Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2014
  2. Published

    Cross-device gaze-supported point-to-point content transfer

    Turner, J., Bulling, A., Alexander, J. & Gellersen, H., 26/03/2014, ETRA '14 Proceedings of the Symposium on Eye Tracking Research and Applications. New York: ACM, p. 19-26 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Demo abstract: A testbed infrastructure to study the impact of temperature on WSN

    Boano, C. A., Roemer, K., Brown, J., Roedig, U. & Zúñiga, M. A., 24/03/2014, Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on. IEEE, p. 154-156 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Performance evaluation of congestion window validation for DASH transport

    Nazir, S., Hossain, Z., Secchi, R., Broadbent, M., Petlund, A. & Fairhurst, G., 19/03/2014, NOSSDAV '14 Proceedings of Network and Operating System Support on Digital Audio and Video Workshop. New York: ACM, 6 p. 67

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    An empirical failure-analysis of a large-scale cloud computing environment

    Garraghan, P., Townend, P. & Xu, J., 6/03/2014, 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering. IEEE, p. 113-120 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    The politics of life at sea: a note on sources

    Follis, K., 3/03/2014

    Research output: Other contribution

  7. Published

    Attack pattern recognition through correlating cyber situational awareness in computer networks

    Shirazi, S. N. U. H., Schaeffer-Filho, A. & Hutchison, D., 1/03/2014, Cyberpatterns: unifying design patterns with security and attack patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 125-134 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  8. Published

    I've had a good life, what's left is a bonus: factor analysis of the Mental Adjustment to Cancer Scale in a palliative care population

    Goodwin, L., Price, A., Lee, W., Rayner, L., Moorey, S., Monroe, B., Sykes, N., Hansford, P., Higginson, I. & Hotopf, M., 1/03/2014, In: Palliative Medicine. 28, 3, p. 243-255 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Sequential Monte Carlo methods for state and parameter estimation in abruptly changing environments

    Nemeth, C., Fearnhead, P. & Mihaylova, L., 1/03/2014, In: IEEE Transactions on Signal Processing. 62, 5, p. 1245-1255 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    A new link lifetime estimation method for greedy and contention-based routing in mobile ad hoc networks

    Noureddine, H., Ni, Q., Min, G. & Al-raweshidy, H., 03/2014, In: Telecommunication Systems. 55, 3, p. 421-433 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Figuring out children’s number representations: lessons from cross-cultural work

    Towse, J., Muldoon, K. & Simms, V., 03/2014, Oxford handbook of numerical cognition. Cohen Kadosh, R. & Dowker, A. (eds.). Oxford: Oxford University Press

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Back to top