Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    Data processing and communication strategies for lifetime optimization in wireless sensor networks

    Tavli, B., Kayaalp, M., Bagci, I. E. & Ceylan, O., 10/2010, In: AEÜ - International Journal of Electronics and Communications. 64, 10, p. 992-998 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Data privacy management, autonomous spontaneous security, and security assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers

    Garcia-Alfaro, J. (Editor), Herrera-Joancomartí, J. (Editor), Lupu, E. (Editor), Posegga, J. (Editor), Aldini, A. (Editor), Martinelli, F. (Editor) & Suri, N. (Editor), 2015, Springer. 343 p. (Lecture Notes in Computer Science)

    Research output: Book/Report/ProceedingsBook

  3. Published

    Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

    Livraga, G. (Editor), Torra, V. (Editor), Aldini, A. (Editor), Martinelli, F. (Editor) & Suri, N. (Editor), 2016, Springer.

    Research output: Book/Report/ProceedingsProceedings

  4. Published

    Data density based clustering

    Hyde, R. & Angelov, P., 8/09/2014, Computational Intelligence (UKCI), 2014 14th UK Workshop on. IEEE, p. 1-7 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Unpublished

    Dasein of the Times: Temporal Features of Dependability

    Clarke, K., Martin, D., Rouncefield, M., Hughes, J., Voß, A., Procter, R., Slack, R. & Hartswood, M., 04/2005, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Other

  6. Published

    Dangerousness: variations on a theme by Thomas

    Gillespie, A., 2006, In: Criminal Law Review. p. 828-831 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Daleel: simplifying cloud instance selection using machine learning

    Samreen, F., El Khatib, Y., Rowe, M. C. & Blair, G. S., 25/04/2016, Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP. IEEE, (Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Cybersecurity risk to critical utilities: the reflexive assessment of technical and social adaptation

    Green, B., Busby, J. & Hutchison, D., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  9. Published

    Cyber-security challenges of agent technology in intelligent transportation systems

    Kibirige Mukisa, S. & Rashid, A., 6/05/2014, ACySE '14 Proceedings of the 1st International Workshop on Agents and CyberSecurity. New York: ACM, 4 p. 9

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Cybernetics of the mind: learning individual's perceptions autonomously

    Angelov, P. P., Gu, X., Iglesias, J., Ledezma, A., Sanchis, A., Sipele, O. & Ramezani, R., 04/2017, In: IEEE Systems, Man, and Cybernetics Magazine. 3, 2, p. 6-17 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Cybercrime: key issues and debates

    Gillespie, A., 2015, London: Routledge. 308 p.

    Research output: Book/Report/ProceedingsBook

  12. Published

    Cyber-bullying and the harassment of teens: the legal response

    Gillespie, A., 2006, In: Journal of Social Welfare and Family Law. 28, 2, p. 123-136 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Cyber security controls effectiveness: a qualitative assessment of cyber essentials

    Such, J. M., Vidler, J., Seabrook, T. & Rashid, A., 2015, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  14. Published

    Cyber policing in the North West: regional and local co-ordination

    Prince, D. D. C., 4/09/2014, Lancaster: Lancaster University.

    Research output: Book/Report/ProceedingsOther report

  15. Published
  16. Published

    Cyber operations and Gray Zones: challenges for NATO

    Fitton, O. J., 7/04/2016, In: Connections. 15, 2, p. 109-119 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Cyber maritime: A priority for Britain

    Germond, B., Burton, J., Prince, D. & Soare, S., 18/04/2024

    Research output: Exhibits, objects and web-based outputsBlog

  18. Published

    Customising geoparsing and georeferencing for historical texts

    Rupp, C. J., Rayson, P., Baron, A., Donaldson, C., Gregory, I., Hardie, A. & Murrieta-Flores, P., 2013, Proceedings of the 2013 IEEE International Conference on Big Data. IEEE, p. 59-62 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Custom automations in Mizar

    Caminati, M. B. & Rosolini, G., 1/11/2012, In: Journal of Automated Reasoning. 50, p. 147–160

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Cunning plans: some notes on plans, procedures and CSCW

    Hartswood, M., Procter, R., Slack, R., Voss, A., Hughes, J., Clarke, K. & Rouncefield, M., 01/2002, In: Requirenautics Quarterly. 25, p. 12-18 7 p.

    Research output: Contribution to Journal/MagazineJournal article

  21. Published

    Cultures of Reading: On Professional Vision and the Lived Work of Mammography

    Slack, R., Hartswood, M., Procter, R. & Rouncefield, M., 2007, Orders of Ordinary Action. Francis, D. & Hester, S. (eds.). Ashgate, p. 175-194 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  22. Published

    Culture moderates changes in linguistic self-presentation and detail provision when deceiving others

    Taylor, P. J., Larner, S., Conchie, S. M. & Menacere, T., 7/06/2017, In: Royal Society Open Science. 4, 11 p., 170128.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Unpublished

    Cultural probes: Eliciting Requirements for Dependable Ubiquitous Computing in the Home

    Cheverst, K., Clarke, K., Dewsbury, G., Fitton, D., Rouncefield, M., Sommerville, I. & Hughes, J., 01/2003, (Unpublished). 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Other

  24. Published

    Cryptography and coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings

    Honary, B. (Editor), 2001, Berlin: Springer Verlag. 416 p. (Lecture Notes in Computer Science; vol. 2260)

    Research output: Book/Report/ProceedingsBook

  25. Published

    CRS interference cancellation algorithm for heterogeneous network

    Luo, H., Li, W., Huang, L.-K., Cosmas, J. & Ni, Q., 8/01/2016, In: Electronics Letters. 52, 1, p. 77-79 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Crossover codeword algorithm for iteration control

    Tanriover, C. C. & Honary, B., 09/2002, Vehicular Technology Conference, 2002. Proceedings. VTC 2002-Fall. 2002 IEEE 56th. Vancouver, Canada: IEEE, Vol. 3. p. 1662-1665 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Cross-layer Framework for Energy Harvesting-LPWAN Resource Management based on Fuzzy Cognitive Maps and Adaptive Glowworm Swarm Optimization for Smart Forest

    Wang, H., Wu, Y., Ni, Q. & Liu, W., 15/05/2024, In: IEEE Sensors Journal. 24, 10, p. 17067 - 17079

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Cross-layer design for single-cell OFDMA systems with heterogeneous QoS and partial CSIT

    Zarakovitis, C., Ni, Q. & Skordoulis, D., 2009, Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published

    Cross-layer Design for Multiuser OFDMA Systems with Cooperative Game and MMPP Queuing Considerations

    Nikolaros, I. G., Zarakovitis, C. C., Skordoulis, D., Hadjinicolaou, M. G. & Ni, Q., 2010, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, p. 2649-2654 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Cross-Document Dependency Analysis for System-of-System Integration

    Naqvi, A., Chitchyan, R., Zschaler, S., Rashid, A. & Südholt, M., 2010, Foundations of Computer Software. Future Trends and Techniques for Development: 15th Monterey Workshop 2008, Budapest, Hungary, September 24-26, 2008, Revised Selected Papers.. Choppy, C. & Sokolsky, O. (eds.). Berlin: Springer, p. 201-226 26 p. (Lecture Notes in Computer Science; vol. 6028).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Cross-device gaze-supported point-to-point content transfer

    Turner, J., Bulling, A., Alexander, J. & Gellersen, H., 26/03/2014, ETRA '14 Proceedings of the Symposium on Eye Tracking Research and Applications. New York: ACM, p. 19-26 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Cross-cultural deception detection

    Taylor, P., Larner, S., Conchie, S. & Van der Zee, S., 2014, Deception detection: current challenges and cognitive approaches. Granhag, P. A., Vrij, A. & Verschuere, B. (eds.). Chichester: Wiley Blackwell, p. 175-202 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  34. Published

    Cross-cultural comparisons of 5-year-olds’ estimating and mathematical ability

    Muldoon, K., Simms, V., Towse, J., Menzies, V. & Yue, G., 05/2011, In: Journal of Cross-Cultural Psychology. 42, 4, p. 669-681 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published
  36. Published

    Crisis negotiation: from suicide to terrorism intervention

    Wells, S., Taylor, P. & Giebels, E., 2013, Handbook of research in negotiation. Olekalns, M. & Adair, W. (eds.). London: Edward Elgar, p. 473-498 26 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  37. Published

    Crisis

    Walby, S., 10/2015, Cambridge: Polity Press. 211 p.

    Research output: Book/Report/ProceedingsBook

  38. Published

    Criminal Profiling Belief and Use: A Study of Canadian Police Officer Opinion.

    Snook, B., Haines, A., Taylor, P. J. & Bennell, C., 2007, In: Canadian Journal of Police and Security Services. 5, 3, p. 169-179 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    Credibility, proof and refugee law

    Sweeney, J., 12/2009, In: International Journal of Refugee Law. 21, 4, p. 700-726 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    Credibility in risk assessment: a normative approach

    Busby, J. S. & Hughes, E. J., 2006, In: International Journal of Risk Assessment and Management. 6, 4/5/6, p. 508-527 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  41. Published

    Creating evolving user behavior profiles automatically

    Iglesias, J., Angelov, P., Ledezma, A. & Sanchis, A., 1/05/2012, In: IEEE Transactions on Knowledge and Data Engineering. 24, 5, p. 854-867 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    Creating CorCenCC (Corpws Cenedlaethol Cymraeg Cyfoes - The National Corpus of Contemporary Welsh)

    Knight, D., Fitzpatrick, T., Morris, S., Evas, J., Rayson, P. E., Spasic, I., Stonelake, M., Mon Thomas, E., Neale, S., Needs, J., Piao, S. S., Rees, M., Watkins, G., Anthony, L., Michael Cobb, T., Deuchar, M., Donnelly, K., McCarthy, M. & Scannell, K., 24/07/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  43. Published

    Creating a stereoscopic magic-lens to improve depth perception in handheld augmented reality

    Čopič Pucihar, K., Coulton, P. & Alexander, J., 27/08/2013, Proceedings of Mobile HCI 2013. ACM, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Crab Cavity Development

    Burt, G. C., 10/2015, The High Luminosity Large Hadron Collider: The New Machine for Illuminating the Mysteries of Universe. Brüning, O. & Rossi, L. (eds.). World Scientific, (Advanced Series on Directions in High Energy Physics; vol. 24).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  45. Published

    Covert surveillance, human rights and the law

    Gillespie, A., 2009, In: Irish Criminal Law Journal. 19, 3, p. 71-79 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    Coverage and Handoff Analysis of 5G Fractal Small Cell Networks

    Chen, J., Ge, X. & Ni, Q., 02/2019, In: IEEE Transactions on Wireless Communications. 18, 2, p. 1263 - 1276 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    Could a cyber attack cause a systemic impact in the financial sector?

    Warren, P., Kaivanto, K. K. & Prince, D. D. C., 21/12/2018, In: Bank of England Quarterly Bulletin. 2018, 4, p. 1-11 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Unpublished

    COTS Component-Based System Development: Processes and Problems.

    Kotonya, G., Hutchinson, J., Sawyer, P., Walter, O. & Joan, C., 10/2002, (Unpublished) EPRINTS-BOOK-TITLE.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  49. Published

    Corrugated Rectangular Waveguide Tunable Backward Wave Oscillator for Terahertz Applications

    Mineo, M. & Paoloni, C., 06/2010, In: IEEE Transactions on Electron Devices. 57, 6, p. 1481-1484 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    Correct composition of dephased behavioural models

    Bowles, J. & Caminati, M. B., 14/09/2017, Formal Aspects of Component Software: 14th International Conference, FACS 2017, Braga, Portugal, October 10-13, 2017, Proceedings 14. Springer, Vol. 10487.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Correct composition in the presence of behavioural conflicts and dephasing

    Bowles, J. & Caminati, M. B., 15/10/2019, In: Science of Computer Programming. 185, 102323.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    Corpus Tools and Methods, Today and Tomorrow: Incorporating Linguists' Manual Annotations

    Smith, N., Hoffmann, S. & Rayson, P., 2008, In: Literary and Linguistic Computing. 23, 2, p. 163-180 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  53. Published

    Corpus tools and methods today and tomorrow: Incorporating user-defined annotations

    Smith, N., Hoffmann, S. & Rayson, P., 2007.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  54. Published

    Corpus linguistics by the Lune: a festschrift for Geoffrey Leech

    Wilson, A., Rayson, P. & McEnery, A. M., 2003, Frankfurt: Peter Lang. 305 p. (Lodz studies in Language)

    Research output: Book/Report/ProceedingsBook

  55. Published

    Corpus linguistics around the world

    Wilson, A. (Editor), Archer, D. (Editor) & Rayson, P. (Editor), 2006, Amsterdam: Rodopi. 233 p. (Language and Computers)

    Research output: Book/Report/ProceedingsBook

  56. Published

    Corporate risk management and hedge accounting

    Panaretou, A., Shackleton, M. B. & Taylor, P. A., 03/2013, In: Contemporary Accounting Research. 30, 1, p. 116-139 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    Corecursion for Compositional Verification

    Caminati, M. B. & Kerber, M., 14/01/2016

    Research output: Other contribution

  58. Published

    Co-realisation: towards a principled synthesis of ethnimethodology and participatory design

    Rouncefield, M., Hartswood, M., Procter, R., Slack, R., Voß, A., Buscher, M. & Rouchy, P., 09/2002, In: Scandinavian Journal of Information Systems. 14, 2, p. 9-30 22 p.

    Research output: Contribution to Journal/MagazineJournal article

  59. Published

    Coral: Reliable and low-latency P2P convergecast for critical sensor data collection

    Germanus, D., Khelil, A., Schwandke, J. & Suri, N., 21/10/2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, p. 300-305 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    Coping with uncertainty: police strategies for resilient decision making and action implementation

    van den Heuvel, C., Alison, L. & Power, N., 02/2014, In: Cognition, Technology and Work. 16, 1, p. 25-45 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  61. Published

    CoPace: Edge Computation Offloading and Caching for Self-Driving with Deep Reinforcement Learning

    Tian, H., Xu, X., Qi, L., Zhang, X., Dou, W., Yu, S. & Ni, Q., 31/12/2021, In: IEEE Transactions on Vehicular Technology. 70, 12, p. 13281-13293 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    Cooperative non-orthogonal multiple access in cognitive radio

    Lv, L., Chen, J. & Ni, Q., 10/2016, In: IEEE Communications Letters. 20, 10, p. 2059-2062 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Published

    Cooperative Non-Orthogonal Layered Multicast Multiple Access for Heterogeneous Networks

    Yang, L., Ni, Q., Lv, L., Chen, J., Xue, X., Zhang, H. & Jiang, H., 02/2019, In: IEEE Transactions on Communications. 67, 2, p. 1148 - 1165 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  64. Published

    Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust Optimization

    Tian, D., Zhou, J., Chen, M., Sheng, Z., Ni, Q. & Leung, V. C. M., 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. IEEE, p. 90-98 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  65. Published

    Convolutional decoding for reconfigurable mobile systems

    Lund, D., Barekos, V. & Honary, B., 03/2001, 3G Mobile Communication Technologies, 2001. Second International Conference on (Conf. Publ. No. 477). London, UK: IEEE, p. 297-301 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    Convex-hull or crossing-avoidance? : solution heuristics in the travelling salesperson problem.

    MacGregor, J. N., Chronicle, E. P. & Ormerod, T. C., 03/2004, In: Memory and Cognition. 32, 2, p. 260-270 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. E-pub ahead of print

    Convergence, capitalist diversity, or political volatility? Immigration policy in Western Europe

    Consterdine, E. & Hampshire, J., 14/10/2019, (E-pub ahead of print) In: Journal of European Public Policy. 27, 10, p. 1487-1505

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    Controlling the polarization correlation of photon pairs from a charge-tunable quantum dot

    Young, R. J., Dewhurst, S. J., Stevenson, R. M., Shields, A. J., Atkinson, P., Cooper, K. & Ritchie, D. A., 2/07/2007, In: Applied Physics Letters. 91, 1, p. - 3 p., 011114.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    Controlling the interview: The influencing techniques of suspects of control and coercion

    Watson, S., Luther, K., Taylor, P. J., Jackson, J. & Alison, L., 07/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  70. Published

    Controlling the fine structure splitting in single InAs quantum dots

    Young, R., 2006, University of Cambridge.

    Research output: ThesisDoctoral Thesis

  71. Published

    Control of fine-structure splitting of individual InAs quantum dots by rapid thermal annealing

    Ellis, D. J. P., Stevenson, R. M., Young, R. J., Shields, A. J., Atkinson, P. & Ritchie, D. A., 1/01/2007, In: Applied Physics Letters. 90, 1, p. - 3 p., 011907.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    Control of Exciton fine structure splitting in quantum dots

    Stevenson, R. M., Young, R. J., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 09/2006, In: Acta Physica Polonica A. 110, 3, p. 311-318 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  73. Published

    Contour Tracking in 2D Images Using Particle Filtering

    Angelova, D., Konstantinova, P. & Mihaylova, L., 5/09/2007. 515 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  74. Published

    Contour segmentation in 2D ultrasound medical images with particle filtering.

    Angelova, D. & Mihaylova, L., 05/2011, In: Machine Vision and Applications. 22, 3, p. 551-561 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  75. Published

    Contour extraction from ultrasound images viewed as a tracking problem.

    Angelova, D. & Mihaylova, L., 7/07/2009, 12th International Conference on Information Fusion, 2009. FUSION '09.. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    Continuous-Discrete Filtering using EKF, UKF, and PF

    Mallick, M., Morelande, M. & Mihaylova, L., 1/07/2012, Information Fusion (FUSION), 2012 15th International Conference on. IEEE, p. 1087-1094 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    Continuous Network Update With Consistency Guaranteed in Software-Defined Networks

    He, X., Zheng, J., Dai, H., Zhang, C., Li, G., Dou, W., Rafique, W., Ni, Q. & Chen, G., 30/06/2022, In: IEEE/ACM Transactions on Networking . 30, 3, p. 1424-1438 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  78. Published

    Content Relevance Opportunistic Routing for Wireless Multimedia Sensor Networks

    Spachos, P., Marnerides, A. & Hatzinakos, D., 27/04/2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, p. 263-268 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  79. Published

    Content Distribution Networks and End-to-End Quality of Service Guarantees

    Race, N. & Eccles, S., 12/2004, Proceedings of the Broadband Europe Conference (BBEurope 2004).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    Consumer credit default and collections: the shifting ontologies of market attachment

    Deville, J., 2014, In: Consumption, Markets and Culture. 17, 5, p. 468-490 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    Constructs competition miner: process control-flow discovery of BP-domain constructs

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2014, Business Process Management: 12th International Conference, BPM 2014, Haifa, Israel, September 7-11, 2014. Proceedings. Sadiq, S., Soffer, P. & Völzer, H. (eds.). Springer, p. 134-150 17 p. (Lecture Notes in Computer Science; vol. 8659).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Construction scheduling, cost optimization and management: a new model based on neurocomputing and object technologies

    Angelov, P., 2001, In: Engineering, Construction and Architectural Management. 8, 3, p. 233-234 2 p.

    Research output: Contribution to Journal/MagazineBook/Film/Article review

  83. Published

    Construction of well-structured quasi-cyclic low-density parity check codes

    Honary, B., Moinian, A. & Ammar, B., 12/2005, In: IEE Proceedings - Communications. 152, 6, p. 1081-1086 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  84. Published

    Construction of Switchable-rate QC-LDPC Cpdes for HF-IP Systems

    Momahed Heravi, B., Kariyawasam Katukolihe Ga, S. & Honary, B., 07/2009, IEEE 10th International Symposium on Communication Theory and Applications, (ISCTA’09). Ambleside, UK, p. 232–235 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Construction of partial unit memory encoders for application in capacity-approaching concatenated codes

    Fagoonee, L. & Honary, B., 12/2005, In: IEE Proceedings - Communications. 152, 5, p. 1108-1116 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  86. Published

    Construction of low-density parity-check codes based on balanced incomplete block designs

    Ammar, B., Honary, B., Kou, Y., Xu, J. & Lin, S., 06/2004, In: IEEE Transactions on Information Theory. 50, 6, p. 1257-1268 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  87. Published

    Construction of low density parity check codes: BIBD and vandermonde

    Ammar, B. & Honary, B., 10/2004, Mobile Future, 2004 and the Symposium on Trends in Communications. SympoTIC '04. Joint IST Workshop on. Bratislava, Slovakia: IEEE, p. xxix 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    Construction of low density parity check codes: a combinatoric design approach

    Ammar, B., Honary, B., Kou, Y. & Lin, S., 07/2002, Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on. Lausanne, Switzerland : IEEE, p. 311 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    Construction issues surrounding a portable four-band neutron detection system.

    Selwood, M. J. & Monk, S. D., 03/2011, In: Radiation Protection Dosimetry. 144, 1-4, p. 249-252 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  90. Published

    Constructing schedules for time-critical data delivery in wireless sensor networks

    Pöttner, W.-B., Seidel, H., Brown, J., Roedig, U. & Wolf, L., 15/08/2014, In: ACM Transactions on Sensor Networks. 10, 3, 31 p., 44.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  91. Published

    Conscripts from birth: War and soldiery in the grim darkness of the far future

    Ryder, M., 31/05/2021, In: Fantastika Journal. 5, 1, p. 47-60 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    Connectivity Dynamics Under Microscopic Parameters in Signalized Heterogeneous Traffic Flow for VANET

    Umer, T., Ding, Z. & Honary, B., 06/2011, 12th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting . Liverpool, UK: Liverpool John Moores University, p. 69-73 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    Connected tools in digital design

    Weichel, C., Alexander, J., Karnik, A. & Gellersen, H., 1/04/2015, In: IEEE Pervasive Computing. 14, 2, p. 18-21 4 p.

    Research output: Contribution to Journal/MagazineJournal article

  94. Published

    Conflict identification with EA-Analyzer

    Sardinha, A., Chitchyan, R., Araújo, J., Moreira, A. & Rashid, A., 2013, Aspect-oriented requirements engineering. Moreira, A., Chitchyan, R., Araújo, J. & Rashid, A. (eds.). Berlin: Springer, p. 209-224 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  95. Published

    Configuring user-designer relations: interdisciplinary perspectives

    Buscher, M. (Editor), Slack, R. (Editor), Rouncefield, M. (Editor), Procter, R. (Editor), Hartswood, M. (Editor) & Voss, A. (Editor), 2008, London: Springer Verlag. 235 p. (Computer Supported Cooperative Work)

    Research output: Book/Report/ProceedingsBook

  96. Published

    Confidence-sourcing among amateur soccer players: interpreting time, place and stimulus-relevance

    Miller, P. K., George, R. & Nicholson, S., 2015, In: Open Sports Science Journal. 8, 1, p. 8-17 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  97. Published

    Concrete governmentality: shelters and the transformations of preparedness

    Deville, J., Guggenheim, M. & Hrdličková, Z., 06/2014, In: The Sociological Review. 62, Supp. S1, p. 183-210 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    Conceptualising the rights and responsibilities of internet intermediaries in relation to user-generated content: an analysis of European Union law

    Easton, C., 2013, In: International Journal of Technology Policy and Law . 1, 3, p. 283-296 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    Conceptualising recidivism for prediction and risk

    Francis, B., 05/2011, Recidivism and Reoffending in South Africa. Cape Town, South Africa: Open Society Foundation, p. 16-21 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  100. Published

    Concept mapping as a means of requirements tracing

    Kof, L., Gacitua, R., Rouncefield, M. & Sawyer, P., 1/09/2010, Managing Requirements Knowledge (MARK), 2010 Third International Workshop on. IEEE Computer Society, p. 22-31 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top