Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    CoPace: Edge Computation Offloading and Caching for Self-Driving with Deep Reinforcement Learning

    Tian, H., Xu, X., Qi, L., Zhang, X., Dou, W., Yu, S. & Ni, Q., 31/12/2021, In: IEEE Transactions on Vehicular Technology. 70, 12, p. 13281-13293 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published
    No renderer
  3. Published

    A multi-disciplinary perspective on emergent and future innovations in peer review

    Tennant, J. P., Dugan, J. M., Graziotin, D., Jacques, D. C., Waldner, F., Mietchen, D., Elkhatib, Y., B. Collister, L., Pikas, C. K., Crick, T., Masuzzo, P., Caravaggi, A., Berg, D. R., Niemeyer, K. E., Ross-Hellauer, T., Mannheimer, S., Rigling, L., Katz, D. S., Greshake Tzovaras, B. & Pacheco-Mendoza, J. & 13 others, Fatima, N., Poblet, M., Isaakidis, M., Irawan, D. E., Renaut, S., Madan, C. R., Matthias, L., Nørgaard Kjær, J., O'Donnell, D. P., Neylon, C., Kearns, S., Selvaraju, M. & Colomb, J., 20/07/2017, In: F1000Research. 6, 53 p., 1151.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Published

    Proximity coefficients as a measure of interrelationships in sequences of behavior.

    Taylor, P. J., 02/2006, In: Behavior Research Methods. 38, 1, p. 42-50 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Foundations and Evidence for an Interaction-based Approach to Conflict Negotiation.

    Taylor, P. J. & Donald, I. J., 2003, In: International Journal of Conflict Management. 14, 3/4, p. 213-232 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    A partial order scalogram analysis of communication behavior in crisis negotiation with the prediction of outcome.

    Taylor, P. J., 2002, In: International Journal of Conflict Management. 13, 1, p. 4-37 34 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Linguistic style matching and negotiation outcome.

    Taylor, P. J. & Thomas, S., 08/2008, In: Negotiation and Conflict Management Research. 1, 3, p. 263-281 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Testing the relationship between local cue-response patterns and global dimensions of communication behavior.

    Taylor, P. J. & Donald, I. J., 1/01/2007, In: British Journal of Social Psychology. 46, 2, p. 273-298 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    On the complexity and accuracy of geographic profiling strategies

    Taylor, P. J., Bennell, C., Snook, B. & Zito, M., 1/01/2005, In: Journal of Quantitative Criminology. 21, 1, p. 1-26 26 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. Published

    A cylindrical model of communication behaviour in crisis negotiations.

    Taylor, P. J., 1/01/2002, In: Human Communication Research. 28, 1, p. 7-48 42 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Jaccard’s heel: are radex models of criminal behaviour falsifiable when derived using Jaccard coefficient?

    Taylor, P., Donald, I. J., Jacques, K. & Conchie, S., 02/2012, In: Legal and Criminological Psychology. 17, 1, p. 41-58 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    The Bounds of Cognitive Heuristic Performance on the Geographic Profiling Task

    Taylor, P. J., Bennell, C. & Snook, B., 04/2009, In: Applied Cognitive Psychology. 23, 3, p. 410-430 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Analysing forensic processes: taking time into account

    Taylor, P., Jacques, K., Giebels, E., Levine, M. & Gendreau, P., 2008, In: Issues in Forensic Psychology. 8, p. 45-57 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    The structure of communication behavior in simulated and actual crisis negotiations

    Taylor, P. J. & Donald, I., 10/2004, In: Human Communication Research. 30, 4, p. 443-478 36 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Hostage negotiation opens up

    Taylor, P. & Donohue, W. A., 2006, The negotiator's fieldbook: the desk reference for the experienced negotiator. Schneider, A. & Honeymoon, C. (eds.). Chicago: American Bar Association, p. 667-674 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  16. Published

    Problems of classification in investigative psychology

    Taylor, P., Bennell, C. & Snook, B., 2002, Classification, clustering, and data analysis: Recent advances and applications. Jajuga, K., Sokolowski, A. & Bock, H.-H. (eds.). Heidelberg: Springer Verlag, p. 479-487 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  17. Published

    Probing Communities: Study of a Village Photo Display

    Taylor, N., Cheverst, K., Fitton, D., Race, N. J. P., Rouncefield, M., Graham, C. & EPSRC (Funder), 11/2007, OZCHI '07 Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces. p. 17-24 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Editorial

    Taylor, P. J., 09/2012, In: Legal and Criminological Psychology. 17, 2, p. 195-195 1 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  19. Published

    The role of language in conflict and conflict resolution

    Taylor, P. J., 2014, The Oxford handbook of language and social psychology. Holtgraves, T. (ed.). Oxford: Oxford University Press, p. 459-470 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  20. Published

    Cross-cultural deception detection

    Taylor, P., Larner, S., Conchie, S. & Van der Zee, S., 2014, Deception detection: current challenges and cognitive approaches. Granhag, P. A., Vrij, A. & Verschuere, B. (eds.). Chichester: Wiley Blackwell, p. 175-202 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  21. Published

    Detecting insider threats to organizations through language change

    Taylor, P., Dando, C., Ormerod, T., Ball, L., Jenkins, M., Sandham, A. & Menacere, T., 08/2013, In: Law and Human Behavior. 37, 4, p. 267-275 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    How technology is revolutionising our understanding of human cooperation

    Taylor, P. J., 2013, Twente: Twente University Press.

    Research output: Book/Report/ProceedingsBook

  23. Published

    Investigative psychology

    Taylor, P. J., Bennell, C., Snook, B. & Porter, L., 12/2014, APA handbook of forensic psychology. Cutler, B. & Zapf, P. (eds.). Washington, DC: American Psychological Association, Vol. 2.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  24. Published

    Lessons from the extreme: what business negotiators can learn from hostage negotiations

    Taylor, P. J. & Donohue, W. A., 15/03/2017, The negotiator's desk reference. Honeymoon, C. & Schneider, A. (eds.). DRI Press, ( Negotiator's Desk Reference).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  25. Published

    A same kind of different: affordances, terrorism and the internet

    Taylor, P. J., Holbrook, D. & Joinson, A., 02/2017, In: Criminology and Public Policy. 16, 1, p. 127-133 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Culture moderates changes in linguistic self-presentation and detail provision when deceiving others

    Taylor, P. J., Larner, S., Conchie, S. M. & Menacere, T., 7/06/2017, In: Royal Society Open Science. 4, 11 p., 170128.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  27. Published

    Optimal data compression and forwarding in wireless sensor networks

    Tavli, B., Bagci, I. E. & Ceylan, O., 05/2010, In: IEEE Communications Letters. 14, 5, p. 408-410 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Data processing and communication strategies for lifetime optimization in wireless sensor networks

    Tavli, B., Kayaalp, M., Bagci, I. E. & Ceylan, O., 10/2010, In: AEÜ - International Journal of Electronics and Communications. 64, 10, p. 992-998 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Novel link adaptation for TETRA cellular systems

    Tarchi, D., Fantacci, R., Tanriover, C. & Honary, B., 04/2009, In: International Journal of Communication Systems. 22, 4, p. 483-501 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. Published

    Improving Turbo Code Error Performance by Multifold Coding.

    Tanriover, C., Honary, B., Xu, J. & Lin, S., 05/2002, In: IEEE Communications Letters. 6, 5, p. 196-198 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Unequal Two-fold Turbo Codes and Digital Image Transmission

    Tanriover, C. C. & Honary, B., 12/2003, 7th International Symposium on Digital Signal Processing and Communication Systems .

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Image transmission using unequal error protection combined with two-fold turbo coding

    Tanriover, C. C. & Honary, B., 10/2003, Mobile Future and Symposium on Trends in Communications, 2003. SympoTIC '03. Joint First Workshop on . IEEE, p. i-v 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Crossover codeword algorithm for iteration control

    Tanriover, C. C. & Honary, B., 09/2002, Vehicular Technology Conference, 2002. Proceedings. VTC 2002-Fall. 2002 IEEE 56th. Vancouver, Canada: IEEE, Vol. 3. p. 1662-1665 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Multifold turbo codes

    Tanriover, C. C., Xu, J., Lin, S. & Honary, B., 06/2001, Information Theory, 2001. Proceedings. 2001 IEEE International Symposium on. Washington D.C., USA: IEEE, p. 145

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    An offloading method using decentralized P2P-enabled mobile edge servers in edge computing

    Tang, W., Zhao, X., Rafique, W., Qi, L., Dou, W. & Ni, Q., 1/03/2019, In: Journal of Systems Architecture. 94, p. 1-13 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Progress in development of a 346GHz BWO

    Tang, Y., Ma, S., Pan, P., Feng, J., Waring, R., Letizia, R., Paoloni, C., Popovic, B., Zheng, Y., Himes, L., Gamzina, D. & Luhmann, N. C., 9/03/2017, Proceedings of IEEE 9th UK-Europe-China Workshop on Millimetre Waves and Terahertz Technologies, UCMMT 2016. Yu, J. & Chen, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 254-256 3 p. 7874029. (Proceedings of IEEE 9th UK-Europe-China Workshop on Millimetre Waves and Terahertz Technologies, UCMMT 2016).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Robust sensor fault reconstruction using right eigenstructure assignment

    Tan, C. P., Kuang, Y. C. & Edwards, C., 2006, DELTA '06: Proceedings of the Third IEEE International Workshop on Electronic Design, Test and Applications. Washington, DC, USA: IEEE Computer Society, p. 435-439 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking

    Tan, F., Wang, Y., Wang, Q., Bu, L. & Suri, N., 1/10/2015, In: IEEE Transactions on Parallel and Distributed Systems. 26, 10, p. 2630-2642 13 p., 6898840.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  39. Published

    Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach

    Tan, F., Wang, Y., Wang, Q., Bu, L., Zheng, R. & Suri, N., 24/06/2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    WiP abstract: A framework on profiling cross-domain noise propagation in control CPS

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 14/04/2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS). IEEE, p. 224 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS.

    Tan, F., Liu, L., Winter, S., Wang, Q., Suri, N., Bu, L., Peng, Y., Liu, X. & Peng, X., 1/01/2019, In: TCPS. 3, 1, 25 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    Exploring the relationship between dimensionality reduction and private data release

    Tai, B.-C., Li, S.-C., Huang, Y., Suri, N. & Wang, P.-C., 4/12/2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, p. 25-33 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    An empirical characterization of touch-gesture input force on mobile devices

    Taher, F., Alexander, J., Hardy, J. & Velloso, E., 11/2014, ITS '14 Proceedings of the Ninth ACM International Conference on Interactive Tabletops and Surfaces. New York: ACM, p. 195-204 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Exploring interactions with physically dynamic bar charts

    Taher, F., Hardy, J., Karnik, A., Weichel, C., Jansen, Y., Hornbaek, K. & Alexander, J., 18/04/2015, CHI '15 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: ACM, p. 3237-3246 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    A Characterization of Actuation Techniques for Generating Movement in Shape-Changing Interfaces

    Taher, F., Vidler, J. & Alexander, J., 05/2017, In: International Journal of Human-Computer Interaction. 33, 5, p. 385-398 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  46. Published

    Investigating the use of a dynamic physical bar chart for data exploration and presentation

    Taher, F., Jansen, Y., Woodruff, J., Hardy, J., Hornbaek, K. & Alexander, J., 01/2017, In: IEEE Transactions on Visualization and Computer Graphics. 23, 1, p. 451-460 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    AHP-based quantitative approach for assessing and comparing cloud security

    Taha, A., Trapero, R., Luna, J. & Suri, N., 24/09/2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 284-291 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Identifying and utilizing dependencies across cloud security services

    Taha, A., Metzler, P., Trapero, R., Luna, J. & Suri, N., 30/05/2016, ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, p. 329-340 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (Editor) & U., B. (Editor), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    SLA-Based Service Selection for Multi-Cloud Environments

    Taha, A., Manzoor, S., Suri, N., A.M., G. (Editor) & M., L. (Editor), 25/06/2017, 2017 IEEE International Conference on Edge Computing (EDGE). IEEE, p. 65-72 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure

    Taha, A., Zakaria, A., Kim, D. & Suri, N., 19/05/2020, 2020 IEEE International Conference on Cloud Engineering (IC2E). IEEE, p. 134-143 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. Published

    "I didn't spel that wrong did i. Oops": Analysis and standardisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 27/05/2010. 23 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  53. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2012, In: Lingvisticæ Investigationes. 35, 2, p. 367-388 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    "i didn't spel that wrong did i. Oops": Analysis and normalisation of SMS spelling variation

    Tagg, C., Baron, A. & Rayson, P., 2014, SMS communication: a linguistic approach. Cougnon, L.-A. & Fairon, C. (eds.). John Benjamins Publishing Company, p. 217-237 21 p. (Benjamins Current Topics; vol. 61).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  55. Published

    MAP-based modeling and design of wireless sensor networks with OMNeT++

    Szczytowski, P., Khelil, A. & Suri, N., 13/07/2009, 2009 International Symposium on Performance Evaluation of Computer & Telecommunication Systems. IEEE, p. 162-169 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  56. Published

    ASample: Adaptive spatial sampling in Wireless Sensor Networks

    Szczytowski, P., Khelil, A. & Suri, N., 7/06/2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, p. 35-42 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  57. Published

    LEHP: Localized energy hole profiling in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 22/06/2010, The IEEE symposium on Computers and Communications. IEEE, p. 100-106 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    TOM: Topology oriented maintenance in sparse Wireless Sensor Networks

    Szczytowski, P., Khelil, A., Ali, A. & Suri, N., 27/06/2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, p. 548-556 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  59. Published

    DKM: Distributed k-connectivity maintenance in wireless sensor networks

    Szczytowski, P., Khelil, A. & Suri, N., 9/01/2012, 2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS). IEEE, p. 83-90 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  60. Published

    MAP++: support for map-based WSN modeling and design with OMNeT++.

    Szczytowski, P., Khelil, A. & Suri, N., 2009, 2nd International ICST Workshop on OMNeT++. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  61. Published

    Big Data and Natural Language Processing for Analysing Railway Safety

    Syeda, K. N., Shirazi, S. N. U. H., Naqvi, S. A. A., Parkinson, H. J. & Bamford, G., 11/2017, Innovative Applications of Big Data in the Railway Industry. Kohli, D. S., Kumar, D. A. V. S., Easton, D. J. M. & Roberts, P. C. (eds.). IGI Global Publishing, p. 240-267 28 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  62. Published

    OSA: one-class recursive SVM algorithm with negative samples for fault detection

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 2013, Artificial neural networks and machine learning – ICANN 2013: 23rd International Conference on Artificial Neural Networks Sofia, Bulgaria, September 10-13, 2013. Proceedings. Mladenov, V., Koprinkova-Hristova, P., Palm, G., Villa, A. E. P., Appollini, B. & Kasabov, N. (eds.). Berlin: Springer Verlag, p. 194-207 14 p. (Lecture Notes in Computer Science; vol. 8131).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  63. Published

    Incremental anomaly identification by adapted SVM method

    Suvorov, M., Ivliev, S., Markarian, G., Kolev, D., Zvikhachevskiy, D. & Angelov, P., 08/2013, International Joint Conference on Neural Networks, IJCNN-2013, Dallas, TX, USA, 3-9 August, 2013. Piscataway, N.J.: IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  64. Published

    A MAC Protocol for Industrial Process Automation and Control

    Suriyachai, P., Brown, J. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  65. Published

    Implementation of a Deterministic Wireless Sensor Network

    Suriyachai, P., Roedig, U. & Scott, A., 01/2008.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  66. Published

    A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks

    Suriyachai, P., Roedig, U. & Scott, A., 2012, In: Communications Surveys and Tutorials, IEEE Communications Society. 14, 2, p. 1-25 25 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  67. Published

    Implementation of a MAC protocol for QoS support in wireless sensor networks

    Suriyachai, P., Roedig, U. & Scott, A., 9/03/2009, IEEE International Conference on Pervasive Computing and Communications, 2009. PerCom 2009.. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  68. Published

    Time-Critical Data Delivery in Wireless Sensor Networks

    Suriyachai, P., Brown, J. & Roedig, U., 06/2010, Proceedings of the 6th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2010). Rajaraman , R., Moscibroda , T., Dunkels, A. & Scaglione, A. (eds.). Berlin: Springer, p. 216-229 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  69. Published

    Dimensioning of Time-Critical WSNs -- Theory, Implementation and Evaluation

    Suriyachai, P., Roedig, U., Scott, A., Gollan, N. & Schmitt, J., 08/2011, In: International Journal of Mobile Communications. 6, 5, p. 360-369 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  70. Published

    A pre-injection analysis for identifying fault-injection tests for protocol validation

    Suri, N. & Sinha, P., 2010, In: Journal of Software. 5, 10, p. 1144-1161 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    A software integration approach for designing and assessing dependable embedded systems

    Suri, N., Jhumka, A., Hiller, M., Pataricza, A., Islam, S. & Sârbu, C., 1/10/2010, In: Journal of Systems and Software. 83, 10, p. 1780-1800 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    Design of an optimal Bayesian incentive compatible broadcast protocol for ad hoc networks with rational nodes

    Suri, N. & Narahari, Y., 2008, In: IEEE Journal on Selected Areas in Communications. 26, 7, p. 1138-1148 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  73. Published

    On dependability driven software and hardware integration

    Suri, N., 12/05/2004, Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings.. IEEE, p. 45-49 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  74. Published

    Panel statement: Why progress in (composite) fault tolerant real-time systems has been slow (-er than expected... & what can we do about it?)

    Suri, N., 18/10/2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004.. IEEE, p. 112-113 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  75. Published

    The need for a generalized compositional framework

    Suri, N., 3/03/2004, 10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004. Proceedings.. IEEE, p. 340 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  76. Published

    Message from the program chair

    Suri, N., 2005, Ninth IEEE International Symposium on High-Assurance Systems Engineering (HASE'05). IEEE, 1 p. (Proc. IEEE Int. Symp. High Assur. Syst. Eng.).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  77. Published

    An auction algorithm for procuring wireless channel in a heterogenous wireless network

    Suri, N. & Narahari, Y., 11/04/2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks. IEEE, 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    An efficient pricing based protocol for broadcasting in wireless ad hoc networks

    Suri, N., Narahari, Y. & Manjunath, D., 8/01/2006, 2006 1st International Conference on Communication Systems Software & Middleware. IEEE, 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  79. Published

    Broadcast in ad hoc wireless networks with selfish nodes: A Bayesian incentive compatibility approach

    Suri, N. & Narahari, Y., 7/01/2007, 2007 2nd International Conference on Communication Systems Software and Middleware. IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  80. Published

    Message from the DCCS program chair

    Suri, N., 24/06/2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). IEEE, p. ii 1 p. (Proc. Int. Conf. Dependable Syst. Networks).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  81. Published

    Design of a parallel interconnect based on communication pattern considerations.

    Suri, N. & Mendelson, A., 2001, In: Parallel Algorithms Appl.. 16, 4, p. 243-271 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  82. Published

    Dependable Embedded Systems Special Day Panel: Issues and Challenges in Dependable Embedded Systems.

    Suri, N., Fetzer, C., Abraham, J. A., Poledna, S., Mendelson, A. & Mitra, S., 2008, 2008 Design, Automation and Test in Europe. IEEE, 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published
  84. Published

    Gyro: A Modular Scale-Out Layer for Single-Server DBMSs

    Suri, N., 30/03/2020, 2019 38th Symposium on Reliable Distributed Systems (SRDS). Lyon, France, Vol. 2019. p. 71-82 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  85. Published

    Distributed Systems Security

    Suri, N., 1/10/2019, CyBOK Knowledge Base. Lupu, E. (ed.). Bristol: University of Bristol, p. 38

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  86. Published

    Collaborative IT Outsourcing in the Public Sector: A Case Analysis of Standard Business Reporting in Australia

    Sun, R., Gregor, S. & Keating, B., 10/12/2014, Proceedings of the 25th Australasian Conference on Information Systems. p. 1-11 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  87. Published

    Information Technology Platforms: Conceptualisation and a Review of Emerging Research in IS Research

    Sun, R., Gregor, S. & Keating, B., 2015, Proceedings of the 26th Australasian Conference on Information Systems. p. 1-17 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  88. Published

    Demystifying the Paradox of Stability and Flexibility in Information Systems Design: An Affordance Perspective

    Sun, R. & Zhang, M., 12/12/2018, Proceedings of the 38th International Conference on Information Systems. p. 1-15 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    Generativity and the Paradox of Stability and Flexibility in a Platform Architecture: A Case of the Oracle Cloud Platform

    Sun, R., Gregor, S. & Fielt, E., 31/12/2021, In: Information and Management. 58, 8, 21 p., 103548.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  90. Published

    Impact of content ideology on social media opinion polarization: The moderating role of functional affordances and symbolic expressions

    Sun, R., Zhu, H. & Guo, F., 31/01/2023, In: Decision Support Systems. 164, 13 p., 113845.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  91. Published

    An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 2012, Advanced Agent Technology. Dechesne, F., Hattori, H., ter Mors, A., Such, J. M., Weyns, D. & Dignum, F. (eds.). Berlin: Springer Verlag, p. 411-425 15 p. (Lecture Notes in Computer Science; vol. 7068).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    Self-disclosure decision making based on intimacy and privacy

    Such, J. M., Espinosa, A., Garcia-Fornes, A. & Sierra, C., 30/11/2012, In: Information Sciences. 211, p. 93-111 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  93. Published

    Enhancing privacy in Multi-agent Systems

    Such, J. M., 2012, In: AI Communications. 25, 4, p. 377-379 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    A Secure Group-Oriented Framework for Intelligent Virtual Environments

    Such, J. M., Alberola, J. M., Barella, A. & Garcia-Fornes, A., 2011, In: Computing and Informatics. 30, 6, p. 1225-1246 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  95. Published

    A group-oriented secure multiagent platform

    Such, J. M., Alberola, J. M., Espinosa, A. & Garcia-Fornes, A., 10/2011, In: Software: Practice and Experience. 41, 11, p. 1289-1302 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  96. Published

    Partial identities as a foundation for trust and reputation

    Such, J. M., Espinosa, A., Garcia-Fornes, A. & Botti, V., 10/2011, In: Engineering Applications of Artificial Intelligence. 24, 7, p. 1128-1136 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  97. Published

    Magentix2: a privacy-enhancing agent platform

    Such, J. M., Garcia-Fornes, A., Espinosa, A. & Bellver, J., 01/2013, In: Engineering Applications of Artificial Intelligence. 26, 1, p. 96-109 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  98. Published

    A survey of privacy in multi-agent systems

    Such, J. M., Espinosa, A. & Garcia-Fornes, A., 06/2014, In: Knowledge Engineering Review. 29, 3, p. 314-344 31 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  99. Published

    Attacks and Vulnerabilities of Trust and Reputation Models

    Such, J. M., 2013, Agreement Technologies. Ossowski, S. (ed.). Dordrecht: Springer Verlag, p. 467-477 11 p. (Law, Governance and Technology Series; vol. 8).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  100. Published

    Automated buyer profiling control based on human privacy attitudes

    Such, J. M., Garcia-Fornes, A. & Botti, V., 11/2013, In: Electronic Commerce Research and Applications. 12, 6, p. 386-396 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1 2 3 4 5 6 7 8 ...26 Next

Back to top