Search Constraints
Search Results
Select an image to start the slideshow
Robust planning and scheduling using column generation
1 of 8
An end-user centred framework for data access management and security in the enterprise public cloud
2 of 8
The users’ behaviour in audio streaming services : investigations in the music and podcast domains
3 of 8
An investigation of the current loopholes in bank ABC’s cybersecurity system : supporting a more resilient and trustworthy cybersecurity system
4 of 8
Every step is moving me up - an information behaviour study of hikers on the West Highland Way
5 of 8
Organising obscenity : a three-part exploration into the architecture of adult sites from the western world, their intimate interactions and lusty language when searching for sex
6 of 8
Fundamental components of deep learning : a category-theoretic approach
7 of 8
Classifying tor traffic using character analysis
8 of 8