University of Hertfordshire

Publications

  1. Introduction: Information Security in Fiction and in Fact: (transcript of discussion)

    Christianson, B., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, (Berlin-Heidelberg), Vol. 9379. p. VII-VIII 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9379).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Intrusion Detection System using Bayesian Network Modeling

    Alocious, C., Abouzakhar, N., Xiao, H. & Christianson, B., Jul 2014, 13th European Conference on Information Warfare and Security ECCWS 2014. ACPI (Academic Conference Publishing International), p. 223-232

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Investigating Mobile Broadband Affordability in Developing Countries: A Cross-National Comparison

    Choudrie, J., Yates, D. & Gulati, J., 15 May 2015, ICTD '15 Proceedings of the Seventh International Conference on Information and Communication Technologies and Development. Singapore, 4 p. 33

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Investigation of alpha-nuclear potential families from elastic scattering experiments

    Ornelas, A., Galaviz, D., Fueloep, Z., Gyuerky, G., Kiss, G., Mate, Z., Mohr, P., Rauscher, T., Somorjai, E., Sonnabend, K. & Zilges, A., 2012, Nuclear Physics in Astrophysics V. Auerbach, N., Hass, M. & Paul, M. (eds.). IOP PUBLISHING LTD, 3 p. 012030. (Journal of Physics Conference Series; vol. 337, no. Conf 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. KASPAR in the wild - Initial findings from a pilot study

    Syrdal, D. S., Lehmann, H., Robins, B. & Dautenhahn, K., Apr 2014, AISB 2014 - 50th Annual Convention of the AISB. Society for the Study of Artificial Intelligence and the Simulation of Behaviour

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Large-scale monitoring in insecticide susceptibility in cat fleas, Ctenocephalides felis

    Denholm, I., Blagburn, B., Kopp, S., Rust, M., Williamson, M., Qureshi, T., Tetzner, K., Mencke, N., Boehm, C., Rees, B. & Ahlstrom, L., 2015, Proceedings of an international conference 'Resistance 2015': 14-16 September, Harpenden, UK (abstract).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Let's get less optimistic in measurement-based timing analysis

    Bünte, S., Zolda, M. & Kirner, R., 1 Jan 2011, SIES 2011 - 6th IEEE International Symposium on Industrial Embedded Systems, Conference Proceedings. IEEE, Vol. 5953663. p. 204-212 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Linear Support Vector Machines for Error Correction in Optical Data Transmission

    Metaxas, A., Redyuk, A., Sun, Y., Shafarenko, A., Davey, N. & Adams, R., 2013, ICANNGA 2013, Procs 11th Int Conf. Springer, p. 438-445 (Lecture Notes in Computer Science; vol. 7824).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Local Information Maximisation creates Emergent Flocking Behaviour

    Salge, C. & Polani, D., 2011, Advances in Artificial Life, ECAL 2011: Proceedings of the Eleventh European Conference on the Synthesis and Simulation of Living Systems. Lenaerts, T., Giacobini, M., Bersini, H., Bourgine, P., Dorigo, M. & Doursat, R. (eds.). Paris, France: MIT Press, p. 688-696 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Local Join Optimization over a Heterogeneously Distributed Scientific Database

    Xiang, H., 2013, Procs 2013 IEEE International Conference on Big Data. IEEE, p. 41-45 6691781

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Look-ahead relevant information: Reducing cognitive burden over prolonged tasks

    van Dijk, S. & Polani, D., 2011, Procs of 2011 IEEE Symposium on Artificial Life. 1st ed. IEEE, p. 46-53 8 p. (Symposium Series on Computational Intelligence - IEEE ALIFE 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. MAC protocol requirements for OFDMA-PONs

    Lim, W., Milosavljevic, M., Gliwan, A., Kourtessis, P. & Senior, J. M., 2012, 14th Int Conf on Transparent Optical Networks (ICTON). IEEE, 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Managing upper limb tendinopathies in athletic and non-athletic populations.

    Lewis, J., 2015, 13th International Conference in Mechanical Diagnosis and Therapy. Copenhagen, Denmark. 6 September 2015. Keynote

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Materials Handling Vehicles: Policy Framework for an Emerging Fuel Cell Market

    Mansouri, I. & Calay, R., 2012, Energy Procedia . Elsevier, Vol. 29. p. 384-393 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Measuring ultracool properties from the UKIDSS Large Area Survey

    Day-Jones, A., Marocco, F., Pinfield, D. J., Zhang, Z., Burningham, B., Deacon, N., Ruiz, M-T., Gallardo, J., Jones, H. R. A., Lucas, P. W., Jenkins, J., Gomes, J., Folkes, S. & Clarke, J., 2013, Hot Planets and Cool Stars. Saglia, R. (ed.). EDP Sciences, 4 p. (EPJ Web of Conferences; vol. 47).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Mirroring Mobile Phone in the Clouds

    Ye, B., Wang, F., li, L., Helian, N. & Dimitrakos, T., 16 Oct 2014, IEEE International Conference on Mobile Services. IEEE, p. 140-146 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Modeling Streams-based Variants of Ant Colony Optimisation for Parallel Systems

    Cheng, W., Penczek, F., Grelck, C., Kirner, R., Scheuermann, B. & Shafarenko, A., Jan 2012, Proceedings: 2nd HiPEAC Workshop on Feedback-Directed Compiler Optimization for Multi-Core Architectures. Grelck, C., Hammond, K. & Scholz, S. B. (eds.). HiPEAC, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Modular design of data-parallel graph algorithms

    Dash, S., Scholz, S-B. & Christianson, B., 2013, Procs 2013 Int Conf on High Performance Computing and Simulation. Helsinki: IEEE Computer Society, p. 398-404

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Money Down the (Brand) Drain: An exploration of the constraints of the adoption of brand strategies and the adversity facing investment in brands by Chinese suppliers

    He, P. & Catulli, M., Apr 2014, Academy of Marketing Global Brand Conference. 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Monitoring field susceptibility to imidacloprid in the cat flea: an update on progress from a fourteen year initiative

    Kopp, S., Blagburn, B., Boehm, C., Denholm, I., Mencke, N., Ahlstrom, L., Rees, B., Rust, M., Qureshi, T., Tetzner, K. & Williamson, MS., 2015, Proceedings of the 25th International Conference of the world Association for the Advancement of Veterinary Parasitology: 16-20 August.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Monitoring framework for stream-processing networks

    Nguyen, V. T. N., Kirner, R. & Penczek, F., 1 Jan 2012, Workshop on Feedback-Directed Compiler Optimization for Multi-Core Architectures (FD-COMA 2012). 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. More security or less insecurity

    Chowdhury, P. D. & Christianson, B., 2014, Security Protocols XVIII. Christianson, B. & Malcolm, J. (eds.). Springer-Verlag, (Berlin-Heidelberg), p. 115-119 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. More security or less insecurity (transcript of discussion)

    Christianson, B., 2014, Security Protocols XVIII. Christianson, B. & Malcolm, J. (eds.). Springer-Verlag, (Berlin-Heidelberg), p. 120-126 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Movement recognition and preference in home-based robot-assisted stroke rehabilitation

    Basteris, A. & Amirabdollahian, F., 23 Jul 2014, Proceedings of the 8th International Conference on Pervasive Computing Technologies for Healthcare. p. 432-435 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. NADPH oxidase is the source of ROS in STZ rat aorta: use of the novel highly selective NOX inhibitor VAS2870

    Dugic, E., Shamsaldeen, Y., Benham, C. D. & MacKenzie, L., Sep 2013, Young Life Scientists Symposium 2013.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution