Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2009
  2. Published

    Covert surveillance, human rights and the law

    Gillespie, A., 2009, In: Irish Criminal Law Journal. 19, 3, p. 71-79 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Cross-layer design for single-cell OFDMA systems with heterogeneous QoS and partial CSIT

    Zarakovitis, C., Ni, Q. & Skordoulis, D., 2009, Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Design of single growth epitaxial structures for monolithic integration of single frequency laser and Electro-absorption modulators

    Daunt, C. L. L. M., Hua, Y., O'Callaghan, J., Young, R. J., Thomas, K., Pelucchi, E., Corbett, B. & Peters, F., 2009, 2009 IEEE LEOS Annual Meeting Conference Proceedings, Vols 1and 2. New York: IEEE, p. 219-220 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Effects of the change temporal order technique on eyewitness memory.

    Dando, C. J. & Ormerod, T. C., 2009, Proceedings of the 31st Annual Conference of the Cognitive Science Society. Taatgen, N. & van Rijn, H. (eds.). p. 2644-2649 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    Efficient robust storage using secret tokens

    Dobre, D., Majuntke, M., Serafini, M. & Suri, N., 2009, Stabilization, Safety, and Security of Distributed Systems: 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings. Springer, Vol. 5873 LNCS. p. 269-283 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    Exploring delay-aware transactions in heterogeneous mobile environments

    Ayari, B., Khelil, A. & Suri, N., 2009, In: Journal of Software. 4, 7, p. 634-643 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Fault analysis in OSS based on program slicing metrics

    Black, S., Counsell, S., Hall, T. & Bowes, D., 2009, 2009 35th Euromicro Conference on Software Engineering and Advanced Applications. IEEE, p. 3-10 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Female terrorism: a review

    Jacques, K. & Taylor, P. J., 2009, In: Terrorism and Political Violence. 21, 3, p. 499-515 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    Formal semantic conflict detection in aspect-oriented requirements

    Weston, N., Chitchyan, R. & Rashid, A., 2009, In: Requirements Engineering . 14, 4, p. 247-268 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    From reducing fear to improving community confidence - a change of emphasis for practitioners.

    Kirby, S. & McPherson, I., 2009, In: Safer Communities. 8, 3, p. 21-27 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top