Home > Publications

Publications

37701 - 37800 out of 42,436Page size: 100
  1. Conference contribution › Research
  2. Published

    Conformal prediction with Neural Networks

    Papadopoulos, H., Vovk, V. & Gammerman, A., 2007, Proceedings of the Nineteenth IEEE International Conference on Tools with Artificial Intelligence. Vol. 2. p. 388-395 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. E-pub ahead of print

    Conformal Predictive Distributions with Kernels

    Vovk, V., Nouretdinov, I., Manokhin, V. & Gammerman, A., 23 Aug 2018, (E-pub ahead of print) Braverman Readings in Machine Learning. Key Ideas from Inception to Current State - International Conference Commemorating the 40th Anniversary of Emmanuil Braverman’s Decease, Invited Talks. Springer-Verlag, Vol. 11100 . p. 103-121 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11100 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Conformal predictor combination using Neyman–Pearson Lemma

    Toccaceli, P., 2019, Proceedings of the Eighth Symposium on Conformal and Probabilistic Prediction and Applications. Proceedings of Machine Learning Research, Vol. 105. p. 66-88 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Conformal Predictors for Compound Activity Prediction

    Toccaceli, P., Nouretdinov, I. & Gammerman, A., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 51-66 16 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Conjuring Bambi: Cuteness, incantation and reclamation in Pascale Petit’s Mama Amazonica

    Harris, C., 1 Oct 2020, Love Spells & Rituals for Another World. Markaki, L. & Harris, C. (eds.). UK, p. 42-47 6 p. (Love Spells & Rituals for Another World).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Connectivity augmentation in tactical mobile ad hoc networks

    Reidt, S. & Wolthusen, S. D., 16 Nov 2008, Proc. 2008 IEEE Military Communications Conference. IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Conquering Generals: an NP-Hard Proof of Useful Work

    Loe, A. & Quaglia, E., 15 Jun 2018, CryBlock'18: Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. ACM, p. 54-59 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Consensus and collision deteotors in wireless ad hoc networks

    Chockler, G., Demirbas, M., Gilbert, S., Newport, C. & Nolte, T., 1 Jan 2005, Proceedings of the 24th annual ACM symposium on Principles of distributed computing (PODC '05). p. 197-206 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Consistency Conditions for a CORBA Caching Service

    Chockler, G., Friedman, R. & Vitenberg, R., 2000, Proceedings of the 14th International Conference on Distributed Computing (DISC '00). Springer-Verlag, p. 374-388 15 p. (Lecture Notes In Computer Science; no. 1914).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Constrained Dynamic Tree Networks

    Hague, M. & Penelle, V., 2018, 12th International Conference on Reachability Problems. Springer International Publishing, p. 45-58 14 p. (Lecture Notes in Computer Science; vol. 11123).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. E-pub ahead of print

    Constrained Hitting Set Problem with Intervals

    Acharyya, A., Keikha, V., Majumdar, D. & Pandit, S., 20 Oct 2021, (E-pub ahead of print) The 27th International Computing and Combinatorics Conference: COCOON 2021. Springer-Verlag, p. 604-616 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Constrained LMS for Dynamic Flow Networks

    Eftaxias, K., Cheong Took, C., Venturini, B. & Arscott, D., 3 Jul 2017, 2017 International Joint Conference on Neural Networks (IJCNN). IEEE, p. 3254-3258 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Constraining Thermal Processing of Carbon-Rich Aggregates in Xenolithic Clasts from Sharps (H3.4) Meteorite

    Kebukawa, Y., Zolensky, ME., Chan, QHS., Fries, M., Steele, A., Kilcoyne, ALD., Rahman, Z. & Cody, GD., 2015, 78th Annual Meeting of the Meteoritical Society. Vol. 1856. 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. E-pub ahead of print

    Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 25 Dec 2016, (E-pub ahead of print) Advances in Network Systems : Architectures, Security, and Applications. AISC ed. Springer-Verlag, Vol. 461. p. 149-166 18 p. (Advances in Intelligent Systems and Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Constraint Branching in Workflow Satisfiability Problem

    Gutin, G. & Karapetyan, D., Jun 2020, SACMAT 2020: Symposium on Access Control Models and Technologies. p. 93-103 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Constraint Expressions and Workflow Satisability

    Crampton, J. & Gutin, G., 2013, 18th ACM SACMAT. p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Forthcoming

    Constraint satisfaction problems parameterized above or below tight bounds: a survey

    Gutin, G. & Yeo, A., 2012, (Accepted/In press) Fellows Festschrift. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection

    Seeger, M., Baier, H., Busch, C. & Wolthusen, S. D., 26 May 2010, Proc. 2010 2nd International Workshop on Security and Communication Networks (IWSCN). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Constructing corporate social responsibility: A discursive and multi-level institutional approach

    Preuss, L. & Schaefer, A., Jul 2011, 27th colloquium of the European Group for Organisation Studies (EGOS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Constructing Key Assignment Schemes from Chain Partitions

    Crampton, J., Daud, R., Martin, K. M., Foresti, S. (ed.) & Jajodia, S. (ed.), 2010, Data and Applications Security and Privacy XXIV. Springer, Vol. 6166. p. 130-145 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Constructing scalable overlays for pub-sub with many topics

    Chockler, G., Melamed, R., Tock, Y. & Vitenberg, R., 1 Jan 2007, Proceedings of the 26th Annual ACM Symposium on Principles of Distributed Computing: PODC 2007. p. 109-118 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    Consumer attention towards brands and products versus human face in video advertisement: An eye tracking study

    Rizvi, W. & Ameen, N., Aug 2020, (E-pub ahead of print) American Marketing Association Summer Academic Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Consumer risk perceptions in e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 308-315 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Consumer-Centric Protection for Online Social Networks

    Akram, R. N., Ko, R. K. L. & Law, T. F., 2014, 1st Workshop on Social Network Security (SocialSec 2014) in conjunction with 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI 2014). Hasan, R. (ed.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Consumers’ Emotional Responses to Brand Extensions: An Examination of the Cognition-Emotion-Action Process Using the Cognitive Appraisal Theory

    Yuen, T. W., He, H. & Nieroda, M., Jun 2019, ISMS Marketing Science Conference 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Consuming Stress: Exploring the Intersection of Female Poverty and Consumption-related Strain

    Hutton, M., 2014, 12th ACR Gender, Marketing and Consumer Behaviour Conference, Aalto University Business School, Helsinki, June 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Consuming Sustainability Narratives

    Haynes, P., 2015, Advances in Consumer Research. Diehl, K. & Yoon, C. (eds.). NA-43 ed. Duluth, MN, Vol. 43. p. 364-367 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Context-aware content-centric collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P. & Clark, T., 2012, Proceedings of the 2nd International Conference on Advanced Collaborative Networks, Systems and Applications (COLLA?12). p. 54-57 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Context-awareness and intelligence in distributed cognitive radio networks: A reinforcement learning approach

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Theory Workshop (AusCTW), 2010 Australian. p. 35-42 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Contextual analysis of word meanings in type-theoretical semantics

    Luo, Z., 2011, Logical Aspects of Computational Linguistics:6th International Conference, LACL 2011, Montpellier, France, June 29 – July 1, 2011: Proceedings. Pogodalla, S. & Prost, J-P. (eds.). Springer, p. 159-174 16 p. (Lecture Notes in Computer Science; vol. 6736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Continuous Beam Energy Measurements at Diamond Light Source

    Vitoratou, N., Karataev, P. & Rehm, G., 29 Jan 2019, International Beam Instrumentation Conference (7th) IBIC2018. JACoW Publishing, p. 107-110 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Unpublished

    Contradictions and tensions in the experience of public sector work: an ethnographic study in UK local government

    Gatenby, M. & Rees, C., Apr 2010, (Unpublished) British Sociological Association (BSA) Annual Conference. Glasgow.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Contribution of Additive Manufacturing Systems to Supply Chain

    Shah, S., Mattiuzza, S., Naghi Ganji, E. & Coutroubis, A., 19 Jul 2017, 2017 International Conference on Industrial Engineering, Management Science and Application, ICIMSA 2017. Institute of Electrical and Electronics Engineers Inc., 7985586. (2017 International Conference on Industrial Engineering, Management Science and Application, ICIMSA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture

    Akram, R. N., Markantonakis, K. & Mayes, K., Oct 2012, The 2012 International Conference on Information and Communications Security (ICICS 2012). Chow, K. P. & Hui, L. C. K. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Coordination: The evolutionary dimension

    Andrade, L. F. & Fiadeiro, J. L., 1 Jan 2001, 38th International Conference on Technology of Object-Oriented Languages and Systems, Components for Mobile Computing. p. 136-147 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Coordination Durative Actions

    Nunes, I., Fiadeiro, J. L. & Turski, W. M., 1997, COORDINATION. Springer, Vol. 1282. p. 115-130 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Coordination for Distributed Business Systems

    Andrade, L. F., Fiadeiro, J. L., Lopes, A. & Wermelinger, M., 2003, CAiSE Workshops. CEUR-WS.org, Vol. 75. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Coordination Technologies for Managing Information System Evolution

    Andrade, L. F. & Fiadeiro, J. L., 2001, CAiSE. Springer, Vol. 2068. p. 374-387 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    CopperDroid: Automatic Reconstruction of Android Malware Behaviors

    Tam, K., Khan, S., Fattori, A. & Cavallaro, L., 7 Feb 2015, NDSS Symposium 2015. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Coreset-based Conformal Prediction for Large-scale Learning

    Riquelme Granada, N., Nguyen, D. K. A. & Luo, Z., Sep 2019, Proceedings of Machine Learning Research: Proceedings of the Eighth Symposium on Conformal and Probabilistic Prediction and Applications. Vol. 105. p. 142-162 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Corporate engagement with the challenge of corruption

    Barkemeyer, R., Preuss, L. & Lee, L., Jan 2014, Africa Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Corporate engagement with the challenge of corruption: An international comparison

    Preuss, L. & Barkemeyer, R., Oct 2011, 10th annual colloquium of the Academy of Business in Society .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Corporate Investment Efficiency: The Role of Financial Development in Firms with Financeing and Agency Issues

    Naeem, K. & Li, M. C., 28 Oct 2018, Proceedings of 10th Economics & Finance Conference, Rome (Italy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Unpublished

    Corporate investment efficiency: The role of financial development in firms with financing constraints and agency issues in OECD non-financial firms

    Li, M. C., 2018, (Unpublished) New York International Business and Social Science Research Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Corporate reporting on corruption: An international comparison

    Barkemeyer, R. & Preuss, L., Aug 2012, Annual Meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Corporate social responsibility and discursive control of corporations

    Schaefer, A. & Preuss, L., Aug 2008, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Corporate social responsibility in the management of supply chains: Toward a holistic framework

    Preuss, L. & Seuring, S., Aug 2008, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Unpublished

    Corporate social responsibility: the challenge for trade unions in Europe

    Preuss, L., Rees, C. & Gold, M., Jun 2012, (Unpublished) British Universities Industrial Relations Association (BUIRA) 62nd Annual Conference. Bradford

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Correspondence between Johann George Roellig and the Court of Anhalt-Zerbst: musical responsibilities in the 1780s and the Swedish connection

    Springthorpe, N., 2015, Fasch Studien 13: 'Zerbst zur Zeit Faschs - ein anhaltinischer Musenhof'', Bericht über die Internationale Wissenschaftliche Konferenz am 17. bis 18. April 2015 im Rahmen der 13. Internationalen Fasch-Festtage in Zerbst. : Fasch-Studien Herausgegeben von der Internationale Fasch-Gesellschaft e.V. Band XIII. Siegmund, B., Musketa, K. & Reul, B. M. (eds.). Beeskow: Ortus Musikverlag, p. 229-246 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Corruption: What do multinationals have to say in the emerging debate?

    Preuss, L. & Barkemeyer, R., Jun 2012, annual meeting of the International Association for Business and Society (IABS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Counter-hegemony in the marketplace: oppositional ideologies and resistant voices of economically constrained women

    Hutton, M., 2016, 41st International Macromarketing Conference, Track: New Consumer Activism(s), Trinity College Dublin, July 13-15th, 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Countering “dead, causal reality”: The fusion of material and metaphysical oppression in Philip Dick’s late work

    Gene-Rowe, F., Jun 2014, Current Research in Speculative Fiction 2014. Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Counting Satisfying Assignments in 2-SAT and 3-SAT

    Dahllöf, V., Jonsson, P. & Wahlström, M., 2002, COCOON. p. 535-543 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Cover Your Cough: Detection of Respiratory Events with Confidence Using a Smartwatch

    Nguyen, D. K. A. & Luo, Z., Jun 2018, Proceedings of Machine Learning Research: Conformal and Probabilistic Prediction and Applications (COPA 2018). Vol. 91. p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Crafting IT jobs through the flexibility of contracting: The case of female contractors in a male-dominated sector

    Panteli, N., 5 Sep 2017, Proceedings of the British Academy of Management Conference, BAM2017: Track: Gender and Management, . The University of Warwick, September 5-7, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Unpublished

    Creating Digital Narrative Artworks: An Expanding Geographical Field

    Lowe, J., 25 Apr 2019, (Unpublished) Innovative Research Methods session at RGS-IBG PGF Mid-Term Conference 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. E-pub ahead of print

    Creative Data Ontology: 'Russian Doll' Metadata Versioning in Film and TV Post-Production Workflows

    Dexiades, C. & Heath, C. P. R., 18 Mar 2021, (E-pub ahead of print) Metadata and Semantic Research. Springer, [Cham], Vol. 1355. p. 204-215 12 p. (Communications in Computer and Information Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Criteria of Efficiency for Conformal Prediction

    Vovk, V., Fedorova, V., Nouretdinov, I. & Gammerman, A., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 23-39 17 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Criterion of calibration for transductive confidence machine with limited feedback

    Nouretdinov, I. & Vovk, V., 2003, Lecture Notes in Articial Intelligence. Vol. 2842. p. 259-267 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Critical phase separation in solid helium isotopic mixtures

    Saunders, J., Cowan, B. & Poole, M., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 358-359 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Unpublished

    Cross-border mergers and the country-of-origin effect: implications for HRM?

    Edwards, T. & Rees, C., Nov 2000, (Unpublished) Association Francophone de Gestion des Ressources Humaines (AGRH) 11th Annual Congress. Paris.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Unpublished

    Cross-border mergers and the country-of-origin effect: trade union responses

    Edwards, T. & Rees, C., Mar 2001, (Unpublished) Wissenschaftszentrum Berlin (WZB) Conference on 'Cross-Border Mergers and Employee Participation in Europe'. Paris.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Cross-cultural Leadership Behavior Adjustment: Expatriate Senior Managers in China

    Tsai, C-J. & Qiao, K., 2017, Academy of Management Annual Meeting (AOM), Atlanta, Georgia, August 4-8. (Awarded Best Paper, HR Division).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2011, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Crossvergence in CSR priorities of developing country firms

    Preuss, L. & Barkemeyer, R., Jan 2014, Africa Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Crowdfunding and social identity in Northern and Latin America

    Kromidha, E., 2016, Proceedings of the 6th Latin American and European Meeting on Organization Studies, 6-9 April 2016 . Viña del Mar, Chile

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Crowdsourcing Lightweight Pyramids for Manual Summary Evaluation

    Shapira, O., Gabay, D., Gao, Y., Ronen, H., Pasunuru, R., Bansal, M., Amsterdamer, Y. & Dagan, I., Jun 2019, Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics, Vol. 1. p. 682-687 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Crusader Perceptions of Byzantium, c.1095 to c.1150

    Phillips, J., 21 Feb 2019, Byzantium and the West: Perception and Reality (C12th to C15th). Chrissis, N., Kolia-Dermitzaki, A. & Papageorgiou, A. (eds.). Abingdon: Routledge

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Cryptanalysis of the EPBC authenticated encryption mode

    Mitchell, C. J., 2007, Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings. Springer-Verlag, Vol. 4887. p. 118-128 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. E-pub ahead of print

    Cryptanalysis of the multivariate encryption scheme EFLASH

    Øygarden, M., Felke, P., Raddum, H. & Cid, C., 14 Feb 2020, (E-pub ahead of print) Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). Springer, p. 85-105 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Cryptanalysis of two variants of PCBC mode when used for message integrity

    Mitchell, C. J., 2005, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Boyd, C. & Gonzalez-Nieto, J. (eds.). Springer-Verlag, Vol. 3574. p. 560-571 12 p. (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    CryptoCache: Network caching with confidentiality

    Leguay, J., Paschos, G., Quaglia, E. & Smyth, B., 31 Jul 2017, 2017 IEEE International Conference on Communications (ICC). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. E-pub ahead of print

    Cryptographic Enforcement of Information Flow Policies Without Public Information

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 9 Jan 2016, (E-pub ahead of print) 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . Malkin, T., Kolesnikov, V., Bishop Lewko, A. & Polychronakis, M. (eds.). p. 389-408 20 p. (Lecture Notes in Computer Science; vol. 9092).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Cryptographic Enforcement of Role-Based Access Control

    Crampton, J., 2010, Proceedings of 7th International Workshop on Formal Aspects of Security and Trust. Springer, p. 191-205 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Cryptographic Protocol Synthesis and Verification for Multiparty Sessions

    Bhargavan, K., Corin, R., Denielou, P-M., Fournet, C. & Leifer, J. J., 2009, PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM. LOS ALAMITOS: IEEE COMPUTER SOC, p. 124-140 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2007, Proceedings of the 12th Nordic Workshop on Secure IT Systems. p. 49-60 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Crystal Structure Prediction via Oblivious Local Search

    Antypov, D., Deligkas, A., Gusev, V., Rosseinsky, M. J., Spirakis, P. G. & Theofilatos, M., 12 Jun 2020, 18th International Symposium on Experimental Algorithms, SEA 2020. Faro, S. & Cantone, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. 21. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 160).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Crystallography of magnetite plaquettes and their significance as asymmetric catalysts for the synthesis of chiral organics in carbonaceous chondrites

    Chan, QHS. & Zolensky, ME., Oct 2015, European Planetary Science Congress 2015, held 27 September - 2 October, 2015 in Nantes, France.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    C-SHORe: A Collapsible Approach to Verifying Higher-Order Programs

    Broadbent, C., Carayol, A., Hague, M. & Serre, O., 25 Sep 2013, ICFP: International Conference on Functional Programming. p. 13-24 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    CSR priorities of emerging economy firms: Is Russia different from the other emerging economies

    Preuss, L. & Barkemeyer, R., Sep 2010, 9th annual colloquium of the Academy of Business in Society (ABIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published
  83. Unpublished

    Culture-Centric Studies of Marketing and Consumption in Brazil

    Ferreira, M. C., Figueiredo, B., Pereira, S. & Scaraboto, D., 2 Jul 2014, (Unpublished) Proceedings of the 39th Annual Macromarketing Conference. Macromarketing Society, Inc., p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Curb Your Enthusiasm: Why the Future is Not Stuxnet

    Haggman, A., 2 Jul 2015, Proceedings of the 14th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, p. 397-403 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Customer Agility Capabilities at EuroBank: The Role of ICT and Organizational Routines

    Hallikainen, P., Merisalo-Rantanen, H. & Elbanna, A., 2017, Australasian Conference on Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Customizing Conventional Patent-based Financial Instruments for Financing Nanotechnology Firms: An Iranian Perspective

    Nasiri, A., 2010, International Conference on Nanotechnology and Biosensors (ICNB). Hong Kong, China

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. E-pub ahead of print

    'Cyber security is a dark art': The CISO as soothsayer

    Da Silva, J. & Jensen, R. B., 25 Feb 2022, (E-pub ahead of print) ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. E-pub ahead of print

    Cybersecurity Readiness of E-tail Organisations: A Technical Perspective

    Shah, M., Muhammad, R. & Ameen, N., 1 Apr 2020, (E-pub ahead of print) Responsible Design, Implementation and Use of Information and Communication Technology: 19th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6–8, 2020, Proceedings, Part I. p. 153-160 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise

    Creese, S., Goldsmith, M., Moffat, N., Happa, J. & Agrafiotis, I., 2013, IEEE Conference on Technologies for Homeland Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Dancing with strangers: observing play, movement and interaction in a public square through the lens of a dancer, a writer and a painter

    Coppard, H., 30 Sep 2014, Children and Families in Changing Urban Spaces conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Dare to innovate by taking care of hurdles to innovation

    Guenther, E., Hueske, A-K., Kesting, P., Linnenluecke, M., Moeller, K. & Preuss, L., Aug 2010, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Data caching as a cloud service

    Chockler, G., Laden, G. & Vigfusson, Y., 2010, Proceedings of the 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS '10). ACM, p. 18-21 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Data Dependent Power Use in Multipliers

    Walter, C. D. & Samyde, D., 2005, 17th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 4-12 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Data Integrity in Hardware for Modular Arithmetic

    Walter, C. D., 2000, CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1965. p. 204-215 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Data Is a Stream: Security of Stream-Based Channels

    Fischlin, M., Günther, F., Marson, G. A. & Paterson, K., 1 Aug 2015, Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Gennaro, R. & Robshaw, M. (eds.). Springer Verlag, Vol. 9216. p. 545-564 20 p. (Lecture Notes in Computer Science; vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Data Structures for Constraint Enforcement in Role-Based Systems

    Crampton, J. & Khambhammettu, H., 2005, Proceedings of the 2005 IASTED Conference on Network and Information Security. p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. E-pub ahead of print

    Data-Driven Robust Control for Type 1 Diabetes Under Meal and Exercise Uncertainties

    Paoletti, N., Liu, K. S., Smolka, S. A. & Lin, S., 1 Sep 2017, (E-pub ahead of print) Computational Methods in Systems Biology. Feret, J. & Koeppl, H. (eds.). Springer, p. 214-232 19 p. (Lecture Notes in Computer Science; vol. 10545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Dataset Construction and Analysis of Screenshot Malware

    Sbai, H., Happa, J., Goldsmith, M. & Meftali, S., 29 Dec 2020, International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. DCM 4.0: Integration of Industry 4.0 and Demand Chain in Global Manufacturing

    Ganji, E. N., Coutroubis, A. & Shah, S., 13 Aug 2018, 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8436383. (2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

    Weldehawaryat, G., Ambassa, P., Marufu, A., Wolthusen, S. & Kayem, A. V. D. M., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 69-86 18 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. E-pub ahead of print

    Decidable Models of Integer-Manipulating Programs with Recursive Parallelism

    Hague, M. & Lin, A., 13 Sep 2016, (E-pub ahead of print) Reachability Problems: 10th International Workshop, RP 2016, Aalborg, Denmark, September 19-21, 2016, Proceedings. Springer International Publishing, Vol. 9899. p. 148-162 15 p. (Lecture Notes in Computer Science; vol. 9899).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution