Home > Research > Publications & Outputs
  1. Conference contribution/Paper
  2. Published

    TWEETHER project for W-band wireless networks

    Paoloni, C., Magne, F., Andre, F., Begaud, X., Da Silva, J., Krozer, V., Marilier, M., Ramirez, A., Vilar, R. & Zimmerman, R., 09/2016, 2016 IEEE 9th UK-Europe-China Workshop on Millimetre Waves and Terahertz Technologies (UCMMT). IEEE, p. 42-43 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Efficient interference mitigation in mmWave backhaul network for high data rate 5G wireless communications

    Shi, J., Ni, Q., Paoloni, C. & Magne, F., 09/2016, Proceedings of the 12th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2016). London: IET Press, p. 382-387 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Model development and energy management control for hybrid electric race vehicles

    Reeves, K., Montazeri, A. & Taylor, C. J., 31/08/2016, 2016 UKACC 11th International Conference on Control (CONTROL). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Traffic event detection from road surveillance videos based on fuzzy logic

    Mehboob, F., Abbas, M. & Jiang, R., 29/08/2016, Proceedings of 2016 SAI Computing Conference, SAI 2016. Institute of Electrical and Electronics Engineers Inc., p. 188-194 7 p. 7555981. (Proceedings of 2016 SAI Computing Conference, SAI 2016).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    A Sequence-based selection hyper-heuristic: A case study in nurse rostering

    Kheiri, A., Özcan, E., Lewis, R. & Thompson, J., 26/08/2016, PATAT 2016 - Proceedings of the 11th International Conference on the Practice and Theory of Automated Timetabling. Burke, E. K., Di Gaspero, L., Ozcan, E., McCollum, B. & Schaerf, A. (eds.). PATAT, p. 503-505 3 p. 45. (PATAT 2016 - Proceedings of the 11th International Conference on the Practice and Theory of Automated Timetabling).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Practical Formal Verification for Model Based Development of Cyber-Physical Systems

    Ishigooka, T., Saissi, H., Piper, T., Winter, S. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Reliable Memory Efficient Name Forwarding in Named Data Networking

    Saxena, D., Raychoudhury, V., Becker, C. & Suri, N., 24/08/2016, 2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, p. 48-55 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    SENTRY: A novel approach for mitigating application layer DDoS threats

    Zhang, H., Taha, A., Trapero, R., Luna, J. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 465-472 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Trust validation of cloud IaaS: A customer-centric approach

    Manzoor, S., Taha, A. & Suri, N., 23/08/2016, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 97-104 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Exploiting dynamic scheduling for VM-based code obfuscation

    Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X., Xing, T., Ye, G., Zhang, J. & Wang, Z., 23/08/2016, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE, p. 489-496 8 p. (2016 IEEE Trustcom/BigDataSE/I​SPA).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top