Search research publications and outputs

  1. 1990
  2. Tools that support human-human communication in the automated office

    Benest, I. D. & Dukic, D., 1990, p. 853-859.

    Research output: Contribution to conferencePaper

  3. Towards an Object Oriented Development Environment for Secure Applciations

    Hocking, E. S., McDermid, J. A. & Eizenberg, G. G., 1990, p. 191-200.

    Research output: Contribution to conferencePaper

  4. Towards an Object Oriented Development Environment for Secure Applications

    Hocking, E. S. & McDermid, J. A., 1990, p. 191-200.

    Research output: Contribution to conferencePaper

  5. Z and the Refinement Calculus

    King, S., 1990, p. 164-188.

    Research output: Contribution to conferencePaper

  6. 1989
  7. On The Derivation of Secure Components

    Jacob, J. L., Berson, T. & Cooper, D. M., 1 May 1989, p. 242-247.

    Research output: Contribution to conferencePaper

  8. A Framework for Expressing Models of Security Policy

    Dobson, J. E. & McDermid, J. A., 1989, p. 229-241.

    Research output: Contribution to conferencePaper

  9. A General Framework for Sorted Deduction: Fundamental Results on Hybrid Reasoning

    Frisch, A. M., 1989, p. 126-136.

    Research output: Contribution to conferencePaper

  10. A Hypertext System with Controlled Hype

    Benest, I. D., 1989, p. 52-63.

    Research output: Contribution to conferencePaper

  11. CHAINED BELL INEQUALITIES

    BRAUNSTEIN, SL., CAVES, CM. & KAFATOS, M., 1989, p. 27-36.

    Research output: Contribution to conferencePaper

  12. IPSEs: Concepts and Reality

    McDermid, J. A. & Salenieks, P., 1989, p. 135-164. 30 p.

    Research output: Contribution to conferencePaper

  13. Pictorial Representation of Parallel Programs

    Stepney, S., 1989.

    Research output: Contribution to conferencePaper

  14. Security Policies for Integrated Project Support Environments

    McDermid, J. A. & Hocking, E. S., 1989, p. 41-74.

    Research output: Contribution to conferencePaper

  15. Towards Assurance Measures for High Integrity Software

    McDermid, J. A., 1989, p. 3A/1-3A/9.

    Research output: Contribution to conferencePaper

  16. 1988
  17. A Security Framework

    Jacob, J. L., 1 Jun 1988, p. 98--111.

    Research output: Contribution to conferencePaper

  18. Security Specifications

    Jacob, J. L., 1 Apr 1988, p. 14--23.

    Research output: Contribution to conferencePaper

  19. Jungle Evaluation

    Habel, A., Kreowski, H-J. & Plump, D., 1988, p. 92-112.

    Research output: Contribution to conferencePaper

  20. Jungle Evaluation for Efficient Term Rewriting

    Hoffmann, B. & Plump, D., 1988, p. 191--203.

    Research output: Contribution to conferencePaper

  21. Life Cycle Models for Software Development

    McDermid, J. A., 1988, p. 43-51.

    Research output: Contribution to conferencePaper

  22. Low Level Synchronisation Problems in Digital Systems: Formal techniques in Real-Time Fault-Tolerant Systems

    McDermid, J. A., Morgan, G. & Joseph, M., 1988, p. 139-141.

    Research output: Contribution to conferencePaper

  23. Modal logics of higher-order probability

    Haddawy, P. & Frisch, A. M., 1988, p. 133-148.

    Research output: Contribution to conferencePaper

  24. Security Models and Enterprise Models

    Dobson, J. E. & McDermid, J. A., 1988, p. 1-39.

    Research output: Contribution to conferencePaper

  25. Understanding Multi-transputer Execution

    Stepney, S., 1988.

    Research output: Contribution to conferencePaper

  26. Using VDM with Rely and Guarantee-Conditions: Experiences from a Real Project

    Woodcock, J. & Dickinson, B., 1988, p. 434-458.

    Research output: Contribution to conferencePaper

  27. 1987
  28. Access Management in multi-administration networks

    Lord, S. P., Pope, N. H. & Stepney, S., 1987.

    Research output: Contribution to conferencePaper

  29. GRAIL: Graphical Representation of Activity, Interconnection and Loading

    Stepney, S. & Muntean, T., 1987.

    Research output: Contribution to conferencePaper

  30. IPSES: Requirements; the Meaning of Integration and some Consequences

    McDermid, J. A., 1987, p. 27-36.

    Research output: Contribution to conferencePaper

  31. Inference without Chaining

    Frisch, A. M., 1987, p. 515-519.

    Research output: Contribution to conferencePaper

  32. 1985
  33. Parallel Thinking

    Wood, A. M., 1985, p. 1-3.

    Research output: Contribution to conferencePaper

  34. Using Model Theory to Specify AI Programs

    Frisch, A. M., 1985, p. 148-154.

    Research output: Contribution to conferencePaper

  35. 1983
  36. The Organisation of Parallel Processing Machines

    Wood, A. M., Becker, J. & Eisele, I., 1983, p. 132-144.

    Research output: Contribution to conferencePaper

  37. 1982
  38. ARGOT: The Rochester Dialogue System

    Allen, J. F., Frisch, A. M. & Litman, D. J., 1 Aug 1982, p. 66-70.

    Research output: Contribution to conferencePaper

  39. Knowledge Retrieval as Limited Inference

    Frisch, A. M. & Allen, J. F., 1982, p. 274-291.

    Research output: Contribution to conferencePaper

  40. Practical Parallel Processing: A User's View of sc \Clip4

    Wood, A. M., 1982, p. 4.1-4.7.

    Research output: Contribution to conferencePaper

Previous 1...21 22 23 24 25 Next