Home > Publications

Publications

42201 - 42225 out of 43,239Page size: 25
  1. E-pub ahead of print

    Weak asymmetric interspecific aggression and divergent habitat preferences at an elevational contact zone between tropical songbirds

    Jones, S., Tobias, J., Freeman, R. & Portugal, S., 26 Oct 2019, (E-pub ahead of print) In: Ibis. p. 1-29 29 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    Weak Conditions for Nonparametric Density Shrinkage

    Sancetta, A., 2013, In: Journal of Multivariate Analysis. 115, p. 285-300

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Weak Convergence of Laws on ℝK with Common Marginals

    Sancetta, A., Jun 2007, In: Journal of Theoretical Probability. 20, 2, p. 371-380 10 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Weak links and DC SQUIDS on artificial nonsymmetric grain boundaries in YBa 2Cu 3O 7-delta

    Ivanov, Z. G., Nilsson, P. A., Winkler, D., Alarco, J. A., Claeson, T., Stepantsov, E. A. & Tzalenchuk, A., 1991, In: Applied Physics Letters. 59, 23, p. 3030

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Weak localization and electron-electron interactions in a two-dimensional grid lateral surface superlattice

    LIANG, C. T., SMITH, C. G., NICHOLLS, J. T., HUGHES, R. J. F., PEPPER, M., FROST, J. E. F., RITCHIE, D. A., GRIMSHAW, M. P. & JONES, G. A. C., 15 Mar 1994, In: Physical Review B. 49, 12, p. 8518-8521 4 p.

    Research output: Contribution to journalComment/debatepeer-review

  6. Published

    Weak localization scattering lengths in epitaxial, and CVD graphene

    Baker, A. M. R., Alexander-Webber, J. A., Altebaeumer, T., Janssen, T. J. B. M., Tzalenchuk, A., Lara-Avila, S., Kubatkin, S., Yakimova, R., Lin, C. T., Li, L. J. & Nicholas, R. J., 2012, In: Physical Review B. 86, 23, 045414.

    Research output: Contribution to journalArticlepeer-review

  7. Forthcoming

    Weak Messianic Power and the Holocaust

    Eaglestone, R., 2010, (Accepted/In press) The Politics to Come. Bradley, A. (ed.). London: Continuum, p. 131-140

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    Weak Synchrony Models and Failure Detectors for Message Passing (k-)Set Agreement

    Biely, M., Robinson, P. & Schmid, U., 2009, Principles of Distributed Systems, 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings. p. 285-299 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Weak Transitivity in Coercive Subtyping

    Luo, Y., Luo, Z. & Soloviev, S., 2003, Types for Proofs and Programs, Proc. of Inter Conf of TYPES'02. LNCS 2646. p. 220--239

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Weakly Hamiltonian-connected ordinary multipartite tournaments.

    Gutin, G., Bang-Jensen, J. & Huang, J., 1995, In: Discrete Mathematics. 138, 1-3, p. 63-74

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Weakness Plagues Ineffective Panacea

    McSweeney, B., 1985, In: Pass. December

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Weaknesses in shared RSA key generation protocols

    Blackburn, S. R., Blake-Wilson, S., Burmester, M. & Galbraith, S. D., 1999, Cryptography and Coding, 7th IMA International Conference, Cirencester. Walker, M. (ed.). Berlin: Springer, p. 300-306 7 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Published

    Weaknesses of protocols for updating the parameters of an established threshold scheme

    Martin, K. M. & Nakahara Jr, J., 2001, In: IEE Proc. Computers and Digital Techniques. 148, 1, p. 45-48 4 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Wealth, volume and stock market volatility: Case of Hong Kong

    Li, M. C., 2007, In: Applied Economics. 39, 15, p. 1937-1953

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Weaponising the Crusades: Justifying Terrorism and Political Violence

    Awan, A., 2 Jul 2019, The Crusades in the Modern World : Engaging the Crusades. Horswell, M. & Awan, A. N. (eds.). 1 ed. Routledge, Vol. 2. 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  16. Published

    Weapons of mass communication: The securitization of social networking sites

    Pinkerton, A., Young, S. & Dodds, K., Mar 2011, In: Political Geography. 30, 3, p. 115-117 3 p.

    Research output: Contribution to journalEditorialpeer-review

  17. Published

    Weapons of Mass Destruction and US Foreign Policy: The strategic use of a concept

    Bentley, M., 19 Mar 2014, 1 ed. London: Routledge. 192 p.

    Research output: Book/ReportBook

  18. Published

    Weapons of Mass Destruction: The Search for Global Security

    Bentley, M., 15 Apr 2018, In: Security Journal. 31, 2, p. 660-62

    Research output: Contribution to journalBook/Film/Article reviewpeer-review

  19. Forthcoming

    Wearable Security and Privacy

    Blasco Alis, J., Chen, T. M., Wolff, D. & Patil, H. K., 26 Oct 2017, (Accepted/In press) The Philosophy of Mission-Oriented Wireless Sensor Networks. Ammari, H. (ed.). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  20. Published

    Wearables Security and Privacy

    Blasco, J., Chen, T. M., Kupwade Patil, H. & Wolff, D., 1 Jan 2019, Studies in Systems, Decision and Control. Springer International Publishing AG, p. 351-380 30 p. (Studies in Systems, Decision and Control; vol. 164).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Tileria, M., Blasco, J. & Suarez-Tangil, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published
  23. Published

    Weather

    Williams, D., 2006, In: Performance Research. 11, 3, p. 142-144 3 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Weather Based Photovoltaic Energy Generation Prediction Using LSTM Networks

    Arshi, S., Zhang, L. & Strachan, B., 30 Sep 2019, 2019 International Joint Conference on Neural Networks (IJCNN). International Joint Conference on Neural Networks (IJCNN): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Weaver's Sundries

    Cowie, D. & Brandon III, W. M. (ed.), May 2017, USA : 1888 Center.

    Research output: Other contribution