default search action
BibTeX records: James Barlow
@article{DBLP:journals/orgsci/DatteeB17, author = {Brice Datt{\'{e}}e and James Barlow}, title = {Multilevel Organizational Adaptation: Scale Invariance in the Scottish Healthcare System}, journal = {Organ. Sci.}, volume = {28}, number = {2}, pages = {301--319}, year = {2017}, url = {https://doi.org/10.1287/orsc.2017.1113}, doi = {10.1287/ORSC.2017.1113}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/orgsci/DatteeB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/BarlowBO12, author = {James Barlow and Steffen Bayer and Tiago Cravo Oliveira}, editor = {Richard Harper}, title = {Remote Care: Health at Home}, booktitle = {The Connected Home - The Future of Domestic Life}, pages = {269--279}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-0-85729-476-0\_13}, doi = {10.1007/978-0-85729-476-0\_13}, timestamp = {Tue, 16 May 2017 14:01:33 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/BarlowBO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/SharmaKBI11, author = {Aashish Sharma and Zbigniew Kalbarczyk and James Barlow and Ravishankar K. Iyer}, title = {Analysis of security data from a large computing organization}, booktitle = {Proceedings of the 2011 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2011, Hong Kong, China, June 27-30 2011}, pages = {506--517}, publisher = {{IEEE} Compute Society}, year = {2011}, url = {https://doi.org/10.1109/DSN.2011.5958263}, doi = {10.1109/DSN.2011.5958263}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/SharmaKBI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hij/BayerPCHB10, author = {Steffen Bayer and Christina Petsoulas and Benita Cox and Alasdair Honeyman and James Barlow}, title = {Facilitating stroke care planning through simulation modelling}, journal = {Health Informatics J.}, volume = {16}, number = {2}, pages = {129--143}, year = {2010}, url = {https://doi.org/10.1177/1460458209361142}, doi = {10.1177/1460458209361142}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hij/BayerPCHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SharmaKIB10, author = {Aashish Sharma and Zbigniew Kalbarczyk and Ravishankar K. Iyer and James Barlow}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Analysis of Credential Stealing Attacks in an Open Networked Environment}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {144--151}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.56}, doi = {10.1109/NSS.2010.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/SharmaKIB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.