Home > Publications

Publications

41251 - 41275 out of 42,939Page size: 25
  1. Published

    Using Game controller for Relaying Deictic Gestures in Computer Mediated Communication

    Walkowski, S., Doerner, R., Lievonen, M. & Rosenberg, D., Jun 2011, In: International Journal of Human-Computer Studies. 69, 6, p. 362-374 12 p., doi:10.1016/j.ijhcs.2011.01.002.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    Using GAs to create a waveguide model of the oral vocal tract

    Cooper, C., Howard, D. M. & and Tyrrell, A. M., 2004, In: Lecture Notes in Computer Science. 3005-200, p. 280-288 9 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Using GAs to create a waveguide model of the oral vocal tract: APPLICATIONS OF EVOLUTIONARY COMPUTING

    Cooper, C. H. V., Howard, D. M. & Tyrrell, A. M., 2004, APPLICATIONS OF EVOLUTIONARY COMPUTING. Raidl, GR. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 280-288 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    Using genetic algorithms to uncover individual differences in how humans represent facial emotion

    Carlisi, C., Reed, K., Helmink, F., Lachlan, R., Cosker, D., Viding, E. & Mareschal, I., 13 Oct 2021, In: Royal Society Open Science. 8, 10

    Research output: Contribution to journalArticlepeer-review

  5. Unpublished

    Using Gesture to Support Language

    Wray, C., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  6. Published

    Using Grounded Theory to Explore Employees' Brand-Oriented Behaviors

    Gill-Simmen, L., 2019, In: SAGE Research Methods Cases.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Using Human Security to Harness Human Rights in the Post-COVID World

    Gilder, A., 24 Mar 2021, Völkerrechtsblog.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  11. Published

    Using IP Rights to Protect Human Rights: Copyright for ‘Revenge Porn’ Removal

    O'Connell, A. & Bakina, K., Sep 2020, In: Legal Studies. 40, 3, p. 442-457 16 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Using legacy core material to assess subsurface carbon storage reservoir potentiality

    Payton, R. L., Chiarella, D. & Kingdon, A., 3 Aug 2022, In: Geological Society, London, Special Publications. 527

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Using LP to study the language PL0+

    Scott, E. & Norrie, K., 1993, In: Workshops in Computing. p. 227-245

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Using Machine Learning to estimate the technical potential of shallow ground-source heat pumps with thermal interference

    Walch, A., Castello, R., Mohajeri, N., Gudmundsson, A. & Scartezzini, J-L., 2021, In: Journal of Physics: Conference Series. 2042, 012010.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Using Maimonides' rule to estimate the effect of class size on scholastic achievement

    Angrist, J. D. & Lavy, V., May 1999, In: The Quarterly Journal of Economics. 114, 2, p. 533-575 43 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Using mammal tooth phosphate with freshwater carbonate and phosphate palaeoproxies to obtain mean paleotemperatures

    Grimes, S. T., Mattey, D. P., Collinson, M. E. & Hooker, J. J., Apr 2004, In: Quaternary Science Reviews. 23, 7-8, p. 967-976 10 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Using Mie Scattering to Determine the Wavelength-Dependent Refractive Index of Polystyrene Beads with Changing Temperature

    McGrory, M., King, M. & Ward, A., 19 Nov 2020, In: Journal of Physical Chemistry C. 124, p. 9617-9625 9 p., 46.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Using multiple chains for Gibbs sampling in mixed graphical association models

    Brewer, M., Luo, Z. & Gammerman, A., 1994, Computational Statistics. p. 185-189

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Using Narrative Research and Portraiture to Inform Design Research

    Golsteijn, C. & Wright, S., 2013, In: Lecture Notes in Computer Science. 8119, p. 298-315 18 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Using Netnography to Investigate Travel Blogging as Digital Work

    Willment, N., 2021, Research Methods for Digital Work and Organization: Investigating Distributed, Multi-Modal, and Mobile Work. Symon, G., Pritchard, K. & Hine, C. (eds.). Oxford Univerity Press; Oxford

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  21. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Using NLG and sensors to support personal narrative for children with complex communication needs

    Black, R., Reddington, J., Reiter, E., Tintarev, N. & Waller, A., 2010, Proceedings of the NAACL HLT 2010 Workshop on Speech and Language Processing for Assistive Technologies. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Using nonword repetition to distinguish genetic and environmental influences on early literacy development: a study of 6-year-old twins

    Bishop, DVM., Adams, CV. & Norbury, CF., 2004, In: American Journal of Medical Genetics Part B: Neuropsychiatric Genetics. 129B, p. 94-96

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution