
The Library
Browse by Warwick Author
![]() | Up a level |
Number of items: 31.
2019
Leeke, Matthew (2019) Simultaneous fault models for the generation and location of efficient error detection mechanisms. The Computer Journal . bxz022. doi:10.1093/comjnl/bxz022
2018
Bradbury, Matthew S., Jhumka, Arshad and Leeke, Matthew (2018) Hybrid online protocols for source location privacy in wireless sensor networks. Journal of Parallel and Distributed Computing, 115 . pp. 67-81. doi:10.1016/j.jpdc.2018.01.006
Fairbrother, Jake and Leeke, Matthew (2018) On basis variables for efficient error detection. In: 15th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC'17), Florida, USA, 6-10 Nov 2017. Published in: 2017 IEEE 15th International Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence & Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) ISBN 9781538619568. doi:10.1109/DASC-PICom-DataCom-CyberSciTec.2017.82
2017
Leeke, Matthew (2017) Simultaneous fault models for the generation of efficient error detection mechanisms. In: 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE'17), Toulouse, France, 23-26 Oct 2017. Published in: 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE) ISBN 9781538609422. ISSN 2332-6549. doi:10.1109/ISSRE.2017.29
2016
Laikin, Joanna F., Bradbury, Matthew S., Gu, Chen and Leeke, Matthew (2016) Towards fake sources for source location privacy in wireless sensor networks with multiple sources. In: 15th IEEE International Conference on Communication Systems (ICCS'16) , Shenzhen, China, 14-16 Dec 2016. Published in: 2016 IEEE International Conference on Communication Systems (ICCS), ISBN 9781509034239.
2015
Jhumka, Arshad, Bradbury, Matthew S. and Leeke, Matthew (2015) Fake source-based source location privacy in wireless sensor networks. Concurrency and Computation: Practice and Experience, 27 (12). pp. 2999-3020. doi:10.1002/cpe.3242
Marchant, James M., Griffiths, Nathan, Leeke, Matthew and Franks, Henry P. W. (2015) Destabilising conventions using temporary interventions. In: The 17th International Workshop on Coordination, Organisations, Institutions and Norms (COIN 2014) , Paris, France, 6 May 2014, 9372 pp. 148-163. ISBN 9783319254203. doi:10.1007/978-3-319-25420-3_10
Thomason, Alasdair, Griffiths, Nathan and Leeke, Matthew (2015) Extracting meaningful user locations from temporally annotated geospatial data. In: Giaffreda, Raffaele and Cagáňová, Dagmar and Li, Yong and Riggio, Roberto and Voisard, Agnès, (eds.) Internet of things : IoT infrastructures : first International Summit, IoT360 2014, Rome, Italy, October 27-28, 2014, Revised Selected Papers. Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (151). Springer International Publishing, pp. 84-90. ISBN 9783319197425
Thomason, Alasdair, Leeke, Matthew and Griffiths, Nathan (2015) Understanding the impact of data sparsity and duration for location prediction applications. In: Giaffreda, Raffaele and Cagáňová, Dagmar and Li, Yong and Riggio, Roberto and Voisard, Agnès, (eds.) Internet of things : IoT infrastructures : first International Summit, IoT360 2014, Rome, Italy, October 27-28, 2014, Revised Selected Papers. Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (151). Springer International Publishing, pp. 192-197. ISBN 9783319197425
Bradbury, Matthew S., Leeke, Matthew and Jhumka, Arshad (2015) A dynamic fake source algorithm for source location privacy in wireless sensor networks. In: 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, 20-22 Aug 2015. Published in: 2015 IEEE Trustcom/BigDataSE/ISPA, 1 pp. 531-538. doi:10.1109/Trustcom.2015.416
Marchant, James M., Griffiths, Nathan and Leeke, Matthew (2015) Destabilising conventions : characterising the cost. In: Eighth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, London, 8-12 Sep 2014. Published in: 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems (SASO) pp. 139-144. ISBN 9781479953677. ISSN 1949-3673. doi:10.1109/SASO.2014.26
Gu, Chen, Bradbury, Matthew S., Jhumka, Arshad and Leeke, Matthew (2015) Assessing the performance of phantom routing on source location privacy in wireless sensor networks. In: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, 18-20 Nov 2015. Published in: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC) pp. 99-108. ISBN 9781467393751. doi:10.1109/PRDC.2015.9
Marchant, James M., Griffiths, Nathan and Leeke, Matthew (2015) Convention emergence and influence in dynamic topologies. In: 14th International Conference on Autonomous Agents and Multiagent Systems, Istanbul, Turkey, 4-8 May 2015. Published in: Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems pp. 1785-1786.
