Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2006
  2. Published

    Quantum dots as a source of entangled photon pairs

    Stevenson, M., Young, R., Atkinson, P., Cooper, K., Ritchie, D. A. & Shields, A. J., 2006.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  3. Published

    Quantum dots for single photon and photon pair technology

    Stevenson, R. M., Young, R., Thompson, R. M., Yuan, Z., Kardynal, B. E., Farrer, I., Ward, M. B., Ritchie, D. A. & Shields, A. J., 2006, Quantum Computing in Solid State Systems. Ruggiero, B., Delsing , P., Granata, C., Pashkin, Y. & Silvestrini, P. (eds.). New York: Springer, p. 288-297 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  4. Published

    Robust sensor fault reconstruction using right eigenstructure assignment

    Tan, C. P., Kuang, Y. C. & Edwards, C., 2006, DELTA '06: Proceedings of the Third IEEE International Workshop on Electronic Design, Test and Applications. Washington, DC, USA: IEEE Computer Society, p. 435-439 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Simulation of a THz vacuum triode using carbon-nanotube emitter

    Petrolati, E., Paoloni, C. & Di Carlo, A., 2006, 2006 IEEE INTERNATIONAL VACUUM ELECTRONICS CONFERENCE HELD JOINTLY WITH 2006 IEEE INTERNATIONAL VACUUM ELECTRON SOURCES. NEW YORK: IEEE, p. 197-198 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Status of 3.9 GHz defelecting mode (crab) cavity R&D.

    Goudket, P., Bellantoni, L., Edwards, H., Foley, M., Khabiboulline, T., Mitchell, D., Rowe, N., Solyak, N., Burt, G., Dexter, A., Koeth, T. & Adolphsen, C., 2006, Proceedings of the LINAC 2006 conference..

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  7. Published

    The acceptability of deontic health and safety rules: Evidence for the conditional expected utility hypothesis

    Ball, L. J., Alford, D., Iszatt-White, M., Kinder, K. E. & Busby, J. S., 2006, 23rd Annual British Psychological Society Cognitive Section Conference (Lancaster) - 2006. N/A: unknown

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    The coordinating role of organisational artefacts in distributed cognition - and how it fails in maritime operations

    Busby, J. S. & Hibberd, R. E., 2006, In: Le Travail Humain. 69, 1, p. 25-47 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. 2005
  10. Published

    Construction of partial unit memory encoders for application in capacity-approaching concatenated codes

    Fagoonee, L. & Honary, B., 12/2005, In: IEE Proceedings - Communications. 152, 5, p. 1108-1116 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    Construction of well-structured quasi-cyclic low-density parity check codes

    Honary, B., Moinian, A. & Ammar, B., 12/2005, In: IEE Proceedings - Communications. 152, 6, p. 1081-1086 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Migration to Capacity Approaching Codes for Digital Video Broadcasting

    Honary, S., Pandya, N., Markarian, G. & Honary, B., 12/2005, In: IEE Proceedings - Communications. 152, 6, p. 1103-1107 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    Recent Results on Construction of Structured LDPC codes

    Honary, B., 12/2005.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  14. Published

    Saturation throughput analysis of error-prone 802.11 wireless networks

    Ni, Q., Li, T. J., Turletti, T. & Xiao, Y., 12/2005, In: Wireless Communications and Mobile Computing. 5, 8, p. 945-956 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Unpublished

    Building Resilient Networks using Programmable Networking Technologies

    Xie, L., Smith, P., Sterbenz, J. & Hutchison, D., 11/2005, (Unpublished)

    Research output: Other contribution

  16. Published

    Improvements for the IPv6 Access Network Protection Protocols in Wireless Environments

    Katsaros, I. & Honary, B., 11/2005, 3G and Beyond, 2005 6th IEE International Conference on. London : IEEE, p. 97-100 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Location Determination and Tracking Using Radio Beacons

    Zarimpas, V., Honary, B., Lund, D., Tanriover, C. & Thanopoulos, N., 11/2005, 3G and Beyond, 2005 6th IEE International Conference on. London , UK: IEEE, p. 207–211 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Work Environments, Stress, and Productivity: An Examination Using ASSET.

    Donald, I., Taylor, P. J., Johnson, S., Cooper, C., Cartwright, S. & Robertson, S., 11/2005, In: International Journal of Stress Management. 12, 4, p. 409-423 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Nonrounded dielectric rectangular rods in helix traveling-wave tubes

    Paoloni, C., 20/10/2005, In: Microwave and Optical Technology Letters. 47, 2, p. 101-103 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Low Complexity Symbol Detection Method for Multilevel 2-D Optical Storage Based on a Linear Channel Model.

    Moinian, A., Fagoonee, L. & Honary, B., 18/10/2005, In: Optical Engineering. 44, 10

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Multimedia and Firewalls: A Performance Perspective.

    Roedig, U. & Schmitt, J., 17/10/2005, In: Multimedia Systems. 11, 1, p. 19-33 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Predictable and controllable wireless sensor networks

    Roedig, U. & Sreenan, C. J., 1/10/2005, Proceedings of the Information Technology & Telecommunications Conference (IT&T2005), Cork, Ireland.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    System-initiated context modification to improve network resource usage

    Roedig, U. & Sreenan, C. J., 1/10/2005, Proceedings of the Information Technology & Telecommunications Conference (IT&T2005), Cork, Ireland.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Geographic profiling - The debate continues: Ten problems with the Rossmo and Filer defence of computer profiling.

    Bennell, C., Snook, B. & Taylor, P. J., 10/2005, In: Blue Line Magazine. p. 34-36 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    On the use of partial unit memory codes for woven turbo codes with outer and inner warp

    Fagoonee, L., Shavgulidze , S. & Honary, B., 10/2005, In: IEE Proceedings - Communications. 152, 5, p. 593-597 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Unpublished

    Peer-to-Peer and GRID Computing

    Mauthe, A. & Heckmann, O., 10/2005, (Unpublished)

    Research output: Other contribution

  27. Published

    Stealth Distributed Hash Table: Unleashing the Real Potential of Peer-to-Peer

    Brampton, A., MacQuire, A., Rai, I., Race, N. J. P. & Mathy, L., 10/2005, p. 230 - 231 . 0 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

Back to top