Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. 2014
  2. Published

    Exploitation of GPUs for the parallelisation of probably parallel legacy code

    Wang, Z., Powell, D., Franke, B. & O'Boyle, M., 2014, Compiler construction: 23rd International Conference, CC 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014. Proceedings. Cohen, A. (ed.). Berlin: Springer Verlag, p. 154-173 20 p. (Lecture Notes in Computer Science ; vol. 8409).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    How do selective attentional processes contribute to maintenance and recall in children’s working memory capacity?

    Roome, H. E., Towse, J. & Jarrold, C., 2014, In: Frontiers in Human Neuroscience. 8, 1011.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Improving the Accuracy of the Internet Cartography

    Giotsas, V., 2014

    Research output: ThesisDoctoral Thesis

  5. Published

    Integrating profile-driven parallelism detection and machine-learning based mapping

    Wang, Z., Tournavitis, G., Franke, B. & O'Boyle, M., 2014, In: ACM Transactions on Architecture and Code Optimization. 11, 1, 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Language independent evaluation of translation style and consistency: comparing human and machine translations of Camus’ novel “The Stranger”

    El-Haj, M., Rayson, P. & Hall, D., 2014, Text, speech and dialogue: 17th International Conference, TSD 2014, Brno, Czech Republic, September 8-12, 2014. Proceedings. Sojka, P., Horák, A., Kopecek, I. & Pala, K. (eds.). Springer International Publishing, p. 116-124 9 p. (Lecture Notes in Computer Science; vol. 8655).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Management patterns for network resilience: design and verification of policy configurations

    Schaeffer-Filho, A., Smith, P., Mauthe, A. & Hutchison, D., 2014, Cyberpatterns: unifying design patterns with security and attack patterns. Switzerland: Springer International Publishing, Vol. 3. p. 85-95 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Metaphor, popular science and semantic tagging: distant reading with the Historical Thesaurus of English

    Alexander, M., Anderson, J., Dallachy, F., Kay, C., Piao, S. & Rayson, P., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  9. Published

    Metaphor, popular science, and semantic tagging: distant reading with the historical thesaurus of English

    Alexander, M., Anderson, J., Baron, A., Dallachy, F., Kay, C., Piao, S. & Rayson, P., 2014, Digital Humanities 2014 Conference Abstracts.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    OpenCL task partitioning in the presence of GPU contention

    Grewe, D., Wang, Z. & O'Boyle, M., 2014, Languages and compilers for parallel computing: 26th International Workshop, LCPC 2013, San Jose, CA, USA, September 25--27, 2013. Revised Selected Papers. Cașcaval, C. & Montesinos , P. (eds.). Springer, p. 87-101 15 p. (Lecture Notes in Computer Science; vol. 8664).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Quantum information system

    Stevenson, R. (Inventor), Bennett, A. (Inventor), Young, R. (Inventor) & Shields, A. J. (Inventor), 2014, Patent No. 8670672, Priority date 11/03/2014, Priority No. 12/834,926

    Research output: Patent

Back to top