Home > Publications

Publications

38001 - 38100 out of 41,436Page size: 100
  1. Conference contribution › Research
  2. Published

    Preventing relay attacks in mobile transactions using infrared light

    Gurulian, I., Akram, R., Markantonakis, K. & Mayes, K., 3 Apr 2017, SAC '17 Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, p. 1724-1731 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Prime and Prejudice: Primality Testing Under Adversarial Conditions

    Albrecht, M., Massimo, J., Paterson, K. & Somorovsky, J., 8 Oct 2018, CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. p. 281-298 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Priorities in corporate sustainability reporting: Does East meet West, does South converge on North?

    Barkemeyer, R. & Preuss, L., Aug 2011, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Priors in Quantum Bayesian Inference

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J. -A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 255-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. E-pub ahead of print

    PRISM-PSY: Precise GPU-Accelerated Parameter Synthesis for Stochastic Systems

    Ceska, M., Pilar, P., Paoletti, N., Brim, L. & Kwiatkowska, M., 9 Apr 2016, (E-pub ahead of print) Tools and Algorithms for the Construction and Analysis of Systems. Chechik, M. & Raskin, J-F. (eds.). p. 367-384 18 p. (Lecture Notes in Computer Science; vol. 9636).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Privacy Risks in Resource Constrained Smart Micro-Grids

    Ambassa, P. L., Kayem, A. V. D. M., Wolthusen, S. D. & Meinel, C., 23 Jul 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2018. Ogiela, L., Enokido, T., Ogiela, M. R., Javaid, N., Barolli, L. & Takizawa, M. (eds.). Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 527-532 6 p. 8418124

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Privacy Violations in Constrained Micro-Grids: Adversarial Cases

    Ambassa, P., Kayem, A. V. D. M., Meinel, C. & Wolthusen, S., 19 May 2016, Proceedings of the 2016 30th International Conference on Advanced Information Networking and Applications Workshops (AINA 2016). IEEE Press, p. 601-606 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Privacy-preserving biometric matching using homomorphic encryption

    Pradel, G. & Mitchell, C., 22 Oct 2021, Proceedings: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China. Zhao, L., Kumar, N., Hsu, R. C. & Zou, Z. (eds.). Los Alamitos: IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Private Outsourced Kriging Interpolation

    Alderman, J., Curtis, B., Farràs Ventura, O., Martin, K. & Ribes-González, J., 7 Apr 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 75-90 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Probabilistic Contract Compliance for Mobile Applications

    Dini, G., Martinelli, F., Saracino, A. & Sgandurra, D., 1 Sep 2013, 2013 International Conference on Availability, Reliability and Security. p. 599-606 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Probabilistic Naming of Functions in Stripped Binaries

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Dec 2020, Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020. Association for Computing Machinery, Inc, p. 373-385 13 p. 3427265. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Probabilistic Reasoning in Mixed Models Using Bayesian Belief Networks and Its Application

    Luo, Z., 1992, Proceedings of 10th European Conference on Artificial Intelligence (ECAI 92),. p. 3-7

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion

    Al-Kuwari, S. & Wolthusen, S. D., May 2010, Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference (CMS 2010). Springer-Verlag, p. 16-27

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Probability theory for the Brier game

    Vovk, V., 1997, Proceedings of the Workshop on Algorithmic Learning Theory. Li, M. & Maruoka, A. (eds.). Springer, p. 323-338 16 p. (Lecture Notes in Computer Science; vol. 1316).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Procrustes Analysis of Diffusion Tensor Data

    Zhou, D., Dryden, IL., Koloydenko, A. & Bai, L., 2009, Proceedings 17th Scientific Meeting, International Society for Magnetic Resonance in Medicine.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Producing Enactable Protocols in Artificial Agent Societies

    Lekeas, G., Kloukinas, C. & Stathis, K., 18 Nov 2011, Agents in Principle, Agents in Practice (PRIMA'11). p. 311-322 (Lecture Notes in Computer Science; vol. 7047/2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Program specification and data refinement in type theory

    Luo, Z., 1991, Proc. of the Fourth Inter. Joint Conf. on the Theory and Practice of Software Development (TAPSOFT), LNCS 493.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Programmable Hash Functions in the Multilinear Setting

    Freire, E. S. V., Hofheinz, D., Paterson, K. G. & Striecks, C., Aug 2013, CRYPTO 2013 (1). Canetti, R. & J. G. (eds.). Springer, Vol. 8042. p. 513-530 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    PROGRESS TOWARDS AN ELECTRONIC ARRAY ON LIQUID HELIUM

    Rees, D. G., Glasson, P., Meeson, P. J., Simkins, L. R., Antonov, V., Frayne, P. G. & Lea, M. J., 2008, CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPRINTRONICS. Takayanagi, H., Nitta, J. & Nakano, H. (eds.). SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 353-358 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. E-pub ahead of print

    Proof Assistants for Natural Language Semantics

    Chatzikyriakidis, S. & Luo, Z., 10 Nov 2016, (E-pub ahead of print) Logical Aspects of Computational Linguistics. Celebrating 20 Years of LACL (1996–2016) : 9th International Conference, LACL 2016, Nancy, France, December 5-7, 2016, Proceedings. Springer Heidelberg, Vol. 10054. p. 85-98 14 p. (Lecture Notes in Computer Science; vol. 10054).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Proof complexity lower bounds from algebraic circuit complexity

    Forbes, M., Shpilka, A., Tzameret, I. & Wigderson, A., 19 May 2016, 31st Conference on Computational Complexity (CCC 2016). Dagstuhl, Germany: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 50. p. 1-17 17 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 50).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Proof-theoretic conceptual modeling – the NIAM case-study

    SERNADAS, C., FIADEIRO, J., MEERSMAN, R. & SERNADAS, A., 1989, INFORMATION SYSTEM CONCEPTS : AN IN-DEPTH ANALYSIS. FALKENBERG, ED. (ed.). AMSTERDAM: ELSEVIER SCIENCE PUBL B V, p. 1-30 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    PROSOCS: a platform for programming software agents in computational logic

    Stathis, K., Kakas, A. C., Lu, W., emetriou, N. D., Endriss, U. & Bracciali, A., 1 Apr 2004, Proceedings of the Fourth International Symposium ``From Agent Th eory to Agent Implementation'' (AT2AI-4 -- EMCSR'2004 Session M). Müller, J. & Petta, P. (eds.). p. 523-528 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. E-pub ahead of print

    Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting

    Fraser, A. & Quaglia, E., 8 Oct 2020, (E-pub ahead of print) SAC 2020 proceedings. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    PROTOSS: A run time tool for detecting PRivacy viOlaTions in Online Social networkS (Short Paper)

    Kafali, O., Gunay, A. & Yolum, P., 2012, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Prototyping symbolic execution engines for interpreted languages

    Bucur, S., Kinder, J. & Candea, G., Feb 2014, ASPLOS '14: Proceedings of the 19th international conference on Architectural support for programming languages and operating systems. ACM, p. 239-254 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Mitchell, C. J., 3 Apr 2021, Security and Privacy: Select Proceedings of ICSP 2020. Stănică, P., Gangopadhyay, S. & Debnath, S. K. (eds.). Singapore: Springer-Verlag, p. 151-162 12 p. (LNEE; vol. 744).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Provably Secure Key Assignment Schemes from Factoring

    Freire, E. S. V. & Paterson, K. G., 2011, ACISP. Parampalli, U. & Hawkes, P. (eds.). Springer, Vol. 6812. p. 292-309 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Provenance of Mesozoic sandstones in the Banda Arc, Indonesia

    Zimmermann, S. & Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-301 1-13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Proving memory safety of floating-point computations by combining static and dynamic program analysis

    Godefroid, P. & Kinder, J., 2010, Proc. 19th Int. Symp. Software Testing and Analysis (ISSTA 2010). ACM, p. 1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Proving Random Formulas in Propositional Logic

    Tzameret, I. & Muller, S., 2013, Logic Across the University: Foundations and Application: Proceedings of the Tsinghua Logic Conference. van Benthem, J. & Liu, F. (eds.). London: College Publications London, Vol. 47. p. 201-208 8 p. (Studies in Logic).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Provisioning Software with Hardware-Software Binding

    Lee, R., Markantonakis, K. & Akram, R., 29 Aug 2017, FARES '17 Proceedings of the 12th International Workshop on Frontiers in Availability, Reliability and Security. ACM, p. 1-9 9 p. 49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Proximity Assurances Based on Natural and Artificial Ambient Environments

    Gurulian, I., Markantonakis, K., Shepherd, C., Frank, E. & Akram, R., 2017, 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. Springer, p. 83-103 21 p. (Security and Cryptology; vol. 10543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Proximity-1 simulating the CCSDS Proximity-1 protocol for ExoMars

    Blommestijn, R., Lange, J., Taylor, C. & Winton, A., 2009, Proceedings of DASIA 2009 Conference on DAta Systems In Aerospace. (European Space Agency, (Special Publication) ESA SP; vol. 669 SP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure

    Ronen, E., Paterson, K. G. & Shamir, A., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1397-1414 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 May 2012, 5th International Conference on New Technologies, Mobility and Security (NTMS). Mana, A. & Klonowski, M. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    PSInSAR remote sensing observations of deformation behaviour at Salisbury Plain, UK

    Agar, S. A., Lawrence, J. A., Ghail, R. C., Mason, P. J. & Thompson, S., 16 Sep 2018, Engineering in Chalk - Proceedings of the Chalk 2018 Conference. Lawrence, J. A., Preene, M., Lawrence, U. L. & Buckley, R. (eds.). ICE Publishing, p. 269-274 6 p. (Engineering in Chalk - Proceedings of the Chalk 2018 Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    PsycoTrace: Virtual and Transparent Monitoring of a Process Self

    Baiardi, F., Maggiari, D., Sgandurra, D. & Tamberi, F., 1 Feb 2009, 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing. p. 393-397 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    PTaCL: A Language for Attribute-Based Access Control in Open Systems

    Crampton, J. & Morisset, C., 2012, POST 2012: Principles of Security and Trust - First International Conference. Degano, P. & Guttman, J. (eds.). Springer, p. 390-409 20 p. (Lecture Notes in Computer Science; vol. 7215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Public sector ICT management strategy and its impact on e-government: A case study

    Stea, B. & Harindranath, G., 2006, Proceedings of the 2006 European Conference on Information Systems (ECIS), Gothenburg, Sweden. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Pulsed-Disk-Laser welding of Ti6Al4V

    Mastrocinque, E., Corrado, G., Caiazzo, F., Pasquino, N. & Sergi, V., 2011, Ninth International Conference on Advanced Manufacturing Systems and Technology. p. 383-393

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries

    Grubbs, P., Lacharité, M. S., Minaud, B. & Paterson, K. G., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 315-331 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Pyg4ometry: A Tool to Create Geometries for Geant4, BDSIM, G4Beamline and FLUKA for Particle Loss and Energy Deposit Studies

    Boogert, S., Abramov, A., Albrecht, J., D'Alessandro, G. L., Nevay, L., Shields, W. & Walker, S., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 3244-3247 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Qualified predictions for large data sets in the case of pattern recognition

    Papadopoulos, H., Vovk, V. & Gammerman, A., 2002, Proceedings of the International Conference on Machine Learning and Applications. Wani, M., Arabnia, H., Cios, K., Hafeez, K. & Kendall, G. (eds.). CSREA Press, p. 159-163 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Qualified predictions for proteomics pattern diagnostics with confidence machines

    Luo, Z., Bellotti, T. & Gammerman, A., 2004, Lecture Notes in Computer Science . Vol. 3177. p. 46-51

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Qualified probabilistic predictions using graphical models

    Luo, Z. & Gammerman, A., 2005, Lecture Notes in Artificial Intelligence. Vol. 3571. p. 111-122

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Unpublished

    Quality management strategies and employee participation in Europe

    Rees, C., Jul 1994, (Unpublished) Industrial Relations in the European Community (IREC) Conference on 'Multinational Companies and the Future of Collective Bargaining'. Dublin.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Quality of Life: Psychological dimensions of health

    Bradley, C., 1998, Royal Holloway Report. Royal Holloway, University of London, p. 17

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Quantifying and qualifying trust: Spectral decomposition of trust networks

    Pavlovic, D., 2011, Proceedings of FAST 2010. Degano, P., Etalle, S. & Guttman, J. (eds.). Springer-Verlag, Vol. 6561. p. 1-17 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Quantitative Concept Analysis

    Pavlovic, D., 2012, Formal Concept Analysis: 10th International Conference, ICFCA 2012, Leuven, Belgium, May 7-10, 2012: Proceedings. Domenach, F., Ignatov, D. I. & Poelmans, J. (eds.). Springer, p. 260-277 18 p. (Lecture Notes in Computer Science; vol. 7278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. E-pub ahead of print

    Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving

    Kirshanova, E., Mårtensson, E., Postlethwaite, E. & Roy Moulik, S., 25 Nov 2019, (E-pub ahead of print) Advances in Cryptology -- ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Springer, p. 521-551 31 p. (Lecture Notes in Computer Science; vol. 11921).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Quantum and classical structures in nondeterministic computation

    Pavlovic, D., 2009, Proceedings of Quantum Interaction 2009. Bruza, P., Sofge, D. & Rijsbergen, K. V. (eds.). Springer-Verlag, Vol. 5494. p. 143-158 16 p. (Lecture Notes in Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Quantum computing with separable states?

    Schack, R., 2001, Macroscopic Quantum Coherence and Quantum Computing. Averin, D. V., Ruggiero, B. & Silvestrini, P. (eds.). New York: Kluwer, p. 285

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. E-pub ahead of print

    Quantum cryptanalysis on contracting feistel structures and observation on related-key settings

    Cid, C., Hosoyamada, A., Liu, Y. & Sim, S. M., 8 Dec 2020, (E-pub ahead of print) Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings. Bhargavan, K., Oswald, E. & Prabhakaran, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 373-394 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12578 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Quantum crystals: from quantum plasticity to supersolidity

    Balibar, S., Haziot, A. & Rojas, X., 2011, QUANTUM SENSING AND NANOPHOTONIC DEVICES VIII. Razeghi, M., Sudharsanan, R. & Brown, GJ. (eds.). SPIE - INT SOC OPTICAL ENGINEERING, 7 p. (Proceedings of SPIE; vol. 7945).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Quantum Theory and Global Optimisation

    Audenaert, K., 2004, Sixteenth International Symposium on Mathematical Theory of Networks and Systems (MTNS2004), Mini-Symposium on Quantum Information, Catholic University of Leuven, Belgium, 5-9 July 2004.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Quaternary life on land

    Elias, S., 2002, Encyclopaedia of Life Sciences. London: Nature Publishing Group, Vol. 15. p. 739-742

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    R&D internationalisation of developing country firms: the case of China

    Rui, H., 2014, Proceedings of the 56th Annual Meeting of the Academy of International Business: Local contexts in Global Business. Meyer, K. & Kiyak, T. (eds.). 2014 Academy of International Business, p. 176 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    r/Coronavirus and the Viral Pandemic: A source of truth, comfort and companionship during COVID19

    Cole, J., van de Ven, C., Sharkey, C. M., Williamson, P., Doherty, P. & Robb, F., 13 May 2021, CHI EA '21: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. Kitamura, Y., Quigley, A., Isbister, K. & Igarashi, T. (eds.). NY, USA: Association for Computing Machinery (ACM), p. 1-6 6 p. 153

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Random planar graphs with n nodes and a fixed number of edges

    Gerke, S., McDiarmid, C., Steger, A. & Weissl, A., 2005, PROCEEDINGS OF THE SIXTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS. PHILADELPHIA: SIAM, p. 999-1007 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Randomized Rounding for Routing and Covering Problems: Experiments and Improvements

    Doerr, B., Künnemann, M. & Wahlström, M., 2010, Experimental Algorithms : 9th International Symposium, SEA 2010. Festa, P. (ed.). Naples, Italy: Springer, Vol. 6049. p. 190-201 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Randomized Rounding in the Presence of a Cardinality Constraint

    Doerr, B. & Wahlström, M., 2009, 2009 Proceedings of the Eleventh Workshop on Algorithm Engineering and Experiments (ALENEX). Finocchi, I. & Hershberger, J. (eds.). New York, USA: SIAM, p. 162-174 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Ranking Bracelets in Polynomial Time

    Adamson, D., Gusev, V., Potapov, I. & Deligkas, A., 30 Jun 2021, Symposium on Combinatorial Pattern Matching: CPM 2021. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 191. p. 1-17 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Ransomclave: Ransomware Key Management using SGX

    Bhudia, A., O'Keeffe, D., Sgandurra, D. & Hurley-Smith, D., 17 Aug 2021, 10th International Workshop on Cyber Crime (IWCC 2021): In proceedings of the International Conference on Availability, Reliability and Security (ARES 2021). p. 1-10 10 p. 58

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    RBAC administration in distributed systems

    Dekker, M., Crampton, J. & Etalle, S., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 93--102 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    RBSLA based implementation for architectural management laws

    Alghamdi, A., Fiadeiro, J. L. & Paschke, A., 1 Jan 2008, Innovations'07: 4th International Conference on Innovations in Information Technology, IIT. p. 556-560 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. E-pub ahead of print

    Reactive and Proactive Standardisation of TLS

    Paterson, K. & Merwe, T. V. D., 2 Nov 2016, (E-pub ahead of print) Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings. Chen, L., McGrew, D. A. & Mitchell, C. (eds.). Springer Verlag, Vol. 10074. p. 160-186 27 p. (Lecture Notes in Computer Science; vol. 10074).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Reactive/proactive connectivity management in a tactical service-oriented infrastructure

    Lopes, R. R. F., Nieminen, M., Viidanoja, A. & Wolthusen, S., 26 Jun 2017, Proceedings of the 2017 International Conference on Military Communications and Information Systems (ICMCIS 2017). IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Reading order independent grouping proof for RFID tags

    Lien, Y., Leng, X., Mayes, K. & Chiu, J-H., 2008, ISI. p. 128-136 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Ready, Steady, Go! Altered Gravity Influences Responses to Environmental Stimuli

    Arshad, I. & Ferrè, E. R., 2021, Experimental Psychology Society .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Reality of Big Data Adoption in Supply Chain for Sustainable Manufacturing SMEs

    Shah, S. & Wiese, J., 13 Aug 2018, 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8436343. (2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. E-pub ahead of print

    Realizability in Cyclic Proof: Extracting Ordering Information for Infinite Descent

    Rowe, R. & Brotherston, J., 30 Aug 2017, (E-pub ahead of print) TABLEAUX 2017: Automated Reasoning with Analytic Tableaux and Related Methods. Springer, p. 295-310 16 p. (Lecture Notes in Computer Science; vol. 10501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Reasonable Doubts, Unspoken Fears: Reassessing the Trial Film's "Heroic Age"

    Langford, B., Apr 2019, Trial Films on Trial: Law, Justice, and Popular Culture. Sarat, A., Silbey, J. & Umphrey, M. M. (eds.). University of Alabama Press, p. 81-110 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Reasoning About Exceptions to Contracts

    Kafali, O., Toni, F. & Torroni, P., 2011, Computational Logic in Multi-Agent Systems (CLIMA XII). Vol. 6814. p. 225-242 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Reasoning about plan robustness versus plan cost for partially informed agents

    Keren, S., Bernardini, S., Kwapong, K. & Parkes, D. C., Sep 2020, Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning. International Joint Conferences on Artificial Intelligence, p. 550-559 10 p. 64

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Reasoning in time with uncertain information

    Ramparany, F., Lorquet, V., Bouyssounous, B., Bigham, J. & Luo, Z., 1994, IFAC/IFIP/IMACS Symposium on Artificial Intelligence in Real Time Control.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Unpublished

    Reassuring Literary Legitimacy of Traditional Chinese Theatre Texts Through Translation Database Research

    Li, X., 21 Jul 2019, (Unpublished) Fourth International Symposium: Dialogue between Chinese Language Teaching and Culture and the Arts.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Recent BDSIM Related Developments and Modeling of Accelerators

    Nevay, L., Abramov, A., Alden, S., Boogert, S., D'Alessandro, G. L., Gibson, S., Lefebvre, H., Shields, W., Walker, S., Gnacadja, E., Hernalsteens, C., Ramoisiaux, E., Tesse, R. & Liu, S. L., 22 Aug 2021, 12th International Particle Accelerator Conference 2021. Campinas, SP, Brazil: JACoW Publishing, p. 4208-4211 4 p. THPAB214

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Recent Developments in Beam Delivery Simulation - BDSIM

    Nevay, L., Abramov, A., Boogert, S., Garcia Morales, H., Gibson, S., Shields, W., Walker, S. & Snuverink, J., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. THPAK025

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Recent research on Roman dams in the Near East

    Kamash, Z., 2006, Cura Aquarum in Ephesus: Proceedings of the 12th International Conference on the History of Water Management and Hydraulic Engineering, Ephesus, 2-10 October 2004. Leuven: Peeters Press, p. 233-238

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Recent Results on Non-invasive Beam Size Measurement Methods Based on Polarization Currents

    Mazzoni, S. & Karataev, P., 29 Jan 2019, International Beam Instrumentation Conference (7th) IBIC2018. JACoW Publishing, p. 464-467 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Forthcoming

    Reciprocity norms in online knowledge sharing: A conceptual analysis

    Wu, P. & Preece, J., 16 Mar 2016, (Accepted/In press) The 76th Annual Meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Recognising lifestyle activities of diabetic patients with a smartphone

    Lustrek, M., Kvetkovic, B., Mirchevska, V., Kafali, R., Romero Lopez, A. & Stathis, K., 3 Aug 2015, Pervasive Health 2015 : Workshop on Personal Health Systems for Chronic Diseases (PHSCD 2015). p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Recognition of hypoxia with a preset confidence level based on EEG analysis

    Zhang, J., Li, G., Meng, H., Li, J. & Luo, Z., Jun 2008, IEEE International Joint Conference on Neural Networks, 2008. p. 3005-3008

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    RECON: a Robust multi-agent Environment for simulating COncurrent Negotiations

    Alrayes, B., Kafali, O. & Stathis, K., 2014, In Seventh International Workshop on Agent-based Complex Automated Negotiations (ACAN), AAMAS: best student paper award.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast

    Chockler, G., Demirbas, M., Gilbert, S., Lynch, N. A., Newport, C. C. & Nolte, T., 2005, Proceedings of the 4th International Workshop on Assurance in Distributed Systems and Networks (ADSN '05): ICDCS Workshops. p. 42-48 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Reconfigurable Distributed Storage for Dynamic Networks

    Chockler, G., Gilbert, S., Gramoli, V., Musial, P. & Shvartsman, A., 2005, Proceedings of the 9th International Conference on Principles of Distributed Systems (OPODIS '05). Springer-Verlag, p. 351-365 15 p. (Lecture Notes in Computer Science; vol. 3974).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Reconfigurable state machine replication from non-reconfigurable building blocks

    Bortnikov, V., Chockler, G., Roytman, A., Shachor, S., Shnayderman, I. & Perelman, D., 2012, Proceedings of the 31st Annual ACM Symposium on Principles of Distributed Computing. ACM, p. 93-94 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Reconstructing the temple of Apollo on the Palatine hill in Rome

    Claridge, A., Nov 2014, Reconstruction and the Historic City: Rome and Abroad - an interdisciplinary approach. Haeuber, C., Winder, G. M. & Schuetz, F-X. (eds.). (Beitraege Wirtschaftsgeographie Muenchen ; vol. 6).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Reconstruction of fundamental SUSY parameters

    Zerwas, P. M., Blair, G. A., Choi, S. Y., Freitas, A., Kalinowski, J., Marlyn, H. U., Moortgat-Pick, G. & Porod, W., 2002, ICHEP 2002, PROCEEDINGS. AMSTERDAM: Elsevier Science Publishers B.V. (North-Holland), 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Reconstruction of Structural Controllability over Erdös-Rényi Graphs via Power Dominating Sets

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR '14). ACM Press, p. 57 60 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Recovering from Lost Digital Wallet

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 4th IEEE International Symposium on Trust, Security, and Privacy for Emerging Applications (TSP-13). Y. Xiang, F. G. M. & Ruj, S. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths

    Walter, C. D., 2008, CHES 2008. Oswald, E. & Rohatgi, P. (eds.). Springer, Vol. 5154. p. 214-227 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs in the Presence of Compromised Nodes

    Alwasel, B. & Wolthusen, S., 18 May 2016, Proceedings of the 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015). Springer-Verlag, Vol. 9578. p. 105-119 15 p. (Lecture Notes in Computer Science; vol. 9578).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs via Partial Control Structure Re-Use

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th International Conference on Critical Information Infrastructures Security (CRITIS 2014). Springer-Verlag, p. 293-307

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Recovery of Structural Controllability for Process Control Systems

    Alcaraz, C. & Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47 63 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. E-pub ahead of print

    Recurrent Auto-Encoder Model for Large-Scale Industrial Sensor Signal Analysis

    Wong, T. & Luo, Z., 27 Jul 2018, (E-pub ahead of print) International Conference on Engineering Applications of Neural Networks: EANN 2018. Pimenidis, E. & Jayne, C. (eds.). Springer, p. 203-216 14 p. (Communications in Computer and Information Science; vol. 893).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Reducing Normative Conflicts in Information Security

    Pieters, W. & Coles-Kemp, L., 2011, NSPW '11: Proceedings of the 2011 New security paradigms workshop, 12-15 Sep 2011, Marin County, CA. . ACM, p. 11-24 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Reducing the Space Requirements of Instant Replay

    Levrouw, L. J. & Audenaert, K., 1993, Proc. of the ACM/ONR Workshop on Parallel and Distributed Debugging. San Diego: ACM, p. 205-207

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Re-Evaluating SMEs IT Readiness in the Age of the Cloud

    Dyerson, R. & Spinelli, R., Sep 2017, 2017 Proceedings of the European Conference on Information Management and Evaluation, Genoa.. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution