Home > Publications

Publications

38501 - 38550 out of 39,926Page size: 50
  1. Unpublished
  2. Published

    A critical analysis of decentralisation and local economic development

    Özcan, G., 2006, In: Environment and Planning C: Government and Policy. 24, 1, p. 117-138

    Research output: Contribution to journalArticlepeer-review

  3. Published

    A criterion for the existence of predictive complexity for binary games

    Kalnishkan, Y., Vovk, V. & Vyugin, M. V., 2004, Proceedings of the Fifteenth International Conference on Algorithmic Learning Theory. Ben-David, S., Case, J. & Maruoka, A. (eds.). Heidelberg: Springer, Vol. 3244. p. 249-263 15 p. (Lecture Notes in Artificial Intelligence; vol. 3244).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Unpublished

    A Crisis is an Opportunity

    Markaki, L., Sep 2020, (Unpublished).

    Research output: Contribution to conferencePaper

  5. Published

    A Creative Multiplicity: The Philosophy of Deleuze and Guattari

    Thornton, E., Mar 2018, Aeon.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  6. Published

    A court of specialists: judicial behavior on the UK Supreme Court

    Hanretty, C., 2020, Oxford University Press. 304 p.

    Research output: Book/ReportBook

  7. Published

    A Court of Specialists: Judicial Behaviour on the UK Supreme Court

    Hanretty, C., 24 Jun 2020, Oxford University Press. 304 p.

    Research output: Book/ReportBook

  8. Published

    A cost bounded possibilistic ATMS

    Bigham, J., Luo, Z. & Banerjee, D., 1994, Proceedings of Expert Systems 94 . Bramer, M. A. & Macintosh, A. L. (eds.). p. 161-172

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    A cost bounded possibilistic ATMS

    Bigham, J., Luo, Z. & Banerjee, D., 1995, European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Lecture Notes in Computer Science . Froidevaux, C. & Kohlas, J. (eds.). Springer, Vol. 946. p. 52-59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    A Correlation Coprocessor for Accurate Real-Time Ultrasonic Ranging of Multiple Objects Using the Transputer

    Brunfaut, M., Peremans, H., Audenaert, K., Blomme, R. & Van Campenhout, J. M., 1993, In: Microprocessors and Microsystems. 17, 10, p. 571-578

    Research output: Contribution to journalArticlepeer-review

  11. Published

    A Cordaixylon axis from well-drained alluvial plain facies in the Lower Pennsylvanian Joggins Formation of Nova Scotia

    Falcon-Lang, H. J., 2007, In: Atlantic Geology. 43, 2, p. 87-90

    Research output: Contribution to journalArticlepeer-review

  12. Published

    A coordination model for service-oriented interactions

    Abreu, J. & Fiadeiro, J. L., 1 Jan 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5052 LNCS. p. 1-16 16 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  13. Published

    A Cooperative Information System for the Connected Communities

    Pitt, J., Mamdani, E. & Stathis, K., 1 May 1998, Proceedings of COOP'98: Improving the Design of Cooperative Systems. Darses, F. & Zarate, P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    A Controversial Company: Debating the Casting of the RSC's The Orphan of Zhao

    Thorpe, A., Rogers, A., Pao, A., Thomas, S. & Chow, B., 21 Oct 2014, 4 ed. Taylor & Francis. 123 p. (Contemporary Theatre Review)

    Research output: Book/ReportBook

  15. Published

    A Contribution to the Military and Administrative History of Montana

    Rankov, B., 1983, Ancient Bulgaria. Papers Presented to the International Symposium on the Ancient History and Archaeology of Bulgaria, University of Nottingham, 1981 Vol. 2. Poulter, A. G. (ed.). Nottingham University Press, p. 40-73

    Research output: Chapter in Book/Report/Conference proceedingChapter

  16. Published

    A contraction theorem for the largest eigenvalue of a multigraph

    McKee, J., 15 Nov 2018, In: Linear Algebra and Its Applications. 557, p. 339-349 11 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    A contract-based event driven model for collaborative security in financial information systems

    Baldoni, R., Lodi, G., Chockler, G., Dekel, E., Mulcahy, B. P. & Martufi, G., 2010, ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems. p. 147-153 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    A contourite depositional system along the Uruguayan continental margin: Sedimentary, oceanographic and paleoceanographic implications

    Hernández-Molina, F. J., Soto, M., Piola, A. R., Tomasini, J., Preu, B., Thompson, P., Badalini, G., Creaser, A., Violante, R. A., Morales, E., Paterlini, M. & De Santa Ana, H., 1 Aug 2016, In: Marine Geology. 378, p. 333–349 17 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    A continuum of mindfulness

    Dennett, D. & McKay, R., 2006, In: Behavioral and Brain Sciences. 29, 4, p. 353-4 2 p.

    Research output: Contribution to journalComment/debatepeer-review

  20. Published

    A Continuous Landscape? Neighbourhood Planning and the New “Local” in Post-War Bristol

    Fisher, F. & Preston, R., 12 Jul 2018, Flow : Interior, Landscape and Architecture in the Era of Liquid Modernity. Sparke, P., Brown, P., Lara-Betancourt, P., Lee, G. & Taylor, M. (eds.). 1st ed. Bloomsbury, p. 168-179 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    A continuous dual-process model of remember/know judgments.

    Wixted, J. & Mickes, L., Oct 2010, In: Psychological Review. 117, 4, p. 1025-1054

    Research output: Contribution to journalArticlepeer-review

  22. Submitted

    A continuity bound for the expected number of connected components of a random graph: a model for epidemics

    Audenaert, K., Hanson, E. & Datta, N., 13 Dec 2019, (Submitted) In: ArXiv.org. 1912, 05599

    Research output: Contribution to journalArticlepeer-review

  23. Published

    A contingency approach to entrepreneurial leadership: an exploratory case study of two Chinese private enterprises

    Wang, C. L., Tee, D. D. & Ahmed, P. K., 2011, 34th Annual Institute for Small Business and Entrepreneurship Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    A Contingency Analysis Of Success Definitions: Is Social Entrepreneurship Really Differe

    Zeyen, A., 2012.

    Research output: Contribution to conferencePaperpeer-review

  25. Published

    A Continent of Camps and Collaboration

    Stone, D., 2019, In: Yad Vashem Studies. 47, 1, p. 217-228 12 p.

    Research output: Contribution to journalArticlepeer-review

  26. E-pub ahead of print

    A contextual approach to information privacy research

    Wu, P., Vitak, J. & Zimmer, M., 16 Apr 2019, In: Journal of the Association for Information Science and Technology. p. 1-6 6 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2009, Hannover, Germany, June 22-24, 2009. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    A contested vision of empire: anonymity, authority, and mobility in the reception of William Macintosh’s Travels in Europe, Asia, and Africa (1782)

    Keighren, I. M., 8 Jun 2020, Empire and mobility in the long nineteenth century. Lambert, D. & Merriman, P. (eds.). Manchester: Manchester University Press, p. 50–68

    Research output: Chapter in Book/Report/Conference proceedingChapter

  29. Published

    A Contested Identity: An Exploration of the Competing Social and Political Discourse Concerning the Identification and Positioning of Young People of Inter-Racial Parentage

    Barn, R. & Harman, V., 2006, In: British Journal of Social Work. 36, 8, p. 1309-1324

    Research output: Contribution to journalArticlepeer-review

  30. Published

    A Consuming Public: Movie Audiences in the Bengali Cultural Imaginary

    Dass, M., 2014, Meanings of Audiences: Comparative Discourses. Butsch, R. & Livingstone, S. (eds.). Routledge, p. 97-110

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  31. Published

    A constructive proof of the existence of Viterbi processes

    Lember, J. & Koloydenko, A., Apr 2010, In: IEEE Transactions on Information Theory. 56, 4, p. 2017-2033 17 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    A Constructive Approach for Proving Data Structures’ Linearizability

    Lev-Ari, K., Chockler, G. & Keidar, I., 5 Nov 2015, Distributed Computing 29th International Symposium, DISC 2015 Tokyo, Japan, October 7–9, 2015 Proceedings. Moses, Y. (ed.). Springer-Verlag, Vol. 9363. p. 356–370 15 p. 97. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    A construction which can be used to produce finitely presented infinite simple groups

    Scott, E., 1984, In: Journal of Algebra. 90, p. 294-322

    Research output: Contribution to journalArticlepeer-review

  34. Published

    A construction method for point divisible designs

    Beker, H. J. & Mitchell, C. J., 1978, In: Journal of Statistical Planning and Inference. 2, 3, p. 293-306 14 p.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    A Construction for Multisecret Threshold Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In: Designs, Codes and Cryptography. 9, p. 287-303 17 p.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    A Consideration on a Datum from Διήγησις περί της Αγίας

    Zecevic, N., 2000, In: Zbornik radova vizantološkog instituta . 38, p. 43-48

    Research output: Contribution to journalArticlepeer-review

  37. Published

    A consideration of individual differences and imagery ability amongst cognitive interviewees. Reply to Douglas on Witness Memory

    Memon, A. & Stevenage, S. V., 1996, In: Psycholoquy.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    A conifer-dominated palynological assemblage from Pennsylvanian (late Moscovian) alluvial drylands in Atlantic Canada: implications for the vegetation of tropical lowlands during glacial phases

    Dolby, G., Falcon-Lang, H. J., Gibling, M. R. & Falcon-Lang, H., Mar 2011, In: Journal of the Geological Society. 168, 2, p. 571-584 14 p.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    A Confusion of Marys

    Cave, S., 24 Jan 2020, Bristol: Shearsman. 78 p.

    Research output: Book/ReportBook

  40. Unpublished

    A Concurrent Bilateral Negotiation Model for Open E-Markets

    Alrayes, B., 2016, (Unpublished) 217 p.

    Research output: ThesisDoctoral Thesis

  41. Unpublished

    A Concrete Security Treatment of Symmetric Encryption in a Quantum Computing World

    Mossayebi, S., 2015, (Unpublished) 172 p.

    Research output: ThesisDoctoral Thesis

  42. Published

    A Conceptual Framework for Smartphone Security Among Arab Millennials

    Shah, M. & Ameen, N., 2019, UK Academy of Information Systems (UKAIS). p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Forthcoming

    A Conceptual Framework for Managing Expectations in Green IS Implementation

    Jackson, S. & Fearon, C., 17 Mar 2016, (Accepted/In press) 22nd IEEE International Technology Management Conference, Trondheim, Norway.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    A Computer-Aided Software Maintenance Process Model

    Deraman, A. B. & Layzell, P. J., 1993, In: Journal of Knowledge Engineering. 6, 1, p. 36-42 7 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    A Computationally Practical Simulation Estimation Algorithm for Dynamic Panel Data Models with Unobserved Endogenous State Variables

    Keane, M. P. & Sauer, R. M., Nov 2010, In: International Economic Review. 51, 4, p. 925-958 34 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    A computational tool that supports formal diagnosis of process design

    Ramos, P. & Fiadeiro, J. L., 15 Oct 1998, In: Information and Software Technology. 40, 10, p. 555-565 11 p.

    Research output: Contribution to journalArticlepeer-review

  47. E-pub ahead of print

    A computational science approach to understanding human conflict

    Johnson Restrepo, D., Spagat, M., Van Weezel, S., Zheng, M. & Johnson, N. F., 3 Feb 2020, In: Journal of Computational Science. p. 1-7 7 p., 101088.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    A Computational Model of the Escape Response Latency in the Giant Fiber System of Drosophila melanogaster

    Augustin, H., Zylbertal, A. & Partridge, L., 1 Apr 2019, In: eNeuro. 6, 2, p. 1-10 10 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    A computational analysis of separating motion signals in transparent random dot kinematograms

    Zanker, J. M., 2005, In: Spatial Vision. 18, 4, p. 431-445

    Research output: Contribution to journalArticlepeer-review

  50. Published

    A Comprehensive Symbolic Analysis of TLS 1.3

    Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T., 30 Oct 2017, ACM SIGSAC Conference on Computer and Commuincations Security. ACM, p. 1773-1788 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution