Home > Publications

Publications

38201 - 38250 out of 40,897Page size: 50
  1. Conference contribution › Research
  2. Published

    Understanding the dynamic process of emerging ICT adoption in UK service SMEs

    Eze, S., Duan, Y. & Jackson, S., 2011, UK Academy for Information Systems Conference Proceedings .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Understanding the experience-centeredness of security and privacy technologies

    Dunphy, P., Vines, J., Coles-Kemp, L., Clarke, R., Vlachokyriakos, V., Wright, P., McCarthy, J. & Olivier, P., 2014, Proceedings of the 2014 New Security Paradigms Workshop. . ACM, p. 83-94 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Understanding the Impact of ICT Adoption and Use in South African Manufacturing and Logistics SMEs: A Firm, Market and Regulatory (FMR) Context Perspective

    Gono, S., Harindranath, G. & Özcan, G. B., Nov 2014, Proceedings of the 2014 ISBE Conference, Manchester, 5-6 Nov 2014. ISBE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Understanding the implementation of social standards in global supply chains: A multi-dimensional analysis

    Soundararajan, V., Sep 2013, 27th annual British Academy of Management (BAM) Conference . Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Understanding the Indian Film Industry: the good, the bad and the ugly

    Sen Gupta, S., 2016, Knowledge Organisation and Learning Conference. London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Understanding the organo-carbonate associations in carbonaceous chondrites with the use of micro-Raman analysis

    Chan, QHS. & Zolensky, ME., 2015, European Planetary Science Congress 2015, held 27 September - 2 October, 2015 in Nantes, France. 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Unfolding in particle physics: a window on solving inverse problems

    Spano, F., Oct 2014, contribution to Top2013, 6th International Workshop on Top Quark Phyiscs, 14th-19th September 2013 , Durbach, Germany. Husemann, U., Mildner, H. & Roscher, F. (eds.). Verlag Deutsches Elektronen-Synchrotron, Vol. DESY-PROC-2014-02. p. 256-261 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Unified Model for Data Security -- A Position Paper

    Akram, R. N. & Ko, R. K. L., 1 Sep 2014, The 1st International Workshop on the Emerging Future Internet and Network Security (IEEE EFINS 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Aiash, M. & Loo, J. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Uniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent

    Cohen, L. & Rowe, R., 4 Sep 2018, 27th EACSL Annual Conference on Computer Science Logic (CSL 2018). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 119. p. 17:1-17:16 16 p. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Uniform, integral and efficient proofs for the determinant identities

    Tzameret, I. & Cook, S., 18 Aug 2017, 2017 32nd Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). IEEE, Vol. 32. p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Unifying Theories in Different Institutions

    Arrais, M. & Fiadeiro, J. L., 1996, COMPASS/ADT. Springer, Vol. 1130. p. 81-101 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Unique View of C Asteriod Regolith from the Jbilet Winselwan CM Chondrite

    Zolensky, M., Mikouchi, T., Hagiya, K., Ohsumi, K., Komatsu, M., Chan, Q. HS., Le, L., Kring, D., Cato, M. & Fagan, A. L., 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Universal portfolio selection

    Vovk, V. & Watkins, C. J. H. C., 1998, Proceedings of the Eleventh Annual Conference on Computational Learning Theory. New York: ACM Press, p. 12-23 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Universal Probability-Free Conformal Prediction

    Vovk, V. & Pavlovic, D., 2016, Proceedings of COPA 2016: Fifth Symposium on Conformal and Probabilistic Prediction with Applications. Springer, Vol. 9653. p. 40-47 8 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Universal well-calibrated algorithm for on-line classification

    Vovk, V., 2003, Proceedings of the Sixteenth Annual Conference on Learning Theory and Seventh Kernel Workshop. Scholkopf, B. & Warmuth, M. K. (eds.). p. 358-372 15 p. (Lecture Notes in Artificial Intelligence; vol. 2777).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Unknown quantum operations

    Schack, R., 2004, Quantum Theory: Reconsideration of Foundations 2. A., K. (ed.). Växjö: Växjö University Press, p. 507-518

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Unknown Quantum States and Operations, a Bayesian View

    Fuchs, C. A. & Schack, R., 2004, Quantum State Estimation: Lecture Notes in Physics {\bf 649}. Řeháček, J. & Paris, M. G. A. (eds.). Berlin: Springer Verlag, p. 147-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Unraveling the complexities of interdisciplinary software engineering

    Mehandjiev, N., Layzell, P. & Brereton, P., 2004, ELEVENTH ANNUAL INTERNATIONAL WORKSHOP ON SOFTWARE TECHNOLOGY AND ENGINEERING PRACTICE, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 214-221 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Unrestricted Faithful Rounding is Good Enough for Some LNS Applications

    Arnold, M. G. & Walter, C. D., 2001, 15th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Unsupervised Induction of Stochastic Context Free Grammars with Distributional Clustering

    Clark, A., 1 Jul 2001, Proc. of Conference on Computational Natural Language Learning. p. 105-112

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Upgrading Technological Capabilities by Developing Country Multinational Companies

    Rui, H. & Cuervo-Cazurra, A., 2013, Proceedings of the 55th Annual Meeting of the Academy of International Business: "Bridging the Divide: Linking IB to Complementary Disciplines and Practice". McDougall-Covin, P. & Kiyak, T. (eds.). 2013 Academy of International Business, p. 277-278 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Upgrading Technological Capabilities by Developing Country Multinational Companies

    Rui, H. & Cuervo-Cazurra, A., 2013, The 73rd Annual Meeting of the Academy of Management: “Capitalism in Question”. Academy of Management

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Uranium and metal concentrations in community water systems across the United States, 2006-2011

    Ravalli, F., Yu, Y., Bostick, B. C., Chillrud, S. N., Schilling, K., Basu, A., Navas-Acien, A. & Nigra, A. E., 2021, International Society for Environmental Epidemiology (ISEE) annual meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Submitted

    USAGE PATTERNS AND CHALLENGES OF MULTIPURPOSE COMMUNITY TELECENTRES IN MALAWI

    Kapondera, S. K. & Chigona, W., 2017, (Submitted) SIG Global Development.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Use of Satisfaction-Satisfaction Matrix (SSM) to evaluate E-Government services from the perspective of Japanese citizens and government service providers

    Wong, K., Nishimoto, H., Nishigaki, Y. & Jackson, S., 2013, 24th Australasian Conference on Information Systems, Melbourne, AU, 04 - 06 Dec.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    User acceptance of electronic commerce: lessons learned from the Bled eConference

    van der Heijden, H., 2012, 25th Special Anniversary Proceedings of the Bled eConference,. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    User acceptance of emergency alert technology: A case study

    Wu, P. F., 1 Jan 2009, ISCRAM 2009 - 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Information Systems for Crisis Response and Management, ISCRAM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 22 Oct 2020, Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press, p. 664-672 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    User Preference Analysis of Internet Social Media services

    Pant, V., Harindranath, G. & Wagner, W. P., 13 Jan 2016, 2015 International Conference on Information Resource Management (Conf-IRM), Ottawa, Canada, May.. Vol. 34.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    User satisfaction evaluation of Malaysian e-government education services

    Wong, M. S. & Jackson, S., 5 Feb 2018, 23rd IEEE International Technology Management Conference, Madeira Island, Portugal. IEEE, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Using Argument-based Features to Predict and Analyse Review Helpfulness

    Liu, H., Gao, Y., Lv, P., Li, M., Geng, S., Li, M. & Wang, H., Sep 2017, Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Copenhagen, Denmark: Association for Computational Linguistics, p. 1358–1363 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Using explicit state to describe architectures

    Lopes, A. & Fiadeiro, J. L., 1999, FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING. Finance, JP. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-160 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Using multiple chains for Gibbs sampling in mixed graphical association models

    Brewer, M., Luo, Z. & Gammerman, A., 1994, Computational Statistics. p. 185-189

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Using NLG and sensors to support personal narrative for children with complex communication needs

    Black, R., Reddington, J., Reiter, E., Tintarev, N. & Waller, A., 2010, Proceedings of the NAACL HLT 2010 Workshop on Speech and Language Processing for Assistive Technologies. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    USING SATELLITES FOR PROVIDING BROADBAND ISLAND INTERCONNECTION-THE RACE IIlR2074 (CATALYST) PROJECT

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, AIAA International Communications Satellite Systems Conference, 15 th, San Diego, CA. p. 407-412 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution