Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. Published

    Towards resilient community wireless mesh networks

    Bury, S. & Race, N. J. P., 07/2008, AIMS '08 Proceedings of the 2nd International Conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services. Springer-Verlag, p. 195-199 5 p. (Lecture Notes in Computer Science).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Towards Resilient Networks Using Programmable Networking Technologies

    Xie, L., Smith, P., Banfield, M., Leopold, H., Sterbenz, J. P. & Hutchison, D., 2009, Active and Programmable Networks: IFIP TC6 7th International Working Conference, IWAN 2005, Sophia Antipolis, France, November 21-23, 2005. Revised Papers. Hutchison, D., Denazis, S., Lefevre, L. & Minden, G. J. (eds.). Berlin: Springer-Verlag, p. 83-95 13 p. (Lecture Notes in Computer Science; vol. 4388).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Towards the improvement of diagnostic metrics Fault diagnosis for DSL-Based IPTV networks using the Rényi entropy

    Marnerides, A., Malinowski, S., Morla, R., Rodrigues, M. R. D. & Kim, H. S., 3/12/2012, 2012 IEEE Global Communications Conference (GLOBECOM). IEEE, p. 2779-2784 6 p. (2012 IEEE Global Communications Conference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Towards the simulation of energy-efficient resilience management

    Peoples, C., Parr, G., Schaeffer-Filho, A. & Mauthe, A., 2011, SIMUTools '11: Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques. Brussels: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), p. 63-68 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Towards utilizing Tcpcrypt in mobile healthcare applications

    Nikolidakis, S. A., Giotsas, V., Georgakakis, E., Vergados, D. D. & Douligeris, C., 2012, Wireless Mobile Communication and Healthcare: Second International ICST Conference, MobiHealth 2011, Kos Island, Greece, October 5-7, 2011. Revised Selected Papers. Berlin: Springer, p. 374-379 6 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 83 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Tradeoff analysis and joint optimization of link-layer energy efficiency and effective capacity toward green communications

    Yu, W., Musavian, L. & Ni, Q., 05/2016, In: IEEE Transactions on Wireless Communications. 15, 5, p. 3339-3353 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Traffic anomaly diagnosis in Internet backbone networks: a survey

    Marnerides, A., Schaeffer-Filho, A. & Mauthe, A., 14/11/2014, In: Computer Networks. 73, p. 224-243 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Transformational leadership, intrinsic motivation and trust: A moderated-mediated model of workplace safety

    Conchie, S., 04/2013, In: Journal of Occupational Health Psychology. 18, 2, p. 198-210 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Travelling through time with corpus annotation software

    Rayson, P., Archer, D., Baron, A. & Smith, N., 2008, Corpus linguistics, computer tools, and applications - state of the art. Lewandowska-Tomaszczyk, B. (ed.). Frankfurt am Main: Peter Lang, Vol. 17. p. 29-46 18 p. (Studies In Language).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. Published

    TriggerTV: exploiting social user journeys within an interactive tv system

    Jones, A., Mitchell, K. & Race, N. J. P., 2010, Proceedings of the 20th international workshop on Network and operating systems support for digital audio and video: NOSSDAV '10. New York: ACM, p. 51-56 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Trust and distrust in safety leadership: mirror reflections?

    Conchie, S., Taylor, P. J. & Charlton, A., 10/2011, In: Safety Science. 49, 8-9, p. 1208-1214 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Trust and risk communication in high-risk organisations: A test of principles from social risk research

    Conchie, S. & Burns, C., 02/2008, In: Risk Analysis. 28, 1, p. 141-149 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Trust-based approaches to safety and production

    Conchie, S. M., Woodcock, H. E. & Taylor, P. J., 6/11/2015, The Wiley Blackwell handbook of the psychology of occupational safety and workplace health. Clarke, S., Probst, T., Guldenmund, F. & Passmore, J. (eds.). Chichester: Wiley-Blackwell, p. 111-132 22 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  14. Published

    Trusting Quantum Physics: lighting the way to secure communications

    Young, R. J., 28/09/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  15. Published

    Truthful Online Double Auctions for Mobile Crowdsourcing: An On-demand Service Strategy

    Liu, S., Yu, Y., Guo, L., Yeoh, P. L., Ni, Q., Vucetic, B. & Li, Y., 1/09/2022, In: IEEE Internet of Things Journal. 9, 17, p. 16096 - 16112 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Tuning into the right wavelength: The importance of culture for effective crisis negotiation

    Giebels, E. & Taylor, P., 2012, The psychology of crisis intervention for law enforcement officers. St-Yves, M. & Collins, P. (eds.). Toronto: Carswell, p. 277-294 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  17. Published

    Tuning the properties of exciton complexes in self-assembled GaSb/GaAs quantum rings

    Kamarudin, M. A., Hayne, M., Young, R. J., Zhuang, Q. D., Ben, T. & Molina, S. I., 10/03/2011, In: Physical review B. 83, 11, 6 p., 115311 .

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Two-dimensional materials for quantum light sources and authentication

    Young, R. J., 23/08/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  19. Published

    Types of risk transformation: a case study

    Busby, J., Alcock, R. E. & MacGillivray, B., 2012, In: Journal of Risk Research. 15, 1, p. 67-84 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Type-safe updating for modular WSN software

    Porter, B., Coulson, G. & Roedig, U., 06/2011, Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011 International Conference on . IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Typicality distribution function: a new density-based data analytics tool

    Angelov, P., 12/07/2015, Neural Networks (IJCNN), 2015 International Joint Conference on. IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Unpublished

    UAV collision avoidance - state of the art and possible solutions.

    Angelov, P., Xydeas, C., Bocaniala, C. D., Ansell, D., Patchett, C. & Everett, M., 4/10/2007, (Unpublished).

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  23. Published

    UAV-aided Wireless Power Transfer and Data Collection in Rician Fading

    Liu, Y., Xiong, K., Lu, Y., Ni, Q., Fan, P. & Letaief, K. B., 31/10/2021, In: IEEE Journal on Selected Areas in Communications. 39, 10, p. 3097-3113 17 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    UAV-Assisted Wireless Powered Cooperative Mobile Edge Computing: Joint Offloading, CPU Control, and Trajectory Optimization

    Liu, Y., Xiong, K., Ni, Q., Fan, P. & Letaief, K. B., 14/04/2020, In: IEEE Internet of Things Journal. 7, 4, p. 2777-2790 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Ubi Displays: A Toolkit for the Rapid Creation of Interactive Projected Displays

    Hardy, J., Ellis, C., Alexander, J. & Davies, N., 5/06/2013. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  26. Published

    Ubiquitous technologies, cultural logics and paternalism in industrial workplaces

    Kinder, K. E., Ball, L. J. & Busby, J. S., 2008, In: Poiesis and Praxis. 5, 3-4, p. 265-290 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Ukko: Resilient DRES Management for Ancillary Services using 5G Service Orchestration

    Rotsos, C., Marnerides, A., Magzoub, A., Jindal, A., McCherry, P., Bor, M., Vidler, J. & Hutchison, D., 30/12/2020, 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Ultra-tangibles: creating movable tangible objects on interactive tables

    Marshall, M., Carter, T., Alexander, J. & Subramanian, S., 2012, CHI '12 Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems. New York: ACM, p. 2185-2188 4 p. (CHI '12).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  29. Published
  30. Published

    Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks

    Kolomvatsos, K., Anagnostopoulos, C., Marnerides, A., Ni, Q., Hadjiefthymiades, S. & Pezaros, D., 4/09/2017, Computers and Communications (ISCC), 2017 IEEE Symposium on. IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  31. Published

    Understanding actionable knowledge in social media: BBC Question Time and Twitter, a case study

    Ferrario, M. A., Simm, W., Whittle, J., Rayson, P., Terzi, M. & Binner, J., 2012, Sixth International AAAI Conference on Weblogs and Social Media. AAAI, p. 455-458 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Unpublished

    Understanding and improving navigation within electronic documents

    Alexander, J., 2009, (Unpublished) 413 p.

    Research output: ThesisDoctoral Thesis

  33. Published

    Understanding cyber criminals and measuring their future activity

    Hargreaves, C. & Prince, D., 1/07/2013, Lancaster: Lancaster University. (Future of ...)

