d'agent argumentatif pour la composition de services

    Morge, M., McGinnis, J., Bromuri, S., Toni, F. C., Mancarella, P. & Stathis, K., 1 Nov 2006, Proc. of the of 15th Journees Francophones sur les Systemes M ulti-Agents (JFSMA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Dec 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, p. 391-398 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Virtual infrastructure for collision-prone wireless networks

    Chockler, G., Gilbert, S. & Lynch, N., Aug 2008, Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing. Toronto, ON, Canada: ACM, p. 233-242 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Virtual Interacting Network Community: Exploiting Multi-core Architectures to Increase Security

    Baiardi, F. & Sgandurra, D., 2008, Proceedings of the 5th Conference on Computing Frontiers. New York, NY, USA: ACM, p. 111-112 2 p. (CF '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Visible-Spectrum Biometric Retina Recognition

    Borgen, H., Bours, P. & Wolthusen, S. D., 15 Aug 2008, Proc. 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP '08). IEEE Computer Society Press, p. 1056-1062

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Visualizing narratives: The case of the celebrity CEO (Panel discussion)

    Reppel, A. & Kravets, O., 7 Jul 2016, Proceedings of the 41st Annual Macromarketing Conference. p. 107-108

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Warlordism and the making of the Roman imperial army

    Rankov, B., 2018, Warlords and Interstate Relations in the Ancient Mediterranean. Naco del Hoyo, T. & Lopez Sanchez, F. (eds.). Leiden/Boston MA: E. J. Brill, p. 415-25 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Water Logging in Keshanbpur: A Focus to the Coping Strategies of the People

    Adri, N. & Islam, I., 2010, Proceedings of International Conference on Environmental aspects of Bangladesh (ICEAB 10). Japan, p. 33-36 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    We Crashed, Now What?

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 3 Oct 2010, Proceedings of the 6th Workshop on Hot Topics in System Dependability (HotDep'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Weak Synchrony Models and Failure Detectors for Message Passing (k-)Set Agreement

    Biely, M., Robinson, P. & Schmid, U., 2009, Principles of Distributed Systems, 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings. p. 285-299 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Weak Transitivity in Coercive Subtyping

    Luo, Y., Luo, Z. & Soloviev, S., 2003, Types for Proofs and Programs, Proc. of Inter Conf of TYPES'02. LNCS 2646. p. 220--239

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Web based student information management system in universities: experiences from Mzuzu University

    Lubanga, S. C., Chawinga, W. D., Majawa, F. & Kapondera, S., 2018, Standing Conference of the Eastern, Central and Southern Africa Librarians and Institutions (SCESCAL).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Web Password Recovery: A Necessary Evil?

    Al Maqbali, F. & Mitchell, C. J., 2019, Proceedings of the Future Technology Conference (FTC) 2018, Volume 2: Vancouver, November 2018. Springer-Verlag, p. 324-341 18 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Web Server on a SIM Card

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2010, Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. Ao, S. I., Gelman, L., Hukins, D. WL., Hunter, A. & Korsunsky, A. M. (eds.). Newswood Limited, Vol. I. p. 253-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Weighted Kernel Regression for Predicting Changing Dependencies

    Busuttil, S. & Kalnishkan, Y., 2007, Machine Learning: ECML 2007, 18th European Conference on Machine Learning: volume 4701 of Lecture Notes in Computer Science. Springer, p. 535-542 (Lecture Notes in Computer Science; vol. 4701).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Wellbore instability during plasma-torch drilling in geothermal reservoirs

    Bazargan, M., Meredith, P., Forbes Inskip, N., Gudmundsson, A., Soliman, M., Habibpour, M., Rezaei, A. & Browning, J., 2015, 49th US Rock Mechanics / Geomechanics Symposium, San Francisco, CA, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Well-calibrated predictions from online compression models

    Vovk, V., 2003, Proceedings of the Fourteenth International Conference on Algorithmic Learning Theory. Gavalda, R., Jantke, K. & Takimoto, E. (eds.). Berlin: Springer, p. 268-282 15 p. (Lecture Notes in Artificial Intelligence; vol. 2842).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Wellness Tourism and Incremental Quality of Life: A Study of a Niche Tourist Segment of Muay Thai Enthusiasts

    Hosany, S. & Deesilatham, S., 2015, Travel and Tourism Research Association (TTRA) European Chapter Conference: Service Innovation and Experiences, Innsbruck, Austria, April 22-24.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Wellness Tourism and Quality of Life: Understanding the Motives, Lifestyle, Feelings, Satisfaction and Subjective Well-Being of Muay Thai Enthusiasts.

    Deesilatham, S. & Hosany, S., 2015, The European Institute of Retailing and Service Studies (EIRASS) 22nd International Conference on Recent Advances in Retailing & Services Science. Montreal, Canada, July 27-30.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Wellness Tourism: Determinants of Incremental Enhancement in Tourists’ Quality of Life

    Hosany, S. & Deesilatham, S., 2015, 3rd World Research Summit for Tourism and Hospitality and 1st USA-China Tourism Research Summit: Transforming Partnerships, Orlando, USA, December 15-19.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Wellness Tourism: Understanding Muay Thai Tourists Travel Motivation

    Deesilatham, S. & Hosany, S., 2016, The European Institute of Retailing and Service Studies (EIRASS) 23rd International Conference on Recent Advances in Retailing & Services Science. Edinburgh, Scotland, July 11-14.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Weyl's Predicative Classical Mathematics as a Logic-Enriched Type Theory

    Adams, R. & Luo, Z., 2007, Types for Proofs and Programs. Altenkirch, T. & McBride, C. (eds.). Springer, Vol. 4502. p. 1-17 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    What CSR scholars can learn from the innovation literature

    Preuss, L., Apr 2010, annual conference of the UK Association of the European Business Ethics Network (EBEN-UK).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    What happened to my commitment? Exception diagnosis among misalignment and misbehavior

    Kafali, O., Chesani, F. & Torroni, P., 2010, Computational Logic in Multi-Agent Systems (CLIMA XI). Vol. 6245. p. 82-98 17 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    What impact does peer support have on school climate? Findings from a 4 month case study of an English secondary school

    James, A., Smith, P. K. & Radford, L., 2010, Proceedings of the II Congress on Community Life at School.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. E-pub ahead of print

    What is decidable about string constraints with the ReplaceAll function

    Chen, T., Chen, Y., Hague, M., Lin, A. & Wu, Z., 27 Dec 2017, Principles of Programming Languages 2018 (POPL 2018). Vol. 2. p. 1-29 29 p. 3

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    When Hardware Meets Software: a Bulletproof Solution to Forensic Memory Acquisition

    Reina, A., Fattori, A., Pagani, F., Cavallaro, L. & Bruschi, D., Dec 2012, Annual Computer Security Application Conference (ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. E-pub ahead of print

    White-Box Atomic Multicast

    Gotsman, A., Lefort, A. & Chockler, G., 22 Aug 2019, 49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2019). p. 176-187 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Who is in Control in Crowdsourcing Initiatives? An Examination of the Case of Crowdmapping

    Shahid, A. R. & Elbanna, A., 2 Aug 2016, Nordic Contributions in IS Research: 7th Scandinavian Conference on Information Systems, SCIS 2016 and IFIP8.6 2016, Ljungskile, Sweden, August 7-10, 2016, Proceedings. Springer International Publishing, Vol. 259. p. 135-148 14 p. (Lecture Notes in Business Information Processing; vol. 259).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Who says personas can't dance? The use of comic strips to design information security personas

    Lewis, M. & Coles-Kemp, L., 2014, CHI EA '14 : CHI '14 Extended Abstracts on Human Factors in Computing Systems . ACM, p. 2485 2490 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Why don’t things happen? Hurdles to green practices

    Guenther, E., Hockerts, K., Linnenluecke, M. & Preuss, L., Aug 2009, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Why we should take a second look at access control in Unix

    Crampton, J., 2008, Proceedings of 13th Nordic Workshop on Secure IT Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Winning Regions of Higher‐Order Pushdown Games

    Carayol, A., Hague, M., Meyer, A., Ong, C-H. L. & Serre, O., 2008, LICS: Logic in Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Winning Regions of Pushdown Parity Games: A Saturation Method

    Hague, M. & Ong, C-H. L., 2009, Concur: Concurrency Theory.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Unpublished

    Work organization, employee voice and engagement: exploring the connections

    Rees, C., Gatenby, M., Alfes, K., Soane, E. & Truss, K., Jul 2009, (Unpublished) British Universities Industrial Relations Association (BUIRA) 59th Annual Conference. Cardiff.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. In preparation

    Working towards the Millennium Development Goals: NGO Accountability and Performance Assessment

    Agyemang, G., Owusu, C. & Giovannoni, E., 2015, (In preparation) British Accounting and Finance Association.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Unpublished

    Workshop And the ICT4kids Oscar goes to…: Good practice in engaging children and youth in development

    Kleine, D., Hollow, D. & Poveda Villalba, S., 2014, (Unpublished) Workshop And the ICT4kids Oscar goes to…: Good practice in engaging children and youth in development. Deutsche Welle

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Worldwide Supply Chain Strategies

    Aboutalebi, R., 28 Oct 2015, In: EAMSA (Euro-Asia Management Studies Association), the 32nd Annual Conference of EAMSA: Theory and Practice in Bringing Europe and Asia- Contemporary Challenges in International Marketing. 28-31 October 2015, SOAS, University of London, England, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Yiddish Songs of London: Jewish Migration and Anglicisation

    Lachs, V., 2013, The London Reader 1: Essays from Londonicity 2011. p. 85-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    You Are The Hero: Stephen Mooney's The Cursory Epic

    Gene-Rowe, F., 28 Jun 2016, SFRA Conference 2016. Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. E-pub ahead of print

    You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques

    Loe, A. & Quaglia, E., 6 Nov 2019, Proceedings of ACM CCS '19. p. 2231-2247 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G., 1 Nov 2009, CCS '09 Proceedings of the 16th ACM conference on Computer and communications security. New York: ACM, p. 635-647

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    Li, W., Mitchell, C. J. & Chen, T., 22 Dec 2018, Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers. Matyáš, V., Švenda, P., Stajano, F., Christianson, B. & Anderson, J. (eds.). Springer, p. 24-41 18 p. (Lecture Notes in Computer Science; vol. 11286).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Zemax simulations for an optical system for a diffraction radiation monitor at cesrta

    Aumeyr, T., Karataev, P., Bobb, L. M., Bolzon, B., Lefevre, T., Mazzoni, S. & Billing, M. G., 24 Dec 2013, IPAC 2013: Proceedings of the 4th International Particle Accelerator Conference. p. 789-791 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

    Ankele, R., Dobraunig, C., Guo, J., Lambooij, E., Leander, G. & Todo, Y., 8 Mar 2019, IACR Transactions on Symmetric Cryptology. 1 ed. Paris, France: Ruhr-Universität Bochum, Vol. 2019. p. 192-235 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Zero-point probability for linear source separation

    Scruby, G. J. & Flockton, S., 1999, Advances in Soft Computing - Engineering Design and Manufacturing. Roy, R., Furuhashi, T. & Chawdhry, P. K. (eds.). SPRINGER-VERLAG BERLIN

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Zubin Kanga: “The soloist has many faces: Examining the expanding skillset of the modern freelance musician”, RMA Study Day, The Classical Musician in the 21st Century, 23 May 2019.

    Kanga, Z., 2019, RMA Study Day, The Classical Musician in the 21st Century, 23 May 2019. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Zubin Kanga: “WIKI-PIANO: an internet-based collaborative composition”, lecture-recital at the Music and/as Process conference, Institute of Contemporary Music Performance, London, 26 July 2019.

    Kanga, Z., 2019, Music and/as Process conference, Institute of Contemporary Music Performance, London, 26 July 2019. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Zubin Kanga: “WIKI-PIANO: realising an internet-composed solo piano work by Alexander Schubert”, Getting it Right? New Music/New Technologies conference, Guildhall School of Music and Drama and the London Symphony Orchestra, 20 March 2019.

    Kanga, Z., 2019, Getting it Right? New Music/New Technologies conference, Guildhall School of Music and Drama and the London Symphony Orchestra, 20 March 2019. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Βυζαντινὲς Σπουδὲς στὸ Πανεπιστήμιο τοῦ Λονδίνου

    Dendrinos, C., 1999, Α' Συνάντηση Βυζαντινολόγων Ἑλλάδος καὶ Κύπρου, 25-27 Σεπτεμβρίου 1998, Πανεπιστήμιο Ἰωαννίνων, Φιλοσοφικὴ Σχολή . Ioannina, p. 99-100

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. E-pub ahead of print

    δ-subgaussian Random Variables in Cryptography

    Murphy, S. & Player, R., 30 May 2019, ACISP 2019 -- The 24th Australasian Conference on Information Security and Privacy. Springer, p. 251-268 18 p. (LNCS; vol. 11547).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Μανουὴλ Β' Παλαιολόγου Ὑποθῆκαι βασιλικῆς ἀγωγῆς

    Dendrinos, C., 2000, Β' Συνάντηση Βυζαντινολόγων Ἐλλάδος καὶ Κύπρου, 24-26 Σεπτεμβρίου 1999, Πανεπιστήμιο Ἀθηνῶν, Φιλοσοφικὴ Σχολή. Athens, p. 159-162

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Об одном критерии случайности для полных последовательностей

    Vovk, V., 1986, Седьмая тематическая конференция механико-математического факультета: Алгебра, логика и теория чисел. Moscow: Moscow State University, p. 34-37 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    澳門開展地理鄉土教育的回顧與反思

    Tam, T-I., May 2013, 第十七屆臺灣地理國際學術研討會論文集: 十二年國教下地理教育與環境教育的展望. Taipei, Taiwan (R.O.C.): Department of Geography, National Taiwan Normal University, p. B2-1-B2-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Foreword/postscript › Research
  73. Published

    Afterword

    Samson, J., 2019, Music, Language and Identity in Greece: Defining a National Art Music in the Nineteenth and Twentieth Centuries. Tambakaki, P., Vlagopoulos, P., Levidou, K. & Beaton, R. (eds.). Newcastle-upon-Tyne: Cambridge Scholars Publishing, p. 292-299 8 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  74. Published

    Dagsthul Seminar on Foundations of Global Computing

    Fiadeiro, J. L., Montanari, U. & Wirsing, M., 2006, Foundations of Global Computing. Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, Vol. 05081. (Dagstuhl Seminar Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  75. Published

    'Dedication': The Literary Legacy of Byzantium. Editions, Translations, and Studies in Honour of Joseph A. Munitiz SJ, ed. Bram Roosen and Peter Van Deun

    Dendrinos, C., 2019, Βυζάντιος: Studies in Byzantine History and Civilization. Turnhout: Brepols, Vol. 15. p. 1-3

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  76. Published

    Director's Note

    Overend, D., Aug 2017, The Majority by Rob Drummond. Bloomsbury Methuen Drama, p. 5-6

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  77. Published

    Editors' introduction

    Hutter, M., Stephan, F., Vovk, V. & Zeugmann, T., 2010, Proceedings of the Twentieth International Conference on Algorithmic Learning Theory. Berlin: Springer, Vol. 6331. p. 1-10 10 p. (Lecture Notes in Articial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  78. Published

    Evolving critical systems

    Hinchey, M., Nuseibeh, B., Coyle, L. & Fiadeiro, J. L., 1 Feb 2011, Dagsthul seminar. Vol. 34. p. 105-107 3 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  79. Published

    Foreword

    Hampson, R., 2012, False memory (by Tony Lopez). Shearsman/ University of Plymouth Press

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  80. In preparation

    International Networks and Capability Building in the Inter-War Electrical Industry: Britain and its Global Rivals

    Fitzgerald, R., 2020, (In preparation) Global business history of general electrical companies (tbc).

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  81. Published

    Introduction

    Gabe, J. & Calnan, M., 5 May 2009, The New Sociology of the Health Service. Routledge Taylor & Francis Group, p. 1-16 16 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  82. Published

    Introduction

    Sheppard, A., Jul 2013, Ancient Approaches to Plato's Republic. London: Institute of Classical Studies, London, p. 1-2 2 p. (BICS Supplements; no. 117).

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  83. Published

    Introduction

    Widder, N., 2012, I am your Anti-Matter. Chen, L-E. (ed.). Li-E Chen, p. 8-10 3 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  84. Published

    Introduction

    Sheppard, A., Sep 2015, BICS Virtual Issue on Ancient Philosophy. Sheppard, A. (ed.). Wiley-Blackwell, 6 p. (Bulletin of the Institute of Classical Studies).

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  85. Published

    Introduction: Hermann Hesse and Siddhartha in Context

    Hughes, J., Nov 2012, Hermann Hesse, Siddhartha : Special Limited Anniversary Edition. London: Peter Owen, p. 19-46 28 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  86. Published

    Introduction

    Dymkowski, C., 1995, Eugene O’Neill, Ah! Wilderness. London: Nick Hern Books, p. vii-xxvi

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  87. Published

    Introduction

    Dymkowski, C., 1995, Eugene O’Neill, Desire under the Elms and The Great God Brown. London: Nick Hern Books, p. vii-xxviii

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  88. Published

    Introduction

    Dymkowski, C., 1991, Eugene O’Neill, Long Day’s Journey into Night. London: Nick Hern Books, p. vii-xxvii

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  89. Published

    Introduction

    Dymkowski, C., 1991, Eugene O’Neill, Strange Interlude. London: Nick Hern Books, p. v-xxiii

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  90. Published

    Introduction

    Dymkowski, C. & vii-xxix, 1991, Anna Christie & The Emperor Jones: Introduction by Christine Dymkowski. London: Nick Hern Books

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  91. Published

    Introduction

    Dymkowski, C., 1992, Eugene O’Neill, A Moon for the Misbegotten. London: Nick Hern Books, p. v-xxvii

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  92. Published

    Introduction

    Dymkowski, C., 1992, Eugene O’Neill, Mourning Becomes Electra. London: Nick Hern Books, p. v-xxix

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  93. Published

    Introduction

    Dymkowski, C., 1993, Eugene O’Neill, The Hairy Ape and All God’s Chillun Got Wings. London: Nick Hern Books, p. vi-xxvi

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  94. Published

    Introduction

    Dymkowski, C., 1993, Eugene O’Neill, A Touch of the Poet. London: Nick Hern Books, p. v-xxv

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  95. Published

    Introduction

    Dymkowski, C., 1993, Eugene O’Neill, The Iceman Cometh. London: Nick Hern Books, p. v-xxvi

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  96. Published

    Introduction

    Ansari, S., 2005, Decade of the Dacoits by Imdad Hussain Sahito. Karachi: OUP, p. ix-xv 7 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  97. Published

    Introduction to Folio Society edition of Selected Poems of Emily Dickinson

    Greenlaw, L., 1 Jun 2016, Emily Dickinson Selected Poems. London: Folio Society, p. xv-xxii 7 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  98. Published

    Introduction: "A presence queer unwelcome here": On Eris and Unhappiness

    Bullen, D., 2018, ERIS by John King. London and New York: Methuen Drama

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  99. Published

    Introduction: Le Pas Mal de Siecle

    Fordham, F. & Sakr, R., 2011, James Joyce and the 19th Century French Novel. Fordham, F. & Sakr, R. (eds.). Rodopi

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  100. Published

    Marjorie Reeves: A Personal Tribute

    Gould, W., 2011, The Life and Thought of Marjorie Reeves FBA (1905-2003): : Advocate for Humanist Scholarship and Opponent of Utilitarian University Education. Lewiston, Queenston, Lampeter: The Edwin Mellen Press, p. ii-xxiii 21 p.

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  101. Published

    McMurdo's Account of Sind: An Introduction

    Ansari, S., 2008, McMurdo's Account of Sind (ed.). Karachi: OUP

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript

  102. Published

    Play it Again Morris: On Pianos, the Past, and all that Jazz

    Maclaran, P., 2015, Legends in Marketing – Morris B. Holbrook, Volume 6:. Thousand Oaks, CA: Sage publications

    Research output: Chapter in Book/Report/Conference proceedingForeword/postscript