Search research publications and outputs

  1. 3-D Planar Orientation from Texture: Estimating Vanishing Point from Local Spectral Analysis

    Ribeiro, E. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  2. A 2D Morphable Model of Craniofacial Profile and its Application to Craniosynostosis

    Dai, H., Pears, N. E. & Duncan, C., 30 Nov 2017.

    Research output: Contribution to conferencePaper

  3. A 65nm CMOS lossless bio-signal compression circuit with 250 femtoJoule performance per bit.

    Crispin-Bailey, C., Dai, C. & Austin, J., 30 Aug 2019, p. 1-14. 14 p.

    Research output: Contribution to conferencePaper

  4. A Binary Correlation Matrix Memory k-NN Classifier with Hardware Implementation

    Zhou, P., Austin, J. & Kennedy, J., 1998.

    Research output: Contribution to conferencePaper

  5. A Binary Neural Decision Table Classifier

    Hodge, V. J., O'Keefe, S. & Austin, J., 29 Aug 2004.

    Research output: Contribution to conferencePaper

  6. A Binary Neural Network Framework for Attribute Selection and Prediction

    Hodge, V. J., Jackson, T. & Austin, J., 5 Oct 2012, p. 510-515. 5 p.

    Research output: Contribution to conferencePaper

  7. A Canonical Scheme for Model Composition

    Bézivin, J., Bouzitouna, S., Fabro, M. D. D., Gervais, M-P., Jouault, F., Kolovos, D. S., Kurtev, I. & Paige, R. F., 2006, p. 346-360.

    Research output: Contribution to conferencePaper

  8. A Case Study of Distributed Music Audio Analysis Using the Geddei Processing Framework

    Wood, G. & O'Keefe, S., 2004, p. 44-47. 4 p.

    Research output: Contribution to conferencePaper

  9. A Case Study using SAM - Safety Analysis of PES

    Liu, S., McDermid, J. A., Kang, K. C. & Cheung, S-C., 1996, p. 217-.

    Research output: Contribution to conferencePaper

  10. A Case for Dynamic Risk Assessment in NEC Systems of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2010.

    Research output: Contribution to conferencePaper

  11. A Cellular Neural Associative Array for Symbolic Vision

    Orovas, C. & Austin, J., 1998, p. 372-386.

    Research output: Contribution to conferencePaper

  12. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  13. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  14. A Comment on opt-AINet: An Immune Network Algorithm for Optimisation

    Timmis, J. & Edmonds, C., 2004, p. 308-317.

    Research output: Contribution to conferenceOther

  15. A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques

    Stibor, T., Timmis, J. & Eckert, C., 2005, p. 262-275.

    Research output: Contribution to conferenceOther

  16. A Comparison of Categorisation Algorithms for Predicting the Cellular Localisation Sites of Proteins

    Cairns, P. A., Huyck, C. R., Mitchell, I. & Wu, W. X., 2001, p. 296-300.

    Research output: Contribution to conferencePaper

  17. A Comparison of State-Based Modelling Tools for Model Validation

    Aydal, E. G., Utting, M. & Woodcock, J., 2008, p. 278-296.

    Research output: Contribution to conferencePaper

  18. A Comparison of the Business Object Notation and the Unified Modelling Language

    Paige, R. F., Ostroff, J. S., France, R. B. & Rumpe, B., 1999, p. 67-82.

    Research output: Contribution to conferencePaper

  19. A Computational Model of Degeneracy in a Lymph Node

    Andrews, P. & Timmis, J., 2006, p. 164-177.

    Research output: Contribution to conferenceOther

  20. A Computationally Efficient Method for Online Identification of Traffic Control Intervention Measures

    Krishnan, R., Hodge, V. J., Austin, J. & Polak, J., 5 Jan 2010.

    Research output: Contribution to conferencePaper

  21. A Conceptual Framework of Business Model Emerging Resilience

    Goumagias, N., Fernandes, K., Cabras, I., Li, F., Shao, J., Devlin, S., Hodge, V. J., Cowling, P. I. & Kudenko, D., 7 Jul 2016.

    Research output: Contribution to conferencePaper

  22. A Concurrent Language for Refinement

    Woodcock, J. & Cavalcanti, A., 2001.

    Research output: Contribution to conferencePaper

  23. A Consensus Protocol for CAN-Based Systems

    Lima, G. M. D. A. & Burns, A., 2003, p. 420-429.

    Research output: Contribution to conferencePaper

  24. A Constraint Logic Approach to Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1990, p. 234-250.

    Research output: Contribution to conferencePaper

  25. A Coordination Model for Agents Based on Secure Spaces

    Bryce, C., Oriol, M. & Vitek, J., 1999, p. 4--20.

    Research output: Contribution to conferencePaper

  26. A Critique of the “Unmanned Systems Safety Guide for DoD Acquisition”

    Alexander, R., Herbert, N. & Kelly, T., 2009.

    Research output: Contribution to conferencePaper

  27. A Danger Theory Approach to Web Mining

    Secker, A., Freitas, A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferenceOther

  28. A Danger Theory Inspired Approach to Web Mining

    Secker, A., Freitas, A. A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferencePaper

  29. A Deep Hybrid Graph Kernel through Deep Learning Networks

    Cui, L., Bai, L., Rossi, L. & Hancock, E. R., 11 Apr 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  30. A Denotational Semantics for Handel-C Hardware Compilation

    Perna, J. I. & Woodcock, J., 2007, p. 266-285.

    Research output: Contribution to conferencePaper

  31. A Development of Hazard Analysis to Aid Software Design

    McDermid, J. A. & Pumfrey, D. J., 1994.

    Research output: Contribution to conferencePaper

  32. A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systems

    Liu, Y., Timmis, J., Qadir, O., Tempesti, G. & Tyrrell, A., Aug 2010, p. 199-212.

    Research output: Contribution to conferencePaper

  33. A Distributed sc \Linda-like Kernel for \PVM

    Rowstron, A., Douglas, A. & Wood, A., 1995, p. 107-112.

    Research output: Contribution to conferencePaper

  34. A Family-Oriented Software Development Process for Engine Controllers

    Allenby, K., Burton, S., Buttle, D. L., McDermid, J. A., Murdoch, J., Stephenson, A., Bardill, M., Hutchesson, S., Bomarius, F. & Komi-Sirviö, S., 2001, p. 210-226.

    Research output: Contribution to conferencePaper

  35. A Fixpoint Based Encoding for Bounded Model Checking

    Frisch, A. M., Sheridan, D. & Walsh, T., 2002, p. 238-255. 17 p.

    Research output: Contribution to conferencePaper

  36. A Flexible Decentralised Communication Architecture on a Field Programmable Gate Array for Swarm System Simulations

    Gomez Zamorano, A., Timmis, J. & Tyrrell, A., Jun 2011, p. 230-237. 8 p.

    Research output: Contribution to conferencePaper

  37. A Formal Approach for Security Evaluation

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  38. A Formal Model of Security Dependency for Analysis and Testing of Secure Systems

    McDermid, J. A. & Shi, Q., 1991, p. 188-200.

    Research output: Contribution to conferencePaper

  39. A Formal Template Language Enabling Metaproof

    Amálio, N., Stepney, S. & Polack, F., 2006, p. 252-267.

    Research output: Contribution to conferencePaper

  40. A Fractal Immune Network

    Bentley, P. & Timmis, J., 2004, p. 133-145.

    Research output: Contribution to conferenceOther

  41. A Framework for Constructing Temporal Models from Texts

    Alfonseca, E. & Manandhar, S., 2002, p. 456-460.

    Research output: Contribution to conferencePaper

  42. A Framework for Expressing Models of Security Policy

    Dobson, J. E. & McDermid, J. A., 1989, p. 229-241.

    Research output: Contribution to conferencePaper

  43. A Framework for Remote User Evaluation of Accessibility and Usability of Websites

    Power, C., Petrie, H. & Mitchell, R., 2009, p. 594-601.

    Research output: Contribution to conferencePaper

  44. A Framework for Requirements Analysis using Automated Reasoning

    Duffy, D. A., MacNish, C., McDermid, J. A., Morris, P., Iivari, J., Lyytinen, K. & Rossi, M., 1995, p. 68-81.

    Research output: Contribution to conferencePaper

  45. A Framework for Specification and Validation of Real-Time Systems Using it ircus Actions

    Sherif, A., He, J., Cavalcanti, A. & Sampaio, A., 2004, p. 478-493.

    Research output: Contribution to conferencePaper

  46. A General Framework for Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1991, p. 196-207.

    Research output: Contribution to conferencePaper

  47. A General Framework for Sorted Deduction: Fundamental Results on Hybrid Reasoning

    Frisch, A. M., 1989, p. 126-136.

    Research output: Contribution to conferencePaper

  48. A Generic Framework for Population-Based Algorithms, Implemented on Multiple FPGAs

    Newborough, J., Stepney, S., Jacob, C., Pilat, M. L., Bentley, P. J. & Timmis, J., 2005, p. 43-55.

    Research output: Contribution to conferencePaper

  49. A Harmonised Model for Safety Assessment and Certification of Safety-Critical Systems

    Papadopoulos, Y. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  50. A High Performance k-NN Classifier Using a Binary Correlation Matrix Memory

    Zhou, P., Austin, J. & Kennedy, J., 1998, p. 713-722.

    Research output: Contribution to conferencePaper

  51. A Human Action Recognition System for Embedded Computer Vision Application

    Meng, H., Pears, N. & Bailey, C., 2007.

    Research output: Contribution to conferencePaper

  52. A Hybrid Approach t Word Segmentation

    Kazakov, D. & Manandhar, S., 1998, p. 125-134.

    Research output: Contribution to conferencePaper

  53. A Hypertext System with Controlled Hype

    Benest, I. D., 1989, p. 52-63.

    Research output: Contribution to conferencePaper

  54. A JAVA bread-board simulator digital circuit simulation with an extensible e-learning tool

    Bailey, C. & Freeman, M. J., 2009, p. 299-306. 8 p.

    Research output: Contribution to conferencePaper

  55. A Layered Behavioural Model of Platelets

    Schneider, S., Treharne, H., Cavalcanti, A. & Woodcock, J., 2006, p. 98-106.

    Research output: Contribution to conferencePaper

  56. A Markov Chain Model of the B-cell Algorithm

    Clarke, E., Hone, A. N. W. & Timmis, J., 2005, p. 318-330.

    Research output: Contribution to conferenceOther

  57. A Mechanism for Implementing Precise Exceptions in Pipelined Processors

    Alli, S. & Bailey, C., 2004, p. 598-602.

    Research output: Contribution to conferencePaper

  58. A Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 473-494.

    Research output: Contribution to conferencePaper

  59. A Miniature Multisensor Biosignal Data Recorder and its evaluation for unsupervised Parkinson's Disease Data Collection

    Crispin-Bailey, C., Hollier, G. P., Moulds, A., Freeman, M. J., Fargus, A. G., Austin, J. & Lampert, T. A., 16 Nov 2014, p. 84-92. 9 p.

    Research output: Contribution to conferencePaper

  60. A Miniaturized 4-Channel, 2KSa/sec Biosignal Data Recorder With 3-Axis Accelerometer and Infra-red Timestamp Function

    Crispin-Bailey, C., Moulds, A., Platt, B., Hollier, G. P., Freeman, M. J. & Fargus, A. G., 2013.

    Research output: Contribution to conferencePaper

  61. A Model-Based Approach to Support the Automatic Safety Analysis of Multiple Product Line Products: Computing Systems Engineering (SBESC), 2014 Brazilian Symposium on

    de Oliveira, A. L., Braga, R. T. V., Masiero, P. C., Papadopoulos, Y., Habli, I. & Kelly, T., 2014, p. 7-12. 6 p.

