Home > Publications

Publications

41176 - 41200 out of 42,821Page size: 25
  1. Published

    Using Signatures in Type Theory to Represent Situations

    Chatzikyriakidis, S. & Luo, Z., 2014, JSAI International Symposium on Artificial Intelligence. p. 172-183 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  2. Published

    Using single cell cultivation system for on-chip monitoring of the interdivision timer in Chlamydomonas reinhardtii cell cycle

    Matsumura, K., Yagi, T., Hattori, A., Soloviev, M. & Yasuda, K., 2010, In: Journal of Nanobiotechnology. 8, p. 23

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Using Social Choice Rule Sets in Multiple Attribute Decision Making for Information System Selection

    Bernroider, E. W. N. & Mitlöhner, J., 2007, Decision Support for Global Enterprises. Kulkarni, U., Power, D. J. & Sharda, R. (eds.). Springer, Vol. 2. p. 165-176 (Annals of Information Systems).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Unpublished

    Using Social Media to Build Hidden Screen Histories - A Case Study of the Pebblemill.org Project

    Jackson, V., 2012, (Unpublished).

    Research output: Contribution to conferencePaper

  5. Published

    Using Social Media to Measure the Effectiveness of e-Government

    Alshehri, A. & O'Keefe, R., 2015.

    Research output: Contribution to conferenceAbstractpeer-review

  6. Published

    Using soil microbial inoculations to enhance substrate performance on extensive green roofs

    Molineux, C., Gange, A. & Newport, D., 15 Feb 2017, In: Science of The Total Environment. 580, p. 846-856 11 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Using temporal distancing to regulate emotion in adolescence: modulation by reactive aggression

    Ahmed, S., Somerville, L. & Sebastian, C., 2018, In: Cognition and Emotion. 32, 4, p. 812-826 15 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Using text messages to support recovering substance misusers

    McClelland, G. T., Duffy, P. & Davda, P., 7 Sep 2018, In: British Journal of Healthcare Management. 24, 9, p. 440-446 7 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Using the Choice Framework to Situate Cases of Collective Action in Capabilities Thinking: The Example of Public Procurement

    Kleine, D., Jun 2013, Maitreyee - e-Journal of the Human Development and Capability Association. Human Development and Capability Association (HDCA), p. 15-18 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. E-pub ahead of print

    Using the Consultation-Based Reassurance Questionnaire to assess reassurance skills among physiotherapy students: reliability and responsiveness

    Ben Ami, N. & Pincus, T., 2 Sep 2020, (E-pub ahead of print) In: Physiotherapy theory and practice.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Using the dead to monitor the living: Can road kill counts detect trends in mammal abundance?

    George, L., Macpherson, J. L., Balmforth, Z. & Bright, P. W., 1 Jan 2011, In: Applied Ecology and Environmental Research. 9, 1, p. 27-41 15 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Using the life history approach to open doors in community education

    Smith, G., 1994, In: By Word of Mouth. 22, p. 17-23

    Research output: Contribution to journalArticlepeer-review

  14. Unpublished
  15. Published

    Using the SF-36 measure to compare the health impact of multiple sclerosis and Parkinson's disease with normal population health profiles

    Riazi, A., Hobart, J. C., Lamping, D. L., Fitzpatrick, R., Freeman, J. A., Jenkinson, C., Peto, V. & Thompson, A. J., 2003, In: Journal of Neurology, Neurosurgery and Psychiatry. 74, 6, p. 710-4 5 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Using the Smart Card Web Server in Secure Branchless Banking

    Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lopez, J., Huang, X. & Sandhu, R. (eds.). Springer-Verlag, Vol. 7873. p. 250-263 14 p. (Lecture Notes In Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  17. Published
  18. Published

    Using the voids to fill the gaps: caves, time, and stratigraphy

    Plotnick, R. E., Kenig, F. & Scott, A. C., 22 Apr 2015, Strata and Time: Probing the Gaps in Our Understanding . Bath: The Geological Society, Vol. 404. p. 233-250 18 p. (Special Publications of the Geological Society; no. SP404).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  19. Published

    Using the δ18O values of rodent teeth to generate new millennial-scale climate records for archaeological cave sites

    Peneycad, E., Candy, I. & Schreve, D., 2018, In: Geophysical Research Abstracts. 20, EGU2018-1590.

    Research output: Contribution to journalMeeting abstractpeer-review

  20. Unpublished
  21. Published

    Using Toulmin’s Framework for the Analysis of Everyday Argumentation: Some Methodological Considerations

    Simosi, M., 2014, In: Bauer, M., Bicquelet, A. & Suerdem, A. (Eds). Textual Analysis (SAGE Benchmarks in Social Research Methods). London: Sage

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    Using Trusted Computing in Commercial Grids

    Yau, P-W. & Tomlinson, A., 1 Jul 2007, p. 31-36. 6 p.

    Research output: Contribution to conferencePaper

  23. Published

    Using trusted computing to secure mobile ubiquitous environments

    Leung, A., Yau, P-W. & Mitchell, C., 2009, Security and Privacy in Mobile & Wireless Networking. Gritzalis, S., Karaygiannis, T. & Skianis, C. (eds.). Leicester, UK: Troubador, p. 303-335 33 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  24. Published

    Using Verification Technology to Specify and Detect Malware

    Holzer, A., Kinder, J. & Veith, H., Feb 2007, 11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers. Springer, p. 497-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Using vision to control locomotion: looking where you want to go

    Wilkie, R. M., Kountouriotis, G. K., Merat, N. & Wann, J., 2010, In: Experimental Brain Research. 204, 4, p. 539-47 9 p.

    Research output: Contribution to journalArticlepeer-review