Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2012
  2. Published

    Stochastic Model for Improving Connectivity under Heterogeneous Traffic Flow for VANET

    Umer, T., Ahmed, H. & Honary, B., 06/2012, Optimisation of Mobile Communication Networks – OMCO NET. Penev, K. (ed.). Southampton: School of Technology, Southampton Solent University, p. 118-125 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  3. Published

    Creating evolving user behavior profiles automatically

    Iglesias, J., Angelov, P., Ledezma, A. & Sanchis, A., 1/05/2012, In : IEEE Transactions on Knowledge and Data Engineering. 24, 5, p. 854-867 14 p.

    Research output: Contribution to journalJournal article

  4. Published

    Automatic mobile photographer and picture diary

    Angelov, P., Andreu, J. & Vong, T., 05/2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on. IEEE, p. 102-107

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  5. Published

    Autonomous visual self-localization in completely unknown environment

    Sadeghi-Tehran, P., Behera, S., Angelov, P. & Andreu, J., 05/2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on. IEEE, p. 90-95 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  6. Published

    The violent crime linkage analysis system: a test of interrater reliability

    Snook, B., Luther, K., House, J., Bennell, C. & Taylor, P., 05/2012, In : Criminal Justice and Behavior. 39, 5, p. 607-619 13 p.

    Research output: Contribution to journalJournal article

  7. Published

    GaSb/GaAs quantum dot formation and demolition studied with cross-sectional scanning tunneling microscopy

    Smakman, E. P., Garleff, J. K., Young, R. J., Hayne, M., Rambabu, P. & Koenraad, P. M., 2/04/2012, In : Applied Physics Letters. 100, 14, p. - 3 p., 142116.

    Research output: Contribution to journalJournal article

  8. Published

    A framework for the design and evaluation of network resilience management

    Schaeffer-Filho, A., Smith, P., Mauthe, A., Hutchison, D., Yu, Y. & Fry, M., 1/04/2012, Network Operations and Management Symposium (NOMS), 2012 IEEE. IEEE, p. 401-408 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  9. Published

    Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures

    Bicakci, K., Bagci, I. E. & Tavli, B., 1/04/2012, In : Information Sciences. 188, p. 44-63 20 p.

    Research output: Contribution to journalJournal article

  10. Published

    Sense and Avoid in UAS: Research and Applications

    Angelov, P., 1/04/2012, Hoboken, NJ: John Wiley and Sons. 384 p.

    Research output: Book/Report/ProceedingsBook

  11. Published

    Questioning the assumptions: a critique of the Violent Crime Linkage Analysis System (ViCLAS)

    Snook, B., Bennell, C., Taylor, P. J., House, J. C., MacDonald, S. & Luther, K., 04/2012, In : Blue Line Magazine.

    Research output: Contribution to journalJournal article

  12. Published

    Towards adaptive, self learning resilience strategies

    Ali, A., Angelov, P. & Hutchinson, D., 15/03/2012, 6th International Workshop on Self Organizing Systems IWSOS-2012. Delft, The Netherlands

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNAbstract

  13. Published

    Compact Electroabsorption Modulators for Photonic Integrated Circuits, Using an Isolated Pedestal Contact Scheme

    Daunt, C. L. M., O'Callaghan, J., Lee, K-H., Yang, H., Young, R. J., Thomas, K., Pelucchi, E., Corbett, B. & Peters, F. H., 1/03/2012, In : IEEE Photonics Technology Letters. 24, 5, p. 356-358 3 p.

    Research output: Contribution to journalJournal article

  14. Published

    Technological solutions to offending

    Rashid, A., Greenwood, P., Walkerdine, J., Baron, A. & Rayson, P., 03/2012, Understanding and preventing online sexual exploitation of children. Quayle, E. & Ribisl, K. (eds.). London: Willan, p. 228-243

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  15. Published

    Optical observation of single-carrier charging in type-II quantum ring ensembles

    Young, R., Smakman, E. P., Sanchez, A. M., Hodgson, P., Koenraad, P. M. & Hayne, M., 20/02/2012, In : Applied Physics Letters. 100, 8, p. - 4 p., 082104.

    Research output: Contribution to journalJournal article

  16. Published

    Demo Abstract: GinLITE - A MAC Protocol for Real-Time Sensor Networks

    Brown, J. & Roedig, U., 15/02/2012.

    Research output: Contribution to conference - Without ISBN/ISSN Other

  17. Published

    Jaccard’s heel: are radex models of criminal behaviour falsifiable when derived using Jaccard coefficient?

    Taylor, P., Donald, I. J., Jacques, K. & Conchie, S., 02/2012, In : Legal and Criminological Psychology. 17, 1, p. 41-58 18 p.

    Research output: Contribution to journalJournal article

  18. Published

    Juno: a middleware platform for supporting delivery-centric applications

    Tyson, G., Mauthe, A., Kaune, S., Grace, P., Taweel, A. & Plagemann, T., 02/2012, In : ACM Transactions on Internet Technology. 12, 2, 4.

    Research output: Contribution to journalJournal article

  19. Published

    Personality assessment and behavioral prediction at first impression

    Vartanian, O., Stewart, K., Mandel, D., Pavlovic, N., McLellan, L. & Taylor, P., 02/2012, In : Personality and Individual Differences. 52, 3, p. 250-254 5 p.

    Research output: Contribution to journalJournal article

  20. Published

    Power-Efficient Cross-Layer Design for OFDMA Systems With Heterogeneous QoS, Imperfect CSI, and Outage Considerations

    C. Zarakovitis, C., Ni, Q., Skordoulis, D. E. & Hadjinicolaou, M. G., 02/2012, In : IEEE Transactions on Vehicular Technology. 61, 2, p. 781-798 18 p.

    Research output: Contribution to journalJournal article

  21. Published

    DKM: Distributed k-connectivity maintenance in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 9/01/2012, 2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS). IEEE, p. 83-90 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  22. Published

    The morphology of GaSb/GaAs nanostructures grown by MBE

    Young, R., 5/01/2012.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  23. Published

    A new type of simplified fuzzy rule-based systems

    Angelov, P. & Yager, R., 01/2012, In : International Journal of General Systems. 41, 2, p. 163-185 23 p.

    Research output: Contribution to journalJournal article

  24. Published

    Designing open, multi-class computational strategies to classify infrared spectroscopy data derived from the Syrian hamster embryo (SHE) assay

    Trevisan, J., Angelov, P. P., Carmichael, P. L., Scott, A. D. & Martin, F. L., 01/2012, In : Mutagenesis. 27, 1, p. 111-111 1 p.

    Research output: Contribution to journalMeeting abstract

  25. Published

    Nash Bargaining Game Theoretic Scheduling for Joint Channel and Power Allocation in Cognitive Radio Systems

    Ni, Q. & Zarakovitis, C. C., 01/2012, In : IEEE Journal on Selected Areas in Communications. 30, 1, p. 70-81 12 p.

    Research output: Contribution to journalJournal article

  26. Published

    Promoting safety voice with safety-specific transformational leadership: the mediating role of two dimensions of trust

    Conchie, S., Taylor, P. & Donald, I. J., 01/2012, In : Journal of Occupational Health Psychology. 17, 1, p. 105-115 11 p.

    Research output: Contribution to journalJournal article

  27. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2012, In : Lingvisticæ Investigationes. 35, 2, p. 367-388 22 p.

    Research output: Contribution to journalJournal article

  28. Published

    2012 IEEE Conference on Evolving and Adaptive Intelligent Systems, EAIS-2012

    Angelov, P. (ed.), Filev, D. (ed.), Kasabov, N. (ed.) & Iglesias, J. A. (ed.), 2012, IEEE. 107 p.

    Research output: Book/Report/ProceedingsProceedings

  29. Published

    A Real-time Approach for Novelty Detection and Trajectories Analysis for Anomaly Recognition in Video Surveillance Systems

    Sadeghi-Tehran, P. & Angelov, P., 2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on . IEEE, p. 108-113 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  30. Published

    A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways

    Eiza, M. H. & Ni, Q., 2012, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. Liverpool: IEEE, p. 1578-1585 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  31. Published

    A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks

    Suriyachai, P., Roedig, U. & Scott, A., 2012, In : Communications Surveys and Tutorials, IEEE Communications Society. 14, 2, p. 1-25 25 p.

    Research output: Contribution to journalJournal article

  32. Published

    A survey of mobility in information-centric networks: challenges and research directions

    Tyson, G., Sastry, N., Rimac, I., Cuevas, R. & Mauthe, A., 2012, NoM '12: Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design - Architecture, Algorithms, and Applications. New York: ACM, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  33. Published

    An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 2012, Advanced Agent Technology. Dechesne, F., Hattori, H., ter Mors, A., Such, J. M., Weyns, D. & Dignum, F. (eds.). Berlin: Springer Verlag, p. 411-425 15 p. (Lecture Notes in Computer Science; vol. 7068).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  34. Published

    Brief announcement: MP-state: State-aware software model checking of message-passing systems

    Muftuoglu, C. A., Bokor, P. & Suri, N., 2012, Stabilization, Safety, and Security of Distributed Systems: 14th International Symposium, SSS 2012, Toronto, Canada, October 1-4, 2012. Proceedings. Vol. 7596 LNCS. p. 183-186 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  35. Published

    Children Online: A survey of child language and CMC corpora

    Baron, A., Rayson, P., Greenwood, P., Walkerdine, J. & Rashid, A., 2012, In : International Journal of Corpus Linguistics. 17, 4, p. 443-481 39 p.

    Research output: Contribution to journalJournal article

  36. Published

    Compressive sensing for wireless sensor networks

    Mahmudimanesh, M., Khelil, A. & Suri, N., 2012, Intelligent Sensor Networks: The Integration of Sensor Networks, Signal Processing and Machine Learning. CRC Press, p. 379-396 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  37. Published

    Computerized crime linkage systems: A critical review and research agenda

    Bennell, C., Snook, B., MacDonald, S., House, J. & Taylor, P., 2012, In : Criminal Justice and Behavior. 39, 5, p. 620-634 14 p.

    Research output: Contribution to journalJournal article

  38. Published

    Design and Analysis of Multicast-Based Publisher/Subscriber Models over Wireless Platforms for Smart Grid Communications

    Fateri, S., Ni, Q., Taylor, G. A., Panchadcharam, S. & Pisica, I., 2012, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. Liverpool: IEEE, p. 1617-1623 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  39. Published

    Design and tuning of fuzzy systems

    Angelov, P. & Iglesias, J. A., 2012

    Research output: Exhibits, objects and web-based outputsWeb publication/site

  40. Published

    Efficient predictive monitoring of wireless sensor networks

    Ali, A., Khelil, A., Shaikh, F. K. & Suri, N., 2012, In : International Journal of Autonomous and Adaptive Communications Systems. 5, 3, p. 233-254 22 p.

    Research output: Contribution to journalJournal article

  41. Published

    Enhancing privacy in Multi-agent Systems

    Such, J. M., 2012, In : AI Communications. 25, 4, p. 377-379 3 p.

    Research output: Contribution to journalJournal article

  42. Published

    Evaluation of the socio-economic implications of contractual mobility in roaming architectures

    Corliano, G., Edwards, C. & Race, N., 2012, 2012 IEEE Global Communications Conference (GLOBECOM). New York: IEEE, p. 2840-2845 6 p. (IEEE Global Telecommunications Conference (Globecom)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  43. Published

    Evolving social network analysis: A case study on mobile phone data

    Dutta Baruah, R. & Angelov, P., 2012, Evolving and Adaptive Intelligent Systems (EAIS), 2012 IEEE Conference on. IEEE, p. 114-120 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  44. Published

    Extracting biological information with computational analysis of Fourier transform infrared (FTIR) biospectroscopy datasets: current practices to future perspectives

    Trevisan, J., Angelov, P., Carmichael, P. L., Scott, A. & Martin, F., 2012, In : Analyst. 137, 14, p. 3202-3215 14 p.

    Research output: Contribution to journalJournal article

  45. Published

    Indoor pedestrian displacement estimation using smart phone inertial sensors

    Ayub, S., Xiaowei, Z., Honary, S., Bahraminasab, A. & Honary, B., 2012, In : International Journal of Innovative Computing and Applications. 4, 1, p. 35-42 8 p.

    Research output: Contribution to journalJournal article

  46. Published

    Introducing NextShareMobile, An Interactive Second Screen Application

    Knowles, W., Mu, M., Bamford, W., Race, N. & Needham, C., 2012, MobiSys '12 Proceedings of the 10th international conference on Mobile systems, applications, and services. New York: ACM, p. 489-490 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  47. Published

    Monitoring and evaluation of semantic rooms

    Gönczy, L., Csertán, G., Urbanics, G., Ghani, H., Khelil, A. & Suri, N., 2012, Collaborative Financial Infrastructure Protection: Tools, Abstractions, and Middleware. Springer Berlin / Heidelberg, p. 99-116 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  48. Published

    OpenCache: Exploring Efficient and Transparent Content Delivery Mechanisms for Video-on-Demand

    Broadbent, M. & Race, N., 2012, Proceedings of the 2012 ACM conference on CoNEXT student workshop. New York, NY, USA: ACM, p. 15-16 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  49. Published

    Perceptual Influences on Risk Assessments and the Challenges for Information Security and Network Management

    Knowles, W., Prince, D. & Hutchison, D., 2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2012). Liverpool: Liverpool John Moores University

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  50. Published

    Performance evaluation of smart metering infrastructure using simulation tool

    Panchadcharam, S., Taylor, G. A., Ni, Q., Pisica, I. & Fateri, S., 2012, Universities Power Engineering Conference (UPEC), 2012 47th International. London: IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  51. Published

    Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, Hollywood, CA, USA, October 7, 2012

    Freedman, M. J. (ed.) & Suri, N. (ed.), 2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  52. Published

    Protection of SCADA communication channels: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    Khelil, A., Germanus, D. & Suri, N., 2012, Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer, Vol. 7130. p. 177-196 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  53. Published

    Providing secure and accountable privacy to roaming 802.11 mobile devices

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2012, MPM '12: Proceedings of the First Workshop on Measurement, Privacy, and Mobility. New York, NY, USA: ACM, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  54. Published

    Putting your best foot forward: investigating real-world mappings for foot-based gestures

    Alexander, J., Han, T., Judd, W., Irani, P. & Subramanian, S., 2012, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems (CHI '12). New York: ACM, p. 1229-1238 10 p. (CHI '12).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  55. Published

    Quantitative assessment of Cloud Security Level Agreements: A case study

    Luna, J., Ghani, H., Vateva, T. & Suri, N., 2012, Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, 2012, Rome, Italy. SciTePress, p. 64-73 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  56. Published

    Security issues in cloud federations

    Rak, M., Ghani, H., Ficco, M., Suri, N., Luna, J., Panica, S. & Petcu, D., 2012, Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice. IGI Global, p. 176-194 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  57. Published

    Self-evolving parameter-free Rule-based Controller: SPARC

    Sadeghi-Tehran, P., Cara, A., Angelov, P., Pomares, H., Rojas, I. & Prieto, A., 2012, Fuzzy Systems (FUZZ-IEEE), 2012 IEEE International Conference on. IEEE, p. 754-761 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  58. Published

    Service level agreement monitoring for resilience in computer networks

    Shirazi, S. N. U. H., Schaeffer-Filho, A. & Hutchison, D., 2012, 13th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting. Liverpool: Liverpool John Moores University, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  59. Published
  60. Published

    Social risk amplification as an attribution: the case of zoonotic disease outbreaks

    Busby, J. & Duckett, D., 2012, In : Journal of Risk Research. 15, 9, p. 1049-1074 26 p.

    Research output: Contribution to journalJournal article

  61. Published

    Statistical analysis of ordinal user opinion scores

    Mu, M., Mauthe, A., Tyson, G. & Cerqueira, E., 2012, IEEE Consumer Communications and Networking Conference (CCNC), 2012 . IEEE, p. 331-336 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  62. Published

    STEER: A Social Telemedia Environment for Experimental Research

    Denazis, S., Efthymiopoulos, N., Koufopavlou, O., Den Hartog, F., Niamut, O., Hutchison, D., Race, N., Mu, M., Taal, J., Mori, L., Boniface, M., C Phillips, S. & Wu, F., 2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  63. Unpublished

    Storisphere: Let’s Make a Video Story Together

    Mu, M., Simpson, S., Brown, J., Bojko, C. & Broadbent, M., 2012, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  64. Published

    The language of Islamic extremism: towards an automated identification of beliefs, motivations and justifications

    Prentice, S., Rayson, P. & Taylor, P., 2012, In : International Journal of Corpus Linguistics. 17, 2, p. 259-286 28 p.

    Research output: Contribution to journalJournal article

  65. Published

    Tilt displays: designing display surfaces with multi-axis tilting and actuation

    Alexander, J., Lucero, A. & Subramanian, S., 2012, p. 161-170. 10 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  66. Published

    Towards a multihomed GSM gateway

    Withnell, R. & Edwards, C., 2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  67. Published

    Towards utilizing Tcpcrypt in mobile healthcare applications

    Nikolidakis, S. A., Giotsas, V., Georgakakis, E., Vergados, D. D. & Douligeris, C., 2012, Wireless Mobile Communication and Healthcare: Second International ICST Conference, MobiHealth 2011, Kos Island, Greece, October 5-7, 2011. Revised Selected Papers. Berlin: Springer, p. 374-379 6 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 83 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  68. Published

    Tuning into the right wavelength: The importance of culture for effective crisis negotiation

    Giebels, E. & Taylor, P., 2012, The psychology of crisis intervention for law enforcement officers. St-Yves, M. & Collins, P. (eds.). Toronto: Carswell, p. 277-294 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  69. Published

    Types of risk transformation: a case study

    Busby, J., Alcock, R. E. & MacGillivray, B., 2012, In : Journal of Risk Research. 15, 1, p. 67-84 18 p.

    Research output: Contribution to journalJournal article

  70. Published

    Ultra-tangibles: creating movable tangible objects on interactive tables

    Marshall, M., Carter, T., Alexander, J. & Subramanian, S., 2012, CHI '12 Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems. New York: ACM, p. 2185-2188 4 p. (CHI '12).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  71. Published

    User Preferences-Adaptive Dynamic Network Selection Approach in Cooperating Wireless Networks: A Game Theoretic Perspective

    Pervaiz, H. & Ni, Q., 2012, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. Liverpool: IEEE, p. 1609-1616 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  72. Published

    Valley-free violation in Internet routing: analysis based on BGP Community data

    Giotsas, V. & Zhou, S., 2012, 2012 IEEE International Conference on Communications, ICC 2012. IEEE, p. 1193-1197 5 p. 6363987

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  73. 2011
  74. Published

    Grid access control models and architectures

    Gouglidis, A. & Mavridis, I., 1/12/2011, Computational and data grids: principles, applications and design. IGI Global, p. 217-234 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  75. Published

    IP-Centric High Rate Narrowband PLC for Smart Grid Applications

    Adebisi, B., Treytl, A., Haidine, A., Portnoy, A., Shan, R., Lund, D., Pille, H. & Honary, B., 12/2011, In : IEEE Communications Magazine. 49, 12, p. 46-54 9 p.

    Research output: Contribution to journalJournal article

  76. Published

    Evolving fuzzy systems for data streams: A Survey

    Dutta Baruah, R. & Angelov, P., 28/11/2011, In : Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. 1, 6, p. 461-476 16 p.

    Research output: Contribution to journalJournal article

  77. Published

    Assessing the comparative effectiveness of map construction protocols in wireless sensor networks

    Khelil, A., Chang, H. & Suri, N., 17/11/2011, 30th IEEE International Performance Computing and Communications Conference. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  78. Published

    Biphoton interference and coherence of a quantum dot source of entangled photons

    Young, R., 15/11/2011.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  79. Published

    Supporting domain-specific state space reductions through local partial-order reduction

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 6/11/2011, 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011). IEEE, p. 113-122 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  80. Published

    Social TV: The impact of social awareness on content navigation within IPTV systems

    Mitchell, K., Jones, A., Ishmael, J. & Race, N. J. P., 1/11/2011, In : Computers in Entertainment (CIE). 9, 3, 29 p., 19.

    Research output: Contribution to journalJournal article

  81. Published

    An adaptive and composite spatio-temporal data compression approach for wireless sensor networks

    Ali, A., Khelil, A., Szczytowski, P. & Suri, N., 31/10/2011, Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems. ACM, p. 67-76 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  82. Published

    Simpl_eClass: simple potential-free evolving fuzzy rule-based on-line classifiers

    Angelov, P., Dutta Baruah, R. & Andreu, J., 9/10/2011, Proceedings of 2011 IEEE International Conference on Systems, Man and Cybernetics, SMC 2011, Anchorage, Alaska, USA, 7-9 Oct, 2011. IEEE, p. 2249-2254 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  83. Published

    Next generation satellite broadband enablers

    Ewald, N. L., Fairhurst, G., Race, N., Baker, T. & Skoutaridis, P., 1/10/2011, Telecom World (ITU WT), 2011 Technical Symposium at ITU. IEEE Publishing, p. 39-44 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  84. Published

    A group-oriented secure multiagent platform

    Such, J. M., Alberola, J. M., Espinosa, A. & Garcia-Fornes, A., 10/2011, In : Software: Practice and Experience. 41, 11, p. 1289-1302 14 p.

    Research output: Contribution to journalJournal article

  85. Published

    Partial identities as a foundation for trust and reputation

    Such, J. M., Espinosa, A., Garcia-Fornes, A. & Botti, V., 10/2011, In : Engineering Applications of Artificial Intelligence. 24, 7, p. 1128-1136 9 p.

    Research output: Contribution to journalJournal article

  86. Published

    Trust and distrust in safety leadership: mirror reflections?

    Conchie, S., Taylor, P. J. & Charlton, A., 10/2011, In : Safety Science. 49, 8-9, p. 1208-1214 7 p.

    Research output: Contribution to journalJournal article

  87. Published

    MWM: A map-based world model for wireless sensor networks

    Khelil, A., Shaikh, F. K., Ayari, B. & Suri, N., 23/09/2011, Autonomics: 2nd International ICST Conference on Autonomic Computing and Communication Systems. EUDL, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  88. Published

    Autonomous Machine Learning (ALMA): generating rules from data streams

    Angelov, P., 19/09/2011, Proceedings of the Special International Conference on Complex Systems, COSY-2011: 16-19 September 2011. Ohrid, FYR of Macedonia, p. 249-256 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  89. Published

    Quantum information to the home

    Young, R. & Townsend, P., 18/09/2011.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  90. Published

    Towards an adaptive resilience strategy for future computer networks

    Ali, A., Angelov, P. & Hutchison, D., 9/09/2011, Proceedings of the UKCI 2011, 7-9 Spetember, 2011, Manchester, UK. Manchester: University of Manchester, p. 201-206 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  91. Published

    Real-time recognition of human activities from wearable sensors by evolving classifiers

    Andreu, J., Dutta Baruah, R. & Angelov, P., 1/09/2011, 2011 IEEE International Conference on Fuzzy Systems (FUZZ). IEEE, p. 2786-2793 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  92. Published

    Automatic scene recognition for low-resource devices using evolving classifiers

    Andreu, J., Dutta Baruah, R. & Angelov, P., 09/2011, 2011 IEEE International Conference on Fuzzy Systems (FUZZ). IEEE, p. 2779-2785 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  93. Published

    Improving Security of Niederreiter Type GPT Cryptosystem Based on Reducible Rank Codes

    Khan, E., Gabidulin, E. M., Honary, B. & Ahmed, H., 09/2011, 3rd International Castle Meeting on Coding Theory and Applications (ICMCTA). Borges, J. & Villanueva, M. (eds.). Barcelona: Servei de Publicacions de la Universitat Autònoma de Barcelona, p. 161-168 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  94. Published

    Maximum Rank Distance Codes for Space Time Block Coding: A Comparative Study

    Asif, H., Gabidulin, E. M. & Honary, B., 09/2011, Next Generation Mobile Applications, Services and Technologies (NGMAST), 2011 5th International Conference on. IEEE, p. 206-211 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  95. Published

    Monitoring, analysing and predicting network performance in grids

    El-khatib, Y., 09/2011, Lancaster University. 226 p.

    Research output: ThesisDoctoral Thesis

  96. Published

    Sensor Placement Modes for Smartphone based Pedestrian Dead Reckoning

    Ayub, S., Zhou, X., Honary, S., Bahraminasab, A. & Honary, B., 09/2011, Computer, Informatics, Cybernetics and Applications: Proceedings of the CICA 2011. He, X., Hua, E., Lin, Y. & Liu, X. (eds.). Berlin: Springer Verlag, p. 123-132 10 p. (Lecture Notes in Electrical Engineering; vol. 107).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  97. Published

    Self-adaptive framelet-based communication for wireless sensor networks

    O'Donovan, T., Roedig, U., Benson, J. & Sreenan, C. J., 4/08/2011, In : Computer Networks. 55, 11, p. 2558-2575

    Research output: Contribution to journalJournal article

  98. Published

    On the design of perturbation-resilient atomic commit protocols for mobile transactions

    Ayari, B., Khelil, A. & Suri, N., 1/08/2011, In : ACM Transactions on Computer Systems. 29, 3, 7.

    Research output: Contribution to journalJournal article

  99. Published

    Dimensioning of Time-Critical WSNs -- Theory, Implementation and Evaluation

    Suriyachai, P., Roedig, U., Scott, A., Gollan, N. & Schmitt, J., 08/2011, In : International Journal of Mobile Communications. 6, 5, p. 360-369 10 p.

    Research output: Contribution to journalJournal article

  100. Published

    Discrete quality assessment in IPTV content distribution networks

    Mu, M., Mauthe, A., Haley, R. & Garcia, F., 08/2011, In : Signal Processing: Image Communication. 26, 7, p. 339-357 19 p.

    Research output: Contribution to journalJournal article

  101. Published

    Fuzzily Connected Multimodel Systems Evolving Autonomously From Data Streams

    Angelov, P., 08/2011, In : IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics. 41, 4, p. 898-910 13 p.

    Research output: Contribution to journalJournal article

  102. Published

    Security of the GPT cryptosystem and its applications to cryptography

    Rashwan, H., Gabidulin, E. M. & Honary, B., 08/2011, In : Security and Communication Networks. 4, 8, p. 937-946 10 p.

    Research output: Contribution to journalJournal article

Previous 1...6 7 8 9 10 11 12 13 ...20 Next

Back to top