• Migration to Cloud Computing: A Decision Process Model more
  • Migration to Cloud Computing-The Impact on IT Management and Security An Exploration of Senior Technical and Security Professional Views more
  • Mii-vitaliSe - Development of a physiotherapist-supported Nintendo Wii™ intervention to encourage people with multiple sclerosis to become more active in the home more
  • Millets across Eurasia: Chronology and context of early records of the genera Panicum and Setaria from archaeological sites in the Old World more
  • Mind and body: academic engagement with industry more
  • Mind the gap: supporting students to have a successful transition from school to university. Current practice and future possibilities. more
  • Mind the Gap: the corrosive impact of the ‘production’/’editorial’ divide in UK television. more
  • Mind the Gaps: Political Rhetoric, Executive Reality and Public Trust more
  • MINDFULNESS INTERVENTION IN PULMONARY ARTERIAL HYPERTENSION (PAH) PATIENTS: OUTCOMES, ISSUES, LESSONS LEARNED more
  • Mindset or Skill-set? What media employers think about graduate employability more
  • Minimizing material consumption of 3d printing with stress-guided optimization more
  • Minimum bit error rate beamforming receiver for space-division multiple-access based quadrature amplitude modulation systems more
  • MirrorMirror: A mobile application to improve speechreading acquisition more
  • Mise-en-scène of narrative action in interactive storytelling more
  • MISER: Mise-En-Scène region support for staging narrative actions in interactive storytelling more
  • Misinformation, Citizenship, and Media Literacy more
  • Misinformation, Security and Media Literacy more
  • Misperceptions and missed opportunities: how Facebookers talked Brexit more
  • Missing features restoration using clustering methods more
  • Mission Impossible IV: The Event Experience more
  • Misty and Gothic for Girls more
  • Misty and Gothic for Girls in British Comics more
  • Misty: Echoes of EC Horror more
  • Misuse case techniques for mobile privacy more
  • Misuse Detection in a Simulated IaaS Environment more

Previous Next