Refine your results

Easily toggle selected advanced search features:

Search research publications and outputs

  1. A Cross-Cultural Study of Motivations to Participate in a Crowdsourcing Project to Support People with Disabilities

    Layas, F., Petrie, H. & Power, C. D., 2015, Third AAAI Conference on Human Computation and Crowdsourcing.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. A DETAILED INVESTIGATION INTO THE EFFECTIVENESS OF EARCONS

    Brewster, S. A., Wright, P. C. & Edwards, A. D. N., 1994, AUDITORY DISPLAY. Kramer, G. (ed.). READING: ADDISON-WESLEY PUBL CO, p. 471-498 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. A DEVELOPMENT OF HAZARD ANALYSIS TO AID SOFTWARE-DESIGN

    McDermid, J. A. & Pumfrey, D. J., 1994, COMPASS '94 - PROCEEDINGS OF THE NINTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE. NEW YORK: I E E E, p. 17-25 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. A Damn’d bad Place, Sheffield: Brownfields and Historical Archaeology

    Symonds, J., Badcock, A. & Lines, A., 2004, Preserving Archaeological Remains in Situ? : Proceedings of the 2nd Conference, 12-14th September, 2001. Dixon, T. (ed.). Museum of London Archaeology Service, p. 249-53

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. A Day in the Life of a Spoken Word

    Dumay, N., Gaskell, M. G. & Feng, X., 2005, PROCEEDINGS OF THE TWENTY-SIXTH ANNUAL CONFERENCE OF THE COGNITIVE SCIENCE SOCIETY. MAHWAH: LAWRENCE ERLBAUM ASSOC PUBL, p. 339-344 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. A Deployment Value Model for Intrusion Detection Sensors

    Shaikh, S. A., Chivers, H., Nobles, P., Clark, J. A. & Chen, H., 2009, Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 200. Vol. 5576 LNCS. p. 250-259 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. A Direct Comparison of Localisation Performance When Using First, Third and Fifth Order Ambisonics For Real Loudspeaker And Virtual Loudspeaker Rendering

    Thresh, L. & Kearney, G. C., Oct 2017, Proc. of AES 143rd Convention.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. A Distributed Theatre Experiment with Shakespeare

    Williams, D. L., Kegel, I. C., Ursu, M., Cesar, P., Jansen, J., Geelhoed, E., Horti, A., Frantzis, M. & Scott, B., 2015, Proceedings of the 23rd ACM International Conference on Multimedia. New York, NY, USA: ACM, p. 281-290 10 p. (MM '15).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. A Dynamic Embedding Algorithm for Wireless Network Virtualization

    Belt, J. V. D., Ahmadi, H. & Doyle, L. E., 1 Sep 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall). p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. A Formal Model for Natural-Language Timed Requirements of Reactive Systems

    Carvalho, G., Carvalho, A., Rocha, E., Cavalcanti, A. L. C. & Sampaio, A. C. A., 2014, Formal Methods and Software Engineering: 16th International Conference on Formal Engineering Methods, ICFEM 2014, Luxembourg, Luxembourg, November 3-5, 2014. Proceedings. Merz, S. & Pang, J. (eds.). SPRINGER, p. 43-58 16 p. (Lecture Notes in Computer Science; vol. 8829).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution