AC/DC: Adaptive Cutoffs and Disputable Cutoffs for Robust Critical Transactions in Smart-Contracts,
Khalil R, Dulay N,
IEEE Transactions on Network and Service Management, Vol: 19, Issue 4, Pages: 5383-5394, 2022
Towards Equity in Proof-of-Work Mining Rewards,
Khalil R, Dulay N, 2022,
(Best Paper) 3rd International Conference on Mathematical Research for Blockchain Economy, 2022
RANC: reward-all nakamoto consensus,
Khalil R, Dulay N,
SAC ’22: 37th ACM/SIGAPP Symposium on Applied Computing, ACM, Pages: 236-245, 2022
Adaptive layer-two dispute cutoffs in smart-contract blockchains,
Khalil R, Dulay N,
(Best Paper) 3rd Conference on Blockchain Research and Applications for Innovative Networks and Services (BRAINS), IEEE, Pages: 129-136, 2021
PoSH in Practice: Implementing Proof of Staked Hardware Consensus with Limited Storage,
Khalil R, Dulay N,
3rd IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE, 2021
Adaptive layer-two dispute periods in blockchains,
Khalil R, Dulay N,
Cryptology ePrint Archive, 2020
PoSH proof of staked hardware consensus,
Khalil R, Dulay N,
Cryptology ePrint Archive, 2020
XPC: fast and reliable synchronous transmission protocols for 2-phase commit and 3-phase commit,
Spina A, Breza M, Dulay N, McCann J,
International Conference on Embedded Wireless Systems and Networks (EWSN), ACM, Pages: 73-84, 2020
PICO-MP: De-Centralised Macro-Programming for Wireless Sensor and Actuator Networks (Best Paper)
Dulay N, Micheletti M, Mostarda L, Piermarteri A,
32nd IEEE International Configuration on Advanced Information Networking and Applications (AINA), 2018
DejaVu: Visual Diffing of Cyber-Physical Systems
Leahy F, Dulay N,
15th ACM International Conference on Embedded Wireless Systems and Networks (EWSN), 2018
DejaVu: Visual Diffing of Cyber-Physical Systems (Best Poster),
Leahy F, Dulay N,
4th ACM International Conference on Systems for Energy-Efficient Built Environments (BuildSys), 2017
Ardan: Using 3D Game Engines in Cyber-Physical Simulations,
Leahy F, Dulay N,
Cyber Physical Systems. Design, Modeling, and Evaluation, LNCS 10107, 2016
Integrating Privacy and Safety Criteria into Planning Tasks,
Lavygina A, Russo A, Dulay N
Security and Trust Management, Springer, 2015, Pages: 20-36
An Approach for Collective Adaptation in Socio-Technical Systems,
Bucchiarone A, Dulay N, Lavygina A, Marconi A, Raik H, Russo A,
2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW), 2015, Pages: 43-48
Rumpole – An Introspective Break-glass Access Control Language,
Marinovic S, Dulay N, Sloman M,
ACM Transactions on Information and System Security (TISSEC), 2014
When Did Your Smartphone Bother You Last?,
Smith J, Lavygina A, Russo A, Dulay N,
UbiComp-ISWC 2014 Programming Competition, 2014
Learning to Recognise Disruptive Smartphone Notifications,
Smith J, Lavygina A, Ma J, Russo, Dulay N,
6th International Conference on Human-Computer Interaction with Mobile Devices and Service (MobileHCI), September 2014
RingLearn: Long-term Mitigation of Disruptive Smartphone Interruptions,
Smith J, Dulay N,
Symposium on Activity and Context Modeling and Reasoning (ACOMORE), 2014
Exploring Concept Drift using Interactive Simulations,
Smith J, Dulay N, Tóth M A, Amft O, Zhang Y:
10th IEEE Workshop on Context Modeling and Reasoning (CoMoRea), 2013, Pages 49-54
| DOI
Self-Management Framework for Mobile Autonomous Systems,
Asmare E, Gopalan A, Sloman M, Dulay N, Lupu E,
Journal of Network and Systems Management, 2012, Vol:20, 1064-7570, Pages:244-275
| DOI | Publisher Web Link
Enhancing Vehicle Navigation using Shared Monitoring and Estimation,
Ball R, Dulay N,
Unpublished, 2012.
| Author Web Link
A Configuration Service for Home Networks,
Pediaditakis D, Gopalan A, Dulay N, Sloman M,
IEEE Network Operations and Management Symposium (NOMS), 2012, IEEE, Pages:1048-1053, 1542-1201
| DOI | Publisher Web Link | Open Access Link
A policy-based publish/subscribe middleware for sense-and-react applications,
Russello G, Mostarda L, Dulay N
Journal of Systems and Software, 2011, Vol:84, ISSN:0164-1212, Pages:638-654
| DOI | Author Web Link
Shared and searchable encrypted data for untrusted servers,
Dong C, Russello G, Dulay N,
Journal of Computer Security, 2011, Vol:19, ISSN:0926-227X, Pages:367-397
| DOI
Argumentation-based Fault Diagnosis for Home Networks,
Dong C, Dulay N,
Proceedings of the 2nd ACM SIGCOMM Workshop on Home networks, 2011, Pages 37-42
| DOI
An Information Plane Architecture Supporting Home Network Management,
Sventek J, Koliousis A, Sharma O, Dulay N, Pediaditakis D, Sloman M, Rodden T, Lodge T, Bedwell B,
IEEE International Symposium on Integrated Network Management (IM), 2011. IEEE, Pages:1-8
| DOI | Publisher Web Link | Open Access Link
Distributed Orchestration of Pervasive Services,
Mostarda L, Marinovic S, Dulay N,
24th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2011 IEEE COMPUTER SOC, Pages:166-173, ISSN:1550-445X
| DOI | Publisher Web Link
Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications,
Dong C, Dulay N,
5th IFIP International Conference on Trust Management, 2011, Springer, Pages:133-148
| DOI | Publisher Web Link
Rumpole: a flexible break-glass access control model,
Marinovic S, Craven R, Ma J, Dulay N,
16th ACM Symposium on Access Control Models and Technologies (SACMAT), 2011, ACM, New York, NY, USA, Pages:73-82
| DOI | Publisher Web Link
Support Tasks for Pervasive Workflows,
Marinovic S, Unger T, Dulay N, Leymann F,
Unpublished, 2011
| Author Web Link
Verifying home network bandwidth sharing plans,
Pediaditakis D, Dulay N,
7th International Conference on Network and Service Management (CNSM), 2011, IEEE, Pages:1-9
| Publisher Web Link
Teleo-Reactive policies for managing human-centric pervasive services,
Marinovic S, Twidle K P, Dulay N, Sloman M,
6th IEEE Int. Conference on Network and Service Management, 2010 IEEE, Pages:80-87
| DOI | Publisher Web Link | Open Access Link
An Architectural Framework for Analyzing Tradeoffs between Software Security and Performance,
Cortellessa V, Trubiani C, Mostarda L, Dulay N,
1st International Symposium on Architecting Critical Systems (ISARCS), 2010. Springer, Pages:1-18
| DOI | Publisher Web Link
Coordinating Data Usage Control in Loosely-Connected Networks,
Russello G, Scalavino E, Dulay N, Lupu E,
2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2010, IEEE Computer Society, Pages:30-39
| DOI | Publisher Web Link
Distributed Fault Tolerant Controllers,
Mostarda L, Ball R, Dulay N,
10th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), 2010 Springer-Verlag Berlin, Pages:141-154, ISSN:0302-9743
| DOI | Publisher Web Link
Providing data confidentiality against malicious hosts in Shared Data Spaces,
Russello G, Dong C, Dulay N, Chaudron M, Van Steen M,
Science of Computer Programming, 2010, Vol:75, ISSN:0167-6423, Pages:426 – 439
| DOI | Publisher Web Link
Predicting Human Behaviour from Selected Mobile Phone Data Points,
Choujaa D, Dulay N,
12th International Conference on Ubiquitous Computing, 2010, ACM, Pages:105-108
| DOI | Publisher Web Link
Shinren: Non-monotonic Trust Management for Distributed Systems,
Dong C, Dulay N,
4th IFIP WG 11 11 International Conference on Trust Management, Springer-Verlag Berlin, Pages:125-140, ISSN:1868-4238
| DOI | Publisher Web Link
Teleo-Reactive Policies in Ponder2,
Twidle K, Marinovic S, Dulay N,
2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), IEEE Computer Society, Pages:57-60
| DOI | Publisher Web Link
Teleo-Reactive workflows for pervasive healthcare,
Marinovic S, Twidle K, Dulay N,
2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 2010, IEEE, Pages:316-321
| DOI | Publisher Web Link
Context-based Authentication and Transport of Cultural Assets,
Mostarda L, Dong C, Dulay N,
Personal and Ubiquitous Computing, 2009, Vol:14, 1617-4909, Pages:-
| DOI | Author Web Link
Locating Network Domain Entry and Exit point/path for DDoS Attack Traffic,
Thing V, Sloman M, Dulay N,
IEEE Transactions on Network and Service Management, 2009, Vol:6, ISSN:1932-4537, Pages:163-174
| DOI | Author Web Link | Open Access Link
Policy Conflict Analysis for DiffServ Quality of Service Management,
Charalambides M, Flegkas P, Pavlou G, Rubio-Loyola J, Bandara A, Lupu E, Russo A, Dulay N, Sloman M,
IEEE Transactions on Network and Service Management, 2009, Vol:6, 1932-4537, Pages:-
| DOI | Author Web Link
Activity Recognition from Mobile Phone Data: State of the Art, Prospects and Open Problems,
Choujaa D, Dulay N,
Unpublished, 2009, 32 pages
| Author Web Link
Policies for Self Tuning Home Networks,
Pediaditakis D, Mostarda L, Dong C, Dulay N,
IEEE International Symposium on Policies for Distributed Systems and Networks, 2009, IEEE, Pages:-
| DOI | Publisher Web Link
xDUCON: Cross Domain Usage Control through Shared Data Spaces,
Russello G, Dulay N,
IEEE Intl Symposium on Policies for Distributed Systems and Networks, 2009, IEEE Computer Society, Pages:-
| DOI | Publisher Web Link
xDUCON: Coordinating Usage Control Policies in Distributed Domains,
Russello G, Dulay N,
IEEE Computer Society, Pages:246-253
| DOI | Publisher Web Link
Adaptive response system for distributed denial-of-service attacks,
Thing V, Sloman M, Dulay N,
IFIP/IEEE International Symposium on Integrated Network Management (IM), 2009, IEEE, Pages:809-814
| DOI | Publisher Web Link | Open Access Link
An Architectural Approach for Self-Managing Security Services,
Russello G, Dulay N,
23rd International Conference on Advanced Information Networking and Applications, 2009, IEEE, Pages:153-158
| DOI | Publisher Web Link
Approximating Travel Times using Opportunistic Networking,
Ball R, Dulay N,
23rd International Conference on Advanced Information Networking and Applications, 2009, IEEE, Pages:844-849
| DOI | Publisher Web Link
Ponder2: A Policy System for Autonomous Pervasive Environments,
Twidle K, Lupu E, Sloman M, Dulay N,
The Fifth International Conference on Autonomic and Autonomous Systems, 2009. IEEE, Pages:-
| DOI | Publisher Web Link | Open Access Link
A Mission Management Framework for Unmanned Autonomous Vehicles,
Asmare E, Gopalan A, Sloman M, Dulay N, Lupu E,
2nd International Mobilware Conference, 2009, Springer, Pages:222-235, ISSN:1867-8211
| DOI | Publisher Web Link | Open Access Link
A Policy Based Management Architecture for Mobile Collaborative Teams,
Asmare E, Gopalan A, Sloman M, Dulay N, Lupu E,
2009 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2009, IEEE Computer Society, Pages:169-174
| DOI | Publisher Web Link | Open Access Link
Activity Inference through Sequence Alignment,
Choujaa D, Dulay N,
4th International Workshop on Location and Context-Awareness (LOCA), Springer-Verlag Berlin, Pages:19-36, ISSN:0302-9743
| DOI | Publisher Web Link
Aligning Activity Sequences for Continuous Tracking of Cellphone Users,
Choujaa D, Dulay N,
7th IEEE International Conference on Pervasive Computing and Communications, 2009, IEEE, Pages:465-470, Pages:1-6
| DOI | Publisher Web Link | Author Web Link
Routine classification through sequence alignment,
Choujaa D, Dulay N,
Proceedings of the 17th ACM international conference on Multimedia (MM), 2009, ACM, Pages:737-740
| DOI | Publisher Web Link
A Framework for Capturing Patient Consent in Pervasive Healthcare Applications.
Russello G , Dong C, Dulay, N,
In P. Olla, & J. Tan (Eds.) Mobile Health Solutions for Biomedical Applications, 2009, Hershey, PA: Medical Information Science Reference. Pages 245-259
| DOI
Adaptive self-management of teams of autonomous vehicles,
Sloman M, Asmare E, Gopalan A, Lupu E, Dulay N,
6th International Workshop on Middleware for Pervasive and Ad-Hoc Computing, 2008, ACM, Pages:1-
| DOI | Publisher Web Link | Open Access Link
AMUSE: autonomic management of ubiquitous e-Health systems,
Lupu E, Dulay N, Sloman M, Sventek J, Heeps S, Strowes S, Twidle K, Keoh S-L, Schaeffer-Filho A,
Concurrency and Computation-Practice & Experience, 2008, Vol:20, ISSN:1532-0626, Pages:277-295
| DOI | Author Web Link | Open Access Link
Reconfigurable architecture for network flow analysis,
Yusuf S, Luk W, Sloman M, Dulay N, Lupu E, Brown G,
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2008, Vol:16, ISSN:1063-8210, Pages:57-65
| DOI | Publisher Web Link | Open Access Link
An Efficient Policy System for Body Sensor Networks,
Zhu Y, Keoh S L, Sloman M, Lupu E, Dulay N, Pryce N,
14th IEEE International Conference on Parallel and Distributed Systems (ICPADS’08), 2008, IEEE, Pages:383-390
| DOI | Publisher Web Link | Open Access Link
Towards Context-aware Face Anonymisation,
Choujaa D, Dulay N,
7th International ACM Conference on Mobile and Ubiquitous Multimedia, 2008, ACM, Pages:-
| DOI | Publisher Web Link
Adaptable Pervasive Flows – An Emerging Technology for Pervasive Adaptation,
Herrmann K, Rothermel K, Kortuem G, Dulay N,
Workshop on Pervasive Adaptation (PerAda), 2008, IEEE Computer Society, Pages:-
| DOI | Publisher Web Link
GSpace: An Architectural Approach for Self-Managing Extra-Functional Concerns,
Russello G, Dulay N, Chaudron M, Van Steen M,
Workshop on Autonomous & Autonomic Software-based Systems, 2008 ACM, Pages:-
| DOI | Publisher Web Link
Using Screenplays as a Source of Context Data,
Choujaa D, Dulay N
2nd ACM Workshop on Story Representation, Mechanism and Context, 2008, ACM, Pages:-
| DOI | Publisher Web Link
A Consent-based Workflow System for Healthcare Systems,
Russello G, Dong C, Dulay N,
Policies for Distributed Systems and Networks (Policy), 2008
Secure Distributed Self Management Framework for UXVs,
Dulay N, Sloman M, Lupu E, Asmare E, Gopalan A,
Systems Engineering for Autonomous Systems Defence Technology Centre Conference, 2008
| Author Web Link | Open Access Link
A Workflow-based Access Control Framework for e-Health Applications,
Russello G, Dong C, Dulay N,
22nd International Workshops on Advanced Information Networking and Applications, 2008, IEEE, Pages:111-120
| DOI | Publisher Web Link
A Policy System to Support Adaptability and Security on Body Sensors,
Zhu Y, Keoh S L, Sloman M, Lupu E, Dulay N, Pryce N,
5th International Summer School and Symposium on Medical Devices and Biosensors, 2008, IEEE, Pages:97-100
| DOI | Publisher Web Link | Open Access Link
Consent-based workflows for healthcare management,
Russello G, Dong C, Dulay N,
IEEE International Workshop on Policies for Distributed Systems and Networks, 2008, IEEE COMPUTER SOC, Pages:153-161
| DOI | Publisher Web Link
Encrypted Shared Data Spaces,
Russello G, Dong C, Dulay N, Chaudron M, van Steen M,
10th International Conference on Coordination Models and Languages (COORDINATION), 2008, Springer-Verlag Berlin, Pages:264-279, ISSN:0302-9743
| DOI | Publisher Web Link
ESCAPE: A Component-Based Policy Framework for Sense and React Applications,
Russello G, Mostarda L, Dulay N,
11th International Symposium on Component-Based Software Engineering, 2008, SPRINGER-VERLAG BERLIN, Pages:212-229, ISSN:0302-9743
| DOI | Publisher Web Link
Finger: An Efficient Policy System for Body Sensor Networks,
Zhu Y, Keoh S L, Sloman M, Lupu E, Zhang Y, Dulay N, Pryce N,
5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2008, IEEE, Pages:428-433
| DOI | Publisher Web Link | Open Access Link
Flexible Resolution of Authorisation Conflicts in Distributed Systems,
Dong C, Russello G, Dulay N,
19th IFIP/IEEE International Workshop on Distributed Systems, Operations and Management (DSOM), 2008, Springer-Verlag, Pages:95-108, ISSN:0302-9743
| DOI | Publisher Web Link
Network domain entrypoint/path determination for DDoS attacks,
Thing V, Sloman M, Dulay N,
IEEE Network Operations and Management Symposium (NOMS), 2008, IEEE, Pages:57-64, 1542-1201
| DOI | Publisher Web Link | Open Access Link
Personalising Situated Workflow Systems for Pervasive Healthcare Applications,
Russello G, Dong C, Dulay N,
2nd International Conference on Pervasive Computing Technologies for Healthcare, 2008, IEEE, Pages:173-177
| Author Web Link
Place and time authentication of cultural assets,
Mostarda L, Dong C, Dulay N,
IFIPTM 2008/Joint iTrust and PST Conference on Privacy, Trust Management and Security, 2008, Springer, Pages:279-294, ISSN:1868-4238
| DOI | Author Web Link
Ponder2 – A policy environment for autonomous pervasive systems,
Twidle K, Lupu E, Dulay N, Sloman M,
IEEE International Workshop on Policies for Distributed Systems and Networks, 2008, IEEE COMPUTER SOC, Pages:245-246
| DOI | Publisher Web Link | Open Access Link
Reconfigurable architecture for network flow analysis,
Yusuf S, Luk W, Sloman M, Dulay N, Lupu E,
International Conference on Engineering of Reconfigurable Systems and Algorithms, 2008, Pages:57-65
Shared and searchable encrypted data for untrusted servers,
Dong C, Russello G, Dulay N,
22nd Annual Conference on Data and Applications Security, 2008, Springer-Verlag Berlin Pages:127-143, ISSN:0302-9743
| DOI | Publisher Web Link
TRAcME: Temporal Activity Recognition using Mobile Phone Data,
Choujaa D, Dulay N,
5th International Conference on Embedded and Ubiquitous Computing, 2008, IEEE, Pages:119-126
| DOI | Publisher Web Link
Policy Based Management,
Bandara A, Damianou N, Lupu E, Sloman M, Dulay N,
Handbook of Network and System Administration, 2007, Editor(s): Burgess, Bergstra, Elsevier, ISBN:978-0-444-52198-9
| Author Web Link
Enhanced TCP SYN Attack Detection,
Thing V, Sloman M, Dulay N,
IEEE Workshop on Monitoring Attack Detection and Mitigation (MonAM), 2007
| Author Web Link | Open Access Link
Towards Self-managing Unmanned Autonomous Vehicles,
Lupu E, Asmare E, Dulay N, Sloman M,
Systems Engineering for Autonomous Systems Defence Technology Centre Conference, 2007 Edinburgh, UK
| Author Web Link
Authorisation and conflict resolution for hierarchical domains,
Russello G, Dong C, Dulay N,
8th IEEE International Workshop on Policies for Distributed Systems and Networks, 2007, IEEE, Pages:201-210
| DOI | Publisher Web Link
Enforcing Fine-grained Authorization Policies for Java Mobile Agents,
Russello G, Dong C, Dulay N,
Security in Networks and Distributed Systems, 2007, IEEE Computer Society, Pages:-
| DOI | Publisher Web Link
Non-intrusive IP Traceback for DDoS Attacks,
Thing V, Sloman M, Dulay N,
ACM Symposium on Information, Computer and Communications Security, 2007, Singapore, ACM, Pages:371-373
| DOI | Publisher Web Link | Open Access Link
A survey of bots used for distributed denial of service attacks,
Thing V, Sloman M, Dulay N,
22nd International Information Security Conference, 2007, Springer, Pages:229-240, ISSN:1571-5736
| DOI | Publisher Web Link | Open Access Link
Autonomous pervasive systems and the policy challenges of a small world!,
Lupu E, Dulay N, Sventek J, Sloman M,
8th IEEE International Workshop on Policies for Distributed Systems and Networks, 2007, IEEE, Pages:3-7
| DOI | Publisher Web Link
Dynamic ontology mapping for interacting autonomous systems,
Heeps S, Sventek J, Dulay N, Filho A, Lupu E, Sloman M, Strowes S,
2nd International Workshop on Self-Organizing Systems, 2007, Springer, Pages:255-263, 0302-9743
| DOI | Publisher Web Link
Policy-based management for body-sensor networks,
Keoh S L, Twidle K, Pryce N, Schaeffer A, Lupu E, Dulay N, Sloman M, Heeps S, Strowes S, Sventek J, Katsiri E,
4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN), 2007, Springer, Pages:92-98, 1680-0737
| DOI | Publisher Web Link | Open Access Link
Privacy-preserving credential verification for non-monotonic trust management systems,
Dong C, Russello G, Dulay N,
4th Intl Conf on Mathematical Methods, Models and Architectures for Computer Network Security, 2007, Springer, Pages:171-186, ISSN:1865-0929
| DOI | Author Web Link
Secure dynamic community establishment in coalitions,
Asmare E, Dulay N, Lupu E, Sloman M, Calo S, Lobo J,
IEEE Military Communications Conference (MILCOM), 2007, IEEE, Pages:3105-3111, 2155-7578
| Author Web Link | Open Access Link
Self-Managed Cell: A Middleware for Managing Body-Sensor Networks,
Keoh S L, Dulay N, Lupu E, Twidle K, Filho A, Sloman M, Heeps S, Strowes S, Sventek J,
4th Annual International Conference on Mobile and Ubiquitous Systems – Networking and Services, 2007, IEEE, Pages:1-5
| DOI | Publisher Web Link
Towards supporting interactions between self-managed cells,
Schaeffer A, Lupu E, Dulay N, Keoh SL, Twidle K, Sloman M, Heeps S, Strowes S, Sventek J,
1st IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO), 2007, IEEE, Pages:224-233
| DOI | Publisher Web Link | Open Access Link
Trust transfer in distributed systems,
Dong C, Russello G, Dulay N ,
Joint iTrust and PST Conference on Privacy, Trust Management and Security, 2007, SPRINGER, Pages:17-29, 1571-5736
| Author Web Link
Policy Refinement for DiffServ Quality of Service Management,
Bandara A , Lupu EC , Russo A , Dulay N , Sloman M , Flegkas P , Charalambides M , Pavlou G,
IEEE Transactions on Network and Service Management, 2006, Vol:3, 1932-4537, Pages:2-13
| DOI | Author Web Link | Publisher Web Link
Privacy Preserving Trust Negotiation for Pervasive Healthcare,
Dong C, Dulay N,
Pervasive Computing Technologies for Healthcare, 2006
Issues in Developing Ubicomp Applications on Symbian Phones,
Pryce N, Huebscher M, Dulay N,
System Support for Future Mobile Computing Applications, 2006
An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health,
Strowes S, Badr N, Dulay N, Heeps S , Lupu E , Sloman M, Sventek J,
Intl. Workshop on Distributed Event-Based Systems (DEBS), 2006
| Author Web Link
Management Architecture and Mission Specification for Unmanned Autonomous Vehicles,
Asmare E , Dulay N , Kim H , Lupu E , Sloman M,
Systems Engineering for Autonomous Systems Defence Technology Centre Conference, 2006, Edinburgh, UK
| Author Web Link
Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management,
Charalambides M , Flegkas P , Pavlou G , Bandara A , Dulay N , Lupu E , Rubio-Loyola J , Russo A , Sloman M,
IFIP/IEEE Network Operations and Management Symposium (NOMS), 2006, IEEE Computer Society, Pages:-, 1542-1201
| DOI | Publisher Web Link | Author Web Link
Fusing multiple sources of context data of the same context type,
Huebscher M, McCann J, Dulay N,
1st International Conference on Hybrid Information Technology, 2006, IEEE COMPUTER SOC, Pages:406-415
| Author Web Link | Open Access Link
Autonomic Management for Ubiquitous e-Health Systems,
Dulay N , Heeps S , Lupu E , Sharma O , Sloman M , Sventek J,
UK e-Science Programme All Hands Meeting (AHM), 2005
| Author Web Link
Combined Hardware-Software Architecture for Network Flow,
Luk W , Yusuf S , Sloman M , Brown A , Lupu C , Dulay N,
Intl Conf on Engineering of Reconfigurable Systems and Algorithms (ERSA), 2005, Pages:149-155
| Author Web Link | Publisher Web Link
Policy conflict analysis for quality of service management,
Charalambides M, Flegkas P, Pavlou G, Bandara A, Lupu E, Russo A, Dulay N, Sloman M, Rubio-Loyola J,
6th IEEE International Workshop on Policies for Distributed Systems and Networks, 2005, IEEE, Pages:99-108
| DOI | Publisher Web Link | Author Web Link
Self-Managed Cells and their Federation,
Sventek J , Badr N , Dulay N , Heeps S , Lupu E , Sloman M,
Intl. Workshop on Adaptive and Self-Managing Enterprise Applications (ASEA), 2005
| Author Web Link | Publisher Web Link
Policy Refinement for DiffServ Quality of Service Management,
Bandara A, Lupu E, Russo A , Dulay N, Sloman M, Flegkas P, Charalambides M, Pavlou G,
9th IFIP/IEEE Intl. Symp. on Integrated Management (IM), 2005
| Author Web Link
A combined hardware-software architecture for network flow analysis,
Yusuf S, Luk W, Sloman M, Dulay N, Lupu E,
International Conference on Engineering of Reconfigurable Systems and Algorithms, C S R e A Press, Pages:149-155
| Author Web Link
Policy refinement for DiffServ quality of service management,
Bandara A, Lupu E, Russo A, Dulay N, Sloman M, Flegkas P, Charalambides M, Pavlou G,
9th IFIP/IEEE International Symposium on Integrated Network Management (IM), 2005 IEEE, Pages:469-482
| DOI | Publisher Web Link
Self-managed cells for ubiquitous systems,
Dulay N, Lupu E, Sloman M, Sventek J, Badr N, Heeps S,
3rd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 2005, SPRINGER-VERLAG BERLIN, Berlin, Pages:1-6, ISSN:0302-9743
| DOI | Publisher Web Link
CareGrid: Autonomous Trust Domains for Healthcare Applications,
Dulay N , Lupu E, Sloman M , Bacon J , Ingram D, Moody K,
ERCIM Special Issue, 2005
| Author Web Link
A framework for contextual mediation in mobile and ubiquitous computing applied to the context-aware adaptation of maps,
Chalmers D, Dulay N, Sloman M,
Personal and Ubiquitous Computing, 2004, Vol:8, ISSN:1617-4909, Pages:1-18
| DOI | Publisher Web Link
Towards reasoning about context in the presence of uncertainty,
Chalmers D, Dulay N, Sloman M,
1st international workshop on advanced context modelling, reasoning and management, 2004, Nottingham, UK, Pages:1-6
| Open Access Link
Meta data to support context aware mobile applications,
Chalmers D, Dulay N, Sloman M,
IEEE international conference on mobile data management (MDM), 2004, IEEE Computer Soc, Los Alamitos, Pages:199-210
| DOI | Publisher Web Link | Open Access Link
Compiling policy descriptions into reconfigurable firewall processors,
Lee T, Yusuf S, Luk W, Sloman M, Lupu E, Dulay N,
11th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), 2003, IEEE, Los Alamitos, Pages:39-48
| DOI | Publisher Web Link
Irregular reconfigurable CAM structures for firewall applications,
Lee T, Yusuf S, Luk W, Sloman M, Lupu E, Dulay N,
13th international conference on field-programmable logic and applications (FPL), 2003, Lisbon, Portugal, Springer-Verlag, Berlin, Pages:890-899
| DOI | Publisher Web Link | Author Web Link
Structuring devolved responsibility in network and systems management,
Lupu E, Dulay N, Damianou N, Sloman M,
Multimedia management, 2003, Editor(s): Neuman de Souza, Agoulmine, Kogan Page Science, Pages:34-49, ISBN:9781903996232
Contextual mediation enables appropriate data selection,
Chalmers D, Sloman M, Dulay N,
ERCIM News, 2003, Vol:54, Pages:15-16
| Publisher Web Link
Development framework for firewall processors,
Lee T, Yusuf S, Luk W, Sloman M, Lupu E, Dulay N,
IEEE International Conference on Field-Programmable Technology (FPT), Chinese University of Hong Kong, New Territories, Peoples Republic of China, 2002, IEEE, New York, Pages:352-355
| DOI | Author Web Link
Tools for domain-based policy management of distributed systems,
Damianou N, Dulay N, Lupu E, Sloman A, Tonouchi T,
8th IEEE/IFIP Network Operations and Management Symposium (NOMS), 2002, IEEE, New York, Pages:203-217
| DOI | Publisher Web Link
Flexible security policies for mobile agent systems,
Montanari R, Stefanelli C, Dulay N,
Microprocessors and Microsystems, 2001, Vol:25, ISSN:0141-9331, Pages:93-99
| DOI | Author Web Link
A policy language for the management of distributed agents,
Dulay N, Damianou N, Lupu E, Sloman M,
Agent-oriented software engineering, AOSE 2001, Springer, Berlin, Pages:84-100, ISSN:0302-9743
| DOI | Publisher Web Link
A policy deployment model for the Ponder language,
Dulay N, Lupu E, Sloman M, Damianou N,
Integrated network management (IM): 2001 IEEE/IFIP integrated management strategies for the new millennium, IEEE, Piscataway, NJ, Pages:529-544
| DOI | Publisher Web Link | Author Web Link
Context-based specifications for data mediation to support mobile systems,
Chalmers D, Dulay N, Sloman M,
CaberNet workshop, Pisa, October 2001
| Author Web Link
Map adaptation for mobile systems,
Chalmers D, Sloman M, Dulay N,
10th international world-wide conference (WWW), 2001, Hong Kong, Pages:735-744
| DOI | Publisher Web Link
Policy-driven management of agent systems,
Corradi A, Dulay N, Montanari R, Stefanelli C,
International Workshop on Policies for Distributed Systems and Networks (POLICY), 2001, Springer-Verlag Berlin, Pages:214-229, 0302-9743
| DOI | Publisher Web Link | Author Web Link
The Ponder policy specification language,
Damianou N, Dulay N, Lupu E, Sloman M,
International Workshop on Policies for Distributed Systems and Networks (POLICY), 2001, Springer Verlag, Berlin, Pages:18-38, ISSN:0302-9743
| DOI | Publisher Web Link
Software Architecture Description,
Kramer J, Magee J , Ng K, Dulay N,
Software Architecture for Product Families: Principles and Practice, 2000, Editor(s): Van Der Linden, Jazayeri, Addison Wesley
Structuring Devolved Responsibilities in Network and Systems Management,
Lupu E, Dulay N, Damianou N, Sloman M,
Networking and Information Systems Journal, 2000, Vol:3, Pages:261-277
Ponder: A Language for Specifying Security and Management Policies for Distributed Systems,
Damianou N, Dulay N, Lupu E, Sloman M,
The Language Specification – Version 2.2, 2000, Imperial College, Department of Computing
| Open Access Link
Managing Security in Object-Based Systems Using Ponder,
Damianou N, Dulay N, Lupu E, Sloman M,
6th EUNICE Open European Summer School, 2000, Enschede, The Netherlands
Ponder: An Object-oriented Language for Specifying Security and Management Policies,
Damianou N, Dulay N, Lupu E, Sloman M,
10th Workshop for PhD Students in Object-Oriented Systems (PhDOOS), 2000, Sophia Antipolis, France
Ponder: Realising enterprise viewpoint concepts,
Lupu E, Sloman M, Dulay N, Damianou N,
4th International Conference on Enterprise Distributed Object Computing (EDOC), 2000, IEEE COMPUTER SOC, Pages:66-75
| DOI | Publisher Web Link | Open Access Link
Towards a Runtime Object Model for the Ponder Policy Language,
Dulay N, Lupu E , Sloman M, Damianou N,
7th Workshop of the Open View University Association (OVUA), 2000, Santorini, Greece
Architectural Support for Managing Nomadic Applications and Services,
Dulay N, Pryce N,
HP OUVA Workshop, 1999, Bologna, Italy
Dynamic Architectures and Architectural Styles for Distributed Programs,
Pryce N, Dulay N,
IEEE Workshop on Future Trends in Distributed Computing Systems (FTDCS), 1999, South Africa, IEEE Computer Society, Pages:-
| DOI | Publisher Web Link
A Configurable Protocol Architecture for CORBA Environments,
Crane S, Dulay N,
3rd International Symposium on Autonomous Decentralized Systems (ISADS),
1997, IEEE, Pages:187-194
| Author Web Link
A Visual Approach to Distributed Programming,
Magee J, Kramer J, Dulay N, Ng K,
Tools and Environments for Distributed Systems, 1996, Kluwer
Configuration Management for Distributed Software Services,
Crane S, Dulay N, Fossa H, Kramer J, Magee J, Sloman M, Twidle K,
IFIP/IEEE International. Symposium on Integrated Network Management (ISINM), 1995, Chapman & Hall Ltd, Pages:29-42
| Author Web Link | Open Access Link | Publisher Web Link
Specifying Distributed Software Architectures,
Magee J, Dulay N, Eisenbach S, Kramer J,
Fifth European Software Engineering Conference (ESEC), 1995 , Barcelona, Springer, Pages:-
| DOI | Publisher Web Link
Ng K, Kramer J, Magee J, Dulay N,
The Software Architect’s Assistant – A Visual Environment for Distributed Programming,
Proceedings of 28th HICSS, 1995, Hawaii, Pages:254-263
| DOI
The Regis Toolkit for Distributed Object-Oriented Programming,
Dulay N,
OOPS Newsletter, 1995, Pages:10-13
Regis: A Constructive Development Environment for Distributed Programs,
Magee J, Dulay N, Kramer J,
Distributed Systems Engineering Journal, 1994, Vol:1, 0967-1846, Pages:304-312
| DOI
Structuring Parallel and Distributed Programs,
Magee J, Dulay N, Kramer J,
Software Engineering Journal, 1993, Vol:8, ISSN:0268-6961, Pages:73-82
| Author Web Link
Configuring Object Based Distributed Programs in REX,
Magee J, Kramer J, Sloman M, Dulay N,
Distributed Computing Systems, 1994, IEEE Computer Society Press, Pages:187-205
Configuring Object Oriented Programs in REX,
Kramer J, Magee J, Sloman M, Dulay N,
Software Engineering Journal, 1992, Vol:7, ISSN:0268-6961, Pages:139-149
| Publisher Web Link
A Constructive Development Environment for Parallel and Distributed Programs,
Magee J, Dulay N, Kramer J.,
Proceedings 2nd IEEE International Workshop on Configurable Distributed Systems (IWCDS-2), 1992, IEEE Computer Society Press, Pages:4-14
| DOI | Publisher Web Link
MP: A Programming Environment for Multicomputers,
Magee J, Dulay N,
Programming Environments for Parallel Computing (PEPC), 1992, North-Holland, Pages:1-16
| Publisher Web Link
Structuring parallel and distributed programs,
Magee J, Dulay N, Kramer J,
International Workshop on Configurable Distributed Systems (CDS), 1992, IEEE, Pages:102-117
| Publisher Web Link
A configuration approach to parallel programming,
Magee J, Dulay N,
Parallel Architectures and Languages Europe (PARLE), Lecture Notes in Computer Science Volume 506, 1991, pp 313-330
| DOI | Publisher Web Link | Author Web Link
Distributed system construction: Experience with the conic toolkit,
Dulay N, Kramer J, Magee J, Sloman M, Twidle K,
Proceedings of the International Workshop on Experiences with Distributed Systems, 1988, LNCS 309, Springer-Verlag, Pages:189-212, ISSN:0302-9743
| DOI | Publisher Web Link