Search research publications and outputs

  1. 1982
  2. Knowledge Retrieval as Limited Inference

    Frisch, A. M. & Allen, J. F., 1982, p. 274-291.

    Research output: Contribution to conferencePaper

  3. Practical Parallel Processing: A User's View of sc \Clip4

    Wood, A. M., 1982, p. 4.1-4.7.

    Research output: Contribution to conferencePaper

  4. ARGOT: The Rochester Dialogue System

    Allen, J. F., Frisch, A. M. & Litman, D. J., 1 Aug 1982, p. 66-70.

    Research output: Contribution to conferencePaper

  5. 1983
  6. The Organisation of Parallel Processing Machines

    Wood, A. M., Becker, J. & Eisele, I., 1983, p. 132-144.

    Research output: Contribution to conferencePaper

  7. 1985
  8. Parallel Thinking

    Wood, A. M., 1985, p. 1-3.

    Research output: Contribution to conferencePaper

  9. Using Model Theory to Specify AI Programs

    Frisch, A. M., 1985, p. 148-154.

    Research output: Contribution to conferencePaper

  10. 1987
  11. Access Management in multi-administration networks

    Lord, S. P., Pope, N. H. & Stepney, S., 1987.

    Research output: Contribution to conferencePaper

  12. GRAIL: Graphical Representation of Activity, Interconnection and Loading

    Stepney, S. & Muntean, T., 1987.

    Research output: Contribution to conferencePaper

  13. IPSES: Requirements; the Meaning of Integration and some Consequences

    McDermid, J. A., 1987, p. 27-36.

    Research output: Contribution to conferencePaper

  14. Inference without Chaining

    Frisch, A. M., 1987, p. 515-519.

    Research output: Contribution to conferencePaper

  15. 1988
  16. Jungle Evaluation

    Habel, A., Kreowski, H-J. & Plump, D., 1988, p. 92-112.

    Research output: Contribution to conferencePaper

  17. Jungle Evaluation for Efficient Term Rewriting

    Hoffmann, B. & Plump, D., 1988, p. 191--203.

    Research output: Contribution to conferencePaper

  18. Life Cycle Models for Software Development

    McDermid, J. A., 1988, p. 43-51.

    Research output: Contribution to conferencePaper

  19. Low Level Synchronisation Problems in Digital Systems: Formal techniques in Real-Time Fault-Tolerant Systems

    McDermid, J. A., Morgan, G. & Joseph, M., 1988, p. 139-141.

    Research output: Contribution to conferencePaper

  20. Modal logics of higher-order probability

    Haddawy, P. & Frisch, A. M., 1988, p. 133-148.

    Research output: Contribution to conferencePaper

  21. Security Models and Enterprise Models

    Dobson, J. E. & McDermid, J. A., 1988, p. 1-39.

    Research output: Contribution to conferencePaper

  22. Understanding Multi-transputer Execution

    Stepney, S., 1988.

    Research output: Contribution to conferencePaper

  23. Using VDM with Rely and Guarantee-Conditions: Experiences from a Real Project

    Woodcock, J. & Dickinson, B., 1988, p. 434-458.

    Research output: Contribution to conferencePaper

  24. Security Specifications

    Jacob, J. L., 1 Apr 1988, p. 14--23.

    Research output: Contribution to conferencePaper

  25. A Security Framework

    Jacob, J. L., 1 Jun 1988, p. 98--111.

    Research output: Contribution to conferencePaper

  26. 1989
  27. A Framework for Expressing Models of Security Policy

    Dobson, J. E. & McDermid, J. A., 1989, p. 229-241.

    Research output: Contribution to conferencePaper

  28. A General Framework for Sorted Deduction: Fundamental Results on Hybrid Reasoning

    Frisch, A. M., 1989, p. 126-136.

    Research output: Contribution to conferencePaper

  29. A Hypertext System with Controlled Hype

    Benest, I. D., 1989, p. 52-63.

    Research output: Contribution to conferencePaper

  30. CHAINED BELL INEQUALITIES

    BRAUNSTEIN, SL., CAVES, CM. & KAFATOS, M., 1989, p. 27-36.

    Research output: Contribution to conferencePaper

  31. IPSEs: Concepts and Reality

    McDermid, J. A. & Salenieks, P., 1989, p. 135-164. 30 p.

    Research output: Contribution to conferencePaper

  32. Pictorial Representation of Parallel Programs

    Stepney, S., 1989.

    Research output: Contribution to conferencePaper

  33. Security Policies for Integrated Project Support Environments

    McDermid, J. A. & Hocking, E. S., 1989, p. 41-74.

    Research output: Contribution to conferencePaper

  34. Towards Assurance Measures for High Integrity Software

    McDermid, J. A., 1989, p. 3A/1-3A/9.

    Research output: Contribution to conferencePaper

  35. On The Derivation of Secure Components

    Jacob, J. L., Berson, T. & Cooper, D. M., 1 May 1989, p. 242-247.

    Research output: Contribution to conferencePaper

  36. 1990
  37. A Constraint Logic Approach to Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1990, p. 234-250.

    Research output: Contribution to conferencePaper

  38. A Simpler Semantics for Z

    Gardiner, P. H. B., Lupton, P. J. & Woodcock, J., 1990, p. 3-11.

    Research output: Contribution to conferencePaper

  39. A Tool for Defining the Architecture of Z Specifications

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1990, p. 77-92.

    Research output: Contribution to conferencePaper

  40. An Approach to Object-Oriented Specification Using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1990, p. 193-215.

    Research output: Contribution to conferencePaper

  41. Architecturally Independent Software: the Case for Abstraction

    Wood, A. M., 1990, p. 123-127.

    Research output: Contribution to conferencePaper

  42. Categorising Non-interference

    Jacob, J. L., 1990, p. 44--50.

    Research output: Contribution to conferencePaper

  43. Generalization with Taxonomic Information

    Frisch, A. M. & Jr., C. D. P., 1990, p. 755-761.

    Research output: Contribution to conferencePaper

  44. Methods for Developing Safe Software

    McDermid, J. A. & Daniels, B. K., 1990, p. 6/1-6/8.

    Research output: Contribution to conferencePaper

  45. Modular Object-oriented Z Specifications

    Meira, S. R. D. L. & Cavalcanti, A., 1990, p. 173-192.

    Research output: Contribution to conferencePaper

  46. Refinement of State-Based Concurrent Systems

    Woodcock, J. & Morgan, C., 1990, p. 340-351.

    Research output: Contribution to conferencePaper

  47. SAZ

    Polack, F., Hitchcock, P. & Brown, A. W., 1990, p. 384-384.

    Research output: Contribution to conferencePaper

  48. Skills and Technologies for the Development and Evaluation of Safety Critical Applications

    McDermid, J. A. & Daniels, B. K., 1990, p. 163-172.

    Research output: Contribution to conferencePaper

  49. Tools that support human-human communication in the automated office

    Benest, I. D. & Dukic, D., 1990, p. 853-859.

    Research output: Contribution to conferencePaper

  50. Towards an Object Oriented Development Environment for Secure Applciations

    Hocking, E. S., McDermid, J. A. & Eizenberg, G. G., 1990, p. 191-200.

    Research output: Contribution to conferencePaper

  51. Towards an Object Oriented Development Environment for Secure Applications

    Hocking, E. S. & McDermid, J. A., 1990, p. 191-200.

    Research output: Contribution to conferencePaper

  52. Z and the Refinement Calculus

    King, S., 1990, p. 164-188.

    Research output: Contribution to conferencePaper

  53. 1991
  54. A Formal Model of Security Dependency for Analysis and Testing of Secure Systems

    McDermid, J. A. & Shi, Q., 1991, p. 188-200.

    Research output: Contribution to conferencePaper

  55. A General Framework for Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1991, p. 196-207.

    Research output: Contribution to conferencePaper

  56. A Tool for Defining the Architecture of a Z Specification

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1991, p. 77-92.

    Research output: Contribution to conferencePaper

  57. A Tutorial on the Refinement Calculus

    Woodcock, J., 1991, p. 79-140.

    Research output: Contribution to conferencePaper

  58. An Approach to Object Oriented Specification using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1991, p. 193-215.

    Research output: Contribution to conferencePaper

  59. An Introduction to Refinement in Z

    Woodcock, J., 1991, p. 96-117.

    Research output: Contribution to conferencePaper

  60. CICS Project Report: Experiences and Results from the use of Z in IBM

    Houston, I. & King, S., 1991, p. 588-596.

    Research output: Contribution to conferencePaper

  61. Efficient Implementation of Massive Neural Networks

    Austin, J., Jackson, T., Wood, A. M., Delgado-Frias, J. G. & Moore, W. P., 1991, p. 387-398.

    Research output: Contribution to conferencePaper

  62. Generalizing Atoms in Constraint Logic

    Page Jr., C. D. & Frisch, A. M., 1991, p. 429-440.

    Research output: Contribution to conferencePaper

  63. Graph-Reducible Term Rewriting Systems

    Plump, D., 1991, p. 622--636.

    Research output: Contribution to conferencePaper

  64. Implementing Term Rewriting by Graph Reduction: Termination of Combined Systems

    Plump, D., 1991, p. 307--317.

    Research output: Contribution to conferencePaper

  65. Learning Constrained Atoms

    Page Jr., C. D. & Frisch, A. M., 1991, p. 427-431.

    Research output: Contribution to conferencePaper

  66. Object Oriented Specification and Refinement

    Whysall, P. J., McDermid, J. A., Morris, J. M. & Shaw, R. C., 1991, p. 150-184.

    Research output: Contribution to conferencePaper

  67. On Integration and Reuse in a Software Development Environment

    Brown, A. W., McDermid, J. A. & Long, F., 1991, p. 171-194.

    Research output: Contribution to conferencePaper

  68. Safety Arguments, Software and System Reliability

    McDermid, J. A., 1991, p. 43-51.

    Research output: Contribution to conferencePaper

  69. Security and Normative Rights

    Morris, P. & McDermid, J. A., 1991, p. 294-314.

    Research output: Contribution to conferencePaper

  70. Structured Analysis: A Draft Method for Writing Z Specifications

    Polack, F., Whiston, M. & Hitchcock, P., 1991, p. 287-328.

    Research output: Contribution to conferencePaper

  71. TARDIS: An Architectural Framework for Timely and Reliable Distributed Information Systems

    Burns, A., Lister, A. M., McDermid, J. A. & Bailes, P. A., 1991, p. 1-15.

    Research output: Contribution to conferencePaper

  72. TARDIS/Z: A Technique for Formal Specification of High Integrity and Real Time Systems

    Coombes, A. C., Burns, A., McDermid, J. A. & Wichmann, B. A., 1991, p. 1-6.

    Research output: Contribution to conferencePaper

  73. The Refinement Calculus

    Woodcock, J., 1991, p. 80-95.

    Research output: Contribution to conferencePaper

  74. The Structure of Permissions: A Normative Framework for Access Rights

    Morris, P., McDermid, J. A., Landwehr, C. E. & Jajodia, S., 1991, p. 77-97.

    Research output: Contribution to conferencePaper

  75. The Use of Z

    Barden, R., Stepney, S., Cooper, D. & Nicholls, J. E., 1991, p. 99-124.

    Research output: Contribution to conferencePaper

  76. The Varieties of Refinement

    Jacob, J. L., Morris, J. M. & Shaw, R. C., 1991, p. 441--455.

    Research output: Contribution to conferencePaper

  77. Two Refinement Case Studies

    Woodcock, J., 1991, p. 118-140.

    Research output: Contribution to conferencePaper

  78. The Basic Integrity Theorem

    Jacob, J. L., 1 Jun 1991, p. 89--97.

    Research output: Contribution to conferencePaper

  79. 1992
  80. A Formal Approach for Security Evaluation

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  81. Ada for High Integrity Systems

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1992.

    Research output: Contribution to conferencePaper

  82. An Abstract View of Sorted Unification

    Frisch, A. M., Cohn, A. G. & Kapur, D., 1992, p. 178-192.

    Research output: Contribution to conferencePaper

  83. An Empirical Analysis of Terminological Representation Systems

    Heinsohn, J., Kudenko, D., Nebel, B. & Profitlich, H-J., 1992, p. 767-773.

    Research output: Contribution to conferencePaper

  84. An Overview of FRAPPS 2.0: A Framework for Resolution-based Automated Proof Procedure Systems

    Uribe, T. E., Frisch, A. M. & Mitchell, M. K., 1992, p. 721-725.

    Research output: Contribution to conferencePaper

  85. Dependable Software - The State of the Art

    McDermid, J. A., 1992, p. 25/6-25/14.

    Research output: Contribution to conferencePaper

  86. Formalizing and Validating Complex Security Requirements

    Morris, P., McDermid, J. A., Thuraisingham, B. M. & Landwehr, C. E., 1992, p. 113-124.

    Research output: Contribution to conferencePaper

  87. Incremental processing of Z specifications

    Vasconcelos, A. M. L. D., McDermid, J. A., Diaz, M. & Groz, R., 1992, p. 53-69.

    Research output: Contribution to conferencePaper

  88. Integrated Techniques for Software Safety Analysis

    Fenelon, P. & McDermid, J. A., 1992, p. 2/1 - 2/16.

    Research output: Contribution to conferencePaper

  89. MooZ Case Studies

    Meira, S. R. D. L. & Cavalcanti, A., 1992, p. 37-58.

    Research output: Contribution to conferencePaper

  90. Object Orientation in Z

    Stepney, S., Barden, R. & Cooper, D., 1992.

    Research output: Contribution to conferencePaper

  91. Safety Cases and Safety Arguments

    McDermid, J. A. & Anderson, T., 1992.

    Research output: Contribution to conferencePaper

  92. Secure Composition of Systems

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  93. Support for Using Z

    Barden, R., Stepney, S., Bowen, J. P. & Nicholls, J. E., 1992, p. 255-280.

    Research output: Contribution to conferencePaper

  94. Using Diagrams to Give a Formal Specification of Timing Constraints in Z

    Coombes, A., McDermid, J. A., Bowen, J. P. & Nicholls, J. E., 1992, p. 119-130.

    Research output: Contribution to conferencePaper

  95. 1993
  96. Achieving System Security by Testing

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  97. An Optical Range Sensor for Mobile Robot Guidance

    Pears, N. & Probert, P., 1993, p. 659-664.

    Research output: Contribution to conferencePaper

  98. An incremental garbage collector for embedded real-time systems

    Wallace, M. & Runciman, C., 1993, p. 277--288.

    Research output: Contribution to conferencePaper

  99. Applying Non-Interference to Composition of Systems: A more Practical Approach

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  100. Collapsed Tree Rewriting: Completeness, Confluence, and Modularity

    Plump, D., 1993, p. 97--112.

    Research output: Contribution to conferencePaper

  101. Constructing Secure Distributed Systems Using Components

    Shi, Q. & McDermid, J. A., 1993, p. 143-152.

    Research output: Contribution to conferencePaper

  102. Design versus Training of Neural Machines

    Somers, H. & Wood, A. M., 1993.

    Research output: Contribution to conferencePaper

  103. Designing Secure Systems of Good Quality

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  104. Developing Secure Systems in a Modular Way

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  105. Dynamic Sets and Their Application in VDM

    Liu, S. & McDermid, J. A., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  106. Dynamic Sets and their Application to VDM

    Liu, S., McDermid, J. A., E Deaton K M George, H. B. & Hedrick, G., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  107. Evaluating Design Concepts through a Qualitative Physics Model

    Coombes, A., McDermid, J. A., Moffett, J. D., Poucet, A. & Modarres, M., 1993.

    Research output: Contribution to conferencePaper

  108. Heap profiling of a lazy functional compiler

    Runciman, C., Wakeling, D., Launchbury, J. & Sansom, P., 1993, p. 203--214.

    Research output: Contribution to conferencePaper

  109. High Integrity Ada: Principles and Problems

    McDermid, J. A., 1993, p. 95-107. 13 p.

    Research output: Contribution to conferencePaper

  110. Investigating and Formalising the Development of HIS Within PSEEs

    Gimenes, I. M. D. S., McDermid, J. A. & Schäfer, W., 1993, p. 90-94.

    Research output: Contribution to conferencePaper

  111. Investigation of Stack Machine Design for Efficient High Level Language Support

    Crispin-Bailey, C. & Sotudeh, R., 1993. 4 p.

    Research output: Contribution to conferencePaper

  112. LZW text compression in Haskell

    Runciman, C., Wakeling, D., Launchbury, J. & Sansom, P., 1993, p. 215--226.

    Research output: Contribution to conferencePaper

  113. PROM: Pragmatic Reusable Object Management

    Burd, E. L. & McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  114. Perfect hash functions made parallel - lazy functional programming on a distributed multiprocessor

    Checkland, I. G. & Runciman, C., 1993, p. 397-406.

    Research output: Contribution to conferencePaper

  115. Quantitative Assessment of Machine-Stack behaviour for better Computer Performance

    Crispin-Bailey, C. & Sotudeh, R., 1993, p. 1. 11 p.

    Research output: Contribution to conferenceAbstract

  116. Specification of Real-Time Systems: A View Oriented Approach

    Barroca, L. M. & McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  117. Specification of Real-Time Systems — A View Oriented Approach

    Barroca, L. M. & McDermid, J. A., 1993.

    Research output: Contribution to conferenceOther

  118. Structural Engineering and Software: Certainty, Uncertainty and Probability

    McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  119. The Formal Analysis of Ada Programs

    Hutcheon, A. D., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1993.

    Research output: Contribution to conferencePaper

  120. The SAZ Project: Integrating SSADM and Z

    Polack, F., Whiston, M. & Mander, K., 1993, p. 541-557.

    Research output: Contribution to conferencePaper

  121. Widening the Representation Bottleneck: a Functional Implementation of Relational Programming

    Cattrall, D. M. & Runciman, C., 1 Jun 1993, p. 191--200.

    Research output: Contribution to conferencePaper

  122. 1994
  123. A Development of Hazard Analysis to Aid Software Design

    McDermid, J. A. & Pumfrey, D. J., 1994.

    Research output: Contribution to conferencePaper

  124. A New File Access Paradigm for Extending a User's Information Base

    Fritz, J. M. & Benest, I. D., 1994, p. 51-60.

    Research output: Contribution to conferencePaper

  125. An Attributive Logic of Set Descriptions and Set Operations

    Manandhar, S., 1994, p. 255-262.

    Research output: Contribution to conferencePaper

  126. Causality as a Means for the Expression of Requirements for Safety Critical Systems

    Coombes, A. C. & McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  127. Engineering & Assessing Safety-Critical Systems

    McDermid, J. A. & Moffett, J. D., 1994.

    Research output: Contribution to conferencePaper

  128. HLL Enhancement for Stack Based Processors

    Crispin-Bailey, C. & Sotudeh, R., 1994. 4 p.

    Research output: Contribution to conferencePaper

  129. High Integrity Software Development: Process and Tool Issues

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1994.

    Research output: Contribution to conferencePaper

  130. Literate Formal Development of Ada from Z for Safety Critical Applications

    Jordan, D. T., Locke, C. J., McDermid, J. A., Parker, C., Sharpe, B. A. P. & Toyn, I., 1994.

    Research output: Contribution to conferencePaper

  131. Policies for Safety Critical Systems: the Challenge of Formalisation

    Moffett, J. D. & McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  132. Priority Union and Generalization in Discourse Grammars

    Grover, C., Brew, C., Manandhar, S. & Moens, M., 1994, p. 17-24.

    Research output: Contribution to conferencePaper

  133. Profiling parallel functional computations (without parallel machines)

    Runciman, C., Wakeling, D., O'Donnell, J. T. & Hammond, K., 1994, p. 236--251.

    Research output: Contribution to conferencePaper

  134. Re-use of Engine Control Technology

    Hill, J. V., McDermid, J. A., Rimmer, R. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  135. Requirements Analysis: Orthodoxy, Fundamentalism and Heresy

    McDermid, J. A., Bickerton, M. & Jarotcka, M., 1994.

    Research output: Contribution to conferenceOther

  136. Requirements and Traceability

    Coombes, A. C., McDermid, J. A. & Morris, P., 1994.

    Research output: Contribution to conferencePaper

  137. Safety Critical Systems in Aerospace

    McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  138. Software Quality Assurance Using the SAZ Method

    Polack, F. & Mander, K., 1994, p. 230-249.

    Research output: Contribution to conferencePaper

  139. Teaching Reuse in a Supportive Life-Cycle

    Burd, E. L., McDermid, J. A. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  140. Teaching Reuse through a supportive life-cycle

    Burd, E. L., McDermid, J. A., Whittle, B. R., O'Callaghan, A. & Leigh, M., 1994.

    Research output: Contribution to conferencePaper

  141. The Development of Reusable Engine Control Technology for Application in Future Engines

    Hill, J. V., McDermid, J. A., Rimmer, R. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  142. The Formal Specification in Z of Defence Standard 00-56

    Woodcock, J., Gardiner, P. H. B. & Hulance, J. R., 1994, p. 9-28.

    Research output: Contribution to conferencePaper

  143. The effects of local variable optimisation in A C-based stack processor environment

    Crispin-Bailey, C., Sotudeh, R. & Ould-Khaoua, M., 1994. 6 p.

    Research output: Contribution to conferencePaper

  144. Tool Support for High Integrity Ada Software

    Hutcheon, A. D., Jordan, D. T., McDermid, J. A., Pierce, R. H., Wand, I. C., Jepson, B. J. & Toussaint, M., 1994, p. 63-75.

    Research output: Contribution to conferencePaper

  145. Towards a Z Method: Axiomatic Specification in Z

    Hall, J. G. & McDermid, J. A., 1994, p. 213-229.

    Research output: Contribution to conferencePaper

  146. Training Blind People in the Use of Graphical User Interfaces

    Weber, G., Petrie, H., Kochanek, D. & Morley, S., 1994, p. 25-31.

    Research output: Contribution to conferencePaper

  147. 1995
  148. A Distributed sc \Linda-like Kernel for \PVM

    Rowstron, A., Douglas, A. & Wood, A., 1995, p. 107-112.

    Research output: Contribution to conferencePaper

  149. A Framework for Requirements Analysis using Automated Reasoning

    Duffy, D. A., MacNish, C., McDermid, J. A., Morris, P., Iivari, J., Lyytinen, K. & Rossi, M., 1995, p. 68-81.

    Research output: Contribution to conferencePaper

  150. A Neural Architecture for Fast Rule Matching

    Austin, J., Kennedy, J. & Lees, K., 1995, p. 255-260.

    Research output: Contribution to conferencePaper

  151. Accessible Formal Method Support for PLC Software Development

    McDermid, J. A., Pierce, R. H. & Rabe, G., 1995, p. 113-129.

    Research output: Contribution to conferencePaper

  152. An Evaluation of Open Hypertext Features for Improved File Access

    Fritz, J. M. & Benest, I. D., 1995, p. 339-354.

    Research output: Contribution to conferencePaper

  153. ArCHATECH — An Architectural Construction and Analysis Technique for Real-Time Systems

    Vickers, A. J., McDermid, J. A. & Garlan, D., 1995.

    Research output: Contribution to conferencePaper

  154. Audio annotation of electronic texts

    Benest, I. D., 1995, p. 390-393.

    Research output: Contribution to conferencePaper

  155. Binding-time improvement and fold-unfold transformations

    Runciman, C., 1995, p. 218-230.

    Research output: Contribution to conferencePaper

  156. Building Theories into Instantiation

    Frisch, A. M. & Page Jr., C. D., 1995, p. 1210-1216.

    Research output: Contribution to conferencePaper

  157. Dependability Terminology: Similarities and Differences

    Prasad, D., McDermid, J. A. & Wand, I. C., 1995.

    Research output: Contribution to conferencePaper

  158. Deterministic Consistency Checking of LP Constraints

    Manandhar, S., 1995, p. 165-172.

    Research output: Contribution to conferencePaper

  159. Experience with the application of HAZOP to computer-based systems

    Fenelon, P., McDermid, J. A., Nicholson, M. & Pumfrey, D. J., 1995.

    Research output: Contribution to conferencePaper

  160. Functional counterparts of some logic programming techniques

    Matsushita, T. & Runciman, C., 1995, p. 90--103.

    Research output: Contribution to conferencePaper

  161. Geometry of quantum states

    BRAUNSTEIN, SL., CAVES, CM., Belavkin, VP., Hirota, O. & Hudson, RL., 1995, p. 21-30.

    Research output: Contribution to conferencePaper

  162. Implementing Mathematical Morphology in \Isetl-sc \Linda

    Rowstron, A. & Wood, A., 1995, p. 847--851.

    Research output: Contribution to conferencePaper

  163. Integrating requirements analysis and safety analysis

    Atlee, J. M. & McDermid, J. A., 1995, p. 158-159.

    Research output: Contribution to conferencePaper

  164. Management of Dependable Computing: Policies and Argumentation

    Moffett, J. D., McDermid, J. A. & Wilson, S. P., 1995.

    Research output: Contribution to conferencePaper

  165. Model Conjectures for Z Specifications

    Hall, J. G., McDermid, J. A. & Toyn, I., 1995.

    Research output: Contribution to conferencePaper

  166. No more spineless safety cases: A structured method and comprehensive tool support for the production of safety cases.

    Fenelon, P., Kirkham, P., McDermid, J. A. & Wilson, S. P., 1995.

    Research output: Contribution to conferencePaper

  167. On Termination of Graph Rewriting

    Plump, D., 1995, p. 88--100.

    Research output: Contribution to conferencePaper

  168. Requirements analysis and safety: a case study (using GRASP)

    Coombes, A. C., McDermid, J. A., Moffett, J. D. & Rabe, G., 1995, p. 353-371.

    Research output: Contribution to conferencePaper

  169. Safety cases for software application reuse

    Fenelon, P., Kelly, T. P., McDermid., J. A. & Rabe, G., 1995, p. 419-436.

    Research output: Contribution to conferencePaper

  170. Segmentation and Estimation of the Optical Flow

    Bors, A. G. & Pitas, I., 1995, p. 680-685.

    Research output: Contribution to conferencePaper

  171. Tactile-based direct manipulation in GUIs for blind users

    Petrie, H., Morley, S. & Weber, G., 1995, p. 428-429.

    Research output: Contribution to conferencePaper

  172. Techniques for simplifying the visualisation of graph reduction

    Foubister, S. P. & Runciman, C., 1995, p. 66--77.

    Research output: Contribution to conferencePaper

  173. Testing as Abstraction

    Stepney, S., 1995, p. 137-151.

    Research output: Contribution to conferencePaper

  174. The Effect of Intra-Block Scheduling on Stack Processor Behaviour

    Crispin-Bailey, C. & Sotudeh, R., 1995. 6 p.

    Research output: Contribution to conferencePaper

  175. Type-checked message passing between functional processes

    Wallace, M. & Runciman, C., 1995, p. 245--254.

    Research output: Contribution to conferencePaper

  176. Unification, Rewriting, and Narrowing on Term Graphs

    Habel, A. & Plump, D., 1995.

    Research output: Contribution to conferencePaper

  177. Lambdas in the Liftshaft: functional programming and an embedded architecture

    Wallace, M. & Runciman, C., 1 Jun 1995, p. 249--258.

    Research output: Contribution to conferencePaper

  178. Trade-offs For Memory Bandwidth Reduction in Stack Processor Design

    Crispin-Bailey, C. & sotudeh, R., 5 Jul 1995.

    Research output: Contribution to conferenceAbstract

  179. Gadgets: lazy functional components for graphical user interfaces

    Noble, R. J., Runciman, C., Hermenegildo, E. M. & Swierstra, S. D., 1 Sep 1995, p. 321--340.

    Research output: Contribution to conferencePaper

  180. 1996
  181. A Case Study using SAM - Safety Analysis of PES

    Liu, S., McDermid, J. A., Kang, K. C. & Cheung, S-C., 1996, p. 217-.

    Research output: Contribution to conferencePaper

  182. Application of Model-Based Software Failure Taxonomy to the Analysis of System Failure Events

    Jackson, T. O., McDermid, J. A., Wand, I. C., Wilikens, M. & Papazoglu, I. A., 1996.

    Research output: Contribution to conferencePaper

  183. AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C., Wood, A., Bougé, L., Fraigniaud, P., Mignotte, A. & Robert, Y., 1996, p. 686-693.

    Research output: Contribution to conferencePaper

  184. Development of Dialogue Systems for a Mobility Aid for Blind People: Initial Design and Usability Testing

    Strothotte, T., Fritz, S., Michel, R., Raab, A., Petrie, H., Johnson, V., Reichert, L. & Schalt, A., 1996, p. 139-144.

    Research output: Contribution to conferencePaper

  185. Document Feature Recognition using a Mesh of Associative Memories

    O'Keefe, S. E. M. & Austin, J., 1996, p. 37.1-37.10.

    Research output: Contribution to conferencePaper

  186. Generating fault trees from fmea

    Wilson, M. S., Timmis, J., Price, C. J. & Cain, C., 1996.

    Research output: Contribution to conferenceOther

  187. Geometry of quantum inference

    Braunstein, SL., Mann, A. & Revzen, M., 1996, p. 218-225.

    Research output: Contribution to conferencePaper

  188. Managing Analytical Complexity of Safety Critical Systems using Viewpoints

    Wilson, S. P., McDermid, J. A. & Vickers, A. J., 1996.

    Research output: Contribution to conferencePaper

  189. Re-use through standardisation: towards industry-standard engine control software

    Lam, W., McDermid, J. A. & Vickers, A. J., 1996.

    Research output: Contribution to conferencePaper

  190. Registering Incomplete Radar Images using the EM Algorithm

    Moss, S. & Hancock, E. R., 1996.

    Research output: Contribution to conferencePaper

  191. Representing Sequences in Description Logics Using Suffix Trees

    Kudenko, D. & Hirsh, H., 1996, p. 141-145.

    Research output: Contribution to conferencePaper

  192. Solving the multiple-rd problem

    Rowstron, A. & Wood, A., 1996, p. 357--367.

    Research output: Contribution to conferencePaper

  193. Technology Transfer by Case Study: an Experience Report

    Whittle, B. R., Vickers, A. J. & McDermid, J. A., 1996, p. 211-218.

    Research output: Contribution to conferencePaper

  194. Two-pass heap profiling: a matter of life and death

    Runciman, C. & Röjemo, N., 1996, p. 222--232.

    Research output: Contribution to conferencePaper

  195. VLSI Design Techniques for Teaching and Research

    Crispin-Bailey, C. & Sotudeh, R., 1996, p. 1-8. 8 p.

    Research output: Contribution to conferencePaper

  196. Towards Inductive Constraint Logic Programming

    Anthony, S., Frisch, A. M. & Gent, I., 1 Apr 1996, p. 3-4.

    Research output: Contribution to conferencePaper

  197. Lag, drag, void and use: heap profiling and space-efficient compilation revisited

    Röjemo, N. & Runciman, C., 1 May 1996, p. 34-41.

    Research output: Contribution to conferencePaper

  198. Heap profiling for space efficiency

    Runciman, C., Röjemo, N., Launchbury, J., Meijer, E. & Sheard, T., 1 Aug 1996, p. 159--183.

    Research output: Contribution to conferencePaper

  199. An Efficient Distributed Tuple Space Implementation for Networks of Workstations

    Rowstron, A. & Wood, A., 1 Oct 1996, p. 510--514.

    Research output: Contribution to conferencePaper

  200. sc AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C. & Wood, A., 1 Oct 1996, p. 686--694.

    Research output: Contribution to conferencePaper

  201. Analyzing APEX applications

    Audsley, N. & Wellings, A., 1 Dec 1996, p. 39-44. 6 p.

    Research output: Contribution to conferencePaper

  202. 1997
  203. A Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 473-494.

    Research output: Contribution to conferencePaper

  204. A Summary of Domain Analysis Experience by Way of Heuristics

    Lam, W. & McDermid, J. A., 1997, p. 54-64.

    Research output: Contribution to conferencePaper

  205. A Systematic Approach to Software Integrity Levels

    Lindsay, P. A. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  206. Case Studies in Using a Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 395-408. 13 p.

    Research output: Contribution to conferencePaper

  207. Certification of Neural Networks

    Jackson, T. O. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  208. Complete and partial redex trails of functional computations

    Sparud, J. & Runciman, C., 1997, p. 160--177.

    Research output: Contribution to conferencePaper

  209. Computer Based Support for Standards and Processes in Safety Critical Systems

    Wilson, S. P., McDermid, J. A., Kirkham, P. M., Pygott, C. H. & Tombs, D. J., 1997.

    Research output: Contribution to conferencePaper

  210. Generating Numerical Literals During Refinement

    Anthony, S., Frisch, A. M., Lavrac, N. & Dzeroski, S., 1997, p. 61-76. 16 p.

    Research output: Contribution to conferencePaper

  211. Guidelines for the design of HCI for people with disabilities

    Abascal, J., Noirhomme-Fraiture, M., Petrie, H. & Nes, F. L. V., 1997, p. 695-696.

    Research output: Contribution to conferencePaper

  212. Initial Design and Evaluation of an Interface to Hypermedia Systems for Blind Users

    Petrie, H., Morley, S., McNally, P., O'Neill, A-M. & Majoe, D., 1997, p. 48-56.

    Research output: Contribution to conferencePaper

  213. Mosaicing of Flattened Images from Straight Homogeneous Generalized Cylinders

    Bors, A. G., Puech, W., Pitas, I. & Chassery, J-M., 1997, p. 122-129.

    Research output: Contribution to conferencePaper

  214. Needle Map Recovery using Robust Regularizers

    Worthington, P. L. & Hancock, E. R., 1997.

    Research output: Contribution to conferencePaper

  215. Representing Sequences in Description Logics

    Hirsh, H. & Kudenko, D., 1997, p. 384-389.

    Research output: Contribution to conferencePaper

  216. Research Challenges in Concurrent Development Development Environments

    Powell, A. L., Mander, K. C. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  217. Specifying Security in CSCW Systems

    Foley, S. N. & Jacob, J. L., 1997, p. 136--145.

    Research output: Contribution to conferencePaper

  218. Structurally Gated Pairwise Geometric Histograms for Shape Indexing

    Huet, B. & Hancock, E. R., 1997.

    Research output: Contribution to conferencePaper

  219. System Modelling for Concurrent Safety Analysis

    Murdoch, J., McDermid, J. A., Wilkinson, P. & Reid, S., 1997.

    Research output: Contribution to conferencePaper

  220. Ten Steps Towards Systematic Requirements Reuse

    Lam, W., McDermid, J. A., Vickers, A. & Mylopoulos, J., 1997, p. 6-15.

    Research output: Contribution to conferencePaper

  221. The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data

    Austin, J., Giacinto, G., Kanellopoulos, I., Lees, K., Roli, F., Vernazza, G. & Wilkinson, G., 1997, p. 765-772.

    Research output: Contribution to conferencePaper

  222. Tracing lazy functional computations using redex trails

    Sparud, J. & Runciman, C., 1997, p. 291--308.

    Research output: Contribution to conferencePaper

  223. Transferring and Retraining Learned Information Filters

    Cohen, W. W. & Kudenko, D., 1997, p. 583-590.

    Research output: Contribution to conferencePaper

  224. User-centred design in the development of a navigational aid for blind travellers

    Petrie, H., Johnson, V., Strothotte, T., Michel, R., Raab, A. & Reichert, L., 1997, p. 220-227.

    Research output: Contribution to conferencePaper

  225. Using PVS to Prove a Z Refinement: A Case Study

    Stringer-Calvert, D. W. J., Stepney, S. & Wand, I., 1997, p. 573-588.

    Research output: Contribution to conferencePaper

  226. BONITA: A Set of Tuple Space Primitives for Distributed Coordination

    Rowstron, A. & Wood, A., 1 Jan 1997.

    Research output: Contribution to conferencePaper

  227. Garbage Collection in Open Distributed Tuple Space Systems

    Menezes, R. & Wood, A., 1 May 1997, p. 525--534.

    Research output: Contribution to conferencePaper

  228. Heap compression and binary I/O in Haskell

    Wallace, M. & Runciman, C., 1 Jun 1997.

    Research output: Contribution to conferencePaper

  229. Parallel Case Base Retrieval: An Implementation on Distributed sc Linda

    Campbell, D. K. G., Osborne, H. R., Wood, A. M. & Bridge, D. G., 1 Oct 1997, p. 525--530.

    Research output: Contribution to conferencePaper

  230. 1998
  231. 3-D Planar Orientation from Texture: Estimating Vanishing Point from Local Spectral Analysis

    Ribeiro, E. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  232. A Binary Correlation Matrix Memory k-NN Classifier with Hardware Implementation

    Zhou, P., Austin, J. & Kennedy, J., 1998.

    Research output: Contribution to conferencePaper

  233. A Cellular Neural Associative Array for Symbolic Vision

    Orovas, C. & Austin, J., 1998, p. 372-386.

    Research output: Contribution to conferencePaper

  234. A Harmonised Model for Safety Assessment and Certification of Safety-Critical Systems

    Papadopoulos, Y. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  235. A High Performance k-NN Classifier Using a Binary Correlation Matrix Memory

    Zhou, P., Austin, J. & Kennedy, J., 1998, p. 713-722.

    Research output: Contribution to conferencePaper

  236. A Hybrid Approach t Word Segmentation

    Kazakov, D. & Manandhar, S., 1998, p. 125-134.

    Research output: Contribution to conferencePaper

  237. An improved three-step search block-matching algorithm for low bit-rate video coding applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., 1998, p. 178-181. 4 p.

    Research output: Contribution to conferencePaper

  238. Applying HAZOP to Functional System Models

    Murdoch, J., McDermid, J. A., Wilkinson, P., Astley, K. & Reid, S., 1998, p. 127-136.

    Research output: Contribution to conferencePaper

  239. Auburn: a kit for benchmarking functional data structures

    Moss, G. E., Runciman, C., Clack, C., Hammond, K. & Davie, T., 1998, p. 141--159.

    Research output: Contribution to conferencePaper

  240. Auditory Navigation in Hyperspace: Design and Evaluation of a Non-Visual Hypermedia System for Blind Users

    Morley, S., Petrie, H., O'Neill, A-M. & McNally, P., 1998, p. 100-107.

    Research output: Contribution to conferencePaper

  241. Augmenting an artificial immune network

    Neal, M., Hunt, J. & Timmis, J., 1998, p. 3821-3826.

    Research output: Contribution to conferenceOther

  242. Automated Program Flaw Finding Using Simulated Annealing

    Tracey, N., Clark, J. A. & Mander, K., 1998, p. 73-81.

    Research output: Contribution to conferencePaper

  243. COTS in Safety-Related Systems: issues and an illustration

    May, R., McDermid, J. A. & Johnston, I. H. A., 1998.

    Research output: Contribution to conferencePaper

  244. Cellular Associative Symbolic Processing for Pattern Recognition

    Orovas, C. & Austin, J., 1998, p. 269-279.

    Research output: Contribution to conferencePaper

  245. Comparing Extended Z with a Heterogeneous Notation for Reasoning about Time and Space

    Paige, R. F., 1998, p. 214-232.

    Research output: Contribution to conferencePaper

  246. Computers and Assistive Technology: ICCHP'98, IFIP World Computer Congress 1998

    Edwards, A. D. N., Arató, A. & Zagler, W. L., 1998.

    Research output: Contribution to conferencePaper

  247. Corner Detection Via Topographic Analysis of Vector Potential

    Luo, B., Cross, A. D. J. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  248. Defining an Acceptable Level of Redundancy

    Dawkins, S. K. & McDermid, J. A., 1998, p. 30-39.

    Research output: Contribution to conferencePaper

  249. Estimating 3D Facial Pose using the EM Algorithm

    Choi, K. N., Carcassoni, M. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  250. Extension of Hazard and Safety Analysis Techniques to Address Problems of Hierarchical Scale

    Mauri, G., McDermid, J. A. & Papadopolous, Y., 1998, p. 4.1-4.6.

    Research output: Contribution to conferencePaper

  251. Feature Generation for Sequence Categorization

    Kudenko, D. & Hirsh, H., 1998, p. 733-738.

    Research output: Contribution to conferencePaper

  252. From Z to BON/Eiffel

    Paige, R. F. & Ostroff, J. S., 1998, p. 209-212.

    Research output: Contribution to conferencePaper

  253. Garbage Collection in Linda using Tuple Monitoring and Process Registration

    Menezes, R. & Wood, A., 1998, p. 490--495.

    Research output: Contribution to conferencePaper

  254. Haptic Virtual Reality for Blind Computer Users

    Colwell, C., Petrie, H., Kornbrot, D., Hardwick, A. & Furner, S., 1998, p. 92-99.

    Research output: Contribution to conferencePaper

  255. Increased Extent of Characteristic Views using Shape-from-Shading for Object Recognition

    Worthington, P. L., Huet, B. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  256. Incremental Development of a High Integrity Compiler: Experience from an Industrial Development

    Stepney, S., 1998, p. 142-149.

    Research output: Contribution to conferencePaper

  257. LIU H, SOTUDEH R, BAILEY C. On improving the Quality of Service for multimedia transmission in ATM networks

    Crispin-Bailey, C., Hong, L. & Sotudeh, R., 1998, p. 412-415. 4 p.

    Research output: Contribution to conferencePaper

  258. Learning Multilingual Morphology with CLOG

    Manandhar, S., Dzeroski, S. & Erjavec, T., 1998, p. 135-144.

    Research output: Contribution to conferencePaper

  259. Modelling Engineering Design Processes with Role Activity Diagrams

    Murdoch, J., McDermid, J. A., Astley, K. & Wilkinson, P., 1998.

    Research output: Contribution to conferencePaper

  260. More Powerful Z Data Refinement: Pushing the State of the Art in Industrial Refinement

    Stepney, S., Cooper, D. & Woodcock, J., 1998, p. 284-307.

    Research output: Contribution to conferencePaper

  261. On Defining a "HURT" Metric to Measure Dissatisfaction with Products

    Prasad, D. K., Atkins, M. C., McDermid, J. A. & Wand, I. C., 1998.

    Research output: Contribution to conferencePaper

  262. Safety Analysis of Hardware/Software Interactions in Complex Systems

    McDermid, J. A. & Pumfrey, D. J., 1998, p. 232-241.

    Research output: Contribution to conferencePaper

  263. Safety Case Patterns - Reusing Successful Arguments

    Kelly, T. P. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  264. Incorporating Input/Output Operations in sc Linda

    Menezes, R. & Wood, A., 1 Jan 1998.

    Research output: Contribution to conferencePaper

  265. sc Linda for Case Base Retrieval: a Case for Extending the Functionality of sc Linda

    Campbell, D. K. G., Osborne, H. R., Wood, A. M. & Bridge, D. G., 1 Jan 1998.

    Research output: Contribution to conferencePaper

  266. Generic Operations for Concurrent Knowledge Manipulation Architectures

    Wood, A. M. & Campbell, D. K. G., 1 Feb 1998.

    Research output: Contribution to conferencePaper

  267. Motion-Compensated Error Concealment for MPGE-2 Coded Video transported over ATM Networks

    Crispin-Bailey, C., enmin, S. & sotudeh, R., Jun 1998, p. 104/1-104/8. 8 p.

    Research output: Contribution to conferencePaper

  268. Improving Multimedia Server Efficiency in ATM Networks

    Crispin-Bailey, C., Maierhofer, M. & sotudeh, R., Jul 1998.

    Research output: Contribution to conferencePaper

  269. Improved local buffering schemes for ATM-based multimedia servers

    Crispin-Bailey, C., Maierhofer, M. & Sotudeh, R., Sep 1998, p. 302-306. 5 p.

    Research output: Contribution to conferencePaper

  270. An Efficient VLSI Architecture for an Enhanced TSS Algorithm for Video Coding Applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., Oct 1998.

    Research output: Contribution to conferencePaper

  271. The bits between the lambdas: binary data in a lazy functional language

    Wallace, M. & Runciman, C., 1 Oct 1998, p. 107--117.

    Research output: Contribution to conferencePaper

  272. 1999
  273. A Comparison of the Business Object Notation and the Unified Modelling Language

    Paige, R. F., Ostroff, J. S., France, R. B. & Rumpe, B., 1999, p. 67-82.

    Research output: Contribution to conferencePaper

  274. A Coordination Model for Agents Based on Secure Spaces

    Bryce, C., Oriol, M. & Vitek, J., 1999, p. 4--20.

    Research output: Contribution to conferencePaper

  275. A New Method for Safety Analysis and the Mechanical Synthesis of Fault Trees in Complex Systems

    Papadopoulos, Y. & McDermid, J. A., 1999, p. 1-9.

    Research output: Contribution to conferencePaper

  276. A Reflectance Model for Radar Shape From Shading

    Wilson, R. C. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  277. A Safety Change Oriented Process for Safety-Critical Systems

    Tracey, N., Stephenson, A., Clark, J. A. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  278. A Systematic Approach to Safety Case Maintenance

    Kelly, T. P. & McDermid, J. A., 1999, p. 13-26.

    Research output: Contribution to conferencePaper

  279. A Weakest Precondition Semantics for an Object-Oriented Language of Refinement

    Cavalcanti, A. & Naumann, D. A., 1999, p. 1439-1459.

    Research output: Contribution to conferencePaper

  280. Accumulating Spectral Evidence for Perspective Views of Texture Planes

    Ribeiro, E. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  281. Achievements and Prospects of Learning Word Morphology with Inductive Logic Programming

    Kazakov, D., 1999, p. 89-109.

    Research output: Contribution to conferencePaper

  282. An Assessment of Shared Local Memory Buffering for Enhanced Multimedia Server Scalability

    Maierhofer, M. & Crispin-Bailey, C., 1999, p. 131-135.

    Research output: Contribution to conferencePaper

  283. An Investigation of Arbitration in Servers for Distributed Multimedia Applications

    Maierhofer, M., Crispin-Bailey, C., Batatia, H. & Sotudeh, R., 1999, p. 1564-1570.

    Research output: Contribution to conferencePaper

  284. An interactive approach to profiling parallel functional programs

    Charles, N., Runciman, C., Hammond, K., Davie, T. & Clack, C., 1999, p. 20--37.

    Research output: Contribution to conferencePaper

  285. Assessing Test Set Adequacy for Object-Oriented Programs using Class Mutation

    Kim, S., Clark, J. A. & McDermid, J. A., 1999, p. 72-83.

    Research output: Contribution to conferencePaper

  286. Automated generalisation of function definitions

    Bakewell, A. & Runciman, C., 1999, p. 225--240.

    Research output: Contribution to conferencePaper

  287. Bunches for Object-Oriented, Concurrent, and Real-Time Specification

    Paige, R. F. & Hehner, E. C. R., 1999, p. 530-550. 20 p.

    Research output: Contribution to conferencePaper

  288. Combining LAPIS and WordNet for Learning of LR Parsers with Optimal Semantic Constraints

    Kazakov, D., Dzeroski, S. & Flach, P. A., 1999, p. 140-151.

    Research output: Contribution to conferencePaper

  289. Coordination with Attributes

    Wood, A. M., Ciancarini, P. & Wolf, A. L., 1999, p. 21--36.

    Research output: Contribution to conferencePaper

  290. Cyber Rally: an experience of democratic use of the internet

    Ramalho, G., Barros, F. A., Cavalcante, S., Cavalcanti, A., Lima, M., Meira, S. R. D. L., Moura, H. & Vasconcelos, A., 1999, p. 402-406.

    Research output: Contribution to conferencePaper

  291. Dependability Evaluation using a Multi-Crieria Decision Analysis Procedure

    Prasad, D. K. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  292. Developing BON as an Industrial-Strength Formal Method

    Paige, R. F. & Ostroff, J. S., 1999, p. 834-853.

    Research output: Contribution to conferencePaper

  293. Distributed Garbage Collection of Tuple Spaces in Open Linda Coordination Systems

    Menezes, R. & Wood, A. M., 1999.

    Research output: Contribution to conferencePaper

  294. Extending and Automating Classical Safety Analyses to Rationalise and Simplify Complex Safety Assessments

    Papadopoulos, Y., McDermid, J. A. & Puschner, P., 1999, p. 15-20.

    Research output: Contribution to conferencePaper

  295. Facial Pose using Shape-from-Shading

    Choi, K. N., Worthington, P. L. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  296. Feature-Based Learners for Description Logics

    Kudenko, D. & Hirsh, H., 1999.

    Research output: Contribution to conferencePaper

  297. Hierarchically Performed Hazard Origin and Propagation Studies

    Papadopoulos, Y. & McDermid, J. A., 1999, p. 139-152.

    Research output: Contribution to conferencePaper

  298. Hierarchically Performed Hazard Origin and Propagation Studies

    Papadopoulos, Y., McDermid, J. A., Felici, M., Kanoun, K. & Pasquini, A., 1999, p. 139-152.

    Research output: Contribution to conferencePaper

  299. Issues in the Conduct of PSSA

    Dawkins, S. K., Kelly, T. P., McDermid, J. A., Murdoch, J. & Pumfrey, D. J., 1999.

    Research output: Contribution to conferencePaper

  300. Learning Word Segmentation Rules for Tag Prediction

    Kazakov, D., Manandhar, S. & Erjavec, T., 1999, p. 152-161.

    Research output: Contribution to conferencePaper

  301. Matching Point-sets using Procrustes Alignment and the EM Algorithm

    Luo, B. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  302. Modelling Complex Design Processes with Role Activity Diagrams

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 1999.

    Research output: Contribution to conferencePaper

  303. On the Refinement and Simulation of Data Types and Processes

    Bolton, C., Davies, J., Woodcock, J. & Araki, K., 1999, p. 273-292.

    Research output: Contribution to conferencePaper

  304. Performance modelling

    Charles, N., Runciman, C., Hammond, K. & Michaelson, G., 1999, p. 233--246.

    Research output: Contribution to conferencePaper

  305. Requirements for the Use of COTS Operating Systems in Safety Related Air Traffic Services

    Pierce, R., Wilson, S. P., McDermid, J. A., Beus-Dukic, L. & Eaton, A., 1999.

    Research output: Contribution to conferencePaper

  306. Specification and Refinement using a Heterogeneous Notation for Concurrency and Communication

    Paige, R. F., 1999, p. 353-372.

    Research output: Contribution to conferencePaper

  307. Systems Development Using Z Generics

    Polack, F. & Stepney, S., 1999, p. 1048-1067.

    Research output: Contribution to conferencePaper

  308. Tailoring Generic Systems Engineering Processes: An Agent-Oriented Method

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 1999, p. 1011-1020.

    Research output: Contribution to conferencePaper

  309. The Rigorous Generation of Java Mutation Operators using HAZOP

    Kim, S-W., Clark, J. A. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  310. The Value of Verification: Positive Experience of Industrial Proof

    King, S., Hammond, J., Chapman, R. & Pryor, A., 1999, p. 1527-1545.

    Research output: Contribution to conferencePaper

  311. Two Accounts of Scope Availability and Semantic Underspecification

    Willis, A. & Manandhar, S., 1999.

    Research output: Contribution to conferencePaper

  312. Unsupervised Lexical Learning with Categorical Grammars Using the LLL Corpus

    Watkinson, S. & Manandhar, S., 1999, p. 218-236.

    Research output: Contribution to conferencePaper

  313. When to Trust Mobile Objects: Access Control in the Jini(tm) Software System

    Crichton, C., Davies, J. & Woodcock, J., 1999, p. 116-125.

    Research output: Contribution to conferencePaper

  314. Packetization and cell-loss concealment for MPEG-2 video transport over ATM networks

    Crispin-Bailey, C., Xu, D. & sotudeh, R., Jan 1999.

    Research output: Contribution to conferencePaper

  315. Automated benchmarking of functional data structures

    Moss, G. E., Runciman, C. & Gupta, G., 1 Jan 1999, p. 1--15.

    Research output: Contribution to conferencePaper

  316. Learning Electronic Systems Design with a Project Based Course on the Web

    Donzellini, G., Ponta, D., Crispin-Bailey, C., Pears, N. E. & Xu, D., Jun 1999, p. 114-121. 8 p.

    Research output: Contribution to conferencePaper

  317. Haskell and XML: Generic Combinators or Type-Based Translation?

    Wallace, M. & Runciman, C., 1 Sep 1999.

    Research output: Contribution to conferencePaper

  318. Automated Generalisation of Function Definitions

    Bakewell, A., Runciman, C., Middeldorp, A. & Sato, T., 1 Nov 1999, p. 225-240.

    Research output: Contribution to conferencePaper

  319. 2000
  320. A Resource Limited Artificial Immune System for Data Analysis

    Timmis, J. & Neal., M. J., 2000, p. 19-32.

    Research output: Contribution to conferenceOther

  321. Achieving Minimal and Deterministic Interrupt Execution in Stack-Based Processor Architectures

    Bailey, C., 2000, p. 1368-.

    Research output: Contribution to conferencePaper

  322. An Evaluation of Standard Retrieval Algorithms and a Weightless Neural Approach

    Hodge, V. J. & Austin, J., 2000, p. 591-596.

    Research output: Contribution to conferencePaper

  323. An Iterator Construct for the Refinement Calculus

    King, S. & Morgan, C., 2000.

    Research output: Contribution to conferencePaper

  324. Approaches to Certification of Reconfigurable IMA Systems

    Hollow, P., McDermid, J. A. & Nicholson, M., 2000, p. 397-404.

    Research output: Contribution to conferencePaper

  325. Class Mutation: Mutation Testing for Object-Oriented Programs

    Kim, S-W., Clark, J. A. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  326. Continuous Discrete-Event Simulation of a Continuous-Media Server I/O Subsystem

    Weeks, M., Bailey, C. & Sotudeh, R., 2000, p. 2002-2009.

    Research output: Contribution to conferencePaper

  327. Coordination with Scopes

    Merrick, I. & Wood, A. M., 2000.

    Research output: Contribution to conferencePaper

  328. Data analysis with artificial immune systems and cluster analysis and kohonen networks: some comparisons

    Timmis, J., Neal, M. & Hunt, J., 2000, p. 922-927.

    Research output: Contribution to conferenceOther

  329. Detecting Multiple Texture Planes using Local Spectral Distortion

    Ribeiro, E. & Hancock, E. R., 2000.

    Research output: Contribution to conferencePaper

  330. Event-ready entanglement

    Kok, P. & Braunstein, SL., 2000, p. 15-29.

