Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    An exact algorithm for a resource allocation problem in mobile wireless communications

    Letchford, A. N., Ni, Q. & Zhong, Z., 09/2017, In: Computational Optimization and Applications. 68, 2, p. 193-208 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    An examination of clicker technology use in legal education

    Easton, C., 22/12/2009, In: European Journal of Law and Technology . 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    An examination of the Internet’s development as a disabling environment in the context of the social model of disability and anti-discrimination legislation in the UK and USA

    Easton, C., 2013, In: Universal Access in the Information Society. 12, 1, p. 105-114 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    An Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems

    Duffy, C., Roedig, U., Herbert, J. & Sreenan, C. J., 03/2007, Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on. IEEE, p. 267-271 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    An Exploration of Real-World Analogical Problem Solving in Novices.

    Bearman, C., Ball, L. J. & Ormerod, T. C., 2002. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Other

  6. Published

    An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains

    Stevenson, M. & Busby, J., 2015, In: International Journal of Operations and Production Management. 35, 1, p. 110-144 35 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    An exploratory study of fault-proneness in evolving aspect-oriented programs

    Ferrari, F., Burrows, R., Lemos, O., Garcia, A., Figueiredo, E., Cacho, N., Lopes, F., Temudo, N., Silva, L., Soares, S., Rashid, A., Masiero, P., Batista, T. & Maldonado, J., 2010, Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering (ICSE 2010). ACM Press, Vol. 1. p. 65-74 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    An exploratory study of fault-proneness in evolving aspect-oriented programs

    Ferrari, F., Burrows, R., Lemos, O., Garcia, A., Figueiredo, E., Cacho, N., Lopes, F., Temudo, N., Silva, L., Soares, S., Rashid, A., Masiero, P., Batista, T. & Maldonado, J., 2010, ICSE '10 Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1. New York: ACM, p. 65-74 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    An Exploratory Study of Information Retrieval Techniques in Domain Analysis

    Alves, V., Schwanninger, C., Barbosa, L., Rashid, A., Sawyer, P., Rayson, P., Pohl, C. & Rummler, A., 2008, 12th International Software Product Line Conference, 2008. SPLC '08. . IEEE Publishing, p. 67-76 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    An Implementation of Distance-Based Message Authentication for WSNs

    Chung, A. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  11. Published

    An improved equivalent circuit model of a four rod deflecting cavity

    Apsimon, R. J. & Burt, G. C., 1/03/2017, In: Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. 847, p. 52-60 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    An improved watermarking technique for the casting of digital signatures

    Katsaros, I. & Honary, B., 10/2004, 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on. London: IEEE, p. 490-493 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    An Inclusive, Real-World Investigation of Persuasion in Language and Verbal Behavior

    Ta, V. P., Boyd, R. L., Seraj, S., Keller, A., Griffith, C., Loggarakis, A. & Medema, L., 31/05/2022, In: Journal of Computational Social Science. 5, 1, p. 883–903 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    An integrated approach to a combinatorial optimisation problem

    Bowles, J. & Caminati, M. B., 22/11/2019, Integrated Formal Methods. Springer, Vol. 11918. p. 204-382

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    An integrated framework for verifying multiple care pathways

    Bowles, J., Caminati, M. B. & Cha, S., 7/02/2018, 2017 International Symposium on Theoretical Aspects of Software Engineering (TASE). IEEE, 17595273

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    An intelligent genetic algorithm for PAPR reduction in a multi-carrier CDMA wireless system

    Zhang, Y., Ni, Q., Chen, H. H. & Song, Y., 2008, Wireless Communications and Mobile Computing Conference, 2008. IWCMC'08. International. IEEE, p. 1052-1057 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    An Inter-domain Collaboration Scheme to Remedy DDoS Attacks in Computer Networks

    Simpson, S., Shirazi, S. N., Marnerides, A., Jouet, S., Pezaros, D. & Hutchison, D., 1/09/2018, In: IEEE Transactions on Network and Service Management. 15, 3, p. 879-893 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    An Interpretable Deep Semantic Segmentation Method for Earth Observation.

    Zhang, Z., Angelov, P., Soares, E., Longépé, N. & Mathieu, P.-P., 23/10/2022, In: arXiv. abs/2210.12820

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    An interval compositional vehicular traffic model for real-time applications

    Gning, A., Mihaylova, L. & Boel, R., 4/06/2008.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  20. Published

    An investigation towards real time dose rate monitoring, and fuel rod detection in a First Generation Magnox Storage Pond (FGMSP)

    Jackson, S., Monk, S. & Riaz, Z., 12/2014, In: Applied Radiation and Isotopes. 94, p. 254-259 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    An offloading method using decentralized P2P-enabled mobile edge servers in edge computing

    Tang, W., Zhao, X., Rafique, W., Qi, L., Dou, W. & Ni, Q., 1/03/2019, In: Journal of Systems Architecture. 94, p. 1-13 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    An open architecture mechanism for control of dynamic processing resources

    Lund, D., Martin, I. & Honary, B., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 469–473 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    AN OPTICAL RETRIEVAL SYSTEM, DATA STORAGE SYSTEM, DATA STORAGE MEDIUM AND METHOD OF OPTICAL RETRIEVAL AND DATA STORAGE

    KABUSHIKI, K. (Inventor), Yuan, Z. (Inventor), Young, R. (Inventor), Shields, A. J. (Inventor) & Stevenson, R. M. (Inventor), 31/12/2008, IPC No. PCT/GB2008/002236, Patent No. WO/2009/001105

    Research output: Patent

  24. Published

    An optimization based design for integrated dependable real-time embedded systems

    Islam, S., Suri, N., Balogh, A., Csertán, G. & Pataricza, A., 2009, In: Design Automation for Embedded Systems. 13, 4, p. 245-285 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    An Overlay Tree Building Control Protocol.

    Mathy, L., Canonico, R. & Hutchison, D., 1/01/2001, Networked Group Communication. Heidelberg: Springer Berlin, Vol. 2233/2. p. 76-87 12 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    An overview on Channel Polarization and Polar Codes

    El-Hawat, A. & Honary, B., 06/2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunication, Networking and Broadcasting . p. 297–301 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    An overview on fault diagnosis and nature-inspired optimal control of industrial process applications

    Precup, R.-E., Angelov, P., Jales Costa, B. S. & Sayed-Mouchaweh, M., 12/2015, In: Computers in Industry. 74, p. 75-94 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    An unsaturated model for request mechanisms in WiMAX

    Ni, Q. & Hu, L., 01/2010, In: IEEE Communications Letters. 14, 1, p. 45-47 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    An unscented Kalman filter for freeway traffic estimation

    Mihaylova, L., Boel, R. & Hegiy, A., 29/08/2006, Proceedings of the 11th IFAC Symposium on Control in Transportation Systems. IFAC, p. 31-36 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    An upbringing to violence? identifying the likelihood of violent crime among the 1966 birth cohort in Denmark.

    Christoffersen, M. N., Francis, B. & Soothill, K., 2003, In: Journal of Forensic Psychiatry and Psychology. 14, 2, p. 367-381 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    An upper bound on the number of zeros of a piecewise polinomial function

    Caminati, M., 15/10/2008, (arXiv preprint arXiv:0810.2634).

    Research output: Working paperPreprint

  32. Published

    Analogue versus propositional representation in congenitally blind individuals.

    Ball, L. J., Collins, A. F., Fleming, P. & Ormerod, T. C., 1/12/2006, In: Psychonomic Bulletin and Review. 13, 6, p. 1049-1055 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Analysing complicity in risk

    Busby, J. S., 2008, In: Risk Analysis. 28, 6, p. 1571-1582 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Analysing Design Approaches for the Power Consumption in Cyber-Physical Systems

    Sailer, P., Ivkic, I., Tauber, M., Mauthe, A. & Gouglidis, A., 30/06/2021, 17th IFIP/IEEE International Symposium on Integrated Network Management (IM 2021): 2nd IEEE/IFIP International Workshop on Management for Industry 4.0 (MFI 4.0). IEEE, p. 908-913 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Analysing forensic processes: taking time into account

    Taylor, P., Jacques, K., Giebels, E., Levine, M. & Gendreau, P., 2008, In: Issues in Forensic Psychology. 8, p. 45-57 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Analysing radiative and non-radiative recombination in InAs quantum dots grown on Si substrates for integrated laser applications

    Orchard, J., Woodhead, C., Shutts, S., Wu, J., Sobiesierski, A., Young, R. J., Beanland, R., Liu, H., Smowton, P. & Mowbray, D., 15/03/2016, Proceedings Volume 9758, Quantum Dots and Nanostructures: Growth, Characterization, and Modeling XIII. Huffaker, D. L., Eisele, H. & Dick, K. A. (eds.). SPIE, Vol. 9758. 7 p. 975809. (Proceedings of SPIE).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Analysing spatial properties on neighbourhood spaces

    Linker, S., Papacchini, F. & Sevegnani, M., 1/08/2020, 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020. Esparza, J., Kral�, D. & Kral�, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 66:1-66:14 14 p. MFCS-2020-66. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 170).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Analysing the impact of change in COTS-based systems

    Kotonya, G. & Hutchinson, J., 02/2005, Proceeding ICCBSS'05 Proceedings of the 4th international conference on COTS-Based Software Systems.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Analysing the risks of individual and collective intentionality

    Busby, J. S. & Bennett, S. A., 2008, In: Journal of Risk Research. 11, 6, p. 797-819 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    Analysing the role of privacy impact assessments in technological development for crisis management

    Easton, C. R., 03/2017, In: Journal of Contingencies and Crisis Management. 25, 1, p. 7-14 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Published

    Analysis and characterisation of botnet scan traffic

    Marnerides, A. & Mauthe, A. U., 15/02/2016, 2016 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Analysis and Classification of Shape-Changing Interfaces for Design and Application-based Research

    Sturdee, M. & Alexander, J., 3/01/2018, In: ACM Computing Surveys. 51, 1, p. 2:1-2:32 32 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    Analysis and recommendations for standardisation in penetration testing and vulnerability assessment: penetration testing market survey

    Knowles, W., Baron, A. & McGarr, T., 26/05/2015, London: BSI. 20 p.

    Research output: Book/Report/ProceedingsCommissioned report

  44. Published

    Analysis of adaptation law of the robust evolving cloud-based controller

    Andonovski, G., Blazic, S., Angelov, P. P. & Skrjanc, I., 3/12/2015, Proceedings 2015 IEEE International Conference on Evolving and Adaptive Intelligent Systems (EAIS). IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    Analysis of affordance, time and adaptation in the assessment of industrial control system cybersecurity risk

    Busby, J. S., Green, B. & Hutchison, D., 07/2017, In: Risk Analysis. 37, 7, p. 1298-1314 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    Analysis of an Anonymity Network for Web Browsing.

    Mathy, L., Hutchison, D., Rennhard, M. & Plattner, B., 06/2002, WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises. p. 49 - 54 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Analysis of evolving social network: methods and results from cell phone data set case study

    Dutta Baruah, R. & Angelov, P., 2013, In: International Journal of Social Network Mining. 1, 3-4, p. 254-279 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    Analysis of methanogen diversity in a hypereutrophic lake using PCR-RFLP analysis of mcr sequences

    Earl, J., Hall, G., Pickup, R. W., Ritchie, D. A. & Edwards, C., 31/08/2003, In: Microbial Ecology. 46, 2, p. 270-278 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    Analysis, modeling and simulation of workload patterns in a large-scale utility cloud

    Moreno, I. S., Garraghan, P., Townend, P. & Xu, J., 1/04/2014, In: IEEE Transactions on Cloud Computing. 2, 2, p. 208-221 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    Analytical and Numerical Simulation of Multipactor within a Helical Resonant Filter

    Constable, D., McElhinney, P., Lingwood, C. J., Burt, G. C., Salza, G. & Goussetis, G., 24/04/2017, Vacuum Electronics Conference (IVEC), 2017 Eighteenth International. IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Analytical Design Method for Corrugated Rectangular Waveguide SWS THz Vacuum Tubes

    Mineo, M., Di Carlo, A. & Paoloni, C., 2010, In: Journal of Electromagnetic Waves and Applications. 24, 17-18, p. 2479-2494 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    Analyzing and improving customer-side cloud security certifiability

    Zhao, S., Chen, Y., Winter, S. & Suri, N., 1/10/2019, Proceedings - 2019 IEEE 30th International Symposium on Software Reliability Engineering Workshops, ISSREW 2019. p. 300-307 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Analyzing the Effects of Bugs on Software Interfaces

    Natella, R., Winter, S., Cotroneo, D. & Suri, N., 1/03/2020, In: IEEE Transactions on Software Engineering. 46, 3, p. 280-301 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    Analyzing the Impact of Data Errors in Safety-Critical Control Systems

    Askerdal, Ö., Gäfvert, M., Hiller, M. & Suri, N., 2003, In: IEICE Transactions on Information and Systems. E86-D, 12, p. 2623-2633 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  55. Published

    Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict

    Prentice, S., Taylor, P. J., Rayson, P., Hoskins, A. & O'Loughlin, B., 03/2011, In: Information Systems Frontiers . 13, 1, p. 61-73 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    Angewandte Informationssicherheit: Ein Hacker-Praktikum an Universitäten

    Schumacher, M., Moschgath, M.-L. & Roedig, U., 1/06/2000, In: Informatik-Spektrum. 23, 3, p. 202-221 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    Angle-only Filtering in 3D using Modified Spherical and Log Spherical Coordinates

    Mallick, M., Mihaylova, L., Arulampalam, S. & Yan, Y., 2011, Proceedings of the 14th International Conference on Information Fusion: ISIF. USA, p. 1905-1912 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    Angle-only Filtering in Three Dimensions

    Mallick, M., Morelande, M., Mihaylova, L., Arulampalam, S. & Yan, Y., 13/11/2012, Integrated Tracking, Classification, and Sensor Management: Theory and Applications. Mallick, M., Krishnamurthy, V. & Vo, B.-N. (eds.). New Jersey: John Wiley and Sons, p. 3-42 40 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  59. Published

    Annotated Corpora for Assistance with English-Polish Translation

    Lewandowska-Tomaszczyk, B., Oakes, M. P. & Rayson, P., 01/2003, Corpus Linguistics by the Lune: a festschrift for Geoffrey Leech. Wilson, A., Rayson, P. & McEnery, T. (eds.). Frankfurt: Peter Lang, p. 107-118 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  60. Published

    Annotated Web as corpus

    Rayson, P., Walkerdine, J., Fletcher, W. & Kilgarriff, A., 04/2006, WAC '06 Proceedings of the 2nd International Workshop on Web as Corpus. p. 27-33 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Anomaly detection based on eccentricity analysis

    Angelov, P., 12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE Press, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Anomaly detection for resilience in cloud computing infrastructures

    Shirazi, S. N. U. H., 2017, Lancaster University. 205 p.

    Research output: ThesisDoctoral Thesis

  63. Published

    Anomaly detection in cloud environments

    Marnerides, A., 2015, Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, p. 43-67 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  64. Published

    Anomaly detection in secure cloud environments using a Self-Organizing Feature Map (SOFM) model For clustering sets of R-ordered vector-structured features

    Shirazi, S. N. U. H., Stephanakis, I. M., Chochliouros , I. P. & Sfakianakis, E., 2015, EANN '15: Proceedings of the 16th International Conference on Engineering Applications of Neural Networks (INNS). Iliadis, L. (ed.). ACM, 9 p. 27

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    Anomaly detection in the cloud using data density

    Shirazi, S. N. U. H., Simpson, S., Gouglidis, A., Mauthe, A. U. & Hutchison, D., 27/06/2016, Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on. IEEE, p. 616-623 8 p. 7820324. (Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    Anticipating Adversary Cost: Bridging the Threat-Vulnerability Gap in Cyber Risk Assessment

    Derbyshire, R., 2022, Lancaster University. 222 p.

    Research output: ThesisDoctoral Thesis

  67. Published

    Anticrab cavities for the removal of spurious vertical bunch rotations caused by crab cavities

    Burt, G., Latina, A., Schulte, D., Dexter, A. C. & McIntosh, P. A., 26/09/2008, In: Physical Review Special Topics: Accelerators and Beams. 11, 9, 6 p., 092801.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X. & Ni, Q., 20/05/2019, 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings. IEEE, 6 p. 8762016. (IEEE International Conference on Communications; vol. 2019-May).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  69. Published

    Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

    Gao, N., Qin, Z., Jing, X., Ni, Q. & Jin, S., 1/01/2020, In: IEEE Transactions on Communications. 68, 1, p. 569-581 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  70. Published

    Antimonide quantum dot nanostructures for novel photonic device applications

    Krier, A., Carrington, P., Zhuang, Q., Young, R., Hayne, M., Lu, Q., James Asirvatham, J., Wagener, M., Botha, J. R., Koenraad, P. M. & Smakman, E. P., 5/11/2013, The wonder of nanotechnology: quantum optoelectronic devices and applications . SPIE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  71. Published

    AoI-Minimal Online Scheduling for Wireless Powered IoT: A Lyapunov Optimization-based Approach

    Hu, H., Xiong, K., Yang, H.-C., Ni, Q., Gao, B., Fan, P. & Letaief, K. B., 1/12/2023, In: IEEE Transactions on Green Communications and Networking. 7, 4, p. 2081-2092

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    AoI-minimal Power Adjustment in RF-EH-powered Industrial IoT Networks: A Soft Actor-Critic-Based Method

    Ge, Y., Xiong, K., Wang, Q., Ni, Q., Fan, P. & Letaief, K. B., 1/09/2024, In: IEEE Transactions on Mobile Computing. 23, 9, p. 8729 - 8741 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  73. Published

    AoI-Minimal Trajectory Planning and Data Collection in UAV-Assisted Wireless Powered IoT Networks

    Hu, H., Xiong, K., Qu, G., Ni, Q., Fan, P. & Letaief, K. B., 15/01/2021, In: IEEE Internet of Things Journal. 8, 2, p. 1211-1223 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  74. Forthcoming

    Apparatus and method for projecting light through a light dispersive medium

    Young, R. J. (Inventor) & Reid, V. M. (Inventor), 13/11/2015, (Accepted/In press) Priority date 13/11/2015, Priority No. GB1520076.9

    Research output: Patent

  75. Published

    Appliance-level Short-term Load Forecasting using Deep Neural Networks

    Ud Din, G. M., Mauthe, A. U. & Marnerides, A., 8/03/2018, 2018 International Conference on Computing, Networking and Communications (ICNC). IEEE, p. 53-57 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    Application of laser spectroscopy for measurement of exhaled ethane in patients with lung cancer.

    Skeldon, K. D., McMillan, L. C., Wyse, C. A., Monk, S. D., Gibson, G., Patterson, C., France, T., Longbottom, C. & Padgett, M. J., 02/2006, In: Respiratory Medicine. 100, 2, p. 300-306 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    Application of non-orthogonal multiple access in cooperative spectrum-sharing networks over Nakagami-m fading channels

    Lv, L., Ni, Q., Ding, Z. & Chen, J., 06/2017, In: IEEE Transactions on Vehicular Technology. 66, 6, p. 5506-5511 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  78. Published

    Application of reinforcement learning for security enhancement in cognitive radio networks

    Ling, M. H., Yau, K.-L. A., Qadir, J., Poh, G. S. & Ni, Q., 12/2015, In: Applied Soft Computing. 37, p. 809-829 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  79. Published

    Application of space time diversity/coding to power line communication systems

    Honary, B. (Inventor), Yazdani, J. (Inventor), Brown, P. (Inventor) & Bahram Honary, Javad Yazdani, and Paul Brown (Patent applicant), 12/2001, Patent No. 0130043.3

    Research output: Patent

  80. Published

    Application of Space-Time Diversity/Coding for Power Channels

    Lopez Giovaneli, C., Yazdani, J., Farrell, P. & Honary, B., 03/2002, Proceedings of the 6th International Symposium on Power-line Communications and Its Application, ISPLC 2002. Athens, Greece: ISPLC, p. 101-105 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    Application of turbo codes to tactical communications

    Fagoonee, L. & Honary, B., 5/12/2004, In: Computer Networks. 46, 5, p. 741-749 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  82. Published

    Application-level diagnostic and membership protocols for generic time-triggered systems

    Serafini, M., Bokor, P., Suri, N., Vinter, J., Ademaj, A., Brandstätter, W., Tagliabo, F. & Koch, J., 1/03/2011, In: IEEE Transactions on Dependable and Secure Computing. 8, 2, p. 177-193 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  83. Published

    Applied Behavior Analysis as Treatment for Autism Spectrum Disorders: Topic Modelling and Linguistic Analysis of Reddit Posts

    Bellon-Harn, M. L., Boyd, R. L. & Manchaiah, V., 31/01/2022, In: Frontiers in Rehabilitation Sciences. 2, 682533.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  84. Published

    Applied sketching in HCI: Hands-on course of sketching techniques

    Lewis, M., Sturdee, M. & Marquardt, N., 20/04/2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery (ACM), C0. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Applying Human Values Theory to Software Engineering Practice: Lessons and Implications

    Ferrario, M. A. & Winter, E., 1/03/2023, In: IEEE Transactions on Software Engineering. 49, 3, p. 973-990 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    Applying NEMO to a mountain rescue domain

    McCarthy, B., Edwards, C. & Dunmore, M., 2006, Information Networking Advances in Data Communications and Wireless Networks. Chong, I. & Kawahara, K. (eds.). Springer, p. 11-20 9 p. (Lecture Notes in Computer Science; vol. 3961).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  87. Published

    Applying Patterns of cooperative Interaction to Work (Re)Design: E-Government and Planning

    Martin, D., Rouncefield, M. & Sommerville, I., 01/2002, CHI '02 Proceedings of the SIGCHI conference on Human factors in computing systems: Changing our world, changing ourselves. ACM, p. 235-242 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    AppMonitor: A Tool for Recording User Actions in Unmodified Windows Applications

    Alexander, J., Cockburn, A. & Lobb, R., 2008, In: Behavior Research Methods. 40, 2, p. 413-421 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  89. Published

    Approaching cut-off rate on the binary symmetric channel using weighted bit flipping

    Hirst, S. A. & Honary, B., 07/2001, Proceedings of the 6th International Symposium on Communication Theory and Applications (ISCTA 2001). Lancaster: HW Communications Limited, p. 375–380 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Unpublished

    Appropriate Home Technology: Depending on Dependable Technology Systems

    Dewsbury, G., Clarke, K., Rouncefield, M. & Sommerville, I., 07/2002, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  91. Published

    Are brief alcohol interventions targeting alcohol use efficacious in military and veteran populations? A meta-analysis

    Doherty, A., Mason, C., Fear, N., Rona, R., Greenberg, N. & Goodwin, L., 1/09/2017, In: Drug and Alcohol Dependence. 178, p. 571-578 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    Are common mental disorders more prevalent in the UK serving military compared to the general working population?

    Goodwin, L., Wessely, S., Hotopf, M., Jones, M., Greenberg, N., Rona, R., Hull, L. & Fear, N., 31/07/2015, In: Psychological Medicine. 45, 9, p. 1881-1891 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  93. Published

    Are People Really Social on Porn 2.0?

    Tyson, G., Elkhatib, Y., Sastry, N. & Uhlig, S., 2015, Proceedings of the AAAI Conference on Web and Social Media (ICWSM). AAAI, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    Are psychosocial interventions effective in reducing alcohol consumption during pregnancy and motherhood? A systematic review and meta‐analysis

    Gomez, K. U., Goodwin, L., Jackson, L., Jones, A., Chisholm, A. & Rose, A. K., 10/07/2021, In: Addiction. 116, 7, p. 1638-1663 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published

    Are reports of psychological stress higher in occupational studies? A systematic review across occupational and population based studies

    Goodwin, L., Ben-Zion, I., Fear, N., Hotopf, M., Stansfeld, S. & Wessely, S., 4/11/2013, In: PLoS ONE. 8, 11, 22 p., e78693.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  96. Published

    Are risk assessments sufficiently credible to support questions of liability?

    Hughes, E. J., Busby, J. S. & Alcock, R., 2004, International Conference on Probalistic Safety Assessment and Management PSAM7, (Berlin) - 2004. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    Are the European Union’s new borders like the Iron Curtain? 1989, borders and freedom of movement in Poland and Ukraine

    Follis, K., 09/2009, In: International Journal of Politics, Culture, and Society. 22, 3, p. 385-400 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    Area energy and area spectrum efficiency trade-off in 5G heterogeneous networks

    Pervaiz, H. B., Musavian, L. & Ni, Q., 1/10/2015, Communication Workshop (ICCW), 2015 IEEE International Conference on . IEEE, p. 1178-1183 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  99. Published

    AReIT: Adaptive Reliable Information Transport Protocol for Wireless Sensor Networks

    Shaikh, F. K., Khelil, A. & Suri, N., 2009, Proceedings of the 2009 International Conference on Wireless Networks, ICWN 2009. CSREA Press, p. 75-81 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  100. Published

    ARFA: automated real-time flight data analysis using evolving clustering, classifiers and recursive density estimation

    Kolev, D., Angelov, P., Markarian, G., Suvorov, M. & Lysanov, S., 2013, Evolving and Adaptive Intelligent Systems (EAIS), 2013 IEEE Conference on. Piscataway, N.J.: IEEE Press, p. 91-97 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...36 Next

Back to top