Search research publications and outputs

  1. sc Linda for Case Base Retrieval: a Case for Extending the Functionality of sc Linda

    Campbell, D. K. G., Osborne, H. R., Wood, A. M. & Bridge, D. G., 1 Jan 1998.

    Research output: Contribution to conferencePaper

  2. sc AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C. & Wood, A., 1 Oct 1996, p. 686--694.

    Research output: Contribution to conferencePaper

  3. it ransML: A Family of Languages to Model Model Transformations

    Guerra, E., Lara, J. D., Kolovos, D. S., Paige, R. F. & Santos, O. M. D., 2010, p. 106-120.

    Research output: Contribution to conferencePaper

  4. Zero-error subspaces of quantum channels

    Patra, M. K. & Braunstein, S., 5 Aug 2011, p. 104-108.

    Research output: Contribution to conferencePaper

  5. ZB 2005: Formal Specification and Development in Z and B

    Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005.

    Research output: Contribution to conferencePaper

  6. ZB 2000: Formal Specification and Development in Z and B

    Bowen, J. P., Dunne, S., Galloway, A. & King, S., 2000.

    Research output: Contribution to conferencePaper

  7. Z/Eves and the Mondex Electronic Purse

    Woodcock, J. & Freitas, L., 2006, p. 15-34.

    Research output: Contribution to conferencePaper

  8. Z and the Refinement Calculus

    King, S., 1990, p. 164-188.

    Research output: Contribution to conferencePaper

  9. YETI on the Cloud

    Oriol, M. & Ullah, F., 1 Apr 2010, p. 434--437.

    Research output: Contribution to conferencePaper

  10. XRound: Bidirectional Transformations and Unifications Via a Reversible Template Language

    Chivers, H. & Paige, R. F., 2005, p. 205-219.

    Research output: Contribution to conferencePaper

  11. Writing Temporally Predictable Code

    Puschner, P. P. & Burns, A., 2002, p. 85-94.

    Research output: Contribution to conferencePaper

  12. Widening the Representation Bottleneck: a Functional Implementation of Relational Programming

    Cattrall, D. M. & Runciman, C., 1 Jun 1993, p. 191--200.

    Research output: Contribution to conferencePaper

  13. When to Trust Mobile Objects: Access Control in the Jini(tm) Software System

    Crichton, C., Davies, J. & Woodcock, J., 1999, p. 116-125.

    Research output: Contribution to conferencePaper

  14. What is Acceptably Safe for Reinforcement Learning?

    Bragg, J. E. & Habli, I., Sep 2018.

    Research output: Contribution to conferencePaper

  15. What Is the Complexity of a Network? The Heat Flow-Thermodynamic Depth Approach

    Escolano, F., Lozano, M. A., Hancock, E. R. & Giorgi, D., 2010, p. 286-295.

    Research output: Contribution to conferencePaper

  16. What Do Beginning CS Majors Know?

    Pedroni, M., Meyer, B. & Oriol, M., 2009, p. 0-4.

    Research output: Contribution to conferencePaper

  17. Web Accessibility Metrics: Effects of Different Computational Approaches

    Freire, A. P., Power, C., Petrie, H., Tanaka, E. H., Rocha, H. V. & Fortes, R. P. D. M., 2009, p. 664-673.

    Research output: Contribution to conferencePaper

  18. Web Accessibility: Automatic/Manual Evaluation and Authoring Tools

    Petrie, H., Power, C. & Weber, G., 2008, p. 334-337.

    Research output: Contribution to conferencePaper

  19. Weakly Hard Real-time Constraints on Controller Area Network

    Broster, I., Bernat, G. & Burns, A., 2002, p. 134-141.

    Research output: Contribution to conferencePaper

  20. Wattsup? motivating reductions in domestic energy consumption using social networks

    Foster, D., Lawson, S., Blythe, M. & Cairns, P. A., 2010, p. 178-187.

    Research output: Contribution to conferencePaper

  21. WHERE? The Use of Bayesian Networks in Critical Applications

    Hawkins, R. D. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  22. WHERE? Risk, Uncertainty and Software Safety

    McDermid, J. A., 2008.

    Research output: Contribution to conferencePaper

  23. Voronoi diagrams, vectors and the visually impaired

    Power, C., Gill, D. & Daley, M., 2006, p. 1247-1252.

    Research output: Contribution to conferencePaper

  24. Visualising random boolean network dynamics

    Stepney, S., 2009, p. 1781-1782.

    Research output: Contribution to conferencePaper

  25. Visualising Random Boolean Network Dynamics: Effects of Perturbations and Canalisation

    Stepney, S., 2009, p. 369-376.

    Research output: Contribution to conferencePaper

  26. Visual Navigation using Planar Homographies

    Liang, B. & Pears, N., 2002, p. 205-210.

    Research output: Contribution to conferencePaper

  27. Virtual Learning Environments: Another Barrier to Blended and E-Learning

    Power, C., Petrie, H., Sakharov, V. & Swallow, D., 2010, p. 519-526.

    Research output: Contribution to conferencePaper

  28. Virtual Drilling in 3-D Objects Reconstructed by Shape-Based Interpolation

    Bors, A. G., Kechagias, L. & Pitas, I., 2001, p. 729-738.

    Research output: Contribution to conferencePaper

  29. Virtual Adaptive Learning Architecture (VALA)

    Metcalfe, A., Snitzer, M. & Austin, J., 2001, p. 7-10.

    Research output: Contribution to conferencePaper

  30. Video games as research instruments

    Gámez, E. H. C., Cairns, P. A., Gow, J., Back, J. & Capstick, E., 2010, p. 4493-4496.

    Research output: Contribution to conferencePaper

  31. Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository

    Freitas, L., Mokos, K. & Woodcock, J., 2007, p. 290-298.

    Research output: Contribution to conferencePaper

  32. Verified Software Grand Challenge

    Woodcock, J., 2006, p. 617-617.

    Research output: Contribution to conferencePaper

  33. Verification of Control Systems using Circus

    Cavalcanti, A. & Clayton, P., 2006, p. 269-278.

    Research output: Contribution to conferencePaper

  34. Variational segmentation of color images

    Nasios, N. & Bors, A. G., Sep 2005, p. 614-617.

    Research output: Contribution to conferencePaper

  35. Validating the unified theory of acceptance and use of technology (UTAUT) tool cross-culturally

    Oshlyansky, L., Cairns, P. A. & Thimbleby, H. W., 2007, p. 83-86.

    Research output: Contribution to conferencePaper

  36. Valid Application of EVT in Timing Analysis by Randomising Execution Time Measurements

    Bate, I. J. & Lima, G. M. D. A., 2017. 11 p.

    Research output: Contribution to conferencePaper

  37. VLSI Design Techniques for Teaching and Research

    Crispin-Bailey, C. & Sotudeh, R., 1996, p. 1-8. 8 p.

    Research output: Contribution to conferencePaper

  38. Using the SPARK Toolset for Showing the Absence of Run-Time Errors in Safety-Critical Software

    Foulger, D. & King, S., 2001, p. 229-240.

    Research output: Contribution to conferencePaper

  39. Using the CoSMoS Process to Enhance an Executable Model of Auxin Transport Canalisation

    Garnett, P., Stepney, S., Day, F. & Leyser, O., 2010, p. 9-32.

    Research output: Contribution to conferencePaper

  40. Using feedback to regulate gene expression in a developmental control architecture

    Clegg, K., Stepney, S. & Clarke, T., 2007, p. 966-973.

    Research output: Contribution to conferencePaper

  41. Using a Model Merging Language for Reconciling Model Versions

    Engel, K-D., Paige, R. F. & Kolovos, D. S., 2006, p. 143-157.

    Research output: Contribution to conferencePaper

  42. Using VDM with Rely and Guarantee-Conditions: Experiences from a Real Project

    Woodcock, J. & Dickinson, B., 1988, p. 434-458.

    Research output: Contribution to conferencePaper

  43. Using Unified Modeling Language for Conceptual Modelling of Knowledge-Based Systems

    Abdullah, M. S., Benest, I. D., Paige, R. F. & Kimble, C., 2007, p. 438-453.

    Research output: Contribution to conferencePaper

  44. Using UML to Model EAE and Its Regulatory Network

    Read, M., Timmis, J., Andrews, P. S. & Kumar, V., 2009, p. 4-6.

    Research output: Contribution to conferencePaper

  45. Using PVS to Prove a Z Refinement: A Case Study

    Stringer-Calvert, D. W. J., Stepney, S. & Wand, I., 1997, p. 573-588.

    Research output: Contribution to conferencePaper

  46. Using Mutation Analysis to Evolve Subdomains for Random Testing

    Patrick, M. T., Alexander, R., Oriol, M. Y. A. & Clark, J. A., Mar 2013, p. 53-62. 10 p.

    Research output: Contribution to conferencePaper

  47. Using Model Theory to Specify AI Programs

    Frisch, A. M., 1985, p. 148-154.

    Research output: Contribution to conferencePaper

  48. Using Fuzzy Self-Organising Maps for Safety Critical Systems

    Kurd, Z. & Kelly, T., 2004, p. 17-30.

    Research output: Contribution to conferencePaper

  49. Using Document Dimensions for Enhanced Information Retrieval

    Jayasooriya, T. & Manandhar, S., 2004, p. 145-152.

    Research output: Contribution to conferencePaper

  50. Using Diagrams to Give a Formal Specification of Timing Constraints in Z

    Coombes, A., McDermid, J. A., Bowen, J. P. & Nicholls, J. E., 1992, p. 119-130.

    Research output: Contribution to conferencePaper

  51. Using Association Rule Mining to Predict Opponent Deck Content in Android: Netrunner

    Sephton, N. J., Cowling, P. I., Devlin, S., Hodge, V. J. & Slaven, N. H., 20 Sep 2016.

    Research output: Contribution to conferencePaper

  52. Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of Systems

    Hall-May, M. & Kelly, T., 2006, p. 330-343.

    Research output: Contribution to conferencePaper

  53. User-defined clocks in the real-time specification for Java

    Wellings, A. & Martin Schoeberl, M., 2011.

    Research output: Contribution to conferencePaper

  54. User-centred design in the development of a navigational aid for blind travellers

    Petrie, H., Johnson, V., Strothotte, T., Michel, R., Raab, A. & Reichert, L., 1997, p. 220-227.

    Research output: Contribution to conferencePaper

  55. User interface design as systems design

    Thimbleby, H., Blandford, A., Cairns, P., Curzon, P. & Jones, M., 2002, p. 281.

    Research output: Contribution to conferencePaper

  56. User Requirements for Technologies for Personal Communication and Information Use for Deafblind People

    Fisher, W. & Petrie, H., 2002, p. 583-584.

    Research output: Contribution to conferencePaper

  57. User Modelling for Personalized Question Answering

    Quarteroni, S. & Manandhar, S., 2007, p. 386-397.

    Research output: Contribution to conferencePaper

  58. User Modeling for Adaptive Question Answering and Information Retrieval

    Quarteroni, S. & Manandhar, S., 2006, p. 776-781.

    Research output: Contribution to conferencePaper

  59. User Centred Design and the Japanese User

    Oshlyansky, L., Cairns, P. A. & Foy, K., 2004, p. 9-20.

    Research output: Contribution to conferencePaper

  60. User Centred Design and Agile Software Development Processes: Friends or Foes?

    Petrie, H., 2009.

    Research output: Contribution to conferencePaper

  61. Unsupervised Word Sense Disambiguation Using The WWW

    Klapaftis, I. P. & Manandhar, S., 2006, p. 174-183.

    Research output: Contribution to conferencePaper

  62. Unsupervised Lexical Learning with Categorical Grammars Using the LLL Corpus

    Watkinson, S. & Manandhar, S., 1999, p. 218-236.

    Research output: Contribution to conferencePaper

  63. Universal quantum gates for single cooper pair box based quantum computing

    Echternach, P., Williams, CP., Dultz, SC., Braunstein, S. & Dowling, JP., 2001, p. 111-120.

    Research output: Contribution to conferencePaper

  64. Universal Interfaces to Multimedia Documents

    Petrie, H., Fisher, W., Langer, I., Weber, G., Gladstone, K., Rundle, C. & Pyfers, L., 2002, p. 319-324.

    Research output: Contribution to conferencePaper

  65. Unit Testing Model Management Operations

    Kolovos, D. S., Paige, R. F., Rose, L. M. & Polack, F. A. C., 2008.

    Research output: Contribution to conferencePaper

  66. Unifying theories of confidentiality

    Banks, M. J., Jacob, J. L. & Qin, S., 2010, p. 120--136.

    Research output: Contribution to conferencePaper

  67. Unifying Theories of Parallel Programming

    Woodcock, J., Hughes, A. P. & George, C., 2002, p. 24-37.

    Research output: Contribution to conferencePaper

  68. Unifying Theories of Interrupts

    McEwan, A. A. & Woodcock, J., 2008, p. 122-141.

    Research output: Contribution to conferencePaper

  69. Unifying Theories in ProofPower-Z

    Oliveira, M., Cavalcanti, A. & Woodcock, J., 2006, p. 123-140.

    Research output: Contribution to conferencePaper

  70. Unifying Program Refinement Calculi

    Woodcock, J., 2005, p. 76.

    Research output: Contribution to conferencePaper

  71. Uniform Boilerplate and List Processing

    Mitchell, N. & Runciman, C., 2007, p. 49--60.

    Research output: Contribution to conferencePaper

  72. Unified Modeling Language for Knowledge Modelling

    Abdullah, M. S., Paige, R. F., Benest, I. D. & Kimble, C., 2005, p. 952-957.

    Research output: Contribution to conferencePaper

  73. Unification, Rewriting, and Narrowing on Term Graphs

    Habel, A. & Plump, D., 1995.

    Research output: Contribution to conferencePaper

  74. Understanding Multi-transputer Execution

    Stepney, S., 1988.

    Research output: Contribution to conferencePaper

  75. Uncalibrated Two-View Metrology

    Liang, B., Chen, Z. & Pears, N., 2004, p. 96-99.

    Research output: Contribution to conferencePaper

  76. UTP Semantics for Handel-C

    Perna, J. I. & Woodcock, J., 2008, p. 142-160.

    Research output: Contribution to conferencePaper

  77. UBB Mining: Finding Unexpected Browsing Behaviour in Clickstream Data to Improve a Web Site's Design

    Ting, I-H., Kimble, C. & Kudenko, D., 2005, p. 179-185.

    Research output: Contribution to conferencePaper

  78. Typechecking Z

    Toyn, I., Valentine, S. H., Stepney, S., King, S. & King, S., 2000, p. 264-285.

    Research output: Contribution to conferencePaper

  79. Type-checked message passing between functional processes

    Wallace, M. & Runciman, C., 1995, p. 245--254.

    Research output: Contribution to conferencePaper

  80. Type-Constrained Generics for Z

    Valentine, S. H., Toyn, I., Stepney, S. & King, S., 2000, p. 250-263.

    Research output: Contribution to conferencePaper

  81. Two-pass heap profiling: a matter of life and death

    Runciman, C. & Röjemo, N., 1996, p. 222--232.

    Research output: Contribution to conferencePaper

  82. Two Refinement Case Studies

    Woodcock, J., 1991, p. 118-140.

    Research output: Contribution to conferencePaper

  83. Two Accounts of Scope Availability and Semantic Underspecification

    Willis, A. & Manandhar, S., 1999.

    Research output: Contribution to conferencePaper

  84. Tuning the Performance of the MMAS Heuristic

    Ridge, E. & Kudenko, D., 2007, p. 46-60.

    Research output: Contribution to conferencePaper

  85. Tuning Jordan Algebra Artificial Chemistries with Probability Spawning Functions

    Faulkner, P. S. M., Sebald, A. A-M. & Stepney, S., Sep 2017, p. 497-504.

    Research output: Contribution to conferencePaper

  86. Triphone Statistics for Polish Language

    Ziólko, B., Galka, J., Manandhar, S., Wilson, R. C. & Ziólko, M., 5 Oct 2007, p. 63-73.

    Research output: Contribution to conferencePaper

  87. Trends in Systems Safety

    McDermid, J. A. & Lindsay, P. A., 2002, p. 3-8.

    Research output: Contribution to conferencePaper

  88. Transparent hardware synthesis of Java for predictable large-scale distributed systems

    Gray, I., Chan, Y., Garside, J., Audsley, N., Wellings, A. & Wellings, A. J., 1 Sep 2015, p. 1-2. 2 p.

    Research output: Contribution to conferencePaper

  89. Transforming and Refining Abstract Constraint Specifications

    Frisch, A. M., Hnich, B., Miguel, I., Smith, B. M. & Walsh, T., 2005, p. 76-91.

    Research output: Contribution to conferencePaper

  90. Transforming Haskell for Tracing

    Chitil, O., Runciman, C. & Wallace, M., 2003, p. 165--181.

    Research output: Contribution to conferencePaper

  91. Transferring and Retraining Learned Information Filters

    Cohen, W. W. & Kudenko, D., 1997, p. 583-590.

    Research output: Contribution to conferencePaper

  92. Transferring Real-Time Systems Research into Industrial Practice: Four Impact Case Studies

    Davis, R. I., Bate, I. J., Bernat, G., Broster, I., Burns, A., Colin, A., Hutchesson, S. G. & Tracey, N., 3 Jul 2018. 23 p.

    Research output: Contribution to conferencePaper

  93. Training Blind People in the Use of Graphical User Interfaces

    Weber, G., Petrie, H., Kochanek, D. & Morley, S., 1994, p. 25-31.

    Research output: Contribution to conferencePaper

  94. Tracing lazy functional computations using redex trails

    Sparud, J. & Runciman, C., 1997, p. 291--308.

    Research output: Contribution to conferencePaper

  95. Towards the Systematic Generation of Channelling Constraints

    Hernández, B. M. & Frisch, A. M., 2005, p. 859.

    Research output: Contribution to conferencePaper

  96. Towards bio-responsive control for music

    Williams, D. A. H., Murphy, D. T. & Fazenda, B., 19 Dec 2017.

    Research output: Contribution to conferencePaper

  97. Towards an Object Oriented Development Environment for Secure Applications

    Hocking, E. S. & McDermid, J. A., 1990, p. 191-200.

    Research output: Contribution to conferencePaper

  98. Towards an Object Oriented Development Environment for Secure Applciations

    Hocking, E. S., McDermid, J. A. & Eizenberg, G. G., 1990, p. 191-200.

    Research output: Contribution to conferencePaper

  99. Towards an Integrated Model Checker for Railway Signalling Data

    Huber, M. & King, S., 2002, p. 204-223.

    Research output: Contribution to conferencePaper

  100. Towards an Executable Model of Auxin Transport Canalisation

    Garnett, P., Stepney, S. & Leyser, O., 2008, p. 63-91.

    Research output: Contribution to conferencePaper

  101. Towards an Agile Process for Building Software Product Lines

    Paige, R. F., Wang, X., Stephenson, Z. R., Brooke, P. J., Abrahamsson, P., Marchesi, M. & Succi, G., 2006, p. 198-199. 11 p.

    Research output: Contribution to conferencePaper

  102. Towards a Z Method: Axiomatic Specification in Z

    Hall, J. G. & McDermid, J. A., 1994, p. 213-229.

    Research output: Contribution to conferencePaper

  103. Towards a Principled Design of Bio-inspired Solutions to Adaptive Information Filtering

    Azmi, N. F. M., Timmis, J. & Polack, F., 2010, p. 315-316.

    Research output: Contribution to conferencePaper

  104. Towards a Practical Process for Automated Safety Analysis

    Lisagor, O., McDermid, J. A. & Pumfrey, D. J., 2006.

    Research output: Contribution to conferencePaper

  105. Towards Using Simulation to Evaluate Safety Policy for Systems of Systems

    Alexander, R., Hall-May, M., Despotou, G. & Kelly, T., 2005.

    Research output: Contribution to conferencePaper

  106. Towards Self-Healing Swarm Robotic Systems Inspired by Granuloma Formation

    Ismail, A. R. & Timmis, J., 2010, p. 313-314.

    Research output: Contribution to conferencePaper

  107. Towards Mobile Processes in Unifying Theories

    Tang, X. & Woodcock, J., 2004, p. 44-53.

    Research output: Contribution to conferencePaper

  108. Towards Inductive Constraint Logic Programming

    Anthony, S., Frisch, A. M. & Gent, I., 1 Apr 1996, p. 3-4.

    Research output: Contribution to conferencePaper

  109. Towards Evidence-Based Architectural Design for Safety-Critical Software Applications

    Wu, W. & Kelly, T., 2006, p. 383-408.

    Research output: Contribution to conferencePaper

  110. Towards Assurance Measures for High Integrity Software

    McDermid, J. A., 1989, p. 3A/1-3A/9.

    Research output: Contribution to conferencePaper

  111. Towards Agile Engineering of High-Integrity Systems

    Paige, R. F., Charalambous, R., Ge, X. & Brooke, P. J., 2008, p. 30-43. 13 p.

    Research output: Contribution to conferencePaper

  112. Toward Information-Centric Software-Defined Cellular Networks

    Vasilakis, V., Moscholios, I., Alzahrani, B. & Logothetis, M., 24 May 2017, (Accepted/In press). 7 p.

    Research output: Contribution to conferencePaper

  113. Tools that support human-human communication in the automated office

    Benest, I. D. & Dukic, D., 1990, p. 853-859.

    Research output: Contribution to conferencePaper

  114. Tool Support for High Integrity Ada Software

    Hutcheon, A. D., Jordan, D. T., McDermid, J. A., Pierce, R. H., Wand, I. C., Jepson, B. J. & Toussaint, M., 1994, p. 63-75.

    Research output: Contribution to conferencePaper

  115. Through Life Safety Management

    McDermid, J. A., 2007.

    Research output: Contribution to conferencePaper

  116. Three-Dimensional Face Recognition: A Fishersurface Approach

    Heseltine, T., Pears, N. & Austin, J., 2004, p. 684-691.

    Research output: Contribution to conferencePaper

  117. Three Dimensional Auditory Display: Issues in Applications for Visually Impaired Students

    Cooper, M. & Petrie, H., 2004.

    Research output: Contribution to conferencePaper

  118. Threat Modelling for Mobile ad hoc and Sensor Networks

    Clark, J. A., Murdoch, J., McDermid, J. A., Sen, S., Chivers, H. R., Worthington, O. & Rohatgi, P., 2007.

    Research output: Contribution to conferencePaper

  119. There's always one! modelling outlying user performance

    Schiller, J. & Cairns, P. A., 2008, p. 3513-3518.

    Research output: Contribution to conferencePaper

  120. Theories of Programming and Formal Methods - Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday

    Liu, Z., Woodcock, J. & Zhu, H., 2013, p. 1-422. 422 p.

    Research output: Contribution to conferencePaper

  121. Theoretical and Empirical Analysis of Reward Shaping in Reinforcement Learning

    Grzes, M. & Kudenko, D., 2009, p. 337-344.

    Research output: Contribution to conferencePaper

  122. Theoretical Aspects of Computing - ICTAC 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings

    Liu, Z., Woodcock, J. & Zhu, H., 2013, p. 1-455. 455 p.

    Research output: Contribution to conferencePaper

  123. The role of the representational entity in physical computing

    Stepney, S. & Kendon, V., 2019, p. 219–231. 13 p.

    Research output: Contribution to conferencePaper

  124. The role of structure and complexity on Reservoir Computing quality

    Dale, M., Dewhirst, J. D., O'Keefe, S. E. M., Sebald, A. A-M., Stepney, S. & Trefzer, M. A., 2019, p. 52–64. 13 p.

    Research output: Contribution to conferencePaper

  125. The identification and extraction of itemset support defined by the weight matrix of a Self-Organising Map

    Baez-Monroy, V. O. & O'Keefe, S., 2006, p. 3518-3525.

    Research output: Contribution to conferencePaper

  126. The generation of speech for a search guide

    Cook, N. J. & Benest, I. D., 2001, p. 1739-1742.

    Research output: Contribution to conferencePaper

  127. The evaluation of accessibility, usability and user experience

    Petrie, H. & Bevan, N., 2009.

    Research output: Contribution to conferencePaper

  128. The effects of local variable optimisation in A C-based stack processor environment

    Crispin-Bailey, C., Sotudeh, R. & Ould-Khaoua, M., 1994. 6 p.

    Research output: Contribution to conferencePaper

  129. The effect of lip and arm synchronization on embodiment: A pilot study

    Collingwoode-Williams, T., Gillies, M., McCall, C. A. & Pan, X., 2017.

    Research output: Contribution to conferencePaper

  130. The effect of global instructions on think-aloud testing

    McDonald, S. & Petrie, H., 27 Apr 2013, p. 2941 - 2944. 4 p.

    Research output: Contribution to conferencePaper

  131. The design of S-boxes by simulated annealing

    Clark, J. A., Jacob, J. L. & Stepney, S., 2004, p. 1533--1537.

    Research output: Contribution to conferencePaper

  132. The challenges faced by academia preparing students for industry: what we teach and what we do

    Oshlyansky, L., Cairns, P. A., Sasse, A. & Harrison, C., 2008, p. 203-204.

    Research output: Contribution to conferencePaper

  133. The bits between the lambdas: binary data in a lazy functional language

    Wallace, M. & Runciman, C., 1 Oct 1998, p. 107--117.

    Research output: Contribution to conferencePaper

  134. The YorkQA Prototype Question Answering System

    Boni, M. D., Jara-Valencia, J-L. & Manandhar, S., 2002.

    Research output: Contribution to conferencePaper

  135. The View Glue

    Radjenovic, A. & Paige, R. F., 2006, p. 66-88. 22 p.

    Research output: Contribution to conferencePaper

  136. The Varieties of Refinement

    Jacob, J. L., Morris, J. M. & Shaw, R. C., 1991, p. 441--455.

    Research output: Contribution to conferencePaper

  137. The Value of Verification: Positive Experience of Industrial Proof

    King, S., Hammond, J., Chapman, R. & Pryor, A., 1999, p. 1527-1545.

    Research output: Contribution to conferencePaper

  138. The Use of Z

    Barden, R., Stepney, S., Cooper, D. & Nicholls, J. E., 1991, p. 99-124.

    Research output: Contribution to conferencePaper

  139. The Use of Sentence Similarity as a Semantic Relevance Metric for Question Answering

    Boni, M. D. & Manandhar, S., 2003, p. 138-144.

    Research output: Contribution to conferencePaper

  140. The Use of Model Transformation in the INESS Project

    Santos, O. M. D., Woodcock, J., Paige, R. F. & King, S., 2009, p. 147-165.

    Research output: Contribution to conferencePaper

  141. The Usability of Accessibility Evaluation Tools

    Petrie, H., King, N., Velasco, C. A., Gappa, H. & Nordbrock, G., 2007, p. 124-132.

    Research output: Contribution to conferencePaper

  142. The Temporal Knapsack Problem and Its Solution

    Bartlett, M., Frisch, A. M., Hamadi, Y., Miguel, I., Tarim, A. & Unsworth, C., 2005, p. 34-48.

    Research output: Contribution to conferencePaper

  143. The Structure of Permissions: A Normative Framework for Access Rights

    Morris, P., McDermid, J. A., Landwehr, C. E. & Jajodia, S., 1991, p. 77-97.

    Research output: Contribution to conferencePaper

  144. The Steam Boiler in a Unified Theory of Z and CSP

    Woodcock, J. & Cavalcanti, A., 2001, p. 291-298.

    Research output: Contribution to conferencePaper

  145. The State of Solutions for Autonomous Systems Safety

    Alexander, R. D., Ashmore, R. & Banks, A., 6 Feb 2018.

    Research output: Contribution to conferencePaper

  146. The State of Practice in System Safety Research Evaluation

    Rae, A., Alexander, R. & Nicholson, M., Oct 2010.

    Research output: Contribution to conferencePaper

  147. The Space Usage Problem: An Evaluation Kit for Graph-Reduction Semantics

    Bakewell, A., Runciman, C. & Gilmore, S., 2000, p. 115--128.

    Research output: Contribution to conferencePaper

  148. The Single Model Principle

    Paige, R. F. & Ostroff, J. S., 2001, p. 292-293.

    Research output: Contribution to conferencePaper

  149. The Simulink/Stateflow Analyser

    Galloway, A. J., Toyn, I., Iwu, F. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  150. The Semantics of Circus

    Woodcock, J. & Cavalcanti, A., 2002, p. 184-203.

    Research output: Contribution to conferencePaper

  151. The SPEKE Protocol Revisited

    Hao, F. & Shahandashti, S. F., 2014, p. 26–38.

    Research output: Contribution to conferencePaper

  152. The SCOOP Concurrency Model in Java-like Languages

    Torshizi, F. A., Ostroff, J. S., Paige, R. F. & Chechik, M., 2009, p. 7-27.

    Research output: Contribution to conferencePaper

  153. The SAZ Project: Integrating SSADM and Z

    Polack, F., Whiston, M. & Mander, K., 1993, p. 541-557.

    Research output: Contribution to conferencePaper

  154. The Role-based Access Control System of a European Bank: a case study and discussion

    Schaad, A., Moffett, J., Jacob, J. & Jaeger, T., 1 May 2001, p. 3--9.

    Research output: Contribution to conferencePaper

  155. The Role of the Human in an Autonomous System

    Alexander, R. D., Herbert, N. J. & Kelly, T. P., 2009.

    Research output: Contribution to conferencePaper

  156. The Role of Dependency Links in Ensuring Architectural View Consistency

    Radjenovic, A. & Paige, R. F., 2008, p. 199-208. 9 p.

    Research output: Contribution to conferencePaper

  157. The Rigorous Generation of Java Mutation Operators using HAZOP

    Kim, S-W., Clark, J. A. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  158. The Refinement Calculus

    Woodcock, J., 1991, p. 80-95.

    Research output: Contribution to conferencePaper

  159. The Reduceron: Widening the von Neumann Bottleneck for Graph Reduction using an FPGA

    Naylor, M. & Runciman, C., 2008, p. 129-146.

    Research output: Contribution to conferencePaper

  160. The Protein Processor Associative Memory on a Robotic Hand-Eye Coordination Task

    Qadir, O., Timmis, J., Tempesti, G. & Tyrrell, A., Dec 2011. 6 p.

    Research output: Contribution to conferencePaper

  161. The Pi-puck extension board: a Raspberry Pi interface for the e-puck robot platform

    Millard, A. G., Joyce, R. A., Hilder, J. A., Fleseriu, C., Newbrook, L., Li, W., McDaid, L. & Halliday, D. M., Sep 2017.

    Research output: Contribution to conferencePaper

  162. The Phish in the Pond: scam emails as literature

    Clark, J. A. & Blythe, M., 10 Apr 2010.

    Research output: Contribution to conferencePaper

  163. The PISA architecture, a Viable platform for the Superscalar Execution of Statically Scheduled Stack Code

    Crispin-Bailey, C. & Alli, S., 31 Aug 2005, p. 23-26. 4 p.

    Research output: Contribution to conferencePaper

  164. The Organisation of Parallel Processing Machines

    Wood, A. M., Becker, J. & Eisele, I., 1983, p. 132-144.

    Research output: Contribution to conferencePaper

  165. The Moral Responsibility Gap and the Increasing Autonomy of Systems

    Porter, Z. L. M., Habli, I., Monkhouse, H. E. & Bragg, J. E., 18 Sep 2018.

    Research output: Contribution to conferencePaper

  166. The Miracle of Reactive Programming

    Woodcock, J., 2008, p. 202-217.

    Research output: Contribution to conferencePaper

  167. The Interaction Between Inference and Branching Heuristics

    Drake, L. & Frisch, A. M., 2003, p. 370-382.

    Research output: Contribution to conferencePaper

  168. The Haptic Perception of Texture in Virtual Environments: An Investigation with Two Devices

    Penn, P., Petrie, H., Colwell, C., Kornbrot, D., Furner, S. & Hardwick, A., 2000, p. 25-30.

    Research output: Contribution to conferencePaper

  169. The HEAT/ACT Preliminary Safety Case: A Case Study in the Use of Goal Structuring Notation

    Chinneck, P., Pumfrey, D. J., McDermid, J. A. & Cant, T., 2004.

    Research output: Contribution to conferencePaper

  170. The Grand Challenge of Scalability for Model Driven Engineering

    Kolovos, D. S., Paige, R. F. & Polack, F., 2008, p. 48-53.

    Research output: Contribution to conferencePaper

  171. The Formal Specification in Z of Defence Standard 00-56

    Woodcock, J., Gardiner, P. H. B. & Hulance, J. R., 1994, p. 9-28.

    Research output: Contribution to conferencePaper

  172. The Formal Analysis of Ada Programs

    Hutcheon, A. D., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1993.

    Research output: Contribution to conferencePaper

  173. The Fading Concept in Tuple-Space Systems

    Menezes, R. & Wood, A. M., 2006, p. 440--444.

    Research output: Contribution to conferencePaper

  174. The Epsilon Object Language (EOL)

    Kolovos, D. S., Paige, R. F. & Polack, F., 2006, p. 128-142.

    Research output: Contribution to conferencePaper

  175. The Epsilon Generation Language

    Rose, L. M., Paige, R. F., Kolovos, D. S. & Polack, F. A. C., 2008, p. 1--16.

    Research output: Contribution to conferencePaper

  176. The Effect of Intra-Block Scheduling on Stack Processor Behaviour

    Crispin-Bailey, C. & Sotudeh, R., 1995. 6 p.

    Research output: Contribution to conferencePaper

  177. The Development of Reusable Engine Control Technology for Application in Future Engines

    Hill, J. V., McDermid, J. A., Rimmer, R. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  178. The Design of a Tool-Supported Graphical Notation for Timed CSP

    Brooke, P. J. & Paige, R. F., 2002, p. 299-318.

    Research output: Contribution to conferencePaper

  179. The Design of ESSENCE: A Constraint Language for Specifying Combinatorial Problems

    Frisch, A. M., Grum, M., Jefferson, C., Hernández, B. M. & Miguel, I., 2007, p. 80-87.

    Research output: Contribution to conferencePaper

  180. The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data

    Austin, J., Giacinto, G., Kanellopoulos, I., Lees, K., Roli, F., Vernazza, G. & Wilkinson, G., 1997, p. 765-772.

    Research output: Contribution to conferencePaper

  181. The Basic Integrity Theorem

    Jacob, J. L., 1 Jun 1991, p. 89--97.

    Research output: Contribution to conferencePaper

  182. The Artificial Epigenetic Network

    Turner, A. P., Lones, M. A., Fuente, L. A., Stepney, S., Caves, L. & Tyrrell, A., Apr 2013, p. 66-72.

    Research output: Contribution to conferencePaper

  183. Testing, Proof and Automation: An Integrated Approach

    Burton, S., Clark, J. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  184. Testing for Refinement in CSP

    Cavalcanti, A. & Gaudel, M-C., 2007, p. 151-170.

    Research output: Contribution to conferencePaper

  185. Testing as Abstraction

    Stepney, S., 1995, p. 137-151.

    Research output: Contribution to conferencePaper

  186. Testing and Tracing Lazy Functional Programs using QuickCheck and Hat

    Claessen, K., Runciman, C., Chitil, O., Hughes, R. J. M. & Wallace, M., 1 Feb 2003, p. 59--99.

    Research output: Contribution to conferencePaper

  187. Testing . NET Code with YETI

    Oriol, M. & Tassis, S., 2010.

    Research output: Contribution to conferencePaper

  188. Test Case Management Tools for Accessibility Testing

    Herramhof, S., Petrie, H., Strobbe, C., Vlachogiannis, E., Weimann, K., Weber, G. & Velasco, C. A., 2006, p. 215-222.

    Research output: Contribution to conferencePaper

  189. Tenuta: Strategies for Providing Guidance on Usability and Accessibility

    Bevan, N., Petrie, H. & Claridge, N., 2007, p. 20-27.

    Research output: Contribution to conferencePaper

  190. Tensor MRI Regularization via Graph Diffusion

    Zhang, F. & Hancock, E. R., 2006, p. 589-598.

    Research output: Contribution to conferencePaper

  191. Tension, what tension? Website accessibility and visual design

    Petrie, H., Hamilton, F. & King, N., 2004, p. 13-18.

    Research output: Contribution to conferencePaper

  192. Tenori-on stage: YouTube as performance space

    Blythe, M. & Cairns, P. A., 2010, p. 72-81.

    Research output: Contribution to conferencePaper

  193. Ten Steps Towards Systematic Requirements Reuse

    Lam, W., McDermid, J. A., Vickers, A. & Mylopoulos, J., 1997, p. 6-15.

    Research output: Contribution to conferencePaper

  194. Technology Transfer by Case Study: an Experience Report

    Whittle, B. R., Vickers, A. J. & McDermid, J. A., 1996, p. 211-218.

    Research output: Contribution to conferencePaper

  195. Techniques for simplifying the visualisation of graph reduction

    Foubister, S. P. & Runciman, C., 1995, p. 66--77.

    Research output: Contribution to conferencePaper

  196. Teaching post-classical computation: extended abstract

    Stepney, S., 2004, p. 3.

    Research output: Contribution to conferencePaper

  197. Teaching Reuse through a supportive life-cycle

    Burd, E. L., McDermid, J. A., Whittle, B. R., O'Callaghan, A. & Leigh, M., 1994.

    Research output: Contribution to conferencePaper

  198. Teaching Reuse in a Supportive Life-Cycle

    Burd, E. L., McDermid, J. A. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  199. TeDUB: A System for Presenting and Exploring Technical Drawings for Blind People

    Petrie, H., Schlieder, C., Blenkhorn, P., Evans, D. G., King, A., O'Neill, A-M., Ioannidis, G. T., Gallagher, B., Crombie, D., Mager, R. & Alafaci, M., 2002, p. 537-539.

    Research output: Contribution to conferencePaper

  200. Taking Our Own Medicine: Applying the Refinement Calculus to State-Rich Refinement Model Checking

    Freitas, L., Cavalcanti, A. & Woodcock, J., 2006, p. 697-716.

    Research output: Contribution to conferencePaper

  201. Tailoring Generic Systems Engineering Processes: An Agent-Oriented Method

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 1999, p. 1011-1020.

    Research output: Contribution to conferencePaper

  202. Tagged sets: A secure and transparent coordination medium

    Oriol, M. & Hicks, M., 2005, p. 252--267.

    Research output: Contribution to conferencePaper

  203. Tactile-based direct manipulation in GUIs for blind users

    Petrie, H., Morley, S. & Weber, G., 1995, p. 428-429.

    Research output: Contribution to conferencePaper

  204. TARDIS/Z: A Technique for Formal Specification of High Integrity and Real Time Systems

    Coombes, A. C., Burns, A., McDermid, J. A. & Wichmann, B. A., 1991, p. 1-6.

    Research output: Contribution to conferencePaper

  205. TARDIS: An Architectural Framework for Timely and Reliable Distributed Information Systems

    Burns, A., Lister, A. M., McDermid, J. A. & Bailes, P. A., 1991, p. 1-15.

    Research output: Contribution to conferencePaper

  206. T Cell Receptor Signalling Inspired Kernel Density Estimation and Anomaly Detection

    Owens, N. D. L., Greensted, A., Timmis, J. & Tyrrell, A., Aug 2009, p. 122-135. 13 p.

    Research output: Contribution to conferencePaper

  207. Systems Development Using Z Generics

    Polack, F. & Stepney, S., 1999, p. 1048-1067.

    Research output: Contribution to conferencePaper

  208. Systematic evaluation of test failure results

    Ciupa, I., Liu, L. L., Oriol, M., Leitner, A. & Borca-Muresan, R., 2007, p. 2--3.

    Research output: Contribution to conferencePaper

  209. Systematic Anticipation and Validation of Scenarios of Failure Propagation and Mitigation in PLC Controlled Processes

    Papadopoulos, Y., Mauri, G. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  210. System Modelling for Concurrent Safety Analysis

    Murdoch, J., McDermid, J. A., Wilkinson, P. & Reid, S., 1997.

    Research output: Contribution to conferencePaper

  211. Symmetry Breaking as a Prelude to Implied Constraints: A Constraint Modelling Pattern

    Frisch, A. M., Jefferson, C. & Miguel, I., 2004, p. 171-175. 4 p.

    Research output: Contribution to conferencePaper

  212. Sustainable Scheduling Analysis

    Baruah, S. K. & Burns, A., 2006, p. 159-168.

    Research output: Contribution to conferencePaper

  213. Surface Reconstruction Using Polarization and Photometric Stereo

    Atkinson, G. & Hancock, E. R., 2007, p. 466-473.

    Research output: Contribution to conferencePaper

  214. Surface Integration: Two Statistical Approaches

    Smith, W. A. P. & Hancock, E. R., 2007, p. 343-350.

    Research output: Contribution to conferencePaper

  215. Supporting Nested Resources in MrsP

    Garrido, J., Zhao, S., Burns, A. & Wellings, A. J., 2017, p. 73-86. 14 p.

    Research output: Contribution to conferencePaper

  216. Supporting Deliberative Real-Time AI Systems: A Fixed Priority Scheduling Approach

    Chu, Y. & Burns, A., 2007, p. 259-268.

    Research output: Contribution to conferencePaper

  217. Supporting Deadlines and EDF Scheduling in Ada

    Burns, A. & Wellings, A. J., 2004, p. 156-165.

    Research output: Contribution to conferencePaper

  218. Support for Using Z

    Barden, R., Stepney, S., Bowen, J. P. & Nicholls, J. E., 1992, p. 255-280.

    Research output: Contribution to conferencePaper

  219. Suggestions for stream based parallel systems in Ada

    Ward, M. & Audsley, N. C., 17 Apr 2007, p. 82-87. 6 p.

    Research output: Contribution to conferencePaper

  220. Structuring Safety Policy Decomposition

    Hall-May, M. & Kelly, T., 2006.

    Research output: Contribution to conferencePaper

  221. Structuring Safety Cases for Autonomous Systems

    Alexander, R., Herbert, N. & Kelly, T., 2008.

    Research output: Contribution to conferencePaper

  222. Structured Analysis: A Draft Method for Writing Z Specifications

    Polack, F., Whiston, M. & Hitchcock, P., 1991, p. 287-328.

    Research output: Contribution to conferencePaper

  223. Structurally Gated Pairwise Geometric Histograms for Shape Indexing

    Huet, B. & Hancock, E. R., 1997.

    Research output: Contribution to conferencePaper

  224. Structural, Syntactic, and Statistical Pattern Recognition - Joint IAPR International Workshop, SSPRSPR 2012, Hiroshima, Japan, November 7-9, 2012. Proceedings

    Gimel'farb, G. L., Hancock, E. R., Imiya, A., Kuijper, A., Kudo, M., Omachi, S., Windeatt, T. & Yamada, K., 2012.

    Research output: Contribution to conferencePaper

  225. Structural Engineering and Software: Certainty, Uncertainty and Probability

    McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  226. Strengthening inferred specifications using search based testing

    Ghani, K. & Clark, JA., 2008.

    Research output: Contribution to conferencePaper

  227. State Visibility and Communication in Unifying Theories of Programming

    Butterfield, A., Gancarski, P. & Woodcock, J., 2009, p. 47-54.

    Research output: Contribution to conferencePaper

  228. Splitting Rate Modelling for Intelligent Transport Systems

    Smith, M., Mounce, R., Hollier, G. P., Hodge, V. J. & Austin, J., 22 Jun 2011.

    Research output: Contribution to conferencePaper

  229. Spherical Embedding and Classification

    Wilson, R. C. & Hancock, E. R., 2010, p. 589-599.

    Research output: Contribution to conferencePaper

  230. Spectral Generative Models for Graphs

    White, D. & Wilson, R. C., 10 Sep 2007, p. 35-42. 7 p.

    Research output: Contribution to conferencePaper

  231. Specifying Security in CSCW Systems

    Foley, S. N. & Jacob, J. L., 1997, p. 136--145.

    Research output: Contribution to conferencePaper

  232. Specifying Confidentiality in Circus

    Banks, M. J. & Jacob, J. L., 2011, p. 215-230.

    Research output: Contribution to conferencePaper

  233. Specification-Driven Design with Eiffel and Agents for Teaching Lightweight Formal Methods

    Paige, R. F. & Ostroff, J. S., 2004, p. 107-123.

    Research output: Contribution to conferencePaper

  234. Specification of Real-Time Systems: A View Oriented Approach

    Barroca, L. M. & McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  235. Specification and Refinement using a Heterogeneous Notation for Concurrency and Communication

    Paige, R. F., 1999, p. 353-372.

    Research output: Contribution to conferencePaper

  236. Specification Coverage for Testing in Circus

    Cavalcanti, A. & Gaudel, M-C., 2010, p. 1-45.

    Research output: Contribution to conferencePaper

  237. Sonification Strategies for Examination of Biological Cells

    Edwards, A., Hunt, A., Hines, G., Jackson, V., Podvoiskis, A., Roseblade, R. & Stammers, J., 1 Jun 2010.

    Research output: Contribution to conferencePaper

  238. Solving the multiple-rd problem

    Rowstron, A. & Wood, A., 1996, p. 357--367.

    Research output: Contribution to conferencePaper

  239. Solving Non-Boolean Satisfiability Problems with Stochastic Local Search

    Frisch, A. M., Peugniez, T. J., Doggett, A. & Nightingale, P., 2001, p. 282-290.

    Research output: Contribution to conferencePaper

  240. Software Vaccination: An Artificial Immune System Approach to Mutation Testing

    May, P., Mander, K. & Timmis, J., 2003, p. 81-92.

    Research output: Contribution to conferencePaper

  241. Software Safety Arguments: Towards a Systematic Categorsation of Evidence

    Weaver, R., McDermid, J. A. & Kelly, T. P., 2002.

    Research output: Contribution to conferencePaper

  242. Software Safety: Why is there no Consensus?

    McDermid, J. A. & Pumfrey, D. J., 2004.

    Research output: Contribution to conferencePaper

  243. Software Safety: Why is there no Consensus?

    McDermid, J. A. & Pumfrey, D. J., 2001.

    Research output: Contribution to conferencePaper

  244. Software Quality Assurance Using the SAZ Method

    Polack, F. & Mander, K., 1994, p. 230-249.

    Research output: Contribution to conferencePaper

  245. Software Assurance Arguments vs Formal Mathematical Arguments

    Habli, I., Stephenson, Z. R., Kelly, T. P. & McDermid, J. A., Nov 2009.

    Research output: Contribution to conferencePaper

  246. Social Learning through Evolution of Language

    Kazakov, D. & Bartlett, M., 2003, p. 397-408.

    Research output: Contribution to conferencePaper

  247. Smart Devices and Software Agents: The Basics of Good Behaviour

    Chivers, H., Clark, J. A., Stepney, S., Hutter, D., Müller, G., Stephan, W. & Ullmann, M., 2003, p. 39-52.

    Research output: Contribution to conferencePaper

  248. Slotted-Circus

    Butterfield, A., Sherif, A. & Woodcock, J., 2007, p. 75-97.

    Research output: Contribution to conferencePaper

  249. Skills and Technologies for the Development and Evaluation of Safety Critical Applications

    McDermid, J. A. & Daniels, B. K., 1990, p. 163-172.

    Research output: Contribution to conferencePaper

  250. Sketching sketching: outlines of a collaborative design method

    Craft, B. & Cairns, P. A., 2009, p. 65-72.

    Research output: Contribution to conferencePaper

  251. Simulation and Prediction in Safety Case Evidence

    Alexander, R. & Kelly, T., 2008.

    Research output: Contribution to conferencePaper

  252. Simulating biology: towards understanding what the simulation shows

    Andrews, P. S., Polack, F., Sampson, A. T., Timmis, J. & Coles, M., 2008, p. 93-123.

    Research output: Contribution to conferencePaper

  253. Short-Term Traffic Prediction Using a Binary Neural Network.

    Hodge, V. J., Krishnan, R., Jackson, T., Austin, J. & Polak, J., 5 Jan 2011.

    Research output: Contribution to conferencePaper

  254. Separating Lambertian and Specular Reflectance Components using Iterated Conditional Modes

    Ragheb, H. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  255. Semi-supervised Feature Selection for Gender Classification

    Wu, J., Smith, W. A. P. & Hancock, E. R., 2010, p. 23-33.

    Research output: Contribution to conferencePaper

  256. Semi-Supervised Graph Rewiring with the Dirichlet Principle

    Curado, M., Escolano, F., Lozano, M. A. & Hancock, E. R., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  257. Semi-Clairvoyance in Mixed-Criticality Scheduling

    Agrawa, K., Baruah, S. & Burns, A., 7 Oct 2019, (Accepted/In press).

    Research output: Contribution to conferencePaper

  258. Self-Similar Convolution Image Distribution Histograms as Invariant Identifiers

    Tuke, C. E., O'Keefe, S. E. M. & Austin, J., 2001, p. 501-510. 10 p.

    Research output: Contribution to conferencePaper

  259. Segregation with Communication

    Cooper, D. & Stepney, S., 2000, p. 451-470.

    Research output: Contribution to conferencePaper

  260. Segmentation of Biological Cell Images for Sonification

    Edwards, A. D. N., Hines, G. & Hunt, A., 1 May 2008, p. 128 -132.

    Research output: Contribution to conferencePaper

  261. Segmentation and Estimation of the Optical Flow

    Bors, A. G. & Pitas, I., 1995, p. 680-685.

    Research output: Contribution to conferencePaper

  262. Security requirements modelling for virtualized 5G small cell networks

    Vasilakis, V., Mouratidis, H., Panaousis, E., Moscholios, I. & Logothetis, M., May 2017. 5 p.

    Research output: Contribution to conferencePaper

  263. Security of two-way quantum cryptography against asymmetric attacks - art. no. 709215

    Pirandola, S., Mancini, S., Lloyd, S. & Braunstein, S. L., 2008, p. 9215.

    Research output: Contribution to conferencePaper

  264. Security and Normative Rights

    Morris, P. & McDermid, J. A., 1991, p. 294-314.

    Research output: Contribution to conferencePaper

  265. Security Specifications

    Jacob, J. L., 1 Apr 1988, p. 14--23.

    Research output: Contribution to conferencePaper

  266. Security Policies for Integrated Project Support Environments

    McDermid, J. A. & Hocking, E. S., 1989, p. 41-74.

    Research output: Contribution to conferencePaper

  267. Security Models and Enterprise Models

    Dobson, J. E. & McDermid, J. A., 1988, p. 1-39.

    Research output: Contribution to conferencePaper

  268. Security Analysis of Integrated Diffie-Hellman Digital Signature Algorithm Protocols

    Vasilakis, V., Alohali, B., Moscholios, I. & Logothetis, M., 30 Apr 2017, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  269. Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment

    Ge, X., Polack, F. & Laleau, R., 2004, p. 234-247.

    Research output: Contribution to conferencePaper

  270. Secure Composition of Systems

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  271. Searching for Risk in Large Complex Spaces

    Clegg, K. D. & Alexander, R., Apr 2013, p. 753-762 .

    Research output: Contribution to conferencePaper

  272. Scribe Identification in Medieval English Manuscripts

    Gillam, T., Wilson, R. C. & Clark, J. A., 23 Aug 2010, p. 1880-1883. 4 p.

    Research output: Contribution to conferencePaper

  273. Screening the parameters affecting heuristic performance

    Ridge, E. & Kudenko, D., 2007, p. 180.

    Research output: Contribution to conferencePaper

  274. Scoped Coordination in Open Distributed Systems

    Merrick, I. & Wood, A. M., 2000, p. 311-316.

    Research output: Contribution to conferencePaper

  275. Schemas in Directed Emergent Drama

    Arinbjarnar, M. & Kudenko, D., 2008, p. 180-185.

    Research output: Contribution to conferencePaper

  276. Scheduling Fixed-Priority Hard Real-Time Tasks in the Presence of Faults

    Lima, G. M. D. A. & Burns, A., 2005, p. 154-173.

    Research output: Contribution to conferencePaper

  277. Safety validation of sense and avoid algorithms using simulation and evolutionary search

    Zou, X., Alexander, R. & McDermid, J. A., 2014. 16 p.

    Research output: Contribution to conferencePaper

  278. Safety cases for software application reuse

    Fenelon, P., Kelly, T. P., McDermid., J. A. & Rabe, G., 1995, p. 419-436.

    Research output: Contribution to conferencePaper

  279. Safety Tactics for Software Architecture Design

    Wu, W. & Kelly, T., 2004, p. 368-375.

    Research output: Contribution to conferencePaper

  280. Safety Lifecycle for Developing Safety Critical Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 77-91.

    Research output: Contribution to conferencePaper

  281. Safety Lifecycle Activities for Autonomous Systems Development

    Alexander, R., Gorry, B. & Kelly, T., 2010.

    Research output: Contribution to conferencePaper

  282. Safety Critical Systems in Aerospace

    McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  283. Safety Cases and Safety Arguments

    McDermid, J. A. & Anderson, T., 1992.

    Research output: Contribution to conferencePaper

  284. Safety Case Patterns - Reusing Successful Arguments

    Kelly, T. P. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  285. Safety Assurance Contracts for Integrated Modular Avionics

    Conmy, P., Nicholson, M., McDermid, J. A., Lindsay, P. A. & Cant, A., 2003, p. 69-78.

    Research output: Contribution to conferencePaper

  286. Safety Assessment of System Architectures

    Murdoch, J., Kirkham, P., McDermid, J. A. & Wilkinson, P., 2000, p. 449-456.

    Research output: Contribution to conferencePaper

  287. Safety Arguments, Software and System Reliability

    McDermid, J. A., 1991, p. 43-51.

    Research output: Contribution to conferencePaper

  288. Safety Analysis of Software Architectures - "LIghtweight PSSA"

    Lisagor, O., McDermid, J. A. & Pumfrey, D. J., 2004.

    Research output: Contribution to conferencePaper

  289. Safety Analysis of Hardware/Software Interactions in Complex Systems

    McDermid, J. A. & Pumfrey, D. J., 1998, p. 232-241.

    Research output: Contribution to conferencePaper

  290. Safety Analysis and Certification of Open Distributed Systems

    Conmy, P. M., McDermid, J. A., Nicholson, M. & Purwantoro, Y., 2002.

    Research output: Contribution to conferencePaper

  291. Safe Multi-objective Planning with a Posteriori Preferences

    Eastwood, T. C. M. R., Alexander, R. D. & Kelly, T. P., 7 Jan 2016. 8 p.

    Research output: Contribution to conferencePaper

  292. SPECULAR AND DIFFUSE REFLECTANCE IN MICROFACET MODELS

    Smith, W. A. P. & Hancock, E. R., 2009, p. 3737-3740.

    Research output: Contribution to conferencePaper

  293. SAZ

    Polack, F., Hitchcock, P. & Brown, A. W., 1990, p. 384-384.

    Research output: Contribution to conferencePaper

  294. SAT Encodings of the AT-Most-k Constraint: Some Old, Some New, Some Fast, Some Slow

    Frisch, A. M. & Giannaros, P. A., 2010.

    Research output: Contribution to conferencePaper

  295. Rule Migration: Exploring a design framework for modelling emergence in CA-like systems

    Turner, H. & Stepney, S., 2005.

    Research output: Contribution to conferencePaper

  296. Role Identification for Accurate Analysis in Dota 2

    Demediuk, S. P., York, P. J., Block, F. O., Walker, J. A. & Drachen, A., 8 Oct 2019.

    Research output: Contribution to conferencePaper

  297. Robustness Analysis of SARSA(lambda): Different Models of Reward and Initialisation

    Grzes, M. & Kudenko, D., 2008, p. 144-156.

    Research output: Contribution to conferencePaper

  298. Robust Shape from Polarisation and Shading

    Huynh, C. P., Robles-Kelly, A. & Hancock, E. R., 2010, p. 810-813.

    Research output: Contribution to conferencePaper

  299. Robust Diffusion of Structural Flows for Volumetric Image Interpolation

    Doshi, A. & Bors, A. G., Sep 2006, p. 1225-1228. 4 p.

    Research output: Contribution to conferencePaper

  300. Robust Computation of the Polarisation Image

    Saman, G. & Hancock, E. R., 2010, p. 971-974.

    Research output: Contribution to conferencePaper

  301. Rewriting History to Exploit Gain Time

    Bernat, G., Broster, I. & Burns, A., 2004, p. 328-335.

    Research output: Contribution to conferencePaper

  302. Reviewing and Evaluating Automatic Term Recognition Techniques

    Korkontzelos, I., Klapaftis, I. P. & Manandhar, S., 2008, p. 248-259.

    Research output: Contribution to conferencePaper

  303. Retrenchment and the Mondex Electronic Purse

    Banach, R., Poppleton, M., Jeske, C. & Stepney, S., 2005, p. 41-48.

    Research output: Contribution to conferencePaper

  304. Retrenchment and the Atomicity Pattern

    Banach, R., Jeske, C., Hall, A. & Stepney, S., 2007, p. 37-46.

    Research output: Contribution to conferencePaper

  305. Retrenching the Purse: Hashing Injective CLEAR Codes, and Security Properties

    Banach, R., Poppleton, M., Jeske, C. & Stepney, S., 2006, p. 82-90.

    Research output: Contribution to conferencePaper

  306. Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern

    Banach, R., Poppleton, M., Jeske, C., Stepney, S., Fitzgerald, J., Hayes, I. J. & Tarlecki, A., 2005, p. 382-398.

    Research output: Contribution to conferencePaper

  307. Retrenching the Purse: Finite Exception Logs, and Validating the Small

    Banach, R., Poppleton, M. & Stepney, S., 2006, p. 234-248.

    Research output: Contribution to conferencePaper

  308. Restoring broken entanglement by separable correlations

    Spedalieri, G. & Pirandola, S., 3 Sep 2015.

    Research output: Contribution to conferencePaper

  309. Response Time Analysis of Synchronous Data Flow Programs on a Many-Core Processor

    Rihani, H., Moy, M., Maiza, C., Davis, R. I. & Altmeyer, S., Oct 2016.

    Research output: Contribution to conferencePaper

  310. Response Time Analysis for Mixed Criticality Systems with Arbitrary Deadlines

    Burns, A. & Davis, R. I., 5 Dec 2017. 6 p.

    Research output: Contribution to conferencePaper

  311. Resource sharing in RTSJ and SCJ systems

    Wellings, A., Lin, S. & Burns, A., Oct 2011.

    Research output: Contribution to conferencePaper

  312. Resource Abstraction for Reinforcement Learning in Multiagent Congestion Problems

    Malialis, K., Devlin, S. & Kudenko, D., 9 May 2016, p. 512-520. 9 p.

    Research output: Contribution to conferencePaper

  313. Reservoir Computing in materio with LEDs

    Dale, M. N., Miller, J. F., Stepney, S. & Trefzer, M. A., 2017.

    Research output: Contribution to conferencePaper

  314. Research methods for HCI

    Cox, A. L., Cairns, P. A., Thimbleby, H. W. & Webb, N., 2008, p. 221-222.

    Research output: Contribution to conferencePaper

  315. Research Challenges in Concurrent Development Development Environments

    Powell, A. L., Mander, K. C. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  316. Requirements for the Use of COTS Operating Systems in Safety Related Air Traffic Services

    Pierce, R., Wilson, S. P., McDermid, J. A., Beus-Dukic, L. & Eaton, A., 1999.

    Research output: Contribution to conferencePaper

  317. Requirements for Performing Safety Analysis on Operating Systems

    Conmy, P. M. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  318. Requirements as Conjectures: Intuitive DVD Menu Navigation

    Rossmorris, J., Stepney, S., Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005, p. 172-186.

    Research output: Contribution to conferencePaper

  319. Requirements and Traceability

    Coombes, A. C., McDermid, J. A. & Morris, P., 1994.

    Research output: Contribution to conferencePaper

  320. Requirements analysis and safety: a case study (using GRASP)

    Coombes, A. C., McDermid, J. A., Moffett, J. D. & Rabe, G., 1995, p. 353-371.

    Research output: Contribution to conferencePaper

  321. Reputation Attacks in Mediated and Automated Systems

    Rabaiotti, JR., Chivers, H. & Clark, J. A., 2008.

    Research output: Contribution to conferencePaper

  322. Representing Sequences in Description Logics Using Suffix Trees

    Kudenko, D. & Hirsh, H., 1996, p. 141-145.

    Research output: Contribution to conferencePaper

  323. Representing Sequences in Description Logics

    Hirsh, H. & Kudenko, D., 1997, p. 384-389.

    Research output: Contribution to conferencePaper

  324. Representation and structural biases in CGP

    Payne, A. J. & Stepney, S., 2009, p. 1064-1071.

    Research output: Contribution to conferencePaper

  325. Reinforcement Learning of Coordination in Heterogeneous Cooperative Multi-agent Systems

    Kapetanakis, S. & Kudenko, D., 2005, p. 119-131.

    Research output: Contribution to conferencePaper

  326. Reinforcement Learning in RoboCup KeepAway with Partial Observability

    Devlin, S., Grzes, M. & Kudenko, D., 2009, p. 201-208.

    Research output: Contribution to conferencePaper

  327. Reinforcement Learning Approaches to Coordination in Cooperative Multi-agent Systems

    Kapetanakis, S., Kudenko, D. & Strens, M. J. A., 2002, p. 18-32.

    Research output: Contribution to conferencePaper

  328. Regularising the Ricci Flow Embedding

    Xu, W., Hancock, E. R. & Wilson, R. C., 2010, p. 579-588.

    Research output: Contribution to conferencePaper

  329. Registering Incomplete Radar Images using the EM Algorithm

    Moss, S. & Hancock, E. R., 1996.

    Research output: Contribution to conferencePaper

  330. Refund Attacks on Bitcoin’s Payment Protocol

    McCorry, P., Shahandashti, S. F. & Hao, F., 17 May 2017, p. 581-599. 19 p.

    Research output: Contribution to conferencePaper

  331. Reflective Grammatical Evolution

    Timperley, C. & Stepney, S., 2014, p. 71–78.

    Research output: Contribution to conferencePaper

  332. Reflecting on Open-Ended Evolution

    Stepney, S. & Hoverd, T., 2011.

    Research output: Contribution to conferencePaper

  333. Refining Implicit Function Representations of 3-D Scenes: Proc. British Machine Vision Conference(BMVC), vol. II

    Grum, M. & Bors, A. G., Sep 2007, p. 710-719.

    Research output: Contribution to conferencePaper

  334. Refinement of State-Based Concurrent Systems

    Woodcock, J. & Morgan, C., 1990, p. 340-351.

    Research output: Contribution to conferencePaper

  335. Refinement in Circus

    Sampaio, A., Woodcock, J. & Cavalcanti, A., 2002, p. 451-470.

    Research output: Contribution to conferencePaper

  336. Refinement Based Methods for the Construction of Dependable Systems, 13.09. - 18.09.2009

    Abrial, J-R., Butler, M. J., Joshi, R., Troubitsyna, E. & Woodcock, J. C. P., 2009.

    Research output: Contribution to conferencePaper

  337. Refinement Algebra for Formal Bytecode Generation

    Duran, A., Cavalcanti, A. & Sampaio, A., 2002, p. 347-358.

    Research output: Contribution to conferencePaper

  338. Refinement: An overview

    Cavalcanti, A., Sampaio, A. & Woodcock, J., 2004, p. 1-17.

    Research output: Contribution to conferencePaper

  339. Refine and Gabriel: Support for Refinement and Tactics

    Oliveira, M., Xavier, M. & Cavalcanti, A., 2004, p. 310-319.

    Research output: Contribution to conferencePaper

  340. Rectifying Non-Euclidean Similarity Data Using Ricci Flow Embedding

    Xu, W., Hancock, E. R. & Wilson, R. C., 2010, p. 3324-3327.

    Research output: Contribution to conferencePaper

  341. Recovering 3D Shape Using an Improved Fast Marching Method

    Zou, C. & Hancock, E. R., 2010, p. 1678-1681.

    Research output: Contribution to conferencePaper

  342. Recognising Facial Expressions Using Spherical Harmonics

    Sharpe, J. & Hancock, E. R., 2008, p. 157-166.

    Research output: Contribution to conferencePaper

  343. Realism in Statistical Analysis of Worst Case Execution Times

    Griffin, D. & Burns, A., 2010, p. 44-53.

    Research output: Contribution to conferencePaper

  344. Real-Time Utilities for Ada 2005

    Wellings, A. J. & Burns, A., 2007, p. 1-14.

    Research output: Contribution to conferencePaper

  345. Real-Time Communication Analysis with a Priority Share Policy in On-Chip Networks

    Shi, Z. & Burns, A., 2009, p. 3-12.

    Research output: Contribution to conferencePaper

  346. Real-Time Communication Analysis for On-Chip Networks with Wormhole Switching

    Shi, Z. & Burns, A., 1 Apr 2008, p. 161 -170.

    Research output: Contribution to conferencePaper

  347. Reading Multimedia Documents

    Petrie, H. & Weber, G., 2002, p. 413-420.

    Research output: Contribution to conferencePaper

  348. Re-use through standardisation: towards industry-standard engine control software

    Lam, W., McDermid, J. A. & Vickers, A. J., 1996.

    Research output: Contribution to conferencePaper

  349. Re-use of Engine Control Technology

    Hill, J. V., McDermid, J. A., Rimmer, R. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  350. Re-evaluation of the role of the processor within embedded multiprocessor systems

    Freeman, M. & Bailey, C., 2009, p. 181-188. 8 p.

    Research output: Contribution to conferencePaper

  351. Ravenscar-Java: a high integrity profile for real-time Java

    Kwon, J., Wellings, A. J. & King, S., 2002, p. 131-140.

    Research output: Contribution to conferencePaper

  352. Radiance function estimation for object classification

    Robles-Kelly, A. & Hancock, E. R., 2004, p. 67-75. 9 p.

    Research output: Contribution to conferencePaper

  353. RBN-World: A Sub-symbolic Artificial Chemistry

    Faulconbridge, A., Stepney, S., Miller, J. F. & Caves, L. S. D., 2009, p. 377-384.

    Research output: Contribution to conferencePaper

  354. RBN-World: The hunt for a rich AChem

    Faulconbridge, A., Stepney, S. & Miller, J. F., 2010, p. 261--268.

    Research output: Contribution to conferencePaper

  355. RBF shape histograms and their application to 3D face processing

    Pears, N., 2008, p. 1-8.

    Research output: Contribution to conferencePaper

  356. Qubus computation - art. no. 63050D

    Munro, W. J., Nemoto, K., Spiller, T. P., van Loock, P., Braunstein, S. L. & Milburn, G. J., 2006, p. D3050.

    Research output: Contribution to conferencePaper

  357. Quantum information processing with Schrodinger cats

    Nemoto, K., Gilchrist, A., Munro, WJ., Ralph, TC., Milburn, GJ. & Braunstein, SL., 2003, p. 434-443.

    Research output: Contribution to conferencePaper

  358. Quantum ensembles and quantum informatics

    Akulin, VM., Kurizki, G., Braunstein, SL. & Ozhigov, Y., 2005, p. 15-16.

    Research output: Contribution to conferencePaper

  359. Quantum cryptography with an ideal local relay

    Spedalieri, G., Ottaviani, C., Braunstein, S. L., Gehring, T., Jacobsen, C. S., Andersen, U. L. & Pirandola, S., 3 Sep 2015.

    Research output: Contribution to conferencePaper

  360. Quantum algorithms in group theory

    Batty, M., Braunstein, SL., Duncan, AJ. & Rees, S., 2004, p. 1-62.

    Research output: Contribution to conferencePaper

  361. Quantum Teleportation of Wavepackets in a Non-Gaussian State

    Lee, N., Takeno, Y., Benichi, H., Yonezawa, H., Webb, J., Huntington, E., Mista, Jr., L., Filip, R., van Loock, P., Braunstein, S. L. & Furusawa, A., 2009, p. 2221-2222.

    Research output: Contribution to conferencePaper

  362. Quantitative comparisons into content-based music recognition with the self organising map

    Wood, G. & O'Keefe, S., 2003, p. 1-2. 2 p.

    Research output: Contribution to conferencePaper

  363. Quantifying the experience of immersion in games

    Cairns, P., Cox, A., Berthouze, N., Dhoparee, S. & Jennett, C., 2006.

    Research output: Contribution to conferencePaper

  364. Putting Formal Specifications under the Magnifying Glass: Model-based Testing for Validation

    Aydal, E. G., Paige, R. F., Utting, M. & Woodcock, J., 2009, p. 131-140.

    Research output: Contribution to conferencePaper

  365. Proving Theorems About JML Classes

    Freitas, L. & Woodcock, J., 2007, p. 255-279.

    Research output: Contribution to conferencePaper

  366. Protein folding with stochastic L-Systems

    Danks, G., Stepney, S. & Caves, L., 2008, p. 150-157.

    Research output: Contribution to conferencePaper

  367. Proof versus testing in the context of Safety Standards

    Galloway, A., Paige, R. F., Tudor, N. J., Weaver, R. A., Toyn, I. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  368. Prolog Issues of an MCMC Algorithm

    Angelopoulos, N. & Cussens, J., 2001, p. 246-253.

    Research output: Contribution to conferencePaper

  369. Prolog Issues and Experimental Results of an MCMC Algorithm

    Angelopoulos, N. & Cussens, J., 2001, p. 186-196.

    Research output: Contribution to conferencePaper

  370. Profiling parallel functional computations (without parallel machines)

    Runciman, C., Wakeling, D., O'Donnell, J. T. & Hammond, K., 1994, p. 236--251.

    Research output: Contribution to conferencePaper

  371. Product-Line Technology Recommendations for Integrated Modular Systems

    Stephenson, Z. R., NIcholson, M. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  372. Product Line Analysis and the System Safety Process

    Stephenson, Z., Souza, S. D., McDermid, J. A. & Ward, A., 2004, p. 790-799.

    Research output: Contribution to conferencePaper

  373. Processing Group Parameters in the Real-Time Specification for Java

    Burns, A. & Wellings, A. J., 2003, p. 360-370.

    Research output: Contribution to conferencePaper

  374. Process Tailoring in Iterative Development

    Murdoch, J., McDermid, J. A. & Wilkinson, P. J., 2001.

    Research output: Contribution to conferencePaper

  375. Proc. British Machine Vision Conference (BMVC), vol II: Navier-Stokes Formulation for Modelling Turbulent Optical Flow

    Doshi, A. & Bors, A. G., Sep 2007, p. 640-649.

    Research output: Contribution to conferencePaper

  376. Problems and solutions for markup for mathematical examples and exercises

    Goguadze, G., Melis, E., Ullrich, C. & Cairns, P., 2003, p. 80--92.

    Research output: Contribution to conferencePaper

  377. Probabilistic Analysis of CAN with Faults

    Broster, I., Burns, A. & Rodríguez-Navas, G., 2002, p. 269-278.

    Research output: Contribution to conferencePaper

  378. Probabilistic Analysis for Mixed Criticality Systems using Fixed Priority Preemptive Scheduling

    Maxim, D., Davis, R. I., Cucu-Grosjean, L. & Easwaran, A., 4 Oct 2017. 10 p.

    Research output: Contribution to conferencePaper

  379. Priority Union and Generalization in Discourse Grammars

    Grover, C., Brew, C., Manandhar, S. & Moens, M., 1994, p. 17-24.

    Research output: Contribution to conferencePaper

  380. Priority Assignment for Real-Time Wormhole Communication in On-Chip Networks

    Shi, Z. & Burns, A., 2008, p. 421-430.

    Research output: Contribution to conferencePaper

  381. Primitives for the dynamic evolution of component-based applications

    Oriol, M., 2007, p. 1122.

    Research output: Contribution to conferencePaper

  382. Predictable Memory Utilization in the Ravenscar-Java Profile

    Kwon, J., Wellings, A. J. & King, S., 2003, p. 267-276.

    Research output: Contribution to conferencePaper

  383. Practical single view metrology for cuboids

    Pears, N., Wright, P. & Bailey, C., 2007, p. 85-90.

    Research output: Contribution to conferencePaper

  384. Practical Parallel Processing: A User's View of sc \Clip4

    Wood, A. M., 1982, p. 4.1-4.7.

    Research output: Contribution to conferencePaper

  385. Practical Formal Specification for Embedded Control Systems

    Iwu, F., Galloway, A. J., Toyn, I. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  386. Policy evolution with genetic programming

    Lim, YT., Cheng, PC. & Clark, J. A., 2008.

    Research output: Contribution to conferencePaper

  387. Policies for Safety Critical Systems: the Challenge of Formalisation

    Moffett, J. D. & McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  388. Pointers and Records in the Unifying Theories of Programming

    Cavalcanti, A., Harwood, W. & Woodcock, J., 2006, p. 200-216.

    Research output: Contribution to conferencePaper

  389. Pictorial Representation of Parallel Programs

    Stepney, S., 1989.

    Research output: Contribution to conferencePaper

  390. Phoneme segmentation of speech

    Ziólko, B., Manandhar, S. & Wilson, R. C., 1 Sep 2006, p. 282-285. 4 p.

    Research output: Contribution to conferencePaper

  391. Persuasive Technology for Leisure and Health: Development of a Personal Navigation Tool

    McCreadie, C., Raper, J., Gunesh, A., Wood, J., Carey, K., Petrie, H., Wood, L., Survey, O., Tyler, S. & Biggs, S., 2006, p. 187-190.

    Research output: Contribution to conferencePaper

  392. Personalization of Interactive Systems: Introduction to the Special Thematic Session

    Petrie, H. & Weber, G., 2004, p. 117-120.

    Research output: Contribution to conferencePaper

  393. Performing Hazard and Safety Analysis of Object Oriented Systems

    Hawkins, R. & McDermid, J. A., 2002.

    Research output: Contribution to conferencePaper

  394. Performance of second order particle-in-cell methods on modern many-core architectures

    Brown, D., Bettencourt, M. T., Wright, S. A., Jones, J. P. & Jarvis, S. A., 1 Oct 2017, (Accepted/In press).

    Research output: Contribution to conferencePaper

  395. Performance modelling

    Charles, N., Runciman, C., Hammond, K. & Michaelson, G., 1999, p. 233--246.

    Research output: Contribution to conferencePaper

  396. Performance evaluation of a fast chemical structure matching method using distributed neural relaxation

    Turner, A. & Austin, J., 2000, p. 201-204.

    Research output: Contribution to conferencePaper

  397. Perfect hash functions made parallel - lazy functional programming on a distributed multiprocessor

    Checkland, I. G. & Runciman, C., 1993, p. 397-406.

    Research output: Contribution to conferencePaper

  398. People with Disabilities: Automatic and Manual Evaluation of Web Sites

    Petrie, H. & Weber, G., 2006, p. 152-155.

    Research output: Contribution to conferencePaper

  399. Penrose Life: Ash and Oscillators

    Hill, M., Stepney, S. & Wan, F., 2005, p. 471-480.

    Research output: Contribution to conferencePaper

  400. Patterns to Guide Practical Refactoring: Examples Targetting Promotion in Z

    Stepney, S., Polack, F. & Toyn, I., 2003, p. 20-39.

    Research output: Contribution to conferencePaper

  401. Pattern Matching in DAME using Grid Enabled AURA Technology

    Davis, R., Liang, B., Jessop, M. D., Pasley, A. & Austin, J., Sep 2003.

    Research output: Contribution to conferencePaper

  402. Parts based generative models for graphs

    White, D. & Wilson, R. C., 8 Dec 2008, p. 1-4.

    Research output: Contribution to conferencePaper

  403. Particle Swarm Optimization of Bollinger Bands

    Butler, M. & Kazakov, D., 2010, p. 504-511.

    Research output: Contribution to conferencePaper

  404. Parameter Optimisation in the Receptor Density Algorithm

    Hilder, J. A., Owens, N. D. L., Timmis, J., Hickey, P., Kilgour, S. & Tyrrell, A., Jun 2011, p. 226-239. 13 p.

    Research output: Contribution to conferencePaper

  405. Parallel reinforcement learning with linear function approximation

    Grounds, M. & Kudenko, D., 2007, p. 45.

    Research output: Contribution to conferencePaper

  406. Parallel Thinking

    Wood, A. M., 1985, p. 1-3.

    Research output: Contribution to conferencePaper

  407. Parallel Case Base Retrieval: An Implementation on Distributed sc Linda

    Campbell, D. K. G., Osborne, H. R., Wood, A. M. & Bridge, D. G., 1 Oct 1997, p. 525--530.

    Research output: Contribution to conferencePaper

  408. Packetization and cell-loss concealment for MPEG-2 video transport over ATM networks

    Crispin-Bailey, C., Xu, D. & sotudeh, R., Jan 1999.

    Research output: Contribution to conferencePaper

  409. PROM: Pragmatic Reusable Object Management

    Burd, E. L. & McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  410. POSIX file store in Z/Eves: an experiment in the verified software repository

    Freitas, L., Fu, Z. & Woodcock, J., 2007, p. 3-14.

    Research output: Contribution to conferencePaper

  411. POSIX and the Verification Grand Challenge: A Roadmap

    Freitas, L., Woodcock, J. & Butterfield, A., 2008, p. 153-162.

    Research output: Contribution to conferencePaper

  412. Origins of the Grid Architectural Style

    Cakic, J. & Paige, R. F., 2006, p. 227-235. 8 p.

    Research output: Contribution to conferencePaper

  413. Optimising Activation of Bus Pre-signals

    Hodge, V. J., Jackson, T. & Austin, J., 22 Jun 2009, p. 344-353.

    Research output: Contribution to conferencePaper

  414. Optical Flow Estimation Using Diffusion Distances

    Wartak, S. & Bors, A. G., Aug 2010, p. 189-192. 4 p.

    Research output: Contribution to conferencePaper

  415. Operational Semantics for Model Checking Circus

    Woodcock, J., Cavalcanti, A. & Freitas, L., 2005, p. 237-252.

    Research output: Contribution to conferencePaper

  416. Open source projects in programming courses

    Pedroni, M., Bay, T., Oriol, M. & Pedroni, A., 2007, p. 454.

    Research output: Contribution to conferencePaper

  417. On the meaning of modes in uniprocessor real-time systems

    Martins, P. & Burns, A., 2008, p. 324-325.

    Research output: Contribution to conferencePaper

  418. On the Refinement and Simulation of Data Types and Processes

    Bolton, C., Davies, J., Woodcock, J. & Araki, K., 1999, p. 273-292.

    Research output: Contribution to conferencePaper

  419. On the Predictability of Random Tests for Object-Oriented Software

    Ciupa, I., Pretschner, A., Leitner, A., Oriol, M. & Meyer, B., 1 Apr 2008, p. 72--81.

    Research output: Contribution to conferencePaper

  420. On the Evaluation of Schedulability Tests for Real-Time Scheduling Algorithms

    Davis, R. I., Jul 2016. 9 p.

    Research output: Contribution to conferencePaper

  421. On the Effectiveness of Test Extraction without Overhead

    Leitner, A., Pretschner, A., Mori, S., Meyer, B. & Oriol, M., 1 Apr 2009, p. 416--425.

    Research output: Contribution to conferencePaper

  422. On the Digital Certificate Management in Advanced Metering Infrastructure Networks

    Vasilakis, V., Moscholios, I., Vardakas, J. & Logothetis, M., 30 Apr 2017, (Accepted/In press). 5 p.

    Research output: Contribution to conferencePaper

  423. On the Accuracy of Tactile Displays

    Power, C., 2006, p. 1155-1162.

    Research output: Contribution to conferencePaper

  424. On posture as a modality for expressing and recognizing emotions

    Bianchi-Berthouze, N., Cairns, P., Cox, A., Jennett, C. & Kim, W. W., 2006.

    Research output: Contribution to conferencePaper

  425. On modelling user observations in the UTP

    Banks, M. J. & Jacob, J. L., 2010, p. 101--119.

    Research output: Contribution to conferencePaper

  426. On The Derivation of Secure Components

    Jacob, J. L., Berson, T. & Cooper, D. M., 1 May 1989, p. 242-247.

    Research output: Contribution to conferencePaper

  427. On Termination of Graph Rewriting

    Plump, D., 1995, p. 88--100.

    Research output: Contribution to conferencePaper

  428. On Techniques for Content-Based Visual Annotation to Aid Intra-Track Music Navigation

    Wood, G. & O'Keefe, S., 2005, p. 58-65.

    Research output: Contribution to conferencePaper

  429. On Integration and Reuse in a Software Development Environment

    Brown, A. W., McDermid, J. A. & Long, F., 1991, p. 171-194.

    Research output: Contribution to conferencePaper

  430. On Identifying Spatial Traffic Patterns using Advanced Pattern Matching Techniques

    Krishnan, R., Hodge, V. J., Austin, J., Polak, J. & Lee, T., 10 Jan 2010.

    Research output: Contribution to conferencePaper

  431. On Homeostasis in Collective Robotic Systems

    Timmis, J. & Tyrrell, A. M., 2010, p. 307-309.

    Research output: Contribution to conferencePaper

  432. On Defining a "HURT" Metric to Measure Dissatisfaction with Products

    Prasad, D. K., Atkins, M. C., McDermid, J. A. & Wand, I. C., 1998.

    Research output: Contribution to conferencePaper

  433. On ATM Cell Batching and Its Effects on Bus Arbitration in a Conventional Multimedia Server

    Maierhofer, M. & Crispin-Bailey, C., 2000, p. 2010-.

    Research output: Contribution to conferencePaper

  434. Object-Orientation in the UTP

    Santos, T. L. V. L., Cavalcanti, A. & Sampaio, A., 2006, p. 18-37.

    Research output: Contribution to conferencePaper

  435. Object distance and its application to adaptive random testing of object-oriented programs

    Ciupa, I., Leitner, A., Oriol, M. & Meyer, B., 2006, p. 63.

    Research output: Contribution to conferencePaper

  436. Object Oriented Specification and Refinement

    Whysall, P. J., McDermid, J. A., Morris, J. M. & Shaw, R. C., 1991, p. 150-184.

    Research output: Contribution to conferencePaper

  437. Object Orientation in Z

    Stepney, S., Barden, R. & Cooper, D., 1992.

    Research output: Contribution to conferencePaper

  438. Novelty detection for strain-gauge degradation using maximally correlated components

    Hollier, G. & Austin, J., 2002, p. 257-262.

    Research output: Contribution to conferencePaper

  439. Novelty Detection in Airframe Strain Data

    Hickinbotham, S. J. & Austin, J., 2000, p. 2536-2539.

    Research output: Contribution to conferencePaper

  440. Novel method of chaotic systems evaluation for implementations of encryption algorithms

    Dutra, E., Glesner, M., Finamore, W. A. & Indrusiak, L., 1 Apr 2010, p. 89 -96.

    Research output: Contribution to conferencePaper

  441. Noun phrase chunking with APL2

    Manandhar, S. & Alfonseca, E., 2000, p. 136-144.

    Research output: Contribution to conferencePaper

  442. Not all patterns, but enough: an automatic verifier for partial but sufficient pattern matching

    Mitchell, N. & Runciman, C., 2008, p. 49--60.

    Research output: Contribution to conferencePaper

  443. Nonclassical readout of optical memories under local energy constraint

    Spedalieri, G., Lupo, C. & Pirandola, S., 3 Sep 2015, p. 1-11. 11 p.

    Research output: Contribution to conferencePaper

  444. Non-rigid 3D Shape Registration using an Adaptive Template

    Dai, H., Pears, N. E. & Smith, W. A. P., 14 Sep 2018. 15 p.

    Research output: Contribution to conferencePaper

  445. NoCScope: A graphical interface to improve Networks-on-Chip monitoring and design space exploration

    Moller, L., Indrusiak, L. S. & Glesner, M., 1 Nov 2009, p. 1 -6.

    Research output: Contribution to conferencePaper

  446. No more spineless safety cases: A structured method and comprehensive tool support for the production of safety cases.

    Fenelon, P., Kirkham, P., McDermid, J. A. & Wilson, S. P., 1995.

    Research output: Contribution to conferencePaper

  447. Neutral Emergence and Coarse Graining

    Weeks, A., Stepney, S. & Polack, F., 2007, p. 1131-1140.

    Research output: Contribution to conferencePaper

  448. Neutral Emergence: a proposal

    Weeks, A., Stepney, S. & Polack, F. A. C., 2007.

    Research output: Contribution to conferencePaper

  449. Neural Networks for Novelty Detection in Airframe Strain Data

    Hickinbotham, S. J. & Austin, J., 2000, p. 375-380.

    Research output: Contribution to conferencePaper

  450. Net4lap: Neural Laplacian Regularization for Ranking and Re-Ranking

    Curado, M., Escolano, F., Lozano, M. & Hancock, E. R., 11 Apr 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  451. Needle Map Recovery using Robust Regularizers

    Worthington, P. L. & Hancock, E. R., 1997.

    Research output: Contribution to conferencePaper

  452. Natural Scene Image Recognition by Fusing Weighted Colour Moments with Bag of Visual Patches on Spatial Pyramid Layout

    Alqasrawi, Y., Neagu, D. & Cowling, P. I., 30 Dec 2009, p. 140-145.

    Research output: Contribution to conferencePaper

  453. NEEDS CORRECTING High-integrity extreme programming

    Paige, R. F., Chivers, H., McDermid, J. A., Stephenson, Z. R., Haddad, H., Liebrock, L. M., Omicini, A. & Wainwright, R. L., 2005, p. 1518-1523.

    Research output: Contribution to conferencePaper

  454. Multiple-View Tracing for Haskell: a New Hat

    Wallace, M., Chitil, O., Brehm, T. & Runciman, C., 2001, p. 151--170.

    Research output: Contribution to conferencePaper

  455. Multiple image disparity correction for 3-D scene representation

    Grum, M. & Bors, A. G., Oct 2008, p. 209-212. 4 p.

    Research output: Contribution to conferencePaper

  456. Multigrid Reinforcement Learning with Reward Shaping

    Grzes, M. & Kudenko, D., 2008, p. 357-366.

    Research output: Contribution to conferencePaper

  457. Multicapabilities for Distributed Resource Management in Open Systems

    Udzir, N. I., Wood, A. & Gonzalez, T., 1 Nov 2004, p. 157-162.

    Research output: Contribution to conferencePaper

  458. Multi-cultural visualization: how functional programming can enrich visualization (and vice versa)

    Borgo, R., Duke, D., Wallace, M. & Runciman, C., 1 Nov 2006.

    Research output: Contribution to conferencePaper

  459. Multi-core Cyclic Executives for Safety-Critical Systems

    Burns, A., Deutschbein, C., Fleming, T. D. & Baruah, S., Oct 2017, p. 94-109. 16 p.

    Research output: Contribution to conferencePaper

  460. Multi-agent Reinforcement Learning for Intrusion Detection

    Servin, A. & Kudenko, D., 2007, p. 211-223.

    Research output: Contribution to conferencePaper

  461. Multi-Agent Reinforcement Learning with Reward Shaping for KeepAway Takers

    Devlin, S., Grzes, M. & Kudenko, D., May 2010.

    Research output: Contribution to conferencePaper

  462. Multi-Agent Reinforcement Learning for Intrusion Detection: A case study and evaluation

    Servin, A. & Kudenko, D., 2008, p. 873-874.

    Research output: Contribution to conferencePaper

  463. Multi-Agent Potential-based Reward Shaping for RoboCup KeepAway

    Devlin, S., Grzes, M. & Kudenko, D., May 2011.

    Research output: Contribution to conferencePaper

  464. Moving Virtual Source Perception in 3D Space

    Hughes, S. S. & Kearney, G. C., 30 Sep 2016.

    Research output: Contribution to conferencePaper

  465. Moving Nature-Inspired Algorithms to Parallel, Asynchronous and Decentralised Environments

    Ridge, E., Kudenko, D., Kazakov, D. & Curry, E., 2005, p. 35-49.

    Research output: Contribution to conferencePaper

  466. Motion-Compensated Error Concealment for MPGE-2 Coded Video transported over ATM Networks

    Crispin-Bailey, C., enmin, S. & sotudeh, R., Jun 1998, p. 104/1-104/8. 8 p.

    Research output: Contribution to conferencePaper

  467. Motion information combination for fast human action recognition

    Meng, H., Pears, N. & Bailey, C., 2007, p. 21-28.

    Research output: Contribution to conferencePaper

  468. Mosaicing of Flattened Images from Straight Homogeneous Generalized Cylinders

    Bors, A. G., Puech, W., Pitas, I. & Chassery, J-M., 1997, p. 122-129.

    Research output: Contribution to conferencePaper

  469. More Powerful Z Data Refinement: Pushing the State of the Art in Industrial Refinement

    Stepney, S., Cooper, D. & Woodcock, J., 1998, p. 284-307.

    Research output: Contribution to conferencePaper

  470. MooZ Case Studies

    Meira, S. R. D. L. & Cavalcanti, A., 1992, p. 37-58.

    Research output: Contribution to conferencePaper

  471. Molecular Microprograms

    Hickinbotham, S. J., Clark, E., Stepney, S., Clarke, T., Nellis, A., Pay, M., Young, P., Kampis, G., Karsai, I. & Szathmáry, E., 2009, p. 297-304.

    Research output: Contribution to conferencePaper

  472. Modular UML Semantics: Interpretations in Z Based on Templates and Generics

    Amálio, N., Stepney, S. & Polack, F., 2003.

    Research output: Contribution to conferencePaper

Previous 1 2 3 Next