    Research output: Book/Report/ProceedingsOther report

  34. Published

    Understanding repeated non-attendance in health services: pilot analysis of administrative data and full study protocol for a national retrospective cohort

    Williamson, A., Ellis, D. A., Wilson, P., McQueenie, R. & McConnachie, A., 14/02/2017, In: BMJ Open. 7, 2, 11 p., e014120.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Understanding the mismatch between the demands of risk assessment and practice of scientists - the case of Deca-BDE.

    Alcock, R. E., MacGillivray, B. H. & Busby, J., 01/2011, In: Environment International. 37, 1, p. 216-225 10 p.

    Research output: Contribution to Journal/MagazineLiterature reviewpeer-review

  36. Published

    Understanding Your Needs: An Adaptive VoD System

    Mu, M., Knowles, W. & Race, N., 12/2012, Multimedia (ISM), 2012 IEEE International Symposium on. IEEE, p. 255-260 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Unraveling BitTorrent’s File Unavailability:Measurements and Analysis

    Kaune, S., Rumin, R. C., Tyson, G., Mauthe, A., Guerrero, C. & Steinmetz, R., 25/08/2010, Proceedings of the IEEE 10th International Conference on Peer-to-Peer Computing (P2P '10). IEEE, p. 1-9 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    Unsupervised classification of data streams based on typicality and eccentricity data analytics

    Costa, B. S. J., Bezerra, C. G., Guedes, L. A. & Angelov, P. P., 24/07/2016, 2016 IEEE International Conference on Fuzzy Systems (FUZZ). Vancouver Canada: IEEE, p. 58-63 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Unsupervised two-class & multi-class support vector machines for abnormal traffic characterization.

    Marnerides, A., Pezaros, D. P., Kim, H. & Hutchison, D., 1/04/2009.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  40. Published

    UPPC - Urdu Paraphrase Plagiarism Corpus

    Muhammad, S., Rayson, P. E. & Nawab, R. M. A., 23/05/2016, Proceedings of LREC 2016, Tenth International Conference on Language Resources and Evaluation. Calzolari, N., Choukri, K., Declerck, T., Grobelnik, M., Maegaard, B., Mariani, J., Moreno, A., Odijk, J. & Piperidis, S. (eds.). European Language Resources Association (ELRA), p. 1832-1836 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Use of data to inform expert evaluative opinion in the comparison of hand images - the importance of scars

    Jackson, G. & Black, S., 05/2014, In: International Journal of Legal Medicine. 128, 3, p. 555-563 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    User adaptive QoS aware selection method for cooperative heterogeneous wireless systems: a dynamic contextual approach

    Pervaiz, H., Ni, Q. & Zarakovitis, C. C., 10/2014, In: Future Generation Computer Systems. 39, p. 75-87 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  43. Published

    User mobility aware task assignment for mobile edge computing

    Wang, Z., Zhao, Z., Min, G., Huang, X., Ni, Q. & Wang, R., 08/2018, In: Future Generation Computer Systems. 85, p. 1-8 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    User modeling : through statistical analysis and an evolving classifier

    Iglesias, J., Angelov, P., Ledezma, A. & Sanchis, A., 07/2010, IEEE International Conference on Fuzzy Systems (FUZZ), 2010 . IEEE, p. 3226-3233 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    User perception and requirements for future IPTV services: case studies from Finland and UK

    Oksman, V., Tammela, A., Mitchell, K., Ishmael, J., Rouncefield, M. & Race, N., 2010, Proceedings of the 8th international interactive conference on Interactive TV & Video. New York, NY, USA: ACM, p. 1-4 4 p. (EuroITV '10).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    User Preferences-Adaptive Dynamic Network Selection Approach in Cooperating Wireless Networks: A Game Theoretic Perspective

    Pervaiz, H. & Ni, Q., 2012, Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. Liverpool: IEEE, p. 1609-1616 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Forthcoming

    User Scheduling in NOMA Random Access Using Contextual Multi-Armed Bandits

    Wang, W., Yu, W., Foh, C. H., Gao, D. & Ni, Q., 19/09/2022, (Accepted/In press) Proceedings of 2022 IEEE Globecom Workshops (GC Wkshps). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    User-level fairness delivered: network resource allocation for adaptive video streaming

    Mu, M., Farshad, A., Simpson, S., Ni, Q. & Race, N. J. P., 15/06/2015, 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS). IEEE, p. 85-94 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    User-Pair Selection in Multiuser Cooperative Networks With an Untrusted Relay

    He, B., Ni, Q., Chen, J., Yang, L. & Lv, L., 15/01/2019, In: IEEE Transactions on Vehicular Technology. 68, 1, p. 869-882 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  50. Published

    Using a keyness metric for single and multi document summarisation

    El-Haj, M. & Rayson, P., 08/2013, Proceedings of the MultiLing 2013 Workshop on Multilingual Multi-document summarization . Sofia, Bulgaria: Association for Computational Linguistics, p. 64-71 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Using a semantic annotation tool for the analysis of metaphor in discourse.

    Koller, V., Hardie, A., Rayson, P. & Semino, E., 2008, In: metaphorik.de. 15, p. 141-160 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    Using agent-based simulation to analyse the effect of broadcast and narrowcast on public perception: a case in social risk amplification

    Onggo, S., Busby, J. & Liu, Y., 12/2014, Proceedings of the 2014 Winter Simulation Conference. IEEE, p. 322-333 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Using Channel State Information for Tamper Detection in the Internet of Things

    Bagci, I. E., Roedig, U., Martinovic, I., Schulz, M. & Hollick, M., 5/12/2015, ACSAC 2015 Proceedings of the 31st Annual Computer Security Applications Conference. New York: ACM, p. 131-140 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    Using context switches for VM scaling

    Hadley, J., Roedig, U. & Elkhatib, Y., 9/12/2016. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  55. Published

    Using Design Fiction to Inform Shape-Changing Interface Design and Use

    Sturdee, M., Coulton, P. & Alexander, J. M., 6/09/2017, In: The Design Journal. 20, Suppl. 1, p. S4146-S4157 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    Using Evolving Fuzzy Models to predict Crude Oil Distillation Side Streams

    Macias-Hernandez, J. J., Angelov, P. & Zhou, X., 2011, Computer-Aided Design, Manufacturing, Modeling and Simulation . He, X., Hua, E., Lin, Y. & Liu, X. (eds.). Zurich: Trans-Tech Publications, p. 432-437 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. E-pub ahead of print

    Using J-K-fold Cross Validation to Reduce Variance When Tuning NLP Models

    Moss, H., Leslie, D. S. & Rayson, P. E., 06/2018, (E-pub ahead of print) Proceedings of COLING 2018. Association for Computational Linguistics (ACL Anthology), p. 2978–2989 12 p. (Proceedings of COLING 2018).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    Using machine learning to partition streaming programs

    Wang, Z. & O'Boyle, M., 09/2013, In: ACM Transactions on Architecture and Code Optimization. 10, 3, 25 p., 20.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    Using quantum confinement to uniquely identify devices

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Young, M., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 10/11/2015, In: Scientific Reports. 5, 8 p., 16456 .

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Using quantum effects in nanomaterials for unique identification

    Young, R. J., Roberts, J. & Speed, P., 5/01/2016, In: SPIE Newsroom. 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  61. Published

    Using software defined networking to enhance the delivery of video-on-demand

    Georgopoulos, P., Broadbent, M., Farshad, A., Plattner, B. & Race, N., 15/09/2015, In: Computer Communications. 69, p. 79-87 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    Using verifiable author data: Gender and spelling differences in Twitter and SMS

    Baron, A., Tagg, C., Rayson, P., Greenwood, P., Walkerdine, J. & Rashid, A., 06/2011. 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  63. Published

    Utilising motion capture technology to identify nonverbal indicators of trust judgements

    Watson, S., Conchie, S., Taylor, P. J. & Poppe, R., 23/08/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Speech

  64. Published

    Utilising motion capture technology to identify trusted testimony in military encounters

    Watson, S. J., Conchie, S. M., Taylor, P. J. & Poppe, R., 2/11/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  65. Published

    Validating the Sensor Network Calculus by Simulations

    Roedig, U., Gollan, N. & Schmitt, J., 10/2007, WICON '07 Proceedings of the 3rd international conference on Wireless internet. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Vol. 34. 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  66. Published

    Valley-free violation in Internet routing: analysis based on BGP Community data

    Giotsas, V. & Zhou, S., 2012, 2012 IEEE International Conference on Communications, ICC 2012. IEEE, p. 1193-1197 5 p. 6363987

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  67. Published

    VARD2: a tool for dealing with spelling variation in historical corpora

    Baron, A. & Rayson, P., 05/2008. 15 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  68. Published

    Variation in working memory due to normal development

    Towse, J. N. & Hitch, J. G., 2007, Variation in working memory. Conway, A., Jarrold, C., Kane, M., Miyake, A. & Towse, J. (eds.). New York: Oxford University Press, p. 109-133 25 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  69. Published

    Variation in working memory.

    Conway, A. R. A., Jarrold, C., Kane, M. J., Myake, A. & Towse, J. N., 2007, New York: Oxford University Press. 321 p.

    Research output: Book/Report/ProceedingsBook

  70. Published

    Vehicle plate recognition using improved neocognitron neural network

    Kangin, D., Kolev, G. & Angelov, P., 2013, Artificial Neural Networks and Machine Learning – ICANN 2013: 23rd International Conference on Artificial Neural Networks Sofia, Bulgaria, September 10-13, 2013. Proceedings. Mladenov, V., Koprinkova-Hristova, P., Palm, G., Villa, A. E. P., Appollini, B. & Kasabov, N. (eds.). Berlin: Springer Verlag, p. 628-640 13 p. (Lecture Notes in Computer Science; vol. 8131).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  71. Published

    Vehicle-Driver Communication using Off-The-Shelf Transceivers

    Ghamari, M., Chung, A., Roedig, U., Honary, B. & Pickering, C. A., 09/2010, IEEE 72nd Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 . IEEE, p. 1-2 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  72. Published

    Verbal lie detection

    Vrij, A., Taylor, P. J. & Picornell, I., 13/11/2015, Communication in investigative and legal contexts: integrated approaches from forensic psychology, linguistics and law enforcement. Oxburgh, G., Myklebust, T., Grant, T. & Milne, R. (eds.). Wiley, (Psychology of Crime, Policing and Law).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  73. Published

    Verification of Policies in Human Cyber-Physical Systems: the Role and Importance of Resilience

    Gouglidis, A. & Hutchison, D., 10/04/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  74. Published

    Verification of Resilience Policies that Assist Attribute Based Access Control

    Gouglidis, A., Hu, V. C., Busby, J. S. & Hutchison, D., 24/03/2017, ABAC '17 Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control. New York: ACM, p. 43-52 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    Verification of secure inter-operation properties in multi-domain RBAC systems

    Gouglidis, A., Mavridis, I. & Hu, V. C., 06/2013, Software Security and Reliability-Companion (SERE-C), 2013 IEEE 7th International Conference on . IEEE, p. 35-44 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    Video Clarity: High Speed Data Mining for Video

    Fisher, P., Alhabib, A., Giotsas, V. & Andreopoulos, I., 2015, IBC 2015. London: Institution of Engineering and Technology, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    Video Quality Assessment and Management in Content Distribution Networks

    Mu, M. & Mauthe, A., 2008. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  78. Published

    Visibility of individual packet loss on H.264 encoded video stream: a user study on the impact of packet loss on perceived video quality

    Mu, M., Gostner, R., Mauthe, A., Tyson, G. & Garcia, F., 2009, Multimedia Computing and Networking 2009. Rejaie, R. & Meyer-Patel, K. D. (eds.). Bellingham, Wash.: SPIE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  79. Published

    Visible spectrum quantum light sources based on InGaN/GaN quantum dots

    Tomic, S., Pal, J., Migliorato, M. A., Young, R. & Vukmirovic, N., 15/07/2015, In: ACS Photonics. 2, 7, p. 958-963 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  80. Published

    Vision based human activity recognition: a review

    Bux, A., Angelov, P. P. & Habib, Z., 7/09/2016, Advances in Computational Intelligence Systems: Contributions Presented at the 16th UK Workshop on Computational Intelligence, September 7–9, 2016, Lancaster, UK. Angelov, P., Gegov, A., Jayne, C. & Shen, Q. (eds.). Springer, p. 341-371 30 p. (Advances in Intelligent Systems and Computing; vol. 513).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  81. Published

    Vision social TV: towards personalised media experience and community atmosphere

    Mu, M., Trench-Jellicoe, J. & Race, N., 05/2014, ACM TVX2014. 2 p. D111

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Visualising corpus linguistics

    Rayson, P. & Mariani, J., 2009, CL2009 Proceedings of the Corpus Linguistics Conference. p. n/a

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    VMGuards: A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern

    Tang, Z., Li, M., Cao, S., Chen, M., Ye, G., Gong, X., Fang, D. & Wang, Z., 12/05/2018, In: Applied Sciences. 8, 5, 23 p., 771.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  84. Published

    Walls and other unremarkable boundaries in South London: impenetrable infrastructure or portals of time, space and cultural difference?

    Knott, K., 1/06/2015, In: New Diversities. 17, 2, p. 15-34 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. Published

    Was it Pod Worthy? A Preparatory Plan for Evaluating Podcasting in Higher Education

    Wingkvist, A. & Alexander, J., 2007, NZCSRSC '07: : New Zealand Computer Science Research Student Conference 2007. 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  86. Published

    Watch-wearing as a marker of conscientiousness

    Ellis, D. & Jenkins, R., 27/08/2015, In: Peerj. 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  87. Published

    Weak signals as predictors of real-world phenomena in social media

    Charitonidis, C., Rashid, A. & Taylor, P. J., 2015, ASONAM '15 Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. New York: ACM, p. 864-871 8 p. (ASONAM '15).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    Weekday affects attendance rate for medical appointments: large-scale data analysis and implications

    Ellis, D. & Jenkins, R., 13/12/2012, In: PLoS ONE. 7, 12, 4 p., e51365.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  89. Published

    Weighted tradeoff between effective capacity and energy efficiency

    Yu, W., Musavian, L. & Ni, Q., 30/06/2015, Communications (ICC), 2015 IEEE International Conference on. IEEE, p. 238-243 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  90. Published

    Weighted Tradeoff between Spectral Efficiency and Energy Efficiency in Energy Harvesting Systems

    Siddiqui, A. M., Musavian, L., Aissa, S. & Ni, Q., 21/11/2019, 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    What can we learn about immediate memory from the development of children's free recall?

    Jarrold, C., Hall, D., Harvey, C. E., Tam, H., Towse, J. N. & Zarandi, A. L., 2015, In: The Quarterly Journal of Experimental Psychology . 68, 9, p. 1871-1894 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  92. Published

    What is middleware made of? exploring abstractions, concepts, and class names in modern middleware

    Taiani, F., Rice, J. & Rayson, P., 2012, ARM '12 Proceedings of the 11th International Workshop on Adaptive and Reflective Middleware . New York: ACM, 6 p. 6

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    What's your back-up strategy?

    Ellis, D. A., 1/12/2010, In: PsyPAG Quarterly. 77, p. 25-26 2 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    When knowledge is not enough: the phenomenon of goal neglect in preschool children.

    Towse, J. N., Lewis, C. & Knowles, M., 04/2007, In: Journal of Experimental Child Psychology. 96, 4, p. 320-332 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published

    When wearable devices fail: Towards an improved understanding of what makes a successful wearable intervention

    Ellis, D. A. & Piwek, L., 2/10/2017.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  96. Published

    Which 'Lancaster' do you mean? Disambiguation challenges in extracting place names for Spatial Humanities

    Rayson, P., Baron, A. & Hardie, A., 09/2012.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  97. Published

    Who am I? Analysing Digital Personas in Cybercrime Investigations

    Rashid, A., Baron, A., Rayson, P., May-Chahal, C., Greenwood, P. & Walkerdine, J., 04/2013, In: Computer. 46, 4, p. 54-61 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    Who are you? Proving your identity with physics

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 14/12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  99. Published

    Who said what? Methodological issues in applying corpus-based methods to analyse online chat data

    Rayson, P., Greenwood, P., Rashid, A. & Walkerdine, J., 07/2009, CL2009 Proceedings of the Corpus Linguistics Conference.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  100. Published

    Who should I look at? eye contact during collective interviewing as a cue to deceit

    Jundi, S., Vrij, A., Mann, S., Hope, L., Hillmann, J., Warmelink, L. & Gahr, E., 2013, In: Psychology, Crime and Law. 19, 8, p. 661-671 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Back to top