Search research publications and outputs

  1. “Slow down and look”: Desirable aspects of failure in video games, from the perspective of players.

    Foch, C. & Kirman, B., 2 Aug 2021.

    Research output: Contribution to conferencePaperpeer-review

  2. sc Linda for Case Base Retrieval: a Case for Extending the Functionality of sc Linda

    Campbell, D. K. G., Osborne, H. R., Wood, A. M. & Bridge, D. G., 1 Jan 1998.

    Research output: Contribution to conferencePaper

  3. sc AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C. & Wood, A., 1 Oct 1996, p. 686--694.

    Research output: Contribution to conferencePaper

  4. pWCET a Toolset for automatic Worst-Case Execution Time Analysis of Real-Time Embedded Programs

    Bernat, G., Colin, A. & Petters, S. M., 2003.

    Research output: Contribution to conferencePaper

  5. it ransML: A Family of Languages to Model Model Transformations

    Guerra, E., Lara, J. D., Kolovos, D. S., Paige, R. F. & Santos, O. M. D., 2010, p. 106-120.

    Research output: Contribution to conferencePaperpeer-review

  6. aivis - artificial immune network visualisation

    Timmis, J., 2001, p. 61-69.

    Research output: Contribution to conferenceOther

  7. Zero-error subspaces of quantum channels

    Patra, M. K. & Braunstein, S., 5 Aug 2011, p. 104-108.

    Research output: Contribution to conferencePaperpeer-review

  8. ZB 2005: Formal Specification and Development in Z and B

    Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005.

    Research output: Contribution to conferencePaperpeer-review

  9. ZB 2000: Formal Specification and Development in Z and B

    Bowen, J. P., Dunne, S., Galloway, A. & King, S., 2000.

    Research output: Contribution to conferencePaperpeer-review

  10. Z/Eves and the Mondex Electronic Purse

    Woodcock, J. & Freitas, L., 2006, p. 15-34.

    Research output: Contribution to conferencePaperpeer-review

  11. Z and the Refinement Calculus

    King, S., 1990, p. 164-188.

    Research output: Contribution to conferencePaperpeer-review

  12. YETI on the Cloud

    Oriol, M. & Ullah, F., 1 Apr 2010, p. 434--437.

    Research output: Contribution to conferencePaperpeer-review

  13. XRound: Bidirectional Transformations and Unifications Via a Reversible Template Language

    Chivers, H. & Paige, R. F., 2005, p. 205-219.

    Research output: Contribution to conferencePaperpeer-review

  14. Writing Temporally Predictable Code

    Puschner, P. P. & Burns, A., 2002, p. 85-94.

    Research output: Contribution to conferencePaperpeer-review

  15. Widening the Representation Bottleneck: a Functional Implementation of Relational Programming

    Cattrall, D. M. & Runciman, C., 1 Jun 1993, p. 191--200.

    Research output: Contribution to conferencePaper

  16. Who supports the support workers? E-learning for support workers of students with disabilities

    Power, C., Petrie, H. & Swallow, D., 2009, p. 167-178.

    Research output: Contribution to conferencePaperpeer-review

  17. When to Trust Mobile Objects: Access Control in the Jini(tm) Software System

    Crichton, C., Davies, J. & Woodcock, J., 1999, p. 116-125.

    Research output: Contribution to conferencePaperpeer-review

  18. What is Acceptably Safe for Reinforcement Learning?

    Bragg, J. E. & Habli, I., Sep 2018.

    Research output: Contribution to conferencePaperpeer-review

  19. What Is the Complexity of a Network? The Heat Flow-Thermodynamic Depth Approach

    Escolano, F., Lozano, M. A., Hancock, E. R. & Giorgi, D., 2010, p. 286-295.

    Research output: Contribution to conferencePaperpeer-review

  20. What Do Beginning CS Majors Know?

    Pedroni, M., Meyer, B. & Oriol, M., 2009, p. 0-4.

    Research output: Contribution to conferencePaperpeer-review

  21. Web Accessibility Metrics: Effects of Different Computational Approaches

    Freire, A. P., Power, C., Petrie, H., Tanaka, E. H., Rocha, H. V. & Fortes, R. P. D. M., 2009, p. 664-673.

    Research output: Contribution to conferencePaperpeer-review

  22. Web Accessibility: Automatic/Manual Evaluation and Authoring Tools

    Petrie, H., Power, C. & Weber, G., 2008, p. 334-337.

    Research output: Contribution to conferencePaperpeer-review

  23. Weakly Hard Real-time Constraints on Controller Area Network

    Broster, I., Bernat, G. & Burns, A., 2002, p. 134-141.

    Research output: Contribution to conferencePaperpeer-review

  24. Wattsup? motivating reductions in domestic energy consumption using social networks

    Foster, D., Lawson, S., Blythe, M. & Cairns, P. A., 2010, p. 178-187.

    Research output: Contribution to conferencePaperpeer-review

  25. WHERE? Through Life Safety Management: Some Concepts and Issues: Some Concepts and Issues

    McDermid, J. A., 2008.

    Research output: Contribution to conferencePaperpeer-review

  26. WHERE? The Use of Bayesian Networks in Critical Applications

    Hawkins, R. D. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaperpeer-review

  27. WHERE? Risk, Uncertainty and Software Safety

    McDermid, J. A., 2008.

    Research output: Contribution to conferencePaper

  28. Voronoi diagrams, vectors and the visually impaired

    Power, C., Gill, D. & Daley, M., 2006, p. 1247-1252.

    Research output: Contribution to conferencePaperpeer-review

  29. Visualising random boolean network dynamics

    Stepney, S., 2009, p. 1781-1782.

    Research output: Contribution to conferencePaperpeer-review

  30. Visualising Random Boolean Network Dynamics: Effects of Perturbations and Canalisation

    Stepney, S., 2009, p. 369-376.

    Research output: Contribution to conferencePaperpeer-review

  31. Visual Navigation using Planar Homographies

    Liang, B. & Pears, N., 2002, p. 205-210.

    Research output: Contribution to conferencePaperpeer-review

  32. Virtual Learning Environments: Another Barrier to Blended and E-Learning

    Power, C., Petrie, H., Sakharov, V. & Swallow, D., 2010, p. 519-526.

    Research output: Contribution to conferencePaperpeer-review

  33. Virtual Drilling in 3-D Objects Reconstructed by Shape-Based Interpolation

    Bors, A. G., Kechagias, L. & Pitas, I., 2001, p. 729-738.

    Research output: Contribution to conferencePaperpeer-review

  34. Virtual Adaptive Learning Architecture (VALA)

    Metcalfe, A., Snitzer, M. & Austin, J., 2001, p. 7-10.

    Research output: Contribution to conferencePaperpeer-review

  35. Video games as research instruments

    Gámez, E. H. C., Cairns, P. A., Gow, J., Back, J. & Capstick, E., 2010, p. 4493-4496.

    Research output: Contribution to conferencePaperpeer-review

  36. Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository

    Freitas, L., Mokos, K. & Woodcock, J., 2007, p. 290-298.

    Research output: Contribution to conferencePaperpeer-review

  37. Verified Software Grand Challenge

    Woodcock, J., 2006, p. 617-617.

    Research output: Contribution to conferencePaperpeer-review

  38. Verification of Control Systems using Circus

    Cavalcanti, A. & Clayton, P., 2006, p. 269-278.

    Research output: Contribution to conferencePaperpeer-review

  39. Variational segmentation of color images

    Nasios, N. & Bors, A. G., Sep 2005, p. 614-617.

    Research output: Contribution to conferencePaperpeer-review

  40. Validating the unified theory of acceptance and use of technology (UTAUT) tool cross-culturally

    Oshlyansky, L., Cairns, P. A. & Thimbleby, H. W., 2007, p. 83-86.

    Research output: Contribution to conferencePaperpeer-review

  41. Valid Application of EVT in Timing Analysis by Randomising Execution Time Measurements

    Bate, I. J. & Lima, G. M. D. A., 2017. 11 p.

    Research output: Contribution to conferencePaperpeer-review

  42. VLSI Design Techniques for Teaching and Research

    Crispin-Bailey, C. & Sotudeh, R., 1996, p. 1-8. 8 p.

    Research output: Contribution to conferencePaper

  43. Utilizing the Untapped Potential of Indirect Encoding for Neural Networks with MetaLearning

    Katona, A., Lourenco, N., Machado, P., Franks, D. W. & Walker, J. A., 20 Jan 2021, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  44. Using the SPARK Toolset for Showing the Absence of Run-Time Errors in Safety-Critical Software

    Foulger, D. & King, S., 2001, p. 229-240.

    Research output: Contribution to conferencePaperpeer-review

  45. Using the CoSMoS Process to Enhance an Executable Model of Auxin Transport Canalisation

    Garnett, P., Stepney, S., Day, F. & Leyser, O., 2010, p. 9-32.

    Research output: Contribution to conferencePaper

  46. Using feedback to regulate gene expression in a developmental control architecture

    Clegg, K., Stepney, S. & Clarke, T., 2007, p. 966-973.

    Research output: Contribution to conferencePaper

  47. Using data confluences in a distributed network with social monitoring to identify fault conditions

    Aitken, J. M. & Clarke, T., 22 Sep 2006, p. 8.

    Research output: Contribution to conferencePaperpeer-review

  48. Using a Model Merging Language for Reconciling Model Versions

    Engel, K-D., Paige, R. F. & Kolovos, D. S., 2006, p. 143-157.

    Research output: Contribution to conferencePaperpeer-review

Previous 1 2 3 4 5 6 7 8 ...27 Next