Home > Publications

Publications

34501 - 35000 out of 38,128Page size: 500
  1. Conference contribution › Research
  2. Published

    Insect Fossils

    Elias, S., 1995, Stratigraphy and Paleoenvironments of Late Quaternary Valley Fills on the Southern High Plains. Holliday, V. T. (ed.). Boulder, Colorado: Geological Society of America, Vol. Memoir 186. p. 50-53.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Insect fossils and Late Quaternary environments of the Chihuahuan Desert.

    Elias, S., 1999, Fourth Symposium on Resources of the Chihuahuan Desert. Barlow, J. C. & Miller, D. J. (eds.). Fort Davis, Texas: Chihuahuan Desert Research Institute, p. 1-10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Insights into the metabolism and ecophysiology of three acidithiobacilli by comparative genome analysis

    Valdes, J., Pedroso, I., Quatrini, R., Hallberg, K. B., Valenzuela, P. D. T. & Holmes, D. S., 2007, BIOHYDROMETALLURY: FROM THE SINGLE CELL TO THE ENVIRONMENT. Schippers, A., Sand, W., Glombitza, F. & Willscher, S. (eds.). STAFA-ZURICH: TRANS TECH PUBLICATIONS LTD, p. 439-442 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Installing fake root keys in a PC

    Alsaid, A. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, Vol. 3545. p. 227-239 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Institutional approaches and strategies of control and collaboration

    Kromidha, E., 2015, Proceedings of IFIP 9.4: 13th Conference on Social Implications of Computers in Developing Countries, 20-22 May 2015. Negombo, Sri Lanka

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Institutions for Behaviour Specification

    Fiadeiro, J. L. & Costa, J. F., 1995, COMPASS/ADT. Springer, Vol. 906. p. 273-289 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Institutions trust institutions: critiques of the BP/Tate partnership by artists

    Chong, D., 2011, 37th Annual Macromarketing Conference (Williamsburg, VA: College of William and Mary).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Instructors as Designated Leaders for Fostering Online Engagement: The Case of Online Learning Communities

    Wallace, A. & Panteli, N., 2016, Mediterranean Conference on Information Systems, MCIS2016: Track: E-learning. September 4-6, 2016, Paphos, Cyprus

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Integrated Simulation Tools for Collimation Cleaning in HL-LHC

    CERN Collimation Team, Gibson, S. & Nevay, L., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 160-162 3 p. MOPRO039

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Integrating OAuth with Information Card Systems

    Al-Sinani, H. S., 2011, Proceedings of IAS '11: 7th International Conference on Information Assurance and Security, Malacca, Malaysia, 5-8 December 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Interactions between insects and mycorrhizal fungi

    Gange, A. & Bower, E., 1997, MULTITROPHIC INTERACTIONS IN TERRESTRIAL SYSTEMS. OXFORD: BLACKWELL SCIENCE PUBL, p. 115-132 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    INTERACTIONS BETWEEN SOIL-DWELLING INSECTS AND MYCORRHIZAS DURING EARLY PLANT SUCCESSION

    Gange, A. & BROWN, V. K., 1992, MYCORRHIZAS IN ECOSYSTEMS. WALLINGFORD: C A B INTERNATIONAL, p. 177-182 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments

    Lunden, N., Sveen, R., Lund, H., Svendsen, N. & Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 171-183

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Interconnecting formalisms: Supporting modularity, reuse and incrementality

    Fiadeiro, J. L. & Maibaum, T., 1 Jan 1995, Proceedings of the Third ACM SIGSOFT Symposium on Foundations of Software Engineering. ACM Press, p. 72-80 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Interconnecting objects via contracts

    Fiadeiro, J. L. & Andrade, L. F., 1 Jan 2001, 38th International Conference on Technology of Object-Oriented Languages and Systems, Components for Mobile Computing. p. 182 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Interconnecting Objects Via Contracts

    Andrade, L. F. & Fiadeiro, J. L., 1999, UML. Springer, Vol. 1723. p. 566-583 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Inter-Continental Strategy Implementation

    Aboutalebi, R., Tan, H. & Lobo, R., 27 Nov 2013, In: EAMSA (Euro-Asia Management Studies Association), 30th Annual Conference of EAMSA: Innovation in Asia and Europe Approaches and Answers to new Challenges. Institute of East Asian Studies (IN-EAST); 27-30 November 2013, University of Duisburg-Essen, Duisburg, Germany.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Inter-domain role mapping and least privilege

    Chen, L. & Crampton, J., 2007, Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 157-162 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    International Manufacturing Strategies: A Taxonomy

    Aboutalebi, R., 6 Sep 2016, In: BAM (British Academy of Management), 30th Annual Conference of BAM: Thriving in Turbulent Time. 06-08 September 2016, Newcastle University, England, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Internet background radiation arrival density and network telescope sampling strategies

    Pemberton, D., Komisarczuk, P. & Welch, I., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 246-252 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Internet Sensor Grid: Experiences with Passive and Active Instruments

    Komisarczuk, P. & Welch, I., 2010, Communications: Wireless in Developing Countries and Networks of the Future - Third IFIP TC 6 International Conference, WCITD 2010 and IFIP TC 6 International Conference, NF 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings. p. 132-145 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Internet Users' Security and Privacy While They Interact with Amazon

    Bella, G. & Coles-Kemp, L., 2011, Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, p. 878-883 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Interoperability of security and quality of Service Policies Over Tactical SOA

    Gkioulos, V., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J. & Wolthusen, S., 13 Feb 2017, Proceedings of the 2016 Symposium on Computational Intelligence (SSCI 2016) . p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Interorganisational information sharing and the use of category management

    Feldberg, F. & van der Heijden, H., 2003, Proceedings of the 16th Bled Electronic Commerce conference. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. E-pub ahead of print

    Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

    Crampton, J. & Sellwood, J., 2 Jul 2016, Data and Applications Security and Privacy XXX. Springer-Verlag, Vol. 9766. p. 96-105 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Unpublished

    Inter-temporal variation in the illiquidity premium and its relationship with monetary conditions within the United Kingdom market

    Said, H. & Giouvris, E., 2015, (Unpublished) Banking, Financial markets, risk and financial vulnerability, 5th International Conference of the Financial Engineering and Banking Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Intriguing Properties of Adversarial ML Attacks in the Problem Space

    Pierazzi, F., Pendlebury, F., Cortellazzi, J. & Cavallaro, L., Mar 2020, IEEE Symposium on Security and Privacy. p. 1308-1325 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Intrinsic circuit evolution using programmable analogue arrays

    Flockton, S. J. & Sheehan, K., 1998, EVOLVABLE SYSTEMS: FROM BIOLOGY TO HARDWARE. Sipper, M., Mange, D. & PerezUribe, A. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-153 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Introducing probabilities in contract-based approaches for mobile application security

    Dini, G., Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer-Verlag, Vol. 8247 LNCS. p. 284-299 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. E-pub ahead of print

    Intrusion Detection in Robotic Swarms

    Sargeant, I. & Tomlinson, A., 24 Aug 2019, Proceedings of SAI Intelligent Systems Conference. Bi, Y., Bhatia, R. & Kapoor, S. (eds.). Springer, Vol. 2. p. 968-980 13 p. (Advances in Intelligent Systems and Computing; vol. 1038).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Intuiting Form: Memory and (Dis)continuity in Enescu's Piano Quintet, Op. 29

    Savage-Hanford, J., 2017, Proceedings of the "George Enescu" International Musicology Symposium 2017. Cosma, M. (ed.). Bucharest: Editura Muzicala

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Invariant statistics and coding of natural microimages

    Geman, D. & Koloydenko, A., 1999, IEEE Workshop on Statistical and Computational Theories of Vision.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Invariants of Finite Groups and Involutive Division

    Cid, C. & Plesken, W., 2001, Computer Algebra in Scientific Computing CASC 2001. Springer, p. 123-135 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Investigating Outward FDI by Indian MNEs in the UK

    Aboutalebi, R. & Tan, H., 29 Mar 2012, In: AIB (Academy of International Business), 39th Academy of International Business: New Global Developments and the Changing Geography of International Business. 29-31 March 2012, the University of Liverpool, Liverpool, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. E-pub ahead of print

    Investigating the Applicability of Distributed Ledger/Blockchain Technology in Manufacturing and Perishable Goods Supply Chains

    Coronado Mondragon, A., Coronado, C. & Coronado, E., 16 May 2019, 2019 IEEE 6th International Conference on Industrial Engineering and Applications (ICIEA). Tokyo, Japan: IEEE Xplore, p. 728-732 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM

    Wetherall, J., Taylor, M. & Hurley-Smith, D., 2 Nov 2015, 2015 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, p. 81-84 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Investigation of CLIC 380 GeV Post-Collision Line

    Bodenstein, R., Abramov, A., Boogert, S., Burrows, P., Nevay, L., Schulte, D. & Tomás, R., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 528-531 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Investigation of the fatigue failure mechanisms for stitched and unstitched unidirectional composites

    Zhang, C., Jamshidi, M., Barnes, S., Cauchi-Savona, S., Rouse, J., Bradley, R., Withers, P. & Hogg, P., 1 Dec 2011, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Unpublished

    Investment styles and the potential of using illiquidity as an investment style in United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Banking, Finance and Institutions: Stability and Risk, 6th International Conference of the Financial Engineering and Banking Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    IP access service provision for broadband customers

    Komisarczuk, P., 1999, Services Over the Internet-What Does Quality Cost?(Ref. No. 1999/099), IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Iron homeostasis strategies in acidophilic iron oxidizers: Comparative genomic analyses

    Quatrini, R., Martinez, V., Osorio, H., Veloso, F. A., Pedroso, I., Valdes, J., Jedlicki, E. & Holmes, D. S., 2007, BIOHYDROMETALLURY: FROM THE SINGLE CELL TO THE ENVIRONMENT. Schippers, A., Sand, W., Glombitza, F. & Willscher, S. (eds.). STAFA-ZURICH: TRANS TECH PUBLICATIONS LTD, p. 531-534 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Is entity authentication necessary?

    Mitchell, C. J. & Pagliusi, P., 2004, Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19 2002, Revised Papers. Springer-Verlag, Vol. 2004. p. 20-33 14 p. (Lecture Notes in Computer Science; vol. 2845).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Unpublished

    Is Islam still the Solution? Clerical Elites and Muslim Extremism in Post Arab- Spring Middle East: Panel on Extremism in Post-Arab Spring MENA: Origins and Catalysts for the Rise of Extremist Movements

    Kalantari, M., 4 Mar 2015, (Unpublished) Royal Holloway University of London Politics and International Relations Department’s 10th Anniversary Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Unpublished

    Is social inclusion the same for all? Critical Internet use as a tool to attend individual needs in Brazil

    Poveda Villalba, S., 2013, (Unpublished) Is social inclusion the same for all? Critical Internet use as a tool to attend individual needs in Brazil. Human Development and Capability Association (HDCA)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Island Grammar-Based Parsing Using GLL and Tom

    Afroozeh, A., Bach, J-C., van den Brand, M., Johnstone, A., Manders, M., Moreau, P-E. & Scott, E., 2013, Software Language Engineering Lecture Notes in Computer Science : 5th International Conference, SLE 2012, Dresden, Germany, September 26-28, 2012, Revised Selected Papers. p. 224-243 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Issues of Security with the Oswald-Aigner Exponentiation Algorithm

    Walter, C. D., 2004, CT-RSA 2004. Okamoto, T. (ed.). Springer, Vol. 2964. p. 208-221 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    IT Enactment of New Public Management in Africa: The Case Study of Health Information Systems in Kenya

    Bernardi, R., 2009, Proceedings of the 9th European Conference on e-Government. Remenyi, D. (ed.). Reading: Academic Publishing Ltd, p. 129-136

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Italianisierte Formen in 'Les Troyens'

    Charlton, D., 2011, Berlioz' 'Troyens' und Halévys 'Juive' im Spiegel der Grand Opéra. Stuttgart: Franz Steiner Verlag, p. 83-96 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    IT-enabled change into the structures of Health Information Systems in Africa: a case study in Kenya

    Bernardi, R., 2009, ECIS09 Proceedings. Newell, S., Whitley, E., Pouloudi, N., Wareham, J. & Mathiassen, L. (eds.). Padova: CLEUP

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    ITS and Smart Grid Networks for Increasing Live Shellfish Value

    Coronado Mondragon, A. E. & Coronado, E. S., 16 Jun 2014, 10th ITS European Congress. Helsinki, 9 p. TP0115

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Jakstab: A Static Analysis Platform for Binaries

    Kinder, J. & Veith, H., 2008, Proc. 20th Int. Conf. Computer Aided Verification (CAV 2008). Springer, p. 423-427

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Jean de La Taille et la scénographie du "creux": Saül le furieux (1572)

    Chesters, T., 2005, Dramaturgies de l'ombre: spectres et fantômes au théâtre. Lavocat, F. & Lecercle, F. (eds.). Presses Universitaires de Rennes, p. 101-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Johann Friedrich Fasch’s Mich vom Stricke meiner Sünden – a work for Zerbst?

    Springthorpe, N., 2007, Johann Friedrich Fasch als Instrumentalkomponist: Bericht über die Internationale Wissenshaftliche Konferenz am 8. und 9. April 2005 im Rahmen der 9. International Fasch-Festtage in Zerbst.: Schriften zur mitteldeutschen Musikgeschichte der Ständigen Konferenz Mitteldeutsche Barockmusik in Sachsen, Sachsen-Anhalt und Thüringen e.V. Band 14. Musketa, K. (ed.). Beeskow: Ortus Musikverlag, Vol. 14. p. 207-224 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Joining the dots: exploring technical and social issues in e-Science approaches to linking landscape and artifactual data in British archaeology

    Gosden, C., Kamash, Z., Kirkham, R. & Pybus, J., 2009, E-science workshops 2009: 5th IEEE International Conference. p. 171-174

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Joyce In The Shadow Of War And Fascism: A Review Of Finnegans Wake By Mario Praz (1939)

    Fordham, F., 2017, Joyce Studies in Italy. Ruggieri, F. (ed.). Rome, Vol. 19. p. 301-322 22 p. (Joyce Studies in italy; vol. 19).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    k-Distinct In- and Out-Branchings in Digraphs

    Gutin, G., Reidl, F. & Wahlstrom, M., 2017, 44th International Colloquium on Automata, Languages, and Programming: ICALP 2017. Dagstuhl, p. 1-13 13 p. (Leibniz International Proceedings in Informatics ; vol. 80).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Kernelization of Constraint Satisfaction Problems: A Study through Universal Algebra

    Lagerkvist, V. & Wahlstrom, M., 2017, Principles and Practice of Constraint Programming: 23rd International Conference, CP 2017, Melbourne, VIC, Australia, August 28 – September 1, 2017, Proceedings. Springer, p. 157-171 15 p. (Lecture Notes in Computer Science; vol. 10416).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Key distribution without individual trusted authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, Proceedings: The 8th IEEE Computer Security Foundations Workshop, Kenmare, Co. Kerry, Ireland, June 1995. IEEE Computer Society Press, p. 30-36 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Key escrow in multiple domains

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of INFOSEC'COM '97, Paris, June 1997. p. 101-116 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Key escrow in mutually mistrusting domains

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1997, Security Protocols - Proceedings, International Workshop, Cambridge, April 1996. Lomas, M. (ed.). Springer-Verlag, p. 139-153 15 p. (Lecture Notes in Computer Science; no. 1189).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Key Management for Secure Demand Data Communication in Constrained Micro-Grids

    Kayem, A. V. D. M., Strauss, H., Wolthusen, S. & Meinel, C., 2016, Advanced Information Networking and Applications Workshops (WAINA), 2016 30th International Conference on. IEEE Press, p. 585-590 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Key minimal authentication systems for unconditional secrecy

    Godlewski, P. & Mitchell, C. J., 1990, Advances in Cryptology - Eurocrypt '89. Quisquater, J-J. & Vandewalle, J. (eds.). Springer-Verlag, p. 497-501 5 p. (Lecture Notes in Computer Science; no. 434).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Key recovery and forgery attacks on the MacDES MAC algorithm

    Coppersmith, D., Knudsen, L. R. & Mitchell, C. J., 2000, Advances in Cryptology - Proceedings of Crypto 2000. Bellare, M. (ed.). Springer-Verlag, p. 184-196 13 p. (Lecture Notes in Computer Science; no. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Key recovery attacks on MACs based on properties of cryptographic APIs

    Brincat, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 63-72 10 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Key recovery for archived data using smart cards

    Rantos, K. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 75-85 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Key recovery in ASPeCT authentication and initialisation of payment protocol

    Rantos, K. & Mitchell, C. J., 1999, Proceedings of the 4th ACTS Mobile Communications Summit, Sorrento, Italy, June 1999. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Key recovery scheme interoperability - a protocol for mechanism negotiation

    Rantos, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Key Rotation for Authenticated Encryption

    Everspaugh, A., Paterson, K., Ristenpart, T. & Scott, S., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Springer-Verlag, Vol. 10403. p. 98-129 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10403 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Knowledge Intensive R&D? Employment Practices of Foreign invested R&D Centres in China

    Zheng, Y., Mar 2013, International Labour Process Conference, Rutgers University, NJ, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Knowledge management orientation, product innovation and shared vision: an integration and empirical examination of performance effects

    Wang, C. L., Ahmed, P. K. & Rafiq, M., 2007, British Academy of Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Knowledge management orientation, shared vision, and product innovation: An integration and empirical examination of performance effects

    Wang, C. L., Ahmed, P. K. & Rafiq, M., 2008, Academy of Management Annual Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Knowledge Management System’s Characteristics that facilitate Knowledge Sharing to Support Decision Making Processes in Multinational Corporations

    Abdelrahman, M. & Papamichail, K., 2011, 17th Americas Conference on Information Systems AMCIS. Detroit, Michigan, USA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Knowledge Sharing to Support Decision Making Processes in Multinational Corporations

    Abdelrahman, M. & Papamichail, K., 2013, 26th European Conference on Operational Research. Rome, Italy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Knowledge, learning and transformation in transnational sites: relationship asymmetry, politics and institution building

    Clark, E., 2005, The end of transformation?. Lang, R. (ed.). Munich: Rainer Hampp Verlag, p. 281-304 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Kolmogorov's complexity conception of probability

    Vovk, V., 2001, Probability Theory: Philosophy, Recent History and Relations to Science. Dordrecht: Kluwer, p. 51-69 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    La comédie lyrique au temps de Diderot

    Charlton, D., 2016, Music et pantomime dans 'Le Neveu de Rameau'. Salaün, F. & Taïeb, P. (eds.). Paris: Hermann Editeurs, p. 50-77 28 p. (Fictions pensantes).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    La penna e il pennello. Retoriche a confronto

    Jossa, S., Hendrix, H. (ed.) & Procaccioli, P. (ed.), 2008, Officine del nuovo. Sodalizi fra letterati, artisti ed editori nella cultura italiana fra Riforma e Controriforma. Atti del Simposio internazionale, Utrecht, 8-10 novembre 2007. Roma: Vecchiarelli

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    La Rencontre de l'ancien et du nouveau dans 'La Fille mal gardée' de Duni et Favart.

    Charlton, D., 2015, Rire et sourire dans l'opéra-comique en France aux XVIIIe et XIXe siècles.. Loriot, C., Cailliez, M. & Bonche, V. (eds.). Lyon: Symétrie, p. 33-51 19 p. (Symétrie Recherche).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    La Vérité se rencontre-t-elle au train de la contingence?

    O'Brien, J., 2011, Les Chapitres oublis des 'Essais' de Montaigne. Paris: Champion, p. 93-106 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Unpublished

    Labour unions and CSR: initial results from a cross-European research project

    Preuss, L., Rees, C. & Gold, M., Jun 2013, (Unpublished) International Association for Business and Society (IABS) Annual Meeting. Portland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Labour-management partnership in the non-union retail sector

    Badigannavar, V. & Kelly, J., 2003, 21st International Labour Process Conference, Bristol Business School, UWE.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Languages as Hyperplanes: grammatical inference with string kernels

    Clark, A., Costa Florêncio, C. & Watkins, C., 2006, Proceedings of ECML. p. 90-101

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Large Modulus Ring-LWE > Module-LWE

    Albrecht, M. & Deo, A., 2017, Advances in Cryptology - ASIACRYPT 2017. p. 267-296 30 p. (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Large sediment accumulations and major subsidence offshore; rapid uplift on land: Consequences of extension of Gorontalo Bay and northern Sulawesi

    Hennig, J., Hall, R., Advokaat, E. & Rudyawan, A., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-304 1-16

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Large-scale probabilistic predictors with and without guarantees of validity

    Vovk, V., Petej, I. & Fedorova, V., 7 Dec 2015, Advances in Neural Information Processing Systems 28: Proceedings of NIPS 2015. Curran Associates, p. 892-900 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Laser induced fluorescence detection of metastable He-2 molecules in superfluid helium

    Rellergert, W. G., Lippincott, W. H., Nikkel, J. A. & McKinsey, D. N., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 382-383 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Laser Sculpted Cool Proton Beams

    Gibson, S., Alden, S. & Nevay, L., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 1-4 4 p. MOPRB116

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Laserwire Emittance Scanner at CERN Linac 4

    Kruchinin, K., Boorman, G., Bosco, A., Gibson, S., Karataev, P., Bravin, E., Hofmann, T., Raich, U., Roncarolo, F., Letchford, A. & Pozimski, J., Jun 2015, 6th International Particle Accelerator Conference: IPAC2015, Richmond, VA, USA. JACoW Publishing, p. 1146-1149 4 p. MOPWI003

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Late Pleistocene Beetle Records from North America

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 222-236

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Late Pleistocene Glacial Events in Beringia

    Elias, S. & Brigham-Grette, J., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 2. p. 1057-1066

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Late Pleistocene Megafaunal Extinctions.

    Elias, S. & Schreve, D., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 4. p. 3202-3217

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Late Triassic – Mid-Jurassic to Neogene Extensional Fault Systems in the Exmouth Sub-Basin, Northern Carnarvon Basin, North West Shelf, Western Australia

    Jitmahantakul, S. & McClay, K., 31 Aug 2013, Proceedings Western Australian Basins Conference. 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Layered Analysis of Security Ceremonies

    Bella, G. & Coles-Kemp, L., 2012, Information Security and Privacy Research: IFIP Advances in Information and Communication Technology. Boston: Springer, Vol. 376. p. 273-286 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    LDT: a language definition technique

    Johnstone, A., Scott, E. & van den Brand, M., 26 Mar 2011, LDTA '11 Proceedings of the Eleventh Workshop on Language Descriptions, Tools and Applications. ACM, p. 1-8 8 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Le comte de Clermont et les intermèdes italiens vers 1752

    Charlton, D., 2005, Les Théâtres de société au XVIIIe siècle. Plagnol-Diéval, M-E. & Quéro, D. (eds.). Brussels: Éditions de l'Université de Bruxelles, p. 63-74 12 p. (Études sur le 18e siècle; vol. 33).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Forthcoming

    Le corps en jeu: Debussy et l’art de toucher

    Johnson, J., 2018, (Accepted/In press) Le corps dans l'écriture musicale. Delaplace, J. & Olive, J. P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Le Matériel musical de l'opéra-comique

    Charlton, D., 2010, L'Invention des genres lyriques français et leur redécouverte au XIXe siècle. Terrier, A. & Dratwicki, A. (eds.). Lyon: Symétrie, p. 239-56 17 p. (Perpetuum mobile).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Leadership Behavior Adjustment and Leader Effectiveness

    Tsai, C-J. & Qiao, K., 2017, European Academy of Management Annual Conference (EURAM), Glasgow, Scotland, UK, 21-24 June..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Leading strategies in competitive on-line prediction

    Vovk, V., 2006, Proceedings of the Seventeenth International Conference on Algorithmic Learning Theory. Balcazar, J., Long, P. M. & Stephan, F. (eds.). p. 214-228 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Leading Structurally Dynamic Virtual Project Teams

    Chamakiotis, P. & Panteli, N., 2016, Proceedings of the 37th International Conference on Information Systems (ICIS): Digital Innovation at the Crossroads: Track 20: Social Media and Digital Collaboration. December 11-14, Dublin, Ireland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Lean e-integration for development: The case of the National Licensing Center in Albania

    Kromidha, E., 2013, Proceedings of the ICTD 2013 Conference, 7-10 December 2013. Cape Town, South Africa

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    Learning an optimal decision strategy in an in uence diagram with latent variables

    Vovk, V., 1996, Proceedings of the Ninth Annual Conference on Computational Learning Theory. New York: ACM Press, p. 110-121 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Published

    Learning by Conformal Predictors with Additional Information

    Yang, M., Nouretdinov, I. & Luo, Z., Oct 2013, The 9th Artificial Intelligence Applications and Innovations Conference (AIAI): 2nd Workshop on Conformal Prediction and its Applications. p. 394-400 7 p. (IFIP Advances in Information and Communication Technology; vol. 412).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  105. Published

    Learning by transduction

    Gammerman, A., Vapnik, V. & Vovk, V., 1998, Proceedings of the Fourteenth Conference on Uncertainty in Articial Intelligence. San Francisco, CA: Morgan Kaufmann, p. 148-156 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. Published

    Learning Context Free Grammars with the Syntactic Concept Lattice

    Clark, A., 1 Sep 2010, Grammatical Inference: Theoretical Results and Applications. Sempere, J. & Garcia, P. (eds.). Springer-Verlag, Vol. 6339. p. 38-51 (Lecture Notes in Computer Science; vol. 6339).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  107. Published

    Learning Eigenvectors for Free

    Koolen, W. M., Kotlowski, W. & Warmuth, M. K., 1 Dec 2011, Proceedings of the 25th Annual Conference on Neural Information Processing Systems (NIPS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  108. Forthcoming

    Learning interpretable disease self-representations for drug repositioning

    Galeano Galeano, D., Frasca, F., Gonzalez, G., Lapanogov, I., Veselkov, K., Paccanaro, A. & Bronstein, M. M., 2019, (Accepted/In press) Conference on Neural Information Processing Systems (NeurIPS) 2019: Graph representation Learning Workshop .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    Learning mechanisms for achieving context awareness and intelligence in Cognitive Radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, IEEE 36th Conference on Local Computer Networks, LCN 2011, Bonn, Germany, October 4-7, 2011. p. 738-745 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  110. Published

    Learning Morphology with Pair Hidden Markov Models

    Clark, A., 1 Jul 2001, Proceedings of the Association for Computational Linguistics: Student Session. p. 55-60

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  111. Published

    Learning nominal automata

    Moerman, J., Sammartino, M., Silva, A., Klin, B. & Szynwe, M., Jan 2017, POPL 2017 - Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages. Gordon, A. D. & Castagna, G. (eds.). Association for Computing Machinery (ACM), p. 613-625 13 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  112. Published

    Learning the Past

    Charlton, D., 2003, Berlioz, Past, Present, Future: Bicentenary Essays. Bloom, P. (ed.). Rochester, NY: University of Rochester Press, p. 34-56 23 p. (Eastman Studies in Music).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  113. Published

    Les instruments à vent: Les sons et les gestes

    Charlton, D., 1991, Le Tambour et la harpe: Oeuvres, pratiques et manifestations musicales sous la Révolution, 1788-1800. Julien, J-R. & Mongrédien, J. (eds.). Paris: Éditions Du May, p. 209-20 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  114. Published

    Les Prolongements romanesques de la matière épique

    Everson, J., 2008, Acts of the XVIIth conference of the international Société Rencesvals, University of Connecticut, July 2006: Olifant special issue. Vol. 2 vols.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  115. Published

    Less harm, less worry or how to improve network security by bounding system offensiveness

    Bruschi, D., Cavallaro, L. & Rosti, E., 2000, 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  116. Published

    Let’s Get Mobile: Secure FOTA for Automotive System

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 6 Nov 2015, Network and System Security. Springer, Vol. 9408. p. 503-510 8 p. (Lecture Notes in Computer Science; vol. 9408).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  117. Unpublished

    Let’s talk about our ways of seeing the world. Exploring more explicit ways to study media representations in Critical Geopolitics

    Van Efferink, L., 2013, (Unpublished) Warwick Graduate Conference in Political Geography,Department of Politics and International Studies (PAIS),University of Warwick.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  118. Published

    Letting Go: Working with the Rhythm of Participants

    Coles-Kemp, L., Angus, A. & Stang, F., 2013, CHI '13 Extended Abstracts on Human Factors in Computing Systems. 2013: ACM, p. 373-378 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  119. Published

    Leveraging probabilistic reasoning in deterministic planning for large-scale autonomous Search-and-Tracking

    Bernardini, S., Fox, M., Long, D. & Piacentini, C., 12 Jun 2016, Proceedings of the Twenty Sixth International Conference on Automated Planning and Scheduling (ICAPS- 16) . p. 47-55 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  120. Published

    LHC Collimation and Energy Deposition Studies Using Beam Delivery Simulation (BDSIM)

    Nevay, L., Boogert, S., Garcia Morales, H., Gibson, S., Kwee-Hinzmann, R., Bruce, R. & Redaelli, S., Jun 2016, 7th International Particle Accelerator Conference: May 8-13, 2016, Busan, Korea. JACoW Publishing, p. 1-3 3 p. WEPOY047

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  121. Published

    LibSEAL: revealing service integrity violations using trusted execution

    Aublin, P-L., Kelbert, F., O'Keeffe, D., Muthukumaran, D., Priebe, C., Lind, J., Krahn, R., Fetzer, C., Eyers, D. M. & Pietzuch, P. R., 23 Apr 2018, Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, April 23-26, 2018. p. 1-15 15 p. 24

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  122. Published

    Lightweight Classification of IoT Malware Based on Image Recognition

    Su, J., Vasconcellos Vargas, D., Prasad, S., Sgandurra, D., Feng, Y. & Sakurai, K., 2018, 8th IEEE International Workshop on Network Technologies for Security, Administration, and Protection (NETSAP 2018). IEEE Xplore, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  123. Published

    Limitations of IEC62351-3's public key management

    Wright, J. & Wolthusen, S., 19 Dec 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  124. Published

    Limits to anonymity when using credentials

    Pashalidis, A. & Mitchell, C. J., 2006, Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004, Revised Selected Papers. Springer-Verlag, Vol. 3957. p. 4-12 9 p. (Lecture Notes in Computer Science; vol. 3957).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  125. Published

    Linear Depth Integer-Wise Homomorphic Division

    Okada, H., Cid, C., Hidano, S. & Kiyomoto, S., 2019, Information Security Theory and Practice. WISTP 2018. Springer, p. 91-106 16 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  126. Published

    Linear Probability Forecasting

    Zhdanov, F. & Kalnishkan, Y., 2010, Artificial Intelligence Applications and Innovations, AIAI 2010, Proceedings: vol 339 of IFIP Advances in Information and Communication Technology. Springer, p. 4-11 (IFIP Advances in Information and Communication Technology; vol. 339).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  127. Published

    Linear Relations between Square-Loss and Kolmogorov Complexity

    Kalnishkan, Y., 1999, of the Twelfth Annual Conference on Computation Learning Theory. ACM, p. 226-232

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  128. Published

    Linearly Ordered Attribute Grammar Scheduling Using SAT-Solving

    van Binsbergen, L. T., 1 Jan 2015, Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin / Heidelberg, p. 289-303 15 p. (Lecture Notes in Computer Science; vol. 9035).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  129. Published

    Linguistic categories in mathematical vernacular and their type-theoretic semantics (extended abstract)

    Luo, Z. & Callaghan, P., 1997, Logical Aspects of Computational Linguistics 97 (LACL'97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  130. Forthcoming

    Linguistic tremours: Language diversity as a fault line in intercultural virtual teams

    Drabble, D., 2016, (Accepted/In press) THE 10th MEDITERRANEAN CONFERENCE ON INFORMATION SYSTEMS, MCIS 2016, PAPHOS, CYPRUS, SEPTEMBER 4-6, 2016. UNIVERSITY OF NICOSIA, P.O.Box 24005, 1700 ΛΕΥΚΩΣΙΑ, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  131. Published

    L'insegnamento della letteratura italiana come scuola di educazione civica

    Jossa, S., 2013, Fare il cittadino: La formazione di un nuovo soggetto sociale nell’Europa tra XIX e XXI secolo. Botteri, I., Riva, E. & Scotto di Luzio, A. (eds.). Rubbettino, p. 131-146 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  132. Published

    Liquid xenon for gamma-ray imaging of special nuclear materials

    Larsen, N. A. N. A., Bernard, E. P. E. P., Cahn, S. B. S. B., Edwards, B. W. H. B. W. H., Linck, E. E., Lyashenko, A. V. A. V., McKinsey, D. N. D. N., Nikkel, J. A. J. A., Rhyne, C. A. C. A., Shin, Y. Y., Tennyson, B. P. B. P., Wahl, C. G. C. G., Destefano, N. E. N. E., Gai, M. M. & De Silva, M. S. M. S., 1 Dec 2012, 2012 IEEE International Conference on Technologies for Homeland Security, HST 2012. p. 378-383 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  133. Published

    LISABETH: Automated Content-based Signatures Generator for Zero-day Polymorphic Worms

    Cavallaro, L., Lanzi, A., Mayer, L. & Monga, M., 2008, International Workshop on Software Engineering for Secure Systems (SESS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  134. Published

    Live and Trustworthy Forensic Analysis of Commodity Production Systems

    Martignoni, L., Fattori, A., Paleari, R. & Cavallaro, L., 15 Sep 2010, Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010: Proceedings. Springer, p. 297-316 (Lecture Notes in Computer Science; vol. 6307).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  135. Published

    Location Based Application Availability

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2009, On the Move to Meaningful Internet Systems: OTM 2009 Workshops. Meersman, R., Herrero, P. & Dillon, T. (eds.). Vilamoura, Portugal: Springer, Vol. 5872/2009. p. 128 - 138 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  136. Published

    Location Tracking Using Smartphone Accelerometer and Magnetometer Traces

    Nguyen, D. K. A., Akram, R. N., Markantonakis, K., Luo, Z. & Watkins, C., 26 Aug 2019, The First Location Privacy Workshop (LPW 2019), the 14th International Conference on Availability, Reliability and Security (ARES 2019). Association for Computing Machinery (ACM), p. 1-9 9 p. 96

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  137. Published

    Log Your Car: The Non-invasive Vehicle Forensics

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 974-982 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  138. Published

    Log Your Car: Reliable Maintenance Services Record

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 2017, Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Springer, Vol. 10143. p. 484-504 21 p. (Lecture Notes in Computer Science ; vol. 10143).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  139. Published

    Logical Lego? Co-constructed perspectives on service design

    Heath, C., Coles-Kemp, L. & Hall, P., 2014, Proceedings of NordDesign 2014. Aalto Design Factory, p. 416 425 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  140. E-pub ahead of print

    Logical Support for Bike-Sharing System Design

    Tutu, I., Chirita, C-E., Lopes, A. & Fiadeiro, J. L., 9 Oct 2019, From Software Engineering to Formal Methods and Tools, and Back. ter Beek, M. H., Fantechi, A. & Semini, L. (eds.). Springer, p. 152-171 20 p. (Lecture Notes In Computer Science; vol. 11865).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  141. Published

    Logical truths in constructive type theory (abstract)

    Luo, Z., 1996, Logic Colloquium 96.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  142. E-pub ahead of print

    Logics for Actor Networks: A Case Study in Constrained Hybridization

    Lopes Fiadeiro, J., Tutu, I., Lopes, A. & Pavlovic, D., 3 Jan 2018, Dynamic Logic. New Trends and Applications: First International Workshop, DALI 2017, Brasilia, Brazil, September 23-24, 2017, Proceedings. Springer, p. 98-114 17 p. (Lecture Notes in Computer Science; vol. 10669).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  143. Published

    Longer Keys May Facilitate Side Channel Attacks

    Walter, C. D., 2003, Selected Areas in Cryptography. Matsui, M. & Zuccherato, R. J. (eds.). Springer, Vol. 3006. p. 42-57 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  144. Published

    Longer Randomly Blinded RSA Keys may be Weaker than Shorter Ones

    Walter, C. D., 2008, WISA 2007. Kim, S., Yung, M. & Lee, H-W. (eds.). Springer, Vol. 4867. p. 303-316 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  145. Forthcoming

    Longing to Belong: Nationalism and Sentimentalism in the Second Violin Concertos of Bartók and Szymanowski

    Downes, S., 1 Mar 2020, (Accepted/In press) Polski Rocznik Muzykologiczny. Lindstedt, I. (ed.). Musicologists Section of the Polish Composers' Union/ PWM Edition

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  146. Published

    Longitudinal Beam Profile Measurements at CTF3 Using Coherent Diffraction Radiation

    Micheler, M., Blair, G., Boorman, G., Karataev, P., Corsini, R. & Lefevre, T., 2009, Proceedings of PAC09, Vancouver, BC, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  147. Published

    LONGITUDINAL BEAM PROFILE MEASUREMENTS OF THE MICROBUNCHING INSTABILITY

    Shields, W., Karataev, P., Finn, A., Bartolini, R., Martin, I. P. S. & Rehm, G., Jul 2014, IPAC 2014 - The Fifth International Particle Accelerator Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  148. Published

    Longitudinal beam profile monitor at CTF3 based on Coherent Diffraction Radiation

    Micheler, M., Ainsworth, R., Blair, G., Boorman, G., Corsini, R., Lefevre, T. & Lekomtsev, K., 2010, Journal of Physics: Conference Series.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  149. Published

    Longitudinal beam profile monitor at CTF3 based on Coherent Diffraction Radiation

    Micheler, M., Ainsworth, R., Blair, G. A., Boorman, G., Corsini, R., Karataev, P., Lefevre, T. & Lekomtsev, K., 2010, VIII INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2009). Strikhanov, MN. & Pivovarov, YL. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  150. Published

    L'Orchestre et la métaphore du vivant de Mozart

    Charlton, D., 1997, Mozart: Les chemins de l'Europe. Massin, B. (ed.). Strasbourg: Editions du Conseil de l'Europe, p. 105-112 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  151. Published

    Loss functions, complexities, and the Legendre transformation

    Kalnishkan, Y., Vovk, V. & Vyugin, M. V., 2001, Proceedings of the Twelfth International Conference on Algorithmic Learning Theory. Abe, N., Khardon, R. & Zeugmann, T. (eds.). London: Springer, p. 181-189 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  152. Published

    L'Oubli comme mémoire: A propos de l'amitié politique

    O'Brien, J., 2012, Amitié et compagnie. Autour du 'Discours de la Servitude Volontaire' de La Boétie. Paris: Garnier, p. 95-111 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  153. Published

    LP-branching algorithms based on biased graphs

    Wahlström, M., 2017, Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, Vol. PRDA17. p. 1559-1570 12 p. (Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  154. Published

    Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS

    Albrecht, M. & Paterson, K., 28 Apr 2016, Advances in Cryptology – EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Vol. 9665. p. 622-643 22 p. (Lecture Notes in Computer Science; vol. 9665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  155. Published

    Lucky Thirteen: Breaking the TLS and DTLS Record Protocols

    Al Fardan, N. J. & Paterson, K. G., 2013, 2013 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, p. 526-540 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  156. Published

    Machine-learning applications of algorithmic randomness

    Vovk, V., Gammerman, A. & Saunders, C., 1999, Proceedings of the Sixteenth International Conference on Machine Learning. San Francisco, CA: Morgan Kaufmann, p. 444-453 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  157. Published

    Magnet: Practical Subscription Clustering for Internet-Scale Publish/Subscribe

    Girdzijauskas, S., Chockler, G., Vigfusson, Y., Melamed, R. & Tock, Y., Jul 2010, Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems (DEBS '10). Cambridge, UK: ACM, p. 172-183 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  158. Published

    Maintaining Concurrency Information for On-the-fly Data Race Detection

    Audenaert, K., D'Hollander, E. (ed.), Joubert, F. J. (ed.) & Trottenberg, F. (ed.), 1998, Parallel Computing: Fundamentals, Applications and New Directions. Bonn, p. 319-326 (Advances in Parallel Computing; vol. 12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  159. Published

    Making an entrance 2.0: The linguistics of introductory success in virtual communities

    Dove, J. A., Eubanks, D. L., Panteli, N., Watts, L. A. & Joinson, A. N., 2011, Proceedings of the Annual Hawaii International Conference on System Sciences. 5718716

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  160. Published

    Making Automated Testing of Cloud Applications an Integral Component of PaaS

    Bucur, S., Kinder, J. & Candea, G., Jul 2013, Proc. 4th Asia-Pacific Workshop on Systems (APSYS 2013). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  161. Published

    Making Home Away from Home: Social Relations and Food Consumption amongst Chinese Students in the UK

    Cappellini, B. & Yen, D. A., 2011, The New World: Macromarketing Yesterday, Today and Tomorrow. Proceedings of the 36thAnnual Macromarketing Conference. p. 227-239

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  162. Published

    Malicious False Data Injection in Hierarchical Electric Power Grid State Estimation Systems

    Feng, Y., Foglietta, C., Baiocco, A., Panzieri, S. & Wolthusen, S. D., 2013, Proceedings of the fourth international conference on Future energy systems (ACM e-Energy 2013). ACM Press, p. 183-192

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  163. Published

    Malicious MPLS Policy Engine Reconnaissance

    Almutairi, A. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014)}. Springer-Verlag, Vol. 8735. p. 3 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  164. In preparation

    MANAGEMENT CONTROL SYSTEMS AND RESEARCH MANAGEMENT IN UNIVERSITIES: an empirical and conceptual exploration.

    Agyemang, G. & Broadbent, J., 9 Jul 2013, (In preparation) MANAGEMENT CONTROL SYSTEMS AND RESEARCH MANAGEMENT IN UNIVERSITIES: an empirical and conceptual exploration.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  165. Published

    Management Control through Joint Activity: the role of managerial co-gravity

    Subramaniam, N., 2013, 9th International Management Control Research Conference, 4-6th September, 2013, Utrecht, Netherlands..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  166. Published

    Management of secure systems and security within Open Systems Interconnection (OSI)

    Mitchell, C. J., 1990, Proceedings of Information Security: Confidentiality, Integrity and Availability, London, July 1990. Uxbridge: UNICOM Seminars

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  167. Published

    Management system requirements for wireless systems beyond 3G

    Lazaro, O., Irvine, J., Girma, D., Dunlop, J., Liotta, A., Borselius, N. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 240-244 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  168. Unpublished

    Managerial perspectives on employee engagement

    Romanou, N., Soane, E., Truss, K., Alfes, K., Rees, C., Gatenby, M., Degleris, N., Mantelou, E., Solias, A. & Karamberi, M., Nov 2009, (Unpublished) 1st International Congress on Neurobiology and Clinical Psychopharmacology. Thessaloniki

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  169. Unpublished

    Managing a positive environment: engagement, wellbeing, performance and the role of meaningfulness

    Soane, E., Alfes, K., Gatenby, M., Rees, C. & Truss, K., Aug 2010, (Unpublished) Academy of Management (AoM) Annual Meeting. Montreal.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  170. Published

    Managing Evolution in Telecommunication Systems

    Koutsoukos, G., Gouveia, J., Andrade, L. F. & Fiadeiro, J. L., 2001, DAIS. Kluwer, Vol. 198. p. 133-140 8 p. (IFIP Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  171. Published

    Managing formality, size of firm and employee evaluation of work

    Storey, D., Saridakis, G., Sen Gupta, S., Edwards, P. & Blackburn, R., 2008, European Academy of Management (EURAM), Ljubljana, Slovenia.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  172. Published

    Managing Innovation in Perceived Low-Tech Industries: A Review of the Technology Management Practices of the Fish Processing Industry of Newfoundland and Labrador

    Coronado Mondragon, C. E. & Coronado Mondragon, A. E., 16 Jul 2012, Driving the Economy through Innovation and Entrepreneurship: Emerging Agenda for Technology Management. Balanchandra, P. (ed.). Bangalore: Springer, Vol. 1. p. 101-109 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  173. Published

    Manifest fields and module mechanisms in intensional type theory

    Luo, Z., 2009, Types for Proofs and Programs, Proc. of Inter. Conf. of TYPES'08. LNCS 5497. p. 237-255 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  174. E-pub ahead of print

    Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange

    Dowling, B., Hansen, T. B. & Paterson, K. G., 10 Apr 2020, Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Proceedings. Ding, J. & Tillich, J-P. (eds.). Springer, p. 483-502 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12100 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  175. Published

    Many-Valued Institutions for Constraint Specification

    Chirita, C-E., Luiz Fiadeiro, J. & Orejas, F., 2016, Fundamental Approaches to Software Engineering. Stevens, P. & Wasowski, A. (eds.). Berlin: Springer, Vol. 9633. p. 359-376 18 p. (Lecture Notes in Computer Science; vol. 9633).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  176. Published

    Market orientation as a mediating factor of the knowledge management and performance relationship

    Wang, C. L. & Ahmed, P. K., 2004, British Academy of Management Annual Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  177. Published

    Marketing thought and counterinsurgency: tracing the history of an overlooked relationship

    Chong, D., 2016, 41st Annual Macromarketing Conference (Dublin: Trinity College Dublin) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  178. Published

    Marking the 'Unmarked' Space: Gendered Vocal Construction in Female Electronic Artists

    McCarthy, R., Dec 2014, Proceedings of the 9th Conference on Interdisciplinary Musicology. Berlin, p. 33-38 6

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  179. Published

    Masterclass: Multisystemic Therapy as an intervention for complex needs

    Fox, S., 2014, European Forensic Child and Adolescent Psychiatrists, Psychologists and other disciplines: Royal College of Psychiatrists.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  180. Published

    Mathematical vernacular and conceptual well-formedness in mathematical language

    Luo, Z. & Callaghan, P., 1999, Proceedings of the 2nd Inter. Conf. on Logical Aspects of Computational Linguistics (LACL'97). LNAI 1582.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  181. Published

    Mathematical vernacular in type theory based proof assistants

    Callaghan, P. & Luo, Z., 1998, User Interfaces for Theorem Provers (UITP'98).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  182. Published

    Measurement of the nu(mu)-CCQE cross section in the SciBooNE experiment

    Alcaraz-Aunion, J. L. & Walding, J., 2009, SIXTH INTERNATIONAL WORKSHOP ON NEUTRINO-NUCLEUS INTERACTIONS IN THE FEW-GEV REGION. Sanchez, F., Sorel, M., AlvarezRuso, L., Cervera, A. & VicenteVacas, M. (eds.). MELVILLE: AMER INST PHYSICS, p. 145-150 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  183. Published

    Measurement re-ordering attacks on power system state estimation

    Gul, A. & Wolthusen, S., 18 Jan 2018, Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe 2017). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  184. Published

    Measurement Study on Malicious Web Servers in the .nz Domain

    Seifert, C., Delwadia, V., Komisarczuk, P., Stirling, D. & Welch, I., 2009, Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. p. 8-25 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  185. Published

    Measuring 3-D Secure and 3D SET against e-commerce end-user requirements

    Jarupunphol, P. & Mitchell, C. J., 2003, Proceedings of the 8th Collaborative electronic commerce technology and research conference (CollECTeR (Europe) 2003), National University of Ireland, Galway, June 2003. p. 51-64 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  186. Published

    Measuring Attitude towards Risk Treatment Actions amongst Information Security Professionals: an Experimental Approach

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 13 Jun 2016, Workshop on the Economics of Information Security. 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  187. Published

    Measuring attitudes towards mobile information services: an empirical validation of the HED/UT scale

    van der Heijden, H. & Sangstad Sørensen, L., 2003, Proceedings of the European Conference on Information Systems (ECIS). Naples, Italy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  188. Published

    Measuring SSL and SET against e-commerce consumer requirements

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - International Network Conference 2002 (INC 2002), University of Plymouth, UK, July 2002. p. 323-330 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  189. Published

    Measuring the Beam Profile by Counting Ionization Electrons

    Sandberg, H., Bertsche, W., Bodart, D., Dehning, B., Gibson, S., Levasseur, S., Satou, K., Schneider, G., Storey, J. & Veness, R., 12 Sep 2019, 8th International Beam Instrumentation Conference 2019. Malmö, Sweden: JACoW Publishing, TUBO04

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  190. Published

    Measuring the Effectiveness of Twitter's URL Shortener (t.co) at Protecting Users from Phishing and Malware Attacks

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 2. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  191. Published

    Measuring Tourists’ Emotional Experiences: Extension and Further Validation of the Destination Emotion Scale

    Hosany, S., Prayag, G., Deesilatham, S. & Odeh, K., 2013, 44th TTRA Annual International Conference, Kansas City, Missouri, USA, June 20-22.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  192. Published

    Mechanical characterisation of ancient Egyptian mortars

    Sanchez-Moral, S., Martinez-Martinez, J., Benavente, D., Cuezva, S. & Fernandez-Cortes, A., 2011, MATERIALS STRUCTURE MICROMECHANICS OF FRACTURE. Sandera, P. (ed.). LAUBLSRUTISTR 24, CH-8717 STAFA-ZURICH, SWITZERLAND: TRANS TECH PUBLICATIONS LTD, Vol. 465. p. 487-490 4 p. (Key Engineering Materials).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  193. Published

    Median based method for baseline wander removal in photoplethysmogram signals

    Awodeyi, A. E., Alty, S. R. & Ghavami, M., 5 Feb 2014, Proceedings - IEEE 14th International Conference on Bioinformatics and Bioengineering, BIBE 2014. Institute of Electrical and Electronics Engineers Inc., p. 311-314 4 p. 7033598

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  194. Published

    Members’ Commitment in online health communities: THE CASE OF MEDICINEAFRICA: Research in Progress

    Panteli, A. & Chamakiotis, P., 2018, Members’ Commitment in online health communities: THE CASE OF MEDICINEAFRICA, .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  195. Published

    Memory Access Pattern Protection for Resource-Constrained Devices

    Nakano, Y., Cid, C., Kiyomoto, S. & Miyake, Y., 2013, Proceedings of CARDIS 2012. Springer, Vol. 7771. p. 188-202 15 p. (Lecture Notes in Computer Science; no. 7771).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  196. Published

    Memory Errors: the Past, the Present, and the Future

    van der Veen, V., dutt-Sharma, N., Bos, H. J. & Cavallaro, L., 12 Sep 2012, 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  197. Published

    Memory-Based Learning of Morphology with Stochastic Transducers

    Clark, A., 2002, Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL). p. 513--520

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  198. Published

    MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

    Ankele, R., Böhl, F. & Friedberger, S., 2018, ACNS 2018 Applied Cryptography & Network security. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 381-399 19 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  199. Published

    Metabolic engineering of the mevalonate and non-mevalonate pathways in tomato

    Enfissi, EM., Fraser, PD., Lois, LM., Boronat, A., Schuch, W. & Bramley, PM., 2003, ADVANCED RESEARCH ON PLANT LIPIDS. Murata, N., Yamada, M., Nishida, Okuyama, H., Sekiya, J. & Hajime, W. (eds.). DORDRECHT: Springer, p. 237-240 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  200. Published

    Meta-Search Through the Space of Representations and Heuristics on a Problem by Problem Basis

    Fuentetaja, R., Barley, M., Borrajo, D., Douglas, J., Franco, S. & Riddle, P., 26 Apr 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI Press, p. 6169-6176 8 p. (32nd AAAI Conference on Artificial Intelligence, AAAI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  201. Published

    Microbunch Instability Observations from a THz Detector at Diamond Light Source

    Shields, W., Bartolini, R., Boorman, G., Karataev, P., Lyapin, A., Puntree, J. & Rehm, G., 2012, IX INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2011). Potylitsyn, A. & Karataev, P. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  202. Published

    Micron-scale Laser-wire at the ATF-II at KEK Commissioning and Results

    Nevay, L. J., Corner, L., Walczak, R., Blair, G., Boogert, S., Deacon, L. & Karataev, P., 1 Dec 2011, IPAC 2011 - 2nd International Particle Accelerator Conference. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  203. Published

    Migration of He-3 impurities along dislocation lines in He-4 single crystals

    Rojas, X., Haziot, A. & Balibar, S., 2012, 26TH INTERNATIONAL CONFERENCE ON LOW TEMPERATURE PHYSICS (LT26), PTS 1-5. IOP PUBLISHING LTD, 4 p. (Journal of Physics Conference Series; vol. 400).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  204. Published

    Millennial and century climate changes in the Colorado Alpine

    Elias, S., 2003, Climate Variability and Ecosystem Response. Greenland, D. (ed.). London: Oxford University Press, p. 370-383

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  205. E-pub ahead of print

    MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

    Albrecht, M., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T., 9 Nov 2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer, Vol. 10031. p. 191-219 29 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  206. E-pub ahead of print

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Ankele, R. & Kölbl, S., 13 Jan 2019, Selected Areas in Cryptography 2018. Lecture Notes in Computer Science ed. Calgary, Canada: Springer, Vol. 11349. p. 163-190 28 p. (Lecture Notes in Computer Science; vol. 11349).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  207. Published

    Minimal weight k-SR representations

    Han, Y., Gollmann, D. & Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 34-43 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  208. Published

    Minimizing the Log Size for Execution Replay of Shared-Memory Programs

    Levrouw, L. J. & Audenaert, K., 1994, Parallel Processing, Proceedings of Conpar 94–VAPP VI. Springer, p. 76-87 (Lecture Notes in Computer Science; vol. 854).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  209. Published

    Minimum description length estimators under the optimal coding scheme

    Vovk, V., 1995, Proceedings of the Second European Conference on Computational Learning Theory. Vitanyi, P. (ed.). Berlin: Springer, p. 237-251 (Lecture Notes in Computer Science; vol. 904).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  210. Published

    Mining the biomedical literature to predict shared drug targets in DrugBank

    Caniza Vierci, H., Galeano Galeano, D. & Paccanaro, A., 2017, XLIII Conferencia Latinoamericana en Informática CLEI 2017. IEEE Xplore, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  211. Published

    Mining the recent history of Macromarketing thought: A visualization of ideas

    Reppel, A. & Kravets, O., 7 Jul 2016, Proceedings of the 41st Annual Macromarketing Conference. Dublin, Ireland, p. 465-468

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  212. Unpublished

    Miracles, transformative moments and ‘A life’s work’: Exploring the intersection of individual and social identity

    Tzouramani, E., 2013, (Unpublished) 3rd Conference of Management, Spirituality and Religion, May 2013.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  213. Published

    MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 53-66 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  214. Published

    Mitigating CSRF attacks on OAuth 2.0 systems

    Li, W., Mitchell, C. J. & Chen, T. M., 1 Nov 2018, Proceedings of 2018 16th Annual Conference on Privacy, Security and Trust (PST): 28-30 Aug 2018. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  215. Published

    Mitigation of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014). IEEE Computer Society Press, p. 478 483 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  216. Published

    Mixability and the Existence of Weak Complexities

    Kalnishkan, Y. & Vyugin, M., 2002, Computational Learning Theory, 15th Annual Conference on Computational Learning Theory, COLT 2002, Proceedings: volume 2375 of Lecture Notes in Artificial Intelligence. Springer, p. 105-120 (Lecture Notes in Artificial Intelligence; vol. 2375).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  217. Published

    Mixed Sneutrino Dark Matter and the Ratio Omega(b)/Omega(dm)

    West, S., 27 Oct 2006, Proceedings of SUSY06.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  218. Published

    Mobile recommendation systems for decisions ‘on the go’

    van der Heijden, H., Kotsis, G. & Kronsteiner, R., 2005, Proceedings of the International Conference on Mobile Business (ICMB). Sydney, Australia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  219. Published

    Mobile services for group decision support

    van Leeuwen, J. & van der Heijden, H., 2003, Proceedings of the 16th Bled Electronic Commerce conference. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  220. Published

    Model checking for symbolic-heap separation logic with inductive predicates

    Brotherston, J., Gorogiannis, N., Kanovich, M. & Rowe, R., 11 Jan 2016, POPL '16 Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. ACM, p. 84-96 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  221. Published

    Model Checking Recursive Programs with Numeric Data Types

    Hague, M. & Lin, A., 2011, CAV: Computer Aided Verification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  222. Published

    Modelando el nicho ecológico de los bambúes leñosos (Bambuseae, Poaceae) en Bolivia: Implicaciones para la construcción de aerófonos autóctonos y la conservación de los bambúes musicales

    Hachmeyer, S., 2017, La rebelión de los objetos Cestería y Maderas: Anales de la reunión anual de etnología. La Paz: MUSEF, Vol. XXXI. p. 183-210

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  223. Published

    Modeling And Detecting Anomalies In Scada Systems

    Svendsen, N. & Wolthusen, S. D., Mar 2008, Critical Infrastructure Protection II: Proc. Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 101-113

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  224. Published

    Modelling e-business security using business processes

    Nachtigal, S. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 459-464 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  225. Published

    Modelling GLL Parser Implementations

    Johnstone, A. & Scott, E., 2011, Software Language Engineering: Third International Conference, SLE 2010, Eindhoven, The Netherlands, October 12-13, 2010, Revised Selected Papers. Malloy, B., Staab, S. & van den Brand, M. (eds.). Springer, p. 42-61 20 p. (Lecture Notes in Computer Science; vol. 6563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  226. Published

    Modelling Implementation of Strategy

    Aboutalebi, R. & Tan, H., 9 Sep 2014, In: BAM (British Academy of Management), 28th Annual Conference of BAM: The Role of the Business School in Supporting Economic and Social Development. 09-11 September 2014, Belfast Waterfront, Northern Ireland, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  227. Published

    Modelling the Satellite Bridge for B-ISDN Islands

    Sun, Z., Komisarczuk, P., Coakley, F. P. & Evans, B. G., 1994, Broadband Islands '94, Connecting with the End-User, Proceedings of the 3rd Intermational Conference on Broadband Islands, Hamburg, Germany, 7-9 June, 1994. p. 211-219 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  228. Published

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L., 30 Oct 2017, PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Published

    Moduli for Testing Implementations of the RSA Cryptosystem

    Walter, C. D., 1999, 14th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 78-85 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  230. Forthcoming

    Monadic Decomposition in Integer Linear Arithmetic

    Hague, M., Wu, Z., Lin, A. & Ruemmer, P., 24 Mar 2020, (Accepted/In press) International Joint Conference on Automated Reasoning. Springer-Verlag, 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  231. Published

    Monitoring excavation-related ground deformation in london, UK using SqueeSAR™

    Bischoff, C. A., Mason, P. J., Ghail, R. C., Giannico, C. & Ferretti, A., 9 May 2019, Tunnels and Underground Cities: Engineering and Innovation meet Archaeology, Architecture and Art- Proceedings of the WTC 2019 ITA-AITES World Tunnel Congress. Viggiani, G., Celestino, T., Peila, D. & Viggiani, G. (eds.). CRC Press / Balkema, p. 5360-5367 8 p. (Tunnels and Underground Cities: Engineering and Innovation meet Archaeology, Architecture and Art- Proceedings of the WTC 2019 ITA-AITES World Tunnel Congress).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  232. Published

    Monotonicity and Completeness in Attribute-Based Access Control

    Crampton, J. & Morisset, C., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 33-48

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  233. Published

    Montgomery's Multiplication Technique: How to Make It Smaller and Faster

    Walter, C. D., 1999, CHES '99. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1717. p. 80-93 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  234. Forthcoming

    Mood and confidence in seeking social support in university students with chronic pain

    Serbic, D. & Doyle, L., 2019, (Accepted/In press) Teaching and supporting students with invisible disabilities . Psychology Teaching Review

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  235. Published

    More Detail for a Combined Timing and Power Attack against Implementations of RSA

    Schindler, W. & Walter, C. D., 2003, 9th IMA Int. Conf. on Cryptography and Coding. Paterson, K. G. (ed.). Springer, Vol. 2898. p. 245-263 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  236. Published

    Morphological effects on pronunciation

    Mousikou, P., Strycharczuk, P., Turk, A., Rastle, K. & Scobbie, J., 2015, The Scottish Consortium for ICPhS 2015 (Ed.), Proceedings of the 18th International Congress of Phonetic Sciences . Glasgow, UK: The University of Glasgow, paper number 0816

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  237. Published

    MoverScore: Text Generation Evaluating with Contextualized Embeddings and Earth Mover Distance

    Zhao, W., Peyrard, M., Liu, F., Gao, Y., Meyer, C. M. & Eger, S., Nov 2019, Proceedings of 2019 Conference on Empirical Methods in Natural Language Processing (EMNLP 2019). p. 563-578 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  238. Published

    Mozart and Paris (1778)

    Charlton, D., 1995, Europa im Zeitalter Mozarts. Csáky, M. & Pass, W. (eds.). Vienna: Böhlau, p. 185-89 5 p. (Schriftenreihe der Osterreichischen Gesellschaft zur Erforschung des 18. Jahrhunderts ; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. Published

    MPLS policy target recognition network

    Al-Mutairi, A. & Wolthusen, S., 2 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9572. p. 71-87 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9572).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  240. Published

    MSL 14 - a Wellcome Manuscript of a Medical Practitioner

    Zipser, B. & Nutton, V., 2010, Histoire de la tradition et édition des médecins grecs: Actes du VIe colloque international (Paris, Université de Paris Sorbonne - Académie des Inscriptions et Belles Lettres, 10-12 avril 2008). Boudon-Millot, V., Garzya, A., Jouanna, J. & Roselli, A. (eds.). Napoli: M. D'Auria Editore, p. 259-270 11 p. (Collectanea; vol. 27).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  241. Published

    Multi-agent interactions for an ATM management system (TeleMACS approach).

    Hayzelden, A., Bigham, J. & Luo, Z., 1999, Software Agents for Future Communications Systems. Hayzelden, A. L. G. & Bigham, J. (eds.). Springer-Verlag, p. 160-182

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  242. Published

    Multi-agent systems for resource management

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 1999, 6th International Conference on Intelligence and Services in Networks, Also in Lecture Notes in Computer Science. Zuidweg, H., Campolargo, M., Delgado, J. & Mullery, A. (eds.). Springer-Verlag, Vol. 1597.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  243. Published

    Multi-Budgeted Directed Cuts

    Kratsch, S., Li, S., Marx, D., Pilipczuk, M. & Wahlstrom, M., 25 Jan 2019, IPEC 2018. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 115. p. 18:1-18:14 14 p. 18. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  244. E-pub ahead of print

    Multichannel Quaternion Least Mean Square Algorithm

    Cheong Took, C. & Xia, Y., 17 Apr 2019, International Conference on Acoustics, Speech, and Signal Processing: ICASSP. Brighton UK: IEEE, p. 1-4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  245. Published

    Multi-Client Non-Interactive Verifiable Computation

    Choi, S. G., Katz, J., Kumaresan, R. & Cid, C., Feb 2013, Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Sahai, A. (ed.). Springer, p. 499-518 20 p. (Lecture Notes in Computer Science; vol. 7785).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  246. Published

    Multi-Dimensional Causal Discovery

    Schaechtle, U., Stathis, K. & Bromuri, S., 3 Aug 2013, Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence: Beijing, China, 3-9 August 2013. Rossi, F. (ed.). p. 1649-1655

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  247. Published

    Multigraph Critical Infrastructure Model

    Schneidhofer, B. & Wolthusen, S., 2016, Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers. Springer-Verlag, Vol. 485. p. 149-167 19 p. (IFIP Advances in Information and Communication Technology; vol. 485).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  248. Published

    Multi-level Access in Searchable Symmetric Encryption

    Alderman, J., Martin, K. & Renwick, S., 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 35-52 18 p. (Lecture Notes in Computer Science; vol. 10323).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  249. Published

    Multilinear Maps from Obfuscation

    Albrecht, M., Farshim, P., Hofheinz, D., Larraia de Vega, E. & Paterson, K., 19 Dec 2015, Theory of Cryptography. Kushilevitz, E. & Malkin, T. (eds.). Springer, Vol. 9562. p. 446-473 27 p. (Lecture Notes in Computer Science; vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  250. Published

    Multiparty Compatibility in Communicating Automata: Characterisation and Synthesis of Global Session Types

    Denielou, P-M. & Yoshida, N., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II: ICALP (2). 2013 ed. Springer, Vol. 7966. p. 174 186 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  251. Published

    Multiparty Session Types Meet Communicating Automata

    Deniélou, P-M. & Yoshida, N., 2012, Programming Languages and Systems: 21st European Symposium on Programming, ESOP 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012: Proceedings. Seidl, H. (ed.). Springer, p. 194-213 20 p. (Lecture Notes in Computer Science; vol. 7211).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  252. Unpublished

    Multiple countries response to oil price shocks and illiquidity shocks

    Said, H. & Giouvris, E., 2017, (Unpublished) 43rd International Business Research Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  253. Published

    Multiple lexicalisation (a Java based study)

    Scott, E. & Johnstone, A., 20 Oct 2019, ACM Digital Library: Proceedings of Software Language Engineering 2019. ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  254. Published

    Multiple Pulse Resonantly Enhanced Laser Plasma Wakefield Acceleration

    Corner, L., Walczak, R., Nevay, L. J., Dann, S., Hooker, S. M., Bourgeois, N. & Cowley, J., 2012, ADVANCED ACCELERATOR CONCEPTS. Zgadzaj, R., Gaul, E. & Downer, MC. (eds.). MELVILLE: AMER INST PHYSICS, p. 872-873 2 p. (AIP Conference Proceedings; vol. 1507).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  255. Published

    Multiple sequence alignment based on new approaches of tree construction and sequences comparison

    Solovyev, V., Streletc, V. B., Milanesi, L., Lim, H. (ed.), Fickett, J. (ed.), Cantor, C. (ed.) & Robbins, R. (ed.), 1993, Proceedings of the 2nd International conference on Bioinformatics, Supercomputing, and Complex genome analysis.. World Scientific, p. 419-428

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  256. Published

    Multiprobabilistic Venn Predictors with Logistic Regression

    Nouretdinov, I., Devetyarov, D., Burford, B., Camuzeaux, S., Gentry-Maharaj, A., Tiss, A., Smith, C., Luo, Z., Chervonenkis, A., Hallett, R., Vovk, V., Waterfield, M., Cramer, R., Timms, J. F., Jacobs, I., Menon, U. & Gammerman, A., 2012, Artificial Intelligence Applications and Innovations - AIAI 2012 International Workshops: AIAB, AIeIA, CISE, COPA, IIVC, ISQL, MHDW, and WADTMB, Halkidiki, Greece, September 27-30, 2012, Proceedings, Part II. Iliadis, L., Maglogiannis, I., Papadopoulos, H., Karatzas, K. & Sioutas, S. (eds.). Springer, Vol. 382. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  257. Published

    Multiproxy Constraints on Redox Conditions of ~2.7 Ga Oceans

    Yang, J., Zerkle, A., Grassineau, N., Nisbet, E., Izon, G., Hunter, M. & Martin, T., 2016, Goldschmidt Conference 2016. p. 03F

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  258. Forthcoming

    Multi-Round Attacks on Structural Controllability Properties for Non-Complete Random Graphs

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, (Accepted/In press) Proceedings of the 16th Information Security Conference (ISC 2013). Springer-Verlag, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  259. Published

    Multi-Shot Distributed Transaction Commit

    Chockler, G. & Gotsman, A., 28 Sep 2018, 32nd International Symposium on DIStributed Computing (DISC 2018). Springer-Verlag, p. 1-18 18 p. (LIPIcs–Leibniz International Proceedings in Informatics ; vol. 121).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  260. Published

    Music as Function: Biofeedback in Games for Health

    Plans, E. & Plans, D., 10 Apr 2016, Ludomusicology - Videogame Music Research Group.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  261. Published

    My Beautiful Self’: an Exploration of the Effects of Advertising Campaigns on Female Empowerment

    Longo, C. & Türe, M., 2016, NA - Advances in Consumer Research . Vol. 44. p. 747-747 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  262. E-pub ahead of print

    Nanothermometry of electrons and phonons

    Weng, Q., Puttock, R., Barton, C., Panchal, V., Yang, L., An, Z., Kajihara, Y., Lu, W., Tzalenchuk, A. & Komiyama, S., 29 Oct 2018, 2018 43rd International Conference on Infrared Millimeter and Terahertz Waves, IRMMW-THz 2018. IEEE Computer Society, Vol. 2018-September. 3 p. 8509939

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  263. Published

    Nature vs Grammar: Annibal Caro's Apologia as a Manifesto for Orality

    Jossa, S., 24 Feb 2016, Interactions between Orality and Writing in Early Modern Italian Culture. Degl'Innocenti, L., Richardson, B. & Sbordoni, C. (eds.). Routledge

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  264. Published

    Navigating the Sacred and the Profane: An Inquiry of ‘Askesis’ Emergent in Daily Lives and Grounded in Wisdom Traditions.

    Tzouramani, E. & Karakas, F., 2016, 11th Organization Studies Workshop, May 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  265. Forthcoming

    Naxos di Sicilia: nuovi dati sulla città del V secolo a.C.

    Lentini, M. C. & Pakkanen, J., 2015, (Accepted/In press) La Città e le città della Sicilia antica. Atti delle Ottave Giornate Internazionali di studio sull’area elima e la Sicilia occidentale nel contesto mediterraneo. Pisa, Scuola Normale Superiore, 18-21 dicembre 2012, Pisa. Ampolo, C. (ed.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. Published

    Naxos of Sicily in the 5th Century BC: New Research

    Lentini, M. C., Pakkanen, J. & Sarris, A., Dec 2015, Greek Colonisation: New Data, Current Approaches: Proceedings of the Scientific Meeting held in Thessaloniki (6 February 2015). Adam-Veleni, P. & Tsangari, D. (eds.). Athens: Alpha Bank, p. 23–35 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  267. Published

    Near and yet So Far: Distance-Bounding Attacks in Wireless Networks

    Clulow, J., Hancke, G., Kuhn, M. G. & Moore, T., 2006, European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS). Springer-Verlag, Vol. 4357. p. 83-97

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  268. Published

    Negotiating expatriate identity in the global era: Implications on expatriate performance

    Li, C. & Zhang, L. E., 1 Jan 2015, Academy of Management Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  269. Published

    Neighbourhood morphology and solar irradiance in relation to urban climate

    Mohajeri, N., Gudmundsson, A., Assouline, D. & Scartezzini, J., 2015, ICUC9 - The 9th International Conference on Urban Climate. ICUC9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  270. Published

    Nella terra di Dante

    Jossa, S. & Gesù, M. D. (ed.), 2009, Letteratura, identità, nazione. Palermo: duepunti, p. 41-58 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  271. Published

    Neo-Archaean Palaeo-Environmental Changes Determined by Microbial Activities Using Stable Isotopic Compositions

    Grassineau, N., Yang, J., Zerkle, A. & Nisbet, E., 12 Dec 2017, American Geophysical Union Fall Annual Meeting. New Orleans, p. B23F-05 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  272. Published

    Neogene extension on Seram: A new tectonic model for the northern Banda Arc

    Pownall, J. & Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-305 1-17

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  273. Published

    NetVis: a visualization tool enabling multiple perspectives of network traffic data

    Peters, D., Slawinski, A., Spoor, T., Vicol, S., Happa, J., Goldsmith, M. & Creese, S., 2013, Proceedings of the 31st conference on Theory and Practice of Computer Graphics, Eurographics UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  274. Published

    Network as a computer: ranking paths to find flows

    Pavlovic, D., 2008, Proceedings of CSR 2008. Razborov, A. & Slissenko, A. (eds.). Springer-Verlag, Vol. 5010. p. 384-397 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  275. Published

    Network provider domain federation in TINA

    Pavón, J., Montes, E. & Komisarczuk, P., 1997, Global Convergence of Telecommunications and Distributed Object Computing, 1997. Proceedings., TINA 97. p. 334-342 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  276. Published

    Network structure and the cultural evolution of linguistic structure: A group communication experiment

    Raviv, L., Meyer, A. & Lev - Ari, S., 2020, Ravignani, A. and Barbieri, C. and Martins, M. and Flaherty, M. and Jadoul, Y. and Lattenkamp, E. and Little, H. and Mudd, K. and Verhoef, T. (Eds) Evolution of Language: Proceedings of the 13th International Conference (EvoLang13). Brussels, Belgium..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  277. Published

    Network traffic demand prediction with confidence

    Dashevskiy, M. & Luo, Z., 2008, IEEE GLOBECOM 2008. p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  278. Published

    Network-aware stream query processing in mobile ad-hoc networks

    O'Keeffe, D., Salonidis, T. & Pietzuch, P. R., 17 Dec 2015, 34th IEEE Military Communications Conference, MILCOM 2015, Tampa, FL, USA, October 26-28, 2015. p. 1335-1340 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  279. E-pub ahead of print

    Neural State Classification for Hybrid Systems

    Phan, D., Paoletti, N., Zhang, T., Grosu, R., Smolka, S. A. & Stoller, S. D., 30 Sep 2018, 16th International Symposium on Automated Technology for Verification and Analysis (ATVA 2018). Lahiri, S. K. & Wang, C. (eds.). Springer, p. 422-440 19 p. (Lecture Notes in Computer Science; vol. 11138).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  280. Published

    New c-ary perfect factors in the de Bruijn Graph

    Mitchell, C. J., 1995, Codes and Cyphers - Cryptography and Coding IV: Proceedings of the fourth IMA Cryptography and Coding Conference, Cirencester, December 1993. Southend: Formara Ltd., p. 299-313 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  281. Published

    New CBC-MAC forgery attacks

    Brincat, K. & Mitchell, C. J., 2001, Information Security and Privacy, ACISP 2001, Sydney, Australia, July 2001. Varadharajan, V. & Mu, Y. (eds.). Springer-Verlag, p. 3-14 12 p. (Lecture Notes in Computer Science; no. 2119).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  282. Published

    New Insights on Architectural Connectors

    Bruni, R., Fiadeiro, J. L., Lanese, I., Lopes, A. & Montanari, U., 2004, IFIP TCS. Kluwer, p. 367-380 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  283. Published

    New Plain-Exponential Time Classes for Graph Homomorphism

    Wahlström, M., 2009, Computer Science - Theory and Applications : 4th International Computer Science Symposium in Russia, CSR 2009. Frid, A., Morozov, A., Rybalchenko, A. & Wagner, K. W. (eds.). Novosibirsk, Russia: Springer, Vol. 5675. p. 346-355 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  284. E-pub ahead of print

    New radiometric calibration site located at Gobabeb, Namib desert

    Bialek, A., Greenwell, C., Lamare, M., Meygret, A., Marcq, S., Lacherade, S., Woolliams, E., Berthelot, B., Bouvet, M., King, M., Underwood, C. & Fox, N., 3 Nov 2016, 2016 IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-November. p. 6094-6097 4 p. 7730592

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  285. Published

    NFC mobile payment with Citizen Digital Certificate

    Chen, W., Mayes, K., Lien, Y-H. & Chiu, J-H., 1 Jun 2011, Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on. Gyeongju: IEEE COMPUTER SOC, p. 120 -126

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  286. Published

    NFC Mobile Transactions and Authentication Based on GSM Network

    Chen, W., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J-H., 1 Apr 2010, Near Field Communication (NFC), 2010 Second International Workshop on. p. 83 -89

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  287. Published

    Ninja: Non identity based, privacy preserving authentication for ubiquitous environments

    Leung, A. & Mitchell, C. J., 2007, UbiComp 2007: Ubiquitous Computing, 9th International Conference, Innsbruck, Austria, September 16-19 2007. Krumm, J., Abowd, G. D., Seneviratne, A. & Strang, T. (eds.). Springer-Verlag, Vol. 4717. p. 73-90 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  288. Published

    Nitrogen cycling in ~2.7 Ga oceans

    Yang, J., Zerkle, A., Grassineau, N., Nisbet, E., Mettam, C., Hunter, M., Martin, A., Newton, J. & Boyce, A., 13 Dec 2016, American Geophysical Union Fall Annual Meeting. San Francisco, p. PP21D-04

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  289. Published

    NLO automated tools for QCD and beyond

    Kauer, N., 26 Feb 2012, LC11: Understanding QCD at linear colliders in searching for old and new physics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  290. Published

    Noisy Carrier Modulation for HF RFID: First International EURASIP Workshop on RFID Technology

    Hancke, G. P., 1 Sep 2007, First International EURASIP Workshop on RFID Technology. Austria, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  291. Unpublished

    Nomadic Metrology

    Hazell, C., 2019, (Unpublished) A Day with Rosi Braidotti: ZOE-GEO-TECHNO Egalitarianism .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  292. Published

    Non-asymptotic calibration and resolution

    Vovk, V., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, Vol. 3734. p. 429-443 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  293. Published

    NON-CRIMP THERMOPLASTIC COMPOSITE FABRICS - AEROSPACE SOLUTIONS TO AUTOMOTIVE PROBLEMS

    WOOLSTENCROFT, D. H. & Hogg, P., 1991, ADVANCED COMPOSITE MATERIALS : NEW DEVELOPMENTS AND APPLICATIONS. MATERIALS PARK: ASM INTERNATIONAL, p. 339-349 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  294. Published

    Non-Forensic Odontological Biometrics

    Busch, C. & Wolthusen, S. D., 12 Sep 2009, Proc. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '09). IEEE Computer Society Press, p. 1105-1109

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  295. Published

    Non-Interactive Key Exchange

    Freire, E. S. V., Hofheinz, D., Kiltz, E. & Paterson, K. G., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 254-271 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  296. Submitted

    Non-Latin Alphabets in the transmission of Simon of Genoa's Clavis Sanationis

    Zipser, B., 2019, (Submitted) De Bagdad à Constantinople: le transfert des savoirs médicaux, XIe-XVe s.. Cronier, M. (ed.). Paris: Collection Orient et Méditerranée

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  297. Published

    Nonlinear Equivalence of Stream Ciphers

    Rønjom, S. & Cid, C., 2010, Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Springer, p. 40-54 15 p. (Lecture Notes in Computer Science; vol. 6147).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  298. Published

    Nonresponse in cross-cultural telephone surveys: reflections on telephone survey interviews with Chinese managers

    Wang, C. L. & Saunders, M., 2011, British Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  299. Published

    Normalized nonconformity measures for regression conformal prediction

    Papadopoulos, H., Gammerman, A. & Vovk, V., 2008, Proceedings of the IASTED International Conference on Articial Intelligence and Applications. p. 64-69 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  300. Published

    Normative KGP Agents: A Preliminary Report

    Sadri, F., Toni, F. & Stathis, K., 1 Dec 2005, Symposium on Normative Multi-Agent Systems, NORMAS 2005, part of the SSAISB 2005 Convention, University of Hertfordshire, Hatfield, UK. p. 85-96 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  301. Published

    Not in Silos: locating ERP project into a complex network- A multiple-project perspective

    Elbanna, A., 2008, Proceedings of the European Conference of Information Systems 2008.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  302. Published

    Novel Genetic Bees Algorithm applied to single machine scheduling problem

    Packianather, M. S., Yuce, B., Mastrocinque, E., Fruggiero, F., Pham, D. T. & Lambiase, A., 2014, World Automation Congress (WAC), 2014. Waikoloa, HI, USA : IEEE, p. 906-911 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  303. Published

    Numerical modelling of stress fields around magma chambers and the generation of ring faults

    Gudmundsson, A., Turon, E. & Marti, J., 1997, Proceedings of IAMG97 Third Annual Conference of the International Association for Mathematical Geology. Pawlowsky-Glahan, V. (ed.). Barcelona, p. 401-406

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  304. Published

    O Debate Político e o Conflito Inter-Profissional em redor da Regulamentação das Medicinas Alternativas e Complementares em Portugal

    Almeida, J., 2008, VI Congresso Português de Sociologia. Lisbon, Portugal, p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  305. Published

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. J. & Chen, T., 11 Nov 2019, Proceedings of the Security Standardisation Research Conference 2019 (SSR 2019, an ACM CCS 2019 Workshop), London, November 11 2019. ACM, p. 35-44 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  306. Published

    Obfuscation and Formal Grammars Revisited

    Repel, D. & Stengel, I., 13 Sep 2013, Fifth International Conference on Internet Technologies and Applications. p. 267-274 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  307. Published

    Object languages in a type-theoretic meta-framework

    Callaghan, P. C., Luo, Z. & Pang, J., 2001, Proof Transformation and Presentation and Proof Complexities.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  308. Published

    Object-Oriented Conceptual Modeling from Law

    Sernadas, C., Fiadeiro, J. L. & Sernadas, A., 1988, DS-3. p. 305-327 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  309. Published

    Observation Mechanism and Cost Model for Tightly Coupled Asymmetric Concurrency

    Seeger, M. & Wolthusen, S. D., May 2010, Proceedings, 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 158-163

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  310. Published

    Observation of stages of homogeneous nucleation of liquid droplets in solid isotopic helium mixtures

    Poole, M., Saunders, J. & Cowan, B., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 360-361 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  311. Published

    Observations on the use of mobile decision aids for consumer decision making

    van der Heijden, H. & Sangstad Sørensen, L., 2003, Proceedings of the 2nd International Conference on Mobile Business (ICMB). Vienna, Austria

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  312. Published

    Oceanographic MOWER Cruise

    Valencia, J., Ercilla, G., Hernández-Molina, F. J. & Casas, D., 9 Apr 2015, International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences - ISPRS Archives. 5W5 ed. International Society for Photogrammetry and Remote Sensing, Vol. 40. p. 223-230 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  313. Published

    Off-line Nearest Neighbour Transductive Confidence Machine

    Nouretdinov, I., 2008, 8th Industrial Conference on Data Mining 2008 Poster and Workshop Proceedings. p. 16-24 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  314. Published

    Offline Peer-to-Peer Broadcast with Anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M., 2011, E-business and Telecommunications. 3 ed. Springer, Vol. 130. p. 174-185 (Communications in Computer and Information Science ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  315. Unpublished

    Oil, Baltic Dry index, foreign exchange, market liquidity and business cycles: Evidence from net oil exporting countries and net oil importing countries

    Said, H. & Giouvris, E., 2018, (Unpublished) 2018 International Conference on Business and Information-Winter session.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  316. Published

    Old and new deterministic factoring algorithms

    McKee, J. & Pinch, R., 1996, Proceedings of the second Algorithmic Number Theory Symposium (ANTS II). Springer, p. 217-224

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  317. Published

    On a possible privacy flaw in Direct Anonymous Attestation (DAA)

    Leung, A., Chen, L. & Mitchell, C. J., 2008, Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, Villach, Austria, March 11-12, 2008, Proceedings. Lipp, P., Sadeghi, A-R. & K-M. K. (eds.). Berlin: Springer-Verlag, p. 179-190 12 p. (Lecture Notes in Computer Science; vol. 4968).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  318. Published

    On assessing the positioning accuracy of Google Tango in challenging indoor environments

    Nguyen, D. K. A. & Luo, Z., 23 Nov 2017, The 8th International Conference on Indoor Positioning and Indoor Navigation, Sept 18-21, 2017, Japan. IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  319. Published

    On becoming bicultural: a taxonomy of expatriate cultural identity

    Zhang, L. E., 2014, Academy of Management Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  320. Published

    On Cipher-Dependent Related-Key Attacks in the Ideal Cipher Model

    Albrecht, M., Farshim, P., Paterson, K. & Watson, G., 2011, Fast Software Encryption (FSE). Joux, A. (ed.). Springer, Vol. 6733. p. 128-145 (Lecutre Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  321. Published

    On Completeness in Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 6 Jun 2016, Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies: SACMAT '16. New York: ACM Press, p. 149-160 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. Published

    On Correctness of Data Structures under Reads-Write Concurrency

    Lev-Ari, K., Chockler, G. & Keidar, I., 2014, Distributed Computing: 28th International Symposium DISC 2014, Austin, TX, USA, October 12-15, 2014, Proceedings. Kuhn, F. (ed.). 1 ed. Springer-Verlag Berlin Heidelberg, Vol. 8784. p. 273-287 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  323. Published

    On Creating Complementary Pattern Databases

    Franco, S., Torralba, Á., Lelis, L. H. S. & Barley, M., 1 Jan 2017, 26th International Joint Conference on Artificial Intelligence, IJCAI 2017. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 4302-4309 8 p. (IJCAI International Joint Conference on Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  324. E-pub ahead of print

    On Deception-Based Protection Against Cryptographic Ransomware

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 6 Jun 2019, DIMVA 2019: 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Springer, p. 219-239 21 p. (Lecture Notes in Computer Science; vol. 11543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  325. Published

    On delegation and workflow execution models

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing. ACM Press, p. 2137-2144 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  326. Published

    On drive-by-download attacks and malware classification

    Puttaroo, M., Komisarczuk, P. & De Amorim, R. C., 2013, Proceedings of the 5th International Conference on Internet Technologies and Applications, ITA 2013. Glyndwr University, p. 217-225 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  327. Published

    On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL

    Albrecht, M., 2017, Annual International Conference on the Theory and Applications of Cryptographic Techniques: EUROCRYPT 2017: Advances in Cryptology . Springer, p. 103-129 27 p. (Lecture Notes in Computer Science; vol. 10210).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  328. Published

    On Initializations for the Minkowski Weighted K-Means

    Amorim, R. C. D. & Komisarczuk, P., 2012, Advances in Intelligent Data Analysis XI - 11th International Symposium, IDA 2012, Helsinki, Finland, October 25-27, 2012. Proceedings. p. 45-55 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  329. Published

    On Key Assignment for Hierarchical Access Control

    Crampton, J., Martin, K. M. & Wild, P., 2006, Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 98-111 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  330. Published

    On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval

    Crampton, J., Morisset, C. & Zannone, N., 1 Jun 2015, 20th ACM Symposium on Access Control Models and Technologies. ACM, p. 99-109 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  331. Published

    On mobile agent based transactions in moderately hostile environments

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Advances in Network and Distributed Systems Security, Proceedings of IFIP TC11 WG11.4 First Annual Working Conference on Network Security, KU Leuven, Belgium, November 2001. De Decker, B., Piessens, F., Smits, J. & Van Herreweghen, E. (eds.). Kluwer Academic Publishers, p. 173-186 14 p. (IFIP Conference Proceedings; no. 206).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  332. Published

    On modelling multi-agent systems declaratively

    Bracciali, A., Mancarella, P., Stathis, K. & Toni, F., 2005, Declarative agent languages and technologies II. Springer-Verlag, Vol. 3476. p. 53-68 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  333. Published

    On multi-channel MAC protocols in cognitive radio networks

    Yau, A. K-L., Komisarczuk, P. & Teal, P. D., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 300-305 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  334. Published

    On partitional clustering of malware

    de Amorim, R. C. & Komisarczuk, P., 2012, Cyberpatterns 2012. p. 47-51 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  335. Published

    On permissions, inheritance and role hierarchies

    Crampton, J., 2003, Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM Press, p. 85-92 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  336. Published

    On Problems as Hard as CNF-SAT

    Cygan, M., Dell, H., Lokshtanov, D., Marx, D., Nederlof, J., Okamoto, Y., Paturi, R., Saurabh, S. & Wahlström, M., 2012, IEEE Conference on Computational Complexity. p. 74-84 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  337. Published

    On quantum statistics in data analysis

    Pavlovic, D., 2008, Quantum Interaction 2008. Bruza, P. (ed.). AAAI Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  338. Forthcoming

    On quasipolynomial multicut-mimicking networks and kernelization of multiway cut problems

    Wahlström, M., 15 Apr 2020, (Accepted/In press) ICALP 2020. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, p. 1-15 101

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  339. Published

    On Redefinitions of 'Rescue opera'

    Charlton, D., 1992, Music and the French Revolution. Boyd, M. (ed.). 1992: Cambridge University Press, p. 169-88 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  340. Published

    On r-Simple k-Path and Related Problems Parameterized by k/r

    Gutin, G., Wahlstrom, M. & Zehavi, M., Jan 2019, Proceedings of SODA 2019. p. 1750-1769 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  341. Published

    On security vulnerabilities and mitigation in the cognition cycle of Distributed Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P., Poh, G-S. & Martin, K., 2011, Proceedings of the 6th International Conference on Broadband Communications & Biomedical Applications. IEEE, p. 132-137

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  342. Published

    On Singleton Arc Consistency for CSPs Defined by Monotone Patterns

    Carbonnel, C., Cohen, D. A., Cooper, M. C. & Živný, S., 20 Feb 2018, 35th Symposium on Theoretical Aspects of Computer Science, STACS 2018. Niedermeier, R. & Vallée, B. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 96. p. 19:1-19:15 15 p. 19

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  343. Published

    On solutions to the key escrow problem

    Hoyle, M. P. & Mitchell, C. J., 1998, State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 1997. Preneel, B. & Rijmen, V. (eds.). Springer-Verlag, p. 277-306 30 p. (Lecture Notes in Computer Science; no. 1528).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  344. Published

    On spatio-temporal constraints and inheritance in role-based access control

    Chen, L. & Crampton, J., 2008, Proceedings of ACM Symposium on Information, Computer and Communications Security. ACM Press, p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  345. Published

    On Subtyping in Type Theories with Canonical Objects

    Lungu, G. & Luo, Z., Nov 2018, Types for Proofs and Programs: Post-proceedings of the 22nd Int. Conf. on Types for Proofs and Programs (TYPES 2016). Leibniz International Proceedings in Informatics, Vol. 97. p. 13:1-13:31 31 p. 13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  346. Published

    On Symmetric Encryption with Distinguishable Decryption Failures

    Boldyreva, A., Degabriele, J. P., Paterson, K. & Stam, M., 2014, FSE 2013. Moriai, S. (ed.). Springer, Vol. 8424. p. 1–24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  347. Published

    On the (in)security of IPsec in MAC-then-encrypt configurations

    Degabriele, J. P. & Paterson, K. G., 2010, CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 493-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  348. Published

    On the Absence of Predictive Complexity for Some Games

    Kalnishkan, Y. & Vyugin, M. V., 2002, Algorithmic Learning Theory 13th International Conference, ALT 2002, Proceedings: volume 2533 of Lecture Notes in Artificial Intelligence. Springer, (Lecture Notes in Artificial Intelligence; vol. 2533).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  349. Published

    On the complexity of universal leader election

    Kutten, S., Pandurangan, G., Peleg, D., Robinson, P. & Trehan, A., 2013, ACM Symposium on Principles of Distributed Computing, PODC '13, Montreal, QC, Canada, July 22-24, 2013. p. 100-109 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  350. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K., 2017, Trustcom/BigDataSE/ICESS, 2017 IEEE. p. 41-49 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  351. Published

    On the Emergence of Properties in Component-Based Systems

    Fiadeiro, J. L., 1996, AMAST. Springer, Vol. 1101. p. 421-443 23 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  352. Published

    On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

    Curtis, B. & Player, R., 11 Nov 2019, 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. Springer, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  353. Published

    On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles

    Al-Kuwari, S. & Wolthusen, S. D., 2011, Forensics in Telecommunications, Information, and Multimedia: Proceedings of the Third International ICST Conference (e-Forensics 2010). Springer-Verlag, p. 207-223

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  354. Published

    On the filtering of photoplethysmography signals

    Awodeyi, A. E., Alty, S. R. & Ghavami, M., 5 Feb 2014, Proceedings - IEEE 14th International Conference on Bioinformatics and Bioengineering, BIBE 2014. Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 7033577

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  355. Published

    On the hardness of LWE with binary error: Revisiting the hybrid lattice-reduction and meet-in-the-middle attack

    Buchmann, J., Göpfert, F., Player, R. & Wunderer, T., 7 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9646. p. 24-43 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  356. Published

    On the interplay between strategic performance measurement and managerial accounting change for sustainable development

    Subramaniam, N., 2015, European Network for Research in Organisational & Accounting Change (ENROAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  357. Published

    On the Joint Security of Encryption and Signature in EMV

    Degabriele, J. P., Lehmann, A., Paterson, K. G., Smart, N. P. & Strefler, M., 2012, CT-RSA. Dunkelmann, O. (ed.). Springer, Vol. 7178. p. 116-135 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  358. Published

    On the Joint Security of Encryption and Signature, Revisited

    Paterson, K., Thomson, S., Schuldt, J. & Stam, M., 2011, ASIACRYPT. Lee, D. H. & Wang, X. (eds.). Springer, Vol. 7073. p. 161-178 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  359. Published

    On the Life Cycle of the Certification Authority key pairs in EMV'96

    Markantonakis, K. & Rantos, K., Apr 1999, On the Life Cycle of the Certification Authority key pairs in EMV'96. Society for Computer Simulation, p. 125-130

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  360. Published

    On the Limits of Information Flow Techniques for Malware Analysis and Containment

    Cavallaro, L., Saxena, P. & Sekar, R., 10 Jul 2008, Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. Zamboni, D. (ed.). Springer, p. 143-163 (Lecture Notes in Computer Science; vol. 5137).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  361. Published

    On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 BPM Workshop on Workflow Security Audit and Certification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  362. Published

    On the parameterized complexity of the workflow satisfiability problem

    Crampton, J., Gutin, G. & Yeo, A., 2012, CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security. New York: ACM, p. 857-868

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  363. Published

    On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation

    Papapanagiotou, K., Markantonakis, K., Zhang, Q., Sirett, W. & Mayes, K., 2005, Security and Privacy in the Age of Ubiquitous Computing. Sasaki, R., Qing, S., Okamoto, E. & Yoshiura, H. (eds.). Springer Boston, Vol. 181. p. 551-563 13 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  364. Unpublished

    On the pricing of commonality across various liquidity proxies in the London Stock Exchange

    Lim, S. & Giouvris, E., 2015, (Unpublished) On the pricing of commonality across various liquidity proxies in the London Stock Exchange.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  365. Published

    On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks

    Kendall, M. & Martin, K. M., 2012, Research in Cryptology – 4th Western European Workshop WEWoRC 2011. Springer, Vol. 7242. p. 62-82 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  366. Published

    On the Satisfiability of Workflows with Release Points

    Crampton, J., Gutin, G. & Watrigant, R., 7 Jun 2017, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 207-217 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  367. Published

    On the security of a structural proven signer ordering multisignature scheme

    Mitchell, C. J. & Hur, N., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, Vol. 228. p. 1-8 8 p. (IFIP Conference Proceedings; no. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  368. Published

    On the security of some password-based key agreement schemes

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 149-154 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  369. E-pub ahead of print

    On the Security of the Algebraic Eraser Tag Authentication Protocol

    Blackburn, S. & Robshaw, M. J. B., 9 Jun 2016, Applied Cryptology and Network Security: 14th International Conference, ACNS 2016, London (Guildford), UK, June 19-22, 2016. Springer-Verlang, Vol. 9696. p. 3-17 15 p. (Lecture Notes in Computer Science; vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  370. Published

    On the Security of the TLS Protocol: A Systematic Analysis

    Krawczyk, H., Paterson, K. G. & Wee, H., Aug 2013, Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings. Garay, J. A. & Canetti, R. (eds.). Springer, Vol. 1. p. 429-448 (Lecture Notes in Computer Science; vol. 8042).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  371. Published

    On the use of variable user goals to measure perceived usefulness

    Matook, S. & van der Heijden, H., 2007, Proceedings of the European Conference on Information Systems (ECIS). St Gallen, Switzerland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  372. Published

    On the Way to 'Euphonia': Berlioz's Promotion of Earlier Music

    Charlton, D., 2015, Von Gluck zu Berlioz.: Die französische Oper zwischen Antikenrezeption und Monumentalität.. Betzwieser, T. & Mauksch, S. (eds.). Würzburg: Konigshausen & Neumann, p. 139-58 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  373. Published

    On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes

    Procter, G. & Cid, C., 2013, Fast Software Encryption, 20th International Workshop, FSE 2013. Springer, Vol. 8424. p. 287-304 18 p. (Lecture Notes in Computer Science - LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  374. Published

    One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography

    Jager, T., Paterson, K. & Somorovsky, J., 24 Apr 2013, Network and Distributed System Security Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  375. Published

    Online community response to major disaster: A study of Tianya forum in the 2008 Sichuan earthquake

    Qu, Y., Wu, P. F. & Wang, X., 6 Apr 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755366

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  376. Published

    On-line confidence machines are well-calibrated

    Vovk, V., 2002, Proceedings of the Forty Third Annual Symposium on Foundations of Computer Science. Los Alamitos, CA: IEEE Computer Society, p. 187-196 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  377. Published

    Online conformal prediction for classifying different types of herbal medicines with electronic nose

    Zhan, X., Guan, X., Wu, R., Wang, Z., Wang, Y., Luo, Z. & Li, G., 4 Nov 2018, IET Doctoral Forum on Biomedical Engineering, Healthcare, Robotics and Artificial Intelligence 2018: BRAIN 2018. IET Conference Publications, Vol. 2018. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  378. Published

    Online distance learning as a public policy tool for development

    Kromidha, E., 2013, Proceedings of the European Consortium for Political Research 2013 General Conference, 8-9 September 2013. Bordeaux, France

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  379. Published

    Online Instructors: How does the presence on e-learning platforms matter?

    Wallace, A. & Panteli, N., 5 Sep 2017, Proceedings of the British Academy of Management Conference, BAM2017: Track: E-business. The University of Warwick, September 5-7, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  380. Published

    On-line network resource consumption prediction with confidence

    Luo, Z., 2007, Second International Conference on Communications and Networking in China, 2007. CHINACOM '07. . p. 104-108

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  381. Published

    Online Prediction of Ovarian Cancer

    Zhdanov, F., Vovk, V., Burford, B., Devetyarov, D., Nouretdinov, I. & Gammerman, A., 2009, Proceedings of the 12th Conference on Artificial Intelligence in Medicine. p. 375-379 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  382. Published

    On-line Prediction with Kernels and the Complexity Approximation Principle

    Gammerman, A., Kalnishkan, Y. & Vovk, V., 2004, Uncertainty in Artificial Intelligence, Proceedings of the Twentieth Conference. Chickering, M. & Halpern, J. (eds.). AUAI Press, p. 170-176

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  383. Published

    On-Line Probability, Complexity and Randomness

    Chernov, A., Shen, A., Vereshchagin, N. & Vovk, V., 2008, Proceedings of the Nineteenth International Conference on Algorithmic Learning Theory. Freund, Y., Gyorfi, L., Turan, G. & Zeugmann, T. (eds.). Berlin: Springer, Vol. 5254. p. 138-153 16 p. (Lecture Notes in Artificial Intelligence; vol. 5254).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  384. Published

    On-line Regression Competitive with Changing Predictors

    Busuttil, S. & Kalnishkan, Y., 2007, Algorithmic Learning Theory, 18th International Conference, ALT 2007, Proceedings: 4754 of Lecture Notes in Computer Science. Springer, p. 181-195 (Lecture Notes in Computer Science,; vol. 4754).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  385. Published

    On-line regression competitive with reproducing kernel Hilbert spaces

    Vovk, V., 2006, Theory and Applications of Models of Computation. Proceedings of the Third Annual Conference on Computation and Logic. Cai, J-Y., Cooper, S. & Li, A. (eds.). Berlin: Springer, Vol. 3959. p. 452-463 12 p. (Lecture Notes in Computer Science; vol. 3959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  386. Published

    Online Total Ionisation Dosimeter (TID) monitoring using semiconductor based radiation sensors in the isis proton synchrotron

    Harryman, D., Sep 2016, International Beam Instrumentation Conference 2016. p. 379-382 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  387. Published

    Open Game Tournaments in STARLITE

    Hopkins, J., Kafali, O. & Stathis, K., 4 May 2015, Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015). IFAAMAS, p. 1927-1928 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  388. Published

    Open Innovation and The Erosion of the Traditional Information Systems Project’s Boundaries

    Elbanna, A., 2008, IFIP WG 8.6.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  389. Published

    Opening the black boxes of TAM: Towards a mixed methods approach

    Wu, P. F., 1 Dec 2009, ICIS 2009 Proceedings - Thirtieth International Conference on Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  390. Published

    Opéra Comique: Identity and Manipulation

    Charlton, D., 2001, Reading Critics Reading: Opera and Ballet Criticism in France from the Revolution to 1848. Parker, R. & Smart, M. A. (eds.). Oxford: Oxford University Press, p. 13-45 32 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  391. Published

    Opéra-comique and the computer

    Charlton, D., 1992, Grétry et l'Europe de l'Opéra-Comique. Vendrix, P. (ed.). Liège: Mardaga, p. 367-78 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  392. Published

    Optical Information

    Soklakov, A. N. & Schack, R., 2003, Proceedings of the 6th International Conference on Quantum Communication, Measurement and Computing (QCMC'02). Shapiro, J. H. & Hirota, O. (eds.). Princeton, New Jersey: Rinton Press, p. 205-208

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  393. Published

    Optimal Contracts for Outsourced Computation

    Pham, V., Rezaei Khouzani, M. & Cid, C., Nov 2014, Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840. p. 79-98 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  394. Published

    Optimal Left-to-Right Pattern-Matching Automata

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1997, ALP '97 - HOA '97. Hanus, M., Heering, J. & Meinke, K. (eds.). Springer, Vol. 1298. p. 273-286 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  395. Published

    Optimal non-perfect uniform secret sharing schemes

    Farràs, O., Hansen, T., Kaced, T. & Padró, C., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Springer-Verlag, Vol. 8617 LNCS. p. 217-234 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  396. Published

    Optimal Recovery of Secret Keys from Weak Side Channel Traces

    Schindler, W. & Walter, C. D., 2009, 12th IMA Int. Conf. on Cryptography and Coding. Parker, M. G. (ed.). Springer, Vol. 5921. p. 446-468 23 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  397. Published

    Optimal regional consecutive leader election in mobile ad-hoc networks

    Chung, H. C., Robinson, P. & Welch, J. L., 2011, FOMC'11, The Seventh ACM SIGACT/SIGMOBILE International Workshop on Foundations of Mobile Computing (part of FCRC 2011), San Jose, CA, USA, June 9, 2011, Proceedings. p. 52-61 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  398. Published

    Optimal Strategies in Pushdown Reachability Games

    Hague, M. & Carayol, A., 20 Aug 2018, International Symposium on Mathematical Foundations of Computer Science. p. 1-14 14 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 117).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  399. Published

    Optimisation and validation of a minimum data set for the identification and quality control of EST expression libraries

    Milnthorpe, A. T. & Soloviev, M., 2013, BIOINFORMATICS 2013 - Proceedings of the International Conference on Bioinformatics Models, Methods and Algorithms. p. 278-281 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  400. Published

    Optimistic Fair-Exchange with Anonymity for Bitcoin Users

    Jayasinghe, D., Markantonakis, K. & Mayes, K., 11 Dec 2014, The 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). Guangzhou, China: IEEE Computer Society, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  401. Published

    Or gate Bayesian networks for text classification: A discriminative alternative approach to multinomial naive Bayes

    de Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 2008, Actas del XIV Congreso Español sobre Tecnologías y Lógica Fuzzy. p. 385-390 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  402. Published

    ORC: an Ontology Reasoning Component for Diabetes

    Kafali, O., Sindlar, M., Weide, T. V. D. & Stathis, K., 2013, 2nd International Workshop on Artificial Intelligence and Netmedicine (NetMed'13).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  403. Published

    Organisational cultural factors and strategic sensemaking in the opportunity exploration and exploitation processes

    Wang, C. L., 2007, British Academy of Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  404. Published

    Organisational Success: Fact or Fiction

    Aboutalebi, R., 8 Oct 2009, In: Graduate Conference on Social Sciences and Management, the 3rd Graduate Conference on Social Sciences and Management, 8-9 October 2009, University of Bradford, England.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  405. Published

    Organisational Success: Impacts of Ethic/Values, Organisation’s Social Responsibility, and Culture

    Aboutalebi, R., 5 Nov 2009, In: European Parliament, the 6th Conference on Ethics in Business, Corporate Culture & Spirituality. 5-6 November 2009, European Parliament, Brussels.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  406. Published

    Organizational diversity and shared vision: resolving the paradox of opportunity exploration and exploitation

    Wang, C. L., 2007, Strategic Management Society Special Conference on Entrepreneurship.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  407. Published

    Organizational misfits and positive identity construction: Practitioner-academics as agents of change

    Lam, A., Jul 2018, 34th EGOS Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  408. Published

    Organizing Is Projects for Innovation: A Collective Mindfulness Perspective

    Elbanna, A. & Murray, D., 2009, The 15th Americas Conference on Information Systems . San Francisco

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  409. Published

    Organizing Large Scale Hacking Competitions

    Childers, N., Boe, B., Cavallaro, L., Cavedon, L., Cova, M., Egele, M. & Vigna, G., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  410. Published

    OSI and X.400 security

    Mitchell, C. J., 1990, Proceedings of Network Management '90, London, March 1990. London: Blenheim Online Ltd, p. 157-167 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  411. Published

    OSI and X.400 security

    Mitchell, C. J. & Walker, M., 1989, Proceedings of COMPSEC 89, London, October 1989. Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 145-163 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  412. Published

    Overcoming channel bandwidth constraints in secure SIM applications

    Macdonald, J. A., Sirett, W. G. & Mitchell, C. J., 2005, Security and privacy in the age of ubiquitous computing: Proceedings of IFIP Working Groups 11.2/8.8 Small Systems Security/Smart Cards Working Conference at 20th IFIP International Information Security Conference (SEC 2005), Makuhari-Messe, Chiba, Japan, May 2005. Sasaki, R., Qing, S. & Okamoto, E. (eds.). Springer-Verlag, p. 539–-549

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  413. Published

    Overview of Fossil Beetles

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 153-163

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  414. Published

    Overview of Laserwire Beam Profile and Emittance Measurements for High Power Proton Accelerators

    Gibson, S., Boorman, G., Bosco, A., Gabor, C., Letchford, A., Pozimski, J., Savage, P. & Hofmann, T., 19 Sep 2013, 2nd International Beam Instrumentation Conference: 16-19 September 2013, Oxford, UK. p. 531-534 4 p. TUPF15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  415. Published

    Overview of Security Threats for Smart Cards in the Public Transport Industry

    Markantonakis, K., Mayes, K., Sauveron, D. & Askoxylakis, I. G., 2008, Proceedings of the 2008 IEEE International Conference on e-Business Engineering. Washington, DC, USA: IEEE Computer Society Press, p. 506-513 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. Published

    Packrat middens: archives of desert biotic history

    Elias, S., 1995, Encyclopedia of Environmental Biology. Nierenburg, W. A. (ed.). San Diego, California: Academic Press, Vol. 3. p. 19-35

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  417. Published

    Pairings for elliptic curves over finite commutative rings

    McKee, J. & Galbraith, S. D., 2005, Cryptography and Coding, Cirencester. p. 392-409 (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  418. Published

    PAL+: a lambda-free logical framework

    Luo, Z., 2000, Inter Workshop on Logical Frameworks and Meta-languages (LFM 2000).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  419. Published

    Palaeocurrent data representation in tectonically-driven basins: insight from Ager Basin (Miocene, Spain) and Catanzaro Strait (Pleistocene, Italy)

    Chiarella, D. & Gioia, D., 2013, Geophysical Research Abstracts. Vol. 15. p. 9937

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  420. Published

    Paleoclimatic studies: Insects and climate change

    Elias, S. A., 1996, SYMPOSIUM ON ENVIRONMENTAL APPLICATIONS. BOSTON: AMER METEOROLOGICAL SOC, p. 211-213 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  421. Published

    Paleoecology and Late Quaternary environments of the Colorado Rockies

    Elias, S., 2001, Structure and Function of an Alpine Ecosystem, Niwot Ridge, Colorado. Bowman, W. (ed.). London: Oxford University Press, p. 285-303

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  422. Published

    PANA/GSM authentication for Internet access

    Pagliusi, P. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 146-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  423. Published

    PANA/IKEv2: An Internet authentication protocol for heterogeneous access

    Pagliusi, P. & Mitchell, C. J., 2003, Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. Springer-Verlag, Vol. 2908. p. 135-149 15 p. (Lecture Notes in Computer Science; vol. 2908).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. Published
  425. Published

    Paradoxes of Visibility in Activism: The Inter-play of Online Power Dynamics Between Activists and the State in the Egyptian Revolution

    Azer, E., Zheng, Y. & Harindranath, G., 29 Sep 2018, The 12th Mediterranean Conference on Information Systems. Corfu, Greece

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  426. Published

    Parameter Learning in Bayesian Belief Networks

    Luo, Z. & Gammerman, A., 1992, Proceeding of IPMU'92. p. 25-28

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  427. Published

    Parameterised Multiparty Session Types

    Yoshida, N., Denielou, P-M., Bejleri, A. & Hu, R., 2010, FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATIONAL STRUCTURES, PROCEEDINGS. Ong, L. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 128-145 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  428. Published

    Parameterised Pushdown Systems with Non‐Atomic Writes

    Hague, M., 2011, FSTTCS: Foundations of Software Technology and Theoretical Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  429. Published

    Parameterized Algorithms for Zero Extension and Metric Labelling Problems

    Reidl, F. & Wahlstrom, M., 2018, ICALP 2018 Track A. Vol. 107. p. 94:1-94:14 14 p. (Leibniz International Proceedings in Informatics ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  430. Published

    Parameterized and Approximation Algorithms for the Load Coloring Problem

    Barbero, F., Gutin, G., Jones, M. & Sheng, B., 9 Nov 2015, 10th International Symposium on Parameterized and Exact Computation. Schloss Dagstuhl –Leibniz Center for Informatics, p. 43-54 12 p. (LIPIcs).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  431. Published

    Parameterized Complexity and Kernelizability of Max Ones and Exact Ones Problems

    Kratsch, S., Marx, D. & Wahlström, M., 2010, Mathematical Foundations of Computer Science 2010 : 35th International Symposium, MFCS 2010. Hlinený, P. & Kucera, A. (eds.). Brno, Czech Republic: Springer, Vol. 6281. p. 489-500 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  432. Published

    Parameterized Complexity of Conflict-Free Set Cover

    Jacob, A., Majumdar, D. & Raman, V., 1 Jul 2019, Computer Science – Theory and Applications - 14th International Computer Science Symposium in Russia, CSR 2019, Proceedings. Kucherov, G. & van Bevern, R. (eds.). Springer-Verlag, Vol. 11532 LNCS. p. 191-202 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11532 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  433. Published

    Parameterized Complexity of MaxSat Above Average

    Crowston, R., Gutin, G., Jones, M., Raman, V. & Saurabh, S., 2012, LATIN 2012: Lect. Notes Comput. Sci.. Springer-Verlag, Vol. 7256. p. 184--194

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  434. Published

    Parameterized Complexity of the $k$-Arc Chinese Postman Problem

    Gutin, G., Jones, M. & Sheng, B., 6 Mar 2014, European Symposium on Algorithms 2014. Springer-Verlag, Vol. 8737. p. 530-541 (Lecture Notes in Computer Science; vol. 8737).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  435. Published

    Parameterized Directed k-Chinese Postman Problem and k Arc-Disjoint Cycles Problem on Euler Digraphs

    Gutin, G., Jones, M., Sheng, B. & Wahlström, M., 2014, Proceedings of WG 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  436. Published

    Parameterized Pre-Coloring Extension and List Coloring Problems

    Gutin, G., Majumdar, D., Ordyniak, S. & Wahlström, M., 27 Feb 2020, LIPIcs, Proceedings of STACS 2020. Vol. 154. p. 1-18 18 p. 15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  437. E-pub ahead of print

    Parameterized Resiliency Problems via Integer Linear Programming

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 14 Apr 2017, CIAC 2017, 10th International Conference on Algorithms and Complexity May 26, 2017 - May 28, 2017. Springer, Vol. 10236. p. 164-176 13 p. (Lecture Notes in Computer Science; vol. 10236).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  438. Published

    Parameterized Study of the Test Cover Problem

    Crowston, R., Gutin, G., Jones, M., Saurabh, S. & Yeo, A., 2012, MFCS 2012: Lecture Notes in Computer Science . Vol. 7464. p. 283-295

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  439. Published

    Parameterized Two-Player Nash Equilibrium

    Hermelin, D., Huang, C-C., Kratsch, S. & Wahlström, M., 2011, Graph-Theoretic Concepts in Computer Science : 37th International Workshop, WG 2011. Kolman, P. & Kratochvíl, J. (eds.). Teplá Monastery, Czech Republic: Springer, Vol. 6986. p. 215-226 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  440. Published

    Parent Subsidiary Relationship of EM MNCs: The Chinese Experience

    Rui, H., 2011, Proceedings of the 53rd Annual Meeting of the Academy of International Business: "International Business for Sustainable World Development". Makino, S. & Kiyak, T. (eds.). 2011 Academy of International Business

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  441. Published

    PAriCheck: an efficient pointer arithmetic checker for C programs

    Younan, Y., Philippaerts, P., Cavallaro, L., Sekar, R., Piessens, F. & Joosen, W., 13 Apr 2010, ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. Beijing, China: ACM, p. 145-156 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  442. Published

    Parity to Safety in Polynomial Time for Pushdown and Collapsible Pushdown Systems

    Hague, M., Meyer, R., Muskalla, S. & Zimmermann, M., 20 Aug 2018, International Symposium of Mathematical Foundations of Computer Science. p. 1-15 15 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 117).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  443. Published

    Partial Awareness

    Piermont, E. & Joseph Y. Halpern, 2019, Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  444. Published

    Partial key recovery attacks on XCBC, TMAC and OMAC

    Mitchell, C. J., 2005, Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings. Smart, N. (ed.). Springer-Verlag, Vol. 3796. p. 155-167 13 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  445. Published

    Partially Distribution-Free Learning of Regular Languages from Positive Samples

    Clark, A. & Thollard, F., 2004, Proceedings of COLING. p. 85-91

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  446. Published

    Partially Preserved Colonnades in Greek Architecture: the Probability of Matching Column Drums

    Mustonen, S. & Pakkanen, J., 2004, Making the Connection to the Past. CAA 99: Computer Applications and Quantitative Methods in Archaeology. Proceedings of the 27th Conference, Dublin, April 1999. Fennema, K. & Kamermans, H. (eds.). Leiden, p. 57–59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  447. Published

    Participation, dialogue and curriculum development in school based AIDS education

    McLaughlin, C., Cobbett, M. & Kiragu, S., 2012, AIDS 2012.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  448. Published

    Particle Tracking for the FETS Laser Wire Emittance Scanner

    Pozimski, J. & Gibson, S., 19 Sep 2013, 2nd International Beam Instrumentation Conference. p. 503-506 4 p. TUPF05

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  449. Published

    Path Conditions and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 2014, 19th ACM Symposium on Access Control Models and Technologies. ACM, p. 187-198

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  450. Published

    Path-Contractions, Edge Deletions and Connectivity Preservation

    Gutin, G., Ramanujan, M. S., Reidl, F. & Wahlstrom, M., 3 Sep 2017, The 25th Annual European Symposium on Algorithms (ESA 2017). p. 1-13 13 p. 47. (LIPICS; vol. 87).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  451. Published

    Patient centred approaches to improving self care

    Bradley, C., 2002, Cyberconference: Compliance, concordance and control – Measures to improve outcome [Website not available].

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  452. Published

    Pattern recognition and density estimation under the general i.i.d assumption

    Nouretdinov, I., Vovk, V., Vyugin, M. & Gammerman, A., 2001, Proceedings of the Fourteenth Annual Conference on Computational Learning Theory and Fifth European Conference on Computational Learning Theory. Helmbold, D. & Williamson, B. (eds.). London: Springer, p. 337-353 17 p. (Lecture Notes in Artificial Intelligence; vol. 2111).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  453. Published

    Patterns for Coordination

    Andrade, L. F., Fiadeiro, J. L., Gouveia, J., Lopes, A. & Wermelinger, M., 2000, COORDINATION. Springer, Vol. 1906. p. 317-322 6 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  454. Published

    Pay Cuts vs Downsizing: How job security and Pay level related perceptions affect work attitudes of remaining employees

    Sen Gupta, S. & Yoon, Y. J., 26 Jun 2019, Society for Advancement of Socio Economics Conference . Society for Advancement of Socio Economics, NY, USA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  455. Published

    Perceived Group diversity, Communication, and Social Integration: The Moderating Effect of Group Interdependence and Group Longevity

    Alsolamy, M. & Tsai, C-J., 14 Sep 2015, BAM 2015 Conference Proceedings . British Academy of Management, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  456. Published

    Perceptions of martyrdom and terrorism amongst British Muslims

    Ansari, H., Cinnirella, M., Rogers, M. B., Loewenthal, K. M. & Lewis, C. A., 2006, Proceedings of the British Psychological Society Seminar Series Aspects of Terrorism and Martyrdom. Rogers, M. B., Lewis, C. A., Loewenthal, K. M., Cinnirella, M., Amlôt, R. & Ansari, H. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  457. Published

    Performance Analysis of Reinforcement Learning for Achieving Context Awareness and Intelligence in Mobile Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  458. Published

    Performance analysis of Reinforcement Learning for achieving context-awareness and intelligence in Cognitive Radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings. p. 1046-1053 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  459. Published

    Performance Appraisal: Much ado about nothing

    Edwards, P. & Sen Gupta, S., 2017, Society for Advancement of Socio Economics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  460. Published

    Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element

    Umar, A., Mayes, K. & Markantonakis, K., 20 Feb 2015, 2015 First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  461. Published

    Peroxy radical intercomparison exercise: A joint TOR/OCTA Experiment at Schauinsland 1994

    VoltThomas, A., Gilge, S., Heitlinger, M., Mihelcic, D., Musgen, P., Patz, H. W., Schultz, M., Borrell, P., Borrell, P. M., Slemr, J., Behmann, T., Burrows, J. P., Weissenmayer, M., Arnold, T., Klupfel, T., Perner, D., Cantrell, C. A., Shetter, R., Carpenter, L. J., Clemitshaw, K. C. & 1 others, Penkett, S. A., 1997, PROCEEDINGS OF EUROTRAC SYMPOSIUM '96 - TRANSPORT AND TRANSFORMATION OF POLLUTANTS IN THE TROPOSPHERE, VOL 2. SOUTHAMPTON: COMPUTATIONAL MECHANICS PUBLICATIONS LTD, p. 621-626 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  462. Published

    Pervasive Healthcare Using Self-Healing Agent Environments

    Bromuri, S., Ignaz Schumacher, M. & Stathis, K., 2011, HIGHLIGHTS IN PRACTICAL APPLICATIONS OF AGENTS AND MULTIAGENT SYSTEMS. Perez, JB., Corchado, JM., Moreno, MN., Julian, V., Mathieu, P., CanadaBago, J., Ortega, A. & Caballero, AF. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 159-166 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  463. E-pub ahead of print

    Philanthropy on the Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N. & Mayes, K., 21 Jun 2018, The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017). Springer, p. 25-38 14 p. (Lecture Notes in Computer Science (LNCS); vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  464. Published

    Phoenix: DGA-Based Botnet Tracking and Intelligence

    Schiavoni, S., Maggi, F., Cavallaro, L. & Zanero, S., 10 Jul 2014, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). London: Springer, Vol. 8550. p. 192-211 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  465. Published

    Photonic Crystal Fibre Laser for Electron Beam Emittance Measurement

    Corner, L., Nevay, L. J. & Walczak, R., 1 Dec 2011, IPAC 2011 - 2nd International Particle Accelerator Conference. p. 577-579 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  466. Published

    Photoproduction of neutral strange hadrons at ZEUS

    Boogert, S. & ZEUS Collaboration, 2001, PHOTON 2001. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  467. Published

    Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids

    Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 52-68 17 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  468. Published

    Physiological vs. Social complexity in software design

    Fiadeiro, J. L., 1 Jan 2006, Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS. p. 3 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  469. Published

    Picking vs. Guessing Secrets: A Game-Theoretic Analysis

    Khouzani, A., Mardziel, P., Cid, C. & Srivatsa, M., 2015, IEEE 28th Computer Security Foundations Symposium. p. 243-257 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  470. Published

    PKI implementation issues in B2B e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2003, EICAR Conference Best Paper Proceedings, Copenhagen, Denmark, May 2003. Gattiker, U. E. (ed.). 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  471. Published

    Placing and scaling ethical choices: ethical consumption and ethical public procurement

    Kleine, D., 2013, Proceedings of the 11th Congress of the European Society for Agricultural and Food Ethics. EurSafe

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  472. Published

    Plaintext Recovery Attacks Against SSH

    Albrecht, M. R., Paterson, K. G. & Watson, G. J., 2009, Proceedings of the 2009 30th IEEE Symposium on Security and Privacy: 17-20 May 2009 / Berkley, CA, US. IEEE Computer Society, p. 16-26 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  473. Published

    Plaintext Recovery Attacks Against WPA/TKIP

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. p. 325-349 25 p. (Lecture Notes in Computer Science; vol. 8540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  474. Published

    Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR

    Paterson, K. G. & Watson, G. J., 2010, Advances in Cryptology – EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010: Proceedings. Gilbert, H. (ed.). Springer, p. 345-361 17 p. (Lecture Notes in Computer Science; vol. 6110).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  475. Published

    Plaintext-Recovery Attacks Against Datagram TLS

    Alfardan, N. & Paterson, K., 2012, Network and Distributed System Security Symposium. The Internet Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  476. Published

    Plant macrofossils from rodent middens

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 3. p. 2356-2367

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  477. Published

    Playing with Agent Coordination Patterns in MAGE

    Urovi, V. & Stathis, K., 2010, Lecture Notes in Computer Science. Springer, Vol. 6069. p. 86-101 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  478. Published

    Plug-in martingales for testing exchangeability on-line

    Fedorova, V., Gammerman, A., Nouretdinov, I. & Vovk, V., 2012, Proceedings of the 29th International Conference on Machine Learning (ICML-12). Langford, J. & Pineau, J. (eds.). Omnipress, p. 1639-1646 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  479. Published

    POLE-ZERO SYSTEM-IDENTIFICATION USING GENETIC ALGORITHMS

    FLOCKTON, S. J. & WHITE, M. S., 1993, PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON GENETIC ALGORITHMS. Forrest, S. (ed.). SAN MATEO: MORGAN KAUFMANN PUB INC, p. 531-535 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  480. Published

    Policy Conflict Resolution in IoT via Planning

    Göynügür, E., Bernardini, S., de Mel, G., Talamadupula, K. & Şensoy, M., 2017, Canadian Conference on Artificial Intelligence: AI 2017: Advances in Artificial Intelligence. Springer, Vol. 10233. p. 169-175 7 p. (Lecture Notes in Computer Science; vol. 10233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  481. Published

    Polynomial Kernels and User Reductions for the Workflow Satisfiability Problem

    Gutin, G., Kratsch, S. & Wahlström, M., 2014, Proceedings of IPEC 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  482. Published

    Polynomial Time Learning of Some Multiple Context-Free Languages with a Minimally Adequate Teacher

    Yoshinaka, R. & Clark, A., 2010, Proceedings of Formal Grammar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  483. Published

    Polynomially Closed Co-clones

    Lagerkvist, V. & Wahlström, M., 2014, Proceedings of ISMVL 2014: IEEE 44th International Symposium on Multiple-Valued Logic. IEEE, p. 85-90 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  484. Published

    Position Statement on the Psychological Aspects of Diabetes Education and Care

    Gallichan, M., Anderson, B., Bradley, C., Kilmartin, J., Peyrot, M. & Dunning, T., 2000, International Consensus Position Statements for Diabetes Education. London: Class publishing

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  485. Published

    Postglacial Beetle Records from North America

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 275-286

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  486. Published

    Posturography Platform and Balance Control Training and Research System Based on FES and Muscle Synergies

    Galeano Galeano, D., Brunetti, F., Torricelli, D., Piazza, S. & Pons, J. L., 2013, Neurotechnology, Electronics, and Informatics. Londral, A. R., Encarnação, P. & Pons Rovira, J. L. (eds.). Springer-Verlag, Vol. 13. ( Springer Series in Computational Neuroscience; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  487. Published

    Potential based reward shaping for hierarchical reinforcement learning

    Gao, Y. & Toni, F., 25 Jul 2015, IJCAI'15 Proceedings of the 24th International Conference on Artificial Intelligence. AAAI Press, p. 3504-3510 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  488. Published

    Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.

    Francis, L., Hancke, G. P., Mayes, K. & Markantonakis, K., 2009, ICITST'09. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  489. Published

    POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Aug 2017, USENIX Workshop on Offensive Technologies (WOOT). USENIX, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  490. E-pub ahead of print

    Practical Attacks Against the Walnut Digital Signature Scheme

    Beullens, W. & Blackburn, S., 27 Oct 2018, Advances in Cryptology - ASIACRYPT 2018. Springer, p. 35-61 27 p. (Lecture Notes in Computer Science; vol. 11272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  491. Published

    Practical attacks on proximity identification systems

    Hancke, G., 2006, IEEE Symposium on Security and Privacy . p. 328-333

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  492. Published

    Practical Automated Vulnerability Monitoring Using Program State Invariants

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 23 Jun 2013, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '13). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  493. Published

    Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, Radio Frequency Identification: Security and Privacy Issues: RFIDSec 2010. Ors Yalcin, S. (ed.). Springer Berlin / Heidelberg, Vol. 6370. p. 35-49 15 p. (Lecture Notes in Computer Science; vol. 6370).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  494. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., Nov 2012, The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8. p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  495. Published

    Practical solutions to key escrow and regulatory aspects

    Jefferies, N., Mitchell, C. J. & Walker, M., 1996, Proceedings of Public Key Solutions '96, Zurich, Switzerland, September/October 1996.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  496. Published

    Practical 'what-if?' modelling for resource management of corporate voice-data networks

    Pitts, J., Luo, Z. & Cosmas, J., 1999, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 3842. p. 132-141

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  497. Published

    Practice Makes Perfect: Motivating Confident Privacy Protection Practices

    Coles-Kemp, L. & Kani-Zabihi, E., 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). IEEE, p. 866-871 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  498. Submitted

    Precarity Amongst Service Managers in the NHS: a review in the midst of austerity and Brexit

    Zahmatkesh, M., 2017, (Submitted) 20th Annual Irish Academy of Management Conference 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  499. Published

    Precise Bounds for Montgomery Modular Multiplication and some Potentially Insecure RSA Moduli

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 30-39 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  500. Published

    Precise Instruction-Level Side Channel Profiling of Embedded Processors

    Msgna, M., Markantonakis, K. & Mayes, K., 5 May 2014, Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Vol. 8434. p. 129-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  501. Published

    Precise parameter synthesis for stochastic biochemical systems

    Ceska, M., Dannenberg, F., Kwiatkowska, M. & Paoletti, N., 2014, Computational Methods in Systems Biology. p. 86-98 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution