Home > Publications

Publications

41326 - 41350 out of 42,807Page size: 25
  1. Published

    A consideration of individual differences and imagery ability amongst cognitive interviewees. Reply to Douglas on Witness Memory

    Memon, A. & Stevenage, S. V., 1996, In: Psycholoquy.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    A conifer-dominated palynological assemblage from Pennsylvanian (late Moscovian) alluvial drylands in Atlantic Canada: implications for the vegetation of tropical lowlands during glacial phases

    Dolby, G., Falcon-Lang, H. J., Gibling, M. R. & Falcon-Lang, H., Mar 2011, In: Journal of the Geological Society. 168, 2, p. 571-584 14 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    A Confusion of Marys

    Cave, S., 24 Jan 2020, Bristol: Shearsman. 78 p.

    Research output: Book/ReportBook

  4. Published

    A confluence of counterhistories: reflections on excavating lost stories through a nation-building novel

    Lickorish Quinn, K., 9 May 2022, In: Journal of Transatlantic Studies. 20, p. 14-38

    Research output: Contribution to journalArticlepeer-review

  5. Unpublished

    A Concurrent Bilateral Negotiation Model for Open E-Markets

    Alrayes, B., 2016, (Unpublished) 217 p.

    Research output: ThesisDoctoral Thesis

  6. Published

    A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs

    Hashimoto, K., Katsumata, S., Postlethwaite, E., Prest, T. & Westerbaan, B., 13 Nov 2021, CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1441-1462 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Unpublished

    A Concrete Security Treatment of Symmetric Encryption in a Quantum Computing World

    Mossayebi, S., 2015, (Unpublished) 172 p.

    Research output: ThesisDoctoral Thesis

  8. A conceptual framework towards continuous transformation of sustainable food manufacturing and logistics

    Ojo, O. O. & Shah, S., Jan 2020, Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020. Institute of Electrical and Electronics Engineers Inc., p. 209-214 6 p. 9051539. (Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    A Conceptual Framework for Smartphone Security Among Arab Millennials

    Shah, M. & Ameen, N., 2019, UK Academy of Information Systems (UKAIS). p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Forthcoming

    A Conceptual Framework for Managing Expectations in Green IS Implementation

    Jackson, S. & Fearon, C., 17 Mar 2016, (Accepted/In press) 22nd IEEE International Technology Management Conference, Trondheim, Norway.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A Computer-Aided Software Maintenance Process Model

    Deraman, A. B. & Layzell, P. J., 1993, In: Journal of Knowledge Engineering. 6, 1, p. 36-42 7 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    A Computationally Practical Simulation Estimation Algorithm for Dynamic Panel Data Models with Unobserved Endogenous State Variables

    Keane, M. P. & Sauer, R. M., Nov 2010, In: International Economic Review. 51, 4, p. 925-958 34 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    A computational tool that supports formal diagnosis of process design

    Ramos, P. & Fiadeiro, J. L., 15 Oct 1998, In: Information and Software Technology. 40, 10, p. 555-565 11 p.

    Research output: Contribution to journalArticlepeer-review

  14. E-pub ahead of print

    A computational science approach to understanding human conflict

    Johnson Restrepo, D., Spagat, M., Van Weezel, S., Zheng, M. & Johnson, N. F., 3 Feb 2020, (E-pub ahead of print) In: Journal of Computational Science. p. 1-7 7 p., 101088.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    A Computational Model of the Escape Response Latency in the Giant Fiber System of Drosophila melanogaster

    Augustin, H., Zylbertal, A. & Partridge, L., 1 Apr 2019, In: eNeuro. 6, 2, p. 1-10 10 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    A computational analysis of separating motion signals in transparent random dot kinematograms

    Zanker, J. M., 2005, In: Spatial Vision. 18, 4, p. 431-445

    Research output: Contribution to journalArticlepeer-review

  17. Published

    A Comprehensive Symbolic Analysis of TLS 1.3

    Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T., 30 Oct 2017, ACM SIGSAC Conference on Computer and Commuincations Security. ACM, p. 1773-1788 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Unpublished
  19. Published

    A comprehensive structural and magnetic study of Ni nanoparticles prepared by the borohydride reduction of NiCl2 solution of different concentrations

    Roy, A., Srinivas, V., Ram, S., De Toro, J. A. & Goff, J. P., 1 Nov 2006, In: Journal of Applied Physics. 100, 9, p. - 8 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    A Comprehensive Health Needs Assessment of the Prisons and Immigration Removal Centres in the London Region

    Meek, R. & Lewis, G., 2013, NHS England.

    Research output: Book/ReportCommissioned report

  21. A Comprehensive Formal Security Analysis of OAuth 2.0

    Fett, D., Küsters, R. & Schmitz, G., 6 Jan 2016, In: ArXiv.org.

    Research output: Contribution to journalArticle

  22. A Comprehensive Formal Security Analysis of OAuth 2.0

    Fett, D., Küsters, R. & Schmitz, G., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1204-1215 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    A Comprehensive Examination of Changes in Psychological Flexibility Following Acceptance and Commitment Therapy for Chronic Pain

    Scott, W., Hann, K. & McCracken, L., Sep 2016, In: Journal of Contemporary Psychotherapy. 46, 3, p. 139–148 10 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    A Comprehensive Evaluation of Showups

    Neuschatz, J. S., Wetmore, S., Key, K. N., Cash, D., Gronlund, S. D. & Goodsell, C. A., 2016, Advances in Psychology and Law. Miller, M. K. & Bornstein, B. H. (eds.). Springer, Vol. 1. p. 43-69 27 p. (Advances in Psychology and Law; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    A Compositional Approach to Connector Construction

    Lopes, A., Wermelinger, M. & Fiadeiro, J. L., 2001, WADT. Springer, Vol. 2267. p. 201-220 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution