Home > Publications

Publications

36551 - 36600 out of 38,708Page size: 50
  1. Published

    Trouble articulating the right words: Evidence for a response-exclusion account of distraction during semantic fluency

    Marsh, J. E., Crawford, J. C., Pilgrim, L. K., Sörqvist, P. & Hughes, R. W., Oct 2017, In : Scandinavian Journal of Psychology. 58, 5, p. 367-372 6 p.

    Research output: Contribution to journalArticle

  2. Published

    Troublesome histories: performance and early modern drama

    Schafer, E., 2012, The Cambridge Companion to Shakespeare and Contemporary Dramatists. Hoenslaars, T. (ed.). Cambridge University Press, p. 244-268 25 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Troublesome Practices: Mothering, Literature and Ethics

    Jeremiah, E., 2002, In : Journal of the Association for Research on Mothering. 4, 2, p. 7-16 10 p.

    Research output: Contribution to journalArticle

  4. Unpublished

    Troubling Child Protection in England: Developing Critical Social Work Practice

    Gupta, A., 2016, (Unpublished) 135 p.

    Research output: ThesisDoctoral Thesis

  5. Published

    Troy Kennedy Martin

    Cooke, L., 2007, Manchester: Manchester University Press. 200 p. (Television Series)

    Research output: Book/ReportBook

  6. Published

    Troy Kennedy Martin: Forty Years of Writing for the Screen

    Cooke, L., 2001, In : Television & New Media. 2, 2, p. 167-180 14 p.

    Research output: Contribution to journalArticle

  7. Published

    True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots

    Seifert, C., Komisarczuk, P. & Welch, I., 2009, The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece. p. 63-69 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Trump’s 100 Days: introduction

    Bentley, M., Eroukhmanoff, C. & Hackett, U., 25 Jul 2017, In : Critical Studies on Security. 5, 2, p. 166-167

    Research output: Contribution to journalArticle

  9. Published

    Trumpeters and diplomacy on the eve of the Thirty Years’ War: the album amicorum of Jonas Kröschel

    Rose, S., 2012, In : Early Music. 40, 3, p. 379-392

    Research output: Contribution to journalArticle

  10. Published

    Trumpington – the blueprint for an award-winning community?

    Sachs Olsen, C., 2016, In : Habitorials. 1

    Research output: Contribution to journalArticle

  11. Published

    Trump's 100 Days: Foreign Policy and Security Implications

    Bentley, M., Eroukhmanoff, C. & Hackett, U., 25 Jul 2017, In : Critical Studies on Security. 5, 2

    Research output: Contribution to journalSpecial issue

  12. Published

    Truncated recursive estimation procedures

    Sharia, T., 1997, In : Proc. A. Razmadze Math. Inst.. 115, p. 149-159 10 p.

    Research output: Contribution to journalArticle

  13. Unpublished

    Truncated Stochastic Approximation with Moving Bounds

    Zhong, L., 2015, (Unpublished) 139 p.

    Research output: ThesisDoctoral Thesis

  14. Published

    Truncated Stochastic Approximation with Moving Bounds: Convergence

    Sharia, T., 7 Mar 2014, In : Statistical Inference for Stochastic Processes. 17, p. 163 17 p.

    Research output: Contribution to journalArticle

  15. Published

    Truncation attacks on MACs

    Mitchell, C. J., Jun 2003, In : Electronics Letters. 39, 20, p. 1439-1440 2 p.

    Research output: Contribution to journalArticle

  16. Published

    Trust Accounting?

    Froud, J., Haslam, C., Johal, S., Shaoul, J. & Williams, K., 1996.

    Research output: Working paper

  17. Published

    Trust and conflict within virtual inter-organizational alliances: a framework for facilitating knowledge sharing

    Panteli, N. & Sockalingam, S., Jun 2005, In : Decision Support Systems. 39, 4, p. 599-617 19 p.

    Research output: Contribution to journalArticle

  18. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. In preparation

    Trust and Reconciliation

    Nettelfield, L., 2015, (In preparation) Peace Works. United States Institute for Peace

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  20. Published

    Trust and temporary virtual teams: Alternative explanations and dramaturgical relationships

    Panteli, N. & Duncan, E., 1 Dec 2004, In : Information Technology & People. 17, 4, p. 423-441 19 p.

    Research output: Contribution to journalArticle

  21. Published

    Trust in me: Allegiance choices in a post-split terrorist movement

    Morrison, J., 2016, In : Aggression and Violent Behavior. 28, p. 47-56 10 p.

    Research output: Contribution to journalArticle

  22. Published

    Trust in me: Trustworthy others are seen as more physically similar to the self

    Farmer, H., McKay, R. & Tsakiris, M., 2014, In : Psychological Science. 25, 1, p. 290–292 3 p.

    Research output: Contribution to journalArticle

  23. Published

    Trust Management For Secure Information Flows

    Srivatsa, M., Balfe, S., Paterson, K. G. & Rohatgi, P., 2008, Proceedings of the 2008 ACM Conference on Computer and Communications Security (CCS 2008). Ning, P., Syverson, P. F. & Jha, S. (eds.). ACM Press, p. 175-188 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  24. Published
  25. Published

    Trust Strategies for ART Testbed

    Kafali, O. & Yolum, P., 2006, Ninth International Workshop on Trust in Agent Societies, AAMAS. p. 43-49 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Forthcoming

    Trust under the Panopticon: Factors Influencing Trust within Contemporary Social Movements

    Azer, E., Zheng, Y. & Harindranath, G., 14 Feb 2019, (Accepted/In press) 35th EGOS Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Trust, confidence, credibility: Citizen responses on Twitter to opinion polls during the 2010 UK general election

    Ampofo, L., Anstead, N. & O'Loughlin, B., 2011, In : Information, Communication and Society.

    Research output: Contribution to journalArticle

  28. Forthcoming

    Trust, confidence, credibility: Citizen responses on Twitter to opinion polls during the 2010 UK General Election

    O'Loughlin, B. & Anstead, N., 2012, (Accepted/In press) Social Media and Democracy: Innovations in Participatory Politics. Loader, B. & Mercea, D. (eds.). Abingdon and New York: Routledge, p. 91 108 p. (Routledge research in political communication).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  29. Published

    Trusted Computing

    Mitchell, C. J. (ed.), 2005, IEE Press. 313 p.

    Research output: Book/ReportAnthology

  30. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings

    Chen, L. (ed.), Mitchell, C. J. (ed.) & Martin, A. (ed.), 2009, Springer-Verlag. 263 p. (Lecture Notes in Computer Science; vol. 5471)

    Research output: Book/ReportAnthology

  32. Published

    Trusted Computing: Providing security for Peer-to-Peer Networks

    Balfe, S., Lakhani, A. D. & Paterson, K. G., 2005, Proc. Fifth International Conference on Peer-to-Peer Computing. Caronni, G. (ed.). IEEE Computer Society Press, p. 117-124 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  33. Published

    Trusted computing: Security and applications

    Gallery, E. M. & Mitchell, C. J., 2009, In : Cryptologia. 33, p. 217-245 29 p.

    Research output: Contribution to journalArticle

  34. Published

    Trusted markets: the exchanges of Islamic companies

    Özcan, G. & Çokgezen, M., 2006, In : Comparative Economic Studies. 48, 1, p. 132-155

    Research output: Contribution to journalArticle

  35. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Trusted Systems: 4th International Conference, InTrust 2012, London, UK, December 17-18, 2012, Proceedings

    Mitchell, C. J. (ed.) & Tomlinson, A. (ed.), 12 Dec 2012, Springer-Verlag. 117 p. (Lecture Notes in Computer Science; no. 7711)

    Research output: Book/ReportAnthology

  38. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Trusted Virtual Disk Images

    Gebhardt, C. & Tomlinson, A., 1 Jul 2009, Future of Trust in Computing. Vieweg and Teubner, p. 197-207 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  40. Published

    Truth and death in Iraq under sanctions

    Spagat, M., Sep 2010, In : Significance. 7, 3, p. 116-120 5 p.

    Research output: Contribution to journalArticle

  41. Published

    Truth and deception in Athenian Forensic Narratives: An Assessment of Demosthenes 54 and Lysias 3

    Kremmydas, C., 21 Aug 2019, Forensic Narratives in Athenian Courts. Edwards, M. & Spatharas, D. (eds.). Routledge, p. 211-229 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  42. Published

    Truth, Aesthetics, History

    Eaglestone, R., 2005, Critical Pasts: writing criticism, writing history. Smallwood, P. (ed.). Lewisburg: Bucknell University Press / Associated University Presses, p. 171-186

    Research output: Chapter in Book/Report/Conference proceedingChapter

  43. Published

    Truth, Language and Art: Benjamin, Davidson and Heidegger

    Bowie, A., Missing, B. (ed.) & Missing, P. (ed.), 1994, Walter Benjamin in the Post-Modern.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  44. Unpublished
  45. Published

    TSP tour domination and Hamilton cycle decompositions of regular digraphs.

    Gutin, G. & Yeo, A., 2001, In : Operations Research Letters. 28, 3, p. 107-111

    Research output: Contribution to journalArticle

  46. Published

    Tsunami modeling of a submarine landslide in the Fram Strait

    Berndt, C., Brune, S., Nisbet, E., Zschau, J. & Sobolev, S. V., 9 Apr 2009, In : Geochemistry, Geophysics, Geosystems. 10, 9 p.

    Research output: Contribution to journalArticle

  47. Published

    Tudor Queenship: The reigns of Mary and Elizabeth

    Whitelock, A. (ed.) & Hunt, A. (ed.), 2010, Palgrave Macmillan.

    Research output: Book/ReportBook

  48. Published

    Tunable balancing of RSA

    McKee, J., Galbraith, S. D. & Heneghan, C., 2005, ACISP 10. p. 280-292 (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Tunable Microwave Single-Photon Source Based on Transmon Qubit with High Efficiency

    Zhou, Y., Peng, Z., Horiuchi, Y., Astafiev, O. V. & Tsai, J. S., 3 Mar 2020, In : Physical Review Applied. 13, 3, p. 1-11 11 p., 034007.

    Research output: Contribution to journalArticle

  50. Published

    Tundra and boreal forest of interior Alaska during terminal MIS 6 and MIS 5e.

    Bigelow, N., Edwards, M. E., Elias, S. & Hamilton, T., 9 Mar 2014, In : Vegetation History and Archaeobotany. 23, 3, p. 177-193 16 p.

    Research output: Contribution to journalArticle