Search research publications and outputs

  1. Fault-tolerant Transmission of Messages of Differing Criticalities Across a Shared Communication Media

    Agrawa, K., Baruah, S. & Burns, A., 1 Aug 2019.

    Research output: Contribution to conferencePaper

  2. Feature Generation for Sequence Categorization

    Kudenko, D. & Hirsh, H., 1998, p. 733-738.

    Research output: Contribution to conferencePaper

  3. Feature-Based Learners for Description Logics

    Kudenko, D. & Hirsh, H., 1999.

    Research output: Contribution to conferencePaper

  4. Feature-Rich Networks for Knowledge Base Completion

    Manandhar, S. K. & Komninos, A., 30 Jul 2017, p. 324-329. 6 p.

    Research output: Contribution to conferencePaper

  5. Finding Inputs that Reach a Target Expression

    Naylor, M. & Runciman, C., 2007, p. 133-142.

    Research output: Contribution to conferencePaper

  6. First Steps in the Verified Software Grand Challenge

    Woodcock, J., 2006, p. 203-206.

    Research output: Contribution to conferencePaper

  7. Flexibility and Manageability of IMS Projects

    Stephenson, Z., Nicholson, M. & McDermid, J. A., 2006.

    Research output: Contribution to conferencePaper

  8. Flexible Dynamic Binding in Agile Grid Development

    Cakic, J., Paige, R., Chivers, H., Ge, X., McDermid, J. & Austin, J., 2005.

    Research output: Contribution to conferencePaper

  9. Folding Protein-Like Structures with Open L-Systems

    Danks, G. B., Stepney, S. & Caves, L. S. D., 2007, p. 1100-1109.

    Research output: Contribution to conferencePaper

  10. Forcing standardization or accommodating diversity? a framework for applying the WCAG in the real world

    Kelly, B., Sloan, D., Phipps, L., Petrie, H. & Hamilton, F., 2005, p. 46-54.

    Research output: Contribution to conferencePaper

  11. Formal Analysis in Model Management: Exploiting the Power of CZT

    Williams, J. R., Polack, F. A. C. & Paige, R. F., 2010, p. 414.

    Research output: Contribution to conferencePaper

  12. Formal Methods for Industrial Products

    Stepney, S., Cooper, D., Bowen, J. P., Dunne, S. & King, S., 2000, p. 374-393.

    Research output: Contribution to conferencePaper

  13. Formal Proof from UML Models

    Amálio, N., Stepney, S. & Polack, F., 2004, p. 418-433.

    Research output: Contribution to conferencePaper

  14. Formalising Flash Memory: First Steps

    Butterfield, A. & Woodcock, J., 2007, p. 251-260.

    Research output: Contribution to conferencePaper

  15. Formalising Harmony Seeking Rules of Morphogenesis

    Hoverd, T. & Stepney, S., 2010, p. 386-393.

    Research output: Contribution to conferencePaper

  16. Formalizing and Validating Complex Security Requirements

    Morris, P., McDermid, J. A., Thuraisingham, B. M. & Landwehr, C. E., 1992, p. 113-124.

    Research output: Contribution to conferencePaper

  17. Forward Simulation for Data Refinement of Classes

    Cavalcanti, A., Naumann, D. A., Eriksson, L-H. & Lindsay, P. A., 2002, p. 471-490.

    Research output: Contribution to conferencePaper

  18. Freja, Hat and Hood: a comparative evaluation of three systems for tracing and debugging lazy functional programs

    Chitil, O., Runciman, C. & Wallace, M., 2001, p. 176--193.

    Research output: Contribution to conferencePaper

  19. From CSP-OZ to Java with Processes

    Cavalcanti, A. & Sampaio, A., 2002.

    Research output: Contribution to conferencePaper

  20. From Circus to JCSP

    Oliveira, M. & Cavalcanti, A., 2004, p. 320-340.

    Research output: Contribution to conferencePaper

  21. From Java to real-time Java: a model-driven methodology with automated toolchain

    Chang, W., Zhao, S., Wei, R., Wellings, A. J. & Burns, A., 23 Jun 2019, p. 123-134. 12 p.

    Research output: Contribution to conferencePaper

  22. From Safety Cases to Security Cases

    Alexander, R. D., Hawkins, R. D. & Kelly, T. P., Feb 2017.

    Research output: Contribution to conferencePaper

  23. From Z to BON/Eiffel

    Paige, R. F. & Ostroff, J. S., 1998, p. 209-212.

    Research output: Contribution to conferencePaper

  24. From immersion to addiction in videogames

    Seah, M. & Cairns, P. A., 2008, p. 55-63.

    Research output: Contribution to conferencePaper

  25. From the gaming experience to the wider user experience

    Gámez, E. H. C., Cairns, P. A. & Cox, A. L., 2009, p. 520-523.

    Research output: Contribution to conferencePaper

  26. Full Implementation of an Estimation of Distribution Algorithm on a GPU

    Poulding, S. M., Staunton, J. P. & Burles, N. J., 2011.

    Research output: Contribution to conferencePaper

  27. Functional Faces: Groupwise Dense Correspondence using Functional Maps

    Zhang, C., Smith, W. A. P., Dessein, A. F., Pears, N. E. & Dai, H., 26 Jun 2016, p. 5033-5041. 9 p.

    Research output: Contribution to conferencePaper

  28. Functional counterparts of some logic programming techniques

    Matsushita, T. & Runciman, C., 1995, p. 90--103.

    Research output: Contribution to conferencePaper

  29. Functional grouping analysis of varying reactor types in the Spiky-RBN AChem

    Krastev, M. S., Sebald, A. A-M. & Stepney, S., Sep 2017, p. 247-254.

    Research output: Contribution to conferencePaper

  30. Further investigations into post-completion error: the effects of interruption position and duration

    Li, S. Y. W., Cox, A. L., Blandford, A., Cairns, P., Young, R. M. & Abeles, A., 2006.

    Research output: Contribution to conferencePaper

  31. Fusion of Multiple Candidate Orientations in Fingerprints

    Zhu, E., Hancock, E. R., Yin, J., Zhang, J. & An, H., 2011, p. 89-100.

    Research output: Contribution to conferencePaper

  32. GRAIL: Graphical Representation of Activity, Interconnection and Loading

    Stepney, S. & Muntean, T., 1987.

    Research output: Contribution to conferencePaper

  33. Gadgets: lazy functional components for graphical user interfaces

    Noble, R. J., Runciman, C., Hermenegildo, E. M. & Swierstra, S. D., 1 Sep 1995, p. 321--340.

    Research output: Contribution to conferencePaper

  34. Game Intelligence: Proceedings of the IEEE Conference on Computational Intelligence in Games (CIG)

    Devlin, S., Cowling, P. I., Kudenko, D., Goumagias, N., Nucciarelli, A., Cabras, I., Fernandes, K. J. & Li, F., 2014.

    Research output: Contribution to conferencePaper

  35. Garbage Collection in Linda using Tuple Monitoring and Process Registration

    Menezes, R. & Wood, A., 1998, p. 490--495.

    Research output: Contribution to conferencePaper

  36. Garbage Collection in Open Distributed Tuple Space Systems

    Menezes, R. & Wood, A., 1 May 1997, p. 525--534.

    Research output: Contribution to conferencePaper

  37. Gene regulation in a particle metabolome

    Hickinbotham, S. J., Clark, E., Stepney, S., Clarke, T. & Young, P., 2009, p. 3024-3031.

    Research output: Contribution to conferencePaper

  38. Generalization with Taxonomic Information

    Frisch, A. M. & Jr., C. D. P., 1990, p. 755-761.

    Research output: Contribution to conferencePaper

  39. Generalizing Atoms in Constraint Logic

    Page Jr., C. D. & Frisch, A. M., 1991, p. 429-440.

    Research output: Contribution to conferencePaper

  40. Generating Numerical Literals During Refinement

    Anthony, S., Frisch, A. M., Lavrac, N. & Dzeroski, S., 1997, p. 61-76. 16 p.

    Research output: Contribution to conferencePaper

  41. Generation of Dilemma-Based Narratives: Method and Turing Test Evaluation

    Barber, H. & Kudenko, D., 2008, p. 214-217.

    Research output: Contribution to conferencePaper

  42. Generic Operations for Concurrent Knowledge Manipulation Architectures

    Wood, A. M. & Campbell, D. K. G., 1 Feb 1998.

    Research output: Contribution to conferencePaper

  43. Generic component lookup

    Bay, T., Eugster, P. & Oriol, M., 2006, p. 182-197. 15 p.

    Research output: Contribution to conferencePaper

  44. Geometry of quantum inference

    Braunstein, SL., Mann, A. & Revzen, M., 1996, p. 218-225.

    Research output: Contribution to conferencePaper

  45. Geometry of quantum states

    BRAUNSTEIN, SL., CAVES, CM., Belavkin, VP., Hirota, O. & Hudson, RL., 1995, p. 21-30.

    Research output: Contribution to conferencePaper

  46. Getting Farther on Software Evolution via AOP and Reflection

    Oriol, M., Cazzola, W., Chiba, S. & Saake, G., 2008, p. 63-69.

    Research output: Contribution to conferencePaper

  47. Global Constraints for Lexicographic Orderings

    Frisch, A. M., Hnich, B., Kiziltan, Z., Miguel, I. & Walsh, T., 2002, p. 93-108.

    Research output: Contribution to conferencePaper

  48. Global Register Allocation, Register Allocation for Stack Machines

    Crispin-Bailey, C. & Shannon, M., Sep 2006. 8 p.

    Research output: Contribution to conferencePaper

  49. Gloss Overlap Extensions for a Semantic Network Algorithm: Building a Better Semantic Distance Measure

    Jayasooriya, T. & Manandhar, S., 2006, p. 74-79.

    Research output: Contribution to conferencePaper

  50. Goal-Based Safety Standards: Opportunities and Challenges

    Kelly, T. P., McDermid, J. A. & Weaver, R. A., 2005.

    Research output: Contribution to conferencePaper

  51. Goal-Oriented Automatic Test Case Generators for MC/DC Compliancy

    Aydal, E. G., Woodcock, J. & Cavalcanti, A., 2007, p. 290-295.

    Research output: Contribution to conferencePaper

  52. Grammatical Evolution of L-systems

    Beaumont, D. & Stepney, S., 2009, p. 2446-2453.

    Research output: Contribution to conferencePaper

  53. Grand Challenge 7: Journeys in Non-Classical Computation

    Stepney, S., Abramsky, S., Adamatzky, A., Johnson, C. G., Timmis, J., Gelenbe, E., Abramsky, S. & Sassone, V., 2008, p. 407-421.

    Research output: Contribution to conferencePaper

  54. Graph Characteristic from the Gauss-Bonnet Theorem

    ElGhawalby, H. & Hancock, E. R., 2008, p. 207-216.

    Research output: Contribution to conferencePaper

  55. Graph Drawing using Quantum Commute Time

    Emms, D., Hancock, E. & Wilson, R., 2008, p. 3743-3746. 4 p.

    Research output: Contribution to conferencePaper

  56. Graph Embedding Using an Edge-Based Wave Kernel

    ElGhawalby, H. & Hancock, E. R., 2010, p. 60-69.

    Research output: Contribution to conferencePaper

  57. Graph Matching using Adjacency Matrix Markov Chains

    Robles-Kelly, A. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  58. Graph Similarity Using Interfering Quantum Walks

    Emms, D., Hancock, E. R. & Wilson, R. C., 2007, p. 823-831.

    Research output: Contribution to conferencePaper

  59. Graph Spectral Image Smoothing

    Zhang, F. & Hancock, E. R., 2007, p. 191-203.

    Research output: Contribution to conferencePaper

  60. Graph-Reducible Term Rewriting Systems

    Plump, D., 1991, p. 622--636.

    Research output: Contribution to conferencePaper

  61. Grid Enabling Data De-Duplication

    Austin, J., Turner, A. & Alwis, S., 2006, p. 2.

    Research output: Contribution to conferencePaper

  62. Grouping Line-segments using Eigenclustering

    Robles-Kelly, A. & Hancock, E. R., 2000.

    Research output: Contribution to conferencePaper

  63. Growing Music: Musical Interpretations of L-Systems

    Worth, P. & Stepney, S., 2005, p. 545-550.

    Research output: Contribution to conferencePaper

  64. Guidelines for the design of HCI for people with disabilities

    Abascal, J., Noirhomme-Fraiture, M., Petrie, H. & Nes, F. L. V., 1997, p. 695-696.

    Research output: Contribution to conferencePaper

  65. HCI... not as it should be: inferential statistics in HCI research

    Cairns, P., 2007, p. 195--201.

    Research output: Contribution to conferencePaper

  66. HLL Enhancement for Stack Based Processors

    Crispin-Bailey, C. & Sotudeh, R., 1994. 4 p.

    Research output: Contribution to conferencePaper

  67. Haptic Virtual Reality for Blind Computer Users

    Colwell, C., Petrie, H., Kornbrot, D., Hardwick, A. & Furner, S., 1998, p. 92-99.

    Research output: Contribution to conferencePaper

  68. Hardware architecture for a Bidirectional Hetero-Associative Protein Processing Associative Memory

    Qadir, O., Liu, J., Tempesti, G., Timmis, J. & Tyrrell, A., Jun 2011, p. 208-215. 8 p.

    Research output: Contribution to conferencePaper

  69. Hardware implementation of similarity functions

    Freeman, M., Weeks, M. & Austin, J., 2005, p. 329-332.

    Research output: Contribution to conferencePaper

  70. Haskell Program Coverage

    Gill, A. & Runciman, C., 2007, p. 1--12.

    Research output: Contribution to conferencePaper

  71. Haskell and XML: Generic Combinators or Type-Based Translation?

    Wallace, M. & Runciman, C., 1 Sep 1999.

    Research output: Contribution to conferencePaper

  72. Hazard Analysis for Security Protocol Requirements

    Foster, N. & Jacob, J. L., 2002, p. 75-92.

    Research output: Contribution to conferencePaper

  73. Hazard and Risk Analysis of Health Informatics: Fundamental Challenges and New Directions

    Habli, I. & White, S. P., 2018.

    Research output: Contribution to conferencePaper

  74. Health Modelling for Agility in Safety Critical Systems Development

    Stephenson, Z. R., McDermid, J. A. & Ward, A. G., 2006.

    Research output: Contribution to conferencePaper

  75. Heap compression and binary I/O in Haskell

    Wallace, M. & Runciman, C., 1 Jun 1997.

    Research output: Contribution to conferencePaper

  76. Heap profiling for space efficiency

    Runciman, C., Röjemo, N., Launchbury, J., Meijer, E. & Sheard, T., 1 Aug 1996, p. 159--183.

    Research output: Contribution to conferencePaper

  77. Heap profiling of a lazy functional compiler

    Runciman, C., Wakeling, D., Launchbury, J. & Sansom, P., 1993, p. 203--214.

    Research output: Contribution to conferencePaper

  78. Heat Flow-Thermodynamic Depth Complexity in Networks

    Escolano, F., Lozano, M. A. & Hancock, E. R., 2010, p. 1578-1581.

    Research output: Contribution to conferencePaper

  79. Hierarchical growing cell structures: TreeGCS

    Hodge, V. J. & Austin, J., 2000, p. 553-556.

    Research output: Contribution to conferencePaper

  80. Hierarchically Performed Hazard Origin and Propagation Studies

    Papadopoulos, Y. & McDermid, J. A., 1999, p. 139-152.

    Research output: Contribution to conferencePaper

  81. Hierarchically Performed Hazard Origin and Propagation Studies

    Papadopoulos, Y., McDermid, J. A., Felici, M., Kanoun, K. & Pasquini, A., 1999, p. 139-152.

    Research output: Contribution to conferencePaper

  82. High Integrity Ada: Principles and Problems

    McDermid, J. A., 1993, p. 95-107. 13 p.

    Research output: Contribution to conferencePaper

  83. High Integrity Software Development: Process and Tool Issues

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1994.

    Research output: Contribution to conferencePaper

  84. High Level Failure Analysis for Integrated Modular Avionics

    Conmy, P., McDermid, J. A. & Lindsay, P. A., 2001, p. 13-22.

    Research output: Contribution to conferencePaper

  85. High frequency forecasting with associative memories

    Pasley, A. & Austin, J., 2002, p. 433-438.

    Research output: Contribution to conferencePaper

  86. High-integrity extreme programming

    Paige, R. F., Chivers, H., McDermid, J. A. & Stephenson, Z. R., 1 Dec 2005, p. 1518-1523. 6 p.

    Research output: Contribution to conferencePaper

  87. Huge data but small programs: visualization design via multiple embedded DSLs

    Duke, D. J., Borgo, R., Runciman, C. & Wallace, M., 2009, p. 31-45. 14 p.

    Research output: Contribution to conferencePaper

  88. Human Action Classification Using SVM_2K Classifier on Motion Features

    Meng, H., Pears, N. & Bailey, C., 2006, p. 458-465.

    Research output: Contribution to conferencePaper

  89. Human competitive security protocols synthesis

    Chen, H., Clark, J. A. & Jacob, J., 2006, p. 1855-1856.

    Research output: Contribution to conferencePaper

  90. Hypercomputation and the Grand Challenge in Non-Classical Computation

    Stepney, S., 2006.

    Research output: Contribution to conferencePaper

  91. Hypergraphs, Characteristic Polynomials and the Ihara Zeta Function

    Ren, P., Aleksic, T., Wilson, R. C. & Hancock, E. R., 2009, p. 369-376.

    Research output: Contribution to conferencePaper

  92. INTELLIGENT DECISION SUPPORT FOR TRAFFIC MANAGEMENT

    Krishnan, R., Hodge, V., Austin, J., Polak, J., Jackson, T., Smith, M. & Lee, T., 25 Oct 2010.

    Research output: Contribution to conferencePaper

  93. IPSES: Requirements; the Meaning of Integration and some Consequences

    McDermid, J. A., 1987, p. 27-36.

    Research output: Contribution to conferencePaper

  94. IPSEs: Concepts and Reality

    McDermid, J. A. & Salenieks, P., 1989, p. 135-164. 30 p.

    Research output: Contribution to conferencePaper

  95. Ide-integrated support for schema evolution in object-oriented applications

    Piccioni, M., Oriol, M. & Meyer, B., 2007, p. 27.

    Research output: Contribution to conferencePaper

  96. Identifying Perceptual Structures In Trademark Images

    Hodge, V. J., Hollier, G. P., Austin, J. & Eakins, J., 13 Feb 2008, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  97. Identifying safety dependencies in modular computer systems

    Conmy, P., Nicholson, M., McDermid, J. A. & Fletcher, R., 2003.

    Research output: Contribution to conferencePaper

  98. Ihara Coefficients: A Flexible Tool for Higher Order Learning

    Ren, P., Aleksic, T., Wilson, R. C. & Hancock, E. R., 2010, p. 670-679.

    Research output: Contribution to conferencePaper

  99. Image Segmentation using Commute Times

    Qiu, H., Hancock, E. R., Clocksin, W. F., Fitzgibbon, A. W. & Torr, P. H. S., 2005.

    Research output: Contribution to conferencePaper

  100. Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation

    Kelsey, J. & Timmis, J., 2003, p. 207-218.

    Research output: Contribution to conferencePaper

  101. Immune Systems and Computation: An Interdisciplinary Adventure

    Timmis, J., Andrews, P. S., Owens, N. D. L. & Clark, E., 2008, p. 8-18.

    Research output: Contribution to conferencePaper

  102. Immune and Evolutionary Approaches to Software Mutation Testing

    May, P., Timmis, J. & Mander, K., 2007, p. 336-347.

    Research output: Contribution to conferencePaper

  103. Immuno-Engineering

    Timmis, J., Hart, E., Hone, A., Neal, M., Robins, A., Stepney, S. & Tyrrell, A., 2008.

    Research output: Contribution to conferencePaper

  104. Implementation and Application of Functional Languages

    Mitchell, N., Runciman, C., Chitil, O., Horváth, Z. & Zsók, V., 2008, p. 147-164. 18 p.

    Research output: Contribution to conferencePaper

  105. Implementing Contract Net in Tuple Space Models

    Udzir, N. I., Wood, A. & Hamza, M. H., 1 Feb 2004, p. 325-330.

    Research output: Contribution to conferencePaper

  106. Implementing Mathematical Morphology in \Isetl-sc \Linda

    Rowstron, A. & Wood, A., 1995, p. 847--851.

    Research output: Contribution to conferencePaper

  107. Implementing Term Rewriting by Graph Reduction: Termination of Combined Systems

    Plump, D., 1991, p. 307--317.

    Research output: Contribution to conferencePaper

  108. Implicit mapping of pointers inside C++ Lambda closure objects in OpenMP target offload regions

    Truby, D. R., Bertolli, C., Wright, S. A., Bercea, G-T., O'Brien, K. & Jarvis, S. A., 1 Feb 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  109. Improved local buffering schemes for ATM-based multimedia servers

    Crispin-Bailey, C., Maierhofer, M. & Sotudeh, R., Sep 1998, p. 302-306. 5 p.

    Research output: Contribution to conferencePaper

  110. Improvement to Quick Processor-Demand Analysis for EDF-Scheduled Real-Time Systems

    Zhang, F. & Burns, A., 2009, p. 76-86.

    Research output: Contribution to conferencePaper

  111. Improvements in Speaker Diarization System

    Fu, R. & Benest, I. D., 2007, p. 317-323.

    Research output: Contribution to conferencePaper

  112. Improving Multimedia Server Efficiency in ATM Networks

    Crispin-Bailey, C., Maierhofer, M. & sotudeh, R., Jul 1998.

    Research output: Contribution to conferencePaper

  113. Improving Optimistic Exploration in Model-Free Reinforcement Learning

    Grzes, M. & Kudenko, D., 2009, p. 360-369.

    Research output: Contribution to conferencePaper

  114. Improving efficiency of persistent storage access in embedded Linux

    Joyce, R. A. & Audsley, N. C., 17 Nov 2017.

    Research output: Contribution to conferencePaper

  115. Improving knowledge discovery by combining text-mining and link analysis techniques

    Ben-Dov, M., Wu, W., Feldman, R., Cairns, P. A. & House, R., 2004.

    Research output: Contribution to conferencePaper

  116. Improving the Performance of Embedded Superscalatr Microprocessors by Adding Partial Pipeline

    Crispin-Bailey, C., Shi, H., Hastie, N. & Farrel, G., 31 Aug 2005, p. 15-20. 6 p.

    Research output: Contribution to conferencePaper

  117. In Search of Sound 'in silico' Research: Validating a Complex System Simulation

    Ghetiu, T., Polack, F. A. C. & Bown, J. L., 2010, p. 312.

    Research output: Contribution to conferencePaper

  118. Incorporating Input/Output Operations in sc Linda

    Menezes, R. & Wood, A., 1 Jan 1998.

    Research output: Contribution to conferencePaper

  119. Incorporating epistemic uncertainty into the safety assurance of socio-technical systems

    Leong, C. W. K., Kelly, T. P. & Alexander, R. D., 29 Apr 2017.

    Research output: Contribution to conferencePaper

  120. Increased Extent of Characteristic Views using Shape-from-Shading for Object Recognition

    Worthington, P. L., Huet, B. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  121. Incremental Development of a High Integrity Compiler: Experience from an Industrial Development

    Stepney, S., 1998, p. 142-149.

    Research output: Contribution to conferencePaper

  122. Incremental processing of Z specifications

    Vasconcelos, A. M. L. D., McDermid, J. A., Diaz, M. & Groz, R., 1992, p. 53-69.

    Research output: Contribution to conferencePaper

  123. Inducing a perceptual relevance shape classifier

    Hodge, V. J., Eakins, J. P. & Austin, J., 2007, p. 138-145.

    Research output: Contribution to conferencePaper

  124. Inductive Mercury Programming

    Fisher, B. & Cussens, J., 2006, p. 199-213.

    Research output: Contribution to conferencePaper

  125. Industrial Practice in Formal Methods: A Review

    Bicarregui, J., Fitzgerald, J. S., Larsen, P. G., Woodcock, J. C. P. & Dams, D., 2009, p. 810-813.

    Research output: Contribution to conferencePaper

  126. Inference without Chaining

    Frisch, A. M., 1987, p. 515-519.

    Research output: Contribution to conferencePaper

  127. Informalising Formal Mathematics: searching the mizar library with Latent Semantics

    Cairns, P., 2004, p. 58--72.

    Research output: Contribution to conferencePaper

  128. Information-Theoretic Detection of Masquerade Mimicry Attacks

    Tapiador, J. E. & Clark, J. A., 1 Sep 2010, p. 183 -190. 7 p.

    Research output: Contribution to conferencePaper

  129. Initial Design and Evaluation of an Interface to Hypermedia Systems for Blind Users

    Petrie, H., Morley, S., McNally, P., O'Neill, A-M. & Majoe, D., 1997, p. 48-56.

    Research output: Contribution to conferencePaper

  130. Innovations in measuring accessibility: theoretical and practical perspectives

    Petrie, H., Power, C., Adams, R., Hwang, F., Weber, G., Darzentas, J. S. & Velasco, C. A., 2008, p. 197-198.

    Research output: Contribution to conferencePaper

  131. Instruction level parallelism of stack-code under varied issue widths, and one-level branch prediction

    Bailey, C. & Shi, H., 2005, p. 23-30.

    Research output: Contribution to conferencePaper

  132. Integrated Analysis of Cache Related Preemption Delays and Cache Persistence Reload Overheads

    Rashid, S. A., Nelissen, G., Altmeyer, S., Davis, R. I. & Tovar, E., 6 Dec 2017. 11 p.

    Research output: Contribution to conferencePaper

  133. Integrated Techniques for Software Safety Analysis

    Fenelon, P. & McDermid, J. A., 1992, p. 2/1 - 2/16.

    Research output: Contribution to conferencePaper

  134. Integrating Priority Inheritance Algorithms in the Real-Time Specification for Java

    Wellings, A. J., Burns, A., Santos, O. M. D. & Brosgol, B. M., 2007, p. 115-123.

    Research output: Contribution to conferencePaper

  135. Integrating requirements analysis and safety analysis

    Atlee, J. M. & McDermid, J. A., 1995, p. 158-159.

    Research output: Contribution to conferencePaper

  136. Integrative Hybrid Modelling of Plant Shoot Branching

    Garnett, P., Stepney, S. & Leyser, O., 1 Nov 2007, p. 9.1-9.5.

    Research output: Contribution to conferencePaper

  137. Intelligent Car Park Routeing for Road Traffic

    Hodge, V. J., Smith, M. & Austin, J., 22 Jun 2009, p. 326-333.

    Research output: Contribution to conferencePaper

  138. Inter-boundary scheduling of stack operands, a preliminary approach

    Crispin-Bailey, C., Nov 2000, p. 3-11. 9 p.

    Research output: Contribution to conferencePaper

  139. Inter-modelling: From Theory to Practice

    Guerra, E., Lara, J. D., Kolovos, D. S. & Paige, R. F., 2010, p. 376-391.

    Research output: Contribution to conferencePaper

  140. Interactions Between Stereotypes

    Lock, Z. P. & Kudenko, D., 2006, p. 172-181.

    Research output: Contribution to conferencePaper

  141. Internalization, qualitative methods, and evaluation

    Faisal, S., Craft, B., Cairns, P. & Blandford, A., 2008, p. 1-8.

    Research output: Contribution to conferencePaper

  142. Interplay between Language, Navigation and Kin selection

    Kazakov, D., 2010.

    Research output: Contribution to conferencePaper

  143. Investigating Available Instruction Level Parallelism for Stack Based Machine Architectures

    Shi, H. & Bailey, C., 2004, p. 112-120.

    Research output: Contribution to conferencePaper

  144. Investigating Patterns for the Process-Oriented Modelling and Simulation of Space in Complex Systems

    Andrews, P. S., Sampson, A. T., Bjørndalen, J. M., Stepney, S., Timmis, J., Warren, D. N. & Welch, P. H., 2008, p. 17-24.

    Research output: Contribution to conferencePaper

  145. Investigating and Formalising the Development of HIS Within PSEEs

    Gimenes, I. M. D. S., McDermid, J. A. & Schäfer, W., 1993, p. 90-94.

    Research output: Contribution to conferencePaper

  146. Investigating computer game immersion and the component real world dissociation

    Jennett, C., Cox, A. L. & Cairns, P. A., 2009, p. 3407-3412.

    Research output: Contribution to conferencePaper

  147. Investigating emergence by coarse graining Elementary Cellular Automata

    Weeks, A., Polack, F. & Stepney, S., 2008, p. 686-693.

    Research output: Contribution to conferencePaper

  148. Investigating the Correctness and Efficiency of MrsP in Fully Partitioned Systems

    Zhao, S. & Wellings, A. J., 17 Nov 2017.

    Research output: Contribution to conferencePaper

  149. Investigation of Stack Machine Design for Efficient High Level Language Support

    Crispin-Bailey, C. & Sotudeh, R., 1993. 4 p.

    Research output: Contribution to conferencePaper

  150. Investigation of cultural dependency in mobile technology and older adults

    Abd Malik, S. & Edwards, A. D. N., 2010, p. 3835-3840.

    Research output: Contribution to conferencePaper

  151. Isoradius Contours: New Representations and Techniques for 3D Face Registration and Matching

    Pears, N. & Heseltine, T., 2006, p. 176-183.

    Research output: Contribution to conferencePaper

  152. Issues in the Conduct of PSSA

    Dawkins, S. K., Kelly, T. P., McDermid, J. A., Murdoch, J. & Pumfrey, D. J., 1999.

    Research output: Contribution to conferencePaper

  153. Issues with using Ravenscar and the ada Distributed Systems Annex for high-integrity systems

    Audsley, N. & Wellings, A., 1 Apr 2001, p. 33-39. 7 p.

    Research output: Contribution to conferencePaper

  154. Jungle Evaluation

    Habel, A., Kreowski, H-J. & Plump, D., 1988, p. 92-112.

    Research output: Contribution to conferencePaper

  155. Jungle Evaluation for Efficient Term Rewriting

    Hoffmann, B. & Plump, D., 1988, p. 191--203.

    Research output: Contribution to conferencePaper

  156. KAOS: A Goal-oriented Process Model for EIS

    Tabatabaie, M., Polack, F. A. C. & Paige, R. F., 2010, p. 40-49.

    Research output: Contribution to conferencePaper

  157. Knowledge Engineering Using the UML Profile - Adopting the Model-Driven Architecture for Knowledge-Based System Development

    Abdullah, M. S., Paige, R. F., Benest, I. D. & Kimble, C., 2006, p. 74-81.

    Research output: Contribution to conferencePaper

  158. Knowledge Modelling Using The UML Profile

    Abdullah, M. S., Paige, R. F., Benest, I. D. & Kimble, C., 2006, p. 70-77. 7 p.

    Research output: Contribution to conferencePaper

  159. Knowledge Retrieval as Limited Inference

    Frisch, A. M. & Allen, J. F., 1982, p. 274-291.

    Research output: Contribution to conferencePaper

  160. Knowledge-Based Reinforcement Learning for Data Mining

    Kudenko, D. & Grzes, M., 2009, p. 21-22.

    Research output: Contribution to conferencePaper

  161. LIU H, SOTUDEH R, BAILEY C. On improving the Quality of Service for multimedia transmission in ATM networks

    Crispin-Bailey, C., Hong, L. & Sotudeh, R., 1998, p. 412-415. 4 p.

    Research output: Contribution to conferencePaper

  162. LZW text compression in Haskell

    Runciman, C., Wakeling, D., Launchbury, J. & Sansom, P., 1993, p. 215--226.

    Research output: Contribution to conferencePaper

  163. Lag, drag, void and use: heap profiling and space-efficient compilation revisited

    Röjemo, N. & Runciman, C., 1 May 1996, p. 34-41.

    Research output: Contribution to conferencePaper

  164. Lambdas in the Liftshaft: functional programming and an embedded architecture

    Wallace, M. & Runciman, C., 1 Jun 1995, p. 249--258.

    Research output: Contribution to conferencePaper

  165. Landmark Localisation in 3D Face Data

    Romero, M. & Pears, N., 2009, p. 73-78.

    Research output: Contribution to conferencePaper

  166. Latent Distribution Preserving Deep Subspace Clustering

    Zhou, L., Xiao, B., wang, D., Liu, X., Zhou, J. & Hancock, E. R., May 2019, p. 4440-4446. 7 p.

    Research output: Contribution to conferencePaper

  167. Layout indexing of trademark images

    Leuken, R. H. V., Demirci, M. F., Hodge, V. J., Austin, J. & Veltkamp, R. C., 2007, p. 525-532.

    Research output: Contribution to conferencePaper

  168. Lazy Assertions

    Chitil, O., McNeill, D. & Runciman, C., 1 Nov 2004, p. 1--19.

    Research output: Contribution to conferencePaper

  169. Lazy Exploration and Checking of CSP Models with CSPsim

    Brooke, P. J. & Paige, R. F., 2007, p. 33-49.

    Research output: Contribution to conferencePaper

  170. Learning Autonomic Security Reconfiguration Policies

    Tapiador, J. E. & Clark, J. A., 2010, p. 902-909. 8 p.

    Research output: Contribution to conferencePaper

  171. Learning Binary Preference Relations: Analysis of Logic-based versus Statistical Approaches

    Qomariyah, N. N. & Kazakov, D. L., 27 Aug 2017, p. 30-34. 5 p.

    Research output: Contribution to conferencePaper

  172. Learning Constrained Atoms

    Page Jr., C. D. & Frisch, A. M., 1991, p. 427-431.

    Research output: Contribution to conferencePaper

  173. Learning Electronic Systems Design with a Project Based Course on the Web

    Donzellini, G., Ponta, D., Crispin-Bailey, C., Pears, N. E. & Xu, D., Jun 1999, p. 114-121. 8 p.

    Research output: Contribution to conferencePaper

  174. Learning Multilingual Morphology with CLOG

    Manandhar, S., Dzeroski, S. & Erjavec, T., 1998, p. 135-144.

    Research output: Contribution to conferencePaper

  175. Learning Word Segmentation Rules for Tag Prediction

    Kazakov, D., Manandhar, S. & Erjavec, T., 1999, p. 152-161.

    Research output: Contribution to conferencePaper

  176. Learning to Coordinate Using Commitment Sequences in Cooperative Multi-agent Systems

    Kapetanakis, S., Kudenko, D. & Strens, M. J. A., 2005, p. 106-118.

    Research output: Contribution to conferencePaper

  177. Life Cycle Models for Software Development

    McDermid, J. A., 1988, p. 43-51.

    Research output: Contribution to conferencePaper

  178. Like a DNA string: Sequence-based Player Profiling in Tom Clancy’s The Division

    Makarovych, S., Canossa, A., Togelius, J. & Drachen, A., 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  179. Linking VDM and Z

    Woodcock, J. & Freitas, L., 2008, p. 143-152.

    Research output: Contribution to conferencePaper

  180. Literate Formal Development of Ada from Z for Safety Critical Applications

    Jordan, D. T., Locke, C. J., McDermid, J. A., Parker, C., Sharpe, B. A. P. & Toyn, I., 1994.

    Research output: Contribution to conferencePaper

  181. Literate Proving: Presenting and Documenting Formal Proofs

    Cairns, P. A. & Gow, J., 2005, p. 159-173.

    Research output: Contribution to conferencePaper

  182. Local Binary Patterns for Graph Characterization

    Jawad, M., Aziz, F. & Hancock, E. R., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  183. Logitboost weka classifier speech segmentation

    Ziólko, B., Manandhar, S., Wilson, R. C. & Ziólko, M., 23 Jun 2008, p. 1297-1300. 4 p.

    Research output: Contribution to conferencePaper

  184. Losing functions without gaining data: another look at defunctionalisation

    Mitchell, N. & Runciman, C., 2009, p. 13--24.

    Research output: Contribution to conferencePaper

  185. Low Level Synchronisation Problems in Digital Systems: Formal techniques in Real-Time Fault-Tolerant Systems

    McDermid, J. A., Morgan, G. & Joseph, M., 1988, p. 139-141.

    Research output: Contribution to conferencePaper

  186. LuckyJ : an Asynchronous Evolution Platform for Component-Based Applications

    Oriol, M., 2003, p. 1-10.

    Research output: Contribution to conferencePaper

  187. MESSI: Mutant Evaluation by Static Semantic Interpretation

    Patrick, M. T., Oriol, M. Y. A. & Clark, J. A., 17 Apr 2012, (Accepted/In press).

    Research output: Contribution to conferencePaper

  188. Machine Learning and Inductive Logic Programming for Multi-agent Systems

    Kazakov, D. & Kudenko, D., 2001, p. 246-272.

    Research output: Contribution to conferencePaper

  189. Machine Learning for Logic-Based Multi-agent Systems

    Alonso, E. & Kudenko, D., 2000, p. 306-307.

    Research output: Contribution to conferencePaper

  190. Management of Dependable Computing: Policies and Argumentation

    Moffett, J. D., McDermid, J. A. & Wilson, S. P., 1995.

    Research output: Contribution to conferencePaper

  191. Managing Analytical Complexity of Safety Critical Systems using Viewpoints

    Wilson, S. P., McDermid, J. A. & Vickers, A. J., 1996.

    Research output: Contribution to conferencePaper

  192. Managing Architectural Design Decisions for Safety-Critical Software Systems

    Wu, W. & Kelly, T., 2006, p. 59-77.

    Research output: Contribution to conferencePaper

  193. Managing Automatically Formed Mathematical Theories

    Colton, S., Torres, P., Cairns, P. A. & Sorge, V., 2006, p. 237-250.

    Research output: Contribution to conferencePaper

  194. Mapping Correlation Matrix Memory Applications onto a Beowulf Cluster

    Weeks, M., Austin, J., Moulds, A., Turner, A., Ulanowski, Z. & Young, J., 2001, p. 156-163.

    Research output: Contribution to conferencePaper

  195. Matching Point-sets using Procrustes Alignment and the EM Algorithm

    Luo, B. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  196. Matching Research Goals and Methods in System Safety Engineering

    Alexander, R., Rae, A. & Nicholson, M., 2010.

    Research output: Contribution to conferencePaper

  197. Mathematics of Surfaces XIII, 13th IMA International Conference, York, UK, September 7-9, 2009

    Hancock, E. R., Martin, R. R. & Sabin, M. A., 2009.

    Research output: Contribution to conferencePaper

  198. Measuring user experience of websites: think aloud protocols and an emotion word prompt list

    Petrie, H. & Precious, J., 2010, p. 3673-3678.

    Research output: Contribution to conferencePaper

  199. Measuring users' emotional reactions to websites

    Petrie, H. & Harrison, C., 2009, p. 3847-3852.

    Research output: Contribution to conferencePaper

  200. Mechanised Translation of Control Law Diagrams into Circus

    Zeyda, F. & Cavalcanti, A., 2009, p. 151-166.

    Research output: Contribution to conferencePaper

  201. Mechanising a Unifying Theory

    Nuka, G. & Woodcock, J., 2006, p. 217-235.

    Research output: Contribution to conferencePaper

  202. Medical diagnostic based on encrypted medical data

    Gribov, A., Horan, K., Gryak, J., Najarian, K., Shpilrain, V., Soroushmehr, S. M. R. & Kahrobaei, D., 2019, p. 98-111. 14 p.

    Research output: Contribution to conferencePaper

  203. Merging Models with the Epsilon Merging Language (EML)

    Kolovos, D. S., Paige, R. F. & Polack, F., 2006, p. 215-229.

    Research output: Contribution to conferencePaper

  204. Metamodelling and Conformance Checking with PVS

    Paige, R. F. & Ostroff, J. S., 2001, p. 2-16. 14 p.

    Research output: Contribution to conferencePaper

  205. Methods for Developing Safe Software

    McDermid, J. A. & Daniels, B. K., 1990, p. 6/1-6/8.

    Research output: Contribution to conferencePaper

  206. Metrics Are Fitness Functions Too

    Harman, M. & Clark, J. A., 2004, p. 58-69.

    Research output: Contribution to conferencePaper

  207. Migrating Activity Diagrams with Epsilon Flock

    Rose, L. M., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010.

    Research output: Contribution to conferencePaper

  208. Migrating Mixed Criticality Tasks within a Cyclic Executive Framework

    Burns, A. & Baruah, S., 2017, p. 203-216. 14 p.

    Research output: Contribution to conferencePaper

  209. Miniature Untethered EEG Recorder Improves Advanced Neuroscience Methodologies

    Crispin-Bailey, C., Austin, J., Moulds, A., Platt, B. & Crouch, B., 14 Aug 2019, p. 1-12. 12 p.

    Research output: Contribution to conferencePaper

  210. Minimal distortion 3-D watermarking using statistics of geodesic distances

    Luo, M. & Bors, A. G., Aug 2012, p. 1683-1687.

    Research output: Contribution to conferencePaper

  211. Mining Exemplars for Object Modelling Using Affinity Propagation

    Xia, S., Liu, J. & Hancock, E. R., 2010, p. 918-921.

    Research output: Contribution to conferencePaper

  212. Mixed Criticality Systems with Varying Context Switch Costs

    Davis, R. I., Altmeyer, S. & Burns, A., 11 Apr 2018. 12 p.

    Research output: Contribution to conferencePaper

  213. Mobile Phone Preferences and Values: the U.K. vs. Korea

    Cha, H., Oshlyansky, L. & Cairns, P. A., 2005, p. 29-41.

    Research output: Contribution to conferencePaper

  214. Modal logics of higher-order probability

    Haddawy, P. & Frisch, A. M., 1988, p. 133-148.

    Research output: Contribution to conferencePaper

  215. Model Conjectures for Z Specifications

    Hall, J. G., McDermid, J. A. & Toyn, I., 1995.

    Research output: Contribution to conferencePaper

  216. Model Migration Case

    Rose, L. M., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010.

    Research output: Contribution to conferencePaper

  217. Model Migration with Epsilon Flock

    Rose, L. M., Kolovos, D. S., Paige, R. F. & Polack, F. A. C., 2010, p. 184--198.

    Research output: Contribution to conferencePaper

  218. Model-based design flow for NoC-based MPSoCs

    Ost, L., Indrusiak, L. S., Maatta, S., Mandelli, M., Nurmi, J. & Moraes, F., 1 Dec 2010, p. 750 -753.

    Research output: Contribution to conferencePaper

  219. Modeling and Learning Interaction-based Accidents for Safety-Critical Software Systems

    Mahmood, T., Kazmierczak, E., Kelly, T. & Plunkett, D., 2007, p. 175-182.

    Research output: Contribution to conferencePaper

  220. Modeling of Dual-Route Fear Conditioning Paradigm in the Auditory Cortex

    Sengupta, B., Austin, J. & Green, G., 2005, p. 3632-3644.

    Research output: Contribution to conferencePaper

  221. Modeling the behavior of the stock market with an Artificial Immune System

    Butler, M. & Kazakov, D., 1 Jul 2010, p. 1 -8.

    Research output: Contribution to conferencePaper

  222. Modelling Complex Design Processes with Role Activity Diagrams

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 1999.

    Research output: Contribution to conferencePaper

  223. Modelling Engineering Design Processes with Role Activity Diagrams

    Murdoch, J., McDermid, J. A., Astley, K. & Wilkinson, P., 1998.

    Research output: Contribution to conferencePaper

  224. Modelling Incremental Learning With The Batch SOM Training Method

    Baez-Monroy, V. O. & O'Keefe, S., 2005, p. 542-544.

    Research output: Contribution to conferencePaper

  225. Modelling and Implementing Complex Systems with Timebands

    Woodcock, J., Oliveira, M., Burns, A. & Wei, K., 2010, p. 1-13.

    Research output: Contribution to conferencePaper

  226. Modelling and simulation of granuloma formation in visceral leishmaniasis

    Flugge, A. J., Timmis, J., Andrews, P. S., Moore, J. W. J. & Kaye, P. M., 2009, p. 3052-3059.

    Research output: Contribution to conferencePaper

  227. Modular Object-oriented Z Specifications

    Meira, S. R. D. L. & Cavalcanti, A., 1990, p. 173-192.

    Research output: Contribution to conferencePaper

  228. Modular UML Semantics: Interpretations in Z Based on Templates and Generics

    Amálio, N., Stepney, S. & Polack, F., 2003.

    Research output: Contribution to conferencePaper

  229. Molecular Microprograms

    Hickinbotham, S. J., Clark, E., Stepney, S., Clarke, T., Nellis, A., Pay, M., Young, P., Kampis, G., Karsai, I. & Szathmáry, E., 2009, p. 297-304.

    Research output: Contribution to conferencePaper

  230. MooZ Case Studies

    Meira, S. R. D. L. & Cavalcanti, A., 1992, p. 37-58.

    Research output: Contribution to conferencePaper

  231. More Powerful Z Data Refinement: Pushing the State of the Art in Industrial Refinement

    Stepney, S., Cooper, D. & Woodcock, J., 1998, p. 284-307.

    Research output: Contribution to conferencePaper

  232. Mosaicing of Flattened Images from Straight Homogeneous Generalized Cylinders

    Bors, A. G., Puech, W., Pitas, I. & Chassery, J-M., 1997, p. 122-129.

    Research output: Contribution to conferencePaper

  233. Motion information combination for fast human action recognition

    Meng, H., Pears, N. & Bailey, C., 2007, p. 21-28.

    Research output: Contribution to conferencePaper

  234. Motion-Compensated Error Concealment for MPGE-2 Coded Video transported over ATM Networks

    Crispin-Bailey, C., enmin, S. & sotudeh, R., Jun 1998, p. 104/1-104/8. 8 p.

    Research output: Contribution to conferencePaper

  235. Moving Nature-Inspired Algorithms to Parallel, Asynchronous and Decentralised Environments

    Ridge, E., Kudenko, D., Kazakov, D. & Curry, E., 2005, p. 35-49.

    Research output: Contribution to conferencePaper

  236. Moving Virtual Source Perception in 3D Space

    Hughes, S. S. & Kearney, G. C., 30 Sep 2016.

    Research output: Contribution to conferencePaper

  237. Multi-Agent Potential-based Reward Shaping for RoboCup KeepAway

    Devlin, S., Grzes, M. & Kudenko, D., May 2011.

    Research output: Contribution to conferencePaper

  238. Multi-Agent Reinforcement Learning for Intrusion Detection: A case study and evaluation

    Servin, A. & Kudenko, D., 2008, p. 873-874.

    Research output: Contribution to conferencePaper

  239. Multi-Agent Reinforcement Learning with Reward Shaping for KeepAway Takers

    Devlin, S., Grzes, M. & Kudenko, D., May 2010.

    Research output: Contribution to conferencePaper

  240. Multi-agent Reinforcement Learning for Intrusion Detection

    Servin, A. & Kudenko, D., 2007, p. 211-223.

    Research output: Contribution to conferencePaper

  241. Multi-core Cyclic Executives for Safety-Critical Systems

    Burns, A., Deutschbein, C., Fleming, T. D. & Baruah, S., Oct 2017, p. 94-109. 16 p.

    Research output: Contribution to conferencePaper

  242. Multi-cultural visualization: how functional programming can enrich visualization (and vice versa)

    Borgo, R., Duke, D., Wallace, M. & Runciman, C., 1 Nov 2006.

    Research output: Contribution to conferencePaper

  243. Multicapabilities for Distributed Resource Management in Open Systems

    Udzir, N. I., Wood, A. & Gonzalez, T., 1 Nov 2004, p. 157-162.

    Research output: Contribution to conferencePaper

  244. Multigrid Reinforcement Learning with Reward Shaping

    Grzes, M. & Kudenko, D., 2008, p. 357-366.

    Research output: Contribution to conferencePaper

  245. Multiple image disparity correction for 3-D scene representation

    Grum, M. & Bors, A. G., Oct 2008, p. 209-212. 4 p.

    Research output: Contribution to conferencePaper

  246. Multiple-View Tracing for Haskell: a New Hat

    Wallace, M., Chitil, O., Brehm, T. & Runciman, C., 2001, p. 151--170.

    Research output: Contribution to conferencePaper

  247. NEEDS CORRECTING High-integrity extreme programming

    Paige, R. F., Chivers, H., McDermid, J. A., Stephenson, Z. R., Haddad, H., Liebrock, L. M., Omicini, A. & Wainwright, R. L., 2005, p. 1518-1523.

    Research output: Contribution to conferencePaper

  248. Natural Scene Image Recognition by Fusing Weighted Colour Moments with Bag of Visual Patches on Spatial Pyramid Layout

    Alqasrawi, Y., Neagu, D. & Cowling, P. I., 30 Dec 2009, p. 140-145.

    Research output: Contribution to conferencePaper

  249. Needle Map Recovery using Robust Regularizers

    Worthington, P. L. & Hancock, E. R., 1997.

    Research output: Contribution to conferencePaper

  250. Net4lap: Neural Laplacian Regularization for Ranking and Re-Ranking

    Curado, M., Escolano, F., Lozano, M. & Hancock, E. R., 11 Apr 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  251. Neural Networks for Novelty Detection in Airframe Strain Data

    Hickinbotham, S. J. & Austin, J., 2000, p. 375-380.

    Research output: Contribution to conferencePaper

  252. Neutral Emergence: a proposal

    Weeks, A., Stepney, S. & Polack, F. A. C., 2007.

    Research output: Contribution to conferencePaper

  253. Neutral Emergence and Coarse Graining

    Weeks, A., Stepney, S. & Polack, F., 2007, p. 1131-1140.

    Research output: Contribution to conferencePaper

  254. No more spineless safety cases: A structured method and comprehensive tool support for the production of safety cases.

    Fenelon, P., Kirkham, P., McDermid, J. A. & Wilson, S. P., 1995.

    Research output: Contribution to conferencePaper

  255. NoCScope: A graphical interface to improve Networks-on-Chip monitoring and design space exploration

    Moller, L., Indrusiak, L. S. & Glesner, M., 1 Nov 2009, p. 1 -6.

    Research output: Contribution to conferencePaper

  256. Non-rigid 3D Shape Registration using an Adaptive Template

    Dai, H., Pears, N. E. & Smith, W. A. P., 14 Sep 2018. 15 p.

    Research output: Contribution to conferencePaper

  257. Nonclassical readout of optical memories under local energy constraint

    Spedalieri, G., Lupo, C. & Pirandola, S., 3 Sep 2015, p. 1-11. 11 p.

    Research output: Contribution to conferencePaper

  258. Not all patterns, but enough: an automatic verifier for partial but sufficient pattern matching

    Mitchell, N. & Runciman, C., 2008, p. 49--60.

    Research output: Contribution to conferencePaper

  259. Noun phrase chunking with APL2

    Manandhar, S. & Alfonseca, E., 2000, p. 136-144.

    Research output: Contribution to conferencePaper

  260. Novel method of chaotic systems evaluation for implementations of encryption algorithms

    Dutra, E., Glesner, M., Finamore, W. A. & Indrusiak, L., 1 Apr 2010, p. 89 -96.

    Research output: Contribution to conferencePaper

  261. Novelty Detection in Airframe Strain Data

    Hickinbotham, S. J. & Austin, J., 2000, p. 2536-2539.

    Research output: Contribution to conferencePaper

  262. Novelty detection for strain-gauge degradation using maximally correlated components

    Hollier, G. & Austin, J., 2002, p. 257-262.

    Research output: Contribution to conferencePaper

  263. Object Orientation in Z

    Stepney, S., Barden, R. & Cooper, D., 1992.

    Research output: Contribution to conferencePaper

  264. Object Oriented Specification and Refinement

    Whysall, P. J., McDermid, J. A., Morris, J. M. & Shaw, R. C., 1991, p. 150-184.

    Research output: Contribution to conferencePaper

  265. Object distance and its application to adaptive random testing of object-oriented programs

    Ciupa, I., Leitner, A., Oriol, M. & Meyer, B., 2006, p. 63.

    Research output: Contribution to conferencePaper

  266. Object-Orientation in the UTP

    Santos, T. L. V. L., Cavalcanti, A. & Sampaio, A., 2006, p. 18-37.

    Research output: Contribution to conferencePaper

  267. On ATM Cell Batching and Its Effects on Bus Arbitration in a Conventional Multimedia Server

    Maierhofer, M. & Crispin-Bailey, C., 2000, p. 2010-.

    Research output: Contribution to conferencePaper

  268. On Defining a "HURT" Metric to Measure Dissatisfaction with Products

    Prasad, D. K., Atkins, M. C., McDermid, J. A. & Wand, I. C., 1998.

    Research output: Contribution to conferencePaper

  269. On Homeostasis in Collective Robotic Systems

    Timmis, J. & Tyrrell, A. M., 2010, p. 307-309.

    Research output: Contribution to conferencePaper

  270. On Identifying Spatial Traffic Patterns using Advanced Pattern Matching Techniques

    Krishnan, R., Hodge, V. J., Austin, J., Polak, J. & Lee, T., 10 Jan 2010.

    Research output: Contribution to conferencePaper

  271. On Integration and Reuse in a Software Development Environment

    Brown, A. W., McDermid, J. A. & Long, F., 1991, p. 171-194.

    Research output: Contribution to conferencePaper

  272. On Techniques for Content-Based Visual Annotation to Aid Intra-Track Music Navigation

    Wood, G. & O'Keefe, S., 2005, p. 58-65.

    Research output: Contribution to conferencePaper

  273. On Termination of Graph Rewriting

    Plump, D., 1995, p. 88--100.

    Research output: Contribution to conferencePaper

  274. On The Derivation of Secure Components

    Jacob, J. L., Berson, T. & Cooper, D. M., 1 May 1989, p. 242-247.

    Research output: Contribution to conferencePaper

  275. On modelling user observations in the UTP

    Banks, M. J. & Jacob, J. L., 2010, p. 101--119.

    Research output: Contribution to conferencePaper

  276. On posture as a modality for expressing and recognizing emotions

    Bianchi-Berthouze, N., Cairns, P., Cox, A., Jennett, C. & Kim, W. W., 2006.

    Research output: Contribution to conferencePaper

  277. On the Accuracy of Tactile Displays

    Power, C., 2006, p. 1155-1162.

    Research output: Contribution to conferencePaper

  278. On the Digital Certificate Management in Advanced Metering Infrastructure Networks

    Vasilakis, V., Moscholios, I., Vardakas, J. & Logothetis, M., 30 Apr 2017, (Accepted/In press). 5 p.

    Research output: Contribution to conferencePaper

  279. On the Effectiveness of Test Extraction without Overhead

    Leitner, A., Pretschner, A., Mori, S., Meyer, B. & Oriol, M., 1 Apr 2009, p. 416--425.

    Research output: Contribution to conferencePaper

  280. On the Evaluation of Schedulability Tests for Real-Time Scheduling Algorithms

    Davis, R. I., Jul 2016. 9 p.

    Research output: Contribution to conferencePaper

  281. On the Predictability of Random Tests for Object-Oriented Software

    Ciupa, I., Pretschner, A., Leitner, A., Oriol, M. & Meyer, B., 1 Apr 2008, p. 72--81.

    Research output: Contribution to conferencePaper

  282. On the Refinement and Simulation of Data Types and Processes

    Bolton, C., Davies, J., Woodcock, J. & Araki, K., 1999, p. 273-292.

    Research output: Contribution to conferencePaper

  283. On the meaning of modes in uniprocessor real-time systems

    Martins, P. & Burns, A., 2008, p. 324-325.

    Research output: Contribution to conferencePaper

  284. Open source projects in programming courses

    Pedroni, M., Bay, T., Oriol, M. & Pedroni, A., 2007, p. 454.

    Research output: Contribution to conferencePaper

  285. Operational Semantics for Model Checking Circus

    Woodcock, J., Cavalcanti, A. & Freitas, L., 2005, p. 237-252.

    Research output: Contribution to conferencePaper

  286. Optical Flow Estimation Using Diffusion Distances

    Wartak, S. & Bors, A. G., Aug 2010, p. 189-192. 4 p.

    Research output: Contribution to conferencePaper

  287. Optimising Activation of Bus Pre-signals

    Hodge, V. J., Jackson, T. & Austin, J., 22 Jun 2009, p. 344-353.

    Research output: Contribution to conferencePaper

  288. Origins of the Grid Architectural Style

    Cakic, J. & Paige, R. F., 2006, p. 227-235. 8 p.

    Research output: Contribution to conferencePaper

  289. POSIX and the Verification Grand Challenge: A Roadmap

    Freitas, L., Woodcock, J. & Butterfield, A., 2008, p. 153-162.

    Research output: Contribution to conferencePaper

  290. POSIX file store in Z/Eves: an experiment in the verified software repository

    Freitas, L., Fu, Z. & Woodcock, J., 2007, p. 3-14.

    Research output: Contribution to conferencePaper

  291. PROM: Pragmatic Reusable Object Management

    Burd, E. L. & McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  292. Packetization and cell-loss concealment for MPEG-2 video transport over ATM networks

    Crispin-Bailey, C., Xu, D. & sotudeh, R., Jan 1999.

    Research output: Contribution to conferencePaper

  293. Parallel Case Base Retrieval: An Implementation on Distributed sc Linda

    Campbell, D. K. G., Osborne, H. R., Wood, A. M. & Bridge, D. G., 1 Oct 1997, p. 525--530.

    Research output: Contribution to conferencePaper

  294. Parallel Thinking

    Wood, A. M., 1985, p. 1-3.

    Research output: Contribution to conferencePaper

  295. Parallel reinforcement learning with linear function approximation

    Grounds, M. & Kudenko, D., 2007, p. 45.

    Research output: Contribution to conferencePaper

  296. Parameter Optimisation in the Receptor Density Algorithm

    Hilder, J. A., Owens, N. D. L., Timmis, J., Hickey, P., Kilgour, S. & Tyrrell, A., Jun 2011, p. 226-239. 13 p.

    Research output: Contribution to conferencePaper

  297. Particle Swarm Optimization of Bollinger Bands

    Butler, M. & Kazakov, D., 2010, p. 504-511.

    Research output: Contribution to conferencePaper

  298. Parts based generative models for graphs

    White, D. & Wilson, R. C., 8 Dec 2008, p. 1-4.

    Research output: Contribution to conferencePaper

  299. Pattern Matching in DAME using Grid Enabled AURA Technology

    Davis, R., Liang, B., Jessop, M. D., Pasley, A. & Austin, J., Sep 2003.

    Research output: Contribution to conferencePaper

  300. Patterns to Guide Practical Refactoring: Examples Targetting Promotion in Z

    Stepney, S., Polack, F. & Toyn, I., 2003, p. 20-39.

    Research output: Contribution to conferencePaper

  301. Penrose Life: Ash and Oscillators

    Hill, M., Stepney, S. & Wan, F., 2005, p. 471-480.

    Research output: Contribution to conferencePaper

  302. People with Disabilities: Automatic and Manual Evaluation of Web Sites

    Petrie, H. & Weber, G., 2006, p. 152-155.

    Research output: Contribution to conferencePaper

  303. Perfect hash functions made parallel - lazy functional programming on a distributed multiprocessor

    Checkland, I. G. & Runciman, C., 1993, p. 397-406.

    Research output: Contribution to conferencePaper

  304. Performance evaluation of a fast chemical structure matching method using distributed neural relaxation

    Turner, A. & Austin, J., 2000, p. 201-204.

    Research output: Contribution to conferencePaper

  305. Performance modelling

    Charles, N., Runciman, C., Hammond, K. & Michaelson, G., 1999, p. 233--246.

    Research output: Contribution to conferencePaper

  306. Performance of second order particle-in-cell methods on modern many-core architectures

    Brown, D., Bettencourt, M. T., Wright, S. A., Jones, J. P. & Jarvis, S. A., 1 Oct 2017, (Accepted/In press).

    Research output: Contribution to conferencePaper

  307. Performing Hazard and Safety Analysis of Object Oriented Systems

    Hawkins, R. & McDermid, J. A., 2002.

    Research output: Contribution to conferencePaper

  308. Personalization of Interactive Systems: Introduction to the Special Thematic Session

    Petrie, H. & Weber, G., 2004, p. 117-120.

    Research output: Contribution to conferencePaper

  309. Persuasive Technology for Leisure and Health: Development of a Personal Navigation Tool

    McCreadie, C., Raper, J., Gunesh, A., Wood, J., Carey, K., Petrie, H., Wood, L., Survey, O., Tyler, S. & Biggs, S., 2006, p. 187-190.

    Research output: Contribution to conferencePaper

  310. Phoneme segmentation of speech

    Ziólko, B., Manandhar, S. & Wilson, R. C., 1 Sep 2006, p. 282-285. 4 p.

    Research output: Contribution to conferencePaper

  311. Pictorial Representation of Parallel Programs

    Stepney, S., 1989.

    Research output: Contribution to conferencePaper

  312. Pointers and Records in the Unifying Theories of Programming

    Cavalcanti, A., Harwood, W. & Woodcock, J., 2006, p. 200-216.

    Research output: Contribution to conferencePaper

  313. Policies for Safety Critical Systems: the Challenge of Formalisation

    Moffett, J. D. & McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  314. Policy evolution with genetic programming

    Lim, YT., Cheng, PC. & Clark, J. A., 2008.

    Research output: Contribution to conferencePaper

  315. Practical Formal Specification for Embedded Control Systems

    Iwu, F., Galloway, A. J., Toyn, I. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  316. Practical Parallel Processing: A User's View of sc \Clip4

    Wood, A. M., 1982, p. 4.1-4.7.

    Research output: Contribution to conferencePaper

  317. Practical single view metrology for cuboids

    Pears, N., Wright, P. & Bailey, C., 2007, p. 85-90.

    Research output: Contribution to conferencePaper

  318. Predictable Memory Utilization in the Ravenscar-Java Profile

    Kwon, J., Wellings, A. J. & King, S., 2003, p. 267-276.

    Research output: Contribution to conferencePaper

  319. Primitives for the dynamic evolution of component-based applications

    Oriol, M., 2007, p. 1122.

    Research output: Contribution to conferencePaper

  320. Priority Assignment for Real-Time Wormhole Communication in On-Chip Networks

    Shi, Z. & Burns, A., 2008, p. 421-430.

    Research output: Contribution to conferencePaper

  321. Priority Union and Generalization in Discourse Grammars

    Grover, C., Brew, C., Manandhar, S. & Moens, M., 1994, p. 17-24.

    Research output: Contribution to conferencePaper

  322. Probabilistic Analysis for Mixed Criticality Systems using Fixed Priority Preemptive Scheduling

    Maxim, D., Davis, R. I., Cucu-Grosjean, L. & Easwaran, A., 4 Oct 2017. 10 p.

    Research output: Contribution to conferencePaper

  323. Probabilistic Analysis of CAN with Faults

    Broster, I., Burns, A. & Rodríguez-Navas, G., 2002, p. 269-278.

    Research output: Contribution to conferencePaper

  324. Problems and solutions for markup for mathematical examples and exercises

    Goguadze, G., Melis, E., Ullrich, C. & Cairns, P., 2003, p. 80--92.

    Research output: Contribution to conferencePaper

  325. Proc. British Machine Vision Conference (BMVC), vol II: Navier-Stokes Formulation for Modelling Turbulent Optical Flow

    Doshi, A. & Bors, A. G., Sep 2007, p. 640-649.

    Research output: Contribution to conferencePaper

  326. Process Tailoring in Iterative Development

    Murdoch, J., McDermid, J. A. & Wilkinson, P. J., 2001.

    Research output: Contribution to conferencePaper

  327. Processing Group Parameters in the Real-Time Specification for Java

    Burns, A. & Wellings, A. J., 2003, p. 360-370.

    Research output: Contribution to conferencePaper

  328. Product Line Analysis and the System Safety Process

    Stephenson, Z., Souza, S. D., McDermid, J. A. & Ward, A., 2004, p. 790-799.

    Research output: Contribution to conferencePaper

  329. Product-Line Technology Recommendations for Integrated Modular Systems

    Stephenson, Z. R., NIcholson, M. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  330. Profiling parallel functional computations (without parallel machines)

    Runciman, C., Wakeling, D., O'Donnell, J. T. & Hammond, K., 1994, p. 236--251.

    Research output: Contribution to conferencePaper

  331. Prolog Issues and Experimental Results of an MCMC Algorithm

    Angelopoulos, N. & Cussens, J., 2001, p. 186-196.

    Research output: Contribution to conferencePaper

  332. Prolog Issues of an MCMC Algorithm

    Angelopoulos, N. & Cussens, J., 2001, p. 246-253.

    Research output: Contribution to conferencePaper

  333. Proof versus testing in the context of Safety Standards

    Galloway, A., Paige, R. F., Tudor, N. J., Weaver, R. A., Toyn, I. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  334. Protein folding with stochastic L-Systems

    Danks, G., Stepney, S. & Caves, L., 2008, p. 150-157.

    Research output: Contribution to conferencePaper

  335. Proving Theorems About JML Classes

    Freitas, L. & Woodcock, J., 2007, p. 255-279.

    Research output: Contribution to conferencePaper

  336. Putting Formal Specifications under the Magnifying Glass: Model-based Testing for Validation

    Aydal, E. G., Paige, R. F., Utting, M. & Woodcock, J., 2009, p. 131-140.

    Research output: Contribution to conferencePaper

  337. Quantifying the experience of immersion in games

    Cairns, P., Cox, A., Berthouze, N., Dhoparee, S. & Jennett, C., 2006.

    Research output: Contribution to conferencePaper

  338. Quantitative comparisons into content-based music recognition with the self organising map

    Wood, G. & O'Keefe, S., 2003, p. 1-2. 2 p.

    Research output: Contribution to conferencePaper

  339. Quantum Teleportation of Wavepackets in a Non-Gaussian State

    Lee, N., Takeno, Y., Benichi, H., Yonezawa, H., Webb, J., Huntington, E., Mista, Jr., L., Filip, R., van Loock, P., Braunstein, S. L. & Furusawa, A., 2009, p. 2221-2222.

    Research output: Contribution to conferencePaper

  340. Quantum algorithms in group theory

    Batty, M., Braunstein, SL., Duncan, AJ. & Rees, S., 2004, p. 1-62.

    Research output: Contribution to conferencePaper

  341. Quantum cryptography with an ideal local relay

    Spedalieri, G., Ottaviani, C., Braunstein, S. L., Gehring, T., Jacobsen, C. S., Andersen, U. L. & Pirandola, S., 3 Sep 2015.

    Research output: Contribution to conferencePaper

  342. Quantum ensembles and quantum informatics

    Akulin, VM., Kurizki, G., Braunstein, SL. & Ozhigov, Y., 2005, p. 15-16.

    Research output: Contribution to conferencePaper

  343. Quantum information processing with Schrodinger cats

    Nemoto, K., Gilchrist, A., Munro, WJ., Ralph, TC., Milburn, GJ. & Braunstein, SL., 2003, p. 434-443.

    Research output: Contribution to conferencePaper

  344. Qubus computation - art. no. 63050D

    Munro, W. J., Nemoto, K., Spiller, T. P., van Loock, P., Braunstein, S. L. & Milburn, G. J., 2006, p. D3050.

    Research output: Contribution to conferencePaper

  345. RBF shape histograms and their application to 3D face processing

    Pears, N., 2008, p. 1-8.

    Research output: Contribution to conferencePaper

  346. RBN-World: A Sub-symbolic Artificial Chemistry

    Faulconbridge, A., Stepney, S., Miller, J. F. & Caves, L. S. D., 2009, p. 377-384.

    Research output: Contribution to conferencePaper

  347. RBN-World: The hunt for a rich AChem

    Faulconbridge, A., Stepney, S. & Miller, J. F., 2010, p. 261--268.

    Research output: Contribution to conferencePaper

  348. Radiance function estimation for object classification

    Robles-Kelly, A. & Hancock, E. R., 2004, p. 67-75. 9 p.

    Research output: Contribution to conferencePaper

  349. Ravenscar-Java: a high integrity profile for real-time Java

    Kwon, J., Wellings, A. J. & King, S., 2002, p. 131-140.

    Research output: Contribution to conferencePaper

  350. Re-evaluation of the role of the processor within embedded multiprocessor systems

    Freeman, M. & Bailey, C., 2009, p. 181-188. 8 p.

    Research output: Contribution to conferencePaper

  351. Re-use of Engine Control Technology

    Hill, J. V., McDermid, J. A., Rimmer, R. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  352. Re-use through standardisation: towards industry-standard engine control software

    Lam, W., McDermid, J. A. & Vickers, A. J., 1996.

    Research output: Contribution to conferencePaper

  353. Reading Multimedia Documents

    Petrie, H. & Weber, G., 2002, p. 413-420.

    Research output: Contribution to conferencePaper

  354. Real-Time Communication Analysis for On-Chip Networks with Wormhole Switching

    Shi, Z. & Burns, A., 1 Apr 2008, p. 161 -170.

    Research output: Contribution to conferencePaper

  355. Real-Time Communication Analysis with a Priority Share Policy in On-Chip Networks

    Shi, Z. & Burns, A., 2009, p. 3-12.

    Research output: Contribution to conferencePaper

  356. Real-Time Utilities for Ada 2005

    Wellings, A. J. & Burns, A., 2007, p. 1-14.

    Research output: Contribution to conferencePaper

  357. Realism in Statistical Analysis of Worst Case Execution Times

    Griffin, D. & Burns, A., 2010, p. 44-53.

    Research output: Contribution to conferencePaper

  358. Recognising Facial Expressions Using Spherical Harmonics

    Sharpe, J. & Hancock, E. R., 2008, p. 157-166.

    Research output: Contribution to conferencePaper

  359. Recovering 3D Shape Using an Improved Fast Marching Method

    Zou, C. & Hancock, E. R., 2010, p. 1678-1681.

    Research output: Contribution to conferencePaper

  360. Rectifying Non-Euclidean Similarity Data Using Ricci Flow Embedding

    Xu, W., Hancock, E. R. & Wilson, R. C., 2010, p. 3324-3327.

    Research output: Contribution to conferencePaper

  361. Refine and Gabriel: Support for Refinement and Tactics

    Oliveira, M., Xavier, M. & Cavalcanti, A., 2004, p. 310-319.

    Research output: Contribution to conferencePaper

  362. Refinement: An overview

    Cavalcanti, A., Sampaio, A. & Woodcock, J., 2004, p. 1-17.

    Research output: Contribution to conferencePaper

  363. Refinement Algebra for Formal Bytecode Generation

    Duran, A., Cavalcanti, A. & Sampaio, A., 2002, p. 347-358.

    Research output: Contribution to conferencePaper

  364. Refinement Based Methods for the Construction of Dependable Systems, 13.09. - 18.09.2009

    Abrial, J-R., Butler, M. J., Joshi, R., Troubitsyna, E. & Woodcock, J. C. P., 2009.

    Research output: Contribution to conferencePaper

  365. Refinement in Circus

    Sampaio, A., Woodcock, J. & Cavalcanti, A., 2002, p. 451-470.

    Research output: Contribution to conferencePaper

  366. Refinement of State-Based Concurrent Systems

    Woodcock, J. & Morgan, C., 1990, p. 340-351.

    Research output: Contribution to conferencePaper

  367. Refining Implicit Function Representations of 3-D Scenes: Proc. British Machine Vision Conference(BMVC), vol. II

    Grum, M. & Bors, A. G., Sep 2007, p. 710-719.

    Research output: Contribution to conferencePaper

  368. Reflecting on Open-Ended Evolution

    Stepney, S. & Hoverd, T., 2011.

    Research output: Contribution to conferencePaper

  369. Reflective Grammatical Evolution

    Timperley, C. & Stepney, S., 2014, p. 71–78.

    Research output: Contribution to conferencePaper

  370. Refund Attacks on Bitcoin’s Payment Protocol

    McCorry, P., Shahandashti, S. F. & Hao, F., 17 May 2017, p. 581-599. 19 p.

    Research output: Contribution to conferencePaper

  371. Registering Incomplete Radar Images using the EM Algorithm

    Moss, S. & Hancock, E. R., 1996.

    Research output: Contribution to conferencePaper

  372. Regularising the Ricci Flow Embedding

    Xu, W., Hancock, E. R. & Wilson, R. C., 2010, p. 579-588.

    Research output: Contribution to conferencePaper

  373. Reinforcement Learning Approaches to Coordination in Cooperative Multi-agent Systems

    Kapetanakis, S., Kudenko, D. & Strens, M. J. A., 2002, p. 18-32.

    Research output: Contribution to conferencePaper

  374. Reinforcement Learning in RoboCup KeepAway with Partial Observability

    Devlin, S., Grzes, M. & Kudenko, D., 2009, p. 201-208.

    Research output: Contribution to conferencePaper

  375. Reinforcement Learning of Coordination in Heterogeneous Cooperative Multi-agent Systems

    Kapetanakis, S. & Kudenko, D., 2005, p. 119-131.

    Research output: Contribution to conferencePaper

  376. Representation and structural biases in CGP

    Payne, A. J. & Stepney, S., 2009, p. 1064-1071.

    Research output: Contribution to conferencePaper

  377. Representing Sequences in Description Logics

    Hirsh, H. & Kudenko, D., 1997, p. 384-389.

    Research output: Contribution to conferencePaper

  378. Representing Sequences in Description Logics Using Suffix Trees

    Kudenko, D. & Hirsh, H., 1996, p. 141-145.

    Research output: Contribution to conferencePaper

  379. Reputation Attacks in Mediated and Automated Systems

    Rabaiotti, JR., Chivers, H. & Clark, J. A., 2008.

    Research output: Contribution to conferencePaper

  380. Requirements analysis and safety: a case study (using GRASP)

    Coombes, A. C., McDermid, J. A., Moffett, J. D. & Rabe, G., 1995, p. 353-371.

    Research output: Contribution to conferencePaper

  381. Requirements and Traceability

    Coombes, A. C., McDermid, J. A. & Morris, P., 1994.

    Research output: Contribution to conferencePaper

  382. Requirements as Conjectures: Intuitive DVD Menu Navigation

    Rossmorris, J., Stepney, S., Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005, p. 172-186.

    Research output: Contribution to conferencePaper

  383. Requirements for Performing Safety Analysis on Operating Systems

    Conmy, P. M. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  384. Requirements for the Use of COTS Operating Systems in Safety Related Air Traffic Services

    Pierce, R., Wilson, S. P., McDermid, J. A., Beus-Dukic, L. & Eaton, A., 1999.

    Research output: Contribution to conferencePaper

  385. Research Challenges in Concurrent Development Development Environments

    Powell, A. L., Mander, K. C. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  386. Research methods for HCI

    Cox, A. L., Cairns, P. A., Thimbleby, H. W. & Webb, N., 2008, p. 221-222.

    Research output: Contribution to conferencePaper

  387. Reservoir Computing in materio with LEDs

    Dale, M. N., Miller, J. F., Stepney, S. & Trefzer, M. A., 2017.

    Research output: Contribution to conferencePaper

  388. Resource Abstraction for Reinforcement Learning in Multiagent Congestion Problems

    Malialis, K., Devlin, S. & Kudenko, D., 9 May 2016, p. 512-520. 9 p.

    Research output: Contribution to conferencePaper

  389. Resource sharing in RTSJ and SCJ systems

    Wellings, A., Lin, S. & Burns, A., Oct 2011.

    Research output: Contribution to conferencePaper

  390. Response Time Analysis for Mixed Criticality Systems with Arbitrary Deadlines

    Burns, A. & Davis, R. I., 5 Dec 2017. 6 p.

    Research output: Contribution to conferencePaper

  391. Response Time Analysis of Synchronous Data Flow Programs on a Many-Core Processor

    Rihani, H., Moy, M., Maiza, C., Davis, R. I. & Altmeyer, S., Oct 2016.

    Research output: Contribution to conferencePaper

  392. Restoring broken entanglement by separable correlations

    Spedalieri, G. & Pirandola, S., 3 Sep 2015.

    Research output: Contribution to conferencePaper

  393. Retrenching the Purse: Hashing Injective CLEAR Codes, and Security Properties

    Banach, R., Poppleton, M., Jeske, C. & Stepney, S., 2006, p. 82-90.

    Research output: Contribution to conferencePaper

  394. Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern

    Banach, R., Poppleton, M., Jeske, C., Stepney, S., Fitzgerald, J., Hayes, I. J. & Tarlecki, A., 2005, p. 382-398.

    Research output: Contribution to conferencePaper

  395. Retrenching the Purse: Finite Exception Logs, and Validating the Small

    Banach, R., Poppleton, M. & Stepney, S., 2006, p. 234-248.

    Research output: Contribution to conferencePaper

  396. Retrenchment and the Atomicity Pattern

    Banach, R., Jeske, C., Hall, A. & Stepney, S., 2007, p. 37-46.

    Research output: Contribution to conferencePaper

  397. Retrenchment and the Mondex Electronic Purse

    Banach, R., Poppleton, M., Jeske, C. & Stepney, S., 2005, p. 41-48.

    Research output: Contribution to conferencePaper

  398. Reviewing and Evaluating Automatic Term Recognition Techniques

    Korkontzelos, I., Klapaftis, I. P. & Manandhar, S., 2008, p. 248-259.

    Research output: Contribution to conferencePaper

  399. Rewriting History to Exploit Gain Time

    Bernat, G., Broster, I. & Burns, A., 2004, p. 328-335.

    Research output: Contribution to conferencePaper

  400. Robust Computation of the Polarisation Image

    Saman, G. & Hancock, E. R., 2010, p. 971-974.

    Research output: Contribution to conferencePaper

  401. Robust Diffusion of Structural Flows for Volumetric Image Interpolation

    Doshi, A. & Bors, A. G., Sep 2006, p. 1225-1228. 4 p.

    Research output: Contribution to conferencePaper

  402. Robust Shape from Polarisation and Shading

    Huynh, C. P., Robles-Kelly, A. & Hancock, E. R., 2010, p. 810-813.

    Research output: Contribution to conferencePaper

  403. Robustness Analysis of SARSA(lambda): Different Models of Reward and Initialisation

    Grzes, M. & Kudenko, D., 2008, p. 144-156.

    Research output: Contribution to conferencePaper

  404. Role Identification for Accurate Analysis in Dota 2

    Demediuk, S. P., York, P. J., Block, F. O., Walker, J. A. & Drachen, A., 8 Oct 2019.

    Research output: Contribution to conferencePaper

  405. Rule Migration: Exploring a design framework for modelling emergence in CA-like systems

    Turner, H. & Stepney, S., 2005.

    Research output: Contribution to conferencePaper

  406. SAT Encodings of the AT-Most-k Constraint: Some Old, Some New, Some Fast, Some Slow

    Frisch, A. M. & Giannaros, P. A., 2010.

    Research output: Contribution to conferencePaper

  407. SAZ

    Polack, F., Hitchcock, P. & Brown, A. W., 1990, p. 384-384.

    Research output: Contribution to conferencePaper

  408. SPECULAR AND DIFFUSE REFLECTANCE IN MICROFACET MODELS

    Smith, W. A. P. & Hancock, E. R., 2009, p. 3737-3740.

    Research output: Contribution to conferencePaper

  409. Safe Multi-objective Planning with a Posteriori Preferences

    Eastwood, T. C. M. R., Alexander, R. D. & Kelly, T. P., 7 Jan 2016. 8 p.

    Research output: Contribution to conferencePaper

  410. Safety Analysis and Certification of Open Distributed Systems

    Conmy, P. M., McDermid, J. A., Nicholson, M. & Purwantoro, Y., 2002.

    Research output: Contribution to conferencePaper

  411. Safety Analysis of Hardware/Software Interactions in Complex Systems

    McDermid, J. A. & Pumfrey, D. J., 1998, p. 232-241.

    Research output: Contribution to conferencePaper

  412. Safety Analysis of Software Architectures - "LIghtweight PSSA"

    Lisagor, O., McDermid, J. A. & Pumfrey, D. J., 2004.

    Research output: Contribution to conferencePaper

  413. Safety Arguments, Software and System Reliability

    McDermid, J. A., 1991, p. 43-51.

    Research output: Contribution to conferencePaper

  414. Safety Assessment of System Architectures

    Murdoch, J., Kirkham, P., McDermid, J. A. & Wilkinson, P., 2000, p. 449-456.

    Research output: Contribution to conferencePaper

  415. Safety Assurance Contracts for Integrated Modular Avionics

    Conmy, P., Nicholson, M., McDermid, J. A., Lindsay, P. A. & Cant, A., 2003, p. 69-78.

    Research output: Contribution to conferencePaper

  416. Safety Case Patterns - Reusing Successful Arguments

    Kelly, T. P. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  417. Safety Cases and Safety Arguments

    McDermid, J. A. & Anderson, T., 1992.

    Research output: Contribution to conferencePaper

  418. Safety Critical Systems in Aerospace

    McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  419. Safety Lifecycle Activities for Autonomous Systems Development

    Alexander, R., Gorry, B. & Kelly, T., 2010.

    Research output: Contribution to conferencePaper

  420. Safety Lifecycle for Developing Safety Critical Artificial Neural Networks

    Kurd, Z. & Kelly, T., 2003, p. 77-91.

    Research output: Contribution to conferencePaper

  421. Safety Tactics for Software Architecture Design

    Wu, W. & Kelly, T., 2004, p. 368-375.

    Research output: Contribution to conferencePaper

  422. Safety cases for software application reuse

    Fenelon, P., Kelly, T. P., McDermid., J. A. & Rabe, G., 1995, p. 419-436.

    Research output: Contribution to conferencePaper

  423. Safety validation of sense and avoid algorithms using simulation and evolutionary search

    Zou, X., Alexander, R. & McDermid, J. A., 2014. 16 p.

    Research output: Contribution to conferencePaper

  424. Scheduling Fixed-Priority Hard Real-Time Tasks in the Presence of Faults

    Lima, G. M. D. A. & Burns, A., 2005, p. 154-173.

    Research output: Contribution to conferencePaper

  425. Schemas in Directed Emergent Drama

    Arinbjarnar, M. & Kudenko, D., 2008, p. 180-185.

    Research output: Contribution to conferencePaper

  426. Scoped Coordination in Open Distributed Systems

    Merrick, I. & Wood, A. M., 2000, p. 311-316.

    Research output: Contribution to conferencePaper

  427. Screening the parameters affecting heuristic performance

    Ridge, E. & Kudenko, D., 2007, p. 180.

    Research output: Contribution to conferencePaper

  428. Scribe Identification in Medieval English Manuscripts

    Gillam, T., Wilson, R. C. & Clark, J. A., 23 Aug 2010, p. 1880-1883. 4 p.

    Research output: Contribution to conferencePaper

  429. Searching for Risk in Large Complex Spaces

    Clegg, K. D. & Alexander, R., Apr 2013, p. 753-762 .

    Research output: Contribution to conferencePaper

  430. Secure Composition of Systems

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  431. Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment

    Ge, X., Polack, F. & Laleau, R., 2004, p. 234-247.

    Research output: Contribution to conferencePaper

  432. Security Analysis of Integrated Diffie-Hellman Digital Signature Algorithm Protocols

    Vasilakis, V., Alohali, B., Moscholios, I. & Logothetis, M., 30 Apr 2017, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  433. Security Models and Enterprise Models

    Dobson, J. E. & McDermid, J. A., 1988, p. 1-39.

    Research output: Contribution to conferencePaper

  434. Security Policies for Integrated Project Support Environments

    McDermid, J. A. & Hocking, E. S., 1989, p. 41-74.

    Research output: Contribution to conferencePaper

  435. Security Specifications

    Jacob, J. L., 1 Apr 1988, p. 14--23.

    Research output: Contribution to conferencePaper

  436. Security and Normative Rights

    Morris, P. & McDermid, J. A., 1991, p. 294-314.

    Research output: Contribution to conferencePaper

  437. Security of two-way quantum cryptography against asymmetric attacks - art. no. 709215

    Pirandola, S., Mancini, S., Lloyd, S. & Braunstein, S. L., 2008, p. 9215.

    Research output: Contribution to conferencePaper

  438. Security requirements modelling for virtualized 5G small cell networks

    Vasilakis, V., Mouratidis, H., Panaousis, E., Moscholios, I. & Logothetis, M., May 2017. 5 p.

    Research output: Contribution to conferencePaper

  439. Segmentation and Estimation of the Optical Flow

    Bors, A. G. & Pitas, I., 1995, p. 680-685.

    Research output: Contribution to conferencePaper

  440. Segmentation of Biological Cell Images for Sonification

    Edwards, A. D. N., Hines, G. & Hunt, A., 1 May 2008, p. 128 -132.

    Research output: Contribution to conferencePaper

  441. Segregation with Communication

    Cooper, D. & Stepney, S., 2000, p. 451-470.

    Research output: Contribution to conferencePaper

  442. Self-Similar Convolution Image Distribution Histograms as Invariant Identifiers

    Tuke, C. E., O'Keefe, S. E. M. & Austin, J., 2001, p. 501-510. 10 p.

    Research output: Contribution to conferencePaper

  443. Semi-Clairvoyance in Mixed-Criticality Scheduling

    Agrawa, K., Baruah, S. & Burns, A., 7 Oct 2019, (Accepted/In press).

    Research output: Contribution to conferencePaper

  444. Semi-Supervised Graph Rewiring with the Dirichlet Principle

    Curado, M., Escolano, F., Lozano, M. A. & Hancock, E. R., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  445. Semi-supervised Feature Selection for Gender Classification

    Wu, J., Smith, W. A. P. & Hancock, E. R., 2010, p. 23-33.

    Research output: Contribution to conferencePaper

  446. Separating Lambertian and Specular Reflectance Components using Iterated Conditional Modes

    Ragheb, H. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  447. Short-Term Traffic Prediction Using a Binary Neural Network.

    Hodge, V. J., Krishnan, R., Jackson, T., Austin, J. & Polak, J., 5 Jan 2011.

    Research output: Contribution to conferencePaper

  448. Simulating biology: towards understanding what the simulation shows

    Andrews, P. S., Polack, F., Sampson, A. T., Timmis, J. & Coles, M., 2008, p. 93-123.

    Research output: Contribution to conferencePaper

  449. Simulation and Prediction in Safety Case Evidence

    Alexander, R. & Kelly, T., 2008.

    Research output: Contribution to conferencePaper

  450. Sketching sketching: outlines of a collaborative design method

    Craft, B. & Cairns, P. A., 2009, p. 65-72.

    Research output: Contribution to conferencePaper

  451. Skills and Technologies for the Development and Evaluation of Safety Critical Applications

    McDermid, J. A. & Daniels, B. K., 1990, p. 163-172.

    Research output: Contribution to conferencePaper

  452. Slotted-Circus

    Butterfield, A., Sherif, A. & Woodcock, J., 2007, p. 75-97.

    Research output: Contribution to conferencePaper

  453. Smart Devices and Software Agents: The Basics of Good Behaviour

    Chivers, H., Clark, J. A., Stepney, S., Hutter, D., Müller, G., Stephan, W. & Ullmann, M., 2003, p. 39-52.

    Research output: Contribution to conferencePaper

  454. Social Learning through Evolution of Language

    Kazakov, D. & Bartlett, M., 2003, p. 397-408.

    Research output: Contribution to conferencePaper

  455. Software Assurance Arguments vs Formal Mathematical Arguments

    Habli, I., Stephenson, Z. R., Kelly, T. P. & McDermid, J. A., Nov 2009.

    Research output: Contribution to conferencePaper

  456. Software Quality Assurance Using the SAZ Method

    Polack, F. & Mander, K., 1994, p. 230-249.

    Research output: Contribution to conferencePaper

  457. Software Safety: Why is there no Consensus?

    McDermid, J. A. & Pumfrey, D. J., 2004.

    Research output: Contribution to conferencePaper

  458. Software Safety: Why is there no Consensus?

    McDermid, J. A. & Pumfrey, D. J., 2001.

    Research output: Contribution to conferencePaper

  459. Software Safety Arguments: Towards a Systematic Categorsation of Evidence

    Weaver, R., McDermid, J. A. & Kelly, T. P., 2002.

    Research output: Contribution to conferencePaper

  460. Software Vaccination: An Artificial Immune System Approach to Mutation Testing

    May, P., Mander, K. & Timmis, J., 2003, p. 81-92.

    Research output: Contribution to conferencePaper

  461. Solving Non-Boolean Satisfiability Problems with Stochastic Local Search

    Frisch, A. M., Peugniez, T. J., Doggett, A. & Nightingale, P., 2001, p. 282-290.

    Research output: Contribution to conferencePaper

  462. Solving the multiple-rd problem

    Rowstron, A. & Wood, A., 1996, p. 357--367.

    Research output: Contribution to conferencePaper

  463. Sonification Strategies for Examination of Biological Cells

    Edwards, A., Hunt, A., Hines, G., Jackson, V., Podvoiskis, A., Roseblade, R. & Stammers, J., 1 Jun 2010.

    Research output: Contribution to conferencePaper

  464. Specification Coverage for Testing in Circus

    Cavalcanti, A. & Gaudel, M-C., 2010, p. 1-45.

    Research output: Contribution to conferencePaper

  465. Specification and Refinement using a Heterogeneous Notation for Concurrency and Communication

    Paige, R. F., 1999, p. 353-372.

    Research output: Contribution to conferencePaper

  466. Specification of Real-Time Systems: A View Oriented Approach

    Barroca, L. M. & McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  467. Specification-Driven Design with Eiffel and Agents for Teaching Lightweight Formal Methods

    Paige, R. F. & Ostroff, J. S., 2004, p. 107-123.

    Research output: Contribution to conferencePaper

  468. Specifying Confidentiality in Circus

    Banks, M. J. & Jacob, J. L., 2011, p. 215-230.

    Research output: Contribution to conferencePaper

  469. Specifying Security in CSCW Systems

    Foley, S. N. & Jacob, J. L., 1997, p. 136--145.

    Research output: Contribution to conferencePaper

  470. Spectral Generative Models for Graphs

    White, D. & Wilson, R. C., 10 Sep 2007, p. 35-42. 7 p.

    Research output: Contribution to conferencePaper

  471. Spherical Embedding and Classification

    Wilson, R. C. & Hancock, E. R., 2010, p. 589-599.

    Research output: Contribution to conferencePaper

  472. Splitting Rate Modelling for Intelligent Transport Systems

    Smith, M., Mounce, R., Hollier, G. P., Hodge, V. J. & Austin, J., 22 Jun 2011.

    Research output: Contribution to conferencePaper

  473. State Visibility and Communication in Unifying Theories of Programming

    Butterfield, A., Gancarski, P. & Woodcock, J., 2009, p. 47-54.

    Research output: Contribution to conferencePaper

  474. Strengthening inferred specifications using search based testing

    Ghani, K. & Clark, JA., 2008.

    Research output: Contribution to conferencePaper

  475. Structural Engineering and Software: Certainty, Uncertainty and Probability

    McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  476. Structural, Syntactic, and Statistical Pattern Recognition - Joint IAPR International Workshop, SSPRSPR 2012, Hiroshima, Japan, November 7-9, 2012. Proceedings

    Gimel'farb, G. L., Hancock, E. R., Imiya, A., Kuijper, A., Kudo, M., Omachi, S., Windeatt, T. & Yamada, K., 2012.

    Research output: Contribution to conferencePaper

  477. Structurally Gated Pairwise Geometric Histograms for Shape Indexing

    Huet, B. & Hancock, E. R., 1997.

    Research output: Contribution to conferencePaper

  478. Structured Analysis: A Draft Method for Writing Z Specifications

    Polack, F., Whiston, M. & Hitchcock, P., 1991, p. 287-328.

    Research output: Contribution to conferencePaper

  479. Structuring Safety Cases for Autonomous Systems

    Alexander, R., Herbert, N. & Kelly, T., 2008.

    Research output: Contribution to conferencePaper

  480. Structuring Safety Policy Decomposition

    Hall-May, M. & Kelly, T., 2006.

    Research output: Contribution to conferencePaper