Search research publications and outputs

1001 - 1233 out of 1,233Page size: 500
  1. Suggestions for stream based parallel systems in Ada

    Ward, M. & Audsley, N. C., 17 Apr 2007, p. 82-87. 6 p.

    Research output: Contribution to conferencePaper

  2. Support for Using Z

    Barden, R., Stepney, S., Bowen, J. P. & Nicholls, J. E., 1992, p. 255-280.

    Research output: Contribution to conferencePaper

  3. Supporting Deadlines and EDF Scheduling in Ada

    Burns, A. & Wellings, A. J., 2004, p. 156-165.

    Research output: Contribution to conferencePaper

  4. Supporting Deliberative Real-Time AI Systems: A Fixed Priority Scheduling Approach

    Chu, Y. & Burns, A., 2007, p. 259-268.

    Research output: Contribution to conferencePaper

  5. Supporting Nested Resources in MrsP

    Garrido, J., Zhao, S., Burns, A. & Wellings, A. J., 2017, p. 73-86. 14 p.

    Research output: Contribution to conferencePaper

  6. Surface Integration: Two Statistical Approaches

    Smith, W. A. P. & Hancock, E. R., 2007, p. 343-350.

    Research output: Contribution to conferencePaper

  7. Surface Reconstruction Using Polarization and Photometric Stereo

    Atkinson, G. & Hancock, E. R., 2007, p. 466-473.

    Research output: Contribution to conferencePaper

  8. Sustainable Scheduling Analysis

    Baruah, S. K. & Burns, A., 2006, p. 159-168.

    Research output: Contribution to conferencePaper

  9. Symmetry Breaking as a Prelude to Implied Constraints: A Constraint Modelling Pattern

    Frisch, A. M., Jefferson, C. & Miguel, I., 2004, p. 171-175. 4 p.

    Research output: Contribution to conferencePaper

  10. System Modelling for Concurrent Safety Analysis

    Murdoch, J., McDermid, J. A., Wilkinson, P. & Reid, S., 1997.

    Research output: Contribution to conferencePaper

  11. Systematic Anticipation and Validation of Scenarios of Failure Propagation and Mitigation in PLC Controlled Processes

    Papadopoulos, Y., Mauri, G. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  12. Systematic evaluation of test failure results

    Ciupa, I., Liu, L. L., Oriol, M., Leitner, A. & Borca-Muresan, R., 2007, p. 2--3.

    Research output: Contribution to conferencePaper

  13. Systems Development Using Z Generics

    Polack, F. & Stepney, S., 1999, p. 1048-1067.

    Research output: Contribution to conferencePaper

  14. T Cell Receptor Signalling Inspired Kernel Density Estimation and Anomaly Detection

    Owens, N. D. L., Greensted, A., Timmis, J. & Tyrrell, A., Aug 2009, p. 122-135. 13 p.

    Research output: Contribution to conferencePaper

  15. TARDIS: An Architectural Framework for Timely and Reliable Distributed Information Systems

    Burns, A., Lister, A. M., McDermid, J. A. & Bailes, P. A., 1991, p. 1-15.

    Research output: Contribution to conferencePaper

  16. TARDIS/Z: A Technique for Formal Specification of High Integrity and Real Time Systems

    Coombes, A. C., Burns, A., McDermid, J. A. & Wichmann, B. A., 1991, p. 1-6.

    Research output: Contribution to conferencePaper

  17. Tactile-based direct manipulation in GUIs for blind users

    Petrie, H., Morley, S. & Weber, G., 1995, p. 428-429.

    Research output: Contribution to conferencePaper

  18. Tagged sets: A secure and transparent coordination medium

    Oriol, M. & Hicks, M., 2005, p. 252--267.

    Research output: Contribution to conferencePaper

  19. Tailoring Generic Systems Engineering Processes: An Agent-Oriented Method

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 1999, p. 1011-1020.

    Research output: Contribution to conferencePaper

  20. Taking Our Own Medicine: Applying the Refinement Calculus to State-Rich Refinement Model Checking

    Freitas, L., Cavalcanti, A. & Woodcock, J., 2006, p. 697-716.

    Research output: Contribution to conferencePaper

  21. TeDUB: A System for Presenting and Exploring Technical Drawings for Blind People

    Petrie, H., Schlieder, C., Blenkhorn, P., Evans, D. G., King, A., O'Neill, A-M., Ioannidis, G. T., Gallagher, B., Crombie, D., Mager, R. & Alafaci, M., 2002, p. 537-539.

    Research output: Contribution to conferencePaper

  22. Teaching Reuse in a Supportive Life-Cycle

    Burd, E. L., McDermid, J. A. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  23. Teaching Reuse through a supportive life-cycle

    Burd, E. L., McDermid, J. A., Whittle, B. R., O'Callaghan, A. & Leigh, M., 1994.

    Research output: Contribution to conferencePaper

  24. Teaching post-classical computation: extended abstract

    Stepney, S., 2004, p. 3.

    Research output: Contribution to conferencePaper

  25. Techniques for simplifying the visualisation of graph reduction

    Foubister, S. P. & Runciman, C., 1995, p. 66--77.

    Research output: Contribution to conferencePaper

  26. Technology Transfer by Case Study: an Experience Report

    Whittle, B. R., Vickers, A. J. & McDermid, J. A., 1996, p. 211-218.

    Research output: Contribution to conferencePaper

  27. Ten Steps Towards Systematic Requirements Reuse

    Lam, W., McDermid, J. A., Vickers, A. & Mylopoulos, J., 1997, p. 6-15.

    Research output: Contribution to conferencePaper

  28. Tenori-on stage: YouTube as performance space

    Blythe, M. & Cairns, P. A., 2010, p. 72-81.

    Research output: Contribution to conferencePaper

  29. Tension, what tension? Website accessibility and visual design

    Petrie, H., Hamilton, F. & King, N., 2004, p. 13-18.

    Research output: Contribution to conferencePaper

  30. Tensor MRI Regularization via Graph Diffusion

    Zhang, F. & Hancock, E. R., 2006, p. 589-598.

    Research output: Contribution to conferencePaper

  31. Tenuta: Strategies for Providing Guidance on Usability and Accessibility

    Bevan, N., Petrie, H. & Claridge, N., 2007, p. 20-27.

    Research output: Contribution to conferencePaper

  32. Test Case Management Tools for Accessibility Testing

    Herramhof, S., Petrie, H., Strobbe, C., Vlachogiannis, E., Weimann, K., Weber, G. & Velasco, C. A., 2006, p. 215-222.

    Research output: Contribution to conferencePaper

  33. Testing . NET Code with YETI

    Oriol, M. & Tassis, S., 2010.

    Research output: Contribution to conferencePaper

  34. Testing and Tracing Lazy Functional Programs using QuickCheck and Hat

    Claessen, K., Runciman, C., Chitil, O., Hughes, R. J. M. & Wallace, M., 1 Feb 2003, p. 59--99.

    Research output: Contribution to conferencePaper

  35. Testing as Abstraction

    Stepney, S., 1995, p. 137-151.

    Research output: Contribution to conferencePaper

  36. Testing for Refinement in CSP

    Cavalcanti, A. & Gaudel, M-C., 2007, p. 151-170.

    Research output: Contribution to conferencePaper

  37. Testing, Proof and Automation: An Integrated Approach

    Burton, S., Clark, J. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  38. The Artificial Epigenetic Network

    Turner, A. P., Lones, M. A., Fuente, L. A., Stepney, S., Caves, L. & Tyrrell, A., Apr 2013, p. 66-72.

    Research output: Contribution to conferencePaper

  39. The Basic Integrity Theorem

    Jacob, J. L., 1 Jun 1991, p. 89--97.

    Research output: Contribution to conferencePaper

  40. The COMPARES Project: COnnectionist Methods for Preprocessing and Analysis of REmote Sensing Data

    Austin, J., Giacinto, G., Kanellopoulos, I., Lees, K., Roli, F., Vernazza, G. & Wilkinson, G., 1997, p. 765-772.

    Research output: Contribution to conferencePaper

  41. The Design of ESSENCE: A Constraint Language for Specifying Combinatorial Problems

    Frisch, A. M., Grum, M., Jefferson, C., Hernández, B. M. & Miguel, I., 2007, p. 80-87.

    Research output: Contribution to conferencePaper

  42. The Design of a Tool-Supported Graphical Notation for Timed CSP

    Brooke, P. J. & Paige, R. F., 2002, p. 299-318.

    Research output: Contribution to conferencePaper

  43. The Development of Reusable Engine Control Technology for Application in Future Engines

    Hill, J. V., McDermid, J. A., Rimmer, R. & Whittle, B. R., 1994.

    Research output: Contribution to conferencePaper

  44. The Effect of Intra-Block Scheduling on Stack Processor Behaviour

    Crispin-Bailey, C. & Sotudeh, R., 1995. 6 p.

    Research output: Contribution to conferencePaper

  45. The Epsilon Generation Language

    Rose, L. M., Paige, R. F., Kolovos, D. S. & Polack, F. A. C., 2008, p. 1--16.

    Research output: Contribution to conferencePaper

  46. The Epsilon Object Language (EOL)

    Kolovos, D. S., Paige, R. F. & Polack, F., 2006, p. 128-142.

    Research output: Contribution to conferencePaper

  47. The Fading Concept in Tuple-Space Systems

    Menezes, R. & Wood, A. M., 2006, p. 440--444.

    Research output: Contribution to conferencePaper

  48. The Formal Analysis of Ada Programs

    Hutcheon, A. D., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1993.

    Research output: Contribution to conferencePaper

  49. The Formal Specification in Z of Defence Standard 00-56

    Woodcock, J., Gardiner, P. H. B. & Hulance, J. R., 1994, p. 9-28.

    Research output: Contribution to conferencePaper

  50. The Grand Challenge of Scalability for Model Driven Engineering

    Kolovos, D. S., Paige, R. F. & Polack, F., 2008, p. 48-53.

    Research output: Contribution to conferencePaper

  51. The HEAT/ACT Preliminary Safety Case: A Case Study in the Use of Goal Structuring Notation

    Chinneck, P., Pumfrey, D. J., McDermid, J. A. & Cant, T., 2004.

    Research output: Contribution to conferencePaper

  52. The Haptic Perception of Texture in Virtual Environments: An Investigation with Two Devices

    Penn, P., Petrie, H., Colwell, C., Kornbrot, D., Furner, S. & Hardwick, A., 2000, p. 25-30.

    Research output: Contribution to conferencePaper

  53. The Interaction Between Inference and Branching Heuristics

    Drake, L. & Frisch, A. M., 2003, p. 370-382.

    Research output: Contribution to conferencePaper

  54. The Miracle of Reactive Programming

    Woodcock, J., 2008, p. 202-217.

    Research output: Contribution to conferencePaper

  55. The Moral Responsibility Gap and the Increasing Autonomy of Systems

    Porter, Z. L. M., Habli, I., Monkhouse, H. E. & Bragg, J. E., 18 Sep 2018.

    Research output: Contribution to conferencePaper

  56. The Organisation of Parallel Processing Machines

    Wood, A. M., Becker, J. & Eisele, I., 1983, p. 132-144.

    Research output: Contribution to conferencePaper

  57. The PISA architecture, a Viable platform for the Superscalar Execution of Statically Scheduled Stack Code

    Crispin-Bailey, C. & Alli, S., 31 Aug 2005, p. 23-26. 4 p.

    Research output: Contribution to conferencePaper

  58. The Phish in the Pond: scam emails as literature

    Clark, J. A. & Blythe, M., 10 Apr 2010.

    Research output: Contribution to conferencePaper

  59. The Pi-puck extension board: a Raspberry Pi interface for the e-puck robot platform

    Millard, A. G., Joyce, R. A., Hilder, J. A., Fleseriu, C., Newbrook, L., Li, W., McDaid, L. & Halliday, D. M., Sep 2017.

    Research output: Contribution to conferencePaper

  60. The Protein Processor Associative Memory on a Robotic Hand-Eye Coordination Task

    Qadir, O., Timmis, J., Tempesti, G. & Tyrrell, A., Dec 2011. 6 p.

    Research output: Contribution to conferencePaper

  61. The Reduceron: Widening the von Neumann Bottleneck for Graph Reduction using an FPGA

    Naylor, M. & Runciman, C., 2008, p. 129-146.

    Research output: Contribution to conferencePaper

  62. The Refinement Calculus

    Woodcock, J., 1991, p. 80-95.

    Research output: Contribution to conferencePaper

  63. The Rigorous Generation of Java Mutation Operators using HAZOP

    Kim, S-W., Clark, J. A. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  64. The Role of Dependency Links in Ensuring Architectural View Consistency

    Radjenovic, A. & Paige, R. F., 2008, p. 199-208. 9 p.

    Research output: Contribution to conferencePaper

  65. The Role of the Human in an Autonomous System

    Alexander, R. D., Herbert, N. J. & Kelly, T. P., 2009.

    Research output: Contribution to conferencePaper

  66. The Role-based Access Control System of a European Bank: a case study and discussion

    Schaad, A., Moffett, J., Jacob, J. & Jaeger, T., 1 May 2001, p. 3--9.

    Research output: Contribution to conferencePaper

  67. The SAZ Project: Integrating SSADM and Z

    Polack, F., Whiston, M. & Mander, K., 1993, p. 541-557.

    Research output: Contribution to conferencePaper

  68. The SCOOP Concurrency Model in Java-like Languages

    Torshizi, F. A., Ostroff, J. S., Paige, R. F. & Chechik, M., 2009, p. 7-27.

    Research output: Contribution to conferencePaper

  69. The SPEKE Protocol Revisited

    Hao, F. & Shahandashti, S. F., 2014, p. 26–38.

    Research output: Contribution to conferencePaper

  70. The Semantics of Circus

    Woodcock, J. & Cavalcanti, A., 2002, p. 184-203.

    Research output: Contribution to conferencePaper

  71. The Simulink/Stateflow Analyser

    Galloway, A. J., Toyn, I., Iwu, F. & McDermid, J. A., 2004.

    Research output: Contribution to conferencePaper

  72. The Single Model Principle

    Paige, R. F. & Ostroff, J. S., 2001, p. 292-293.

    Research output: Contribution to conferencePaper

  73. The Space Usage Problem: An Evaluation Kit for Graph-Reduction Semantics

    Bakewell, A., Runciman, C. & Gilmore, S., 2000, p. 115--128.

    Research output: Contribution to conferencePaper

  74. The State of Practice in System Safety Research Evaluation

    Rae, A., Alexander, R. & Nicholson, M., Oct 2010.

    Research output: Contribution to conferencePaper

  75. The State of Solutions for Autonomous Systems Safety

    Alexander, R. D., Ashmore, R. & Banks, A., 6 Feb 2018.

    Research output: Contribution to conferencePaper

  76. The Steam Boiler in a Unified Theory of Z and CSP

    Woodcock, J. & Cavalcanti, A., 2001, p. 291-298.

    Research output: Contribution to conferencePaper

  77. The Structure of Permissions: A Normative Framework for Access Rights

    Morris, P., McDermid, J. A., Landwehr, C. E. & Jajodia, S., 1991, p. 77-97.

    Research output: Contribution to conferencePaper

  78. The Temporal Knapsack Problem and Its Solution

    Bartlett, M., Frisch, A. M., Hamadi, Y., Miguel, I., Tarim, A. & Unsworth, C., 2005, p. 34-48.

    Research output: Contribution to conferencePaper

  79. The Usability of Accessibility Evaluation Tools

    Petrie, H., King, N., Velasco, C. A., Gappa, H. & Nordbrock, G., 2007, p. 124-132.

    Research output: Contribution to conferencePaper

  80. The Use of Model Transformation in the INESS Project

    Santos, O. M. D., Woodcock, J., Paige, R. F. & King, S., 2009, p. 147-165.

    Research output: Contribution to conferencePaper

  81. The Use of Sentence Similarity as a Semantic Relevance Metric for Question Answering

    Boni, M. D. & Manandhar, S., 2003, p. 138-144.

    Research output: Contribution to conferencePaper

  82. The Use of Z

    Barden, R., Stepney, S., Cooper, D. & Nicholls, J. E., 1991, p. 99-124.

    Research output: Contribution to conferencePaper

  83. The Value of Verification: Positive Experience of Industrial Proof

    King, S., Hammond, J., Chapman, R. & Pryor, A., 1999, p. 1527-1545.

    Research output: Contribution to conferencePaper

  84. The Varieties of Refinement

    Jacob, J. L., Morris, J. M. & Shaw, R. C., 1991, p. 441--455.

    Research output: Contribution to conferencePaper

  85. The View Glue

    Radjenovic, A. & Paige, R. F., 2006, p. 66-88. 22 p.

    Research output: Contribution to conferencePaper

  86. The YorkQA Prototype Question Answering System

    Boni, M. D., Jara-Valencia, J-L. & Manandhar, S., 2002.

    Research output: Contribution to conferencePaper

  87. The bits between the lambdas: binary data in a lazy functional language

    Wallace, M. & Runciman, C., 1 Oct 1998, p. 107--117.

    Research output: Contribution to conferencePaper

  88. The challenges faced by academia preparing students for industry: what we teach and what we do

    Oshlyansky, L., Cairns, P. A., Sasse, A. & Harrison, C., 2008, p. 203-204.

    Research output: Contribution to conferencePaper

  89. The design of S-boxes by simulated annealing

    Clark, J. A., Jacob, J. L. & Stepney, S., 2004, p. 1533--1537.

    Research output: Contribution to conferencePaper

  90. The effect of global instructions on think-aloud testing

    McDonald, S. & Petrie, H., 27 Apr 2013, p. 2941 - 2944. 4 p.

    Research output: Contribution to conferencePaper

  91. The effect of lip and arm synchronization on embodiment: A pilot study

    Collingwoode-Williams, T., Gillies, M., McCall, C. A. & Pan, X., 2017.

    Research output: Contribution to conferencePaper

  92. The effects of local variable optimisation in A C-based stack processor environment

    Crispin-Bailey, C., Sotudeh, R. & Ould-Khaoua, M., 1994. 6 p.

    Research output: Contribution to conferencePaper

  93. The evaluation of accessibility, usability and user experience

    Petrie, H. & Bevan, N., 2009.

    Research output: Contribution to conferencePaper

  94. The generation of speech for a search guide

    Cook, N. J. & Benest, I. D., 2001, p. 1739-1742.

    Research output: Contribution to conferencePaper

  95. The identification and extraction of itemset support defined by the weight matrix of a Self-Organising Map

    Baez-Monroy, V. O. & O'Keefe, S., 2006, p. 3518-3525.

    Research output: Contribution to conferencePaper

  96. The role of structure and complexity on Reservoir Computing quality

    Dale, M., Dewhirst, J. D., O'Keefe, S. E. M., Sebald, A. A-M., Stepney, S. & Trefzer, M. A., 2019, p. 52–64. 13 p.

    Research output: Contribution to conferencePaper

  97. The role of the representational entity in physical computing

    Stepney, S. & Kendon, V., 2019, p. 219–231. 13 p.

    Research output: Contribution to conferencePaper

  98. Theoretical Aspects of Computing - ICTAC 2013 - 10th International Colloquium, Shanghai, China, September 4-6, 2013. Proceedings

    Liu, Z., Woodcock, J. & Zhu, H., 2013, p. 1-455. 455 p.

    Research output: Contribution to conferencePaper

  99. Theoretical and Empirical Analysis of Reward Shaping in Reinforcement Learning

    Grzes, M. & Kudenko, D., 2009, p. 337-344.

    Research output: Contribution to conferencePaper

  100. Theories of Programming and Formal Methods - Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday

    Liu, Z., Woodcock, J. & Zhu, H., 2013, p. 1-422. 422 p.

    Research output: Contribution to conferencePaper

  101. There's always one! modelling outlying user performance

    Schiller, J. & Cairns, P. A., 2008, p. 3513-3518.

    Research output: Contribution to conferencePaper

  102. Threat Modelling for Mobile ad hoc and Sensor Networks

    Clark, J. A., Murdoch, J., McDermid, J. A., Sen, S., Chivers, H. R., Worthington, O. & Rohatgi, P., 2007.

    Research output: Contribution to conferencePaper

  103. Three Dimensional Auditory Display: Issues in Applications for Visually Impaired Students

    Cooper, M. & Petrie, H., 2004.

    Research output: Contribution to conferencePaper

  104. Three-Dimensional Face Recognition: A Fishersurface Approach

    Heseltine, T., Pears, N. & Austin, J., 2004, p. 684-691.

    Research output: Contribution to conferencePaper

  105. Through Life Safety Management

    McDermid, J. A., 2007.

    Research output: Contribution to conferencePaper

  106. Tool Support for High Integrity Ada Software

    Hutcheon, A. D., Jordan, D. T., McDermid, J. A., Pierce, R. H., Wand, I. C., Jepson, B. J. & Toussaint, M., 1994, p. 63-75.

    Research output: Contribution to conferencePaper

  107. Tools that support human-human communication in the automated office

    Benest, I. D. & Dukic, D., 1990, p. 853-859.

    Research output: Contribution to conferencePaper

  108. Toward Information-Centric Software-Defined Cellular Networks

    Vasilakis, V., Moscholios, I., Alzahrani, B. & Logothetis, M., 24 May 2017, (Accepted/In press). 7 p.

    Research output: Contribution to conferencePaper

  109. Towards Agile Engineering of High-Integrity Systems

    Paige, R. F., Charalambous, R., Ge, X. & Brooke, P. J., 2008, p. 30-43. 13 p.

    Research output: Contribution to conferencePaper

  110. Towards Assurance Measures for High Integrity Software

    McDermid, J. A., 1989, p. 3A/1-3A/9.

    Research output: Contribution to conferencePaper

  111. Towards Evidence-Based Architectural Design for Safety-Critical Software Applications

    Wu, W. & Kelly, T., 2006, p. 383-408.

    Research output: Contribution to conferencePaper

  112. Towards Inductive Constraint Logic Programming

    Anthony, S., Frisch, A. M. & Gent, I., 1 Apr 1996, p. 3-4.

    Research output: Contribution to conferencePaper

  113. Towards Mobile Processes in Unifying Theories

    Tang, X. & Woodcock, J., 2004, p. 44-53.

    Research output: Contribution to conferencePaper

  114. Towards Self-Healing Swarm Robotic Systems Inspired by Granuloma Formation

    Ismail, A. R. & Timmis, J., 2010, p. 313-314.

    Research output: Contribution to conferencePaper

  115. Towards Using Simulation to Evaluate Safety Policy for Systems of Systems

    Alexander, R., Hall-May, M., Despotou, G. & Kelly, T., 2005.

    Research output: Contribution to conferencePaper

  116. Towards a Practical Process for Automated Safety Analysis

    Lisagor, O., McDermid, J. A. & Pumfrey, D. J., 2006.

    Research output: Contribution to conferencePaper

  117. Towards a Principled Design of Bio-inspired Solutions to Adaptive Information Filtering

    Azmi, N. F. M., Timmis, J. & Polack, F., 2010, p. 315-316.

    Research output: Contribution to conferencePaper

  118. Towards a Z Method: Axiomatic Specification in Z

    Hall, J. G. & McDermid, J. A., 1994, p. 213-229.

    Research output: Contribution to conferencePaper

  119. Towards an Agile Process for Building Software Product Lines

    Paige, R. F., Wang, X., Stephenson, Z. R., Brooke, P. J., Abrahamsson, P., Marchesi, M. & Succi, G., 2006, p. 198-199. 11 p.

    Research output: Contribution to conferencePaper

  120. Towards an Executable Model of Auxin Transport Canalisation

    Garnett, P., Stepney, S. & Leyser, O., 2008, p. 63-91.

    Research output: Contribution to conferencePaper

  121. Towards an Integrated Model Checker for Railway Signalling Data

    Huber, M. & King, S., 2002, p. 204-223.

    Research output: Contribution to conferencePaper

  122. Towards an Object Oriented Development Environment for Secure Applciations

    Hocking, E. S., McDermid, J. A. & Eizenberg, G. G., 1990, p. 191-200.

    Research output: Contribution to conferencePaper

  123. Towards an Object Oriented Development Environment for Secure Applications

    Hocking, E. S. & McDermid, J. A., 1990, p. 191-200.

    Research output: Contribution to conferencePaper

  124. Towards bio-responsive control for music

    Williams, D. A. H., Murphy, D. T. & Fazenda, B., 19 Dec 2017.

    Research output: Contribution to conferencePaper

  125. Towards the Systematic Generation of Channelling Constraints

    Hernández, B. M. & Frisch, A. M., 2005, p. 859.

    Research output: Contribution to conferencePaper

  126. Tracing lazy functional computations using redex trails

    Sparud, J. & Runciman, C., 1997, p. 291--308.

    Research output: Contribution to conferencePaper

  127. Training Blind People in the Use of Graphical User Interfaces

    Weber, G., Petrie, H., Kochanek, D. & Morley, S., 1994, p. 25-31.

    Research output: Contribution to conferencePaper

  128. Transferring Real-Time Systems Research into Industrial Practice: Four Impact Case Studies

    Davis, R. I., Bate, I. J., Bernat, G., Broster, I., Burns, A., Colin, A., Hutchesson, S. G. & Tracey, N., 3 Jul 2018. 23 p.

    Research output: Contribution to conferencePaper

  129. Transferring and Retraining Learned Information Filters

    Cohen, W. W. & Kudenko, D., 1997, p. 583-590.

    Research output: Contribution to conferencePaper

  130. Transforming Haskell for Tracing

    Chitil, O., Runciman, C. & Wallace, M., 2003, p. 165--181.

    Research output: Contribution to conferencePaper

  131. Transforming and Refining Abstract Constraint Specifications

    Frisch, A. M., Hnich, B., Miguel, I., Smith, B. M. & Walsh, T., 2005, p. 76-91.

    Research output: Contribution to conferencePaper

  132. Transparent hardware synthesis of Java for predictable large-scale distributed systems

    Gray, I., Chan, Y., Garside, J., Audsley, N., Wellings, A. & Wellings, A. J., 1 Sep 2015, p. 1-2. 2 p.

    Research output: Contribution to conferencePaper

  133. Trends in Systems Safety

    McDermid, J. A. & Lindsay, P. A., 2002, p. 3-8.

    Research output: Contribution to conferencePaper

  134. Triphone Statistics for Polish Language

    Ziólko, B., Galka, J., Manandhar, S., Wilson, R. C. & Ziólko, M., 5 Oct 2007, p. 63-73.

