Items where Author is "Malcolm, J."

Number of items: 32.
Article
  • Preface. (2011) B. Christianson, J. Malcolm, B. Crispo and F. Stajano
  • Efficient Search for Plagiarism on the Web. (2008) J. Malcolm and P.C.R. Lane
  • Genetic local search for multicast routing with pre-processing by logarithmic simulated annealing. (2008) M.S. Zahrani, M.J. Loomes, J. Malcolm, A.Z.M. Dayem Ullah, K. Steinhofel and A. Albrecht
  • Plagiarism is easy, but also easy to detect. (2006) C. Lyon, R. Barrett and J. Malcolm
  • Anonymous authentication. (2006) P. Das Chowdhury, J. Malcolm and B. Christianson
  • Embedding plagiarism education in the assessment process. (2006) R. Barrett and J. Malcolm
  • Landscape analysis for multicast routing. (2006) M.S. Zahrani, M.J. Loomes, J. Malcolm and A. Albrecht
  • Text similarity in academic conference papers. (2006) J. Bao and J. Malcolm
  • Anonymous Context Based Role Activation Mechanism. (2005) P. Das Chowdhury, B. Christianson and J. Malcolm
  • Auditable Anonymous Delegation. (2005) B. Christianson, P. Das Chowdhury and J. Malcolm
  • A theoretical basis to the automated detection of copying between texts, and its practical implementation in the Ferret plagiarism and collusion detector. (2004) C. Lyon, R. Barrett and J. Malcolm
  • Incremental Retrieval of documents relevant to a topic. (2002) C. Lyon, J. Malcolm and R. Dickerson
  • Detecting Short Passages of Similar Text in Large Document Collections. (2001) C. Lyon, J. Malcolm and B. Dickerson
  • Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001) B. Christianson, B. Crispo and J. Malcolm
  • Pictures Can’t Lie under Oath. (2000) B. Christianson, J. Malcolm and B. Robinson
  • Delegation and not-so smart cards. (1999) B. Christianson and J. Malcolm
  • Binding bit patterns to real world entities. (1998) B. Christianson and J. Malcolm
  • Other
  • The sense of security and a countermeasure for the false sense (transcript of discussion). (2011) J. Malcolm
  • Snoop behaviour in multihop wireless networks. (2010) P. Nambiar, Hannan Xiao and J. Malcolm
  • Tackling the PAN’09 External Plagiarism Detection Corpus with a Desktop Plaigiarism Detector. (2009) J. Malcolm and P.C.R. Lane
  • Using n-grams to rapidly characterise the evolution of software code. (2008) A. Rainer, P.C.R. Lane, J. Malcolm and S. Scholz
  • Comparing Different Text Similarity Methods. (2007) J. Bao, C. Lyon, P.C.R. Lane, W. Ji and J. Malcolm
  • Hierarchical Trustworthy Authentication for Pervasive Computing. (2007) Hannan Xiao, J. Malcolm and B. Christianson
  • A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. (2007) S.M. Bo, Hannan Xiao, A. Adereti, J. Malcolm and B. Christianson
  • Copy detection in Chinese documents using the Ferret: a report on experiments. (2006) J. Bao, C. Lyon, P.C.R. Lane, W. Ji and J. Malcolm
  • Joint Source Channel Coding for H.264 Compliant Stereoscopic Video Transmission. (2005) P.Y. Yip, J. Malcolm, A. Fernando, K.K. Loo and H.K. Arachchi
  • Theoretical analysis of TCP throughput in adhoc wireless networks. (2005) Hannan Xiao, K.C. Chua, J. Malcolm and Y. Zhang
  • Experiments in Electronic Plagiarism Detection. (2003) C. Lyon, R. Barrett and J. Malcolm
  • Digital cash : electronic commerce over open networks. (1999) J. Mankin and J. Malcolm
  • Binding bit patterns to real world entities. (1997) B. Christianson and J. Malcolm
  • Teaching client server computing to undergraduates and postgraduates. (1996) J. Malcolm and P. Hu
  • Knowledge-based systems in network management. (1990) T. Wooding and J. Malcolm