Home > Publications

Publications

38801 - 38825 out of 42,410Page size: 25
  1. Published

    An analysis of core-mantle boundary Stoneley mode sensitivity and sources of uncertainty

    Robson, A., Lau, H., Koelemeijer, P. & Romanowicz, B., 29 Oct 2021, In: Geophysical Journal International. ggab448.

    Research output: Contribution to journalArticlepeer-review

  2. Published
  3. Published

    An Analysis of Cause-Related Marketing Implementation Strategies through Social Alliance: Partnership Conditions and Strategic Objectives

    Liu, G. & Ko, W. W., 2011, In: Journal of Business Ethics. 100, 2, p. 253-281

    Research output: Contribution to journalArticlepeer-review

  4. Published

    An Analysis of Active and Latent Errors During Object-Oriented Maintenance

    Douce, C. R. & Layzell, P. J., 1998, PPIG-10 Annual workshop Proceedings, Open University, UK, 5-7 January 1998.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Unpublished
  6. Published

    An Ambidexterity Perspective Toward Multinational Enterprises from Emerging Economies

    Luo, Y. & Rui, H., Nov 2009, In: Academy of Management Perspective. 23, 4, p. 49-70 21 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published
  8. Published

    An Alien Concept? The Continuity of Anti-Alienism in British Society before 1940

    Cesarani, D., 1993, The Internment of Aliens in Twentieth Century Britain. Cesarani, D. & Kushner, T. (eds.). London: Frank Cass, p. 25-42

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    An Algorithm for the SAT Problem for Formulae of Linear Length

    Wahlström, M., 2005, ESA. p. 107-118 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    An Algorithm for Finding Input-Output Constrained Convex Sets in an Acyclic Digraph

    Gutin, G., Johnstone, A., Reddington, J., Scott, E., Yeo, A., Broersma, H. (ed.), Erlebach, T. (ed.), Friedeizky, T. (ed.) & Paulusma, D. (ed.), 2008, In: Lecture Notes in Computer Science. 5344, p. 206-217 12 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    An algorithm for finding input-output constrained convex sets in an acyclic digraph

    Gutin, G., Johnstone, A., Reddington, J., Scott, E. & Yeo, A., May 2012, In: Journal of Discrete Algorithms. 13, p. 47-58 12 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    An algorithm for finding connected convex subgraphs of an acyclic digraph

    Gutin, G., Johnstone, A., Reddington, J., Scott, E., Soleimanfallah, A. & Yeo, A., 2007, p. 69-82. 14 p.

    Research output: Contribution to conferencePaperpeer-review

  13. Published

    An Algorithm for Efficient Geometric Secret Sharing

    Martin, K. M. & Jackson, W-A., 1998, In: Utilitas Mathematica. 54, p. 127-150 24 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    An Algebraic Theory of Complexity for Valued Constraints: Establishing a Galois Connection

    Cohen, D. A., Creed, P., Jeavons, P. G. & Živný, S., 2011, Mathematical Foundations of Computer Science 2011: 36th International Symposium, MFCS 2011, Warsaw, Poland, August 22-26, 2011: Proceedings. Springer, p. 231-242 (Lecture Notes in Computer Science; vol. 6907).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    An Algebraic Theory of Complexity for Discrete Optimisation

    Cohen, D. A., Cooper, M. C., Creed, P., Jeavons, P. G. & Živný, S., 2013, In: SIAM Journal on Computing. 42, 5, p. 1915-1939 24 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    An algebraic semantics of event-based architectures

    Fiadeiro, J. L. & Lopes, A., 1 Oct 2007, In: Mathematical Structures in Computer Science. 17, 5, p. 1029-1073 45 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    An Algebraic Framework for Cipher Embeddings

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2005, Proceedings of Cryptography and Coding, 10th IMA International Conference, 2005. Smart, N. (ed.). Springer, Vol. 3796. p. 278-289 12 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  18. Published

    An Algebraic Characterization of Tractable Constraints

    Jeavons, P. G. & Cohen, D. A., 1995, p. 633-642.

    Research output: Contribution to conferencePaper

  19. Published

    An algebraic characterisation of complexity for valued constraints

    Cohen, D., Cooper, M. & Jeavons, P., 2006, p. 107-121.

    Research output: Contribution to conferencePaper

  20. Published

    An Algebraic Approach to the Analysis of Constrained Workflow Systems

    Crampton, J., 2004, Proceedings of 3rd Workshop on Foundations of Computer Security (FCS'04). p. 61-74 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems

    Mcevoy, R. & Wolthusen, S. D., May 2010, Proceedings of the 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 125-133

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    An AHP and Fuzzy AHP Multifactor Decision Making Approach for Technology and Supplier Selection in the High-Functionality Textile Industry

    Coronado Mondragon, A., Mastrocinque, E., Tsai, J-F. & Hogg, P., 1 Aug 2021, In: IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT. 68, 4, p. 1112-1125 14 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    An agile approach to language modelling and development

    Johnstone, A., Mosses, P. D. & Scott, E., Mar 2010, In: Innovations in Systems and Software Engineering. 6, 1-2, p. 145-153 9 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    An Agent Development Framework based on Social Positions

    Lekeas, G. K. & Stathis, K., 1 Oct 2004, IEEE Interantional Conference on Systems, Man and Cybernetics. Thiessen, W. & Wieringa, P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    An agent development framework based on social positions

    Lekeas, G. & Stathis, K., 2004, p. 5461-5466. 6 p.

    Research output: Contribution to conferencePaperpeer-review