Home > Publications

Publications

37901 - 38000 out of 41,436Page size: 100
  1. Conference contribution › Research
  2. Published

    Parameterized Directed k-Chinese Postman Problem and k Arc-Disjoint Cycles Problem on Euler Digraphs

    Gutin, G., Jones, M., Sheng, B. & Wahlström, M., 2014, Proceedings of WG 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Parameterized Pre-Coloring Extension and List Coloring Problems

    Gutin, G., Majumdar, D., Ordyniak, S. & Wahlström, M., 27 Feb 2020, LIPIcs, Proceedings of STACS 2020. Vol. 154. p. 1-18 18 p. 15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    Parameterized Resiliency Problems via Integer Linear Programming

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 14 Apr 2017, (E-pub ahead of print) CIAC 2017, 10th International Conference on Algorithms and Complexity May 26, 2017 - May 28, 2017. Springer, Vol. 10236. p. 164-176 13 p. (Lecture Notes in Computer Science; vol. 10236).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Parameterized Study of the Test Cover Problem

    Crowston, R., Gutin, G., Jones, M., Saurabh, S. & Yeo, A., 2012, MFCS 2012: Lecture Notes in Computer Science . Vol. 7464. p. 283-295

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Parameterized Two-Player Nash Equilibrium

    Hermelin, D., Huang, C-C., Kratsch, S. & Wahlström, M., 2011, Graph-Theoretic Concepts in Computer Science : 37th International Workshop, WG 2011. Kolman, P. & Kratochvíl, J. (eds.). Teplá Monastery, Czech Republic: Springer, Vol. 6986. p. 215-226 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Parent Subsidiary Relationship of EM MNCs: The Chinese Experience

    Rui, H., 2011, Proceedings of the 53rd Annual Meeting of the Academy of International Business: "International Business for Sustainable World Development". Makino, S. & Kiyak, T. (eds.). 2011 Academy of International Business

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Pareto Bid Estimation for Multi-Issue Bilateral Negotiation under User Preference Uncertainty

    Bagga, P., Paoletti, N. & Stathis, K., 5 Aug 2021, FUZZ-IEEE 2021. IEEE Xplore

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    PAriCheck: an efficient pointer arithmetic checker for C programs

    Younan, Y., Philippaerts, P., Cavallaro, L., Sekar, R., Piessens, F. & Joosen, W., 13 Apr 2010, ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. Beijing, China: ACM, p. 145-156 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Parity to Safety in Polynomial Time for Pushdown and Collapsible Pushdown Systems

    Hague, M., Meyer, R., Muskalla, S. & Zimmermann, M., 20 Aug 2018, International Symposium of Mathematical Foundations of Computer Science. p. 1-15 15 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 117).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Partial Awareness

    Piermont, E. & Joseph Y. Halpern, 2019, Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Partial key recovery attacks on XCBC, TMAC and OMAC

    Mitchell, C. J., 2005, Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings. Smart, N. (ed.). Springer-Verlag, Vol. 3796. p. 155-167 13 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Partially Distribution-Free Learning of Regular Languages from Positive Samples

    Clark, A. & Thollard, F., 2004, Proceedings of COLING. p. 85-91

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Partially Preserved Colonnades in Greek Architecture: the Probability of Matching Column Drums

    Mustonen, S. & Pakkanen, J., 2004, Making the Connection to the Past. CAA 99: Computer Applications and Quantitative Methods in Archaeology. Proceedings of the 27th Conference, Dublin, April 1999. Fennema, K. & Kamermans, H. (eds.). Leiden, p. 57–59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Participation, dialogue and curriculum development in school based AIDS education

    McLaughlin, C., Cobbett, M. & Kiragu, S., 2012, AIDS 2012.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Particle Tracking for the FETS Laser Wire Emittance Scanner

    Pozimski, J. & Gibson, S., 19 Sep 2013, 2nd International Beam Instrumentation Conference. p. 503-506 4 p. TUPF05

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Path Conditions and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 2014, 19th ACM Symposium on Access Control Models and Technologies. ACM, p. 187-198

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Path-Contractions, Edge Deletions and Connectivity Preservation

    Gutin, G., Ramanujan, M. S., Reidl, F. & Wahlstrom, M., 3 Sep 2017, The 25th Annual European Symposium on Algorithms (ESA 2017). p. 1-13 13 p. 47. (LIPICS; vol. 87).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Patient centred approaches to improving self care

    Bradley, C., 2002, Cyberconference: Compliance, concordance and control – Measures to improve outcome [Website not available].

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Pattern recognition and density estimation under the general i.i.d assumption

    Nouretdinov, I., Vovk, V., Vyugin, M. & Gammerman, A., 2001, Proceedings of the Fourteenth Annual Conference on Computational Learning Theory and Fifth European Conference on Computational Learning Theory. Helmbold, D. & Williamson, B. (eds.). London: Springer, p. 337-353 17 p. (Lecture Notes in Artificial Intelligence; vol. 2111).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Patterns for Coordination

    Andrade, L. F., Fiadeiro, J. L., Gouveia, J., Lopes, A. & Wermelinger, M., 2000, COORDINATION. Springer, Vol. 1906. p. 317-322 6 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Pay Cuts vs Downsizing: How job security and Pay level related perceptions affect work attitudes of remaining employees

    Sen Gupta, S. & Yoon, Y. J., 26 Jun 2019, Society for Advancement of Socio Economics Conference . Society for Advancement of Socio Economics, NY, USA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Unpublished

    Pentecostalism & Politics in Africa: The Case of Zimbabwe

    Zigomo, K., 10 Sep 2018, (Unpublished) Interdisciplinary thematic panels.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Perceived Group diversity, Communication, and Social Integration: The Moderating Effect of Group Interdependence and Group Longevity

    Alsolamy, M. & Tsai, C-J., 14 Sep 2015, BAM 2015 Conference Proceedings . British Academy of Management, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Perceiving the Gravitational Vertical in 3D-Space

    Arshad, I., Gallagher, M. & Ferrè, E. R., Jan 2018, Poster presented at the Experimental Psychology Society January 2019 Meeting, London, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Perceiving the Gravitational-Vertical: Head Versus Torso Contributions to the Aubert Effect

    Arshad, I., Gallagher, M. & Ferrè, E. R., Jan 2018, Poster presented at the Experimental Psychology Society January 2018 Meeting, London, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Perceptions of martyrdom and terrorism amongst British Muslims

    Ansari, H., Cinnirella, M., Rogers, M. B., Loewenthal, K. M. & Lewis, C. A., 2006, Proceedings of the British Psychological Society Seminar Series Aspects of Terrorism and Martyrdom. Rogers, M. B., Lewis, C. A., Loewenthal, K. M., Cinnirella, M., Amlôt, R. & Ansari, H. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Perfect Forests in Graphs and Their Extensions

    Gutin, G. & Yeo, A., 18 Aug 2021, 46th International Symposium on Mathematical Foundations of Computer Science: LIPIcs (Leibniz International Proceedings in Informatics). Schloss Dagstuhl –Leibniz Center for Informatics, p. 1-13 13 p. 54

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Performance Analysis of Reinforcement Learning for Achieving Context Awareness and Intelligence in Mobile Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Performance analysis of Reinforcement Learning for achieving context-awareness and intelligence in Cognitive Radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings. p. 1046-1053 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Performance Appraisal: Much ado about nothing

    Edwards, P. & Sen Gupta, S., 2017, Society for Advancement of Socio Economics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element

    Umar, A., Mayes, K. & Markantonakis, K., 20 Feb 2015, 2015 First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Peroxy radical intercomparison exercise: A joint TOR/OCTA Experiment at Schauinsland 1994

    VoltThomas, A., Gilge, S., Heitlinger, M., Mihelcic, D., Musgen, P., Patz, H. W., Schultz, M., Borrell, P., Borrell, P. M., Slemr, J., Behmann, T., Burrows, J. P., Weissenmayer, M., Arnold, T., Klupfel, T., Perner, D., Cantrell, C. A., Shetter, R., Carpenter, L. J., Clemitshaw, K. C. & 1 others, Penkett, S. A., 1997, PROCEEDINGS OF EUROTRAC SYMPOSIUM '96 - TRANSPORT AND TRANSFORMATION OF POLLUTANTS IN THE TROPOSPHERE, VOL 2. SOUTHAMPTON: COMPUTATIONAL MECHANICS PUBLICATIONS LTD, p. 621-626 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Pervasive Healthcare Using Self-Healing Agent Environments

    Bromuri, S., Ignaz Schumacher, M. & Stathis, K., 2011, HIGHLIGHTS IN PRACTICAL APPLICATIONS OF AGENTS AND MULTIAGENT SYSTEMS. Perez, JB., Corchado, JM., Moreno, MN., Julian, V., Mathieu, P., CanadaBago, J., Ortega, A. & Caballero, AF. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 159-166 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. E-pub ahead of print

    Philanthropy on the Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N. & Mayes, K., 21 Jun 2018, (E-pub ahead of print) The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017). Springer, p. 25-38 14 p. (Lecture Notes in Computer Science (LNCS); vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Phoenix: DGA-Based Botnet Tracking and Intelligence

    Schiavoni, S., Maggi, F., Cavallaro, L. & Zanero, S., 10 Jul 2014, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). London: Springer, Vol. 8550. p. 192-211 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Photonic Crystal Fibre Laser for Electron Beam Emittance Measurement

    Corner, L., Nevay, L. J. & Walczak, R., 1 Dec 2011, IPAC 2011 - 2nd International Particle Accelerator Conference. p. 577-579 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Photoproduction of neutral strange hadrons at ZEUS

    Boogert, S. & ZEUS Collaboration, 2001, PHOTON 2001. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids

    Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 52-68 17 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Physiological vs. Social complexity in software design

    Fiadeiro, J. L., 1 Jan 2006, Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS. p. 3 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Picking vs. Guessing Secrets: A Game-Theoretic Analysis

    Khouzani, A., Mardziel, P., Cid, C. & Srivatsa, M., 2015, IEEE 28th Computer Security Foundations Symposium. p. 243-257 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    PKI implementation issues in B2B e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2003, EICAR Conference Best Paper Proceedings, Copenhagen, Denmark, May 2003. Gattiker, U. E. (ed.). 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Placing and scaling ethical choices: ethical consumption and ethical public procurement

    Kleine, D., 2013, Proceedings of the 11th Congress of the European Society for Agricultural and Food Ethics. EurSafe

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Plaintext Recovery Attacks Against SSH

    Albrecht, M. R., Paterson, K. G. & Watson, G. J., 2009, Proceedings of the 2009 30th IEEE Symposium on Security and Privacy: 17-20 May 2009 / Berkley, CA, US. IEEE Computer Society, p. 16-26 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Plaintext Recovery Attacks Against WPA/TKIP

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. p. 325-349 25 p. (Lecture Notes in Computer Science; vol. 8540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR

    Paterson, K. G. & Watson, G. J., 2010, Advances in Cryptology – EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010: Proceedings. Gilbert, H. (ed.). Springer, p. 345-361 17 p. (Lecture Notes in Computer Science; vol. 6110).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Plaintext-Recovery Attacks Against Datagram TLS

    Alfardan, N. & Paterson, K., 2012, Network and Distributed System Security Symposium. The Internet Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Plant macrofossils from rodent middens

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 3. p. 2356-2367

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Unpublished

    Platforming place narratives with location-based games: playful and participatory storytelling using What3Words

    Lowe, J., 12 Jun 2020, (Unpublished) 20 Years of Seeing with GPS: Perspectives and Future Directions.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Unpublished

    Platformization of Technology dominance: the case study of developing cryptocurrencies on GitHub

    Eshraghian, F. & Hafezieh, N., 2019, (Unpublished) The 6th Innovation in Information Infrastructures Workshop, University of Surrey, Surrey, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Playing with Agent Coordination Patterns in MAGE

    Urovi, V. & Stathis, K., 2010, Lecture Notes in Computer Science. Springer, Vol. 6069. p. 86-101 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Plug-in martingales for testing exchangeability on-line

    Fedorova, V., Gammerman, A., Nouretdinov, I. & Vovk, V., 2012, Proceedings of the 29th International Conference on Machine Learning (ICML-12). Langford, J. & Pineau, J. (eds.). Omnipress, p. 1639-1646 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    POLE-ZERO SYSTEM-IDENTIFICATION USING GENETIC ALGORITHMS

    FLOCKTON, S. J. & WHITE, M. S., 1993, PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON GENETIC ALGORITHMS. Forrest, S. (ed.). SAN MATEO: MORGAN KAUFMANN PUB INC, p. 531-535 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Policy Conflict Resolution in IoT via Planning

    Göynügür, E., Bernardini, S., de Mel, G., Talamadupula, K. & Şensoy, M., 2017, Canadian Conference on Artificial Intelligence: AI 2017: Advances in Artificial Intelligence. Springer, Vol. 10233. p. 169-175 7 p. (Lecture Notes in Computer Science; vol. 10233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Polynomial Kernels and User Reductions for the Workflow Satisfiability Problem

    Gutin, G., Kratsch, S. & Wahlström, M., 2014, Proceedings of IPEC 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Polynomial Time Learning of Some Multiple Context-Free Languages with a Minimally Adequate Teacher

    Yoshinaka, R. & Clark, A., 2010, Proceedings of Formal Grammar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Polynomially Closed Co-clones

    Lagerkvist, V. & Wahlström, M., 2014, Proceedings of ISMVL 2014: IEEE 44th International Symposium on Multiple-Valued Logic. IEEE, p. 85-90 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Position Statement on the Psychological Aspects of Diabetes Education and Care

    Gallichan, M., Anderson, B., Bradley, C., Kilmartin, J., Peyrot, M. & Dunning, T., 2000, International Consensus Position Statements for Diabetes Education. London: Class publishing

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Postglacial Beetle Records from North America

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 275-286

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Post-Quantum Certificates for Electronic Travel Documents

    Pradel, G. & Mitchell, C. J., 24 Dec 2020, Proceedings of DETIPS 2020 (Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy), September 18 2020. Springer, p. 56-73 18 p. (Lecture Notes in Computer Science; vol. 12580).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Posturography Platform and Balance Control Training and Research System Based on FES and Muscle Synergies

    Galeano Galeano, D., Brunetti, F., Torricelli, D., Piazza, S. & Pons, J. L., 2013, Neurotechnology, Electronics, and Informatics. Londral, A. R., Encarnação, P. & Pons Rovira, J. L. (eds.). Springer-Verlag, Vol. 13. ( Springer Series in Computational Neuroscience; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Potential based reward shaping for hierarchical reinforcement learning

    Gao, Y. & Toni, F., 25 Jul 2015, IJCAI'15 Proceedings of the 24th International Conference on Artificial Intelligence. AAAI Press, p. 3504-3510 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Potential Impact of Industry 4.0 in Sustainable Food Supply Chain Environment

    Ojo, O. O., Shah, S., Coutroubis, A., Jimenez, M. T. & Ocana, Y. M., 2 Jul 2018, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 172-177 6 p. 8691223. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.

    Francis, L., Hancke, G. P., Mayes, K. & Markantonakis, K., 2009, ICITST'09. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Aug 2017, USENIX Workshop on Offensive Technologies (WOOT). USENIX, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Power Quality Ancillary Services Support from Customer-owned Electric Vehicles in Low Voltage Distribution Networks

    Luo, H. & Nduka, O., 13 Oct 2020, 2020 IEEE PES Asia-Pacific Power & Energy Engineering Conference (APPEEC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. E-pub ahead of print

    Practical Attacks Against the Walnut Digital Signature Scheme

    Beullens, W. & Blackburn, S., 27 Oct 2018, (E-pub ahead of print) Advances in Cryptology - ASIACRYPT 2018. Springer, p. 35-61 27 p. (Lecture Notes in Computer Science; vol. 11272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Practical attacks on proximity identification systems

    Hancke, G., 2006, IEEE Symposium on Security and Privacy . p. 328-333

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Practical Automated Vulnerability Monitoring Using Program State Invariants

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 23 Jun 2013, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '13). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Practical investment with the long-short game

    Al-Baghdadi, N., Lindsay, D., Kalnishkan, Y. & Lindsay, S., Sep 2020, Conformal and Probabilistic Prediction and Applications: COPA 2020. Proceedings of Machine Learning Research, Vol. 128. p. 209-228 20 p. (Proceedings of Machine Learning Research ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, Radio Frequency Identification: Security and Privacy Issues: RFIDSec 2010. Ors Yalcin, S. (ed.). Springer Berlin / Heidelberg, Vol. 6370. p. 35-49 15 p. (Lecture Notes in Computer Science; vol. 6370).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., Nov 2012, The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8. p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Practical solutions to key escrow and regulatory aspects

    Jefferies, N., Mitchell, C. J. & Walker, M., 1996, Proceedings of Public Key Solutions '96, Zurich, Switzerland, September/October 1996.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Practical 'what-if?' modelling for resource management of corporate voice-data networks

    Pitts, J., Luo, Z. & Cosmas, J., 1999, Proceedings of SPIE - The International Society for Optical Engineering. Vol. 3842. p. 132-141

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Practice Makes Perfect: Motivating Confident Privacy Protection Practices

    Coles-Kemp, L. & Kani-Zabihi, E., 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). IEEE, p. 866-871 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Submitted

    Precarity Amongst Service Managers in the NHS: a review in the midst of austerity and Brexit

    Zahmatkesh, M., 2017, (Submitted) 20th Annual Irish Academy of Management Conference 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Precise Bounds for Montgomery Modular Multiplication and some Potentially Insecure RSA Moduli

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 30-39 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Precise Instruction-Level Side Channel Profiling of Embedded Processors

    Msgna, M., Markantonakis, K. & Mayes, K., 5 May 2014, Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Vol. 8434. p. 129-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Precise parameter synthesis for stochastic biochemical systems

    Ceska, M., Dannenberg, F., Kwiatkowska, M. & Paoletti, N., 2014, Computational Methods in Systems Biology. p. 86-98 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Precise static analysis of untrusted driver binaries

    Kinder, J. & Veith, H., 2010, Proc. 10th Int. Conf. Formal Methods in Computer Aided Design (FMCAD 2010). p. 43-50

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Precision Modelling of Energy Deposition in the LHC using BDSIM

    Walker, S., Abramov, A., Boogert, S., Gibson, S., Pikhartova, H. & Nevay, L., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. MOPRB064

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Predicting Cognitive Recovery of Stroke Patients from the Structural MRI Connectome Using a Naïve Bayesian Tree Classifier

    Dacosta-Aguayo, R., Stephan-Otto, C., Auer, T., Clemente, I., Davalos, A., Bargallo, N., Mataro, M. & Klados, M. A., 2017, Proceedings - 2017 IEEE 30th International Symposium on Computer-Based Medical Systems, CBMS 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-June. p. 413-418 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Prediction of long-range dependent time series data with performance guarantee

    Dashevskiy, M. & Luo, Z., 2009, Stochastic Algorithms: Foundations and Applications, Lecture Notes in Computer Science. Vol. 5792. p. 31-45

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Prediction of Metabolic Transformations using Cross Venn-ABERS Predictors

    Arvidsson, S., Spjuth, O., Carlsson, L. & Toccaceli, P., 31 May 2017, Proceedings of Machine Learning Research. Vol. 60. p. 118-131 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Prediction with advice of unknown number of experts

    Chernov, A. & Vovk, V., 2010, Proceedings of the Twenty Sixth Conference on Uncertainty in Articial Intelligence. Grunwald, P. & Spirtes, P. (eds.). Arlington, VA: AUAI Press, p. 117-125 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Prediction with Confidence Based on a Random Forest Classifier

    Devetyarov, D. & Nouretdinov, I., 2010, Aritificial Intelligence and Innovations: Proceedings od 6th IFIP WG 12.5 International Conference. p. 37-44 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Prediction with expert advice for the Brier game

    Vovk, V. & Zhdanov, F., 2008, Proceedings of the Twenty Fifth International Conference on Machine Learning. McCallum, A. & Roweis, S. (eds.). New York: ACM Press, p. 1104-1111 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Prediction with Expert Advice for Value at Risk

    Dzhamtyrova, R. & Kalnishkan, Y., 28 Sep 2020, Proceedings of The 2020 International Joint Conference on Neural Networks (IJCNN 2020). IEEE, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Prediction with Expert Evaluators' Advice

    Chernov, A. & Vovk, V., 2009, Proceedings of the Twentieth International Conference on Algorithmic Learning Theory. Gavalda, R., Lugosi, G., Zeugmann, T. & Zilles, S. (eds.). Springer, p. 8-22 15 p. (Lecture Notes in Artificial Intelligence; vol. 5809).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Predictions with confidence in applications,

    Dashevskiy, M. & Luo, Z., 2009, Lecture Notes in Computer Science. Vol. 5632. p. 775-786

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Predmetnyi mir v romane D.S. Merezhkovskogo 'Piotr i Aleksei' (iz trilogii 'Khristos i Antikhrist')

    Poljakowa, N., 2005, Stavropol'skii almanakh rossiiskogo obshchestva intellektual'noi istorii: Materialy mezhdunarodnoi nauchnoi konferentsii ''Fakt-Sobytie' v razlichnykh diskursakh' (Piatigorsk, 26-27 Marta 2005. Special Edition ed. Stavropol': Izdatel'stvo Stavropol'skogo Gosudarstvennogo Universiteta, Vol. 8. p. 208-214

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Preferred Cross-continental Strategies

    Aboutalebi, R. & Lobo, R., 27 Jun 2016, In: AIB (Academy of International Business), 58th annual conference of AIB: The Locus of Global Innovation. 27-30 June 2016, New Orleans, Louisiana, U.S.A.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Preforming of fibre bridging for improved damage tolerance

    Potluri, P., Arshad, M., Jetavat, D., Jamshidi, P. & Hogg, P., 1 Dec 2011, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Preprocessing of Min Ones Problems: A Dichotomy

    Kratsch, S. & Wahlström, M., 2010, Automata, Languages and Programming : 37th International Colloquium, ICALP 2010. Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F. & Spirakis, P. G. (eds.). Bordeaux, France: Springer, Vol. 6198. p. 653-665 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Prequential probability: game-theoretic = measure-theoretic

    Vovk, V., 2009, Proceedings of the 2009 Joint Statistical Meetings: Section on Risk Analysis, Session on Predictive and Prequential Statistics. Alexandria, VA: American Statistical Association, p. 3859-3872 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection

    Deo, A., Dash, S., Suarez de Tangil Rotaeche, G., Vovk, V. & Cavallaro, L., 28 Oct 2016, ACM Workshop on Artificial Intelligence and Security. Vienna, Austria: ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Preservation and Reflection in Specification

    Lopes, A. & Fiadeiro, J. L., 1997, AMAST. Springer, Vol. 1349. p. 380-394 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Preservation of coralline-algal reef frameworks

    Bosence, D., 1985, Proceedings of The Fifth International Coral Reef Congress. Gabrie, C. & Harmelin, M. (eds.). Vol. 6. p. 623-628 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    PRESS - a probabilistic reasoning expert system shell

    Luo, Z. & Gammerman, A., 1991, European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Lecture Notes in Computer Science. Kruse, R. & Siegel, P. (eds.). Springer-Verlag, Vol. 548. p. 232-237

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Preventing Failure of Strategy Implementation

    Aboutalebi, R., 28 Oct 2015, In: EAMSA (Euro-Asia Management Studies Association), the 32nd Annual Conference of EAMSA: Theory and Practice in Bringing Europe and Asia- Contemporary Challenges in International Marketing. 28-31 October 2015, SOAS, University of London, England, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Preventing phishing attacks using trusted computing technology

    Alsaid, A. & Mitchell, C. J., 2006, Proceedings of INC 2006, Sixth International Network Conference, Plymouth, UK, July 2006. p. 221-228

    Research output: Chapter in Book/Report/Conference proceedingConference contribution