Home > Publications

Publications

37551 - 37575 out of 41,077Page size: 25
  1. Unpublished
  2. Unpublished

    An Annotated Translation of John Kantakouzenos’ Histories, Book III, Chapters 1-30

    McLaughlin, B., 2017, (Unpublished) 491 p.

    Research output: ThesisDoctoral Thesis

  3. Unpublished

    An annotated edition of the Refutation of the Errors of the Latins by Matthaios Blastares

    Palaiologos, K., 2011, (Unpublished) 539 p.

    Research output: ThesisDoctoral Thesis

  4. Unpublished
  5. Unpublished
  6. Published

    An ANFIS-PI based boost converter control scheme

    Darvill, J., Tisan, A. & Cirstea, M., 1 Oct 2015, p. 632-639. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  7. Published

    An ancestral non-proteolytic role for presenilin proteins in multicellular development of the social amoeba Dictyostelium discoideum

    Ludtmann, M., Otto, G., Schilde, C., Chen, Z-H., Allan, C., Brace, S., Beesley, P., kimmel, A., Fisher, P., Killick, R. & Williams, R., 1 Apr 2014, In: Journal of Cell Science. 127, p. 1576-1584

    Research output: Contribution to journalArticlepeer-review

  8. Published

    An anatomical account of somatoparaphrenia

    Gandola, M., Invernizzi, P., Sedda, A., Ferrè, E. R., Sterzi, R., Sberna, M., Paulesu, E. & Bottini, G., Oct 2012, In: Cortex. 48, 9, p. 1165-78 14 p.

    Research output: Contribution to journalArticlepeer-review

  9. Unpublished

    An Analysis of TLS 1.3 and its use in Composite Protocols

    Hoyland, J., 2018, (Unpublished) 273 p.

    Research output: ThesisDoctoral Thesis

  10. Published

    An Analysis of the XSL Algorithm

    Cid, C. & Gaetan, L., Dec 2005, Advances in Cryptology - ASIACRYPT 2005. Springer, Vol. 3788. p. 333-352 20 p. (Lecture Notes in Computer Science - LNCS; vol. 3788).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Unpublished
  12. Unpublished

    An Analysis of the Transport Layer Security Protocol

    van der Merwe, T., 2018, (Unpublished) 229 p.

    Research output: ThesisDoctoral Thesis

  13. Published

    An Analysis of the Perceived Value of Using Knowledge Management Systems in Supporting Decision Making Processes

    Abdelrahman, M., Papamichail, K. & French, S., 2010, 11th European Conference on Knowledge Management ECKM . p. 1115-1128

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    An analysis of the motion signal distributions generated by locomotion in a natural environment

    Zanker, J. M. & Zeil, J., 2002, Dynamic Perception. Workshop of GI section 1.0.04 “Image Understanding” and the European Networks MUHCI and ECOVISION. Würtz, R. P. & Lappe, M. (eds.). Berlin: Akademische Verlagsgesellschaft, p. 203-208

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    An analysis of the motion signal distributions emerging from locomotion through a natural environment

    Zanker, J. M. & Zeil, J., 2002, Biologically Motivated Computer Vision 2002. Wallraven, C., Poggio, T. A., Lee, S. . W. & Bülthoff, H. H. (eds.). Berlin Heidelberg: Springer-Verlag, p. 146-156 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  16. Published

    An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems (UKAIS)

    Ameen, N. & Willis, R., 2018, An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Unpublished

    An Analysis of the Knowledge and Use of English Collocations by French and Japanese Learners

    Kurosaki, S., 2012, (Unpublished) 262 p.

    Research output: ThesisDoctoral Thesis

  18. Published

    An Analysis of the Hermes8 Stream Ciphers

    Babbage, S., Cid, C., Pramstaller, N. & Raddum, H., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007. Springer, Vol. 4586. p. 1-10 11 p. (Lecture Notes in Computer Science - LNCS; vol. 4586).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    An analysis of the energetic reward offered by field bean (Vicia faba) flowers : Nectar, pollen, and operative force

    Bailes, E. J., Pattrick, J. G. & Glover, B. J., Mar 2018, In: Ecology and Evolution. 8, 6, p. 3161-3171 11 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    An analysis of the 3gpp-MAC scheme

    Knudsen, L. R. & Mitchell, C. J., 2001, Proceedings of WCC 2001, Paris, France, 8-12 January 2001. Augot, D. & Carlet, C. (eds.). p. 319-328 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

    Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Unpublished

    An Analysis of Primality Testing and Its Use in Cryptographic Applications

    Massimo, J., 2020, (Unpublished) 209 p.

    Research output: ThesisDoctoral Thesis

  23. Published

    An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 3. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. E-pub ahead of print

    An Analysis of NIST SP 800-90A

    Woodage, J. & Shumow, D., 24 Apr 2019, (E-pub ahead of print) Advances in Cryptology - EUROCRYPT 2019. Ishai, Y. & Rijmen, V. (eds.). p. 151-180 30 p. (Lecture Notes in Computer Science; vol. 11477).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    An Analysis of Methodological and Quantitative Aspects in the Evaluation of Thematic Segmentation Algorithms

    Georgescul, M., Clark, A. & Armstrong, S., 2006.

    Research output: Contribution to conferencePaper