Home > Publications

Publications

37551 - 37600 out of 39,092Page size: 50
  1. Published

    Using computer programs to code qualitative data

    Catterall, M. & Maclaran, P., 1996, In : Marketing Intelligence and Planning. 14, 4, p. 29-33

    Research output: Contribution to journalArticle

  2. Published

    Using computer software for the analysis of qualitative market research data

    Catterall, M. & Maclaran, P., Jul 1998, In : Journal of the Market Research Society. 40, 3, p. 207-222 16 p.

    Research output: Contribution to journalArticle

  3. E-pub ahead of print

    Using connectivity-based real-time fMRI neurofeedback to modulate attentional and resting state networks in people with high trait anxiety

    Morgenroth, E., Saviola, F., Gilleen, J., Allen, B., Lührs, M., W. Eysenck, M. & Allen, P., 23 Jan 2020, In : NeuroImage: Clinical. 25, p. 1-10 10 p., 102191.

    Research output: Contribution to journalArticle

  4. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Using Contextual Representations to Efficiently Learn Context-Free Languages

    Clark, A., Eyraud, R. & Habrard, A., 1 Oct 2010, In : Journal of Machine Learning Research. 11, p. 2707-2744 38 p.

    Research output: Contribution to journalArticle

  6. Published

    Using decomposition-parameters for QBF: Mind the prefix!

    Eiben, E., Ganian, R. & Ordyniak, S., Jun 2020, In : Journal of Computer and System Sciences. 110, p. 1-21 21 p.

    Research output: Contribution to journalArticle

  7. Published

    Using Decomposition-Parameters for QBF: Mind the Prefix!

    Eiben, E., Ganian, R. & Ordyniak, S., 21 Feb 2016, p. 964-970. 7 p.

    Research output: Contribution to conferencePaper

  8. Published

    Using Design Thinking to Understand Cyber Attack Surfaces of Future Smart Grids

    Snow, S., Happa, J., Horrocks, N. & Glencross, M., 2020, In : Frontiers in Energy Research.

    Research output: Contribution to journalArticle

  9. Published

    Using detrital garnet compositions to determine provenance: a new compositional database and procedure

    Suggate, S. & Hall, R., 2014, Sediment Provenance Studies in Hydrocarbon Exploration and Production. Scott, R. A., Smyth, H. R., Morton, A. C. & Richardson, N. (eds.). Geological Society of London Special Publication, Vol. 386. p. 373-393 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  10. Published

    Using developmental cognitive neuroscience to study behavioral and attentional control

    Astle, D. E. & Scerif, G., 2009, In : Developmental Psychobiology. 51, 2, p. 107-18 12 p.

    Research output: Contribution to journalArticle

  11. Published

    Using discourse analysis to understand IS planning and development in organization: A case study

    Sillince, J. A. A. & Harindranath, G., 1999, SYSTEMS DEVELOPMENT METHODS FOR DATABASES, ENTERPRISE MODELING, AND WORKFLOW MANAGEMENT. Wojtkowsky, W. (ed.). NEW YORK: KLUWER ACADEMIC/PLENUM PUBL, p. 327-336 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Using Electroglottographic Real-Time Feedback to Control Posterior Glottal Adduction during Phonation

    Herbst, C. T., Howard, D. & Schloemicher-Thier, J., Jan 2010, In : Journal of Voice. 24, 1, p. 72-85 14 p.

    Research output: Contribution to journalArticle

  14. Published

    Using electrostatic potentials to predict DNA-binding sites on DNA-binding proteins

    Jones, S., Shanahan, H. P., Berman, H. M. & Thornton, J. M., 15 Dec 2003, In : Nucleic Acids Research. 31, 24, p. 7189-7198 10 p.

    Research output: Contribution to journalArticle

  15. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Using Evidence To Inform Decision-Making

    Evans, T., 2014, Applying Research Evidence in Social Work Practice. Webber, M. (ed.). Red Globe Press

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  18. Published

    Using explicit state to describe architectures

    Lopes, A. & Fiadeiro, J. L., 1999, FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING. Finance, JP. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-160 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Using Foucalt to analyse ethics in the practice of problem structuring methods

    Córdoba-Pachón, J-R., 1 Sep 2006, In : Journal of the Operational Research Society. 57, 9, p. 1027-1034

    Research output: Contribution to journalArticle

  20. Published

    Using Game controller for Relaying Deictic Gestures in Computer Mediated Communication

    Walkowski, S., Doerner, R., Lievonen, M. & Rosenberg, D., Jun 2011, In : International Journal of Human-Computer Studies. 69, 6, p. 362-374 12 p., doi:10.1016/j.ijhcs.2011.01.002.

    Research output: Contribution to journalArticle

  21. Published

    Using GAs to create a waveguide model of the oral vocal tract

    Cooper, C., Howard, D. M. & and Tyrrell, A. M., 2004, In : Lecture Notes in Computer Science. 3005-200, p. 280-288 9 p.

    Research output: Contribution to journalArticle

  22. Published

    Using GAs to create a waveguide model of the oral vocal tract: APPLICATIONS OF EVOLUTIONARY COMPUTING

    Cooper, C. H. V., Howard, D. M. & Tyrrell, A. M., 2004, APPLICATIONS OF EVOLUTIONARY COMPUTING. Raidl, GR. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 280-288 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. Unpublished

    Using Gesture to Support Language

    Wray, C., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  24. Published

    Using Grounded Theory to Explore Employees' Brand-Oriented Behaviors

    Gill-Simmen, L., 2019, In : SAGE Research Methods Cases.

    Research output: Contribution to journalArticle

  25. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. E-pub ahead of print

    Using IP Rights to Protect Human Rights: Copyright for ‘Revenge Porn’ Removal

    O'Connell, A. & Bakina, K., 9 Jun 2020, In : Legal Studies. 16 p.

    Research output: Contribution to journalArticle

  29. Published

    Using LP to study the language PL0+

    Scott, E. & Norrie, K., 1993, In : Workshops in Computing. p. 227-245

    Research output: Contribution to journalArticle

  30. Published

    Using Maimonides' rule to estimate the effect of class size on scholastic achievement

    Angrist, J. D. & Lavy, V., May 1999, In : The Quarterly Journal of Economics. 114, 2, p. 533-575 43 p.

    Research output: Contribution to journalArticle

  31. Published

    Using mammal tooth phosphate with freshwater carbonate and phosphate palaeoproxies to obtain mean paleotemperatures

    Grimes, S. T., Mattey, D. P., Collinson, M. E. & Hooker, J. J., Apr 2004, In : Quaternary Science Reviews. 23, 7-8, p. 967-976 10 p.

    Research output: Contribution to journalArticle

  32. Published

    Using multiple chains for Gibbs sampling in mixed graphical association models

    Brewer, M., Luo, Z. & Gammerman, A., 1994, Computational Statistics. p. 185-189

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Using Narrative Research and Portraiture to Inform Design Research

    Golsteijn, C. & Wright, S., 2013, In : Lecture Notes in Computer Science. 8119, p. 298-315 18 p.

    Research output: Contribution to journalArticle

  34. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Using NLG and sensors to support personal narrative for children with complex communication needs

    Black, R., Reddington, J., Reiter, E., Tintarev, N. & Waller, A., 2010, Proceedings of the NAACL HLT 2010 Workshop on Speech and Language Processing for Assistive Technologies. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Using nonword repetition to distinguish genetic and environmental influences on early literacy development: a study of 6-year-old twins

    Bishop, DVM., Adams, CV. & Norbury, CF., 2004, In : American Journal of Medical Genetics Part B: Neuropsychiatric Genetics. 129B, p. 94-96

    Research output: Contribution to journalArticle

  38. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Forthcoming

    Using Padlet as an Intercultural Learning Tool

    Gill-Simmen, L., 1 Feb 2020, (Accepted/In press) Learner Relationships in a Global Higher Education. Foster, M. & Killick, D. (eds.). Routledge

    Research output: Chapter in Book/Report/Conference proceedingChapter

  40. Published

    Using performance-based pay to improve the quality of teachers

    Lavy, V., 2007, In : FUTURE OF CHILDREN. 17, 1, p. 87-109 23 p.

    Research output: Contribution to journalArticle

  41. Published

    Using Personal Values to Understand the Motivational Basis of Amity Goal Orientation

    Levontin, L. & Bardi, A., 9 Jan 2019, In : Frontiers in Psychology. 9, p. 1-19 19 p., 2736.

    Research output: Contribution to journalArticle

  42. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Using recycled aggregates in green roof substrates for plant diversity

    Molineux, C., Gange, A., Connop, S. P. & Newport, D., Sep 2015, In : Ecological Engineering. 82, p. 596-604 9 p.

    Research output: Contribution to journalArticle

  44. Published

    USING SATELLITES FOR PROVIDING BROADBAND ISLAND INTERCONNECTION-THE RACE IIlR2074 (CATALYST) PROJECT

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, AIAA International Communications Satellite Systems Conference, 15 th, San Diego, CA. p. 407-412 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Using self‐determination theory to understand the relationship between calling enactment and daily well‐being

    Conway, N., Clinton, M., Sturges, J. & Budjanovcanin, A., Nov 2015, In : Journal of organizational behavior. 36, 8, p. 1114–1131 18 p.

    Research output: Contribution to journalArticle

  46. Published

    Using self-reflective tools to understand violence perpetration among patients with personality disorders

    Gopalakrishnan, S., Ambrose, D. & Harvey, J., Nov 2019, In : Aggression and Violent Behavior. 49, 10 p., 101311.

    Research output: Contribution to journalArticle

  47. Published

    Using Separable Bell-Diagonal States to Distribute Entanglement

    Kay, A., 21 Aug 2012, In : Physical Review Letters. 109, 8, 080503.

    Research output: Contribution to journalArticle

  48. E-pub ahead of print

    Using Signatures in Type Theory to Represent Situations

    Chatzikyriakidis, S. & Luo, Z., 25 Aug 2015, New Frontiers in Artificial Intelligence : JSAI-isAI 2014 Workshops, LENLS, JURISIN, and GABA, Kanagawa, Japan, October 27-28, 2014, Revised Selected Papers. Murata, T., Mineshima, K. & Bekki, D. (eds.). Springer, p. 172-183 12 p. (Lecture Notes in Computer Science; vol. 9067).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  49. Published

    Using Signatures in Type Theory to Represent Situations

    Chatzikyriakidis, S. & Luo, Z., 2014, JSAI International Symposium on Artificial Intelligence. p. 172-183 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  50. Published

    Using single cell cultivation system for on-chip monitoring of the interdivision timer in Chlamydomonas reinhardtii cell cycle

    Matsumura, K., Yagi, T., Hattori, A., Soloviev, M. & Yasuda, K., 2010, In : Journal of Nanobiotechnology. 8, p. 23

    Research output: Contribution to journalArticle