Home > Research Search

Search for research

  1. Published

    EHBT: An efficient protocol for group key management.

    Mathy, L. & Hutchison, D., 11/2001, Lecture Notes in Computer Science: Networked Group Communication. Springer Berlin / Heidelberg, p. 159-171

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    Charging in Peer-to-Peer Systems based on a Token Accounting System

    Mauthe, A., Liebau, N., Heckmann, O., Kovacevic, A. & Steinmetz, R., 06/2006, Lecture Notes in Computer Science: Performability Has its Price. Springer Berlin / Heidelberg

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    A Peer-to-Peer Content Distribution Network

    Mauthe, A., Heckmann, O., Liebau, N., Darlagiannis, V. & Bock, A., 01/2005, Lecture Notes in Computer Science: From Integrated Publication and Information Systems to Information and Knowledge Environments.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Unpublished

    SAND: A Scalable, Distributed and Dynamic Active Network Directory Service

    Sifalakis, M., Mauthe, A. & Hutchison, D., 2009, (Unpublished) Lecture Notes in Computer Science: Active and Programmable Networks. Springer Berlin / Heidelberg

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Caching Indices for Efficient Lookup in Structured Overlay Networks

    Mauthe, A., Darlagiannis, V., Liebau, N., Heckmann, O. & Steinmetz, R., 07/2005, Lecture Notes in Computer Science: Agents and Peer-to-Peer Computing. p. 81-93

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Determining Risks from Advanced Multi-step Attacks to Critical Information Infrastructures.

    Ma, Z. & Smith, P., 2013, Critical Information Infrastructures Security. CRITIS 2013.: Lecture Notes in Computer Science. Springer, Vol. 8328. p. 142-154 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Data.dcs: from legacy to linked data

    Rowe, M., 2010. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  8. Published

    Summary of the Workshop Models@run.time at MoDELS 2006

    Bencomo, N., Blair, G. S. & France, R., 2006, Lecture Notes in Computer Science, Satellite Events at the MoDELS 2006 Conference. Springer-Verlag, p. 226-230 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. Published

    Regularized sparse kernel slow feature analysis

    Böhmer, W., Grunewalder, S., Nickisch, H. & Obermayer, K., 2011, Machine Learning and Knowledge Discovery in Databases. ECML PKDD 2011. Gunopulos, D., Hoffmann, T., Malerba, D. & Vazirgiannis, M. (eds.). Berlin: Springer, p. 235-248 14 p. (Lecture Notes in Computer Science; vol. 6911).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Assert use and defectiveness in industrial code

    Counsell, S., Hall, T., Shippey, T., Bowes, D., Tahir, A. & MacDonell, S., 14/11/2017, Proceedings - 2017 IEEE 28th International Symposium on Software Reliability Engineering Workshops, ISSREW 2017. Institute of Electrical and Electronics Engineers Inc., p. 20-23 4 p. 8109241

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review