Search research publications and outputs

  1. 1982
  2. Knowledge Retrieval as Limited Inference

    Frisch, A. M. & Allen, J. F., 1982, p. 274-291.

    Research output: Contribution to conferencePaper

  3. Practical Parallel Processing: A User's View of sc \Clip4

    Wood, A. M., 1982, p. 4.1-4.7.

    Research output: Contribution to conferencePaper

  4. ARGOT: The Rochester Dialogue System

    Allen, J. F., Frisch, A. M. & Litman, D. J., 1 Aug 1982, p. 66-70.

    Research output: Contribution to conferencePaper

  5. 1983
  6. The Organisation of Parallel Processing Machines

    Wood, A. M., Becker, J. & Eisele, I., 1983, p. 132-144.

    Research output: Contribution to conferencePaper

  7. 1985
  8. Parallel Thinking

    Wood, A. M., 1985, p. 1-3.

    Research output: Contribution to conferencePaper

  9. Using Model Theory to Specify AI Programs

    Frisch, A. M., 1985, p. 148-154.

    Research output: Contribution to conferencePaper

  10. 1987
  11. Access Management in multi-administration networks

    Lord, S. P., Pope, N. H. & Stepney, S., 1987.

    Research output: Contribution to conferencePaper

  12. GRAIL: Graphical Representation of Activity, Interconnection and Loading

    Stepney, S. & Muntean, T., 1987.

    Research output: Contribution to conferencePaper

  13. IPSES: Requirements; the Meaning of Integration and some Consequences

    McDermid, J. A., 1987, p. 27-36.

    Research output: Contribution to conferencePaper

  14. Inference without Chaining

    Frisch, A. M., 1987, p. 515-519.

    Research output: Contribution to conferencePaper

  15. 1988
  16. Jungle Evaluation

    Habel, A., Kreowski, H-J. & Plump, D., 1988, p. 92-112.

    Research output: Contribution to conferencePaper

  17. Jungle Evaluation for Efficient Term Rewriting

    Hoffmann, B. & Plump, D., 1988, p. 191--203.

    Research output: Contribution to conferencePaper

  18. Life Cycle Models for Software Development

    McDermid, J. A., 1988, p. 43-51.

    Research output: Contribution to conferencePaper

  19. Low Level Synchronisation Problems in Digital Systems: Formal techniques in Real-Time Fault-Tolerant Systems

    McDermid, J. A., Morgan, G. & Joseph, M., 1988, p. 139-141.

    Research output: Contribution to conferencePaper

  20. Modal logics of higher-order probability

    Haddawy, P. & Frisch, A. M., 1988, p. 133-148.

    Research output: Contribution to conferencePaper

  21. Security Models and Enterprise Models

    Dobson, J. E. & McDermid, J. A., 1988, p. 1-39.

    Research output: Contribution to conferencePaper

  22. Understanding Multi-transputer Execution

    Stepney, S., 1988.

    Research output: Contribution to conferencePaper

  23. Using VDM with Rely and Guarantee-Conditions: Experiences from a Real Project

    Woodcock, J. & Dickinson, B., 1988, p. 434-458.

    Research output: Contribution to conferencePaper

  24. Security Specifications

    Jacob, J. L., 1 Apr 1988, p. 14--23.

    Research output: Contribution to conferencePaper

  25. A Security Framework

    Jacob, J. L., 1 Jun 1988, p. 98--111.

    Research output: Contribution to conferencePaper

  26. 1989
  27. A Framework for Expressing Models of Security Policy

    Dobson, J. E. & McDermid, J. A., 1989, p. 229-241.

    Research output: Contribution to conferencePaper

  28. A General Framework for Sorted Deduction: Fundamental Results on Hybrid Reasoning

    Frisch, A. M., 1989, p. 126-136.

    Research output: Contribution to conferencePaper

  29. A Hypertext System with Controlled Hype

    Benest, I. D., 1989, p. 52-63.

    Research output: Contribution to conferencePaper

  30. CHAINED BELL INEQUALITIES

    BRAUNSTEIN, SL., CAVES, CM. & KAFATOS, M., 1989, p. 27-36.

    Research output: Contribution to conferencePaper

  31. IPSEs: Concepts and Reality

    McDermid, J. A. & Salenieks, P., 1989, p. 135-164. 30 p.

    Research output: Contribution to conferencePaper

  32. Pictorial Representation of Parallel Programs

    Stepney, S., 1989.

    Research output: Contribution to conferencePaper

  33. Security Policies for Integrated Project Support Environments

    McDermid, J. A. & Hocking, E. S., 1989, p. 41-74.

    Research output: Contribution to conferencePaper

  34. Towards Assurance Measures for High Integrity Software

    McDermid, J. A., 1989, p. 3A/1-3A/9.

    Research output: Contribution to conferencePaper

  35. On The Derivation of Secure Components

    Jacob, J. L., Berson, T. & Cooper, D. M., 1 May 1989, p. 242-247.

    Research output: Contribution to conferencePaper

  36. 1990
  37. A Constraint Logic Approach to Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1990, p. 234-250.

    Research output: Contribution to conferencePaper

  38. A Simpler Semantics for Z

    Gardiner, P. H. B., Lupton, P. J. & Woodcock, J., 1990, p. 3-11.

    Research output: Contribution to conferencePaper

  39. A Tool for Defining the Architecture of Z Specifications

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1990, p. 77-92.

    Research output: Contribution to conferencePaper

  40. An Approach to Object-Oriented Specification Using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1990, p. 193-215.

    Research output: Contribution to conferencePaper

  41. Architecturally Independent Software: the Case for Abstraction

    Wood, A. M., 1990, p. 123-127.

    Research output: Contribution to conferencePaper

  42. Categorising Non-interference

    Jacob, J. L., 1990, p. 44--50.

    Research output: Contribution to conferencePaper

  43. Generalization with Taxonomic Information

    Frisch, A. M. & Jr., C. D. P., 1990, p. 755-761.

    Research output: Contribution to conferencePaper

  44. Methods for Developing Safe Software

    McDermid, J. A. & Daniels, B. K., 1990, p. 6/1-6/8.

    Research output: Contribution to conferencePaper

  45. Modular Object-oriented Z Specifications

    Meira, S. R. D. L. & Cavalcanti, A., 1990, p. 173-192.

    Research output: Contribution to conferencePaper

  46. Refinement of State-Based Concurrent Systems

    Woodcock, J. & Morgan, C., 1990, p. 340-351.

    Research output: Contribution to conferencePaper

  47. SAZ

    Polack, F., Hitchcock, P. & Brown, A. W., 1990, p. 384-384.

    Research output: Contribution to conferencePaper

  48. Skills and Technologies for the Development and Evaluation of Safety Critical Applications

    McDermid, J. A. & Daniels, B. K., 1990, p. 163-172.

    Research output: Contribution to conferencePaper

  49. Tools that support human-human communication in the automated office

    Benest, I. D. & Dukic, D., 1990, p. 853-859.

    Research output: Contribution to conferencePaper

  50. Towards an Object Oriented Development Environment for Secure Applciations

    Hocking, E. S., McDermid, J. A. & Eizenberg, G. G., 1990, p. 191-200.

    Research output: Contribution to conferencePaper

  51. Towards an Object Oriented Development Environment for Secure Applications

    Hocking, E. S. & McDermid, J. A., 1990, p. 191-200.

    Research output: Contribution to conferencePaper

  52. Z and the Refinement Calculus

    King, S., 1990, p. 164-188.

    Research output: Contribution to conferencePaper

  53. 1991
  54. A Formal Model of Security Dependency for Analysis and Testing of Secure Systems

    McDermid, J. A. & Shi, Q., 1991, p. 188-200.

    Research output: Contribution to conferencePaper

  55. A General Framework for Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1991, p. 196-207.

    Research output: Contribution to conferencePaper

  56. A Tool for Defining the Architecture of a Z Specification

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1991, p. 77-92.

    Research output: Contribution to conferencePaper

  57. A Tutorial on the Refinement Calculus

    Woodcock, J., 1991, p. 79-140.

    Research output: Contribution to conferencePaper

  58. An Approach to Object Oriented Specification using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1991, p. 193-215.

    Research output: Contribution to conferencePaper

  59. An Introduction to Refinement in Z

    Woodcock, J., 1991, p. 96-117.

    Research output: Contribution to conferencePaper

  60. CICS Project Report: Experiences and Results from the use of Z in IBM

    Houston, I. & King, S., 1991, p. 588-596.

    Research output: Contribution to conferencePaper

  61. Efficient Implementation of Massive Neural Networks

    Austin, J., Jackson, T., Wood, A. M., Delgado-Frias, J. G. & Moore, W. P., 1991, p. 387-398.

    Research output: Contribution to conferencePaper

  62. Generalizing Atoms in Constraint Logic

    Page Jr., C. D. & Frisch, A. M., 1991, p. 429-440.

    Research output: Contribution to conferencePaper

  63. Graph-Reducible Term Rewriting Systems

    Plump, D., 1991, p. 622--636.

    Research output: Contribution to conferencePaper

  64. Implementing Term Rewriting by Graph Reduction: Termination of Combined Systems

    Plump, D., 1991, p. 307--317.

    Research output: Contribution to conferencePaper

  65. Learning Constrained Atoms

    Page Jr., C. D. & Frisch, A. M., 1991, p. 427-431.

    Research output: Contribution to conferencePaper

  66. Object Oriented Specification and Refinement

    Whysall, P. J., McDermid, J. A., Morris, J. M. & Shaw, R. C., 1991, p. 150-184.

    Research output: Contribution to conferencePaper

  67. On Integration and Reuse in a Software Development Environment

    Brown, A. W., McDermid, J. A. & Long, F., 1991, p. 171-194.

    Research output: Contribution to conferencePaper

  68. Safety Arguments, Software and System Reliability

    McDermid, J. A., 1991, p. 43-51.

    Research output: Contribution to conferencePaper

  69. Security and Normative Rights

    Morris, P. & McDermid, J. A., 1991, p. 294-314.

    Research output: Contribution to conferencePaper

  70. Structured Analysis: A Draft Method for Writing Z Specifications

    Polack, F., Whiston, M. & Hitchcock, P., 1991, p. 287-328.

    Research output: Contribution to conferencePaper

  71. TARDIS: An Architectural Framework for Timely and Reliable Distributed Information Systems

    Burns, A., Lister, A. M., McDermid, J. A. & Bailes, P. A., 1991, p. 1-15.

    Research output: Contribution to conferencePaper

  72. TARDIS/Z: A Technique for Formal Specification of High Integrity and Real Time Systems

    Coombes, A. C., Burns, A., McDermid, J. A. & Wichmann, B. A., 1991, p. 1-6.

    Research output: Contribution to conferencePaper

  73. The Refinement Calculus

    Woodcock, J., 1991, p. 80-95.

    Research output: Contribution to conferencePaper

  74. The Structure of Permissions: A Normative Framework for Access Rights

    Morris, P., McDermid, J. A., Landwehr, C. E. & Jajodia, S., 1991, p. 77-97.

    Research output: Contribution to conferencePaper

  75. The Use of Z

    Barden, R., Stepney, S., Cooper, D. & Nicholls, J. E., 1991, p. 99-124.

    Research output: Contribution to conferencePaper

  76. The Varieties of Refinement

    Jacob, J. L., Morris, J. M. & Shaw, R. C., 1991, p. 441--455.

    Research output: Contribution to conferencePaper

  77. Two Refinement Case Studies

    Woodcock, J., 1991, p. 118-140.

    Research output: Contribution to conferencePaper

  78. The Basic Integrity Theorem

    Jacob, J. L., 1 Jun 1991, p. 89--97.

    Research output: Contribution to conferencePaper

  79. 1992
  80. A Formal Approach for Security Evaluation

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  81. Ada for High Integrity Systems

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1992.

    Research output: Contribution to conferencePaper

  82. An Abstract View of Sorted Unification

    Frisch, A. M., Cohn, A. G. & Kapur, D., 1992, p. 178-192.

    Research output: Contribution to conferencePaper

  83. An Empirical Analysis of Terminological Representation Systems

    Heinsohn, J., Kudenko, D., Nebel, B. & Profitlich, H-J., 1992, p. 767-773.

    Research output: Contribution to conferencePaper

  84. An Overview of FRAPPS 2.0: A Framework for Resolution-based Automated Proof Procedure Systems

    Uribe, T. E., Frisch, A. M. & Mitchell, M. K., 1992, p. 721-725.

    Research output: Contribution to conferencePaper

  85. Dependable Software - The State of the Art

    McDermid, J. A., 1992, p. 25/6-25/14.

    Research output: Contribution to conferencePaper

  86. Formalizing and Validating Complex Security Requirements

    Morris, P., McDermid, J. A., Thuraisingham, B. M. & Landwehr, C. E., 1992, p. 113-124.

    Research output: Contribution to conferencePaper

  87. Incremental processing of Z specifications

    Vasconcelos, A. M. L. D., McDermid, J. A., Diaz, M. & Groz, R., 1992, p. 53-69.

    Research output: Contribution to conferencePaper

  88. Integrated Techniques for Software Safety Analysis

    Fenelon, P. & McDermid, J. A., 1992, p. 2/1 - 2/16.

    Research output: Contribution to conferencePaper

  89. MooZ Case Studies

    Meira, S. R. D. L. & Cavalcanti, A., 1992, p. 37-58.

    Research output: Contribution to conferencePaper

  90. Object Orientation in Z

    Stepney, S., Barden, R. & Cooper, D., 1992.

    Research output: Contribution to conferencePaper

  91. Safety Cases and Safety Arguments

    McDermid, J. A. & Anderson, T., 1992.

    Research output: Contribution to conferencePaper

  92. Secure Composition of Systems

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  93. Support for Using Z

    Barden, R., Stepney, S., Bowen, J. P. & Nicholls, J. E., 1992, p. 255-280.

    Research output: Contribution to conferencePaper

  94. Using Diagrams to Give a Formal Specification of Timing Constraints in Z

    Coombes, A., McDermid, J. A., Bowen, J. P. & Nicholls, J. E., 1992, p. 119-130.

    Research output: Contribution to conferencePaper

  95. 1993
  96. Achieving System Security by Testing

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  97. An Optical Range Sensor for Mobile Robot Guidance

    Pears, N. & Probert, P., 1993, p. 659-664.

    Research output: Contribution to conferencePaper

  98. An incremental garbage collector for embedded real-time systems

    Wallace, M. & Runciman, C., 1993, p. 277--288.

    Research output: Contribution to conferencePaper

  99. Applying Non-Interference to Composition of Systems: A more Practical Approach

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  100. Collapsed Tree Rewriting: Completeness, Confluence, and Modularity

    Plump, D., 1993, p. 97--112.

    Research output: Contribution to conferencePaper

  101. Constructing Secure Distributed Systems Using Components

    Shi, Q. & McDermid, J. A., 1993, p. 143-152.

    Research output: Contribution to conferencePaper

  102. Design versus Training of Neural Machines

    Somers, H. & Wood, A. M., 1993.

    Research output: Contribution to conferencePaper

  103. Designing Secure Systems of Good Quality

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  104. Developing Secure Systems in a Modular Way

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  105. Dynamic Sets and Their Application in VDM

    Liu, S. & McDermid, J. A., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  106. Dynamic Sets and their Application to VDM

    Liu, S., McDermid, J. A., E Deaton K M George, H. B. & Hedrick, G., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  107. Evaluating Design Concepts through a Qualitative Physics Model

    Coombes, A., McDermid, J. A., Moffett, J. D., Poucet, A. & Modarres, M., 1993.

    Research output: Contribution to conferencePaper

  108. Heap profiling of a lazy functional compiler

    Runciman, C., Wakeling, D., Launchbury, J. & Sansom, P., 1993, p. 203--214.

    Research output: Contribution to conferencePaper

  109. High Integrity Ada: Principles and Problems

    McDermid, J. A., 1993, p. 95-107. 13 p.

    Research output: Contribution to conferencePaper

Previous 1 2 3 4 5 6 7 8 ...13 Next