Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Chapter
  2. Published

    Brief Announcement: Efficient Model Checking of Fault-Tolerant Distributed Protocols Using Symmetry Reduction

    Bokor, P., Serafini, M., Suri, N. & Veith, H., 2009, Distributed Computing: 23rd International Symposium, DISC 2009, Elche, Spain, September 23-25, 2009. Proceedings. Springer, p. 289-290 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  3. Published

    Wireless Mesh Networks: Middleware for Network Eccentric and Mobile Applications

    Ishmael, J. & Race, N., 2009, Middleware for Network Eccentric and Mobile Applications. Garbinato, B., Miranda, H. & Rodrigues, L. (eds.). Springer Berlin Heidelberg, p. 149-166 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  4. Published

    A retrospective comparative study of three data modelling techniques in anticoagulation therapy.

    McDonald, S., Angelov, P. & Xydeas, C., 28/05/2008, BMEI 2008. International Conference on BioMedical Engineering and Informatics, 2008.. Sanya, China: IEEE, p. 219-225 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    Using NEMO to Extend the Functionality of MANETs.

    McCarthy, B., Edwards, C. & Dunmore, M., 05/2008, IEEE International Conference on Communications Workshops, 2008. ICC Workshops '08.. IEEE, p. 455-460 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  6. Published

    Travelling through time with corpus annotation software

    Rayson, P., Archer, D., Baron, A. & Smith, N., 2008, Corpus linguistics, computer tools, and applications - state of the art. Lewandowska-Tomaszczyk, B. (ed.). Frankfurt am Main: Peter Lang, Vol. 17. p. 29-46 18 p. (Studies In Language).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    Protocols to efficiently support nested NEMO (NEMO+).

    McCarthy, B., Jakeman, M., Edwards, C. & Thubert, P., 2008, Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture. New York: ACM, p. 43-48 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  8. Published

    Robustness Evaluation of Operating Systems

    Johansson, A. & Suri, N., 2008, Information Assurance: The Morgan Kaufmann Series in Networking. Elsevier Inc., p. 349-375 27 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    Delay-aware mobile transactions

    Ayari, B., Khelil, A. & Suri, N., 2008, Software Technologies for Embedded and Ubiquitous Systems: 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedings. Springer, Vol. 5287 LNCS. p. 280-291 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  10. Published

    Execution path profiling for OS device drivers: Viability and methodology

    Sârbu, C., Johansson, A. & Suri, N., 2008, Service Availability: 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedings. Vol. 5017 LNCS. p. 90-109 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  11. Published

    On the time-complexity of robust and amnesic storage

    Dobre, D., Majuntke, M. & Suri, N., 2008, Principles of Distributed Systems: 12th International Conference, OPODIS 2008, Luxor, Egypt, December 15-18, 2008. Proceedings. Springer, Vol. 5401 LNCS. p. 197-216 20 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Previous 1...5 6 7 8 9 10 11 12 ...255 Next

Back to top