Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2013
  2. Published

    Articulated Human Body Parts Detection Based on Cluster Background Subtraction and Foreground Matching

    Bhaskar, H., Mihaylova, L. & Maskell, S., 16/01/2013, In: Neurocomputing. 100, 1, p. 58-73 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Electron and hole confinement by type-II semiconductor nano-rings

    Young, R., 10/01/2013.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  4. Published

    Advances in Intelligent Signal Processing and Data Mining: Theory and Applications (Studies in Computational Intelligence

    Georgieva, P. (Editor), Mihaylova, L. (Editor) & Jain, L. (Editor), 1/01/2013, Berlin: Springer Verlag. 351 p. (Studies in Computational Intelligence; vol. 410, no. 1)

    Research output: Book/Report/ProceedingsBook

  5. Published

    Magentix2: a privacy-enhancing agent platform

    Such, J. M., Garcia-Fornes, A., Espinosa, A. & Bellver, J., 01/2013, In: Engineering Applications of Artificial Intelligence. 26, 1, p. 96-109 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Spatial and Temporal Details in Intentions: A Cue to Detecting Deception

    Warmelink, L., Vrij, A., Mann, S. & Granhag, P. A., 01/2013, In: Applied Cognitive Psychology. 27, 1, p. 101-106 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    “How many bloody examples do you want?”: fieldwork and generalisation

    Crabtree, A., Tolmie, P. & Rouncefield, M., 2013, Proceedings of the 13th European Conference on Computer Supported Cooperative Work (ECSCW 2013). Bertelsen, O. W., Ciolfi, L., Grasso, M. A. & Papadopoulos, G. A. (eds.). Berlin: Springer Verlag, p. 1-20 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A methodology for the development and verification of access control systems in cloud computing

    Gouglidis, A. & Mavridis, I., 2013, Collaborative, Trusted and Privacy-Aware e/m-Services. Douligeris, C., Polemi, N., Karantjias, A. & Lamersdorf, W. (eds.). Berlin: Springer Verlag, p. 88-99 12 p. (IFIP Advances in Information and Communication Technology ; vol. 399).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  9. Published

    A practical implementation of self-evolving cloud-based control of a pilot plant

    Costa, B., Skrjanc, I., Blazic, S. & Angelov, P., 2013, 2013 IEEE International Conference on Cybernetics, CYBCONF-2013, Lausanne, Switzerland13-15 June, 2013. Piscataway, N.J.: IEEE, p. 7-12 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A retrospective analysis of QoS deployment, operation and use in enterprise and provider networks

    Mackay, M. & Edwards, C., 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA). Barolli, L., Xhafa, F., Takizawa, M., Enokido, T. & Hsu, H. H. (eds.). New York: IEEE, p. 583-588 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Adolescents, sexting and human rights

    Gillespie, A., 2013, In: Human Rights Law Review. 13, 4

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top