Home > Publications

Publications

41561 - 41570 out of 43,264Page size: 10
  1. Published

    Using GAs to create a waveguide model of the oral vocal tract

    Cooper, C., Howard, D. M. & and Tyrrell, A. M., 2004, In: Lecture Notes in Computer Science. 3005-200, p. 280-288 9 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    Using GAs to create a waveguide model of the oral vocal tract: APPLICATIONS OF EVOLUTIONARY COMPUTING

    Cooper, C. H. V., Howard, D. M. & Tyrrell, A. M., 2004, APPLICATIONS OF EVOLUTIONARY COMPUTING. Raidl, GR. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 280-288 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Using genetic algorithms to uncover individual differences in how humans represent facial emotion

    Carlisi, C., Reed, K., Helmink, F., Lachlan, R., Cosker, D., Viding, E. & Mareschal, I., 13 Oct 2021, In: Royal Society Open Science. 8, 10

    Research output: Contribution to journalArticlepeer-review

  4. Unpublished

    Using Gesture to Support Language

    Wray, C., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  5. Published

    Using Grounded Theory to Explore Employees' Brand-Oriented Behaviors

    Gill-Simmen, L., 2019, In: SAGE Research Methods Cases.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Using Human Security to Harness Human Rights in the Post-COVID World

    Gilder, A., 24 Mar 2021, Völkerrechtsblog.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  10. Published

    Using IP Rights to Protect Human Rights: Copyright for ‘Revenge Porn’ Removal

    O'Connell, A. & Bakina, K., Sep 2020, In: Legal Studies. 40, 3, p. 442-457 16 p.

    Research output: Contribution to journalArticlepeer-review