Items where Author is "Malcolm, J."
Number of items: 32.
Article
Efficient Search for Plagiarism on the Web. (2008)
J. Malcolm
and
P.C.R. Lane
Plagiarism is easy, but also easy to detect. (2006)
C. Lyon,
R. Barrett
and
J. Malcolm
Embedding plagiarism education in the assessment process. (2006)
R. Barrett
and
J. Malcolm
Text similarity in academic conference papers. (2006)
J. Bao
and
J. Malcolm
A theoretical basis to the automated detection of copying between texts, and its practical implementation in the Ferret plagiarism and collusion detector. (2004)
C. Lyon,
R. Barrett
and
J. Malcolm
Incremental Retrieval of documents relevant to a topic. (2002)
C. Lyon,
J. Malcolm
and
R. Dickerson
Detecting Short Passages of Similar Text in Large Document Collections. (2001)
C. Lyon,
J. Malcolm
and
B. Dickerson
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001)
B. Christianson,
B. Crispo
and
J. Malcolm
Binding bit patterns to real world entities. (1998)
B. Christianson
and
J. Malcolm
Landscape analysis for multicast routing. (2006)
M.S. Zahrani,
M.J. Loomes,
J. Malcolm
and
A. Albrecht
Genetic local search for multicast routing with pre-processing by logarithmic simulated annealing. (2008)
M.S. Zahrani,
M.J. Loomes,
J. Malcolm,
A.Z.M. Dayem Ullah,
K. Steinhofel
and
A. Albrecht
Anonymous Context Based Role Activation Mechanism. (2005)
P. Das Chowdhury,
B. Christianson
and
J. Malcolm
Auditable Anonymous Delegation. (2005)
B. Christianson,
P. Das Chowdhury
and
J. Malcolm
Preface. (2011)
B. Christianson,
J. Malcolm,
B. Crispo
and
F. Stajano
Pictures Can’t Lie under Oath. (2000)
B. Christianson,
J. Malcolm
and
B. Robinson
Anonymous authentication. (2006)
P. Das Chowdhury,
J. Malcolm
and
B. Christianson
Delegation and not-so smart cards. (1999)
B. Christianson
and
J. Malcolm
Book Section
Snoop behaviour in multihop wireless networks. (2010)
P. Nambiar,
Hannan Xiao
and
J. Malcolm
Tackling the PAN’09 External Plagiarism Detection Corpus with a Desktop Plaigiarism Detector. (2009)
J. Malcolm
and
P.C.R. Lane
Using n-grams to rapidly characterise the evolution of software code. (2008)
A. Rainer,
P.C.R. Lane,
J. Malcolm
and
S. Scholz
Hierarchical Trustworthy Authentication for Pervasive Computing. (2007)
Hannan Xiao,
J. Malcolm
and
B. Christianson
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. (2007)
S.M. Bo,
Hannan Xiao,
A. Adereti,
J. Malcolm
and
B. Christianson
Joint Source Channel Coding for H.264 Compliant Stereoscopic Video Transmission. (2005)
P.Y. Yip,
J. Malcolm,
A. Fernando,
K.K. Loo
and
H.K. Arachchi
Theoretical analysis of TCP throughput in adhoc wireless networks. (2005)
Hannan Xiao,
K.C. Chua,
J. Malcolm
and
Y. Zhang