Search concepts
|
Selected filters
|
- 2,150 - 2,200 out of 47,474 results
Search results
-
An Analysis of Methodological and Quantitative Aspects in the Evaluation of Thematic Segmentation Algorithms
Georgescul, M., Clark, A. & Armstrong, S., 2006.Research output: Contribution to conference › Paper
-
An Analysis of NIST SP 800-90A
Woodage, J. & Shumow, D., 24 Apr 2019, (E-pub ahead of print) Advances in Cryptology - EUROCRYPT 2019. Ishai, Y. & Rijmen, V. (eds.). p. 151-180 30 p. (Lecture Notes in Computer Science; vol. 11477).Research output: Chapter in Book/Report/Conference proceeding › Chapter
Open AccessFile777 Downloads (Pure) -
An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank
Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 3. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
An Analysis of Primality Testing and Its Use in Cryptographic Applications
Massimo, J., 2020, (Unpublished) 209 p.Research output: Thesis › Doctoral Thesis
File1636 Downloads (Pure) -
An Analysis of Road Accidents in Great Britain
Santangelo, N. E., 2020, (Unpublished)Research output: Thesis › Doctoral Thesis
File130 Downloads (Pure) -
An Analysis of SAFER
Murphy, S., 1998, In: Journal of Cryptology. 11, p. 235-251 17 p.Research output: Contribution to journal › Article › peer-review
File15 Downloads (Pure) -
An Analysis of Service Degradation Attacks against Real-Time MPLS Networks
Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
An analysis of the 3gpp-MAC scheme
Knudsen, L. R. & Mitchell, C. J., 2001, Proceedings of WCC 2001, Paris, France, 8-12 January 2001. Augot, D. & Carlet, C. (eds.). p. 319-328 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile81 Downloads (Pure) -
An analysis of the energetic reward offered by field bean (Vicia faba) flowers : Nectar, pollen, and operative force
Bailes, E. J., Pattrick, J. G. & Glover, B. J., Mar 2018, In: Ecology and Evolution. 8, 6, p. 3161-3171 11 p.Research output: Contribution to journal › Article › peer-review
Open Access22 Downloads (Pure) -
An Analysis of the Hermes8 Stream Ciphers
Babbage, S., Cid, C., Pramstaller, N. & Raddum, H., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007. Springer, Vol. 4586. p. 1-10 11 p. (Lecture Notes in Computer Science - LNCS; vol. 4586).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
An Analysis of the Knowledge and Use of English Collocations by French and Japanese Learners
Kurosaki, S., 2012, (Unpublished) 262 p.Research output: Thesis › Doctoral Thesis
File1140 Downloads (Pure) -
An Analysis of the Late Roman Army in the Western section of the Notitia Dignitatum.
Pearce, S., 2022, (Unpublished)Research output: Thesis › Doctoral Thesis
File8 Downloads (Pure) -
An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems (UKAIS)
Ameen, N. & Willis, R., 2018, An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
An analysis of the motion signal distributions emerging from locomotion through a natural environment
Zanker, J. M. & Zeil, J., 2002, Biologically Motivated Computer Vision 2002. Wallraven, C., Poggio, T. A., Lee, S. . W. & Bülthoff, H. H. (eds.). Berlin Heidelberg: Springer-Verlag, p. 146-156 (Lecture Notes in Computer Science).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
An analysis of the motion signal distributions generated by locomotion in a natural environment
Zanker, J. M. & Zeil, J., 2002, Dynamic Perception. Workshop of GI section 1.0.04 “Image Understanding” and the European Networks MUHCI and ECOVISION. Würtz, R. P. & Lappe, M. (eds.). Berlin: Akademische Verlagsgesellschaft, p. 203-208Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
An Analysis of the Perceived Value of Using Knowledge Management Systems in Supporting Decision Making Processes
Abdelrahman, M., Papamichail, K. & French, S., 2010, 11th European Conference on Knowledge Management ECKM . p. 1115-1128Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
An analysis of the properties and the performance of WiFi RTT for indoor positioning in non-line-of-sight environments
Feng, X., Nguyen, K. A. & Luo, Z., 12 Sept 2022. 17 p.Research output: Contribution to conference › Paper › peer-review
File4 Downloads (Pure) -
An Analysis of the Transport Layer Security Protocol
van der Merwe, T., 2018, (Unpublished) 229 p.Research output: Thesis › Doctoral Thesis
File1520 Downloads (Pure) -
An Analysis of the Unintended Outcomes of Performance Management Systems and How Social Learning Influences Employees to Engage in Behaviours Not Intended by Performance Management Systems
Aboubichr, B., 2019, (Unpublished)Research output: Thesis › Doctoral Thesis
203 Downloads (Pure) -
An Analysis of the XSL Algorithm
Cid, C. & Gaetan, L., Dec 2005, Advances in Cryptology - ASIACRYPT 2005. Springer, Vol. 3788. p. 333-352 20 p. (Lecture Notes in Computer Science - LNCS; vol. 3788).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile56 Downloads (Pure) -
An Analysis of TLS 1.3 and its use in Composite Protocols
Hoyland, J., 2018, (Unpublished) 273 p.Research output: Thesis › Doctoral Thesis
File1285 Downloads (Pure) -
An anatomical account of somatoparaphrenia
Gandola, M., Invernizzi, P., Sedda, A., Ferrè, E. R., Sterzi, R., Sberna, M., Paulesu, E. & Bottini, G., Oct 2012, In: Cortex. 48, 9, p. 1165-78 14 p.Research output: Contribution to journal › Article › peer-review
-
An ancestral non-proteolytic role for presenilin proteins in multicellular development of the social amoeba Dictyostelium discoideum
Ludtmann, M., Otto, G., Schilde, C., Chen, Z-H., Allan, C., Brace, S., Beesley, P., kimmel, A., Fisher, P., Killick, R. & Williams, R., 1 Apr 2014, In: Journal of Cell Science. 127, p. 1576-1584Research output: Contribution to journal › Article › peer-review
File67 Downloads (Pure) -
An ANFIS-PI based boost converter control scheme
Darvill, J., Tisan, A. & Cirstea, M., 1 Oct 2015, p. 632-639. 8 p.Research output: Contribution to conference › Paper › peer-review
-
An annotated critical edition of Demetrios Chrysoloras’Dialogue on Demetrios Kydones’ Antirrhetic against Neilos Kabasilas
Pasiourtides, V., 2013, (Unpublished) 434 p.Research output: Thesis › Doctoral Thesis
File3496 Downloads (Pure) -
An annotated critical edition of Emperor Manuel II Palaeologus’ "Seven Ethico-political Orations"
Kakkoura, C., 2013, (Unpublished) 523 p.Research output: Thesis › Doctoral Thesis
File4031 Downloads (Pure) -
An annotated edition of the Refutation of the Errors of the Latins by Matthaios Blastares
Palaiologos, K., 2011, (Unpublished) 539 p.Research output: Thesis › Doctoral Thesis
File1272 Downloads (Pure) -
An annotated translation of Emperor Manuel II Palaeologus' treatise On the Procession of the Holy spirit, discourse On the Order in the Trinity, and Letter to Alexios Iagoupes
Dendrinos, C., 2026, (In preparation) Brepols. (Corpus Christianorum Translations)Research output: Book/Report › Scholarly edition
-
An Annotated Translation of John Kantakouzenos’ Histories, Book III, Chapters 1-30
McLaughlin, B., 2017, (Unpublished) 491 p.Research output: Thesis › Doctoral Thesis
File4542 Downloads (Pure) -
An annually resolved climate record for MIS 11 from Marks Tey, eastern England: Investigating landscape response to abrupt events during the closest climatic analogue to the Holocene
Tye, G., 26 Mar 2015, (Unpublished) 378 p.Research output: Thesis › Doctoral Thesis
File317 Downloads (Pure) -
An anonymous and undeniable payment scheme
Chen, LI. & Mitchell, C. J., 1997, Proceedings of the First International Conference on Information and Communications Security, ICICS '97, Beijing, China, November 1997. Han, Y., Okamoto, T. & Qing, S. (eds.). Springer-Verlag, p. 478-482 5 p. (Lecture Notes in Computer Science; no. 1334).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
File100 Downloads (Pure) -
An Anthology of British Neo-Latin Literature
Houghton, L. (ed.), Manuwald, G. (ed.) & Nicholas, L. R. (ed.), 2020, London: Bloomsbury Academic. 312 p.Research output: Book/Report › Book
-
An Apollonian appreciation of Google Earth
Eades, G., Sept 2010, In: Geoforum. 41, 5, p. 671-673 3 p.Research output: Contribution to journal › Literature review › peer-review
19 Downloads (Pure) -
An apology with a tiny monetary compensation is no more effective than a verbal apology alone
Imada, H., Yamamoto, A. & Tsudaka, G., 18 May 2023, In: Letters on Evolutionary Behavioral Science. 14, 1Research output: Contribution to journal › Article › peer-review
Open Access -
An apparatus for sequentially sampling unconsolidated cohesive sediments exposed on salt marsh and river cliffs
Allen, J. R. L. & French, P., 1989, In: Sedimentary Geology. 61, p. 151-154 5 p.Research output: Contribution to journal › Article › peer-review
-
An Appealing Treasury
McSweeney, B., 1983, In: The Accountant. 13 OctoberResearch output: Contribution to journal › Article › peer-review
-
An application of field-based photogrammetry as a virtual outcrop building target: a key example from Santorini’s northern caldera wall, Greece
Bonali, F. L., Fallati, L., Antoniou, V., Drymoni, K., Mariotto, F. P., Corti, N., Tibaldi, A., Gudmundsson, A. & Nomikou, P., 2021.Research output: Contribution to conference › Abstract › peer-review
Open AccessFile51 Downloads (Pure) -
An application of the Theory of Planned Behaviour to truck driving behaviour and compliance with regulations
Poulter, D., Chapman, P., Bibby, P., Clarke, D. & Crundall, D., 2008, In: Accident Analysis and Prevention. 40, p. 2058-2064Research output: Contribution to journal › Article › peer-review
-
An Application of Univariate and Multivariate Approaches in fMRI to Quantifying the Hemispheric Lateralization of Acoustic and Linguistic Processes
McGettigan, C., Evans, S., Rosen, S., Agnew, Z. K., Shah, P. & Scott, S. K., Mar 2012, In: Journal of Cognitive Neuroscience. 24, 3, p. 636-652 17 p.Research output: Contribution to journal › Article › peer-review
-
An application-oriented framework for wireless sensor network key establishment
Martin, K. M. & Paterson, M. B., 2008, Electronic Notes in Theoretical Computer Science: Proceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07. 2 ed. Vol. 192. p. 31-41 11 p. (Electronic Notes in Theoretical Computer Science).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
An Appraisal of Australian Maritime Strategy: Part I
Haggman, A., 7 Aug 2015, Future Foreign Policy.Research output: Other contribution
-
An Appraisal of Australian Maritime Strategy: Part II
Haggman, A., 28 Nov 2015, Future Foreign Policy.Research output: Other contribution
-
An approach to early evaluation of informational privacy requirements
Barn, B. S., Primiero, G. & Barn, R., 13 Apr 2015, p. 1370-1375. 6 p.Research output: Contribution to conference › Paper › peer-review
-
An appropriate verbal probability lexicon for communicating surgical risks is unlikely to exist
Harris, A. J. L., Tran, T., Jenkins, S., Su, A., He, L., Zhu, Y. & Gane, S., 28 Jul 2022, (E-pub ahead of print) In: Journal of Experimental Psychology: Applied.Research output: Contribution to journal › Article › peer-review
Open AccessFile44 Downloads (Pure) -
An approximate algorithm for combinatorial optimization problems with two parameters
Blokh, D. & Gutin, G., 1996, In: Australasian Journal of Combinatorics. 14, p. 157-164Research output: Contribution to journal › Article › peer-review
File242 Downloads (Pure) -
An Approximate Distribution for the Maximum Order Complexity
Murphy, S. & Erdmann, D., 1997, In: Designs, Codes and Cryptography. 10, p. 325-329 5 p.Research output: Contribution to journal › Article › peer-review
File15 Downloads (Pure) -
An Araki-Lieb-Thirring inequality for geometrically concave and geometrically convex functions
Audenaert, K., 2013, In: Linear Algebra and Its Applications. 438, 8, p. 3454-3462Research output: Contribution to journal › Article › peer-review
-
An Arbitrary Line
Cave, S., 30 Nov 2018, Broken Sleep Books. 98 p.Research output: Book/Report › Book
-
Anarchism and Critical Security Studies
Rossdale, C., 2014, (Accepted/In press) The Anarchist Imagination: Anarchism Encounters the Humanities and Social Sciences.Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
An architectural approach to mobility - The handover case study
Oliveira, C., Wermelinger, M., Fiadeiro, J. L. & Lopes, A., 1 Jan 2004, Proceedings - Fourth Working IEEE/IFIP Conference on Software Architecture (WICSA 2004). p. 305-308 4 p.Research output: Chapter in Book/Report/Conference proceeding › Other contribution