    Research output: Contribution to conferenceOther

  62. A Modified Dendritic Cell Algorithm for On-line Error Detection in Robotic Systems

    Mokhtar, M., Bi, R., Timmis, J. & Tyrrell, A. M., May 2009, p. 2055-2062. 8 p.

    Research output: Contribution to conferencePaper

  63. A Morphable Profile Model of the Human Head as an Outcome Tool for Craniosynostosis Surgery

    Duncan, C., Armstrong, R. & Pears, N. E., 14 Sep 2015.

    Research output: Contribution to conferenceAbstract

  64. A Multi-Layered Immune Inspired Approach to Data Mining

    Knight, T. & Timmis, J., 2002, p. 266-271.

    Research output: Contribution to conferenceOther

  65. A Navigation-based Algorithm for Matching Scenario Patterns

    Ma, J., Zhao, G. & Hancock, E. R., 2007, p. 151-157.

    Research output: Contribution to conferencePaper

  66. A Neural Architecture for Fast Rule Matching

    Austin, J., Kennedy, J. & Lees, K., 1995, p. 255-260.

    Research output: Contribution to conferencePaper

  67. A Neural-Endocrine Architecture for Foraging in Swarm Robotic Systems

    Timmis, J., Murray, L. & Neal, M., 2010, p. 319-330.

    Research output: Contribution to conferencePaper

  68. A New File Access Paradigm for Extending a User's Information Base

    Fritz, J. M. & Benest, I. D., 1994, p. 51-60.

    Research output: Contribution to conferencePaper

  69. A New Framework for Grayscale and Colour Non-lambertian Shape-from-Shading

    Smith, W. A. P. & Hancock, E. R., 2007, p. 869-880.

    Research output: Contribution to conferencePaper

  70. A New Look at the Refund Mechanism in the Bitcoin Payment Protocol

    Avizheh, S., Safavi-Naini, R. & Shahandashti, S. F., Dec 2018, p. 369-387. 19 p.

    Research output: Contribution to conferencePaper

  71. A New Method for Safety Analysis and the Mechanical Synthesis of Fault Trees in Complex Systems

    Papadopoulos, Y. & McDermid, J. A., 1999, p. 1-9.

    Research output: Contribution to conferencePaper

  72. A New Paradigm for SpeckNets: Inspiration from Fungal Colonies

    Falconer, R., Bown, J., Hart, E. & Timmis, J., 2008, p. 90-95.

    Research output: Contribution to conferencePaper

  73. A Note on Traces Refinement and the it onf Relation in the Unifying Theories of Programming

    Cavalcanti, A. & Gaudel, M-C., 2008, p. 42-61.

    Research output: Contribution to conferencePaper

  74. A Novel Approach to the Detection of Cheating in Multiplayer Online Games

    Laurens, P., Paige, R. F., Brooke, P. J. & Chivers, H., 2007, p. 97-106.

    Research output: Contribution to conferencePaper

  75. A Petri Net Model of Granulomatous Inflammation

    Albergante, L., Timmis, J., Andrews, P. S., Beattie, L. & Kaye, P. M., 2010, p. 1-3.

    Research output: Contribution to conferencePaper

  76. A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments

    Weaver, R., Fenn, J. & Kelly, T., 2003, p. 57-67.

    Research output: Contribution to conferencePaper

  77. A Probabilistic Framework for Schedulability Analysis

    Burns, A., Bernat, G. & Broster, I., 2003, p. 1-15.

    Research output: Contribution to conferencePaper

  78. A Proposal for a Lightweight Rigorous UML-Based Development Method for Reliable Systems

    Paige, R. F. & Ostroff, J. S., 2001, p. 192-206.

    Research output: Contribution to conferencePaper

  79. A Proposed Mechanism for Super-Pipelined Instruction-Issue for ILP Stack Machines

    Bailey, C., 2004, p. 121-129.

    Research output: Contribution to conferencePaper

  80. A ProtoType Question Answering System Using Syntactic and Semantic Information for Answer Retrieval

    Alfonseca, E., Boni, M. D., Jara-Valencia, J-L. & Manandhar, S., 2001.

    Research output: Contribution to conferencePaper

  81. A Refinement Tool for Z

    Freitas, A., Nascimento, C. & Cavalcanti, A., 2003, p. 396-415.

    Research output: Contribution to conferencePaper

  82. A Reflectance Model for Radar Shape From Shading

    Wilson, R. C. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  83. A Reflective Approach to Model-Driven Web Engineering

    Clowes, D., Kolovos, D. S., Holmes, C., Rose, L. M., Paige, R. F., Johnson, J., Dawson, R. & Probets, S. G., 2010, p. 62--73.

    Research output: Contribution to conferencePaper

  84. A Research Agenda for Metaheuristic Standardization

    Swan, J., Adriaensen, S., Bishr, M., Burke, E. K., Clark, J. A., De Causmaecker, P., Durillo, J., Hammond, K., Hart, E., Johnson, C. G., Kocsis, Z. A., Kovitz, B., Krawiec, K., Martin, S., Merelo, J. J., Minku, L. L., Özcan, E., Pappa, G. L., Pesch, E., Garcia-Sànchez, P. & 7 others, Schaerf, A., Sim, K., Smith, J., Stützle, T., Stefan, V., Wagner, S. & Yao, X., Jun 2015, p. 1-3. 3 p.

    Research output: Contribution to conferencePaper

  85. A Resource Limited Artificial Immune System for Data Analysis

    Timmis, J. & Neal., M. J., 2000, p. 19-32.

    Research output: Contribution to conferenceOther

  86. A Rigorous Evaluation of Crossover and Mutation in Genetic Programming

    White, D. & Poulding, S., 2009, p. 220-231. 12 p.

    Research output: Contribution to conferencePaper

  87. A Rigorous Metamodel for UML Static Conceptual Modelling of Information Systems

    Laleau, R. & Polack, F., 2001, p. 402-416.

    Research output: Contribution to conferencePaper

  88. A Risk Modelling Approach for a Communicating System of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2011, p. 442-447.

    Research output: Contribution to conferencePaper

  89. A Round Robin Scheduling Policy for Ada

    Burns, A., Harbour, M. G. & Wellings, A. J., 2003, p. 334-343.

    Research output: Contribution to conferencePaper

  90. A Safety Change Oriented Process for Safety-Critical Systems

    Tracey, N., Stephenson, A., Clark, J. A. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  91. A Safety-Case Approach for Ethical Considerations for Autonomous Vehicles

    Menon, C. & Alexander, R. D., 1 Nov 2017.

    Research output: Contribution to conferencePaper

  92. A Secure Scheme for Group Communication of Wireless IoT Devices

    Alohali, B., Vasilakis, V., Moscholios, I. & Logothetis, M., 27 Sep 2018. 6 p.

    Research output: Contribution to conferencePaper

  93. A Security Framework

    Jacob, J. L., 1 Jun 1988, p. 98--111.

    Research output: Contribution to conferencePaper

  94. A Self-scaling Instruction Generator Using Cartesian Genetic Programming

    Liu, Y., Tempesti, G., Walker, J. A., Timmis, J., Tyrrell, A. M. & Bremner, P., 2011, p. 298-309.

    Research output: Contribution to conferencePaper

  95. A Signature-based Intrusion Detection System for the Internet of Things

    Ioulianou, P., Vasilakis, V., Moscholios, I. & Logothetis, M., 8 Jun 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  96. A Simpler Semantics for Z

    Gardiner, P. H. B., Lupton, P. J. & Woodcock, J., 1990, p. 3-11.

    Research output: Contribution to conferencePaper

  97. A Static Checker for Safe Pattern Matching in Haskell

    Mitchell, N., Runciman, C. & Eekelen, M. V., 2007, p. 15-30.

    Research output: Contribution to conferencePaper

  98. A Strategic Roadmap for Business Model Change for the Video-games Industry

    Goumagias, N., Purvis, K., Fernandes, K., Cabras, I., Li, F., Shao, J., Devlin, S., Hodge, V. J., Cowling, P. & Kudenko, D., 3 May 2016, (Accepted/In press).

    Research output: Contribution to conferencePaper

  99. A Strategy for Compiling Classes, Inheritance, and Dynamic Binding

    Duran, A., Cavalcanti, A. & Sampaio, A., 2003, p. 301-320.

    Research output: Contribution to conferencePaper

  100. A Summary of Domain Analysis Experience by Way of Heuristics

    Lam, W. & McDermid, J. A., 1997, p. 54-64.

    Research output: Contribution to conferencePaper

  101. A Supergraph-based Generative Model

    Han, L., Wilson, R. C. & Hancock, E. R., 2010, p. 1566-1569.

    Research output: Contribution to conferencePaper

  102. A Systematic Approach for Designing Mutation Operators for MDE languages

    Alhwikem, F. H. M., Paige, R. F., Rose, L. M. & Alexander, R. D., Oct 2016.

    Research output: Contribution to conferencePaper

  103. A Systematic Approach for Developing Software Safety Arguments

    Hawkins, R. D. & Kelly, T., Jul 2010, p. 25-33.

    Research output: Contribution to conferencePaper

  104. A Systematic Approach to Safety Case Maintenance

    Kelly, T. P. & McDermid, J. A., 1999, p. 13-26.

    Research output: Contribution to conferencePaper

  105. A Systematic Approach to Software Integrity Levels

    Lindsay, P. A. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  106. A Theoretical Analysis of Hierarchical Proofs

    Cairns, P. A. & Gow, J., 2003, p. 175-187.

    Research output: Contribution to conferencePaper

  107. A Theory of Pointers for the UTP

    Harwood, W., Cavalcanti, A. & Woodcock, J., 2008, p. 141-155.

    Research output: Contribution to conferencePaper

  108. A Timed Model of Circus with the Reactive Design Miracle

    Wei, K., Woodcock, J. & Burns, A., 2010, p. 315-319.

    Research output: Contribution to conferencePaper

  109. A Tool for Defining the Architecture of Z Specifications

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1990, p. 77-92.

    Research output: Contribution to conferencePaper

  110. A Tool for Defining the Architecture of a Z Specification

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1991, p. 77-92.

    Research output: Contribution to conferencePaper

  111. A Tutorial Introduction to CSP in it nifying Theories of Programming

    Cavalcanti, A. & Woodcock, J., 2004, p. 220-268.

    Research output: Contribution to conferencePaper

  112. A Tutorial Introduction to Designs in Unifying Theories of Programming

    Woodcock, J. & Cavalcanti, A., 2004, p. 40-66.

    Research output: Contribution to conferencePaper

  113. A Tutorial on the Refinement Calculus

    Woodcock, J., 1991, p. 79-140.

    Research output: Contribution to conferencePaper

  114. A UML Profile for Knowledge-Based Systems Modelling

    Abdullah, M. S., Paige, R. F., Kimble, C. & Benest, I. D., 20 Aug 2007, p. 871-878.

    Research output: Contribution to conferencePaper

  115. A Unified Neighbor Reconstruction Method for Embeddings

    Hancock, E. R., Zhang, Z. H. & Bai, L., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  116. A Visual Specification Language for Model-to-Model Transformations

    Guerra, E., Lara, J. D., Kolovos, D. S. & Paige, R. F., 2010, p. 119-126.

    Research output: Contribution to conferencePaper

  117. A Weakest Precondition Semantics for an Object-Oriented Language of Refinement

    Cavalcanti, A. & Naumann, D. A., 1999, p. 1439-1459.

    Research output: Contribution to conferencePaper

  118. A Web Services Description Framework to Support Dynamic Run-Time Binding in Grid-based Systems

    Cakic, J. & Paige, R. F., 2005, p. 85-96.

    Research output: Contribution to conferencePaper

  119. A case study of hierarchically heterogeneous application modelling using UML and Ptolemy II

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Sep 2010, p. 68 -71.

    Research output: Contribution to conferencePaper

  120. A co-design strategy for embedded Java applications based on a hardware interface with invocation semantics

    Borg, A., Gao, R. & Audsley, N., 1 Dec 2006, p. 58-67. 10 p.

    Research output: Contribution to conferencePaper

  121. A compact fiducial for affine augmented reality

    Parnham, D. J., Robinson, J. A. & Zhao, Y., 1 Apr 2005, p. 347-352.

    Research output: Contribution to conferenceOther

  122. A comparison of categorisation algorithms for predicting the cellular localization sites of proteins

    Cairns, P., Huyck, C., Mitchell, I. & Wu, W. X., 2001, p. 296--300.

    Research output: Contribution to conferencePaper

  123. A computationally efficient method for online identification of traffic incidents and network equipment failures

    Hodge, V. J., Krishnan, R., Austin, J. & Polak, J., 4 Apr 2010.

    Research output: Contribution to conferencePaper

  124. A framework for describing and comparing courses and curricula

    Pedroni, M., Oriol, M. & Meyer, B., 1 Jun 2007, p. 131.

    Research output: Contribution to conferencePaper

  125. A functional-logic library for Wired

    Naylor, M., Axelsson, E. & Runciman, C., 2007, p. 37--48.

    Research output: Contribution to conferencePaper

  126. A grounded investigation of game immersion

    Brown, E. & Cairns, P., 2004, p. 1297--1300.

    Research output: Contribution to conferencePaper

  127. A high abstraction, high accuracy power estimation model for networks-on-chip

    Ost, L., Guindani, G., Indrusiak, L. S., Reinbrecht, C., Raupp, T. & Moraes, F., 2009, p. 31:1--31:6.

    Research output: Contribution to conferencePaper

  128. A model for comparing the space usage of lazy evaluators

    Bakewell, A. & Runciman, C., 1 Sep 2000, p. 151--162.

    Research output: Contribution to conferencePaper

  129. A multi-arm bandit neighbourhood search for routing and scheduling problems

    Chen, Y., Cowling, P. I., Polack, F. A. C. & Mourdjis, P. J., 2016. 33 p.

    Research output: Contribution to conferencePaper

  130. A new public body is necessary to effectively regulate the UK video game industry

    Zendle, D., Reith, G., Bowden-Jones, H. & Wardle, H., 9 Oct 2019.

    Research output: Contribution to conferenceOther

  131. A practitioner perspective on integrating agile and user centred design

    Salah, D., Paige, R. & Cairns, P., 2014, p. 100-109. 10 p.

    Research output: Contribution to conferencePaper

  132. A pragmatist aesthetics approach to the design of a technological artefact

    Fiore, S., Wright, P. & Edwards, A., 2005, p. 129-132.

    Research output: Contribution to conferencePaper

  133. A principled semantics for inp

    Jacob, J. L., Wood, A. M., Porto, A. & Roman, G-C., 1 Sep 2000, p. 51--65.

    Research output: Contribution to conferencePaper

  134. A proposal for an optical implementation of a universal quantum phase gate

    Rebic, S., Vitali, D., Ottaviani, C., Tombesi, P., Artoni, M. & Cataliotti, F., 1 Mar 2005, p. 245.

    Research output: Contribution to conferencePaper

  135. A psychometric evaluation of emotional responses to horror music

    Williams, D., Wu, C. Y., Hodge, V. J., Murphy, D. & Cowling, P. I., 1 Jan 2019. 9 p.

    Research output: Contribution to conferencePaper

  136. A refinement based approach to calculating a fault tolerant railway signal device

    McEwan, A. A. & Woodcock, J. C. P., 2004, p. 621-628.

    Research output: Contribution to conferencePaper

  137. A simulation environment for emergent properties: extended abstract

    Turner, H. R., Stepney, S. & Polack, F. A. C., 2005.

    Research output: Contribution to conferencePaper

  138. A space semantics for core Haskell

    Bakewell, A. & Runciman, C., 2001.

    Research output: Contribution to conferencePaper

  139. A spectral analysis of perceptual shape variation

    Hughes, A. & Wilson, R. C., 17 Sep 2003, p. 38-43.

    Research output: Contribution to conferencePaper

  140. A time-domain Based Looseless Data Compression Technique for Wireless Wearable Biometric Devices

    Crispin-Bailey, C. & Dai, C., Aug 2013, p. 104-107. 4 p.

    Research output: Contribution to conferencePaper

  141. A unified model of specular and diffuse reflectance for rough, glossy surfaces

    Smith, W. A. P. & Hancock, E. R., 2009, p. 643-650.

    Research output: Contribution to conferencePaper

  142. ABZ2008 VSR-Net Workshop

    Woodcock, J. & Boca, P., 2008, p. 378-379.

    Research output: Contribution to conferencePaper

  143. AI and Automatic Music Generation for Mindfulness

    Williams, D., Hodge, V. J., Gega, L., Murphy, D., Cowling, P. I. & Drachen, A., 17 Mar 2019. 10 p.

    Research output: Contribution to conferencePaper

  144. AISEC: An Artificial Immune System for E-mail Classification

    Secker, A., Freitas, A. & Timmis, J., 2003, p. 131-139.

    Research output: Contribution to conferenceOther

  145. APD-A Tool for Identifying Behavioural Patterns Automatically from Clickstream Data

    Ting, I-H., Clark, L., Kimble, C., Kudenko, D. & Wright, P., 2007, p. 66-73.

    Research output: Contribution to conferencePaper

  146. ARGOT: The Rochester Dialogue System

    Allen, J. F., Frisch, A. M. & Litman, D. J., 1 Aug 1982, p. 66-70.

    Research output: Contribution to conferencePaper

  147. AURA-Alert: The use of Binary Associative Memories for Condition Monitoring Applications

    Austin, J., Jackson, T., Hodge, V. J. & Brewer, G., 22 Jun 2010, p. 699-711.

    Research output: Contribution to conferencePaper

  148. Abstracting Complex Languages through Transformation and Composition

    Johannes, J., Zschaler, S., Fernández, M. A., Castillo, A., Kolovos, D. S. & Paige, R. F., 2009, p. 546-550.

    Research output: Contribution to conferencePaper

  149. Abstraction and Reformulation in the Generation of Constraint Models

    Frisch, A. M., 2007, p. 2-3.

    Research output: Contribution to conferencePaper

  150. Access Management in multi-administration networks

    Lord, S. P., Pope, N. H. & Stepney, S., 1987.

    Research output: Contribution to conferencePaper

  151. Accessibility 2.0: people, policies and processes

    Kelly, B., Sloan, D., Brown, S., Seale, J., Petrie, H., Lauke, P. & Ball, S., 2007, p. 138-147.

    Research output: Contribution to conferencePaper

  152. Accessibility in non-professional web authoring tools: a missed web 2.0 opportunity?

    Power, C. & Petrie, H., 2007, p. 116-119.

    Research output: Contribution to conferencePaper

  153. Accessibility of Blended and E-Learning for Mature Age and Disabled Students and Staff: Introduction to the Special Thematic Session

    Petrie, H., Power, C., Velasco, C. A. & Boticario, J., 2010, p. 484-485.

    Research output: Contribution to conferencePaper

  154. Accessible Formal Method Support for PLC Software Development

    McDermid, J. A., Pierce, R. H. & Rabe, G., 1995, p. 113-129.

    Research output: Contribution to conferencePaper

  155. Accessible Player Experiences (APX): The Players

    Power, C. D., Beeston, J. T. & Cairns, P., 25 Mar 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  156. Accumulating Spectral Evidence for Perspective Views of Texture Planes

    Ribeiro, E. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  157. Achievements and Prospects of Learning Word Morphology with Inductive Logic Programming

    Kazakov, D., 1999, p. 89-109.

    Research output: Contribution to conferencePaper

  158. Achieving Minimal and Deterministic Interrupt Execution in Stack-Based Processor Architectures

    Bailey, C., 2000, p. 1368-.

    Research output: Contribution to conferencePaper

  159. Achieving System Security by Testing

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  160. Ada for High Integrity Systems

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1992.

    Research output: Contribution to conferencePaper

  161. Adaptable Lymphocytes for Artificial Immune Systems

    Andrews, P. S. & Timmis, J., 2008, p. 376-386.

    Research output: Contribution to conferencePaper

  162. Adaptive Circuit Control through Gene Expression

    Clegg, K. & Stepney, S., 2008, p. 154-163.

    Research output: Contribution to conferencePaper

  163. Adaptivity in Question Answering with User Modelling and a Dialogue Interface

    Quarteroni, S. & Manandhar, S., 2006.

    Research output: Contribution to conferencePaper

  164. Adding Temporal Annotations and Associated Verification to Ravenscar Profile

    Burns, A. & Lin, T-M., 2003, p. 80-91.

    Research output: Contribution to conferencePaper

  165. Advanced Structural Representations for Question Classification and Answer Re-ranking

    Quarteroni, S., Moschitti, A., Manandhar, S., Basili, R., Amati, G., Carpineto, C. & Romano, G., 2007, p. 234-245.

    Research output: Contribution to conferencePaper

  166. Affinity Propagation for Class Exemplar Mining

    Xia, S., Song, R. & Hancock, E. R., 2010, p. 191-201.

    Research output: Contribution to conferencePaper

  167. Aggregation of Information leaked by a MANET

    Murdoch, J., Clark, J. A., McDermid, J. A., Chivers, H. R. & Worthington, O., 2007.

    Research output: Contribution to conferencePaper

  168. Agile Formal Method Engineering

    Paige, R. F. & Brooke, P. J., 2005, p. 109-128. 19 p.

    Research output: Contribution to conferencePaper

  169. Agile Security Using an Incremental Security Architecture

    Chivers, H., Paige, R. F. & Ge, X., 2005, p. 57-65. 8 p.

    Research output: Contribution to conferencePaper

  170. Agile Specification-Driven Development

    Ostroff, J. S., Makalsky, D. & Paige, R. F., 2004, p. 104-112.

    Research output: Contribution to conferencePaper

  171. Agile development of secure web applications

    Ge, X., Paige, R. F., Polack, F., Chivers, H. & Brooke, P. J., 2006, p. 305-312. 7 p.

    Research output: Contribution to conferencePaper

  172. Aine: an immunological approach to data mining

    Knight, T. & Timmis, J., 2001, p. 297-304.

    Research output: Contribution to conferenceOther

  173. Alignment using Spectral Clusters

    Carcassoni, M. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  174. An Abstract View of Sorted Unification

    Frisch, A. M., Cohn, A. G. & Kapur, D., 1992, p. 178-192.

    Research output: Contribution to conferencePaper

  175. An Actor-Oriented Group Mobility Model for Wireless Ad Hoc Sensor Networks

    Ochirsuren, E., Indrusiak, L. S. & Glesner, M., 1 Jun 2008, p. 174 -179.

    Research output: Contribution to conferencePaper

  176. An Admission Control Protocol for Real-Time OSGi

    Richardson, T. & Wellings, A. J., May 2010, p. 217. 224 p.

    Research output: Contribution to conferencePaper

  177. An Agile and Extensible Code Generation Framework

    Kolovos, D. S., Paige, R. F. & Polack, F., 2005, p. 226-229.

    Research output: Contribution to conferencePaper

  178. An Analysis of Approaches to Model Migration

    Rose, L. M., Paige, R. F., Kolovos, D. S. & Polack, F. A. C., 2009.

    Research output: Contribution to conferencePaper

  179. An Analysis of Clarification Dialogue for Question Answering

    Boni, M. D. & Manandhar, S., 2003.

    Research output: Contribution to conferencePaper

  180. An Analysis of Problem Difficulty for a Class of Optimisation Heuristics

    Ridge, E. & Kudenko, D., 2007, p. 198-209.

    Research output: Contribution to conferencePaper

  181. An Approach to Object Oriented Specification using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1991, p. 193-215.

    Research output: Contribution to conferencePaper

  182. An Approach to Object-Oriented Specification Using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1990, p. 193-215.

    Research output: Contribution to conferencePaper

  183. An Architecture for Modelling Emergence in CA-Like Systems

    Polack, F., Stepney, S., Turner, H. R., Welch, P. H., Barnes, F. R. M., Capcarrère, M. S., Freitas, A. A., Bentley, P. J., Johnson, C. G. & Timmis, J., 2005, p. 433-442.

    Research output: Contribution to conferencePaper

  184. An Artificial Immune System for Evolving Amino Acid Clusters Tailored to Protein Function Prediction

    Secker, A., Davies, M. N., Freitas, A. A., Timmis, J., Clark, E. & Flower, D. R., 2008, p. 242-253.

    Research output: Contribution to conferencePaper

  185. An Assessment of Shared Local Memory Buffering for Enhanced Multimedia Server Scalability

    Maierhofer, M. & Crispin-Bailey, C., 1999, p. 131-135.

    Research output: Contribution to conferencePaper

  186. An Associative Memory for Association Rule Mining

    Baez-Monroy, V. O. & O'Keefe, S., 2007, p. 2227-2232.

    Research output: Contribution to conferencePaper

  187. An Attributive Logic of Set Descriptions and Set Operations

    Manandhar, S., 1994, p. 255-262.

    Research output: Contribution to conferencePaper

  188. An EM-like Algorithm for Motion Segmentation via Eigendecomposition

    Robles-Kelly, A. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  189. An Efficient Distributed Tuple Space Implementation for Networks of Workstations

    Rowstron, A. & Wood, A., 1 Oct 1996, p. 510--514.

    Research output: Contribution to conferencePaper

  190. An Efficient VLSI Architecture for an Enhanced TSS Algorithm for Video Coding Applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., Oct 1998.

    Research output: Contribution to conferencePaper

  191. An Empirical Analysis of Terminological Representation Systems

    Heinsohn, J., Kudenko, D., Nebel, B. & Profitlich, H-J., 1992, p. 767-773.

    Research output: Contribution to conferencePaper

  192. An Empirical Analysis of the Impact of Prioritised Sweeping on the DynaQ's Performance

    Grzes, M. & Kudenko, D., 2008, p. 1041-1051.

    Research output: Contribution to conferencePaper

  193. An Evaluation of Open Hypertext Features for Improved File Access

    Fritz, J. M. & Benest, I. D., 1995, p. 339-354.

    Research output: Contribution to conferencePaper

  194. An Evaluation of Standard Retrieval Algorithms and a Weightless Neural Approach

    Hodge, V. J. & Austin, J., 2000, p. 591-596.

    Research output: Contribution to conferencePaper

  195. An Experience Report in Requirements Elicitation for Accessible E-Learning Systems

    Power, C. & Petrie, H., 1 Mar 2010, p. 259 -261.

    Research output: Contribution to conferencePaper

  196. An Experimental Investigation of Single and Multiple Issue ILP Speedup for Stack-Based code

    Crispin-Bailey, C. & Weeks, M., Nov 2000, p. 19-24. 6 p.

    Research output: Contribution to conferencePaper

  197. An FPGA-based system for development of real-time embedded vision applications

    Crispin-Bailey, C., Pears, N. E. & Meng, H., 2007, p. 33-40. 8 p.

    Research output: Contribution to conferencePaper

  198. An IDE-based, Integrated Solution to Schema Evolution of Object-Oriented Software

    Piccioni, M., Oriol, M., Meyer, B. & Schneider, T., 1 Nov 2009, p. 650--654. 4 p.

    Research output: Contribution to conferencePaper

  199. An Introduction to Refinement in Z

    Woodcock, J., 1991, p. 96-117.

    Research output: Contribution to conferencePaper

  200. An Investigation into the Use of Mutation Analysis for Automated Program Repair

    Timperley, C. S., Stepney, S. & Le Goues, C., 17 Aug 2017, p. 99-114. 16 p.

    Research output: Contribution to conferencePaper

  201. An Investigation of Arbitration in Servers for Distributed Multimedia Applications

    Maierhofer, M., Crispin-Bailey, C., Batatia, H. & Sotudeh, R., 1999, p. 1564-1570.

    Research output: Contribution to conferencePaper

  202. An Investigation on the Compression Quality of aiNet

    Stibor, T. & Timmis, J., 2007, p. 495-502.

    Research output: Contribution to conferencePaper

  203. An Iterator Construct for the Refinement Calculus

    King, S. & Morgan, C., 2000.

    Research output: Contribution to conferencePaper

  204. An Object-Oriented Structuring for Z Based on Views

    Amálio, N., Polack, F., Stepney, S., Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005, p. 262-278.

    Research output: Contribution to conferencePaper

  205. An Operational Semantics in UTP for a Language of Reactive Designs

    Woodcock, J., 2006, p. 84-84.

    Research output: Contribution to conferenceAbstract

  206. An Optical Range Sensor for Mobile Robot Guidance

    Pears, N. & Probert, P., 1993, p. 659-664.

    Research output: Contribution to conferencePaper

  207. An Outline Pattern Language for Z: Five Illustrations and Two Tables

    Stepney, S., Polack, F., Toyn, I., Bert, D., Bowen, J. P., King, S. & Waldén, M. A., 2003, p. 2-19.

    Research output: Contribution to conferencePaper

  208. An Overview of FRAPPS 2.0: A Framework for Resolution-based Automated Proof Procedure Systems

    Uribe, T. E., Frisch, A. M. & Mitchell, M. K., 1992, p. 721-725.

    Research output: Contribution to conferencePaper

  209. An action semantics for MOF 2.0

    Paige, R. F., Kolovos, D. S., Polack, F. & Haddad, H., 2006, p. 1304-1305.

    Research output: Contribution to conferencePaper

  210. An algebraic approach to information theory

    Patra, M. K. & Braunstein, S. L., 2010, p. 2708-2712.

    Research output: Contribution to conferencePaper

  211. An artificial immune network for multimodal optimisation

    Castro, L. N. D. & Timmis, J., 2002, p. 699-704.

    Research output: Contribution to conferenceOther

  212. An evidential reasoning approach for assessing confidence in safety evidence: Software Reliability Engineering (ISSRE), 2015 IEEE 26th International Symposium on

    Nair, S., Walkinshaw, N., Kelly, T. & de la Vara, J. L., 2015, p. 541-552. 12 p.

    Research output: Contribution to conferenceOther

  213. An improved speaker diarization system

    Fu, R. & Benest, I. D., 2007, p. 2605-2608.

    Research output: Contribution to conferencePaper

  214. An improved three-step search block-matching algorithm for low bit-rate video coding applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., 1998, p. 178-181. 4 p.

    Research output: Contribution to conferencePaper

  215. An incremental garbage collector for embedded real-time systems

    Wallace, M. & Runciman, C., 1993, p. 277--288.

    Research output: Contribution to conferencePaper

  216. An integrated neural IR system

    Hodge, V. J. & Austin, J., 2001, p. 265-270.

    Research output: Contribution to conferencePaper

  217. An interactive approach to profiling parallel functional programs

    Charles, N., Runciman, C., Hammond, K., Davie, T. & Clack, C., 1999, p. 20--37.

    Research output: Contribution to conferencePaper

  218. Analogue Circuit Control through Gene Expression

    Clegg, K. & Stepney, S., 2008, p. 154-163.

    Research output: Contribution to conferencePaper

  219. Analysing Available ILP in Stack Based Code : A Preliminary Approach

    Crispin-Bailey, C. & Shi, H., 2003.

    Research output: Contribution to conferencePaper

  220. Analysing the Reliability of a Self-reconfigurable Modular Robotic System

    Murray, L. J., Liu, W., Winfield, A., Timmis, J. & Tyrrell, A., Dec 2011, p. -. 6 p.

    Research output: Contribution to conferencePaper

  221. Analysis of Hierarchical EDF Pre-emptive Scheduling

    Zhang, F. & Burns, A., 2007, p. 423-434.

    Research output: Contribution to conferencePaper

  222. Analysis of Write-back Caches under Fixed-priority Preemptive and Non-preemptive Scheduling

    Davis, R. I., Altmeyer, S. & Reineke, J., Oct 2016.

    Research output: Contribution to conferencePaper

  223. Analysis of a statistical regression approach for NO_2 pollution modelling

    Makrai, G. & Bate, I., 2017.

    Research output: Contribution to conferenceOther

  224. Analyzing APEX applications

    Audsley, N. & Wellings, A., 1 Dec 1996, p. 39-44. 6 p.

    Research output: Contribution to conferencePaper

  225. Anisotropic fluid solver for robust optical flow smoothing

    Doshi, A. & Bors, A. G., 6 May 2009, p. 117-120.

    Research output: Contribution to conferencePaper

  226. Application Areas of AIS: The Past, The Present and The Future

    Hart, E. & Timmis, J., 2005, p. 483-497.

    Research output: Contribution to conferencePaper

  227. Application Areas of AIS: Past, Present and Future

    Hart, E. & Timmis, J., 2005, p. 483-497.

    Research output: Contribution to conferenceOther

  228. Application of Model-Based Software Failure Taxonomy to the Analysis of System Failure Events

    Jackson, T. O., McDermid, J. A., Wand, I. C., Wilikens, M. & Papazoglu, I. A., 1996.

    Research output: Contribution to conferencePaper

  229. Applying HAZOP to Functional System Models

    Murdoch, J., McDermid, J. A., Wilkinson, P., Astley, K. & Reid, S., 1998, p. 127-136.

    Research output: Contribution to conferencePaper

  230. Applying Non-Interference to Composition of Systems: A more Practical Approach

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  231. Applying UML Interactions and Actor-Oriented Simulation to the Design Space Exploration of Network-on-Chip Interconnects

    Indrusiak, L. S., Ost, L., Moller, L., Moraes, F. & Glesner, M., 1 Apr 2008, p. 491 -494.

    Research output: Contribution to conferencePaper

  232. Applying Web Usage Mining Techniques to Discover Potential Browsing Problems of Users

    Ting, I-H., Kimble, C. & Kudenko, D., 2007, p. 929-930.

    Research output: Contribution to conferencePaper

  233. Approaches to Certification of Reconfigurable IMA Systems

    Hollow, P., McDermid, J. A. & Nicholson, M., 2000, p. 397-404.

    Research output: Contribution to conferencePaper

  234. Approaching the Formal Design and Development of Complex Systems: The Retrenchment Position

    Banach, R., Jeske, C., Fraser, S., Cross, R., Poppleton, M., Stepney, S. & King, S., 2004.

    Research output: Contribution to conferencePaper

  235. Approximating 3D facial shape from photographs using coupled statistical models

    Castelan, M., Smith, W. A. P. & Hancock, E. R., 2006, p. 89-98. 10 p.

    Research output: Contribution to conferencePaper

  236. ArCHATECH — An Architectural Construction and Analysis Technique for Real-Time Systems

    Vickers, A. J., McDermid, J. A. & Garlan, D., 1995.

    Research output: Contribution to conferencePaper

  237. Arabic Character Recognition with Shape Mixtures

    Al-Shaher, A. A. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  238. Architecturally Independent Software: the Case for Abstraction

    Wood, A. M., 1990, p. 123-127.

    Research output: Contribution to conferencePaper

  239. Artificial Homeostatic System: A Novel Approach

    Vargas, P. A., Moioli, R. C., Castro, L. N. D., Timmis, J., Neal, M. & Zuben, F. J. V., 2005, p. 754-764.

    Research output: Contribution to conferencePaper

  240. Artificial Immune Recognition System (AIRS): Revisions and Refinements

    Watkins, A. & Timmis, J., 2002, p. 173-181.

    Research output: Contribution to conferenceOther

  241. Artificial catalysed reaction networks for search

    Weeks, A. & Stepney, S., 2005.

    Research output: Contribution to conferencePaper

  242. Assessing Test Set Adequacy for Object-Oriented Programs using Class Mutation

    Kim, S., Clark, J. A. & McDermid, J. A., 1999, p. 72-83.

    Research output: Contribution to conferencePaper

  243. Assessing the Performance of Two Immune Inspired Algorithms and a Hybrid Genetic Algorithm for Function Optimisation

    Timmis, J., Edmonds, C. & Kelsey, J., 2004, p. 1044-1051.

    Research output: Contribution to conferenceOther

  244. Assurance of Claims and Evidence for Aviation Systems

    Reinhardt, D. W. & McDermid, J. A., 20 Oct 2010, p. 1-10. 10 p.

    Research output: Contribution to conferencePaper

  245. AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C., Wood, A., Bougé, L., Fraigniaud, P., Mignotte, A. & Robert, Y., 1996, p. 686-693.

    Research output: Contribution to conferencePaper

  246. Auburn: a kit for benchmarking functional data structures

    Moss, G. E., Runciman, C., Clack, C., Hammond, K. & Davie, T., 1998, p. 141--159.

    Research output: Contribution to conferencePaper

  247. Audio annotation of electronic texts

    Benest, I. D., 1995, p. 390-393.

    Research output: Contribution to conferencePaper

  248. Auditory Immersion of 5.1 Virtualization within Gameplay

    Hughes, S. S. & Kearney, G. C., 27 Sep 2016.

    Research output: Contribution to conferencePaper

  249. Auditory Navigation in Hyperspace: Design and Evaluation of a Non-Visual Hypermedia System for Blind Users

    Morley, S., Petrie, H., O'Neill, A-M. & McNally, P., 1998, p. 100-107.

    Research output: Contribution to conferencePaper

  250. Augmenting an artificial immune network

    Neal, M., Hunt, J. & Timmis, J., 1998, p. 3821-3826.

    Research output: Contribution to conferenceOther

  251. Augmenting icons for deaf computer users

    Petrie, H., Fisher, W., Weimann, K. & Weber, G., 2004, p. 1131-1134.

    Research output: Contribution to conferencePaper

  252. Automated Component Configuration in Safety-Critical Domains

    Stephenson, Z. & McDermid, J. A., 2004, p. 1-11.

    Research output: Contribution to conferencePaper

  253. Automated Generalisation of Function Definitions

    Bakewell, A., Runciman, C., Middeldorp, A. & Sato, T., 1 Nov 1999, p. 225-240.

    Research output: Contribution to conferencePaper

  254. Automated Heap Sizing in the Poly/ML Runtime

    White, D. R., Singer, J., Aitken, J. M. & Matthews, D., 2012, p. 1-9.

    Research output: Contribution to conferencePaper

  255. Automated Program Flaw Finding Using Simulated Annealing

    Tracey, N., Clark, J. A. & Mander, K., 1998, p. 73-81.

    Research output: Contribution to conferencePaper

  256. Automated benchmarking of functional data structures

    Moss, G. E., Runciman, C. & Gupta, G., 1 Jan 1999, p. 1--15.

    Research output: Contribution to conferencePaper

  257. Automated generalisation of function definitions

    Bakewell, A. & Runciman, C., 1999, p. 225--240.

    Research output: Contribution to conferencePaper

  258. Automatic Critiques of Interface Modes

    Gow, J., Thimbleby, H. W. & Cairns, P. A., 2005, p. 201-212.

    Research output: Contribution to conferencePaper

  259. Automatic Generation of Implied Clauses for SAT

    Drake, L., Frisch, A. M. & Walsh, T., 2002, p. 783.

    Research output: Contribution to conferencePaper

  260. Automatic Generation of Information-seeking Questions Using Concept Clusters

    Li, S. & Manandhar, S., 2009, p. 93-96.

    Research output: Contribution to conferencePaper

  261. Automatic Generation of Integrated Formal Models Corresponding to UML System Models

    Treharne, H., Turner, E., Paige, R. F. & Kolovos, D. S., 2009, p. 357-367.

    Research output: Contribution to conferencePaper

  262. Automatic Generation of Verified Concurrent Hardware

    Oliveira, M. & Woodcock, J., 2007, p. 286-306.

    Research output: Contribution to conferencePaper

  263. Automatic Multilingual Lexicon Generation using Wikipedia as a Resource

    Shahid, A. R. & Kazakov, D., 2009, p. 357-360.

    Research output: Contribution to conferencePaper

  264. Automatic Test Data Generation for Multiple Condition and MCDC Coverage

    Ghani, K., Clark, J. A., Boness, K., Fernandes, J. M., Hall, J. G., Machado, R. J. & Oberhauser, R., 2009, p. 152-157. 6 p.

    Research output: Contribution to conferencePaper

  265. Automatic Translation from it ircus to Java

    Freitas, A. & Cavalcanti, A., 2006, p. 115-130.

    Research output: Contribution to conferencePaper

  266. Automatic extraction of notions from course material

    Pedroni, M., Oriol, M., Meyer, B. & Angerer, L., 2008, p. 251.

    Research output: Contribution to conferencePaper

  267. Automatic generation of tests from Statechart specifications

    Burton, S., Clark, J. A. & McDermid, J. A., 2001.

    Research output: Contribution to conferencePaper

  268. Automatically moving between levels in Artificial Chemistries

    Nellis, A. & Stepney, S., 2010, p. 269-276.

    Research output: Contribution to conferencePaper

  269. Automating Refinement of Circus Programs

    Zeyda, F. & Cavalcanti, A., 2010, p. 274-290.

    Research output: Contribution to conferencePaper

  270. Automation of System Safety Analysis: Possibilities and Pitfalls

    Galloway, A., McDermid, J. A., Murdoch, J. & Pumfrey, D. J., 2002.

    Research output: Contribution to conferencePaper

  271. Automorphisms of transition graphs for a linear cellular automaton

    Powley, E. J. & Stepney, S., 2008, p. 55-68.

    Research output: Contribution to conferencePaper

  272. Autonomous Objects and Bottom-Up Composition in ZOO Applied to a Case Study of Biological Reactivity

    Amálio, N., Polack, F. & Zhang, J., 2008, p. 323-336.

    Research output: Contribution to conferencePaper

  273. BONITA: A Set of Tuple Space Primitives for Distributed Coordination

    Rowstron, A. & Wood, A., 1 Jan 1997.

    Research output: Contribution to conferencePaper

  274. Background Subtraction in Video Using Recursive Mixture Models, Spatio-Temporal Filtering and Shadow Removal

    Chen, Z., Pears, N., Freeman, M. & Austin, J., 2009, p. 1141-1150.

    Research output: Contribution to conferencePaper

  275. Baselines for Joint-Action Reinforcement Learning of Coordination in Cooperative Multi-agent Systems

    Carpenter, M. & Kudenko, D., 2005, p. 55-72.

    Research output: Contribution to conferencePaper

  276. Behaviour, realism and immersion in games

    Cheng, K. & Cairns, P. A., 2005, p. 1272--1275.

    Research output: Contribution to conferencePaper

  277. Beyond Guidelines: What Can We Learn from the Visual Information Seeking Mantra?

    Craft, B. & Cairns, P. A., 2005, p. 110-118.

    Research output: Contribution to conferencePaper

  278. Bilingual lexicon extraction from comparable corpora using in-domain terms

    Ismail, A. & Manandhar, S., 2010, p. 481-489.

    Research output: Contribution to conferencePaper

  279. Binary neural network based 3D facial feature localization

    Ju, Q., O'Keefe, S. & Austin, J., 2009, p. 1462-1469.

    Research output: Contribution to conferencePaper

  280. Binding-time improvement and fold-unfold transformations

    Runciman, C., 1995, p. 218-230.

    Research output: Contribution to conferencePaper

  281. Biomolecular Immune-Computer: Theoretical Basis and Experimental Simulator

    Goncharova, L. B., Jacques, Y., Martín-Vide, C., Tarakanov, A. O. & Timmis, J., 2005, p. 72-85.

    Research output: Contribution to conferencePaper

  282. Blind Source Separation Using Variational Expectation-Maximization Algorithm

    Nasios, N. & Bors, A. G., Aug 2003, p. 442-450.

    Research output: Contribution to conferencePaper

  283. Blind and robust mesh watermarking using manifold harmonics

    Wang, K., Luo, M., Bors, A. G. & Denis, F., Nov 2009, p. 3657-3660. 4 p.

    Research output: Contribution to conferencePaper

  284. BookLeaf: An Unstructured Hydrodynamics Mini-application

    Truby, D., Wright, S. A., Kevis, R., Maheswaran, S., Herdman, A. & Jarvis, S. A., 10 Sep 2018. 8 p.

    Research output: Contribution to conferencePaper

  285. Breaking affordance: culture as context

    Oshlyansky, L., Thimbleby, H. & Cairns, P., 2004, p. 81--84.

    Research output: Contribution to conferencePaper

  286. Breaking the Model: finalisation and a taxonomy of security attacks

    Clark, J. A., Stepney, S. & Chivers, H., 2005, p. 225--242.

    Research output: Contribution to conferencePaper

  287. Building Theories into Instantiation

    Frisch, A. M. & Page Jr., C. D., 1995, p. 1210-1216.

    Research output: Contribution to conferencePaper

  288. Building for Users not for Experts: Designing a Visualization of the Literature Domain

    Faisal, S., Cairns, P. A. & Blandford, A., 2007, p. 707-712.

    Research output: Contribution to conferencePaper

  289. Bunches for Object-Oriented, Concurrent, and Real-Time Specification

    Paige, R. F. & Hehner, E. C. R., 1999, p. 530-550. 20 p.

    Research output: Contribution to conferencePaper

  290. CGRASS: A System for Transforming Constraint Satisfaction Problems

    Frisch, A. M., Miguel, I. & Walsh, T., 2002, p. 15-30.

    Research output: Contribution to conferencePaper

  291. CHAINED BELL INEQUALITIES

    BRAUNSTEIN, SL., CAVES, CM. & KAFATOS, M., 1989, p. 27-36.

    Research output: Contribution to conferencePaper

  292. CICS Project Report: Experiences and Results from the use of Z in IBM

    Houston, I. & King, S., 1991, p. 588-596.

    Research output: Contribution to conferencePaper

  293. COTS Product Selection for Safety-Critical Systems

    Ye, F. & Kelly, T., 2004, p. 53-62.

    Research output: Contribution to conferencePaper

  294. COTS in Safety-Related Systems: issues and an illustration

    May, R., McDermid, J. A. & Johnston, I. H. A., 1998.

    Research output: Contribution to conferencePaper

  295. Calculated Secure Processes

    Banks, M. J. & Jacob, J. L., 1 Nov 2010, p. 19--28.

    Research output: Contribution to conferencePaper

  296. Can Secure Systems be Built Using Today's Development Processes?

    Woody, C., Hall, A. & Clark, J. A., 2004.

    Research output: Contribution to conferenceOther

  297. Can we Remove the Human from Hazard Analysis?

    Alexander, R. & Kelly, T., 2006.

    Research output: Contribution to conferencePaper

  298. Capturing player experiences with post-game commentaries.

    Gow, J., Cairns, P. A., Colton, S., Baumgarten, R. & Miller, P., 2010.

    Research output: Contribution to conferencePaper

  299. Case Studies in Using a Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 395-408. 13 p.

    Research output: Contribution to conferencePaper

  300. Categorising Non-interference

    Jacob, J. L., 1990, p. 44--50.

    Research output: Contribution to conferencePaper

  301. Causality as a Means for the Expression of Requirements for Safety Critical Systems

    Coombes, A. C. & McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  302. Cellular Associative Symbolic Processing for Pattern Recognition

    Orovas, C. & Austin, J., 1998, p. 269-279.

    Research output: Contribution to conferencePaper

  303. Certification of Autonomous Systems

    R Alexander, M. H-M. & Kelly, T., 2007.

    Research output: Contribution to conferencePaper

  304. Certification of Autonomous Systems under UK Military Safety Standards

    Alexander, R., Hall-May, M. & Kelly, T., 2007.

    Research output: Contribution to conferencePaper

  305. Certification of Neural Networks

    Jackson, T. O. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  306. Challenges for Artificial Immune Systems

    Timmis, J., 2005, p. 355-367.

    Research output: Contribution to conferenceOther

  307. Challenges of Establishing a Software Product Line for an Aerospace Engine Monitoring System

    Habli, I. & Kelly, T., 2007, p. 193-202.

    Research output: Contribution to conferencePaper

  308. Challenges of evaluating the information visualisation experience

    Faisal, S., Cairns, P. A. & Blandford, A., 2007, p. 167-170.

    Research output: Contribution to conferencePaper

  309. Challenges when using Model-Driven Architecture in the development of Safety Critical Software

    Conmy, P. & Paige, R. F., 31 Mar 2007, p. 127-136. 9 p.

    Research output: Contribution to conferencePaper

  310. Character Education Using Pedagogical Agents and Socratic Voice

    HodHod, R. A., Kudenko, D. & Cairns, P. A., 2010.

    Research output: Contribution to conferencePaper

  311. Characterisation of Systems of Systems Failures

    Alexander, R., Hall-May, M. & Kelly, T., 2004.

    Research output: Contribution to conferencePaper

  312. Characterising Facial Gender Difference Using Fisher-Rao Metric

    Ceolin, S. & Hancock, E. R., 2010, p. 4308-4311.

    Research output: Contribution to conferencePaper

  313. Characterising Graphs using the Heat Kernel

    Xiao, B., Wilson, R. C. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  314. Characterising embedded applications using a UML profile

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Oct 2009, p. 172 -175.

    Research output: Contribution to conferencePaper

  315. Characters + Mark-up = Z Lexis

    Toyn, I. & Stepney, S., 2002, p. 100-119.

    Research output: Contribution to conferencePaper

  316. Chasing Chaos.

    Kelsy, J., Timmis, J. & Hone, A., 2003, p. 131-139.

    Research output: Contribution to conferenceOther

  317. Chemical similarity searching using a neural graph matcher

    Klinger, S. & Austin, J., 2005, p. 479-484.

    Research output: Contribution to conferencePaper

  318. Class Mutation: Mutation Testing for Object-Oriented Programs

    Kim, S-W., Clark, J. A. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  319. Clustering Morphological Paradigms Using Syntactic Categories

    Can, B. & Manandhar, S., 2009, p. 641-648.

    Research output: Contribution to conferencePaper

  320. Co-designing the computational model and the computing substrate

    Stepney, S., 2019, p. 5–14. 10 p.

    Research output: Contribution to conferencePaper

  321. Co-ordinating Knowledge in Pervasive Environments

    Nixon, L., Tolksdorf, R., Wood, A. M. & Menezes, R., 2007, p. to appear.

    Research output: Contribution to conferencePaper

  322. CoSMoS: Complex Systems Modelling and Simulation Infrastructure (extended abstract)

    Stepney, S. & Welch, P. H., 2009.

    Research output: Contribution to conferenceAbstract

  323. CoSMoS in the Context of Social Ecological Research

    Forrester, J. M., Greaves, R. B. & Polack, F. A. C., 2012, p. 47-76.

    Research output: Contribution to conferencePaper

  324. CoSMoS process, models, and metamodels

    Andrews, P. S., Stepney, S., Hoverd, T., Polack, F. A. C., Sampson, A. T. & Timmis, J., 2011.

    Research output: Contribution to conferencePaper

  325. Collapsed Tree Rewriting: Completeness, Confluence, and Modularity

    Plump, D., 1993, p. 97--112.

    Research output: Contribution to conferencePaper

  326. Combining Agile Practices with UML and EJB: A Case Study in Agile Development

    Paige, R. F., Agarwal, P. & Brooke, P. J., 2003, p. 351-353. 2 p.

    Research output: Contribution to conferencePaper

  327. Combining EDF and FP Scheduling: Analysis and Implementation in Ada 2005

    Burns, A., Wellings, A. J. & Zhang, F., 2009, p. 119-133.

    Research output: Contribution to conferencePaper

  328. Combining Gameplay Data with Monte Carlo Tree Search to Emulate Human Play

    Devlin, S., Anspoka, A., Sephton, N. J., Cowling, P. I. & Rollason, J., 19 Sep 2016.

    Research output: Contribution to conferencePaper

  329. Combining Inference and Search for the Propositional Satisfiability Problem

    Drake, L. & Frisch, A. M., 2002, p. 982.

    Research output: Contribution to conferencePaper

  330. Combining LAPIS and WordNet for Learning of LR Parsers with Optimal Semantic Constraints

    Kazakov, D., Dzeroski, S. & Flach, P. A., 1999, p. 140-151.

    Research output: Contribution to conferencePaper

  331. Combining Probabilistic Shape-from-Shading and Statistical Facial Shape Models

    Ahmad, T., Wilson, R. C., Smith, W. A. P. & Haines, T. S. F., 14 Sep 2011, p. 680-690. 11 p.

    Research output: Contribution to conferencePaper

  332. Combining Reinforcement Learning with Symbolic Planning

    Grounds, M. & Kudenko, D., 2007, p. 75-86.

    Research output: Contribution to conferencePaper

  333. Combining Simulation with Machine Learning to Build Accident Models

    Alexander, R. & Kelly, T., 2006.

    Research output: Contribution to conferencePaper

  334. Combining shape-from-shading and stereo using Gaussian-Markov random fields

    Haines, T. S. F. & Wilson, R. C., 8 Dec 2008, p. 1-4. 4 p.

    Research output: Contribution to conferencePaper

  335. Coming and Going from UML to B: a proposal to support traceability in rigorous IS development

    Laleau, R. & Polack, F., 1 Jan 2002, p. 517-534.

    Research output: Contribution to conferencePaper

  336. Comments on real-valued negative selection vs. real-valued positive selection and one-class SVM

    Stibor, T. & Timmis, J., 2007, p. 3727-3734.

    Research output: Contribution to conferencePaper

  337. Communicating Complex Systems

    Welch, P. H., Barnes, F. R. M. & Polack, F., 2006, p. 107-120.

    Research output: Contribution to conferencePaper

  338. Communication Systems in ClawZ

    Vernon, M., Zeyda, F. & Cavalcanti, A., 2010, p. 334-348.

    Research output: Contribution to conferencePaper

  339. Commute-Time Convolution Kernels for Graph Clustering

    Rahman, N. A. & Hancock, E. R., 2010, p. 316-323.

    Research output: Contribution to conferencePaper

  340. Comparing Composite vs. Wave-Cores in a Novel Dark-Silicon Methodology

    Crispin-Bailey, C. & Arnone, A., 27 Jun 2016. 4 p.

    Research output: Contribution to conferencePaper

  341. Comparing Extended Z with a Heterogeneous Notation for Reasoning about Time and Space

    Paige, R. F., 1998, p. 214-232.

    Research output: Contribution to conferencePaper

  342. Comparing Model-Metamodel and Transformation-Metamodel Co-evolution

    Rose, L. M., Etien, A., Méndez, D., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010.

    Research output: Contribution to conferencePaper

  343. Comparing Real-Time Communication Under Electromagnetic Interference

    Broster, I., Burns, A. & Rodríguez-Navas, G., 2004, p. 45-52.

    Research output: Contribution to conferencePaper

  344. Comparing Variants of the Beckmann Model

    Ragheb, H. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  345. Comparing algorithms for search-based test data generation of Matlab

    Ghani, K., Clark, J. A. & Zhan, Y., 2009, p. 2940-2947.

    Research output: Contribution to conferencePaper

  346. Comparison of a multi-layered artificial immune system with a kohonen network

    Knight, T. & Timmis, J., 2007, p. 3735-3742.

    Research output: Contribution to conferencePaper

  347. Comparison of formalisation approaches of UML class constructs in Z and Object-Z

    Amàlio, N. & Polack, F., 1 Jun 2003, p. 339-358.

    Research output: Contribution to conferencePaper

  348. Competitive carbon counting: can social networking sites make saving energy more enjoyable?

    Foster, D., Blythe, M., Cairns, P. A. & Lawson, S., 2010, p. 4039-4044.

    Research output: Contribution to conferencePaper

  349. Complete and partial redex trails of functional computations

    Sparud, J. & Runciman, C., 1997, p. 160--177.

    Research output: Contribution to conferencePaper

  350. Component Failure Mitigation According to Failure Type

    Ye, F. & Kelly, T., 2004, p. 258-264.

    Research output: Contribution to conferencePaper

  351. Computational novelty: Phenomena, mechanisms, worlds

    Nellis, A. & Stepney, S., Jul 2014, p. 506–513.

    Research output: Contribution to conferencePaper

  352. Computer Analysis of Images and Patterns

    Wilson, R., Hancock, E., Bors, A. & Smith, W., 2013.

    Research output: Contribution to conferencePaper

  353. Computer Analysis of Images and Patterns - Part 1

    Wilson, R., Hancock, E., Bors, A. & Smith, W., 2013.

    Research output: Contribution to conferencePaper

  354. Computer Based Support for Standards and Processes in Safety Critical Systems

    Wilson, S. P., McDermid, J. A., Kirkham, P. M., Pygott, C. H. & Tombs, D. J., 1997.

    Research output: Contribution to conferencePaper

  355. Computer-Driven Persuasive Dialogue: A Multi-Layer Reasoning Framework

    Andrews, P., Manandhar, S. & Boni, M. D., 2006, p. 787-788.

    Research output: Contribution to conferencePaper

  356. Computers and Assistive Technology: ICCHP'98, IFIP World Computer Congress 1998

    Edwards, A. D. N., Arató, A. & Zagler, W. L., 1998.

    Research output: Contribution to conferencePaper

  357. Concordance: A Framework for Managing Model Integrity

    Rose, L. M., Kolovos, D. S., Drivalos, N., Williams, J. R., Paige, R. F., Polack, F. A. C. & Fernandes, K. J., 2010, p. 245-260.

    Research output: Contribution to conferencePaper

  358. Concordance: An Efficient Framework for Managing Model Integrity

    Rose, L. M., Kolovos, D. S., Drivalos, N., Williams, J. R., Paige, R. F., Polack, F. A. C. & Fernandes, K. J., 2010, p. 62--73.

    Research output: Contribution to conferencePaper

  359. Congestion Sensitive Algorithm for Point-to-Multipoint Multicast Congestion Control in ATM Networks

    Hong, L., enmin, S., sotudeh, R. & Crispin-Bailey, C., 2002, p. 417-420. 4 p.

    Research output: Contribution to conferencePaper

  360. Conjure Revisited: Towards Automated Constraint Modelling

    Akgun, O., Frisch, A. M., Hnich, B., Jefferson, C. & Miguel, I., 1 Sep 2010.

    Research output: Contribution to conferencePaper

  361. Connecting resilience engineering to healthcare practice: Clinical engagement through a serious video game

    Jackson, J., Iacovides, I., Alders, M., Duncan, M., Anderson, J. & Back, J., 2017.

    Research output: Contribution to conferenceAbstract

  362. Constraints for Breaking More Row and Column Symmetries

    Frisch, A. M., Jefferson, C., Miguel, I. & Rossi, F., 2003, p. 318-332.

    Research output: Contribution to conferencePaper

  363. Constructing Models with the Human-Usable Textual Notation

    Rose, L. M., Paige, R. F., Kolovos, D. S. & Polack, F. A. C., 2008, p. 249-263.

    Research output: Contribution to conferencePaper

  364. Constructing Secure Distributed Systems Using Components

    Shi, Q. & McDermid, J. A., 1993, p. 143-152.

    Research output: Contribution to conferencePaper

  365. Content Personalization for Inclusive Education through Model-Driven Engineering

    Power, C. & Paige, R. F., 2009, p. 102-109.

    Research output: Contribution to conferencePaper

  366. Contents of a Software Engineering Undergraduate Course

    McDermid, J. A., Thompson, J. B., Edwards, H. M. & Lethbridge, T., 2002, p. B37-B40.

    Research output: Contribution to conferencePaper

  367. Contextual web accessibility: maximizing the benefit of accessibility guidelines

    Sloan, D., Heath, A., Hamilton, F., Kelly, B., Petrie, H. & Phipps, L., 2006, p. 121-131.

    Research output: Contribution to conferencePaper

  368. Continuous Discrete-Event Simulation of a Continuous-Media Server I/O Subsystem

    Weeks, M., Bailey, C. & Sotudeh, R., 2000, p. 2002-2009.

    Research output: Contribution to conferencePaper

  369. Contract driven development= test driven development-writing test cases

    Leitner, A., Ciupa, I., Oriol, M., Meyer, B. & Fiva, A., 2007, p. 434.

    Research output: Contribution to conferencePaper

  370. Contract-Based Justification for COTS Component within Safety Critical Applications

    Ye, F. & Kelly, T., 2004, p. 13-22.

    Research output: Contribution to conferencePaper

  371. Control Law Diagrams in it ircus

    Cavalcanti, A., Clayton, P. & O'Halloran, C., 2005, p. 253-268.

    Research output: Contribution to conferencePaper

  372. Controlling Complex Dynamics with Artificial Biochemical Networks

    Lones, M. A., Tyrrell, A. M., Stepney, S. & Caves, L. S. D., 2010, p. 159-170.

    Research output: Contribution to conferencePaper

  373. Controlling Legged Robots with Coupled Artificial Biochemical Networks

    Lones, M. A., Tyrrell, A. M., Stepney, S. & Caves, L. S. D., Aug 2011, p. 465-472.

    Research output: Contribution to conferencePaper

  374. Coordinating Knowledge in Pervasive Environments

    Nixon, L. J. B., Tolksdorf, R., Wood, A. & Menezes, R., 2007, p. 74-79.

    Research output: Contribution to conferencePaper

  375. Coordination of Collaborative Engineering: State of the Art and Future Challenges

    Pawlak, A., Sandkuhl, K., Cholewa, W. & Indrusiak, L. S., 2007.

    Research output: Contribution to conferencePaper

  376. Coordination with Attributes

    Wood, A. M., Ciancarini, P. & Wolf, A. L., 1999, p. 21--36.

    Research output: Contribution to conferencePaper

  377. Coordination with Multicapabilities

    Udzir, N. I., Wood, A. M. & Jacob, J. L., 2005, p. 79--108.

    Research output: Contribution to conferencePaper

  378. Coordination with Scopes

    Merrick, I. & Wood, A. M., 2000.

    Research output: Contribution to conferencePaper

  379. Corner Detection Via Topographic Analysis of Vector Potential

    Luo, B., Cross, A. D. J. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  380. Cotranslational Protein Folding with L-systems

    Danks, G. B., Stepney, S., Caves, L. S. D., Kampis, G., Karsai, I. & Szathmáry, E., 2009, p. 289-296.

    Research output: Contribution to conferencePaper

  381. Course management with TrucStudio

    Pedroni, M., Oriol, M., Meyer, B., Albonico, E. & Angerer, L., 1 Aug 2008, p. 260.

    Research output: Contribution to conferencePaper

  382. Critical Critical Systems

    Stepney, S., 2002, p. 62-70.

    Research output: Contribution to conferencePaper

  383. Critical Critical Systems

    Stepney, S., 2003, p. 62--70.

    Research output: Contribution to conferencePaper

  384. Cyber Rally: an experience of democratic use of the internet

    Ramalho, G., Barros, F. A., Cavalcante, S., Cavalcanti, A., Lima, M., Meira, S. R. D. L., Moura, H. & Vasconcelos, A., 1999, p. 402-406.

    Research output: Contribution to conferencePaper

  385. Cyber-Physical Systems Design: Formal Foundations, Methods and Integrated Tool Chains

    Woodcock, J., Fitzgerald, J., Gamble, C., Larsen, P. G. & Pierce, K., 2015, p. 40-46.

    Research output: Contribution to conferencePaper

  386. Data analysis with artificial immune systems and cluster analysis and kohonen networks: some comparisons

    Timmis, J., Neal, M. & Hunt, J., 2000, p. 922-927.

    Research output: Contribution to conferenceOther

  387. Data, Intelligent Decision Support and Pattern Matching

    Hodge, V. J., Smith, M. & Austin, J., 23 Sep 2009.

    Research output: Contribution to conferencePaper

  388. Decentralised Gambling Overview: House of Lords Select Committee

    Scholten, O. J., Walker, J. A. & Zendle, D., 9 Oct 2019.

    Research output: Contribution to conferenceOther

  389. Decoding Population Codes

    Wilson, R. C. & Lüdtke, N., 3 Sep 2000, p. 2137-2140. 4 p.

    Research output: Contribution to conferencePaper

  390. Deconstructing Web Experience: More Than Just Usability and Good Design

    Harrison, C. & Petrie, H., 2007, p. 889-898.

    Research output: Contribution to conferencePaper

  391. Decoupling Criticality and Importance in Mixed-Criticality Scheduling

    Bletsas, K., Awan, M. A., Souto, P. F., Akesson, B., Burns, A. & Tovar, E., Dec 2018, p. 25-32. 6 p.

    Research output: Contribution to conferenceOther

  392. Deep Learning and Word Embeddings for Tweet Classification for Crisis Response

    O'Keefe, S. E. M. & Alrashdi, R. M. M., 8 Oct 2018. 5 p.

    Research output: Contribution to conferencePaper

  393. Deep Learning of Cell Classification using Microscope Images of Intracellular Microtubule Networks

    Alexei, S., Dmitry, B., Marina, P., Kudenko, D., Burakov, A. & Nadezhdina, E., 18 Dec 2017.

    Research output: Contribution to conferencePaper

  394. Defining an Acceptable Level of Redundancy

    Dawkins, S. K. & McDermid, J. A., 1998, p. 30-39.

    Research output: Contribution to conferencePaper

  395. Defining and Decomposing Safety Policy for Systems of Systems

    Hall-May, M. & Kelly, T., 2005, p. 37-51.

    Research output: Contribution to conferencePaper

  396. Delivering Real-Time Behaviour

    Burns, A. & Wellings, A. J., 2007, p. 1-50.

    Research output: Contribution to conferencePaper

  397. Dependability Evaluation using a Multi-Crieria Decision Analysis Procedure

    Prasad, D. K. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  398. Dependability Terminology: Similarities and Differences

    Prasad, D., McDermid, J. A. & Wand, I. C., 1995.

    Research output: Contribution to conferencePaper

  399. Dependable Software - The State of the Art

    McDermid, J. A., 1992, p. 25/6-25/14.

    Research output: Contribution to conferencePaper

  400. Dependency Based Embeddings for Sentence Classification Tasks

    Komninos, A. & Manandhar, S., 12 Jun 2016, p. 1490-1500. 11 p.

    Research output: Contribution to conferencePaper

  401. Depth-Based Subgraph Convolutional Neural Networks

    Zhang, Z., Hancock, E. R., Bai, L. & Cui, L., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  402. Derivation of Safety Requirements for an Embedded Control System

    Lindsay, P. A., McDermid, J. A. & Kassler, J., 2002.

    Research output: Contribution to conferencePaper

  403. Deriving Safety Requirements Using Scenarios

    Allenby, K. & Kelly, T., 2001, p. 228-235.

    Research output: Contribution to conferencePaper

  404. Deriving Safety Requirements for Autonomous Systems

    Alexander, R., Herbert, N. & Kelly, T., Jul 2009.

    Research output: Contribution to conferencePaper

  405. Design of a Miniature Physiological Data Recorder, and it's Biomedical Applications: Presentation to BPSI Spring Symposium 2018

    Crispin-Bailey, C., Austin, J., Dai, C., Moulds, A., Platt, B. & Crouch, B., 20 Mar 2018, p. 1-17. 18 p.

    Research output: Contribution to conferenceOther

  406. Design to read: designing for people who do not read easily

    Jarrett, C., Petrie, H. & Summers, K., 2010, p. 4481-4484.

    Research output: Contribution to conferencePaper

  407. Design versus Training of Neural Machines

    Somers, H. & Wood, A. M., 1993.

    Research output: Contribution to conferencePaper

  408. Designing Secure Systems of Good Quality

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  409. Designing a Domain-Specific Contract Language: A Metamodelling Approach

    Chan, Z. E. & Paige, R. F., 2005, p. 175-189.

    Research output: Contribution to conferencePaper

  410. Designing an Ubiquitous Computing Development Kit

    Crispin-Bailey, C. & Freeman, M. J., 25 Oct 2005, p. 99-105. 7 p.

    Research output: Contribution to conferencePaper

  411. Designing for Emotional Complexity in Games: The Interplay of Positive and Negative Affect

    Mekler, E., Rank, S., Steinemann, S., Birk, M. & Iacovides, I., 1 Oct 2016.

    Research output: Contribution to conferenceOther

  412. Detecting Compositionality in Multi-Word Expressions

    Korkontzelos, I. & Manandhar, S., 2009, p. 65-68.

    Research output: Contribution to conferencePaper

  413. Detecting Multiple Texture Planes using Local Spectral Distortion

    Ribeiro, E. & Hancock, E. R., 2000.

    Research output: Contribution to conferencePaper

  414. Detecting Vorticity in Optical Flow of Fluids

    Doshi, A. & Bors, A. G., Aug 2010, p. 2118-2121. 4 p.

    Research output: Contribution to conferencePaper

  415. Detecting and Repairing Inconsistencies across Heterogeneous Models

    Kolovos, D., Paige, R. & Polack, F., 2008, p. 356--364.

    Research output: Contribution to conferencePaper

  416. Determining Accessibility Needs Through User Goals

    Carey, K., Gracia, R., Power, C., Petrie, H. & Carmien, S., 2007, p. 28-35.

    Research output: Contribution to conferencePaper

  417. Deterministic Consistency Checking of LP Constraints

    Manandhar, S., 1995, p. 165-172.

    Research output: Contribution to conferencePaper

  418. Developing BON as an Industrial-Strength Formal Method

    Paige, R. F. & Ostroff, J. S., 1999, p. 834-853.

