Home > Publications

Publications

37701 - 37750 out of 39,258Page size: 50
  1. Published

    Using a quantum computer to investigate quantum chaos

    Schack, R., 1998, In : Physical Review A. 57, p. 1634-1635 2 p.

    Research output: Contribution to journalArticle

  2. Published

    Using a systems viability approach to evaluate integrated conservation and development projects: assessing the impact of the North Rupununi Adaptive Management Process, Guyana

    Mistry, J., Berardi, A., Simpson, M., Davis, O. & Haynes, L., Sep 2010, In : Geographical Journal. 176, 3, p. 241-252

    Research output: Contribution to journalArticle

  3. Published

    Using a Whole Person Approach to Support People with Cancer: A Longitudinal, Mixed-Methods Service Evaluation

    Polley, M., Jolliffe, R., Boxell, E., Zollman, C., Jackson, S. & Seers, H., 1 Dec 2016, In : Integrative Cancer Therapies. 15, 4, p. 435-445 11 p.

    Research output: Contribution to journalArticle

  4. Published

    Using an exponential sine sweep to measure the vocal tract resonances

    Delvaux, B. & Howard, D. M., 2013, In : Journal of the Acoustical Society of America. 134, 5, p. 4206 1 p.

    Research output: Contribution to journalArticle

  5. Published

    Using an oculomotor signature as an indicator of aesthetic preference

    Holmes, T. & Zanker, J., 2012, In : iPerception. 3, 7, p. 426-439 14 p.

    Research output: Contribution to journalSpecial issue

  6. Unpublished
  7. Published

    USING ANTISENSE RNA TO STUDY GENE-FUNCTION - INHIBITION OF CAROTENOID BIOSYNTHESIS IN TRANSGENIC TOMATOES

    BIRD, CR., RAY, JA., FLETCHER, JD., BONIWELL, JM., BIRD, AS., TEULIERES, C., BLAIN, N. V., BRAMLEY, PM., SCHUCH, W. & Bramley, P., Jul 1991, In : Bio-Technology. 9, 7, p. 635-639 5 p.

    Research output: Contribution to journalArticle

  8. Published

    Using Argument-based Features to Predict and Analyse Review Helpfulness

    Liu, H., Gao, Y., Lv, P., Li, M., Geng, S., Li, M. & Wang, H., Sep 2017, Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Copenhagen, Denmark: Association for Computational Linguistics, p. 1358–1363 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  11. Published

    Using computer programs to code qualitative data

    Catterall, M. & Maclaran, P., 1996, In : Marketing Intelligence and Planning. 14, 4, p. 29-33

    Research output: Contribution to journalArticle

  12. Published

    Using computer software for the analysis of qualitative market research data

    Catterall, M. & Maclaran, P., Jul 1998, In : Journal of the Market Research Society. 40, 3, p. 207-222 16 p.

    Research output: Contribution to journalArticle

  13. E-pub ahead of print

    Using connectivity-based real-time fMRI neurofeedback to modulate attentional and resting state networks in people with high trait anxiety

    Morgenroth, E., Saviola, F., Gilleen, J., Allen, B., Lührs, M., W. Eysenck, M. & Allen, P., 23 Jan 2020, In : NeuroImage: Clinical. 25, p. 1-10 10 p., 102191.

    Research output: Contribution to journalArticle

  14. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Using Contextual Representations to Efficiently Learn Context-Free Languages

    Clark, A., Eyraud, R. & Habrard, A., 1 Oct 2010, In : Journal of Machine Learning Research. 11, p. 2707-2744 38 p.

    Research output: Contribution to journalArticle

  16. Published

    Using decomposition-parameters for QBF: Mind the prefix!

    Eiben, E., Ganian, R. & Ordyniak, S., Jun 2020, In : Journal of Computer and System Sciences. 110, p. 1-21 21 p.

    Research output: Contribution to journalArticle

  17. Published

    Using Decomposition-Parameters for QBF: Mind the Prefix!

    Eiben, E., Ganian, R. & Ordyniak, S., 21 Feb 2016, p. 964-970. 7 p.

    Research output: Contribution to conferencePaper

  18. Published

    Using Design Thinking to Understand Cyber Attack Surfaces of Future Smart Grids

    Snow, S., Happa, J., Horrocks, N. & Glencross, M., 2020, In : Frontiers in Energy Research.

    Research output: Contribution to journalArticle

  19. Published

    Using detrital garnet compositions to determine provenance: a new compositional database and procedure

    Suggate, S. & Hall, R., 2014, Sediment Provenance Studies in Hydrocarbon Exploration and Production. Scott, R. A., Smyth, H. R., Morton, A. C. & Richardson, N. (eds.). Geological Society of London Special Publication, Vol. 386. p. 373-393 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  20. Published

    Using developmental cognitive neuroscience to study behavioral and attentional control

    Astle, D. E. & Scerif, G., 2009, In : Developmental Psychobiology. 51, 2, p. 107-18 12 p.

    Research output: Contribution to journalArticle

  21. Published

    Using discourse analysis to understand IS planning and development in organization: A case study

    Sillince, J. A. A. & Harindranath, G., 1999, SYSTEMS DEVELOPMENT METHODS FOR DATABASES, ENTERPRISE MODELING, AND WORKFLOW MANAGEMENT. Wojtkowsky, W. (ed.). NEW YORK: KLUWER ACADEMIC/PLENUM PUBL, p. 327-336 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Using Electroglottographic Real-Time Feedback to Control Posterior Glottal Adduction during Phonation

    Herbst, C. T., Howard, D. & Schloemicher-Thier, J., Jan 2010, In : Journal of Voice. 24, 1, p. 72-85 14 p.

    Research output: Contribution to journalArticle

  24. Published

    Using electrostatic potentials to predict DNA-binding sites on DNA-binding proteins

    Jones, S., Shanahan, H. P., Berman, H. M. & Thornton, J. M., 15 Dec 2003, In : Nucleic Acids Research. 31, 24, p. 7189-7198 10 p.

    Research output: Contribution to journalArticle

  25. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Using Evidence To Inform Decision-Making

    Evans, T., 2014, Applying Research Evidence in Social Work Practice. Webber, M. (ed.). Red Globe Press

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  28. Published

    Using explicit state to describe architectures

    Lopes, A. & Fiadeiro, J. L., 1999, FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING. Finance, JP. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-160 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Using Foucalt to analyse ethics in the practice of problem structuring methods

    Córdoba-Pachón, J-R., 1 Sep 2006, In : Journal of the Operational Research Society. 57, 9, p. 1027-1034

    Research output: Contribution to journalArticle

  30. Published

    Using Game controller for Relaying Deictic Gestures in Computer Mediated Communication

    Walkowski, S., Doerner, R., Lievonen, M. & Rosenberg, D., Jun 2011, In : International Journal of Human-Computer Studies. 69, 6, p. 362-374 12 p., doi:10.1016/j.ijhcs.2011.01.002.

    Research output: Contribution to journalArticle

  31. Published

    Using GAs to create a waveguide model of the oral vocal tract

    Cooper, C., Howard, D. M. & and Tyrrell, A. M., 2004, In : Lecture Notes in Computer Science. 3005-200, p. 280-288 9 p.

    Research output: Contribution to journalArticle

  32. Published

    Using GAs to create a waveguide model of the oral vocal tract: APPLICATIONS OF EVOLUTIONARY COMPUTING

    Cooper, C. H. V., Howard, D. M. & Tyrrell, A. M., 2004, APPLICATIONS OF EVOLUTIONARY COMPUTING. Raidl, GR. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 280-288 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  33. Unpublished

    Using Gesture to Support Language

    Wray, C., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  34. Published

    Using Grounded Theory to Explore Employees' Brand-Oriented Behaviors

    Gill-Simmen, L., 2019, In : SAGE Research Methods Cases.

    Research output: Contribution to journalArticle

  35. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. E-pub ahead of print

    Using IP Rights to Protect Human Rights: Copyright for ‘Revenge Porn’ Removal

    O'Connell, A. & Bakina, K., 9 Jun 2020, In : Legal Studies. 16 p.

    Research output: Contribution to journalArticle

  39. Published

    Using LP to study the language PL0+

    Scott, E. & Norrie, K., 1993, In : Workshops in Computing. p. 227-245

    Research output: Contribution to journalArticle

  40. Published

    Using Maimonides' rule to estimate the effect of class size on scholastic achievement

    Angrist, J. D. & Lavy, V., May 1999, In : The Quarterly Journal of Economics. 114, 2, p. 533-575 43 p.

    Research output: Contribution to journalArticle

  41. Published

    Using mammal tooth phosphate with freshwater carbonate and phosphate palaeoproxies to obtain mean paleotemperatures

    Grimes, S. T., Mattey, D. P., Collinson, M. E. & Hooker, J. J., Apr 2004, In : Quaternary Science Reviews. 23, 7-8, p. 967-976 10 p.

    Research output: Contribution to journalArticle

  42. Published

    Using multiple chains for Gibbs sampling in mixed graphical association models

    Brewer, M., Luo, Z. & Gammerman, A., 1994, Computational Statistics. p. 185-189

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Using Narrative Research and Portraiture to Inform Design Research

    Golsteijn, C. & Wright, S., 2013, In : Lecture Notes in Computer Science. 8119, p. 298-315 18 p.

    Research output: Contribution to journalArticle

  44. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Using NLG and sensors to support personal narrative for children with complex communication needs

    Black, R., Reddington, J., Reiter, E., Tintarev, N. & Waller, A., 2010, Proceedings of the NAACL HLT 2010 Workshop on Speech and Language Processing for Assistive Technologies. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Using nonword repetition to distinguish genetic and environmental influences on early literacy development: a study of 6-year-old twins

    Bishop, DVM., Adams, CV. & Norbury, CF., 2004, In : American Journal of Medical Genetics Part B: Neuropsychiatric Genetics. 129B, p. 94-96

    Research output: Contribution to journalArticle

  48. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Forthcoming

    Using Padlet as an Intercultural Learning Tool

    Gill-Simmen, L., 1 Feb 2020, (Accepted/In press) Learner Relationships in a Global Higher Education. Foster, M. & Killick, D. (eds.). Routledge

    Research output: Chapter in Book/Report/Conference proceedingChapter

  50. Published

    Using performance-based pay to improve the quality of teachers

    Lavy, V., 2007, In : FUTURE OF CHILDREN. 17, 1, p. 87-109 23 p.

    Research output: Contribution to journalArticle