Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2015
  2. Published

    Managing emergent ethical concerns for software engineering in society

    Rashid, A., Moore, K., May-Chahal, C. & Chitchyan, R., 16/06/2015, Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on (Volume:2 ) . IEEE, p. 523-526 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Sound auction specification and implementation

    Caminati, M. B., Kerber, M., Lange, C. & Rowat, C., 15/06/2015, Proceedings of the Sixteenth ACM Conference on Economics and Computation (EC '15). ACM, p. 547-564

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    User-level fairness delivered: network resource allocation for adaptive video streaming

    Mu, M., Farshad, A., Simpson, S., Ni, Q. & Race, N. J. P., 15/06/2015, 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS). IEEE, p. 85-94 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    ENGAGE: early insights in measuring multi-device engagements

    Jones, R., Clinch, S., Alexander, J., Davies, N. & Mikusz, M., 10/06/2015, PerDis '15 Proceedings of the 4th International Symposium on Pervasive Displays. New York: ACM, p. 31-37 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Energy efficiency optimization with energy harvesting using harvest-use approach

    Siddiqui, A., Musavian, L. & Ni, Q., 8/06/2015, Communication Workshop (ICCW), 2015 IEEE International Conference on. IEEE, p. 1982-1987 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    A working memory test battery: Java-based collection of seven working memory tasks

    Stone, J. M. & Towse, J., 5/06/2015, In: Journal of Open Research Software. 3, 9 p., e5.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    A survey of cyber security management in industrial control systems

    Knowles, W., Prince, D. D. C., Hutchison, D., Disso, J. F. P. & Jones, K., 1/06/2015, In: International Journal of Critical Infrastructure Protection. 9, p. 52-80 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Development of the multilingual semantic annotation system

    Piao, S., Bianchi, F., Dayrell, C., D'egidio, A. & Rayson, P., 1/06/2015, The 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Proceedings of the Conference. Association for Computational Linguistics, p. 1268-1274 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Passive network awareness as a means for improved grid scheduling

    Elkhatib, Y. & Edwards, C., 1/06/2015, In: Journal of Grid Computing. 13, 2, p. 275-291 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Walls and other unremarkable boundaries in South London: impenetrable infrastructure or portals of time, space and cultural difference?

    Knott, K., 1/06/2015, In: New Diversities. 17, 2, p. 15-34 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top