Search research publications and outputs

  1. Paper › Research › Not peer-reviewed
  2. A Comparison of Categorisation Algorithms for Predicting the Cellular Localisation Sites of Proteins

    Cairns, P. A., Huyck, C. R., Mitchell, I. & Wu, W. X., 2001, p. 296-300.

    Research output: Contribution to conferencePaper

  3. A Critique of the “Unmanned Systems Safety Guide for DoD Acquisition”

    Alexander, R., Herbert, N. & Kelly, T., 2009.

    Research output: Contribution to conferencePaper

  4. A Development of Hazard Analysis to Aid Software Design

    McDermid, J. A. & Pumfrey, D. J., 1994.

    Research output: Contribution to conferencePaper

  5. A Distributed sc \Linda-like Kernel for \PVM

    Rowstron, A., Douglas, A. & Wood, A., 1995, p. 107-112.

    Research output: Contribution to conferencePaper

  6. A Generic Framework for Population-Based Algorithms, Implemented on Multiple FPGAs

    Newborough, J., Stepney, S., Jacob, C., Pilat, M. L., Bentley, P. J. & Timmis, J., 2005, p. 43-55.

    Research output: Contribution to conferencePaper

  7. A Harmonised Model for Safety Assessment and Certification of Safety-Critical Systems

    Papadopoulos, Y. & McDermid, J. A., 1998.

    Research output: Contribution to conferencePaper

  8. A Hybrid Approach t Word Segmentation

    Kazakov, D. & Manandhar, S., 1998, p. 125-134.

    Research output: Contribution to conferencePaper

  9. A Rigorous Metamodel for UML Static Conceptual Modelling of Information Systems

    Laleau, R. & Polack, F., 2001, p. 402-416.

    Research output: Contribution to conferencePaper

  10. A Static Checker for Safe Pattern Matching in Haskell

    Mitchell, N., Runciman, C. & Eekelen, M. V., 2007, p. 15-30.

    Research output: Contribution to conferencePaper

  11. A Systematic Approach for Developing Software Safety Arguments

    Hawkins, R. D. & Kelly, T., Jul 2010, p. 25-33.

    Research output: Contribution to conferencePaper

  12. A Timed Model of Circus with the Reactive Design Miracle

    Wei, K., Woodcock, J. & Burns, A., 2010, p. 315-319.

    Research output: Contribution to conferencePaper

  13. A functional-logic library for Wired

    Naylor, M., Axelsson, E. & Runciman, C., 2007, p. 37--48.

    Research output: Contribution to conferencePaper

  14. A grounded investigation of game immersion

    Brown, E. & Cairns, P., 2004, p. 1297--1300.

    Research output: Contribution to conferencePaper

  15. A model for comparing the space usage of lazy evaluators

    Bakewell, A. & Runciman, C., 1 Sep 2000, p. 151--162.

    Research output: Contribution to conferencePaper

  16. A principled semantics for inp

    Jacob, J. L., Wood, A. M., Porto, A. & Roman, G-C., 1 Sep 2000, p. 51--65.

    Research output: Contribution to conferencePaper

  17. A simulation environment for emergent properties: extended abstract

    Turner, H. R., Stepney, S. & Polack, F. A. C., 2005.

    Research output: Contribution to conferencePaper

  18. A space semantics for core Haskell

    Bakewell, A. & Runciman, C., 2001.

    Research output: Contribution to conferencePaper

  19. Access Management in multi-administration networks

    Lord, S. P., Pope, N. H. & Stepney, S., 1987.

    Research output: Contribution to conferencePaper

  20. Achieving System Security by Testing

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  21. Adaptive Circuit Control through Gene Expression

    Clegg, K. & Stepney, S., 2008, p. 154-163.

    Research output: Contribution to conferencePaper

  22. Agile development of secure web applications

    Ge, X., Paige, R. F., Polack, F., Chivers, H. & Brooke, P. J., 2006, p. 305-312. 7 p.

    Research output: Contribution to conferencePaper

  23. An Architecture for Modelling Emergence in CA-Like Systems

    Polack, F., Stepney, S., Turner, H. R., Welch, P. H., Barnes, F. R. M., Capcarrère, M. S., Freitas, A. A., Bentley, P. J., Johnson, C. G. & Timmis, J., 2005, p. 433-442.

    Research output: Contribution to conferencePaper

  24. An Efficient Distributed Tuple Space Implementation for Networks of Workstations

    Rowstron, A. & Wood, A., 1 Oct 1996, p. 510--514.

    Research output: Contribution to conferencePaper

  25. An Experimental Investigation of Single and Multiple Issue ILP Speedup for Stack-Based code

    Crispin-Bailey, C. & Weeks, M., Nov 2000, p. 19-24. 6 p.

    Research output: Contribution to conferencePaper

  26. An Overview of FRAPPS 2.0: A Framework for Resolution-based Automated Proof Procedure Systems

    Uribe, T. E., Frisch, A. M. & Mitchell, M. K., 1992, p. 721-725.

    Research output: Contribution to conferencePaper

  27. An incremental garbage collector for embedded real-time systems

    Wallace, M. & Runciman, C., 1993, p. 277--288.

    Research output: Contribution to conferencePaper

  28. An interactive approach to profiling parallel functional programs

    Charles, N., Runciman, C., Hammond, K., Davie, T. & Clack, C., 1999, p. 20--37.

    Research output: Contribution to conferencePaper

  29. Analogue Circuit Control through Gene Expression

    Clegg, K. & Stepney, S., 2008, p. 154-163.

    Research output: Contribution to conferencePaper

  30. Applying Non-Interference to Composition of Systems: A more Practical Approach

    Shi, Q., McDermid, J. A. & Moffett, J. D., 1993.

    Research output: Contribution to conferencePaper

  31. Architecturally Independent Software: the Case for Abstraction

    Wood, A. M., 1990, p. 123-127.

    Research output: Contribution to conferencePaper

  32. Artificial catalysed reaction networks for search

    Weeks, A. & Stepney, S., 2005.

    Research output: Contribution to conferencePaper

  33. AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C., Wood, A., Bougé, L., Fraigniaud, P., Mignotte, A. & Robert, Y., 1996, p. 686-693.

    Research output: Contribution to conferencePaper

  34. Auburn: a kit for benchmarking functional data structures

    Moss, G. E., Runciman, C., Clack, C., Hammond, K. & Davie, T., 1998, p. 141--159.

    Research output: Contribution to conferencePaper

  35. Audio annotation of electronic texts

    Benest, I. D., 1995, p. 390-393.

    Research output: Contribution to conferencePaper

  36. Auditory Immersion of 5.1 Virtualization within Gameplay

    Hughes, S. S. & Kearney, G. C., 27 Sep 2016.

    Research output: Contribution to conferencePaper

  37. Automated Generalisation of Function Definitions

    Bakewell, A., Runciman, C., Middeldorp, A. & Sato, T., 1 Nov 1999, p. 225-240.

    Research output: Contribution to conferencePaper

  38. Automated benchmarking of functional data structures

    Moss, G. E., Runciman, C. & Gupta, G., 1 Jan 1999, p. 1--15.

    Research output: Contribution to conferencePaper

  39. Automated generalisation of function definitions

    Bakewell, A. & Runciman, C., 1999, p. 225--240.

    Research output: Contribution to conferencePaper

  40. Automatic Generation of Information-seeking Questions Using Concept Clusters

    Li, S. & Manandhar, S., 2009, p. 93-96.

    Research output: Contribution to conferencePaper

  41. Automatically moving between levels in Artificial Chemistries

    Nellis, A. & Stepney, S., 2010, p. 269-276.

    Research output: Contribution to conferencePaper

  42. Autonomous Objects and Bottom-Up Composition in ZOO Applied to a Case Study of Biological Reactivity

    Amálio, N., Polack, F. & Zhang, J., 2008, p. 323-336.

    Research output: Contribution to conferencePaper

  43. BONITA: A Set of Tuple Space Primitives for Distributed Coordination

    Rowstron, A. & Wood, A., 1 Jan 1997.

    Research output: Contribution to conferencePaper

  44. Baselines for Joint-Action Reinforcement Learning of Coordination in Cooperative Multi-agent Systems

    Carpenter, M. & Kudenko, D., 2005, p. 55-72.

    Research output: Contribution to conferencePaper

  45. Behaviour, realism and immersion in games

    Cheng, K. & Cairns, P. A., 2005, p. 1272--1275.

    Research output: Contribution to conferencePaper

  46. Binding-time improvement and fold-unfold transformations

    Runciman, C., 1995, p. 218-230.

    Research output: Contribution to conferencePaper

  47. Breaking affordance: culture as context

    Oshlyansky, L., Thimbleby, H. & Cairns, P., 2004, p. 81--84.

    Research output: Contribution to conferencePaper

  48. Breaking the Model: finalisation and a taxonomy of security attacks

    Clark, J. A., Stepney, S. & Chivers, H., 2005, p. 225--242.

    Research output: Contribution to conferencePaper

  49. Calculated Secure Processes

    Banks, M. J. & Jacob, J. L., 1 Nov 2010, p. 19--28.

    Research output: Contribution to conferencePaper

  50. Can we Remove the Human from Hazard Analysis?

    Alexander, R. & Kelly, T., 2006.

    Research output: Contribution to conferencePaper

  51. Capturing player experiences with post-game commentaries.

    Gow, J., Cairns, P. A., Colton, S., Baumgarten, R. & Miller, P., 2010.

    Research output: Contribution to conferencePaper

  52. Categorising Non-interference

    Jacob, J. L., 1990, p. 44--50.

    Research output: Contribution to conferencePaper

  53. Certification of Autonomous Systems

    R Alexander, M. H-M. & Kelly, T., 2007.

    Research output: Contribution to conferencePaper

  54. Certification of Autonomous Systems under UK Military Safety Standards

    Alexander, R., Hall-May, M. & Kelly, T., 2007.

    Research output: Contribution to conferencePaper

  55. Characterisation of Systems of Systems Failures

    Alexander, R., Hall-May, M. & Kelly, T., 2004.

    Research output: Contribution to conferencePaper

  56. Co-designing the computational model and the computing substrate

    Stepney, S., 2019, p. 5–14. 10 p.

    Research output: Contribution to conferencePaper

  57. CoSMoS process, models, and metamodels

    Andrews, P. S., Stepney, S., Hoverd, T., Polack, F. A. C., Sampson, A. T. & Timmis, J., 2011.

    Research output: Contribution to conferencePaper

  58. Collapsed Tree Rewriting: Completeness, Confluence, and Modularity

    Plump, D., 1993, p. 97--112.

    Research output: Contribution to conferencePaper

  59. Combining Simulation with Machine Learning to Build Accident Models

    Alexander, R. & Kelly, T., 2006.

    Research output: Contribution to conferencePaper

  60. Coming and Going from UML to B: a proposal to support traceability in rigorous IS development

    Laleau, R. & Polack, F., 1 Jan 2002, p. 517-534.

    Research output: Contribution to conferencePaper

  61. Communicating Complex Systems

    Welch, P. H., Barnes, F. R. M. & Polack, F., 2006, p. 107-120.

    Research output: Contribution to conferencePaper

  62. Commute-Time Convolution Kernels for Graph Clustering

    Rahman, N. A. & Hancock, E. R., 2010, p. 316-323.

    Research output: Contribution to conferencePaper

  63. Comparison of formalisation approaches of UML class constructs in Z and Object-Z

    Amàlio, N. & Polack, F., 1 Jun 2003, p. 339-358.

    Research output: Contribution to conferencePaper

  64. Complete and partial redex trails of functional computations

    Sparud, J. & Runciman, C., 1997, p. 160--177.

    Research output: Contribution to conferencePaper

  65. Computer Analysis of Images and Patterns

    Wilson, R., Hancock, E., Bors, A. & Smith, W., 2013.

    Research output: Contribution to conferencePaper

  66. Computer Analysis of Images and Patterns - Part 1

    Wilson, R., Hancock, E., Bors, A. & Smith, W., 2013.

    Research output: Contribution to conferencePaper

  67. Concordance: A Framework for Managing Model Integrity

    Rose, L. M., Kolovos, D. S., Drivalos, N., Williams, J. R., Paige, R. F., Polack, F. A. C. & Fernandes, K. J., 2010, p. 245-260.

    Research output: Contribution to conferencePaper

  68. Conjure Revisited: Towards Automated Constraint Modelling

    Akgun, O., Frisch, A. M., Hnich, B., Jefferson, C. & Miguel, I., 1 Sep 2010.

    Research output: Contribution to conferencePaper

  69. Contents of a Software Engineering Undergraduate Course

    McDermid, J. A., Thompson, J. B., Edwards, H. M. & Lethbridge, T., 2002, p. B37-B40.

    Research output: Contribution to conferencePaper

  70. Coordination of Collaborative Engineering: State of the Art and Future Challenges

    Pawlak, A., Sandkuhl, K., Cholewa, W. & Indrusiak, L. S., 2007.

    Research output: Contribution to conferencePaper

  71. Coordination with Attributes

    Wood, A. M., Ciancarini, P. & Wolf, A. L., 1999, p. 21--36.

    Research output: Contribution to conferencePaper

  72. Coordination with Multicapabilities

    Udzir, N. I., Wood, A. M. & Jacob, J. L., 2005, p. 79--108.

    Research output: Contribution to conferencePaper

  73. Coordination with Scopes

    Merrick, I. & Wood, A. M., 2000.

    Research output: Contribution to conferencePaper

  74. Cotranslational Protein Folding with L-systems

    Danks, G. B., Stepney, S., Caves, L. S. D., Kampis, G., Karsai, I. & Szathmáry, E., 2009, p. 289-296.

    Research output: Contribution to conferencePaper

  75. Critical Critical Systems

    Stepney, S., 2002, p. 62-70.

    Research output: Contribution to conferencePaper

  76. Designing an Ubiquitous Computing Development Kit

    Crispin-Bailey, C. & Freeman, M. J., 25 Oct 2005, p. 99-105. 7 p.

    Research output: Contribution to conferencePaper

  77. Developing user requirements for visualizations of literature knowledge domains

    Faisal, S., Cairns, P. & Blandford, A., 2006, p. 264-269.

    Research output: Contribution to conferencePaper

  78. Deviational Analyses for Validating Regulations on Real Systems

    Polack, F., Srivatanakul, T., Kelly, T., Clark, J. A., Laleau, R. & Lemoine, M., 2006.

    Research output: Contribution to conferencePaper

  79. Dispatching Domains for Multiprocessor Platforms and Their Representation in Ada

    Burns, A. & Wellings, A. J., 2010, p. 41-53.

    Research output: Contribution to conferencePaper

  80. Ecore to GenModel Case

    Kolovos, D. S., Rose, L. M., Paige, R. F. & de Lara, J., 2010.

    Research output: Contribution to conferencePaper

  81. Enforcing Behaviour with Anonymity

    Wright, J. & Stepney, S., 2008.

    Research output: Contribution to conferencePaper

  82. Engineering & Assessing Safety-Critical Systems

    McDermid, J. A. & Moffett, J. D., 1994.

    Research output: Contribution to conferencePaper

  83. Engineering Emergence

    Stepney, S., Polack, F. & Turner, H. R., 2006, p. 89-97.

    Research output: Contribution to conferencePaper

  84. Ensuring Dependable Systems of Systems

    Kelly, T., Hall-May, M. & Alexander, R., 2007.

    Research output: Contribution to conferencePaper

  85. Environment orientation: an architecture for simulating complex systems

    Hoverd, T. & Stepney, S., 2009, p. 67-82.

    Research output: Contribution to conferencePaper

  86. Equivalence Arguments for Complex Systems Simulations: A Case-Study

    Ghetiu, T., Alexander, R., Andrews, P., Polack, F. & Bown, J., 2009.

    Research output: Contribution to conferencePaper

  87. Escaping the Non-Quantitative Trap

    Alexander, R. & Kelly, T., 2009.

    Research output: Contribution to conferencePaper

  88. Establishing Private Communications in Open Systems using Multicapabilities

    Udzir, N. I. & Wood, A., 1 Apr 2006.

    Research output: Contribution to conferencePaper

  89. Ethics and the safety of autonomous systems

    Menon, C. & Alexander, R. D., 6 Feb 2018.

    Research output: Contribution to conferencePaper

  90. Exemplar-based word-space model for compositionality detection: shared task system description

    Reddy, S., McCarthy, D., Manandhar, S. K. & Gella, S., 2011, p. 54-60.

    Research output: Contribution to conferencePaper

  91. Experience Report: Visualizing Data through Functional Pipelines

    Duke, D., Borgo, R., Runciman, C. & Wallace, M., 1 Sep 2008, p. 379--382.

    Research output: Contribution to conferencePaper

  92. Extending PSSA for Complex Systems

    Nicholson, M., McDermid, J. A. & Fletcher, R., 2003.

    Research output: Contribution to conferencePaper

  93. Extending the safety case concept to address dependability

    Despotou, G. & Kelly, T., 2004.

    Research output: Contribution to conferencePaper

  94. FORTEST: Formal Methods and Testing

    Bowen, J. P., Bogdanov, K., Clark, J. A., Harman, M., Hierons, R. M. & Krause, P., 2002, p. 91-104.

    Research output: Contribution to conferencePaper

  95. FPGA Based Video Processing System For Ubiquitous Applications

    Crispin-Bailey, C., Pears, N. E. & Meng, H., 25 Oct 2005, p. 59-63. 5 p.

    Research output: Contribution to conferencePaper

  96. Finding Inputs that Reach a Target Expression

    Naylor, M. & Runciman, C., 2007, p. 133-142.

    Research output: Contribution to conferencePaper

  97. Folding Protein-Like Structures with Open L-Systems

    Danks, G. B., Stepney, S. & Caves, L. S. D., 2007, p. 1100-1109.

    Research output: Contribution to conferencePaper

  98. Formalising Harmony Seeking Rules of Morphogenesis

    Hoverd, T. & Stepney, S., 2010, p. 386-393.

    Research output: Contribution to conferencePaper

  99. Freja, Hat and Hood: a comparative evaluation of three systems for tracing and debugging lazy functional programs

    Chitil, O., Runciman, C. & Wallace, M., 2001, p. 176--193.

    Research output: Contribution to conferencePaper

  100. From Safety Cases to Security Cases

    Alexander, R. D., Hawkins, R. D. & Kelly, T. P., Feb 2017.

    Research output: Contribution to conferencePaper

  101. From immersion to addiction in videogames

    Seah, M. & Cairns, P. A., 2008, p. 55-63.

    Research output: Contribution to conferencePaper

  102. Full Implementation of an Estimation of Distribution Algorithm on a GPU

    Poulding, S. M., Staunton, J. P. & Burles, N. J., 2011.

    Research output: Contribution to conferencePaper

  103. Functional counterparts of some logic programming techniques

    Matsushita, T. & Runciman, C., 1995, p. 90--103.

    Research output: Contribution to conferencePaper

  104. Further investigations into post-completion error: the effects of interruption position and duration

    Li, S. Y. W., Cox, A. L., Blandford, A., Cairns, P., Young, R. M. & Abeles, A., 2006.

    Research output: Contribution to conferencePaper

  105. Gadgets: lazy functional components for graphical user interfaces

    Noble, R. J., Runciman, C., Hermenegildo, E. M. & Swierstra, S. D., 1 Sep 1995, p. 321--340.

    Research output: Contribution to conferencePaper

  106. Garbage Collection in Linda using Tuple Monitoring and Process Registration

    Menezes, R. & Wood, A., 1998, p. 490--495.

    Research output: Contribution to conferencePaper

  107. Garbage Collection in Open Distributed Tuple Space Systems

    Menezes, R. & Wood, A., 1 May 1997, p. 525--534.

    Research output: Contribution to conferencePaper

  108. Gene regulation in a particle metabolome

    Hickinbotham, S. J., Clark, E., Stepney, S., Clarke, T. & Young, P., 2009, p. 3024-3031.

    Research output: Contribution to conferencePaper

  109. Generating Numerical Literals During Refinement

    Anthony, S., Frisch, A. M., Lavrac, N. & Dzeroski, S., 1997, p. 61-76. 16 p.

    Research output: Contribution to conferencePaper

  110. Generic Operations for Concurrent Knowledge Manipulation Architectures

    Wood, A. M. & Campbell, D. K. G., 1 Feb 1998.

    Research output: Contribution to conferencePaper

  111. Grammatical Evolution of L-systems

    Beaumont, D. & Stepney, S., 2009, p. 2446-2453.

    Research output: Contribution to conferencePaper

  112. Graph-Reducible Term Rewriting Systems

    Plump, D., 1991, p. 622--636.

    Research output: Contribution to conferencePaper

  113. Growing Music: Musical Interpretations of L-Systems

    Worth, P. & Stepney, S., 2005, p. 545-550.

    Research output: Contribution to conferencePaper

  114. HCI... not as it should be: inferential statistics in HCI research

    Cairns, P., 2007, p. 195--201.

    Research output: Contribution to conferencePaper

  115. Haskell Program Coverage

    Gill, A. & Runciman, C., 2007, p. 1--12.

    Research output: Contribution to conferencePaper

  116. Haskell and XML: Generic Combinators or Type-Based Translation?

    Wallace, M. & Runciman, C., 1 Sep 1999.

    Research output: Contribution to conferencePaper

  117. Hazard and Risk Analysis of Health Informatics: Fundamental Challenges and New Directions

    Habli, I. & White, S. P., 2018.

    Research output: Contribution to conferencePaper

  118. Heap compression and binary I/O in Haskell

    Wallace, M. & Runciman, C., 1 Jun 1997.

    Research output: Contribution to conferencePaper

  119. Heap profiling for space efficiency

    Runciman, C., Röjemo, N., Launchbury, J., Meijer, E. & Sheard, T., 1 Aug 1996, p. 159--183.

    Research output: Contribution to conferencePaper

  120. Heap profiling of a lazy functional compiler

    Runciman, C., Wakeling, D., Launchbury, J. & Sansom, P., 1993, p. 203--214.

    Research output: Contribution to conferencePaper

  121. Human Action Classification Using SVM_2K Classifier on Motion Features

    Meng, H., Pears, N. & Bailey, C., 2006, p. 458-465.

    Research output: Contribution to conferencePaper

  122. Hypercomputation and the Grand Challenge in Non-Classical Computation

    Stepney, S., 2006.

    Research output: Contribution to conferencePaper

  123. Ihara Coefficients: A Flexible Tool for Higher Order Learning

    Ren, P., Aleksic, T., Wilson, R. C. & Hancock, E. R., 2010, p. 670-679.

    Research output: Contribution to conferencePaper

  124. Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation

    Kelsey, J. & Timmis, J., 2003, p. 207-218.

    Research output: Contribution to conferencePaper

  125. Implementing Contract Net in Tuple Space Models

    Udzir, N. I., Wood, A. & Hamza, M. H., 1 Feb 2004, p. 325-330.

    Research output: Contribution to conferencePaper

  126. Implementing Mathematical Morphology in \Isetl-sc \Linda

    Rowstron, A. & Wood, A., 1995, p. 847--851.

    Research output: Contribution to conferencePaper

  127. Improving knowledge discovery by combining text-mining and link analysis techniques

    Ben-Dov, M., Wu, W., Feldman, R., Cairns, P. A. & House, R., 2004.

    Research output: Contribution to conferencePaper

  128. In Search of Sound 'in silico' Research: Validating a Complex System Simulation

    Ghetiu, T., Polack, F. A. C. & Bown, J. L., 2010, p. 312.

    Research output: Contribution to conferencePaper

  129. Incorporating Input/Output Operations in sc Linda

    Menezes, R. & Wood, A., 1 Jan 1998.

    Research output: Contribution to conferencePaper

  130. Informalising Formal Mathematics: searching the mizar library with Latent Semantics

    Cairns, P., 2004, p. 58--72.

    Research output: Contribution to conferencePaper

  131. Internalization, qualitative methods, and evaluation

    Faisal, S., Craft, B., Cairns, P. & Blandford, A., 2008, p. 1-8.

    Research output: Contribution to conferencePaper

  132. Investigating Patterns for the Process-Oriented Modelling and Simulation of Space in Complex Systems

    Andrews, P. S., Sampson, A. T., Bjørndalen, J. M., Stepney, S., Timmis, J., Warren, D. N. & Welch, P. H., 2008, p. 17-24.

    Research output: Contribution to conferencePaper

  133. Investigating emergence by coarse graining Elementary Cellular Automata

    Weeks, A., Polack, F. & Stepney, S., 2008, p. 686-693.

    Research output: Contribution to conferencePaper

  134. Jungle Evaluation for Efficient Term Rewriting

    Hoffmann, B. & Plump, D., 1988, p. 191--203.

    Research output: Contribution to conferencePaper

  135. LZW text compression in Haskell

    Runciman, C., Wakeling, D., Launchbury, J. & Sansom, P., 1993, p. 215--226.

    Research output: Contribution to conferencePaper

  136. Lag, drag, void and use: heap profiling and space-efficient compilation revisited

    Röjemo, N. & Runciman, C., 1 May 1996, p. 34-41.

    Research output: Contribution to conferencePaper

  137. Lambdas in the Liftshaft: functional programming and an embedded architecture

    Wallace, M. & Runciman, C., 1 Jun 1995, p. 249--258.

    Research output: Contribution to conferencePaper

  138. Lazy Assertions

    Chitil, O., McNeill, D. & Runciman, C., 1 Nov 2004, p. 1--19.

    Research output: Contribution to conferencePaper

  139. Losing functions without gaining data: another look at defunctionalisation

    Mitchell, N. & Runciman, C., 2009, p. 13--24.

    Research output: Contribution to conferencePaper

  140. Matching Research Goals and Methods in System Safety Engineering

    Alexander, R., Rae, A. & Nicholson, M., 2010.

    Research output: Contribution to conferencePaper

  141. Measuring users' emotional reactions to websites

    Petrie, H. & Harrison, C., 2009, p. 3847-3852.

    Research output: Contribution to conferencePaper

  142. Metrics Are Fitness Functions Too

    Harman, M. & Clark, J. A., 2004, p. 58-69.

    Research output: Contribution to conferencePaper

  143. Mining Exemplars for Object Modelling Using Affinity Propagation

    Xia, S., Liu, J. & Hancock, E. R., 2010, p. 918-921.

    Research output: Contribution to conferencePaper

  144. Modelling Engineering Design Processes with Role Activity Diagrams

    Murdoch, J., McDermid, J. A., Astley, K. & Wilkinson, P., 1998.

    Research output: Contribution to conferencePaper

  145. Modular UML Semantics: Interpretations in Z Based on Templates and Generics

    Amálio, N., Stepney, S. & Polack, F., 2003.

    Research output: Contribution to conferencePaper

  146. Molecular Microprograms

    Hickinbotham, S. J., Clark, E., Stepney, S., Clarke, T., Nellis, A., Pay, M., Young, P., Kampis, G., Karsai, I. & Szathmáry, E., 2009, p. 297-304.

    Research output: Contribution to conferencePaper

  147. Multi-cultural visualization: how functional programming can enrich visualization (and vice versa)

    Borgo, R., Duke, D., Wallace, M. & Runciman, C., 1 Nov 2006.

    Research output: Contribution to conferencePaper

  148. Multicapabilities for Distributed Resource Management in Open Systems

    Udzir, N. I., Wood, A. & Gonzalez, T., 1 Nov 2004, p. 157-162.

    Research output: Contribution to conferencePaper

  149. Multiple-View Tracing for Haskell: a New Hat

    Wallace, M., Chitil, O., Brehm, T. & Runciman, C., 2001, p. 151--170.

    Research output: Contribution to conferencePaper

  150. Natural Scene Image Recognition by Fusing Weighted Colour Moments with Bag of Visual Patches on Spatial Pyramid Layout

    Alqasrawi, Y., Neagu, D. & Cowling, P. I., 30 Dec 2009, p. 140-145.

    Research output: Contribution to conferencePaper

  151. Neutral Emergence: a proposal

    Weeks, A., Stepney, S. & Polack, F. A. C., 2007.

    Research output: Contribution to conferencePaper

  152. Neutral Emergence and Coarse Graining

    Weeks, A., Stepney, S. & Polack, F., 2007, p. 1131-1140.

    Research output: Contribution to conferencePaper

  153. Not all patterns, but enough: an automatic verifier for partial but sufficient pattern matching

    Mitchell, N. & Runciman, C., 2008, p. 49--60.

    Research output: Contribution to conferencePaper

  154. Object Orientation in Z

    Stepney, S., Barden, R. & Cooper, D., 1992.

    Research output: Contribution to conferencePaper

  155. On Defining a "HURT" Metric to Measure Dissatisfaction with Products

    Prasad, D. K., Atkins, M. C., McDermid, J. A. & Wand, I. C., 1998.

    Research output: Contribution to conferencePaper

  156. On Termination of Graph Rewriting

    Plump, D., 1995, p. 88--100.

    Research output: Contribution to conferencePaper

  157. On The Derivation of Secure Components

    Jacob, J. L., Berson, T. & Cooper, D. M., 1 May 1989, p. 242-247.

    Research output: Contribution to conferencePaper

  158. On posture as a modality for expressing and recognizing emotions

    Bianchi-Berthouze, N., Cairns, P., Cox, A., Jennett, C. & Kim, W. W., 2006.

    Research output: Contribution to conferencePaper

  159. On the Evaluation of Schedulability Tests for Real-Time Scheduling Algorithms

    Davis, R. I., Jul 2016. 9 p.

    Research output: Contribution to conferencePaper

  160. Parallel Case Base Retrieval: An Implementation on Distributed sc Linda

    Campbell, D. K. G., Osborne, H. R., Wood, A. M. & Bridge, D. G., 1 Oct 1997, p. 525--530.

    Research output: Contribution to conferencePaper

  161. Parallel Thinking

    Wood, A. M., 1985, p. 1-3.

    Research output: Contribution to conferencePaper

  162. Pattern Matching in DAME using Grid Enabled AURA Technology

    Davis, R., Liang, B., Jessop, M. D., Pasley, A. & Austin, J., Sep 2003.

    Research output: Contribution to conferencePaper

  163. Penrose Life: Ash and Oscillators

    Hill, M., Stepney, S. & Wan, F., 2005, p. 471-480.

    Research output: Contribution to conferencePaper

  164. Perfect hash functions made parallel - lazy functional programming on a distributed multiprocessor

    Checkland, I. G. & Runciman, C., 1993, p. 397-406.

    Research output: Contribution to conferencePaper

  165. Performance modelling

    Charles, N., Runciman, C., Hammond, K. & Michaelson, G., 1999, p. 233--246.

    Research output: Contribution to conferencePaper

  166. Pictorial Representation of Parallel Programs

    Stepney, S., 1989.

    Research output: Contribution to conferencePaper

  167. Policy evolution with genetic programming

    Lim, YT., Cheng, PC. & Clark, J. A., 2008.

    Research output: Contribution to conferencePaper

  168. Practical Parallel Processing: A User's View of sc \Clip4

    Wood, A. M., 1982, p. 4.1-4.7.

    Research output: Contribution to conferencePaper

  169. Problems and solutions for markup for mathematical examples and exercises

    Goguadze, G., Melis, E., Ullrich, C. & Cairns, P., 2003, p. 80--92.

    Research output: Contribution to conferencePaper

  170. Product Line Analysis and the System Safety Process

    Stephenson, Z., Souza, S. D., McDermid, J. A. & Ward, A., 2004, p. 790-799.

    Research output: Contribution to conferencePaper

  171. Profiling parallel functional computations (without parallel machines)

    Runciman, C., Wakeling, D., O'Donnell, J. T. & Hammond, K., 1994, p. 236--251.

    Research output: Contribution to conferencePaper

  172. Protein folding with stochastic L-Systems

    Danks, G., Stepney, S. & Caves, L., 2008, p. 150-157.

    Research output: Contribution to conferencePaper

  173. Quantifying the experience of immersion in games

    Cairns, P., Cox, A., Berthouze, N., Dhoparee, S. & Jennett, C., 2006.

    Research output: Contribution to conferencePaper

  174. RBN-World: A Sub-symbolic Artificial Chemistry

    Faulconbridge, A., Stepney, S., Miller, J. F. & Caves, L. S. D., 2009, p. 377-384.

    Research output: Contribution to conferencePaper

  175. Re-use through standardisation: towards industry-standard engine control software

    Lam, W., McDermid, J. A. & Vickers, A. J., 1996.

    Research output: Contribution to conferencePaper

  176. Refine and Gabriel: Support for Refinement and Tactics

    Oliveira, M., Xavier, M. & Cavalcanti, A., 2004, p. 310-319.

    Research output: Contribution to conferencePaper

  177. Reflecting on Open-Ended Evolution

    Stepney, S. & Hoverd, T., 2011.

    Research output: Contribution to conferencePaper

  178. Representation and structural biases in CGP

    Payne, A. J. & Stepney, S., 2009, p. 1064-1071.

    Research output: Contribution to conferencePaper

  179. Retrenchment and the Atomicity Pattern

    Banach, R., Jeske, C., Hall, A. & Stepney, S., 2007, p. 37-46.

    Research output: Contribution to conferencePaper

  180. Rule Migration: Exploring a design framework for modelling emergence in CA-like systems

    Turner, H. & Stepney, S., 2005.

    Research output: Contribution to conferencePaper

  181. SPECULAR AND DIFFUSE REFLECTANCE IN MICROFACET MODELS

    Smith, W. A. P. & Hancock, E. R., 2009, p. 3737-3740.

    Research output: Contribution to conferencePaper

  182. Safety Critical Systems in Aerospace

    McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  183. Safety Lifecycle Activities for Autonomous Systems Development

    Alexander, R., Gorry, B. & Kelly, T., 2010.

    Research output: Contribution to conferencePaper

  184. Scoped Coordination in Open Distributed Systems

    Merrick, I. & Wood, A. M., 2000, p. 311-316.

    Research output: Contribution to conferencePaper

  185. Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment

    Ge, X., Polack, F. & Laleau, R., 2004, p. 234-247.

    Research output: Contribution to conferencePaper

  186. Security Specifications

    Jacob, J. L., 1 Apr 1988, p. 14--23.

    Research output: Contribution to conferencePaper

  187. Semi-supervised Feature Selection for Gender Classification

    Wu, J., Smith, W. A. P. & Hancock, E. R., 2010, p. 23-33.

    Research output: Contribution to conferencePaper

  188. Simulating biology: towards understanding what the simulation shows

    Andrews, P. S., Polack, F., Sampson, A. T., Timmis, J. & Coles, M., 2008, p. 93-123.

    Research output: Contribution to conferencePaper

  189. Simulation and Prediction in Safety Case Evidence

    Alexander, R. & Kelly, T., 2008.

    Research output: Contribution to conferencePaper

  190. Smart Devices and Software Agents: The Basics of Good Behaviour

    Chivers, H., Clark, J. A., Stepney, S., Hutter, D., Müller, G., Stephan, W. & Ullmann, M., 2003, p. 39-52.

    Research output: Contribution to conferencePaper

  191. Software Quality Assurance Using the SAZ Method

    Polack, F. & Mander, K., 1994, p. 230-249.

    Research output: Contribution to conferencePaper

  192. Software Safety: Why is there no Consensus?

    McDermid, J. A. & Pumfrey, D. J., 2004.

    Research output: Contribution to conferencePaper

  193. Solving the multiple-rd problem

    Rowstron, A. & Wood, A., 1996, p. 357--367.

    Research output: Contribution to conferencePaper

  194. Specification of Real-Time Systems: A View Oriented Approach

    Barroca, L. M. & McDermid, J. A., 1993.

    Research output: Contribution to conferencePaper

  195. Specifying Security in CSCW Systems

    Foley, S. N. & Jacob, J. L., 1997, p. 136--145.

    Research output: Contribution to conferencePaper

  196. Structured Analysis: A Draft Method for Writing Z Specifications

    Polack, F., Whiston, M. & Hitchcock, P., 1991, p. 287-328.

    Research output: Contribution to conferencePaper

  197. Structuring Safety Cases for Autonomous Systems

    Alexander, R., Herbert, N. & Kelly, T., 2008.

    Research output: Contribution to conferencePaper

  198. Support for Using Z

    Barden, R., Stepney, S., Bowen, J. P. & Nicholls, J. E., 1992, p. 255-280.

    Research output: Contribution to conferencePaper

  199. Tailoring Generic Systems Engineering Processes: An Agent-Oriented Method

    Murdoch, J., McDermid, J. A. & Wilkinson, P., 1999, p. 1011-1020.

    Research output: Contribution to conferencePaper

  200. Teaching post-classical computation: extended abstract

    Stepney, S., 2004, p. 3.

    Research output: Contribution to conferencePaper

  201. Techniques for simplifying the visualisation of graph reduction

    Foubister, S. P. & Runciman, C., 1995, p. 66--77.

    Research output: Contribution to conferencePaper

  202. Ten Steps Towards Systematic Requirements Reuse

    Lam, W., McDermid, J. A., Vickers, A. & Mylopoulos, J., 1997, p. 6-15.

    Research output: Contribution to conferencePaper

  203. Testing as Abstraction

    Stepney, S., 1995, p. 137-151.

    Research output: Contribution to conferencePaper

  204. The Basic Integrity Theorem

    Jacob, J. L., 1 Jun 1991, p. 89--97.

    Research output: Contribution to conferencePaper

  205. The Fading Concept in Tuple-Space Systems

    Menezes, R. & Wood, A. M., 2006, p. 440--444.

    Research output: Contribution to conferencePaper

  206. The Interaction Between Inference and Branching Heuristics

    Drake, L. & Frisch, A. M., 2003, p. 370-382.

    Research output: Contribution to conferencePaper

  207. The Organisation of Parallel Processing Machines

    Wood, A. M., Becker, J. & Eisele, I., 1983, p. 132-144.

    Research output: Contribution to conferencePaper

  208. The Reduceron: Widening the von Neumann Bottleneck for Graph Reduction using an FPGA

    Naylor, M. & Runciman, C., 2008, p. 129-146.

    Research output: Contribution to conferencePaper

  209. The Rigorous Generation of Java Mutation Operators using HAZOP

    Kim, S-W., Clark, J. A. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  210. The Role of the Human in an Autonomous System

    Alexander, R. D., Herbert, N. J. & Kelly, T. P., 2009.

    Research output: Contribution to conferencePaper

  211. The Role-based Access Control System of a European Bank: a case study and discussion

    Schaad, A., Moffett, J., Jacob, J. & Jaeger, T., 1 May 2001, p. 3--9.

    Research output: Contribution to conferencePaper

  212. The SAZ Project: Integrating SSADM and Z

    Polack, F., Whiston, M. & Mander, K., 1993, p. 541-557.

    Research output: Contribution to conferencePaper

  213. The Space Usage Problem: An Evaluation Kit for Graph-Reduction Semantics

    Bakewell, A., Runciman, C. & Gilmore, S., 2000, p. 115--128.

    Research output: Contribution to conferencePaper

  214. The State of Solutions for Autonomous Systems Safety

    Alexander, R. D., Ashmore, R. & Banks, A., 6 Feb 2018.

    Research output: Contribution to conferencePaper

  215. The Use of Z

    Barden, R., Stepney, S., Cooper, D. & Nicholls, J. E., 1991, p. 99-124.

    Research output: Contribution to conferencePaper

  216. The Varieties of Refinement

    Jacob, J. L., Morris, J. M. & Shaw, R. C., 1991, p. 441--455.

    Research output: Contribution to conferencePaper

  217. The bits between the lambdas: binary data in a lazy functional language

    Wallace, M. & Runciman, C., 1 Oct 1998, p. 107--117.

    Research output: Contribution to conferencePaper

  218. The design of S-boxes by simulated annealing

    Clark, J. A., Jacob, J. L. & Stepney, S., 2004, p. 1533--1537.

    Research output: Contribution to conferencePaper

  219. The effects of local variable optimisation in A C-based stack processor environment

    Crispin-Bailey, C., Sotudeh, R. & Ould-Khaoua, M., 1994. 6 p.

    Research output: Contribution to conferencePaper

  220. Towards Inductive Constraint Logic Programming

    Anthony, S., Frisch, A. M. & Gent, I., 1 Apr 1996, p. 3-4.

    Research output: Contribution to conferencePaper

  221. Towards Using Simulation to Evaluate Safety Policy for Systems of Systems

    Alexander, R., Hall-May, M., Despotou, G. & Kelly, T., 2005.

    Research output: Contribution to conferencePaper

  222. Towards a Practical Process for Automated Safety Analysis

    Lisagor, O., McDermid, J. A. & Pumfrey, D. J., 2006.

    Research output: Contribution to conferencePaper

  223. Towards an Executable Model of Auxin Transport Canalisation

    Garnett, P., Stepney, S. & Leyser, O., 2008, p. 63-91.

    Research output: Contribution to conferencePaper

  224. Tracing lazy functional computations using redex trails

    Sparud, J. & Runciman, C., 1997, p. 291--308.

    Research output: Contribution to conferencePaper

  225. Transforming Haskell for Tracing

    Chitil, O., Runciman, C. & Wallace, M., 2003, p. 165--181.

    Research output: Contribution to conferencePaper

  226. Two-pass heap profiling: a matter of life and death

    Runciman, C. & Röjemo, N., 1996, p. 222--232.

    Research output: Contribution to conferencePaper

  227. Type-checked message passing between functional processes

    Wallace, M. & Runciman, C., 1995, p. 245--254.

    Research output: Contribution to conferencePaper

  228. Understanding Multi-transputer Execution

    Stepney, S., 1988.

    Research output: Contribution to conferencePaper

  229. Unification, Rewriting, and Narrowing on Term Graphs

    Habel, A. & Plump, D., 1995.

    Research output: Contribution to conferencePaper

  230. Uniform Boilerplate and List Processing

    Mitchell, N. & Runciman, C., 2007, p. 49--60.

    Research output: Contribution to conferencePaper

  231. User interface design as systems design

    Thimbleby, H., Blandford, A., Cairns, P., Curzon, P. & Jones, M., 2002, p. 281.

    Research output: Contribution to conferencePaper

  232. Using Model Theory to Specify AI Programs

    Frisch, A. M., 1985, p. 148-154.

    Research output: Contribution to conferencePaper

  233. Using feedback to regulate gene expression in a developmental control architecture

    Clegg, K., Stepney, S. & Clarke, T., 2007, p. 966-973.

    Research output: Contribution to conferencePaper

  234. Using the CoSMoS Process to Enhance an Executable Model of Auxin Transport Canalisation

    Garnett, P., Stepney, S., Day, F. & Leyser, O., 2010, p. 9-32.

    Research output: Contribution to conferencePaper

  235. VLSI Design Techniques for Teaching and Research

    Crispin-Bailey, C. & Sotudeh, R., 1996, p. 1-8. 8 p.

    Research output: Contribution to conferencePaper

  236. WHERE? Risk, Uncertainty and Software Safety

    McDermid, J. A., 2008.

    Research output: Contribution to conferencePaper

  237. Widening the Representation Bottleneck: a Functional Implementation of Relational Programming

    Cattrall, D. M. & Runciman, C., 1 Jun 1993, p. 191--200.

    Research output: Contribution to conferencePaper

  238. sc AstroGofer: Parallel Functional Programming with Co-ordinating Processes

    Douglas, A., Röjemo, N., Runciman, C. & Wood, A., 1 Oct 1996, p. 686--694.

    Research output: Contribution to conferencePaper

  239. sc Linda for Case Base Retrieval: a Case for Extending the Functionality of sc Linda

    Campbell, D. K. G., Osborne, H. R., Wood, A. M. & Bridge, D. G., 1 Jan 1998.

    Research output: Contribution to conferencePaper

  240. Paper › Research › Peer-reviewed
  241. 3-D Planar Orientation from Texture: Estimating Vanishing Point from Local Spectral Analysis

    Ribeiro, E. & Hancock, E. R., 1998.

    Research output: Contribution to conferencePaper

  242. A 2D Morphable Model of Craniofacial Profile and its Application to Craniosynostosis

    Dai, H., Pears, N. E. & Duncan, C., 30 Nov 2017.

    Research output: Contribution to conferencePaper

  243. A 65nm CMOS lossless bio-signal compression circuit with 250 femtoJoule performance per bit.

    Crispin-Bailey, C., Dai, C. & Austin, J., 30 Aug 2019, p. 1-14. 14 p.

    Research output: Contribution to conferencePaper

  244. A Binary Correlation Matrix Memory k-NN Classifier with Hardware Implementation

    Zhou, P., Austin, J. & Kennedy, J., 1998.

    Research output: Contribution to conferencePaper

  245. A Binary Neural Decision Table Classifier

    Hodge, V. J., O'Keefe, S. & Austin, J., 29 Aug 2004.

    Research output: Contribution to conferencePaper

  246. A Binary Neural Network Framework for Attribute Selection and Prediction

    Hodge, V. J., Jackson, T. & Austin, J., 5 Oct 2012, p. 510-515. 5 p.

    Research output: Contribution to conferencePaper

  247. A Canonical Scheme for Model Composition

    Bézivin, J., Bouzitouna, S., Fabro, M. D. D., Gervais, M-P., Jouault, F., Kolovos, D. S., Kurtev, I. & Paige, R. F., 2006, p. 346-360.

    Research output: Contribution to conferencePaper

  248. A Case Study of Distributed Music Audio Analysis Using the Geddei Processing Framework

    Wood, G. & O'Keefe, S., 2004, p. 44-47. 4 p.

    Research output: Contribution to conferencePaper

  249. A Case Study using SAM - Safety Analysis of PES

    Liu, S., McDermid, J. A., Kang, K. C. & Cheung, S-C., 1996, p. 217-.

    Research output: Contribution to conferencePaper

  250. A Case for Dynamic Risk Assessment in NEC Systems of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2010.

    Research output: Contribution to conferencePaper

  251. A Cellular Neural Associative Array for Symbolic Vision

    Orovas, C. & Austin, J., 1998, p. 372-386.

    Research output: Contribution to conferencePaper

  252. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  253. A Circus Semantics for Ravenscar Protected Objects

    Atiya, D-A., King, S. & Woodcock, J., 2003, p. 617-635.

    Research output: Contribution to conferencePaper

  254. A Comparison of State-Based Modelling Tools for Model Validation

    Aydal, E. G., Utting, M. & Woodcock, J., 2008, p. 278-296.

    Research output: Contribution to conferencePaper

  255. A Comparison of the Business Object Notation and the Unified Modelling Language

    Paige, R. F., Ostroff, J. S., France, R. B. & Rumpe, B., 1999, p. 67-82.

    Research output: Contribution to conferencePaper

  256. A Computationally Efficient Method for Online Identification of Traffic Control Intervention Measures

    Krishnan, R., Hodge, V. J., Austin, J. & Polak, J., 5 Jan 2010.

    Research output: Contribution to conferencePaper

  257. A Conceptual Framework of Business Model Emerging Resilience

    Goumagias, N., Fernandes, K., Cabras, I., Li, F., Shao, J., Devlin, S., Hodge, V. J., Cowling, P. I. & Kudenko, D., 7 Jul 2016.

    Research output: Contribution to conferencePaper

  258. A Concurrent Language for Refinement

    Woodcock, J. & Cavalcanti, A., 2001.

    Research output: Contribution to conferencePaper

  259. A Consensus Protocol for CAN-Based Systems

    Lima, G. M. D. A. & Burns, A., 2003, p. 420-429.

    Research output: Contribution to conferencePaper

  260. A Constraint Logic Approach to Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1990, p. 234-250.

    Research output: Contribution to conferencePaper

  261. A Coordination Model for Agents Based on Secure Spaces

    Bryce, C., Oriol, M. & Vitek, J., 1999, p. 4--20.

    Research output: Contribution to conferencePaper

  262. A Danger Theory Inspired Approach to Web Mining

    Secker, A., Freitas, A. A. & Timmis, J., 2003, p. 156-167.

    Research output: Contribution to conferencePaper

  263. A Deep Hybrid Graph Kernel through Deep Learning Networks

    Cui, L., Bai, L., Rossi, L. & Hancock, E. R., 11 Apr 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  264. A Denotational Semantics for Handel-C Hardware Compilation

    Perna, J. I. & Woodcock, J., 2007, p. 266-285.

    Research output: Contribution to conferencePaper

  265. A Developmental and Immune-Inspired Dynamic Task Allocation Algorithm for Microprocessor Array Systems

    Liu, Y., Timmis, J., Qadir, O., Tempesti, G. & Tyrrell, A., Aug 2010, p. 199-212.

    Research output: Contribution to conferencePaper

  266. A Family-Oriented Software Development Process for Engine Controllers

    Allenby, K., Burton, S., Buttle, D. L., McDermid, J. A., Murdoch, J., Stephenson, A., Bardill, M., Hutchesson, S., Bomarius, F. & Komi-Sirviö, S., 2001, p. 210-226.

    Research output: Contribution to conferencePaper

  267. A Fixpoint Based Encoding for Bounded Model Checking

    Frisch, A. M., Sheridan, D. & Walsh, T., 2002, p. 238-255. 17 p.

    Research output: Contribution to conferencePaper

  268. A Flexible Decentralised Communication Architecture on a Field Programmable Gate Array for Swarm System Simulations

    Gomez Zamorano, A., Timmis, J. & Tyrrell, A., Jun 2011, p. 230-237. 8 p.

    Research output: Contribution to conferencePaper

  269. A Formal Approach for Security Evaluation

    Shi, Q. & McDermid, J. A., 1992.

    Research output: Contribution to conferencePaper

  270. A Formal Model of Security Dependency for Analysis and Testing of Secure Systems

    McDermid, J. A. & Shi, Q., 1991, p. 188-200.

    Research output: Contribution to conferencePaper

  271. A Formal Template Language Enabling Metaproof

    Amálio, N., Stepney, S. & Polack, F., 2006, p. 252-267.

    Research output: Contribution to conferencePaper

  272. A Framework for Constructing Temporal Models from Texts

    Alfonseca, E. & Manandhar, S., 2002, p. 456-460.

    Research output: Contribution to conferencePaper

  273. A Framework for Expressing Models of Security Policy

    Dobson, J. E. & McDermid, J. A., 1989, p. 229-241.

    Research output: Contribution to conferencePaper

  274. A Framework for Remote User Evaluation of Accessibility and Usability of Websites

    Power, C., Petrie, H. & Mitchell, R., 2009, p. 594-601.

    Research output: Contribution to conferencePaper

  275. A Framework for Requirements Analysis using Automated Reasoning

    Duffy, D. A., MacNish, C., McDermid, J. A., Morris, P., Iivari, J., Lyytinen, K. & Rossi, M., 1995, p. 68-81.

    Research output: Contribution to conferencePaper

  276. A Framework for Specification and Validation of Real-Time Systems Using it ircus Actions

    Sherif, A., He, J., Cavalcanti, A. & Sampaio, A., 2004, p. 478-493.

    Research output: Contribution to conferencePaper

  277. A General Framework for Modal Deduction

    Frisch, A. M. & Scherl, R. B., 1991, p. 196-207.

    Research output: Contribution to conferencePaper

  278. A General Framework for Sorted Deduction: Fundamental Results on Hybrid Reasoning

    Frisch, A. M., 1989, p. 126-136.

    Research output: Contribution to conferencePaper

  279. A High Performance k-NN Classifier Using a Binary Correlation Matrix Memory

    Zhou, P., Austin, J. & Kennedy, J., 1998, p. 713-722.

    Research output: Contribution to conferencePaper

  280. A Human Action Recognition System for Embedded Computer Vision Application

    Meng, H., Pears, N. & Bailey, C., 2007.

    Research output: Contribution to conferencePaper

  281. A Hypertext System with Controlled Hype

    Benest, I. D., 1989, p. 52-63.

    Research output: Contribution to conferencePaper

  282. A JAVA bread-board simulator digital circuit simulation with an extensible e-learning tool

    Bailey, C. & Freeman, M. J., 2009, p. 299-306. 8 p.

    Research output: Contribution to conferencePaper

  283. A Layered Behavioural Model of Platelets

    Schneider, S., Treharne, H., Cavalcanti, A. & Woodcock, J., 2006, p. 98-106.

    Research output: Contribution to conferencePaper

  284. A Mechanism for Implementing Precise Exceptions in Pipelined Processors

    Alli, S. & Bailey, C., 2004, p. 598-602.

    Research output: Contribution to conferencePaper

  285. A Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 473-494.

    Research output: Contribution to conferencePaper

  286. A Miniature Multisensor Biosignal Data Recorder and its evaluation for unsupervised Parkinson's Disease Data Collection

    Crispin-Bailey, C., Hollier, G. P., Moulds, A., Freeman, M. J., Fargus, A. G., Austin, J. & Lampert, T. A., 16 Nov 2014, p. 84-92. 9 p.

    Research output: Contribution to conferencePaper

  287. A Miniaturized 4-Channel, 2KSa/sec Biosignal Data Recorder With 3-Axis Accelerometer and Infra-red Timestamp Function

    Crispin-Bailey, C., Moulds, A., Platt, B., Hollier, G. P., Freeman, M. J. & Fargus, A. G., 2013.

    Research output: Contribution to conferencePaper

  288. A Modified Dendritic Cell Algorithm for On-line Error Detection in Robotic Systems

    Mokhtar, M., Bi, R., Timmis, J. & Tyrrell, A. M., May 2009, p. 2055-2062. 8 p.

    Research output: Contribution to conferencePaper

  289. A Navigation-based Algorithm for Matching Scenario Patterns

    Ma, J., Zhao, G. & Hancock, E. R., 2007, p. 151-157.

    Research output: Contribution to conferencePaper

  290. A Neural Architecture for Fast Rule Matching

    Austin, J., Kennedy, J. & Lees, K., 1995, p. 255-260.

    Research output: Contribution to conferencePaper

  291. A Neural-Endocrine Architecture for Foraging in Swarm Robotic Systems

    Timmis, J., Murray, L. & Neal, M., 2010, p. 319-330.

    Research output: Contribution to conferencePaper

  292. A New File Access Paradigm for Extending a User's Information Base

    Fritz, J. M. & Benest, I. D., 1994, p. 51-60.

    Research output: Contribution to conferencePaper

  293. A New Framework for Grayscale and Colour Non-lambertian Shape-from-Shading

    Smith, W. A. P. & Hancock, E. R., 2007, p. 869-880.

    Research output: Contribution to conferencePaper

  294. A New Look at the Refund Mechanism in the Bitcoin Payment Protocol

    Avizheh, S., Safavi-Naini, R. & Shahandashti, S. F., Dec 2018, p. 369-387. 19 p.

    Research output: Contribution to conferencePaper

  295. A New Method for Safety Analysis and the Mechanical Synthesis of Fault Trees in Complex Systems

    Papadopoulos, Y. & McDermid, J. A., 1999, p. 1-9.

    Research output: Contribution to conferencePaper

  296. A New Paradigm for SpeckNets: Inspiration from Fungal Colonies

    Falconer, R., Bown, J., Hart, E. & Timmis, J., 2008, p. 90-95.

    Research output: Contribution to conferencePaper

  297. A Note on Traces Refinement and the it onf Relation in the Unifying Theories of Programming

    Cavalcanti, A. & Gaudel, M-C., 2008, p. 42-61.

    Research output: Contribution to conferencePaper

  298. A Novel Approach to the Detection of Cheating in Multiplayer Online Games

    Laurens, P., Paige, R. F., Brooke, P. J. & Chivers, H., 2007, p. 97-106.

    Research output: Contribution to conferencePaper

  299. A Petri Net Model of Granulomatous Inflammation

    Albergante, L., Timmis, J., Andrews, P. S., Beattie, L. & Kaye, P. M., 2010, p. 1-3.

    Research output: Contribution to conferencePaper

  300. A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments

    Weaver, R., Fenn, J. & Kelly, T., 2003, p. 57-67.

    Research output: Contribution to conferencePaper

  301. A Probabilistic Framework for Schedulability Analysis

    Burns, A., Bernat, G. & Broster, I., 2003, p. 1-15.

    Research output: Contribution to conferencePaper

  302. A Proposal for a Lightweight Rigorous UML-Based Development Method for Reliable Systems

    Paige, R. F. & Ostroff, J. S., 2001, p. 192-206.

    Research output: Contribution to conferencePaper

  303. A Proposed Mechanism for Super-Pipelined Instruction-Issue for ILP Stack Machines

    Bailey, C., 2004, p. 121-129.

    Research output: Contribution to conferencePaper

  304. A ProtoType Question Answering System Using Syntactic and Semantic Information for Answer Retrieval

    Alfonseca, E., Boni, M. D., Jara-Valencia, J-L. & Manandhar, S., 2001.

    Research output: Contribution to conferencePaper

  305. A Refinement Tool for Z

    Freitas, A., Nascimento, C. & Cavalcanti, A., 2003, p. 396-415.

    Research output: Contribution to conferencePaper

  306. A Reflectance Model for Radar Shape From Shading

    Wilson, R. C. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  307. A Reflective Approach to Model-Driven Web Engineering

    Clowes, D., Kolovos, D. S., Holmes, C., Rose, L. M., Paige, R. F., Johnson, J., Dawson, R. & Probets, S. G., 2010, p. 62--73.

    Research output: Contribution to conferencePaper

  308. A Research Agenda for Metaheuristic Standardization

    Swan, J., Adriaensen, S., Bishr, M., Burke, E. K., Clark, J. A., De Causmaecker, P., Durillo, J., Hammond, K., Hart, E., Johnson, C. G., Kocsis, Z. A., Kovitz, B., Krawiec, K., Martin, S., Merelo, J. J., Minku, L. L., Özcan, E., Pappa, G. L., Pesch, E., Garcia-Sànchez, P. & 7 others, Schaerf, A., Sim, K., Smith, J., Stützle, T., Stefan, V., Wagner, S. & Yao, X., Jun 2015, p. 1-3. 3 p.

    Research output: Contribution to conferencePaper

  309. A Rigorous Evaluation of Crossover and Mutation in Genetic Programming

    White, D. & Poulding, S., 2009, p. 220-231. 12 p.

    Research output: Contribution to conferencePaper

  310. A Risk Modelling Approach for a Communicating System of Systems

    Aitken, J. M., Alexander, R. & Kelly, T., 2011, p. 442-447.

    Research output: Contribution to conferencePaper

  311. A Round Robin Scheduling Policy for Ada

    Burns, A., Harbour, M. G. & Wellings, A. J., 2003, p. 334-343.

    Research output: Contribution to conferencePaper

  312. A Safety Change Oriented Process for Safety-Critical Systems

    Tracey, N., Stephenson, A., Clark, J. A. & McDermid, J. A., 1999.

    Research output: Contribution to conferencePaper

  313. A Safety-Case Approach for Ethical Considerations for Autonomous Vehicles

    Menon, C. & Alexander, R. D., 1 Nov 2017.

    Research output: Contribution to conferencePaper

  314. A Secure Scheme for Group Communication of Wireless IoT Devices

    Alohali, B., Vasilakis, V., Moscholios, I. & Logothetis, M., 27 Sep 2018. 6 p.

    Research output: Contribution to conferencePaper

  315. A Security Framework

    Jacob, J. L., 1 Jun 1988, p. 98--111.

    Research output: Contribution to conferencePaper

  316. A Self-scaling Instruction Generator Using Cartesian Genetic Programming

    Liu, Y., Tempesti, G., Walker, J. A., Timmis, J., Tyrrell, A. M. & Bremner, P., 2011, p. 298-309.

    Research output: Contribution to conferencePaper

  317. A Signature-based Intrusion Detection System for the Internet of Things

    Ioulianou, P., Vasilakis, V., Moscholios, I. & Logothetis, M., 8 Jun 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  318. A Simpler Semantics for Z

    Gardiner, P. H. B., Lupton, P. J. & Woodcock, J., 1990, p. 3-11.

    Research output: Contribution to conferencePaper

  319. A Strategic Roadmap for Business Model Change for the Video-games Industry

    Goumagias, N., Purvis, K., Fernandes, K., Cabras, I., Li, F., Shao, J., Devlin, S., Hodge, V. J., Cowling, P. & Kudenko, D., 3 May 2016, (Accepted/In press).

    Research output: Contribution to conferencePaper

  320. A Strategy for Compiling Classes, Inheritance, and Dynamic Binding

    Duran, A., Cavalcanti, A. & Sampaio, A., 2003, p. 301-320.

    Research output: Contribution to conferencePaper

  321. A Summary of Domain Analysis Experience by Way of Heuristics

    Lam, W. & McDermid, J. A., 1997, p. 54-64.

    Research output: Contribution to conferencePaper

  322. A Supergraph-based Generative Model

    Han, L., Wilson, R. C. & Hancock, E. R., 2010, p. 1566-1569.

    Research output: Contribution to conferencePaper

  323. A Systematic Approach for Designing Mutation Operators for MDE languages

    Alhwikem, F. H. M., Paige, R. F., Rose, L. M. & Alexander, R. D., Oct 2016.

    Research output: Contribution to conferencePaper

  324. A Systematic Approach to Safety Case Maintenance

    Kelly, T. P. & McDermid, J. A., 1999, p. 13-26.

    Research output: Contribution to conferencePaper

  325. A Systematic Approach to Software Integrity Levels

    Lindsay, P. A. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  326. A Theoretical Analysis of Hierarchical Proofs

    Cairns, P. A. & Gow, J., 2003, p. 175-187.

    Research output: Contribution to conferencePaper

  327. A Theory of Pointers for the UTP

    Harwood, W., Cavalcanti, A. & Woodcock, J., 2008, p. 141-155.

    Research output: Contribution to conferencePaper

  328. A Tool for Defining the Architecture of Z Specifications

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1990, p. 77-92.

    Research output: Contribution to conferencePaper

  329. A Tool for Defining the Architecture of a Z Specification

    Coombes, A., McDermid, J. A. & Nicholls, J. E., 1991, p. 77-92.

    Research output: Contribution to conferencePaper

  330. A Tutorial Introduction to CSP in it nifying Theories of Programming

    Cavalcanti, A. & Woodcock, J., 2004, p. 220-268.

    Research output: Contribution to conferencePaper

  331. A Tutorial Introduction to Designs in Unifying Theories of Programming

    Woodcock, J. & Cavalcanti, A., 2004, p. 40-66.

    Research output: Contribution to conferencePaper

  332. A Tutorial on the Refinement Calculus

    Woodcock, J., 1991, p. 79-140.

    Research output: Contribution to conferencePaper

  333. A UML Profile for Knowledge-Based Systems Modelling

    Abdullah, M. S., Paige, R. F., Kimble, C. & Benest, I. D., 20 Aug 2007, p. 871-878.

    Research output: Contribution to conferencePaper

  334. A Unified Neighbor Reconstruction Method for Embeddings

    Hancock, E. R., Zhang, Z. H. & Bai, L., 11 Apr 2018, (Accepted/In press). 6 p.

    Research output: Contribution to conferencePaper

  335. A Visual Specification Language for Model-to-Model Transformations

    Guerra, E., Lara, J. D., Kolovos, D. S. & Paige, R. F., 2010, p. 119-126.

    Research output: Contribution to conferencePaper

  336. A Weakest Precondition Semantics for an Object-Oriented Language of Refinement

    Cavalcanti, A. & Naumann, D. A., 1999, p. 1439-1459.

    Research output: Contribution to conferencePaper

  337. A Web Services Description Framework to Support Dynamic Run-Time Binding in Grid-based Systems

    Cakic, J. & Paige, R. F., 2005, p. 85-96.

    Research output: Contribution to conferencePaper

  338. A case study of hierarchically heterogeneous application modelling using UML and Ptolemy II

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Sep 2010, p. 68 -71.

    Research output: Contribution to conferencePaper

  339. A co-design strategy for embedded Java applications based on a hardware interface with invocation semantics

    Borg, A., Gao, R. & Audsley, N., 1 Dec 2006, p. 58-67. 10 p.

    Research output: Contribution to conferencePaper

  340. A comparison of categorisation algorithms for predicting the cellular localization sites of proteins

    Cairns, P., Huyck, C., Mitchell, I. & Wu, W. X., 2001, p. 296--300.

    Research output: Contribution to conferencePaper

  341. A computationally efficient method for online identification of traffic incidents and network equipment failures

    Hodge, V. J., Krishnan, R., Austin, J. & Polak, J., 4 Apr 2010.

    Research output: Contribution to conferencePaper

  342. A framework for describing and comparing courses and curricula

    Pedroni, M., Oriol, M. & Meyer, B., 1 Jun 2007, p. 131.

    Research output: Contribution to conferencePaper

  343. A high abstraction, high accuracy power estimation model for networks-on-chip

    Ost, L., Guindani, G., Indrusiak, L. S., Reinbrecht, C., Raupp, T. & Moraes, F., 2009, p. 31:1--31:6.

    Research output: Contribution to conferencePaper

  344. A multi-arm bandit neighbourhood search for routing and scheduling problems

    Chen, Y., Cowling, P. I., Polack, F. A. C. & Mourdjis, P. J., 2016. 33 p.

    Research output: Contribution to conferencePaper

  345. A practitioner perspective on integrating agile and user centred design

    Salah, D., Paige, R. & Cairns, P., 2014, p. 100-109. 10 p.

    Research output: Contribution to conferencePaper

  346. A pragmatist aesthetics approach to the design of a technological artefact

    Fiore, S., Wright, P. & Edwards, A., 2005, p. 129-132.

    Research output: Contribution to conferencePaper

  347. A proposal for an optical implementation of a universal quantum phase gate

    Rebic, S., Vitali, D., Ottaviani, C., Tombesi, P., Artoni, M. & Cataliotti, F., 1 Mar 2005, p. 245.

    Research output: Contribution to conferencePaper

  348. A psychometric evaluation of emotional responses to horror music

    Williams, D., Wu, C. Y., Hodge, V. J., Murphy, D. & Cowling, P. I., 1 Jan 2019. 9 p.

    Research output: Contribution to conferencePaper

  349. A refinement based approach to calculating a fault tolerant railway signal device

    McEwan, A. A. & Woodcock, J. C. P., 2004, p. 621-628.

    Research output: Contribution to conferencePaper

  350. A spectral analysis of perceptual shape variation

    Hughes, A. & Wilson, R. C., 17 Sep 2003, p. 38-43.

    Research output: Contribution to conferencePaper

  351. A time-domain Based Looseless Data Compression Technique for Wireless Wearable Biometric Devices

    Crispin-Bailey, C. & Dai, C., Aug 2013, p. 104-107. 4 p.

    Research output: Contribution to conferencePaper

  352. A unified model of specular and diffuse reflectance for rough, glossy surfaces

    Smith, W. A. P. & Hancock, E. R., 2009, p. 643-650.

    Research output: Contribution to conferencePaper

  353. ABZ2008 VSR-Net Workshop

    Woodcock, J. & Boca, P., 2008, p. 378-379.

    Research output: Contribution to conferencePaper

  354. AI and Automatic Music Generation for Mindfulness

    Williams, D., Hodge, V. J., Gega, L., Murphy, D., Cowling, P. I. & Drachen, A., 17 Mar 2019. 10 p.

    Research output: Contribution to conferencePaper

  355. APD-A Tool for Identifying Behavioural Patterns Automatically from Clickstream Data

    Ting, I-H., Clark, L., Kimble, C., Kudenko, D. & Wright, P., 2007, p. 66-73.

    Research output: Contribution to conferencePaper

  356. ARGOT: The Rochester Dialogue System

    Allen, J. F., Frisch, A. M. & Litman, D. J., 1 Aug 1982, p. 66-70.

    Research output: Contribution to conferencePaper

  357. AURA-Alert: The use of Binary Associative Memories for Condition Monitoring Applications

    Austin, J., Jackson, T., Hodge, V. J. & Brewer, G., 22 Jun 2010, p. 699-711.

    Research output: Contribution to conferencePaper

  358. Abstracting Complex Languages through Transformation and Composition

    Johannes, J., Zschaler, S., Fernández, M. A., Castillo, A., Kolovos, D. S. & Paige, R. F., 2009, p. 546-550.

    Research output: Contribution to conferencePaper

  359. Abstraction and Reformulation in the Generation of Constraint Models

    Frisch, A. M., 2007, p. 2-3.

    Research output: Contribution to conferencePaper

  360. Accessibility 2.0: people, policies and processes

    Kelly, B., Sloan, D., Brown, S., Seale, J., Petrie, H., Lauke, P. & Ball, S., 2007, p. 138-147.

    Research output: Contribution to conferencePaper

  361. Accessibility in non-professional web authoring tools: a missed web 2.0 opportunity?

    Power, C. & Petrie, H., 2007, p. 116-119.

    Research output: Contribution to conferencePaper

  362. Accessibility of Blended and E-Learning for Mature Age and Disabled Students and Staff: Introduction to the Special Thematic Session

    Petrie, H., Power, C., Velasco, C. A. & Boticario, J., 2010, p. 484-485.

    Research output: Contribution to conferencePaper

  363. Accessible Formal Method Support for PLC Software Development

    McDermid, J. A., Pierce, R. H. & Rabe, G., 1995, p. 113-129.

    Research output: Contribution to conferencePaper

  364. Accessible Player Experiences (APX): The Players

    Power, C. D., Beeston, J. T. & Cairns, P., 25 Mar 2018, (Accepted/In press).

    Research output: Contribution to conferencePaper

  365. Accumulating Spectral Evidence for Perspective Views of Texture Planes

    Ribeiro, E. & Hancock, E. R., 1999.

    Research output: Contribution to conferencePaper

  366. Achievements and Prospects of Learning Word Morphology with Inductive Logic Programming

    Kazakov, D., 1999, p. 89-109.

    Research output: Contribution to conferencePaper

  367. Achieving Minimal and Deterministic Interrupt Execution in Stack-Based Processor Architectures

    Bailey, C., 2000, p. 1368-.

    Research output: Contribution to conferencePaper

  368. Ada for High Integrity Systems

    Hutcheon, A. D., Jepson, B. J., Jordan, D. T., McDermid, J. A. & Wand, I. C., 1992.

    Research output: Contribution to conferencePaper

  369. Adaptable Lymphocytes for Artificial Immune Systems

    Andrews, P. S. & Timmis, J., 2008, p. 376-386.

    Research output: Contribution to conferencePaper

  370. Adaptivity in Question Answering with User Modelling and a Dialogue Interface

    Quarteroni, S. & Manandhar, S., 2006.

    Research output: Contribution to conferencePaper

  371. Adding Temporal Annotations and Associated Verification to Ravenscar Profile

    Burns, A. & Lin, T-M., 2003, p. 80-91.

    Research output: Contribution to conferencePaper

  372. Advanced Structural Representations for Question Classification and Answer Re-ranking

    Quarteroni, S., Moschitti, A., Manandhar, S., Basili, R., Amati, G., Carpineto, C. & Romano, G., 2007, p. 234-245.

    Research output: Contribution to conferencePaper

  373. Affinity Propagation for Class Exemplar Mining

    Xia, S., Song, R. & Hancock, E. R., 2010, p. 191-201.

    Research output: Contribution to conferencePaper

  374. Aggregation of Information leaked by a MANET

    Murdoch, J., Clark, J. A., McDermid, J. A., Chivers, H. R. & Worthington, O., 2007.

    Research output: Contribution to conferencePaper

  375. Agile Formal Method Engineering

    Paige, R. F. & Brooke, P. J., 2005, p. 109-128. 19 p.

    Research output: Contribution to conferencePaper

  376. Agile Security Using an Incremental Security Architecture

    Chivers, H., Paige, R. F. & Ge, X., 2005, p. 57-65. 8 p.

    Research output: Contribution to conferencePaper

  377. Agile Specification-Driven Development

    Ostroff, J. S., Makalsky, D. & Paige, R. F., 2004, p. 104-112.

    Research output: Contribution to conferencePaper

  378. Alignment using Spectral Clusters

    Carcassoni, M. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  379. An Abstract View of Sorted Unification

    Frisch, A. M., Cohn, A. G. & Kapur, D., 1992, p. 178-192.

    Research output: Contribution to conferencePaper

  380. An Actor-Oriented Group Mobility Model for Wireless Ad Hoc Sensor Networks

    Ochirsuren, E., Indrusiak, L. S. & Glesner, M., 1 Jun 2008, p. 174 -179.

    Research output: Contribution to conferencePaper

  381. An Admission Control Protocol for Real-Time OSGi

    Richardson, T. & Wellings, A. J., May 2010, p. 217. 224 p.

    Research output: Contribution to conferencePaper

  382. An Agile and Extensible Code Generation Framework

    Kolovos, D. S., Paige, R. F. & Polack, F., 2005, p. 226-229.

    Research output: Contribution to conferencePaper

  383. An Analysis of Approaches to Model Migration

    Rose, L. M., Paige, R. F., Kolovos, D. S. & Polack, F. A. C., 2009.

    Research output: Contribution to conferencePaper

  384. An Analysis of Clarification Dialogue for Question Answering

    Boni, M. D. & Manandhar, S., 2003.

    Research output: Contribution to conferencePaper

  385. An Analysis of Problem Difficulty for a Class of Optimisation Heuristics

    Ridge, E. & Kudenko, D., 2007, p. 198-209.

    Research output: Contribution to conferencePaper

  386. An Approach to Object Oriented Specification using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1991, p. 193-215.

    Research output: Contribution to conferencePaper

  387. An Approach to Object-Oriented Specification Using Z

    Whysall, P. J., McDermid, J. A. & Nicholls, J. E., 1990, p. 193-215.

    Research output: Contribution to conferencePaper

  388. An Artificial Immune System for Evolving Amino Acid Clusters Tailored to Protein Function Prediction

    Secker, A., Davies, M. N., Freitas, A. A., Timmis, J., Clark, E. & Flower, D. R., 2008, p. 242-253.

    Research output: Contribution to conferencePaper

  389. An Assessment of Shared Local Memory Buffering for Enhanced Multimedia Server Scalability

    Maierhofer, M. & Crispin-Bailey, C., 1999, p. 131-135.

    Research output: Contribution to conferencePaper

  390. An Associative Memory for Association Rule Mining

    Baez-Monroy, V. O. & O'Keefe, S., 2007, p. 2227-2232.

    Research output: Contribution to conferencePaper

  391. An Attributive Logic of Set Descriptions and Set Operations

    Manandhar, S., 1994, p. 255-262.

    Research output: Contribution to conferencePaper

  392. An EM-like Algorithm for Motion Segmentation via Eigendecomposition

    Robles-Kelly, A. & Hancock, E. R., 2001.

    Research output: Contribution to conferencePaper

  393. An Efficient VLSI Architecture for an Enhanced TSS Algorithm for Video Coding Applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., Oct 1998.

    Research output: Contribution to conferencePaper

  394. An Empirical Analysis of Terminological Representation Systems

    Heinsohn, J., Kudenko, D., Nebel, B. & Profitlich, H-J., 1992, p. 767-773.

    Research output: Contribution to conferencePaper

  395. An Empirical Analysis of the Impact of Prioritised Sweeping on the DynaQ's Performance

    Grzes, M. & Kudenko, D., 2008, p. 1041-1051.

    Research output: Contribution to conferencePaper

  396. An Evaluation of Open Hypertext Features for Improved File Access

    Fritz, J. M. & Benest, I. D., 1995, p. 339-354.

    Research output: Contribution to conferencePaper

  397. An Evaluation of Standard Retrieval Algorithms and a Weightless Neural Approach

    Hodge, V. J. & Austin, J., 2000, p. 591-596.

    Research output: Contribution to conferencePaper

  398. An Experience Report in Requirements Elicitation for Accessible E-Learning Systems

    Power, C. & Petrie, H., 1 Mar 2010, p. 259 -261.

    Research output: Contribution to conferencePaper

  399. An FPGA-based system for development of real-time embedded vision applications

    Crispin-Bailey, C., Pears, N. E. & Meng, H., 2007, p. 33-40. 8 p.

    Research output: Contribution to conferencePaper

  400. An IDE-based, Integrated Solution to Schema Evolution of Object-Oriented Software

    Piccioni, M., Oriol, M., Meyer, B. & Schneider, T., 1 Nov 2009, p. 650--654. 4 p.

    Research output: Contribution to conferencePaper

  401. An Introduction to Refinement in Z

    Woodcock, J., 1991, p. 96-117.

    Research output: Contribution to conferencePaper

  402. An Investigation into the Use of Mutation Analysis for Automated Program Repair

    Timperley, C. S., Stepney, S. & Le Goues, C., 17 Aug 2017, p. 99-114. 16 p.

    Research output: Contribution to conferencePaper

  403. An Investigation of Arbitration in Servers for Distributed Multimedia Applications

    Maierhofer, M., Crispin-Bailey, C., Batatia, H. & Sotudeh, R., 1999, p. 1564-1570.

    Research output: Contribution to conferencePaper

  404. An Investigation on the Compression Quality of aiNet

    Stibor, T. & Timmis, J., 2007, p. 495-502.

    Research output: Contribution to conferencePaper

  405. An Iterator Construct for the Refinement Calculus

    King, S. & Morgan, C., 2000.

    Research output: Contribution to conferencePaper

  406. An Object-Oriented Structuring for Z Based on Views

    Amálio, N., Polack, F., Stepney, S., Treharne, H., King, S., Henson, M. C. & Schneider, S. A., 2005, p. 262-278.

    Research output: Contribution to conferencePaper

  407. An Optical Range Sensor for Mobile Robot Guidance

    Pears, N. & Probert, P., 1993, p. 659-664.

    Research output: Contribution to conferencePaper

  408. An Outline Pattern Language for Z: Five Illustrations and Two Tables

    Stepney, S., Polack, F., Toyn, I., Bert, D., Bowen, J. P., King, S. & Waldén, M. A., 2003, p. 2-19.

    Research output: Contribution to conferencePaper

  409. An action semantics for MOF 2.0

    Paige, R. F., Kolovos, D. S., Polack, F. & Haddad, H., 2006, p. 1304-1305.

    Research output: Contribution to conferencePaper

  410. An algebraic approach to information theory

    Patra, M. K. & Braunstein, S. L., 2010, p. 2708-2712.

    Research output: Contribution to conferencePaper

  411. An improved speaker diarization system

    Fu, R. & Benest, I. D., 2007, p. 2605-2608.

    Research output: Contribution to conferencePaper

  412. An improved three-step search block-matching algorithm for low bit-rate video coding applications

    Crispin-Bailey, C., Xu, D. & sotudeh, R., 1998, p. 178-181. 4 p.

    Research output: Contribution to conferencePaper

  413. An integrated neural IR system

    Hodge, V. J. & Austin, J., 2001, p. 265-270.

    Research output: Contribution to conferencePaper

  414. Analysing Available ILP in Stack Based Code : A Preliminary Approach

    Crispin-Bailey, C. & Shi, H., 2003.

    Research output: Contribution to conferencePaper

  415. Analysing the Reliability of a Self-reconfigurable Modular Robotic System

    Murray, L. J., Liu, W., Winfield, A., Timmis, J. & Tyrrell, A., Dec 2011, p. -. 6 p.

    Research output: Contribution to conferencePaper

  416. Analysis of Hierarchical EDF Pre-emptive Scheduling

    Zhang, F. & Burns, A., 2007, p. 423-434.

    Research output: Contribution to conferencePaper

  417. Analysis of Write-back Caches under Fixed-priority Preemptive and Non-preemptive Scheduling

    Davis, R. I., Altmeyer, S. & Reineke, J., Oct 2016.

    Research output: Contribution to conferencePaper

  418. Analyzing APEX applications

    Audsley, N. & Wellings, A., 1 Dec 1996, p. 39-44. 6 p.

    Research output: Contribution to conferencePaper

  419. Anisotropic fluid solver for robust optical flow smoothing

    Doshi, A. & Bors, A. G., 6 May 2009, p. 117-120.

    Research output: Contribution to conferencePaper

  420. Application Areas of AIS: The Past, The Present and The Future

    Hart, E. & Timmis, J., 2005, p. 483-497.

    Research output: Contribution to conferencePaper

  421. Application of Model-Based Software Failure Taxonomy to the Analysis of System Failure Events

    Jackson, T. O., McDermid, J. A., Wand, I. C., Wilikens, M. & Papazoglu, I. A., 1996.

    Research output: Contribution to conferencePaper

  422. Applying HAZOP to Functional System Models

    Murdoch, J., McDermid, J. A., Wilkinson, P., Astley, K. & Reid, S., 1998, p. 127-136.

    Research output: Contribution to conferencePaper

  423. Applying UML Interactions and Actor-Oriented Simulation to the Design Space Exploration of Network-on-Chip Interconnects

    Indrusiak, L. S., Ost, L., Moller, L., Moraes, F. & Glesner, M., 1 Apr 2008, p. 491 -494.

    Research output: Contribution to conferencePaper

  424. Applying Web Usage Mining Techniques to Discover Potential Browsing Problems of Users

    Ting, I-H., Kimble, C. & Kudenko, D., 2007, p. 929-930.

    Research output: Contribution to conferencePaper

  425. Approaches to Certification of Reconfigurable IMA Systems

    Hollow, P., McDermid, J. A. & Nicholson, M., 2000, p. 397-404.

    Research output: Contribution to conferencePaper

  426. Approaching the Formal Design and Development of Complex Systems: The Retrenchment Position

    Banach, R., Jeske, C., Fraser, S., Cross, R., Poppleton, M., Stepney, S. & King, S., 2004.

    Research output: Contribution to conferencePaper

  427. Approximating 3D facial shape from photographs using coupled statistical models

    Castelan, M., Smith, W. A. P. & Hancock, E. R., 2006, p. 89-98. 10 p.

    Research output: Contribution to conferencePaper

  428. ArCHATECH — An Architectural Construction and Analysis Technique for Real-Time Systems

    Vickers, A. J., McDermid, J. A. & Garlan, D., 1995.

    Research output: Contribution to conferencePaper

  429. Arabic Character Recognition with Shape Mixtures

    Al-Shaher, A. A. & Hancock, E. R., 2002.

    Research output: Contribution to conferencePaper

  430. Artificial Homeostatic System: A Novel Approach

    Vargas, P. A., Moioli, R. C., Castro, L. N. D., Timmis, J., Neal, M. & Zuben, F. J. V., 2005, p. 754-764.

    Research output: Contribution to conferencePaper

  431. Assessing Test Set Adequacy for Object-Oriented Programs using Class Mutation

    Kim, S., Clark, J. A. & McDermid, J. A., 1999, p. 72-83.

    Research output: Contribution to conferencePaper

  432. Assurance of Claims and Evidence for Aviation Systems

    Reinhardt, D. W. & McDermid, J. A., 20 Oct 2010, p. 1-10. 10 p.

    Research output: Contribution to conferencePaper

  433. Auditory Navigation in Hyperspace: Design and Evaluation of a Non-Visual Hypermedia System for Blind Users

    Morley, S., Petrie, H., O'Neill, A-M. & McNally, P., 1998, p. 100-107.

    Research output: Contribution to conferencePaper

  434. Augmenting icons for deaf computer users

    Petrie, H., Fisher, W., Weimann, K. & Weber, G., 2004, p. 1131-1134.

    Research output: Contribution to conferencePaper

  435. Automated Component Configuration in Safety-Critical Domains

    Stephenson, Z. & McDermid, J. A., 2004, p. 1-11.

    Research output: Contribution to conferencePaper

  436. Automated Heap Sizing in the Poly/ML Runtime

    White, D. R., Singer, J., Aitken, J. M. & Matthews, D., 2012, p. 1-9.

    Research output: Contribution to conferencePaper

  437. Automated Program Flaw Finding Using Simulated Annealing

    Tracey, N., Clark, J. A. & Mander, K., 1998, p. 73-81.

    Research output: Contribution to conferencePaper

  438. Automatic Critiques of Interface Modes

    Gow, J., Thimbleby, H. W. & Cairns, P. A., 2005, p. 201-212.

    Research output: Contribution to conferencePaper

  439. Automatic Generation of Implied Clauses for SAT

    Drake, L., Frisch, A. M. & Walsh, T., 2002, p. 783.

    Research output: Contribution to conferencePaper

  440. Automatic Generation of Integrated Formal Models Corresponding to UML System Models

    Treharne, H., Turner, E., Paige, R. F. & Kolovos, D. S., 2009, p. 357-367.

    Research output: Contribution to conferencePaper

  441. Automatic Generation of Verified Concurrent Hardware

    Oliveira, M. & Woodcock, J., 2007, p. 286-306.

    Research output: Contribution to conferencePaper

  442. Automatic Multilingual Lexicon Generation using Wikipedia as a Resource

    Shahid, A. R. & Kazakov, D., 2009, p. 357-360.

    Research output: Contribution to conferencePaper

  443. Automatic Test Data Generation for Multiple Condition and MCDC Coverage

    Ghani, K., Clark, J. A., Boness, K., Fernandes, J. M., Hall, J. G., Machado, R. J. & Oberhauser, R., 2009, p. 152-157. 6 p.

    Research output: Contribution to conferencePaper

  444. Automatic Translation from it ircus to Java

    Freitas, A. & Cavalcanti, A., 2006, p. 115-130.

    Research output: Contribution to conferencePaper

  445. Automatic extraction of notions from course material

    Pedroni, M., Oriol, M., Meyer, B. & Angerer, L., 2008, p. 251.

    Research output: Contribution to conferencePaper

  446. Automatic generation of tests from Statechart specifications

    Burton, S., Clark, J. A. & McDermid, J. A., 2001.

    Research output: Contribution to conferencePaper

  447. Automating Refinement of Circus Programs

    Zeyda, F. & Cavalcanti, A., 2010, p. 274-290.

    Research output: Contribution to conferencePaper

  448. Automation of System Safety Analysis: Possibilities and Pitfalls

    Galloway, A., McDermid, J. A., Murdoch, J. & Pumfrey, D. J., 2002.

    Research output: Contribution to conferencePaper

  449. Automorphisms of transition graphs for a linear cellular automaton

    Powley, E. J. & Stepney, S., 2008, p. 55-68.

    Research output: Contribution to conferencePaper

  450. Background Subtraction in Video Using Recursive Mixture Models, Spatio-Temporal Filtering and Shadow Removal

    Chen, Z., Pears, N., Freeman, M. & Austin, J., 2009, p. 1141-1150.

    Research output: Contribution to conferencePaper

  451. Beyond Guidelines: What Can We Learn from the Visual Information Seeking Mantra?

    Craft, B. & Cairns, P. A., 2005, p. 110-118.

    Research output: Contribution to conferencePaper

  452. Bilingual lexicon extraction from comparable corpora using in-domain terms

    Ismail, A. & Manandhar, S., 2010, p. 481-489.

    Research output: Contribution to conferencePaper

  453. Binary neural network based 3D facial feature localization

    Ju, Q., O'Keefe, S. & Austin, J., 2009, p. 1462-1469.

    Research output: Contribution to conferencePaper

  454. Biomolecular Immune-Computer: Theoretical Basis and Experimental Simulator

    Goncharova, L. B., Jacques, Y., Martín-Vide, C., Tarakanov, A. O. & Timmis, J., 2005, p. 72-85.

    Research output: Contribution to conferencePaper

  455. Blind Source Separation Using Variational Expectation-Maximization Algorithm

    Nasios, N. & Bors, A. G., Aug 2003, p. 442-450.

    Research output: Contribution to conferencePaper

  456. Blind and robust mesh watermarking using manifold harmonics

    Wang, K., Luo, M., Bors, A. G. & Denis, F., Nov 2009, p. 3657-3660. 4 p.

    Research output: Contribution to conferencePaper

  457. BookLeaf: An Unstructured Hydrodynamics Mini-application

    Truby, D., Wright, S. A., Kevis, R., Maheswaran, S., Herdman, A. & Jarvis, S. A., 10 Sep 2018. 8 p.

    Research output: Contribution to conferencePaper

  458. Building Theories into Instantiation

    Frisch, A. M. & Page Jr., C. D., 1995, p. 1210-1216.

    Research output: Contribution to conferencePaper

  459. Building for Users not for Experts: Designing a Visualization of the Literature Domain

    Faisal, S., Cairns, P. A. & Blandford, A., 2007, p. 707-712.

    Research output: Contribution to conferencePaper

  460. Bunches for Object-Oriented, Concurrent, and Real-Time Specification

    Paige, R. F. & Hehner, E. C. R., 1999, p. 530-550. 20 p.

    Research output: Contribution to conferencePaper

  461. CGRASS: A System for Transforming Constraint Satisfaction Problems

    Frisch, A. M., Miguel, I. & Walsh, T., 2002, p. 15-30.

    Research output: Contribution to conferencePaper

  462. CHAINED BELL INEQUALITIES

    BRAUNSTEIN, SL., CAVES, CM. & KAFATOS, M., 1989, p. 27-36.

    Research output: Contribution to conferencePaper

  463. CICS Project Report: Experiences and Results from the use of Z in IBM

    Houston, I. & King, S., 1991, p. 588-596.

    Research output: Contribution to conferencePaper

  464. COTS Product Selection for Safety-Critical Systems

    Ye, F. & Kelly, T., 2004, p. 53-62.

    Research output: Contribution to conferencePaper

  465. COTS in Safety-Related Systems: issues and an illustration

    May, R., McDermid, J. A. & Johnston, I. H. A., 1998.

    Research output: Contribution to conferencePaper

  466. Case Studies in Using a Meta-Method for Formal Method Integration

    Paige, R. F., 1997, p. 395-408. 13 p.

    Research output: Contribution to conferencePaper

  467. Causality as a Means for the Expression of Requirements for Safety Critical Systems

    Coombes, A. C. & McDermid, J. A., 1994.

    Research output: Contribution to conferencePaper

  468. Cellular Associative Symbolic Processing for Pattern Recognition

    Orovas, C. & Austin, J., 1998, p. 269-279.

    Research output: Contribution to conferencePaper

  469. Certification of Neural Networks

    Jackson, T. O. & McDermid, J. A., 1997.

    Research output: Contribution to conferencePaper

  470. Challenges of Establishing a Software Product Line for an Aerospace Engine Monitoring System

    Habli, I. & Kelly, T., 2007, p. 193-202.

    Research output: Contribution to conferencePaper

  471. Challenges of evaluating the information visualisation experience

    Faisal, S., Cairns, P. A. & Blandford, A., 2007, p. 167-170.

    Research output: Contribution to conferencePaper

  472. Challenges when using Model-Driven Architecture in the development of Safety Critical Software

    Conmy, P. & Paige, R. F., 31 Mar 2007, p. 127-136. 9 p.

    Research output: Contribution to conferencePaper

  473. Character Education Using Pedagogical Agents and Socratic Voice

    HodHod, R. A., Kudenko, D. & Cairns, P. A., 2010.

    Research output: Contribution to conferencePaper

  474. Characterising Facial Gender Difference Using Fisher-Rao Metric

    Ceolin, S. & Hancock, E. R., 2010, p. 4308-4311.

    Research output: Contribution to conferencePaper

  475. Characterising Graphs using the Heat Kernel

    Xiao, B., Wilson, R. C. & Hancock, E. R., 2005.

    Research output: Contribution to conferencePaper

  476. Characterising embedded applications using a UML profile

    Maatta, S., Indrusiak, L. S., Ost, L., Moller, L., Glesner, M., Moraes, F. G. & Nurmi, J., 1 Oct 2009, p. 172 -175.

    Research output: Contribution to conferencePaper

  477. Characters + Mark-up = Z Lexis

    Toyn, I. & Stepney, S., 2002, p. 100-119.

    Research output: Contribution to conferencePaper

  478. Chemical similarity searching using a neural graph matcher

    Klinger, S. & Austin, J., 2005, p. 479-484.

    Research output: Contribution to conferencePaper

  479. Class Mutation: Mutation Testing for Object-Oriented Programs

    Kim, S-W., Clark, J. A. & McDermid, J. A., 2000.

    Research output: Contribution to conferencePaper

  480. Clustering Morphological Paradigms Using Syntactic Categories

    Can, B. & Manandhar, S., 2009, p. 641-648.

    Research output: Contribution to conferencePaper

  481. Co-ordinating Knowledge in Pervasive Environments

    Nixon, L., Tolksdorf, R., Wood, A. M. & Menezes, R., 2007, p. to appear.

    Research output: Contribution to conferencePaper

  482. CoSMoS in the Context of Social Ecological Research

    Forrester, J. M., Greaves, R. B. & Polack, F. A. C., 2012, p. 47-76.

    Research output: Contribution to conferencePaper

  483. Combining Agile Practices with UML and EJB: A Case Study in Agile Development

    Paige, R. F., Agarwal, P. & Brooke, P. J., 2003, p. 351-353. 2 p.

    Research output: Contribution to conferencePaper

  484. Combining EDF and FP Scheduling: Analysis and Implementation in Ada 2005

    Burns, A., Wellings, A. J. & Zhang, F., 2009, p. 119-133.

    Research output: Contribution to conferencePaper

  485. Combining Gameplay Data with Monte Carlo Tree Search to Emulate Human Play

    Devlin, S., Anspoka, A., Sephton, N. J., Cowling, P. I. & Rollason, J., 19 Sep 2016.

    Research output: Contribution to conferencePaper

  486. Combining Inference and Search for the Propositional Satisfiability Problem

    Drake, L. & Frisch, A. M., 2002, p. 982.

    Research output: Contribution to conferencePaper

  487. Combining LAPIS and WordNet for Learning of LR Parsers with Optimal Semantic Constraints

    Kazakov, D., Dzeroski, S. & Flach, P. A., 1999, p. 140-151.

    Research output: Contribution to conferencePaper

  488. Combining Probabilistic Shape-from-Shading and Statistical Facial Shape Models

    Ahmad, T., Wilson, R. C., Smith, W. A. P. & Haines, T. S. F., 14 Sep 2011, p. 680-690. 11 p.

    Research output: Contribution to conferencePaper

Previous 1 2 3 Next