    Research output: Contribution to conferencePaper

  331. Extending Commonality Analysis for Embedded Control System Families

    Stephenson, A., Buttle, D. L., McDermid, J. A. & Linden, F. V. D., 2000, p. 217-224.

    Research output: Contribution to conferencePaper

  332. Formal Methods for Industrial Products

    Stepney, S., Cooper, D., Bowen, J. P., Dunne, S. & King, S., 2000, p. 374-393.

    Research output: Contribution to conferencePaper

  333. Grouping Line-segments using Eigenclustering

    Robles-Kelly, A. & Hancock, E. R., 2000.

    Research output: Contribution to conferencePaper

  334. Hierarchical growing cell structures: TreeGCS

    Hodge, V. J. & Austin, J., 2000, p. 553-556.

    Research output: Contribution to conferencePaper

  335. Investigating the evolution and stability of a resource limited artificial immune system

    Timmis, J. & Neal, M., 2000, p. 40-41.

    Research output: Contribution to conferenceOther

  336. Machine Learning for Logic-Based Multi-agent Systems

    Alonso, E. & Kudenko, D., 2000, p. 306-307.

    Research output: Contribution to conferencePaper

  337. Neural Networks for Novelty Detection in Airframe Strain Data

    Hickinbotham, S. J. & Austin, J., 2000, p. 375-380.

    Research output: Contribution to conferencePaper

  338. Noun phrase chunking with APL2

    Manandhar, S. & Alfonseca, E., 2000, p. 136-144.

    Research output: Contribution to conferencePaper

  339. Novelty Detection in Airframe Strain Data

    Hickinbotham, S. J. & Austin, J., 2000, p. 2536-2539.

    Research output: Contribution to conferencePaper

  340. On ATM Cell Batching and Its Effects on Bus Arbitration in a Conventional Multimedia Server

    Maierhofer, M. & Crispin-Bailey, C., 2000, p. 2010-.

    Research output: Contribution to conferencePaper

  341. Performance evaluation of a fast chemical structure matching method using distributed neural relaxation

    Turner, A. & Austin, J., 2000, p. 201-204.

    Research output: Contribution to conferencePaper

  342. Safety Assessment of System Architectures

    Murdoch, J., Kirkham, P., McDermid, J. A. & Wilkinson, P., 2000, p. 449-456.

    Research output: Contribution to conferencePaper

  343. Scoped Coordination in Open Distributed Systems

    Merrick, I. & Wood, A. M., 2000, p. 311-316.

    Research output: Contribution to conferencePaper

  344. Segregation with Communication

    Cooper, D. & Stepney, S., 2000, p. 451-470.

    Research output: Contribution to conferencePaper

  345. Systematic Anticipation and Validation of Scenarios of Failure Propagation and Mitigation in PLC Controlled Processes

    Papadopoulos, Y., Mauri, G. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  346. Testing, Proof and Automation: An Integrated Approach

    Burton, S., Clark, J. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  347. The Haptic Perception of Texture in Virtual Environments: An Investigation with Two Devices

    Penn, P., Petrie, H., Colwell, C., Kornbrot, D., Furner, S. & Hardwick, A., 2000, p. 25-30.

    Research output: Contribution to conferencePaper

  348. The Space Usage Problem: An Evaluation Kit for Graph-Reduction Semantics

    Bakewell, A., Runciman, C. & Gilmore, S., 2000, p. 115--128.

    Research output: Contribution to conferencePaper

  349. Type-Constrained Generics for Z

    Valentine, S. H., Toyn, I., Stepney, S. & King, S., 2000, p. 250-263.

    Research output: Contribution to conferencePaper

  350. Typechecking Z

    Toyn, I., Valentine, S. H., Stepney, S., King, S. & King, S., 2000, p. 264-285.

    Research output: Contribution to conferencePaper

  351. ZB 2000: Formal Specification and Development in Z and B

    Bowen, J. P., Dunne, S., Galloway, A. & King, S., 2000.

    Research output: Contribution to conferencePaper

  352. A model for comparing the space usage of lazy evaluators

    Bakewell, A. & Runciman, C., 1 Sep 2000, p. 151--162.

    Research output: Contribution to conferencePaper

  353. A principled semantics for inp

    Jacob, J. L., Wood, A. M., Porto, A. & Roman, G-C., 1 Sep 2000, p. 51--65.

    Research output: Contribution to conferencePaper

  354. Decoding Population Codes

    Wilson, R. C. & Lüdtke, N., 3 Sep 2000, p. 2137-2140. 4 p.

    Research output: Contribution to conferencePaper

  355. An Experimental Investigation of Single and Multiple Issue ILP Speedup for Stack-Based code

    Crispin-Bailey, C. & Weeks, M., Nov 2000, p. 19-24. 6 p.

    Research output: Contribution to conferencePaper

  356. Inter-boundary scheduling of stack operands, a preliminary approach

    Crispin-Bailey, C., Nov 2000, p. 3-11. 9 p.

    Research output: Contribution to conferencePaper

  357. 2001
  358. A Comparison of Categorisation Algorithms for Predicting the Cellular Localisation Sites of Proteins

    Cairns, P. A., Huyck, C. R., Mitchell, I. & Wu, W. X., 2001, p. 296-300.

    Research output: Contribution to conferencePaper

  359. A Concurrent Language for Refinement

    Woodcock, J. & Cavalcanti, A., 2001.

    Research output: Contribution to conferencePaper

  360. A Family-Oriented Software Development Process for Engine Controllers

    Allenby, K., Burton, S., Buttle, D. L., McDermid, J. A., Murdoch, J., Stephenson, A., Bardill, M., Hutchesson, S., Bomarius, F. & Komi-Sirviö, S., 2001, p. 210-226.

    Research output: Contribution to conferencePaper

  361. A Proposal for a Lightweight Rigorous UML-Based Development Method for Reliable Systems

    Paige, R. F. & Ostroff, J. S., 2001, p. 192-206.

    Research output: Contribution to conferencePaper

  362. A ProtoType Question Answering System Using Syntactic and Semantic Information for Answer Retrieval

    Alfonseca, E., Boni, M. D., Jara-Valencia, J-L. & Manandhar, S., 2001.

    Research output: Contribution to conferencePaper

  363. A Rigorous Metamodel for UML Static Conceptual Modelling of Information Systems

    Laleau, R. & Polack, F., 2001, p. 402-416.

    Research output: Contribution to conferencePaper

  364. A comparison of categorisation algorithms for predicting the cellular localization sites of proteins

    Cairns, P., Huyck, C., Mitchell, I. & Wu, W. X., 2001, p. 296--300.

    Research output: Contribution to conferencePaper

  365. A space semantics for core Haskell

    Bakewell, A. & Runciman, C., 2001.

    Research output: Contribution to conferencePaper

  366. Aine: an immunological approach to data mining

    Knight, T. & Timmis, J., 2001, p. 297-304.

    Research output: Contribution to conferenceOther

  367. An EM-like Algorithm for Motion Segmentation via Eigendecomposition

    Robles-Kelly, A. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  368. An integrated neural IR system

    Hodge, V. J. & Austin, J., 2001, p. 265-270.

    Research output: Contribution to conferencePaper

  369. Automatic generation of tests from Statechart specifications

    Burton, S., Clark, J. A. & McDermid, J. A., 2001.

    Research output: Contribution to conferencePaper

  370. Deriving Safety Requirements Using Scenarios

    Allenby, K. & Kelly, T., 2001, p. 228-235.

    Research output: Contribution to conferencePaper

  371. Emergent Neural Computational Architectures Based on Neuroscience: Towards Neuroscience-Inspired Computing

    Wermter, S., Austin, J. & Willshaw, D. J., 2001.

    Research output: Contribution to conferencePaper

  372. Extending the message flow debugger for MQSI

    Tan, S., Arjomandi, E., Paige, R. F., Mamas, E., Moser, S. & O'Farrell, B., 2001, p. 15.

    Research output: Contribution to conferencePaper

  373. Failure Modes and Effects Analysis (FMEA) and System Design

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 2001.

    Research output: Contribution to conferencePaper

  374. Freja, Hat and Hood: a comparative evaluation of three systems for tracing and debugging lazy functional programs

    Chitil, O., Runciman, C. & Wallace, M., 2001, p. 176--193.

    Research output: Contribution to conferencePaper

  375. Graph Matching using Adjacency Matrix Markov Chains

    Robles-Kelly, A. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  376. High Level Failure Analysis for Integrated Modular Avionics

    Conmy, P., McDermid, J. A. & Lindsay, P. A., 2001, p. 13-22.

    Research output: Contribution to conferencePaper

  377. Machine Learning and Inductive Logic Programming for Multi-agent Systems

    Kazakov, D. & Kudenko, D., 2001, p. 246-272.

    Research output: Contribution to conferencePaper

  378. Mapping Correlation Matrix Memory Applications onto a Beowulf Cluster

    Weeks, M., Austin, J., Moulds, A., Turner, A., Ulanowski, Z. & Young, J., 2001, p. 156-163.

    Research output: Contribution to conferencePaper

  379. Metamodelling and Conformance Checking with PVS

    Paige, R. F. & Ostroff, J. S., 2001, p. 2-16. 14 p.

    Research output: Contribution to conferencePaper

  380. Multiple-View Tracing for Haskell: a New Hat

    Wallace, M., Chitil, O., Brehm, T. & Runciman, C., 2001, p. 151--170.

    Research output: Contribution to conferencePaper

  381. Process Tailoring in Iterative Development

    Murdoch, J., McDermid, J. A. & Wilkinson, P. J., 2001.

    Research output: Contribution to conferencePaper

  382. Prolog Issues and Experimental Results of an MCMC Algorithm

    Angelopoulos, N. & Cussens, J., 2001, p. 186-196.

    Research output: Contribution to conferencePaper

  383. Prolog Issues of an MCMC Algorithm

    Angelopoulos, N. & Cussens, J., 2001, p. 246-253.

    Research output: Contribution to conferencePaper

  384. Self-Similar Convolution Image Distribution Histograms as Invariant Identifiers

    Tuke, C. E., O'Keefe, S. E. M. & Austin, J., 2001, p. 501-510. 10 p.

    Research output: Contribution to conferencePaper

  385. Separating Lambertian and Specular Reflectance Components using Iterated Conditional Modes

    Ragheb, H. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  386. Software Safety: Why is there no Consensus?

    McDermid, J. A. & Pumfrey, D. J., 2001.

    Research output: Contribution to conferencePaper

  387. Solving Non-Boolean Satisfiability Problems with Stochastic Local Search

    Frisch, A. M., Peugniez, T. J., Doggett, A. & Nightingale, P., 2001, p. 282-290.

    Research output: Contribution to conferencePaper

  388. The Single Model Principle

    Paige, R. F. & Ostroff, J. S., 2001, p. 292-293.

    Research output: Contribution to conferencePaper

  389. The Steam Boiler in a Unified Theory of Z and CSP

    Woodcock, J. & Cavalcanti, A., 2001, p. 291-298.

    Research output: Contribution to conferencePaper

  390. The generation of speech for a search guide

    Cook, N. J. & Benest, I. D., 2001, p. 1739-1742.

    Research output: Contribution to conferencePaper

  391. Universal quantum gates for single cooper pair box based quantum computing

    Echternach, P., Williams, CP., Dultz, SC., Braunstein, S. & Dowling, JP., 2001, p. 111-120.

    Research output: Contribution to conferencePaper

  392. Using the SPARK Toolset for Showing the Absence of Run-Time Errors in Safety-Critical Software

    Foulger, D. & King, S., 2001, p. 229-240.

    Research output: Contribution to conferencePaper

  393. Virtual Adaptive Learning Architecture (VALA)

    Metcalfe, A., Snitzer, M. & Austin, J., 2001, p. 7-10.

    Research output: Contribution to conferencePaper

  394. Virtual Drilling in 3-D Objects Reconstructed by Shape-Based Interpolation

    Bors, A. G., Kechagias, L. & Pitas, I., 2001, p. 729-738.

    Research output: Contribution to conferencePaper

  395. aivis - artificial immune network visualisation

    Timmis, J., 2001, p. 61-69.

    Research output: Contribution to conferenceOther

  396. Issues with using Ravenscar and the ada Distributed Systems Annex for high-integrity systems

    Audsley, N. & Wellings, A., 1 Apr 2001, p. 33-39. 7 p.

    Research output: Contribution to conferencePaper

  397. The Role-based Access Control System of a European Bank: a case study and discussion

    Schaad, A., Moffett, J., Jacob, J. & Jaeger, T., 1 May 2001, p. 3--9.

    Research output: Contribution to conferencePaper

  398. 2002
  399. A Fixpoint Based Encoding for Bounded Model Checking

    Frisch, A. M., Sheridan, D. & Walsh, T., 2002, p. 238-255. 17 p.

    Research output: Contribution to conferencePaper

  400. A Framework for Constructing Temporal Models from Texts

    Alfonseca, E. & Manandhar, S., 2002, p. 456-460.

    Research output: Contribution to conferencePaper

  401. A Multi-Layered Immune Inspired Approach to Data Mining

    Knight, T. & Timmis, J., 2002, p. 266-271.

    Research output: Contribution to conferenceOther

  402. Alignment using Spectral Clusters

    Carcassoni, M. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  403. An artificial immune network for multimodal optimisation

    Castro, L. N. D. & Timmis, J., 2002, p. 699-704.

    Research output: Contribution to conferenceOther

  404. Arabic Character Recognition with Shape Mixtures

    Al-Shaher, A. A. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  405. Artificial Immune Recognition System (AIRS): Revisions and Refinements

    Watkins, A. & Timmis, J., 2002, p. 173-181.

    Research output: Contribution to conferenceOther

  406. Automatic Generation of Implied Clauses for SAT

    Drake, L., Frisch, A. M. & Walsh, T., 2002, p. 783.

    Research output: Contribution to conferencePaper

  407. Automation of System Safety Analysis: Possibilities and Pitfalls

    Galloway, A., McDermid, J. A., Murdoch, J. & Pumfrey, D. J., 2002.

    Research output: Contribution to conferencePaper

  408. CGRASS: A System for Transforming Constraint Satisfaction Problems

    Frisch, A. M., Miguel, I. & Walsh, T., 2002, p. 15-30.

    Research output: Contribution to conferencePaper

  409. Characters + Mark-up = Z Lexis

    Toyn, I. & Stepney, S., 2002, p. 100-119.

    Research output: Contribution to conferencePaper

  410. Combining Inference and Search for the Propositional Satisfiability Problem

    Drake, L. & Frisch, A. M., 2002, p. 982.

    Research output: Contribution to conferencePaper

  411. Congestion Sensitive Algorithm for Point-to-Multipoint Multicast Congestion Control in ATM Networks

    Hong, L., enmin, S., sotudeh, R. & Crispin-Bailey, C., 2002, p. 417-420. 4 p.

    Research output: Contribution to conferencePaper

  412. Contents of a Software Engineering Undergraduate Course

    McDermid, J. A., Thompson, J. B., Edwards, H. M. & Lethbridge, T., 2002, p. B37-B40.

    Research output: Contribution to conferencePaper

  413. Critical Critical Systems

    Stepney, S., 2002, p. 62-70.

    Research output: Contribution to conferencePaper

  414. Derivation of Safety Requirements for an Embedded Control System

    Lindsay, P. A., McDermid, J. A. & Kassler, J., 2002.

    Research output: Contribution to conferencePaper

  415. Eliciting and Specifying Requirements with Use Cases for Embedded Systems

    Nasr, E., McDermid, J. A. & Bernat, G., 2002, p. 350-358.

    Research output: Contribution to conferencePaper

  416. Enabling Network-Based Learning

    Crispin-Bailey, C. & Pears, N. E., 2002. 5 p.

    Research output: Contribution to conferencePaper

  417. European Trends in Safety

    McDermid, J. A. & LIndsay, P. A., 2002.

    Research output: Contribution to conferencePaper

  418. Evolution of Code through Asynchronous Services

    Oriol, M., 2002.

    Research output: Contribution to conferencePaper

  419. Extending a Lexical Ontology by a Combination of Distributional Semantics Signatures

    Alfonseca, E. & Manandhar, S., 2002, p. 1-7.

    Research output: Contribution to conferencePaper

  420. FORTEST: Formal Methods and Testing

    Bowen, J. P., Bogdanov, K., Clark, J. A., Harman, M., Hierons, R. M. & Krause, P., 2002, p. 91-104.

    Research output: Contribution to conferencePaper

  421. Face Recognition Using Shape-from-shading

    Smith, W. A. P. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  422. Forward Simulation for Data Refinement of Classes

    Cavalcanti, A., Naumann, D. A., Eriksson, L-H. & Lindsay, P. A., 2002, p. 471-490.

    Research output: Contribution to conferencePaper

  423. From CSP-OZ to Java with Processes

    Cavalcanti, A. & Sampaio, A., 2002.

    Research output: Contribution to conferencePaper

  424. Global Constraints for Lexicographic Orderings

    Frisch, A. M., Hnich, B., Kiziltan, Z., Miguel, I. & Walsh, T., 2002, p. 93-108.

    Research output: Contribution to conferencePaper

  425. Hazard Analysis for Security Protocol Requirements

    Foster, N. & Jacob, J. L., 2002, p. 75-92.

    Research output: Contribution to conferencePaper

  426. Hierarchy and convergance of immune networks: basic ideas and premilinary results

    Castro, L. N. D. & Timmis, J., 2002, p. 231-240.

    Research output: Contribution to conferenceOther

  427. High frequency forecasting with associative memories

    Pasley, A. & Austin, J., 2002, p. 433-438.

    Research output: Contribution to conferencePaper

  428. Negative selection: How to generate detectors

    Ayara, M., Timmis, J., Lemos, L. N. D., Castro, R. D. & Duncan, R., 2002, p. 89-98.

    Research output: Contribution to conferenceOther

  429. Novelty detection for strain-gauge degradation using maximally correlated components

    Hollier, G. & Austin, J., 2002, p. 257-262.

    Research output: Contribution to conferencePaper

  430. Performing Hazard and Safety Analysis of Object Oriented Systems

    Hawkins, R. & McDermid, J. A., 2002.

    Research output: Contribution to conferencePaper

  431. Probabilistic Analysis of CAN with Faults

    Broster, I., Burns, A. & Rodríguez-Navas, G., 2002, p. 269-278.

    Research output: Contribution to conferencePaper

  432. Ravenscar-Java: a high integrity profile for real-time Java

    Kwon, J., Wellings, A. J. & King, S., 2002, p. 131-140.

    Research output: Contribution to conferencePaper

  433. Reading Multimedia Documents

    Petrie, H. & Weber, G., 2002, p. 413-420.

    Research output: Contribution to conferencePaper

  434. Refinement Algebra for Formal Bytecode Generation

    Duran, A., Cavalcanti, A. & Sampaio, A., 2002, p. 347-358.

    Research output: Contribution to conferencePaper

  435. Refinement in Circus

    Sampaio, A., Woodcock, J. & Cavalcanti, A., 2002, p. 451-470.

    Research output: Contribution to conferencePaper

  436. Reinforcement Learning Approaches to Coordination in Cooperative Multi-agent Systems

    Kapetanakis, S., Kudenko, D. & Strens, M. J. A., 2002, p. 18-32.

    Research output: Contribution to conferencePaper

  437. Safety Analysis and Certification of Open Distributed Systems

    Conmy, P. M., McDermid, J. A., Nicholson, M. & Purwantoro, Y., 2002.

    Research output: Contribution to conferencePaper

  438. Software Safety Arguments: Towards a Systematic Categorsation of Evidence

    Weaver, R., McDermid, J. A. & Kelly, T. P., 2002.

    Research output: Contribution to conferencePaper

  439. TeDUB: A System for Presenting and Exploring Technical Drawings for Blind People

    Petrie, H., Schlieder, C., Blenkhorn, P., Evans, D. G., King, A., O'Neill, A-M., Ioannidis, G. T., Gallagher, B., Crombie, D., Mager, R. & Alafaci, M., 2002, p. 537-539.

    Research output: Contribution to conferencePaper

  440. The Design of a Tool-Supported Graphical Notation for Timed CSP

    Brooke, P. J. & Paige, R. F., 2002, p. 299-318.

    Research output: Contribution to conferencePaper

  441. The Semantics of Circus

    Woodcock, J. & Cavalcanti, A., 2002, p. 184-203.

    Research output: Contribution to conferencePaper

  442. The YorkQA Prototype Question Answering System

    Boni, M. D., Jara-Valencia, J-L. & Manandhar, S., 2002.

    Research output: Contribution to conferencePaper

  443. Towards an Integrated Model Checker for Railway Signalling Data

    Huber, M. & King, S., 2002, p. 204-223.

    Research output: Contribution to conferencePaper

  444. Towards immune inspired fault tolerance in embedded systems

    Timmis, J., Lemos, R. D., Ayara, M. & Duncan, R., 2002, p. 1459-1463.

    Research output: Contribution to conferenceOther

  445. Trends in Systems Safety

    McDermid, J. A. & Lindsay, P. A., 2002, p. 3-8.

    Research output: Contribution to conferencePaper

  446. Unifying Theories of Parallel Programming

    Woodcock, J., Hughes, A. P. & George, C., 2002, p. 24-37.

    Research output: Contribution to conferencePaper

  447. Universal Interfaces to Multimedia Documents

    Petrie, H., Fisher, W., Langer, I., Weber, G., Gladstone, K., Rundle, C. & Pyfers, L., 2002, p. 319-324.

    Research output: Contribution to conferencePaper

  448. User Requirements for Technologies for Personal Communication and Information Use for Deafblind People

    Fisher, W. & Petrie, H., 2002, p. 583-584.

    Research output: Contribution to conferencePaper

  449. User interface design as systems design

    Thimbleby, H., Blandford, A., Cairns, P., Curzon, P. & Jones, M., 2002, p. 281.

    Research output: Contribution to conferencePaper

  450. Visual Navigation using Planar Homographies

    Liang, B. & Pears, N., 2002, p. 205-210.

    Research output: Contribution to conferencePaper

  451. Weakly Hard Real-time Constraints on Controller Area Network

    Broster, I., Bernat, G. & Burns, A., 2002, p. 134-141.

    Research output: Contribution to conferencePaper

  452. Writing Temporally Predictable Code

    Puschner, P. P. & Burns, A., 2002, p. 85-94.

    Research output: Contribution to conferencePaper

  453. Coming and Going from UML to B: a proposal to support traceability in rigorous IS development

    Laleau, R. & Polack, F., 1 Jan 2002, p. 517-534.

    Research output: Contribution to conferencePaper

  454. 2003
  455. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  456. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  457. A Consensus Protocol for CAN-Based Systems

    Lima, G. M. D. A. & Burns, A., 2003, p. 420-429.

    Research output: Contribution to conferencePaper

  458. A Danger Theory Approach to Web Mining

    Secker, A., Freitas, A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferenceOther

  459. A Danger Theory Inspired Approach to Web Mining

    Secker, A., Freitas, A. A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferencePaper

  460. A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments

    Weaver, R., Fenn, J. & Kelly, T., 2003, p. 57-67.

    Research output: Contribution to conferencePaper

  461. A Probabilistic Framework for Schedulability Analysis

    Burns, A., Bernat, G. & Broster, I., 2003, p. 1-15.

    Research output: Contribution to conferencePaper

  462. A Refinement Tool for Z

    Freitas, A., Nascimento, C. & Cavalcanti, A., 2003, p. 396-415.

    Research output: Contribution to conferencePaper

  463. A Round Robin Scheduling Policy for Ada

    Burns, A., Harbour, M. G. & Wellings, A. J., 2003, p. 334-343.

    Research output: Contribution to conferencePaper

  464. A Strategy for Compiling Classes, Inheritance, and Dynamic Binding

    Duran, A., Cavalcanti, A. & Sampaio, A., 2003, p. 301-320.

    Research output: Contribution to conferencePaper

  465. A Theoretical Analysis of Hierarchical Proofs

    Cairns, P. A. & Gow, J., 2003, p. 175-187.

    Research output: Contribution to conferencePaper

  466. AISEC: An Artificial Immune System for E-mail Classification

    Secker, A., Freitas, A. & Timmis, J., 2003, p. 131-139.

    Research output: Contribution to conferenceOther

  467. Adding Temporal Annotations and Associated Verification to Ravenscar Profile

    Burns, A. & Lin, T-M., 2003, p. 80-91.

    Research output: Contribution to conferencePaper

  468. An Analysis of Clarification Dialogue for Question Answering

    Boni, M. D. & Manandhar, S., 2003.

    Research output: Contribution to conferencePaper

  469. An Outline Pattern Language for Z: Five Illustrations and Two Tables

    Stepney, S., Polack, F., Toyn, I., Bert, D., Bowen, J. P., King, S. & Waldén, M. A., 2003, p. 2-19.

    Research output: Contribution to conferencePaper

  470. Analysing Available ILP in Stack Based Code : A Preliminary Approach

    Crispin-Bailey, C. & Shi, H., 2003.

    Research output: Contribution to conferencePaper

  471. Chasing Chaos.

    Kelsy, J., Timmis, J. & Hone, A., 2003, p. 131-139.

    Research output: Contribution to conferenceOther

  472. Combining Agile Practices with UML and EJB: A Case Study in Agile Development

    Paige, R. F., Agarwal, P. & Brooke, P. J., 2003, p. 351-353. 2 p.

    Research output: Contribution to conferencePaper

  473. Constraints for Breaking More Row and Column Symmetries

    Frisch, A. M., Jefferson, C., Miguel, I. & Rossi, F., 2003, p. 318-332.

    Research output: Contribution to conferencePaper

  474. Critical Critical Systems

    Stepney, S., 2003, p. 62--70.

    Research output: Contribution to conferencePaper

  475. Epipole Estimation under Pure Camera Translation

    Chen, Z., Pears, N., McDermid, J. A. & Heseltine, T., 2003, p. 849-858.

    Research output: Contribution to conferencePaper

  476. Establishing Safety Criteria for Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 163-169.

    Research output: Contribution to conferencePaper

  477. Extending PSSA for Complex Systems

    Nicholson, M., McDermid, J. A. & Fletcher, R., 2003.

    Research output: Contribution to conferencePaper

  478. Face Recognition: A Comparison of Appearance-Based Approaches

    Heseltine, T., Pears, N., Austin, J. & Chen, Z., 2003, p. 59-68.

    Research output: Contribution to conferencePaper

  479. Identifying safety dependencies in modular computer systems

    Conmy, P., Nicholson, M., McDermid, J. A. & Fletcher, R., 2003.

    Research output: Contribution to conferencePaper

  480. Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation

    Kelsey, J. & Timmis, J., 2003, p. 207-218.

    Research output: Contribution to conferencePaper

  481. Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation

    Kelsey, J. & Timmis, J., 2003, p. 81-92.

    Research output: Contribution to conferenceOther

  482. LuckyJ : an Asynchronous Evolution Platform for Component-Based Applications

    Oriol, M., 2003, p. 1-10.

    Research output: Contribution to conferencePaper

  483. Modular UML Semantics: Interpretations in Z Based on Templates and Generics

    Amálio, N., Stepney, S. & Polack, F., 2003.

    Research output: Contribution to conferencePaper

  484. Mutation Testing: An Artificial Immune System Approach

    Timmis, J., 2003, p. 81-92.

    Research output: Contribution to conferenceOther

  485. Patterns to Guide Practical Refactoring: Examples Targetting Promotion in Z

    Stepney, S., Polack, F. & Toyn, I., 2003, p. 20-39.

    Research output: Contribution to conferencePaper

  486. Predictable Memory Utilization in the Ravenscar-Java Profile

    Kwon, J., Wellings, A. J. & King, S., 2003, p. 267-276.

    Research output: Contribution to conferencePaper

  487. Problems and solutions for markup for mathematical examples and exercises

    Goguadze, G., Melis, E., Ullrich, C. & Cairns, P., 2003, p. 80--92.

    Research output: Contribution to conferencePaper

  488. Processing Group Parameters in the Real-Time Specification for Java

    Burns, A. & Wellings, A. J., 2003, p. 360-370.

    Research output: Contribution to conferencePaper

  489. Quantitative comparisons into content-based music recognition with the self organising map

    Wood, G. & O'Keefe, S., 2003, p. 1-2. 2 p.

    Research output: Contribution to conferencePaper

  490. Quantum information processing with Schrodinger cats

    Nemoto, K., Gilchrist, A., Munro, WJ., Ralph, TC., Milburn, GJ. & Braunstein, SL., 2003, p. 434-443.

    Research output: Contribution to conferencePaper

  491. Revisiting the Foundations of Artificial Immune Systems: A Problem Oriented Perspective

    Freitas, A. & Timmis, J., 2003, p. 229-241.

    Research output: Contribution to conferenceOther

  492. Safety Assurance Contracts for Integrated Modular Avionics

    Conmy, P., Nicholson, M., McDermid, J. A., Lindsay, P. A. & Cant, A., 2003, p. 69-78.

    Research output: Contribution to conferencePaper

  493. Safety Lifecycle for Developing Safety Critical Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 77-91.

    Research output: Contribution to conferencePaper

  494. Smart Devices and Software Agents: The Basics of Good Behaviour

    Chivers, H., Clark, J. A., Stepney, S., Hutter, D., Müller, G., Stephan, W. & Ullmann, M., 2003, p. 39-52.

    Research output: Contribution to conferencePaper

  495. Social Learning through Evolution of Language

    Kazakov, D. & Bartlett, M., 2003, p. 397-408.

    Research output: Contribution to conferencePaper

  496. Software Vaccination: An Artificial Immune System Approach to Mutation Testing

    May, P., Mander, K. & Timmis, J., 2003, p. 81-92.

    Research output: Contribution to conferencePaper

  497. The Interaction Between Inference and Branching Heuristics

    Drake, L. & Frisch, A. M., 2003, p. 370-382.

    Research output: Contribution to conferencePaper

  498. The Use of Sentence Similarity as a Semantic Relevance Metric for Question Answering

    Boni, M. D. & Manandhar, S., 2003, p. 138-144.

    Research output: Contribution to conferencePaper

  499. Transforming Haskell for Tracing

    Chitil, O., Runciman, C. & Wallace, M., 2003, p. 165--181.

    Research output: Contribution to conferencePaper

  500. Testing and Tracing Lazy Functional Programs using QuickCheck and Hat

    Claessen, K., Runciman, C., Chitil, O., Hughes, R. J. M. & Wallace, M., 1 Feb 2003, p. 59--99.

    Research output: Contribution to conferencePaper

  501. Comparison of formalisation approaches of UML class constructs in Z and Object-Z

    Amàlio, N. & Polack, F., 1 Jun 2003, p. 339-358.

    Research output: Contribution to conferencePaper

  502. Blind Source Separation Using Variational Expectation-Maximization Algorithm

    Nasios, N. & Bors, A. G., Aug 2003, p. 442-450.

    Research output: Contribution to conferencePaper

  503. Pattern Matching in DAME using Grid Enabled AURA Technology

    Davis, R., Liang, B., Jessop, M. D., Pasley, A. & Austin, J., Sep 2003.

    Research output: Contribution to conferencePaper

  504. A spectral analysis of perceptual shape variation

    Hughes, A. & Wilson, R. C., 17 Sep 2003, p. 38-43.

    Research output: Contribution to conferencePaper

  505. 2004
  506. A Case Study of Distributed Music Audio Analysis Using the Geddei Processing Framework

    Wood, G. & O'Keefe, S., 2004, p. 44-47. 4 p.

    Research output: Contribution to conferencePaper

  507. A Comment on opt-AINet: An Immune Network Algorithm for Optimisation

    Timmis, J. & Edmonds, C., 2004, p. 308-317.

    Research output: Contribution to conferenceOther

  508. A Fractal Immune Network

    Bentley, P. & Timmis, J., 2004, p. 133-145.

    Research output: Contribution to conferenceOther

  509. A Framework for Specification and Validation of Real-Time Systems Using it ircus Actions

    Sherif, A., He, J., Cavalcanti, A. & Sampaio, A., 2004, p. 478-493.

    Research output: Contribution to conferencePaper

  510. A Mechanism for Implementing Precise Exceptions in Pipelined Processors

    Alli, S. & Bailey, C., 2004, p. 598-602.

    Research output: Contribution to conferencePaper

  511. A Proposed Mechanism for Super-Pipelined Instruction-Issue for ILP Stack Machines

    Bailey, C., 2004, p. 121-129.

    Research output: Contribution to conferencePaper

  512. A Tutorial Introduction to CSP in it nifying Theories of Programming

    Cavalcanti, A. & Woodcock, J., 2004, p. 220-268.

    Research output: Contribution to conferencePaper

Previous 1 2 3 Next