Marchant, James M., Griffiths, Nathan and Leeke, Matthew (2015) Manipulating conventions in a particle-based topology. In: Coordination, Organizations, Institutions and Norms in Agent Systems Workshop : A workshop of the 12th International Conference on Autonomous Agents and Multiagent Systems : AAMAS2015, Istanbul, Turkey, 4-5 May 2015. Published in: Proceedings of the Coordination, Organizations, Institutions and Norms in Agent Systems Workshop
2014
Coetzee, Peter, Leeke, Matthew and Jarvis, Stephen A. (2014) Towards unified secure on- and off-line analytics at scale. Parallel Computing, Volume 40 (Number 10). pp. 738-753. doi:10.1016/j.parco.2014.07.004
2013
Thomason, Alasdair, Leeke, Matthew, Bradbury, Matthew S. and Jhumka, Arshad (2013) Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'13), Melbourne, Australia, 16-18 July 2013. Published in: Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013) pp. 667-674. doi:10.1109/TrustCom.2013.81
Leeke, Matthew, Jhumka, Arshad and Anand, Sarabjot Singh (2013) Towards the design of efficient error detection mechanisms for transient data errors. Computer Journal, Volume 56 (Number 6). pp. 674-692. doi:10.1093/comjnl/bxs049
2012
Jhumka, Arshad, Bradbury, Matthew S. and Leeke, Matthew (2012) Towards understanding source location privacy in wireless sensor networks through fake sources. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'12), Liverpool, UK, 25-27 Jun 2012 pp. 760-768. ISBN 9781467321723. doi:10.1109/TrustCom.2012.281
2011
Jhumka, Arshad and Leeke, Matthew (2011) The early identification of detector locations in dependable software. In: 22nd IEEE International Symposium on Software Reliability Engineering, Hiroshima, Japan, 29 Nov - 2 Dec 2011. Published in: Proceedings of 22nd IEEE International Symposium on Software Reliability Engineering pp. 40-49. ISSN 9780769545684. doi:10.1109/ISSRE.2011.34
Leeke, Matthew (2011) Towards the design of efficient error detection mechanisms. PhD thesis, University of Warwick.
Chester, Adam P., Leeke, Matthew, Al-Ghamdi, M., Jhumka, Arshad and Jarvis, Stephen A. (2011) A framework for data center scale dynamic resource allocation algorithms. In: 11th IEEE International Conference on Computer and Information Technology (CIT), Pafos, Cyprus, 31st August - 2nd September 2011. Published in: Proceedings of the 11th IEEE International Conference on Scalable Computing and Communications (SCALCOM'11) pp. 67-74. ISBN 9781457703836 . doi:10.1109/CIT.2011.72
Leeke, Matthew and Jhumka, Arshad (2011) An automated wrapper-based approach to the design of dependable software. In: 4th International Conference on Dependability (DEPEND'11), Nice, France, 21-27 August 2011 (Unpublished)
Chester, Adam P., Leeke, Matthew, Al-Ghamdi, M., Jarvis, Stephen A. and Jhumka, Arshad (2011) A modular failure-aware resource allocation architecture for cloud computing. In: UK Performance Engineering Workshop (UKPEW'11), Bradford, United Kingdom, 7-8 July 2011
Leeke, Matthew, Arif, Saima, Jhumka, Arshad and Anand, Sarabjot Singh (2011) A methodology for the generation of efficient error detection mechanisms. In: IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), Hong Kong, 27-30 June 2011 . Published in: Proceedings of the 41st International Conference on Dependable Systems and Networks pp. 25-36. ISBN 9781424492329. ISSN 1530-0889. doi:10.1109/DSN.2011.5958204
Jhumka, Arshad, Leeke, Matthew and Shrestha, Sambid (2011) On the use of fake sources for source location privacy : trade-offs between energy and privacy. The Computer Journal, Volume 54 (Number 6). pp. 860-874. doi:10.1093/comjnl/bxr010
2010
Shrestha, Sambid, Leeke, Matthew and Jhumka, Arshad (2010) On the tradeoff between privacy and energy in wireless sensor networks. In: UK Performance Engineering Workshop (UKPEW'10), Coventry, UK, 9-10 July 2010. Published in: Proceedings of the 26th UK Performance Engineering Workshop (UKPEW 2010) pp. 103-110.
Hammond, Simon D. and Jarvis, Stephen A., 1970- and Leeke, Matthew, eds. (2010) Proceedings of the 26th UK Performance Engineering Workshop (UKPEW 2010). UK Performance Engineering Workshop . Coventry, UK: Performance Computing and Visualisation, Department of Computer Science, University of Warwick. ISBN 9780955970320
Leeke, Matthew and Jhumka, Arshad (2010) Towards understanding the importance of variables in dependable software. In: 8th European Dependable Computing Conference (EDCC'10), Valencia, Spain, 28-30 April 2010. Published in: 2010 European Dependable Computing Conference (EDCC) pp. 85-94. ISBN 9780769540078. doi:10.1109/EDCC.2010.20
2009
Leeke, Matthew and Jhumka, Arshad (2009) Beyond the golden run : evaluating the use of reference run models in fault injection analysis. In: UK Performance Engineering Workshop (UKPEW 2009), Leeds, UK, 6-7 July 2009. Published in: Proceedings of the 25th UK Performance Engineering Workshop pp. 61-74. ISBN 9780955970313.
Leeke, Matthew and Jhumka, Arshad (2009) Evaluating the use of reference run models in fault injection analysis. In: 15th Pacific Rim International Symposium on Dependable Computing, Shanghai, People's Republic of China, November 16-18, 2009. Published in: IEEE 15th Pacific Rim International Symposium on Dependable Computing, Proceedings pp. 121-124. ISBN 978-0-7695-3849-5. doi:10.1109/PRDC.2009.28
Jhumka, Arshad and Leeke, Matthew (2009) Issues on the design of efficient fail-safe fault tolerance. In: 20th International Symposium on Software Reliability Engineering, 2009. ISSRE '09, Mysuru, Karnataka, 16-19 Nov 2009 . Published in: International Symposium on Software Reliability Engineering. Proceedings pp. 155-164. ISSN 1071-9458. doi:10.1109/ISSRE.2009.31
This list was generated on Mon Dec 16 06:15:50 2019 GMT.