    Research output: Contribution to conferencePaper

  135. Tuning Jordan Algebra Artificial Chemistries with Probability Spawning Functions

    Faulkner, P. S. M., Sebald, A. A-M. & Stepney, S., Sep 2017, p. 497-504.

    Research output: Contribution to conferencePaper

  136. Tuning the Performance of the MMAS Heuristic

    Ridge, E. & Kudenko, D., 2007, p. 46-60.

    Research output: Contribution to conferencePaper

  137. Two Accounts of Scope Availability and Semantic Underspecification

    Willis, A. & Manandhar, S., 1999.

    Research output: Contribution to conferencePaper

  138. Two Refinement Case Studies

    Woodcock, J., 1991, p. 118-140.

    Research output: Contribution to conferencePaper

  139. Two-pass heap profiling: a matter of life and death

    Runciman, C. & Röjemo, N., 1996, p. 222--232.

    Research output: Contribution to conferencePaper

  140. Type-Constrained Generics for Z

    Valentine, S. H., Toyn, I., Stepney, S. & King, S., 2000, p. 250-263.

    Research output: Contribution to conferencePaper

  141. Type-checked message passing between functional processes

    Wallace, M. & Runciman, C., 1995, p. 245--254.

    Research output: Contribution to conferencePaper

  142. Typechecking Z

    Toyn, I., Valentine, S. H., Stepney, S., King, S. & King, S., 2000, p. 264-285.

    Research output: Contribution to conferencePaper

  143. UBB Mining: Finding Unexpected Browsing Behaviour in Clickstream Data to Improve a Web Site's Design

    Ting, I-H., Kimble, C. & Kudenko, D., 2005, p. 179-185.

    Research output: Contribution to conferencePaper

  144. UTP Semantics for Handel-C

    Perna, J. I. & Woodcock, J., 2008, p. 142-160.

    Research output: Contribution to conferencePaper

  145. Uncalibrated Two-View Metrology

    Liang, B., Chen, Z. & Pears, N., 2004, p. 96-99.

    Research output: Contribution to conferencePaper

  146. Understanding Multi-transputer Execution

    Stepney, S., 1988.

    Research output: Contribution to conferencePaper

  147. Unification, Rewriting, and Narrowing on Term Graphs

    Habel, A. & Plump, D., 1995.

    Research output: Contribution to conferencePaper

  148. Unified Modeling Language for Knowledge Modelling

    Abdullah, M. S., Paige, R. F., Benest, I. D. & Kimble, C., 2005, p. 952-957.

    Research output: Contribution to conferencePaper

  149. Uniform Boilerplate and List Processing

    Mitchell, N. & Runciman, C., 2007, p. 49--60.

    Research output: Contribution to conferencePaper

  150. Unifying Program Refinement Calculi

    Woodcock, J., 2005, p. 76.

    Research output: Contribution to conferencePaper

  151. Unifying Theories in ProofPower-Z

    Oliveira, M., Cavalcanti, A. & Woodcock, J., 2006, p. 123-140.

    Research output: Contribution to conferencePaper

  152. Unifying Theories of Interrupts

    McEwan, A. A. & Woodcock, J., 2008, p. 122-141.

    Research output: Contribution to conferencePaper

  153. Unifying Theories of Parallel Programming

    Woodcock, J., Hughes, A. P. & George, C., 2002, p. 24-37.

    Research output: Contribution to conferencePaper

  154. Unifying theories of confidentiality

    Banks, M. J., Jacob, J. L. & Qin, S., 2010, p. 120--136.

    Research output: Contribution to conferencePaper

  155. Unit Testing Model Management Operations

    Kolovos, D. S., Paige, R. F., Rose, L. M. & Polack, F. A. C., 2008.

    Research output: Contribution to conferencePaper

  156. Universal Interfaces to Multimedia Documents

    Petrie, H., Fisher, W., Langer, I., Weber, G., Gladstone, K., Rundle, C. & Pyfers, L., 2002, p. 319-324.

    Research output: Contribution to conferencePaper

  157. Universal quantum gates for single cooper pair box based quantum computing

    Echternach, P., Williams, CP., Dultz, SC., Braunstein, S. & Dowling, JP., 2001, p. 111-120.

    Research output: Contribution to conferencePaper

  158. Unsupervised Lexical Learning with Categorical Grammars Using the LLL Corpus

    Watkinson, S. & Manandhar, S., 1999, p. 218-236.

    Research output: Contribution to conferencePaper

  159. Unsupervised Word Sense Disambiguation Using The WWW

    Klapaftis, I. P. & Manandhar, S., 2006, p. 174-183.

    Research output: Contribution to conferencePaper

  160. User Centred Design and Agile Software Development Processes: Friends or Foes?

    Petrie, H., 2009.

    Research output: Contribution to conferencePaper

  161. User Centred Design and the Japanese User

    Oshlyansky, L., Cairns, P. A. & Foy, K., 2004, p. 9-20.

    Research output: Contribution to conferencePaper

  162. User Modeling for Adaptive Question Answering and Information Retrieval

    Quarteroni, S. & Manandhar, S., 2006, p. 776-781.

    Research output: Contribution to conferencePaper

  163. User Modelling for Personalized Question Answering

    Quarteroni, S. & Manandhar, S., 2007, p. 386-397.

    Research output: Contribution to conferencePaper

  164. User Requirements for Technologies for Personal Communication and Information Use for Deafblind People

    Fisher, W. & Petrie, H., 2002, p. 583-584.

    Research output: Contribution to conferencePaper

  165. User interface design as systems design

    Thimbleby, H., Blandford, A., Cairns, P., Curzon, P. & Jones, M., 2002, p. 281.

    Research output: Contribution to conferencePaper

  166. User-centred design in the development of a navigational aid for blind travellers

    Petrie, H., Johnson, V., Strothotte, T., Michel, R., Raab, A. & Reichert, L., 1997, p. 220-227.

    Research output: Contribution to conferencePaper

  167. User-defined clocks in the real-time specification for Java

    Wellings, A. & Martin Schoeberl, M., 2011.

    Research output: Contribution to conferencePaper

  168. Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of Systems

    Hall-May, M. & Kelly, T., 2006, p. 330-343.

    Research output: Contribution to conferencePaper

  169. Using Association Rule Mining to Predict Opponent Deck Content in Android: Netrunner

    Sephton, N. J., Cowling, P. I., Devlin, S., Hodge, V. J. & Slaven, N. H., 20 Sep 2016.

    Research output: Contribution to conferencePaper

  170. Using Diagrams to Give a Formal Specification of Timing Constraints in Z

    Coombes, A., McDermid, J. A., Bowen, J. P. & Nicholls, J. E., 1992, p. 119-130.

    Research output: Contribution to conferencePaper

  171. Using Document Dimensions for Enhanced Information Retrieval

    Jayasooriya, T. & Manandhar, S., 2004, p. 145-152.

    Research output: Contribution to conferencePaper

  172. Using Fuzzy Self-Organising Maps for Safety Critical Systems

    Kurd, Z. & Kelly, T., 2004, p. 17-30.

    Research output: Contribution to conferencePaper

  173. Using Model Theory to Specify AI Programs

    Frisch, A. M., 1985, p. 148-154.

    Research output: Contribution to conferencePaper

  174. Using Mutation Analysis to Evolve Subdomains for Random Testing

    Patrick, M. T., Alexander, R., Oriol, M. Y. A. & Clark, J. A., Mar 2013, p. 53-62. 10 p.

    Research output: Contribution to conferencePaper

  175. Using PVS to Prove a Z Refinement: A Case Study

    Stringer-Calvert, D. W. J., Stepney, S. & Wand, I., 1997, p. 573-588.

    Research output: Contribution to conferencePaper

  176. Using UML to Model EAE and Its Regulatory Network

    Read, M., Timmis, J., Andrews, P. S. & Kumar, V., 2009, p. 4-6.

    Research output: Contribution to conferencePaper

  177. Using Unified Modeling Language for Conceptual Modelling of Knowledge-Based Systems

    Abdullah, M. S., Benest, I. D., Paige, R. F. & Kimble, C., 2007, p. 438-453.

    Research output: Contribution to conferencePaper

  178. Using VDM with Rely and Guarantee-Conditions: Experiences from a Real Project

    Woodcock, J. & Dickinson, B., 1988, p. 434-458.

    Research output: Contribution to conferencePaper

  179. Using a Model Merging Language for Reconciling Model Versions

    Engel, K-D., Paige, R. F. & Kolovos, D. S., 2006, p. 143-157.

    Research output: Contribution to conferencePaper

  180. Using feedback to regulate gene expression in a developmental control architecture

    Clegg, K., Stepney, S. & Clarke, T., 2007, p. 966-973.

    Research output: Contribution to conferencePaper

  181. Using the CoSMoS Process to Enhance an Executable Model of Auxin Transport Canalisation

    Garnett, P., Stepney, S., Day, F. & Leyser, O., 2010, p. 9-32.

    Research output: Contribution to conferencePaper

  182. Using the SPARK Toolset for Showing the Absence of Run-Time Errors in Safety-Critical Software

    Foulger, D. & King, S., 2001, p. 229-240.

    Research output: Contribution to conferencePaper

  183. VLSI Design Techniques for Teaching and Research

    Crispin-Bailey, C. & Sotudeh, R., 1996, p. 1-8. 8 p.

    Research output: Contribution to conferencePaper

  184. Valid Application of EVT in Timing Analysis by Randomising Execution Time Measurements

    Bate, I. J. & Lima, G. M. D. A., 2017. 11 p.

    Research output: Contribution to conferencePaper

  185. Validating the unified theory of acceptance and use of technology (UTAUT) tool cross-culturally

    Oshlyansky, L., Cairns, P. A. & Thimbleby, H. W., 2007, p. 83-86.

    Research output: Contribution to conferencePaper

  186. Variational segmentation of color images

    Nasios, N. & Bors, A. G., Sep 2005, p. 614-617.

    Research output: Contribution to conferencePaper

  187. Verification of Control Systems using Circus

    Cavalcanti, A. & Clayton, P., 2006, p. 269-278.

    Research output: Contribution to conferencePaper

  188. Verified Software Grand Challenge

    Woodcock, J., 2006, p. 617-617.

    Research output: Contribution to conferencePaper

  189. Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository

    Freitas, L., Mokos, K. & Woodcock, J., 2007, p. 290-298.

    Research output: Contribution to conferencePaper

  190. Video games as research instruments

    Gámez, E. H. C., Cairns, P. A., Gow, J., Back, J. & Capstick, E., 2010, p. 4493-4496.

    Research output: Contribution to conferencePaper

  191. Virtual Adaptive Learning Architecture (VALA)

    Metcalfe, A., Snitzer, M. & Austin, J., 2001, p. 7-10.

    Research output: Contribution to conferencePaper

  192. Virtual Drilling in 3-D Objects Reconstructed by Shape-Based Interpolation

    Bors, A. G., Kechagias, L. & Pitas, I., 2001, p. 729-738.

    Research output: Contribution to conferencePaper

  193. Virtual Learning Environments: Another Barrier to Blended and E-Learning

    Power, C., Petrie, H., Sakharov, V. & Swallow, D., 2010, p. 519-526.

    Research output: Contribution to conferencePaper

  194. Visual Navigation using Planar Homographies

    Liang, B. & Pears, N., 2002, p. 205-210.

    Research output: Contribution to conferencePaper

  195. Visualising Random Boolean Network Dynamics: Effects of Perturbations and Canalisation

    Stepney, S., 2009, p. 369-376.

    Research output: Contribution to conferencePaper

  196. Visualising random boolean network dynamics

    Stepney, S., 2009, p. 1781-1782.

    Research output: Contribution to conferencePaper

  197. Voronoi diagrams, vectors and the visually impaired

    Power, C., Gill, D. & Daley, M., 2006, p. 1247-1252.

    Research output: Contribution to conferencePaper

  198. WHERE? Risk, Uncertainty and Software Safety

    McDermid, J. A., 2008.

    Research output: Contribution to conferencePaper

  199. WHERE? The Use of Bayesian Networks in Critical Applications

    Hawkins, R. D. & McDermid, J. A., 2005.

    Research output: Contribution to conferencePaper

  200. Wattsup? motivating reductions in domestic energy consumption using social networks

    Foster, D., Lawson, S., Blythe, M. & Cairns, P. A., 2010, p. 178-187.

    Research output: Contribution to conferencePaper

  201. Weakly Hard Real-time Constraints on Controller Area Network

    Broster, I., Bernat, G. & Burns, A., 2002, p. 134-141.

    Research output: Contribution to conferencePaper

  202. Web Accessibility: Automatic/Manual Evaluation and Authoring Tools

    Petrie, H., Power, C. & Weber, G., 2008, p. 334-337.

    Research output: Contribution to conferencePaper

  203. Web Accessibility Metrics: Effects of Different Computational Approaches

    Freire, A. P., Power, C., Petrie, H., Tanaka, E. H., Rocha, H. V. & Fortes, R. P. D. M., 2009, p. 664-673.

    Research output: Contribution to conferencePaper

  204. What Do Beginning CS Majors Know?

    Pedroni, M., Meyer, B. & Oriol, M., 2009, p. 0-4.

    Research output: Contribution to conferencePaper

  205. What Is the Complexity of a Network? The Heat Flow-Thermodynamic Depth Approach

    Escolano, F., Lozano, M. A., Hancock, E. R. & Giorgi, D., 2010, p. 286-295.

    Research output: Contribution to conferencePaper

  206. What is Acceptably Safe for Reinforcement Learning?

    Bragg, J. E. & Habli, I., Sep 2018.

    Research output: Contribution to conferencePaper

  207. When to Trust Mobile Objects: Access Control in the Jini(tm) Software System

    Crichton, C., Davies, J. & Woodcock, J., 1999, p. 116-125.

    Research output: Contribution to conferencePaper

  208. Widening the Representation Bottleneck: a Functional Implementation of Relational Programming

    Cattrall, D. M. & Runciman, C., 1 Jun 1993, p. 191--200.

    Research output: Contribution to conferencePaper

  209. Writing Temporally Predictable Code

    Puschner, P. P. & Burns, A., 2002, p. 85-94.

    Research output: Contribution to conferencePaper

  210. XRound: Bidirectional Transformations and Unifications Via a Reversible Template Language

    Chivers, H. & Paige, R. F., 2005, p. 205-219.

    Research output: Contribution to conferencePaper

  211. YETI on the Cloud

    Oriol, M. & Ullah, F., 1 Apr 2010, p. 434--437.

    Research output: Contribution to conferencePaper

  212. Z and the Refinement Calculus

    King, S., 1990, p. 164-188.

    Research output: Contribution to conferencePaper

  213. Z/Eves and the Mondex Electronic Purse

    Woodcock, J. & Freitas, L., 2006, p. 15-34.

    Research output: Contribution to conferencePaper

  214. ZB 2000: Formal Specification and Development in Z and B

    Bowen, J. P., Dunne, S., Galloway, A. & King, S., 2000.

    Research output: Contribution to conferencePaper

  215. ZB 2005: Formal Specification and Development in Z and B

    Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005.

    Research output: Contribution to conferencePaper

  216. Zero-error subspaces of quantum channels

    Patra, M. K. & Braunstein, S., 5 Aug 2011, p. 104-108.

    Research output: Contribution to conferencePaper

  217. it ransML: A Family of Languages to Model Model Transformations

    Guerra, E., Lara, J. D., Kolovos, D. S., Paige, R. F. & Santos, O. M. D., 2010, p. 106-120.

    Research output: Contribution to conferencePaper

  218. sc AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C. & Wood, A., 1 Oct 1996, p. 686--694.

    Research output: Contribution to conferencePaper

  219. sc Linda for Case Base Retrieval: a Case for Extending the Functionality of sc Linda

    Campbell, D. K. G., Osborne, H. R., Wood, A. M. & Bridge, D. G., 1 Jan 1998.

    Research output: Contribution to conferencePaper

Previous 1 2 3 Next