Home > Research > Browse

Results for Programming

Publications & Outputs

  1. Taking the Middle Path: Learning About Security Through Online Social Interaction

    Lopez, T., Thein Than Tun, Bandara, A., Levine, M., Nuseibeh, B. & Sharp, H., 1/01/2020, In: IEEE Software. 37, 1, p. 25-30 6 p., 8854988.

    Research output: Contribution to journalJournal articlepeer-review

  2. Energy and spectral efficiency tradeoff with user association and power coordination in massive MIMO enabled HetNets

    Hao, Y., Ni, Q., Li, H. & Hou, S., 10/2016, In: IEEE Communications Letters. 20, 10, p. 2091-2094 4 p.

    Research output: Contribution to journalLetterpeer-review

  3. Early Report: How to Improve Programmers' Expertise at App Security?

    Weir, C., Rashid, A. & Noble, J., 8/04/2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security: co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). Aspinall, D., Cavallaro, L., Seghir, M. & Volkamer, M. (eds.). London, UK: CEUR-WS.org, Vol. 1575. p. 49-50 2 p. 8

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. An integer optimization approach to large-scale air traffic flow management

    Bertsimas, D., Lulli, G. & Odoni, A., 2011, In: Operations Research. 59, 1, p. 211-227 17 p.

    Research output: Contribution to journalJournal articlepeer-review

  5. An approach to specify and test component-based dependable software

    Jhumka, A., Hiller, M. & Suri, N., 23/10/2002, 7th IEEE International Symposium on High Assurance Systems Engineering, 2002. Proceedings.. IEEE, p. 211-220 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review