Home > Publications

Publications

40701 - 40800 out of 42,442Page size: 100
  1. Published

    Use it or lose it? The impact of computers on earnings

    Dolton, P., Makepeace, G. & Robinson, H., Dec 2007, In: Manchester School. 75, 6, p. 673-694 22 p.

    Research output: Contribution to journalArticlepeer-review

  2. Unpublished

    Use of Bacillus subtilis spores in treatments for Clostridium difficile infection

    Colenutt, C., 2015, (Unpublished) 241 p.

    Research output: ThesisDoctoral Thesis

  3. Published

    Use of activated charcoal for the purification of neon in the CLEAN experiment

    Harrison, M. K., Lippincott, W. H., McKinsey, D. N. & Nikkel, J. A., 21 Jan 2007, In: Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment. 570, 3, p. 556-560 5 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Use of anthropogenic material affects bird nest arthropod community structure: influence of urbanisation, and consequences for ectoparasites and fledging success

    Hanmer, H. J., Thomas, R. L., Beswick, G. J. F., Collins, B. P. & Fellowes, M. D. E., Oct 2017, In: Journal of Ornithology . 158, 4, p. 1045–1059 15 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Use of Artificial Intelligence in Regulatory Decision-Making

    Jago, R., van der Gaag, A., Stathis, K., Petej, I., Lertvittayakumjorn, P., Krishnamurthy, Y., Gao, Y., Caceres Silva, J., Webster, M., Gallagher, A. & Austin, Z., 1 Oct 2021, In: Journal of Nursing Regulation. 12, 3, p. 11-19 9 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Use of Bacillus subtilis PXN21 spores for suppression of Clostridium difficile infection symptoms in a murine model

    Colenutt, C. & Cutting, S. M., 29 May 2014, In: FEMS Microbiology Letters. 358, 2, p. 154-61 8 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Use of corporate reports for social disclosures: Some early evidence from Shell

    Unerman, J., 2000, Organisational Discourse: Word-views, Work-views and World-views. Coombes, C., Grant, D., Keenoy, T. & Oswick, C. (eds.). KMCP

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  8. Published

    Use of genetic algorithms to improve the solid waste collection service in an urban area

    Buenrostro-Delgado, O., Ortega-Rodriguez, J. M., Clemitshaw, K., González-Razo, C. & Hernandez Paniagua, I., Jul 2015, In: Waste Management. 41, p. 20-27 8 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Use of geostatistics in designing optimal sampling strategies for soil survey in an alluvial system

    Di, H. J., Trangmar, P. B. & Kemp, R. A., 1989, In: Journal of the Soil Science Society of America. 53, p. 1163-1167

    Research output: Contribution to journalArticlepeer-review

  10. In preparation

    Use of gold as alternative savings means in Indian households

    Dimopoulou, A., 2019, (In preparation).

    Research output: Working paper

  11. Published

    Use of Improvement Strategies for Excessive Inventory Levels Reduction

    Shah, S. & Chen, S., 17 Mar 2021, Proceedings of 2nd IEEE International Conference on Computational Intelligence and Knowledge Economy, ICCIKE 2021. Naranje, V., Singh, B. & Velan, S. (eds.). IEEE, p. 181-186 6 p. 9410761. (Proceedings of 2nd IEEE International Conference on Computational Intelligence and Knowledge Economy, ICCIKE 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Use of novel attraction compounds increases monitoring success of a rare beetle, Elater ferrugineus

    Harvey, D., Harvey, H., Harvey, R., Kadej, M., Hedenstrom, E., Gange, A. & Finch, P., Mar 2017, In: Insect Conservation and Diversity. 10, 2, p. 161-170 10 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Use of plaid patterns to distinguish the corticofugal and direct retinal inputs to the brainstem optokinetic nystagmus generator.

    Smith, A. T. & Harris, L. R., 1991, In: Experimental Brain Research. 86, p. 324-332

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Use of process modeling in product development integration within manufacturing environment

    Syed, M. H. & Shah, S., 2013, Manufacturing Science and Technology (ICMST2013). p. 1210-1214 5 p. (Advanced Materials Research; vol. 816-817).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Use of quality control charts for detection of outliers and temporal trends in cumulative meta-analysis

    Kulinskaya, E. & Koricheva, J., 2010, In: Research Synthesis Methods. 1, 3-4, p. 297-307

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Use of reactive tracers to determine ambient OH radical concentrations: Application within the indoor environment

    White, I. R., Martin, D., Muñoz, M. P., Petersson, F. K., Henshaw, S. J., Nickless, G., Lloyd-Jones, G. C., Clemitshaw, K. C. & Shallcross, D. E., 15 Aug 2010, In: Environmental Science and Technology. 44, 16, p. 6269-6274 6 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Use of Satisfaction-Satisfaction Matrix (SSM) to evaluate E-Government services from the perspective of Japanese citizens and government service providers

    Wong, K., Nishimoto, H., Nishigaki, Y. & Jackson, S., 2013, 24th Australasian Conference on Information Systems, Melbourne, AU, 04 - 06 Dec.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Use of Satisfaction‑Satisfaction Matrix (SSM) to Evaluate Japanese E‑Government Services

    Wong, M. S., Nishimoto, H., Nishigaki, Y. & Jackson, S., Jul 2017, In: Electronic Journal of Information Systems Evaluation. 20, 1, p. 3-10 8 p.

    Research output: Contribution to journalArticlepeer-review

  19. E-pub ahead of print

    Use of Small Animal Models for Duchenne and Parameters to Assess Efficiency upon Antisense Treatment

    Lu-Nguyen, N., Malerba, A. & Popplewell, L., 25 Feb 2022, (E-pub ahead of print) In: Methods in Molecular Biology. 2434, p. 301-313 13 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Use of Systematic, Palaeoflood and Historical data for the improvement of flood risk estimation. Review of scientifc methods

    Benito, G., Lang, M., Barriendos, M., Llasat, M-C., Francés, F., Ouarda, T., Thorndycraft, V., Enzel, Y., Bardossy, A., Coeur, D. & Bobée, B., 2004, In: Natural Hazards. 31, p. 623-643

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Useful Scientific Theories are Useful: A Reply to Rouder, Pratte and Morey (2010).

    Wixted, J. & Mickes, L., 2010, In: Psychonomic Bulletin and Review.

    Research output: Contribution to journalComment/debatepeer-review

  22. Published

    User acceptance of electronic commerce: lessons learned from the Bled eConference

    van der Heijden, H., 2012, 25th Special Anniversary Proceedings of the Bled eConference,. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    User acceptance of emergency alert technology: A case study

    Wu, P. F., 1 Jan 2009, ISCRAM 2009 - 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Information Systems for Crisis Response and Management, ISCRAM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    User acceptance of hedonic information systems

    van der Heijden, H., Dec 2004, In: MIS Quarterly. 28, 4, p. 695-704

    Research output: Contribution to journalArticlepeer-review

  25. Published

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 22 Oct 2020, Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press, p. 664-672 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    User needs in sustainability accounting: Perspectives of stakeholders in Ireland

    O'Dwyer, B., Unerman, J. & Hession, E., 2005, In: European Accounting Review. 14, 4, p. 759-787

    Research output: Contribution to journalArticlepeer-review

  28. Published

    User perspective of DITIS: Virtual collaborative teams for home-healthcare

    Pitsillides, B., Pitsillides, A., Samaras, G., Andreou, P., Georgiadis, D., Christodoulou, E. & Panteli, N., 2004, Studies in Health Technology and Informatics. Vol. 100. p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  29. Published

    User Preference Analysis of Internet Social Media services

    Pant, V., Harindranath, G. & Wagner, W. P., 13 Jan 2016, 2015 International Conference on Information Resource Management (Conf-IRM), Ottawa, Canada, May.. Vol. 34.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    User satisfaction evaluation of Malaysian e-government education services

    Wong, M. S. & Jackson, S., 5 Feb 2018, 23rd IEEE International Technology Management Conference, Madeira Island, Portugal. IEEE, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2011, In: International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    User-Generated Place Brand Equity on Twitter: The Dynamics of Brand Associations in Social Media.

    Andéhn, M., Kazeminia, A., Lucarelli, A. & Sevin, E., 2014, In: Place Branding and Public Diplomacy. 10, 2, p. 132-144

    Research output: Contribution to journalArticlepeer-review

  33. Unpublished

    User-generated Video as a New Genre of Documentary

    Said Mahfouz, M., 2012, (Unpublished) 198 p.

    Research output: ThesisDoctoral Thesis

  34. Published

    U-series isochron dating of immature and mature calcretes as a basis for constructing Quaternary landform chronologies: Examples from the Sorbas basin, southeast Spain

    Candy, I., Black, S. & Sellwood, B., 2005, In: Quaternary Research. 64, p. 100-111 12 p.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    User's guide to cryptography and standards

    Dent, A. W. & Mitchell, C. J., 2005, Artech House.

    Research output: Book/ReportBook

  36. Published

    'Users Rights and the Probation Service: some opportunities and obstacles'

    Broad, B. & Denney, D., 1996, In: The Howard Journal of Criminal Justice. 35, 1, p. 61-76.

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Uses and misuses of meta-analysis in plant ecology

    Koricheva, J. & Gurevitch, J., 2014, In: Journal of Ecology. 102, p. 828–844

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Uses of the operatic canon: Verdi and Wagner

    Berry, M. & Cormac, N., Aug 2020, The Oxford Handbook of the Operatic Canon. Oxford University Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  39. Published

    Uses, benefits and challenges of using rural community telecentres as tools for development: the Case of Vikwa Community Telecentre in Kasungu, Malawi

    Kapondera, S. K. & Namusanya, D. M., 2017, In: Journal of Development and Communication Studies. 5, 1, p. 1-21 21 p.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Forthcoming
  42. Forthcoming

    Using a neurodiversity framework to test young children’s attitudes towards autism

    Hare, A., Pitman, E. & Cage, E., 4 Mar 2019, (Accepted/In press) In: British Journal of Special Education.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Using a parental checklist to identify diagnostic groups in children with communication impairment: A validation of the Children’s Communication Checklist – 2

    Norbury, CF., Nash, M., Baird, G. & Bishop, DVM., 2004, In: International Journal of Language and Communication Impairments. 39, 3, p. 345-364

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Using a quantum computer to investigate quantum chaos

    Schack, R., 1998, In: Physical Review A. 57, p. 1634-1635 2 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Using a systems viability approach to evaluate integrated conservation and development projects: assessing the impact of the North Rupununi Adaptive Management Process, Guyana

    Mistry, J., Berardi, A., Simpson, M., Davis, O. & Haynes, L., Sep 2010, In: Geographical Journal. 176, 3, p. 241-252

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Using a Whole Person Approach to Support People with Cancer: A Longitudinal, Mixed-Methods Service Evaluation

    Polley, M., Jolliffe, R., Boxell, E., Zollman, C., Jackson, S. & Seers, H., 1 Dec 2016, In: Integrative Cancer Therapies. 15, 4, p. 435-445 11 p.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Using alt text to make science Twitter more accessible for people with visual impairments

    Chiarella, D., Yarbrough, J. & Jackson, C. A-L., 16 Nov 2020, In: Nature Communications. 11, p. 1-3 3 p., 5803.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Using an exponential sine sweep to measure the vocal tract resonances

    Delvaux, B. & Howard, D. M., 2013, In: Journal of the Acoustical Society of America. 134, 5, p. 4206 1 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Using an oculomotor signature as an indicator of aesthetic preference

    Holmes, T. & Zanker, J., 2012, In: iPerception. 3, 7, p. 426-439 14 p.

    Research output: Contribution to journalSpecial issuepeer-review

  50. Unpublished
  51. Published

    USING ANTISENSE RNA TO STUDY GENE-FUNCTION - INHIBITION OF CAROTENOID BIOSYNTHESIS IN TRANSGENIC TOMATOES

    BIRD, CR., RAY, JA., FLETCHER, JD., BONIWELL, JM., BIRD, AS., TEULIERES, C., BLAIN, N. V., BRAMLEY, PM., SCHUCH, W. & Bramley, P., Jul 1991, In: Bio-Technology. 9, 7, p. 635-639 5 p.

    Research output: Contribution to journalArticlepeer-review

  52. Published

    Using Argument-based Features to Predict and Analyse Review Helpfulness

    Liu, H., Gao, Y., Lv, P., Li, M., Geng, S., Li, M. & Wang, H., Sep 2017, Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Copenhagen, Denmark: Association for Computational Linguistics, p. 1358–1363 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  55. Published

    Using computer programs to code qualitative data

    Catterall, M. & Maclaran, P., 1996, In: Marketing Intelligence and Planning. 14, 4, p. 29-33

    Research output: Contribution to journalArticlepeer-review

  56. Published

    Using computer software for the analysis of qualitative market research data

    Catterall, M. & Maclaran, P., Jul 1998, In: Journal of the Market Research Society. 40, 3, p. 207-222 16 p.

    Research output: Contribution to journalArticlepeer-review

  57. E-pub ahead of print

    Using connectivity-based real-time fMRI neurofeedback to modulate attentional and resting state networks in people with high trait anxiety

    Morgenroth, E., Saviola, F., Gilleen, J., Allen, B., Lührs, M., W. Eysenck, M. & Allen, P., 23 Jan 2020, (E-pub ahead of print) In: NeuroImage: Clinical. 25, p. 1-10 10 p., 102191.

    Research output: Contribution to journalArticlepeer-review

  58. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Using Contextual Representations to Efficiently Learn Context-Free Languages

    Clark, A., Eyraud, R. & Habrard, A., 1 Oct 2010, In: Journal of Machine Learning Research. 11, p. 2707-2744 38 p.

    Research output: Contribution to journalArticlepeer-review

  60. Published

    Using decomposition-parameters for QBF: Mind the prefix!

    Eiben, E., Ganian, R. & Ordyniak, S., Jun 2020, In: Journal of Computer and System Sciences. 110, p. 1-21 21 p.

    Research output: Contribution to journalArticlepeer-review

  61. Published

    Using Decomposition-Parameters for QBF: Mind the Prefix!

    Eiben, E., Ganian, R. & Ordyniak, S., 21 Feb 2016, p. 964-970. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  62. Published

    Using Design Thinking to Understand Cyber Attack Surfaces of Future Smart Grids

    Snow, S., Happa, J., Horrocks, N. & Glencross, M., 30 Oct 2020, In: Frontiers in Energy Research. 8, p. 1-17 17 p., 591999.

    Research output: Contribution to journalArticlepeer-review

  63. Published

    Using detrital garnet compositions to determine provenance: a new compositional database and procedure

    Suggate, S. & Hall, R., 2014, Sediment Provenance Studies in Hydrocarbon Exploration and Production. Scott, R. A., Smyth, H. R., Morton, A. C. & Richardson, N. (eds.). Geological Society of London Special Publication, Vol. 386. p. 373-393 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  64. Published

    Using developmental cognitive neuroscience to study behavioral and attentional control

    Astle, D. E. & Scerif, G., 2009, In: Developmental Psychobiology. 51, 2, p. 107-18 12 p.

    Research output: Contribution to journalArticlepeer-review

  65. Published

    Using Dictyostelium to advance our understanding of the role of medium chain fatty acids in health and disease

    Pain, E., Shinhmar, S. & Williams, R. S., 13 Sep 2021, In: Frontiers in Cell and Developmental Biology. 9, 722066.

    Research output: Contribution to journalLiterature reviewpeer-review

  66. Published

    Using discourse analysis to understand IS planning and development in organization: A case study

    Sillince, J. A. A. & Harindranath, G., 1999, SYSTEMS DEVELOPMENT METHODS FOR DATABASES, ENTERPRISE MODELING, AND WORKFLOW MANAGEMENT. Wojtkowsky, W. (ed.). NEW YORK: KLUWER ACADEMIC/PLENUM PUBL, p. 327-336 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  67. Published

    Using DNA to predict behaviour problems from preschool to adulthood

    Gidziela, A., Rimfeld, K., Malanchini, M., Allegrini, A. G., McMillan, A., Selzam, S., Ronald, A., Viding, E., von Stumm, S., Eley, T. C. & Plomin, R., 6 Sep 2021, In: Journal of Child Psychology and Psychiatry.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Using Electroglottographic Real-Time Feedback to Control Posterior Glottal Adduction during Phonation

    Herbst, C. T., Howard, D. & Schloemicher-Thier, J., Jan 2010, In: Journal of Voice. 24, 1, p. 72-85 14 p.

    Research output: Contribution to journalArticlepeer-review

  70. Published

    Using electrostatic potentials to predict DNA-binding sites on DNA-binding proteins

    Jones, S., Shanahan, H. P., Berman, H. M. & Thornton, J. M., 15 Dec 2003, In: Nucleic Acids Research. 31, 24, p. 7189-7198 10 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Unpublished

    Using Encoding to Reduce the Errors in Quantum Spin Chains

    Keele, C., 2021, (Unpublished)

    Research output: ThesisDoctoral Thesis

  74. Published

    Using Evidence To Inform Decision-Making

    Evans, T., 2014, Applying Research Evidence in Social Work Practice. Webber, M. (ed.). Red Globe Press

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  75. Published

    Using explicit state to describe architectures

    Lopes, A. & Fiadeiro, J. L., 1999, FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING. Finance, JP. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-160 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Using Foucalt to analyse ethics in the practice of problem structuring methods

    Córdoba-Pachón, J-R., 1 Sep 2006, In: Journal of the Operational Research Society. 57, 9, p. 1027-1034

    Research output: Contribution to journalArticlepeer-review

  77. Published

    Using Game controller for Relaying Deictic Gestures in Computer Mediated Communication

    Walkowski, S., Doerner, R., Lievonen, M. & Rosenberg, D., Jun 2011, In: International Journal of Human-Computer Studies. 69, 6, p. 362-374 12 p., doi:10.1016/j.ijhcs.2011.01.002.

    Research output: Contribution to journalArticlepeer-review

  78. Published

    Using GAs to create a waveguide model of the oral vocal tract

    Cooper, C., Howard, D. M. & and Tyrrell, A. M., 2004, In: Lecture Notes in Computer Science. 3005-200, p. 280-288 9 p.

    Research output: Contribution to journalArticlepeer-review

  79. Published

    Using GAs to create a waveguide model of the oral vocal tract: APPLICATIONS OF EVOLUTIONARY COMPUTING

    Cooper, C. H. V., Howard, D. M. & Tyrrell, A. M., 2004, APPLICATIONS OF EVOLUTIONARY COMPUTING. Raidl, GR. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 280-288 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  80. Published

    Using genetic algorithms to uncover individual differences in how humans represent facial emotion

    Carlisi, C., Reed, K., Helmink, F., Lachlan, R., Cosker, D., Viding, E. & Mareschal, I., 13 Oct 2021, In: Royal Society Open Science. 8, 10

    Research output: Contribution to journalArticlepeer-review

  81. Unpublished

    Using Gesture to Support Language

    Wray, C., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  82. Published

    Using Grounded Theory to Explore Employees' Brand-Oriented Behaviors

    Gill-Simmen, L., 2019, In: SAGE Research Methods Cases.

    Research output: Contribution to journalArticlepeer-review

  83. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Using Human Security to Harness Human Rights in the Post-COVID World

    Gilder, A., 24 Mar 2021, Völkerrechtsblog.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  87. Published

    Using IP Rights to Protect Human Rights: Copyright for ‘Revenge Porn’ Removal

    O'Connell, A. & Bakina, K., Sep 2020, In: Legal Studies. 40, 3, p. 442-457 16 p.

    Research output: Contribution to journalArticlepeer-review

  88. Published

    Using LP to study the language PL0+

    Scott, E. & Norrie, K., 1993, In: Workshops in Computing. p. 227-245

    Research output: Contribution to journalArticlepeer-review

  89. Submitted

    Using Machine Learning to estimate the technical potential of shallow ground-source heat pumps with thermal interference

    Walch, A., Castello, R., Mohajeri, N., Gudmundsson, A. & Scartezzini, J-L., 2021, (Submitted) In: Journal of Physics: Conference Series.

    Research output: Contribution to journalArticlepeer-review

  90. Published

    Using Maimonides' rule to estimate the effect of class size on scholastic achievement

    Angrist, J. D. & Lavy, V., May 1999, In: The Quarterly Journal of Economics. 114, 2, p. 533-575 43 p.

    Research output: Contribution to journalArticlepeer-review

  91. Published

    Using mammal tooth phosphate with freshwater carbonate and phosphate palaeoproxies to obtain mean paleotemperatures

    Grimes, S. T., Mattey, D. P., Collinson, M. E. & Hooker, J. J., Apr 2004, In: Quaternary Science Reviews. 23, 7-8, p. 967-976 10 p.

    Research output: Contribution to journalArticlepeer-review

  92. Published

    Using Mie Scattering to Determine the Wavelength-Dependent Refractive Index of Polystyrene Beads with Changing Temperature

    McGrory, M., King, M. & Ward, A., 19 Nov 2020, In: Journal of Physical Chemistry C. 124, p. 9617-9625 9 p., 46.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    Using multiple chains for Gibbs sampling in mixed graphical association models

    Brewer, M., Luo, Z. & Gammerman, A., 1994, Computational Statistics. p. 185-189

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Using Narrative Research and Portraiture to Inform Design Research

    Golsteijn, C. & Wright, S., 2013, In: Lecture Notes in Computer Science. 8119, p. 298-315 18 p.

    Research output: Contribution to journalArticlepeer-review

  95. Published

    Using Netnography to Investigate Travel Blogging as Digital Work

    Willment, N., 2021, Research Methods for Digital Work and Organization: Investigating Distributed, Multi-Modal, and Mobile Work. Symon, G., Pritchard, K. & Hine, C. (eds.). Oxford Univerity Press; Oxford

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  96. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Using NLG and sensors to support personal narrative for children with complex communication needs

    Black, R., Reddington, J., Reiter, E., Tintarev, N. & Waller, A., 2010, Proceedings of the NAACL HLT 2010 Workshop on Speech and Language Processing for Assistive Technologies. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Using nonword repetition to distinguish genetic and environmental influences on early literacy development: a study of 6-year-old twins

    Bishop, DVM., Adams, CV. & Norbury, CF., 2004, In: American Journal of Medical Genetics Part B: Neuropsychiatric Genetics. 129B, p. 94-96

    Research output: Contribution to journalArticlepeer-review

  100. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution