Items where Author is "Malcolm, J."
Number of items: 32.
Article
Preface. (2011)
B. Christianson,
J. Malcolm,
B. Crispo
and
F. Stajano
Efficient Search for Plagiarism on the Web. (2008)
J. Malcolm
and
P.C.R. Lane
Genetic local search for multicast routing with pre-processing by logarithmic simulated annealing. (2008)
M.S. Zahrani,
M.J. Loomes,
J. Malcolm,
A.Z.M. Dayem Ullah,
K. Steinhofel
and
A. Albrecht
Plagiarism is easy, but also easy to detect. (2006)
C. Lyon,
R. Barrett
and
J. Malcolm
Anonymous authentication. (2006)
P. Das Chowdhury,
J. Malcolm
and
B. Christianson
Embedding plagiarism education in the assessment process. (2006)
R. Barrett
and
J. Malcolm
Landscape analysis for multicast routing. (2006)
M.S. Zahrani,
M.J. Loomes,
J. Malcolm
and
A. Albrecht
Text similarity in academic conference papers. (2006)
J. Bao
and
J. Malcolm
Anonymous Context Based Role Activation Mechanism. (2005)
P. Das Chowdhury,
B. Christianson
and
J. Malcolm
Auditable Anonymous Delegation. (2005)
B. Christianson,
P. Das Chowdhury
and
J. Malcolm
A theoretical basis to the automated detection of copying between texts, and its practical implementation in the Ferret plagiarism and collusion detector. (2004)
C. Lyon,
R. Barrett
and
J. Malcolm
Incremental Retrieval of documents relevant to a topic. (2002)
C. Lyon,
J. Malcolm
and
R. Dickerson
Detecting Short Passages of Similar Text in Large Document Collections. (2001)
C. Lyon,
J. Malcolm
and
B. Dickerson
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001)
B. Christianson,
B. Crispo
and
J. Malcolm
Pictures Can’t Lie under Oath. (2000)
B. Christianson,
J. Malcolm
and
B. Robinson
Delegation and not-so smart cards. (1999)
B. Christianson
and
J. Malcolm
Binding bit patterns to real world entities. (1998)
B. Christianson
and
J. Malcolm
Other
The sense of security and a countermeasure for the false sense (transcript of discussion). (2011)
J. Malcolm
Snoop behaviour in multihop wireless networks. (2010)
P. Nambiar,
Hannan Xiao
and
J. Malcolm
Tackling the PAN’09 External Plagiarism Detection Corpus with a Desktop Plaigiarism Detector. (2009)
J. Malcolm
and
P.C.R. Lane
Using n-grams to rapidly characterise the evolution of software code. (2008)
A. Rainer,
P.C.R. Lane,
J. Malcolm
and
S. Scholz
Comparing Different Text Similarity Methods. (2007)
J. Bao,
C. Lyon,
P.C.R. Lane,
W. Ji
and
J. Malcolm
Hierarchical Trustworthy Authentication for Pervasive Computing. (2007)
Hannan Xiao,
J. Malcolm
and
B. Christianson
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. (2007)
S.M. Bo,
Hannan Xiao,
A. Adereti,
J. Malcolm
and
B. Christianson
Copy detection in Chinese documents using the Ferret: a report on experiments. (2006)
J. Bao,
C. Lyon,
P.C.R. Lane,
W. Ji
and
J. Malcolm
Joint Source Channel Coding for H.264 Compliant Stereoscopic Video Transmission. (2005)
P.Y. Yip,
J. Malcolm,
A. Fernando,
K.K. Loo
and
H.K. Arachchi
Theoretical analysis of TCP throughput in adhoc wireless networks. (2005)
Hannan Xiao,
K.C. Chua,
J. Malcolm
and
Y. Zhang
Experiments in Electronic Plagiarism Detection. (2003)
C. Lyon,
R. Barrett
and
J. Malcolm
Digital cash : electronic commerce over open networks. (1999)
J. Mankin
and
J. Malcolm
Binding bit patterns to real world entities. (1997)
B. Christianson
and
J. Malcolm
Teaching client server computing to undergraduates and postgraduates. (1996)
J. Malcolm
and
P. Hu
Knowledge-based systems in network management. (1990)
T. Wooding
and
J. Malcolm