Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust Optimization

    Tian, D., Zhou, J., Chen, M., Sheng, Z., Ni, Q. & Leung, V. C. M., 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. IEEE, p. 90-98 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    CoPace: Edge Computation Offloading and Caching for Self-Driving with Deep Reinforcement Learning

    Tian, H., Xu, X., Qi, L., Zhang, X., Dou, W., Yu, S. & Ni, Q., 31/12/2021, In: IEEE Transactions on Vehicular Technology. 70, 12, p. 13281-13293 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Low leakage-current InAsSb nanowire photodetectors on silicon

    Thompson, M. D., Alhodaib, A., Craig, A. P., Robson, A. J., Aziz, A., Krier, A., Svensson, J., Wernersson, L.-E., Sanchez, A. M. & Marshall, A. R. J., 13/01/2016, In: Nano Letters. 16, 1, p. 182-187 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    A multi-disciplinary perspective on emergent and future innovations in peer review

    Tennant, J. P., Dugan, J. M., Graziotin, D., Jacques, D. C., Waldner, F., Mietchen, D., Elkhatib, Y., B. Collister, L., Pikas, C. K., Crick, T., Masuzzo, P., Caravaggi, A., Berg, D. R., Niemeyer, K. E., Ross-Hellauer, T., Mannheimer, S., Rigling, L., Katz, D. S., Greshake Tzovaras, B. & Pacheco-Mendoza, J. & 13 others, Fatima, N., Poblet, M., Isaakidis, M., Irawan, D. E., Renaut, S., Madan, C. R., Matthias, L., Nørgaard Kjær, J., O'Donnell, D. P., Neylon, C., Kearns, S., Selvaraju, M. & Colomb, J., 20/07/2017, In: F1000Research. 6, 53 p., 1151.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Exploring fine-grained sentiment values in online product reviews

    Teh, P. L., Rayson, P., Pak, I. & Piao, S., 2015, 2015 IEEE Conference on Open Systems. IEEE, p. 114-118 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Sentiment analysis tools should take account of the number of exclamation marks!!!

    Teh, P. L., Rayson, P. E., Pak, I. & Piao, S. S., 11/12/2015, iiWAS '15 Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services. New York: ACM, 6 p. 35

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Proximity coefficients as a measure of interrelationships in sequences of behavior.

    Taylor, P. J., 02/2006, In: Behavior Research Methods. 38, 1, p. 42-50 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Foundations and Evidence for an Interaction-based Approach to Conflict Negotiation.

    Taylor, P. J. & Donald, I. J., 2003, In: International Journal of Conflict Management. 14, 3/4, p. 213-232 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    A partial order scalogram analysis of communication behavior in crisis negotiation with the prediction of outcome.

    Taylor, P. J., 2002, In: International Journal of Conflict Management. 13, 1, p. 4-37 34 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    The Co-realisation of a Village Photo Display

    Taylor, N., Cheverst, K., Dix, A., Silva, P. A. & Rouncefield, M., 5/04/2008. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  11. Published

    Linguistic style matching and negotiation outcome.

    Taylor, P. J. & Thomas, S., 08/2008, In: Negotiation and Conflict Management Research. 1, 3, p. 263-281 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    United Kingdom - Group Accounts (2001)

    Taylor, P., 2001, Transnational Accounting (TRANSACC) 2nd Edition. Ordelheide, D. & Ordelheide, D. (eds.). UK: Palgrave, Vol. 3. p. 2,717-2,851

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  13. Published

    Testing the relationship between local cue-response patterns and global dimensions of communication behavior.

    Taylor, P. J. & Donald, I. J., 1/01/2007, In: British Journal of Social Psychology. 46, 2, p. 273-298 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    On the complexity and accuracy of geographic profiling strategies

    Taylor, P. J., Bennell, C., Snook, B. & Zito, M., 1/01/2005, In: Journal of Quantitative Criminology. 21, 1, p. 1-26 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    A cylindrical model of communication behaviour in crisis negotiations.

    Taylor, P. J., 1/01/2002, In: Human Communication Research. 28, 1, p. 7-48 42 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    United Kingdom – group accounts

    Taylor, P. A., 2001, Transnational Accounting, 2nd Edition. London: Palgrave, p. 2717-2849 133 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  17. Published

    Foreign currency translation and hedging

    Taylor, P. A., 2003, International Accounting. 2 ed. London: Thomson Learning, p. 403-443 41 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  18. Published

    Jaccard’s heel: are radex models of criminal behaviour falsifiable when derived using Jaccard coefficient?

    Taylor, P., Donald, I. J., Jacques, K. & Conchie, S., 02/2012, In: Legal and Criminological Psychology. 17, 1, p. 41-58 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    The Bounds of Cognitive Heuristic Performance on the Geographic Profiling Task

    Taylor, P. J., Bennell, C. & Snook, B., 04/2009, In: Applied Cognitive Psychology. 23, 3, p. 410-430 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Analysing forensic processes: taking time into account

    Taylor, P., Jacques, K., Giebels, E., Levine, M. & Gendreau, P., 2008, In: Issues in Forensic Psychology. 8, p. 45-57 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    The structure of communication behavior in simulated and actual crisis negotiations

    Taylor, P. J. & Donald, I., 10/2004, In: Human Communication Research. 30, 4, p. 443-478 36 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Encouraging Community Spirit with Situated Displays

    Taylor, N., Rouncefield, M., Cheverst, K. & Izadi, S., 2/04/2008, Proceedings of the AISB 2008 Symposium on Persuasive Technology. AISB, p. 39-42 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Hostage negotiation opens up

    Taylor, P. & Donohue, W. A., 2006, The negotiator's fieldbook: the desk reference for the experienced negotiator. Schneider, A. & Honeymoon, C. (eds.). Chicago: American Bar Association, p. 667-674 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  24. Published

    Problems of classification in investigative psychology

    Taylor, P., Bennell, C. & Snook, B., 2002, Classification, clustering, and data analysis: Recent advances and applications. Jajuga, K., Sokolowski, A. & Bock, H.-H. (eds.). Heidelberg: Springer Verlag, p. 479-487 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  25. Published

    Probing Communities: Study of a Village Photo Display

    Taylor, N., Cheverst, K., Fitton, D., Race, N. J. P., Rouncefield, M., Graham, C. & EPSRC (Funder), 11/2007, OZCHI '07 Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces. p. 17-24 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    The role of language in conflict and conflict resolution

    Taylor, P. J., 2014, The Oxford handbook of language and social psychology. Holtgraves, T. (ed.). Oxford: Oxford University Press, p. 459-470 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  27. Published

    Cross-cultural deception detection

    Taylor, P., Larner, S., Conchie, S. & Van der Zee, S., 2014, Deception detection: current challenges and cognitive approaches. Granhag, P. A., Vrij, A. & Verschuere, B. (eds.). Chichester: Wiley Blackwell, p. 175-202 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  28. Published

    Detecting insider threats to organizations through language change

    Taylor, P., Dando, C., Ormerod, T., Ball, L., Jenkins, M., Sandham, A. & Menacere, T., 08/2013, In: Law and Human Behavior. 37, 4, p. 267-275 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    How technology is revolutionising our understanding of human cooperation

    Taylor, P. J., 2013, Twente: Twente University Press.

    Research output: Book/Report/ProceedingsBook

  30. Published

    Investigative psychology

    Taylor, P. J., Bennell, C., Snook, B. & Porter, L., 12/2014, APA handbook of forensic psychology. Cutler, B. & Zapf, P. (eds.). Washington, DC: American Psychological Association, Vol. 2.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  31. Published

    Lessons from the extreme: what business negotiators can learn from hostage negotiations

    Taylor, P. J. & Donohue, W. A., 15/03/2017, The negotiator's desk reference. Honeymoon, C. & Schneider, A. (eds.). DRI Press, ( Negotiator's Desk Reference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  32. Published

    A same kind of different: affordances, terrorism and the internet

    Taylor, P. J., Holbrook, D. & Joinson, A., 02/2017, In: Criminology and Public Policy. 16, 1, p. 127-133 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  33. Published

    Culture moderates changes in linguistic self-presentation and detail provision when deceiving others

    Taylor, P. J., Larner, S., Conchie, S. M. & Menacere, T., 7/06/2017, In: Royal Society Open Science. 4, 11 p., 170128.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Optimal data compression and forwarding in wireless sensor networks

    Tavli, B., Bagci, I. E. & Ceylan, O., 05/2010, In: IEEE Communications Letters. 14, 5, p. 408-410 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Data processing and communication strategies for lifetime optimization in wireless sensor networks

    Tavli, B., Kayaalp, M., Bagci, I. E. & Ceylan, O., 10/2010, In: AEÜ - International Journal of Electronics and Communications. 64, 10, p. 992-998 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Novel link adaptation for TETRA cellular systems

    Tarchi, D., Fantacci, R., Tanriover, C. & Honary, B., 04/2009, In: International Journal of Communication Systems. 22, 4, p. 483-501 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  37. Published

    Improving Turbo Code Error Performance by Multifold Coding.

    Tanriover, C., Honary, B., Xu, J. & Lin, S., 05/2002, In: IEEE Communications Letters. 6, 5, p. 196-198 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    Unequal Two-fold Turbo Codes and Digital Image Transmission

    Tanriover, C. C. & Honary, B., 12/2003, 7th International Symposium on Digital Signal Processing and Communication Systems .

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Image transmission using unequal error protection combined with two-fold turbo coding

    Tanriover, C. C. & Honary, B., 10/2003, Mobile Future and Symposium on Trends in Communications, 2003. SympoTIC '03. Joint First Workshop on . IEEE, p. i-v 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Crossover codeword algorithm for iteration control

    Tanriover, C. C. & Honary, B., 09/2002, Vehicular Technology Conference, 2002. Proceedings. VTC 2002-Fall. 2002 IEEE 56th. Vancouver, Canada: IEEE, Vol. 3. p. 1662-1665 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Multifold turbo codes

    Tanriover, C. C., Xu, J., Lin, S. & Honary, B., 06/2001, Information Theory, 2001. Proceedings. 2001 IEEE International Symposium on. Washington D.C., USA: IEEE, p. 145

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    A comparative study of architecture knowledge management tools

    Tang, A., Avgeriou, P., Jansen, A., Capilla, R. & Babar, M. A., 03/2010, In: Journal of Systems and Software. 83, 3, p. 352-370 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    An offloading method using decentralized P2P-enabled mobile edge servers in edge computing

    Tang, W., Zhao, X., Rafique, W., Qi, L., Dou, W. & Ni, Q., 1/03/2019, In: Journal of Systems Architecture. 94, p. 1-13 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    Robust sensor fault reconstruction using right eigenstructure assignment

    Tan, C. P., Kuang, Y. C. & Edwards, C., 2006, DELTA '06: Proceedings of the Third IEEE International Workshop on Electronic Design, Test and Applications. Washington, DC, USA: IEEE Computer Society, p. 435-439 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking

    Tan, F., Wang, Y., Wang, Q., Bu, L. & Suri, N., 1/10/2015, In: IEEE Transactions on Parallel and Distributed Systems. 26, 10, p. 2630-2642 13 p., 6898840.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach

    Tan, F., Wang, Y., Wang, Q., Bu, L., Zheng, R. & Suri, N., 24/06/2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    WiP abstract: A framework on profiling cross-domain noise propagation in control CPS

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 14/04/2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS). IEEE, p. 224 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    Distorted body representations are robust to differences in experimental instructions

    Tame, L., Bumpus, N., Linkenauger, S. A. & Longo, M. R., 05/2017, In: Attention, Perception, and Psychophysics. 79, 4, p. 1204-1216 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    Religion in the British media today

    Taira, T., Poole, E. & Knott, K., 2012, Religion and the News. Mitchell, J. & Gower, O. (eds.). Farnham: Ashgate, p. 31-44 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  51. Published

    What is middleware made of? exploring abstractions, concepts, and class names in modern middleware

    Taiani, F., Rice, J. & Rayson, P., 2012, ARM '12 Proceedings of the 11th International Workshop on Adaptive and Reflective Middleware . New York: ACM, 6 p. 6

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. Published

    Exploring the relationship between dimensionality reduction and private data release

    Tai, B.-C., Li, S.-C., Huang, Y., Suri, N. & Wang, P.-C., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 25-33 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    An empirical characterization of touch-gesture input force on mobile devices

    Taher, F., Alexander, J., Hardy, J. & Velloso, E., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 195-204 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    Exploring interactions with physically dynamic bar charts

    Taher, F., Hardy, J., Karnik, A., Weichel, C., Jansen, Y., Hornbaek, K. & Alexander, J., 18/04/2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 3237-3246 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    A Characterization of Actuation Techniques for Generating Movement in Shape-Changing Interfaces

    Taher, F., Vidler, J. & Alexander, J., 05/2017, In: International Journal of Human-Computer Interaction. 33, 5, p. 385-398 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    Investigating the use of a dynamic physical bar chart for data exploration and presentation

    Taher, F., Jansen, Y., Woodruff, J., Hardy, J., Hornbaek, K. & Alexander, J., 01/2017, In: IEEE Transactions on Visualization and Computer Graphics. 23, 1, p. 451-460 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    Identifying and utilizing dependencies across cloud security services

    Taha, A., Metzler, P., Trapero, R., Luna, J. & Suri, N., 30/05/2016, ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, p. 329-340 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (Editor) & U., B. (Editor), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    SLA-Based Service Selection for Multi-Cloud Environments

    Taha, A., Manzoor, S., Suri, N., A.M., G. (Editor) & M., L. (Editor), 25/06/2017, 2017 IEEE International Conference on Edge Computing (EDGE). IEEE, p. 65-72 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure

    Taha, A., Zakaria, A., Kim, D. & Suri, N., 19/05/2020, 2020 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 134-143 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Cloud Security Requirement Based Threat Analysis

    Taha, A., Lawall, A. & Suri, N., 23/03/2023, 2023 International Conference on Computing, Networking and Communications, ICNC 2023. Institute of Electrical and Electronics Engineers Inc., p. 506-510 5 p. (2023 International Conference on Computing, Networking and Communications, ICNC 2023).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    "I didn't spel that wrong did i. Oops": Analysis and standardisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 27/05/2010. 23 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  64. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2012, In: Lingvisticæ Investigationes. 35, 2, p. 367-388 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  65. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2014, SMS communication: a linguistic approach. Cougnon, L.-A. & Fairon, C. (eds.). John Benjamins Publishing Company, p. 217-237 21 p. (Benjamins Current Topics; vol. 61).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  66. Published

    An Inclusive, Real-World Investigation of Persuasion in Language and Verbal Behavior

    Ta, V. P., Boyd, R. L., Seraj, S., Keller, A., Griffith, C., Loggarakis, A. & Medema, L., 31/05/2022, In: Journal of Computational Social Science. 5, 1, p. 883–903 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    MAP-based modeling and design of wireless sensor networks with OMNeT++

    Szczytowski, P., Khelil, A. & Suri, N., 13/07/2009, 2009 International Symposium on Performance Evaluation of Computer & Telecommunication Systems. IEEE, p. 162-169 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    ASample: Adaptive spatial sampling in Wireless Sensor Networks

    Szczytowski, P., Khelil, A. & Suri, N., 7/06/2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  69. Published

    LEHP: Localized energy hole profiling in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 22/06/2010, The IEEE symposium on Computers and Communications. IEEE, p. 100-106 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  70. Published

    TOM: Topology oriented maintenance in sparse Wireless Sensor Networks

    Szczytowski, P., Khelil, A., Ali, A. & Suri, N., 27/06/2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, p. 548-556 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    DKM: Distributed k-connectivity maintenance in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 9/01/2012, 2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS). IEEE, p. 83-90 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    MAP++: support for map-based WSN modeling and design with OMNeT++.

    Szczytowski, P., Khelil, A. & Suri, N., 2009, 2nd International ICST Workshop on OMNeT++. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  73. Published

    Big Data and Natural Language Processing for Analysing Railway Safety

    Syeda, K. N., Shirazi, S. N. U. H., Naqvi, S. A. A., Parkinson, H. J. & Bamford, G., 11/2017, Innovative Applications of Big Data in the Railway Industry. Kohli, D. S., Kumar, D. A. V. S., Easton, D. J. M. & Roberts, P. C. (eds.). IGI Global Publishing, p. 240-267 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  74. Published

    The European Court of Human Rights in the post-Cold War era: universality in transition

    Sweeney, J., 30/11/2012, Abingdon: Routledge. 262 p.

    Research output: Book/Report/ProceedingsBook

  75. Published

    Restorative justice and transitional justice at the ECHR

    Sweeney, J., 2012, In: International Criminal Law Review. 12, 3, p. 313-337 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  76. Published

    Credibility, proof and refugee law

    Sweeney, J., 12/2009, In: International Journal of Refugee Law. 21, 4, p. 700-726 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  77. Published

    The human rights of failed asylum seekers in the UK

    Sweeney, J., 2008, In: Public Law. 2008, p. 277-301 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  78. Published

    Transitional criminal justice at the ECtHR: implications for the universality of human rights

    Sweeney, J., 2012, Baltic yearbook of international law. Leiden: Martinus Nijhoff, Vol. 12. p. 183-210 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  79. Published

    Freedom of religion and democratic transition

    Sweeney, J., 2011, Transitional jurisprudence and the ECHR: justice, politics, rights. Buyse, A. & Hamilton, M. (eds.). Cambridge: Cambridge University Press, p. 103-130 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  80. Published

    The idea of home in law: displacement and dispossession

    Sweeney, J. (Editor) & Fox-O'Mahony, L. (Editor), 2010, Farnham: Ashgate Publishing. 248 p. (Law, Property and Society)

    Research output: Book/Report/ProceedingsBook

  81. Published

    The “lure” of facts in asylum appeals: critiquing the practice of judges

    Sweeney, J., 2007, Applying theory to policy and practice: issues for critical reflection . Smith, S. (ed.). Farnham: Ashgate Publishing, p. 19-35 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  82. Published

    A “margin of appreciation” in the internal market: lessons from the European Court of Human Rights

    Sweeney, J., 2007, In: Legal Issues of Economic Integration. 34, p. 27-52 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  83. Published

    Divergence and diversity in post-communist European human rights cases

    Sweeney, J., 2005, In: Connecticut Journal of International Law. 21, p. 1-40 40 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  84. Published

    Margins of appreciation: cultural relativity and the European Court of Human Rights

    Sweeney, J., 1/04/2005, In: International and Comparative Law Quarterly. 54, 2, p. 459-474 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. Published

    Non-retroactivity, candour and ‘transitional relativism’: a response to the ECtHR judgment in Maktouf and Damjanović v. Bosnia and Herzegovina

    Sweeney, J., 2014, In: Diritti umani e diritto internazionale. 8, 3, p. 607-622 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    Law and policy on post-conflict restitution

    Sweeney, J., 26/05/2015, International law and post-conflict reconstruction policy. Saul, M. & Sweeney, J. A. (eds.). London: Routledge, p. 286-308 23 p. (Post-Conflict Law and Justice).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  87. Published

    A 'credible' response to persons fleeing armed conflict

    Sweeney, J. A., 04/2016, The Protection of Persons Fleeing Armed Conflict and Other Situations of Violence. Happold, M. & Pichou, M. (eds.). Brussels: Larcier, p. 81-103 23 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  88. Published

    The Elusive Right to Truth in Transitional Human Rights Jurisprudence

    Sweeney, J. A., 1/04/2018, In: International and Comparative Law Quarterly. 67, 2, p. 353-387 35 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  89. Published

    OSA: one-class recursive SVM algorithm with negative samples for fault detection

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 2013, Artificial neural networks and machine learning – ICANN 2013: 23rd International Conference on Artificial Neural Networks Sofia, Bulgaria, September 10-13, 2013. Proceedings. Mladenov, V., Koprinkova-Hristova, P., Palm, G., Villa, A. E. P., Appollini, B. & Kasabov, N. (eds.). Berlin: Springer Verlag, p. 194-207 14 p. (Lecture Notes in Computer Science; vol. 8131).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    Incremental anomaly identification by adapted SVM method

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 08/2013, International Joint Conference on Neural Networks, IJCNN-2013, Dallas, TX, USA, 3-9 August, 2013. Piscataway, N.J.: IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    Discovering affect-laden requirements to achieve system acceptance

    Sutcliffe, A., Rayson, P., Bull, C. & Sawyer, P., 08/2014, 22nd IEEE International Requirements Engineering Conference (RE'14). IEEE, p. 173-182 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    A MAC Protocol for Industrial Process Automation and Control

    Suriyachai, P., Brown, J. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  93. Published

    Implementation of a Deterministic Wireless Sensor Network

    Suriyachai, P., Roedig, U. & Scott, A., 01/2008.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  94. Published

    A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks

    Suriyachai, P., Roedig, U. & Scott, A., 2012, In: Communications Surveys and Tutorials, IEEE Communications Society. 14, 2, p. 1-25 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published

    Implementation of a MAC protocol for QoS support in wireless sensor networks

    Suriyachai, P., Roedig, U. & Scott, A., 9/03/2009, IEEE International Conference on Pervasive Computing and Communications, 2009. PerCom 2009.. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    Time-Critical Data Delivery in Wireless Sensor Networks

    Suriyachai, P., Brown, J. & Roedig, U., 06/2010, Proceedings of the 6th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2010). Rajaraman , R., Moscibroda , T., Dunkels, A. & Scaglione, A. (eds.). Berlin: Springer, p. 216-229 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    Dimensioning of Time-Critical WSNs -- Theory, Implementation and Evaluation

    Suriyachai, P., Roedig, U., Scott, A., Gollan, N. & Schmitt, J., 08/2011, In: International Journal of Mobile Communications. 6, 5, p. 360-369 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    A pre-injection analysis for identifying fault-injection tests for protocol validation

    Suri, N. & Sinha, P., 2010, In: Journal of Software. 5, 10, p. 1144-1161 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    A software integration approach for designing and assessing dependable embedded systems

    Suri, N., Jhumka, A., Hiller, M., Pataricza, A., Islam, S. & Sârbu, C., 1/10/2010, In: Journal of Systems and Software. 83, 10, p. 1780-1800 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    Design of an optimal Bayesian incentive compatible broadcast protocol for ad hoc networks with rational nodes

    Suri, N. & Narahari, Y., 2008, In: IEEE Journal on Selected Areas in Communications. 26, 7, p. 1138-1148 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 4 5 6 7 8 ...36 Next

Back to top