Home > Publications

Publications

38801 - 38850 out of 40,420Page size: 50
  1. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2011, In: International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    User-Generated Place Brand Equity on Twitter: The Dynamics of Brand Associations in Social Media.

    Andéhn, M., Kazeminia, A., Lucarelli, A. & Sevin, E., 2014, In: Place Branding and Public Diplomacy. 10, 2, p. 132-144

    Research output: Contribution to journalArticlepeer-review

  3. Unpublished

    User-generated Video as a New Genre of Documentary

    Said Mahfouz, M., 2012, (Unpublished) 198 p.

    Research output: ThesisDoctoral Thesis

  4. Published

    U-series isochron dating of immature and mature calcretes as a basis for constructing Quaternary landform chronologies: Examples from the Sorbas basin, southeast Spain

    Candy, I., Black, S. & Sellwood, B., 2005, In: Quaternary Research. 64, p. 100-111 12 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    User's guide to cryptography and standards

    Dent, A. W. & Mitchell, C. J., 2005, Artech House.

    Research output: Book/ReportBook

  6. Published

    'Users Rights and the Probation Service: some opportunities and obstacles'

    Broad, B. & Denney, D., 1996, In: The Howard Journal of Criminal Justice. 35, 1, p. 61-76.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Uses and misuses of meta-analysis in plant ecology

    Koricheva, J. & Gurevitch, J., 2014, In: Journal of Ecology. 102, p. 828–844

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Uses of the operatic canon: Verdi and Wagner

    Berry, M. & Cormac, N., Aug 2020, The Oxford Handbook of the Operatic Canon. Oxford University Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    Uses, benefits and challenges of using rural community telecentres as tools for development: the Case of Vikwa Community Telecentre in Kasungu, Malawi

    Kapondera, S. K. & Namusanya, D. M., 2017, In: Journal of Development and Communication Studies. 5, 1, p. 1-21 21 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Forthcoming
  12. Forthcoming

    Using a neurodiversity framework to test young children’s attitudes towards autism

    Hare, A., Pitman, E. & Cage, E., 4 Mar 2019, (Accepted/In press) In: British Journal of Special Education.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Using a parental checklist to identify diagnostic groups in children with communication impairment: A validation of the Children’s Communication Checklist – 2

    Norbury, CF., Nash, M., Baird, G. & Bishop, DVM., 2004, In: International Journal of Language and Communication Impairments. 39, 3, p. 345-364

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Using a quantum computer to investigate quantum chaos

    Schack, R., 1998, In: Physical Review A. 57, p. 1634-1635 2 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Using a systems viability approach to evaluate integrated conservation and development projects: assessing the impact of the North Rupununi Adaptive Management Process, Guyana

    Mistry, J., Berardi, A., Simpson, M., Davis, O. & Haynes, L., Sep 2010, In: Geographical Journal. 176, 3, p. 241-252

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Using a Whole Person Approach to Support People with Cancer: A Longitudinal, Mixed-Methods Service Evaluation

    Polley, M., Jolliffe, R., Boxell, E., Zollman, C., Jackson, S. & Seers, H., 1 Dec 2016, In: Integrative Cancer Therapies. 15, 4, p. 435-445 11 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Using alt text to make science Twitter more accessible for people with visual impairments

    Chiarella, D., Yarbrough, J. & Jackson, C. A-L., 16 Nov 2020, In: Nature Communications. 11, p. 1-3 3 p., 5803.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Using an exponential sine sweep to measure the vocal tract resonances

    Delvaux, B. & Howard, D. M., 2013, In: Journal of the Acoustical Society of America. 134, 5, p. 4206 1 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Using an oculomotor signature as an indicator of aesthetic preference

    Holmes, T. & Zanker, J., 2012, In: iPerception. 3, 7, p. 426-439 14 p.

    Research output: Contribution to journalSpecial issuepeer-review

  20. Unpublished
  21. Published

    USING ANTISENSE RNA TO STUDY GENE-FUNCTION - INHIBITION OF CAROTENOID BIOSYNTHESIS IN TRANSGENIC TOMATOES

    BIRD, CR., RAY, JA., FLETCHER, JD., BONIWELL, JM., BIRD, AS., TEULIERES, C., BLAIN, N. V., BRAMLEY, PM., SCHUCH, W. & Bramley, P., Jul 1991, In: Bio-Technology. 9, 7, p. 635-639 5 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Using Argument-based Features to Predict and Analyse Review Helpfulness

    Liu, H., Gao, Y., Lv, P., Li, M., Geng, S., Li, M. & Wang, H., Sep 2017, Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Copenhagen, Denmark: Association for Computational Linguistics, p. 1358–1363 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  25. Published

    Using computer programs to code qualitative data

    Catterall, M. & Maclaran, P., 1996, In: Marketing Intelligence and Planning. 14, 4, p. 29-33

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Using computer software for the analysis of qualitative market research data

    Catterall, M. & Maclaran, P., Jul 1998, In: Journal of the Market Research Society. 40, 3, p. 207-222 16 p.

    Research output: Contribution to journalArticlepeer-review

  27. E-pub ahead of print

    Using connectivity-based real-time fMRI neurofeedback to modulate attentional and resting state networks in people with high trait anxiety

    Morgenroth, E., Saviola, F., Gilleen, J., Allen, B., Lührs, M., W. Eysenck, M. & Allen, P., 23 Jan 2020, In: NeuroImage: Clinical. 25, p. 1-10 10 p., 102191.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Using Contextual Representations to Efficiently Learn Context-Free Languages

    Clark, A., Eyraud, R. & Habrard, A., 1 Oct 2010, In: Journal of Machine Learning Research. 11, p. 2707-2744 38 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Using decomposition-parameters for QBF: Mind the prefix!

    Eiben, E., Ganian, R. & Ordyniak, S., Jun 2020, In: Journal of Computer and System Sciences. 110, p. 1-21 21 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Using Decomposition-Parameters for QBF: Mind the Prefix!

    Eiben, E., Ganian, R. & Ordyniak, S., 21 Feb 2016, p. 964-970. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  32. Published

    Using Design Thinking to Understand Cyber Attack Surfaces of Future Smart Grids

    Snow, S., Happa, J., Horrocks, N. & Glencross, M., 30 Oct 2020, In: Frontiers in Energy Research. 8, p. 1-17 17 p., 591999.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Using detrital garnet compositions to determine provenance: a new compositional database and procedure

    Suggate, S. & Hall, R., 2014, Sediment Provenance Studies in Hydrocarbon Exploration and Production. Scott, R. A., Smyth, H. R., Morton, A. C. & Richardson, N. (eds.). Geological Society of London Special Publication, Vol. 386. p. 373-393 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  34. Published

    Using developmental cognitive neuroscience to study behavioral and attentional control

    Astle, D. E. & Scerif, G., 2009, In: Developmental Psychobiology. 51, 2, p. 107-18 12 p.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    Using discourse analysis to understand IS planning and development in organization: A case study

    Sillince, J. A. A. & Harindranath, G., 1999, SYSTEMS DEVELOPMENT METHODS FOR DATABASES, ENTERPRISE MODELING, AND WORKFLOW MANAGEMENT. Wojtkowsky, W. (ed.). NEW YORK: KLUWER ACADEMIC/PLENUM PUBL, p. 327-336 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Using Electroglottographic Real-Time Feedback to Control Posterior Glottal Adduction during Phonation

    Herbst, C. T., Howard, D. & Schloemicher-Thier, J., Jan 2010, In: Journal of Voice. 24, 1, p. 72-85 14 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Using electrostatic potentials to predict DNA-binding sites on DNA-binding proteins

    Jones, S., Shanahan, H. P., Berman, H. M. & Thornton, J. M., 15 Dec 2003, In: Nucleic Acids Research. 31, 24, p. 7189-7198 10 p.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Using Evidence To Inform Decision-Making

    Evans, T., 2014, Applying Research Evidence in Social Work Practice. Webber, M. (ed.). Red Globe Press

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  42. Published

    Using explicit state to describe architectures

    Lopes, A. & Fiadeiro, J. L., 1999, FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING. Finance, JP. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-160 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Using Foucalt to analyse ethics in the practice of problem structuring methods

    Córdoba-Pachón, J-R., 1 Sep 2006, In: Journal of the Operational Research Society. 57, 9, p. 1027-1034

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Using Game controller for Relaying Deictic Gestures in Computer Mediated Communication

    Walkowski, S., Doerner, R., Lievonen, M. & Rosenberg, D., Jun 2011, In: International Journal of Human-Computer Studies. 69, 6, p. 362-374 12 p., doi:10.1016/j.ijhcs.2011.01.002.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Using GAs to create a waveguide model of the oral vocal tract

    Cooper, C., Howard, D. M. & and Tyrrell, A. M., 2004, In: Lecture Notes in Computer Science. 3005-200, p. 280-288 9 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Using GAs to create a waveguide model of the oral vocal tract: APPLICATIONS OF EVOLUTIONARY COMPUTING

    Cooper, C. H. V., Howard, D. M. & Tyrrell, A. M., 2004, APPLICATIONS OF EVOLUTIONARY COMPUTING. Raidl, GR. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 280-288 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  47. Unpublished

    Using Gesture to Support Language

    Wray, C., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  48. Published

    Using Grounded Theory to Explore Employees' Brand-Oriented Behaviors

    Gill-Simmen, L., 2019, In: SAGE Research Methods Cases.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution