Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2010
  2. Published

    Using underutilized CPU resources to enhance its reliability

    Timor, A., Mendelson, A., Birk, Y. & Suri, N., 1/01/2010, In: IEEE Transactions on Dependable and Secure Computing. 7, 1, p. 94-109 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    An unsaturated model for request mechanisms in WiMAX

    Ni, Q. & Hu, L., 01/2010, In: IEEE Communications Letters. 14, 1, p. 45-47 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Location and navigation support for emergency responders: a survey

    Fischer, C. & Gellersen, H., 01/2010, In: IEEE Pervasive Computing. 9, 1, p. 38-47 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Pyramidal quantum dots: High uniformity and narrow excitonic emission

    Mereni, L. O., Dimastrodonato, V., Young, R. J. & Pelucchi, E., 01/2010, In: Superlattices and Microstructures. 47, 1, p. 78-82 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    The use of the R2 as a measure of firm-specific information: A cross-country critique

    Alves, P., Peasnell, K. & Taylor, P., 01/2010, In: Journal of Business Finance and Accounting. 37, 1, p. 1-26 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    A Comparative Study of DECT and WLAN Signals for Indoor Localization

    Kranz, M., Fischer, C. & Schmidt, A., 2010, IEEE International Conference on Pervasive Computing and Communications (PerCom), 2010. IEEE, p. 235-243 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    A computational protocol and software implementation (as a MATLAB application) for biomaker identification in infrared spectroscopy datasets

    Trevisan, J., Angelov, P. & Martin, F., 2010, In: Nature Protocols.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    A New Link Lifetime Prediction Method for Greedy and Contention-based Routing in Mobile Ad Hoc Networks

    Noureddine, H., Ni, Q., Min, G. & Al-Raweshidy, H., 2010, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, p. 2662-2667 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A Novel Game-Theoretic Cross-Layer Design for OFDMA Broadband Wireless Networks

    Zarakovitis, C. C., Ni, Q., Nikolaros, I. & Tyce, O., 2010, Communications (ICC), 2010 IEEE International Conference on. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    A pre-injection analysis for identifying fault-injection tests for protocol validation

    Suri, N. & Sinha, P., 2010, In: Journal of Software. 5, 10, p. 1144-1161 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top