Home > Publications

Publications

41401 - 41450 out of 42,415Page size: 50
  1. Weak associations between pubertal development and psychiatric and behavioral problems

    Smith-Woolley, E., Rimfeld, K. & Plomin, R., 18 Apr 2017, In: Translational Psychiatry. 7, 4, p. e1098

    Research output: Contribution to journalArticlepeer-review

  2. E-pub ahead of print

    Weak asymmetric interspecific aggression and divergent habitat preferences at an elevational contact zone between tropical songbirds

    Jones, S., Tobias, J., Freeman, R. & Portugal, S., 26 Oct 2019, (E-pub ahead of print) In: Ibis. p. 1-29 29 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Weak Conditions for Nonparametric Density Shrinkage

    Sancetta, A., 2013, In: Journal of Multivariate Analysis. 115, p. 285-300

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Weak Convergence of Laws on ℝK with Common Marginals

    Sancetta, A., Jun 2007, In: Journal of Theoretical Probability. 20, 2, p. 371-380 10 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Weak links and DC SQUIDS on artificial nonsymmetric grain boundaries in YBa 2Cu 3O 7-delta

    Ivanov, Z. G., Nilsson, P. A., Winkler, D., Alarco, J. A., Claeson, T., Stepantsov, E. A. & Tzalenchuk, A., 1991, In: Applied Physics Letters. 59, 23, p. 3030

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Weak localization and electron-electron interactions in a two-dimensional grid lateral surface superlattice

    LIANG, C. T., SMITH, C. G., NICHOLLS, J. T., HUGHES, R. J. F., PEPPER, M., FROST, J. E. F., RITCHIE, D. A., GRIMSHAW, M. P. & JONES, G. A. C., 15 Mar 1994, In: Physical Review B. 49, 12, p. 8518-8521 4 p.

    Research output: Contribution to journalComment/debatepeer-review

  7. Published

    Weak localization scattering lengths in epitaxial, and CVD graphene

    Baker, A. M. R., Alexander-Webber, J. A., Altebaeumer, T., Janssen, T. J. B. M., Tzalenchuk, A., Lara-Avila, S., Kubatkin, S., Yakimova, R., Lin, C. T., Li, L. J. & Nicholas, R. J., 2012, In: Physical Review B. 86, 23, 045414.

    Research output: Contribution to journalArticlepeer-review

  8. Forthcoming

    Weak Messianic Power and the Holocaust

    Eaglestone, R., 2010, (Accepted/In press) The Politics to Come. Bradley, A. (ed.). London: Continuum, p. 131-140

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    Weak Synchrony Models and Failure Detectors for Message Passing (k-)Set Agreement

    Biely, M., Robinson, P. & Schmid, U., 2009, Principles of Distributed Systems, 13th International Conference, OPODIS 2009, Nîmes, France, December 15-18, 2009. Proceedings. p. 285-299 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Weak Transitivity in Coercive Subtyping

    Luo, Y., Luo, Z. & Soloviev, S., 2003, Types for Proofs and Programs, Proc. of Inter Conf of TYPES'02. LNCS 2646. p. 220--239

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Weakly Hamiltonian-connected ordinary multipartite tournaments.

    Gutin, G., Bang-Jensen, J. & Huang, J., 1995, In: Discrete Mathematics. 138, 1-3, p. 63-74

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Weakness Plagues Ineffective Panacea

    McSweeney, B., 1985, In: Pass. December

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Weaknesses in shared RSA key generation protocols

    Blackburn, S. R., Blake-Wilson, S., Burmester, M. & Galbraith, S. D., 1999, Cryptography and Coding, 7th IMA International Conference, Cirencester. Walker, M. (ed.). Berlin: Springer, p. 300-306 7 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    Weaknesses of protocols for updating the parameters of an established threshold scheme

    Martin, K. M. & Nakahara Jr, J., 2001, In: IEE Proc. Computers and Digital Techniques. 148, 1, p. 45-48 4 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Wealth, volume and stock market volatility: Case of Hong Kong

    Li, M. C., 2007, In: Applied Economics. 39, 15, p. 1937-1953

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Weaponising the Crusades: Justifying Terrorism and Political Violence

    Awan, A., 2 Jul 2019, The Crusades in the Modern World : Engaging the Crusades. Horswell, M. & Awan, A. N. (eds.). 1 ed. Routledge, Vol. 2. 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Published

    Weapons of mass communication: The securitization of social networking sites

    Pinkerton, A., Young, S. & Dodds, K., Mar 2011, In: Political Geography. 30, 3, p. 115-117 3 p.

    Research output: Contribution to journalEditorialpeer-review

  18. Published

    Weapons of Mass Destruction and US Foreign Policy: The strategic use of a concept

    Bentley, M., 19 Mar 2014, 1 ed. London: Routledge. 192 p.

    Research output: Book/ReportBook

  19. Published

    Weapons of Mass Destruction: The Search for Global Security

    Bentley, M., 15 Apr 2018, In: Security Journal. 31, 2, p. 660-62

    Research output: Contribution to journalBook/Film/Article reviewpeer-review

  20. Forthcoming

    Wearable Security and Privacy

    Blasco Alis, J., Chen, T. M., Wolff, D. & Patil, H. K., 26 Oct 2017, (Accepted/In press) The Philosophy of Mission-Oriented Wireless Sensor Networks. Ammari, H. (ed.). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  21. Published

    Wearables Security and Privacy

    Blasco, J., Chen, T. M., Kupwade Patil, H. & Wolff, D., 1 Jan 2019, Studies in Systems, Decision and Control. Springer International Publishing AG, p. 351-380 30 p. (Studies in Systems, Decision and Control; vol. 164).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Tileria, M., Blasco, J. & Suarez-Tangil, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published
  24. Published

    Weather

    Williams, D., 2006, In: Performance Research. 11, 3, p. 142-144 3 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Weather Based Photovoltaic Energy Generation Prediction Using LSTM Networks

    Arshi, S., Zhang, L. & Strachan, B., 30 Sep 2019, 2019 International Joint Conference on Neural Networks (IJCNN). International Joint Conference on Neural Networks (IJCNN): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Weaver's Sundries

    Cowie, D. & Brandon III, W. M. (ed.), May 2017, USA : 1888 Center.

    Research output: Other contribution

  27. Published

    Weaving Stories

    Hawkins, H., 2011, Connecting with Gertrude: Recent Work by Amy Houghton. Plymouth City Art Gallery

    Research output: Chapter in Book/Report/Conference proceedingChapter

  28. Published

    Weaving Texts for a Twentieth-Century Ulysses: Dallapiccola's Religious Vision in Ulisse

    Suvini-Hand, V., 2005, In: Italian Studies. 60, 1, p. 71-98 28 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Web 2.0 and micro-businesses, Highly Commended Award Winner at the 2013 Emerald Literati Network Awards for Excellence: An exploratory investigation

    Barnes, D., Clear, F., Dyerson, R., Harindranath, G., Harris, L. & Ray, A., 2012, In: Journal of Small Business and Enterprise Development. 19, 4

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Web 2.0: New Challenges for the Study of E-Democracy in an Era of Informational Exuberance

    Chadwick, A., 2012, Connecting Democracy: Online Consultation and the Flow of Political Communication. Coleman, S. & Shane, P. M. (eds.). MIT Press, p. 45-75

    Research output: Chapter in Book/Report/Conference proceedingChapter

  31. Published

    Web 2.0: New Challenges for the Study of E-Democracy in an Era of Informational Exuberance

    Chadwick, A., 2009, In: I/S: A Journal of Law and Policy for the Information Society. 5, 1, p. 9-41

    Research output: Contribution to journalArticlepeer-review

  32. Published

    Web archiving in the UK: cooperation, legislation and regulation

    Tuck, J., Dec 2008, In: LIBER Quarterly. 18, 3/4, p. 357-365

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Web based student information management system in universities: experiences from Mzuzu University

    Lubanga, S. C., Chawinga, W. D., Majawa, F. & Kapondera, S., 2018, Standing Conference of the Eastern, Central and Southern Africa Librarians and Institutions (SCESCAL).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Web Challenges to Berlusconi: An Analysis of Oppositional Sites

    Vaccari, C., 2010, Resisting the Tide: Cultures of Opposition under Berlusconi (2001-06). Albertazzi, D., Brook, C., Ross, C. & Rothenberg, N. (eds.). London: Continuum, p. 135 147 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  35. Published

    Web Password Recovery: A Necessary Evil?

    Al Maqbali, F. & Mitchell, C. J., 2019, Proceedings of the Future Technology Conference (FTC) 2018, Volume 2: Vancouver, November 2018. Springer-Verlag, p. 324-341 18 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Web Server on a SIM Card

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2010, Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. Ao, S. I., Gelman, L., Hukins, D. WL., Hunter, A. & Korsunsky, A. M. (eds.). Newswood Limited, Vol. I. p. 253-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Web-based customer decision support systems

    O'Keefe, R. M. & Mceachern, T., Mar 1998, In: Communications of the ACM. 41, 3, p. 71-78 8 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Webern and the Transformation of Nature

    Johnson, J., 1999, Cambridge: Cambridge University Press. 274 p.

    Research output: Book/ReportBook

  39. Published

    Webern, Metaphysics and Musical Thresholds

    Johnson, J., 2009, Webern_21. Schweiger, D. & Urbanek, N. (eds.). Vienna: Böhlau, p. 73-97 (Wiener Veröffentlichungen zur Musikgeschichte).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  40. Published

    Webern's "Middle Period": Body of the Mother or Law of the Father?

    Johnson, J., 1 Apr 1997, In: Repercussions. 6, 1, p. 61–108

    Research output: Contribution to journalArticlepeer-review

  41. Published

    Web-Services Architecture for Pervasive Computing Environment

    Malik, N. A. & Tomlinson, A., 1 Sep 2009, In: Pakistan Journal of Science. 61, 3, p. 153 - 157

    Research output: Contribution to journalArticlepeer-review

  42. Published

    Website Credential Storage and Two-Factor Web Authentication with a Java SIM

    Hart, J., Markantonakis, K. & Mayes, K., 2010, In: Information security theory and practices: security and privacy of pervasive systems and smart devices. 6033, p. 229-236 8 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Website Fingerprinting Defenses at the Application Layer

    Cherubin, G., Hayes, J. & Juarez, M., 2017, In: Proceedings on Privacy Enhancing Technologies. 2017, 2, p. 186-203 18 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published
  45. Published

    Wednesday's Child: Research into women's experience of neglect and abuse in childhood and adult depression.

    Bifulco, T. & Moran, P., 1998, London, New York: Routledge.

    Research output: Book/ReportBook

  46. Published

    Weeds, plagues, and bodily secretions: A geographical interpretation of metaphors of displacement

    Cresswell, T., Jun 1997, In: Annals of the Association of American Geographers. 87, 2, p. 330-345 16 p.

    Research output: Contribution to journalArticlepeer-review

  47. E-pub ahead of print

    Weight sharing for LMS algorithms: Convolutional Neural Networks Inspired Multichannel Adaptive Filtering

    Cheong Took, C. & Mandic, D., Jul 2022, In: Digital Signal Processing. 127, 103580.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Weighted combination of size and disparity: a computational model for timing a ball catch

    Rushton, S. K. & Wann, J., 1 Feb 1999, In: Nature Neuroscience . 2, 2, p. 186-90 5 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Weighted Kernel Regression for Predicting Changing Dependencies

    Busuttil, S. & Kalnishkan, Y., 2007, Machine Learning: ECML 2007, 18th European Conference on Machine Learning: volume 4701 of Lecture Notes in Computer Science. Springer, p. 535-542 (Lecture Notes in Computer Science; vol. 4701).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Weights for total division orderings on strings

    Scott, E., 1994, In: Theoretical Computer Science. 135, 2, p. 345-359

    Research output: Contribution to journalArticlepeer-review