Home > Research > Computing and Communications > Publications & Outputs
View graph of relations

Computing and Communications

  1. Published

    Utilizing Public Blockchains for Censorship-Circumvention and IoT Communication

    Al-Salami, N. & Zhang, B., 23/12/2019, IEEE Conference on Dependable and Secure Computing (DSC). IEEE, p. 1-7 7 p. 8937637

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Utilizing mobile phones as ambient information displays

    Schmidt, A., Häkkilä, J., Atterer, R., Rukzio, E. & Holleis, P., 2006, CHI EA '06: CHI '06 extended abstracts on Human factors in computing systems. New York: ACM, p. 1295-1300 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Utilizing Context History to Provide Dynamic Adaptations.

    Cheverst, K. & Byun, H. E., 07/2004, In: Applied Artificial Intelligence. 18, 6, p. 533-548 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Utilizing contact-view as an augmented reality authoring method for printed document annotation

    Čopič Pucihar, K. & Coulton, P., 10/09/2014, Proceedings of International Symposium on Mixed and Augmented Reality 2014. Piscataway, N.J.: IEEE, p. 299-300 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Utilização de redes neurais SOM para análise de dados espaciais

    Tavares Dos Passos, Y., Jose, R., Matos, L. N. & Silva, M. A. S., 2007.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  6. Published

    Utility-based adaptive radio resource allocation in OFDM wireless networks with traffic prioritization

    Katoozian, M., Navaie, K. & Yanikomeroglu, H., 01/2009, In: IEEE Transactions on Wireless Communications. 8, 1, p. 66-71 6 p., 10476352.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Utilising the event calculus for policy driven adaptation on mobile systems

    Efstratiou, C., Friday, A., Davies, N., Cheverst, K. & EPSRC (Funder), 5/06/2002, p. 13-24. 12 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  8. Published

    Utilising RFID for mixed reality mobile games.

    Rashid, O., Coulton, P., Edwards, R. & Bamford, W., 01/2006, Consumer Electronics, 2006. ICCE '06. 2006 Digest of Technical Papers. International Conference on. IEEE, p. 459-460 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Utilising games to generate awareness regarding gender inequality in parliament

    Christou, E., Blaney, A. & Dunn, N., 25/03/2015. 21 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  10. Published

    Using YANG for the dissemination of the Traffic Engineering Database within software defined Elastic Optical Networks

    Lopez de Vergara, J. E., Lopez, V., Fernández-Palacios, J. P., King, D., Gonzalez de Dios, O., Farrel, A. & Georgalas, N., 5/07/2015, Transparent Optical Networks (ICTON), 2015 17th International Conference on. Jaworski, M. & Marciniak, M. (eds.). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Unpublished

    Using WS-BPEL to Implement Software Fault Tolerance for Web Services

    Dobson, G., 07/2006, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  12. Published

    Using Workshops to Improve Security in Software Development Teams

    Weir, C., 23/11/2020, Lancaster University. 206 p.

    Research output: ThesisDoctoral Thesis

  13. Published

    Using web data provenance for quality assessment

    Hartig, O. & Zhao, J., 2009, Proceedings of the International Workshop on the role of Semantic Web in Provenance Management, Washington DC, USA. Freire, J., Missier, P. & Sahoo, S. S. (eds.). CEUR Workshop Proceedings, Vol. 526. 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Using Visualization to Derive Insights from Research Funding Portfolios

    Molnar, A., McKenna, A. F., Liu, Q., Vorvoreanu, M. & Madhavan, K., 05/2015, In: IEEE Computer Graphics and Applications. 35, 3, p. 91 1 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Using Video Clips to Support Requirements Elicitation in Focus Groups - An Experience Report.

    Broll, G., Hussmann, H., Rukzio, E. & Wimmer, R., 2007. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  16. Published

    Using verifiable author data: Gender and spelling differences in Twitter and SMS

    Baron, A., Tagg, C., Rayson, P., Greenwood, P., Walkerdine, J. & Rashid, A., 06/2011. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  17. Published

    Using unlabeled data in a sparse-coding framework for human activity recognition

    Bhattacharya, S., Nurmi, P., Hammerla, N. & Plötz, T., 12/2014, In: Pervasive and Mobile Computing. 15, p. 242-262 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Using underutilized CPU resources to enhance its reliability

    Timor, A., Mendelson, A., Birk, Y. & Suri, N., 1/01/2010, In: IEEE Transactions on Dependable and Secure Computing. 7, 1, p. 94-109 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Using 'Tilt' as an Interface to control 'No Button' 3-D Mobile Games.

    Gilbertson, P., Coulton, P., Chehimi, F. & Vajk, T., 09/2008, In: Computers in Entertainment (CIE). 6, 3, 14 p., 38.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages

    Farrell, M., Bradbury, M., Fisher, M., Dennis, L. A., Dixon, C., Yuan, H. & Maple, C., 1/09/2019, Software Engineering and Formal Methods: 17th International Conference, SEFM 2019, Oslo, Norway, September 18–20, 2019, Proceedings. Ölveczky, P. C. & Salaün, G. (eds.). Cham: Springer International Publishing, p. 471-490 20 p. (Lecture Notes in Computer Science ; vol. 11724).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Using the XARA XML-Aware corpus query tool to investigate the METER Corpus

    Gaizauskas, R., Burnard, L., Clough, P. & Piao, S., 2003, Proceedings of the Corpus Linguistics 2003 conference. . Archer, D., Rayson, P., Wilson, A. & McEnery, T. (eds.). Lancaster, UK: Lancaster University, p. 227-236 10 p. (UCREL technical paper; no. 16).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Using the support vector machine as a classification method for software defect prediction with static code metrics

    Gray, D., Bowes, D., Davey, N., Sun, Y. & Christianson, B., 2009, International Conference on Engineering Applications of Neural Networks EANN 2009: Engineering Applications of Neural Networks. Springer, p. 223-234 12 p. (Communications in Computer and Information Science; vol. 43).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Using the physicality of NFC to combat grokking of the check-in mechanic

    Nandwani, A., Coulton, P. & Edwards, R., 28/09/2011, MindTrek '11 Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments. New York: ACM, p. 287-290 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Using the Path Computation Element to Enhance SDN for Elastic Optical Networks (EON)

    King, D., López Álvarez, V. & Gonzalez de Dios, O., 31/01/2013, iPOP: IP Over Optical. Japan

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Using the BBC micro:bit as AAC – Three Solutions

    Oppenheim, M., 30/11/2020, In: Communication Matters. 34, 3, p. 13-15 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Using synthetic data for person tracking under adverse weather conditions

    Kerim, A., Celikcan, U., Erdem, E. & Erdem, A., 31/07/2021, In: Image and Vision Computing. 111, 10 p., 104187.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Using subjective views to enhance 3D applications

    Smith, G. & Mariani, J., 1997, VRST '97: Proceedings of the ACM symposium on Virtual reality software and technology. New York, NY, USA: ACM, p. 139-146 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Using studies of collaborative activity in physical environments to inform the design of digital libraries: Technical Report CSEG/11/1998

    Twidale, M. & Nichols, D., 1998, Lancaster University. 5 p.

    Research output: Book/Report/ProceedingsOther report

  29. Published

    Using spatial techniques to decrease message passing in a distributed VE system

    Hagsand, O., Lea, R. & Stenius, M., 1997, VRML '97 Proceedings of the second symposium on Virtual reality modeling language . New York: ACM, 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Using spatial conditions for proactive computing and interaction metaphors

    Streng, S., Guinard, D., Gellersen, H-W. & Schmidt, A., 2008, Proceedings of the Third IASTED International Conference on Human Computer Interaction. Anaheim, CA, USA: ACTA Press, p. 242-247 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Using software defined networking to enhance the delivery of video-on-demand

    Georgopoulos, P., Broadbent, M., Farshad, A., Plattner, B. & Race, N., 15/09/2015, In: Computer Communications. 69, p. 79-87 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Using Smartwatches for Privacy Awareness in Pervasive Environments

    Shaw, P. A., Mikusz, M. A., Davies, N. A. J. & Clinch, S. E., 21/02/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  33. Published

    Using signed digit arithmetic for low-power multiplication

    Crookes, D. & Jiang, M., 24/05/2007, In: Electronics Letters. 43, 11, p. 613-614 2 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Using semantic web technologies for representing e-science provenance

    Zhao, J., Wroe, C., Goble, C., Stevens, R., Quan, D. & Greenwood, M., 2004, The Semantic Web--ISWC 2004: Third International Semantic Web Conference, Hiroshima, Japan, November 7-11, 2004. Proceedings. McIlraith, S. A., Plexousakis, D. & van Harmelen, F. (eds.). Berlin: Springer, p. 92-106 15 p. (Lecture Notes in Computer Science; vol. 3298).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Using quantum confinement to uniquely identify devices

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Young, M., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 10/11/2015, In: Scientific Reports. 5, 8 p., 16456 .

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Using public displays to stimulate passive engagement, active engagement, and discovery in Public spaces

    Memarovic, N., Langheinrich, M., Alt, F., Elhart, I., Hosio, S. & Rubegni, E., 2012, MAB '12 Proceedings of the 4th Media Architecture Biennale Conference: Participation. ACM, p. 55-64 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Using provenance to manage knowledge of In Silico experiments

    Stevens, R., Zhao, J. & Goble, C., 05/2007, In: Briefings in Bioinformatics. 8, 3, p. 183-194 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    Using phylogenetic analysis to enhance genetic improvement

    Rainford, P. & Porter, B., 8/07/2022, GECCO '22: Proceedings of the Genetic and Evolutionary Computation Conference. Fieldsend, J. E. (ed.). New York: ACM, p. 849-957 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Using Pervasive Displays to Aid Student Recall - Reflections on a Campus-Wide Trial

    Mikusz, M. A., Clinch, S., Shaw, P. A., Davies, N. A. J. & Nurmi, P. T., 7/06/2018, PerDis '18 Proceedings of the 7th ACM International Symposium on Pervasive Displays. New York: ACM, 8 p. 6

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Using personal objects as tangible interfaces for memory recollection and sharing

    Mugellini, E., Rubegni, E., Gerardi, S. & Khaled, O. A., 1/10/2007, TEI'07: First International Conference on Tangible and Embedded Interaction - Conference Proceedings. Association for Computing Machinery, Inc, p. 231-238 8 p. (TEI'07: First International Conference on Tangible and Embedded Interaction).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Using P4 to Enable Scalable Intents in Software Defined Networks

    Lewis, B., Fawcett, L., Broadbent, M. & Race, N., 25/09/2018, ICNP 2018: 2018 IEEE 26th InternationalConference on Network Protocols. p. 442-443 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Using NFC to support and encourage green exercise

    Rashid, O., Coulton, P. & Bird, W., 02/2008, Second International Conference on Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008.. IEEE, p. 214-217 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Using NFC Check-ins to Crowd curate Music Preferences

    Lochrie, M., Burnett, D. & Coulton, P., 5/02/2013, Proceedings of 5th International Workshop on Near Field Communication. 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Using NEMO to support the global reachability of MANET nodes.

    McCarthy, B., Edwards, C. & Dunmore, M., 04/2009, IEEE INFOCOM 2009. IEEE, p. 2097-2115 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Using NEMO to Extend the Functionality of MANETs.

    McCarthy, B., Edwards, C. & Dunmore, M., 05/2008, IEEE International Conference on Communications Workshops, 2008. ICC Workshops '08.. IEEE, p. 455-460 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  46. Unpublished

    Using natural language processing tools to assist semiotic analysis of information systems

    Cosh, K. & Sawyer, P., 01/2003, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  47. Published

    Using mobile phones to reveal the complexities of the school journey.

    Bamford, W., Coulton, P., Walker, M., Whyatt, D., Davies, G. & Pooley, C., 09/2008, MobileHCI '08 Proceedings of the 10th international conference on Human computer interaction with mobile devices and services. New York: ACM, p. 283-292 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Using Mobile Phones for Domain Specific Information Appliances

    Schmidt, A., Rukzio, E. & Schmidt, D., 2005.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  49. Published

    Using Mobile Devices to Personalize Pervasive Displays (Demo)

    Clinch, S., Kubitza, T., Davies, N. & Langheinrich, M., 10/2012.

    Research output: Contribution to conference - Without ISBN/ISSN Other

  50. Published

    Using Mobile Devices to Personalize Pervasive Displays (Demo)

    Kubitza, T., Clinch, S., Davies, N. & Langheinrich, M., 02/2012.

    Research output: Contribution to conference - Without ISBN/ISSN Other

Previous 1...3 4 5 6 7 8 9 10 ...199 Next

Back to top