    Research output: Contribution to conferencePaper

  419. Developing Secure Systems in a Modular Way

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  420. Developing Successful Modular Arguments for Object-Oriented Systems

    Hawkins, R., Bates, S. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  421. Developing a UML Profile for Modelling Knowledge-Based Systems

    Abdullah, M. S., Kimble, C., Paige, R. F., Benest, I. D. & Evans, A., 2004, p. 220-233.

    Research output: Contribution to conferencePaper

  422. Developing ubiquitous computing applications

    Freeman, M. & Bailey, C., 2005, p. 263-270.

    Research output: Contribution to conferencePaper

  423. Developing user requirements for visualizations of literature knowledge domains

    Faisal, S., Cairns, P. & Blandford, A., 2006, p. 264-269.

    Research output: Contribution to conferencePaper

  424. Development of Dialogue Systems for a Mobility Aid for Blind People: Initial Design and Usability Testing

    Strothotte, T., Fritz, S., Michel, R., Raab, A., Petrie, H., Johnson, V., Reichert, L. & Schalt, A., 1996, p. 139-144.

    Research output: Contribution to conferencePaper

  425. Deviational Analyses for Validating Regulations on Real Systems

    Polack, F., Srivatanakul, T., Kelly, T., Clark, J. A., Laleau, R. & Lemoine, M., 2006.

    Research output: Contribution to conferencePaper

  426. Directed Graph Evolution from Euler-Lagrange Dynamics

    Wang, J., Wilson, R. C. & Hancock, E. R., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  427. Directions for Methodological Research in Information Visualization

    Craft, B. & Cairns, P. A., 2008, p. 44-50.

    Research output: Contribution to conferencePaper

  428. Discretization Numbers for Multiple-Instances Problem in Relational Database

    Alfred, R. & Kazakov, D., 2007, p. 55-65.

    Research output: Contribution to conferencePaper

  429. Discriminative Features Matter: Multi-layer Bilinear Pooling for Camera Localization

    Wang, X., Wang, X., Wang, C., Bai, X., Wu, J. & Hancock, E. R., 23 Jul 2019, (Accepted/In press). 12 p.

    Research output: Contribution to conferencePaper

  430. Dispatching Domains for Multiprocessor Platforms and Their Representation in Ada

    Burns, A. & Wellings, A. J., 2010, p. 41-53.

    Research output: Contribution to conferencePaper

  431. Display Registration for Device Interaction: a Proof of Principle Prototype

    Pears, N., Olivier, P. & Jackson, D., 2008, p. 446-451.

    Research output: Contribution to conferencePaper

  432. Distributed Garbage Collection of Tuple Spaces in Open Linda Coordination Systems

    Menezes, R. & Wood, A. M., 1999.

    Research output: Contribution to conferencePaper

  433. Distribution Data Across Multiple Cloud Storage Using ReinforcementLearning Method

    Algarni, A. F. H. & Kudenko, D., 2016, (Accepted/In press).

    Research output: Contribution to conferencePaper

  434. Do 'Attractive Things Work Better'? An Exploration of Search Tool Visualisations

    Chawda, B., Craft, B., Cairns, P., Rüger, S. & Heesch, D., 2005.

    Research output: Contribution to conferencePaper

  435. Document Feature Recognition using a Mesh of Associative Memories

    O'Keefe, S. E. M. & Austin, J., 1996, p. 37.1-37.10.

    Research output: Contribution to conferencePaper

  436. Domain-Specific Metamodelling Languages for Software Language Engineering

    Zschaler, S., Kolovos, D. S., Drivalos, N., Paige, R. F. & Rashid, A., 2009, p. 334-353.

    Research output: Contribution to conferencePaper

  437. Duality of Actor and Character Goals in Virtual Drama

    Arinbjarnar, M. & Kudenko, D., 2009, p. 386-392.

    Research output: Contribution to conferencePaper

  438. Dynamic Ceiling Priorities: A Proposal for Ada0Y

    Real, J., Burns, A., Schonberg, E. & Crespo, A., 2004, p. 261-272.

    Research output: Contribution to conferencePaper

  439. Dynamic Generation of Dilemma-based Interactive Narratives

    Barber, H. & Kudenko, D., 2007, p. 2-7.

    Research output: Contribution to conferencePaper

  440. Dynamic Sets and Their Application in VDM

    Liu, S. & McDermid, J. A., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  441. Dynamic Sets and their Application to VDM

    Liu, S., McDermid, J. A., E Deaton K M George, H. B. & Hedrick, G., 1993, p. 187-192.

    Research output: Contribution to conferencePaper

  442. Dynamic software updates for real-time systems

    Wahler, M., Richter, S. & Oriol, M., 2009, p. 1.

    Research output: Contribution to conferencePaper

  443. Ecore to GenModel Case

    Kolovos, D. S., Rose, L. M., Paige, R. F. & de Lara, J., 2010.

    Research output: Contribution to conferencePaper

  444. Educational Narrative and Student Modeling for Ill-Defined Domains

    HodHod, R. A., Kudenko, D. & Cairns, P. A., 2009, p. 638. 640 p.

    Research output: Contribution to conferencePaper

  445. Efficient Implementation of Massive Neural Networks

    Austin, J., Jackson, T., Wood, A. M., Delgado-Frias, J. G. & Moore, W. P., 1991, p. 387-398.

    Research output: Contribution to conferencePaper

  446. Efficient unit test case minimization

    Leitner, A., Oriol, M., Zeller, A., Ciupa, I. & Meyer, B., 2007, p. 417.

    Research output: Contribution to conferencePaper

  447. Eliciting and Specifying Requirements with Use Cases for Embedded Systems

    Nasr, E., McDermid, J. A. & Bernat, G., 2002, p. 350-358.

    Research output: Contribution to conferencePaper

  448. Embodied copying for richer evolution

    Nellis, A. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  449. Embodied genomes and metaprogramming

    Hickinbotham, S., Stepney, S., Nellis, A., Clarke, T., Clark, E., Pay, M. & Young, P., 2011.

    Research output: Contribution to conferencePaper

  450. Emergent Neural Computational Architectures Based on Neuroscience: Towards Neuroscience-Inspired Computing

    Wermter, S., Austin, J. & Willshaw, D. J., 2001.

    Research output: Contribution to conferencePaper

  451. Emerging Patterns for Testing Model Management Tools

    Rose, L. M., Kolovos, D. S., Paige, R. F., Gilliam, T. & Polack, F. A. C., 2009.

    Research output: Contribution to conferencePaper

  452. Empirical Investigation of an Artificial Cytokine Network

    Read, M., Timmis, J. & Andrews, P. S., 2008, p. 340-351.

    Research output: Contribution to conferencePaper

  453. Enabling Network-Based Learning

    Crispin-Bailey, C. & Pears, N. E., 2002. 5 p.

    Research output: Contribution to conferencePaper

  454. Enabling Software Evolution Via AOP and Reflection

    Oriol, M., Cazzola, W., Chiba, S., Saake, G., Coady, Y., Ducasse, S. & Kniesel, G., 2007, p. 91--98.

    Research output: Contribution to conferencePaper

  455. Encoding it ircus Programs in ProofPowerZ

    Zeyda, F. & Cavalcanti, A., 2008, p. 218-237.

    Research output: Contribution to conferencePaper

  456. Energy as a driver of diversity in open-ended evolution

    Hoverd, T. & Stepney, S., 2011.

    Research output: Contribution to conferencePaper

  457. Enforcing Behaviour with Anonymity

    Wright, J. & Stepney, S., 2008.

    Research output: Contribution to conferencePaper

  458. Engineering & Assessing Safety-Critical Systems

    McDermid, J. A. & Moffett, J. D., 1994.

    Research output: Contribution to conferencePaper

  459. Engineering Emergence

    Stepney, S., Polack, F. & Turner, H. R., 2006, p. 89-97.

    Research output: Contribution to conferencePaper

  460. Enhancing YouShare: the online collaboration research environment for sharing data and services.

    Hodge, V., Turner, A., Fletcher, M., Jessop, M., Weeks, M., Jackson, T. & Austin, J., 2012.

    Research output: Contribution to conferencePaper

  461. Ensuring Dependable Systems of Systems

    Kelly, T., Hall-May, M. & Alexander, R., 2007.

    Research output: Contribution to conferencePaper

  462. Environment orientation: an architecture for simulating complex systems

    Hoverd, T. & Stepney, S., 2009, p. 67-82.

    Research output: Contribution to conferencePaper

  463. Epipole Estimation under Pure Camera Translation

    Chen, Z., Pears, N., McDermid, J. A. & Heseltine, T., 2003, p. 849-858.

    Research output: Contribution to conferencePaper

  464. Equation Discovery for Macroeconomic Modelling

    Kazakov, D. & Tsenova, T., 2009, p. 318-323.

    Research output: Contribution to conferencePaper

  465. Equivalence Arguments for Complex Systems Simulations: A Case-Study

    Ghetiu, T., Alexander, R., Andrews, P., Polack, F. & Bown, J., 2009.

    Research output: Contribution to conferencePaper

  466. Errata for three papers (2004-05) on fixed-priority scheduling with self-suspensions

    Audsley, N. C., Bletsas, K., Nelissen, G., Chen, J-J., Nelissen, G. & Huang, W-H. K., 1 Oct 2018.

    Research output: Contribution to conferencePaper

  467. Escaping the Non-Quantitative Trap

    Alexander, R. & Kelly, T., 2009.

    Research output: Contribution to conferencePaper

  468. Establishing Private Communications in Open Systems using Multicapabilities

    Udzir, N. I. & Wood, A., 1 Apr 2006.

    Research output: Contribution to conferencePaper

  469. Establishing Safety Criteria for Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 163-169.

    Research output: Contribution to conferencePaper

  470. Establishing a Standard Business Process Execution Architecture for Integrating Web Services

    Gunasinghe, T. & Kelly, T., 2005, p. 365-372.

    Research output: Contribution to conferencePaper

  471. Estimating 3D Facial Pose using the EM Algorithm

    Choi, K. N., Carcassoni, M. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  472. Estimating Linear Models for Compositional Distributional Semantics

    Zanzotto, F. M., Korkontzelos, I., Fallucchi, F. & Manandhar, S., 2010, p. 1263-1271.

    Research output: Contribution to conferencePaper

  473. Ethics and the safety of autonomous systems

    Menon, C. & Alexander, R. D., 6 Feb 2018.

    Research output: Contribution to conferencePaper

  474. European Trends in Safety

    McDermid, J. A. & LIndsay, P. A., 2002.

    Research output: Contribution to conferencePaper

  475. Evaluating Design Concepts through a Qualitative Physics Model

    Coombes, A., McDermid, J. A., Moffett, J. D., Poucet, A. & Modarres, M., 1993.

    Research output: Contribution to conferencePaper

  476. Evaluating the impact of communication latency on applications running over on-chip multiprocessing platforms: A layered approach

    Indrusiak, L. S., Ost, L. C., Moraes, F. G., Maatta, S., Nurmi, J., Moller, L. & Glesner, M., 1 Jul 2010, p. 148 -153.

    Research output: Contribution to conferencePaper

  477. Event-ready entanglement

    Kok, P. & Braunstein, SL., 2000, p. 15-29.

    Research output: Contribution to conferencePaper

  478. Evolution of Code through Asynchronous Services

    Oriol, M., 2002.

    Research output: Contribution to conferencePaper

  479. Evolutionary search applied to reconfigurable analogue control

    Clegg, K., Stepney, S. & Clarke, T., 1 Aug 2007, p. 593-6.

    Research output: Contribution to conferenceOther

  480. Evolvable Hardware: a Fundamental Technology for Homeostasis

    Tyrrell, A. M., Timmis, J., Greensted, A. J. & Owens, N., 1 Apr 2007, p. 40-45.

    Research output: Contribution to conferenceOther

Previous 1 2 3 Next