Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    Sentiment Analysis based Error Detection for Large-Scale Systems

    Alharthi, K., Jhumka, A., Di, S., Cappello, F. & Chuah, E., 24/06/2021.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  2. Published

    Sentencing for offences involving child pornography

    Gillespie, A., 2003, In: Criminal Law Review. p. 81-93 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Sentence memorability reveals the mental representations involved in processing spatial descriptions

    Fleming, P., Ball, L. J., Ormerod, T. C. & Collins, A. F., 2011, In: Thinking and Reasoning. 17, 1, p. 30-56 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Sensor Placement Modes for Smartphone based Pedestrian Dead Reckoning

    Ayub, S., Zhou, X., Honary, S., Bahraminasab, A. & Honary, B., 09/2011, Computer, Informatics, Cybernetics and Applications: Proceedings of the CICA 2011. He, X., Hua, E., Lin, Y. & Liu, X. (eds.). Berlin: Springer Verlag, p. 123-132 10 p. (Lecture Notes in Electrical Engineering; vol. 107).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Sensor Network Calculus with Multiple Sinks

    Schmitt, J., Zdarsky, F. & Roedig, U., 05/2006, Proceedings of the Performance Control in Wireless Sensor Networks Workshop at the 2006 IFIP Networking Conference. p. 6-13 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Sensor Network Calculus - A Framework for Worst Case Analysis.

    Roedig, U. & Schmitt, J., 30/06/2005, Distributed Computing in Sensor Systems: First IEEE International Conference, DCOSS 2005, Marina del Rey, CA, USA, June 30 – July 1, 2005. Proceedings. Prasanna, V. K., Iyengar, S. S., Spirakis, P. G. & Welsh, M. (eds.). Berlin: Springer Verlag, p. 141-154 14 p. (Lecture Notes in Computer Science; vol. 3560).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Sensor and Data Fusion: Taxonomy, Challenges and Applications

    Klein, L., Mihaylova, L. & El Faouzi, N.-E., 01/2012, Handbook on Soft Computing for Video Surveillance. Pal, S. K., Petrosino, A. & Maddalena, L. (eds.). USA: Chapman & Hall, p. 139-183 45 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  8. Published

    Sense and semantic tagging

    Rayson, P. & Stevenson, M., 2008, Corpus Linguistics: An international handbook. Lüdeling, A. & Kytö, M. (eds.). Berlin: Mouton de Gruyter, (Handbooks of Linguistics and Communication Science Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    Sense and Avoid in UAS: Research and Applications

    Angelov, P., 1/04/2012, Hoboken, NJ: John Wiley and Sons. 384 p.

    Research output: Book/Report/ProceedingsBook

  10. Published

    Sender-adaptive and receiver-driven layered multicast for scalable video over the Internet

    Zhang, Q., Guo, Q., Ni, Q., Zhu, W. & Zhang, Y.-Q., 04/2005, In: IEEE Transactions on Circuits and Systems for Video Technology. 15, 4, p. 482-495 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection

    Jardine, W., Frey, S., Green, B. & Rashid, A., 28/10/2016, CPS-SPC '16 Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. New York: ACM, p. 23-34 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Semiconductor quantum dots for quantum light sources

    Young, M., Roberts, J. & Young, R., 4/10/2013.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  13. Published

    Semiconductor devices for quantum technologies

    Young, R., 22/09/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  14. Published

    Semantics-Based Composition for Aspect-Oriented Requirements Engineering

    Chitchyan, R., Rashid, A., Rayson, P. & Waters, R., 04/2007, AOSD '07 Proceedings of the 6th international conference on Aspect-oriented software development. ACM, p. 36-48 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Semantic tagging and early modern collocates

    Alexander, M., Baron, A., Dallachy, F., Piao, S., Rayson, P. & Wattam, S., 22/07/2015, p. 8-10. 3 p.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  16. Published

    Semantic image retrieval using region-based relevance feedback

    Torres, J. M., Hutchison, D. & Reis, L. P., 2007, Adaptive Multimedia Retrieval: User, Context, and Feedback 4th International Workshop, AMR 2006, Geneva, Switzerland, July 27-28, 2006, Revised Selected Papers. Marchand-Maillet, S., Bruno, E., Nürnberger, A. & Detyniecki, M. (eds.). Berlin: Springer, p. 192-206 15 p. (Lecture Notes in Computer Science; vol. 4398).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Semantic categorization of web-based documents

    Evans, T. & Angelov, P., 16/12/2004, p. 500-505. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  18. Published

    SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage

    Xiong, S., Ni, Q., Wang, L. & Wang, Q., 14/04/2020, In: IEEE Internet of Things Journal. 7, 4, p. 2914-2927 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Self-organized Relay Selection for Cooperative Transmission in Vehicular Ad-hoc Networks

    Tian, D., Zhou, J., Sheng, Z., Chen, M., Ni, Q. & Leung, V. C. M., 10/2017, In: IEEE Transactions on Vehicular Technology. 66, 10, p. 9534-9549 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Self-Organization and Resilience for Networked Systems: Design Principles and Open Research Issues

    Dobson, S., Hutchison, D., Mauthe, A. U., Schaeffer-Filho, A. E., Smith, P. & Sterbenz, J. P., 1/04/2019, In: Proceedings of the IEEE . 107, 4, p. 819-834 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Self-Organising Fuzzy Logic Classifier

    Gu, X. & Angelov, P. P., 06/2018, In: Information Sciences. 447, p. 36-51 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Self-organisation in wireless sensor networks for assisted living.

    Zvikhachevskaya, A. & Mihaylova, L., 25/03/2009, IET Conference on Assisted Living 2009: Proceedings of a meeting held 24-25 March 2009, London, United Kingdom. Curran Associates, Inc. , 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Self-disclosure decision making based on intimacy and privacy

    Such, J. M., Espinosa, A., Garcia-Fornes, A. & Sierra, C., 30/11/2012, In: Information Sciences. 211, p. 93-111 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Self-Adaptive Power Control Mechanism in D2D Enabled Hybrid Cellular Network with mmWave Small Cells: An Optimization Approach

    Raza, S. A., Hassan, S. A., Pervaiz, H. B., Ni, Q. & Musavian, L., 4/12/2016, Globecom Workshops (GC Wkshps), 2016 IEEE. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Self-adaptive framelet-based communication for wireless sensor networks

    O'Donovan, T., Roedig, U., Benson, J. & Sreenan, C. J., 4/08/2011, In: Computer Networks. 55, 11, p. 2558-2575

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Seeing the invisible algorithm: the practical politics of tracking the credit trackers

    Deville, J. & van der Velden, L., 8/12/2015, Algorithmic life: calculative devices in the age of big data. Amoore, L. & Piotukh, V. (eds.). London: Routledge

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  27. Published

    SEED: a scalable approach for cyber-physical system simulation

    Garraghan, P., McKee, D., Ouyang, X., Webster, D. & Xu, J., 14/10/2015, In: IEEE Transactions on Services Computing. 9, 2, p. 199-212 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Security, technology and global politics: thinking with Virilio

    Lacy, M. J., 2015, London: Routledge. 168 p. (Prio New Security Studies)

    Research output: Book/Report/ProceedingsBook

  29. Published

    Security Requirements Engineering in Safety-Critical Railway Signalling Networks.

    Heinrich, M., Vateva-Gurova, T., Arul, T., Katzenbeisser, S., Suri, N., Birkholz, H., Fuchs, A., Krauß, C., Zhdanova, M., Kuzhiyelil, D., Tverdyshev, S. & Schlehuber, C., 14/07/2019, In: Security and Communication Networks. 2019, 14 p., 8348925.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Security policy verification for multi-domains in cloud systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 1/04/2014, In: International Journal of Information Security. 13, 2, p. 97-111 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Security of the GPT cryptosystem and its applications to cryptography

    Rashwan, H., Gabidulin, E. M. & Honary, B., 08/2011, In: Security and Communication Networks. 4, 8, p. 937-946 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Security issues in cloud federations

    Rak, M., Ghani, H., Ficco, M., Suri, N., Luna, J., Panica, S. & Petcu, D., 2012, Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice. IGI Global, p. 176-194 19 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  33. Published

    Security enhancements for A5/1 without loosing hardware efficiency in future mobile systems

    Komninos, N., Honary, B. & Darnell, M., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 324-328 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Security engineering with patterns

    Schumacher, M. & Roedig, U., 1/09/2001, Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Security as a service using an SLA-based approach via SPECS

    Rak, M., Suri, N., Luna, J., Petcu, D., Casola, V. & Villano, U., 2/12/2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published
  37. Published

    Securitization and the global politics of cybersecurity

    Lacy, M. J. & Prince, D. D. C., 1/03/2018, In: Global Discourse. 8, 1, p. 100-115 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    Securing the cloud-assisted smart grid

    Demir, K., Ismail, H., Vateva-Gurova, T. & Suri, N., 1/12/2018, In: International Journal of Critical Infrastructure Protection. 23, p. 100-111 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    Securing GSM voice through scrambling

    Naeem, I. A., Rauf, U., Ahmad, S. F. & Shirazi, S. N., 2010, Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010. IEEE, p. 156-158 3 p. 5555330

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    Securing Communication in 6LoWPAN with Compressed IPsec

    Raza, S., Duquennoy, S., Chung, A., Yazar, D., Voigt, T. & Roedig, U., 1/06/2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Securing by design

    Weber, C. & Lacy, M., 07/2011, In: Review of International Studies. 37, 3, p. 1021-1043 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    Secure messaging and real time media streaming using enterprise PKI and ECC based certificates

    Ashraf, S., Shirazi, S. N., Nadeem, M. A. & Ikram, N., 2010, Computational Technologies in Electrical and Electronics Engineering (SIBIRCON), 2010 IEEE Region 8 International Conference on. IEEE, p. 159-161 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN

    Raza, S., Duquennoy, S., Höglund, J., Roedig, U. & Voigt, T., 12/2014, In: Security and Communication Networks. 7, 12, p. 2654-2668 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    Secure and robust multi-constrained QoS aware routing algorithm for VANETs

    Hashem Eiza, M., Owens, T. & Ni, Q., 01/2016, In: IEEE Transactions on Dependable and Secure Computing. 13, 1, p. 32-45 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

    Hashem-Eiza, M., Shi, Q., Marnerides, A. & Owens, T., 22/05/2016, 2016 IEEE International Conference on Communications (ICC). IEEE, 6 p. 7510934

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Secure and privacy-aware cloud-assisted video reporting service in 5G enabled vehicular networks

    Hashem Eiza, M., Ni, Q. & Shi, Q., 10/2016, In: IEEE Transactions on Vehicular Technology. 65, 10, p. 7868-7881 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    Secrecy Spectrum and Energy Efficiency Analysis in Massive MIMO-enabled Multi-Tier Hybrid HetNets

    Umer, A., Hassan, S. A., Pervaiz, H., Musavian, L., Ni, Q. & Imran, M. A., 1/03/2020, In: IEEE Transactions on Green Communications and Networking. 4, 1, p. 246-262 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  48. Published

    SecLA-based negotiation and brokering of cloud resources

    Luna, J., Vateva-Gurova, T., Suri, N., Rak, M. & De Benedictis, A., 2014, Cloud Computing and Services Science: Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers. Springer-Verlag, Vol. 453. p. 1-18 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  49. Published

    Search+: A resource efficient Peer-to-Peer service discovery mechanism

    Skjegstad, M., Roedig, U. & Johnsen, F. T., 10/2009, IEEE Military Communications Conference, 2009. MILCOM 2009. . IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Seapower in the Post-Modern World

    Germond, B., 30/04/2024, McGill-Queens University Press.

    Research output: Book/Report/ProceedingsBook

  51. Published

    Seapower in the age of global leadership challenge: A whole-system approach for the UK

    Germond, B., 11/04/2024, 2 p.

    Research output: Book/Report/ProceedingsCommissioned report

  52. Published

    Sea Blindness: The Cyber Briefing

    Germond, B. (Speaker), 25/05/2023

    Research output: Exhibits, objects and web-based outputsPodcast

  53. Published

    SDQ: Enabling rapid QoE experimentation using Software Defined Networking

    Fawcett, L., Mu, M., Broadbent, M. H., Hart, N. P. & Race, N. J. P., 24/07/2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon, Portugal: IEEE, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    SDN-PANDA: Software-Defined Network Platform for ANomaly Detection Applications

    Granby, B., Askwith, R. & Marnerides, A., 10/11/2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP). IEEE, p. 463-466 4 p. (2015 IEEE 23rd International Conference on Network Protocols (ICNP)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas

    Serafini, M., Bokor, P., Dobre, D., Majuntke, M. & Suri, N., 28/06/2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN). IEEE, p. 353-362 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published
  57. Published

    Science fiction and making ethics futural: Critical response to Yannick Rumpala

    Moffat, L., 28/02/2021, In: Global Discourse. 11, 1-2, p. 267-269 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  58. Published

    Scenarios and use cases in Tweether: W-band for Internet Everywhere

    Paoloni, C., Letizia, R., Ni, Q., Krozer, V., Andre, F., Magne, F., Marilier, M., Zimmerman, R., Ramirez, A., Vilar, R. & Burciu, I., 2015.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  59. Published

    Scared stiff: The influence of anxiety on the perception of action capabilities

    Graydon, M. M., Linkenauger, S. A., Teachman, B. A. & Proffitt, D. R., 2012, In: Cognition and Emotion. 26, 7, p. 1301-1315 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Scarecrows, robots and time machines

    Coulton, P., Race, N. & Burnett, D., 4/11/2013. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  61. Published

    Scamming the scammers: towards automatic detection of persuasion in advance fee frauds

    Edwards, M. J., Peersman, C. & Rashid, A., 3/04/2017, Second International Workshop on Computational Methods for CyberSafety (CyberSafety 2017) co-located with International Conference on World Wide Web (WWW). New York: ACM, p. 1291-1299 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  62. Published

    Scaled design and test of a coupler for micro-reentrant square-cavities for millimeter wave klystrons

    Paoloni, C., Mineo, M., Yin, H., Zhang, L., He, W., Robertson, C. W., Ronald, K., Phelps, A. D. R. & Cross, A. W., 2013, 14th IEEE International Vacuum Electronic Conference. IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    Scalable dynamic business process discovery with the constructs competition miner

    Redlich, D., Molka, T., Gilani, W., Blair, G. S. & Rashid, A., 2014, Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014), Milan, Italy, November 19-21, 2014.. Accorsi, R., Ceravolo, P. & Russo, B. (eds.). p. 91-107 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    Scalable Bloom Filters

    Almeida, P. S., Baquero, C., Preguiça, N. & Hutchison, D., 31/03/2007, In: Information Processing Letters. 101, 6, p. 255-261 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  65. Published

    Scalable and Efficient Multiagent Platform Closer to the Operating System

    Alberola, J. M., Such, J. M., Espinosa, A., Botti, V. & Garcia-Fornes, A., 2008, Artificial intelligence research and development: proceedings of the 11th International Conference of the Catalan Association for Artificial Intelligence. Alsinet, T., PuyolGruart, J. & Torras, C. (eds.). Asmsterdam: IOS Press, p. 7-15 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    Scalable adaptive hierarchical clustering

    Mathy, L., Canonico, R., Simpson, S. & Hutchison, D., 1/03/2002, In: IEEE Communications Letters. 6, 3, p. 117-119 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    Scalability improvement of the real time control protocol

    El-Marakby, R. & Hutchison, D., 10/02/2005, In: Computer Communications. 28, 2, p. 136-149 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  68. Published

    SCADA-agnostic Power Modelling for Distributed Renewable Energy Sources

    Althobaiti, A., Jindal, A. & Marnerides, A., 9/10/2020, 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, p. 379-384 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  69. Published

    SBVLC: Secure Barcode-based Visible Light Communication for Smartphones

    Zhang, B., Ren, K., Xing, G., Fu, X. & Wang, C., 1/02/2016, In: IEEE Transactions on Mobile Computing. 15, 2, p. 432-446 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  70. Published

    Saturation throughput analysis of error-prone 802.11 wireless networks

    Ni, Q., Li, T. J., Turletti, T. & Xiao, Y., 12/2005, In: Wireless Communications and Mobile Computing. 5, 8, p. 945-956 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    SARLM: sender-adaptive & receiver-driven layered multicasting for scalable video

    Ni, Q., Zhang, Q. & Zhu, W., 22/08/2001, Multimedia and Expo, 2001. ICME 2001. IEEE International Conference on. IEEE, p. 757-760 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    SARIVA: Smartphone App for Real-time Intelligent Video Analytics

    Clarke, C., Angelov, P., Sadeghi Tehran, P. & Yusuf, M., 2014, In: Journal of Automation, Mobile Robotics and Intelligent Systems. 8, 4, p. 15-19 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  73. Unpublished

    SAND: A Scalable, Distributed and Dynamic Active Network Directory Service

    Sifalakis, M., Mauthe, A. & Hutchison, D., 2009, (Unpublished) Lecture Notes in Computer Science: Active and Programmable Networks. Springer Berlin / Heidelberg

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    San Francisco U-turn on ‘killer robots’: Are we any safer as a result?

    Ryder, M., 26/12/2022

    Research output: Exhibits, objects and web-based outputsBlog

  75. Published

    Sampling labelled profile data for identity resolution

    Edwards, M., Wattam, S. M., Rayson, P. E. & Rashid, A., 5/12/2016, Proceedings of IEEE International Conference on Big Data (IEEE BigData 2016). IEEE, p. 540-547 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    Sampling and transport co-design in Wireless Sensor Networks

    Sachidananda, V., Khelil, A., Noack, D. & Suri, N., 18/03/2013, 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS). IEEE, p. 98-100 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    Same, Same but Different: Provoking Relations, Assembling the Comparator

    Deville, J., Guggenheim, M. & Hrdličková, Z., 2016, Practising Comparison: Logics, Relations, Collaborations. Deville, J., Guggenheim, M. & Hrdličková, Z. (eds.). Manchester: Mattering Press, p. 99-129 31 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  78. Published

    Safety verification utilizing model-based development for safety critical cyber-physical systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 15/08/2017, In: Journal of Information Processing Systems. 25, p. 797-810 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  79. Unpublished

    Safety in Numbers: Calculation and Document Re-Use in Knowledge Work

    Harper, R., Procter, R., Randall, D. & Rouncefield, M., 10/2001, (Unpublished) GROUP '01 Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting Group Work. New York: ACM, p. 242-251 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    Safeguarding cyborg childhoods: incorporating the on/offline behaviour of children into everyday social work practices

    May-Chahal, C., Mason, C., Rashid, A., Walkerdine, J., Rayson, P. & Greenwood, P., 2014, In: British Journal of Social Work. 44, 3, p. 596-614 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  81. Published

    Russia’s plan to relocate its Black Sea naval base from Crimea is priceless for Ukraine’s morale

    Germond, B., 25/10/2023

    Research output: Exhibits, objects and web-based outputsBlog

  82. Published

    Russia has most to gain from Black Sea ceasefire – but it’s marginal, and Ukraine benefits too

    Germond, B., 28/03/2025

    Research output: Exhibits, objects and web-based outputsBlog

  83. Published
  84. Published

    Run Time Application Repartitioning in Dynamic Mobile Cloud Environments

    Yang, L., Cao, J., Tang, S., Han, D. & Suri, N., 1/07/2016, In: IEEE Transactions on Cloud Computing. 4, 3, p. 336-348 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. Published

    RTSDE: recursive total-sum-distances-based density estimation approach and its application for autonomous real-time video analytics

    Angelov, P. & Wilding, A., 9/12/2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS). Orlando, FL, USA: IEEE, p. 81-86 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    RSVP as firewall signalling protocol

    Roedig, U., Goertz, M., Karsten, M. & Steinmetz, R., 3/07/2001, Proceedings of the 6th IEEE Symposium on Computers and Communications, Hammamet, Tunisia. IEEE Computer Society Press, p. 57-62 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    RR644 - Attention, awareness and occupational stress.

    Fairclough, S. & Goodwin, L., 1/01/2008, The Health and Safety Executive.

    Research output: Other contribution

  88. Published

    Routing challenges: Peer to peer applications on a community mesh network

    Ishmael, J. & Race, N. J. P., 08/2006, First International Workshop on "Wireless mesh: moving towards applications" (WiMeshNets).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    ROUTER: Fog Enabled Cloud based Intelligent Resource Management Approach for Smart Home IoT Devices

    Gill, S. S., Garraghan, P. & Buyya, R., 1/08/2019, In: Journal of Systems and Software. 154, p. 125-138 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  90. Published

    ROSE: Cluster Resource Scheduling via Speculative Over-subscription

    Sun, X., Hu, C., Yang, R., Garraghan, P., Wo, T., Xu, J., Zhu, J. & Li, C., 2/07/2018, 38th IEEE International Conference on Distributed Systems Computing Systems. IEEE, p. 949-960 12 p. (2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    Room temperature mid-infrared emission from faceted InAsSb multi quantum wells embedded in InAs nanowires

    Alhodaib, A., Noori, Y., Carrington, P. J., Sanchez, A., Thompson, M. D., Young, R. J., Krier, A. & Marshall, A. R. J., 10/01/2018, In: Nano Letters. 18, 1, p. 235-240 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    Role-based symmetry reduction of fault-tolerant distributed protocols with language support

    Bokor, P., Serafini, M., Suri, N. & Veith, H., 2009, Formal Methods and Software Engineering: 11th International Conference on Formal Engineering Methods ICFEM 2009, Rio de Janeiro, Brazil, December 9-12, 2009. Proceedings. Springer, Vol. 5885 LNCS. p. 147-166 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  93. Published

    Role-based secure inter-operation and resource usage management in mobile grid systems

    Gouglidis, A. & Mavridis, I., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication : 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. Ardagna, C. A. & Zhou, J. (eds.). Berlin: Springer Verlag, p. 38-53 16 p. (Lecture Notes in Computer Science; vol. 6633).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  94. Published

    Role Effects in Negotiation: The One-Down Phenomenon

    Donohue, W. A. & Taylor, P. J., 07/2007, In: Negotiation Journal. 23, 3, p. 307-331 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published

    Rod-type photonic crystals For colloidal quantum dot light coupling

    Noori, Y., Roberts, J., Woodhead, C., Young, M. & Young, R., 17/04/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  96. Published

    Robustness Evaluation of Operating Systems

    Johansson, A. & Suri, N., 2008, Information Assurance: The Morgan Kaufmann Series in Networking. Elsevier Inc., p. 349-375 27 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  97. Published

    Robust Transmit Designs for Secrecy Rate Constrained MISO NOMA System

    Su, B., Ni, Q. & He, B., 20/12/2018, 29th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    Robust Transmit Beamforming for SWIPT-Enabled Cooperative NOMA with Channel Uncertainties

    Su, B., Ni, Q. & Yu, W., 1/06/2019, In: IEEE Transactions on Communications. 67, 6, p. 4381-4392 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    Robust sensor fault reconstruction using right eigenstructure assignment

    Tan, C. P., Kuang, Y. C. & Edwards, C., 2006, DELTA '06: Proceedings of the Third IEEE International Workshop on Electronic Design, Test and Applications. Washington, DC, USA: IEEE Computer Society, p. 435-439 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  100. Published

    Robust routing of data in wireless networks

    Sreenan, C. J. (Inventor), Benson, J. (Inventor) & Roedig, U. (Inventor), 2009, Patent No. WO 2009/053954

    Research output: Patent

Previous 1...5 6 7 8 9 10 11 12 ...36 Next

Back to top