Home > Publications

Publications

36301 - 36350 out of 39,096Page size: 50
  1. Conference contribution › Research
  2. E-pub ahead of print

    Syntax-Guided Optimal Synthesis for Chemical Reaction Networks

    Cardelli, L., Ceska, M., Fränzle, M., Kwiatkowska, M., Laurenti, L., Paoletti, N. & Whitby, M., 13 Jul 2017, International Conference on Computer Aided Verification. Majumdar, R. & Kunčak, V. (eds.). p. 375-395 21 p. (Lecture Notes in Computer Science; vol. 10427).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Synthesising choreographies from local session types

    Lange, J. & Tuosto, E., 2012, Concurrency Theory - 23rd International Conference, CONCUR 2012, Proceedings. p. 225-239 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7454 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Synthesising interconnections

    Fiadeiro, J. L., Lopes, A. & Maibaum, T. S. E., 1997, Algorithmic Languages and Calculi. Chapman & Hall, Vol. 95. p. 240-264 25 p. (IFIP Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Synthesizing and Verifying Plans for Constrained Workflows: Transferring Tools from Formal Methods

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 Workshop on Verification and Validation of Planning and Scheduling Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Synthesizing stealthy reprogramming attacks on cardiac devices

    Paoletti, N., Jiang, Z., Islam, M. A., Abbas, H., Mangharam, R., Lin, S., Gruber, Z. & Smolka, S. A., 16 Apr 2019, 10th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS 2019). ACM, p. 13-22 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print

    Systems Metagenomics: Applying Systems Biology Thinking to Human Microbiome Analysis

    Radwan, G. S. & Shanahan, H., 24 Aug 2018, Computational Methods in Systems Biology - 16th International Conference, CMSB 2018, Proceedings. Springer-Verlag, Vol. 11095 LNBI. p. 318-321 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11095 LNBI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Systems Security at VU University Amsterdam

    Bos, H. J. & Cavallaro, L., 1 Jul 2011, 1st SysSec Workshop on Systems Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Forthcoming

    Tag Group Authentication using Bit Collisions

    Leng, X., Hancke, G., Mayes, K. & Markantonakis, K., Oct 2012, (Accepted/In press) Information Security South Africa (ISSA). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol

    Paterson, K. G., Ristenpart, T. & Shrimpton, T., 2011, Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011: Proceedings. Lee, D. H. & Wang, X. (eds.). Springer, p. 372-389 (Lecture Notes in Computer Science; vol. 7073).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Tailoring authentication protocols to match underlying mechanisms

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1996, Information Security and Privacy - Proceedings: First Australasian Conference, Wollongong, NSW, Australia, June 1996. Pieprzyk, J. & Seberry, J. (eds.). Springer-Verlag, p. 121-133 13 p. (Lecture Notes in Computer Science; no. 1172).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Taint-Enhanced Anomaly Detection

    Cavallaro, L. & Sekar, R., 2011, ICISS. p. 160-174 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Take a Deep Breath: a Stealthy, Resilient and Cost-Effective Botnet Using Skype

    Nappa, A., Fattori, A., Balduzzi, M., Dell'Amico, M. & Cavallaro, L., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Taking photos might not impair memory

    Nightingale, S., Wade, K., Watson, D., Mills, A., Zajac, R., Henkel, L. & Garry, M., Jul 2016, International Conference on Memory.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    TALEN-directed genome surgery of the DMD gene

    Popplewell, L., Marsh, J., Kymalainen, H., Yanez, R. & Dickson, J., 15 May 2013, Human Gene Therapy. Mary Ann Liebert Inc., Vol. 24. p. A21 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Forthcoming

    Target Search on Road Networks with Range-Constrained UAVs and Ground-Based Mobile Recharging Vehicles

    Booth, K. & Bernardini, S., 2 Jul 2020, (Accepted/In press) International Conference on Intelligent Robots and Systems (IROS): 2020 IEEE/RSJ. IEEE Xplore, 8 p. 3038

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Task Facilitation and Navigation via a Mediator: An Application from Software Integration

    Stathis, K., 1 Dec 1995, Proceedings of the 5th Hellenic Conference on Informatics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Taste and Toasts in Early Eighteenth-Century Club Culture

    Hawley, J., 2011, Taste and the Senses in the Eighteenth Century. Wagner, P. & Ogée, F. (eds.). Trier: Wissenschaftlicher Verlag Trier, p. 299-318 20 p. (LAPASEC: Landau Paris Studies on the Eighteenth Century; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Taxonomy of Barriers to Strategy Implementation

    Aboutalebi, R., 8 Sep 2015, BAM (British Academy of Management), 29th Annual Conference of BAM: The Value of Pluralism in Advancing Management Research, Education and Practice. 08-10 September 2015, The University of Portsmouth, England, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Tear-Insert-Fold grammars

    Johnstone, A. & Scott, E., 28 Mar 2010, LDTA '10 Proceedings of the Tenth Workshop on Language Descriptions, Tools and Applications. ACM, p. 1-8 8 p. 6

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1 Oct 1998, Proc. 2nd IMACS Internat. Conf. on Circuits, Systems Computers. Vol. 2. p. 945-949 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Technology, globalization, and the future

    Reppel, A. & Mitussis, D., 9 Jul 2018, Proceedings of the 43rd Annual Macromarketing Conference. Leipzig, Germany, p. 218

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Tectono-stratigraphic evolution and hydrocarbon prospectivity of the South Halmahera Basin, Indonesia

    Chandra, J. & Hall, R., 25 May 2016, Proceedings, Indonesian Petroleum Association Fortieth Annual Convention 2016. Indonesian Petroleum Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Teeth Segmentation and Feature Extraction for Odontological Biometrics

    Mairaj, D., Busch, C. & Wolthusen, S. D., Oct 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE Computer Society Press, p. 323-328

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Telescopic Relative Entropy

    Audenaert, K., 2014, Theory of Quantum Computation, Communication, and Cryptography - 6th Conference, TQC 2011, Madrid. Springer, Vol. LNCS 6745. p. 39-52

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Temperature and magnetic-field driven dynamics in artificial magnetic square ice

    Morley, S. A., Stein, A., Rosamond, M. C., Venero, D. A., Hrabec, A., Shepley, P. M., Im, M. Y., Fischer, P., Bryan, M. T., Allwood, D. A., Steadman, P., Langridge, S. & Marrows, C. H., 8 Sep 2015, Spintronics VIII. Drouhin, H-J., Wegrowe, J-E. & Razeghi, M. (eds.). SPIE, Vol. 9551. 95511Q

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Temporally Aware Behaviour-Based Security in Smart Cards

    Sirett, W. G., Markantonakis, K. & Mayes, K., 1 Nov 2006, Computational Intelligence and Security, 2006 International Conference on. Vol. 1. p. 604 -608

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Ten reasons WHY IRIS Needed 20:20 Foresight: Some Lessons for Introducing Biometric Border Control Systems

    Palmer, A. & Hurrey, C., 2012, Proceedings of the 2012 European Intelligence and Security Informatics Conference. Washington: IEEE Computer Society, p. 311-316 6 p. Palmer:2012:TRW:2373856.2372920

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Tensor decomposition via joint matrix schur decomposition

    Colombo, N. & Vlassis, N., 19 Jun 2016, ICML'16 Proceedings of the 33rd International Conference on International Conference on Machine Learning. Weinberger, K. Q. & Balcan, M. F. (eds.). International Machine Learning Society (IMLS), p. 2820-2828 9 p. (33rd International Conference on Machine Learning, ICML 2016; vol. 48).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Terrestrial Ecosystems in the past 100 Myr

    Elias, S., 2002, Encyclopaedia of Life Sciences. London: Nature Publishing Group, Vol. 18. p. 169-173

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., Aug 2019, 28th USENIX Security Symposium (USENIX Sec). p. 729-746 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Testing exchangeability on-line

    Vovk, V., Nouretdinov, I. & Gammerman, A., 2003, Proceedings of the Twentieth International Conference on Machine Learning. Fawcett, T. & Mishra, N. (eds.). Menlo Park, CA: AAAI Press, p. 768-775

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Textures in experimentally deformed olivine aggregates: the effects of added water and melt.

    Heidelbach, F., Holtzman, B., Hier-Majumder, S. & Kohlstedt, D., 2005, ICOTOM 14: TEXTURES OF MATERIALS, PTS 1AND 2. Houtte, PV. & Kestens, L. (eds.). ZURICH-UETIKON: TRANS TECH PUBLICATIONS LTD, p. 63-68 6 p. (MATERIALS SCIENCE FORUM; vol. 495-497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    The ‘reinvention’ of the Mahachat Sung Sermon as a theatre play for new generations of Thai Buddhist audience in the context of urban migration

    Utairat, M., 2018, Theatre and Migration: Theatre, Nation and Identity between Migration and Stasis, IFTR World Congress 2018, Belgrade, Serbia .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    The “Coralligène” of the Mediterranean — a Recent Analog for Tertiary Coralline Algal Limestones

    Bosence, D., 1985, Paleoalgology: Contemporary Research and Applications. Toomey, D. F. & Nitecki, M. H. (eds.). Springer Berlin / Heidelberg, p. 216-225 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    The Entasis of Greek Doric Columns and Curve Fitting: a Case Study Based on the Peristyle Column of the Temple of Athena Alea at Tegea

    Pakkanen, J., 1996, III Convegno Internazionale di Archeologia e Informatica. III International Symposium on Computing and Archaeology. Moscati, P. & Mariotti, S. (eds.). Firenze, p. 693–702 (Archeologia e Calcolatori; vol. 7).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    The 1st European Stag Beetle Survey: preliminary results

    Campanaro, A., Al Fulaij, N., Bardiani, M., Corezzola, S., Della Rocca, F., Hardersen, S., Harvey, D., Hawes, C., Kadej, M., Karg, J., Mendez, M., Minari, E., Rink, M., Smolis, A., Sprecher-Uebersax, E., Thomaes, A., Toni, I., Vrezec, A., Zapponi, L., Zauli, A. & 2 others, Zilioli, M. & Chiari, S., Sep 2013, 4th meeting of the European Stag Beetle Group.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    The Agency Exerted by Analytic Systems on Public Sector Organisations: The Case of Controlling and Preventing a Life-Threatening Virus (Paper Development)

    Shahid, A. R. & Shaikh, S. E., 2018, International Federation for Information Processing (IFIP) WG 8.6.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

    Shepherd, C., Gurulian, I., Frank, E., Markantonakis, K., Akram, R., Mayes, K. & Panaousis, E., 21 Dec 2017, Mobile Security Technologies (MoST '17), IEEE Security & Privacy Workshops. IEEE, p. 179-188 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    The Apriori Stochastic Dependency Detection (ASDD) algorithm for learning Stochastic logic rules

    Child, C. & Stathis, K., 2004, Computational logic in multi-agent systems (CLIMA 2004). Springer-Verlag, Vol. 3259. p. 234-249 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    The Asynchronous Bounded-Cycle Model

    Robinson, P. & Schmid, U., 2008, Stabilization, Safety, and Security of Distributed Systems, 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings. p. 246-262 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. In preparation

    The Banking Industry; Regulation and ‎Performance: A Data Envelopment Analysis on Total Factor ‎Productivity Changes

    Hassan, M. & Giouvris, E. (ed.), 2016, (In preparation) IFABS-International Finance and Banking Society: Corporate Finance Decisions in a Changing Global Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    The basic building blocks of information systems

    SERNADAS, A., FIADEIRO, J., SERNADAS, C. & EHRICH, H. D., 1989, INFORMATION SYSTEM CONCEPTS : AN IN-DEPTH ANALYSIS. FALKENBERG, ED. (ed.). AMSTERDAM: ELSEVIER SCIENCE PUBL B V, p. 225-246 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    The Beam Gas Vertex Profile Monitoring Station for HL-LHC

    Kieffer, R., Alexopoulos, A., Fosse, L., Gonzalez Berges, M., Gibson, S., Guerin, H., Jones, R., Marriott-Dodington, T., Storey, J., Veness, R., Vlachos, S., Würkner, B. & Zamantzas, C., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPGW082

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    The bigger the better and the more the merrier? Realistic office reverberation levels abolish cognitive distraction by multiple-voice speech

    Vachon, F., Winder, E., Lavandier, M. & Hughes, R., 18 Jun 2017, Proceedings of the 12th ICBEN Congress on Noise as a Public Health Problem. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

    Msgna, M., Markantonakis, K. & Mayes, K., 25 Sep 2013, Security and Privacy in Communication Networks: 9th International ICST Conference. Sydney, Australia, Vol. 127. p. 288-304 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Information and Telecommunication Engineering; vol. 127).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    The Business of Practice: Examining GP Training: British Academy of Management Conference 5th -7th September 2017 University of Warwick

    Dyerson, R., Sep 2017, British Academy of Management Conference Proceedings 2017. 7 p. 838

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    The Caelum Toolkit for CSCW: The Sky is the Limit

    Anker, T., Chockler, G., Dolev, D. & Keidar, I., 1997, Proceedings of the 3rd International Workshop on Next Generation Information Technologies and Systems (NGITS '97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Unpublished

    The care home as a performative space: possibilities for creative practice

    Hatton, N., 2014, (Unpublished) The care home as a performative space: possibilities for creative practice.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    The Case for a Secure Multi-Application Smart Card Operating System

    Markantonakis, K., 1998, Proceedings of the First International Workshop on Information Security. London, UK: Springer-Verlag, p. 188-197 10 p. (ISW '97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    The challenges to distributed leadership and the boundary spanning of local entrepreneurs in emergent healthcare innovation: the telehealth experience of one Clinical Commissioning Group (CCG) in England

    Bernardi, R. & Exworthy, M., 2015, BAM2015 Conference Proceedings. British Academy of Management, p. 1-17 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution