Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    Entangled photon pairs from a quantum dot source

    Stevenson, R. M., Young, R. J., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 12/2006, In: Physica Status Solidi C. 3, 11, p. 3697-3701 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Entangled Photon Pair Emission and Interference from Single Quantum Dots

    Stevenson, R. M., Young, R. & Shields, A. J., 2008, Semiconductor Quantum Bits. Henneberger , F. & Benson, O. (eds.). Jenny Stanford, p. 369-388 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  3. Published

    Quantum dots for single photon and photon pair technology

    Stevenson, R. M., Young, R., Thompson, R. M., Yuan, Z., Kardynal, B. E., Farrer, I., Ward, M. B., Ritchie, D. A. & Shields, A. J., 2006, Quantum Computing in Solid State Systems. Ruggiero, B., Delsing , P., Granata, C., Pashkin, Y. & Silvestrini, P. (eds.). New York: Springer, p. 288-297 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  4. Published

    An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains

    Stevenson, M. & Busby, J., 2015, In: International Journal of Operations and Production Management. 35, 1, p. 110-144 35 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Quantum information system

    Stevenson, R. (Inventor), Bennett, A. (Inventor), Young, R. (Inventor) & Shields, A. J. (Inventor), 2014, Patent No. 8670672, Priority date 11/03/2014, Priority No. 12/834,926

    Research output: Patent

  6. Published

    Optical retrieval system, data storage system, data storage medium and method of optical retrieval and data storage

    Stevenson, R. (Inventor), Yuan, Z. (Inventor), Young, R. (Inventor) & Shields, A. J. (Inventor), 2013, Patent No. 8537649, Priority date 17/09/2013

    Research output: Patent

  7. Published

    Quantum dots as a source of entangled photon pairs

    Stevenson, M., Young, R., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 2006.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  8. Published

    A working memory test battery: Java-based collection of seven working memory tasks

    Stone, J. M. & Towse, J., 5/06/2015, In: Journal of Open Research Software. 3, 9 p., e5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Neighborhood watch: on network coding throughput and key sharing

    Strohmeier, M., Martinovic, I., Roedig, U., Defrawy, K. E. & Schmitt, J., 9/12/2013, Global Communications Conference (GLOBECOM), 2013 IEEE . IEEE Xplore, p. 849-854 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Measurement of organisational maturity in designing safe offshore installations

    Strutt, J. E., Sharp, J. V., Terry, M. & Busby, J. S., 2002, 21st International Conference on Offshore Mechanics and Arctic Engineering (Oslo) - 2002. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    A public ideation of shape-changing applications

    Sturdee, M., Hardy, J., Dunn, N. & Alexander, J., 2015, ITS '15 Proceedings of the 2015 International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 219-228 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Design fiction: how to build a Voight Kampff machine

    Sturdee, M., Coulton, P., Lindley, J., Stead, M., Akmal, H. A. & Hudson-Smith, A., 9/05/2016, CHI EA '16 Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. New York: ACM, p. 375-386 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. E-pub ahead of print

    Using Design Fiction to Inform Shape-Changing Interface Design and Use

    Sturdee, M., 14/04/2017, (E-pub ahead of print) Design for Next, 12th EAD Conference Proceedings. European Academy of Design, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Drawing design futures for shape-changing interfaces

    Sturdee, M., 13/06/2017, DIS '17 Companion Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems. New York: ACM, p. 399-401 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Using Design Fiction to Inform Shape-Changing Interface Design and Use

    Sturdee, M., Coulton, P. & Alexander, J. M., 6/09/2017, In: The Design Journal. 20, Suppl. 1, p. S4146-S4157 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Analysis and Classification of Shape-Changing Interfaces for Design and Application-based Research

    Sturdee, M. & Alexander, J., 3/01/2018, In: ACM Computing Surveys. 51, 1, p. 2:1-2:32 32 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Unpublished

    Toward a Practice of User-Centred Design for Shape-Changing Interfaces

    Sturdee, M. A. & Alexander, J. M., 14/05/2016, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    Sketch & The Lizard King: Supporting Image Inclusion in HCI Publishing

    Sturdee, M. A., Alexander, J. M., Coulton, P. & Carpendale, S., 23/04/2018, CHI EA '18 Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. New York: ACM, 10 p. alt15

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Sketching as a support mechanism for the design and development of shape-changing interfaces

    Sturdee, M. A., 2018, Lancaster University. 262 p.

    Research output: ThesisDoctoral Thesis

  20. Published

    Time for a Change: Examining Temporality in Shape-Changing Interfaces

    Sturdee, M. A. & Alexander, J. M., 2015, 11 p.

    Research output: Book/Report/ProceedingsOther report

  21. Published

    SketchBlog #1: the rise and rise of the sketchnote

    Sturdee, M., Lewis, M. & Marquardt, N., 1/11/2018, Interactions, 25, 6, p. 6-8 3 p.

    Research output: Contribution to specialist publicationArticle

  22. Published

    Feeling SketCHI? the lasting appeal of the drawn image in HCI

    Sturdee, M., Lewis, M. & Marquardt, N., 1/11/2018, Interactions, 25, 6, p. 64-69 6 p.

    Research output: Contribution to specialist publicationArticle

  23. Published

    Sketching sustainability in computing

    Sturdee, M., Mann, S. & Carpendale, S., 20/06/2019, C&C '19 Proceedings of the 2019 on Creativity and Cognition. New York: ACM, p. 29-40 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Visual Methods for the Design of Shape-Changing Interfaces

    Sturdee, M., Everitt, A., Lindley, J., Coulton, P. & Alexander, J., 25/08/2019, IFIP Conference on Human-Computer Interaction: INTERACT 2019. Lamas, D., Loizides, F., Nacke, L., Petrie, H., Winckler, M. & Zaphiris, P. (eds.). Springer, p. 337-358 22 p. ( Lecture Notes in Computer Science; vol. 11748).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Sketching & drawing as future inquiry in HCI

    Sturdee, M. & Lindley, J., 19/11/2019, HTTF 2019 - Proceedings of the Halfway to the Future Symposium 2019. New York: ACM, 10 p. 18. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    A Visual Exploration of Cybersecurity Concepts

    Sturdee, M., Thornton, L., Wimasaliri, B. & Patil, S., 22/06/2021, C&C '21: Creativity and Cognition. New York: ACM, 10 p. 46

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Personality Traits in Game Development

    Sturdee, M., Ivory, M., Ellis, D., Stacey, P. & Ralph, P., 13/06/2022, Proceedings of the ACM International Conference on Evaluation and Assessment in Software Engineering, EASE 2022. ACM, p. 221-230 10 p. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Robust Transmit Designs for Secrecy Rate Constrained MISO NOMA System

    Su, B., Ni, Q. & He, B., 20/12/2018, 29th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Robust Transmit Beamforming for SWIPT-Enabled Cooperative NOMA with Channel Uncertainties

    Su, B., Ni, Q. & Yu, W., 1/06/2019, In: IEEE Transactions on Communications. 67, 6, p. 4381-4392 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Energy Efficient Uplink Transmissions in LoRa Networks

    Su, B., Qin, Z. & Ni, Q., 1/08/2020, In: IEEE Transactions on Communications. 68, 8, p. 4960-4972 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Optimizing Computation Efficiency for NOMA-Assisted Mobile Edge Computing with User Cooperation

    Su, B., Ni, Q., Yu, W. & Pervaiz, H., 30/06/2021, In: IEEE Transactions on Green Communications and Networking. 5, 2, p. 858-867 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 2012, Advanced Agent Technology. Dechesne, F., Hattori, H., ter Mors, A., Such, J. M., Weyns, D. & Dignum, F. (eds.). Berlin: Springer Verlag, p. 411-425 15 p. (Lecture Notes in Computer Science; vol. 7068).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Self-disclosure decision making based on intimacy and privacy

    Such, J. M., Espinosa, A., Garcia-Fornes, A. & Sierra, C., 30/11/2012, In: Information Sciences. 211, p. 93-111 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Enhancing privacy in Multi-agent Systems

    Such, J. M., 2012, In: AI Communications. 25, 4, p. 377-379 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    A Secure Group-Oriented Framework for Intelligent Virtual Environments

    Such, J. M., Alberola, J. M., Barella, A. & Garcia-Fornes, A., 2011, In: Computing and Informatics. 30, 6, p. 1225-1246 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    A group-oriented secure multiagent platform

    Such, J. M., Alberola, J. M., Espinosa, A. & Garcia-Fornes, A., 10/2011, In: Software: Practice and Experience. 41, 11, p. 1289-1302 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Partial identities as a foundation for trust and reputation

    Such, J. M., Espinosa, A., Garcia-Fornes, A. & Botti, V., 10/2011, In: Engineering Applications of Artificial Intelligence. 24, 7, p. 1128-1136 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    Magentix2: a privacy-enhancing agent platform

    Such, J. M., Garcia-Fornes, A., Espinosa, A. & Bellver, J., 01/2013, In: Engineering Applications of Artificial Intelligence. 26, 1, p. 96-109 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    A survey of privacy in multi-agent systems

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 06/2014, In: Knowledge Engineering Review. 29, 3, p. 314-344 31 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    Attacks and Vulnerabilities of Trust and Reputation Models

    Such, J. M., 2013, Agreement Technologies. Ossowski, S. (ed.). Dordrecht: Springer Verlag, p. 467-477 11 p. (Law, Governance and Technology Series; vol. 8).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  41. Published

    Automated buyer profiling control based on human privacy attitudes

    Such, J. M., Garcia-Fornes, A. & Botti, V., 11/2013, In: Electronic Commerce Research and Applications. 12, 6, p. 386-396 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    Privacy policy negotiation in social media

    Such, J. M. & Rovatsos, M., 02/2016, In: ACM Transactions on Autonomous and Adaptive Systems. 11, 1, 29 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    Adaptive conflict resolution mechanism for multi-party privacy management in social media

    Such, J. M. & Criado, N., 2014, WPES '14 Proceedings of the 13th Workshop on Privacy in the Electronic Society. New York: ACM, p. 69-72 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    The economics of assurance activities

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 2015, Lancaster University. 47 p.

    Research output: Book/Report/ProceedingsOther report

  45. Published

    Cyber security controls effectiveness: a qualitative assessment of cyber essentials

    Such, J. M., Vidler, J., Seabrook, T. & Rashid, A., 2015, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  46. Published

    Resolving multi-party privacy conflicts in social media

    Such, J. M. & Criado Pacheco, N., 2/06/2016, In: IEEE Transactions on Knowledge and Data Engineering. 28, 7, p. 1851-1863 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    Information assurance techniques: perceived cost effectiveness

    Such, J. M., Gouglidis, A., Knowles, W., Misra, G. & Rashid, A., 07/2016, In: Computers and Security. 60, p. 117-133 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    An active learning technique enhanced with electronic polls

    Such, J. M., Criado Pacheco, N. & Garcia-Fornes, A., 2015, In: International Journal of Engineering Education. 31, 4, p. 1048-1057 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    Basic Cyber Hygiene: Does It Work?

    Such, J. M., Ciholas, P., Rashid, A., Vidler, J. & Seabrook, T., 16/04/2019, In: IEEE Computer. 52, 4, p. 21-31 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    ROSE: Cluster Resource Scheduling via Speculative Over-subscription

    Sun, X., Hu, C., Yang, R., Garraghan, P., Wo, T., Xu, J., Zhu, J. & Li, C., 2/07/2018, 38th IEEE International Conference on Distributed Systems Computing Systems. IEEE, p. 949-960 12 p. (2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    A pre-injection analysis for identifying fault-injection tests for protocol validation

    Suri, N. & Sinha, P., 2010, In: Journal of Software. 5, 10, p. 1144-1161 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    A software integration approach for designing and assessing dependable embedded systems

    Suri, N., Jhumka, A., Hiller, M., Pataricza, A., Islam, S. & Sârbu, C., 1/10/2010, In: Journal of Systems and Software. 83, 10, p. 1780-1800 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. Published

    Design of an optimal Bayesian incentive compatible broadcast protocol for ad hoc networks with rational nodes

    Suri, N. & Narahari, Y., 2008, In: IEEE Journal on Selected Areas in Communications. 26, 7, p. 1138-1148 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    On dependability driven software and hardware integration

    Suri, N., 12/05/2004, Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings.. IEEE, p. 45-49 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    Panel statement: Why progress in (composite) fault tolerant real-time systems has been slow (-er than expected... & what can we do about it?)

    Suri, N., 18/10/2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004.. IEEE, p. 112-113 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    The need for a generalized compositional framework

    Suri, N., 3/03/2004, 10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings.. IEEE, p. 340 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    Message from the program chair

    Suri, N., 2005, Ninth IEEE International Symposium on High-Assurance Systems Engineering (HASE'05). IEEE, 1 p. (Proc. IEEE Int. Symp. High Assur. Syst. Eng.).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    An auction algorithm for procuring wireless channel in a heterogenous wireless network

    Suri, N. & Narahari, Y., 11/04/2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    An efficient pricing based protocol for broadcasting in wireless ad hoc networks

    Suri, N., Narahari, Y. & Manjunath, D., 8/01/2006, 2006 1st International Conference on Communication Systems Software & Middleware. IEEE, 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    Broadcast in ad hoc wireless networks with selfish nodes: A Bayesian incentive compatibility approach

    Suri, N. & Narahari, Y., 7/01/2007, 2007 2nd International Conference on Communication Systems Software and Middleware. IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Message from the DCCS program chair

    Suri, N., 24/06/2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). IEEE, p. ii 1 p. (Proc. Int. Conf. Dependable Syst. Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  62. Published

    Design of a parallel interconnect based on communication pattern considerations.

    Suri, N. & Mendelson, A., 2001, In: Parallel Algorithms Appl.. 16, 4, p. 243-271 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Published

    Dependable Embedded Systems Special Day Panel: Issues and Challenges in Dependable Embedded Systems.

    Suri, N., Fetzer, C., Abraham, J. A., Poledna, S., Mendelson, A. & Mitra, S., 2008, 2008 Design, Automation and Test in Europe. IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published
  65. Published

    Gyro: A Modular Scale-Out Layer for Single-Server DBMSs

    Suri, N., 30/03/2020, 2019 38th Symposium on Reliable Distributed Systems (SRDS). Lyon, France, Vol. 2019. p. 71-82 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    Distributed Systems Security

    Suri, N., 1/10/2019, CyBOK Knowledge Base. Lupu, E. (ed.). Bristol: University of Bristol, p. 38

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  67. Published

    Distributed Systems Security Knowledge Area: Issue 1.0

    Suri, N., 2019, The Cyber Security Body of Knowledge . Lupu, E. (ed.). University of Bristol, 38 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  68. Published

    A MAC Protocol for Industrial Process Automation and Control

    Suriyachai, P., Brown, J. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  69. Published

    Implementation of a Deterministic Wireless Sensor Network

    Suriyachai, P., Roedig, U. & Scott, A., 01/2008.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  70. Published

    A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks

    Suriyachai, P., Roedig, U. & Scott, A., 2012, In: Communications Surveys and Tutorials, IEEE Communications Society. 14, 2, p. 1-25 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    Implementation of a MAC protocol for QoS support in wireless sensor networks

    Suriyachai, P., Roedig, U. & Scott, A., 9/03/2009, IEEE International Conference on Pervasive Computing and Communications, 2009. PerCom 2009.. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Time-Critical Data Delivery in Wireless Sensor Networks

    Suriyachai, P., Brown, J. & Roedig, U., 06/2010, Proceedings of the 6th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2010). Rajaraman , R., Moscibroda , T., Dunkels, A. & Scaglione, A. (eds.). Berlin: Springer, p. 216-229 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    Dimensioning of Time-Critical WSNs -- Theory, Implementation and Evaluation

    Suriyachai, P., Roedig, U., Scott, A., Gollan, N. & Schmitt, J., 08/2011, In: International Journal of Mobile Communications. 6, 5, p. 360-369 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  74. Published

    Discovering affect-laden requirements to achieve system acceptance

    Sutcliffe, A., Rayson, P., Bull, C. & Sawyer, P., 08/2014, 22nd IEEE International Requirements Engineering Conference (RE'14). IEEE, p. 173-182 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    OSA: one-class recursive SVM algorithm with negative samples for fault detection

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 2013, Artificial neural networks and machine learning – ICANN 2013: 23rd International Conference on Artificial Neural Networks Sofia, Bulgaria, September 10-13, 2013. Proceedings. Mladenov, V., Koprinkova-Hristova, P., Palm, G., Villa, A. E. P., Appollini, B. & Kasabov, N. (eds.). Berlin: Springer Verlag, p. 194-207 14 p. (Lecture Notes in Computer Science; vol. 8131).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    Incremental anomaly identification by adapted SVM method

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 08/2013, International Joint Conference on Neural Networks, IJCNN-2013, Dallas, TX, USA, 3-9 August, 2013. Piscataway, N.J.: IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    The European Court of Human Rights in the post-Cold War era: universality in transition

    Sweeney, J., 30/11/2012, Abingdon: Routledge. 262 p.

    Research output: Book/Report/ProceedingsBook

  78. Published

    Restorative justice and transitional justice at the ECHR

    Sweeney, J., 2012, In: International Criminal Law Review. 12, 3, p. 313-337 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  79. Published

    Credibility, proof and refugee law

    Sweeney, J., 12/2009, In: International Journal of Refugee Law. 21, 4, p. 700-726 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  80. Published

    The human rights of failed asylum seekers in the UK

    Sweeney, J., 2008, In: Public Law. 2008, p. 277-301 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    Transitional criminal justice at the ECtHR: implications for the universality of human rights

    Sweeney, J., 2012, Baltic yearbook of international law. Leiden: Martinus Nijhoff, Vol. 12. p. 183-210 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  82. Published

    Freedom of religion and democratic transition

    Sweeney, J., 2011, Transitional jurisprudence and the ECHR: justice, politics, rights. Buyse, A. & Hamilton, M. (eds.). Cambridge: Cambridge University Press, p. 103-130 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  83. Published

    The idea of home in law: displacement and dispossession

    Sweeney, J. (Editor) & Fox-O'Mahony, L. (Editor), 2010, Farnham: Ashgate Publishing. 248 p. (Law, Property and Society)

    Research output: Book/Report/ProceedingsBook

  84. Published

    The “lure” of facts in asylum appeals: critiquing the practice of judges

    Sweeney, J., 2007, Applying theory to policy and practice: issues for critical reflection . Smith, S. (ed.). Farnham: Ashgate Publishing, p. 19-35 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  85. Published

    A “margin of appreciation” in the internal market: lessons from the European Court of Human Rights

    Sweeney, J., 2007, In: Legal Issues of Economic Integration. 34, p. 27-52 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    Divergence and diversity in post-communist European human rights cases

    Sweeney, J., 2005, In: Connecticut Journal of International Law. 21, p. 1-40 40 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  87. Published

    Margins of appreciation: cultural relativity and the European Court of Human Rights

    Sweeney, J., 1/04/2005, In: International and Comparative Law Quarterly. 54, 2, p. 459-474 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  88. Published

    Non-retroactivity, candour and ‘transitional relativism’: a response to the ECtHR judgment in Maktouf and Damjanović v. Bosnia and Herzegovina

    Sweeney, J., 2014, In: Diritti umani e diritto internazionale. 8, 3, p. 607-622 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  89. Published

    Law and policy on post-conflict restitution

    Sweeney, J., 26/05/2015, International law and post-conflict reconstruction policy. Saul, M. & Sweeney, J. A. (eds.). London: Routledge, p. 286-308 23 p. (Post-Conflict Law and Justice).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  90. Published

    A 'credible' response to persons fleeing armed conflict

    Sweeney, J. A., 04/2016, The Protection of Persons Fleeing Armed Conflict and Other Situations of Violence. Happold, M. & Pichou, M. (eds.). Brussels: Larcier, p. 81-103 23 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  91. Published

    The Elusive Right to Truth in Transitional Human Rights Jurisprudence

    Sweeney, J. A., 1/04/2018, In: International and Comparative Law Quarterly. 67, 2, p. 353-387 35 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    Big Data and Natural Language Processing for Analysing Railway Safety

    Syeda, K. N., Shirazi, S. N. U. H., Naqvi, S. A. A., Parkinson, H. J. & Bamford, G., 11/2017, Innovative Applications of Big Data in the Railway Industry. Kohli, D. S., Kumar, D. A. V. S., Easton, D. J. M. & Roberts, P. C. (eds.). IGI Global Publishing, p. 240-267 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  93. Published

    MAP-based modeling and design of wireless sensor networks with OMNeT++

    Szczytowski, P., Khelil, A. & Suri, N., 13/07/2009, 2009 International Symposium on Performance Evaluation of Computer & Telecommunication Systems. IEEE, p. 162-169 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    ASample: Adaptive spatial sampling in Wireless Sensor Networks

    Szczytowski, P., Khelil, A. & Suri, N., 7/06/2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    LEHP: Localized energy hole profiling in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 22/06/2010, The IEEE symposium on Computers and Communications. IEEE, p. 100-106 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    TOM: Topology oriented maintenance in sparse Wireless Sensor Networks

    Szczytowski, P., Khelil, A., Ali, A. & Suri, N., 27/06/2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, p. 548-556 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    DKM: Distributed k-connectivity maintenance in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 9/01/2012, 2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS). IEEE, p. 83-90 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    MAP++: support for map-based WSN modeling and design with OMNeT++.

    Szczytowski, P., Khelil, A. & Suri, N., 2009, 2nd International ICST Workshop on OMNeT++. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  99. Published

    An Inclusive, Real-World Investigation of Persuasion in Language and Verbal Behavior

    Ta, V. P., Boyd, R. L., Seraj, S., Keller, A., Griffith, C., Loggarakis, A. & Medema, L., 31/05/2022, In: Journal of Computational Social Science. 5, 1, p. 883–903 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    "I didn't spel that wrong did i. Oops": Analysis and standardisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 27/05/2010. 23 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

Back to top