Refine your results

Easily toggle selected advanced search features:

Search research publications and outputs

  1. Using Unstructured Data to Improve the Continuous Planning of Critical Processes Involving Humans

    Paterson, C., Calinescu, R. C., Wang, D. & Manandhar, S. K., 2019, (Accepted/In press) 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Using a Software Safety Argument Pattern Catalogue: Two Case Studies

    Hawkins, R. D., Clegg, K. D., Alexander, R. & Kelly, T., Sep 2011, Computer Safety, Reliability, and Security: Proceedings of the 30th international conference on Computer safety, reliability, and security. Berlin: SPRINGER-VERLAG BERLIN, Vol. 6894. p. 185-198 14 p. (Lecture Notes in Computer Science; vol. 6894).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Using a model merging language for reconciling model versions

    Engel, K-D., Paige, R. F. & Kolovos, D. S., 2006, MODEL DRIVEN ARCHITECTURE - FOUNDATIONS AND APPLICATIONS, PROCEEDINGS. Rensink, A. & Warmer, J. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 143-157 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Using agent-based modelling approaches to support the development of safety policy for systems of systems

    Hall-May, M. & Kelly, T., 2006, COMPUTER SAFETY, RELIABILTIY, AND SECURITY, PROCEEDINGS. Gorski, J. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 330-343 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Using ants to attack a classical cipher

    Russell, M., Clark, J. A. & Stepney, S., 2003, GENETIC AND EVOLUTIONARY COMPUTATION - GECCO 2003, PT I, PROCEEDINGS. CantuPaz, E., Foster, JA., Deb, K., Davis, LD., Roy, R., OReilly, UM., Beyer, HG., Standish, R., Kendall, G., Wilson, S., Harman, M., Wegener, J., Dasgupta, D., Potter, MA., Schultz, AC., Dowsland, KA., Jonoska, N. & Miller, J. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 146-147 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Using association rule mining to predict opponent deck content in android: Netrunner

    Sephton, N., Cowling, P. I., Devlin, S., Hodge, V. J. & Slaven, N. H., 20 Sep 2016, 2016 IEEE Conference on Computational Intelligence and Games, CIG 2016. IEEE Computer Society Press, 7860399

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Using bugs and viruses to teach artificial intelligence

    Cowling, PI., Fennell, R., Hogg, R., King, G., Rhodes, P. & Sephton, N., 2004, Proceedings of The International Conference on Computer Games: Artificial Intelligence, Design and Education (CGAIDE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Using card sorts for understanding website information architectures: technological, methodological and cultural issues

    Petrie, H., Power, C., Cairns, P. & Seneler, C., 2011, Human-Computer Interaction – INTERACT 2011 : 13th IFIP TC 13 International Conference, Lisbon, Portugal, September 5-9, 2011, Proceedings, Part IV. Berlin, Heidelberg: Springer-verlag, p. 309-322 14 p. (Lecture Notes in Computer Science; vol. 6949).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Using defeasible logic for a window on a probabilistic database: some preliminary notes

    Cussens, J. & Hunter, A., 1991, Symbolic and Quantitative Approaches for Uncertainty. Kruse, R. & Seigel, P. (eds.). Springer, Vol. 548. p. 146-152 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Using document dimensions for enhanced information retrieval

    Jayasooriya, T. & Manandhar, S., 2004, APPLIED COMPUTING, PROCEEDINGS. Manandhar, S., Austin, J., Desai, U., Oyanagi, Y. & Talukder, A. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 145-152 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Using fuzzy self-organising maps for safety critical systems

    Kurd, Z. & Kelly, T. P., 2004, COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS. Heisel, M., Liggesmeyer, P. & Wittmann, S. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 17-30 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Using hardware methods to improve time-predictable performance in real-time Java systems

    Whitham, J., Audsley, N. C. & Schoeberl, M., 2009, Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems, JTRES 2009, Madrid, Spain, September 23-25, 2009. Higuera-Toledano, M. T. & Schoeberl, M. (eds.). ACM, p. 130-139 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Using harmonic task-sets to increase the schedulable utilization of cache-based preemptive real-time systems

    Busquets-Mataix, J. V., Serrano, J. J., Ors, R., Gil, P. J. & Wellings, A. J., 1996, Third International Workshop on Real-Time Computing Systems Application (RTCSA '96), October 30 - November 01, 1996, Seoul, Korea. IEEE Computer Society, p. 195-202 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Using maximum entropy in a defeasible logic with probabilistic semantics

    Cussens, J. & Hunter, A., 1993, IPMU'92 - Advanced Techniques in Artificial Intelligence. Bouchon-Meunier, B., Valverde, L. & Yager, R. R. (eds.). Lecture Notes in Computer Science 682, Springer-Verlag, p. 43-52 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Using mobile robotic agents to increase service availability and extend network lifetime on WSRNs

    Caliskanelli, I. & Indrusiak, L. S., 2014, Proceedings - 2014 12th IEEE International Conference on Industrial Informatics, INDIN 2014. Institute of Electrical and Electronics Engineers Inc., p. 388-393 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Using model checking to validate style-specific architectural refactoring patterns

    Stephenson, Z. & McDermid, J., 2007, 31ST IEEE SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 53-62 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Using multi-objective artificial immune systems to find core collections based on molecular markers

    Schlottfeldt, S., Carvalho, A. C. P. L. F., Walter, M. E. M. T., Telles, M. P. C., Timmis, J. & Diniz-Filho, J. A. F., 11 Jul 2015, GECCO 2015 - Proceedings of the 2015 Genetic and Evolutionary Computation Conference. Association for Computing Machinery, Inc, p. 1271-1278 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Using neural networks as part of a system to recognise formations of aircraft

    Zanelli, P. R. & Austin, J., 1997, FIFTH INTERNATIONAL CONFERENCE ON ARTIFICIAL NEURAL NETWORKS. EDISON: INST ELECTRICAL ENGINEERS INSPEC INC, p. 152-157 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Using neural networks for strategy selection in real-time strategy games

    Randall, T., Cowling, P., Baker, R. & Jiang, P., 2009, AISB 2009 Symposium: AI and Games, Edinburgh, Scotland, 8th-9th April.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Using observation ageing to improve Markovian model learning in QoS engineering

    Calinescu, R. C., Johnson, K. H. A. & Rafiq, Y., 2011, Proceedings of the 2nd ACM/SPEC International Conference on Performance Engineering. p. 505 510 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Using parallel corpora for word sense disambiguation

    Shahid, A. R. & Kazakov, D. L., 2013, RANLP-13. Hissar, Bulgaria

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Using quantitative analysis to implement autonomic IT systems

    Calinescu, R. & Kwiatkowska, M., 2009, Proceedings of the 31st International Conference on Software Engineering (ICSE). p. 100-110 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Using simulation to validate style-specific architectural refactoring patterns

    Stephenson, Z., McDermid, J. & Choy, J., 2006, 30th Annual IEEE/NASA Software Engineering Workshop, Proceedings. LOS ALAMITOS: IEEE COMPUTER SOC, p. 123-132 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Using social marketing techniques to improve parental engagement in reading at home with Y5 children (age 9-10)

    Wells, VK. & Smithson, J., 1 Sep 2016, n/a.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Using societal impact assessment (SIA) to improve technological development in the field of crime prevention

    Clavell, G. G. & Frowd, P. M., 1 Jan 2015, Social Informatics: SocInfo 2014 International Workshops, Barcelona, Spain, November 11, 2014, Revised Selected Papers. Aiello, L. M. & McFarland, D. (eds.). Springer-Verlag, p. 118-124 7 p. (Lecture Notes in Computer Science; vol. 8852).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution