Home > Publications

Publications

32501 - 33000 out of 36,749Page size: 500
  1. Conference contribution › Research
  2. Published

    An extensible, self contained, layered approach to context acquisition

    Kramer, D., Kocurova, A., Oussena, S., Clark, T. & Komisarczuk, P., 2011, Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing. p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    An Identity for Kernel Ridge Regression

    Zhdanov, F. & Kalnishkan, Y., 2010, Learning Theory 21st International Conference, ALT 2010, Proceedings: volume 6331 of Lecture Notes in Computer Science. Springer, p. 405-419 (Lecture Notes in Computer Science; vol. 6331).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data

    Swift, S., Tucker, A., Crampton, J. & Garway-Heath, D., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 2174-2181 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    An information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Classical Correspondence: Proceedings of the 4th Drexel Symposium on Quantum Nonintegrability. Feng, D. H. & Hu, B. L. (eds.). Cambridge, Massachusetts: International Press, p. 339-353

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    An institutionalist perspective of IT-enabled change of Health Management Information Systems in Africa: implications for the Open-Source Software

    Bernardi, R., 2009, 10th International Conference on Social Implications of Computers in Developing Countries: Assessing the Contribution of ICT to Development Goals. Byrne, E., Nicholson, B. & Salem, F. (eds.). IFIP WG9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    An interface theory for service-oriented design

    Fiadeiro, J. L. & Lopes, A., 1 Jan 2011, Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011. Proceedings. Giannakopoulou, D. & Orejas, F. (eds.). p. 18-33 16 p. (Lecture Notes in Computer Science; vol. 6603).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    An NFC based consumer-level counterfeit detection framework

    Saeed, Q., Walter, C. & Bilal, Z., 2013, The 11th International Conference on Privacy, Security and Trust (PST 2013). IEEE, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    An Obfuscation-Based Approach against Injection Attacks

    Baiardi, F. & Sgandurra, D., 1 Aug 2011, 2011 Sixth International Conference on Availability, Reliability and Security. p. 51-58 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    An online secret sharing scheme which identifies all cheaters

    Yeun, C. Y., Mitchell, C. J. & Burmester, M., 1998, Proceedings of NORDSEC '98, Trondheim, Norway, November 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    An optimal-control application of two paradigms of on-line learning

    Vovk, V., 1994, Proceedings of the Seventh Annual Workshop on Computational Learning Theory. New York: ACM Press, p. 98-109 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    An RFID distance bounding protocol

    Hancke, G. & Kuhn, M. G., 2005, Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm). p. 67-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    An upgraded scanning wire beam profile monitoring system for the ISIS high energy drift space

    Harryman, D., Sep 2017, International Beam Instrumentation Conference 2017. p. 401-405 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    An Upper Bound for Aggregating Algorithm for Regression with Changing Dependencies

    Kalnishkan, Y., 2016, Algorithmic Learning Theory : 27th International Conference, ALT 2016, Bari, Italy, October 19-21, 2016, Proceedings. Springer International Publishing, Vol. 9925. p. 238-252 15 p. (Lecture Notes in Computer Science; vol. 9925).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Analysing and modelling the growth and efficiency of urban transportation infrastructures

    Mohajeri, N., Gudmundsson, A. & Scartezzini, J., 2014, Symposium on Applied Urban Modelling-Planning Urban Infrustructure, Cambridge University.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Analysing evolvable cell design for optimisation of routing options

    Ellin, D. & Flockton, S., Jul 2007, Proceedings Genetic and Evolutionary Computation Conference 2007 (GECCO2007). p. 2687-2694 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Analysing Mu‐Calculus Properties of Pushdown Systems (Tool Presentation)

    Hague, M. & Ong, C-H. L., 2010, SPIN.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Analysing the IOBC Authenticated Encryption Mode

    Mitchell, C. J., 2013, Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, QLD, Australia, July 2013, Proceedings. Boyd, C. & Simpson, L. (eds.). Springer-Verlag, Vol. 7959. p. 1-12 12 p. (Lecture Notes in Computer Science; vol. 7959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks

    Xu, H., Sgandurra, D., Mayes, K., Li, P. & Wang, R., 2017, The 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. p. 291-301 11 p. (Lecture Notes in Computer Science; vol. 10658).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. E-pub ahead of print

    Analysing the security of Google's implementation of OpenID Connect

    Li, W. & Mitchell, C. J., 12 Jun 2016, Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Donostia-San Sebastián, Spain, July 7-8, 2016, Proceedings. Caballero, J., Zurutuza, U. & Rodriguez, R. J. (eds.). Springer-Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science; vol. 9721).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Analysis and implementation of reinforcement learning on a GNU Radio cognitive radio platform

    Ren, Y., Dmochowski, P. A. & Komisarczuk, P., 2010, 5th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2010, Cannes, France, June 9-11, 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Analysis of an innovation-driven supply chain using supply chain innovations from a “low-tech” sector: a perspective from the composites materials sector

    Coronado Mondragon, A. E. & Coronado Mondragon, C. E., 6 Aug 2014, 2014 International Conference on Business Information and Cultural Creativity Industry. Tsai, J. (ed.). Taipei, Taiwan, 11 p. 229

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Analysis of faunal remains: insect analysis

    Elias, S., 2008, Encyclopedia of Archaeology. Persall, D. M. (ed.). Elsevier Science Publishers B.V. (North-Holland), p. 1521-1524

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Analysis of Message Injection in Stream Cipher-based Hash Functions

    Nakano, Y., Cid, C., Fukushima, K. & Kiyomoto, S., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, Vol. 6715. p. 498-513 15 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Analysis of the Bit-Search Generator and sequence compression techniques

    Gouget, A., Sibert, H., Berbain, C., Courtois, N., Debraize, B. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer-Verlag, Vol. 3557. p. 196-214 19 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Analyzing ‘IS in developing countries’ research: A bibliometric study

    Choudrie, J. & Harindranath, G., 2011, Proceedings of the 11th IFIP TC 9/WG 9.4 International Conference on Social Implications of Computers in Developing Countries, Kathmandu, Nepal. IFIP9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Analyzing and Synthesizing Genomic Logic Functions

    Paoletti, N., Yordanov, B., Hamadi, Y., Wintersteiger, C. M. & Kugler, H., 2014, Computer Aided Verification. p. 343-357 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Analyzing Multi-key Security Degradation

    Luykx, A., Mennink, B. & Paterson, K. G., 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer-Verlag, Vol. 10625 LNCS. p. 575-605 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10625 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Anatomy of Drive-by Download Attack

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013. p. 49-58 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Anomalous Taint Detection (Extended Abstract)

    Cavallaro, L. & Sekar, R., 2008, 11th International Symposium on Recent Advances in Intrusion Detection.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013. Springer-Verlag, p. 321-335

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Anomaly Detection of Trajectories with Kernel Density Estimation by Conformal Prediction

    Smith, J., Nouretdinov, I., Craddock, R., Offer, C. & Gammerman, A., 19 Sep 2014, Artificial Intelligence Applications and Innovations: AIAI2014 Workshops. Rhodes, Greece: Springer, p. 271-280 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

    Libert, B., Paterson, K. & Quaglia, E., 2012, Public Key Cryptography. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer, Vol. 7293. p. 206-224 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing

    Xu, Z. & Martin, K. M., 2014, The 6th IEEE International Conference on Cloud Computing Technology and Science. IEEE, p. 358-365

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Another Look at Privacy Threats in 3G Mobile Telephony

    Alam, S. & Mitchell, C. J., 2014, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings. Susilo, W. & Mu, Y. (eds.). Berlin: Springer-Verlag, p. 386-396 11 p. (Lecture Notes in Computer Science; vol. 8544).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing

    Pietro, R. D., Lombardi, F., Martinelli, F. & Sgandurra, D., 1 Dec 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing. p. 371-379 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Anything but not food: Acculturation and food consumption practices amongst Chinese students in the UK

    Cappellini, B. & Yen, D. A., 2010, Global Marketing conference proceedings .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Aug 2009, The 10th International Workshop on Information Security Applications (WISA09). YOUM, H. Y. & Yung, M. (eds.). Busan, Korea: Springer, Vol. 5932/2009. p. 20-35 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Application of conformal predictors to tea classification based on electronic nose

    Nouretdinov, I., Li, G., Gammerman, A. & Luo, Z., 2010, Artificial Intelligence Applications and Innovations. Springer, p. 303-310

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008. p. 1426-1432 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    APPLICATION OF GENETIC ALGORITHMS TO INFINITE IMPULSE-RESPONSE ADAPTIVE FILTERS

    FLOCKTON, S. J. & WHITE, M. S., 1993, SCIENCE OF ARTIFICIAL NEURAL NETWORKS II. Ruck, DW. (ed.). BELLINGHAM: SPIE - INT SOC OPTICAL ENGINEERING, p. 414-419 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Application of Inductive Confidence Machine to ICMLA competition data

    Nouretdinov, I., Burford, B. & Gammerman, A., 2009, Proceedings of The Eighth International Conference on Machine Learning and Applications. p. 435-438 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Application of optical diffraction radiation to a non-invasive low-emittance high-brightness beam diagnostics

    Karataev, P., Hamatsu, R., Muto, T., Araki, S., Hayano, H., Urakawa, J., Naumenko, G., Potylitsyn, A. & Hirose, T., 2004, QUANTUM ASPECTS OF BEAM PHYSICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 111-118 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Applications of reinforcement learning to cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Workshops (ICC), 2010 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Applications of the oriented permission role-based access control model

    Crampton, J. & Chen, L., 2007, Proceedings of the 26th IEEE International Performance Computing and Communications Conference. IEEE Computer Society Press, p. 387-394 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Applying Conformal Prediction to the Bovine TB Diagnosing

    Adamskiy, M., Nouretdinov, I., Mitchell, A., Coldham, N. & Gammerman, A., 2011, 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, Artificial Intelligence Applications and Innovations 2011, Corfu, Greece, September 15--18, 2011, Proceedings , Part II. . p. 449-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Applying hierarchial and role-based access control to XML documents

    Crampton, J., 2004, Proceedings of 2004 ACM Workshop on Secure Web Services. ACM Press, p. 37-46 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Approaches to integration of uncertain and temporal information in diagnostic reasoning

    Bigham, J., Luo, Z., Cayrac, D., Nordbo, I. & Bouyssounous, B., 1994, Proceedings of Information Processing and the Management of Uncertainty in Knowledge Based Systems. p. 250-255

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    APRIL: Interactively Learning to Summarise by Combining Active Preference Learning and Reinforcement Learning

    Gao, Y., Meyer, C. M. & Gurevych, I., 31 Oct 2018, Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. Brussels, Belgium: Association for Computational Linguistics, p. 4120-4130 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Architectural Handling of Management Concerns in Service-Driven Business Processes

    Al-Ghamdi, A. & Fiadeiro, J. L., 2006, MSVVEIS. INSTICC Press, p. 111-120 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Architecture Migration driven by Code Categorization

    Correia, R., Matos, C., Heckel, R. & El-Ramly, M., 2007, Proceedings of the European Conference on Software Architecture (ECSA). Oquendo, F. (ed.). Springer-Verlag, Vol. 4758. p. 115-122 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Architecture of the ATLAS online physics-selection software at LHC

    Armstrong, S., Baines, J. T., Bee, C. P., Biglietti, M., Bogaerts, A., Boisvert, V., Bosman, M., Brandt, S., Caron, B., Casado, P., Cataldi, G., Cavalli, D., Cervetto, M., Comune, G., Corso-Radu, A., Di Mattia, A., Gomez, M. D., dos Anjos, A., Drohan, J., Ellis, N. & 58 others, Elsing, M., Epp, B., Etienne, F., Falciano, S., Farilla, A., George, S., Ghete, V., Gonzalez, S., Grothe, M., Kaczmarska, A., Karr, K., Khomich, A., Konstantinidis, N., Krasny, W., Li, W., Lowe, A., Luminari, L., Ma, H., Meessen, C., Mello, A. G., Merino, G., Morettini, P., Moyse, E., Nairz, A., Negri, A., Nikitin, N., Nisati, A., Padilla, C., Parodi, F., Perez-Reale, V., Pinfold, J. L., Pinto, P., Polesello, G., Qian, Z., Rajagopalan, S., Resconi, S., Rosati, S., Scannicchio, D. A., Schiavi, C., Schoerner-Sadenius, T., Segura, E., de Seixas, J. M., Shears, T., Sivoklokov, S., Smizanska, M., Soluk, R., Stanescu, C., Tapprogge, S., Touchard, F., Vercesi, V., Watson, A., Wengler, T., Werner, P., Wheeler, S., Wickens, F. J., Wiedenmann, W., Wielers, M. & Zobernig, H., 2004, ASTROPARTICLE, PARTICLE AND SPACE PHYSICS , DETECTORS AND MEDICAL PHYSICS APPLICATIONS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 255-259 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Are Dynamic Capabilities Idiosyncratic? A Mixed Method Study of UK High-Tech SMEs

    Senaratne, P., Wang, C. L. & Sarma, M., 2015, British Academy of Management Annual Conference. Portsmouth

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Are We Compromised? Modelling Security Assessment Games

    Pham, V. & Cid, C., Nov 2012, Decision and Game Theory for Security - Third International Conference, GameSec 2012. Springer, p. 234-247 14 p. (Lecture Notes in Computer Science - LNCS; vol. 7638).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Arguing over Motivations within the V3A-Architecture for Self-Adaptation

    Morge, M., Stathis, K. & Vercouter, L., 2009, ICAART 2009: Proceedings of the International Conference on Agents and Artificial Intelligence. SETUBAL: INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL, p. 214-219 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Argumentation accelerated reinforcement learning for cooperative multi-agent systems

    Gao, Y. & Toni, F., 18 Aug 2014, ECAI'14 Proceedings of the Twenty-first European Conference on Artificial Intelligence. IOS Press, p. 333-338 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Argumentation sur les motivations propres dans l'architecture V3A pour des agents auto-adaptatifs

    Morge, M., Stathis, K. & Vercouter, L., 2008, Actes des 16ème Journées Francophones sur les Systèmes Multi-Agen ts (JFSMA). France: Cepudes

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Argumentation-Based Multi-Agent Decision Making with Privacy Preserved

    Gao, Y., Toni, F., Wang, H. & Xu, F., 9 May 2016, Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, p. 1153-1161 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Ariosto o Boiardo? Giovan Battista Giraldi Cinzio critico dell’Orlando furioso

    Jossa, S., 2011, Volteggiando in su le carte. Ludovico Ariosto e i suoi lettori. Garavelli, E. (ed.). University of Helsinki Press, p. 45-72 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Art, finance, politics, and the art museum as a public institution

    Chong, D., 2018, Market orientation of cultural institutions (University of Borås).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K., 29 Aug 2017, ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 1-10 10 p. 5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Artistic versus the commercial logics: A comparitive analysis of the UK and Indian creative and media industry

    Sen Gupta, S., 2011, Society for the Advancement of Socio Economics, Madrid Spain.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Sep 2013, ESORICS 2013. Springer, Vol. 8134. p. 381-399 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Aspects of terrorism and martyrdom: Seminar one - What roles are played by religious beliefs and identity in supporting views of violent activists as terrorists or martyrs?

    Cinnirella, M., Ansari, H., Rogers, M. B., Lewis, C. A. & Loewenthal, K. M., 2006, Proceedings of the British Psychological Society Seminar Series Aspects of Terrorism and Martyrdom. Rogers, M. B., Lewis, C. A., Loewenthal, K. M., Cinnirella, M., Amlot, R. & Ansari, H. (eds.). (eCOMMUNITY: International Journal of Mental Health & Addiction).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Aspects of terrorism and martyrdom: Seminar three - Exploring organisational contributory factors and socio-religious outcomes of terrorism and martyrdom

    Cinnirella, M., Ansari, H., Lewis, C. A., Rogers, M. B., Amlot, R. & Loewenthal, K. M., 2006, Proceedings of the British Psychological Society Seminar Series Aspects of Terrorism and Martyrdom. (eCOMMUNITY: International Journal of Mental Health & Addiction).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Assessing Electronic Portfolios -- Now that we have them, what can we do with them?

    Bures, E. & Bentley, C., 2007, Proceedings from World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007. Bastiaens, T. & Carliner, S. (eds.). AACE, p. 7030-7038

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Asymmetric Sneutrino Dark Matter

    West, S., 13 May 2006, 41st Rencontres de Moriond on Electroweak Interactions and Unified Theories.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Asymptotic optimality of transductive confidence machine

    Vovk, V., 2002, Lecture Notes in Articial Intelligence. Vol. 2533. p. 336-350 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Asynchronous Binary Byzantine Consensus over Graphs with Power Law Degree Sequence

    Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 263 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs

    Weldehawaryat, G. & Wolthusen, S. D., 2013, Proceedings of the 2013 IEEE 2nd International Workshop on Network Science (NSW 2013). IEEE Computer Society Press, p. 9-15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Attacks on time-of-flight distance bounding channels

    Hancke, G. P. & Kuhn, M. G., 2008, Proceedings of the first ACM conference on Wireless network security. New York, NY, USA: ACM, p. 194-202 9 p. (WiSec '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS

    Garman, C., Paterson, K. & Van Der Merwe, T., Jul 2015, USENIX Security 2015. USENIX Association, p. 113-128

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Attribute Expressions, Policy Tables and Attribute-Based Access Control

    Crampton, J. & Williams, C., 7 Jun 2017, SACMAT'17: Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. ACM Press, p. 79-90 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Attribute-Based Encryption for Access Control Using Elementary Operations

    Crampton, J. & Pinto, A., 2014, 27th Computer Security Foundations Symposium. IEEE, p. 125-139

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Unpublished

    Audience familiarity and children's understanding of disclaimers

    Watling, D. & Nesbit, R., 2015, (Unpublished) Audience familiarity and children's understanding of disclaimers.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    AudioNode : Prototypical Affective Modelling in Experience-driven Procedural Music Generation

    Plans, E., Morelli, D. & Plans, D., 28 Jun 2015, COMPUTATIONAL CREATIVITY & GAMES WORKSHOP.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Authenticated-Encryption with Padding: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J., 2012, Cryptography and Security. Naccache, D. (ed.). Springer, Vol. 6805. p. 83-107 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Authorization and Certificates: Are We Pushing When We Should Be Pulling?

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of IASTED Conference on Network and Information Security. p. 62-66 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Authorization recycling in RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication

    Cremers, C., Horvat, M., Scott, S. & Van Der Merwe, T., 18 Aug 2016, IEEE Symposium on Security and Privacy 2016. p. 470-485 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Automated Debugging for Arbitrarily Long Executions

    Zamfir, C., Kasikci, B., Kinder, J., Bugnion, E. & Candea, G., May 2013, Proc. 14th Workshop on Hot Topics in Operating Systems (HotOS 2013). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. E-pub ahead of print

    Automated peripheral neuropathy assessment of diabetic patients using optical imaging and binary processing techniques

    Siddiqui, H. U. R., Alty, S. R., Spruce, M. & Dudley, S. E., 14 Feb 2013, IEEE EMBS Special Topic Conference on Point-of-Care (POC) Healthcare Technologies: Synergy Towards Better Global Healthcare, PHT 2013. p. 200-203 4 p. 6461319

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Automated Semmes Weinstein monofilament examination replication using optical imaging and mechanical probe assembly

    Siddiqui, H. U. R., Spruce, M., Alty, S. R. & Dudley, S., 21 Jul 2015, 2015 IEEE 12th International Symposium on Biomedical Imaging, ISBI 2015. IEEE Computer Society, Vol. 2015-July. p. 552-555 4 p. 7163933

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Automated taxonomy extraction from semantic business process models

    De Cesare, S., Juric, D. & Lycett, M., 7 Mar 2016, Proceedings of the 49th Annual Hawaii International Conference on System Sciences, HICSS 2016. IEEE Computer Society, Vol. 2016-March. p. 4394-4403 10 p. 7427732

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Automated Workflows using Dialectical Argumentation

    McGinnis, J., Bromuri, S., Urovi, V. & Stathis, K., 1 May 2007, German e-Science Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Automatic cyclic termination proofs for recursive procedures in separation logic

    Rowe, R. & Brotherston, J., 16 Jan 2017, CPP 2017 Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs. ACM, p. 53-65 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Automatic path generation for multirotor descents through varying air masses above Ascension Island

    Greatwood, C., Richardson, T., Freer, J., Thomas, R., Brownlow, R., Lowry, D., Fisher, R. E. & Nisbet, E. G., 2016, AIAA Atmospheric Flight Mechanics Conference. American Institute of Aeronautics and Astronautics Inc, AIAA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Automating Malware Scanning Using Workflows

    Stirling, D., Welch, I., Komisarczuk, P. & Seifert, C., 2009, 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009. p. 562-567 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    AutoPass: An automatic password generator

    Al Maqbali, F. & Mitchell, C. J., 7 Dec 2017, 2017 International Carnahan Conference on Security Technology (ICCST): Proceedings. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Avoiding key redistribution in key assignment schemes

    Rowe, H. & Crampton, J., 2007, Proceedings of the Fourth International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. p. 127-140 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    Rizzo, C., Cavallaro, L. & Kinder, J., 2018, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018). Springer, p. 25-46 22 p. (Lecture Notes in Computer Science (LNCS); vol. 11050).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Back to basics: Sharing goals and developing trust in global virtual teams

    Tucker, R. & Panteli, N., 2003, IFIP Advances in Information and Communication Technology. Springer New York LLC, Vol. 126. p. 85-98 14 p. (IFIP Advances in Information and Communication Technology; vol. 126).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Backoff protocols for distributed mutual exclusion and ordering

    Chockler, G., Malkhi, D. & Reiter, M. K., 1 Jan 2001, Proceedings of the 21st IEEE International Conference on Distributed Computing Systems (ICDCS '01). p. 11-20 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Ballistic impact of composite laminates: Experiments and simulations

    Guild, F. J., El-Habti, M. & Hogg, P. J., 1 Dec 2007, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Bank Mergers’ Risks: the Macro and Micro Prudential approaches and their determinants

    Hassan, M. & Giouvris, E., 18 Jun 2019, The 12th International Risk Management Conference. Altman, E., Brenner, M., Dalocchio, M. & Gabbi, G. (eds.). Italy: The Risk, Banking and Finace Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Bark beetle fossils from two early post-glacial age sites at high altitude in the Colorado Rocky Mountains

    Elias, S., 1982, Journal of Paleontology: 1982 North American Paleontological Convention Proceedings Volume . Vol. 1. p. 53-57

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Barriers to Absorptive Capacity and Capability Upgrading in Developing Country Multinationals

    Cuervo-Cazurra, A. & Rui, H., 2013, Proceedings of the 55th Annual Meeting of the Academy of International Business: "Bridging the Divide: Linking IB to Complementary Disciplines and Practice". McDougall-Covin, P. & Kiyak, T. (eds.). 2013 Academy of International Business, p. 263 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Basin-scale salt tectonic processes of the Laurentian Basin, Eastern Canada: insights from integrated regional 2D seismic interpretation and 4D physical experiments

    Adam, J. & Krezsek, C., 2012, Salt tectonics, Sediments and Prospectivity. Alsop, G. I., Archer, S. G., Grant, N. T. & Hodgkinson, R. (eds.). Geological Society of London Special Publication, Vol. 363. p. 331 360 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Bayesian probability in quantum mechanics

    Schack, R., 2007, Bayesian Statistics 8: Proceedings of the Eighth Valencia International Meeting. Bernardo, J. M., Bayarri, M. J., Berger, J. O., Dawid, A. P., Heckerman, D., Smith, A. F. M. & West, M. (eds.). Oxford: Oxford University Press, p. 453-464

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Bayesian versus frequentist predictions in quantum tomography

    Schack, R., 2007, Foundations of Probability and Physics 4: AIP Conference Proceedings Vol.~889. Adenier, G., Fuchs, C. A. & Khrennikov, A. (eds.). Melville, New York: American Institute of Physics, p. 230-234

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    BBOB: Nelder-Mead with resize and halfruns

    Doerr, B., Fouz, M., Schmidt, M. & Wahlström, M., 2009, Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference (GECCO 2009). Rothlauf, F. (ed.). Montreal, Québec, Canada: ACM, p. 2239-2246 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Published

    BDSIM: Recent Developments and New Features Beyond V1.0

    Nevay, L., Abramov, A., Joshua, A., Alden, S., Boogert, S., Garcia Morales, H., Gibson, S., Shields, W., Walker, S. & Snuverink, J., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPTS058

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  105. Published

    Beam Delivery Simulation - Recent Developments and Optimization

    Snuverink, J., Boogert, S., Garcia Morales, H., Gibson, S., Kwee-Hinzmann, R., Nevay, L. & Deacon, L., Jun 2015, 6th International Particle Accelerator Conference: IPAC2015, Richmond, VA, USA. JACoW Publishing, p. 499-501 3 p. MOPJE078

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. Published

    Beam Delivery Simulation (BDSIM): A Geant4 Based Toolkit for Diagnostics and Loss Simulation

    Boogert, S., Gibson, S., Kwee-Hinzmann, R., Nevay, L., Snuverink, J. & Deacon, L., 19 Sep 2013, 2nd International Beam Instrumentation Conference: 16-19 September 2013, Oxford, UK. p. 799-802 4 p. WEPC46

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  107. Published

    Beam Delivery Simulation: BDSIM - Automatic Geant4 Models of Accelerators

    Nevay, L., Boogert, S., Garcia Morales, H., Gibson, S., Kwee-Hinzmann, R., Shields, W., Snuverink, J. & Deacon, L., Jun 2016, 7th International Particle Accelerator Conference: May 8-13, 2016, Busan, Korea. JACoW Publishing, p. 1-3 3 p. WEPOY046

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  108. Published

    Beam Delivery Simulation: BDSIM - Development & Optimisation

    Nevay, L., Boogert, S., Garcia Morales, H., Gibson, S., Kwee-Hinzmann, R. & Deacon, L., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 182-184 3 p. MOPRO045

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    Beam Induced Background Simulation Studies at IR1 with New High Luminosity LHC Layout

    Kwee-Hinzmann, R., Gibson, S., Bruce, R., Cerutti, F., Esposito, L. & Lechner, A., Jun 2015, 6th International Particle Accelerator Conference: IPAC2015, Richmond, VA, USA. JACoW Publishing, p. 2184-2187 4 p. TUPTY067

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  110. Published

    Beam loss monitoring in the ISIS synchrotron main dipole magnets

    Harryman, D., Sep 2018, International Beam Instrumentation Conference 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  111. Published

    Beam Measurements at the CERN SPS Using Interferometric Electro-Optic Pickups

    Arteche, A., Bashforth, S., Bosco, A., Gibson, S., Krupa, M. & Lefevre, T., 12 Sep 2019, 8th International Beam Instrumentation Conference 2019. Malmö, Sweden: JACoW Publishing, 3 p. WEAO04

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  112. Published

    Beam test proposal of an ODR beam size monitor at SLAC FFTB

    Fukui, Y., Cline, D., Zhou, F., Ross, M., Bolton, P., Urakawa, J., Tobiyama, M., Muto, T., Karataev, P., Aryshev, A., Hamatsu, R., Potylitsyn, A., Naumenko, G. & Sharafutdinov, A., 2005, IEEE. p. 1922-1924 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  113. Published

    Beam-Gas Background Observations at LHC

    Gibson, S. & LHC Background Study Group, 19 May 2017, 8th International Particle Accelerator Conference: Copenhagen, Denmark 2017, May 14-19. Geneva: JACoW Publishing, p. 1-4 4 p. TUPVA032

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  114. Published

    Beam-line Diagnostics at the Front End Test Stand (FETS), Rutherford Appleton Laboratory, Oxfordshire, UK

    Boorman, G., Gibson, S., D'Arcy, R., Jolly, S., Gabor, C., Lawrie, S. & Letchford, A., 19 Sep 2013, 2nd International Beam Instrumentation Conference: 16-19 September 2013, Oxford, UK.. p. 431-434 4 p. TUPC26

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  115. Published

    Behaviour of a building block for intrinsic evolution of analogue signal shaping and filtering circuits

    Flockton, S. J. & Sheehan, K., 2000, SECOND NASA/DOD WORKSHOP ON EVOLVABLE HARDWARE, PROCEEDINGS. Lohn, J., Stoica, A., Keymeulen, D. & Colombano, S. (eds.). LOS ALAMITOS: IEEE COMPUTER SOC, p. 117-123 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  116. Published

    Behavioural Aspects of Intelligent Knowledge-Based Information Systems

    Fiadeiro, J. L. & Sernadas, A., 1987, Temporal Aspects in Information Systems. p. 77-92 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  117. Published

    Bench-marking of 3D preforming strategies

    Potluri, P., Sharif, T., Jetavat, D., Aktas, A., Choudhry, R., Hogg, P., Foreman, A., Stringer, G. & Starink, L., 1 Dec 2009, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  118. Published

    Better Rewards Yield Better Summaries: Learning to Summarise Without References

    Böhm, F., Gao, Y., Meyer, C. M., Shapira, O., Dagan, I. & Gurevych, I., Nov 2019, Proceedings of 2019 Conference on Empirical Methods in Natural Language Processing (EMNLP 2019) . p. 3101–3111 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  119. Published

    Better Than Optimal: Fast Identification of Custom Instruction Candidates

    Reddington, J., Gutin, G., Johnstone, A., Scott, E. & Yeo, A., 2009, CSE '09: International Conference on Computational Science and Engineering, 2009. Vol. 2. p. 17-24 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  120. Unpublished

    Between the Stranger and the Thief: A Non-Standard Reading of Bill Griffiths's Liam's Song

    Hazell, C., 2018, (Unpublished) Between the Stranger and the Thief: A Non-Standard Reading of Bill Griffiths's Liam's Song.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  121. Published

    Beyond autonomy and control: An identity-based view of information privacy on social media

    Wu, P., Jun 2016, The 24th European Conference on Information Systems (ECIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  122. Published

    Beyond the enterprise-Widening the Horizons of International HRM

    Delbridge, R., Hauptmeier, M. & Sen Gupta, S., 2010, European research unit annual conference (ERU), Cardiff.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  123. Published

    Bias in the Mifare DESFire EV1 TRNG

    Hurley-Smith, D. & Hernandez-Castro, J., 2016, International Workshop on Radio Frequency Identification: Security and Privacy Issues (RFIDSec 2016). Hancke, G. P. & Markantonakis, K. (eds.). Springer, p. 123-133 11 p. (Lecture Notes in Computer Science; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  124. Published

    Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Springer, p. 398-419 22 p. (Lecture Notes in Computer Science; vol. 8873).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  125. Published

    Big data and humanitarian supply networks: Can Big Data give voice to the voiceless?

    Monaghan, A. & Lycett, M., 2013, Global Humanitarian Technology Conference (GHTC). IEEE Xplore, p. 432-437

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  126. Published

    Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting

    Lee, R., Markantonakis, K. & Akram, R., 30 May 2016, CPSS '16 Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. ACM Press, p. 70-81 12 p. (Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  127. Published

    Biogas potential of residues generated by the tomato processing industry under different substrate and inoculum conditions

    Martínez, M., Driller, L., Chamy, R., Schuch, W., Nogueira, M. & Fraser, P., 1 May 2017, 14th International Symposium on Processing Tomato. International Society for Horticultural Science, Vol. 1159. p. 151-157 7 p. (Acta Horticulturae; vol. 1159).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  128. E-pub ahead of print

    Birkhoff Completeness for Hybrid-Dynamic First-Order Logic

    Gaina, D. & Tutu, I., 14 Aug 2019, The 28th International Conference on Automated Reasoning with Analytic Tableaux and Related Methods: 3-5 September 2019, London, UK . Springer, p. 277-293 17 p. (Lecture Notes in Computer Science; vol. 11714).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  129. Published

    B-ISDN implementation via satellite: the catalyst project

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F. & Smythe, C., 1993, Teletraffic Symposium, 10th. Performance Engineering in Telecommunications Network, Tenth UK. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  130. Published

    Black-Scholes formula without stochastic assumptions

    Vovk, V., May 2000, Models for Credit Risk. London: UNICOM Seminars, p. 149-154 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  131. Published

    Blasting Open the Historical Continuum: Antihistoricism in Benjamin, Dick & Le Guin

    Gene-Rowe, F., Mar 2015, Sideways in Time Conference. Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  132. Published

    BLOCH OSCILLATIONS IN A JOSEPHSON CIRCUIT

    Boulant, N., Ithier, G., Nguyen, F., Bertet, P., Pothier, H., Vion, D., Urbina, C. & Esteve, D., 2007, CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPRINTRONICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 71-76 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  133. Published

    BNA 2017 Festival of Neuroscience: Abstract Book: Using in vitro systems to study the role of isoform-specific Apolipoprotein E processing in Alzheimer’s Disease

    Marsh, J., Dickson, J. & Alifragis, P., 7 Apr 2017, Brain and Neuroscience Advances. Dalley, J. (ed.). SAGE Publications Ltd, Vol. 1. p. 173 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  134. Published

    BOOM: Taking boolean program model checking one step further

    Basler, G., Hague, M., Kroening, D., Ong, C-H. L., Wahl, T. & Zhao, H., 2010, TACAS: Tools and Algorithms for the Construction and Analysis of Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  135. Published

    Boomerang Connectivity Table: A New Cryptanalysis Tool

    Cid, C., Huang, T., Peyrin, T., Sasaki, Y. & Song, L., 2018, Advances in Cryptology – EUROCRYPT 2018. Rijmen, V. & Nielsen, J. B. (eds.). Springer Heidelberg, p. 683–714 32 p. (Lecture Notes in Computer Science; vol. 10821).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  136. Published

    Boosting search guidance in problems with semantic attachments

    Bernardini, S., Fox, M., Long, D. & Piacentini, C., 5 Jun 2017, Proceedings International Conference on Automated Planning and Scheduling, ICAPS 2017. AAAI Press, p. 29-37 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  137. Published

    Bounded and Approximate Strong Satisfiability in Workflows

    Crampton, J., Gutin, G. & Majumdar, D., 28 May 2019, Proceedings of ACM SACMAT 2019. ACM, p. 179-184 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  138. Published

    Brand Meanings in Kinetic Circulation: Consumer Reception of Brand Paratexts

    Hackley, C., Jun 2019, Consumer Culture Theory Conference 2019: Concordia University, Montreal, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  139. Published

    Breaking An Identity-Based Encryption Scheme based on DHIES

    Albrecht, M. & Paterson, K., 2011, IMA International Conference on Cryptography and Coding. Chen, L. (ed.). Springer, Vol. 7089. p. 344-355 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  140. Published

    Breaking the Liardet-Smart Randomized Exponentiation Algorithm

    Walter, C. D., 2002, CARDIS '02. USENIX, p. 59-68 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  141. Published

    Brief Announcement: Gossiping with Latencies

    Gilbert, S., Robinson, P. & Sourav, S., 25 Jul 2017, PODC '17 : Proceedings of the ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery (ACM), p. 255-257 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  142. Published

    Brief announcement: gracefully degrading consensus and k-set agreement under dynamic link failures

    Schwarz, M., Winkler, K., Schmid, U., Biely, M. & Robinson, P., 2014, Proceedings of the 2014 ACM symposium on Principles of distributed computing. p. 341-343 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  143. Published

    Brief Announcement: Regional Consecutive Leader Election in Mobile Ad-Hoc Networks

    Chung, H. C., Robinson, P. & Welch, J. L., 2010, Algorithms for Sensor Systems - 6th International Workshop on Algorithms for Sensor Systems, Wireless Ad Hoc Networks, and Autonomous Mobile Entities, ALGOSENSORS 2010, Bordeaux, France, July 5, 2010, Revised Selected Papers. p. 89-91 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  144. Published

    Brief Announcement: Space Bounds for Reliable Multi-Writer Data Store: Inherent Cost of Read/Write Primitives

    Chockler, G., Dobre, D., Shraer, A. & Spiegelman, A., Oct 2015, Distributed Computing: 29th International Symposium, DISC 2015, Tokyo, Japan, October 7-9, 2015, Proceedings. Moses, Y. (ed.). 1 ed. Springer-Verlag Berlin Heidelberg, Vol. 9363. p. 673-674 2 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  145. Published

    Brief Announcement: Weak Synchrony Models and Failure Detectors for Message Passing (k-)Set Agreement

    Biely, M., Robinson, P. & Schmid, U., 2009, Distributed Computing, 23rd International Symposium, DISC 2009, Elche, Spain, September 23-25, 2009. Proceedings. Springer Berlin / Heidelberg, p. 360-361 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  146. E-pub ahead of print

    Bright ICT and Unbounded Employment: Typology of Crowdworkers and Their Lived and Envisaged Career Trajectory in Nigeria

    Idowu, A. & Elbanna, A., 19 May 2019, IFIP WG 8.6 Conference 2019. p. 470-486 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  147. Published

    Broken hearted: How to attack ECG biometrics

    Eberz, S., Paoletti, N., Roeschlin, M., Kwiatkowska, M., Martinovic, I. & Patanè, A., 27 Feb 2017, Network and Distributed System Security Symposium. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  148. Published

    Buddhist Monks' Performance and a Play in the Context of the Buddhist Ritual Event of Giving

    Utairat, M., 2014, Theatre and Stratification, IFTR World Congress, Warwick, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  149. Published

    Buffered Communication Analysis in Distributed Multiparty Sessions

    Denielou, P-M. & Yoshida, N., 2010, CONCUR 2010 - CONCURRENCY THEORY. Gastin, P. & Laroussinie, F. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 343-357 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  150. Published

    Building Attacker Personas in Practice - a Digital Banking Example

    Moeckel, C., 4 Jul 2018, Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018). British Computer Society (BCS), p. 1-5 5 p. (Electronic Workshops in Computing (eWiC)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  151. Published

    Building general-purpose security services on EMV payment cards

    Chen, C., Tang, S. & Mitchell, C. J., 2013, Security and Privacy in Communication Networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Springer-Verlag, p. 29-44 16 p. (LNICST; vol. 106).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  152. Published

    Building next generation Service-Oriented Architectures using Argumentation Agents

    Curcin, V., Ghanem, M., Guo, Y., Stathis, K. & Toni, F., 1 Sep 2006, 3rd International Conference on Grid Services Engineering and Management (GSEM 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  153. Published

    Building Power Consumption Models from Executable Timed I/O Automata Specifications

    Barbot, B., Kwiatkowska, M., Mereacre, A. & Paoletti, N., 11 Apr 2016, Hybrid Systems : Computation and Control. p. 195-204 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  154. Published

    Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem

    Akram, R. N., Markantonakis, K. & Mayes, K., Nov 2012, The 8th International Conference on Computational Intelligence and Security (CIS 2012). Xie, S. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  155. Published

    Building Trustworthy Intrusion Detection through VM Introspection

    Baiardi, F. & Sgandurra, D., 1 Aug 2007, Third International Symposium on Information Assurance and Security. p. 209-214 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  156. Published

    Business ethics doesn’t reside in tax havens, does it?

    Preuss, L., Apr 2009, annual conference of the UK Association of the European Business Ethics Network (EBEN-UK).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  157. Published

    Business Intelligence at Telenor Pakistan

    Shaikh, S. E., Hassan, Z., Farooq, B. & Shahid, A. R., 2012, 33rd International Conference on Information Systems (ICIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  158. Published

    Business Intelligence For Human Healthcare And Wellbeing And Its Potentially Open Nature

    Soltan-Zadeh, Y. & Córdoba, J-R., 9 Apr 2014, UK Academy for Information Systems: 19th Annual Conference 2014. UK

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  159. Published

    Business Success as Network of Networks

    Aboutalebi, R., 22 Oct 2009, In: EAMSA (Euro-Asia Management Studies Association), 26th Annual Conference: Globalization of Technology, Innovation & Knowledge: The Euro-Asia Connection. 22-24 October 2009, Lausanne, Switzerland.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  160. Forthcoming

    Buy low, sell high

    Koolen, W. & Vovk, V., 2012, (Accepted/In press) Proceedings of the Twenty Third International Conference on Algorithmic Learning Theory. Bshouty, N., Stoltz, G., Vayatis, N. & Zeugmann, T. (eds.). Berlin: Springer, Vol. 7568. p. 335 - 349 15 p. (Lecture Notes in Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  161. Published

    Bylands: reverse engineering safety-critical systems

    Bull, T., Younger, E., Bennett, K. & Luo, Z., 1995, Proc. of Inter. Conf. on Software Maintenance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  162. Published

    Byzantine disk Paxos: Optimal resilience with byzantine shared memory

    Abraham, I., Chockler, G. V., Keidar, I. & Malkhi, D., 2004, Proceedings of the 23rd Annual ACM SIGACT-SIGOPS Symposium on. Principles of Distributed Computing (PODC 2004). ACM, p. 226-235 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  163. Published

    C 2 net: A Cross-Layer Quality of Service (QoS) Architecture for Cognitive Wireless Ad Hoc Networks

    Yau, A. K-L., Komisarczuk, P. & Teal, P. D., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 306-311 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  164. Published

    Caching and Auditing in the RPPM Model

    Crampton, J. & Sellwood, J., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 49-64 16 p. (Lecture Notes in Computer Science; vol. 8743).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  165. Unpublished

    Can Digital Inclusion promote freedom? Development as freedom, Freedom as Critical Awakening

    Poveda Villalba, S., 2012, (Unpublished) Can Digital Inclusion promote freedom? Development as freedom, Freedom as Critical Awakening. Department of Geography, Royal Holloway, University of London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  166. Published

    Can shadows and reflections help in the detection of photo forgeries?

    Nightingale, S., Wade, K., Faird, H. & Watson, D., 6 Jan 2017, Society for Applied Research in Memory and Cognition.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  167. Published

    Can you call the software in your device firmware?

    Hassan, M., Markantonakis, K. & Akram, R., 9 Jan 2017, e-Business Engineering (ICEBE), 2016 IEEE 13th International Conference on. Macau, China: IEEE Computer Society Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  168. E-pub ahead of print

    Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 22 Mar 2017, 7th ACM Conference on Data and Application Security and Privacy. ACM Press, p. 47-58 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  169. Published

    Capability Building of Developing Country MNEs: the Chinese Experience

    Rui, H., 2015, Proceedings of the 57th Annual Meeting of the Academy of International Business: "Global Networks: Organizations and People". Mudambi, R. & Kiyak, T. (eds.). 2015 Academy of International Business, p. 103 1 p. ID#1653

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  170. Published

    Capturing sensemaking patterns during data analysis: A conceptual framework

    Lycett, M. & Marshan, A., 24 Aug 2016, 25th International Conference on Information Systems Development, ISD 2016. Association for Information Systems, p. 106-116 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  171. Published

    Carbon Nanotube Bolometer: Transport Properties and Noise Characteristics

    Rod, I., Wirtz, C., Kazakova, O., Panchal, V., Cox, D., Zaehres, H., Posth, O., Lindner, J., Meckenstock, R. & Farle, M., 2012, MAGNETISM AND MAGNETIC MATERIALS V. Perov, N. & Rodionova (eds.). STAFA-ZURICH: TRANS TECH PUBLICATIONS LTD, p. 510-513 4 p. (Solid State Phenomena; vol. 190).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  172. Published

    Carbonate budgets for carbonate mounds, Florida, USA

    Bosence, D., 1988, Proceedings of the 6th International Coral Reef Symposium. Choat, J. H., Barnes, D., Borowitzka, M. A., Coll, J. C., Davies, P. J., Flood, P., Hatcher, B. G., Hopley, D., Hutchings, P. A., Kinsey, D., Orme, G. R., Pichon, M., Sale, P. F., Sammarco, P., Wallace, C. C., Wilkinson, C., Wolanski, E. & Bellwood, O. (eds.). Vol. 2. p. 529-534 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  173. Published

    Card-present Transactions On The Internet Using The Smart Card Web Server

    Kyrillidis, L., Chazalet, B., Mayes, K. & Markantonakis, K., 2013, Proceedings of TrustCom 2013. IEEE Computer Society, p. 611-619 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  174. Published

    CardSpace-Liberty Integration for CardSpace Users

    Al-Sinani, H., Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of the 9th Symposium on Identity and Trust on the Internet 2010 (IDtrust 2010), Gaithersburg, MD, USA, 13-15 April 2010. ACM Press, p. 12-25 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  175. Published

    Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 14 Nov 2019, Central European Cybersecurity Conference 2019. ACM, p. 1-4 4 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  176. Published

    Casting the Outcast: Perspectives on Acting Style

    Conroy, C., 2003, Conference Proceedings: Finding The Spotlight.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  177. Published

    Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol

    Baiocco, A. & Wolthusen, S., 24 Dec 2018, Proceedings of the 2018 IEEE PES General Meeting. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  178. Published

    Cavity Beam Position Monitor System for ATF2

    Boogert, S., Ainsworth, R., Boorman, G., Swinson, C., Molloy, S., Aryshev, A., Honda, Y., Tauchi, T., Terunuma, N., Urakawa, J., Frisch, J., May, J., McCormick, D., Nelson, J., Smith, T., Smith, G., Woodley, M., Heo, A., Kim, E-S., Kim, H-S. & 5 others, Kim, Y., Lyapin, A., Park, H., Ross, M. & Shin, S., 2010, Proceedings of IPAC'10, Kyoto, Japan.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  179. Published

    Cérémonie et néoclassicisme à Fontainebleau

    Charlton, D., 2014, D'un 'Orphée', l'autre: 1762-1859...Métamorphoses d'un mythe . Ramaut, A. & Saby, P. (eds.). Saint-Étienne : Publications de l'Université de Saint-Étienne, p. 57-68 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  180. Published

    Certificate translation

    Borselius, N. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 289-300 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  181. Published

    Challenges in developing Capture-HPC exclusion lists

    Puttaroo, M., Komisarczuk, P. & Amorim, R. C. D., 2014, Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014. p. 334 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  182. Published

    Challenges of security and trust in Avionics Wireless Networks

    Akram, R., Markantonakis, K., Kariyawasam, S., Ayub, S., Seem, A. & Atkinson, R., 13 Sep 2015, 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). IEEE Computer Society, p. 4B1-1-4B1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  183. Published

    Challenges of security and trust of mobile devices as digital avionics component

    Akram, R. & Markantonakis, K., 9 Jun 2016, Integrated Communications Navigation and Surveillance (ICNS), 2016. IEEE Computer Society, p. 1C4-1-1C4-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  184. Published

    Changing patterns of employment in privatised Czech enterprises: management action in a transitional context

    Soulsby, A. & Clark, E., 2002, Personalmanagement im transformationsprozess. Lang, R. (ed.). Munich: Rainer Hampp Verlag, p. 201-223 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  185. Published

    Characterisation of Electro-Optic Pickups for High Bandwidth Diagnostics at the High Luminosity LHC

    Arteche, A., Bashforth, S., Bosco, A., Gibson, S., Penman, I., Krupa, M. & Lefevre, T., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPGW088

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  186. Published

    Characterising renaming within OCaml's module system: theory and implementation

    Rowe, R., Férée, H., Thompson, S. & Owens, S., 8 Jun 2019, PLDI 2019 Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. Association for Computing Machinery (ACM), p. 950-965 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  187. Published

    Characterising the Signal Processing System for Beam Position Monitors at the Front End Test Stand

    Boorman, G., Gibson, S., Gale, J., Rajaeifar, N., Jolly, S., Lawrie, S. & Letchford, A., Jan 2016, 4th International Beam Instrumentation Conference : IBIC2015, Melbourne, Australia. Geneva: JACoW Publishing, p. 526-529 4 p. TUPB073

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  188. Published

    Characteristics of Smith-Purcell radiation in millimeter wavelength region

    Naumenko, G., Potylitsyn, A., Karataev, P., Bleko, V., Sukhikh, L., Shevelev, M. & Popov, Y., 1 Jul 2016, Journal of Physics: Conference Series. Karataev, P., Potylitsyn, A., Tyukhtin, A. & Strikhanov, M. (eds.). UK: IOP PUBLISHING LTD, Vol. 732. p. 1-9 9 p. 012018. (Radiation from Relativistic Electrons in Periodic Structures; vol. 732).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  189. Published

    Checking cryptographic API usage with composable annotations

    Mitchell, D., van Binsbergen, L. T., Loring, B. & Kinder, J., 25 Dec 2017, ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM 2018). p. 53-59 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  190. Published

    CheR: Cheating resilience in the cloud via smart resource allocation

    Roberto, D. P., Lombardi, F., Martinelli, F. & Sgandurra, D., 2014, Foundations and Practice of Security - 6th International Symposium, FPS 2013, Revised Selected Papers. Springer-Verlag, Vol. 8352 LNCS. p. 339-352 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8352 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  191. Unpublished

    Children, childhood and youth: online and offline

    Kleine, D., Hollow, D. & Poveda Villalba, S., 2014, (Unpublished) Children, childhood and youth: online and offline. Royal Geographical Society (with IBG)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  192. Published

    CIM Justification

    Pilkington, A., 1989, IFS.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  193. Published

    Ciphers for MPC and FHE

    Albrecht, M., Rechberger, C., Schneider, T., Tiessen, T. & Zohner, M., 14 Apr 2015, Advances in Cryptology -- EUROCRYPT 2015. Oswald, E. & Fischlin, M. (eds.). Springer, p. 430-454 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  194. Published

    Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 26 Jan 2017, Proceedings of the 14th International Conference of Smart City (SmartCity 2016). IEEE Press, p. 1380-1387 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  195. Unpublished

    Civil society organisations shaping corporate social responsibility: a comparison of NGO and trade union involvement

    Preuss, L., Rees, C. & Gold, M., Jul 2014, (Unpublished) 30th European Group for Organizational Studies (EGOS) Colloquium. Rotterdam

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  196. Unpublished

    Civil society organisations shaping CSR: what role for organised labour?

    Preuss, L., Rees, C. & Gold, M., Aug 2015, (Unpublished) Academy of Management (AoM) Annual Meeting. Vancouver

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  197. Unpublished

    Civil society organizations shaping CSR: what role for trade unions?

    Preuss, L., Rees, C. & Gold, M., Jun 2015, (Unpublished) 65th British Universities Industrial Relations Association (BUIRA) Annual Conference. Leicester

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  198. Published

    Class War on Wonga: morality of inequality

    Chong, D., 2014, 6th Critical Finance Studies Conference (Amsterdam: University of Amsterdam).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  199. Published

    Classification of acute leukaemia from gene expression data using confidence machines

    Bellotti, T., Luo, Z. & Gammerman, A., May 2006, IEEE International Conference on Granular Computing . p. 148-153

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  200. E-pub ahead of print

    Classification of Malware Families Based on Runtime Behaviour

    Geden, M. & Happa, J., 23 Sep 2018, International Symposium on Cyberspace Safety and Security. p. 33-48 16 p. (Lecture Notes in Computer Science; vol. 11161).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  201. Published

    Classifying android malware through subgraph mining

    Martinelli, F., Saracino, A. & Sgandurra, D., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer-Verlag, Vol. 8247 LNCS. p. 268-283 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  202. Published

    Client-based CardSpace-OpenID Interoperation

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of ISCIS, 26th International Symposium on Computer and Information Sciences, London, UK, 26-28 September 2011. Gelenbe, E., Lent, R. & Sakellari, G. (eds.). London: Springer-Verlag, p. 387-393 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  203. Published

    Clinical translation of Raman-based multimodal spectral histopathology for margin assessment during surgery of basal cell carcinoma

    Boitor, R., Kong, K., Varma, S., Koloydenko, A., Williams, H. & Notingher, I., 22 Jul 2019, Proceedings SPIE, Medical Laser Applications and Laser-Tissue Interactions IX, 110790G . SPIE - INT SOC OPTICAL ENGINEERING, Vol. 11079. p. 1-4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  204. Published

    Clique Cover and Graph Separation: New Incompressibility Results

    Cygan, M., Kratsch, S., Pilipczuk, M., Pilipczuk, M. & Wahlström, M., 2012, ICALP (1). p. 254-265 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  205. Published

    Cloud Security is Not (Just) Virtualization Security: A Short Paper

    Christodorescu, M., Sailer, R., Schales, D. L., Sgandurra, D. & Zamboni, D., 2009, Proceedings of the 2009 ACM Workshop on Cloud Computing Security. New York, NY, USA: ACM, p. 97-102 6 p. (CCSW '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  206. Published

    Cloud Storage File Recoverability

    Gorke, C., Janson, C., Armknecht, F. & Cid, C., 2 Apr 2017, SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing. New York, NY, USA: ACM, p. 19-26 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  207. Published

    CloudSafetyNet: Detecting Data Leakage between Cloud Tenants

    Priebe, C., Muthukumaran, D., O'Keeffe, D., Eyers, D. M., Shand, B., Kapitza, R. & Pietzuch, P. R., 2014, Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14, Scottsdale, Arizona, USA, November 7, 2014. p. 117-128 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  208. Published

    Coding schemes for two-dimensional position sensing

    Burns, J. & Mitchell, C. J., 1993, Cryptography and Coding III: Proceedings of the third IMA Cryptography and Coding Conference, Cirencester, December 1991. Ganley, M. J. (ed.). Oxford University Press, p. 31-66 36 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  209. Published

    Coercions in Hindley-Milner systems

    Kießling, R. & Luo, Z., 2004, Types for Proofs and Programs, Proc. of Inter. Conf. of TYPES'03. LNCS'3085.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  210. Published

    Coercive subtyping and lexical semantics (extended abstract)

    Luo, Z. & Callaghan, P., 1998, Logical Aspects of Computational Linguistics (LACL'98).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  211. Published

    Coercive Subtyping in Lambda-Free Logical Frameworks

    Adams, R., 2009, Proceedings of the Fourth international Workshop on Logical Frameworks and Meta-Languages. Cheney, J. & Felty, A. (eds.). New York: ACM, p. 30-39 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  212. Published

    Coercive subtyping in type theory

    Luo, Z., 1997, CSL'96, LNCS'1258.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  213. Published

    Cognitive assessment in MS

    Langdon, D., Dec 2015, Neurodegenerative disease management. 6S ed. Vol. 5. p. 43-45 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  214. Published

    Cognitive Radio-based Wireless Sensor Networks: Conceptual design and open issues

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings. p. 955-962 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  215. Published

    Cognitive strategic groups: Real or artefact?

    Robson, J. & van der Heijden, H., 2012, British Academy of Management (BAM) conference. Cardiff

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  216. Published

    Coherence and transitivity in coercive subtyping

    Luo, Y. & Luo, Z., 2001, Proc. of the 8th Inter. Conf. on Logic for Programming, Artificial Intelligence and Reasoning (LPAR'01), LNAI 2250.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  217. Published

    Coherent Cherenkov radiation as an intense THz source

    Bleko, V., Karataev, P., Konkov, A., Kruchinin, K., Naumenko, G., Potylitsyn, A. & Vaughan, T., 1 Jul 2016, Journal of Physics: Conference Series. Karataev, P., Potylitsyn, A., Tyukhtin, A. & Strikhanov, M. (eds.). IOP PUBLISHING LTD, Vol. 732. p. 1-7 7 p. 012006. (Radiation from Relativistic Electrons in Periodic Structures; vol. 732).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  218. Published

    COHERENT DIFFRACTION RADIATION AS A TOOL FOR LONGITUDINAL BEAM PROFILE DIAGNOSTICS AT CTF3

    Lekomtsev, K., Blair, G., Boorman, G., Karataev, P., Micheler, M., Corsini, R. & Lefevre, T., Sep 2010, Proceedings of Linear Accelerators Conference: LINAC'10, Tsukuba, Japan.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  219. Published

    Coherent Diffraction Radiation Longitudinal Beam Profile Monitor for CTF3.

    Micheler, M., Blair, G., Boorman, G., Karataev, P., Lekomtsev, K., Molloy, S., Corsini, R., Lefevre, T. & Dabrowski, A., May 2010, Proceedings of 1st International Particle Accelerator Conference: IPAC'10. p. 1143-1145 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  220. Published

    Cold Boot Attacks on NTRU

    Paterson, K. G. & Villanueva-Polanco, R., 2017, Progress in Cryptology – INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Proceedings. Springer-Verlag, Vol. 10698 LNCS. p. 107-125 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10698 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  221. Published

    Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    Albrecht, M. & Cid, C., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, p. 57-72 16 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  222. Published

    Coleoptera and Trichoptera

    Elias, S., 2001, Tracking Environmental Change Using Lake Sediments: Biological And Statistical Techniques. Smol, J. P. & Last, W. M. (eds.). Kluwer Academic Publishers, Vol. 4. p. 67-80

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  223. Published

    Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager

    Akram, R. N., Markantonakis, K. & Sauveron, D., 1 Sep 2014, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Liu, Y. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  224. Published

    Collaborative Diagnosis of Exceptions to Contracts (Extended Abstract)

    Kafali, O., Toni, F. & Torroni, P., 2011, AAMAS 2011: 10th International Conference on Autonomous Agents and Multiagent Systems. p. 1167-1168 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  225. Published

    Collaborative value co-creation in crowd-sourced online communities- acknowledging and resolving competing commercial and communal orientations

    Whalley, A., 1 Oct 2011, Research In Consumer Behaviour. Emerald Group Publishing Ltd., Vol. 13. p. 1 18 p. 1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  226. Published

    Collapsible Pushdown Automata and Recursion Schemes

    Hague, M., Murawski, A. S., Ong, C-H. L. & Serre, O., 2008, LICS '08: 23rd Annual IEEE Symposium on Logic in Computer Science. IEEE Computer Society Press, p. 452-461

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  227. Published

    Co-location epidemic tracking on London public transports using low power mobile magnetometer

    Nguyen, D. K. A., Watkins, C. & Luo, Z., 23 Nov 2017, The 8th International Conference on Indoor Positioning and Indoor Navigation, Sept 18-21, 2017, Japan. IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  228. Published

    Combination of Conformal Predictors for Classification

    Toccaceli, P. & Gammerman, A., 13 Jun 2017, Proceedings of Machine Learning Research. Lawrence, N. & Reid, M. (eds.). Vol. 60. p. 39-61 23 p. (The Proceedings of Machine Learning Research; vol. 60).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Published

    Combining Distributional and Morphological Information for Part of Speech Induction

    Clark, A., 2003, Proceedings of the tenth Annual Meeting of the {European Association for Computational Linguistics: EACL-03. p. 59--66

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  230. Published

    Combining Expert Advice Efficiently

    Koolen, W. M. & Rooij, S. D., 1 Jun 2008, Proceedings of the 21st Annual Conference on Learning Theory (COLT 2008). Servedio, R. & Zang, T. (eds.). p. 275-286 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  231. Published

    Combining incoherent coercions for Sigma-types

    Luo, Y. & Luo, Z., 2004, Types for Proofs and Programs, Proc. of Inter. Conf. of TYPES'03. LNCS'3085.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  232. Published

    Combining Initial Segments of Lists

    Warmuth, M., Koolen, W. M. & Helmbold, D. P., 1 Oct 2011, Proceedings of the 22nd International Conference on Algorithmic Learning Theory (ALT 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  233. Published

    Combining uncertain and temporal reasoning

    Ramparany, F., Lorquet, V., Bouyssounous, B., Bigham, J. & Luo, Z., 1994, Proceedings of Information Processing and Management of Uncertainty in Knowledge-based System. p. 256-261

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  234. Published

    Comeld™ joints: A novel technique for bonding composites and metal

    Guild, F. J., Hogg, P. J. & Tu, W., 1 Dec 2009, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  235. Published

    Coming of Age: A Longitudinal Study of TLS Deployment

    Kotzias, P., Razaghpanah, A., Amann, J., Paterson, K. G., Vallina-Rodriguez, N. & Caballero, J., 31 Oct 2018, Proceedings of the Internet Measurement Conference 2018, IMC 2018, Boston, MA, USA, October 31 - November 02, 2018. p. 415-428 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  236. Published

    Commissioning of the Operational Laser Emittance Monitors for LINAC4 at CERN

    Hofmann, T., Boorman, G., Bosco, A., Gibson, S. & Roncarolo, F., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPAL074

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  237. E-pub ahead of print

    Committed Moving Horizon Estimation for Meal Detection and Estimation in Type 1 Diabetes

    Chen, H., Paoletti, N., Smolka, S. A. & Lin, S., 29 Aug 2019, American Control Conference 2019. p. 4765-4772 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  238. Published

    Communication-efficient probabilistic quorum systems for sensor networks

    Chockler, G., Gilbert, S. & Patt-Shamir, B., 2006, Proceedings of the 1st Annual IEEE International Workshop on "Foundation and Algorithms for Wireless Networking" (FAWN'2006). p. 111-115 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. Published

    Community response grid (CRG) for a university campus: Design requirements and implications

    Wu, P. F., Qu, Y., Preece, J., Fleischmann, K. R., Golbeck, J., Jaeger, P. T. & Shneiderman, B., 1 Jan 2008, Proceedings of ISCRAM 2008 - 5th International Conference on Information Systems for Crisis Response and Management. Information Systems for Crisis Response and Management, ISCRAM, p. 34-43 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  240. Published

    Community response grids for older adults: Motivations, usability, and sociability

    Wu, P. F., Preece, J., Shneiderman, B., Jaeger, P. T. & Qu, Y., 1 Dec 2007, Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights. Vol. 5. p. 3022-3031 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  241. Published

    Community-centric engagement: lessons learned from privacy awareness intervention design

    Coles-Kemp, L. & Ashenden, D., 1 Sep 2012, Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems. p. 4:1-4:4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  242. Published

    Comparing the Bayes and typicalness frameworks

    Melluish, T., Saunders, C., Nouretdinov, I. & Vovk, V., 2001, Lecture Notes in Articial Intelligence. Vol. 2167. p. 360-371

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  243. Published

    Comparison of Messaging Protocols for Emerging Wireless Networks

    Bagale, J. N., Moore, J. P. T., Kheirkhahzadeh, A. D. & Komisarczuk, P., 2012, 5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  244. Published

    Compensating through the employee ownership program

    Yoon, Y. J. & Sen Gupta, S., 4 Aug 2019, Academy of Management Conference, Boston, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  245. Published

    Competence checking for the global e-service society using games

    Stathis, K., Lekeas, G. & Kloukinas, C., 2007, Engineering societies in the agents world VII. Vol. 4457. p. 384-400 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  246. Published

    Competent agents and customising protocols

    Endriss, U., Lu, W. J., Maudet, N. & Stathis, K., 2003, Engineering societies in the agents world IV. Springer-Verlag, Vol. 3071. p. 168-181 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  247. Published

    Competing commensurate and incommensurate magnetic structures in dhcp Ce/Nd superlattices

    Clegg, P. S., Goff, J. P., McIntyre, G. J., Ward, R. C. C. & Wells, M. R., 2001, EUROPEAN MAGNETIC MATERIALS AND APPLICATIONS. Baryakhtar, VG. (ed.). ZURICH-UETIKON: TRANS TECH PUBLICATIONS LTD, p. 205-208 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  248. Published

    Competing with stationary prediction strategies

    Vovk, V., 2007, Proceedings of the Twentieth Annual Conference on Learning Theory . Bshouty, N. & Gentile, C. (eds.). p. 439-453 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  249. Published

    Competing with wild prediction rules

    Vovk, V., 2006, Proceedings of the Nineteenth Annual Conference on Learning Theory. Lugosi, G. & Simon, H. (eds.). Berlin: Springer, p. 559-573 15 p. (Lecture Notes in Articial Intelligence; vol. 4005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  250. Published

    Competitive Learning Organizations – A Way Forward in the European Construction Industry

    Jashapara, A., 1993, Proceedings of the CIB W-65 Symposium on ‘Organization and Management of Construction – The Way Forward’. p. 653-670

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  251. Published

    Competitive Online Generalised Linear Regression with Multidimensional Outputs

    Dzhamtyrova, R. & Kalnishkan, Y., 2019, Proceedings of IJCNN 2019. IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  252. Published

    Competitive online generalized linear regression under square loss

    Zhdanov, F. & Vovk, V., 2010, Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases 2010. Balcazar, J., Bonchi, F., Gionis, A. & Sebag, M. (eds.). Springer, p. 531-546 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  253. Published

    Competitive on-line linear regression

    Vovk, V., 1998, Advances in Neural Information Processing Systems. Jordan, M., Kearns, M. & Solla, S. (eds.). Cambridge, MA: MIT Press, p. 364-370 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  254. Published

    Competitive Online Regression under Continuous Ranked Probability Score

    Dzhamtyrova, R. & Kalnishkan, Y., Sep 2019, Conformal and Probabilistic Prediction and Applications, 9-11 September 2019, Golden Sands, Bulgaria. Proceedings of Machine Learning Research, Vol. 105. p. 178-195 18 p. (Proceedings of Machine Learning Research).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  255. Published

    Competitive on-line statistics

    Vovk, V., 1999, Bulletin of the International Statistical Institute. Proceedings of the Fifty Second Session. Vol. Tome 58, Book 1. p. 231-234

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  256. Published

    Complex Event as an Core Aspect of Enterprise Architecture - EDEMF: Event Driven Enterprise Architecture Modeling Framework

    Kim, H., Oussena, S. & Komisarczuk, P., 2013, ICEIS 2013 - Proceedings of the 15th International Conference on Enterprise Information Systems, Volume 3, Angers, France, 4-7 July, 2013. p. 292-301 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  257. Published

    Complex urban transport in Europe: Tackling problems. Finding solutions

    Anastasiadis, S., Jönson, G. (ed.) & Tengström, E. (ed.), 2005, Urban transport development: A complex issue. Springer-Verlag, p. 219-244

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  258. Published

    Complexity Approximation Principle and Rissanen's Approach to Real-Valued Parameters

    Kalnishkan, Y., 2000, Machine Learning: ECML 2000, 11th European Conference on Machine Learning, Proceedings: volume 1810 of Lecture Notes in Artificial Intelligence. Springer, p. 203-210 (Lecture Notes in Artificial Intelligence; vol. 1810).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  259. Published

    Compression via matroids: a randomized polynomial kernel for odd cycle transversal

    Kratsch, S. & Wahlström, M., 2012, SODA. p. 94-103 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  260. Published

    Computational and Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2004, Proceedings of the Seventh International Workshop on Computer Algebra in Scientific Computing, CASC 2004. p. 93-103 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  261. Published

    Computational systems for mixed graphical models

    Gammerman, A., Luo, Z., Aitken, C. & Brewer, M., 1994, UNICOM Adaptive Computing and Information Processing Seminar . p. 143-163

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  262. Published

    Computationally efficient time-varying ISAR imaging

    Alty, S. R. & Jakobsson, A., 2006, 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing - Proceedings. Vol. 3. 1660620

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  263. Published

    Computationally efficient transductive machines

    Saunders, C., Gammerman, A. & Vovk, V., 2000, Proceedings of the Eleventh International Conference on Algorithmic Learning Theory. Arimura, H., Jain, S. & Sharma, A. (eds.). Berlin: Springer, p. 325-333 9 p. (Lecture Notes in Artificial Intelligence; vol. 1968).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  264. Published

    CONAN: a heuristic strategy for COncurrent Negotiating AgeNts

    Alrayes, B., Kafali, O. & Stathis, K., 2014, Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems. ACM, p. 1585-1586

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  265. Published

    Conceptualising the role of intermediaries in developing SMEs’ ICT capabilities

    Dyerson, R., Harindranath, G. & Levy, M., 2009, Proceedings of the 2009 Institute for Small Business & Entrepreneurship Conference, Liverpool. ISBE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. Published

    Conditional prediction intervals for linear regression

    McCullagh, P., Vovk, V., Nouretdinov, I., Devetyarov, D. & Gammerman, A., 2009, Proceedings of the International Conference on Machine Learning and Applications. p. 131-138 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  267. Published

    Confidence in Ability: The Non-Traditional University Student

    Chaney, I., 12 Nov 2018, 11th International Conference of Education, Research and Innovation, Seville, 12-14 November 2018. p. 7206-7211 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  268. Published

    Confidence Machine and its application to medical diagnosis

    Devetyarov, D., Nouretdinov, I. & Gammerman, A., 2009, International Conference on Bioinformatics and Computational Biology. p. 448-454 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  269. Published

    Confidence Predictions for the Diagnosis of Acute Abdominal Pain

    Papadopoulos, H., Gammerman, A. & Vovk, V., 2009, Artificial Intelligence Applications & Innovations III. Iliadis, L., Vlahavas, I. & Bramer, M. (eds.). Springer, Vol. 296. p. 175-184 10 p. (IFIP International Federation for Information Processing; vol. 296).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  270. Published

    Conformal Anomaly Detection of Trajectories with a Multi-class Hierarchy

    Smith, J., Nouretdinov, I., Craddock, R., Offer, C. & Gammerman, A., 3 Apr 2015, Statistical Learning and Data Sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 281-290 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  271. Published

    Conformal Clustering and Its Application to Botnet Traffic

    Cherubin, G., Nouretdinov, I., Gammerman, A., Jordaney, R., Wang, Z., Papini, D. & Cavallaro, L., 3 Apr 2015, Statistical Learning and Data Sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 313-322 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  272. Published

    Conformal Prediction for Indoor Localisation with Fingerprinting Method

    Nguyen, K. & Luo, Z., Sep 2012, Artificial Intelligence Applications and Innovations: First Conformal Prediction and Its Applications Workshop (COPA 2012). Halkidiki, Greece: Springer, p. 214-223 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  273. Published

    Conformal prediction under hypergraphical models

    Fedorova, V., Gammerman, A., Nouretdinov, I. & Vovk, V., Oct 2013, The 9th Artificial Intelligence Applications and Innovations Conference (AIAI): 2nd Workshop on Conformal Prediction and its Applications. p. 371-383 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  274. Published

    Conformal Prediction under Probabilistic Input

    Nouretdinov, I., 19 Sep 2014, Artificial Intelligence Applications and Innovations: AIAI2014 Workshops. Rhodes, Greece, p. 291-300 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  275. Published

    Conformal prediction with Neural Networks

    Papadopoulos, H., Vovk, V. & Gammerman, A., 2007, Proceedings of the Nineteenth IEEE International Conference on Tools with Artificial Intelligence. Vol. 2. p. 388-395 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  276. E-pub ahead of print

    Conformal Predictive Distributions with Kernels

    Vovk, V., Nouretdinov, I., Manokhin, V. & Gammerman, A., 23 Aug 2018, Braverman Readings in Machine Learning. Key Ideas from Inception to Current State - International Conference Commemorating the 40th Anniversary of Emmanuil Braverman’s Decease, Invited Talks. Springer-Verlag, Vol. 11100 . p. 103-121 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11100 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  277. Published

    Conformal Predictors for Compound Activity Prediction

    Toccaceli, P., Nouretdinov, I. & Gammerman, A., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 51-66 16 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  278. Published

    Connectivity augmentation in tactical mobile ad hoc networks

    Reidt, S. & Wolthusen, S. D., 16 Nov 2008, Proc. 2008 IEEE Military Communications Conference. IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  279. Published

    Consensus and collision deteotors in wireless ad hoc networks

    Chockler, G., Demirbas, M., Gilbert, S., Newport, C. & Nolte, T., 1 Jan 2005, Proceedings of the 24th annual ACM symposium on Principles of distributed computing (PODC '05). p. 197-206 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  280. Published

    Consistency Conditions for a CORBA Caching Service

    Chockler, G., Friedman, R. & Vitenberg, R., 2000, Proceedings of the 14th International Conference on Distributed Computing (DISC '00). Springer-Verlag, p. 374-388 15 p. (Lecture Notes In Computer Science; no. 1914).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  281. Published

    Constrained Dynamic Tree Networks

    Hague, M. & Penelle, V., 2018, 12th International Conference on Reachability Problems. Springer International Publishing, p. 45-58 14 p. (Lecture Notes in Computer Science; vol. 11123).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  282. E-pub ahead of print

    Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 25 Dec 2016, Advances in Network Systems : Architectures, Security, and Applications. AISC ed. Springer-Verlag, Vol. 461. p. 149-166 18 p. (Advances in Intelligent Systems and Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  283. Published

    Constraint Expressions and Workflow Satisability

    Crampton, J. & Gutin, G., 2013, 18th ACM SACMAT. p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  284. Forthcoming

    Constraint satisfaction problems parameterized above or below tight bounds: a survey

    Gutin, G. & Yeo, A., 2012, (Accepted/In press) Fellows Festschrift. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  285. Published

    Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection

    Seeger, M., Baier, H., Busch, C. & Wolthusen, S. D., 26 May 2010, Proc. 2010 2nd International Workshop on Security and Communication Networks (IWSCN). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  286. Published

    Constructing corporate social responsibility: A discursive and multi-level institutional approach

    Preuss, L. & Schaefer, A., Jul 2011, 27th colloquium of the European Group for Organisation Studies (EGOS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  287. Published

    Constructing Key Assignment Schemes from Chain Partitions

    Crampton, J., Daud, R., Martin, K. M., Foresti, S. (ed.) & Jajodia, S. (ed.), 2010, Data and Applications Security and Privacy XXIV. Springer, Vol. 6166. p. 130-145 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  288. Published

    Constructing scalable overlays for pub-sub with many topics

    Chockler, G., Melamed, R., Tock, Y. & Vitenberg, R., 1 Jan 2007, Proceedings of the 26th Annual ACM Symposium on Principles of Distributed Computing: PODC 2007. p. 109-118 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  289. Published

    Consumer risk perceptions in e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 308-315 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  290. Published

    Consumer-Centric Protection for Online Social Networks

    Akram, R. N., Ko, R. K. L. & Law, T. F., 2014, 1st Workshop on Social Network Security (SocialSec 2014) in conjunction with 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI 2014). Hasan, R. (ed.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  291. Published

    Consuming Sustainability Narratives

    Haynes, P., 2015, Advances in Consumer Research. Diehl, K. & Yoon, C. (eds.). NA-43 ed. Duluth, MN, Vol. 43. p. 364-367 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  292. Published

    Context-aware content-centric collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P. & Clark, T., 2012, Proceedings of the 2nd International Conference on Advanced Collaborative Networks, Systems and Applications (COLLA?12). p. 54-57 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  293. Published

    Context-awareness and intelligence in distributed cognitive radio networks: A reinforcement learning approach

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Theory Workshop (AusCTW), 2010 Australian. p. 35-42 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  294. Published

    Contextual analysis of word meanings in type-theoretical semantics

    Luo, Z., 2011, Logical Aspects of Computational Linguistics:6th International Conference, LACL 2011, Montpellier, France, June 29 – July 1, 2011: Proceedings. Pogodalla, S. & Prost, J-P. (eds.). Springer, p. 159-174 16 p. (Lecture Notes in Computer Science; vol. 6736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  295. Published

    Continuous Beam Energy Measurements at Diamond Light Source

    Vitoratou, N., Karataev, P. & Rehm, G., 29 Jan 2019, International Beam Instrumentation Conference (7th) IBIC2018. JACoW Publishing, p. 107-110 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  296. Unpublished

    Contradictions and tensions in the experience of public sector work: an ethnographic study in UK local government

    Gatenby, M. & Rees, C., Apr 2010, (Unpublished) British Sociological Association (BSA) Annual Conference. Glasgow.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  297. Published

    Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture

    Akram, R. N., Markantonakis, K. & Mayes, K., Oct 2012, The 2012 International Conference on Information and Communications Security (ICICS 2012). Chow, K. P. & Hui, L. C. K. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  298. Published

    Coordination: The evolutionary dimension

    Andrade, L. F. & Fiadeiro, J. L., 1 Jan 2001, 38th International Conference on Technology of Object-Oriented Languages and Systems, Components for Mobile Computing. p. 136-147 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  299. Published

    Coordination Durative Actions

    Nunes, I., Fiadeiro, J. L. & Turski, W. M., 1997, COORDINATION. Springer, Vol. 1282. p. 115-130 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  300. Published

    Coordination for Distributed Business Systems

    Andrade, L. F., Fiadeiro, J. L., Lopes, A. & Wermelinger, M., 2003, CAiSE Workshops. CEUR-WS.org, Vol. 75. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  301. Published

    Coordination Technologies for Managing Information System Evolution

    Andrade, L. F. & Fiadeiro, J. L., 2001, CAiSE. Springer, Vol. 2068. p. 374-387 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  302. Published

    CopperDroid: Automatic Reconstruction of Android Malware Behaviors

    Tam, K., Khan, S., Fattori, A. & Cavallaro, L., 7 Feb 2015, NDSS Symposium 2015. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  303. Published

    Coreset-based Conformal Prediction for Large-scale Learning

    Riquelme Granada, N., Nguyen, D. K. A. & Luo, Z., Sep 2019, Proceedings of Machine Learning Research: Proceedings of the Eighth Symposium on Conformal and Probabilistic Prediction and Applications. Vol. 105. p. 142-162 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  304. Published

    Corporate engagement with the challenge of corruption

    Barkemeyer, R., Preuss, L. & Lee, L., Jan 2014, Africa Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  305. Published

    Corporate engagement with the challenge of corruption: An international comparison

    Preuss, L. & Barkemeyer, R., Oct 2011, 10th annual colloquium of the Academy of Business in Society .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  306. Unpublished

    Corporate investment efficiency: The role of financial development in firms with financing constraints and agency issues in OECD non-financial firms

    Li, M. C., 2018, (Unpublished) New York International Business and Social Science Research Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  307. Published

    Corporate reporting on corruption: An international comparison

    Barkemeyer, R. & Preuss, L., Aug 2012, Annual Meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  308. Published

    Corporate social responsibility and discursive control of corporations

    Schaefer, A. & Preuss, L., Aug 2008, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  309. Published

    Corporate social responsibility in the management of supply chains: Toward a holistic framework

    Preuss, L. & Seuring, S., Aug 2008, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  310. Unpublished

    Corporate social responsibility: the challenge for trade unions in Europe

    Preuss, L., Rees, C. & Gold, M., Jun 2012, (Unpublished) British Universities Industrial Relations Association (BUIRA) 62nd Annual Conference. Bradford

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  311. Published

    Correspondence between Johann George Roellig and the Court of Anhalt-Zerbst: musical responsibilities in the 1780s and the Swedish connection

    Springthorpe, N., 2015, Fasch Studien 13: 'Zerbst zur Zeit Faschs - ein anhaltinischer Musenhof'', Bericht über die Internationale Wissenschaftliche Konferenz am 17. bis 18. April 2015 im Rahmen der 13. Internationalen Fasch-Festtage in Zerbst. : Fasch-Studien Herausgegeben von der Internationale Fasch-Gesellschaft e.V. Band XIII. Siegmund, B., Musketa, K. & Reul, B. M. (eds.). Beeskow: Ortus Musikverlag, p. 229-246 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  312. Published

    Corruption: What do multinationals have to say in the emerging debate?

    Preuss, L. & Barkemeyer, R., Jun 2012, annual meeting of the International Association for Business and Society (IABS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  313. Published

    Countering “dead, causal reality”: The fusion of material and metaphysical oppression in Philip Dick’s late work

    Gene-Rowe, F., Jun 2014, Current Research in Speculative Fiction 2014. Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  314. Published

    Counting Satisfying Assignments in 2-SAT and 3-SAT

    Dahllöf, V., Jonsson, P. & Wahlström, M., 2002, COCOON. p. 535-543 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  315. Published

    Cover Your Cough: Detection of Respiratory Events with Confidence Using a Smartwatch

    Nguyen, D. K. A. & Luo, Z., Jun 2018, Proceedings of Machine Learning Research: Conformal and Probabilistic Prediction and Applications (COPA 2018). Vol. 91. p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  316. Published

    Crafting IT jobs through the flexibility of contracting: The case of female contractors in a male-dominated sector

    Panteli, N., 5 Sep 2017, Proceedings of the British Academy of Management Conference, BAM2017: Track: Gender and Management, . The University of Warwick, September 5-7, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  317. Unpublished

    Creating Digital Narrative Artworks: An Expanding Geographical Field

    Lowe, J., 25 Apr 2019, (Unpublished) Innovative Research Methods session at RGS-IBG PGF Mid-Term Conference 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  318. Published

    Criteria of Efficiency for Conformal Prediction

    Vovk, V., Fedorova, V., Nouretdinov, I. & Gammerman, A., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 23-39 17 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  319. Published

    Criterion of calibration for transductive confidence machine with limited feedback

    Nouretdinov, I. & Vovk, V., 2003, Lecture Notes in Articial Intelligence. Vol. 2842. p. 259-267 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  320. Published

    Critical phase separation in solid helium isotopic mixtures

    Saunders, J., Cowan, B. & Poole, M., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 358-359 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  321. Unpublished

    Cross-border mergers and the country-of-origin effect: implications for HRM?

    Edwards, T. & Rees, C., Nov 2000, (Unpublished) Association Francophone de Gestion des Ressources Humaines (AGRH) 11th Annual Congress. Paris.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. Unpublished

    Cross-border mergers and the country-of-origin effect: trade union responses

    Edwards, T. & Rees, C., Mar 2001, (Unpublished) Wissenschaftszentrum Berlin (WZB) Conference on 'Cross-Border Mergers and Employee Participation in Europe'. Paris.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  323. Published

    Cross-cultural Leadership Behavior Adjustment: Expatriate Senior Managers in China

    Tsai, C-J. & Qiao, K., 2017, Academy of Management Annual Meeting (AOM), Atlanta, Georgia, August 4-8. (Awarded Best Paper, HR Division).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  324. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2011, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  325. Published

    Crossvergence in CSR priorities of developing country firms

    Preuss, L. & Barkemeyer, R., Jan 2014, Africa Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  326. Published

    Crowdfunding and social identity in Northern and Latin America

    Kromidha, E., 2016, Proceedings of the 6th Latin American and European Meeting on Organization Studies, 6-9 April 2016 . Viña del Mar, Chile

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  327. Published

    Crowdsourcing Lightweight Pyramids for Manual Summary Evaluation

    Shapira, O., Gabay, D., Gao, Y., Ronen, H., Pasunuru, R., Bansal, M., Amsterdamer, Y. & Dagan, I., Jun 2019, Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics, Vol. 1. p. 682-687 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  328. Published

    Crusader Perceptions of Byzantium, c.1095 to c.1150

    Phillips, J., 21 Feb 2019, Byzantium and the West: Perception and Reality (C12th to C15th). Chrissis, N., Kolia-Dermitzaki, A. & Papageorgiou, A. (eds.). Abingdon: Routledge

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  329. Published

    Cryptanalysis of the EPBC authenticated encryption mode

    Mitchell, C. J., 2007, Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings. Springer-Verlag, Vol. 4887. p. 118-128 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  330. Published

    Cryptanalysis of two variants of PCBC mode when used for message integrity

    Mitchell, C. J., 2005, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Boyd, C. & Gonzalez-Nieto, J. (eds.). Springer-Verlag, Vol. 3574. p. 560-571 12 p. (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  331. E-pub ahead of print

    Cryptographic Enforcement of Information Flow Policies Without Public Information

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 9 Jan 2016, 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . Malkin, T., Kolesnikov, V., Bishop Lewko, A. & Polychronakis, M. (eds.). p. 389-408 20 p. (Lecture Notes in Computer Science; vol. 9092).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  332. Published

    Cryptographic Enforcement of Role-Based Access Control

    Crampton, J., 2010, Proceedings of 7th International Workshop on Formal Aspects of Security and Trust. Springer, p. 191-205 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  333. Published

    Cryptographic Protocol Synthesis and Verification for Multiparty Sessions

    Bhargavan, K., Corin, R., Denielou, P-M., Fournet, C. & Leifer, J. J., 2009, PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM. LOS ALAMITOS: IEEE COMPUTER SOC, p. 124-140 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  334. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2007, Proceedings of the 12th Nordic Workshop on Secure IT Systems. p. 49-60 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  335. Published

    C-SHORe: A Collapsible Approach to Verifying Higher-Order Programs

    Broadbent, C., Carayol, A., Hague, M. & Serre, O., 25 Sep 2013, ICFP: International Conference on Functional Programming. p. 13-24 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  336. Published

    CSR priorities of emerging economy firms: Is Russia different from the other emerging economies

    Preuss, L. & Barkemeyer, R., Sep 2010, 9th annual colloquium of the Academy of Business in Society (ABIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  337. Published
  338. Unpublished

    Culture-Centric Studies of Marketing and Consumption in Brazil

    Ferreira, M. C., Figueiredo, B., Pereira, S. & Scaraboto, D., 2 Jul 2014, (Unpublished) Proceedings of the 39th Annual Macromarketing Conference. Macromarketing Society, Inc., p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  339. Published

    Curb Your Enthusiasm: Why the Future is Not Stuxnet

    Haggman, A., 2 Jul 2015, Proceedings of the 14th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, p. 397-403 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  340. Published

    Customer Agility Capabilities at EuroBank: The Role of ICT and Organizational Routines

    Hallikainen, P., Merisalo-Rantanen, H. & Elbanna, A., 2017, Australasian Conference on Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  341. Published

    Customizing Conventional Patent-based Financial Instruments for Financing Nanotechnology Firms: An Iranian Perspective

    Nasiri, A., 2010, International Conference on Nanotechnology and Biosensors (ICNB). Hong Kong, China

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  342. Published

    CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise

    Creese, S., Goldsmith, M., Moffat, N., Happa, J. & Agrafiotis, I., 2013, IEEE Conference on Technologies for Homeland Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  343. Published

    Dancing with strangers: observing play, movement and interaction in a public square through the lens of a dancer, a writer and a painter

    Coppard, H., 30 Sep 2014, Children and Families in Changing Urban Spaces conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  344. Published

    Dare to innovate by taking care of hurdles to innovation

    Guenther, E., Hueske, A-K., Kesting, P., Linnenluecke, M., Moeller, K. & Preuss, L., Aug 2010, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  345. Published

    Data caching as a cloud service

    Chockler, G., Laden, G. & Vigfusson, Y., 2010, Proceedings of the 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS '10). ACM, p. 18-21 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  346. Published

    Data Dependent Power Use in Multipliers

    Walter, C. D. & Samyde, D., 2005, 17th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 4-12 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  347. Published

    Data Integrity in Hardware for Modular Arithmetic

    Walter, C. D., 2000, CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1965. p. 204-215 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  348. Published

    Data Is a Stream: Security of Stream-Based Channels

    Fischlin, M., Guenther, F., Paterson, K. & Marson, G. A., 1 Aug 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Gennaro, R. & Robshaw, M. (eds.). Springer Verlag, Vol. 9216. p. 545-564 20 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  349. Published

    Data Structures for Constraint Enforcement in Role-Based Systems

    Crampton, J. & Khambhammettu, H., 2005, Proceedings of the 2005 IASTED Conference on Network and Information Security. p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  350. E-pub ahead of print

    Data-Driven Robust Control for Type 1 Diabetes Under Meal and Exercise Uncertainties

    Paoletti, N., Liu, K. S., Smolka, S. A. & Lin, S., 1 Sep 2017, Computational Methods in Systems Biology. Feret, J. & Koeppl, H. (eds.). Springer, p. 214-232 19 p. (Lecture Notes in Computer Science; vol. 10545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  351. Published

    Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

    Weldehawaryat, G., Ambassa, P., Marufu, A., Wolthusen, S. & Kayem, A. V. D. M., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 69-86 18 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  352. E-pub ahead of print

    Decidable Models of Integer-Manipulating Programs with Recursive Parallelism

    Hague, M. & Lin, A., 13 Sep 2016, Reachability Problems: 10th International Workshop, RP 2016, Aalborg, Denmark, September 19-21, 2016, Proceedings. Springer International Publishing, Vol. 9899. p. 148-162 15 p. (Lecture Notes in Computer Science; vol. 9899).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  353. Published

    Declarative agent control

    Kakas, A., Mancarella, P., Sadri, F., Stathis, K. & Toni, F., 2004, Computational Logic in Multi-agent Systems (CLIMA 2004). Springer-Verlag, Vol. 3487. p. 96-110 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  354. Published

    Decoherence of a quantum bit circuit

    Ithier, G., Nguyen, F., Collin, E., Boulant, N., Meeson, P. J., Joyez, P., Vion, D. & Esteve, D., 2007, Quantum Decoherence: Poincare Seminar 2005. Duplantier, B., Raimond, JM. & Rivasseau, V. (eds.). CAMBRIDGE: Birkhauser, Boston, p. 125-149 25 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  355. Published

    Deconfinement and cold atoms in optical lattices

    Cazalilla, M. A., Ho, A. F. & Giamarchi, T., 2006, RECENT PROGRESS IN MANY-BODY THEORIES: Proceedings of the 13th International Conference, Buenos Aires, Argentina, 5 – 9 December 2005. Hernández, S. & Cataldo, H. (eds.). p. 208-217 10 p. (Series on Advances in Quantum Many-Body Theory ; vol. 10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  356. Forthcoming

    Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper

    Meister, J. A., Akram, R. N. & Markantonakis, K., 7 Nov 2018, (Accepted/In press) The 12th WISTP International Conference on Information Security Theory and Practice (WISTP'2018). Blazy, O. & Yeun, C. Y. (eds.). Brussels, Belgium: Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  357. Forthcoming

    Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the 6th International Workshop on Critical Information Infrastructures Security 2011 (CRITIS 2011). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  358. Published

    Defending financial infrastructures through early warning systems: The intelligent cloud approach

    Lodi, G., Querzoni, L., Baldoni, R., Marchetti, M., Colajanni, M., Bortnikov, V., Chockler, G., Dekel, E., Laventman, G. & Roytman, A., 2009, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies (CSIIRW '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  359. Published

    Defensive Forecast for Conformal Bounded Regression

    Nouretdinov, I. & Lebedev, A., Oct 2013, The 9th Artificial Intelligence Applications and Innovations Conference (AIAI): 2nd Workshop on Conformal Prediction and its Applications. p. 384-393 10 p. (IFIP Advances in Information and Communication Technology; vol. 412).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  360. Published

    Defensive forecasting

    Vovk, V., Takemura, A. & Shafer, G., 2005, Proceedings of the Tenth International Workshop on Articial Intelligence and Statistics. Cowell, R. & Ghahramani, Z. (eds.). p. 365-372 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  361. Published

    Defensive forecasting for linear protocols

    Vovk, V., Nouretdinov, I., Takemura, A. & Shafer, G., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, Vol. 3734. p. 459-473 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  362. Published

    Defensive prediction with expert advice

    Vovk, V., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, p. 444-458 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  363. Published

    Definitions of corporate social responsibility: Content, range of authors, evolution over time

    Preuss, L., 2015, Annual Meeting of the International Association for Business and Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  364. Published

    Delay and jitter attacks on hierarchical state estimation

    Baiocco, A., Foglietta, C. & Wolthusen, S., 21 Mar 2016, Proceedings of the 2015 IEEE International Conference on Smart Grid Communications. IEEE Press, p. 485-490

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  365. Published

    Delegation and satisfiability in workflow systems

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 31-40 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  366. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H., 2006, Proceedings of 11th European Symposium on Research in Computer Security. Springer, p. 174-191 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  367. Published

    Democratising Capitalism: Employee Share ownership schemes and unions

    Sen Gupta, S., 2013, European Academy of Management, University of Galatsaray, Istanbul, Turkey.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  368. Published

    Dependent coercions

    Luo, Z. & Soloviev, S., 1999, Proc of the 8th Inter. Conf. on Category Theory in Computer Science (CTCS'99), Edinburgh, Scotland. Electronic Notes in Theoretical Computer Science, Vol 29.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  369. Published

    Dependent Randomized Rounding: The Bipartite Case

    Doerr, B., Künnemann, M. & Wahlström, M., 2011, 2011 Proceedings of the Thirteenth Workshop on Algorithm Engineering and Experiments (ALENEX). Müller-Hannemann, M. & Werneck, R. (eds.). San Francisco, California, USA: SIAM, p. 96-106 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  370. Published

    Dependent record types revisited

    Luo, Z., 2009, Modules and Libraries for Proof Assistants (MLPA'09), ACM Inter. Conf. Proceeding Series. Vol. 429.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  371. Published

    Derandomizing stochastic prediction strategies

    Vovk, V., 1997, Proceedings of the Tenth Annual Conference on Computational Learning Theory. Freund, Y. & Schapire, R. (eds.). New York: ACM Press, p. 32-44 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  372. Published

    Deriving Ancient Foot Units from Building Dimensions: a Statistical Approach Employing Cosine Quantogram Analysis

    Pakkanen, J., 2002, Archaeological Informatics: Pushing the Envelope. CAA 2001: Computer Applications and Quantitative Methods in Archaeology. Proceedings of the 29th Conference, Gotland, April 2001. Burenhult, G. & Arvidsson, J. (eds.). Oxford: Archaeopress, p. 501–506 (BAR International Series; vol. 1016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  373. Published

    Deriving authentication for pervasive security

    Pavlovic, D. & Meadows, C., 2008, Proceedings of the ISTPS 2008. McLean, J. (ed.). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  374. Forthcoming

    Deriving ephemeral authentication using channel axioms

    Pavlovic, D. & Meadows, C., 2012, (Accepted/In press) Proceedings of the Cambridge Workshop on Security Protocols 2009. Christianson, B. (ed.). Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  375. Published

    Description and Classification of Rhodoliths (Rhodoids, Rhodolites)

    Bosence, D., 1983, Coated Grains. Peryt, T. M. (ed.). Springer Berlin / Heidelberg, p. 217-224 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  376. Published

    Description of Laser Transport and Delivery System for the FETS Laserwire Emittance Scanner

    Bosco, A., Boorman, G., Emery, S., Gibson, S., Gabor, C., Hofmann, T., Pozimski, J. & Savage, P., 19 Sep 2013, 2nd International Beam Instrumentation Conference. p. 527-530 4 p. TUPF14

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  377. Published

    Design and development of a facebook application to raise privacy awareness

    Costantino, G. & Sgandurra, D., 2015, Proceedings - 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2015. Institute of Electrical and Electronics Engineers Inc., p. 583-586 4 p. 7092778

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  378. Published

    Design of a Laser-based Profile Monitor for LINAC4 Commissioning at 50 MeV and 100 MeV

    Hofmann, T., Boorman, G., Bosco, A., Bravin, E., Gibson, S. & Griesmayer, E., Jan 2016, 4th International Beam Instrumentation Conference: IBIC2015, Melbourne, Australia. JACoW Publishing, p. 451-455 4 p. TUPB055

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  379. Published

    Design of a multiagent-based e-marketplace to secure service trading on the Internet

    Li, Q., Martin, K. M. & Zhang, J., 2011, Proceedings of the 13th International Conference on Electronic Commerce (ICEC 2011) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  380. Published

    Design of the beam delivery system for the international linear collider

    Seryi, A., Amann, J., Arnold, R., Asiri, F., Bane, K., Bellomo, P., Doyle, E., Fasso, A., Jonghoon, K., Keller, L., Ko, K., Li, Z., Markiewicz, T., Maruyama, T., Moffeit, K., Molloy, S., Nosochkov, Y., Phinney, N., Raubenheimer, T., Seletskiy, S. & 81 others, Smith, S., Spencer, C., Tenenbaum, P., Walz, D., White, G., Woodley, M., Woods, M., Xiao, L., Anerella, M., Jain, A., Marone, A., Parker, B., Delferriere, O., Napoly, O., Payet, J., Uriot, D., Watson, N., Agapov, I., Baldy, J-L., Schulte, D., Burt, G., Dexter, A., Buesser, K., Lohmann, W., Bellantoni, L., Drozhdin, A., Kashikhin, V., Kuchler, V., Lackowski, T., Mokhov, N., Nakao, N., Peterson, T., Ross, M., Striganov, S., Tompkins, J., Wendt, M., Yang, X., Enomoto, A., Kuroda, S., Okugi, T., Sanami, T., Suetsugu, Y., Tauchi, T., Alabau, M. D. C., Bambade, P., Brossard, J., Dadoun, O., Burrows, P., Christian, G., Clarke, C., Constance, B., Khah, H. D., Hartin, A., Perry, C., Swinson, C., Ferrari, A., Blair, G., Boogert, S., Carter, J., Angal-Kalinin, D., Beard, C., Densham, C., Fernandez-Hernando, L., Greenhalgh, J., Goudket, P., Jackson, F., Jones, J., Kalinin, A., Ma, L., McIntosh, P., Yamamoto, H., Mattison, T., Carwardine, J., Saunders, C., Appleby, R., Torrence, E., Gronberg, J., Sanuki, T., Iwashita, Y., Telnov, V. & Warner, D., 2007, Particle Accelerator Conference, 2007. PAC. IEEE. p. 3773-3775 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  381. Published

    Design, development and use of the spectrometer for investigating coherent THz radiation produced by micro-bunching instabilities at Diamond Light Source

    Finn, A., Karataev, P. & Rehm, G., 1 Jul 2016, Journal of Physics: Conference Series. Karataev, P., Potylitsyn, A., Tyukhtin, A. & Strikhanov, M. (eds.). UK: IOP PUBLISHING LTD, Vol. 732. p. 1-9 9 p. 012039. (Radiation from Relativistic Electrons in Periodic Structures; vol. 732).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  382. Published

    Design, Installation and Execution of a Security Agent for Mobile Stations.

    Sirett, W. G., MacDonald, J. A., Mayes, K. & Markantonakis, K., 2006, CARDIS. Domingo-Ferrer, J., Posegga, J. & Schreckling, D. (eds.). Springer, Vol. 3928. p. 1-15 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  383. Published

    Designing for creep in composites

    Hogg, P. J., 1998, DESIGNING COST-EFFECTIVE COMPOSITES. WESTMINISTER: PROFESSIONAL ENGINEERING PUBLISHING LTD, p. 93-106 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  384. E-pub ahead of print

    Designing Robust Software Systems through Parametric Markov Chain Synthesis

    Calinescu, R., Ceska, M., Gerasimou, S., Kwiatkowska, M. & Paoletti, N., 18 May 2017, Software Architecture (ICSA), 2017 IEEE International Conference on. p. 131-140 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  385. Published

    Designing Workflows for Grid Enabled Internet Instruments

    Stirling, D., Welch, I. & Komisarczuk, P., 2008, 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France. p. 218-225 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  386. Published

    De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S., 9 Sep 2018, Proceedings of the 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017). Springer-Verlag, p. 131-143 13 p. (Lecture Notes in Computer Science; vol. 10707).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  387. Published

    Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?

    Crampton, J. & Huth, M., 2009, Proceedings of 5th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  388. E-pub ahead of print

    Detecting disguised processes using application-behavior profiling

    Vaas, C. & Happa, J., 8 Jun 2017, Technologies for Homeland Security (HST), 2017 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  389. Published

    Detecting Exceptions in Commitment Protocols: Discovering Hidden States

    Kafali, O. & Yolum, P., 2010, Languages, Methodologies and Development Tools for Multi-Agent Systems. Vol. 6039. p. 112-127 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  390. Published

    Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013. p. 300-303 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  391. Published

    Detecting Malicious Code by Model Checking

    Kinder, J., Katzenbeisser, S., Schallhart, C. & Veith, H., 2005, Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, p. 174-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  392. Published

    Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach

    Hague, M., Lin, A. & Ong, C-H. L., 23 Oct 2015, OOPSLA: Object-Oriented Programming Systems, Languages and Applications. New York, NY: ACM, p. 1-19 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  393. Published

    Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes

    Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 81-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  394. Published

    Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 310-316 7 p. (Lecture Notes in Computer Science; vol. 10898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  395. Forthcoming

    Determining Confidence of Predicted Interactions Between HIV-1 and Human Proteins Using Conformal Method

    Nouretdinov, I., Gammerman, A., Qi, Y. & Klein-Seetharaman, J., 2012, (Accepted/In press) Pacific Symposium on Biocomputing. Vol. 17. p. 311-322 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  396. Published

    Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) Attacks

    Esnaashari, S., Welch, I. & Komisarczuk, P., 2013, 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013. p. 725-729 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  397. Published

    Deterministic versus Probabilistic Methods for Searching for an Evasive Target

    Bernardini, S., Fox, M., Long, D. & Piacentini, C., 12 Feb 2017, Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17). p. 3709-3715 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  398. Published

    Developing a multi-level framework of sustainability innovation

    Dyerson, R. & Preuss, L., Sep 2011, 25th annual conference of the British Academy of Management (BAM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  399. Published

    Developing a Typology of Social Commerce Websites- An Exploratory Study

    Panteli, N., 2015, 2015 Academy of Marketing Conference – The Magic in Marketing: University of Limerick, Ireland 7-9 July 2015. O'Malley, L. (ed.). p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  400. Published

    Developing openness in electronic healthcare systems

    Soltan-Zadeh, Y. & Córdoba, J-R., 2014, BAM2014 Conference: The Role of The Business School in Supporting Economic and Social Development.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  401. Published

    Developing reuse technology in proof engineering

    Luo, Z., 1 Apr 1995, Proceedings of AISB95, Workshop on Automated Reasoning: bridging the gap between theory and practice, Sheffield, U.K..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  402. Published

    Developing virtual medical communities

    Panteli, N. & Sims, J., 2010, Proceedings of the IADIS International Conference e-Health 2010, EH, Part of the IADIS Multi Conference on Computer Science and Information Systems 2010, MCCSIS 2010. p. 249-252 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  403. Published

    Development and testing of the inTouch video link for people with dementia: Design approach and practical challenges

    Boyd, H., Jones, S., Harris, N., Panteli, N., Leake, J. & Jones, R., 29 Dec 2014, Proceedings - 2014 IEEE International Conference on Bioinformatics and Biomedicine, IEEE BIBM 2014. Institute of Electrical and Electronics Engineers Inc., p. 608-612 5 p. 6999231

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  404. Unpublished

    Development from the inside-out?: CSR and the construction of working conditions in Indian SMEs

    Soundararajan, V., Spence, L. & Rees, C., Jul 2013, (Unpublished) 29th European Group for Organizational Studies (EGOS) Colloquium. Montreal

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  405. Published

    Development of a BPM System using a Commercial FPGA Card and Digitizer Adaptor Module for FETS

    Boorman, G., Gibson, S., Jolly, S., D'Arcy, R., Lawrie, S. & Letchford, A., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 3716-3719 4 p. THPME186

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  406. Published

    Development of a Prototype Electro-Optic Beam Position Monitor at the CERN SPS

    Arteche, A., Bosco, A., Gibson, S., Chritin, N., Draskovic, D., Lefevre, T. & Levens, T., Feb 2017, 5th International Beam Instrumentation Conference: 11-15 September 2016, Barcelona, Spain. Geneva: JACoW Publishing, p. 1-4 4 p. WEPG09

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  407. Published

    Development of microwave and soft X-ray sources based on coherent radiation and Thomson scattering

    Aryshev, A., Araki, A., Fukuda, M., Karataev, P., Naumenko, G., Potylitsyn, A., Sakaue, K., Sukhikh, L., Urakawa, J. & Verigin, D., 2010, VIII INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2009). Strikhanov, MN. & Pivovarov, YL. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  408. Published

    Development of natural HEMP fibre sheet mould composites (NF- SMC)

    Ren, G., Patel, H., Hapuarachchi, D., Crowther, S., Fan, M. & Hogg, P. J., 1 Dec 2009, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  409. Published

    Development of the C-Band BPM System for ATF2

    Molloy, S., Ainsworth, R., Boogert, S., Boorman, G., Heo, A., Kim, H. -S., Kim, E. -S., Honda, Y., Tauchi, T., Terunuma, N., Lyapin, A., Maiheu, B., Wing, M., McCormick, D. J., Nelson, J., White, G. R., Shin, S. & Ward, D. R., 2009, Proceedings of IPAC'09, Vancouver, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  410. Published

    Development of the Sorong Fault Zone north of Misool Eastern Indonesia

    Saputra, A., Hall, R. & White, L., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. Jakarta, Indonesia, p. 1-14 IPA14-G-086

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  411. Published

    DEX: Self-Healing Expanders

    Pandurangan, G., Robinson, P. & Trehan, A., 2014, 2014 IEEE 28th International Parallel and Distributed Processing Symposium, Phoenix, AZ, USA, May 19-23, 2014. p. 702-711 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  412. Published

    Diabetes, Type 1

    Riazi, A. & Bradley, C., 2000, Encyclopedia of Stress . Fink, G. (ed.). San Diego: Acadamic Press, p. 688-693 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  413. Published

    Diagnosing Commitments: Delegation Revisited (Extended Abstract)

    Kafali, O. & Torroni, P., 2011, AAMAS 2011: 10th International Conference on Autonomous Agents and Multiagent Systems. p. 1175-1176 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  414. Published

    Diagnosing the Clinician: Business Capability Development and GP Practices

    Dyerson, R., Nov 2017, 2017 Proceedings of the International Small Business & Entrepreneurship conference, Belfast. 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  415. Published

    DIESECT: A DIstributed Environment for Simulating E-commerce ContracTs

    Wood, D., Kafali, O. & Stathis, K., 2013, E-Commerce and Web Technologies. Huemer, C. & Lops, P. (eds.). Springer Berlin / Heidelberg, Vol. 152. p. 39-50 12 p. (Lecture Notes in Business Information Processing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. Published

    Differential Cryptanalysis of Round-Reduced Sparx-64/128

    Ankele, R. & List, E., 2018, ACNS 2018 Applied Cryptography & Network security.. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 459-475 17 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  417. Published

    DIFFUSE NEUTRON-SCATTERING FROM EXCESS OXYGEN IN UO2.13

    GOFF, J. P., HUTCHINGS, M. T., BROWN, K., HAYES, W. & GODFRIN, H., 1990, NEUTRON SCATTERING FOR MATERIALS SCIENCE. SHAPIRO, SM., MOSS, SC. & JORGENSEN, JD. (eds.). PITTSBURGH: MATERIALS RESEARCH SOC, p. 373-377 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  418. Published

    Digital rights management using a mobile phone

    Abbadi, I. & Mitchell, C. J., 2007, Proceedings of ICEC 2007, Ninth International Conference on Electronic Commerce, Minneapolis, USA, August 2007. ACM Press, p. 185-194 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  419. Published

    Digital Trust - Trusted Computing and Beyond A Position Paper

    Akram, R. N. & Ko, R. K. L., 2014, The 7th IEEE International Symposium on Security, Privacy and Anonymity in Internet of Things (IEEE SpaIoT 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Marmol, F. G., Tapiador, J. E. & Dong, M. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  420. Published

    Digitally signed documents - Ambiguities and solutions

    Alsaid, A. & Mitchell, C. J., 2004, Proceedings - International Network Conference 2004 (INC 2004), University of Plymouth, UK, July 2004. Plymouth University, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  421. Published

    Directed Acyclic Subgraph Problem Parameterized above Poljak-Turzik Bound

    Crowston, R., Gutin, G. & Jones, M., 2012, FSTTCS 2012: LIPICS . Vol. 18. p. 400-411

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  422. Published

    Directed multicut is W[1]-hard, even for four terminal pairs

    Pilipczuk, M. & Wahlstrom, M., 2016, Proceedings of SODA 2016. Krauthgamer, R. (ed.). SIAM, p. 1167-1178 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  423. Published

    Discretionary and Mandatory Control for Role-Based Administration

    Crampton, J., 2006, Data Applications and Security XX. Damiani, E. & Liu, P. (eds.). Springer, p. 194-208 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. Published

    Disk laser welding of Ti6Al4V alloy

    Mastrocinque, E., Corrado, G., Caiazzo, F., Pasquino, N., Sergi, V. & Acerra, F., 2011, ICPR 21st International Conference on Production Research: Innovation in Product and Production. p. 1-6

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  425. Published

    Disrupt the disruptor: rethinking ‘disruption’ in digital innovation

    Elbanna, A. & Newman, M., Sep 2016, Tenth Mediterranean Conference on Information Systems (MCIS), Paphos, Cyprus, September 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  426. Published

    Dissecting the Role of Protectable Intellectual Property in Financing Nanotech Firms

    Nasiri, A., 2010, 2nd International Conference on Intellectual Capital Management (IICM). Zanajn, Iran

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  427. Published

    Dissemination of the ultra-low temperature scales PLTS-2000

    Rusby, R., Cousins, D., Head, D., Mohandas, P., Godfrin, H., Bunkov, M., Bauerle, C., Harakaly, R., Collin, E., Triqueneaux, S., Lusher, C., Li, J., Saunders, J., Cowan, B., Nyeki, J., Digby, M., Pekola, J., Gloos, K., Hernandez, P., de Groot, M. & 13 others, Peruzzi, A., Jochemsen, R., Chinchure, A., Bosch, W., Mathu, F., Flokstra, J., Veldhuis, D., Hermier, Y., Pitre, L., Verge, A., Benhalima, F., Fellmuth, B. & Engert, J., 2002, TEMPMEKO 2001: 8TH INTERNATIONAL SYMPOSIUM ON TEMPERATURE AND THERMAL MEASUREMENT IN INDUSTRY AND SCIENCE, VOL 1. BERLIN 12: V D E - VERLAG GMBH, p. 525-530 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  428. Forthcoming

    Distance Bounding for RFID: Effectiveness of Terrorist Fraud

    Hancke, G., Nov 2012, (Accepted/In press) IEEE RFID-TA. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  429. Published

    Distinguishing Exponent Digits by Observing Modular Subtractions

    Walter, C. D. & Thompson, S., 2001, CT-RSA 2001. Naccache, D. (ed.). Springer, Vol. 2020. p. 192-207 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  430. Published

    Distributed Computation of Large-scale Graph Problems

    Klauck, H., Nanongkai, D., Pandurangan, G. & Robinson, P., 2015, Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015, San Diego, CA, USA, January 4-6, 2015. p. 391-410 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  431. E-pub ahead of print

    Distributed Conformal Anomaly Detection

    Nouretdinov, I., 2 Feb 2017, Machine Learning and Applications (ICMLA), 2016 15th IEEE International Conference on. IEEE Computer Society, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  432. Published

    Distributed e-Voting using the Smart Card Web Server

    Kyrillidis, L., Cobourne, S., Mayes, K., Dong, S. & Markantonakis, K., 2012, Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). Martinelli, F., Lanet, J-L., Fitzgerald, W. & Foley, S. (eds.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  433. Published

    Distributed Symmetry Breaking in Hypergraphs

    Kutten, S., Nanongkai, D., Pandurangan, G. & Robinson, P., 2014, Distributed Computing - 28th International Symposium, DISC 2014, Austin, TX, USA, October 12-15, 2014. Proceedings. p. 469-483 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  434. Published

    Distributional Learning of some Context-free Languages with a Minimally Adequate Teacher

    Clark, A., 1 Sep 2010, Grammatical Inference: Theoretical Results and Applications. p. 24-37

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  435. Published

    Diversified Process Replicae for Defeating Memory Error Exploits

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  436. Unpublished

    Diversity in international HR transfer processes: evidence from a Swiss MNC in Sri Lanka

    Rees, C. & Samaratunga, M., Jun 2007, (Unpublished) EBS/CRANET Conference on 'Changes in Society, Changes in Organizations, and the Changing Role of HRM' . Tallinn.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  437. Published

    Do Birds of a Feather Flock Together? Determinants of Social Enterprise Sustainability and Location

    thirlaway, K., Haugh, H. & Robson, P., Aug 2014, 2014 Academy of Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  438. Published

    Do employee share ownership schemes contribute towards greater economic and industrial democracy: analysis using the WERS 98 cross section dataset

    Sen Gupta, S., 2005, European Academy of Management (EURAM), Munich, Germany.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  439. Published

    Do people converge to the linguistic patterns of non-reliable speakers? Perceptual learning from non-native speakers.

    Lev Ari, S. & Peperkamp, S., 2014, Proceedings of the 10th International Seminar on Speech Production (ISSP). p. 261 264 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  440. Published

    Do resistant seeds offer a worthwhile avenue for progress in stored product protection?

    Credland, P. F. & Appleby, J. H., 2003, ADVANCES IN STORED PRODUCT PROTECTION. CAMBRIDGE: CABI PUBLISHING, p. 50-58 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  441. Published

    Documentation and computer reconstruction strategies in the study of architecture at the sanctuary of Poseidon at Kalaureia, Greece

    Pakkanen, J., 2009, Archäologie und Computer. Workshop 13: Kulturelles Erbe und Neue Technologien 03–05. November 2008. Börner, W. & Uhlirz, S. (eds.). Wien: Museen der Stadt Wien - Stadtarchäolgie, 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  442. Published

    Does My Rebuttal Matter? Insights from a Major NLP Conference

    Gao, Y., Eger, S., Kuznetsov, I., Gurevych, I. & Miyao, Y., Jun 2019, Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Minneapolis, Minnesota: Association for Computational Linguistics, Vol. 1. p. 1274–1290 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  443. Published

    Doing Contracting, Being Flexible, Crafting Careers: The case of female contractors in the IT sector

    Panteli, N., 2017, 10th Critical Management Conference 2017. Liverpool, July 3-5, 2017. : Stream: Reclaiming Flexibility: Workplace Flexibility in the Contemporary Economy. Liverpool, July 3-5, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  444. Published

    Domains for Higher-Order Games

    Hague, M., Meyer, R. & Muskalla, S., 2017, 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2017). LIPIcs, p. 59:1-59:15 15 p. 59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  445. Published

    Domination Above r-Independence: Does Sparseness Help?

    Einarson, C. & Reidl, F., 30 Aug 2019, 44th International Symposium on Mathematical Foundations of Computer Science (MFCS 2019). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 138. p. 40:1-40:13 13 p. 40. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  446. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 19 Oct 2015, 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  447. Published

    Dr. Multicast: Rx for Data Center Communication Scalability

    Vigfusson, Y., Abu-Libdeh, H., Balakrishnan, M., Birman, K., Burgess, R., Chockler, G., Li, H. & Tock, Y., Apr 2010, EuroSys '10 Proceedings of the 5th European conference on Computer systems. Paris, France: ACM, p. 349-362 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  448. Published

    Drive-Witness Acceleration Scheme Based on Corrugated Dielectric mm-Scale Capillary

    Lekomtsev, K., Lyapin, A., Boogert, S., Karataev, P., Aryshev, A., Shevelev, M., Tishchenko, A., Terunuma, N. & Urakawa, J., 20 Jun 2017, Proceedings of the 8th International Particle Accelerator Conference. The Joint Accelerator Conferences Website, p. 3292-3295 4 p. (International Particle Accelerator Conference ; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  449. Published

    DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L., 4 Aug 2016, Security and Privacy Workshops (SPW), 2016 IEEE: Mobile Security Technologies (MoST 2016). IEEE, p. 252-261 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  450. Published

    DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

    Suarez de Tangil Rotaeche, G., Dash, S., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L., 22 Mar 2017, ACM CODASPY. ACM, p. 309-320 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  451. Published

    Drug cocktail selection for the treatment of chagas disease: A multi-objective approach

    Torres Bobadilla, M., Caceres Silva, J., Jimenez, R., Yubero, V., Vega, C., Rolón, M., Cernuzzi, L., Barán, B. & Paccanaro, A., 21 Dec 2017, SLIOIA - Simposio Latinoamericano de Investigación de Operaciones e Inteligencia Artificial 2017. p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  452. Published

    Drug targets prediction using chemical similarity

    Galeano Galeano, D. & Paccanaro, A., 26 Jan 2017, XLII Conferencia Latinoamericana de Informatica (CLEI). IEEE Xplore, p. 1-7 7 p. (2016 XLII Latin American Computing Conference (CLEI)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  453. Published

    Duni's 'Le Retour au village' and the Politics of Parma

    Charlton, D., 2014, I due mondi di Duni.: Il teatro musicale di un compositore illuminista fra Italia e Francia. Russo, P. (ed.). Lucca: Libreria Musicale Italiana, p. 119-54 36 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  454. Published

    DYKE EMPLACEMENT AT DIVERGENT PLATE BOUNDARIES

    GUDMUNDSSON, A., 1990, MAFIC DYKES AND EMPLACEMENT MECHANISMS. PARKER, AJ., RICKWOOD, PC. & TUCKER, DH. (eds.). ROTTERDAM: A A BALKEMA, p. 47-62 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  455. Published

    Dynamic capabilities for sustainability

    Preuss, L. & Dyerson, R., Jul 2012, 11th annual colloquium of the Academy of Business in Society (ABIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  456. Published

    Dynamic data integration using web services

    Zhu, F., Turner, M., Kotsiopoulos, I., Bennett, K., Russell, M., Budgen, D., Brereton, P., Keane, J., Layzell, P., Rigby, M. & Xu, J., 2004, IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 262-269 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  457. Published

    Dynamic Forced Partitioning of Robust Hierarchical State Estimators for Power Networks

    Baiocco, A. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  458. Published

    Dynamic Multirole Session Types

    Denielou, P-M. & Yoshida, N., 2011, POPL 11: PROCEEDINGS OF THE 38TH ANNUAL ACM SIGPLAN-SIGACT SYMPOSIUM ON PRINCIPLES OF PROGRAMMING LANGUAGES. NEW YORK: ACM, p. 435-446 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  459. Published

    Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014). Springer-Verlag, p. 73 85 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  460. Published

    Dynamic pricing and benchmarking in AirBnB

    Sims, J., Ameen, N. & Bauer, R., 2019, UK Academy of Information Systems (UKAIS). p. 1-29 29 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  461. Published

    Dynamics, robustness and fragility of trust

    Pavlovic, D., 2008, Proceedings of FAST 2008. Degano, P., Guttman, J. & Martinelli, F. (eds.). Springer-Verlag, Vol. 5491. p. 97-113 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  462. Published

    Earthquake focal mechanisms and recent faulting: a seismotectonic analysis in the Vordufell area, South Iceland Seismic Zone

    Angelier, J., Rognvaldsson, S., Bergerat, F., Gudmundsson, A., Jakobsdottir, S. & Stefansson, R., 1996, Seismology in Europe. Thorkelsson, B. (ed.). Reykjavik: Iceland Meteorological Office, Reykjavik, p. 199-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  463. Published

    Easy Impossibility Proofs for k-Set Agreement in Message Passing Systems

    Biely, M., Robinson, P. & Schmid, U., 2011, Principles of Distributed Systems - 15th International Conference, OPODIS 2011, Toulouse, France, December 13-16, 2011. Proceedings. p. 299-312 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  464. Published

    Eavesdropping Attacks on High-Frequency RFID Tokens

    Hancke, G. P., 1 Jul 2008, Workshop on RFID Security -- RFIDSec'08. Budapest, Hungary, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  465. Published

    ECC, an Extended Calculus of Constructions

    Luo, Z., 1 Jun 1989, Logics in Computer Science (LICS 1989).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  466. Published

    Ecological Studies on two Carbonate Sediment-Producing Algae

    Bosence, D., 1977, Fossil Algae. Flügel, E. (ed.). Springer Berlin / Heidelberg, p. 270-278 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  467. Published

    Ecological Succession from Corals to Coralline Algae in Eocene Patch Reefs, Northern Spain

    Taberner, C. & Bosence, D., 1985, Paleoalgology: Contemporary Research and Applications. Toomey, D. F. & Nitecki, M. H. (eds.). Springer Berlin / Heidelberg, p. 226-236 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  468. Published

    E-commerce and the media - Influences on security risk perceptions

    Jarupunphol, P. & Mitchell, C. J., 2002, Internet Technologies, Applications and Societal Impact, The 1st IFIP Workshop on Internet Technologies, Applications and Societal Impact, WITASI '02, Wroclaw, Poland, October 2002. Cellary, W. & Iyengar, A. (eds.). Kluwer Academic Publishers, p. 163-173 11 p. (IFIP Conference Proceedings; no. 232).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  469. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K., 27 Mar 2017, Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  470. Forthcoming

    Ecrire, trobar: le troubadour entre création et représentation

    Harvey, R., 2015, (Accepted/In press) L’Italie et les troubadours (XIIIe-XVe siècles). Paris: Classiques Garnier

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  471. Published

    Effect of rerouting on NGN VoIP Quality

    Komisarczuk, P. & Koudrin, A., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 364-370 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  472. Published

    Effects of context relevance and perceived risk on user acceptance of mobile information services

    van der Heijden, H., Ogertschnig, M. & van der Gaast, L., 2005, Proceedings of the European Conference on Information Systems (ECIS). Regensburg, Germany

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  473. Published

    EFFECTS OF INSECTICIDE APPLICATION ON WEED AND PASTURE PLANT-COMMUNITIES

    Gange, A. & BROWN, V. K., 1991, BRIGHTON CROP PROTECTION CONFERENCE : WEEDS - 1991, VOLS 1-3. FARNHAM: BRITISH CROP PROTECTION COUNCIL, p. 901-910 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  474. Published

    Effects of see-through interfaces on user acceptance of small screen information systems

    Acton, T., Golden, W. & van der Heijden, H., 2005, Proceedings of the European Conference on Information Systems (ECIS). Regensburg, Germany

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  475. Published

    Efficiency of conformalized ridge regression

    Burnaev, E. & Vovk, V., 2014, Proceedings of the Twenty Seventh Annual Conference on Learning Theory: JMLR: Workshop and Conference Proceedings. Vol. 35. p. 605-622 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  476. Published

    Efficiency updates for the restricted growth function GA for grouping problems

    Tucker, A., Swift, S. & Crampton, J., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 1536 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  477. E-pub ahead of print

    Efficient and Provable White-Box Primitives

    Fouque, P-A., Karpman, P., Kirchner, P. & Minaud, B., 9 Nov 2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer Verlag, p. 159-188 30 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  478. Published

    Efficient compilers for authenticated group key exchange

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 192-197 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  479. Published

    Efficient Computation of Balanced Structures

    Harris, D. G., Morsy, E., Pandurangan, G., Robinson, P. & Srinivasan, A., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II. p. 581-593 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  480. Published

    Efficient dynamic resource specifications

    Bubendorfer, K., Komisarczuk, P. & Chard, K., 2005, 6th International Conference on Mobile Data Management (MDM 2005), Ayia Napa, Cyprus, May 9-13, 2005. p. 281-285 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  481. Published

    Efficient implementation of the time-recursive Capon and APES spectral estimators

    Alty, S. R., Jakobsson, A. & Larsson, E. G., 3 Apr 2015, 2004 12th European Signal Processing Conference, EUSIPCO 2004. European Signal Processing Conference, EUSIPCO, Vol. 06-10-September-2004. p. 1269-1272 4 p. 7080094

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  482. Published

    Efficient model checking of fault-tolerant distributed protocols

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 2011, Proc. 41st Int Conf. Dependable Systems and Networks (DSN-DCCS 2011). IEEE, p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  483. Published

    Efficient Sampling with Small Populations: a Genetic Algorithm Satisfying Detailed Balance

    Watkins, C. & Buttkewitz, Y., 11 Jul 2015, Gecco Companion '15: Proceedings of the Companion Publication of the 2015 Genetic and Evolutionary Computation Conference. p. 1517-1518 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  484. Published

    Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures

    Wolthusen, S., 2016, Proceedings of the Second International Conference on Future Network Systems and Security. Springer-Verlag, p. 47-61 15 p. (Communications in Computer and Information Science; vol. 670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  485. Published

    Efficient state estimation and Byzantine behavior identification in Tactical MANETs

    Ebinger, P. & Wolthusen, S. D., 18 Oct 2009, Proc. 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  486. Published

    Efficient state merging in symbolic execution

    Kuznetsov, V., Kinder, J., Bucur, S. & Candea, G., Jun 2012, Proc. 33rd Conf. Programming Language Design and Implementation (PLDI 2012). ACM, p. 193-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  487. Published

    Efficient, correct, unsupervised learning of context-sensitive languages

    Clark, A., 2010, Proceedings of the Fourteenth Conference on Computational Natural Language Learning. p. 28-37

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  488. Published

    Either / Or

    Samson, J., 2008, Rethinking Musical Modernism: Proceedings of the international conference held from October 11 to 13, 2007. Despić, D. & Milin, M. (eds.). Belgrade: Serbian Academy of Sciences and Arts, p. 15-26

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  489. Published

    Electroantennogram obtained from honeybee antennae for odor detection

    Wang, Y., Zheng, Y., Luo, Z. & Li, G., 2010, Lecture Notes in Computer Science. Springer, Vol. 6063. p. 63-66

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  490. Published

    Electronic Case Management System in the judiciary: Perspectives from the Judiciary of Malawi

    Chawinga, C., Chawinga, W., Majawa, F. & Kapondera, S., 2018, Standing Conference of Eastern Central and Southern African Libraries Associatio.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  491. Published

    Electronic transaction security: An analysis of the effectiveness of SSL and TLS

    Khu-smith, V. & Mitchell, C. J., 2002, Proceedings of the International Conference on Security and Management (SAM '02), Las Vegas, Nevada, USA, June 2002. CSREA Press, p. 425-429 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  492. Published

    Email-based Password Recovery - Risking or Rescuing Users?

    Al Maqbali, F. & Mitchell, C. J., 24 Dec 2018, Proceedings of ICCST 2018: 52nd Annual IEEE International Carnahan Conference on Security Technology. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  493. Published

    Embedding knowledge management into business process: The use of threaded discussion forums and knowledge objects at AstraZeneca

    Jashapara, A. & Adelmann, H., 2003, Proceedings of ECKM 2003: The 4th European Conference on Knowledge Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  494. Published

    Emergence and mutability of social media work practices

    Hafezieh, N. & Amis, J., 2017, International Conference on Information Systems Proceedings. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  495. Forthcoming

    Emerging market MNEs' expatriate Management

    Rui, H. & Zhang, M., 16 Mar 2016, (Accepted/In press) Academy of International Business 2016 conference proceeding. AIB

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  496. E-pub ahead of print

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N. & Markantonakis, K., 21 Jun 2018, 11th IFIP International Conference on Information Security Theory and Practice (WISTP'17). Springer, p. 75-92 18 p. (Lecture Notes in Computer Science; vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  497. Published

    EMNCs' Knowledge Transfer in Emerging Markets

    Rui, H., Zhang, M. & Shipman, A., 2016, Proceedings of the 58th Annual Meeting of the Academy of International Business . AIB

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  498. Published

    Emotions, Satisfaction, and Place Attachment: A Structural Model

    Prayag, G., Van Der Veen, R., Huang, S. & Hosany, S., 2015, 3rd World Research Summit for Tourism and Hospitality and 1st USA-China Tourism Research Summit, Orlando, USA, December 15-19.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  499. Published

    Emperor Manuel II Palaeologus’ Unpublished Treatise ‘On the Procession of the Holy Spirit’

    Dendrinos, C., 2006, Proceedings of the 21st International Congress of Byzantine Studies, London 21-26 August 2006. Jeffreys, E., Haarer, F. & Gilliland, J. (eds.). Aldershot: Ashgate, Vol. 3. p. 124-125

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  500. Unpublished

    Employee autonomy and management control in the quality organization

    Rees, C., Mar 1996, (Unpublished) 14th International Labour Process Conference (ILPC). Aston.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  501. Unpublished

    Employee perceptions of quality management: making sense of the paradox

    Rees, C., Jul 1996, (Unpublished) British Universities Industrial Relations Association (BUIRA) 46th Annual Conference. Bradford.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution