Home > Publications

Publications

41621 - 41630 out of 42,634Page size: 10
  1. Forthcoming

    Weak Messianic Power and the Holocaust

    Eaglestone, R., 2010, (Accepted/In press) The Politics to Come. Bradley, A. (ed.). London: Continuum, p. 131-140

    Research output: Chapter in Book/Report/Conference proceedingChapter

  2. Published

    Weak Synchrony Models and Failure Detectors for Message Passing (k-)Set Agreement

    Biely, M., Robinson, P. & Schmid, U., 2009, Principles of Distributed Systems, 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings. p. 285-299 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Weak Transitivity in Coercive Subtyping

    Luo, Y., Luo, Z. & Soloviev, S., 2003, Types for Proofs and Programs, Proc. of Inter Conf of TYPES'02. LNCS 2646. p. 220--239

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Weakly Hamiltonian-connected ordinary multipartite tournaments.

    Gutin, G., Bang-Jensen, J. & Huang, J., 1995, In: Discrete Mathematics. 138, 1-3, p. 63-74

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Weakness Plagues Ineffective Panacea

    McSweeney, B., 1985, In: Pass. December

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Weaknesses in shared RSA key generation protocols

    Blackburn, S. R., Blake-Wilson, S., Burmester, M. & Galbraith, S. D., 1999, Cryptography and Coding, 7th IMA International Conference, Cirencester. Walker, M. (ed.). Berlin: Springer, p. 300-306 7 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Weaknesses of protocols for updating the parameters of an established threshold scheme

    Martin, K. M. & Nakahara Jr, J., 2001, In: IEE Proc. Computers and Digital Techniques. 148, 1, p. 45-48 4 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Wealth, volume and stock market volatility: Case of Hong Kong

    Li, M. C., 2007, In: Applied Economics. 39, 15, p. 1937-1953

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Weaponising the Crusades: Justifying Terrorism and Political Violence

    Awan, A., 2 Jul 2019, The Crusades in the Modern World : Engaging the Crusades. Horswell, M. & Awan, A. N. (eds.). 1 ed. Routledge, Vol. 2. 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    Weapons of mass communication: The securitization of social networking sites

    Pinkerton, A., Young, S. & Dodds, K., Mar 2011, In: Political Geography. 30, 3, p. 115-117 3 p.

    Research output: Contribution to journalEditorialpeer-review