Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    A Fast Recursive Approach to Autonomous Detection, Identification and Tracking of Multiple Objects in Video Streams under Uncertainties

    Sadeghi-Tehran, P., Angelov, P. & Ramezani, R., 07/2010, Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications : 13th International Conference, IPMU 2010, Dortmund, Germany, June 28–July 2, 2010. Proceedings, Part II. Hüllermeier, E., Kruse, R. & Hoffmann, F. (eds.). Berlin: Springer, p. 30-43 14 p. (Communications in Computer and Information Science; vol. 81).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    A field-portable, laser-diode spectrometer for the ultra-sensitive detection of hydrocarbon gases

    Gibson, G., Monk, S. D. & Padgett, M., 04/2002, In: Journal of Modern Optics. 49, 5-6, p. 769-776 8 p.

    Research output: Contribution to Journal/MagazineJournal article

  3. Published

    A flexible approach for finding optimal paths with minimal conflicts

    Bowles, J. & Caminati, M. B., 11/10/2017, ICFEM: International Conference on Formal Engineering Methods. Springer, Vol. 10610. p. 209-225

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A flexible framework to experiment with ontology learning techniques

    Gacitua, R., Sawyer, P. & Rayson, P., 04/2008, In: Knowledge-Based Systems. 21, 3, p. 192-199 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    A flexible framework to experiment with ontology learning techniques

    Gacitua, R., Sawyer, P. & Rayson, P., 2008, Proceedings of AI-2007 Twenty-seventh SGAI International Conference on Artificial Intelligence. Bramer, M., Coenen, F. & Petridis, M. (eds.). Springer, p. 153-166 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    A Flexible ICT Architecture to Support Ancillary Services in Future Electricity Distribution Networks: An Accounting Use Case for DSOs

    Jindal, A., Kronawitter, J., Kühn, R., Bor, M., de Meer, H., Gouglidis, A., Hutchison, D., Marnerides, A., Scott, A. & Mauthe, A., 31/07/2020, In: Energy Informatics. 3, 10 p., 6.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    A formally verified SMT approach to true concurrency

    Bowles, J. & Caminati, M. B., 24/10/2020, Proceedings of the 35th Italian Conference on Computational Logic - CILC 2020, Rende, Italy, October 13-15, 2020.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A foundation for defining security requirements in grid computing

    Gouglidis, A. & Mavridis, I., 4/12/2009, PCI 2009 - 13th Panhellenic Conference on Informatics. IEEE, p. 180-184 5 p. 5298349

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A Framework and Task Allocation Analysis for Infrastructure Independent Energy-Efficient Scheduling in Cloud Data Centers

    Primas, B., Garraghan, P., McKee, D., Summers, J. & Xu, J., 11/12/2017, 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, p. 178-185 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A framework for automated conflict detection and resolution in medical guidelines

    Bowles, J., Caminati, M. B., Cha, S. & Mendoza, J., 1/08/2019, In: Science of Computer Programming. p. 42-63

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    A Framework for Measuring the Costs of Security at Runtime

    Ivkic, I., Pichler, H., Zsilak, M., Mauthe, A. & Tauber, M., 05/2019, CLOSER 2019 : International Conference on Cloud Computing and Services Science.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    A framework for P2P application development

    Walkerdine, J., Hughes, D., Rayson, P., Simms, J., Gilleade, K., Mariani, J. & Sommerville, I., 2008, In: Computer Communications. 31, 2, p. 387-401 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    A framework for privacy aware design in future mobile applications

    Kibirige Mukisa, S., 30/07/2019, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  14. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (Editor) & U., B. (Editor), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    A framework for resilience management in the cloud

    Shirazi, S. N. U. H., Simpson, S., Oechsner, S., Mauthe, A. U. & Hutchison, D., 03/2015, In: Elektrotechnik und Informationstechnik. 132, 2, p. 122-132 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    A framework for the design and evaluation of network resilience management

    Schaeffer-Filho, A., Smith, P., Mauthe, A., Hutchison, D., Yu, Y. & Fry, M., 1/04/2012, Network Operations and Management Symposium (NOMS), 2012 IEEE. IEEE, p. 401-408 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    A framework for the design and validation of efficient fail-safe fault-tolerant programs

    Jhumka, A., Suri, N. & Hiller, M., 2003, Software and Compilers for Embedded Systems . Springer-Verlag, Vol. 2826. p. 182-197 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  18. Published

    A Framework to Support ICS Cyber Incident Response and Recovery

    Staves, A., Balderstone, H., Green, B., Gouglidis, A. & Hutchison, D., 24/05/2020. 14 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  19. Published

    A Frequency Dictionary of Mandarin Chinese: Core vocabulary for learners

    Xiao, R., Rayson, P. & McEnery, T., 2009, London: Routledge.

    Research output: Book/Report/ProceedingsBook

  20. Published

    A Fuel-Payload Ratio Based Flight-Segmentation Benchmark

    Kaivanto, K. K. & Zhang, P., 08/2018, In: Transportation Research Part D: Transport and Environment. 63, p. 548–559 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    A Functional Role for Motor Simulation in Identifying Tools

    Witt, J. K., Kemmerer, D., Linkenauger, S. A. & Culham, J., 09/2010, In: Psychological Science. 21, 9, p. 1215-1219 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    A game theoretical network-assisted user-centric design for resource allocation in 5G heterogeneous networks

    Munir, H., Hassan, S. A., Pervaiz, H. B. & Ni, Q., 15/05/2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    A general purpose intelligent surveillance system for mobile devices using deep learning

    Antoniou, A. & Angelov, P. P., 24/07/2016, 2016 International Joint Conference on Neural Networks (IJCNN). Vancouver Canada: IEEE, p. 2879-2886 8 p. (Neural Networks (IJCNN), 2016 International Joint Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    A general rule for sensory cue summation: evidence from photographic, musical, phonetic and cross-modal stimuli

    To, M. P. S., Baddeley, R. J., Troscianko, T. & Tolhurst, D. J., 7/05/2011, In: Proceedings of the Royal Society B: Biological Sciences. 278, 1710, p. 1365-1372 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Unpublished

    A generic active service deployment protocol

    Sifalakis, M., Schmid, S., Hutchison, D. & Chart, T., 05/2003, (Unpublished)

    Research output: Other contribution

  26. Published

    A Generic Hand-Over Framework for 4G Networks

    Roedig, U. & Sreenan, C. J., 10/2006.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  27. Published

    A genetic algorithm approach for parameter optimization of a 7DOF robotic manipulator

    West, C., Montazeri, A., Monk, S. D. & Taylor, C. J., 28/06/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  28. Published

    A genetic algorithm approach for parameter optimization of a 7DOF robotic manipulator

    West, C., Montazeri, A., Monk, S. D. & Taylor, C. J., 2016, In: IFAC-PapersOnLine. 49, 12, p. 1261-1266 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    A geospatial framework to support integrated biogeochemical modelling in the United Kingdom

    Greene, S., Johnes, P. J., Bloomfield, J. P., Reaney, S. M., Lawley, R. S., Elkhatib, Y., Freer, J., Odoni, N., Macleod, C. J. A. & Percy, B. J., 06/2015, In: Environmental Modelling and Software. 68, p. 219-232 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    A group-oriented secure multiagent platform

    Such, J. M., Alberola, J. M., Espinosa, A. & Garcia-Fornes, A., 10/2011, In: Software: Practice and Experience. 41, 11, p. 1289-1302 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    A History of Violence: Mearsheimer and Walt's Writings from ‘An Unnecessary War’ to the ‘Israel Lobby’ Controversy

    Lacy, M., 2008, In: Geopolitics. 13, 1, p. 100-119 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    A hopping code for MMFSK in a power-line channel

    Adebisi, B., Ali, S. & Honary, B., 07/2009, In: Journal of Communications. 4, 6, p. 429-436 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    A K-Anonymity Based Schema for Location Privacy Preservation

    Fei, F., Li, S., Dai, H., Hu, C., Dou, W. & Ni, Q., 1/04/2019, In: IEEE Transactions on Sustainable Computing. 4, 2, p. 156-167 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    A Key Exchange Protocol for Wireless Ad-hoc Networks Using ECC

    Catterall, N., Katsaros, I. & Honary, B., 12/2004, First International Symposium on Broadband Communications. Harrogate, p. 30

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    A large semantic lexicon for corpus annotation : Proceedings of the Corpus Linguistics 2005 Conference, July 14-17, Birmingham, UK.

    Piao, S., Archer, D., Mudraya, O., Rayson, P., Garside, R., McEnery, T. & Wilson, A., 2005, In: Proceedings from the Corpus Linguistics Conference Series. 1, 1

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    A large semantic lexicon for corpus annotation.

    Piao, S. S. L., Archer, D., Mudraya, O., Rayson, P., Garside, R., McEnery, A. M. & Wilson, A., 2005, Proceedings of the corpus linguistics 2005 conference.. Birmingham

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    A latent class analysis of health risk behaviours in the UK Police Service and their associations with mental health and job strain

    Irizar, P., Gage, S. H., Fallon, V. & Goodwin, L., 24/06/2022, In: BMC Psychiatry. 22, 1, 15 p., 426.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    A latent Markov model for detecting patterns of criminal activity.

    Francis, B. J., Bartolucci, F. & Pennoni, F., 01/2007, In: Journal of the Royal Statistical Society: Series A Statistics in Society. 170, 1, p. 115-132 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking

    Tan, F., Wang, Y., Wang, Q., Bu, L. & Suri, N., 1/10/2015, In: IEEE Transactions on Parallel and Distributed Systems. 26, 10, p. 2630-2642 13 p., 6898840.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing

    Benachour, P., Farrell, P. & Honary, B., 2001, Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings. Honary, B. (ed.). Berlin: Springer, p. 166-175 10 p. (Lecture Notes in Computer Science; vol. 2260).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    A longitudinal analysis of estimation accuracy, counting skills and mathematical ability across the first school year

    Muldoon, K., Towse, J., Simms, V., Perra, O. & Menzies, V., 02/2013, In: Developmental Psychology. 49, 2, p. 250-257 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. E-pub ahead of print

    A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software

    Weir, C., Dyson, A. & Prince, D., 25/09/2023, (E-pub ahead of print) Proceedings of the 2023 IEEE Secure Development Conference (SecDev). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    A Low-Latency Interference Coordinated Routing for Wireless Multi-hop Networks

    Cheng, J., Yang, P., Navaie, K., Ni, Q. & Yang, H., 15/03/2021, In: IEEE Sensors Journal. 21, 6, p. 8679 - 8690 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    A MAC Protocol for Industrial Process Automation and Control

    Suriyachai, P., Brown, J. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  45. Published

    A managed IPv6 transitioning architecture for large network deployments

    Mackay, M. & Edwards, C., 1/07/2009, In: IEEE Internet Computing. 13, 4, p. 42 -51 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    A mapping study of software code cloning

    Shippey, T., Bowes, D., Chrisianson, B. & Hall, T., 2012, 16th International Conference on Evaluation & Assessment in Software Engineering (EASE 2012). IEEE, p. 274-278 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    A Markovian Model for the Analysis of Age of Information in IoT Networks

    Abbas, Q., Hassan, S. A., Pervaiz, H. & Ni, Q., 31/07/2021, In: IEEE Wireless Communications Letters. 10, 7, p. 1596-1600 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    A method for analysing traceability between privacy policies and privacy controls of online social networks

    Anthonysamy, P., Greenwood, P. & Rashid, A., 2014, Privacy technologies and policy: First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers. Preneel, B. & Ikonomou, D. (eds.). Berlin: Springer, p. 187-202 16 p. (Lecture Notes in Computer Science; vol. 8319).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    A Method for Deriving Paths Across a Distributed Web of Trust

    Tipper, P. & Edwards, C., 10/2006.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  50. Published

    A Methodology for analysing the impacts of climate change on maritime security

    Brennan, J. & Germond, B., 10/01/2024, In: Climatic Change. 177, 32 p., 15.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    A methodology for the development and verification of access control systems in cloud computing

    Gouglidis, A. & Mavridis, I., 2013, Collaborative, Trusted and Privacy-Aware e/m-Services. Douligeris, C., Polemi, N., Karantjias, A. & Lamersdorf, W. (eds.). Berlin: Springer Verlag, p. 88-99 12 p. (IFIP Advances in Information and Communication Technology ; vol. 399).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  52. Published

    A Minimum Distance guided Genetic Algorithm for Multi-User Detection in a Multi-Carrier CDMA Wireless Broadband System

    Ni, Q., Jehanzeb, J., Zhang, Y. & Guan, S.-U., 2008, Broadband Communications, Networks and Systems, 2008. BROADNETS 2008. 5th International Conference on. New York: IEEE, p. 500-505 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    A mobile healthcare system using IMS and the HL7 framework

    Nikolidakis, S., Giotsas, V., Vergados, D. & Douligeris, C., 2009, ANCS '09 Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems. New York: ACM Press, p. 187-188 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  54. Published

    A model for characterising cybercrime

    Venables, A., Shaikh, S. & Shuttleworth, J., 01/2015, Standing Group on Organised Crime.

    Research output: Other contribution

  55. Published

    A model for characterizing cyberpower

    Venables, A., Shaikh, S. & Shuttleworth, J., 2015, Critical Infrastructure Protection. USA: Springer, Vol. 9. p. 3-16 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    A Monte Carlo Algorithm for State and Parameter Estimation of Extended Targets

    Angelova, D. & Mihaylova, L., 28/05/2006, ICCS'06: Proceedings of the 6th international conference on Computational Science. p. 624-631 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    A Monte Carlo simulation of monoenergetic neutrons traversing rectangular and spherical polyethylene moderators.

    Monk, S. & Selwood, M., 03/2011, In: Radiation Protection Dosimetry. 144, 1-4, p. 182-186 5 p.

    Research output: Contribution to Journal/MagazineJournal article

  58. Published

    A multi variable optimization approach for the design of integrated dependable real-time embedded systems

    Islam, S. & Suri, N., 2007, Embedded and Ubiquitous Computing: International Conference, EUC 2007, Taipei, Taiwan, December 17-20, 2007. Proceedings. Springer, Vol. 4808 LNCS. p. 517-530 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  59. Published

    A Multi-commodity network flow model for cloud service environments

    Stephanakis, I. M., Shirazi, S. N. U. H., Gouglidis, A. & Hutchison, D., 2016, Engineering Applications of Neural Networks: 17th International Conference, EANN 2016, Aberdeen, UK, September 2-5, 2016, Proceedings. Jayne, C. & Iliadis, L. (eds.). Cham: Springer, p. 186-197 12 p. (Communications in Computer and Information Science; vol. 629).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    A multi-disciplinary perspective on emergent and future innovations in peer review

    Tennant, J. P., Dugan, J. M., Graziotin, D., Jacques, D. C., Waldner, F., Mietchen, D., Elkhatib, Y., B. Collister, L., Pikas, C. K., Crick, T., Masuzzo, P., Caravaggi, A., Berg, D. R., Niemeyer, K. E., Ross-Hellauer, T., Mannheimer, S., Rigling, L., Katz, D. S., Greshake Tzovaras, B. & Pacheco-Mendoza, J. & 13 others, Fatima, N., Poblet, M., Isaakidis, M., Irawan, D. E., Renaut, S., Madan, C. R., Matthias, L., Nørgaard Kjær, J., O'Donnell, D. P., Neylon, C., Kearns, S., Selvaraju, M. & Colomb, J., 20/07/2017, In: F1000Research. 6, 53 p., 1151.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  61. Published

    A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes

    Fagoonee, L. & Honary, B., 12/2003, Cryptography and coding : 9th IMA International Conference on Cryptography and Coding. Paterson, K. G. (ed.). Berlin: Springer-Verlag, p. 24-34 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    A multi-layer and multi-tenant cloud assurance evaluation methodology

    Hudic, A., Tauber, M., Lorunser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A. & Weippl, E. R., 12/2014, Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. Piscataway, N.J.: IEEE, p. 386-393 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    A Multi-Level Approach to Resilience of Critical Infrastructures and Services

    Gouglidis, A., Shirazi, S. N. U. H., Simpson, S., Smith, P. & Hutchison, D., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  64. Published

    A multilevel approach towards challenge detection in cloud computing

    Shirazi, S. N. U. H., Watson, M., Marnerides, A., Mauthe, A. & Hutchison, D., 07/2013, Cyberpatterns 2013 : Proceedings of the Second International Workshop on Cyberpatterns . Oxford: Oxford Brookes University, p. 103-107 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    A multi-level resilience framework for unified networked environments

    Marnerides, A., Bhandari, A., Murthy, H. & Mauthe, A. U., 05/2015, Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on. IEEE, p. 1369-1372 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Unpublished

    A Multimedia Phone in Family Life

    Graham, C. & Rouncefield, M., 2007, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  67. Published

    A multisine approach for trajectory optimization based on information gain.

    Mihaylova, L., De Schutter, J. & Bruyninckx, H., 06/2003, In: Robotics and Autonomous Systems. 43, 4, p. 231-243 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    A national initiative in data science for health: an evaluation of the UK Farr Institute

    Hemingway, H., Lyons, R., Li, Q., Buchan, I., Ainsworth, J., Pell, J., Morris, A., Barnes, M. R., Bedford, H., Bennie, M., others, 1. & Caminati, M., 8/04/2020, In: International Journal of Population Data Science. 5, 1, 32935051.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    A Negative Effect of Evaluation Upon Analogical Problem Solving.

    Bearman, C., Ormerod, T. C. & Ball, L. J., 08/2003. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  70. Published

    A nested hierarchy of dynamically evolving clouds for big data structuring and searching

    Angelov, P. & Sadeghi Tehran, P., 8/08/2015, In: Procedia Computer Science. 53, p. 1-8 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    A new approach to improve the parameter estimation accuracy in robotic manipulators using a multi-objective output error identification technique

    West, C., Montazeri, A., Monk, S. D., Duda, D. & Taylor, C. J., 14/12/2017, 26th IEEE International Symposium on Robot and Human Interactive Communication, Lisbon. IEEE, p. 1406-1411 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    A new family of rank codes and applications to cryptography

    Gabidulin, E. M., Ourivski, A. V., Honary, B. & Ammar, B., 07/2002, Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on. Lausanne, Switzerland : IEEE, p. 268 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    A new link lifetime estimation method for greedy and contention-based routing in mobile ad hoc networks

    Noureddine, H., Ni, Q., Min, G. & Al-raweshidy, H., 03/2014, In: Telecommunication Systems. 55, 3, p. 421-433 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  74. Published

    A New Link Lifetime Prediction Method for Greedy and Contention-based Routing in Mobile Ad Hoc Networks

    Noureddine, H., Ni, Q., Min, G. & Al-Raweshidy, H., 2010, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, p. 2662-2667 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    A New Method for Ultra Wideband Channel Modelling Based on Ray Tracing

    Memari, B. & Honary, B., 11/2006, The IET International Conference on Wireless, Mobile & Multimedia Networks . Hangzhou, China: IET Press, p. 139-142 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    A new partial transmit sequence scheme using genetic algorithm for peak-to-average power ratio reduction in a multi-carrier code division multiple access wireless system

    Zhang, Y., Ni, Q. & Chen, H. H., 2009, In: International Journal of Autonomous and Adaptive Communications Systems. 2, 1, p. 40-57 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    A new signal set for ring-BCM

    Castineira Moreira, J., Honary, B. & Farrell, P., 07/2001, Proceedings of the 6th International Symposium on Communication Theory and Applications (ISCTA 2001). Lancaster: HW Communications Limited, p. 353–357 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    A new type of simplified fuzzy rule-based systems

    Angelov, P. & Yager, R., 01/2012, In: International Journal of General Systems. 41, 2, p. 163-185 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  79. Published

    A new unsupervised approach to fault detection and identification

    Costa, B., Angelov, P. & Guedes, L. A., 07/2014, Neural Networks (IJCNN), 2014 International Joint Conference on. IEEE, p. 1557-1564 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. E-pub ahead of print

    A NOMA-Enhanced 2-Step RACH Procedure for Low-Latency Access in 5G Networks

    Nie, D., Yu, W., Foh, C. H. & Ni, Q., 31/05/2025, In: IEEE Internet of Things Journal. 12, 9, p. 11568 11580 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    A Non-linear Signal Processing Model for Signal Generation in Multilevel Two Dimensional Optical Storage

    Fagoonee, L., Coene, W. M. J., Moinian, A. & Honary, B., 02/2004, In: Optics Letters. 29, 4, p. 385-387 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  82. Published

    A novel 3D analytical scattering model for air-to-ground fading channels

    Gulfam, S. M., Nawaz, S. J., Ahmed, A., Patwary, M. N. & Ni, Q., 4/08/2016, In: Applied Sciences. 6, 8, 21 p., 207.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  83. Published

    A novel approach to estimating current and future states of technical systems: Proc. of the International Conference on Computing, Networking and Communications (ICNC)

    Bushminkin, K., Kolev, D., Rodionov, D., Mihaylova, L. & Vikhoreva, A., 2012, International Conference on Computing, Networking and Communications (ICNC), 2012. IEEE, p. 512-516 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    A novel approach to manage cloud security SLA incidents

    Trapero, R., Modic, J., Stopar, M., Taha, A. & Suri, N., 1/07/2017, In: Future Generation Computer Systems. 72, p. 193-205 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. Published

    A Novel Data-driven Approach to Autonomous Fuzzy Clustering

    Gu, X., Ni, Q. & Tang, G., 30/06/2022, In: IEEE Transactions on Fuzzy Systems. 30, 6, p. 2073-2085 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    A Novel Game-Theoretic Cross-Layer Design for OFDMA Broadband Wireless Networks

    Zarakovitis, C. C., Ni, Q., Nikolaros, I. & Tyce, O., 2010, Communications (ICC), 2010 IEEE International Conference on. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    A novel power-efficient middleware scheme for sensor grid applications

    Miridakis, N. I., Giotsas, V., Vergados, D. D. & Douligeris, C., 2009, Quality of Service in Heterogeneous Networks: 6th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2009 and 3rd International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications, AAA-IDEA 2009, Las Palmas, Gran Canaria, November 23-25, 2009 Proceedings. Bartolini, N., Nikoletseas, S., Cardellini, V. & Mahanti, A. (eds.). Berlin: Springer, p. 476-492 17 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 22).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    A Novel Sequential Monte Carlo Approach for Extended Object Tracking Based on Border Parameterisation

    Petrov, N., Mihaylova, L., Gning, A. & Angelova, D., 07/2011, 14th International Conference on Information Fusion: ISIF. Chicago, Illinois, USA, p. 306-313 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    A Novel Simplified Implementation of LDPC Decoding Using Neural Networks

    Momahed Heravi, B. & Honary, B., 09/2006, The Second International Symposium on Broadband Communication (ISBC’06). Lancaster: HW Communications

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    A Novel Wireless Leaf Area Index Sensor Based on a Combined U-Net Deep Learning Model

    Wang, H., Wu, Y., Ni, Q. & Liu, W., 15/08/2022, In: IEEE Sensors Journal. 22, 16, p. 16573 - 16585 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  91. Published

    A Parsimonious Measure of Lexical Similarity for the Characterisation of Latent Stylistic Profiles

    Bell, E., Berridge, D. & Rayson, P., 2009, Proceedings of the Corpus Linguistics Conference CL 2009. Mahlberg, M., González-Díaz, V. & Smith, C. (eds.). Lancaster: Lancaster University, 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    A partial order scalogram analysis of communication behavior in crisis negotiation with the prediction of outcome.

    Taylor, P. J., 2002, In: International Journal of Conflict Management. 13, 1, p. 4-37 34 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  93. Published

    A particle filter for freeway traffic estimation

    Mihaylova, L. & Boel, R., 12/2004, Decision and Control, 2004. CDC. 43rd IEEE Conference on (Volume:2 ). IEEE, Vol. 2. p. 2106-2111 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    A Passion for Security: Intervening to Help Software Developers

    Weir, C., Becker, I. & Blair, L., 25/05/2021, 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, p. 21-30 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    A Passive Approach to Autonomous Collision Detection and Avoidance in Uninhabited Aerial Systems.

    Angelov, P., Bocaniala, C. D., Xydeas, C., Pattchett, C., Ansell, D., Everett, M. & Leng, G., 04/2008, Tenth International Conference on Computer Modeling and Simulation, 2008. UKSIM 2008. . IEEE, p. 64-69 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Unpublished

    A Pattern for Designing Component-Based Frameworks

    Rashid, A., Parsons, D., Telea, A. & Speck, A., 01/2005, (Unpublished)

    Research output: Other contribution

  97. Published

    A Perceptual-Motor Deficit Predicts Social and Communicative Impairments in Individuals With Autism Spectrum Disorders

    Linkenauger, S. A., Lerner, M. D., Ramenzoni, V. C. & Proffitt, D. R., 10/2012, In: Autism Research. 5, 5, p. 352-362 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    A performance comparative study on the implementation methods for OFDMA cross-layer optimization

    C. Zarakovitis, C. & Ni, Q., 06/2012, In: Future Generation Computer Systems. 28, 6, p. 923-929 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    A performance evaluation of three multiagent platforms

    Alberola, J. M., Such, J. M., Garcia-Fornes, A., Espinosa, A. & Botti, V., 08/2010, In: Artificial Intelligence Review. 34, 2, p. 145-176 32 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    A performance study of RSVP with proposed extensions

    Mathy, L., Hutchison, D., Schmid, S. & Simpson, S., 1/12/2002, In: Computer Communications. 25, 18, p. 1782-1798 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 4 5 6 7 8 ...36 Next

Back to top