Home > Publications

Publications

37501 - 37600 out of 41,090Page size: 100
  1. Published

    An embodied approach to consumer experiences: the Hollister brandscape

    Stevens, L., Maclaran, P. & Brown, S., 8 Apr 2019, In: European Journal of Marketing. 53, 4, p. 806-828 23 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    An Embedded Multi-Method Approach to Doing Prison Research

    Harvey, J., 2007, Doing Research on Crime and Justice. King, R. & Wincup, E. (eds.). Oxford: Oxford Univerity Press; Oxford

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    An Embattled Minority: The Jews in Britain During World War One

    Cesarani, D., 1990, The Politics of Marginality. Kushner, T. & Lunn, K. (eds.). London: Frank Cass, p. 61-81

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    An electronic nose-based assistive diagnostic prototype for lung cancer detection with conformal prediction

    Zhan, X., Wang, Z., Yang, M., Luo, Z., Wang, Y. & Li, G., 1 Jul 2020, In: Measurement. 158, p. 1-10 10 p., 107588.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    An electronic array on liquid helium

    Rees, D. G., Glasson, P., Antonov, V., Bennett, R., Fozooni, P., Frayne, P. G., Lea, M. J., Meeson, P. J., Simkins, L. & Mukharsky, Y., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 1464-1465 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    An e-learning support Toolkit for social work students on placement

    Zhang, P., Wills, G. B., Howard, Y., Oussena, S., Kramer, D., Barn, R. & Barn, B. S., 2009, In: eprints.ecs.soton.ac.uk.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    An Eighteenth-Century Capital of Culture? Conflict and Controversy in Liverpool's Pursuit of a Theatre Royal, 1772-1800.

    Foy, A., 2011, In: Theatre Notebook. 65, 1

    Research output: Contribution to journalArticle

  8. Published

    An e-healthcare mobile application: A stakeholders' analysis experience of reading

    Panteli, N., Pitsillides, B., Pitsillides, A. & Samaras, G., 2010, Handbook of Research on Advances in Health Informatics and Electronic Healthcare Applications: Global Adoption and Impact of Information Communication Technologies. IGI Global, p. 433-445 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    An e-healthcare mobile application: A stakeholders' analysis experience of reading

    Panteli, N., Pitsillides, B., Pitsillides, A. & Samaras, G., 2007, Web Mobile-Based Applications for Healthcare Management. IGI Global, p. 101-117 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. E-pub ahead of print

    An efficient, secure and trusted channel protocol for avionics wireless networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, (E-pub ahead of print) 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    An Efficient Toolkit for Computing Private Set Operations

    Davidson, A. & Cid, C., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II. Pieprzyk, J. & Suriadi, S. (eds.). Springer Heidelberg, Vol. 2. p. 261-278 18 p. (Lecture Notes in Computer Science; vol. 10343).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published
  14. Published

    An efficient buyer-seller watermarking protocol based on Chameleon encryption

    Martin, K. M. & Poh, G. S., 2009, Digital Watermarking, 7th International Workshop (IWDW 2008). Springer, Vol. 5450. p. 433-447 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Unpublished
  16. Published

    An Economic Model of Whistle-Blower Policy

    Heyes, A. & Kapur, S., May 2009, In: Journal of Law, Economics, & Organization. 25, 1, p. 157-182 26 p.

    Research output: Contribution to journalArticlepeer-review

  17. Unpublished

    An Economic Analysis on Human Costs in Armed Conflict

    Lee, U. R., 2013, (Unpublished)

    Research output: ThesisDoctoral Thesis

  18. Published

    An ecological context for the Post-Roman Archaeology of the Somerset Moors (South West England, UK)

    Housley, R. A., Straker, V., Chambers, F. M. & Lageard, J. G. A., 2007, In: Journal of Wetland Archaeology. 7, p. 1-22 22 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    An ecological comparison of Impatiens glandulifera Royle in the native and introduced range

    Tanner, R. A., Jin, L., Shaw, R., Murphy, S. T. & Gange, A. C., Aug 2014, In: Plant Ecology. 215, 8, p. 833-843 11 p.

    Research output: Contribution to journalArticlepeer-review

  20. Unpublished
  21. Published

    An early terrestrial biota preserved by Visean vulcanicity in Scotland

    Rolfe, W. D. I., Durant, G., Fallick, A. E., Hall, A. J., Large, D., Scott, A. C., Smithson, T. R. & Walkden, G., 1990, Volcanism and fossil biotas. . Lockley, M. & Rice, A. (eds.). Geological Society of America Special Publication , Vol. 244. p. 13-24 12 p. (Geological Society of America Special Publication ; vol. 244).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    An Early Private Indenture of Retainer: The Agreement Between Hugh Despenser the Younger and Sir Robert De Shirland

    Saul, N., Jun 2013, In: The English Historical Review. 128 , 532, p. 519-534

    Research output: Contribution to journalArticlepeer-review

  23. E-pub ahead of print

    An Early Pleistocene hippopotamus from Westbury Cave, Somerset, England: support for a previously unrecognized temperate interval in the British Quaternary record

    Adams, N. F., Candy, I. & Schreve, D. C., 4 Oct 2021, (E-pub ahead of print) In: Journal of Quaternary Science.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    An early Pennsylvanian waterhole deposit and its fossil biota in a dryland alluvial plain setting, Joggins, Nova Scotia

    Falcon-Lang, H. J., Rygel, M., Gibling, M. R. & Calder, J. H., 2004, In: Journal of the Geological Society. 161, 2, p. 209-222

    Research output: Contribution to journalArticlepeer-review

  25. Published

    An early Carboniferous (Mississippian), Tournaisian, megaspore assemblage from Three Mile Plains, Nova Scotia, Canada

    Glasspool, I. J. & Scott, A. C., May 2005, In: Review of Palaeobotany and Palynology. 134, 3-4, p. 219-236 18 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    An autosomal transcript in skeletal muscle with homology to dystrophin

    Love, D. R., Hill, D. F., Dickson, G., Spurr, N. K., Byth, B. C., Marsden, R. F., Walsh, F. S., Edwards, Y. H. & Davies, K. E., 1989, In: Nature. 339, 6219, p. 55-8 4 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    An automated proof of the correctness of a compiling specification

    Scott, E., 1993, In: Workshops in Computing. p. 392-402

    Research output: Contribution to journalArticlepeer-review

  28. Published

    An Auto-Delegation Mechanism for Access Control Systems

    Crampton, J. & Morisset, C., 2010, Proceedings of 6th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    An authorization framework resilient to policy evaluation failures

    Crampton, J. & Huth, M., 2010, Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010: Proceedings. Springer, p. 472-487 16 p. (Lecture Notes in Computer Science; vol. 6345).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    An Augmented Affine Projection Algorithm for the Filtering of Noncircular Complex Signals

    Cheong Took, C., 2010, In: Signal Processing. 90, 6, p. 1788-1799

    Research output: Contribution to journalArticlepeer-review

  31. Published

    An audit of tuberculosis health services in prisons and immigration removal centres

    Mehay, A., Raj, T., Altass, L., Newton, A., O'Moore, E., Railton, C., Tan, H., Story, A. & Frater, A., 30 May 2016, In: Journal of public health (Oxford, England).

    Research output: Contribution to journalArticlepeer-review

  32. Published

    An attack on some multi-party key agreement protocols

    Paterson, K. G., 2006, In: IEE Proceedings on Information Security. 153, 2, p. 59-60 2 p.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

    Saeed, Q. & Walter, C., Mar 2012, In: International Journal for Information Security Research. 2, 1/2, p. 325-334

    Research output: Contribution to journalArticlepeer-review

  34. Forthcoming

    An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms

    McEvoy, R. & Wolthusen, S. D., 2014, (Accepted/In press) Proceedings of the 9th International Workshop on Critical Information Infrastructures Security. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    An Atlas of Industrial Protest in Britain, 1750–1990

    Charlesworth, A. (ed.), Gilbert, D. (ed.), Randall, A. (ed.), Southall, H. (ed.) & Wrigley, C. (ed.), 24 Jan 1996, Palgrave Macmillan. 256 p.

    Research output: Book/ReportBook

  36. Published

    An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.

    Rantos, K. & Markantonakis, K., 2004, SEC'04. p. 351-366 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    An assessment of the tsunami risk in Muscat and Salalah, Oman, based on estimations of probable maximum loss

    Browning, J. & Thomas, N., 1 Jun 2016, In: International Journal of Disaster Risk Reduction. 16, p. 75-87 14 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    An assessment of the long-term preservation of the DNA of a bacterial pathogen in ethanol-preserved archival material

    Barnes, I., Holton, J., Vaira, D., Spigelman, M. & Thomas, M. G., Dec 2000, In: JOURNAL OF PATHOLOGY. 192, 4, p. 554-559 6 p.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    An assessment of mass discrimination in MC-ICPMS using Nd isotopes

    Vance, D. & Thirlwall, M., 1 May 2002, In: Chemical Geology. 185, 3-4, p. 227-240 14 p.

    Research output: Contribution to journalArticlepeer-review

  40. Unpublished
  41. Published

    An ash cloud, airspace and environmental threat

    Adey, P., Anderson, B. & Guerrero, L. L., 1 Jul 2011, In: Transactions of the Institute of British Geographers. 36, 3, p. 338-343 6 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    An Artist’s Approach to the Modular Synthesizer in Experimental Electronic Music Composition and Performance

    Bruno, C., Feb 2016, In: eContact!. 17, 4

    Research output: Contribution to journalSpecial issuepeer-review

  43. Published

    An Art of the Ugly in Schelling’s Philosophie der Kunst: Questions concerning the ‘umgekehrt Symbolische’ of §103

    Whistler, D., 25 Nov 2019, In: Schelling-Studien. 7, p. 199-213 15 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    An Argumentative Model for Service-oriented Agents

    Morge, M., McGinnis, J., Bromuri, S., Mancarella, P. & Stathis, K., 1 Mar 2008, Proc. of the International Symposium on Architectures for Intelligent Theory-Based Agents. Balduccini, M. & Baral, C. (eds.). p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems

    Francis, L., Mayes, K. & Markantonakis, K., 2008, THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 386-395 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    An Architecture for Audit Logging in a Smart Card Environment

    Markantonakis, K., Mar 1999, An Architecture for Audit Logging in a Smart Card Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    An Architectural Support for Self-Adaptive Software for Treating Faults

    De Lemos, R. & Fiadeiro, J. L., 1 Jan 2002, Proceedings of the first ACM SIGSOFT Workshop on Self-Healing Systems (WOSS'02). p. 39-42 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  48. Published

    An architectural approach to mobility - The handover case study

    Oliveira, C., Wermelinger, M., Fiadeiro, J. L. & Lopes, A., 1 Jan 2004, Proceedings - Fourth Working IEEE/IFIP Conference on Software Architecture (WICSA 2004). p. 305-308 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  49. Published

    An Arbitrary Line

    Cave, S., 30 Nov 2018, Broken Sleep Books. 98 p.

    Research output: Book/ReportBook

  50. Published

    An Araki-Lieb-Thirring inequality for geometrically concave and geometrically convex functions

    Audenaert, K., 2013, In: Linear Algebra and Its Applications. 438, 8, p. 3454-3462

    Research output: Contribution to journalArticlepeer-review

  51. Published

    An approximate algorithm for combinatorial optimization problems with two parameters

    Blokh, D. & Gutin, G., 1996, In: Australasian Journal of Combinatorics. 14, p. 157-164

    Research output: Contribution to journalArticlepeer-review

  52. Published

    An approach to early evaluation of informational privacy requirements

    Barn, B. S., Primiero, G. & Barn, R., 13 Apr 2015, p. 1370-1375. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  53. Published

    An Appraisal of Australian Maritime Strategy: Part II

    Haggman, A., 28 Nov 2015, Future Foreign Policy.

    Research output: Other contribution

  54. Published

    An Appraisal of Australian Maritime Strategy: Part I

    Haggman, A., 7 Aug 2015, Future Foreign Policy.

    Research output: Other contribution

  55. Published

    An application-oriented framework for wireless sensor network key establishment

    Martin, K. M. & Paterson, M. B., 2008, Electronic Notes in Theoretical Computer Science: Proceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07. 2 ed. Vol. 192. p. 31-41 11 p. (Electronic Notes in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  56. Published

    An Application of Univariate and Multivariate Approaches in fMRI to Quantifying the Hemispheric Lateralization of Acoustic and Linguistic Processes

    McGettigan, C., Evans, S., Rosen, S., Agnew, Z. K., Shah, P. & Scott, S. K., Mar 2012, In: Journal of Cognitive Neuroscience. 24, 3, p. 636-652 17 p.

    Research output: Contribution to journalArticlepeer-review

  57. Published

    An application of the Theory of Planned Behaviour to truck driving behaviour and compliance with regulations

    Poulter, D., Chapman, P., Bibby, P., Clarke, D. & Crundall, D., 2008, In: Accident Analysis and Prevention. 40, p. 2058-2064

    Research output: Contribution to journalArticlepeer-review

  58. Published

    An application of field-based photogrammetry as a virtual outcrop building target: a key example from Santorini’s northern caldera wall, Greece

    Bonali, F. L., Fallati, L., Antoniou, V., Drymoni, K., Mariotto, F. P., Corti, N., Tibaldi, A., Gudmundsson, A. & Nomikou, P., 2021.

    Research output: Contribution to conferenceAbstractpeer-review

  59. Published

    An Appealing Treasury

    McSweeney, B., 1983, In: The Accountant. 13 October

    Research output: Contribution to journalArticlepeer-review

  60. Published

    An apparatus for sequentially sampling unconsolidated cohesive sediments exposed on salt marsh and river cliffs

    Allen, J. R. L. & French, P., 1989, In: Sedimentary Geology. 61, p. 151-154 5 p.

    Research output: Contribution to journalArticlepeer-review

  61. Published

    An Apollonian appreciation of Google Earth

    Eades, G., Sep 2010, In: Geoforum. 41, 5, p. 671-673 3 p.

    Research output: Contribution to journalLiterature reviewpeer-review

  62. Published

    An anonymous and undeniable payment scheme

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of the First International Conference on Information and Communications Security, ICICS '97, Beijing, China, November 1997. Han, Y., Okamoto, T. & Qing, S. (eds.). Springer-Verlag, p. 478-482 5 p. (Lecture Notes in Computer Science; no. 1334).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Unpublished
  64. Unpublished

    An Annotated Translation of John Kantakouzenos’ Histories, Book III, Chapters 1-30

    McLaughlin, B., 2017, (Unpublished) 491 p.

    Research output: ThesisDoctoral Thesis

  65. Unpublished

    An annotated edition of the Refutation of the Errors of the Latins by Matthaios Blastares

    Palaiologos, K., 2011, (Unpublished) 539 p.

    Research output: ThesisDoctoral Thesis

  66. Unpublished
  67. Unpublished
  68. Published

    An ANFIS-PI based boost converter control scheme

    Darvill, J., Tisan, A. & Cirstea, M., 1 Oct 2015, p. 632-639. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  69. Published

    An ancestral non-proteolytic role for presenilin proteins in multicellular development of the social amoeba Dictyostelium discoideum

    Ludtmann, M., Otto, G., Schilde, C., Chen, Z-H., Allan, C., Brace, S., Beesley, P., kimmel, A., Fisher, P., Killick, R. & Williams, R., 1 Apr 2014, In: Journal of Cell Science. 127, p. 1576-1584

    Research output: Contribution to journalArticlepeer-review

  70. Published

    An anatomical account of somatoparaphrenia

    Gandola, M., Invernizzi, P., Sedda, A., Ferrè, E. R., Sterzi, R., Sberna, M., Paulesu, E. & Bottini, G., Oct 2012, In: Cortex. 48, 9, p. 1165-78 14 p.

    Research output: Contribution to journalArticlepeer-review

  71. Unpublished

    An Analysis of TLS 1.3 and its use in Composite Protocols

    Hoyland, J., 2018, (Unpublished) 273 p.

    Research output: ThesisDoctoral Thesis

  72. Published

    An Analysis of the XSL Algorithm

    Cid, C. & Gaetan, L., Dec 2005, Advances in Cryptology - ASIACRYPT 2005. Springer, Vol. 3788. p. 333-352 20 p. (Lecture Notes in Computer Science - LNCS; vol. 3788).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Unpublished
  74. Unpublished

    An Analysis of the Transport Layer Security Protocol

    van der Merwe, T., 2018, (Unpublished) 229 p.

    Research output: ThesisDoctoral Thesis

  75. Published

    An Analysis of the Perceived Value of Using Knowledge Management Systems in Supporting Decision Making Processes

    Abdelrahman, M., Papamichail, K. & French, S., 2010, 11th European Conference on Knowledge Management ECKM . p. 1115-1128

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    An analysis of the motion signal distributions generated by locomotion in a natural environment

    Zanker, J. M. & Zeil, J., 2002, Dynamic Perception. Workshop of GI section 1.0.04 “Image Understanding” and the European Networks MUHCI and ECOVISION. Würtz, R. P. & Lappe, M. (eds.). Berlin: Akademische Verlagsgesellschaft, p. 203-208

    Research output: Chapter in Book/Report/Conference proceedingChapter

  77. Published

    An analysis of the motion signal distributions emerging from locomotion through a natural environment

    Zanker, J. M. & Zeil, J., 2002, Biologically Motivated Computer Vision 2002. Wallraven, C., Poggio, T. A., Lee, S. . W. & Bülthoff, H. H. (eds.). Berlin Heidelberg: Springer-Verlag, p. 146-156 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  78. Published

    An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems (UKAIS)

    Ameen, N. & Willis, R., 2018, An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Unpublished

    An Analysis of the Knowledge and Use of English Collocations by French and Japanese Learners

    Kurosaki, S., 2012, (Unpublished) 262 p.

    Research output: ThesisDoctoral Thesis

  80. Published

    An Analysis of the Hermes8 Stream Ciphers

    Babbage, S., Cid, C., Pramstaller, N. & Raddum, H., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007. Springer, Vol. 4586. p. 1-10 11 p. (Lecture Notes in Computer Science - LNCS; vol. 4586).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    An analysis of the energetic reward offered by field bean (Vicia faba) flowers : Nectar, pollen, and operative force

    Bailes, E. J., Pattrick, J. G. & Glover, B. J., Mar 2018, In: Ecology and Evolution. 8, 6, p. 3161-3171 11 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    An analysis of the 3gpp-MAC scheme

    Knudsen, L. R. & Mitchell, C. J., 2001, Proceedings of WCC 2001, Paris, France, 8-12 January 2001. Augot, D. & Carlet, C. (eds.). p. 319-328 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

    Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Unpublished

    An Analysis of Primality Testing and Its Use in Cryptographic Applications

    Massimo, J., 2020, (Unpublished) 209 p.

    Research output: ThesisDoctoral Thesis

  85. Published

    An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 3. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. E-pub ahead of print

    An Analysis of NIST SP 800-90A

    Woodage, J. & Shumow, D., 24 Apr 2019, (E-pub ahead of print) Advances in Cryptology - EUROCRYPT 2019. Ishai, Y. & Rijmen, V. (eds.). p. 151-180 30 p. (Lecture Notes in Computer Science; vol. 11477).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  87. Published

    An Analysis of Methodological and Quantitative Aspects in the Evaluation of Thematic Segmentation Algorithms

    Georgescul, M., Clark, A. & Armstrong, S., 2006.

    Research output: Contribution to conferencePaper

  88. Published

    An Analysis of Job Satisfaction and Job Satisfier Factors among Hospital Employees

    Mosadegh Rad, A., 2008, In: Journal of Isfahan faculty of administration science and Economy. p. 49-66

    Research output: Contribution to journalArticlepeer-review

  89. Published

    An Analysis of ERP decision making practice and consequences for subsequent system life cycle stages - A case study

    Bernroider, E. W. N., 2007, Decision Support for Global Enterprises - Annals of Information Systems. Kulkarni, U., Power, D. J. & Sharda, R. (eds.). Vol. 2. p. 195-206

    Research output: Chapter in Book/Report/Conference proceedingChapter

  90. Published

    An Analysis of DepenDNS

    Alfardan, N. & Paterson, K., 2010, Information Security. Springer, Vol. 6531. p. 31-37 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    An Analysis of Cyclical Interdependencies in Critical Infrastructures

    Svendsen, N. & Wolthusen, S. D., 3 Oct 2007, Proc. Second International Workshop on Critical Information Infrastructures Security (CRITIS 2007). Springer-Verlag, p. 25-36

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published
  93. Published

    An Analysis of Cause-Related Marketing Implementation Strategies through Social Alliance: Partnership Conditions and Strategic Objectives

    Liu, G. & Ko, W. W., 2011, In: Journal of Business Ethics. 100, 2, p. 253-281

    Research output: Contribution to journalArticlepeer-review

  94. Published

    An Analysis of Active and Latent Errors During Object-Oriented Maintenance

    Douce, C. R. & Layzell, P. J., 1998, PPIG-10 Annual workshop Proceedings, Open University, UK, 5-7 January 1998.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  95. Unpublished
  96. Published

    An Ambidexterity Perspective Toward Multinational Enterprises from Emerging Economies

    Luo, Y. & Rui, H., Nov 2009, In: Academy of Management Perspective. 23, 4, p. 49-70 21 p.

    Research output: Contribution to journalArticlepeer-review

  97. Published
  98. Published

    An Alien Concept? The Continuity of Anti-Alienism in British Society before 1940

    Cesarani, D., 1993, The Internment of Aliens in Twentieth Century Britain. Cesarani, D. & Kushner, T. (eds.). London: Frank Cass, p. 25-42

    Research output: Chapter in Book/Report/Conference proceedingChapter

  99. Published

    An Algorithm for the SAT Problem for Formulae of Linear Length

    Wahlström, M., 2005, ESA. p. 107-118 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    An Algorithm for Finding Input-Output Constrained Convex Sets in an Acyclic Digraph

    Gutin, G., Johnstone, A., Reddington, J., Scott, E., Yeo, A., Broersma, H. (ed.), Erlebach, T. (ed.), Friedeizky, T. (ed.) & Paulusma, D. (ed.), 2008, In: Lecture Notes in Computer Science. 5344, p. 206-217 12 p.

    Research output: Contribution to journalArticlepeer-review