Search research publications and outputs

  1. 1993
  2. SAM - A Tool to Support the Construction, Review and Evolution of Safety Arguments

    Forder, J., Higgins, C., McDermid, J. A., Storrs, G., Redmill, F. (ed.) & Anderson, T. (ed.), 1993, Directions in Safety-Critical Systems: Proceedings of the First Safety-Critical Systems Symposium . Springer-Verlag, p. 195-216 22 p.

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  3. The Olympus Attitude and Orbital Control System: A Case Study in Hard Real-Time System Design and Implementation

    Burns, A., Wellings, A. J., Bailey, C. M. & Fyfe, E., 1993, Ada-Europe '93: 12th Ada-Europe International Conference, Ada Sans Frontières, Paris, France, June 14-18, 1993. Gauthier, M. (ed.). Springer, Vol. 688. p. 19-35 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Using maximum entropy in a defeasible logic with probabilistic semantics

    Cussens, J. & Hunter, A., 1993, IPMU'92 - Advanced Techniques in Artificial Intelligence. Bouchon-Meunier, B., Valverde, L. & Yager, R. R. (eds.). Lecture Notes in Computer Science 682, Springer-Verlag, p. 43-52 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. 1992
  6. Absolute and relative temporal constraints in hard real-time databases

    Audsley, N. C., Burns, A., Richardson, M. F. & Wellings, A. J., 1 Dec 1992, Proceedings - 4th Euromicro Workshop on Real-Time Systems, ECRTS 1992. p. 148-153 6 p. 637486

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. A HIERARCHICAL EVIDENCE COMBINING EDGE DETECTOR

    HANCOCK, E. R., HAINDL, M. & KITTLER, J., 1992, PROGRESS IN IMAGE ANALYSIS AND PROCESSING II. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 494-501 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. A RELATIONAL PROGRAMMING SYSTEM WITH INFERRED REPRESENTATIONS

    Cattrall, D. & Runciman, C., 1992, PROGRAMMING LANGUAGE IMPLEMENTATION AND LOGIC PROGRAMMING. Bruynooghe, M. & Wirsing, M. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 475-476 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. MULTIRESOLUTION EDGE LABELING USING HIERARCHICAL-RELAXATION

    HANCOCK, E. R., HAINDL, M. & KITTLER, J., 1992, 11TH IAPR INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, PROCEEDINGS, VOL II. LOS ALAMITOS: I E E E, COMPUTER SOC PRESS, p. 140-144 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. RELAXATIONAL REFINEMENT OF INTENSITY RIDGES

    HANCOCK, E. R. & KITTLER, J., 1992, 11TH IAPR INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, PROCEEDINGS, VOL III. LOS ALAMITOS: I E E E, COMPUTER SOC PRESS, p. 459-463 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. THE STRUCTURE OF PERMISSIONS - A NORMATIVE FRAMEWORK FOR ACCESS RIGHTS

    Morris, P. & McDermid, J., 1992, DATABASE SECURITY, V. Landwehr, CE. & Jajodia, S. (eds.). AMSTERDAM: ELSEVIER SCIENCE PUBL B V, p. 77-97 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. The Structure of Permissions: A Normative Framework for Access Rights

    Morris, P., McDermid, J. A., Landwehr, C. (ed.) & Jajodia, S. (ed.), 1992, Database Security V: Status and Prospects. North Holland, p. 77-98 22 p. (IFIP Transactions A: Computer Science and Technology).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. 1991
  14. ADAPTIVE ESTIMATION OF HYSTERESIS THRESHOLDS

    HANCOCK, E. R. & KITTLER, J., 1991, 1991 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION. LOS ALAMITOS: I E E E, COMPUTER SOC PRESS, p. 196-201 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. CADiZ - Computer Aided Design in Z

    Jordan, D. T., McDermid, J. A., Toyn, I. & Nicholls, J. E. (ed.), 1991, Z User Workshop, Oxford 1990. Springer-Verlag, p. 93-104 12 p. (Workshops in Computing).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  16. LINEARITY AND LAZINESS

    Wakeling, D. & Runciman, C., 1991, FUNCTIONAL PROGRAMMING LANGUAGES AND COMPUTER ARCHITECTURE. HUGHES, J. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 215-240 26 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Software Development Process Models

    McDermid, J. A., Rook, P. & McDermid, J. A. (ed.), 1991, Software Engineers' Reference Book. Oxford: Butterworth Heinemann

    Research output: Chapter in Book/Report/Conference proceedingChapter

  18. Using defeasible logic for a window on a probabilistic database: some preliminary notes

    Cussens, J. & Hunter, A., 1991, Symbolic and Quantitative Approaches for Uncertainty. Kruse, R. & Seigel, P. (eds.). Springer, Vol. 548. p. 146-152 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. 1990
  20. Integrated Project Support Environments: General Principles and Issues in the Development of High Integrity Systems

    McDermid, J. A. & Kitchenham, B. A. (ed.), 1990, Software engineering for large software systems. Elsevier Science, 57 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Integrated Project Support Environments and Software Engineering Toolsets

    McDermid, J. A., Jenkins, D. G. (ed.) & Welland, R. C. (ed.), 1990, Software engineering for electronic systems designers. I E E E, (IEE Computing Series; vol. 18).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Security Policies for Integrated Project Support Environments

    Hocking, E. S., McDermid, J. A., Landwehr, C. E. (ed.) & Spooner, D. (ed.), 1990, Database Security III: Status and Prospects. III ed. Monterey: IFIP/North Holland, p. 41-74 34 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. Specifying Security Properties

    Jacob, J. L. & Hoare, C. A. R. (ed.), 1990, Developments in Concurrency and Communication. Reading, Mass, U. S. A.: http://www.aw.com/Addison Wesley, p. 221-237 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  24. 1989
  25. Assurance in High-Integrity Software

    McDermid, J. A. & Sennett, C. T. (ed.), 1989, High-integrity software. Pitman, p. 226-273 48 p.

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  26. USER MODELING BY CLASSIFICATION - A NEURAL-BASED APPROACH

    Beale, R., Finlay, J., Austin, J. & Harrison, M., 1989, NEW DEVELOPMENTS IN NEURAL COMPUTING. TAYLOR, JG. & MANNION, CLT. (eds.). BRISTOL: ADAM HILGER LTD, p. 103-110 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. 1988
  28. Intermediate-level Vision, Relations and Processor Arrays: An Application of sc \Clip4 to Image Sequence Analysis

    Wood, A. M. & Page, I. (ed.), 1988, Parallel Architectures and Computer Vision. Oxford University Press, p. 157-170 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  29. Security Models and Enterprise Models

    Dobson, J. E., McDermid, J. A. & Landwehr, C. (ed.), 1988, Database Security II : Status and Prospects. II ed. IFIP - International Federation for Information Processing, p. 1-36 36 p.

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

  30. 1987
  31. Assurance

    McDermid, J. A. & Anderson, T. (ed.), 1987, Safe and Secure Computing Systems. Blackwell Scientific, p. 163-188 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  32. 1986
  33. Higher Level Operations using Processor Arrays

    Wood, A. M., Uhr, L. (ed.), Preston~Jr., K. (ed.), Levialdi, S. (ed.) & Duff, M. (ed.), 1986, Evaluation of Multicomputers for Image Processing. academic press, p. 91-105 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter