Home > Publications

Publications

41276 - 41300 out of 42,956Page size: 25
  1. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Using Human Security to Harness Human Rights in the Post-COVID World

    Gilder, A., 24 Mar 2021, Völkerrechtsblog.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  3. Published

    Using IP Rights to Protect Human Rights: Copyright for ‘Revenge Porn’ Removal

    O'Connell, A. & Bakina, K., Sep 2020, In: Legal Studies. 40, 3, p. 442-457 16 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Using legacy core material to assess subsurface carbon storage reservoir potentiality

    Payton, R. L., Chiarella, D. & Kingdon, A., 3 Aug 2022, In: Geological Society, London, Special Publications. 527

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Using LP to study the language PL0+

    Scott, E. & Norrie, K., 1993, In: Workshops in Computing. p. 227-245

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Using Machine Learning to estimate the technical potential of shallow ground-source heat pumps with thermal interference

    Walch, A., Castello, R., Mohajeri, N., Gudmundsson, A. & Scartezzini, J-L., 2021, In: Journal of Physics: Conference Series. 2042, 012010.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Using Maimonides' rule to estimate the effect of class size on scholastic achievement

    Angrist, J. D. & Lavy, V., May 1999, In: The Quarterly Journal of Economics. 114, 2, p. 533-575 43 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Using mammal tooth phosphate with freshwater carbonate and phosphate palaeoproxies to obtain mean paleotemperatures

    Grimes, S. T., Mattey, D. P., Collinson, M. E. & Hooker, J. J., Apr 2004, In: Quaternary Science Reviews. 23, 7-8, p. 967-976 10 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Using Mie Scattering to Determine the Wavelength-Dependent Refractive Index of Polystyrene Beads with Changing Temperature

    McGrory, M., King, M. & Ward, A., 19 Nov 2020, In: Journal of Physical Chemistry C. 124, p. 9617-9625 9 p., 46.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Using multiple chains for Gibbs sampling in mixed graphical association models

    Brewer, M., Luo, Z. & Gammerman, A., 1994, Computational Statistics. p. 185-189

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Using Narrative Research and Portraiture to Inform Design Research

    Golsteijn, C. & Wright, S., 2013, In: Lecture Notes in Computer Science. 8119, p. 298-315 18 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Using Netnography to Investigate Travel Blogging as Digital Work

    Willment, N., 2021, Research Methods for Digital Work and Organization: Investigating Distributed, Multi-Modal, and Mobile Work. Symon, G., Pritchard, K. & Hine, C. (eds.). Oxford Univerity Press; Oxford

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  13. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Using NLG and sensors to support personal narrative for children with complex communication needs

    Black, R., Reddington, J., Reiter, E., Tintarev, N. & Waller, A., 2010, Proceedings of the NAACL HLT 2010 Workshop on Speech and Language Processing for Assistive Technologies. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Using nonword repetition to distinguish genetic and environmental influences on early literacy development: a study of 6-year-old twins

    Bishop, DVM., Adams, CV. & Norbury, CF., 2004, In: American Journal of Medical Genetics Part B: Neuropsychiatric Genetics. 129B, p. 94-96

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Forthcoming

    Using Online Data in Terrorism Research

    Pearson, E., Macdonald, S., Scrivens, R. & Whittaker, J., 2022, (Accepted/In press) A research agenda for terrorism studies. Frumkin, L., Morrison, J. & Silke, A. (eds.). Edward Elgar

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  19. Published

    Using Padlet as an Intercultural Learning Tool

    Gill-Simmen, L., 1 Feb 2021, Learner Relationships in a Global Higher Education. Foster, M. & Killick, D. (eds.). Routledge

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Using Padlet in instructional design to promote cognitive engagement: a case study of undergraduate marketing students

    Gill-Simmen, L., 31 Mar 2021, In: Journal of Learning Development in Higher Education. 20, 1, p. 1-14 14 p.

    Research output: Contribution to journalArticlepeer-review

  21. E-pub ahead of print

    Using participatory video to share people’s experiences of neotropical urban green and blue space with decision-makers

    Fisher, J., Mistry, J., Pierre, M., Huichang, Y., Harris, A., Hunte, N., Fernandes, D., Bicknell, J. E. & Davies, Z. G., 12 Jul 2021, (E-pub ahead of print) In: Geographical Journal.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Using performance-based pay to improve the quality of teachers

    Lavy, V., 2007, In: FUTURE OF CHILDREN. 17, 1, p. 87-109 23 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Using Personal Values to Understand the Motivational Basis of Amity Goal Orientation

    Levontin, L. & Bardi, A., 9 Jan 2019, In: Frontiers in Psychology. 9, p. 1-19 19 p., 2736.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Using privacy calculus theory to explore for entrepreneurial directions in mobile location-based advertising: Identifying intrusiveness as the critical risk factor

    Gutierrez, A., O'Leary, S., Rana, N. P., Dwivedi, Y. K. & Calle, T., Jun 2019, In: Computers in Human Behavior. 95, p. 295-306 12 p.

    Research output: Contribution to journalArticlepeer-review