Home > Research > Browse

Results for Applications

Publications & Outputs

  1. Droplets- and digital-based methods

    Fielden, P. R. & Baldock, S. J., 15/02/2019, Encyclopedia of Analytical Science. Worsfold, P., Townshend, A., Poole, C. & Miro, M. (eds.). 3rd ed. ed. Elsevier, p. 225-231 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNEntry for encyclopedia/dictionary

  2. Creative art-based technologies for interagency working together for safeguarding children and young people

    Carlick, S., 2018, Lancaster University. 326 p.

    Research output: ThesisDoctoral Thesis

  3. Early Report: How to Improve Programmers' Expertise at App Security?

    Weir, C., Rashid, A. & Noble, J., 8/04/2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security: co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). Aspinall, D., Cavallaro, L., Seghir, M. & Volkamer, M. (eds.). London, UK: CEUR-WS.org, Vol. 1575. p. 49-50 2 p. 8

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  4. Action-specific effects in perception and their potential applications: a reply to commentaries

    Witt, J. K., Linkenauger, S. A. & Wickens, C., 03/2016, In : Journal of Applied Research in Memory and Cognition. 5, 1, p. 88-93 6 p.

    Research output: Contribution to journalJournal article

  5. Does this App ask for too much data? the role of privacy perceptions in user behavior towards Facebook applications and permission dialogs

    Krasnova, H., Eling, N., Schneider, O., Wenninger, H. E., Widjaja, T. & Buxmann, P., 5/06/2013, European Conference on Information Systems (ECIS). Utrecht, Netherlands, p. 1-12 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  6. The international market for MBA qualifications: the relationship between tuition fees and applications

    Elliott, C. & Soo, K. T., 06/2013, In : Economics of Education Review. 34, p. 162–174 13 p.

    Research output: Contribution to journalJournal article

  7. An integer optimization approach to large-scale air traffic flow management

    Bertsimas, D., Lulli, G. & Odoni, A., 2011, In : Operations Research. 59, 1, p. 211-227 17 p.

    Research output: Contribution to journalJournal article

  8. Adaptive wireless thin-client model for mobile computing

    Al-Turkistany, M., Helal, S. & Schmalz, M., 01/2009, In : Wireless Communications and Mobile Computing. 9, 1, p. 47-59 13 p.

    Research output: Contribution to journalJournal article

  9. Aiding modular design and verification of safety-critical time-triggered systems by use of executable formal specifications

    Sakurai, K., Bokor, P. & Suri, N., 3/12/2008, 2008 11th IEEE High Assurance Systems Engineering Symposium. IEEE, p. 261-270 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  10. Observing walking behavior of humans using distributed phenomenon detection and tracking mechanisms

    Bose, R. & Helal, S., 2008, 2008 International Symposium on Applications and the Internet, SAINT 2008. IEEE, p. 405-408 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  11. Characterization of synthetic and natural materials by Fourier transform Raman spectroscopy

    Rehman, I. U., 1995, In : Journal of Advanced Materials. 27, 1, p. 59-63 5 p.

    Research output: Contribution to journalJournal article

More results »