Home > Publications

Publications

38201 - 38300 out of 40,915Page size: 100
  1. Conference contribution › Research
  2. Published

    Two Edge Modification Problems without Polynomial Kernels

    Kratsch, S. & Wahlström, M., 1 Sep 2009, Parameterized and Exact Computation : 4th International Workshop, IWPEC 2009. Chen, J. & Fomin, F. V. (eds.). Denmark, Copenhagen: Springer, Vol. 5917. p. 264-275 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Two Proposals for Improving the Image-Based Authentication System: H-IBAS-H

    Vuksanovic, B. & Al-Sinani, H., 2009, INTERNET-09: First International Conference on Evolving Internet, Cannes/La Bocca, French Riviera, France, August 23-29 2009 . Washington: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Two's Company, Three's a Crowd: Consensus-Halving for a Constant Number of Agents

    Deligkas, A., Filos-Ratsikas, A. & Hollender, A., 18 Jul 2021, ACM Conference on Economics and Computation: EC '21. p. 347-368 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Two-Stage Classification Model to Detect Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 113-120 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Typed Operational Semantics for Dependent Record Types

    Feng, Y. & Luo, Z., 2011, Proceedings of Types for Proofs and Programs (TYPES'09), EPTCS 53.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Type-theoretic semantics for SemNet

    Shiu, S., Luo, Z. & Garigliano, R., 1996, Proc. of Inter. Conf. on Formal and Applied Practical Reasoning, LNAI 1085.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Type-Theoretical Semantics with Coercive Subtyping

    Luo, Z., 2010, Semantics and Linguistic Theory. Vol. 20. p. 38-56 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures

    Bilal, Z. & Martin, K. M., 2013, Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. IEEE, p. 304-309

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Unboundedness and downward closures of higher-order pushdown automata

    Hague, M., Kochems, J. & Ong, C-H. L., 11 Jan 2016, Principles of Programming Languages: POPL '16. New York, NY: ACM, p. 151-163 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Understanding and developing role-based administrative models

    Crampton, J., 2005, Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Understanding knowledge management software acquisition in organisations: A conceptual framework

    Le-Nguyen, K., Harindranath, G. & Dyerson, R., 2007, PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2007, SECTIONS 1-6. KAOHSIUNG: NATL SUN YAT-SEN UNIV, p. U1096-U1108 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Understanding knowledge management software-organisation misalignments from an institutional perspective: A case study of a global IT-management consultancy firm

    Le-Nguyen, K., Harindranath, G. & Dyerson, R., 2008, 12TH PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS (PACIS 2008). KOWLOON: CITY UNIVERSITY HONG KONG, p. 85A-+ 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Understanding Subcultures and Change Dynamics in E-Government: An Empirical Study of a Local Government in Malaysia

    Jackson, S. & Wong, K., 11 Jul 2015, 10th Annual Midwest Association for Information Systems Conference, Pittsburg, Kansas. Vol. 23. p. 1-3 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Understanding the creation of ICT-value in the building and construction industry

    Linderoth, H. C. J. & Elbanna, A., 5 Sep 2016, Proceedings of the 32nd Annual ARCOM Conference, 5-7 September 2016, Manchester, UK. Vol. 1. p. 103-112 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Understanding the dynamic process of emerging ICT adoption in UK service SMEs

    Eze, S., Duan, Y. & Jackson, S., 2011, UK Academy for Information Systems Conference Proceedings .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Understanding the experience-centeredness of security and privacy technologies

    Dunphy, P., Vines, J., Coles-Kemp, L., Clarke, R., Vlachokyriakos, V., Wright, P., McCarthy, J. & Olivier, P., 2014, Proceedings of the 2014 New Security Paradigms Workshop. . ACM, p. 83-94 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Understanding the Impact of ICT Adoption and Use in South African Manufacturing and Logistics SMEs: A Firm, Market and Regulatory (FMR) Context Perspective

    Gono, S., Harindranath, G. & Özcan, G. B., Nov 2014, Proceedings of the 2014 ISBE Conference, Manchester, 5-6 Nov 2014. ISBE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Understanding the implementation of social standards in global supply chains: A multi-dimensional analysis

    Soundararajan, V., Sep 2013, 27th annual British Academy of Management (BAM) Conference . Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Understanding the Indian Film Industry: the good, the bad and the ugly

    Sen Gupta, S., 2016, Knowledge Organisation and Learning Conference. London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Understanding the organo-carbonate associations in carbonaceous chondrites with the use of micro-Raman analysis

    Chan, QHS. & Zolensky, ME., 2015, European Planetary Science Congress 2015, held 27 September - 2 October, 2015 in Nantes, France. 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Unfolding in particle physics: a window on solving inverse problems

    Spano, F., Oct 2014, contribution to Top2013, 6th International Workshop on Top Quark Phyiscs, 14th-19th September 2013 , Durbach, Germany. Husemann, U., Mildner, H. & Roscher, F. (eds.). Verlag Deutsches Elektronen-Synchrotron, Vol. DESY-PROC-2014-02. p. 256-261 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Unified Model for Data Security -- A Position Paper

    Akram, R. N. & Ko, R. K. L., 1 Sep 2014, The 1st International Workshop on the Emerging Future Internet and Network Security (IEEE EFINS 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Aiash, M. & Loo, J. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Uniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent

    Cohen, L. & Rowe, R., 4 Sep 2018, 27th EACSL Annual Conference on Computer Science Logic (CSL 2018). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 119. p. 17:1-17:16 16 p. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Uniform, integral and efficient proofs for the determinant identities

    Tzameret, I. & Cook, S., 18 Aug 2017, 2017 32nd Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). IEEE, Vol. 32. p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Unifying Theories in Different Institutions

    Arrais, M. & Fiadeiro, J. L., 1996, COMPASS/ADT. Springer, Vol. 1130. p. 81-101 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Unique View of C Asteriod Regolith from the Jbilet Winselwan CM Chondrite

    Zolensky, M., Mikouchi, T., Hagiya, K., Ohsumi, K., Komatsu, M., Chan, Q. HS., Le, L., Kring, D., Cato, M. & Fagan, A. L., 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Universal portfolio selection

    Vovk, V. & Watkins, C. J. H. C., 1998, Proceedings of the Eleventh Annual Conference on Computational Learning Theory. New York: ACM Press, p. 12-23 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Universal Probability-Free Conformal Prediction

    Vovk, V. & Pavlovic, D., 2016, Proceedings of COPA 2016: Fifth Symposium on Conformal and Probabilistic Prediction with Applications. Springer, Vol. 9653. p. 40-47 8 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Universal well-calibrated algorithm for on-line classification

    Vovk, V., 2003, Proceedings of the Sixteenth Annual Conference on Learning Theory and Seventh Kernel Workshop. Scholkopf, B. & Warmuth, M. K. (eds.). p. 358-372 15 p. (Lecture Notes in Artificial Intelligence; vol. 2777).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Unknown quantum operations

    Schack, R., 2004, Quantum Theory: Reconsideration of Foundations 2. A., K. (ed.). Växjö: Växjö University Press, p. 507-518

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Unknown Quantum States and Operations, a Bayesian View

    Fuchs, C. A. & Schack, R., 2004, Quantum State Estimation: Lecture Notes in Physics {\bf 649}. Řeháček, J. & Paris, M. G. A. (eds.). Berlin: Springer Verlag, p. 147-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Unraveling the complexities of interdisciplinary software engineering

    Mehandjiev, N., Layzell, P. & Brereton, P., 2004, ELEVENTH ANNUAL INTERNATIONAL WORKSHOP ON SOFTWARE TECHNOLOGY AND ENGINEERING PRACTICE, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 214-221 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Unrestricted Faithful Rounding is Good Enough for Some LNS Applications

    Arnold, M. G. & Walter, C. D., 2001, 15th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Unsupervised Induction of Stochastic Context Free Grammars with Distributional Clustering

    Clark, A., 1 Jul 2001, Proc. of Conference on Computational Natural Language Learning. p. 105-112

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Upgrading Technological Capabilities by Developing Country Multinational Companies

    Rui, H. & Cuervo-Cazurra, A., 2013, Proceedings of the 55th Annual Meeting of the Academy of International Business: "Bridging the Divide: Linking IB to Complementary Disciplines and Practice". McDougall-Covin, P. & Kiyak, T. (eds.). 2013 Academy of International Business, p. 277-278 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Upgrading Technological Capabilities by Developing Country Multinational Companies

    Rui, H. & Cuervo-Cazurra, A., 2013, The 73rd Annual Meeting of the Academy of Management: “Capitalism in Question”. Academy of Management

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Uranium and metal concentrations in community water systems across the United States, 2006-2011

    Ravalli, F., Yu, Y., Bostick, B. C., Chillrud, S. N., Schilling, K., Basu, A., Navas-Acien, A. & Nigra, A. E., 2021, International Society for Environmental Epidemiology (ISEE) annual meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Submitted

    USAGE PATTERNS AND CHALLENGES OF MULTIPURPOSE COMMUNITY TELECENTRES IN MALAWI

    Kapondera, S. K. & Chigona, W., 2017, (Submitted) SIG Global Development.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Use of Satisfaction-Satisfaction Matrix (SSM) to evaluate E-Government services from the perspective of Japanese citizens and government service providers

    Wong, K., Nishimoto, H., Nishigaki, Y. & Jackson, S., 2013, 24th Australasian Conference on Information Systems, Melbourne, AU, 04 - 06 Dec.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    User acceptance of electronic commerce: lessons learned from the Bled eConference

    van der Heijden, H., 2012, 25th Special Anniversary Proceedings of the Bled eConference,. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    User acceptance of emergency alert technology: A case study

    Wu, P. F., 1 Jan 2009, ISCRAM 2009 - 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Information Systems for Crisis Response and Management, ISCRAM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 22 Oct 2020, Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press, p. 664-672 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    User Preference Analysis of Internet Social Media services

    Pant, V., Harindranath, G. & Wagner, W. P., 13 Jan 2016, 2015 International Conference on Information Resource Management (Conf-IRM), Ottawa, Canada, May.. Vol. 34.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    User satisfaction evaluation of Malaysian e-government education services

    Wong, M. S. & Jackson, S., 5 Feb 2018, 23rd IEEE International Technology Management Conference, Madeira Island, Portugal. IEEE, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Using Argument-based Features to Predict and Analyse Review Helpfulness

    Liu, H., Gao, Y., Lv, P., Li, M., Geng, S., Li, M. & Wang, H., Sep 2017, Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Copenhagen, Denmark: Association for Computational Linguistics, p. 1358–1363 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Using explicit state to describe architectures

    Lopes, A. & Fiadeiro, J. L., 1999, FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING. Finance, JP. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-160 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Using multiple chains for Gibbs sampling in mixed graphical association models

    Brewer, M., Luo, Z. & Gammerman, A., 1994, Computational Statistics. p. 185-189

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Using NLG and sensors to support personal narrative for children with complex communication needs

    Black, R., Reddington, J., Reiter, E., Tintarev, N. & Waller, A., 2010, Proceedings of the NAACL HLT 2010 Workshop on Speech and Language Processing for Assistive Technologies. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    USING SATELLITES FOR PROVIDING BROADBAND ISLAND INTERCONNECTION-THE RACE IIlR2074 (CATALYST) PROJECT

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, AIAA International Communications Satellite Systems Conference, 15 th, San Diego, CA. p. 407-412 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Using the Choice Framework to Situate Cases of Collective Action in Capabilities Thinking: The Example of Public Procurement

    Kleine, D., Jun 2013, Maitreyee - e-Journal of the Human Development and Capability Association. Human Development and Capability Association (HDCA), p. 15-18 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Using Verification Technology to Specify and Detect Malware

    Holzer, A., Kinder, J. & Veith, H., Feb 2007, 11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers. Springer, p. 497-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Utilisation de la méthode de la matrice R dans les calculs de l'ionisation d'atomes par impact d'électrons rapides

    Mota-Furtado, F., O'Mahony, P. & Hennecart, D. (ed.), 1989, Proceedings of Invited Lectures presented at 12ème Colloque sur la Physique des Collisions Atomiques et Electroniques (Caen, 21-24 June 1988), Conférences Invitées. Vol. 2. p. 101-117

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Utilising Geological Field Measurements and Historic Eruption Volumes to Estimate the Volume of Santorini's Magma Chamber

    Browning, J., Drymoni, K. & Gudmundsson, A., 2015, American Geophysical Union, Fall Meeting 2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Valid Probabilistic Prediction of Life Status after Percutaneous Coronary Intervention procedure

    Volkhonskiy, D., Nouretdinov, I., Gammerman, A. & Lim, P., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Validating an Insider Threat Detection System: A Real Scenario Perspective

    Agrafiotis, I., Erola, A., Happa, J., Goldsmith, M. & Creese, S., 4 Aug 2016, IEEE Security and Privacy Workshop on Research for Insider Threat. IEEE, p. 286-295 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Validation of a Seven Serum Biomarker Panel in Ovarian Cancer

    Timms, J. F., Arslan-Low, E., Cubizolles, M., Lomas, L., Yip, C., Meng, X-Y., Hogdall, E., Gentry-Maharaj, A., Ford, J., Burford, B., Nouretdinov, I., Vovk, V., Luo, Z., Menon, U., Gammerman, A., Fung, E. T. & Jacobs, I., 2007, Proceedings of the 15th International Meeting of the European Society of Gynaecological Oncology.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Variability and rigour in Service Computing engineering

    Ter Beek, M. H., Gnesi, S., Fantechi, A. & Fiadeiro, J. L., 1 Jan 2012, Proceedings - 2011 34th IEEE Software Engineering Workshop, SEW 2011. p. 122-127 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Varying Representation Schemata vs Fact Updating in KB Management

    Carapuça, R. & Fiadeiro, J. L., 1986, DS-2. p. 71-87 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Venn-Abers predictors

    Vovk, V. & Petej, I., 2014, Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence. p. 829-838 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Veraci fizioni. Sullo statuto della letteratura nella cultura delle Corti

    Jossa, S., 2010, A. Quondam (ed.), Classicismo e culture di Antico regime (Roma: Bulzoni, 2010). Quondam, A. (ed.). Bulzoni, p. 197-212 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Verifying Asynchronous Interactions via Communicating Session Automata

    Lange, J. & Yoshida, N., 12 Jul 2019, Computer Aided Verification - 31st International Conference, CAV 2019, Proceedings. Dillig, I. & Tasiran, S. (eds.). Springer Verlag, p. 97-117 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11561 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Vers une architecture modulaire d'agent argumentatif pour la composition de services

    Morge, M., McGinnis, J., Bromuri, S., Toni, F. C., Mancarella, P. & Stathis, K., 1 Nov 2006, Proc. of the of 15th Journees Francophones sur les Systemes M ulti-Agents (JFSMA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Dec 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, p. 391-398 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Virtual infrastructure for collision-prone wireless networks

    Chockler, G., Gilbert, S. & Lynch, N., Aug 2008, Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing. Toronto, ON, Canada: ACM, p. 233-242 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Virtual Interacting Network Community: Exploiting Multi-core Architectures to Increase Security

    Baiardi, F. & Sgandurra, D., 2008, Proceedings of the 5th Conference on Computing Frontiers. New York, NY, USA: ACM, p. 111-112 2 p. (CF '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Visible-Spectrum Biometric Retina Recognition

    Borgen, H., Bours, P. & Wolthusen, S. D., 15 Aug 2008, Proc. 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP '08). IEEE Computer Society Press, p. 1056-1062

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Visualizing narratives: The case of the celebrity CEO (Panel discussion)

    Reppel, A. & Kravets, O., 7 Jul 2016, Proceedings of the 41st Annual Macromarketing Conference. p. 107-108

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    vPlanSim: An Open Source Graphical Interface for the Visualisation and Simulation of AI Systems

    Roberts, J., Mastorakis, G., Lazaruk, B., Franco Aixela, S., Stokes, A. & Bernardini, S., 17 May 2021, The 31st International Conference on Automated Planning and Scheduling (ICAPS 2021). 1 ed. Vol. 31. p. 486-490 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Walrasian Equilibria in Markets with Small Demands

    Deligkas, A., Melissourgos, T. & Spirakis, P. G., May 2021, International Conference on Autonomous Agents and Multiagent Systems: AAMAS '21. p. 413-419 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Warlordism and the making of the Roman imperial army

    Rankov, B., 2018, Warlords and Interstate Relations in the Ancient Mediterranean. Naco del Hoyo, T. & Lopez Sanchez, F. (eds.). Leiden/Boston MA: E. J. Brill, p. 415-25 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Water Logging in Keshanbpur: A Focus to the Coping Strategies of the People

    Adri, N. & Islam, I., 2010, Proceedings of International Conference on Environmental aspects of Bangladesh (ICEAB 10). Japan, p. 33-36 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    We Crashed, Now What?

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 3 Oct 2010, Proceedings of the 6th Workshop on Hot Topics in System Dependability (HotDep'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Weak Synchrony Models and Failure Detectors for Message Passing (k-)Set Agreement

    Biely, M., Robinson, P. & Schmid, U., 2009, Principles of Distributed Systems, 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings. p. 285-299 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Weak Transitivity in Coercive Subtyping

    Luo, Y., Luo, Z. & Soloviev, S., 2003, Types for Proofs and Programs, Proc. of Inter Conf of TYPES'02. LNCS 2646. p. 220--239

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Tileria, M., Blasco, J. & Suarez-Tangil, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Web based student information management system in universities: experiences from Mzuzu University

    Lubanga, S. C., Chawinga, W. D., Majawa, F. & Kapondera, S., 2018, Standing Conference of the Eastern, Central and Southern Africa Librarians and Institutions (SCESCAL).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Web Password Recovery: A Necessary Evil?

    Al Maqbali, F. & Mitchell, C. J., 2019, Proceedings of the Future Technology Conference (FTC) 2018, Volume 2: Vancouver, November 2018. Springer-Verlag, p. 324-341 18 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Web Server on a SIM Card

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2010, Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. Ao, S. I., Gelman, L., Hukins, D. WL., Hunter, A. & Korsunsky, A. M. (eds.). Newswood Limited, Vol. I. p. 253-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Weighted Kernel Regression for Predicting Changing Dependencies

    Busuttil, S. & Kalnishkan, Y., 2007, Machine Learning: ECML 2007, 18th European Conference on Machine Learning: volume 4701 of Lecture Notes in Computer Science. Springer, p. 535-542 (Lecture Notes in Computer Science; vol. 4701).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Wellbore instability during plasma-torch drilling in geothermal reservoirs

    Bazargan, M., Meredith, P., Forbes Inskip, N., Gudmundsson, A., Soliman, M., Habibpour, M., Rezaei, A. & Browning, J., 2015, 49th US Rock Mechanics / Geomechanics Symposium, San Francisco, CA, USA.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Well-calibrated predictions from online compression models

    Vovk, V., 2003, Proceedings of the Fourteenth International Conference on Algorithmic Learning Theory. Gavalda, R., Jantke, K. & Takimoto, E. (eds.). Berlin: Springer, p. 268-282 15 p. (Lecture Notes in Artificial Intelligence; vol. 2842).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution