Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. Published

    A Computational Model for Reputation and Ensemble-Based Learning Model for Prediction of Trustworthiness in Vehicular Ad Hoc Network

    Alharthi, A., Ni, Q., Jiang, R. & Khan, M. A., 15/10/2023, In: IEEE Internet of Things Journal. 10, 20, p. 18248-18258 11 p., 20.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    A computational protocol and software implementation (as a MATLAB application) for biomaker identification in infrared spectroscopy datasets

    Trevisan, J., Angelov, P. & Martin, F., 2010, In: Nature Protocols.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    A computer-assisted approach to the analysis of metaphor variation across genres.

    Semino, E., Hardie, A., Koller, V. & Rayson, P., 2005, Corpus-based Approaches to Figurative Language. . Barnden, J., Lee, M., Littlemore, J., Moon, R., Philip, G. & Wallington, A. (eds.). Birmingham: University of Birmingham School of Computer Science, p. 145-153 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A computer-assisted study of the use of violence metaphors for cancer and end of life by patients, family carers and health professionals

    Demmen, J. E., Semino, E., Demjen, Z., Koller, V., Hardie, A., Rayson, P. & Payne, S., 17/08/2015, In: International Journal of Corpus Linguistics. 20, 2, p. 205-231 27 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    A concern-oriented requirements engineering model

    Moreira, A., Araújo, J. & Rashid, A., 2005, Advanced Information Systems Engineering 17th International Conference, CAiSE 2005, Porto, Portugal, June 13-17, 2005. Proceedings. Pastor, O. & Falcão e Cunha, J. (eds.). Berlin: Springer, p. 293-308 16 p. (Lecture Notes in Computer Science; vol. 3520).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    A Congestion Control Framework Based on In-Network Resource Pooling

    Rene, S., Ascigil, O., Psaras, I. & Pavlou, G., 30/04/2022, In: IEEE/ACM Transactions on Networking . 30, 2, p. 683-697 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    A connection-level call admission control using genetic algorithm for multi-class multimedia services in wireless networks

    Hong, X., Xiao, Y., Ni, Q. & Li, T., 2006, In: International Journal of Mobile Communications. 4, 5, p. 568-580 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    A contribution to an Auction Theory Toolbox through code and discussion

    Caminati, M. B., 30/04/2013, 39th Annual Convention of The Society for the Study of Artificial Intelligence and the Simulation of Behaviour (SSAISB).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    A control theory approach for analyzing the effects of data errors in safety-critical control systems

    Askerdal, O., Gäfvert, M., Hiller, M. & Suri, N., 16/12/2002, Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings. IEEE, p. 105-114 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A convolution particle filtering approach for tracking elliptical extended objects

    Angelova, D., Mihaylova, L., Petrov, N. & Gning, A., 1/07/2013, p. 1-6. 6 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

Previous 1...4 5 6 7 8 9 10 11 ...353 Next

Back to top