Refine your results

Easily toggle selected advanced search features:

Search research publications and outputs

  1. 2014
  2. Fault Attack on AES via Hardware Trojan Insertion by Dynamic Partial Reconfiguration of FPGA over Ethernet

    Johnson, A. P., Saha, S., Chakraborty, R. S., Mukhopadhyay, D. & Gören, S., Oct 2014, Workshop on Embedded Systems Security (WESS, part of ACM ESWEEK) 2014, New Delhi, India. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Lossy Compression for Static Probabilistic Timing Analysis of Random Replacement Caches

    Griffin, D. J., Lesage, B. M. J-R., Burns, A. & Davis, R. I., Oct 2014, RTNS '14: Proceedings of the 22nd International Conference on Real-Time Networks and Systems. ACM, p. 289-298 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Schedulability Analysis for Fixed Priority Real-Time Systems with Energy-Harvesting

    Abdeddaïm, Y., Chanderli, Y., Masson, D. & Davis, R. I., Oct 2014, Proceedings of the 22nd International Conference on Real-Time Networks and Systems. p. 311-320 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Enhancing intrapreneurial skills of students through entrepreneurship education: a case study of an interdisciplinary Engineering Management Programme

    Ward, T. & Baruah, B. J., 13 Sep 2014, 13th International Conference on Information Technology based Higher Education and Training (ITHET). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Authority and judgement in the digital archive

    Dix, A., Cowgill, R., Bashford, C., McVeigh, S. & Ridgewell, R., 12 Sep 2014, Proceedings of the 1st International Workshop on Digital Libraries for Musicology. Association for Computing Machinery (ACM), p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Architecture-awareness for real-time big data systems

    Gray, I., Audsley, N. C., Chan, Y. & Wellings, A., 9 Sep 2014, ACM International Conference Proceeding Series. Association for Computing Machinery (ACM), p. 151-156 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Automatically Improving Constraint Models in Savile Row through Associative-Commutative Common Subexpression Elimination

    Nightingale, P., Akgun, O., Gent, I. P., Jefferson, C. & Miguel, I., 8 Sep 2014, Principles and Practice of Constraint Programming. Cham: SPRINGER, p. 590-605 16 p. (Lecture Notes in Computer Science; vol. 8656).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Discriminating instance generation for automated constraint model selection

    Gent, I. P., Hussain, B. S., Jefferson, C., Kotthoff, L., Miguel, I., Nightingale, G. F. & Nightingale, P., 8 Sep 2014, Principles and Practice of Constraint Programming - 20th International Conference, CP 2014, Proceedings. Springer Verlag, p. 356-365 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. On Demand Data Analysis and Filtering for Inaccurate Flight Trajectories

    Zanin, M., Perez, D., Chatterjee, K., Kolovos, D. S., Paige, R. F., Horst, A. & Rumpe, B., 8 Sep 2014, Proceedings of the SESAR Innovation Days (2011) EUROCONTROL. Toulouse

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. A Cost-Efficient System for Detecting an Intentional Electromagnetic Interference (IEMI) Attack

    Dawson, J. F., Flintoft, I. D., Kortoći, P., Dawson, L., Marvin, A. C., Robinson, M. P., Stojilović, M., Rubinstein, M., Menssen, B., Garbe, H., Hirschi, W. & Rouiller, L., 1 Sep 2014, EMC Europe 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...331 Next