Home > Publications

Publications

38201 - 38250 out of 39,928Page size: 50
  1. Paper › Research › Peer-reviewed
  2. Published

    An algorithm for finding connected convex subgraphs of an acyclic digraph

    Gutin, G., Johnstone, A., Reddington, J., Scott, E., Soleimanfallah, A. & Yeo, A., 2007, p. 69-82. 14 p.

    Research output: Contribution to conferencePaperpeer-review

  3. Published
  4. Published

    An ANFIS-PI based boost converter control scheme

    Darvill, J., Tisan, A. & Cirstea, M., 1 Oct 2015, p. 632-639. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  5. Published

    An approach to early evaluation of informational privacy requirements

    Barn, B. S., Primiero, G. & Barn, R., 13 Apr 2015, p. 1370-1375. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  6. Published

    An end user platform for implementing artificial neutron networks on FPGA

    Tisan, A. & Chin, J., 1 Oct 2015, p. 856-859. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  7. Published

    An ethics framework for research into heterogeneous systems

    Happa, J., Nurse, J. R. C., Goldsmith, M., Creese, S. & Williams, R., 14 Jun 2018, p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  8. E-pub ahead of print

    An Evaluation of the Security of the Bitcoin Peer-To-Peer Network

    Tapsell, J., Akram, R. N. & Markantonakis, K., 3 Jun 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  9. Unpublished

    An expedition into maritime metadata: Curating dispersed sources for a multi-scalar exploration of Nazi-era Jewish refugees at sea

    Gigliotti, S., 4 Nov 2020, (Unpublished).

    Research output: Contribution to conferencePaperpeer-review

  10. Published
  11. Published

    An IoT-based pervasive body hydration tracker (PHT)

    Chin, J. & Tisan, A., 1 Oct 2015, p. 437-441. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  12. Published

    An ontological representation of a taxonomy for cybercrime. In 24th European Conference on Information Systems (ECIS 2016)

    Barn, R. & Barn, B. S., 2016.

    Research output: Contribution to conferencePaperpeer-review

  13. Published

    Another look at indirect negative evidence

    Clark, A. & Lappin, S., 1 Mar 2009.

    Research output: Contribution to conferencePaperpeer-review

  14. E-pub ahead of print

    Another Look at Some Isogeny Hardness Assumptions

    Merz, S-P., Minko, R. & Petit, C., 14 Feb 2020, p. 496-511. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  15. Published
  16. Published

    Architecture and algorithms for syntetizable neural networks withon-chip learning

    Tisan, A., Tisan, A., Oniga, I. L., Buchman, A. & Gavrincea, C., 2007.

    Research output: Contribution to conferencePaperpeer-review

  17. Published

    Are diamonds forever? Exploring the creation and maintenance of a market for ethical diamond engagement rings

    Glozer, S. & Sethi, H., 2013, p. 6-8. 2 p.

    Research output: Contribution to conferencePaperpeer-review

  18. Published

    Artificial olfaction system with hardware on-chip learning neural networks

    Tisan, A., Cirstea, M., Oniga, I. L. & Buchman, A., 2010.

    Research output: Contribution to conferencePaperpeer-review

  19. Published

    Attacker-centric thinking in security: perspectives from financial services practitioners

    Moeckel, C., Aug 2020, p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  20. Unpublished

    Back to the Future

    Markaki, L., Mar 2019, (Unpublished).

    Research output: Contribution to conferencePaperpeer-review

  21. Published
  22. Published

    Battle to blur: counter-mapping and politics of ground truth

    Eades, G., 2014.

    Research output: Contribution to conferencePaperpeer-review

  23. Published

    Beckett's Breath: Theatricality and Non-Art

    Goudouna, S., 2006.

    Research output: Contribution to conferencePaperpeer-review

  24. Published

    Beckett's Breath

    Goudouna, S., 2010.

    Research output: Contribution to conferencePaperpeer-review

  25. Published

    Beyond Work and Life: Constructing New Domains in the Digital Age

    Whiting, R., Roby, H., Symon, G. & Chamakiotis, P., 2015.

    Research output: Contribution to conferencePaperpeer-review

  26. Published

    Big Data Meets Credit Scoring: The Risks and Rewards of Reform

    Marriott, J. & Robinson, G., 2016.

    Research output: Contribution to conferencePaperpeer-review

  27. Published

    Binarisation via Dualisation for Valued Constraints

    Cohen, D., Cooper, M., Jeavons, P. & Živný, S., Jan 2015, p. 3731-3737. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  28. Unpublished

    Bricolage, Maturity and the Small Firm: The Case of a Japanese Parts Supplier

    Fitzgerald, R. & Dyerson, R., 2018, (Unpublished).

    Research output: Contribution to conferencePaperpeer-review

  29. Published
  30. Published

    Brief Announcement: Consistency and Complexity Tradeoffs for Highly-Available Multi-Cloud Store

    Chockler, G., Shraer, A. & Dobre, D., 2013.

    Research output: Contribution to conferencePaperpeer-review

  31. Forthcoming

    Building Interfirm Relational Governance through Computer-Mediated Communication

    Joyce, L., Saunders, C. & Panteli, A., 2018, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  32. Published
  33. Published

    Can a virtual design environment enhance group creativity and the use of stimuli?

    Elias, E., Chamakiotis, P., Howard, T., Dekoninck, E. & Culley, S., 2011.

    Research output: Contribution to conferencePaperpeer-review

  34. In preparation

    Cast adrift with aqueous metaphors and mobilities: conceptualizing the Holocaust at sea

    Gigliotti, S., 7 Apr 2021, (In preparation).

    Research output: Contribution to conferencePaperpeer-review

  35. Published

    Cause-Related Marketing, Social Alliances and Voluntary Employee Activities: A Resource-Based Perspective

    Liu, G., Liston-Heyes, C. & Ko, W. W., 2009.

    Research output: Contribution to conferencePaperpeer-review

  36. Published

    Centrality or De-Centrality? Hidden Influences for Sustaining Online Communities

    Lee, J., Wang, J-H. & Panteli, N., 4 Jun 2020.

    Research output: Contribution to conferencePaperpeer-review

  37. Published

    Challenges in developing Capture-HPC exclusion lists

    Puttaroo, M., Komisarczuk, P. & Cordeiro De Amorim, R., 2014, p. 334-338. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  38. Published

    Characterising a CPU fault attack model via run-time data analysis

    Kelly, M., Mayes, K. & Walker, J. F., 2017, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  39. Published

    Characterization of a Paleokarst Reservoir within a Paleozoic Carbonate Platform though Seismic Volume Attributes

    Son Tran, V., Riva, A., Scarselli, N., Pace, P. & Di Cuia, R., 2017.

    Research output: Contribution to conferencePaperpeer-review

  40. Published

    Charity Shops: An Investigations of Commercial Knowledge Exchange Between UK Nonprofit Organizations

    Liu, G., Liston-Heyes, C. & Ko, W. W., 2010.

    Research output: Contribution to conferencePaperpeer-review

  41. E-pub ahead of print

    Chief Digital Officers as protagonists in Digital Transformation

    Engesmo, J. & Panteli, N., 14 Aug 2019, p. 730-737. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  42. Published

    Chinese Human Resource Practices at the Firm Level: The Migrant Worker Issue

    Smith, C. & Leung, A., 8 Aug 2008. 40 p.

    Research output: Contribution to conferencePaperpeer-review

  43. Unpublished

    Close, Naked, Natural: How the Lens changed writing

    Ganz, A., 2012, (Unpublished).

    Research output: Contribution to conferencePaperpeer-review

  44. Published

    Cluster use for logistics operations and wireless vehicular networks in urban port areas: Urban freight

    Coronado Mondragon, A. E., Coronado Mondragon, E. S. & Coronado Mondragon, C. E., Jun 2011. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  45. Published

    Clust-IT: Clustering-Based Intrusion Detection in IoT Environments

    Markiewicz, R. & Sgandurra, D., Aug 2020, p. 1-9. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  46. Published
  47. Unpublished
  48. Published

    Communities of different size create different categorization systems

    Lev - Ari, S., 2020.

    Research output: Contribution to conferencePaperpeer-review

  49. Published
  50. Published

    Comparison of dynamic biometrie security characteristics against other biometrics

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2017, p. 1-7. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  51. Published

    Comparison of Next-to-Leading Order Calculations for Jet Cross Sections in Deep-Inelastic Scattering

    Duprel, C., Hadig, T., Kauer, N. & Wobisch, M., 22 Oct 1999.

    Research output: Contribution to conferencePaperpeer-review