Home > Publications

Publications

39101 - 39200 out of 42,944Page size: 100
  1. Conference contribution › Research
  2. Published

    Multi-Dimensional Causal Discovery

    Schaechtle, U., Stathis, K. & Bromuri, S., 3 Aug 2013, Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence: Beijing, China, 3-9 August 2013. Rossi, F. (ed.). p. 1649-1655

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Multigraph Critical Infrastructure Model

    Schneidhofer, B. & Wolthusen, S., 2016, Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers. Springer-Verlag, Vol. 485. p. 149-167 19 p. (IFIP Advances in Information and Communication Technology; vol. 485).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Multi-level Access in Searchable Symmetric Encryption

    Alderman, J., Martin, K. & Renwick, S., 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 35-52 18 p. (Lecture Notes in Computer Science; vol. 10323).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Multilinear Maps from Obfuscation

    Albrecht, M., Farshim, P., Hofheinz, D., Larraia, E. & Paterson, K., 19 Dec 2015, Theory of Cryptography. Kushilevitz, E. & Malkin, T. (eds.). Springer, p. 446-473 27 p. (Lecture Notes in Computer Science; vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Multiparty Compatibility in Communicating Automata: Characterisation and Synthesis of Global Session Types

    Denielou, P-M. & Yoshida, N., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II: ICALP (2). 2013 ed. Springer, Vol. 7966. p. 174 186 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Multiparty Session Types Meet Communicating Automata

    Deniélou, P-M. & Yoshida, N., 2012, Programming Languages and Systems: 21st European Symposium on Programming, ESOP 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012: Proceedings. Seidl, H. (ed.). Springer, p. 194-213 20 p. (Lecture Notes in Computer Science; vol. 7211).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Unpublished

    Multiple countries response to oil price shocks and illiquidity shocks

    Said, H. & Giouvris, E., 2017, (Unpublished) 43rd International Business Research Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Multiple lexicalisation (a Java based study)

    Scott, E. & Johnstone, A., 20 Oct 2019, ACM Digital Library: Proceedings of Software Language Engineering 2019. ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Multiple Pulse Resonantly Enhanced Laser Plasma Wakefield Acceleration

    Corner, L., Walczak, R., Nevay, L. J., Dann, S., Hooker, S. M., Bourgeois, N. & Cowley, J., 2012, ADVANCED ACCELERATOR CONCEPTS. Zgadzaj, R., Gaul, E. & Downer, MC. (eds.). MELVILLE: AMER INST PHYSICS, p. 872-873 2 p. (AIP Conference Proceedings; vol. 1507).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Multiple sequence alignment based on new approaches of tree construction and sequences comparison

    Solovyev, V., Streletc, V. B., Milanesi, L., Lim, H. (ed.), Fickett, J. (ed.), Cantor, C. (ed.) & Robbins, R. (ed.), 1993, Proceedings of the 2nd International conference on Bioinformatics, Supercomputing, and Complex genome analysis.. World Scientific, p. 419-428

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Multiprobabilistic Venn Predictors with Logistic Regression

    Nouretdinov, I., Devetyarov, D., Burford, B., Camuzeaux, S., Gentry-Maharaj, A., Tiss, A., Smith, C., Luo, Z., Chervonenkis, A., Hallett, R., Vovk, V., Waterfield, M., Cramer, R., Timms, J. F., Jacobs, I., Menon, U. & Gammerman, A., 2012, Artificial Intelligence Applications and Innovations - AIAI 2012 International Workshops: AIAB, AIeIA, CISE, COPA, IIVC, ISQL, MHDW, and WADTMB, Halkidiki, Greece, September 27-30, 2012, Proceedings, Part II. Iliadis, L., Maglogiannis, I., Papadopoulos, H., Karatzas, K. & Sioutas, S. (eds.). Springer, Vol. 382. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Multiproxy Constraints on Redox Conditions of ~2.7 Ga Oceans

    Yang, J., Zerkle, A., Grassineau, N., Nisbet, E., Izon, G., Hunter, M. & Martin, T., 2016, Goldschmidt Conference 2016. p. 03F

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Forthcoming

    Multi-Round Attacks on Structural Controllability Properties for Non-Complete Random Graphs

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, (Accepted/In press) Proceedings of the 16th Information Security Conference (ISC 2013). Springer-Verlag, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Multi-Shot Distributed Transaction Commit

    Chockler, G. & Gotsman, A., 4 Oct 2018, 32nd International Symposium on Distributed Computing (DISC 2018). Springer-Verlag, p. 1-18 18 p. (LIPIcs–Leibniz International Proceedings in Informatics ; vol. 121).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Music as Function: Biofeedback in Games for Health

    Plans, E. & Plans, D., 10 Apr 2016, Ludomusicology - Videogame Music Research Group.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    My Beautiful Self’: an Exploration of the Effects of Advertising Campaigns on Female Empowerment

    Longo, C. & Türe, M., 2016, NA - Advances in Consumer Research . Vol. 44. p. 747-747 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. E-pub ahead of print

    Nanothermometry of electrons and phonons

    Weng, Q., Puttock, R., Barton, C., Panchal, V., Yang, L., An, Z., Kajihara, Y., Lu, W., Tzalenchuk, A. & Komiyama, S., 29 Oct 2018, (E-pub ahead of print) 2018 43rd International Conference on Infrared Millimeter and Terahertz Waves, IRMMW-THz 2018. IEEE Computer Society, Vol. 2018-September. 3 p. 8509939

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Narratives of Vulnerability: Disrupted and Unequal Consumption Lives of Ex-offenders

    Hutton, M., 2019, 52nd Academy of Marketing Conference, July, Regents University, London.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Nature vs Grammar: Annibal Caro's Apologia as a Manifesto for Orality

    Jossa, S., 24 Feb 2016, Interactions between Orality and Writing in Early Modern Italian Culture. Degl'Innocenti, L., Richardson, B. & Sbordoni, C. (eds.). Routledge

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Navigating the Sacred and the Profane: An Inquiry of ‘Askesis’ Emergent in Daily Lives and Grounded in Wisdom Traditions.

    Tzouramani, E. & Karakas, F., 2016, 11th Organization Studies Workshop, May 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Forthcoming

    Naxos di Sicilia: nuovi dati sulla città del V secolo a.C.

    Lentini, M. C. & Pakkanen, J., 2015, (Accepted/In press) La Città e le città della Sicilia antica. Atti delle Ottave Giornate Internazionali di studio sull’area elima e la Sicilia occidentale nel contesto mediterraneo. Pisa, Scuola Normale Superiore, 18-21 dicembre 2012, Pisa. Ampolo, C. (ed.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Naxos of Sicily in the 5th Century BC: New Research

    Lentini, M. C., Pakkanen, J. & Sarris, A., Dec 2015, Greek Colonisation: New Data, Current Approaches: Proceedings of the Scientific Meeting held in Thessaloniki (6 February 2015). Adam-Veleni, P. & Tsangari, D. (eds.). Athens: Alpha Bank, p. 23–35 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Near and yet So Far: Distance-Bounding Attacks in Wireless Networks

    Clulow, J., Hancke, G., Kuhn, M. G. & Moore, T., 2006, European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS). Springer-Verlag, Vol. 4357. p. 83-97

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. E-pub ahead of print

    Near-linear-time, Optimal Vertex Cut Sparsifiers in Directed Acyclic Graphs

    He, Z., Li, J. & Wahlström, M., 3 Jul 2021, (E-pub ahead of print) Proceedings of ESA 2021. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, p. 1-14 14 p. 52

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Negotiating expatriate identity in the global era: Implications on expatriate performance

    Li, C. & Zhang, L. E., 1 Jan 2015, Academy of Management Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Neighbourhood morphology and solar irradiance in relation to urban climate

    Mohajeri, N., Gudmundsson, A., Assouline, D. & Scartezzini, J., 2015, ICUC9 - The 9th International Conference on Urban Climate. ICUC9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Nella terra di Dante

    Jossa, S. & Gesù, M. D. (ed.), 2009, Letteratura, identità, nazione. Palermo: duepunti, p. 41-58 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Neo-Archaean Palaeo-Environmental Changes Determined by Microbial Activities Using Stable Isotopic Compositions

    Grassineau, N., Yang, J., Zerkle, A. & Nisbet, E., 12 Dec 2017, American Geophysical Union Fall Annual Meeting. New Orleans, p. B23F-05 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Neogene extension on Seram: A new tectonic model for the northern Banda Arc

    Pownall, J. & Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-305 1-17

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    NetVis: a visualization tool enabling multiple perspectives of network traffic data

    Peters, D., Slawinski, A., Spoor, T., Vicol, S., Happa, J., Goldsmith, M. & Creese, S., 2013, Proceedings of the 31st conference on Theory and Practice of Computer Graphics, Eurographics UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Network as a computer: ranking paths to find flows

    Pavlovic, D., 2008, Proceedings of CSR 2008. Razborov, A. & Slissenko, A. (eds.). Springer-Verlag, Vol. 5010. p. 384-397 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Network provider domain federation in TINA

    Pavón, J., Montes, E. & Komisarczuk, P., 1997, Global Convergence of Telecommunications and Distributed Object Computing, 1997. Proceedings., TINA 97. p. 334-342 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Network structure and the cultural evolution of linguistic structure: A group communication experiment

    Raviv, L., Meyer, A. & Lev - Ari, S., 2020, Ravignani, A. and Barbieri, C. and Martins, M. and Flaherty, M. and Jadoul, Y. and Lattenkamp, E. and Little, H. and Mudd, K. and Verhoef, T. (Eds) Evolution of Language: Proceedings of the 13th International Conference (EvoLang13). Brussels, Belgium..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Network traffic demand prediction with confidence

    Dashevskiy, M. & Luo, Z., 2008, IEEE GLOBECOM 2008. p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Network-aware stream query processing in mobile ad-hoc networks

    O'Keeffe, D., Salonidis, T. & Pietzuch, P. R., 17 Dec 2015, 34th IEEE Military Communications Conference, MILCOM 2015, Tampa, FL, USA, October 26-28, 2015. p. 1335-1340 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. E-pub ahead of print

    Neural Pairwise Ranking Factorization Machine for Item Recommendation

    Jiao, L., Yu, Y., Zhou, N., Zhang, L. & Yin, H., 18 Sep 2020, (E-pub ahead of print) Neural Pairwise Ranking Factorization Machine for Item Recommendation. Proceedings, Part I. ed. Springer, [Cham], p. 680-688 9 p. (Lecture Notes in Computer Science (12112)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Neural Simplex Architecture

    Phan, D. T., Grosu, R., Jansen, N., Paoletti, N., Smolka, S. A. & Stoller, S. D., 2020, NASA Formal Methods - 12th International Symposium, NFM 2020, Proceedings. Lee, R., Jha, S. & Mavridou, A. (eds.). Springer, p. 97-114 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12229 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. E-pub ahead of print

    Neural State Classification for Hybrid Systems

    Phan, D., Paoletti, N., Zhang, T., Grosu, R., Smolka, S. A. & Stoller, S. D., 30 Sep 2018, (E-pub ahead of print) 16th International Symposium on Automated Technology for Verification and Analysis (ATVA 2018). Lahiri, S. K. & Wang, C. (eds.). Springer, p. 422-440 19 p. (Lecture Notes in Computer Science; vol. 11138).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Neutron star merger remnants: Braking indices, gravitational waves, and the equation of state

    Lasky, P. D., Sarin, N. & Ashton, G., 17 Jul 2019, Xiamen-CUSTIPEN Workshop on the EOS of Dense Neutron-Rich Matter in the Era of Gravitational Wave Astronomy. Li, B-A., Li, A. & Xu, F. (eds.). American Institute of Physics Inc., 020025. (AIP Conference Proceedings; vol. 2127).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    New c-ary perfect factors in the de Bruijn Graph

    Mitchell, C. J., 1995, Codes and Cyphers - Cryptography and Coding IV: Proceedings of the fourth IMA Cryptography and Coding Conference, Cirencester, December 1993. Southend: Formara Ltd., p. 299-313 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    New CBC-MAC forgery attacks

    Brincat, K. & Mitchell, C. J., 2001, Information Security and Privacy, ACISP 2001, Sydney, Australia, July 2001. Varadharajan, V. & Mu, Y. (eds.). Springer-Verlag, p. 3-14 12 p. (Lecture Notes in Computer Science; no. 2119).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    New Directions in Secure African Branchless Banking

    Heath, C. & Quaglia, E., 2017, Strategic Narratives of Technology and Africa.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    New Infrastructure Technology and Smart Institutional Interventions: The Case of Implementing Government Cloud Computing in Oman

    Al zadjali, K. & Elbanna, A., 2018, International Federation of Information Processing (IFIP) WG 8.6. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    New Insights on Architectural Connectors

    Bruni, R., Fiadeiro, J. L., Lanese, I., Lopes, A. & Montanari, U., 2004, IFIP TCS. Kluwer, p. 367-380 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    New Plain-Exponential Time Classes for Graph Homomorphism

    Wahlström, M., 2009, Computer Science - Theory and Applications : 4th International Computer Science Symposium in Russia, CSR 2009. Frid, A., Morozov, A., Rybalchenko, A. & Wagner, K. W. (eds.). Novosibirsk, Russia: Springer, Vol. 5675. p. 346-355 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. E-pub ahead of print

    New radiometric calibration site located at Gobabeb, Namib desert

    Bialek, A., Greenwell, C., Lamare, M., Meygret, A., Marcq, S., Lacherade, S., Woolliams, E., Berthelot, B., Bouvet, M., King, M., Underwood, C. & Fox, N., 3 Nov 2016, (E-pub ahead of print) 2016 IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-November. p. 6094-6097 4 p. 7730592

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    NFC mobile payment with Citizen Digital Certificate

    Chen, W., Mayes, K., Lien, Y-H. & Chiu, J-H., 1 Jun 2011, Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on. Gyeongju: IEEE COMPUTER SOC, p. 120 -126

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    NFC Mobile Transactions and Authentication Based on GSM Network

    Chen, W., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J-H., 1 Apr 2010, Near Field Communication (NFC), 2010 Second International Workshop on. p. 83 -89

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Ninja: Non identity based, privacy preserving authentication for ubiquitous environments

    Leung, A. & Mitchell, C. J., 2007, UbiComp 2007: Ubiquitous Computing, 9th International Conference, Innsbruck, Austria, September 16-19 2007. Krumm, J., Abowd, G. D., Seneviratne, A. & Strang, T. (eds.). Springer-Verlag, Vol. 4717. p. 73-90 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Nitrogen cycling in ~2.7 Ga oceans

    Yang, J., Zerkle, A., Grassineau, N., Nisbet, E., Mettam, C., Hunter, M., Martin, A., Newton, J. & Boyce, A., 13 Dec 2016, American Geophysical Union Fall Annual Meeting. San Francisco, p. PP21D-04

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    NLO automated tools for QCD and beyond

    Kauer, N., 26 Feb 2012, LC11: Understanding QCD at linear colliders in searching for old and new physics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Noisy Carrier Modulation for HF RFID: First International EURASIP Workshop on RFID Technology

    Hancke, G. P., 1 Sep 2007, First International EURASIP Workshop on RFID Technology. Austria, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Unpublished

    Nomadic Metrology

    Hazell, C., 2019, (Unpublished) A Day with Rosi Braidotti: ZOE-GEO-TECHNO Egalitarianism .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Non-asymptotic calibration and resolution

    Vovk, V., 2005, Proceedings of the Sixteenth International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. & Tomita, E. (eds.). Berlin: Springer, Vol. 3734. p. 429-443 15 p. (Lecture Notes in Computer Science; vol. 3734).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    NON-CRIMP THERMOPLASTIC COMPOSITE FABRICS - AEROSPACE SOLUTIONS TO AUTOMOTIVE PROBLEMS

    WOOLSTENCROFT, D. H. & Hogg, P., 1991, ADVANCED COMPOSITE MATERIALS : NEW DEVELOPMENTS AND APPLICATIONS. MATERIALS PARK: ASM INTERNATIONAL, p. 339-349 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Non-Forensic Odontological Biometrics

    Busch, C. & Wolthusen, S. D., 12 Sep 2009, Proc. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '09). IEEE Computer Society Press, p. 1105-1109

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Non-Interactive Key Exchange

    Freire, E. S. V., Hofheinz, D., Kiltz, E. & Paterson, K. G., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 254-271 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Submitted

    Non-Latin Alphabets in the transmission of Simon of Genoa's Clavis Sanationis

    Zipser, B., 2019, (Submitted) De Bagdad à Constantinople: le transfert des savoirs médicaux, XIe-XVe s.. Cronier, M. (ed.). Paris: Collection Orient et Méditerranée

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Nonlinear Equivalence of Stream Ciphers

    Rønjom, S. & Cid, C., 2010, Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Springer, p. 40-54 15 p. (Lecture Notes in Computer Science; vol. 6147).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Nonresponse in cross-cultural telephone surveys: reflections on telephone survey interviews with Chinese managers

    Wang, C. L. & Saunders, M., 2011, British Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Normalized nonconformity measures for regression conformal prediction

    Papadopoulos, H., Gammerman, A. & Vovk, V., 2008, Proceedings of the IASTED International Conference on Articial Intelligence and Applications. p. 64-69 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Normative KGP Agents: A Preliminary Report

    Sadri, F., Toni, F. & Stathis, K., 1 Dec 2005, Symposium on Normative Multi-Agent Systems, NORMAS 2005, part of the SSAISB 2005 Convention, University of Hertfordshire, Hatfield, UK. p. 85-96 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Not in Silos: locating ERP project into a complex network- A multiple-project perspective

    Elbanna, A., 2008, Proceedings of the European Conference of Information Systems 2008.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Unpublished

    Notes toward a non-anthropocentric anthropomorphism

    Hazell, C., 2021, (Unpublished) La Filosofia, Il Castello e la Torre - Ischia and Naples International Festival of Philosophy: Universes - VII Edition 1-26 September 2021.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Novel Genetic Bees Algorithm applied to single machine scheduling problem

    Packianather, M. S., Yuce, B., Mastrocinque, E., Fruggiero, F., Pham, D. T. & Lambiase, A., 2014, World Automation Congress (WAC), 2014. Waikoloa, HI, USA : IEEE, p. 906-911 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Numerical modelling of stress fields around magma chambers and the generation of ring faults

    Gudmundsson, A., Turon, E. & Marti, J., 1997, Proceedings of IAMG97 Third Annual Conference of the International Association for Mathematical Geology. Pawlowsky-Glahan, V. (ed.). Barcelona, p. 401-406

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    O Debate Político e o Conflito Inter-Profissional em redor da Regulamentação das Medicinas Alternativas e Complementares em Portugal

    Almeida, J., 2008, VI Congresso Português de Sociologia. Lisbon, Portugal, p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. J. & Chen, T., 11 Nov 2019, Proceedings of the Security Standardisation Research Conference 2019 (SSR 2019, an ACM CCS 2019 Workshop), London, November 11 2019. ACM, p. 35-44 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Obfuscation and Formal Grammars Revisited

    Repel, D. & Stengel, I., 13 Sep 2013, Fifth International Conference on Internet Technologies and Applications. p. 267-274 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Object languages in a type-theoretic meta-framework

    Callaghan, P. C., Luo, Z. & Pang, J., 2001, Proof Transformation and Presentation and Proof Complexities.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Object-Oriented Conceptual Modeling from Law

    Sernadas, C., Fiadeiro, J. L. & Sernadas, A., 1988, DS-3. p. 305-327 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Oblique: Accelerating Page Loads Using Symbolic Execution

    Ko, R., Mickens, J., Loring, B. & Netravali, R., Apr 2021, NSDI 2021. USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Observation Mechanism and Cost Model for Tightly Coupled Asymmetric Concurrency

    Seeger, M. & Wolthusen, S. D., May 2010, Proceedings, 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 158-163

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Observation of stages of homogeneous nucleation of liquid droplets in solid isotopic helium mixtures

    Poole, M., Saunders, J. & Cowan, B., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 360-361 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Observations on the use of mobile decision aids for consumer decision making

    van der Heijden, H. & Sangstad Sørensen, L., 2003, Proceedings of the 2nd International Conference on Mobile Business (ICMB). Vienna, Austria

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Oceanographic MOWER Cruise

    Valencia, J., Ercilla, G., Hernández-Molina, F. J. & Casas, D., 9 Apr 2015, International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences - ISPRS Archives. 5W5 ed. International Society for Photogrammetry and Remote Sensing, Vol. 40. p. 223-230 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Off-line Nearest Neighbour Transductive Confidence Machine

    Nouretdinov, I., 2008, 8th Industrial Conference on Data Mining 2008 Poster and Workshop Proceedings. p. 16-24 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Offline Peer-to-Peer Broadcast with Anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M., 2011, E-business and Telecommunications. 3 ed. Springer, Vol. 130. p. 174-185 (Communications in Computer and Information Science ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Unpublished

    Oil, Baltic Dry index, foreign exchange, market liquidity and business cycles: Evidence from net oil exporting countries and net oil importing countries

    Said, H. & Giouvris, E., 2018, (Unpublished) 2018 International Conference on Business and Information-Winter session.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Old and new deterministic factoring algorithms

    McKee, J. & Pinch, R., 1996, Proceedings of the second Algorithmic Number Theory Symposium (ANTS II). Springer, p. 217-224

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    On a possible privacy flaw in Direct Anonymous Attestation (DAA)

    Leung, A., Chen, L. & Mitchell, C. J., 2008, Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, Villach, Austria, March 11-12, 2008, Proceedings. Lipp, P., Sadeghi, A-R. & K-M. K. (eds.). Berlin: Springer-Verlag, p. 179-190 12 p. (Lecture Notes in Computer Science; vol. 4968).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    On assessing the positioning accuracy of Google Tango in challenging indoor environments

    Nguyen, D. K. A. & Luo, Z., 23 Nov 2017, The 8th International Conference on Indoor Positioning and Indoor Navigation, Sept 18-21, 2017, Japan. IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    On becoming bicultural: a taxonomy of expatriate cultural identity

    Zhang, L. E., 2014, Academy of Management Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. E-pub ahead of print

    On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem

    Albrecht, M. & Heninger, N., 16 Jun 2021, (E-pub ahead of print) EUROCRYPT 2021. Springer, (Lecture Notes in Computer Science; vol. 12696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    On Cipher-Dependent Related-Key Attacks in the Ideal Cipher Model

    Albrecht, M., Farshim, P., Paterson, K. & Watson, G., 2011, Fast Software Encryption (FSE). Joux, A. (ed.). Springer, Vol. 6733. p. 128-145 (Lecutre Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    On Completeness in Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 6 Jun 2016, Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies: SACMAT '16. New York: ACM Press, p. 149-160 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    On Correctness of Data Structures under Reads-Write Concurrency

    Lev-Ari, K., Chockler, G. & Keidar, I., 2014, Distributed Computing: 28th International Symposium DISC 2014, Austin, TX, USA, October 12-15, 2014, Proceedings. Kuhn, F. (ed.). 1 ed. Springer-Verlag Berlin Heidelberg, Vol. 8784. p. 273-287 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    On Creating Complementary Pattern Databases

    Franco, S., Torralba, Á., Lelis, L. H. S. & Barley, M., 2017, Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 4302-4309 8 p. (IJCAI International Joint Conference on Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. E-pub ahead of print

    On Deception-Based Protection Against Cryptographic Ransomware

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 6 Jun 2019, (E-pub ahead of print) DIMVA 2019: 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Springer, p. 219-239 21 p. (Lecture Notes in Computer Science; vol. 11543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    On delegation and workflow execution models

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing. ACM Press, p. 2137-2144 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    On drive-by-download attacks and malware classification

    Puttaroo, M., Komisarczuk, P. & De Amorim, R. C., 2013, Proceedings of the 5th International Conference on Internet Technologies and Applications, ITA 2013. Glyndwr University, p. 217-225 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. E-pub ahead of print

    On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL

    Albrecht, M., 1 Apr 2017, (E-pub ahead of print) Annual International Conference on the Theory and Applications of Cryptographic Techniques: EUROCRYPT 2017: Advances in Cryptology . Springer, p. 103-129 27 p. (Lecture Notes in Computer Science; vol. 10210).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    On Generating Efficient Data Summaries for Logistic Regression: A Coreset-based Approach

    Riquelme Granada, N., Nguyen, D. K. A. & Luo, Z., Jul 2020, 9th International Conference on Data Science, Technology and Applications (DATA 2020). Vol. 1. p. 78-89 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    On Initializations for the Minkowski Weighted K-Means

    Amorim, R. C. D. & Komisarczuk, P., 2012, Advances in Intelligent Data Analysis XI - 11th International Symposium, IDA 2012, Helsinki, Finland, October 25-27, 2012. Proceedings. p. 45-55 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    On Key Assignment for Hierarchical Access Control

    Crampton, J., Martin, K. M. & Wild, P., 2006, Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 98-111 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval

    Crampton, J., Morisset, C. & Zannone, N., 1 Jun 2015, 20th ACM Symposium on Access Control Models and Technologies. ACM, p. 99-109 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    On mobile agent based transactions in moderately hostile environments

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Advances in Network and Distributed Systems Security, Proceedings of IFIP TC11 WG11.4 First Annual Working Conference on Network Security, KU Leuven, Belgium, November 2001. De Decker, B., Piessens, F., Smits, J. & Van Herreweghen, E. (eds.). Kluwer Academic Publishers, p. 173-186 14 p. (IFIP Conference Proceedings; no. 206).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    On modelling multi-agent systems declaratively

    Bracciali, A., Mancarella, P., Stathis, K. & Toni, F., 2005, Declarative agent languages and technologies II. Springer-Verlag, Vol. 3476. p. 53-68 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    On multi-channel MAC protocols in cognitive radio networks

    Yau, A. K-L., Komisarczuk, P. & Teal, P. D., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 300-305 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    On partitional clustering of malware

    de Amorim, R. C. & Komisarczuk, P., 2012, Cyberpatterns 2012. p. 47-51 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution