Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2010
  2. Published

    Blackmail, kidnapping and threats to kill: Chapter 21

    Soothill, K. & Francis, B., 2010, Handbook on Crime. Brookman, F., Maguire, M., Pierpoint, H. & Bennett, T. (eds.). Cullompton: Willan, p. 393-414 22 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  3. Published

    Characterising a grid site's traffic

    Ma, T., El-khatib, Y., Mackay, M. & Edwards, C., 2010, HPDC '10 Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing. New York: ACM, p. 707-716 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Classification of Short Text Comments by Sentiment and Actionability for VoiceYourView

    Simm, W., Ferrario, M., Piao, S., Whittle, J. & Rayson, P., 2010, IEEE Second International Conference on Social Computing (SocialCom), 2010 . IEEE, p. 552-557 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Cross-Document Dependency Analysis for System-of-System Integration

    Naqvi, A., Chitchyan, R., Zschaler, S., Rashid, A. & Südholt, M., 2010, Foundations of Computer Software. Future Trends and Techniques for Development: 15th Monterey Workshop 2008, Budapest, Hungary, September 24-26, 2008, Revised Selected Papers.. Choppy, C. & Sokolsky, O. (eds.). Berlin: Springer, p. 201-226 26 p. (Lecture Notes in Computer Science; vol. 6028).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Cross-layer Design for Multiuser OFDMA Systems with Cooperative Game and MMPP Queuing Considerations

    Nikolaros, I. G., Zarakovitis, C. C., Skordoulis, D., Hadjinicolaou, M. G. & Ni, Q., 2010, Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, p. 2649-2654 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Defining child pornography: challenges for the law

    Gillespie, A., 2010, In: Child and Family Law Quarterly. p. 200-222 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Developing a Portable Wireless LAN Kit

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2010, JANET.

    Research output: Working paper

  9. Published

    Diagrammatic specification of mobile real-time systems

    Linker, S., 2010, Diagrammatic Representation and Inference: 6th International Conference, Diagrams 2010, Portland, OR, USA, August 9-11, 2010. Proceedings. Goel, A. K., Jamnik, M. & Narayanan, N. H. (eds.). Berlin: Springer, p. 316-318 3 p. (Lecture Notes in Computer Science; vol. 6170).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Diasporas : concepts, intersections, identities

    Knott, K. (Editor) & McLoughlin, S. (Editor), 2010, London; New York: Zed Books. 319 p.

    Research output: Book/Report/ProceedingsBook

  11. Published

    Domain-specific metamodelling languages for software language engineering

    Zschaler, S., Kolovos, D. S., Drivalos, N., Paige, R. F. & Rashid, A., 2010, Software language engineering: Second International Conference, SLE 2009, Denver, CO, USA, October 5-6, 2009, Revised Selected Papers. van den Brand, M., Gašević, D. & Gray, J. (eds.). Berlin: Springer, p. 334-353 20 p. (Lecture Notes in Computer Science; vol. 5969).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top