Home > Research > Computing and Communications > Publications & Outputs
View graph of relations

Computing and Communications

  1. 2014
  2. Published

    Detecting and Preventing Data Exfiltration

    Rashid, A., Ramdhany, R., Edwards, M., Kibirige Mukisa, S., Ali Babar, M., Hutchison, D. & Chitchyan, R., 04/2014, Lancaster: Lancaster University. 40 p.

    Research output: Book/Report/ProceedingsOther report

  3. Published

    Downlink beamforming design for cognitive cellular systems

    Le, T. A. & Navaie, K., 04/2014, Wireless Communications and Networking Conference (WCNC), 2014 IEEE. IEEE, p. 1188-1193 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    From the private into the public: privacy-respecting mobile interaction techniques for sharing data on surfaces

    Seifert, J., Dobbelstein, D., Schmidt, D., Holleis, P. & Rukzio, E., 04/2014, In: Personal and Ubiquitous Computing. 18, 4, p. 1013-1026 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Illuminating adaptive comfort: dynamic lighting for the active occupant

    Nagy, Z., Hazas, M., Frei, M., Rossi, D. & Schlueter, A., 04/2014, Proceedings of the 8th Windsor Conference: Counting the Cost of Comfort in a Changing World. Nicol, F., Roaf, S., Brotas, L. & Humphreys, M. (eds.). Network for Comfort and Energy Use in Buildings (NCEUB), p. 872-885 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Measuring similarity and improving stability in biomarker identification methods applied to Fourier-transform infrared (FTIR) spectroscopy

    Trevisan, J., Park, J., Angelov, P., Ahmadzai, A., Gajjar, K., Scott, A. D., Carmichael, P. L. & Martin, F., 04/2014, In: Journal of Biophotonics. 7, 3-4, p. 254-265 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Norm reasoning services

    Criado, N., Such, J. M. & Botti, V., 04/2014, In: Information Systems Frontiers . 16, 2, p. 201-223 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Observations of a software engineering studio: reflecting with the studio framework

    Bull, C. & Whittle, J., 04/2014, Proceedings of the 27th IEEE Conference on Software Engineering Education and Training (CSEE&T 2014). Piscataway, N.J.: IEEE, p. 74-83 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    OpenCache: leveraging SDN to demonstrate a customisable and configurable cache

    Broadbent, M., Georgopoulos, P., Kotronis, V., Plattner, B. & Race, N., 04/2014, Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on. Piscataway, N.J.: IEEE, p. 151-152 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Outside the box: an alternative data analytics frame-work

    Angelov, P., 04/2014, In: Journal of Automation, Mobile Robotics and Intelligent Systems. 8, 2, p. 29-35 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Periphere Kooperation am Beispiel der Anschläge in Norwegen 2011

    Buscher, M., Weise, S. & Perng, S.-Y., 04/2014, In: i-com. 13, 1, p. 12-19 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Pervasive displays: understanding the future of digital signage

    Davies, N., Clinch, S. & Alt, F., 04/2014, Morgan and Claypool. 128 p. (Synthesis Lectures on Mobile and Pervasive Computing)

    Research output: Book/Report/ProceedingsBook

  13. Published

    SensaBubble: a chrono-sensory mid-air display of sight and smell

    Seah, S. A., Martinez Plasencia, D., Bennett, P. D., Karnik, A., Otrocol, V. S., Knibbe, J., Cockburn, A. & Subramanian, S., 04/2014, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM, p. 2863-2872 10 p. (CHI '14).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Cross-device gaze-supported point-to-point content transfer

    Turner, J., Bulling, A., Alexander, J. & Gellersen, H., 26/03/2014, ETRA '14 Proceedings of the Symposium on Eye Tracking Research and Applications. New York: ACM, p. 19-26 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication

    Truong, H. T. T., Gao, X., Shrestha, B., Saxena, N., Asokan, N. & Nurmi, P., 24/03/2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, p. 163-171 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Demo abstract: A testbed infrastructure to study the impact of temperature on WSN

    Boano, C. A., Roemer, K., Brown, J., Roedig, U. & Zúñiga, M. A., 24/03/2014, Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on. IEEE, p. 154-156 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Performance evaluation of congestion window validation for DASH transport

    Nazir, S., Hossain, Z., Secchi, R., Broadbent, M., Petlund, A. & Fairhurst, G., 19/03/2014, NOSSDAV '14 Proceedings of Network and Operating System Support on Digital Audio and Video Workshop. New York: ACM, 6 p. 67

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Special issue on Future Internet Testbeds - Part I: Guest Editorial

    Sterbenz, J. P. G., Hutchison, D., Müller, P. & Elliott, C., 14/03/2014, In: Computer Networks. 61, p. 1-4 4 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  19. Published

    Network aware and power-based resource allocation in mobile Ad Hoc computational grid

    Shah, S. C., Chauhdary, S. H., Bilal, M. & Park, M. S., 9/03/2014, Proceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014. Institute of Electrical and Electronics Engineers Inc., p. 428-435 8 p. 7056777. (Proceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    An Architectural Model for Deploying Critical Infrastructure Services in the Cloud.

    Schöller, M., Bless, R., Pallas, F., Horneber, J. & Smith, P., 6/03/2014, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 458-466 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    An empirical failure-analysis of a large-scale cloud computing environment

    Garraghan, P., Townend, P. & Xu, J., 6/03/2014, 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering. IEEE, p. 113-120 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    Attack pattern recognition through correlating cyber situational awareness in computer networks

    Shirazi, S. N. U. H., Schaeffer-Filho, A. & Hutchison, D., 1/03/2014, Cyberpatterns: unifying design patterns with security and attack patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 125-134 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  23. Published

    Sequential Monte Carlo methods for state and parameter estimation in abruptly changing environments

    Nemeth, C., Fearnhead, P. & Mihaylova, L., 1/03/2014, In: IEEE Transactions on Signal Processing. 62, 5, p. 1245-1255 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    A new link lifetime estimation method for greedy and contention-based routing in mobile ad hoc networks

    Noureddine, H., Ni, Q., Min, G. & Al-raweshidy, H., 03/2014, In: Telecommunication Systems. 55, 3, p. 421-433 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Hidden-sector photon and axion searches using photonic band gap structures

    Seviour, R., Bailey, I., Woollett, N. & Williams, P., 12/02/2014, In: Journal of Physics G: Nuclear and Particle Physics. 41, 3, 10 p., 035005.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Preface

    Chen, X., Qu, G., Angelov, P., Ferri, C., Lai, J. H. & Wani, A., 5/02/2014, 2014 13th International Conference on Machine Learning and Applications. IEEE, p. xiv 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNForeword/postscript

Back to top