Search research publications and outputs

  1. “Slow down and look”: Desirable aspects of failure in video games, from the perspective of players.

    Foch, C. & Kirman, B., 2 Aug 2021.

    Research output: Contribution to conferencePaperpeer-review

  2. sc Linda for Case Base Retrieval: a Case for Extending the Functionality of sc Linda

    Campbell, D. K. G., Osborne, H. R., Wood, A. M. & Bridge, D. G., 1 Jan 1998.

    Research output: Contribution to conferencePaper

  3. sc AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C. & Wood, A., 1 Oct 1996, p. 686--694.

    Research output: Contribution to conferencePaper

  4. pWCET a Toolset for automatic Worst-Case Execution Time Analysis of Real-Time Embedded Programs

    Bernat, G., Colin, A. & Petters, S. M., 2003.

    Research output: Contribution to conferencePaper

  5. it ransML: A Family of Languages to Model Model Transformations

    Guerra, E., Lara, J. D., Kolovos, D. S., Paige, R. F. & Santos, O. M. D., 2010, p. 106-120.

    Research output: Contribution to conferencePaperpeer-review

  6. aivis - artificial immune network visualisation

    Timmis, J., 2001, p. 61-69.

    Research output: Contribution to conferenceOther

  7. Zero-error subspaces of quantum channels

    Patra, M. K. & Braunstein, S., 5 Aug 2011, p. 104-108.

    Research output: Contribution to conferencePaperpeer-review

  8. ZB 2005: Formal Specification and Development in Z and B

    Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005.

    Research output: Contribution to conferencePaperpeer-review

  9. ZB 2000: Formal Specification and Development in Z and B

    Bowen, J. P., Dunne, S., Galloway, A. & King, S., 2000.

    Research output: Contribution to conferencePaperpeer-review

  10. Z/Eves and the Mondex Electronic Purse

    Woodcock, J. & Freitas, L., 2006, p. 15-34.

    Research output: Contribution to conferencePaperpeer-review

  11. Z and the Refinement Calculus

    King, S., 1990, p. 164-188.

    Research output: Contribution to conferencePaperpeer-review

  12. YETI on the Cloud

    Oriol, M. & Ullah, F., 1 Apr 2010, p. 434--437.

    Research output: Contribution to conferencePaperpeer-review

  13. XRound: Bidirectional Transformations and Unifications Via a Reversible Template Language

    Chivers, H. & Paige, R. F., 2005, p. 205-219.

    Research output: Contribution to conferencePaperpeer-review

  14. Writing Temporally Predictable Code

    Puschner, P. P. & Burns, A., 2002, p. 85-94.

    Research output: Contribution to conferencePaperpeer-review

  15. Widening the Representation Bottleneck: a Functional Implementation of Relational Programming

    Cattrall, D. M. & Runciman, C., 1 Jun 1993, p. 191--200.

    Research output: Contribution to conferencePaper

  16. Who supports the support workers? E-learning for support workers of students with disabilities

    Power, C., Petrie, H. & Swallow, D., 2009, p. 167-178.

    Research output: Contribution to conferencePaperpeer-review

  17. When to Trust Mobile Objects: Access Control in the Jini(tm) Software System

    Crichton, C., Davies, J. & Woodcock, J., 1999, p. 116-125.

    Research output: Contribution to conferencePaperpeer-review

  18. What is Acceptably Safe for Reinforcement Learning?

    Bragg, J. E. & Habli, I., Sep 2018.

    Research output: Contribution to conferencePaperpeer-review

  19. What Is the Complexity of a Network? The Heat Flow-Thermodynamic Depth Approach

    Escolano, F., Lozano, M. A., Hancock, E. R. & Giorgi, D., 2010, p. 286-295.

    Research output: Contribution to conferencePaperpeer-review

  20. What Do Beginning CS Majors Know?

    Pedroni, M., Meyer, B. & Oriol, M., 2009, p. 0-4.

    Research output: Contribution to conferencePaperpeer-review

  21. Web Accessibility Metrics: Effects of Different Computational Approaches

    Freire, A. P., Power, C., Petrie, H., Tanaka, E. H., Rocha, H. V. & Fortes, R. P. D. M., 2009, p. 664-673.

    Research output: Contribution to conferencePaperpeer-review

  22. Web Accessibility: Automatic/Manual Evaluation and Authoring Tools

    Petrie, H., Power, C. & Weber, G., 2008, p. 334-337.

    Research output: Contribution to conferencePaperpeer-review

  23. Weakly Hard Real-time Constraints on Controller Area Network

    Broster, I., Bernat, G. & Burns, A., 2002, p. 134-141.

    Research output: Contribution to conferencePaperpeer-review

  24. Wattsup? motivating reductions in domestic energy consumption using social networks

    Foster, D., Lawson, S., Blythe, M. & Cairns, P. A., 2010, p. 178-187.

    Research output: Contribution to conferencePaperpeer-review

  25. WHERE? Through Life Safety Management: Some Concepts and Issues: Some Concepts and Issues

    McDermid, J. A., 2008.

    Research output: Contribution to conferencePaperpeer-review

  26. WHERE? The Use of Bayesian Networks in Critical Applications

    Hawkins, R. D. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaperpeer-review

  27. WHERE? Risk, Uncertainty and Software Safety

    McDermid, J. A., 2008.

    Research output: Contribution to conferencePaper

  28. Voronoi diagrams, vectors and the visually impaired

    Power, C., Gill, D. & Daley, M., 2006, p. 1247-1252.

    Research output: Contribution to conferencePaperpeer-review

  29. Visualising random boolean network dynamics

    Stepney, S., 2009, p. 1781-1782.

    Research output: Contribution to conferencePaperpeer-review

  30. Visualising Random Boolean Network Dynamics: Effects of Perturbations and Canalisation

    Stepney, S., 2009, p. 369-376.

    Research output: Contribution to conferencePaperpeer-review

  31. Visual Navigation using Planar Homographies

    Liang, B. & Pears, N., 2002, p. 205-210.

    Research output: Contribution to conferencePaperpeer-review

  32. Virtual Learning Environments: Another Barrier to Blended and E-Learning

    Power, C., Petrie, H., Sakharov, V. & Swallow, D., 2010, p. 519-526.

    Research output: Contribution to conferencePaperpeer-review

  33. Virtual Drilling in 3-D Objects Reconstructed by Shape-Based Interpolation

    Bors, A. G., Kechagias, L. & Pitas, I., 2001, p. 729-738.

    Research output: Contribution to conferencePaperpeer-review

  34. Virtual Adaptive Learning Architecture (VALA)

    Metcalfe, A., Snitzer, M. & Austin, J., 2001, p. 7-10.

    Research output: Contribution to conferencePaperpeer-review

  35. Video games as research instruments

    Gámez, E. H. C., Cairns, P. A., Gow, J., Back, J. & Capstick, E., 2010, p. 4493-4496.

    Research output: Contribution to conferencePaperpeer-review

  36. Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository

    Freitas, L., Mokos, K. & Woodcock, J., 2007, p. 290-298.

    Research output: Contribution to conferencePaperpeer-review

  37. Verified Software Grand Challenge

    Woodcock, J., 2006, p. 617-617.

    Research output: Contribution to conferencePaperpeer-review

  38. Verification of Control Systems using Circus

    Cavalcanti, A. & Clayton, P., 2006, p. 269-278.

    Research output: Contribution to conferencePaperpeer-review

  39. Variational segmentation of color images

    Nasios, N. & Bors, A. G., Sep 2005, p. 614-617.

    Research output: Contribution to conferencePaperpeer-review

  40. Validating the unified theory of acceptance and use of technology (UTAUT) tool cross-culturally

    Oshlyansky, L., Cairns, P. A. & Thimbleby, H. W., 2007, p. 83-86.

    Research output: Contribution to conferencePaperpeer-review

  41. Valid Application of EVT in Timing Analysis by Randomising Execution Time Measurements

    Bate, I. J. & Lima, G. M. D. A., 2017. 11 p.

    Research output: Contribution to conferencePaperpeer-review

  42. VLSI Design Techniques for Teaching and Research

    Crispin-Bailey, C. & Sotudeh, R., 1996, p. 1-8. 8 p.

    Research output: Contribution to conferencePaper

  43. Utilizing the Untapped Potential of Indirect Encoding for Neural Networks with MetaLearning

    Katona, A., Lourenco, N., Machado, P., Franks, D. W. & Walker, J. A., 20 Jan 2021, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  44. Using the SPARK Toolset for Showing the Absence of Run-Time Errors in Safety-Critical Software

    Foulger, D. & King, S., 2001, p. 229-240.

    Research output: Contribution to conferencePaperpeer-review

  45. Using the CoSMoS Process to Enhance an Executable Model of Auxin Transport Canalisation

    Garnett, P., Stepney, S., Day, F. & Leyser, O., 2010, p. 9-32.

    Research output: Contribution to conferencePaper

  46. Using feedback to regulate gene expression in a developmental control architecture

    Clegg, K., Stepney, S. & Clarke, T., 2007, p. 966-973.

    Research output: Contribution to conferencePaper

  47. Using data confluences in a distributed network with social monitoring to identify fault conditions

    Aitken, J. M. & Clarke, T., 22 Sep 2006, p. 8.

    Research output: Contribution to conferencePaperpeer-review

  48. Using a Model Merging Language for Reconciling Model Versions

    Engel, K-D., Paige, R. F. & Kolovos, D. S., 2006, p. 143-157.

    Research output: Contribution to conferencePaperpeer-review

  49. Using VDM with Rely and Guarantee-Conditions: Experiences from a Real Project

    Woodcock, J. & Dickinson, B., 1988, p. 434-458.

    Research output: Contribution to conferencePaperpeer-review

  50. Using Unified Modeling Language for Conceptual Modelling of Knowledge-Based Systems

    Abdullah, M. S., Benest, I. D., Paige, R. F. & Kimble, C., 2007, p. 438-453.

    Research output: Contribution to conferencePaperpeer-review

  51. Using UML to Model EAE and Its Regulatory Network

    Read, M., Timmis, J., Andrews, P. S. & Kumar, V., 2009, p. 4-6.

    Research output: Contribution to conferencePaperpeer-review

  52. Using Scenarios to Identify and Trade-Off Dependability Objectives in Design

    Despotou, G., McDermid, J. A. & Kelly, T. P., 2005.

    Research output: Contribution to conferencePaperpeer-review

  53. Using PVS to Prove a Z Refinement: A Case Study

    Stringer-Calvert, D. W. J., Stepney, S. & Wand, I., 1997, p. 573-588.

    Research output: Contribution to conferencePaperpeer-review

  54. Using Mutation Analysis to Evolve Subdomains for Random Testing

    Patrick, M. T., Alexander, R., Oriol, M. Y. A. & Clark, J. A., Mar 2013, p. 53-62. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  55. Using Multi-parameters for Calibration of Low-cost Sensors in Urban Environment

    Bate, I. J. & Fang, X., 2017.

    Research output: Contribution to conferencePaperpeer-review

  56. Using Model Theory to Specify AI Programs

    Frisch, A. M., 1985, p. 148-154.

    Research output: Contribution to conferencePaper

  57. Using Fuzzy Self-Organising Maps for Safety Critical Systems

    Kurd, Z. & Kelly, T., 2004, p. 17-30.

    Research output: Contribution to conferencePaperpeer-review

  58. Using Document Dimensions for Enhanced Information Retrieval

    Jayasooriya, T. & Manandhar, S., 2004, p. 145-152.

    Research output: Contribution to conferencePaperpeer-review

  59. Using Diagrams to Give a Formal Specification of Timing Constraints in Z

    Coombes, A., McDermid, J. A., Bowen, J. P. & Nicholls, J. E., 1992, p. 119-130.

    Research output: Contribution to conferencePaperpeer-review

  60. Using Association Rule Mining to Predict Opponent Deck Content in Android: Netrunner

    Sephton, N. J., Cowling, P. I., Devlin, S., Hodge, V. J. & Slaven, N. H., 20 Sep 2016.

    Research output: Contribution to conferencePaperpeer-review

  61. Using Artificial Epigenetic Regulatory Networks To Control Complex Tasks Within Chaotic Systems

    Turner, A. P., Lones, M. A., Fuente, L. A., Stepney, S., Caves, L. & Tyrrell, A., Mar 2012, p. -. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  62. Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of Systems

    Hall-May, M. & Kelly, T., 2006, p. 330-343.

    Research output: Contribution to conferencePaperpeer-review

  63. User-defined clocks in the real-time specification for Java

    Wellings, A. & Martin Schoeberl, M., 2011.

    Research output: Contribution to conferencePaperpeer-review

  64. User-centred design in the development of a navigational aid for blind travellers

    Petrie, H., Johnson, V., Strothotte, T., Michel, R., Raab, A. & Reichert, L., 1997, p. 220-227.

    Research output: Contribution to conferencePaperpeer-review

  65. User interface design as systems design

    Thimbleby, H., Blandford, A., Cairns, P., Curzon, P. & Jones, M., 2002, p. 281.

    Research output: Contribution to conferencePaper

  66. User Requirements for Technologies for Personal Communication and Information Use for Deafblind People

    Fisher, W. & Petrie, H., 2002, p. 583-584.

    Research output: Contribution to conferencePaperpeer-review

  67. User Modelling for Personalized Question Answering

    Quarteroni, S. & Manandhar, S., 2007, p. 386-397.

    Research output: Contribution to conferencePaperpeer-review

  68. User Modeling for Adaptive Question Answering and Information Retrieval

    Quarteroni, S. & Manandhar, S., 2006, p. 776-781.

    Research output: Contribution to conferencePaperpeer-review

  69. User Centred Design and the Japanese User

    Oshlyansky, L., Cairns, P. A. & Foy, K., 2004, p. 9-20.

    Research output: Contribution to conferencePaperpeer-review

  70. User Centred Design and Agile Software Development Processes: Friends or Foes?

    Petrie, H., 2009.

    Research output: Contribution to conferencePaperpeer-review

  71. Unsupervised Word Sense Disambiguation Using The WWW

    Klapaftis, I. P. & Manandhar, S., 2006, p. 174-183.

    Research output: Contribution to conferencePaperpeer-review

  72. Unsupervised Lexical Learning with Categorical Grammars Using the LLL Corpus

    Watkinson, S. & Manandhar, S., 1999, p. 218-236.

    Research output: Contribution to conferencePaperpeer-review

  73. Unsupervised Learning of Functional Groups for Computational Chemistry

    Erten, C., Algahtani, E., Fairlamb, I. J. S., Garcia-Padilla, E., Lynam, J. M., Manandhar, S., Slattery, J. M. & Kazakov, D. L., 5 Sep 2019, p. 1-4.

    Research output: Contribution to conferenceAbstractpeer-review

  74. Universal quantum gates for single cooper pair box based quantum computing

    Echternach, P., Williams, CP., Dultz, SC., Braunstein, S. & Dowling, JP., 2001, p. 111-120.

    Research output: Contribution to conferencePaperpeer-review

  75. Universal Interfaces to Multimedia Documents

    Petrie, H., Fisher, W., Langer, I., Weber, G., Gladstone, K., Rundle, C. & Pyfers, L., 2002, p. 319-324.

    Research output: Contribution to conferencePaperpeer-review

  76. Unit Testing Model Management Operations

    Kolovos, D. S., Paige, R. F., Rose, L. M. & Polack, F. A. C., 2008.

    Research output: Contribution to conferencePaperpeer-review

  77. Unifying theories of confidentiality

    Banks, M. J., Jacob, J. L. & Qin, S., 2010, p. 120--136.

    Research output: Contribution to conferencePaperpeer-review

  78. Unifying Theories of Parallel Programming

    Woodcock, J., Hughes, A. P. & George, C., 2002, p. 24-37.

    Research output: Contribution to conferencePaperpeer-review

  79. Unifying Theories of Interrupts

    McEwan, A. A. & Woodcock, J., 2008, p. 122-141.

    Research output: Contribution to conferencePaperpeer-review

  80. Unifying Theories in ProofPower-Z

    Oliveira, M., Cavalcanti, A. & Woodcock, J., 2006, p. 123-140.

    Research output: Contribution to conferencePaperpeer-review

  81. Unifying Program Refinement Calculi

    Woodcock, J., 2005, p. 76.

    Research output: Contribution to conferencePaperpeer-review

  82. Uniform Boilerplate and List Processing

    Mitchell, N. & Runciman, C., 2007, p. 49--60.

    Research output: Contribution to conferencePaper

  83. Unified Modeling Language for Knowledge Modelling

    Abdullah, M. S., Paige, R. F., Benest, I. D. & Kimble, C., 2005, p. 952-957.

    Research output: Contribution to conferencePaperpeer-review

  84. Unification, Rewriting, and Narrowing on Term Graphs

    Habel, A. & Plump, D., 1995.

    Research output: Contribution to conferencePaper

  85. Understanding Multi-transputer Execution

    Stepney, S., 1988.

    Research output: Contribution to conferencePaper

  86. Uncalibrated Two-View Metrology

    Liang, B., Chen, Z. & Pears, N., 2004, p. 96-99.

    Research output: Contribution to conferencePaperpeer-review

  87. UTP Semantics for Handel-C

    Perna, J. I. & Woodcock, J., 2008, p. 142-160.

    Research output: Contribution to conferencePaperpeer-review

  88. UBB Mining: Finding Unexpected Browsing Behaviour in Clickstream Data to Improve a Web Site's Design

    Ting, I-H., Kimble, C. & Kudenko, D., 2005, p. 179-185.

    Research output: Contribution to conferencePaperpeer-review

  89. Typechecking Z

    Toyn, I., Valentine, S. H., Stepney, S., King, S. & King, S., 2000, p. 264-285.

    Research output: Contribution to conferencePaperpeer-review

  90. Type-checked message passing between functional processes

    Wallace, M. & Runciman, C., 1995, p. 245--254.

    Research output: Contribution to conferencePaper

  91. Type-Constrained Generics for Z

    Valentine, S. H., Toyn, I., Stepney, S. & King, S., 2000, p. 250-263.

    Research output: Contribution to conferencePaperpeer-review

  92. Two-pass heap profiling: a matter of life and death

    Runciman, C. & Röjemo, N., 1996, p. 222--232.

    Research output: Contribution to conferencePaper

  93. Two Refinement Case Studies

    Woodcock, J., 1991, p. 118-140.

    Research output: Contribution to conferencePaperpeer-review

  94. Two Accounts of Scope Availability and Semantic Underspecification

    Willis, A. & Manandhar, S., 1999.

    Research output: Contribution to conferencePaperpeer-review

  95. Tuning the Performance of the MMAS Heuristic

    Ridge, E. & Kudenko, D., 2007, p. 46-60.

    Research output: Contribution to conferencePaperpeer-review

  96. Tuning Jordan Algebra Artificial Chemistries with Probability Spawning Functions

    Faulkner, P. S. M., Sebald, A. A-M. & Stepney, S., Sep 2017, p. 497-504.

    Research output: Contribution to conferencePaperpeer-review

Previous 1 2 3 4 5 6 7 8 ...14 Next