Home > Publications

Publications

38201 - 38225 out of 42,605Page size: 25
  1. Published

    Applied Behaviour Analysis in Education: A critical assessment and some implications for training teachers

    Berger, M., 1982, In: Educational Psychology. 2, 3-4, p. 289-300 12 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    Applications of the oriented permission role-based access control model

    Crampton, J. & Chen, L., 2007, Proceedings of the 26th IEEE International Performance Computing and Communications Conference. IEEE Computer Society Press, p. 387-394 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Applications of reinforcement learning to cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Workshops (ICC), 2010 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Applications of mobile agents in healthcare domain: a literature survey

    Bagga, P. & Hans, R., 31 Oct 2015, In: International Journal of Grid Distribution Computing. 8, 5, p. 55-72 28 p.

    Research output: Contribution to journalArticlepeer-review

  5. Unpublished

    Applications of Game Theory in Information Security

    Pham, V., 2015, (Unpublished) 222 p.

    Research output: ThesisDoctoral Thesis

  6. Published

    Applications of galois geometry to cryptology

    Martin, K. M., 2011, Current Research Topics in Galois Geometry. Nova science, p. 215-244 (Mathematics Research Developments: Cryptography, Steganography and Data Security).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Applications of Exponential Sums in Communications Theory

    Paterson, K. G., 1999, Cryptography and Coding. Walker, M. (ed.). Springer, p. 1-24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    Applications of Combinatorics to Security

    Blackburn, S. R. & Piper, F. C., 1997, Proceedings of 'The Applications of Combinatorial Mathematics', Oxford, 14-16 December 1994. Mitchell, C. (ed.). Oxford: Oxford University Press, p. 31-47 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    Applications of Combinatorial Mathematics: Proceedings of the IMA Conference, Oxford, December 1994

    Mitchell, C. J. (ed.), 1997, Oxford University Press. 241 p.

    Research output: Book/ReportAnthology

  10. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Application Potentiality of GIS in the field of Urban and Regional Planning

    Adri, N. & Kamruzzaman, M., 2005, In: The Jahangirnagar Review, Part II: Social Science. XXVIII, p. 193-206 14 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Application of Whitney and Nuismer stress fracture criterion to composites loaded in shear

    Aramah, S. E., Hogg, P. J. & Hill, P. S., 1999, In: Plastics, Rubber and Composites. 28, 9, p. 438-451 14 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Application of Value Stream Mapping in Global Manufacturing Environment

    Shah, S. & Goh, C., 15 Nov 2021, 2021 26th International Conference on Automation and Computing (ICAC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Unpublished

    Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers

    Gallery, E., Tomlinson, A. & Delicata, R., 1 Jun 2005, (Unpublished).

    Research output: Working paper

  15. Published

    APPLICATION OF SEM TO A SIGILLARIAN IMPRESSION FOSSIL

    CHALONER, W. G. & COLLINSON, M. E., 1975, In: Review of Palaeobotany and Palynology. 20, 1-2, p. 85-101 17 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Application of optical diffraction radiation to a non-invasive low-emittance high-brightness beam diagnostics

    Karataev, P., Hamatsu, R., Muto, T., Araki, S., Hayano, H., Urakawa, J., Naumenko, G., Potylitsyn, A. & Hirose, T., 2004, QUANTUM ASPECTS OF BEAM PHYSICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 111-118 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Unpublished
  18. Published

    Application of metabolomics to genotype and phenotype discrimination of birch trees grown in a long-term open-field experiment

    Ossipov, V., Ossipova, S., Bykov, V., Oksanen, E., Koricheva, J. & Haukioja, E., 2008, In: Metabolomics. 4, 1, p. 39-51 13 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Application of metabolomics approaches to the study of respiratory diseases.

    Snowden, S., Dahlen, S-E. & Wheelock, C., 2012, In: Bioanalysis. 4, 18, p. 2265-2290

    Research output: Contribution to journalArticlepeer-review

  20. Published
  21. Published

    Application of Inductive Confidence Machine to ICMLA competition data

    Nouretdinov, I., Burford, B. & Gammerman, A., 2009, Proceedings of The Eighth International Conference on Machine Learning and Applications. p. 435-438 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Application of high-performance liquid chromatography with photodiode array detection to the metabolic profiling of plant isoprenoids

    Fraser, P. D., Pinto, M. E. S., Holloway, D. E. & Bramley, P. M., Nov 2000, In: Plant Journal. 24, 4, p. 551-558 8 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Application of Grid Security to Personal Distributed Environments

    Tomlinson, A. & Schwiderski-Grosche, S., 1 Oct 2004, p. 68-78. 11 p.

    Research output: Contribution to conferencePaper

  24. Published

    Application of geometric models to inverted listric fault systems in sandbox experiments. Paper 2: insights for possible along strike migration of material during 3D hanging wall deformation

    Yamada, Y. & McClay, K., 2003, In: Journal of Structural Geology. 25, 8, p. 1331-1336 6 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Application of geometric models to inverted listric fault systems in sandbox experiments. Paper 1: 2D hanging wall deformation and section restoration

    Yamada, Y. & McClay, K., 2003, In: Journal of Structural Geology. 25, 9, p. 1551-1560 10 p.

    Research output: Contribution to journalArticlepeer-review