Coronavirus (Covid-19): Latest updates and information
Skip to main content Skip to navigation

Matthew Leeke - Publications

  • Bradbury, M. and Jhumka, A. and Leeke, M. (2018) Hybrid Online Protocols for Source Location Privacy in Wireless Sensor Networks. Journal of Parallel and Distributed Computing. ISSN: 0743-7315.
  • Fairbrother, J. and Leeke, M. (2017) On Basis Sets Variables for Efficient Error Detection. In: 15th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC'17), 6-11th November, 2017, Florida, USA.
  • Leeke, M. (2017) Simultaneous Fault Models for the Generation of Efficient Error Detection Mechanisms. In: 22nd International Symposium on Software Reliability Engineering (ISSRE’17), 23rd–26th October, 2017, Toulouse, France.
  • Laikin, J. and Bradbury, M. and Gu, C. and Leeke, M. (2016) Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources. In: 15th IEEE International Conference on Communication Systems (ICCS'16), 14-16th December, Shenzhen, China.
  • Gu, C. and Bradbury, M. and Jhumka, A. and Leeke, M. (2015) Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks. In: 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'15), 18-20th November 2015, Zhangjiajie, China.
  • Bradbury, M. and Jhumka, A. and Leeke, M. (2015) A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks. In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM'15), 22-24th August 2015, Helsinki, Finland.
  • Jhumka, A. and Bradbury, M. and Leeke, M. (2015) Fake Source-based Source Location Privacy in Wireless Sensor Networks, Concurrency and Computation: Practice and Experience. ISSN 1532-0634.
  • Marchant, J. and Griffiths, N and Leeke, M. (2015) Manipulating conventions in a particle-based topology. In: 10th Coordination, Organizations, Institutions and Norms in Agent Systems Workshop at 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'15), 4-5th May 2015, Istanbul, Turkey.
  • Thomason, A. and Griffiths, N. and Leeke, M. (2014) Extracting Meaningful User Locations from Temporally Annotated Geospatial Data, In: International Conference on Mobility and Smart Cities (Mobility-IoT'14), 27-28th October 2014, Rome, Italy.
  • Thomason, A. and Leeke, M. and Griffiths, N. (2014) Understanding the Impact of Data Sparsity and Duration for Location Prediction Applications, In: International Conference on Mobility and Smart Cities (Mobility-IoT'14), 27-28th October 2014, Rome, Italy.
  • Coetzee, P. and Leeke, M. and Jarvis, S. (2014) Towards Unified Secure On- and Off-Line Analytics at Scale, Parallel Computing. ISSN 0167-8191.
  • Marchant, J. and Griffiths, N. and Leeke, M. (2014) Destabilising Conventions: Characterising the Cost, In: 8th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO'14), 2014, London, United Kingdom.
  • Marchant, J. and Griffiths, N. and Leeke, M. and Franks, H. (2014) Destabilising Conventions using Temporary Interventions, In: 17th International Workshop on Coordination, Organisations, Institutions and Norms (COIN’14) - co-located with the 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS’14), 6th June 2014, Paris, France.
  • Thomason, A and Leeke, M. and Bradbury, M. and Jhumka, A. (2013) Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'13), 16-18 July 2013, Melbourne, Australia.
  • Leeke, M. and Jhumka, A. and Anand, S.S. (2013) Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors. The Computer Journal. ISSN BXS049.
  • Jhumka, A. and Bradbury, M. and Leeke, M. (2012) Towards Understanding Source Location Privacy in Wireless Sensor Networks Through Fake Sources. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'12), 25-27 June 2012, Liverpool, UK.
  • Jhumka, A. and Leeke, M. (2011) The Early Identification of Detector Locations in Dependable Software. In: 22nd International Symposium on Software Reliability Engineering (ISSRE'11), November 29th-December 2nd 2011, Hiroshima, Japan.
  • Chester, A.P. and Leeke, M. and Al-Ghamdi, M. and Jhumka, A. and Jarvis, S.A. (2011) A Framework for Data Center Scale Dynamic Resource Allocation Algorithms. In: Proceedings of the 11th IEEE International Conference on Scalable Computing and Communications (SCALCOM'11), 31st August - 2nd September, 2011, Pafos, Cyprus.
  • Leeke, M. and Jhumka, A. (2011) An Automated Wrapper-based Approach to the Design of Dependable Software. In: 4th International Conference on Dependability (DEPEND'11), August 21-27th 2011, Nice, France.
  • Chester, A.P. and Leeke, M. and Al-Ghamdi, M. and Jarvis, S.A. and Jhumka, A. (2011) A Modular Failure-Aware Resource Allocation Architecture for Cloud Computing. In: Proceedings of the UK Performance Engineering Workshop (UKPEW'11), 7-8th July, 2011, Bradford, United Kingdom.
  • Leeke, M. and Arif, S. and Jhumka, A. and Anand, S.S. (2011) A Methodology for the Generation of Efficient Error Detection Mechanisms. In: 41st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'11), 27th-30th June 2011, Hong Kong, China.
  • Jhumka, A. and Leeke, M. and Shrestha, S. (2011) On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy. The Computer Journal, 54 (6).
  • Hammond, S.D. and Jarvis, S.A. and Leeke, M., eds. (2010) Proceedings of the 26th UK Performance Engineering Workshop (UKPEW 2010). UK Performance Engineering Workshop . Performance Computing and Visualisation, Department of Computer Science, University of Warwick, Coventry, UK. ISBN 978-0-9559703-2-0.
  • Shrestha, S. and Leeke, M. and Jhumka, A. (2010) On the Tradeoff Between Privacy and Energy in Wireless Sensor Networks. In: UK Performance Engineering Workshop (UKPEW'10), 9-10th July 2010, Coventry, UK.
  • Leeke, M. and Jhumka, A. (2010) Towards Understanding the Importance of Variables in Dependable Software. In: 8th European Dependable Computing Conference (EDCC'10), April 28th-30th 2010, Valencia, Spain.
  • Jhumka, A. and Leeke, M. (2009) Issues on the Design of Efficient Fail-Safe Fault Tolerance. In: 20th International Symposium on Software Reliability Engineering (ISSRE'09), November 16th-19th 2009, Mysuru, India.
  • Leeke, M. and Jhumka, A. (2009) Evaluating the Use of Reference Run Models in Fault Injection Analysis. In: Proceedings of the 15th IEEE Pacific Rim
    International Symposium on Dependable Computing (PRDC'09), 16-18th November 2009, Shanghai, China.

  • Leeke, M. and Jhumka, A. (2009) Beyond The Golden Run: Evaluating the Use of Reference Run Models in Fault Injection Analysis. In: UK Performance Engineering Workshop (UKPEW 2009), 6-7th July 2009, Leeds, UK.
  • Leeke, M. (2008) Constuctivism, Empirical Modelling and NIM , The 4th Warwick Empirical Modelling Bulletin (WEB-EM-04), June 3rd, University of Warwick, Coventry, UK
  • Leeke, M. and Chan, H.F. and Dawson, A. and Ingram, A.G. and Hartley, M. and Howlin, C. (2008) Person Tracking and Behaviour Monitoring Across A Multi-Camera Network, Teachnical Report, May 14th, University of Warwick, UK
  • Leeke, M. (2007) Reversible Digital Watermarking, Technical Report, April 9th, University of Warwick, UK