Search concepts
|
Selected filters
|
- 2,150 - 2,200 out of 47,614 results
Search results
-
An Analysis of Cause-Related Marketing Implementation Strategies through Social Alliance: Partnership Conditions and Strategic Objectives
Liu, G. & Ko, W. W., 2011, In: Journal of Business Ethics. 100, 2, p. 253-281Research output: Contribution to journal › Article › peer-review
-
An analysis of core-mantle boundary Stoneley mode sensitivity and sources of uncertainty
Robson, A., Lau, H., Koelemeijer, P. & Romanowicz, B., 29 Oct 2021, In: Geophysical Journal International. ggab448.Research output: Contribution to journal › Article › peer-review
Open Access -
An Analysis of Cyclical Interdependencies in Critical Infrastructures
Svendsen, N. & Wolthusen, S. D., 3 Oct 2007, Proc. Second International Workshop on Critical Information Infrastructures Security (CRITIS 2007). Springer-Verlag, p. 25-36Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
An Analysis of DepenDNS
Alfardan, N. & Paterson, K., 2010, Information Security. Springer, Vol. 6531. p. 31-37 (Lecture Notes in Computer Science).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
An analysis of environmental management and sustainability in SMEs
Shah, S., Ganji, E. N. & Hasan, S., 15 Aug 2017, In: WSEAS Transactions on Environment and Development. 13, p. 137-149 13 p.Research output: Contribution to journal › Article › peer-review
-
An Analysis of ERP decision making practice and consequences for subsequent system life cycle stages - A case study
Bernroider, E. W. N., 2007, Decision Support for Global Enterprises - Annals of Information Systems. Kulkarni, U., Power, D. J. & Sharda, R. (eds.). Vol. 2. p. 195-206Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
An Analysis of Job Satisfaction and Job Satisfier Factors among Hospital Employees
Mosadegh Rad, A., 2008, In: Journal of Isfahan faculty of administration science and Economy. p. 49-66Research output: Contribution to journal › Article › peer-review
-
An Analysis of Methodological and Quantitative Aspects in the Evaluation of Thematic Segmentation Algorithms
Georgescul, M., Clark, A. & Armstrong, S., 2006.Research output: Contribution to conference › Paper
-
An Analysis of NIST SP 800-90A
Woodage, J. & Shumow, D., 24 Apr 2019, (E-pub ahead of print) Advances in Cryptology - EUROCRYPT 2019. Ishai, Y. & Rijmen, V. (eds.). p. 151-180 30 p. (Lecture Notes in Computer Science; vol. 11477).Research output: Chapter in Book/Report/Conference proceeding › Chapter
Open AccessFile780 Downloads (Pure) -
An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank
Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 3. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
An Analysis of Primality Testing and Its Use in Cryptographic Applications
Massimo, J., 2020, (Unpublished) 209 p.Research output: Thesis › Doctoral Thesis
File1662 Downloads (Pure) -
An Analysis of Road Accidents in Great Britain
Santangelo, N. E., 2020, (Unpublished)Research output: Thesis › Doctoral Thesis
File140 Downloads (Pure) -
An Analysis of SAFER
Murphy, S., 1998, In: Journal of Cryptology. 11, p. 235-251 17 p.Research output: Contribution to journal › Article › peer-review
File15 Downloads (Pure) -
An Analysis of Service Degradation Attacks against Real-Time MPLS Networks
Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
An analysis of the 3gpp-MAC scheme
Knudsen, L. R. & Mitchell, C. J., 2001, Proceedings of WCC 2001, Paris, France, 8-12 January 2001. Augot, D. & Carlet, C. (eds.). p. 319-328 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile85 Downloads (Pure) -
An analysis of the energetic reward offered by field bean (Vicia faba) flowers : Nectar, pollen, and operative force
Bailes, E. J., Pattrick, J. G. & Glover, B. J., Mar 2018, In: Ecology and Evolution. 8, 6, p. 3161-3171 11 p.Research output: Contribution to journal › Article › peer-review
Open Access22 Downloads (Pure) -
An Analysis of the Hermes8 Stream Ciphers
Babbage, S., Cid, C., Pramstaller, N. & Raddum, H., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007. Springer, Vol. 4586. p. 1-10 11 p. (Lecture Notes in Computer Science - LNCS; vol. 4586).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
An Analysis of the Knowledge and Use of English Collocations by French and Japanese Learners
Kurosaki, S., 2012, (Unpublished) 262 p.Research output: Thesis › Doctoral Thesis
File1141 Downloads (Pure) -
An Analysis of the Late Roman Army in the Western section of the Notitia Dignitatum.
Pearce, S., 2022, (Unpublished)Research output: Thesis › Doctoral Thesis
File8 Downloads (Pure) -
An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems (UKAIS)
Ameen, N. & Willis, R., 2018, An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
An analysis of the motion signal distributions emerging from locomotion through a natural environment
Zanker, J. M. & Zeil, J., 2002, Biologically Motivated Computer Vision 2002. Wallraven, C., Poggio, T. A., Lee, S. . W. & Bülthoff, H. H. (eds.). Berlin Heidelberg: Springer-Verlag, p. 146-156 (Lecture Notes in Computer Science).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
An analysis of the motion signal distributions generated by locomotion in a natural environment
Zanker, J. M. & Zeil, J., 2002, Dynamic Perception. Workshop of GI section 1.0.04 “Image Understanding” and the European Networks MUHCI and ECOVISION. Würtz, R. P. & Lappe, M. (eds.). Berlin: Akademische Verlagsgesellschaft, p. 203-208Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
An Analysis of the Perceived Value of Using Knowledge Management Systems in Supporting Decision Making Processes
Abdelrahman, M., Papamichail, K. & French, S., 2010, 11th European Conference on Knowledge Management ECKM . p. 1115-1128Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
An analysis of the properties and the performance of WiFi RTT for indoor positioning in non-line-of-sight environments
Feng, X., Nguyen, K. A. & Luo, Z., 12 Sept 2022. 17 p.Research output: Contribution to conference › Paper › peer-review
File9 Downloads (Pure) -
An Analysis of the Transport Layer Security Protocol
van der Merwe, T., 2018, (Unpublished) 229 p.Research output: Thesis › Doctoral Thesis
File1539 Downloads (Pure) -
An Analysis of the Unintended Outcomes of Performance Management Systems and How Social Learning Influences Employees to Engage in Behaviours Not Intended by Performance Management Systems
Aboubichr, B., 2019, (Unpublished)Research output: Thesis › Doctoral Thesis
203 Downloads (Pure) -
An Analysis of the XSL Algorithm
Cid, C. & Gaetan, L., Dec 2005, Advances in Cryptology - ASIACRYPT 2005. Springer, Vol. 3788. p. 333-352 20 p. (Lecture Notes in Computer Science - LNCS; vol. 3788).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile63 Downloads (Pure) -
An Analysis of TLS 1.3 and its use in Composite Protocols
Hoyland, J., 2018, (Unpublished) 273 p.Research output: Thesis › Doctoral Thesis
File1299 Downloads (Pure) -
An anatomical account of somatoparaphrenia
Gandola, M., Invernizzi, P., Sedda, A., Ferrè, E. R., Sterzi, R., Sberna, M., Paulesu, E. & Bottini, G., Oct 2012, In: Cortex. 48, 9, p. 1165-78 14 p.Research output: Contribution to journal › Article › peer-review
-
An ancestral non-proteolytic role for presenilin proteins in multicellular development of the social amoeba Dictyostelium discoideum
Ludtmann, M., Otto, G., Schilde, C., Chen, Z-H., Allan, C., Brace, S., Beesley, P., kimmel, A., Fisher, P., Killick, R. & Williams, R., 1 Apr 2014, In: Journal of Cell Science. 127, p. 1576-1584Research output: Contribution to journal › Article › peer-review
File69 Downloads (Pure) -
An ANFIS-PI based boost converter control scheme
Darvill, J., Tisan, A. & Cirstea, M., 1 Oct 2015, p. 632-639. 8 p.Research output: Contribution to conference › Paper › peer-review
-
An annotated critical edition of Demetrios Chrysoloras’Dialogue on Demetrios Kydones’ Antirrhetic against Neilos Kabasilas
Pasiourtides, V., 2013, (Unpublished) 434 p.Research output: Thesis › Doctoral Thesis
File3510 Downloads (Pure) -
An annotated critical edition of Emperor Manuel II Palaeologus’ "Seven Ethico-political Orations"
Kakkoura, C., 2013, (Unpublished) 523 p.Research output: Thesis › Doctoral Thesis
File4036 Downloads (Pure) -
An annotated edition of the Refutation of the Errors of the Latins by Matthaios Blastares
Palaiologos, K., 2011, (Unpublished) 539 p.Research output: Thesis › Doctoral Thesis
File1278 Downloads (Pure) -
An annotated translation of Emperor Manuel II Palaeologus' treatise On the Procession of the Holy spirit, discourse On the Order in the Trinity, and Letter to Alexios Iagoupes
Dendrinos, C., 2026, (In preparation) Brepols. (Corpus Christianorum Translations)Research output: Book/Report › Scholarly edition
-
An Annotated Translation of John Kantakouzenos’ Histories, Book III, Chapters 1-30
McLaughlin, B., 2017, (Unpublished) 491 p.Research output: Thesis › Doctoral Thesis
File4630 Downloads (Pure) -
An annually resolved climate record for MIS 11 from Marks Tey, eastern England: Investigating landscape response to abrupt events during the closest climatic analogue to the Holocene
Tye, G., 26 Mar 2015, (Unpublished) 378 p.Research output: Thesis › Doctoral Thesis
File325 Downloads (Pure) -
An anonymous and undeniable payment scheme
Chen, LI. & Mitchell, C. J., 1997, Proceedings of the First International Conference on Information and Communications Security, ICICS '97, Beijing, China, November 1997. Han, Y., Okamoto, T. & Qing, S. (eds.). Springer-Verlag, p. 478-482 5 p. (Lecture Notes in Computer Science; no. 1334).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
File101 Downloads (Pure) -
An Anthology of British Neo-Latin Literature
Houghton, L. (ed.), Manuwald, G. (ed.) & Nicholas, L. R. (ed.), 2020, London: Bloomsbury Academic. 312 p.Research output: Book/Report › Book
-
An Apollonian appreciation of Google Earth
Eades, G., Sept 2010, In: Geoforum. 41, 5, p. 671-673 3 p.Research output: Contribution to journal › Literature review › peer-review
19 Downloads (Pure) -
An apology with a tiny monetary compensation is no more effective than a verbal apology alone
Imada, H., Yamamoto, A. & Tsudaka, G., 18 May 2023, In: Letters on Evolutionary Behavioral Science. 14, 1Research output: Contribution to journal › Article › peer-review
Open Access -
An apparatus for sequentially sampling unconsolidated cohesive sediments exposed on salt marsh and river cliffs
Allen, J. R. L. & French, P., 1989, In: Sedimentary Geology. 61, p. 151-154 5 p.Research output: Contribution to journal › Article › peer-review
-
An Appealing Treasury
McSweeney, B., 1983, In: The Accountant. 13 OctoberResearch output: Contribution to journal › Article › peer-review
-
An application of field-based photogrammetry as a virtual outcrop building target: a key example from Santorini’s northern caldera wall, Greece
Bonali, F. L., Fallati, L., Antoniou, V., Drymoni, K., Mariotto, F. P., Corti, N., Tibaldi, A., Gudmundsson, A. & Nomikou, P., 2021.Research output: Contribution to conference › Abstract › peer-review
Open AccessFile55 Downloads (Pure) -
An application of the Theory of Planned Behaviour to truck driving behaviour and compliance with regulations
Poulter, D., Chapman, P., Bibby, P., Clarke, D. & Crundall, D., 2008, In: Accident Analysis and Prevention. 40, p. 2058-2064Research output: Contribution to journal › Article › peer-review
-
An Application of Univariate and Multivariate Approaches in fMRI to Quantifying the Hemispheric Lateralization of Acoustic and Linguistic Processes
McGettigan, C., Evans, S., Rosen, S., Agnew, Z. K., Shah, P. & Scott, S. K., Mar 2012, In: Journal of Cognitive Neuroscience. 24, 3, p. 636-652 17 p.Research output: Contribution to journal › Article › peer-review
-
An application-oriented framework for wireless sensor network key establishment
Martin, K. M. & Paterson, M. B., 2008, Electronic Notes in Theoretical Computer Science: Proceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07. 2 ed. Vol. 192. p. 31-41 11 p. (Electronic Notes in Theoretical Computer Science).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
An Appraisal of Australian Maritime Strategy: Part I
Haggman, A., 7 Aug 2015, Future Foreign Policy.Research output: Other contribution
-
An Appraisal of Australian Maritime Strategy: Part II
Haggman, A., 28 Nov 2015, Future Foreign Policy.Research output: Other contribution
-
An approach to early evaluation of informational privacy requirements
Barn, B. S., Primiero, G. & Barn, R., 13 Apr 2015, p. 1370-1375. 6 p.Research output: Contribution to conference › Paper › peer-review