Search research publications and outputs

  1. 3D Imaging, Analysis and Applications

    Pears, N. E. (ed.), Liu, Y. (ed.) & Bunting, P. (ed.), 2012, Springer. 500 p.

    Research output: Book/ReportBook

  2. A Z Patterns Catalogue I: specification and refactorings, v0.1

    Stepney, S., Polack, F. & Toyn, I., 1 Jan 2003, Department of Computer Science, University of York. (Department of Computer Science Technical Report series; vol. YCS-2003-349)

    Research output: Book/ReportOther report

  3. A Z Patterns Catalogue II: definitions and laws, v0.1

    Valentine, S. H., Stepney, S. & Toyn, I., 1 Oct 2004, Department of Computer Science, University of York. (Department of Computer Science Technical Report; vol. YCS-2004-383)

    Research output: Book/ReportOther report

  4. A search-based approach to the automated design of security protocols

    Hao, C., Clark, JA. & Jacob, J. L., 2004, YCS-2004-376 ed. Department of Computer Science, University of York. 102 p. (York Computer Science Technical Report Series ("Yellow Reports"); vol. YCS , no. YCS-2004-376)

    Research output: Book/ReportOther report

  5. A survey of authentication protocol literature: Version 1.0

    Clark, J. A. & Jacob, J. L., 1997, Citeseer.

    Research output: Book/ReportOther report

  6. Absent fathers?

    Bradshaw, J., Stimson, C., Skinner, C. & Williams, J., 1999, London: Routledge. 258 p.

    Research output: Book/ReportBook

  7. Advances in Artificial Life: 8th European Conference, ECAL 2005, Canterbury, UK, September 5-9, 2005, Proceedings

    Capcarrère, M. S., Freitas, A. A., Bentley, P. J., Johnson, C. G. & Timmis, J., 2005, Springer. (Lecture Notes in Artificial Intelligence; vol. 3630)

    Research output: Book/ReportBook

  8. An Evaluation of the Ten15 Persistent Store

    Blanchard, T. D. & McDermid, J. A., 1992, Department of Computer Science, University of York. (York Computer Science Technical Report Series ("Yellow Reports"); no. YCS-1992-187)

    Research output: Book/ReportOther report

  9. An information theoretic approach to learning generative graph prototypes

    Han, L., Hancock, E. R. & Wilson, R. C., 2011, Springer. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))

    Research output: Book/ReportBook

  10. Analysing Systems: determining requirements for object-oriented development

    MacLean, R., Stepney, S., Smith, S., Tordoff, N., Gradwell, D., Hoverd, T. & Katz, S., 1994, Prentice Hall.

    Research output: Book/ReportBook

  11. Analysis of Dependable Computing Systems

    Nicholson, M. & McDermid, J. A., 1994, Department of Computer Science, University of York. (Computer Science Technical Report Series; vol. YCS-1994-245)

    Research output: Book/ReportOther report

  12. Animal Social Networks

    Krause, J., James, R., Franks, D. W. & Croft, D. P., 2015, Oxford: Oxford University Press.

    Research output: Book/ReportBook

  13. Applications of functional programming

    Runciman, C. (ed.) & Wakeling, D. (ed.), 1995, UCL Press.

    Research output: Book/ReportBook

  14. Applied Computing: Second Asian Applied Computing Conference, AACC 2004, Kathmandu, Nepal, October 29-31, 2004. Proceedings

    Manandhar, S. (ed.), Austin, J. (ed.), Desai, U. B. (ed.), Oyanagi, Y. (ed.) & Talukder, A. K. (ed.), 2004, Springer. (Lecture Notes in Computer Science; vol. 3285)

    Research output: Book/ReportBook

  15. Architectural Design

    Buxton, J. N., McDermid, J. A. & McDermid, J. A. (ed.), 1991, Oxford: Butterworth Heinemann.

    Research output: Book/ReportBook

  16. Artificial Immune Systems: Proceedings of the Third International Conference, ICARIS 2004, Catania, Sicily,

    Nicosia, G., Cutello, V., Bentley, P. & Timmis, J., 2004, Springer. (LNCS; vol. 3239)

    Research output: Book/ReportBook

  17. Artificial Immune Systems: Second International Conference, ICARIS 2003, Edinburgh, UK, September 1-3, 2003, Proceedings

    Timmis, J. (ed.), Bentley, P. J. (ed.) & Hart, E. (ed.), 2003, Springer. (Lecture Notes in Computer Science; vol. 2787)

    Research output: Book/ReportBook

  18. Artificial Immune Systems: 9th International Conference, ICARIS 2010, Edinburgh, UK, July 26-29, 2010. Proceedings

    Hart, E. (ed.), McEwan, C. (ed.), Timmis, J. (ed.) & Hone, A. (ed.), 2010, Springer. (Lecture Notes in Computer Science; vol. 6209)

    Research output: Book/ReportBook

  19. Artificial Immune Systems, 8th International Conference, ICARIS 2009, York, UK, August 9-12, 2009. Proceedings

    Andrews, P. S. (ed.), Timmis, J. (ed.), Owens, N. D. L. (ed.), Aickelin, U. (ed.), Hart, E. (ed.), Hone, A. (ed.) & Tyrrell, A. M. (ed.), 2009, Springer. (Lecture Notes in Computer Science; vol. 5666)

    Research output: Book/ReportBook

  20. Artificial Immune Systems: A New Computational Approach

    Castro, L. N. D. & Timmis, J., 2002, Springer.

    Research output: Book/ReportBook

  21. Artificial Immune Systems: Second International Conference, ICARIS 2003

    Timmis, J., Bentley, P. & Hart., E., 2003, Springer. (LNCS; vol. 2787)

    Research output: Book/ReportBook

  22. Artificial immune systems - a new computational intelligence paradigm

    Castro, L. N. D. & Timmis, J., 2002, Springer.

    Research output: Book/ReportBook

  23. Automatic test-data generation for testing simulink models

    Zhan, Y. & Clark, J. A., 2004, Department of Computer Science, University of York. 16 p. (York Computer Science Technical Report ; vol. YCS, no. YCS-2004-382)

    Research output: Book/ReportOther report

  24. Breaking the Model: finalisation and a taxonomy of security attack

    Stepney, S., Clark, J. A. & Chivers, H., 2004, Department of Computer Science, University of York. 20 p. (York Computer Science Technical Report; vol. YCS, no. YCS-2004-371)

    Research output: Book/ReportOther report

Previous 1 2 3 4 5 6 Next