Home > Publications

Publications

41501 - 41600 out of 43,237Page size: 100
  1. Published

    Using a quantum computer to investigate quantum chaos

    Schack, R., 1998, In: Physical Review A. 57, p. 1634-1635 2 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    Using a systems viability approach to evaluate integrated conservation and development projects: assessing the impact of the North Rupununi Adaptive Management Process, Guyana

    Mistry, J., Berardi, A., Simpson, M., Davis, O. & Haynes, L., Sep 2010, In: Geographical Journal. 176, 3, p. 241-252

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Using a Whole Person Approach to Support People with Cancer: A Longitudinal, Mixed-Methods Service Evaluation

    Polley, M., Jolliffe, R., Boxell, E., Zollman, C., Jackson, S. & Seers, H., 1 Dec 2016, In: Integrative Cancer Therapies. 15, 4, p. 435-445 11 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Using alt text to make science Twitter more accessible for people with visual impairments

    Chiarella, D., Yarbrough, J. & Jackson, C. A-L., 16 Nov 2020, In: Nature Communications. 11, p. 1-3 3 p., 5803.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Using an exponential sine sweep to measure the vocal tract resonances

    Delvaux, B. & Howard, D. M., 2013, In: Journal of the Acoustical Society of America. 134, 5, p. 4206 1 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Using an oculomotor signature as an indicator of aesthetic preference

    Holmes, T. & Zanker, J., 2012, In: iPerception. 3, 7, p. 426-439 14 p.

    Research output: Contribution to journalSpecial issuepeer-review

  7. Unpublished
  8. Published

    USING ANTISENSE RNA TO STUDY GENE-FUNCTION - INHIBITION OF CAROTENOID BIOSYNTHESIS IN TRANSGENIC TOMATOES

    BIRD, CR., RAY, JA., FLETCHER, JD., BONIWELL, JM., BIRD, AS., TEULIERES, C., BLAIN, N. V., BRAMLEY, PM., SCHUCH, W. & Bramley, P., Jul 1991, In: Bio-Technology. 9, 7, p. 635-639 5 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Using Argument-based Features to Predict and Analyse Review Helpfulness

    Liu, H., Gao, Y., Lv, P., Li, M., Geng, S., Li, M. & Wang, H., Sep 2017, Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Copenhagen, Denmark: Association for Computational Linguistics, p. 1358–1363 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  12. Published

    Using computer programs to code qualitative data

    Catterall, M. & Maclaran, P., 1996, In: Marketing Intelligence and Planning. 14, 4, p. 29-33

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Using computer software for the analysis of qualitative market research data

    Catterall, M. & Maclaran, P., Jul 1998, In: Journal of the Market Research Society. 40, 3, p. 207-222 16 p.

    Research output: Contribution to journalArticlepeer-review

  14. E-pub ahead of print

    Using connectivity-based real-time fMRI neurofeedback to modulate attentional and resting state networks in people with high trait anxiety

    Morgenroth, E., Saviola, F., Gilleen, J., Allen, B., Lührs, M., W. Eysenck, M. & Allen, P., 23 Jan 2020, (E-pub ahead of print) In: NeuroImage: Clinical. 25, p. 1-10 10 p., 102191.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Using Contextual Representations to Efficiently Learn Context-Free Languages

    Clark, A., Eyraud, R. & Habrard, A., 1 Oct 2010, In: Journal of Machine Learning Research. 11, p. 2707-2744 38 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Using decomposition-parameters for QBF: Mind the prefix!

    Eiben, E., Ganian, R. & Ordyniak, S., Jun 2020, In: Journal of Computer and System Sciences. 110, p. 1-21 21 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Using Decomposition-Parameters for QBF: Mind the Prefix!

    Eiben, E., Ganian, R. & Ordyniak, S., 21 Feb 2016, p. 964-970. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  19. Published

    Using Design Thinking to Understand Cyber Attack Surfaces of Future Smart Grids

    Snow, S., Happa, J., Horrocks, N. & Glencross, M., 30 Oct 2020, In: Frontiers in Energy Research. 8, p. 1-17 17 p., 591999.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Using detrital garnet compositions to determine provenance: a new compositional database and procedure

    Suggate, S. & Hall, R., 2014, Sediment Provenance Studies in Hydrocarbon Exploration and Production. Scott, R. A., Smyth, H. R., Morton, A. C. & Richardson, N. (eds.). Geological Society of London Special Publication, Vol. 386. p. 373-393 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  21. Published

    Using developmental cognitive neuroscience to study behavioral and attentional control

    Astle, D. E. & Scerif, G., 2009, In: Developmental Psychobiology. 51, 2, p. 107-18 12 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Using Dictyostelium to advance our understanding of the role of medium chain fatty acids in health and disease

    Pain, E., Shinhmar, S. & Williams, R. S., 13 Sep 2021, In: Frontiers in Cell and Developmental Biology. 9, 722066.

    Research output: Contribution to journalLiterature reviewpeer-review

  23. Published

    Using discourse analysis to understand IS planning and development in organization: A case study

    Sillince, J. A. A. & Harindranath, G., 1999, SYSTEMS DEVELOPMENT METHODS FOR DATABASES, ENTERPRISE MODELING, AND WORKFLOW MANAGEMENT. Wojtkowsky, W. (ed.). NEW YORK: KLUWER ACADEMIC/PLENUM PUBL, p. 327-336 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  24. Published

    Using DNA to predict behaviour problems from preschool to adulthood

    Gidziela, A., Rimfeld, K., Malanchini, M., Allegrini, A. G., McMillan, A., Selzam, S., Ronald, A., Viding, E., von Stumm, S., Eley, T. C. & Plomin, R., 6 Sep 2021, In: Journal of Child Psychology and Psychiatry.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Using Electroglottographic Real-Time Feedback to Control Posterior Glottal Adduction during Phonation

    Herbst, C. T., Howard, D. & Schloemicher-Thier, J., Jan 2010, In: Journal of Voice. 24, 1, p. 72-85 14 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Using electrostatic potentials to predict DNA-binding sites on DNA-binding proteins

    Jones, S., Shanahan, H. P., Berman, H. M. & Thornton, J. M., 15 Dec 2003, In: Nucleic Acids Research. 31, 24, p. 7189-7198 10 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Unpublished

    Using Encoding to Reduce the Errors in Quantum Spin Chains

    Keele, C., 2021, (Unpublished)

    Research output: ThesisDoctoral Thesis

  31. Published

    Using Evidence To Inform Decision-Making

    Evans, T., 2014, Applying Research Evidence in Social Work Practice. Webber, M. (ed.). Red Globe Press

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  32. Published

    Using explicit state to describe architectures

    Lopes, A. & Fiadeiro, J. L., 1999, FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING. Finance, JP. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-160 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Using Foucalt to analyse ethics in the practice of problem structuring methods

    Córdoba-Pachón, J-R., 1 Sep 2006, In: Journal of the Operational Research Society. 57, 9, p. 1027-1034

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Using Game controller for Relaying Deictic Gestures in Computer Mediated Communication

    Walkowski, S., Doerner, R., Lievonen, M. & Rosenberg, D., Jun 2011, In: International Journal of Human-Computer Studies. 69, 6, p. 362-374 12 p., doi:10.1016/j.ijhcs.2011.01.002.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    Using GAs to create a waveguide model of the oral vocal tract

    Cooper, C., Howard, D. M. & and Tyrrell, A. M., 2004, In: Lecture Notes in Computer Science. 3005-200, p. 280-288 9 p.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    Using GAs to create a waveguide model of the oral vocal tract: APPLICATIONS OF EVOLUTIONARY COMPUTING

    Cooper, C. H. V., Howard, D. M. & Tyrrell, A. M., 2004, APPLICATIONS OF EVOLUTIONARY COMPUTING. Raidl, GR. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 280-288 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  37. Published

    Using genetic algorithms to uncover individual differences in how humans represent facial emotion

    Carlisi, C., Reed, K., Helmink, F., Lachlan, R., Cosker, D., Viding, E. & Mareschal, I., 13 Oct 2021, In: Royal Society Open Science. 8, 10

    Research output: Contribution to journalArticlepeer-review

  38. Unpublished

    Using Gesture to Support Language

    Wray, C., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  39. Published

    Using Grounded Theory to Explore Employees' Brand-Oriented Behaviors

    Gill-Simmen, L., 2019, In: SAGE Research Methods Cases.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Using Human Security to Harness Human Rights in the Post-COVID World

    Gilder, A., 24 Mar 2021, Völkerrechtsblog.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  44. Published

    Using IP Rights to Protect Human Rights: Copyright for ‘Revenge Porn’ Removal

    O'Connell, A. & Bakina, K., Sep 2020, In: Legal Studies. 40, 3, p. 442-457 16 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Using legacy core material to assess subsurface carbon storage reservoir potentiality

    Payton, R. L., Chiarella, D. & Kingdon, A., 3 Aug 2022, In: Geological Society, London, Special Publications. 527

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Using LP to study the language PL0+

    Scott, E. & Norrie, K., 1993, In: Workshops in Computing. p. 227-245

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Using Machine Learning to estimate the technical potential of shallow ground-source heat pumps with thermal interference

    Walch, A., Castello, R., Mohajeri, N., Gudmundsson, A. & Scartezzini, J-L., 10 Sep 2021, In: Journal of Physics: Conference Series. 2042, 012010.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Using Maimonides' rule to estimate the effect of class size on scholastic achievement

    Angrist, J. D. & Lavy, V., May 1999, In: The Quarterly Journal of Economics. 114, 2, p. 533-575 43 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Using mammal tooth phosphate with freshwater carbonate and phosphate palaeoproxies to obtain mean paleotemperatures

    Grimes, S. T., Mattey, D. P., Collinson, M. E. & Hooker, J. J., Apr 2004, In: Quaternary Science Reviews. 23, 7-8, p. 967-976 10 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    Using Mie Scattering to Determine the Wavelength-Dependent Refractive Index of Polystyrene Beads with Changing Temperature

    McGrory, M., King, M. & Ward, A., 19 Nov 2020, In: Journal of Physical Chemistry C. 124, p. 9617-9625 9 p., 46.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    Using multiple chains for Gibbs sampling in mixed graphical association models

    Brewer, M., Luo, Z. & Gammerman, A., 1994, Computational Statistics. p. 185-189

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Using Narrative Research and Portraiture to Inform Design Research

    Golsteijn, C. & Wright, S., 2013, In: Lecture Notes in Computer Science. 8119, p. 298-315 18 p.

    Research output: Contribution to journalArticlepeer-review

  53. Published

    Using Netnography to Investigate Travel Blogging as Digital Work

    Willment, N., 2021, Research Methods for Digital Work and Organization: Investigating Distributed, Multi-Modal, and Mobile Work. Symon, G., Pritchard, K. & Hine, C. (eds.). Oxford Univerity Press; Oxford

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  54. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Using NLG and sensors to support personal narrative for children with complex communication needs

    Black, R., Reddington, J., Reiter, E., Tintarev, N. & Waller, A., 2010, Proceedings of the NAACL HLT 2010 Workshop on Speech and Language Processing for Assistive Technologies. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Using nonword repetition to distinguish genetic and environmental influences on early literacy development: a study of 6-year-old twins

    Bishop, DVM., Adams, CV. & Norbury, CF., 2004, In: American Journal of Medical Genetics Part B: Neuropsychiatric Genetics. 129B, p. 94-96

    Research output: Contribution to journalArticlepeer-review

  58. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Forthcoming

    Using Online Data in Terrorism Research

    Pearson, E., Macdonald, S., Scrivens, R. & Whittaker, J., 2022, (Accepted/In press) A research agenda for terrorism studies. Frumkin, L., Morrison, J. & Silke, A. (eds.). Edward Elgar

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  60. Published

    Using Padlet as an Intercultural Learning Tool

    Gill-Simmen, L., 1 Feb 2021, Learner Relationships in a Global Higher Education. Foster, M. & Killick, D. (eds.). Routledge

    Research output: Chapter in Book/Report/Conference proceedingChapter

  61. Published

    Using Padlet in instructional design to promote cognitive engagement: a case study of undergraduate marketing students

    Gill-Simmen, L., 31 Mar 2021, In: Journal of Learning Development in Higher Education. 20, 1, p. 1-14 14 p.

    Research output: Contribution to journalArticlepeer-review

  62. E-pub ahead of print

    Using participatory video to share people’s experiences of neotropical urban green and blue space with decision-makers

    Fisher, J., Mistry, J., Pierre, M., Huichang, Y., Harris, A., Hunte, N., Fernandes, D., Bicknell, J. E. & Davies, Z. G., 12 Jul 2021, (E-pub ahead of print) In: Geographical Journal.

    Research output: Contribution to journalArticlepeer-review

  63. Published

    Using performance-based pay to improve the quality of teachers

    Lavy, V., 2007, In: FUTURE OF CHILDREN. 17, 1, p. 87-109 23 p.

    Research output: Contribution to journalArticlepeer-review

  64. Published

    Using Personal Values to Understand the Motivational Basis of Amity Goal Orientation

    Levontin, L. & Bardi, A., 9 Jan 2019, In: Frontiers in Psychology. 9, p. 1-19 19 p., 2736.

    Research output: Contribution to journalArticlepeer-review

  65. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Using privacy calculus theory to explore for entrepreneurial directions in mobile location-based advertising: Identifying intrusiveness as the critical risk factor

    Gutierrez, A., O'Leary, S., Rana, N. P., Dwivedi, Y. K. & Calle, T., Jun 2019, In: Computers in Human Behavior. 95, p. 295-306 12 p.

    Research output: Contribution to journalArticlepeer-review

  67. Published

    Using recycled aggregates in green roof substrates for plant diversity

    Molineux, C., Gange, A., Connop, S. P. & Newport, D., Sep 2015, In: Ecological Engineering. 82, p. 596-604 9 p.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    USING SATELLITES FOR PROVIDING BROADBAND ISLAND INTERCONNECTION-THE RACE IIlR2074 (CATALYST) PROJECT

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, AIAA International Communications Satellite Systems Conference, 15 th, San Diego, CA. p. 407-412 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Using seismicity and tomographic imaging to infer the location and rupture of the reservoir that supplies magma to the 2021 eruption at Fagradalsfjall, Iceland

    Hobe, A., Selek, B., Bazargan, M., Tryggvason, A. & Gudmundsson, A., 2021.

    Research output: Contribution to conferenceAbstractpeer-review

  70. Published

    Using self‐determination theory to understand the relationship between calling enactment and daily well‐being

    Conway, N., Clinton, M., Sturges, J. & Budjanovcanin, A., Nov 2015, In: Journal of organizational behavior. 36, 8, p. 1114–1131 18 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    Using self-reflective tools to understand violence perpetration among patients with personality disorders

    Gopalakrishnan, S., Ambrose, D. & Harvey, J., Nov 2019, In: Aggression and Violent Behavior. 49, 10 p., 101311.

    Research output: Contribution to journalArticlepeer-review

  72. Published

    Using Separable Bell-Diagonal States to Distribute Entanglement

    Kay, A., 21 Aug 2012, In: Physical Review Letters. 109, 8, 080503.

    Research output: Contribution to journalArticlepeer-review

  73. Published

    Using Signatures in Type Theory to Represent Situations

    Chatzikyriakidis, S. & Luo, Z., 2014, JSAI International Symposium on Artificial Intelligence. p. 172-183 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  74. E-pub ahead of print

    Using Signatures in Type Theory to Represent Situations

    Chatzikyriakidis, S. & Luo, Z., 25 Aug 2015, (E-pub ahead of print) New Frontiers in Artificial Intelligence : JSAI-isAI 2014 Workshops, LENLS, JURISIN, and GABA, Kanagawa, Japan, October 27-28, 2014, Revised Selected Papers. Murata, T., Mineshima, K. & Bekki, D. (eds.). Springer, p. 172-183 12 p. (Lecture Notes in Computer Science; vol. 9067).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  75. Published

    Using single cell cultivation system for on-chip monitoring of the interdivision timer in Chlamydomonas reinhardtii cell cycle

    Matsumura, K., Yagi, T., Hattori, A., Soloviev, M. & Yasuda, K., 2010, In: Journal of Nanobiotechnology. 8, p. 23

    Research output: Contribution to journalArticlepeer-review

  76. Published

    Using Social Choice Rule Sets in Multiple Attribute Decision Making for Information System Selection

    Bernroider, E. W. N. & Mitlöhner, J., 2007, Decision Support for Global Enterprises. Kulkarni, U., Power, D. J. & Sharda, R. (eds.). Springer, Vol. 2. p. 165-176 (Annals of Information Systems).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  77. Unpublished

    Using Social Media to Build Hidden Screen Histories - A Case Study of the Pebblemill.org Project

    Jackson, V., 2012, (Unpublished).

    Research output: Contribution to conferencePaper

  78. Published

    Using Social Media to Measure the Effectiveness of e-Government

    Alshehri, A. & O'Keefe, R., 2015.

    Research output: Contribution to conferenceAbstractpeer-review

  79. Published

    Using soil microbial inoculations to enhance substrate performance on extensive green roofs

    Molineux, C., Gange, A. & Newport, D., 15 Feb 2017, In: Science of The Total Environment. 580, p. 846-856 11 p.

    Research output: Contribution to journalArticlepeer-review

  80. Published

    Using temporal distancing to regulate emotion in adolescence: modulation by reactive aggression

    Ahmed, S., Somerville, L. & Sebastian, C., 2018, In: Cognition and Emotion. 32, 4, p. 812-826 15 p.

    Research output: Contribution to journalArticlepeer-review

  81. Published

    Using text messages to support recovering substance misusers

    McClelland, G. T., Duffy, P. & Davda, P., 7 Sep 2018, In: British Journal of Healthcare Management. 24, 9, p. 440-446 7 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    Using the Choice Framework to Situate Cases of Collective Action in Capabilities Thinking: The Example of Public Procurement

    Kleine, D., Jun 2013, Maitreyee - e-Journal of the Human Development and Capability Association. Human Development and Capability Association (HDCA), p. 15-18 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. E-pub ahead of print

    Using the Consultation-Based Reassurance Questionnaire to assess reassurance skills among physiotherapy students: reliability and responsiveness

    Ben Ami, N. & Pincus, T., 2 Sep 2020, (E-pub ahead of print) In: Physiotherapy theory and practice.

    Research output: Contribution to journalArticlepeer-review

  84. Published

    Using the dead to monitor the living: Can road kill counts detect trends in mammal abundance?

    George, L., Macpherson, J. L., Balmforth, Z. & Bright, P. W., 1 Jan 2011, In: Applied Ecology and Environmental Research. 9, 1, p. 27-41 15 p.

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Using the life history approach to open doors in community education

    Smith, G., 1994, In: By Word of Mouth. 22, p. 17-23

    Research output: Contribution to journalArticlepeer-review

  87. Unpublished
  88. Published

    Using the SF-36 measure to compare the health impact of multiple sclerosis and Parkinson's disease with normal population health profiles

    Riazi, A., Hobart, J. C., Lamping, D. L., Fitzpatrick, R., Freeman, J. A., Jenkinson, C., Peto, V. & Thompson, A. J., 2003, In: Journal of Neurology, Neurosurgery and Psychiatry. 74, 6, p. 710-4 5 p.

    Research output: Contribution to journalArticlepeer-review

  89. Published

    Using the Smart Card Web Server in Secure Branchless Banking

    Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lopez, J., Huang, X. & Sandhu, R. (eds.). Springer-Verlag, Vol. 7873. p. 250-263 14 p. (Lecture Notes In Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  90. Published
  91. Published

    Using the voids to fill the gaps: caves, time, and stratigraphy

    Plotnick, R. E., Kenig, F. & Scott, A. C., 22 Apr 2015, Strata and Time: Probing the Gaps in Our Understanding . Bath: The Geological Society, Vol. 404. p. 233-250 18 p. (Special Publications of the Geological Society; no. SP404).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  92. Published

    Using the δ18O values of rodent teeth to generate new millennial-scale climate records for archaeological cave sites

    Peneycad, E., Candy, I. & Schreve, D., 2018, In: Geophysical Research Abstracts. 20, EGU2018-1590.

    Research output: Contribution to journalMeeting abstractpeer-review

  93. Unpublished
  94. Published

    Using Toulmin’s Framework for the Analysis of Everyday Argumentation: Some Methodological Considerations

    Simosi, M., 2014, In: Bauer, M., Bicquelet, A. & Suerdem, A. (Eds). Textual Analysis (SAGE Benchmarks in Social Research Methods). London: Sage

    Research output: Chapter in Book/Report/Conference proceedingChapter

  95. Published

    Using Trusted Computing in Commercial Grids

    Yau, P-W. & Tomlinson, A., 1 Jul 2007, p. 31-36. 6 p.

    Research output: Contribution to conferencePaper

  96. Published

    Using trusted computing to secure mobile ubiquitous environments

    Leung, A., Yau, P-W. & Mitchell, C., 2009, Security and Privacy in Mobile & Wireless Networking. Gritzalis, S., Karaygiannis, T. & Skianis, C. (eds.). Leicester, UK: Troubador, p. 303-335 33 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  97. Published

    Using Verification Technology to Specify and Detect Malware

    Holzer, A., Kinder, J. & Veith, H., Feb 2007, 11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers. Springer, p. 497-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Using vision to control locomotion: looking where you want to go

    Wilkie, R. M., Kountouriotis, G. K., Merat, N. & Wann, J., 2010, In: Experimental Brain Research. 204, 4, p. 539-47 9 p.

    Research output: Contribution to journalArticlepeer-review

  99. Published

    Using visual approaches with Indigenous communities

    Berardi, A., Mistry, J., Haynes, L., Jafferally, D., Bignante, E., Albert, G., Xavier, R., Benjamin, R. & de Ville, G., 2017, Mapping environmental sustainability: Reflecting on systemic practices for participatory research. Oreszczyn, S. & Lane, A. (eds.). Bristol: The Policy Press, p. 103-128 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  100. Published

    Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices

    Eze, C., Nurse, JRC. & Happa, J., Mar 2016, In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 7, p. 39-57 19 p., 1.

    Research output: Contribution to journalArticlepeer-review