Browse Publications

  1. Conference contribution › Research
  2. Publications content icon
    Published

    Human factors of multi-modal ubiquitous computing

    David Haniff, Chris Baber & William Edmondson, 1 Jan 1999, Handheld and Ubiquitous Computing - 1st International Symposium, HUC 1999, Proceedings. Gellersen, H-W. (ed.). Springer Verlag, p. 346-348 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1707).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Publications content icon
    Published

    Improved Torsion-Point Attacks on SIDH Variants

    Peter Kutas, , , , Christophe Petit & , 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer, p. 432-470 39 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12827 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Publications content icon
    Published

    Improving efficiency of heuristics for the large scale traveling thief problem

    Xin Yao, 2014, Simulated Evolution and Learning : 10th International Conference, SEAL 2014, Dunedin, New Zealand, December 15-18, 2014. Proceedings. Springer, Vol. 8886. p. 631-643 13 p. (Lecture Notes in Computer Science; vol. 8886).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Publications content icon
    Published

    Improving sampling in evolution strategies through mixture-based distributions built from past problem instances

    Stephen Friess, Peter Tino, , & Xin Yao, 31 Aug 2020, Parallel Problem Solving from Nature – PPSN XVI. Springer, p. 583-596 14 p. (Lecture Notes in Computer Science; vol. 12269).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Publications content icon
    Published

    Improving the performance of the Germinal center artificial immune system using ɛ-dominance: a multi-objective knapsack problem case study

    Christine Zarges & Jon Rowe, 2015, Evolutionary Computation in Combinatorial Optimization: 15th European Conference, EvoCOP 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings. Ochoa, G. & Chicano, F. (eds.). Springer, Vol. 9026. p. 114-125 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9026).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Publications content icon
    Published

    Increasing the reliability of high redundancy actuators by using elements in series and parallel

    Roger Dixon, 4 Nov 2009, Computer Safety, Reliability, and Security - 28th International Conference, SAFECOMP 2009, Proceedings. p. 270-282 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5775 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Publications content icon
    Published

    Landscape properties of the 0-1 knapsack problem

    Jon Rowe, 11 Jul 2015, GECCO Companion '15: Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation. Association for Computing Machinery , p. 1343-1344 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Publications content icon
    Published

    Large scale indefinite kernel fisher discriminant

    Frank-Michael Schleif, & Peter Tino, 2015, Similarity-Based Pattern Recognition : Third International Workshop, SIMBAD 2015, Copenhagen, Denmark, October 12-14, 2015. Proceedings. Feragen, A., Pelillo, M. & Loog, M. (eds.). Springer, Vol. 9370. p. 160-170 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9370).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Publications content icon
    Published

    LeakWatch: Estimating information leakage from java programs

    Tom Chothia, & , 2014, Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II. Kutyłowski, M. & Vaidya, J. (eds.). PART 2 ed. Springer, Vol. 8713 LNCS. p. 219-236 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8713 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Publications content icon
    Published

    Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems

    Richard J Thomas & Tom Chothia, 17 Dec 2020, Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, 2020, Revised Selected Papers. Katsikas, S., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Kalloniatis, C., Mylopoulos, J., Antón, A., Gritzalis, S., Meng, W. & Furnell, S. (eds.). Springer, p. 100-116 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12501 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...4 5 6 7 8 9 10 11 ...25 Next