Search research publications and outputs

  1. Book › Research
  2. ZB 2003: Formal Specification and Development in Z and B: Third International Conference of B and Z Users, Turku, Finland, June 4-6, 2003, Proceedings

    Bert, D. (ed.), Bowen, J. P. (ed.), King, S. (ed.) & Waldén, M. A. (ed.), 2003, Springer. (Lecture Notes in Computer Science; vol. 2651)

    Research output: Book/ReportBook

  3. μKernel service for dynamic load balancing

    Grigoras, D. & Calinescu, R., 1 Dec 1995, Amsterdam, Netherlands: IOS Press. 11 p.

    Research output: Book/ReportBook

  4. Anthology › Research
  5. Narrating Complexity

    Walsh, R. (ed.) & Stepney, S. (ed.), 2018, London: Springer.

    Research output: Book/ReportAnthology

  6. Proceedings of the Tenth Workshop on Energy Methods in Computer Vision and Pattern Recognition

    Pelillo, M. (ed.) & Hancock, E. R., Mar 2018, Berlin: Springer. 500 p. (Lecture Notes in Computer Science; vol. 10746)

    Research output: Book/ReportAnthology

  7. Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications: 19th Iberoamerican Congress, CIARP 2014, Puerto Vallarta, Mexico.

    Bayro Corrochano, E. (ed.) & Hancock, E. R. (ed.), 3 Dec 2014, Heidelberg: Springer. 1050 p. (Lecture Note in Computer Science; vol. 8827)

    Research output: Book/ReportAnthology

  8. Similarity-Based Pattern Recognition - Second International Workshop, SIMBAD 2013, York, UK, July 3-5, 2013. Proceedings

    Hancock, E. R. & Pelillo, M., 2013, Springer Berlin / Heidelberg. (Lecture Notes in Computer Science,; vol. 7953)

    Research output: Book/ReportAnthology

  9. Structural, Syntactic, and Statistical Pattern Recognition: Joint IAPR International Workshop, S+SSPR 2018, Beijing, China, August 17-19, 2018, Proceedings

    Bai, X., Hancock, E. R. (ed.), Ho, T. K. (ed.), Wilson, R. C. (ed.), Biggio, B. (ed.) & Robles-Kelly, A., 2018, SPRINGER. 540 p. (Lecture Notes in Computer Science)

    Research output: Book/ReportAnthology

  10. Commissioned report › Research
  11. Interpretations of Probability, Nonstandard Analysis and Confirmation Theory

    Cussens, J., 1991, King's College, London.

    Research output: Book/ReportCommissioned report

  12. Learning Worst-Case Execution Time Loop Bounds with Inductive Logic Programming

    Kazakov, D., Bate, I., Muggleton, S. (ed.) & Otero, R. (ed.), 1 Aug 2006, Santiago de Compostela: University of Corunna.

    Research output: Book/ReportCommissioned report

  13. Mapping employment focussed services for disabled people

    Arksey, H., Thornton, P. & Williams, J., 2002, London: Social Research Branch, Department for Work and Pensions. (Department for Work and Pensions In-house Report)

    Research output: Book/ReportCommissioned report

  14. Proceedings of the 1st International Workshop on Assurance Cases for Software-Intensive Systems, ASSURE '13, San Francisco, California, USA, May 19, 2013

    Denney, E. (ed.), Habli, I. (ed.), Kelly, T. (ed.), Knight, J. C. (ed.) & Pai, G. (ed.), 2013, IEEE Computer Society Press.

    Research output: Book/ReportCommissioned report

  15. Security Assurance Cases: Motivation and the State of the Art

    Alexander, R., Hawkins, R. D. & Kelly, T., Apr 2011, Department of Computer Science, University of York.

    Research output: Book/ReportCommissioned report

  16. Therapeutic community effectiveness: a systematic international review of therapeutic community treatment for people with personality disorders and mentally disordered offenders

    Lees, J., Manning, N. & Rawlings, B., Oct 1999, York: University of York. 124 p.

    Research output: Book/ReportCommissioned report

  17. Women's Current Pension Arrangements: Information from the General Household Survey

    Hutton, S., Williams, J. & Kennedy, S., 1997, Department of Social Security, London: Social Research Branch. (DSS In house report)

    Research output: Book/ReportCommissioned report

  18. Other report › Research
  19. A Z Patterns Catalogue I: specification and refactorings, v0.1

    Stepney, S., Polack, F. & Toyn, I., 1 Jan 2003, Department of Computer Science, University of York. (Department of Computer Science Technical Report series; vol. YCS-2003-349)

    Research output: Book/ReportOther report

  20. A Z Patterns Catalogue II: definitions and laws, v0.1

    Valentine, S. H., Stepney, S. & Toyn, I., 1 Oct 2004, Department of Computer Science, University of York. (Department of Computer Science Technical Report; vol. YCS-2004-383)

    Research output: Book/ReportOther report

  21. A search-based approach to the automated design of security protocols

    Hao, C., Clark, JA. & Jacob, J. L., 2004, YCS-2004-376 ed. Department of Computer Science, University of York. 102 p. (York Computer Science Technical Report Series ("Yellow Reports"); vol. YCS , no. YCS-2004-376)

    Research output: Book/ReportOther report

  22. A survey of authentication protocol literature: Version 1.0

    Clark, J. A. & Jacob, J. L., 1997, Citeseer.

    Research output: Book/ReportOther report

  23. An Evaluation of the Ten15 Persistent Store

    Blanchard, T. D. & McDermid, J. A., 1992, Department of Computer Science, University of York. (York Computer Science Technical Report Series ("Yellow Reports"); no. YCS-1992-187)

    Research output: Book/ReportOther report

  24. Analysis of Dependable Computing Systems

    Nicholson, M. & McDermid, J. A., 1994, Department of Computer Science, University of York. (Computer Science Technical Report Series; vol. YCS-1994-245)

    Research output: Book/ReportOther report