Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    TRCCIT: Tunable reliability with congestion control for information transport in wireless sensor networks

    Shaikh, F. K., Khelil, A., Ali, A. & Suri, N., 2010. 9 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  2. Published

    TrEKer: Tracing error propagation in operating system kernels

    Coppik, N., Schwahn, O., Winter, S., Suri, N., T.N., N. (Editor), G., R. & M., D. P., 30/10/2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, p. 377-387 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Trellis decoding techniques for binary adder channel with M users and it’s practical application

    Markarian, G., Honary, B. & Benachour, P., 5/09/1996, p. 218-221. 4 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Published

    Trellis-hopping Turbo Coding

    Moreira, J. C., Petruzzi, D. M., Liberatori, M. C. & Honary, B., 12/2006, In: IEE Proceedings - Communications. 153, 6, p. 966-975 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Triggered entangled photons from quantum dots

    Young, R., 25/09/2006.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  6. Published

    TriggerTV: exploiting social user journeys within an interactive tv system

    Jones, A., Mitchell, K. & Race, N. J. P., 2010, Proceedings of the 20th international workshop on Network and operating systems support for digital audio and video: NOSSDAV '10. New York: ACM, p. 51-56 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Trimmer: Cost-Efficient Deep Learning Auto-tuning for Cloud Datacenters

    Borowiec, D., Yeung, G.-F., Friday, A., Harper, R. H. R. & Garraghan, P., 24/08/2022, Proceedings - 2022 IEEE 15th International Conference on Cloud Computing, CLOUD 2022. IEEE, p. 374-384 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Trolling in asynchronous computer-mediated communication: from user discussions to theoretical concepts

    Hardaker, C., 07/2010, In: Journal of Politeness Research. 6, 2, p. 215-242 28 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Trust & security RTD in the internet of things: Opportunities for international cooperation

    Clarke, J., Sharma, A., Suri, N., Castro, R. R. & Lopez, J., 17/08/2012, Proceedings of the First International Conference on Security of Internet of Things. ACM, p. 172-178 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Trust and distrust in safety leadership: mirror reflections?

    Conchie, S., Taylor, P. J. & Charlton, A., 10/2011, In: Safety Science. 49, 8-9, p. 1208-1214 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Trust validation of cloud IaaS: A customer-centric approach

    Manzoor, S., Taha, A. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 97-104 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Trust: Missing Piece(s) in the Safety Puzzle.

    Conchie, S., Donald, I. & Taylor, P. J., 10/2006, In: Risk Analysis. 26, 5, p. 1097-1104 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Trust-based approaches to safety and production

    Conchie, S. M., Woodcock, H. E. & Taylor, P. J., 6/11/2015, The Wiley Blackwell handbook of the psychology of occupational safety and workplace health. Clarke, S., Probst, T., Guldenmund, F. & Passmore, J. (eds.). Chichester: Wiley-Blackwell, p. 111-132 22 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  14. Published

    Trusted Asynchronous Structured Messaging Architecture

    Tipper, P. & Edwards, C., 03/2007.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  15. Published

    Trusting Quantum Physics: lighting the way to secure communications

    Young, R. J., 28/09/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  16. Published

    Trusting the record

    Clarke, K., Hartswood, M., Procter, R., Rouncefield, M. & Slack, R., 2003, In: Methods of Information in Medicine. 42, 4, p. 345-352 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Trustworthy by design

    Knowles, B., Harding, M., Blair, L., Davies, N., Hannon, J., Rouncefield, M. & Walden, J., 2014, CSCW '14 Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. New York: ACM, p. 1060-1071 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Truthful Online Double Auctions for Mobile Crowdsourcing: An On-demand Service Strategy

    Liu, S., Yu, Y., Guo, L., Yeoh, P. L., Ni, Q., Vucetic, B. & Li, Y., 1/09/2022, In: IEEE Internet of Things Journal. 9, 17, p. 16096 - 16112 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    TTET: Event-triggered channels on a time-triggered base

    Claesson, V. & Suri, N., 14/04/2004, ICECCS '04 Proceedings of the Ninth IEEE International Conference on Engineering Complex Computer Systems Navigating Complexity in the e-Engineering Age. ACM, p. 39-46 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Tuning into the right wavelength: The importance of culture for effective crisis negotiation

    Giebels, E. & Taylor, P., 2012, The psychology of crisis intervention for law enforcement officers. St-Yves, M. & Collins, P. (eds.). Toronto: Carswell, p. 277-294 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  21. Published

    Tuning the properties of exciton complexes in self-assembled GaSb/GaAs quantum rings

    Kamarudin, M. A., Hayne, M., Young, R. J., Zhuang, Q. D., Ben, T. & Molina, S. I., 10/03/2011, In: Physical review B. 83, 11, 6 p., 115311 .

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Tutorial: implementation of a pedestrian tracker using foot-mounted inertial sensors

    Fischer, C., Talkad Sukumar, P. & Hazas, M., 04/2013, In: IEEE Pervasive Computing. 12, 2, p. 17-27 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Unpublished

    Tweaking: The Everyday Accomplishment of Managerial Work in a Hospital Setting

    Clarke, K., Rouncefield, M., Procter, R. & Hartswood, M., 01/2001, (Unpublished) In: Environment and Planning A.

    Research output: Contribution to Journal/MagazineJournal article

  24. Published

    Two-dimensional materials for quantum light sources and authentication

    Young, R. J., 23/08/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  25. Published

    Types of risk transformation: a case study

    Busby, J., Alcock, R. E. & MacGillivray, B., 2012, In: Journal of Risk Research. 15, 1, p. 67-84 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Type-safe updating for modular WSN software

    Porter, B., Coulson, G. & Roedig, U., 06/2011, Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011 International Conference on . IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Typicality distribution function: a new density-based data analytics tool

    Angelov, P., 12/07/2015, Neural Networks (IJCNN), 2015 International Joint Conference on. IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Unpublished

    UAV collision avoidance - state of the art and possible solutions.

    Angelov, P., Xydeas, C., Bocaniala, C. D., Ansell, D., Patchett, C. & Everett, M., 4/10/2007, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  29. Published

    UAV-aided Wireless Power Transfer and Data Collection in Rician Fading

    Liu, Y., Xiong, K., Lu, Y., Ni, Q., Fan, P. & Letaief, K. B., 31/10/2021, In: IEEE Journal on Selected Areas in Communications. 39, 10, p. 3097-3113 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    UAV-Assisted Wireless Powered Cooperative Mobile Edge Computing: Joint Offloading, CPU Control, and Trajectory Optimization

    Liu, Y., Xiong, K., Ni, Q., Fan, P. & Letaief, K. B., 14/04/2020, In: IEEE Internet of Things Journal. 7, 4, p. 2777-2790 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Ubi Displays: A Toolkit for the Rapid Creation of Interactive Projected Displays

    Hardy, J., Ellis, C., Alexander, J. & Davies, N., 5/06/2013. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  32. Published

    Ubiquitous technologies, cultural logics and paternalism in industrial workplaces

    Kinder, K. E., Ball, L. J. & Busby, J. S., 2008, In: Poiesis and Praxis. 5, 3-4, p. 265-290 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    UDesignIt: Towards Social Media for Community- Driven Design

    Greenwood, P., Rashid, A. & Walkerdine, J., 2012. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  34. Published

    UK election 2019: how the main parties compare on immigration

    Consterdine, E., 4/12/2019

    Research output: Exhibits, objects and web-based outputsBlog

  35. Published

    UK to remain a hostile environment for immigration under nebulous new post-Brexit policy

    Consterdine, E., 20/12/2018

    Research output: Exhibits, objects and web-based outputsBlog

  36. Published

    Ukko: Resilient DRES Management for Ancillary Services using 5G Service Orchestration

    Rotsos, C., Marnerides, A., Magzoub, A., Jindal, A., McCherry, P., Bor, M., Vidler, J. & Hutchison, D., 30/12/2020, 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Ukraine invasion: what can be done at sea – without risking war

    Germond, B., 1/03/2022

    Research output: Exhibits, objects and web-based outputsBlogpeer-review

  38. Published

    Ukraine war: how Kyiv’s southern offensive will exploit Russia’s naval vulnerabilities

    Germond, B., 31/08/2022

    Research output: Exhibits, objects and web-based outputsBlog

  39. Published

    Ukraine war: Black Sea grain deal exposes Moscow’s long-term diplomatic game

    Germond, B., 25/07/2022

    Research output: Exhibits, objects and web-based outputsBlog

  40. Published
  41. Published
  42. Published
  43. Published

    Ukraine war: reclaiming Snake Island is Kyiv’s biggest strategic victory so far – here’s why

    Germond, B., 5/07/2022

    Research output: Exhibits, objects and web-based outputsBlog

  44. Published

    Ukraine war: Russia has the upper hand in the ground war – but at sea it’s a different story

    Germond, B., 17/07/2024

    Research output: Exhibits, objects and web-based outputsBlog

  45. Published

    Ukraine War: The Limits of Traditional Naval Power and the Rise of Collective and Civilian Seapower

    Germond, B., 10/05/2022

    Research output: Exhibits, objects and web-based outputsBlog

  46. Published

    Ukraine War: why the Black Sea is key to Kyiv’s counteroffensive

    Germond, B., 21/09/2023

    Research output: Exhibits, objects and web-based outputsBlog

  47. Published

    Ukraine: Russia’s inability to dominate the sea has changed the course of the war

    Germond, B., 23/02/2023

    Research output: Exhibits, objects and web-based outputsBlog

  48. Published

    uLearn: facilitating ubiquitous learning through camera equipped mobile phones

    Mitchell, K., Race, N. J. P. & Clarke, M., 01/2005, IEEE International Workshop on Wireless and Mobile Technologies in Education, 2005. WMTE 2005. . IEEE Press, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Ultrasound-aided pedestrian dead reckoning for indoor navigation

    Fischer, C., Muthukrishnan, K., Hazas, M. & Gellersen, H., 19/09/2008, ACM. p. 31-36 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Ultra-tangibles: creating movable tangible objects on interactive tables

    Marshall, M., Carter, T., Alexander, J. & Subramanian, S., 2012, CHI '12 Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems. New York: ACM, p. 2185-2188 4 p. (CHI '12).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published
  52. Published

    Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks

    Kolomvatsos, K., Anagnostopoulos, C., Marnerides, A., Ni, Q., Hadjiefthymiades, S. & Pezaros, D., 4/09/2017, Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity

    Al-Salami, N. & Zhang, B., 6/10/2020, 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS). IEEE, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    Understanding actionable knowledge in social media: BBC Question Time and Twitter, a case study

    Ferrario, M. A., Simm, W., Whittle, J., Rayson, P., Terzi, M. & Binner, J., 2012, Sixth International AAAI Conference on Weblogs and Social Media. AAAI, p. 455-458 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Unpublished

    Understanding and improving navigation within electronic documents

    Alexander, J., 2009, (Unpublished) 413 p.

    Research output: ThesisDoctoral Thesis

  56. Published

    Understanding criminal careers

    Soothill, K., Fitzpatrick, C. & Francis, B., 2009, Cullompton: Willan. 204 p.

    Research output: Book/Report/ProceedingsBook

  57. Published

    Understanding criminal careers in organised crime

    Francis, B., Humphreys, L., Kirby, S. & Soothill, K., 7/10/2013, London: Home Office. 120 p. (Crime research and analysis; no. 74)

    Research output: Book/Report/ProceedingsCommissioned report

  58. Published

    Understanding cyber criminals and measuring their future activity

    Hargreaves, C. & Prince, D., 1/07/2013, Lancaster: Lancaster University. (Future of ...)

    Research output: Book/Report/ProceedingsOther report

  59. Unpublished

    Understanding space, place and 'community

    Rouncefield, M., Cheverst, K., Dix, A., Gibbs, M. & Graham, C., 09/2005, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  60. Published

    Understanding the barriers to accidents - organisations and the management of technological hazards

    Lemon, M. & Busby, J. S., 2003, Technology and HRM Conference II (CERMAhia Antipolis) - 2003. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Understanding the confounding factors of inter-domain routing modeling

    Kastanakis, S., Giotsas, V. & Suri, N., 25/10/2022, IMC 2022 - Proceedings of the 2022 ACM Internet Measurement Conference. New York: ACM, p. 758-759 2 p. (Proceedings of the 22nd ACM Internet Measurement Conference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Understanding the ecological validity of relying practice as a basis for risk identification

    Anderson, T., Busby, J. & Rouncefield, M., 1/07/2020, In: Risk Analysis. 40, 7, p. 1383-1398 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Unpublished

    Understanding the Impact of Change in COTS-Based Systems

    Hutchinson, J., Kotonya, G. & Sawyer, P., 06/2003, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  64. Published

    Understanding the mismatch between the demands of risk assessment and practice of scientists - the case of Deca-BDE.

    Alcock, R. E., MacGillivray, B. H. & Busby, J., 01/2011, In: Environment International. 37, 1, p. 216-225 10 p.

    Research output: Contribution to Journal/MagazineLiterature reviewpeer-review

  65. Published

    Understanding Your Needs: An Adaptive VoD System

    Mu, M., Knowles, W. & Race, N., 12/2012, Multimedia (ISM), 2012 IEEE International Symposium on. IEEE, p. 255-260 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    Unequal Two-fold Turbo Codes and Digital Image Transmission

    Tanriover, C. C. & Honary, B., 12/2003, 7th International Symposium on Digital Signal Processing and Communication Systems .

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification

    Lopez Pellicer, A., Giatgong, K., Li, Y., Suri, N. & Angelov, P., 9/09/2024, 2024 International Joint Conference on Neural Networks (IJCNN). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    Unified and Personalised Messaging to Support E-Learning

    Mitchell, K., Race, N. J. P., McCaffery, D., Bryson, M. & Zhen, C., 11/2006, Fourth IEEE International Workshop on Wireless, Mobile and Ubiquitous Technology in Education, 2006. WMUTE '06. . IEEE, p. 164-168 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  69. Published

    Uniformly distributed hopping pattern for MMFSK in power line communications

    Adebisi, B., Ali, S. & Honary, B., 04/2008, IEEE ISPLC (International Symposium on Power-Line Communications and Its Applications) . Jeju Island, Korea: IEEE, p. 244–248 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    United Kingdom – group accounts

    Taylor, P. A., 2001, Transnational Accounting, 2nd Edition. London: Palgrave, p. 2717-2849 133 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  71. Published

    United Kingdom - Group Accounts (2001)

    Taylor, P., 2001, Transnational Accounting (TRANSACC) 2nd Edition. Ordelheide, D. & Ordelheide, D. (eds.). UK: Palgrave, Vol. 3. p. 2,717-2,851

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  72. Published

    Unmanned weapons systems and just wars: the psychological dimensions

    Power, N., Alison, L. & Ralph, J., 18/08/2014, Precision strike warfare and international intervention: strategic, ethico-legal and decisional implications. Aaronson, M., Aslam, W., Dyson, T. & Rauxloh, R. (eds.). London: Routledge, p. 188-205 18 p. (Routledge Global Security Studies).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  73. Published

    Unpacking tacit knowledge for requirements engineering

    Gervasi, V., Gacitua, R., Rouncefield, M., Sawyer, P., Kof, L., Li, M., Piwek, P., De Roeck, A., Willis, A., Hui, Y. & Nuseibeh, B., 2013, Managing requirements knowledge. Maalej, W. & Thurimella, A. K. (eds.). Berlin: Springer, p. 23-47 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  74. Published

    Unraveling BitTorrent’s File Unavailability:Measurements and Analysis

    Kaune, S., Rumin, R. C., Tyson, G., Mauthe, A., Guerrero, C. & Steinmetz, R., 25/08/2010, Proceedings of the IEEE 10th International Conference on Peer-to-Peer Computing (P2P '10). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    Unscented compression sensing

    Carmi, A., Mihaylova, L. & Kanevsky, D., 1/03/2012, Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on. Kyoto, Japan: IEEE, p. 5249-5252 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    Unsupervised classification of data streams based on typicality and eccentricity data analytics

    Costa, B. S. J., Bezerra, C. G., Guedes, L. A. & Angelov, P. P., 24/07/2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ). Vancouver Canada: IEEE, p. 58-63 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges

    Usama, M., Qadir, J., Raza, A., Arif, H., Yau, K.-L. A., Elkhatib, Y., Hussain, A. & Al-Fuqaha, A., 19/09/2017, In: arxiv.org. 37 p.

    Research output: Contribution to Journal/MagazineJournal article

  78. Published

    Unsupervised two-class & multi-class support vector machines for abnormal traffic characterization.

    Marnerides, A., Pezaros, D. P., Kim, H.-C. & Hutchison, D., 1/04/2009.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  79. Published

    Untangling the concept of coercive control: Theorizing domestic violent crime

    Walby, S. & Towers, J. S., 1/02/2018, In: Criminology and Criminal Justice. 18, 1, p. 7-28 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  80. Published

    'Upskirts' and 'down-blouses': voyeurism and the law

    Gillespie, A., 2008, In: Criminal Law Review. n/a, n/a, p. 370-382 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    Usable assured deletion in the cloud

    Ramokapane, K. M., 2019, Lancaster University. 190 p.

    Research output: ThesisDoctoral Thesis

  82. Published

    Use of a priori information from Huffman coding to improve the MAP decoding performance of turbo codes

    Baichoo, S., Honary, B. & Soyjaudah, K. S., 07/2005, 8th International Symposium on Communication Theory and Applications. Lancaster: HW Communications, p. 445–450 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    Use of Framelets for Efficient Transmitter-Receiviver rendezvous in Wireless Sensor Networks

    Barroso, A., Roedig, U. & Sreeman, C. J., 2005, Local Computer Networks, 2005. 30th Anniversary. The IEEE Conference on. Washington, DC, USA: IEEE Computer Society, p. 664-671 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  84. Published

    Use of motivational interviewing in behavioural interventions among adults with obesity: A systematic review and meta-analysis

    Makin, H., Chisholm, A., Fallon, V. & Goodwin, L., 31/08/2021, In: Clinical obesity. 11, 4, 26 p., e12457.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. Published

    Use of open-ended questionnaires to examine the effects of tinnitus and its relation to patient-reported outcome measures

    Manchaiah, V., Andersson, G., Fagelson, M. A., Boyd, R. L. & Beukes, E. W., 1/07/2022, In: International Journal of Audiology. 61, 7, p. 592-599 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    User adaptive QoS aware selection method for cooperative heterogeneous wireless systems: a dynamic contextual approach

    Pervaiz, H., Ni, Q. & Zarakovitis, C. C., 10/2014, In: Future Generation Computer Systems. 39, p. 75-87 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  87. Published

    User modeling : through statistical analysis and an evolving classifier

    Iglesias, J., Angelov, P., Ledezma, A. & Sanchis, A., 07/2010, IEEE International Conference on Fuzzy Systems (FUZZ), 2010 . IEEE, p. 3226-3233 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    User perception and requirements for future IPTV services: case studies from Finland and UK

    Oksman, V., Tammela, A., Mitchell, K., Ishmael, J., Rouncefield, M. & Race, N., 2010, Proceedings of the 8th international interactive conference on Interactive TV & Video. New York, NY, USA: ACM, p. 1-4 4 p. (EuroITV '10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    User Preferences-Adaptive Dynamic Network Selection Approach in Cooperating Wireless Networks: A Game Theoretic Perspective

    Pervaiz, H. & Ni, Q., 2012, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. Liverpool: IEEE, p. 1609-1616 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Forthcoming

    User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits

    Wang, W., Yu, W., Foh, C. H., Gao, D. & Ni, Q., 19/09/2022, (Accepted/In press) Proceedings of 2022 IEEE Globecom Workshops (GC Wkshps). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    User-centric security assessment of software configurations: A case study

    Ghani, H., Luna Garcia, J., Petkov, I. & Suri, N., 2014, Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Springer-Verlag, Vol. 8364 LNCS. p. 196-212 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    User-level fairness delivered: network resource allocation for adaptive video streaming

    Mu, M., Farshad, A., Simpson, S., Ni, Q. & Race, N. J. P., 15/06/2015, 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS). IEEE, p. 85-94 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    User-Pair Selection in Multiuser Cooperative Networks With an Untrusted Relay

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 15/01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 869-882 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    Users as Contextual Features of Software Product Development and Testing

    Martin, D., Rooksby, J. & Rouncefield, M., 2007, USA: ACM. (Proceedings of the 2007 International ACM Conference on Supporting Group Work)

    Research output: Book/Report/ProceedingsBook

  95. Published

    Using a keyness metric for single and multi document summarisation

    El-Haj, M. & Rayson, P., 08/2013, Proceedings of the MultiLing 2013 Workshop on Multilingual Multi-document summarization . Sofia, Bulgaria: Association for Computational Linguistics, p. 64-71 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    Using a semantic annotation tool for the analysis of metaphor in discourse.

    Koller, V., Hardie, A., Rayson, P. & Semino, E., 2008, In: metaphorik.de. 15, p. 141-160 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  97. Published

    Using a semantic tagger as dictionary search tool

    Lofberg, L., Juntunen, J., Nykanen, A., Varantola, K., Rayson, P. & Archer, D., 07/2004, p. 127-134. 8 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  98. Published

    Using agent-based simulation to analyse the effect of broadcast and narrowcast on public perception: a case in social risk amplification

    Onggo, S., Busby, J. & Liu, Y., 12/2014, Proceedings of the 2014 Winter Simulation Conference. IEEE, p. 322-333 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  99. Published

    Using an historical semantic tagger as a diagnostic tool for variation in spelling

    Archer, D. & Rayson, P., 08/2004.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  100. Published

    Using Byzantine fault-tolerance to improve dependability in federated cloud computing

    Garraghan, P., Townend, P., Xu, J., Yang, X. & Sui, P., 1/06/2013, In: International Journal of Software and Informatics. 7, 2, p. 221-237 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top